76
VOL.15 | ISSUE.4 | AUG/SEP 2010 PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION [ MAGAZINE ] THE MAGAZINE FOR SECURITY PROFESSIONALS SECURITY PP255003/02390 47 OFFICIAL EVENT GUIDE Security2010 EXHIBITION AND CONFERENCE 1 – 3 SEPTEMBER 2010 SYDNEY CONVENTION & EXHIBITION CENTRE The Peak National Body for the Australian Security Industry

Insider Aug-Sept 2010

  • Upload
    ograkos

  • View
    43

  • Download
    4

Embed Size (px)

DESCRIPTION

Security Mag

Citation preview

Page 1: Insider Aug-Sept 2010

VOL.15 | ISSUE.4 | AUG/SEP 2010

PUBLISHED BY THE AUSTRALIAN SECURITY INDUSTRY ASSOCIATION [ M AG A Z I N E ]

THE MAGAZINE FOR SECURITY PROFESSIONALSS E C U R I T Y

PP255003/02390

2547

OFFICIAL EVENTGUIDE

Security2010EXHIBITION AND CONFERENCE

1 – 3 SEPTEMBER 2010 SYDNEY CONVENTION & EXHIBITION CENTRE

The Peak National Body for the Australian Security Industry

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:05 PM Page 1

Page 2: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:05 PM Page 2

Page 3: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:05 PM Page 3

Page 4: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:05 PM Page 4

Page 5: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:05 PM Page 5

Page 6: Insider Aug-Sept 2010

Security in Governmentheads in the rightdirection

22

One small step forcommon sense: A giantleap for security policy

26

Trends in commercialarmed robbery

64

6 //SECURITY INSIDER AUG/SEP 2010

CONTENTSVOL.15 | ISSUE.4 | AUG/SEP 2010

08 | President’s Message

10 | Reform of the NSW regulatory

model – back to the future?

12 | Helping women avoid

pregnancy discrimination

14 | Personal medical/security alert

devices using 000

17 | Government moves to fight

against Phoenix tax fraud

20 | Security Officer Survey –

Speaking Up for Safety

21 | Australian Security Medal Announced

34 | Official Security 2010Conference & Exhibition ShowGuide

67 | ASIAL Certified Security

Monitoring Centres

68 | Adverse Action (Unfair

Dismissal) “All inclusive” rates

and paid parental leave

71 | Hot Products

74 | Frank Sales

Official Security 2010Conference & ExhibitionShow Guide

34

Editorial and AdvertisingSecurity Insider is published byThe Australian Security IndustryAssociation LimitedPO Box 1338 Crows Nest, NSW 1585Tel: 02 8425 4300 • Fax: 02 8425 4343Email: [email protected]: www.asial.com.au

EditorBryan de Caires | [email protected]

Editorial EnquiriesAngela Maan

[email protected]

Advertising

Aleisha Rees | [email protected]

Creative Director

Martin Costanzo | [email protected]

Graphic Design + Prepress

Webfx2 digital | [email protected]

Editorial Contributors

Lance Smith and Erin Louise, Rod Cowan, Chris

Delaney.

Print + Distribution

Nationwide

Published bi-monthlyEstimated Readership of 10,000

[Next Issue]: Oct/Nov 2010

Views expressed in Security Insider do not necessarilyreflect the opinion of ASIAL. Advertising does not implyendorsement by ASIAL, unless otherwise stated withpermission. All contributions are welcomed, though thepublisher reserves the right to decline to publish or toedit for style, grammar, length and legal reasons. PressReleases to: [email protected] references in articles, stories and advertisingwere correct at the time of printing. ASIAL does notaccept responsibility for misleading views. Copyright©2010 (ASIAL) All rights reserved. Reproduction ofSecurity Insider magazine without permission is strictlyprohibited. Security Insider is a subscription based publication, rates and furtherdetails can be found at www.asial.com.au.

ISSN 1442-1720

THE MAGAZINE FORSECURITY PROFESSIONALS

Publisher

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 6

Page 7: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 7

Page 8: Insider Aug-Sept 2010

8 //SECURITY INSIDER AUG/SEP 2010

PPRREESSIIDDEENNTT’’SS MMEESSSSAAGGEE

New South Wales has long led the waynationally in promoting higher standardsand compliance within the securityindustry through the co-regulatorypartnership between industry andGovernment.The improvements havebeen in the areas of promoting nationalconsistency in licensing, improvedstandards and professionalism.

The Government’s recentannouncement to abandon the co-regulatory partnership may well placemany of these improvements atsignificant risk and take the industrybackwards.

As part of the changes the SecurityIndustry Regulator (SIR) will perform agreater regulatory and enforcement roleand will become part of the NSW PoliceForce State Crime Command and berenamed the Security Licensing &Enforcement Directorate (SLED). Industrywill bear the full brunt of funding theadditional 33 personnel within SLED atan initial cost of $4.7 million per year.

Diverting the blameThe changes are in response to theIndependent Commission againstCorruption (ICAC) report into Corruptionin the Provision of Security IndustryTraining. The report identified that theSIR and the Vocational Education andTraining Accreditation Board (VETAB)mismanaged the 2007 licence upgradeprocess and increased the risk ofcorruption in relation to security training.

Industry now appears to have beenpenalised and blamed for the NSWGovernment’s failure to correct internalfaults within the SIR (in dealing with the2007 license issues) and with VETAB (inthe ongoing accrediting and properauditing of training providers).Furthermore, no evidence has beenprovided to show that imposing

increased licence fees to fund a largerbureaucracy will result in any meaningfulimprovement in compliance levels acrossthe industry (particularly among smalleroperators).

The ICAC report also noted thatproper processes to assess and monitorthe performance of Approved SecurityIndustry Associations were not in place.ASIAL has for many years advocated tothe NSW Government that it needed tostrengthen the requirements for theseassociations to ensure greateraccountability and performance. A wellfunctioning co-regulatory frameworkwould have delivered the additionalcompliance and auditing services beingsought by Government within its currentcost structure and the fees being paidby industry.

It is unfortunate however that ASIAL’sadvice was not acted upon and that nowthe Government is introducing wholesalechange which risks reversing the positiveoutcomes achieved together under theco-regulatory framework.

It is widely acknowledged that of theten approved associations, only ASIALundertook the necessary investment tofulfil its obligations including expendingover $500,000 to promote to consumersthe need to use licensed securityproviders.

From the very outset, ASIAL’s positionon co-regulation was that it was aboutimproving standards and the level ofprofessionalism within the industrythrough a partnership between industryand Government. In accepting thisresponsibility ASIAL chose not toincrease membership fees (70% ofASIAL members pay less than $275 perannum), rather it focused on providingadditional benefits and services.

Whilst ASIAL accepts theGovernment’s right to terminate

mandatory membership, the major risk isthat it will encourage smaller and lessscrupulous providers to operate underthe radar and beyond the control ofindustry associations.

Where to now?ASIAL’s concern is that these changeswill effectively signal the end of co-regulation and the implementation of theagreed COAG reforms on developing auniform and consistent approach toindustry licensing.

Rather than disengaging with industry,there is a compelling case for greaterindustry engagement in framingcompliance and enforcementapproaches to address issues such asrates of pay, sham contracting andphoenixing.

Meaningful and long lastingimprovements in the industry will only beachieved through a genuine co-regulatory partnership betweengovernment and ‘recognised’ qualityindustry associations.

It is an inherent right of any industryto have a say in shaping its own destiny.The proposed changes take away thisright and hands over industry control toGovernment bureaucrats.This is not inthe interests of the industry, and moreimportantly the community as a whole.

Ged Byrnes

ASIAL President

THE END OF THE ROADFOR CO-REGULATION?

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 8

Page 9: Insider Aug-Sept 2010

Victoria 9823 1533 [email protected]

New South Wales 9552 8350 [email protected]

Queensland 3862 6222 [email protected]

South Australia 8410 0533 [email protected]

Western Ausralia 9381 7144 [email protected]

New Zealand 09 276 3271 [email protected]

Australia www.lgcctv.com.au

New Zealand www.lgcctv.co.nz

With Australia’s best surveillance solutions, life’s good.In hotels, homes, corporations,

retail chains, airports and

casinos, LG provides just the

right surveillance solution – and

C.R.Kennedy can tailor them to your

needs. LG is one of the world’s great

electronics companies, creating

leading-edge security technology,

including DVR’s, cameras and

accessories. And

C.R.Kennedy matches this

quality with total

surveillance solutions and a dedicated

local support network

right across Australia.

We bring you the right LG

surveillance product at

the right price. You are

supported by dedicated

technical advice from any of our state

offices or authorised resellers

around Australia and New

Zealand. C.R.Kennedy’s

fast and efficient service

is recognised as the best in the

business. Combined with LG’s

world-leading technology, life’s good.

CRK26213 IN

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 9

Page 10: Insider Aug-Sept 2010

10 //SECURITY INSIDER AUG/SEP 2010

IINNDDUUSSTTRRYY NNeWWSS

REFORM OF THE NSW REGULATORY MODEL -BACK TO THE FUTURE?The Independent CommissionAgainst Corruption’s (ICAC)December 2009 report on the findingsof Operation Columba demonstratedthat more work needs to be done toensure ongoing compliance with theregulatory regime for the NSW securityindustry.

On its release in December 2009,ASIAL welcomed the findings of theICAC Report. Among the ICAC report’skey findings included that the SecurityIndustry Registry and VocationalEducation Training Advisory Boardmismanaged the September 2007licence upgrade process.

“Despite their concerns about thecompetence of security officers andthe quality and integrity of securitytraining, and their knowledge of pastcorruption in the industry, the SIR andVETAB did not apply this knowledge tothe security licence upgrade process.They did not identify all the corruptionopportunities or have in placesuccessful strategies to minimise themor detect corrupt activity.The upgradeprocess increased the risk ofcorruption by increasing theopportunities and instead of solvingthe problems in relation to securitytraining, it magnified them.”

(ICAC Report on the Provision andCertification of Security IndustryTraining)

The report also found that “… not allApproved Security IndustryAssociations (ASIAs) are currentlycapable of effectively carrying out theirrole in ensuring master licenseecompliance with the legislation andthe industry Code of Practice and theirperformance has not, to date, beenwell-monitored by the body tasked todo so: the Security Industry Council”

ASIAL has for many yearsadvocated to the NSW Governmentthat it needed to strengthen therequirements for these associations toensure greater accountability andperformance. A well functioning co-regulatory framework would have

delivered the additional complianceand auditing services being sought byGovernment within its current coststructure and the fees being paid byindustry.

While the ICAC’s findings andrecommendations related to securityindustry training issues, the NSWGovernment decided that they hadbroader relevance to the industry as awhole. Accordingly, it chose toabandon the co-regulatory partnershipwith industry and provide additionalresources to the NSW Police Force’sSecurity Industry Registry’s (SIR),which will be renamed the SecurityLicensing and EnforcementDirectorate.

SLED will report to theCommissioner of Police via StateCrime Command (an operationalpolicing command). It will assumeresponsibility for all integrity-relatedfunctions and compliance and willrecruit an additional 33 personnel.Tofund the additional personnel at SLED,an additional $4.7m annually will belevied on the security industry.TheGovernment has sought industry inputon how this charge should be applied.

The Government has advisedMaster licensees that they may chooseto minimise the impact of increases totheir licence fees by either negotiatingreductions in their industry associationfees, or by choosing to no longer be

members of associations.

Legislation will be introduced to theNSW Parliament in September to:• Make sure all powers provided for

under the Security Industry Act1997 that are necessary for theeffective conduct of complianceauditing, may be exercised bycivilian employees of the NSWPolice Force.

• Remove the industry monitoring roleof the Security Industry Council andinstead focus on the Council’s roleas an advisory body to the Ministerfor Police.

• Remove the current mandatoryrequirement placed on securityindustry Master licensees to retainfinancial membership of one of tenapproved industry associations.

• Specify the increases to licencefees to fund the expanded functionsof the SIR.The SIR will undertake to

communicate with industry to educatemembers and to communicateindustry suggestions and concernsback to the NSW Police Force and theNSW Government more generally.

The Government has advised that itwill take time to fully implement thechanges due to the need to recruitadditional staff, however it is expectedthis process will be completed by theend of the 2010/11 financial year.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 10

Page 11: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 11

Page 12: Insider Aug-Sept 2010

12 //SECURITY INSIDER AUG/SEP 2010

IINNDDUUSSTTRRYY NNeWWSS

HELPING WOMEN AVOID PREGNANCYDISCRIMINATIONThe Fair Work Ombudsman haslaunched a national campaigndesigned to inform women of theirworkplace rights while pregnant.

About 100,000 information packsare being sent to hospitals, GPs andother health service providers inmetropolitan and regional areasthroughout Australia. Pregnant womenwill receive the packs when theyregister with their preferred healthprofessional after becoming pregnant.

The packs contain magazines andpamphlets detailing the workplacerights of pregnant women, whatconstitutes pregnancy discrimination,the harm pregnancy discrimination cancause and how the Fair WorkOmbudsman can help women whoexperience it.

Acting Fair Work Ombudsman LeighJohns says the Agency received morethan 70 pregnancy discriminationcomplaints last financial year.

The Fair Work Ombudsman has hadthe power to investigate discriminationin the workplace since July 1, 2009.

Fair Work inspectors can alsoinvestigate allegations of discriminationon the grounds of race, colour, sex,

sexual preference, age, physical ormental disability, marital status, familyor carer responsibilities, religion,political opinion, national extraction orsocial origin.

Mr Johns says maternitydiscrimination has been one of themost common complaints, promptingthe new national awareness campaign.

“We want women to be aware oftheir rights so they can identify whenthey are being subjected to pregnancydiscrimination and know they can turnto the Fair Work Ombudsman for help.The news of impending parenthoodshould be met with delight, notdiscrimination,” he says.

Mr Johns says pregnancydiscrimination can include a range ofemployer behaviours, such as:• failing to let an employee take

parental leave,• declining to keep a job open,• demotion during pregnancy or on

return from parental leave, or• refusing to promote an employee

because they are pregnant.

“Threatening to engage in any of thesediscriminatory acts also constitutes

discrimination,” Mr Johns says.The Fair Work Ombudsman has

information about maternitydiscrimination available at its websiteat www.fairwork.gov.au or on the FairWork Infoline on 13 13 94 8am-6pmweekdays.

ASIAL BOARD ELECTIONS

The Australian Electoral Commission (AEC) advised that the

Nomination Roll for ASIAL’s upcoming Board Election closed

Friday, 16 July 2010. Only Financial Corporate members of the

Association are included in the roll.The Australian Electoral

Commission has provided the timetable for ASIAL’s Board

election. A nomination form can be found in the Members area of

the ASIAL website.

The timetable for the ASIAL Board election is as follows:

Voter Roll closed: 2 July 2010

Nominations open: 2 August 2010

Nominations close: 23 August 2010 at 12:00noon

Ballot opens: 1 October 2010

Ballot closes: 22 October 2010 at 5:00pm

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 12

Page 13: Insider Aug-Sept 2010

Access Professional Edition Challenging your concepts of access control

Access Professional Edition,

Sydney Adelaide Perth(02) 9672 1777 (04) 00 488 415 (08) 9240 5455Melbourne Brisbane Email: [email protected](03) 9558 8088 (07) 3267 0442

1. Easy to InstallComplete IP based system allows you to use the existing IP network.

Plug’n’play IP device detection reduces installation time.

Compact modular design features DIN rail mounted swap and go controllers. Backed by a Bosch 3 year warranty.

3. Easy to UseUsing the secure operator client, add up to 3 cards per user and assign doors. The system supports up to 5 card formats simultaneously.

Integrated card photo ID and card creation software as standard makes it easy to design and manage cards.

including Muster Reports to check who is on site at any time.

2. Easy to Program

choice of a door type from a list of templates. Assign these to the controllers and you’re done.

Door controllers feature an LCD display with

Bosch APE ad_0710.indd 1 27/07/2010 1:05:22 PM

VISIT US ATSTAND D30

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 13

Page 14: Insider Aug-Sept 2010

14 //SECURITY INSIDER AUG/SEP 2010

IINNDDUUSSTTRRYY NNeWWSS

Following up on ASIAL’s call forconsumers to carefully questionproviders of personal activationdevices and to be wary of the claimsbeing made relating to the devices’ability to elicit a response by Police,Fire or Ambulance,Victoria Police havetaken a position.

Victoria Police has recently reviewedthe use of personal medical/securityalert devices that have an automaticdial up function for pre-programmedtelephone numbers, some of thesespecifically recommend including theemergency 000 number as a pre-programmed number.

Some retailers of personalmedical/security alert devices or“autodialers” have made claims that the useof the emergency 000 number hasbeen approved by emergency serviceproviders when this is not the case.These claims are misleading and

expose the user to a number of risks,including an activation not beingresponded to by emergency servicesor possible prosecution if activationsare not emergency situations.

The Victoria Police Alarm Policyreflects that these devices, which arenot monitored, where the emergency000 number is pre-programmed, willnot receive a police response.

PERSONAL MEDICAL/SECURITYALERT DEVICES USING 000

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 14

Page 15: Insider Aug-Sept 2010

Southwest Microwave is rolling out exciting changes to our INTREPID™ family of perimeter detection systems, with performance enhancements to field-proven sensor technologies and the simplicity of new, single-platform networking.

Universal set-up software, scalable system controllers to suit any site parameters and integrated I/O modules align with a common, open-architecture communications protocol for easy deployment of any combination of INTREPID™ sensors and auxiliary devices on one network platform - letting you protect each portion of your perimeter with the optimal sensor for thatlocation.

Finally, high performance perimeter protection meets true systems convergence.To learn more, visit www.southwestmicrowave.com/intrepid

PROVEN PERIMETER PROTECTION. NEW SINGLE-PLATFORM SIMPLICITY.

Buried Cable Detection System Digital Microwave LinkFence Detection System

INTELLIGENT SENSORS JUST GOT EVEN SMARTER!

PERIMETER DETECTION SOLUTIONS SINCE 1987Palmgrove Business Park, Unit E813-15 Forrester St., Kingsgrove, NSW 2208 Australia | Ph: +61 2 9150 [email protected] | www.perimetersystems.com.au

Perimeter SystemsAustralia Pty Ltd

SEE US ON STAND E39

C

M

Y

CM

MY

CY

CMY

K

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 15

Page 16: Insider Aug-Sept 2010

Careers in Electronic SecurityInformation on careers in the electronic security industry is available on the CPSISC website now!

Electronic Security keeps people safe and helps prevent physical violence. It protects premises and information. It is the most effective tool in detecting crime and bringing perpetrators tojustice.

The website includes detailed information about Working in the Electronic Security Industry and what kind of jobs are available. Jobs fit into the following four main categories: 1 – Technician 2 – Operation3 – Sales 4 – Management To find out more go to: www.cpsisc.com.au

CPSISC Resource DatabaseCPSISC has developed a comprehensive and searchable Resource Database which lists all existing resources against individual qualifications and units of competency within the Construction and Property Services industries. The Resource Database includes CPSISC resources, industry-developed resources, sector-specific, unit-specific, generic and WELL resources.

The database not only provides a summary of resources but also information about the format and content of the resources, and how they can be accessed. The Resource Database will initially contain the major resources available and be slowly built up as more resources become available. There are currently 120 resources available. To access the Resource Database, go to: http://www.cpsisc.com.au and click on the Resource Database button.

CPSISC has resources for Certificates II and III in Security Operations. For more information go to: http://www.cpsisc.com.au/portal/products/StockInformation.asp?stockNo=165

CPSISC Resource CentreCPSISC has also developed a Resource Centre. This is where you’ll find a variety of information, tools and support resources to help you to implement Construction and Property Services Training Packages.

The Resource Centre contains a range of flexible, highly visual and interactive resources to meet your delivery and assessment needs - whether you are looking for specific sector tools, professional development, or wish to link up with other RTOs to share resources and best practice.

Follow the links to find the support you need for your training and assessment activities.

The Security Sector Guide will assists with the use and understanding of the Security Sector qualifications and units of competency within CPP07. Whether you are an employee, a job seeker, an employer, a trainer or assessor, or another person interested in security skills, this guide will be of use. It contains advice on:

An introduction to the Security Sector

Career and learning pathways

Licensing requirements

Process for implementing training

Broader human resource applications

For more information on the CPSISC Resource Database, the Resource Centre or Careers in Electronic Security, go to www.cpsisc.com.au or email: [email protected]

Construction and Property Services Industry Skills Council

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 16

Page 17: Insider Aug-Sept 2010

SECURITY INSIDER AUG/SEP 2010// 17

Fully licensed and insured - SCEC Endorsed staff

Level 5, 520 Collins Street, Melbourne, Vic. 3000

Email: [email protected]

Web: www.connleywalker.com.au

Phone: (03) 9621 1077

Project managementSecurity management

CCTVAccess control & biometricsPhysical securitySecurity alarms (incl Type 1)

Security risk assessmentsTechnology reviewsMaintenance auditsProcedure reviews

Reviews and Audits

Design

Management

IINNDDUUSSTTRRYY NNeWWSS

GOVERNMENT MOVES TO FIGHT AGAINSTPHOENIX TAX FRAUDThe federal government has passedlegislation to strengthening lawsagainst Phoenix activity.The legislationis designed to stop unscrupulousoperators who deliberately liquidate acompany to avoid paying liabilitiesincluding workers wages,superannuation and other debts owedto business creditors and also the ATO.

The Assistant Treasurer, Senator NickSherry, has highlighted a significantstrengthening of laws to fight fraudulent'phoenix' activity which has beenpassed by Parliament.

Phoenix activity involves thedeliberate liquidation of a company toavoid paying liabilities - includingworkers' wages and superannuation,debts owed to other business creditorsand also taxes.

The business then 'rises' andcontinues operations through anothercorporate entity, controlled by the

same person or group of individuals,often with a very similar name and freeof the debts.

"This new legislation will make itmuch harder for unscrupulous

operators to engage in phoenix activityand stops them from cheating workersand other business people of whatthey are rightfully owed," the AssistantTreasurer said.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:06 PM Page 17

Page 18: Insider Aug-Sept 2010

IINNDDUUSSTTRRYY NNeWWSS

18 //SECURITY INSIDER AUG/SEP 2010

“It does this by expanding the use of'security deposits' and significantlyincreasing penalties."

The reforms are contained in the TaxLaws Amendment (Transfer of Provisions)Bill 2010.

"Security deposits act like a bond,which the Tax Commissioner can direct ataxpayer to make in relation to anexisting or future tax liability," theAssistant Treasurer said.

"The Commissioner can also acceptsecurity in another form, such as amortgage over property or a guarantee."

The new provisions expand the scopeof security deposits from applying only toincome tax to applying to all taxes thatthe Tax Commissioner administers.

The penalties for non-complianceincrease for individuals from 20 penaltyunits ($2,200) to 100 penalty units($11,000). For companies, they increase

from 100 penalty units ($11,000) to 500penalty units ($55,000).

The legislation also containsimportant new procedural safeguardsthat will govern how the TaxCommissioner uses the security depositmechanism, including requiring theCommissioner to write to the taxpayerclearly identifying the reasons why thedeposit has been requested andoutlining the taxpayer's review rights.

PHOENIX TAX FRAUD (CONT)

ASIAL MEMBERFLYERS AVAILABLEFOR PURCHASE

ASIAL’s member flyers are nowavailable for purchase from the ASIALonline store.These promotional flyersset out the benefits of using an ASIALmember company and can bedistributed to potential commercialclients and domestic clients. The flyersinclude a space for you to attach yourbusiness card on the reverse.

A growing number of members are utilizing their FREE new ASIAL memberbenefit – a company webpage on the ASIAL website.The webpage allowsASIAL members to upload their own logo, images,video and product/service information into a webpage with a dedicated URL.

The new web page will be available in twodifferent templates and four colour schemes.

If you haven't already done so, sign up atwww.asial.com.au now to get started today.

GET YOUR FREE COMPANYWEB PAGE ON THE ASIAL WEBSITE

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:07 PM Page 18

Page 19: Insider Aug-Sept 2010

Grade One Monitoring Pty LtdA.B.N.: 76 119 807 644

Phone: 1300 723 185 Fax: 1300 723 195Email: [email protected] Web: www.grade1,com.au

Master Licence #: 409 475 562 ASIAL Member #: 031080

TM

GuardcellSecure

PERmaconnleaders in GPRS security technology

GPRS Monitoring from $4.00 + GST per week

Multiple GPRS Reporting Platforms

“ Your Grade A1 Monitoring Centre ”

Grade A1 ASIAL Certified Monitoring Centre

Bureau Specialist Monitoring

ISO 9001 Quality Certified

24/7 Line Commissioning

Flexible Tailored Security Services

1300 723 185www.grade1.com.au

Page 20: Insider Aug-Sept 2010

IINNDDUUSSTTRRYY NNeWWSS

20 //SECURITY INSIDER AUG/SEP 2010

As part of the 3-year benchmarkstudy of the security industry in Australiafunded principally by the AustralianResearch Council, ASIAL in conjunctionwith the University of South Australiaand Griffith University, is conducting astudy into how practices can bedeveloped to ensure security officer andpublic safety. Feedback is being soughtfrom individual licence holders abouttheir experiences and views on how toimprove safety for security officers andthe people they work with. ALLresponses will remain anonymous.

The survey can be completed byvisiting www.asial.com.au

Security System Programming DataOwnership and TransferabilityGuidelinesASIAL has prepared draft guidelineshave been prepared for membercomment. For more information visitwww.asial.com.au

AS4421: Guards and patrols standardFollowing a review initiated andchaired by ASIAL, the Guards andPatrol standard has now beenupdated.The draft is now availablefor public comment. Comments closeon the 16th September 2010.

SECURITY OFFICER SURVEY - SPEAKING UP FOR SAFETY

DEDICATED MICROSWINS IFSEC AWARDFOR CLOSED IP TVDedicated Micros has taken out the

Integrated Security Product of the Year

category at the IFSEC 2010 Security

Industry Awards for its Closed IP TV

system, a plug & play IP video product

solution which offers all the physical

security of a traditional CCTV system to

the IP environment.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:10 PM Page 20

Page 21: Insider Aug-Sept 2010

IINNDDUUSSTTRRYY NNeWWSS

SECURITY INSIDER AUG/SEP 2010// 21

A group of major security buyershas formed the Australian SecurityMedal Foundation (ASMF). ASMF’s keyaims are to publically recogniseoutstanding security operatives andsecurity professionals and to promote‘Security’ as a profession. It isproposed that two categories ofmedal be struck:1. The Australian Security Valour

Medal (ASVM), recognising securityoperatives for an outstanding act oracts of valour; an action(s)demonstrating valour, courage anddecisiveness above and beyondthe call of duty.The ASMF guidelineis to award between one and amaximum of ten ASVM’s perannum.

2. The Australian Security Medal(ASM), recognising the outstandingcareer and character of the securityprofessional receiving it.The ASMF

guideline is to award between oneand a maximum of three ASM’s perannum.“ASM recipients will be those who

have demonstrated a consistent, high-level contribution to the widercommunity, possibly via innovativenon-core business activities andprojects, or via extraordinaryperformance in their professional role,”says Craig Millar, Chairman of thisyear’s Awards panel.“A citation fornon-award nominees will also beconsidered based on the number andquality of nominations received.”

For more information about theAustralian Security Medals Foundationand the nomination criteria, visitwww.australiansecuritymedal.com

BUREAU ALARMMONITORINGGUIDELINESASIAL has prepared draft guidelines toassist members in helping to:• Help ensure high standards of

service and ethics are maintained byASIAL members.

• Clearly outline the responsibilities ofmonitoring providers and bureaux toensure fairness to both parties.

• Address areas of potential contentionbetween bureaux and monitoringproviders.The draft guidelines are available on

the ASIAL web site for comment –www.asial.com.au

AUSTRALIAN SECURITY MEDALANNOUNCED

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 21

Page 22: Insider Aug-Sept 2010

22 //SECURITY INSIDER AUG/SEP 2010

The Security in Government conference (SIG), this year,was all about…well…security in government.

To find that remarkable, you would have to know that in thepast few years — let’s face it, since 9/11 “changed everything”— the SIG agenda has been hijacked by terrorism, turning itinto something of a national security gabfest.

Of course, you can’t talk publicly about really interestingaspects of terrorism and counter-terrorism, the upshot beinga string of speakers offering less — often far less —information than you’d find with a decent search engine.

As a result, the core audience — agency security advisers,policy wonks, bureaucrats, information technology securityadvisers and private security contractors to Government —werefast losing interest. After all, their daily concerns are moreabout things like preventing walk-in theft, loss of information,or illegal computer use, rather then watching out for Osamaand his crew.The reality is if there were a terrorist attack, itwould quickly become the business of first responders andthen investigative agencies.The point is, yes terrorism is animportant issue, but probably as relevant on a day-to-day basisto this crowd as design tips on security for kittens.

SIG’s decline as a source of information and networkingopportunities was highlighted by the fact that this was the22nd SIG conference in 23 years — hardly anyone noticed2009 slip by without one.

This year’s turnaround came about mostly because theNational Security Resilience Policy Division, part of theFederal Attorney-General’s Department, picked up organisingthe conference and decided to rethink the SIG concept withthe aim of getting it back on track as the key Governmentsecurity event on the conference calendar.

The first sign of difference in this year’s SIG — with thetheme Securing Our Business — was the choice of

speakers.To be sure, there were government representatives,such as the Federal Attorney-General, Robert McClelland,and the National Security Adviser, Duncan Lewis, amongothers. But, there were also speakers from the private sector,such as Paul Maihi, Head of Crisis & Security Management,Group Operations Westpac, and Michael Julian, GeneralManager, Westfield Security. Now, what’s that all about? Well,amid the SIG rethink was the need to reflect the significantpolicy shifts that have been taking place.You see, behind thescenes it hasn’t all been about the War On Terror.There hasbeen a distinct broadening of the security agenda —population, climate, organised crime and so on — and arealisation that Government is not the font of all knowledge.Sure, if you want to know about the likes of locking stuff away,go to a Government organisation. In the past, after all, it wasall about the “need to know”.Today, however, is about need toshare. As such, building security systems around informationsharing is best found in private sector practices. SIG,therefore, is an excellent forum for building much-needed

SECURITY INGOVERNMENTHEADS IN THE RIGHTDIRECTIONAfter a year hiatus and new organisers, the Security in Government conferencewas back on again this year. Rod Cowan* was there to watch proceedings.

SSIIGG

>

Security in GovernmentConference delegates

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 22

Page 23: Insider Aug-Sept 2010

SECURITY INSIDER AUG/SEP 2010// 23

SSEECCUURRIITTYY IINNSSIIDDEERR

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 23

Page 24: Insider Aug-Sept 2010

conduits between the public and private sector.Another sign of change was that the Federal

Attorney-General had something more to say than aturgid Google search on the history of terrorism.Apart from A-G’s Department dumpingspeechwriters — with staff in the know writing thematerial now — there have been some significantchanges in policies, approaches, and activities,perhaps best reflected in McClelland’s launch atSIG of the Government’s new Protective SecurityPolicy Framework (PSPF). Okay, the policy wasn’tactually available on the day — having failed toemerge in time from the quagmire of what was thenthe Rudd administration — and the press release inpoint of fact ended:“More information about thenew Protective Security Policy Framework isavailable at.”

See anything missing?In Government terms protective security

comprises the physical, personnel, informationand procedural measures that are put in place tosafeguard Australia’s national security interests.

“The new policy creates a more effectiveprotective security framework by streamliningpractices in order to achieve better securityoutcomes as well as reduce red tape, increaseefficiency, eliminate duplication and reduce costs,”McClelland said.

“The current framework was developed when thebusiness of Government wasn’t as diverse as it is currently.In today’s security climate, Government and private sectorpartnership is essential and we need a system that can betailored to the nature of the task, the identity of the partiesand the relevant security issues considered.”

The Protective Security Manual (PSM) had grown to over250 pages, containing more than 400 different mandatoryrequirements.

“The new framework contains just 33 with a tieredframework consisting of a range of core standards, policiesand guidelines – some to apply across the board, and othersto be developed by and apply to specific agencies, takinginto account their individual work and function,” saidMcClelland.

In short, anyone in the business of providing security togovernment had better get their head around the PSPF quicksmart. (The information is now available atwww.ag.gov.au/pspf.)

So, was SIG an overall success? In addition to relevantand interesting content being on the money, all the numbersalso headed in the right direction: Conference attendancewas up by 20 per cent to 747 people; exhibition sales up by

45 per cent to 122 booths; and sales of conference tickets,booth, sponsorship and social events pulled in $437,000,with a somewhat embarrassing — since the aim is not tomake money — profit of somewhere between $120,000 to$150,000, which the organisers say will be ploughed backinto next year’s SIG.

There were a couple of minor downsides.A few people grumbled that the material did not go deep

enough for their liking. Speakers, however, rarely win over sucha large and diverse crowd, by lecturing at Masters level.

Also, the conference dinner speaker from the US,Christopher Painter, Senior Director for Cybersecurity, NationalSecurity Staff,The White House, deserved better than chinkingglasses, chatting, face-pulling and general hub-bub from aboorish segment of the crowd — mostly security providers, ithas to be said. In fairness, Painter’s discussion was toointeresting and too important for a dinner gig and should havebeen part of the conference proper. Next year’s organisersmight want to think about a dinner speaker who isinspirational or funny — or even better, inspirational and funny.

All of which is pretty much nitpicking.The only real downside, then, is it is tough to write a review

— especially with any sense of wit or irony — about an eventthat goes well.

And, this was one extremely tough review to write.

CONFERENCE ATTENDANCE WAS UP BY 20 PERCENT TO 747 PEOPLE; EXHIBITION SALES UP BY 45

PER CENT TO 122 BOOTHS; AND SALES OFCONFERENCE TICKETS, BOOTH, SPONSORSHIP AND

SOCIAL EVENTS PULLED IN $437,000.

““””

24 //SECURITY INSIDER AUG/SEP 2010

SSIIGG

* Rod Cowan is an independent Contributing Editor. He can be contacted at [email protected]

Christopher Painter, Senior Director for Cybersecurity, National Security Staff,The White House

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 24

Page 25: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 25

Page 26: Insider Aug-Sept 2010

26 //SECURITY INSIDER AUG/SEP 2010

Mike Rothery, head of the Federal Attorney General’s National Security Resilience Policy Division.

MMIIKKEE RROOTTHHEERRYY:: SSEECCUURRIITTYY PPOOLLIICCYY

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 26

Page 27: Insider Aug-Sept 2010

SECURITY INSIDER AUG/SEP 2010// 27

MMIIKKEE RROOTTHHEERRYY:: SSEECCUURRIITTYY PPOOLLIICCYY

continued page 28 >

Arriving at the Attorney-General’sDepartment’s glass and marble hotelstyle offices, complete with atrium andtrendy coffee shop, the female voice onthe other end of the reception deskphone tells me the man I have come tosee, Mike Rothery, head of the FederalAttorney General’s National SecurityResilience Policy Division, has justpopped out to Gabyz to get a bite to eat.

A short while later, Rothery greets meat the front entrance — dark suit trousers,pale grey shirt and regulation dark tie —holding a cardboard cup of hot chips inhis hand.“Comfort food,” he says. He’srecovering from a bout of flu, courtesy ofhis kids.

We make our way upstairs — via adrinks machine to buy a diet cola — to hiscorner office. But there are no downtownmetropolitan views here. Instead, it looksover a sand-covered children’s play areawith shade cloths, bouncy balls andbuckets. Beyond that, a car park withGabyz, a café a demountable buildingwith plastic tables and chairs outside.

The office is steel and blond wood

furniture, white wall, ash coloured carpet,and a plasma TV suspended from theceiling. Next to the flat screen computeron the desk sits a large Macquariedictionary, behind the desk chair, atraditional safe. Along the window shelfare stress balls, except they are in theshape of yellow rubber ducks withGovcert stamped on the side, save oneshaped like a red heart.

As we sit at a round meeting table withfour chairs, Rothery slides a partiallyfrosted glass wall with a white tyre trackpattern across the middle, shutting hisoffice from the open plan area. It is quiet.So quiet, you can hear the low hum of theair-conditioning.

The 26-year veteran of Governmentbureaucracy speaks as someone whohas confidence in his ability and iscomfortable in his position…

Security Insider:Thanks for your time.I wonder, in 2007 there was a changein leadership, what has happened inthat time?

Mike Rothery: Well, we in the Attorney-

General’s Department restructured at theend of 2008 to reflect a number ofchanges in the approach to homelandsecurity with the change of government.One of those was to move to the all-hazards approach, which is to try andmake sure that the programs that we runand the effort that government makes tominimise risk to the community, that if weare going to spend time and effort on acapability, that we try and make thatcapability deal with the broadest numberof hazards.Whether it is about commandand control, or communications systems,or policy, it is about saying, rather thanhave, you know, a sort of stove-pipedapproach to dealing with terrorism, naturaldisasters, manmade hazards, such asinfrastructure failure, it is to say, well canwe actually develop capabilities that helpmitigate all of those, or more than one?And, that’s an important commitment thatthe Government has made.The other isthat the Prime Minister [Rudd] delivered anational security statement to Parliamentin the end of 2008 broadening what wewould normally call national security for it

ONE SMALL STEP FOR

COMMONSENSE:A GIANT LEAP FOR SECURITY POLICY

By Rod Cowan*.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 27

Page 28: Insider Aug-Sept 2010

to cover threats such as seriousorganised crime, major natural disasters,and what that has done is that it has sortof said that the way that government hasorganised itself, particularly the way thatthe Federal Government has organiseditself, to deal with these threats of nationalsignificance is that we are now going touse that approach and the resources thathave traditionally been assigned todealing with those high end nationalsecurity matter are now going to beapplied to a broader range of threats.That,of course….

SI:The phone rings. It’s the boss.Rothery returns after a shortconversation.

MR: So, the Department’s restructurewas in a good part to position theDepartment to achieve those outcomes;that is the all-hazards approach and toapply the approach that had been appliedto serious matters of national security, to abroader range of threats, including thingslike serious and organised crime andmajor natural disasters. And, theconsequence of that is that of thatrestructure is that we have invested in amore strategic approach to ouremergency management work, throughthe creation of a new strategic policy areathat is working with the States andTerritories on a resilience-basedapproach, which was signed off by COAGin December 2009.We are also pursuinga resilience-based approach with ourwork for critical infrastructure, working onimplementing recommendations from areview of cyber security that has part ofthat arrangement as well, and also lookingat the other areas in the Department withregard to our operational co-ordinationand crisis management arrangementsand our capability developmentarrangements. So, it has been quite acomprehensive rethink about the way thatthe Department orders it outcomes.

SI: What is it then that you see as yourcurrent mandate?

MR: Well, the Division that I look afteris the National Security Resilience PolicyDivision has it’s goal is to help prevent ormitigate the effects of hazards on thecommunity, be it from natural disasters, be

it from infrastructure failure, or attacks oninfrastructure, issues around cybersecurity from organised crime, or issuesrelating to things like terrorist accessingchemicals to make home-madeexplosives, or things around identity theftand identity fraud. So, the Division’sresponsibilities are quite broad and theyrelate both to the way that we protectgovernment from a security point of view,including cyber security, but also what dowe do with the private sector? So, ourpartnerships with the private sectoraround things like critical infrastructure,cyber identity security, those things are allwithin the scope for the Division. So, it is areasonably large slice of the domesticsecurity policy.

SI:That are of private partnership wasobviously a big part of Security inGovernment [SIG conference] this year.There seemed to be a lot more talkabout this working together withbusiness, but what are the practicaloutcomes of that?

MR: SIG is an interesting example.TheSecurity in Government conference —traditionally a place for the securitypractitioners in government to cometogether, hear about changes in policy,learn about best practice — has in themore recent past been used to talk aboutnational security issues, particularlyterrorism issues more broadly, but wehave made a conscious effort this year tobring it back to a practitioner’s forum.Now, one of the things that we thoughtabout is about, well where is bestpractice? There had been perhaps a smalldegree of arrogance that government wasthe source of best practice in protectivesecurity and in some areas it clearly is. Ithink in terms of some the bestcapabilities in protective security being incyber security, some of the bestapproaches to the prevention ofsurreptitious access to information, whatgovernment does is best practice and weprobably have some things…lessons thatcan be passed on and shared with theprivate sector. But, I other areas ofprotective security, it certainly was myview that we were failing to exploit what Isaw as a great deal of knowledge andcompetence that was in the private

sector, not only in terms of the securityindustry but in the way that security isdone in business more generally.Youknow, if you want to know about bestpractice in CCTV, you would probably goand talk to a casino. If you want to talkabout the protection of staff in high-riskareas, it is probably much more likely tobe in the private sector than government.In some respects, we are lucky that wedon’t have that — we do have in parts —but where do government agencies go towhen that is an issue for them? When it isnot something that is a common problemacross agencies but is a commonproblem in many other industries and theprivate sector. So, one of the steps thatwe took was to try and invite some privatesector speakers on to the SIG program.And, also to allow more industrydelegates to actually attend SIG. Really, inpart, to start to work with securityprofessionals and get the networkingacross security professionals, be they inthe private sector, be they in government,or be they in the security industry.The ideathat we are just going to have acommunity that is only for securitypractitioners within government agenciesseem to be cutting your nose off to spiteyour face.

SI:There are limits, though, isn’t there?If you open it up too much, then youend up getting invaded by sales people,don’t you?

MR: There is this sort of balancebetween having the conversationdominated by product placements orhaving a conversation where you actuallyfind that the security practitioner ingovernment have a lot in common withtheir counterparts in business.That’s notto say that there is not interest in findingout what is on the market or thecapabilities that companies have in termsof services or products.There is aninterest in that but it is not the onlyinterest. It is not the only show. It is anissue about finding a balance.We alsohave to sort of push back on this sort ofinstinctive negative reaction that securitysales people are just out to sell you aproduct and aren’t interested in what isgood practice in the industry or what arethe emerging problems or what are the

28 //SECURITY INSIDER AUG/SEP 2010

MMIIKKEE RROOTTHHEERRYY:: SSEECCUURRIITTYY PPOOLLIICCYY

>

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 28

Page 29: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 29

Page 30: Insider Aug-Sept 2010

emerging markets.We all want to be in asituation….[The same phone ringsagain.]…Sorry.

Rothery goes to his desk and returnsafter another short phone conversation.

SI: So, you were saying the interactionwith sales people…

MR: Yeah, so there has also got to bea maturing of this with the industry, aswell. I mean, if the industry is going to beinvited in to participate in strategising or totalk about the future and to talk aboutemerging issues, there has got to be a bitof maturity about that, in terms of maybeoccasionally setting aside the immediatesales pitch for an opportunity to talk aboutthe future.You know, when we engagewith many of the big defence industrycompanies on things like cyber security,they are able to walk and chew gum atthe same time; they are able to come inand talk strategically and then come in aweek later and tell you about their latestproduct offering. ITwould be good to havethat relationship with the security industrymore broadly.

SI: At SIG there was an announcementof a new security policy — but the policywasn’t actually available — what are theoutcomes of that policy?

MR: Well, that policy went live on thefollowing Friday, so you can get it fromwww.ag.gov.au/pspf.

The Protective Security PolicyFramework [PSPF] is our first element of anew protective security policy for theCommonwealth. It replaces thegovernance section of the old ProtectiveSecurity Manual [PSM]. At the moment,practitioners are using the twodocuments: the new PSPF for policy, andthe old PSM for the practical elements ofphysical security, personnel security,information security etc.What is differentabout the new Protective Security PolicyFramework is that it tries to separatepolicy from process. So, what it is askingCEOs to do is to guarantee certainsecurity outcomes, but give them adegree of flexibility about how theyachieve those outcomes, by taking whatwe would regard as a more conventionalapproach to risk. Previously, the PSM wasvery much driven by an understanding of

harm, that is classified material that wouldhave a lot of damage to government isprotected in almost absolute ways. And,other material that seemed to have lessharm, then it has a lower regime ofphysical security in procedural securitymeasures. So, it wasn’t really risk based, itwas driven by impact not taking intoaccount things like opportunity orlikelihood of a particular attempt to stealor misuse information.What we haveintroduced is a more mainstream conceptin accordance with the new ISO standard.But, you know, importantly, we have statedright up front that the purpose of having aprotective security policy is not only toensure the protection of information, butis actually also to ensure and enableinformation sharing. Now, the old policynever said that and what that meant wasthat whenever there was a need tointerpret the policy, it was alwaysinterpreted in a way of, well, you default toprotect and default to not disclose. Now,what we have made clear is that thepurpose of having a policy — astandardised approach across agencies —is to actually enable the sharing ofinformation across agencies.The securitypolicy itself should not become the barrierto effective information sharing.Thosethings are conceptually fairly easy — theydon’t take many pages to write — but theyare a significant shift in terms of both theapproach but also the outcome that thepolicy is trying to achieve.

SI: Isn’t that a bit like rewriting theBible? I mean have you had muchresistance to these ideas?

MR: I have to say that the reactions fallin to sort of two camps.There are thosethat are really excited by the idea of a risk-based approach, which will allow peopleto find more innovative ways of achievingthe security outcome but also deliveringservices, particularly online.There are alsosome critics out there who sort of say youare moving us away from a complianceregime and a compliance regime is easy;you know what you have got to do, youdon’t have to argue with people, you don’thave to make any calculations to risk, youjust follow the rules…

SI: …tick the boxes?...

MR: Yeah, and we are taking thatsafety net away.

SI: Are you providing counselling forthese people?

MR: Well, we are certainly allowing areasonably sober introduction period.Weare releasing the policy framework, now. Itwill be another nine to twelve monthsbefore all of the other procedural parts ofthe policy are reviewed and published.Weare working with the training centre herein the Attorney-General’s Department thatprovides training to Agency SecurityAdvisors and Government.We are alsoworking with people like the Audit Officeto see how future audits of agencysecurity will be done in accordance withthe new policy framework. And, of course,that approach is going to permeate themore procedural parts of the framework,relating to things like ITsecurity, physicalsecurity. It will start to take in things likeaggregation, so should a single documentor piece of information get the sameprotection as a million pieces ofinformation? At the moment the rules sayexactly the same. Common sense wouldsay, if you have got a single place which isa rich source of data, you might need todefend that a bit harder than a singledesk draw with one piece of information.That sort of approach is common sense.So, yes, we are asking people to change,but we are actually asking to change tosomething that is a little bit more intuitive,a little bit more real world, and takes intoaccount the fact that most of theinformation we now store and create andsend to each other is electronic, ratherthan bits of paper, and the old policy reallywas paper based.

SI: What does this mean for business?If I was providing products or servicesto the Government, is this something Iwould need to get my head around?

MR: Oh, I think so. I think, if you are acontractor for Government, some of thosecontractors at the moment have half adozen security clearances in differentagencies. As of 1st October, this year, thevast majority of contractors will only needto have one clearance at the highest levelfor the highest customer, which will thencount for all of the other customers. I’m

30 //SECURITY INSIDER AUG/SEP 2010

MMIIKKEE RROOTTHHEERRYY:: SSEECCUURRIITTYY PPOOLLIICCYY

>

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:15 PM Page 30

Page 31: Insider Aug-Sept 2010

QFG0184/Tails. Qantas Airways Limited ABN 16 009 661 901.

qantas.com

The Spirit of Australia≥

No one knows Australia better than Qantas. That’s why more people choose to fly to and around Australia with us. That’s the spirit. The Spirit of Australia.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 31

Page 32: Insider Aug-Sept 2010

quite often told people have got four, five,six different security clearances, each ofwhich they have to pay for as part of theircontracts. So, for example, it is going totidy that up, because we are going tohave a new Australian Governmentsecurity vetting agency, located in theDepartment of Defence, which will bedoing the vast majority of securityclearances.

We are also going to be moving toportability of clearances.That is, whensomeone moves from agency to agency,those clearances will be recognised untilthey need to be re-validated. People won’thave to fill out the forms again.They won’thave to go through another process.Obviously, there is going to be, because ofthe risk-based approach, there is going tobe the opportunity to introduce new andinnovative security solutions, probablyoutside of, or broader than, the range ofsecurity treatments that governmentagencies have used in the past. And, Iunderstand from my colleagues in theDefence Signals Directorate [DSD] thatthey are thinking of a similar approacharound the security of the Internetconnected IT, which is going to meanthe possibility of some consideration ofsome new and different sorts of securityproducts and services.

SI: Looking at COAG for the moment.How far away is some sort of nationalframework within COAG, say, forguarding?

MR: Well, there is an agreement for anational framework on the guardingservices part of the security industry.Obviously, we are waiting for theimplementation to be completed by theStates and Territories and we are verykeen that that happens.There hasobviously been a little bit of slippage insome of the dates, but we are stillworking with the States and Territories tosee whatever obstacles there are forthem to implement the agreement. Morebroadly, one of the things that we havebeen approached on is around a greaterrecognition of proper, professionalcompetencies and things like theconsulting end of the market.That is notfully regulated across all the States andTerritories, so some regulate, some don’t.

There are some differences there interms of the professional standards thathave to be met to achieve licensing orregistration in different States. Obviously,for the Federal Government to assist, itwould be our strong preference not tobe sort of picking a winner; not to besaying it is going to be this part of theindustry or that industry association andnot that other peak body. Our preferencewould be that the industry itself comesto some sort of agreement on whatdoes a security professional look like?And, [with] people with differentqualifications, what does it mean thatthey are capable of doing? Because, asecurity consultant could be everythingfrom visiting your home, telling youwhere your movement sensitive lightsand door locks should be, through tosomeone that is working with a largemulti-national corporation, looking attheir arrangements for potential hostagetaking of executives, when they aretravelling overseas, or issues relating todifficult equations of mixing safety andsecurity around things like oil refineriesan gas plants.The types ofcompetencies that are required, the typeof experience you would expectsomeone to have, have to really betailored to the particular task that you aregiving them. So it is a complex sort ofmatrix of skills, qualifications,certifications, competencies, as well asall those issues about character, goodreputation, sound business financials,and so forth. Our strong preference isthat industry sort itself out and bring toGovernment a model that has got strongconsensus across the industry.Then, wecan have a look at talking to the Stateand Territory Governments about seeingthat reflected in the licensing regime. Atthe moment it is so balkanised that therereally is not an elegant alternative towhat the State and Territories havealready done. One can hardly blame theState regulators fore the approachesthat have been taken, because no onehas made it any easier for them. So, thebody that has just been created [theAustralasian Security ProfessionalsCouncil], which we strongly support,which is doing this work of working withthe peak bodies, working with the

industry associations, and building thatconsensus, which will then, hopefully,turn into some more detaileddiscussions about professionalcompetencies and practitioneraccreditation, that’s the way forward. Ifindustry gets behind that and makes itwork, then it becomes much, mucheasier for government regulators to linklicensing requirements to theseindependent professional competencies.

SI: Finally, what is your ambition forthe future?

MR: There is going to be someannouncements in the next few weeksabout our move from criticalinfrastructure protection to criticalinfrastructure resilience.This is ourcommitment to what we see as thebenefits of a resilience-based approachfor business and that is going to meanan entirely fresh approach to therelationship we have had with the criticalinfrastructure owners.We will be rampingup the services that CERTAustraliadelivers to the business community. Itcommenced operating at the beginningof the year, inheriting the work fromGovcert.au, but we have got a while newrange of activities and products that willbe coming online for business in thesecond half, some of those interweavedwith the new ISP security code ofpractice that has just been released.Weare working with the States andTerritories on a disaster resiliencestrategy for the whole of the country,around our ability to deal with bothmanmade and natural disasters.We havegot to bring that back to leaders at theend of 2010.The core of a lot of this isour relationship with business. It is aboutthe role that business has in things likeidentity security, cyber security, security ofchemicals; our relationship with thesecurity industry and the consultantsaround the security of the AustralianGovernment systems and agencies; and,of course, our work with CERTAustraliaand critical infrastructure. So, we live anddie on the strength of our relationshipwith the Australian business community.

SI:Thanks again for your time.MR: Thank you.

32 //SECURITY INSIDER AUG/SEP 2010

MMIIKKEE RROOTTHHEERRYY:: SSEECCUURRIITTYY PPOOLLIICCYY

* Rod Cowan is an independent Contributing Editor. He can be contacted at [email protected]

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 32

Page 33: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 33

Page 34: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 34

Page 35: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 35

Page 36: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 36

Page 37: Insider Aug-Sept 2010

SECURITY 2010 CONFERENCE PROGRAM

3.40 pm – 4.30 pm PLANNING FOR THE ‘UNTHINKABLE’: MANAGING RISK FROM ALL POTENTIAL HAZARDS

f Gillies Crichton, Head of Assurance, Glasgow AirportGillies Crichton explains how a well prepared and practiced crisis management plan can get a business back to operation after any disruptive event, whether a fire, storm or a terrorist attack. Having just such a plan worked for Glasgow Airport — up and running in just 23 hours and 59 minutes after a terrorist attack brought operations to a standstill.

4.30 pm – 5.15 pm SPECIALIST PANEL - A DISCUSSION ON TACTICS FOR SAFER SPACESPlaces of mass gathering present attractive targets for crime of all levels as well as challenges for public safety. An expert panel with frontline experience and responsibility examines world best practice, tactics and technology for keeping the public safe in airports, shopping centres, and city precincts.Facilitator: Peter Davies, ACPO Lead on Security Industry Liaison and ACC (Protective Services) LincolnshirePanellists include:

P Gillies Crichton, Head of Assurance, Glasgow Airport

P Steve Jackson, Head of Security, Qantas Airways Limited

P Stacey Kirmos, Security Advisor/Safe City Operations, City of Ipswich

Thursday 2 September

9.00 am – 9.45 am LEADERSHIP AMONG DIFFERING AGENDAS : GETTING THE BEST OUT OF PEOPLE WORKING INA MULTI-AGENCY ENVIRONMENT

f Nick Kaldas APM, Deputy Commissioner Specialist Operations, NSW Police ForceWithout leadership, different points of view can quickly develop into competing agendas which have the potential to hamper successful operations, no matter how worthwhile. Nick Kaldas — drawing on his international experience — explains how leadership can keep people on track.

9.45 am – 10.30 am THE REALITY OF SUPPLY CHAIN SECURITY: UNDERSTANDING KEY DIMENSIONS TO MITIGATE LOSS

f Graeme Mayne, Country Security Manager, DHL Supply Chain AustraliaNo matter how effective your security may be, your weakest link may be somewhere beyond your immediate control. Graeme Mayne talks about how he manages supply chain security — from cooperation with others to working with standards — to mitigate risk to his business

10.30 am – 10.45 am BREAK

10.45 am – 11.15 am THE FUTURE OF SECURITY: A US PERSPECTIVE

f Julie Stansfield Cabus, Diplomatic Security Special Agent / Regional Security Officer, US Mission, Australia

11.15 am – 12.00 pm GOVERNMENT AND BUSINESS : WORKING TOGETHER TO PROTECT AUSTRALIANS

f Paul Retter, Executive Director, Office of Transport Security, Department of Infrastructure, Transport,Regional Development and Local GovernmentPublic expectations and political responsibility means many businesses face regulatory controls when it comes to security. Paul Retter explains what happens behind the scenes in formulating Government policy in relation to transport security and what businesses can do to be part of the process.

12.00 pm – 12.45 pm SPECIALIST PANEL - UNDERSTANDING THE ROLE OF PROFILING AND POLICY IN SECURITY MANAGEMENTProfiling is comparing the characteristics of a person thought to be a security risk to the available data on those known to have threatened, approached or attacked. The validity of profiling has been strongly criticised as the‘profile’ is often little more than a shopping list of general traits which provide limited opportunities for intervening. This panel discussion examines the practicalities of profiling and the required shifts in policy to help security operatives move beyond rote questions to methods of identifying the behaviours that increase risk and the strategies that derail criminal intent.Facilitator: Steve Jackson, Head of Security, Qantas Airways LimitedPanellists include:

P Professor Martin Gill, Director, Perpetuity Research and Consultancy International

P Dr Lisa Warren, Managing Director, Code Black Threat Management

P Kim Langton, Director and Managing Partner, Asia Pacific, Chameleon Associates

P Lizz Corbett, Managing Director, Training Group International

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 37

Page 38: Insider Aug-Sept 2010

Security 2010 Floor Plan

Floor plan subject to change without notification, for an updated floor plan visit www.securityexpo.com.au

SHOW HOURS

Wednesday 1 September 9.30am - 5.00pm

Thursday 2 September 9.30am - 5.00pm

Friday 3 September 9.30am - 2.30pm

Exclusive Exhibition Sponsor

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 38

Page 39: Insider Aug-Sept 2010

corporate design: ©2010 www.webfx2.com.au

Think security…THINK ASIAL

The Peak National Body for the Australian Security Industry

… Consumers do! ASIAL invests heavily in

promoting its members to business, government

and domestic users of security, by providing direct

links to those security providers who are bound by

the ASIAL code of conduct and are committed to

providing the highest standards.

Join Australia’s peak national security body and

access the strength, knowledge, benefits and

resources exclusive to ASIAL members. To find out

more visit www.asial.com.au/apply today.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 39

Page 40: Insider Aug-Sept 2010

SECURITY 2010 CONFERENCE PROGRAM

12.45 pm – 2.00 pm LUNCH - PARKSIDE FOYER

2.00 pm – 2.45 pm SECURITY STRATEGY FROM THE GROUND UP: PRACTICAL APPROACHES TO TARGET HARDENINGGary Heward, Director of Blast and Protective Design, MFD International Limited (UK)Beginning with determining how and for what purpose premises are used, Gary Heward examines the physical and operational vulnerabilities for a range of threat scenarios and some of the solutions, including protected building design, “Secure by Design” approaches, perimeter security, hostile vehicle mitigation, bomb shelters, safe rooms, and control room design.

2.45 pm – 3.30 pm SURVIVE , SUSTAIN AND PROSPER : HOW STANDARDS HELP RESILIENCE

f Jason Brown, National Security Director, Thales AustraliaMaking the link between applying security standards and everyday business activity is not always easy. But, as Jason Brown explains, making the link can result in improved performance in people, asset and supply chain management while delivering better business resilience — and a higher profile for security departments.

3.30 pm – 3.45 pm BREAK

3.45 pm – 4.30 pm SPECIALIST PANEL - PUTTING SECURITY ON THE MAP : WILL IT EVER BE SEEN AS APROFESSION ?Developing the security industry into a profession has long been the holy grail of some individuals and organisations. The Security 2010 Conference chairmen form a panel to face the audience — and the tough questions — about what it would take for a security profession to become a reality.Facilitator: Lizz Corbett, Managing Director, Training Group InternationalPanellists include:

P Prof. Martin Gill, Director, Perpetuity Research and Consultancy International

P Steve Jackson, Head of Security, Qantas Airways Limited

P Peter Davies, ACPO Lead on Security Industry Liaison and ACC (Protective Services) Lincolnshire

P Rod Cowan, Writer/Director, Cowan Communications

4.30 pm CONFERENCE CLOSE

Executive Briefings and Workshop

SECURITY STRATEGY AND MANAGEMENTMonday 30 August, 9.30 am – 4.00 pm

f Presenter: Professor Martin Gill, Director, Perpetuity Research and Consultancy International

UNDERSTANDING CRIME AND CRIME PREVENTIONTuesday 31 August, 9.30 am – 4.00 pm

f Presenter: Professor Martin Gill, Director, Perpetuity Research and Consultancy International

MEDIA MANAGEMENT WORKSHOPTuesday 31 August, 10.00 am – 2.00 pm

f Presenter: Rod Cowan, Writer/Director, Cowan Communications

For conference, executive briefings and workshop bookingsvisit www.securityexpo.com.au/conference and enter code INS

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 40

Page 41: Insider Aug-Sept 2010

The ChallengerTM

evolution continues…

What’s Next?

Improved Firmware: Extended alarm groups, door groups, floor groups, and time zonesSoftware IUM: Up to 2,000 users withno hardware IUM module requiredEnhanced IP Interface: Improved and lower cost IPconnection to management softwareKone IP lift interface: Next generation destination control lift management systemChallenger Hi-O Gateway: Integration to ASSA ABLOY’s Hi-O (Highly Intelligent Opening) door technologyTITAN 2.0: Windows 7 support, auto-backup & restore and self-registrationChallenger IP LAN Adaptor: Run Challenger RS-485 LAN over IP networks

Australian Distributor

NSW

Granville (02) 9897 7722

Rosebery (02) 9698 9698

Chatswood (02) 8467 1467

ACT

Fyshwick (02) 6280 9630

VIC

Rowville (03) 9755 6922

Coburg (03) 9383 2066

QLD

Molendinar (07) 5597 7203

Bowen Hills (07) 3252 5512

SA

Torrensville (08) 8150 9400

WA

Balcatta (08) 9241 3100

TAS

Hobart (03) 6272 0211

www.das.com.au

Witness the evolution at Security 2010

Multi-operator, SQL based Windows management software

Integration to ASSA ABLOY’s Aperio wireless door technology

Forcefield Commend IP-Intercom support

Forcefield off-site redundancy

3rd party GPRS alarm reporting support

Plus much, much, more…

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:16 PM Page 41

Page 42: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:31 PM Page 42

Page 43: Insider Aug-Sept 2010

3 Dimensional Consulting ....................................iS15

Access Communications ......................................F13

Western Digital .....................................................F40

ADI Global Distribution............................................A8

AGP Door Systems ..............................................E10

AISA....................................................................iS17

Alarmcorp...............................................................E2

AlarmIP Australia ................................................. B21

Altech Computers................................................G44

AME System Pty Ltd ...........................................G18

Anixter Pty Ltd..................................................... H24

Assa Abloy ............................................................ B8

AusScott Guardian Systems.................................A22

Australian Security Industry Association (ASIAL)....F34

Australian Security Magazine (ASM)..................... K22

Australian Security Technology .............................F12

Avigilon................................................................ H22

Axis Communications Pty Ltd.............................. D14

Bens Wholesale Monitoring ..................................F18

BFT Automation Australia Pty Ltd ........................G22

Biometric Access Systems Pty. Ltd...................... K32

Biometric Innovations Pty Ltd ...............................F10

Bosch Security Systems...................................... D30

BREON Enterprises Pty Ltd ................................. K38

Brickcom Corporation ......................................... C31

Briell Marketing.....................................................E18

B-Sealed ............................................................ H25

Building Services Recruitment .............................G40

C R Kennedy Total Surveillance Solutions ............ C40

Centaman Entrance Control ...................................F3

Central Security Distribution................................. D22

Chase Security Solutions..................................... B32

CIC Secure...........................................................A24

COE Limited.........................................................A15

Colemans Group Australia Pty Ltd ....................... C44

Commend Australia ............................................. B30

Covetek Biometric Security..................................G17

Craig International Ballistics Pty Ltd ......................J30

Craig International Ballistics Pty Ltd ......................J26

CSM Filing & Storage Solutions ........................... H33

Dedicated Micros .................................................. D2

Electro-Com (Aust) .............................................. C35

Electronic Development Sales (Australia) Pty Ltd.. D44

Electronic Keying Australia................................... B29

Emizon .................................................................A42

E-Nose Pty Ltd.................................................... C42

Eos Australia Pty Ltd ........................................... D10

EQL Networks & Security .................................... C13

ETM Pacific Pty Ltd ............................................. D46

FAAC Australia......................................................E40

FSH Fire & Security Hardware Pty.Ltd. .................. B38

Gated Solutions Australia..................................... D43

Geutebruck Pty Ltd ..............................................F30

Golf Cart Group....................................................J36

Gryffin Pty Ltd...................................................... D40

GSS Global Security Services...............................E33

Guizhou New Era Union I.&E. Corp...................... C15

Gunnebo Australia Pty Ltd....................................A27

Harcor Security Seals ..........................................F15

HID Global........................................................... D33

Hills Industries ....................................................... C2

Hirsch Electronics.................................................A11

ICU Intercoms ..................................................... H18

Id Supplies ...........................................................F17

ID Warehouse...................................................... C22

Infratherm Pty. Ltd. .............................................. K40

Ingersoll Rand Security Technologies....................A38

Jacques .............................................................. C17

Joinlink .................................................................A31

Kaba Australia Pty Ltd ..........................................F22

SECURITY 2010 A- Z LISTINGS

Company Name Stand Company Name Stand

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:31 PM Page 43

Page 44: Insider Aug-Sept 2010

Kenwood Electronics .......................................... H50

Kobra Shredders Australia ................................... B18

Kyodensha Technologies (M) SDN BHD............... H39

Lan 1....................................................................E13

LawMate Australia & eWitness.............................G35

Leda Security .........................................................F2

Lockit Systems Pty.Ltd ........................................ C33

LSC Electronic Security ....................................... C30

Magnetic Automation ...........................................E30

Mega Fortris Australia Pty Ltd.............................. K36

Merit Lilin Pacific P/L ...........................................G29

Milestone Systems Australia Pty Ltd .......................E6

Mobotix AG ......................................................... B22

Motorola Australia Pty Ltd.....................................E14

Multicard ..............................................................A13

National Communications.....................................F38

Natural Power Solutions Pty Ltd .......................... B36

Nuvico Australia......................................................A4

Omega Power Equipment Pty Ltd ........................F39

Oztime Technologies ...........................................G34

Pacen Corp .........................................................iS18

Paper Handling Equipment ...................................E34

Perimeter Systems Australia Pty Ltd .....................E39

Pitlok Security.......................................................A35

POE Solutions / CCTV Hire...................................A30

Powdersafe Pty Ltd ..............................................A24

PPC - Plastic Card Solutions ..................................F8

Rapiscan Systems .............................................. B44

RhinoCo Technology............................................ C16

Salto Systems Australia Pty Ltd ...........................G30

SAY Security Pl.................................................... K34

scates Pty Ltd ..................................................... H36

Seadan Security .....................................................A2

Secupro .............................................................. D41

Security Distributors Australia .............................. B23

Security Electronics & Networks Magazine .............A9

Security Merchants Australia Pty Ltd ..................... B2

Security Solutions Magazine ...................................F6

SecuSafe Pty ltd...................................................A17

Shyh Ru Metallic Industrial Corp. ......................... B34

Sigma CCTV.........................................................A23

simPRO...............................................................G15

Sony Australia Limited ..........................................E22

Sprint Intercom.......................................................A2

Sprintquip Security Pty Ltd ...................................E36

Suretek.................................................................A14

Syscan Technology Shenzhen ............................. H21

Takex America Inc ............................................... D29

Tecsec Training.....................................................A36

TeleEye Holdings Limited ..................................... B14

Texolabs ...............................................................E45

TouchStar............................................................ H30

Training Group International .................................G36

Videofied ............................................................. B26

Virdi ..................................................................... B33

Western Digital .....................................................F40

Company Name Stand Company Name Stand

Listings subject to change without notification, for an updated list visit www.securityexpo.com.au

SECURITY 2010 A- Z LISTINGS

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:31 PM Page 44

Page 45: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:31 PM Page 45

Page 46: Insider Aug-Sept 2010

Access Control ........................................ StandADI Global Distribution.................................................. A8AGP Door Systems .................................................... E10Alarmcorp..................................................................... E2AlarmIP Australia ........................................................ B21Assa Abloy ................................................................... B8BFT Automation Australia Pty Ltd ...............................G22Biometric Access Systems Pty. Ltd............................. K32Biometric Innovations Pty Ltd ......................................F10Bosch Security Systems.............................................D30Briell Marketing........................................................... E18Centaman Entrance Control .........................................F3Central Security Distribution .......................................D22Chase Security Solutions............................................ B32Colemans Group Australia Pty Ltd ..............................C44Covetek Biometric Security.........................................G17Electro-Com (Aust) .....................................................C35Electronic Development Sales (Australia) Pty Ltd ..........D44Electronic Keying Australia ......................................... B29Eos Australia Pty Ltd ..................................................D10FAAC Australia............................................................ E40FSH Fire & Security Hardware Pty Ltd......................... B38Harcor Security Seals ..................................................F15HID Global ................................................................D33Hills Industries .............................................................C2Hirsch Electronics....................................................... A11Id Supplies .................................................................F17ID Warehouse.............................................................C22Ingersoll Rand Security Technologies ......................... A38Kaba Australia Pty Ltd .................................................F22Kyodensha Technologies (M) Sdn Bhd........................H39Lan 1.......................................................................... E13Lockit Systems Pty.Ltd ...............................................C33LSC Electronic Security ..............................................C30Magnetic Automation ................................................. E30Mobotix AG ................................................................ B22Multicard .................................................................... A13National Communications............................................F38Natural Power Solutions Pty Ltd ................................. B36Pitlok Security............................................................. A35PPC - Plastic Card Solutions .........................................F8RhinoCo Technology...................................................C16Salto Systems Australia Pty Ltd ..................................G30Security Distributors Australia ..................................... B23Security Merchants Australia Pty Ltd............................. B2Virdi ............................................................................ B33Alarms...................................................... StandADI Global Distribution.................................................. A8Alarmcorp..................................................................... E2AlarmIP Australia ........................................................ B21AusScott Guardian Systems....................................... A22Bosch Security Systems.............................................D30Central Security Distribution .......................................D22Colemans Group Australia Pty Ltd ..............................C44

E-Nose Pty Ltd...........................................................C42GSS Global Security Services .................................... E33Hills Industries .............................................................C2Hirsch Electronics....................................................... A11Kyodensha Technologies (M) Sdn Bhd........................H39LSC Electronic Security ..............................................C30Mobotix AG ................................................................ B22RhinoCo Technology...................................................C16Seadan Security ........................................................... A2Security Distributors Australia ..................................... B23Security Merchants Australia Pty Ltd............................. B2Shyh Ru Metallic Industrial Corp. ................................ B34Sprint Intercom............................................................. A2Suretek....................................................................... A14TeleEye Holdings Limited ............................................ B14Videofied .................................................................... B26Associations / Publications....................... StandAISA ..........................................................................iS17Australian Security Industry Association (ASIAL)...........F34Australian Security Magazine (ASM)............................ K22Security Electronics & Networks Magazine ................... A9Security Solutions Magazine ..........................................F6Barrier Protection/Bollards....................... StandAGP Door Systems .................................................... E10BFT Automation Australia Pty Ltd ...............................G22Colemans Group Australia Pty Ltd ..............................C44FAAC Australia............................................................ E40Gryffin Pty Ltd.............................................................D40Gunnebo Australia Pty Ltd.......................................... A27Harcor Security Seals .................................................F15Kaba Australia Pty Ltd .................................................F22Leda Security ................................................................F2Lockit Systems Pty.Ltd ...............................................C33Magnetic Automation ................................................. E30Oztime Technologies ..................................................G34Biometrics................................................ StandBiometric Access Systems Pty. Ltd............................. K32Biometric Innovations Pty Ltd ......................................F10Chase Security Solutions............................................ B32Covetek Biometric Security.........................................G17Electronic Development Sales (Australia) Pty Ltd.........D44HID Global..................................................................D33ID Warehouse.............................................................C22Ingersoll Rand Security Technologies ......................... A38Pacen Corp ................................................................iS18Sigma CCTV............................................................... A23Syscan Technology Shenzhen ....................................H21Texolabs ..................................................................... E45Virdi ............................................................................ B33Cash Management .................................. StandMega Fortris Australia Pty Ltd..................................... K36Sprintquip Security Pty Ltd ......................................... E36CCTV........................................................ StandADI Global Distribution.................................................. A8

SECURITY 2010 PRODUCT CATEGORIES

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:31 PM Page 46

Page 47: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:31 PM Page 47

Page 48: Insider Aug-Sept 2010

48 //SECURITY INSIDER AUG/SEP 2010

SSEECCUURRIITTYY PPRROOGGRRAAMM GGUUIIDDEE

Run only to benefit members

16 investment choices

Low fees

‘The AustralianSuperwebsite is great for allsorts of superannuationinformation

and it’s easy to use.‘Put us to work for you. Call 1300 300 273or go to www.australiansuper.com

Michael Bottomley, member.

AustralianSuper looks aftermore than $32 billion, forover 1.5 million everydayAustralians.

This information is of a general nature and does not take into account your personal objectives, situation or needs. Before making a decision about AustralianSuper, consider your fi nancial requirements and read our Product Disclosure Statement, which is available on our website or by calling us. Statements made by members have been reproduced with their consent and this consent has not been withdrawn at the date of publication. ‘Industry SuperFund’ logo used with permission of Industry Fund Services (IFS) and this consent has not been withdrawn at the date of publication. AustralianSuper Pty Ltd ABN 94 006 457 987 AFSL 233788, Trustee of AustralianSuper ABN 65 714 394 898.

AUSS

3100

6

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 48

Page 49: Insider Aug-Sept 2010

Alarmcorp..................................................................... E2Altech Computers.......................................................G44AME System Pty Ltd ..................................................G18Avigilon.......................................................................H22Axis Communications Pty Ltd.....................................D14Bosch Security Systems.............................................D30Brickcom Corporation ................................................C31C R Kennedy Total Surveillance Solutions ..................C40Central Security Distribution .......................................D22Colemans Group Australia Pty Ltd ..............................C44Dedicated Micros .........................................................D2Eos Australia Pty Ltd ..................................................D10EQL Networks & Security ..........................................C13Geutebruck Pty Ltd ....................................................F30Hills Industries .............................................................C2Kyodensha Technologies (M) Sdn Bhd........................H39Lan 1.......................................................................... E13LSC Electronic Security ..............................................C30Merit Lilin Pacific P/L ..................................................G29Milestone Systems Australia Pty Ltd ............................. E6Mobotix AG ................................................................ B22National Communications............................................F38Natural Power Solutions Pty Ltd ................................. B36Nuvico Australia............................................................ A4POE Solutions / CCTV Hire......................................... A30RhinoCo Technology...................................................C16SAY Security Pl........................................................... K34Scates Pty Ltd............................................................H36Seadan Security ........................................................... A2Secupro .....................................................................D41Security Merchants Australia Pty Ltd............................. B2SecuSafe Pty Ltd........................................................ A17Sigma CCTV............................................................... A23Sprint Intercom............................................................. A2Suretek....................................................................... A14TeleEye Holdings Limited ............................................ B14Texolabs ..................................................................... E45Clothing, Equipment & Accessories ......... StandCraig International Ballistics Pty Ltd ...................J26 & J30GSS Global Security Services .................................... E33Guizhou New Era Union I.&E. CORP. ..........................C15Id Supplies .................................................................F17Computer (IT) & CommunicationsSecurity .................................................... StandAccess Communications .............................................F13Anixter Pty Ltd............................................................H24Brickcom Corporation ................................................C31C R Kennedy Total Surveillance Solutions ..................C40Commend Australia ................................................... B30EQL Networks & Security ..........................................C13HID Global..................................................................D33Hirsch Electronics....................................................... A11ICU Intercoms ............................................................H18Kenwood Electronics .................................................H50

Kobra Shredders Australia ......................................... B18Motorola Australia Pty Ltd........................................... E14National Communications............................................F38Natural Power Solutions Pty Ltd ................................. B36Pacen Corp ................................................................iS18Paper Handling Equipment ......................................... E34POE Solutions / CCTV Hire......................................... A30Scates Pty Ltd............................................................H36Sony Australia Limited ................................................ E22Suretek....................................................................... A14Syscan Technology Shenzhen ....................................H21TouchStar...................................................................H30Critical Infrastructure Security Services......... StandBiometric Innovations Pty Ltd ......................................F10Central Security Distribution .......................................D22Commend Australia ................................................... B30Dedicated Micros .........................................................D2Emizon ...................................................................... A42E-Nose Pty Ltd...........................................................C42Geutebruck Pty Ltd ....................................................F30GSS Global Security Services .................................... E33Infratherm Pty. Ltd. ..................................................... K40Lockit Systems Pty.Ltd ...............................................C33Pitlok Security............................................................. A35POE Solutions / CCTV Hire......................................... A30Powdersafe Pty Ltd .................................................... A24SAY Security Pl........................................................... K34Sigma CCTV............................................................... A23Takex America Inc ......................................................D29Data Security............................................ StandBiometric Access Systems Pty. Ltd............................. K32Chase Security Solutions............................................ B32Covetek Biometric Security.........................................G17Emizon ...................................................................... A42Kobra Shredders Australia ......................................... B18Lan 1.......................................................................... E13Mega Fortris Australia Pty Ltd..................................... K36Natural Power Solutions Pty Ltd ................................. B36Pacen Corp ................................................................iS18Paper Handling Equipment ......................................... E34Shyh Ru Metallic Industrial Corp. ................................ B34Syscan Technology Shenzhen ....................................H21Detection Control/Devices ....................... StandAlarmcorp..................................................................... E2AlarmIP Australia ........................................................ B21Brickcom Corporation ................................................C31E-Nose Pty Ltd...........................................................C42Gryffin Pty Ltd.............................................................D40Gunnebo Australia Pty Ltd.......................................... A27Infratherm Pty. Ltd. ..................................................... K40SAY Security Pl........................................................... K34Takex America Inc ......................................................D29Fencing / Perimeter Security/Grills ........... StandAlarmcorp..................................................................... E2

SECURITY 2010 PRODUCT CATEGORIES

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 49

Page 50: Insider Aug-Sept 2010

Colemans Group Australia Pty Ltd ..............................C44Craig International Ballistics Pty Ltd ...................J26 & J30FAAC Australia............................................................ E40Geutebruck Pty Ltd ....................................................F30Gryffin Pty Ltd.............................................................D40Infratherm Pty. Ltd. ..................................................... K40Leda Security ................................................................F2Lockit Systems Pty.Ltd ...............................................C33Magnetic Automation ................................................. E30Oztime Technologies ..................................................G34Takex America Inc ......................................................D29Videofied .................................................................... B26Fire Protection/Safety............................... StandADI Global Distribution.................................................. A8Dedicated Micros .........................................................D2FSH Fire & Security Hardware Pty Ltd......................... B38Seadan Security ........................................................... A2Sprint Intercom............................................................. A2Home Automation.................................... StandAccess Communications .............................................F13BFT Automation Australia Pty Ltd ...............................G22Biometric Access Systems Pty. Ltd............................. K32FAAC Australia............................................................ E40Ingersoll Rand Security Technologies ......................... A38Kyodensha Technologies (M) Sdn Bhd........................H39Magnetic Automation ................................................. E30Mobotix AG ................................................................ B22Takex America Inc ......................................................D29ID Systems/Supplies................................. StandBriell Marketing........................................................... E18Harcor Security Seals .................................................F15HID Global..................................................................D33Id Supplies .................................................................F17ID Warehouse.............................................................C22Mega Fortris Australia Pty Ltd..................................... K36Multicard .................................................................... A13PPC - Plastic Card Solutions .........................................F8Syscan Technology Shenzhen ....................................H21IP Technology........................................... StandADI Global Distribution.................................................. A8AlarmIP Australia ........................................................ B21Altech Computers.......................................................G44Anixter Pty Ltd............................................................H24Bosch Security Systems.............................................D30Brickcom Corporation ................................................C31C R Kennedy Total Surveillance Solutions ..................C40Chase Security Solutions............................................ B32Commend Australia ................................................... B30Dedicated Micros .........................................................D2Emizon ...................................................................... A42Eos Australia Pty Ltd ..................................................D10EQL Networks & Security ..........................................C13Hills Industries .............................................................C2Hirsch Electronics....................................................... A11

ICU Intercoms ............................................................H18Jacques .....................................................................C14Kenwood Electronics .................................................H50Lan 1.......................................................................... E13Merit Lilin Pacific P/L ..................................................G29Milestone Systems Australia Pty Ltd ............................. E6Mobotix AG ................................................................ B22POE Solutions / CCTV Hire......................................... A30RhinoCo Technology...................................................C16Security Distributors Australia ..................................... B23SecuSafe Pty Ltd........................................................ A17Sigma CCTV............................................................... A23Sony Australia Limited ................................................ E22Suretek....................................................................... A14TeleEye Holdings Limited ............................................ B14Locks/Hardware ...................................... StandAssa Abloy ................................................................... B8Biometric Access Systems Pty. Ltd............................. K32Central Security Distribution .......................................D22Covetek Biometric Security.........................................G17CSM Filing & Storage Solutions .................................H33Electro-Com (Aust) .....................................................C35Electronic Keying Australia ......................................... B29Harcor Security Seals .................................................F15Ingersoll Rand Security Technologies ......................... A38Kaba Australia Pty Ltd .................................................F22Kyodensha Technologies (M) Sdn Bhd........................H39Lockit Systems Pty.Ltd ...............................................C33LSC Electronic Security ..............................................C30Mega Fortris Australia Pty Ltd..................................... K36National Communications............................................F38Pacen Corp ................................................................iS18Pitlok Security............................................................. A35Salto Systems Australia Pty Ltd ..................................G30Seadan Security ........................................................... A2Security Merchants Australia Pty Ltd............................. B2Sprint Intercom............................................................. A2Virdi ............................................................................ B33Mobile Video & Surveillance ..................... StandLawMate Australia & eWitness....................................G35SAY Security Pl........................................................... K34Monitoring Equip. Systems/Servic es ....... StandAlarmIP Australia ........................................................ B21AME System Pty Ltd ..................................................G18Anixter Pty Ltd............................................................H24Axis Communications Pty Ltd.....................................D14Bens Wholesale monitoring .........................................F18Biometric Innovations Pty Ltd ......................................F10CIC Secure ................................................................ A24Emizon ...................................................................... A42GSS Global Security Services .................................... E33E-Nose Pty Ltd...........................................................C42EQL Networks & Security ..........................................C13Geutebruck Pty Ltd ....................................................F30

SECURITY 2010 PRODUCT CATEGORIES

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 50

Page 51: Insider Aug-Sept 2010

DVTel won Project of the Year at IFSEC 2010!

DVTel Latitude NVMS V6 o�ers an enhanced visual experience, combined with the dynamic workspace, giving you more options, more control and superior ease of use. Latitude NVMS o� ers:

Beyond Expectations

Added features of Latitude NVMS V6 include:- Award winning features (Scenetracker; Casebuilder; Mentor) - Discreet sites to installations of 4000 cameras- Open architecture- Kalagate certi� cation- Analytics- Access control certi�cation (including Force�eld, Cardax, SiPass, Lenel, Andover)

Exclusive suppliers of DVTel, Paci�c Communications, o� ers an unmatched sales and product support of the DVTel V6 system.

DVTel is a Proven Product with Proven Support.

SNMP traps support

NVMS V6 include:

Advanced Alarm Management

Web publishing – integration

with common streaming servers

(MMS and VLC)

H.264 integration

Supports Windows 7 & Server 2008

Added features of Latitudee N

AAAAEnhanced Web Client

sssssssssss

Background Mass Export

HH

Google maps TM

mapping service integration

module

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 51

Page 52: Insider Aug-Sept 2010

Hills Industries .............................................................C2Natural Power Solutions Pty Ltd ................................. B36Sony Australia Limited ................................................ E22Suretek....................................................................... A14TeleEye Holdings Limited ............................................ B14Recruitment ............................................. StandBuilding Services Recruitment ....................................G40Safes/Record Protection .......................... StandB-Sealed ....................................................................H25CSM Filing & Storage Solutions .................................H33Gunnebo Australia Pty Ltd.......................................... A27Kobra Shredders Australia .......................................... B18Mega Fortris Australia Pty Ltd..................................... K36Natural Power Solutions Pty Ltd ................................. B36Pacen Corp ................................................................iS18Shyh Ru Metallic Industrial Corp. ................................ B34Sprintquip Security Pty Ltd ......................................... E36Virdi ............................................................................ B33Security Consulting .................................. Stand3 Dimensional Consulting ...........................................iS15Smart Cards............................................. StandAssa Abloy ................................................................... B8Briell Marketing........................................................... E18B-Sealed ....................................................................H25Chase Security Solutions............................................ B32Electro-Com (Aust) ....................................................C35Electronic Development Sales (Australia) Pty Ltd.........D44Eos Australia Pty Ltd ..................................................D10HID Global..................................................................D33Hirsch Electronics....................................................... A11Id Supplies .................................................................F17Kaba Australia Pty Ltd .................................................F22Multicard .................................................................... A13PPC – Plastic Card Solutions.........................................F8Salto Systems Australia Pty Ltd ..................................G30Virdi ............................................................................ B33System Integrators................................... StandAltech Computers.......................................................G44Anixter Pty Ltd............................................................H24Biometric Innovations Pty Ltd ......................................F10C R Kennedy Total Surveillance Solutions ..................C40Dedicated Micros .........................................................D2Kaba Australia Pty Ltd .................................................F22POE Solutions / CCTV Hire......................................... A30Sony Australia Limited ................................................ E22Syscan Technology Shenzhen ....................................H21TouchStar...................................................................H30Tamper Evident Security Products ........... StandAltech Computers.......................................................G44B-Sealed ....................................................................H25Mega Fortris Australia Pty Ltd..................................... K36Harcor Security Seals .................................................F15Telecommunications ................................ StandCommend Australia ................................................... B30

Emizon ...................................................................... A42EQL Networks & Security ..........................................C13Time and Attendance............................... StandBiometric Innovations Pty Ltd ......................................F10Covetek Biometric Security.........................................G17Commend Australia ................................................... B30Emizon ...................................................................... A42EQL Networks & Security ..........................................C13National Communications............................................F38Pitlok Security............................................................. A35Texolabs ..................................................................... E45Training & Education ................................ StandPowdersafe Pty Ltd .................................................... A24Tecsec Training........................................................... A36Training Group International ........................................G36Vehicles.................................................... StandCraig International Ballistics Pty Ltd ...................J26 & J30Golf Cart Group...........................................................J36Video Intercoms....................................... StandBosch Security Systems.............................................D30Commend Australia ................................................... B30Eos Australia Pty Ltd ..................................................D10ICU Intercoms ............................................................H18Jacques .....................................................................C14Seadan Security ........................................................... A2Security Merchants Australia Pty Ltd............................. B2SecuSafe Pty Ltd........................................................ A17Sprint Intercom............................................................. A2Texolabs ..................................................................... E45Wireless Applications ............................... StandAltech Computers.......................................................G44Anixter Pty Ltd............................................................H24Assa Abloy ................................................................... B8AusScott Guardian Systems....................................... A22BFT Automation Australia Pty Ltd ...............................G22Brickcom Corporation ................................................C31Ingersoll Rand Security Technologies ......................... A38Kenwood Electronics .................................................H50Lan 1.......................................................................... E13LSC Electronic Security ..............................................C30Motorola Australia Pty Ltd........................................... E14RhinoCo Technology...................................................C16Salto Systems Australia Pty Ltd ..................................G30simPRO......................................................................G15TeleEye Holdings Limited ............................................ B14Texolabs ..................................................................... E45TouchStar...................................................................H30Videofied .................................................................... B26X-ray Equipment/Technology ................... StandBREON Enterprises Pty Ltd ........................................ K38GSS Global Security Services .................................... E33Kobra Shredders Australia ......................................... B18Rapiscan Systems ..................................................... B44

SECURITY 2010 PRODUCT CATEGORIES

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 52

Page 53: Insider Aug-Sept 2010

SPECIAL OFFER AVAILABLE FROM 1 JULY 2010 TO 30 SEPTEMBER 2010

Place your order via email at [email protected]

Easy to set up, use and expand.

Purchase the new 700 Series Hybrid-Network DVR and receive a Flexidome 2X

Bosch Image Quality recorded in genuine

4CIF images

Introducing the 700 Series Hybrid-Network DVR

The high quality 700 series hybrid-network DVR provides powerful and flexible solutions for IP camera surveillance and growing security needs. These solutions can be applied to a wide range of applications and can be supported in multiple locations. *Keyboard accessory sold separately

Experience live and playback images

with no change to image quality

FREE! FREE!

H.264 for reduced storage

requirements

Hybrid (analogue & IP cameras)

options with keyboard accessory

for PTZ*

Larger Hard Drive (Up to 8TB internal plus

external storage),ATM/POS Integration

and Backward Compatibility

Bosch challenge any competing camera brand to a ‘head-to-head shoot-out’ in your most challenging situations, onsite. Anywhere. Anytime* - Day or Night. This provides the end-user and system integrator with the opportunity to make a truly informed decision, by providing a real life comparison. Contact your Bosch branch for further details. *Minimum of one week’s notice to be provided for travel arrangements. Some areas may be excluded.

Security Master License No: 409 400 739

Call your nearest Bosch office for more information:

Sydney Adelaide Perth (02) 9672 1777 (04) 00 488 415 (08) 9240 5455Melbourne Brisbane (03) 9558 8088 (07) 3267 0442

700 Series ad.indd 1 27/07/2010 1:07:38 PM

Page 54: Insider Aug-Sept 2010

FREE SEMINAR PROGRAM - HALL 5

Wednesday 1 September

Time Title Speaker Company

11.00 am IP MONITORING FOR ALARM SYSTEMS Ian Tredinnick Chiron

12.00 pm H.264 WITH THE LOT PLEASE! Sean Borg Bosch Security Systems

1.00 pm UNIFIED ACCESS CONTROL Ross Head Hirsch Electronics

2.00 pm RemoteGUARD Mark Timmins Suretek

3.00 pm ACCESS CONTROL WITH OPEN ARCHITECTURE SOLUTIONS David Giannetti HID Global

4.00 pm SECUROS - VIDEO MANAGEMENT AND VIDEO ANALYTICS FRAMEWORK Ross Melene Sigma International (Australia) Pty Ltd

Thursday 2 September

Time Title Speaker Company

10.00 am HOSTILE VEHICLE MITIGATION Heng Cheng Leda Security

11.00 am ARE YOU READY FOR THE HD CCTV ERA? Joseph Mah TeleEye Holdings Limited

12.00 pm BEYOND THE NETWORK VIDEO RECORDER (NVR) Phillip Brewer Bosch Security Systems

2.00 pm EASY SWITCH FROM ANALOGUE TO IP Sonny Lee EQL Networks & Security

3.00 pm CHAOS IN AN ENVELOPE Tim Roberts Powdersafe

4.00 pm OPEN PLATFORM VIDEO MANAGEMENT Angelo Salvatore Milestone Systems Australia

Friday 3 September

Time Title Speaker Company

11.00 pm FACIAL VS FINGERPRINT - A COMMERCIAL PERSPECTIVE Kevin Mackay Covetek Australasia Pty Ltd

12.00 pm WIRELESS NETWORKS FOR PUBLIC SAFETY AND BUSINESS GROWTH Andrew Findlay Vertel

1.00 pm NETWORK VIDEO – THE FUTURE TECHNOLOGY IN SECURITY Sharon Chong Axis Communications Pty Ltd

Program subject to change without notification, for an updated program visit www.securityexpo.com.au

SECURITY 2010 SEMINAR PROGRAMS

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 54

Page 55: Insider Aug-Sept 2010

INFORMATION SECURITY ZONE SEMINARS

Wednesday 1 September

Time Title Speaker Company

10.00 - 11.00am WEB IS THE BATTLEGROUND, AND SOCIAL NETWORKS Rob Collins Watchguard TechnologiesLEAD THE CHARGE

11.30 - 12.30pm CASE STUDY: MANAGING MOBILE SECURITY THREATS WITHIN Lisa Leal SybaseYOUR BUSINESS

2.00 - 3.00pm PENETRATION TESTING AS A FORM OF SECURITY VALIDATION Declan Ingram Securus Global

3.30 - 4.30pm CASE STUDY: THE COMPLEXITIES OF PAYMENT INDUSTRY Nick Ellsmore StratSecIT SECURITY COMPLIANCE

Thursday 2 September

10.00 - 11.00am LEARNING FROM THE BAD GUYS IS LEARNING FROM THE BEST Andreas Baumhof Trust Defender

11.30 - 12.30pm DETECTING THE ENEMY FROMWITHIN - INTERNAL FRAUD Blare Sutton Ernst & Young

2.00 - 3.00pm WEB APPLICATION SECURITY - CYBER CRIMINALS ARE HIRING Branko Ninkovic Dragonfly Technologies

3.30 - 4.30pm INFORMATION SECURITY GOVERNANCE MODELS: Stephen Frede Sydney WaterLOCAL VS. INTERNATIONAL ISSUES

Friday 3 September

10.00 - 11.00am EMERGING TECHNOLOGIES: THERE’S ALWAYS A CATCH Mark Dowd Azimuth Security

11.30 - 12.30pm THE MYTHS AROUND CLOUD COMPUTING SECURITY Keith Price AISA

Program subject to change without notification, for an updated program visit www.securityexpo.com.au

Entry is FREE, however limited seats are available for the Information Security Zone Seminars.

Secure your free expo ticket and Information Security Zone Seminar sessions online at

www.securityexpo.com.au/register. Simply enter code INS

SECURITY 2010 INFORMATION SECURITY ZONE SEMINARS

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 55

Page 56: Insider Aug-Sept 2010

SECURITY 2010 EXHIBITOR PROFILE LISTING

3 Dimensional ConsultingSTAND [email protected](61) 03 8844 7550www.simtrack.com

Access CommunicationsSTAND [email protected](61) 02 9414 8888www.accesscomms.com.au

ADI Global DistributionSTAND [email protected] ADI ADIwww.adiglobal.com/au

AGP Door SystemsSTAND [email protected](61) 02 9671 0000www.agpgroup.com.au

AISASTAND iS17www.aisa.org.au

AlarmcorpSTAND [email protected] 894 088www.alarmcorp.net.au

AlarmIP AustraliaSTAND [email protected] 767 347www.alarmip.com.au

Altech ComputersSTAND [email protected](61) 02 8831 9973www.altech.com.au

AME System Pty LtdSTAND [email protected](61) 03 9574 8044www.amesystem.com.au

Anixter Pty LtdSTAND [email protected](61) 02 9333 0800www.anixter.com

Assa AbloySTAND [email protected](61) 03 8574 3888www.assaabloy.com.au

AusScott Guardian SystemsSTAND [email protected](61) 08 9451 9806www.ausscott.com.au

Australian Security Industry Association (ASIAL)STAND [email protected](61) 02 8425 4300www.asial.com.au

Australian Security Magazine (ASM)STAND [email protected](61) 07 3348 6966www.securityaccess.com.au

Australian Security TechnologySTAND F12www.astpl.com.au

AvigilonSTAND [email protected](61) 07 3853 5393www.avigilon.com

Axis Communications Pty LtdSTAND [email protected](61) 03 9221 6133www.axis.com

Bens Wholesale MonitoringSTAND [email protected] 130 515www.bensecurity.com.au

BFT Automation Australia Pty LtdSTAND [email protected](61) 02 9757 0677www.bftaustralia.com.au

Biometric Access Systems Pty. LtdSTAND [email protected](61) 07 55717426www.bioaccsys.net

Biometric Innovations Pty LtdSTAND [email protected](61) 07 3243 6000www.biometricinnovations.com

Bosch Security SystemsSTAND [email protected](61) 02 9672 1233www.boschsecurity.com.au

BREON Enterprises Pty LtdSTAND [email protected](61) 03 8336 3333www.breon.com.au

Brickcom CorporationSTAND [email protected](886) 3 598 2022www.brickcom.com

Briell MarketingSTAND [email protected](61) 02 9986 3911www.briell.com.au

B-SealedSTAND [email protected](61) 02 9260 5988www.bsealed.com.au

Building Services RecruitmentSTAND [email protected](61) 03 9077 1271www.bsra.com.au

C R Kennedy Total Surveillance SolutionsSTAND [email protected](61) 03 9823 1555www.crkennedy.com.au

Centaman Entrance ControlSTAND [email protected](61) 02 9906 7522www.entrancecontrol.com.au

Central Security DistributionSTAND [email protected](61) 03 9946 3200www.centralsd.com.au

Chase Security SolutionsSTAND [email protected] 793 316www.ChaseSecurity.com.au

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 56

Page 57: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 57

Page 58: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 58

Page 59: Insider Aug-Sept 2010

SECURITY 2010 EXHIBITOR PROFILE LISTING

CIC SecureSTAND [email protected](61) 02 6239 3355www.cicsecure.com.au

COE LimitedSTAND A15www.coe.co.uk

Colemans Group Australia Pty LtdSTAND [email protected](61) 02 9280 0615www.colemansgroup.com.au

Commend AustraliaSTAND [email protected](61) 02 4655 5738www.commend.com

Covetek Biometric SecuritySTAND [email protected](61) 02 9404 8777www.covetek.com.au

Craig International Ballistics Pty LtdSTAND J26 & [email protected](61) 07 5528 5088www.ballistics.com.au

CSM Filing & Storage SolutionsSTAND [email protected](61) 02 9540 2111www.csm-office.com.au

Dedicated MicrosSTAND [email protected](61) 02 9634 4211www.dedicatedmicros.com

Electro-Com (Aust)STAND [email protected](61) 03 9535 0700www.electrocom.com.au

Electronic Development Sales (Australia) Pty LtdSTAND [email protected](61) 02 9496 0500www.edsales.com.au

Electronic Keying AustraliaSTAND [email protected] 722 311www.ekasecurity.com.au

EmizonSTAND [email protected] 307 403www.emizon.com.au

E-Nose Pty LtdSTAND [email protected] 9209 4083www.enose.info

Eos Australia Pty LtdSTAND [email protected](61) 02 9749 5888www.eos.com.au

EQL Networks & SecuritySTAND [email protected](61) 02 9824 5680www.eql.com.au

ETM Pacific Pty LtdSTAND D46www.etmpacific.com.au

FAAC AustraliaSTAND [email protected](61) 02 8756 5644www.faac.com.au

FSH Fire & Security Hardware Pty LtdSTAND [email protected](61) 02 9700 1050www.fshlocking.com.au

Gated Solutions AustraliaSTAND [email protected](61) 07 3622 6400www.geutebruck.com.au

Geutebruck Pty LtdSTAND [email protected](61) 1300 796 425www.gatedsolutions.com.au

Golf Cart GroupSTAND [email protected] 680 088www.getmobile.com.au

Gryffin Pty LtdSTAND D40salesgryffin.com.au(61) 03 9761 4522www.gryffin.com.au

GSS Global Security ServicesSTAND E33john@safetcard1300 SafeTcardwww.safetcard.com.au

Guizhou New Era Union I.&E. CorpSTAND [email protected] 574 87784793

Gunnebo Australia Pty LtdSTAND [email protected](61) 02 9852 0700www.gunnebo.com.au

Harcor Security SealsSTAND [email protected](61) 02 9454 4200www.harcor.com.au

HID GlobalSTAND [email protected](852) 3160 9800www.hidglobal.com

Hills IndustriesSTAND [email protected](61) 02 9717 5222www.das.com.au, www.pacom.com.au, www.hills.com.au

Hirsch ElectronicsSTAND [email protected](61) 07 3472 1346www.hirschelectronics.com

ICU IntercomsSTAND [email protected](61) 02 9450 1260www.icuintercoms.net

Id SuppliesSTAND [email protected](61) 02 9485 0455www.idsupplies.com.au

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 59

Page 60: Insider Aug-Sept 2010

SECURITY 2010 EXHIBITOR PROFILE LISTING

ID WarehouseSTAND [email protected] 301 748www.idwarehouse.com.au

Infratherm Pty. Ltd.STAND [email protected](61) 02 4579 7334www.infratherm.com.au

Ingersoll Rand Security TechnologiesSTAND [email protected](61) 03 9312 2822www.ingersollrand.com.au

JacquesSTAND [email protected](61) 07 3844 1103www.jacques.com.au

Joinlink Pty LtdSTAND A31www.ntcs.com.au

Kaba Australia Pty LtdSTAND [email protected](61) 02 8787 4777www.kaba.com.au

Kenwood ElectronicsSTAND [email protected](61) 02 8879 2222www.kenwood.com.au

Kobra Shredders AustraliaSTAND [email protected](61) 03 98236268www.kobrashredders.com.au

Kyodensha Technologies (M) Sdn BhdSTAND [email protected](60) 03 8061 4589www.elock2u.com

Lan 1STAND [email protected](61) 02 9318 4200www.Lan1.com.au

LawMate Australia & eWitnessSTAND [email protected] 887 656www.lawmate.com.au, www.ewitness.com.au

Leda SecuritySTAND [email protected](61) 02 8413 3410www.ledasecurity.com.au

Lockit Systems Pty.LtdSTAND [email protected](61) 02 9648 4188www.lockit.com.au

LSC Electronic SecuritySTAND [email protected](61) 02 96478111www.lsc.com.au

Magnetic AutomationSTAND [email protected](61) 03 9339 2900www.ac-magnetic.com

Mega Fortris Australia Pty LtdSTAND [email protected](61) 02 9984 7720www.megafortris.com.au

Merit Lilin Pacific P/LSTAND [email protected](61) 02 9646 4878www.meritlilinpacific.com.au

Milestone Systems Australia Pty LtdSTAND E6asal@milestonesys,com(61) 03 9466 7806www.milestonesys.com

Mobotix AGSTAND [email protected](61) 02 8507 2000www.mobotix.com

Motorola Australia Pty LtdSTAND E14(61) 03 9847 7500www.motorola.com.au

MulticardSTAND [email protected] 666 910www.multicard.com.au

National CommunicationsSTAND [email protected](61) 07 5596 5128www.natcomm.com.au

Natural Power Solutions Pty LtdSTAND [email protected](61) 02 9906 6696www.nps.com.au

Nuvico AustraliaSTAND [email protected](61) 07 5527 9939www.nuvico.com

Omega Power Equipment Pty LtdSTAND F39www.omegapower.com.au

Oztime TechnologiesSTAND [email protected](61) 02 62805200www.oztime.com.au

Pacen CorpSTAND [email protected](61) 02 9955 3595www.pacen.com.au

Paper Handling EquipmentSTAND [email protected](61) 07 3899 9811www.phe.com.au

Perimeter Systems Australia Pty LtdSTAND E39www.perimetersystems.com.au

Pitlok SecuritySTAND [email protected](61) 08 9248 4200www.pitlok.com.au

POE Solutions / CCTV HireSTAND [email protected](61) 02 9618 0444www.poes.com.au

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:32 PM Page 60

Page 61: Insider Aug-Sept 2010

Protect yourbusinesswith AonAon is the leading insurance broker to the security industry, and the broker preferred by the Australian Security Industry Association (ASIAL).

We are pleased to offer you a tailored product, SecurAcover, that provides a simple and competitive insurance solution to protect your business. This product is exclusive to ASIAL Members and covers public and products liability with an extension for errors and omissions coverage.

If you need to protect your business, talk to Australia’s leading insurance provider today.

Call

1800 806 584or email [email protected]

© 2010 Aon Risk Services Australia Pty LimitedABN 17 000 434 720 AFSL No. 241141

RRIS

1595

041

0

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 61

Page 62: Insider Aug-Sept 2010

SECURITY 2010 EXHIBITOR PROFILE LISTING

Powdersafe Pty LtdSTAND A24(61) 02 6281 6111www.powdersafe.com.au

PPC - Plastic Card SolutionsSTAND [email protected] 651 277www.ppc.com.au

Rapiscan SystemsSTAND [email protected](61) 03 9929 4600www.rapiscansystems.com

RhinoCo TechnologySTAND [email protected](61) 02 4577 4708www.rhino.com.au

Salto Systems Australia Pty LtdSTAND [email protected](61) 02 9890 4600www.saltosystems.com

SAY Security PlSTAND [email protected](61) 02 9680 8844www.saysecurity.net

scates Pty LtdSTAND [email protected](61) 07 3173 1640www.scates.com.au

Seadan SecuritySTAND [email protected](61) 02 9633 9222www.seadan.com.au

SecuproSTAND [email protected](61) 0468 747 862www.secupro.com.au

Security Distributors AustraliaSTAND [email protected](61) 08 92406281www.securitydistributors.com.au

Security Electronics & Networks MagazineSTAND [email protected](61) 02 9280 4425www.securityelectronicsandnetworks.com.au

Security Merchants Australia Pty LtdSTAND [email protected] 663 904www.security-merchants.com

Security Solutions MagazineSTAND [email protected](61) 03 9845 1520www.securitysolutionsmagazine.com

SecuSafe Pty LtdSTAND [email protected](61) 02 9649 4477www.secusafe.com.au

SHYH RU METALLIC INDUSTRIAL CORP.STAND [email protected](886) 2 2906 5816www.shyhru.com.tw

Sigma CCTVSTAND [email protected](61) 07 5591 9559www.sigmacctv.com.au

simPROSTAND [email protected] 139 467www.simpro.com.au

Sony Australia LimitedSTAND [email protected](61) 02 9887 6666www.sony.com.au

Sprint IntercomSTAND [email protected](61) 02 9427 2677www.sprintintercom.com.au

Sprintquip Security Pty LtdSTAND [email protected](61) 02 9772 4377www.sprintquip.com.au

SuretekSTAND [email protected] 654 433www.suretek.com.au

Syscan Technology ShenzhenSTAND [email protected](61) 02 8211 0441www.syscan.com.au

Takex America IncSTAND [email protected](61) 03 9546 0533www.takex.com

Tecsec TrainingSTAND [email protected] 798 106www.tecsectraining.com.au

TeleEye Holdings LimitedSTAND [email protected](852) 2995 5996www.TeleEye.com

TexolabsSTAND [email protected](61) 0407 080 290www.texolabs.com

TouchStarSTAND [email protected](61) 02 9739 9000www.touchstargroup.com

Training Group InternationalSTAND [email protected] 855 618www.traininggroup.com.au

VideofiedSTAND [email protected] 464 455www.videofied.com.au

VirdiSTAND [email protected](82) 02 6488 3049www.virditech.com

Western DigitalSTAND F40www.achieva.com.au

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 62

Page 63: Insider Aug-Sept 2010

AS

IAL

©20

09 w

ww

.myn

etb

uild

er.c

om.a

u

Would you like some further information or assistance? Email [email protected] complete the information below and fax to 02 8425 4343.

Company name:

Contact name: Position:

Phone: Email: Your mark of distinction

1VISIT:www.asial.com.auand login to theMember area.

Just four easy steps to get your ASIAL web page up and running!

STEP 2STEP 3STEP 4STEP

SELECT theMember ProfileLink and Click

Register your interest today!

Create webpageCreate webpage

Follow theprompts to beginpopulating yourweb page.

When you areready for the pageto be published, hit

SubmitSubmit

HELP CONSUMERSFIND YOUR BUSINESS!The ASIAL website attracts 10,000 visitors a month, with themost popular page being the ‘Find a Security Provider’ Search.

ASIAL members can now create and manage a FREE web page on theASIAL website to complement their existing ASIAL member search listing.· Receive a dedicated URL that can appear on external search engine listings

· Upload images and a description of the products and/or services offered

· Choose from two templates and four colours to complement your promotional material

No experience required!

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 63

Page 64: Insider Aug-Sept 2010

AAIICC:: AARRMMEEDD RROOBBBBEERRYY TTRREENNDDSS

TRENDS INCOMMERCIALARMED ROBBERYBy Lance Smith & Erin Louis*

64 //SECURITY INSIDER AUG/SEP 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 64

Page 65: Insider Aug-Sept 2010

Overall trendsThe Australian Institute of Criminology’s National Armed

Robbery Monitoring Program data (NARMP) has shown noconsistent patterns in overall trends for armed robbery inAustralia since incident data was first collected (2004) to 2007.While data indicates that from 2004 to 2006 there was a 20percent increase in the number of armed robbery incidents inAustralia, in 2007 there was an eight percent decrease in thenumber of incidents.Thus, although it is interesting to examineoverall trends for armed robbery, it is more useful to focus onunderstanding trends in specific locations where armedrobbery incidents occurred. For example, the data shows thatstreet armed robbery to bank armed robbery have distinctlydifferent characteristics.This article will examine some of thereasons for why trends in different types of armed robbery mayvary in different ways at different times.

Commercial locationsThere have been changes in the nature and frequency of

armed robberies committed in the five commercial locationsdiscussed in this article over the life of the NARMP. Somehave experienced consistent increases, while others haveseen decreases and others have seen fluctuations from yearto year. Some commercial locations have seen changes inthe characteristics of their victimisation, such as an increasein the number of firearms used by offenders. Generally, thedata highlights that different commercial industriesexperienced armed robbery in different forms and that thiscan change over time.

Banking and financial institutions‘Bank’ armed robberies have some key features worth

highlighting. First, the number of armed robberies at this type oflocation remained at just below 100 incidents per year from2004 to 2007. However, in 2006 numbers dropped considerablyto 76 recorded incidents - an 18 percent decrease from 2005.

Another change in the characteristics of armed robbery atbanks involved the use of firearms. In 2004, firearms were usedin 41 percent of armed robberies at banks and by 2007 thishad increased to 49 percent - an overall increase of eightpercent.

A third shift in the trends for banking and financial armedrobbery involved a slight decrease in the average age ofoffenders and this may be important.There are three main

typologies of armed robbery offenders: amateurs, intermediatesand professionals. Professional armed robbers are more likelyto use firearms; plan their offences with much more detail; aremore motivated; are more likely to use violence; and are morelikely to commit armed robbery as a means of making a living.Offender age is one of several key characteristics that helpsdefine an armed robbery offender as potentially being a‘professional’.

In 2004, offenders targeting banking and financial institutionshad an average age of 30 years, making them the oldest of allarmed robbery offenders. By 2007 the average age for theseoffenders had decreased to 28 years.Whether this decreasingage trend will continue remains unknown, but it requiresmonitoring.

Service stationsOver the four year period examined there have been

complex shifts in service station armed robbery. Most notablewas the substantial decrease in the number of incidentsbetween 2006 and 2007 (a 34 percent decrease), following agradual increase in incidents between 2004 and 2006. Anidentified decrease in incidents in 2007 also reflected a changein trends regarding weapon use in service station armedrobbery.

There were two main shifts in trends regarding weaponsused in service station armed robbery. First, there was anincrease in the number of firearms used by offenders.Thisincrease was unexpected as the profile of an offender targetingservice stations is generally one who is less professional.Historically, offenders targeting this type of location act aloneand use easy to obtain weapons such as knives rather thanfirearms. In 2004, firearms only constituted 9 percent ofweapons used in service station armed robbery but this hasincreased gradually each year since then. In 2007 firearmsaccounted for almost a quarter (24%) of all weapons used inarmed robberies targeting service stations.

Second, this change helps explain the gradual decrease inthe use of knives in service station armed robbery. In 2004knives accounted for 65 percent of weapons used in servicestation armed robbery compared with 47 percent in 2007.These changes in service station armed robbery need to beconsidered by the industry and analysed to help determine whythere has been a drop in the number of incidents, but the useof potentially more dangerous weapons is increasing.

AAIICC:: AARRMMEEDD RROOBBEERRYY TTRREENNDDSS

SECURITY INSIDER AUG/SEP 2010// 65

>

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 65

Page 66: Insider Aug-Sept 2010

The next shift in trends for service station armed robberyworthy of highlighting is the number of offenders involved in anincident. Generally, the typical armed robbery offender forservice stations is considered amateurish and opportunistic.Amateur armed robbers tend to have short-sighted intentions,little understanding of what to expect from the experienceand/or of how much money they are likely to obtain. As a result,the majority of incidents involve a lone offender.

However, in recent years there has been an increasedlikelihood of two or more offenders being involved. In 2004, 82percent of incidents involved lone offenders and 14 percentinvolved two offenders.Whereas in 2007 only 74 percent ofincidents involved lone offenders, with dual offenders nowconstituted 21 percent of service station armed robberies. So,while the typical service station armed robbery offender stillacts alone, there is an increased likelihood of a co-offendernow being involved.

Licensed premisesLicensed premises are one industry that has seen

considerable shifts in armed robbery trends. For instance, therewas a 22 percent increase in the number of armed robberyincidents involving licensed premises between 2004 and 2007.There have also been shifts in specific characteristics oflicensed premises armed robbery.

The use of firearms has fluctuated considerably at varioustimes between 2004 and 2007; however in 2004 and 2007 44percent of armed robberies at licensed premises involved afirearm. While the use of firearms in 2007 reflects the rate ofuse in 2004, it is the fluctuations over these years that areworth analysing in order to determine the reasons they occur,as it has a direct impact on those affected by armed robberyat these locations, and may inform crime reduction strategies.

Like banking and financial armed robbery, the average agefor licensed premises armed robbery offenders also decreasedbetween 2004 and 2007. Although not considered asprofessional and generally not as experienced as their bankarmed robbery counterparts, offenders targeting licensedpremises are still considered as intermediate offenders ratherthan amateur or opportunistic offenders.That is, they are moreorganised and more experienced than amateurs, are likely toengage in some planning and are prepared to use weapons ifrequired. In 2004 the average age of an offender was 27 yearsold; this decreased to only 24 years old in 2007. Similar tobanking and financial armed robbery offenders this trend willbe monitored closely over the coming years as it may signify ashift in the profile of offenders now targeting these commercialbusinesses.

Another changing offender characteristic involves theincreased presence of multiple offenders. While theinvolvement of three offenders in an incident has remainedconstant (7%), incidents with dual offenders increased eachyear between 2004 and 2007 from 12 percent to 27 percent in

2007. Incidents of licensed premise armed robbery involvinglone offenders have decreased every year from 2004 (79%) to2007 (61%).

Post offices and newsagentsCommercial armed robberies of post offices and

newsagents (this is a combined location category employed byNARMP) are not targeted as often as some other locations,however they still deserve consideration. One reason for this isthe decrease in the number of incidents experienced. Bearingin mind the smaller numbers (in 2004 111 incidents of armedrobbery occurred at these locations across Australia), from2004 to 2007 there has been an overall 15 percent decreasein the number of incidents.

One characteristic that separates armed robberies atnewsagents and post offices from other locations is thetendency to be targeted in the early morning pre-businesshours (6am-9am).This factor has become even moreprominent with a recent sharp increase in the number ofincidents. In 2004, 18 percent of incidents at these locationsoccurred between 6am and 9am which increased to 35percent in 2007.This clearly indentifies the increased risk tothese businesses in the early hours of the morning as they aresetting up for the day. It is important to monitor thischaracteristic as it continues to be a factor that distinguishesarmed robbery at this particular location category from othercommercial premises.

Corner stores, supermarkets and takeawaysCorner stores, supermarkets and takeaways (another

NARMP location category) has not experienced as many shiftsin armed robbery patterns in recent times, but there are stillsome changes worth highlighting.The first of these is the 20percent decrease in the number of incidents between 2004and 2007.

The other notable shift was the increased presence ofmultiple offenders. In the period from 2004 to 2007, theinvolvement of two or more offenders in an incident increasedfrom 19 percent to 31 percent. Similar to other commerciallocations this increase in multiple offenders coincided with adecline in the number of incidents involving lone offendersfrom 81 percent in 2004 to 69 percent in 2007.

Future trendsThe continuing examination of shifting trends in commercial

armed robbery is important as a means of identifying changingpatterns in armed robberies over time. Further, monitoring canhelp explain any displacement (when characteristics of crimechange to counter crime prevention strategies) in particulararmed robberies or other crimes that might occur and canassist in identifying opportunities for implementing importantcrime prevention strategies with the best chance of remainingeffective in future years.

66 //SECURITY INSIDER AUG/SEP 2010

AAIICC:: AARRMMEEDD RROOBBEERRYY TTRREENNDDSS

Source: AIC, NARMP Collection 2004-2007 [Computer file]. *Lance Smith is a research analyst and Erin Louis is a formerresearch officer with the National Armed Robbery Monitoring Program at the Australian Institute of Criminology.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 66

Page 67: Insider Aug-Sept 2010

SECURITY INSIDER AUG/SEP 2010// 67

ADT Security NSW 317 A1 09 Mar 2011

Allcare Monitoring Services WA 334 A2 28 Feb 2012

ARM Security WA 318 A1 10 Mar 2011

ART Security VIC 339 A1 08 Sep 2010

Central Monitoring Services NSW 343 B1 21 Mar 2012

ClubLINKS Security VIC 315 C3 11 Dec 2010

Commonwealth Bank of Australia NSW 306 A1 24 Sep 2010

Energize Australia VIC 345 C2 18 Mar 2011

Golden Electronics TAS 310 A1 17 Oct 2010

Grade One Monitoring NSW 333 A1 13 Feb 2012

Grid Security Services NSW 336 A1 18 Mar 2012

IAG (operating with IAG Data Centre) NSW 329 C1 27 Nov 2011

Instant Security Alarms QLD 320 A1 09 Jun 2011

ISS Security Services (Manpower Response) NSW 335 C3 30 Nov 2011

Linfox Armaguard VIC 346 A1 08 Aug 2012

NSS Group NSW 341 A1 07 May 2012

Paul-Tec Australia NSW 342 A2 13 May 2012

Protection Pacific Security VIC 304 C2 03 Aug 2010

RAA Security Services SA 314 A1 12 Dec 2010

Secom Australia NSW 327 A1 14 Dec 2011

Sectrol Security VIC 322 B2 02 Jul 2011

Securemonitoring VIC 328 A1 23 Nov 2011

Security Alarm Monitoring Service SA 344 A1 18 Jun 2012

Sesco Security Co WA 319 A1 03 Mar 2011

Signature Security NSW 307 A1 03 Oct 2010

Signature Security WA 308 A1 03 Oct 2010

SMC (Chubb) QLD 330 A1 07 Dec 2011

SMC (Chubb) VIC 332 A1 16 Dec 2011

SNP Security (Newcastle) NSW 321 A1 17 Aug 2011

SNP Security (Sydney) NSW 347 A1 13 Aug 2012

Spectus WA 325 A1 02 Sep 2011

State Govt Protective Security Service QLD 340 C1 22 May 2012

Summerland Security Services NSW 331 C2 30 Nov 2011

Westpac Banking Corporation NSW 338 A1 19 Mar 2012

Woolworths Limited NSW 311 C1 04 Nov 2010

Company (short form name) State Cert. No. Grade Expires

ASIAL Certified Security Monitoring Centres*Current as at: 28 July 2010

*The above-listed ASIAL Certified monitoring centres comprise those establishments that have been inspected and gradedfor compliance with the applicable Australian Standard: AS 2201.2 – 2004. PLEASE NOTE: ASIAL takes no responsibility forlisted companies which may change the nature of their operations subsequent to Certification.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 67

Page 68: Insider Aug-Sept 2010

INDUSTRIAL ReLATIONS

68 //SECURITY INSIDER AUG/SEP 2010

ADVERSE ACTION(UNFAIR DISMISSAL)“ALL INCLUSIVE RATES” AND PAID PARENTAL LEAVE By Chris Delaney*

continued page 69 >

The new industrial relations system has

brought with it a great deal of confusion.

The Fair Work Ombudsman and Fair

Work Australia have clarified some

matters. In this article we consider three

matters which have a significant impact

on business.

Adverse action (the alternative unfairdismissal claim?)

Section 342 of the Fair Work Act sets outthe type of conduct which will be adverseaction.Adverse action can be taken by:1. an employee against his or her employer 2. an employer against an employee (or

prospective employee)

3. an independent contractor against aprincipal

4. a principal against an independentcontractor

5. a person against an industrial association.

However most adverse action claims willbe made by employees in relation to thealleged adverse actions taken by employerswhich include termination of employment; orinjuries to the employee in their employment;or changing the position of the employee totheir detriment; or discriminating between theemployee and other employees of theemployer.

“Workplace Rights”, employmententitlements and the freedom to exercise and

enforce those entitlements, are also protectedagainst adverse action

A person has a workplace right if theperson:• is entitled to the benefit of or has a role or

responsibility under a workplace law, aworkplace instrument or an order made byan industrial body,

• is able to initiate or participate in a processor proceeding under a workplace lawincluding a conference or hearing at FWAor a court, or

• is able to make a complaint under aworkplace law to seek compliance with alaw or industrial instrument or if thatperson is an employee, in relation to his orher employment, such as an internalgrievance for a bullying complaint.

Two recent decisions have clarified the

treatment of adverse action claims:

Automotive Food Metals Engineering

Printing and Kindred Industries Union v

Philips Engineering Australia Pty (Philips)

[2010] FCA 611 (15 June 2010)In this case Philips terminated an

employee on the grounds of redundancy. Thematter went to the Federal Court where theemployee’s Union put that he be reinstated tohis position. The Union claimed that Philipshad engaged in adverse action by terminatingthe affected employee's employmentbecause of the employee's union activitiesand not for the reason that his position wasredundant.

The Court agreed to make the order toreinstate the employee until the substantive

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 68

Page 69: Insider Aug-Sept 2010

claim could be heard on the basis that theevidence indicated that the redundancy wasa "smokescreen" for the real reasons fortermination, which were the employee's unionactivities.

This case shows that in adverse actionclaims the Courts are willing to order re-instatement or make orders to stop atermination of employment occurring until thesubstantive application can be heard.

Employers need to be thorough interminations of employment, disciplinarymatters, transfers, demotions and changes interms and conditions of employment toensure that these are undertaken withfairness and equity, and not on the basis thatthe employee exercised a workplace right.

Construction Forestry Mining and EnergyUnion v BHP Coal Pty Ltd [2010] FCA 590(11 June 2010)

In the BHP Coal case the Union claimedthat BHP Coal breached an enterpriseagreement provision and the Fair Work Act'sadverse action provisions.

The Union's adverse action claim was thatBHP Coal breached the provisions anindustrial agreement relating to howdisciplinary meeting should be conducted.The Union further claimed that BHP Coalengaged in adverse action by threatening todismiss the employee if he did not participatein the disciplinary meeting with the presenceof a BHP Coal HR representative present.The employee and the Union representativewalked out of the meeting and refused toattend subsequent meetings.

BHP Coal subsequently terminated theemployee for serious misconduct arising fromthe issues which were the subject of thedisciplinary meetings.

On the adverse action argument, theCourt found that nothing the employer or itsmanagers had done constituted an injury or athreat to injure the employee because heexercised his workplace rights.

The Court particularly looked at thecomments made by the manager aboutgetting alternative representation and foundthat this did not constitute adverse action.

Suggestion for employersAdverse action claims are increasing. They

are being used as an alternative to unfairdismissal claims, compensation is notcapped and claims can be made up to 60days after termination of employment.

To limit the effect of an adverse actionclaim employers should:• make sure decisions are unambiguous,

fair and valid and not for some otherreason related to the employee'sworkplace rights or industrial activities

• ensure that managers understand the newgeneral protection provisions and this isreflected in training and procedures

• action claims that are not in relation totermination of employment can becommenced within six years of theincident, it is therefore vital to documenteverything throughout employment

• develop a system to identify high riskissues or employees, so that grievancescan be dealt with internally rather thanemployees making claims to externaltribunals and courts.

Employers should not be reticent to takedisciplinary action where warranted, providedthat that action is taken on bona fide groundsusing procedural fairness and in line withpolicies and/or the requirements of theworkplace instrument.

All Inclusive Rates and Absorbing Over

Award payments

The Fair Work Ombudsman has confirmedthat it considers off-set clauses as a validmeans of making payments to satisfyminimum monetary award entitlements.

As long as an "all-inclusive wage rate"is higher than the amounts the employee

would have received under an award forhours worked, employers can use set-offclauses to pay their employees an all-inclusive rate.

Paying a higher wage rate than the awardminimum will offset penalties or loadings inthe award where it is clear that the partiesintended to do so (and in fact, the amountsatisfies the entitlements that wouldotherwise be payable to the employee).

Some awards include clauses whichexpressly allow an employer pay anannualised salary in satisfaction of certainmonetary entitlements (provided that certainconditions are met), others do not have suchclauses.

Provided that an all inclusive rate is higherthan the amounts the employee would havereceived under an award for the hoursworked, employers covered by awards

without annualised salary clauses can useclauses to pay their employees an all-inclusive hourly wage or annual salary insatisfaction of minimum award entitlementssuch as minimum wages, allowances, leaveloading, penalty rates, overtime, andweekend and public holiday rates.

It is important that such agreements with

employees are:

• By genuine agreement free from anycoercion,

• Committed to writing and kept as timeand wages records,

• Clear as to what penalties, loadings etc

INDUSTRIAL ReLATIONS

SECURITY INSIDER AUG/SEP 2010// 69

continued page 70 >

The employer is only obliged to pay

parental leave if the employee has been

with that employer for at least 12 months.

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 69

Page 70: Insider Aug-Sept 2010

Note:The information provided above is for convenient reference only. ASIAL and Chris Delaney & Associates Pty Ltd provide thisinformation on the basis that it is not to be relied upon in any or all cases, as the circumstances in each matter are specific.Accordingly, we provide this information for general reference only, but we advise you to take no action without prior reference toan Employee Relations professional. ASIAL members can contact Chris Delaney by emailing [email protected]

are off-set by the over award payment,and

• is higher than the amounts the employeewould have received under an award forthe hours worked

The Fair Work Ombudsman’s Guidance

Note #7 includes the following:

Absorption and offsetting of over-awardpaymentsThe model transitional provisions provide that: “The monetary obligations imposed onemployers by this award may be absorbedinto over-award payments. Nothing in thisaward requires an employer to maintain orincrease any over-award payment.”

This means that if an employer was paying$2 more per hour than the minimum wagebefore 1 July 2010 and the minimum wagewas increased by $1 per hour from 1 July2010, the modern award does not require theemployer to pay $2 more than the newminimum wage; they can continue paying thesame amount per hour (which would be $1more than the employee’s minimumentitlement).

This provision applies in conjunction withwell established Court authority concerninghow employers can offset over-awardpayments against other award entitlements.As a general principle, over-award paymentscan only satisfy entitlements to which thepayment is directed.

This means, for example, that paying ahigher wage rate than the award minimumdoes not offset penalties or loadings in theaward unless it is clear that the partiesintended to do so (and in fact, the amountsatisfies the entitlements that wouldotherwise be payable to the employee).

If an employer has properly entered intoan offsetting arrangement that makes it clearthat over-award payments are in satisfactionof all penalties, wages etc due under theaward, that arrangement can continue to berelied upon to satisfy increases that arise as aresult of the commencement of modernawards. In addition, employers can agreewith their employees to enter into such anarrangement with respect to future payments.

Paid Parental LeaveFrom 1 January 2011, the mother of a

new born child, or the primary care giver of anewly adopted child will be provided withpaid leave for a maximum of 18 weeks at theminimum wage of $569.90 per week.

EligibilityTo be eligible for the leave the employee

must:• Be the primary care giver of a new born

child, or newly adopted child;• Have an income of not more than

$150,000 per annum;• Have worked at least 330 hours in the

preceding 392 days (13 months) withpermissible breaks. Many part-time andcasual employees will satisfy this worktest; and

• Be an Australian Citizen or permanentresident.

Eligibility will be assessed by the FamilyAssistance Office (a Government agency)upon receiving an application direct from anemployee seeking paid parental leave.

An employee may also satisfy the worktest if they have had multiple employers, orworked as an independent contractor overthe qualifying period, however, in suchcircumstances payment would be receivedfrom the Family Assistance Office direct, notany employer.

Paid parental leave and other paid leaveAn employee’s entitlement to 18 weeks

paid parental leave under this legislation is inaddition to any other entitlement to paidparental leave that may exist in anemployment contract or an enterpriseagreement and other statutory entitlements toleave.

Payments from the Family AssistanceOffice

The Family Assistance Office will assessthe application and, if approved, it will notifythe employer that they are required to makethe payments.

Employer’s ResponsibilitiesAfter 1 July 2011 an employer who is

notified by the Family Assistance Office thatthey are required to make parental leavepayments will have to pay the parental leavevia normal payroll practices, includingwithholding the usual PAYG tax.

The Family Assistance Office will pay theemployer in advance of the parental leavebeing paid to the employee.

The employer is only obliged to payparental leave if the employee has been withthat employer for at least 12 months.Otherwise, the Family Assistance Office willpay the parental leave directly to theemployee.

From 1 January 2011 to 30 June 2011,will be regarded as a transitional periodduring which time employers can choose toadminister the paid parental leavethemselves, otherwise the Family AssistanceOffice will pay the parental leave direct to theemployee.

After July 2011, time for employers tounderstand their obligations to pay parentalleave will have expired as the transitionalperiod will have passed. From that time theFair Work Ombudsman will have parentalleave payments to add to the lengthy list ofemployer obligations it enforces.

70 //SECURITY INSIDER AUG/SEP 2010

INDUSTRIAL ReLATIONS

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 70

Page 71: Insider Aug-Sept 2010

HHOOTT PPRROODDUUCCTTSS

INTREPID™ Sensors Now Even SMARTER!n Perimeter Systems Australia Pty Ltd > (02) 9150 0651n Email > [email protected] Web > www.southwestmicrowave.com

In protecting a facility’s perimeter, two distinct challenges arise. Selecting theappropriate sensor to address site requirements,and finding cost-effective,compatiblesolutions when site characteristics or security level dictate layered protection.

Combining 40 years of perimeter detection experience with the latest inintegrated systems engineering, Southwest Microwave addresses thesechallenges with its new-generation INTREPID™ Intelligent Sensors. Deploy anycombination of fence, buried and digital microwave solutions on a single networkplatform to protect each portion of your perimeter with the optimal sensor for thatlocation. For unparalleled configuration and operating convenience, INTREPID™employs a common communications protocol, universal set-up software, scalablesystem controllers and a broad input voltage range.

SECURITY INSIDER AUG/SEP 2010// 71

Vigitron’s Next Generation IP extendersn Pacom Communications > (03) 9676 0222n Email > [email protected] Web > www.pacom.com.au

Videofied XL totally wireless securityn Video Alarm Technologies > 1300 46 44 55n Email > [email protected] Web > www.videofied.com.au

The newVideofied XL wireless video alarm system is completely UNPLUGGEDand has two way voice built in, also accommodating up to 20 wireless devicesincluding Videofied indoor and outdoor MotionViewers.

The VIDEOFIED™ MotionViewer combines a PIR, camera and illuminators into aself-powered device that can be instantly mounted anywhere security is needed.The panel communicates alarms to the Central Monitoring Station over the cellnetwork using GSM (2-way voice) and GPRS (10 second video of the intrusion).Video verification and Voice Verification on a single system — all for a similar price asa blind burglar alarm makes the XL the next generation alarm system for thedomestic to commercial markets.

The VIDEOFIED™ XL literally needs no wires or cables, not even power to thepanel. Contact us for more information.

Pacific Communications is pleased to release the latest Super Ethernet transmissiontechnology from Vigitron.

Vigitron's Vi2401 (S78625) is a revolutionary data transmission device thatextends full-duplex High-Speed Ethernet over existing UTP infrastructures. Itemploys an innovative and unique Super Ethernet scheme instead of traditionallyused DSL technology. DSL technology is designed for data transmission over lowgrade wires and the inherent redundant data transmission scheme for errorcorrection significantly reduces effective data rate as distance increases.

Product features include: New Super Ethernet transmission technology • Up to1,600m coaxial cable for 10Base T• Up to 700m coaxial cable for 100Base T• astto install, no IP setup • Small footprint and lots more... Available from your PacificCommunications and Direct Alarm Supplies branch.

NEW!

NEW!

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:39 PM Page 71

Page 72: Insider Aug-Sept 2010

HHOOTT PPRROODDUUCCTTSS

UTC Fire and Security release Challenger™IP LAN Adaptorn Direct Alarm Supplies > (02) 9717 5222n Email > [email protected] Web > www.das.com.au

RoboCam R1 body-worn chestcamera systemn ValuTronics Pty Ltd > (02) 9671 7777n Email > [email protected] Web > www.valutronics.com.au

RoboCam is a totally mobile security system comprising of a portable harddrive and camera unit which can be worn on the head, the shoulder or thechest. RoboCam is an essential asset for any professional security operativethat wants to protect their livelihood. A false allegation could cost an operativetheir hard earned license and consequently their means to earn a living.RoboCam can ensure that this never happens to you.

Every RoboCam unit provides multi-level password protection and framecounters to guarantee that your data tamperproof.The hands free unit enablesthe user to have an instant record of everything they hear and see.

Inner Range – Aperio Modulen Inner Range > (03) 9753 3488n Web > www.centralsd.com.aun Web > www.innerrange.com

72 //SECURITY INSIDER AUG/SEP 2010

The new Aperio module from Inner Range positions itself as the most flexibleAperio Interface available. As a true 2 door controller the Concept 4000 modulefeatures onboard interfaces for two Aperio hubs and delivers a high level ofredundancy via its onboard card caching capacity. Designed with installation ease inmind the Aperio modules simply connect directly to the Concept 4000 RS485 LANand are sized to install into very small enclosures or into existing equipmenthousings. Set-up and commissioning is also straight forward.

Aperio is a wireless access control technology that radically reduces theinstallation time and cost of installing traditional electronic access control devices.Aperio cylinders replace traditional mechanical cylinders and contain a wirelesstransceiver and a card reader.

See it at Security 2010 Exhibition – Central Security Distribution Stand D22.

Save time and money installing Challenger™ with the newTS0098 Challenger IPLAN Adaptor. TS0098 modules allow Challenger RS-485 LAN data to be carriedover an IP network.This provides an IP connection between a Challenger panel andits LAN devices such as Remote Arming Stations (RAS) and Data Gathering Panels(including Intelligent Access Controllers) reducing the need for dedicated wiring ofexpensive two-pair twisted, shielded data cable (Belden 8723).

The TS0098 also enables physically separate segments of the Challenger RS-485 LAN to be linked together over an IP network, either to extend distance orinexpensively utilise existing IT infrastructure. TS0098 modules provide securely-encrypted IP communications via a unique 128-bit encryption key. For moreinformation, please visit www.utcfs.com.au/IPLAN

NEW!

NEW!

NEW!

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:40 PM Page 72

Page 73: Insider Aug-Sept 2010

HHOOTT PPRROODDUUCCTTSS

Inner Range – Insight V5n Inner Range > (03) 9753 3488n Web > www.centralsd.com.aun Web > www.innerrange.com

The Industries' leading integrated security and access control managementsoftware is now a whole lot more powerful! Insight V5 has a host of exciting new features:

Tagboard User Location Display - The new user location module displays thelocation of specific users, or displays all users in specific locations. It delivers real-timeuser location status and is designed for both public displays and private workstations.

User Credit System - Insight V5 introduces a brand new user credit feature. Usersare given credit points,byoperatorentryordynamically from a 3rd partyapplication.Useraccess events then decrement these credits, with access permissions expiring whentheir credit points equal zero.Plus Qualification/Certification Management • New user friendly, UserManagement Screens • Updates to the Schematic Floor Plan Module

SECURITY INSIDER AUG/SEP 2010// 73

The MITT Hands-Free AdamsMetal Detectorn ValuTronics Pty Ltd > (02) 9671 7777n Email > [email protected] Web > www.valutronics.com.au

Inner Range – Intelligent Two DoorAccess Modulen Inner Range > (03) 9753 3488n Web > www.centralsd.com.aun Web > www.innerrange.com

The Inner Range Concept 4000 Intelligent 2 Door Controller is now available.Building upon the highly successful Intelligent 4 Door Access Module, the

modular architecture of the Intelligent 2 Door Access Module has been specificallydesigned to meet the highest levels of system integrity and redundancy planning.The Intelligent 2 Door Access module effectively combines offline stand-aloneoperation with enhanced feature design. Full support of the advanced Conceptaccess control features (soft/hard/timed anti-passback, dual user, card + PIN, freeaccess via time-zones etc) is provided. Added advantages include more flexiblemodular design allowing for door and reader expansion up to 4 doors and 8 readersall in smaller chassis housing.

See it at Security 2010 Exhibition - Central Security Distribution Stand D22.

The MITT hands-free Adams Metal Detectors have become a serious choice forprofessionals involved in the pat down search of personnel.The operator can detectstandard weapons (small knives, guns etc) yet the MITThas extra sensitivity to detectmetal objects as small as a book staple, or even smaller.The MITT is ergonomic andcomfortable enough to be worn continuously throughout a shift and is a flexible fit.Due to the unit’s hands free operation and covert abilities (silent vibrating alarm).

The MITT makes screening simple, fast, safe and more efficient. With thespecial flexible search head, operators can bend their hands or clench a fistcomfortably while using the MITT, leaving hands and fingers completely free tosimultaneously perform other tasks.

NEW!

NEW!

NEW!

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:40 PM Page 73

Page 74: Insider Aug-Sept 2010

74 //SECURITY INSIDER AUG/SEP 2010

R esearchers have found that the world's strongest insect, relative to body weight, is the male dung beetle, able to liftmore than 1,100 times its weight in dung. Since the beetles mate inside dung patties, their every move is a struggleagainst the resistance posed by the feces.They also found some weaker dung beetles mated just fine, helped not bytheir strength but their unusually large testicles. Either way, it all sounds a bit like the life of the average security

manager. Police in Edinburgh, Scotland, issued two men disorderly-conduct citations, after witnesses reported that theinebriated pair had placed their genitals on a supermarket’s vegetable weighing scale.They were acquitted, however, after theonly witness admitted that she only saw the men zipping up after claiming to have weighed themselves. Pennsylvania policecharged a 55-year-old man with public drunkenness, after neighbors spotted him giving — as he later described it — mouth-to-mouth resuscitation to a road-kill possum. A 62-year-old Michigan man suffered second-degree burns after launching himselfon a makeshift, rocket-powered sled.Witnesses say he put on a helmet, strapped a contraption consisting of a motorcyclemuffler, a pipe, gunpowder, match heads, and gasoline on his back, and had someone light the wick. Alcohol may have beeninvolved. Lucky he didn’t send a New Jersey burglar to get his painkillers, who was arrested having made off with packets ofOxybutynin. Police figure he may have been after Oxycontin.The difference? The latter is a powerful pain killer, his haul treatsoveractive bladders. Mind you, a 43-year-old Virginia man might have found that helpful, after he was caught straight away forrobbing a mini-mart, because he had to stop in a nearby ally to relieve himself. A 51-year-old Florida woman who walked into aBank of America branch, handed over a robbery note, and walked out with money, was quickly identified and arrested. She said:“There was no plan, no nothing, just impulse. I think everyone should have a list of things they want to do before they die.”Wonder if that was what on the mind of a 39-year-old San Diego man who he died when he crashed his motorcycle whilefleeing from sheriff's deputies after allegedly stealing a pack of cigarettes from a mini-mart? Three middle-aged Detroit menwere also killed going the wrong way on a freeway after stealing $US45 worth of beauty products from a convenience store.This time, however, police said they were not chasing them but that men were merely in a hurry to get away. Police in St. Louis,Missouri, were called to a man roaming the halls of an upscale office block with a gun. On arrival, officers found workers hidingunder desks and in closets, while others had fled the building. Investigations revealed that two lawyers were, once again, playinga game in the hallways, stalking each other with BB guns and occasionally firing. None of the occupants knew it was a game,apart from one, because she had been shot in the finger and shoulder after walking into a previous battle. Police filed guncharges, and one senior officer said the men would be “tried as adults”, despite their juvenile behaviour. A 41-year-old Michiganwoman suffering an increasingly painful shoulder injury was repeatedly turned away from emergency rooms, because hercondition was not life threatening. Finally, she took a gun and shot herself in the shoulder, hoping for ER treatment. Havingmissed major arteries and bones, she was patched up and again sent home. Except, of course, this time in even more pain. A33-year-old British actor who had, among other things,“water-boarded” his girlfriend by pulling her shirt over her head and heldher under a shower during a two-hour rampage, was acquitted of domestic assault, not because water-boarding isn’t torture — itis, it is — but because the actor convinced the judge that an anti-smoking drug made him unable to control himself, or even toremember the events of that evening. So, water-boarding is okay, but not, apparently the use of the Mosquito device, whichemits an irritating, pulsating, very-high-pitched noise, marketed to shopkeepers to drive away loitering children and teenagers,since the pitch is audible to them but rarely to anyone older than their mid-20s (audio range contracts with age). The Council ofEurope, which oversees the European Court of Human Rights, declared the Mosquito a “human rights violation” in that thesounds it emits constitutes “torture”.Whereas kids and their racket are just really, really annoying, right? Check out theJuly/August issue of The Atlantic, where Daniel Byman and Christine Fair, present evidence that jihadists blow themselves up bymistake, botch airline shoe- and underwear-bombing, buy the wrong fertilizer for urban car bombs, brag too much, and watch fartoo much Internet pornography. (Is that really possible?) The authors conclude, that there has not been a truly competent jihadistterrorist since Mohammad Atta led the September 11, 2001, missions, and suggest that the US and its allies treat jihadists as“nitwits”, rather than as “savvy and sophisticated killers” (the latter being an attractive recruiting image). Kind of hard, though, todrum up big budgets on that basis, isn’t it? We could say more and probably will do so next issue…

“Pennsylvania police charged a 55-year-old manwith public drunkenness, after neighbors spottedhim giving — as he late“r described it — mouth-to-mouth resuscitation to a road-kill possum.”

Frank Sales

HHUUMMOOUURR MMEE

frank sales

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:40 PM Page 74

Page 75: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:40 PM Page 75

Page 76: Insider Aug-Sept 2010

INSIDER_Aug_Sept10 Iss4_76pp 3/8/10 8:40 PM Page 76