Asia Pacific Security Magazine

Page 1

THE REGION’S LEADING GOVERNMENT AND CORPORATE SECURITY MAGAZINE | www.asiapacificsecuritymagazine.com.au Jan 2014

India’s Defence Budget: To spend, or not to spend

China’s own rebalancing act

FEATURE INTERVIEW

Patrick Suckling Australia’s Ambassador to India

Humans becoming superhumans all because of CCTV

Insight into Global Security Giant Lockheed Martin International

Watch interviews on IT security with: INTEL CISCO TREND MICRO SCHNEIDER ELECTRIC

Plus TechTime Mini-Mag inside All the latest in news and products


Help keep the internet safe. With the crucial need to keep up with the ever evolving knowledge of hackers, cyber security is a rapidly growing industry that offers excellent career opportunities. Curtin is one of only a few universities in Australia to offer a Graduate Diploma in Cyber Security. As a graduate, you’ll learn how to develop and maintain a secure computing infrastructure, handle and address cyber security threats and manage data access in a distributed network. This means you’ll help keep the digital environment safe, be in high demand and make tomorrow better. To find out more, visit curtin.edu.au/postgradcyber

CRICOS Provider Code 00301J MF CUSE000019 Curtin University is a trademark of Curtin University of Technology


Memories. iFly Singapore, the world’s largest indoor skydiving simulator,

uses Milestone XProtect® Enterprise surveillance software to monitor park grounds and give visitors a lasting memory. Flying at speeds of up to 186 miles per hour, the software records each skydiver’s flight and information using Radio Frequency Identification (RFID). After their flight, a video souvenir helps visitors relive all of the adrenaline-fueled moments. Proving again that XProtect is more than security.

Milestone XProtect® is the world’s leading IP video surveillance management software and is reliable, future proof and easy to use. It supports the widest choice in cameras and seamlessly integrates with business and security solutions such as RFID. Which means your possibilities are unlimited and you can keep your security options open. See our new products and the new ways to use XProtect at: www.milestonesys.com

Milestone Systems Australia Теl: +61 3 9016 7877


Editor'sDesk “There is no greater responsibility for a Prime Minister than ensuring the safety of Australian citizens and securing our borders.”

I

t will be worthwhile reading the quote above again before reading further. Is it wasteful political rhetoric or is it a quote of substance and to be taken with the utmost seriousness? Anyone who regularly reads this desk, or knows me professionally, will be aware of my advocacy to have the security industry appropriately recognised and regulated by Government. For example, there is currently no consistent national legislation for security providers and security operators in Australia. Legislative reform is not on the COAG (Council of Australian Governments) agenda within the National Security and Community Safety charter. Surprisingly, cyber security is not even nominated under this agenda. Nor does security, community safety or crime prevention get any mention within COAG’s National Objective and Criteria for Future Strategic Planning of Capital Cities. Where on the agenda is the security of Australians? Of greatest concern is the exclusion of the security industry from the National Occupations Legislation scheme. Plumbers, electricians and real estate agents breathe easy. The exclusion is reportedly at the request of State based industry regulators. The Security Industry Regulator’s Forum (SIRF), made up of representatives from each of the State regulators, be they police or Fair Trading officers, appears to be the group who controls the industry through inconsistent State regulation, each with different cost structures, penalties and enforcement. The last time COAG looked at the security industry was in 2008. Even at that time, COAG’s work was acknowledged as inadequate and the latest updates on COAG’s progress during the past five years have been deemed a failure. Coincidently, since 2008, there has been a surge of organised crime in Australia. Organised Crime now costs $15 billion a year, rising by 50 percent, increasing at an estimated average of $1 billion per year during the past five years. Alongside this increase, since 2007, OMCG member numbers have also surged, increasing by 53 percent to about 4,500 individuals, in 44 active gangs. It is one of the drivers for recent action on the issue at a national level. “Organised crime activity invariably exploits

- Australian Prime Minister Tony Abbott, Australian Parliament, November 19, 2013. Australia’s communities, from vulnerable sectors such as the users of illicit drugs to individuals who purchase counterfeit goods. However, all people can be adversely impacted by the activities and products of organised crime, including violence, theft, fraud, intimidation and fear.” National Organised Crime Response Plan Over 2010-13. Even COAG has recognised that by working with industry and communities, that Governments can succeed in building and maintaining a national environment that is hostile and resilient to the activities of organised crime. One of the key strategies has been to reduce barriers and improve the conduct of multi-jurisdictional investigations and adopt a more strategic national approach to cyber crime. Despite these being the words of COAG strategies, neither of these are occurring with any support or reform for the Australian security industry. So where does the responsibility for securing Australians lay? The Commonwealth and the States and Territories agree they ‘share’ responsibility for the internal security of Australia. Therefore, there is no clear ‘accountability’ for community safety and security – hence why they seem to have the same debates about street crime, organised crime, drug abuse, alcohol related violence and more, around Australia, year after year. Examine any local Government in any Australian Capital City and you will find Community Safety and Crime Prevention will be within the top three priorities for the local community. It is why Campbell Newman, can suddenly introduce frightening legislation against OMCGs with a majority of public support. Yet, Queensland remains behind other States in introducing COAG’s 2008 recommendations. There is an existing business case making it worthwhile to add the Reform of the Australian Security Industry to the National Security and Community Safety agenda. The Federal Government made a pre-election commitment to inject $50 million funding to local Governments, across Australia, to install public CCTV surveillance systems to fight crime. The CCTV Industry incorporates security consultants, security suppliers, security integrators and

installers, security maintenance technicians, as well as input from police and local Government authorities. Although the funds will be dispersed nationally, security providers cannot function nationally due to the limitations of the State based legislation model. The CCTV funding is currently at risk as the Federal Government has advised that the grant will be re-issued under an amended community safety charter – the details of which are yet to be released. Any funding would certainly be a welcome boost to the sector, but the benefit to industry is often inhibited by surges of work in pockets, rather than facilitating a national boost and scalable model. Consider the near future also, with most City CCTV systems looking to use the ‘National’ Broadband Network (NBN) as a backbone – there is a great deal of up skilling needed within the security industry and yet insufficient capacity or framework to share NBN learning outcomes between the States. By reforming the industry to a national framework, there will be increased opportunities for security related businesses and improved standards and professionalism through increased competition. All in line with the new Australian Government’s national economy and productivity agendas. The industry has a lot more breadth than just security guards, crowd controllers, body guards and investigators. Security impacts all sectors of society and includes some of the world’s largest companies, like our profile in this issue of Lockheed Martin International, a $47 billion global security company. If legislators and regulators, not just in Australia but globally, understood the business of modern security better, I’m sure we would not need to be managing multiple different security licence classes across multiple different jurisdictions. Instead, we would have the option of operating, consulting, advising and investigating under a Federal framework that integrates and complements State based systems. Yours sincerely, Chris Cubbage

CPP, RSecP, GAICD

Executive Editor

Acknowledgements Executive Editor / Director Chris Cubbage Director / Co-founder David Matrai Senior Editor Loreta Cilfone Art Director Stefan Babij Copyright © 2013 My Security Media Pty Ltd 286 Alexander Drive, Dianella, WA 6059, Australia T: +61 8 6465 4732 | E: info@mysecurity.com.au E: editor@asiapacificsecuritymagazine.com All material appearing in Asia Pacific Security Magazine is copyright. Reproduction in whole or part is not permitted without permission in writing from the publisher. The views of contributors are not necessarily those of the publisher. Professional advice should be sought before applying the information to particular circumstances. 2 | Asia Pacific Security Magazine


KEEP YOUR WORKMATES SAFE

19–20 MARCH 2014 Register for free at safetyinaction.net.au/darwin/apsm Major Corporate Sponsor

Supported by

Learn. Network. Source. Stay Safe.

Darwin Convention Centre #SIADarwin Asia Pacific Security Magazine | 3


L A I C SPE

....with Mihai Lazarescu

Associate Professor, Head of Department of Computing, Curtin University Associate Professor Lazarescu specialises in the development of high quality Computer Science Programmes with specialties in Unstructured Stream Data Mining, Computer Science Curriculum Development and Management. How did you get into the security industry? I have had an interest in cyber security for over seven years – ever since I started to work with the Linux firewall rules and I was surprised at how easy it was to circumvent some of the security settings. How did your current position come about? Over the past five years I have done a lot of research in the area of stream data mining which involved analysing large scale TCP traffic from a theoretical pattern recognition point of view. As I worked on the problem, I realised that a lot of the previous research I have done in computer vision and artificial intelligence dealt with problems that are still open in the security field. Finally, over two years ago, we started to develop both undergraduate and graduate courses in cyber security and we are now focusing a large amount of our research in the cyber forensics and intrusion detection areas. What are some of the challenges you think the industry is faced with? There are many challenges that are faced by the industry and the lack of personnel with a good mixture of security skills is probably the most

4 | Asia Pacific Security Magazine

significant. There is substantial number of people that are able to handle the policy and some aspects of the administration part of cyber security but there are very few that have the technical skills to handle the challenges of dealing with network defense, intrusion detection and investigation. Other significant challenges are the speed with which everything changes in modern computing and the lack of understanding of what effective cyber security is all about, and that it needs resources to mitigate the threats faced in today’s world. Unfortunately, good cyber security is a problem in the sense that when everything is working well, the expense to keep it that way is very difficult to explain to non-computing persons. Where do you see the industry heading? The awareness of cyber security is clearly increasing but from a local perspective, it will take a number of years before cyber security will be receiving the attention and resources needed. The amount of resources allocated to cyber security is small when compared with the US or the EU and it is likely to stay that way for some time. What do you do when you’re not working? I like to solve problems, primarily in pattern recognition and cyber security and the most fun way to do this is to take part in cyber hacking competitions. Professor Lazarescu can be contacted via email: M.Lazarescu@curtin.edu.au

Watch the 2 minute video with Mihai Lazarescu, Associate Professor, Head of Department of Computing, Curtin University, as he tells you what you need to know about cyber security.


www.bigdataworldshow.com

BIG DATA BIG FUTURE 25 - 26 MARCH 2014 • SINGAPORE

Riding on the success of Big Data World Show 2013 in Malaysia recently with more than 200 attendees, we are now organizing a 2014 world-tour; Singapore (25th26th March), UAE (9th-10th June), Malaysia (9th-10th September) & Australia (17th18th November).

Big Data World Show Singapore 2014 will be launched on March 24-

25! More than 150 big data scientist and analytics leaders from various industries such as telecommunications, nance, government, oil and gas, FMCG and healthcare industries just to name a few and world’s leading big data solution providers are expected to share the most advanced experience and brainstorm in Global Big Data Market Outlook & Development, Data Storage, Data Maintenance, Data Mining and Business Intelligence in the 2 day summit.

Ajmair Singh (AJ) Marketing Manager Olygen Sdn. Bhd. Phone: 603-2282 0973 Fax: 603-21784789 Mobile: 6010-4249176 Email: aj.singh@olygen.com


....with Justin Busuttil

Protective Security Manager, Lockheed Martin Australia

As a Registered Security Professional of Australasia, Justin Busuttil previously spent 11 years as a police officer with the NSW Police Force, two years as an Operational Safety Trainer (OST) with Australian Federal Police (AFP) and has managed security operations and protective security for the past five years. In his current role with Lockheed Martin Australia, he is responsible for the management of personnel, information and physical security across a number of Lockheed Martin business lines and programs in Australia. How did you get into the security industry? After leaving law enforcement it seemed like the logical progression. Pursuing a career in protective security management appealed to me and allowed me to use the skills I had developed over an 11-year career in law enforcement. Where I am now seems such a long way from being a beat cop in south west Sydney. The hard part was not being seen as just another ex-cop. The first major step was to obtain civilian recognition for my police training and experience and continue with additional training and development. Since leaving the police I have obtained a number of qualifications which I think are essential to protective security management in both Government and industry. These include Diploma’s in Management, Government (Security), Government (Investigation), Security & Risk Management. I am currently studying to receive my Diploma of Work Health and Safety, and plan after that is complete, to look at some studies in Emergency Management. How did your current position come about? I was working as the Agency Security Adviser (ASA) for the Office of the Fair Work Ombudsman in Canberra, when I saw an advertisement for a Security Manager with Lockheed Martin. I knew very little about the company at that point, other than they built military aircraft. I checked out the company website and was impressed with what I saw, which was more than just building planes. The type of work conducted by Lockheed Martin really interested me and I thought it would be a great opportunity to take my security management career to the next level.

6 | Asia Pacific Security Magazine

What are some of the challenges you think the industry is faced with? There has been so much development and advancement in the technological side of security but the manpower side of the fence is still in the dark ages. This concerns me because the weakest link in any security control or process is the human component and the trusted insider threat still remains the greatest threat to Government and industry. Security guards/officers remain poorly paid, poorly trained, and they are often the first and last person you see when you interact with an organisation or facility. There is so much focus and investment in cyber security which is valid based on the threat but the traditional threats have not gone away. We need to ensure there is a balance between cyber security and physical security and that they are complementary to each other. It is pointless spending hundreds of thousands of dollars on cyber security when you don’t conduct background checks on your personnel. It is pointless spending thousands of

dollars on Electronic Access Control Systems (EACS) if you don’t provide adequate and ongoing security awareness training where personnel are educated about access control, visitor management, and situational awareness. Where do you see the industry heading? Unfortunately, I think the separation between protective security (personnel, physical and information security) and cyber security will continue to grow and we will go full circle and see a return of traditional security threats because all of our focus is on the cyber threat. It does not take a rocket scientist to know that you target the weakest link in the chain. I see the continued and progressive integration of protective security management with emergency/crisis management, and see the security manpower (guards/officers) continuing to be the most neglected sector in the security industry.


Asia Pacific Security Magazine | 7


addition, she also worked as a security consultant in the private sector for nearly seven years, across privacy, security compliance, secure product design, security architectures and PKI. These roles strengthen Gartner’s security expertise across the Asia Pacific region.

Iain Deuchars

Roger Hook

Craig Lawson and Anne Robins Gartner in Australia has two new additions joining the security research team. Craig Lawson is a research director based in Brisbane, covering network security. His research areas focus on firewalls, Web security, IPS, IDS, SIEM, log management, vulnerability management, advanced threats (APT), vulnerability research, network forensics, virtualisation, cloud and mobile security. He brings more than 22 years’ experience in the IT industry to Gartner, having worked in IT security related pre-sales, engineering and solution architecture roles at HP, IBM and Dimension Data during the past 15 years. These roles covered a variety of vertical markets using on-premise, managed services, IaaS and SaaS delivery models, such as health, commercial, Government, natural resources and telco. Anne Robins is a Sydney-based research director covering security, risk management, identity and privacy strategies. She has more than 20 years’ information security experience in both Government and private sectors. Before joining Gartner, Anne worked in biometrics and identity management with Daon in Australia and New Zealand. She also spent nearly 10 years in a variety of roles at the Defence Signals Directorate (DSD), including cryptographic engineering, security product evaluation and accreditation, as well as InfoSec policy and capability development. In

8 | Asia Pacific Security Magazine

Security and crowd management specialist Integrated Security Consultants Ltd (ISC), has been awarded the contract to secure Singapore’s multi-venue flagship, the Singapore Sports Hub, due to open in April 2014. The Hub, with its motto ‘where Singapore comes to play’, includes the republic’s new 55,000-capacity National Stadium, the existing 13,000-capacity Singapore Indoor Stadium, plus two multipurpose Sports Halls, an Aquatic Centre, 41,000 square metre Retail and Waterfront area, Water Sports, Sports promenade, Singapore Sports Hub Library, Singapore Sports Museum and Sports & Lifestyle Facilities. In a five-year exclusive deal with global property services provider DTZ, one of the Hub’s consortium partners, ISC Ltd has incorporated a new Singapore-based company, Integrated Security Consultants (S) Pte Ltd, as it launches this international expansion. ISC (S) Pte Ltd will source, recruit and train a local crowd management workforce to supply the various venues at the Sports Hub, bringing UK expertise in event staffing operations and safety stewarding to this facility. Roger Hooker, previously Venue Management Cluster Manager for London 2012 and Venue General Manager at Games Time for the Organising Committee across the Wembley Olympic site, has been appointed Senior Project Director for ISC. He will mobilise the business and lead the team to deliver these services in Singapore.

ComNet Europe Ltd of Leeds in the United Kingdom, a division of ComNet Communication Networks, a USA-based manufacturer of fiber optic, wireless and copper transmission and networking equipment, has announced the appointment of Iain Deuchars as Business Development Manager. Iain will be responsible for securing new business opportunities and strategic partnerships throughout Europe, the Middle East, Africa and Asia. Iain Deuchars comes to ComNet from KBC Networks where he served as Managing Director for the past eight years. Prior to KBC, he was the Managing Director of IFS Europe. “I’m very pleased to be joining ComNet,” comments Iain, on his new role. “ComNet has been very aggressive since entering the market, their product development pace has been very impressive and the fact that many of the products they offer are made in the USA give us, as I am now proud to say, a very distinct advantage.”

Bill Gately ISCON Imaging, Inc, a subsidiary of DVTEL and a manufacturer of patented infrared (IR) imaging systems for the global security market, has appointed seasoned executive leader Bill Gately as its new Chief Executive Officer. Gately brings to ISCON a proven track record of helping to drive growth and launch new technology developments into emerging, fast growth markets. He has more than 25 years of multinational executive leadership, strategic product development and operational expertise at world-class organisations. “Bill is a proven executive leader with extensive experience in the fields of electronics, semiconductors, homeland defense and security,” says Yoav Stern, President and CEO, DVTEL, the parent company of ISCON. If you have an entry for Movers & Shakers please email details and photo to editor@australiansecuritymagazine.com.au


www.cctvbuyersguide.com

For all the latest in CCTV products and news. www.cctvbuyersguide.com


....with Colin Knox

RIMS Australasia Chapter President what both drives RIMS and sets it far apart from other associations and institutes. With significant initiatives such as the Spencer Foundation, which offers funded internships and other educational assistance for students, RIMS is able to deliver services and opportunities to members that simply have not been available in this region and which would take years to establish in isolation. RIMS network stretches across over 11,000 members around the world and with that broad base of skills and knowledge comes deeper and broader learning opportunities as well as a sound base from which to continue to grow. Risk Management has been an accepted discipline for 20 years – what are the impediments for the Asian region in adopting the ISO 31000 standard?

E

arly December 2013, RIMS successfully hosted its first ‘Risk Forum’ in Melbourne, Australia. The Australian Security Magazine interviewed the new RIMS Australasia Chapter President, Colin Knox, about the expansion into the region. What is your motivation in taking up the Australasian Presidency for RIMS and what qualities do you bring to the role? My main aim is to establish a member based professional risk management organisation that will assist risk managers working in public and private organisations to have access to global networks of risk managers, strong technical support for their roles and internationally recognised risk management professional development and educational pathways and qualifications. The presidency role is something that I see as an opportunity to drive the

10 | Asia Pacific Security Magazine

establishment of RIMS in this region, and with long experience in risk management dating back to the 1980s when I completed the RIMS Associate in Risk Management qualification, and experience in various senior risk management roles in Australia, Papua New Guinea and the Americas, I have seen the benefits of being associated with a strong international body, such as RIMS. What is the driving force behind RIMS and how will it be different to other associations or institutes operating in the broad risk management charter? RIMS has established strong professional networks, education and professional development programs and technical resources that can be of immediate value to members and are unmatched by other associations. The depth of these resources and the long experience that RIMS has in delivering them through established systems is

I don’t see any impediments to Asia adopting ISO 31000, moreover I see one of the great strengths of Asia as being its ability to evolve quickly into being leaders in the global economy and great adopters of fundamental processes and international standards that are helping to drive this evolution. The growth of education and professional development across much of Asia in recent years has been astounding and despite coming from ‘third-world’ levels of risk management, there is strong interest in business and Government in adopting sound risk management practices. I believe that as Asia continues to grow as an economic powerhouse, so too does its want and need to improve the management of risk through the adoption of internationally recognised processes and standards. RIMS is well positioned to assist in delivering services to assist the growing risk management community in Asia in the understanding and adoption of these processes and standards. What are the key challenges ahead for RIMS as it expands? I believe the only real challenge for RIMS is that many companies and Government bodies are operating under financial constraints that restrict their membership of professional bodies. I think it is incumbent therefore on RIMS to demonstrate and continuously improve its ability to add value to its membership and to business and Government through the delivery of RIMS services that improve knowledge, skills and technical resources to help drive better business and Government outcomes through sound risk management practices.


LEADING INDEPENDENT SECURITY CONSULTANTS

Security, Risk & Resilience Independent, Specialist, Professional

T | + 61 8 6162 9920 E | info@amlechouse.com W | www.amlechouse.com

PTY LTD

security & risk management specialists Asia Pacific Security Magazine | 11


Feature Interview

Future of AustraliaIndia Relations In today’s context, Australia-India relations have reached a new and unprecedented milestone. Australia’s Ambassador to India, Patrick Suckling, provided an exclusive insight to Sergei DeSilvaRanasinghe about the development and scale of modern bilateral relations, challenges in the relationship, cooperation in combating people smuggling, development of a strategic partnership, the implications of Australia’s role in the UN Security Council for South Asia, Australia’s growing interest in the Indian Ocean, the importance of regional multilateral organisations and what the future holds for the bilateral relationship.

I

would like to start by getting a sense of how Australia views the relationship with India today?

By

Serge DeSilva-Ranasinghe Correspondent

12 | Asia Pacific Security Magazine

As you know the Government recently released three significant documents: The White Paper on the Asian Century, The National Security Strategy, and the Defence White Paper. Those documents give you a very good sense of where Australia views India now. India’s influence in commerce has definitely grown in recent years off the back of its economic growth, but its strategic reach has also been important and its interest in East Asia and the Indian Ocean. These documents recognise that India is at the forefront of our relationships in the region, alongside China, Indonesia, Japan, South Korea and the United States. The relationship with India is growing strongly. The white papers are a reflection of the Australian Government’s commitment to strengthening and diversifying our relationship – not only in terms of economic cooperation, but also on strategic security cooperation. The scale of the relationship, especially over the last ten years, has become very significant. This is why both countries agreed to elevate the relationship to a strategic partnership

in 2009. That was built on quite significantly during former Prime Minister Gillard’s visit to India in October last year [2012], including an agreement that the Prime Ministers would meet annually. The economic relationship is based on a genuinely strategic element, which is resource security. India sees Australia as a secure, long-term supplier of its energy needs, which is the way Northeast Asian economies have viewed Australia for decades. Whether it’s coal, LNG, copper or gold, there’s a significant trade in those sorts of resources. India is currently our tenth largest trading partner and fifth largest destination for Australian exports in goods and services. However, India is now looking at Australia in a way that it didn’t in the past; in terms of providing significant input into its continued development and prosperity. All of our major banks are now in India, we have major construction companies working with India and we have all sorts of providers from agribusiness to education, legal services to architecture and urban planning and design services operating there. We have got a very good set of bilateral forums where we can discuss a whole range of issues. For example, coming out of the Prime Minister’s visit to India last year [2012], there


Feature Interview

was an agreement for an annual PM to PM meeting. Now that will sit on the top of all the other frameworks where ministerial dialogues will now feed up into an annual PM to PM level agenda. It will drive the whole relationship, with a range of bilateral mechanisms – such as Foreign Minister meetings, annual Trade Minister meetings and regular Defence Minister meetings. We have ministerial dialogues on energy, security, education and skills. We have a CEO forum where top CEOs from India and Australia get together and discuss matters of mutual interest where they can drive the relationship further. So if you put all of those things together, we have a very significant suite of arrangements where ministers can, on an annual basis, talk about things that are of most importance to us and then feed them up to a Prime Minister-led process. In terms of where we’re looking down the road, what we’d like to see is, in the context of the PM to PM meetings, how far and fast we can drive the relationship through these ministerial level-led dialogues. Bilateral trade and investment is around 20 billion. Last year alone India put 10 billion dollars into Australia. Twoway trade last year was about 17.4 billion dollars. About 15 billion of that was Australia into India and the remainder was India into Australia. We expect those figures to continue to grow. If you look at India’s coal requirements over the next few years, the projections are that their import requirements will go from 100 billion tons to around 200 billion. If you look at LNG they’re going to go from 15 million tons to 30 million tons in the next few years and then 50 million tonnes by 2025. There is also increasing interest from India into Australia. For example, last year over 10 billion dollars was invested by Indian companies into our resources sector. All of India’s major IT firms are active in Australia, with upwards of 2,000 employees each. They’re looking at niche manufacturing areas such as aircraft, fertilizers and chemicals. We’re trying to negotiate further and more comprehensive economic partnership arrangements so that we can continue to diversify and strengthen the relationship. If you also look at people-to-people links, they’ve been growing fairly strongly over the last 15 years. We now have about 450,000 people of Indian origin living in Australia. Two-way flow for tourists are higher than they’ve ever been. There were over 180,000 Australians who went to India last year [2012] and over 150,000 Indians who went to Australia last year [2012], with that number projected to go up to 300,000 in the next few years. Since August 29 this year [2013], India has commenced direct flights to Australia, which is significant. For the first time there will be direct flights between India and Australia. Indians are currently the strongest growing migrant group in Australia and Indian international students are the second-largest group of foreign students in Australia. We’re pursuing, with India, stability and security for both the Indian Ocean region and the Asia Pacific. On the strategic and security side of things, I think India and Australia see eye-to-eye currently in a way that we didn’t in the past. For example, the recent Indian Defence Minister’s trip to Australia was a first ever visit by an Indian Defence Minister. There were very significant and detailed strategic discussions during that visit, but also with substantive outcomes – particularly an agreement on navy-to-navy

“Bilateral trade and investment is around 20 billion. Last year alone India put 10 billion dollars into Australia. Two-way trade last year was about 17.4 billion dollars. About 15 billion of that was Australia into India and the remainder was India into Australia.” exercises commencing in 2015. We’re working together in terms of our shared interest in a continued democratic Afghanistan. We’re working together on counter terrorism. We have shared strategic interests in the Indian Ocean. What would you say are the major challenges in the relationship? There are no major impediments, irritants or significant problems in the relationship. Having said that, there will always be challenges. The student issue was a significant challenge. But in terms of the relationship, the issue is well and truly behind us now. The Government in Australia took some fairly swift and strong action to nip that problem in the bud. Having said that, as I travel around India I am regularly asked by people whether Indian students can safely go to Australia because of the media attention at that time. So I do think that we still have a public diplomacy agenda or some work in public diplomacy to do to showcase just how safe and tolerant Australia is as a place for international students to go and study. On the Uranium issue, India recognises that Australia has changed its policy, which had previously been a bit of a drag on the relationship. We’re actively negotiating that agreement as we speak. We’ve had two highly productive and positive exchanges so far. From my perspective I think that the major challenge of the relationship with India and Australia is just the enormity and diversity of it. We need to make sure that we can as two Governments, peoples and business communities make the most of the sorts of opportunities that are currently being presented to each other through India’s extraordinary growth, Australia’s strong economy, and the positions that we both have adopted in terms of the Asia Pacific and the Indian Ocean. What about the issue of people smuggling? To what extent has there been cooperation between the Indian authorities and the Australian authorities on mitigating this problem? There’s been significant cooperation between Australia and India on people smuggling. The Indian authorities have disrupted 19 boats. We’ve worked with them very closely in terms of sharing information. We’re currently working closely with the Indian Government on the Australian Government’s recent changes to the system and the processing and rehabilitation that will occur in Papua New Guinea. We’re working with the Indian Governments both at the centre and in the south of India, to make sure there’s a very clear sense of Australia’s latest policy. There still are from time to time, boats that are looking to leave from India and that the Government

Asia Pacific Security Magazine | 13


NCT C-IED Asia 2013 C-IED and EOD: An Enduring Threat

W

hen we think about the threat of explosives and IEDs, many people in the Western hemisphere intuitively think about the Boston Bombings in 2013, or even more devastating IED attacks which took place in Madrid 2004, London 2005, and Oslo 2011. Together, with previously prevented attacks, the threat of IEDs to public security has been engraved in the heads of everybody from the Western world. However, with the withdrawal of ISAF troops from Afghanistan in 2014, the importance of these challenges for ‘Western’ military forces will probably decline. But in the meantime, this threat is ever present in regions such as Central, South and Southeast Asia, where IED attacks kill civilians and military representatives on a monthly basis. In parallel, the threat posed by landmines and unexploded war remnants is tremendous; large areas in Afghanistan, Myanmar, Cambodia and Laos cannot be inhabited or even cultivated, because they are practically littered with landmines. NCT C-IED Asia 2013 The second edition of NCT C-IED Asia took place on 29 to 31 October 2013, at the St Regis Hotel in Bangkok. It aimed to raise awareness of this enduring threat to both regional and international security. In cooperation with the Royal Thai Police, IB Consultancy gathered international experts, regional civil and military stakeholders, as well as leading companies providing C-IED and EOD solutions in the bubbly capital of Thailand. The event opened with a live demonstration of the Royal Thai Police’s C-IED capabilities. The setting included an IED placed in the parking lot of the St Regis Hotel, a classic realistic scenario for which Bangkok first responders prepare themselves every day. On the second day, the conference was opened by the Secretary General of the Cambodian Mine Action Authority and Advisor to the Cambodian Prime Minister, His Excellency Chum Bun Rong. Followed by highly interesting insights into new approaches and trends in the field of C-IED and EOD by speakers such as Pol. Colonel Kamthorn Auicharoen, from the Royal Thai Police’s EOD Team, and Lt Col Nabin Silwal from the Nepalese Army, the first day of the conference provided a broad basis for the in-depth analyses which were to follow. The third day featured interactive workshops and presentations on C-IED intelligence, forensics and analysis, including high-level speakers such as KhunYing Porntip Rojanasunan – in Thailand a star of criminal investigations and forensics. First responders such as Superintendent Jimmy Yuen, from the Hong Kong Police, presented new solutions for C-IED response while EOD experts from regional Mine Action Centers and humanitarian organisations stressed again the relevance of demining and land release for public security and development in the region.

14 | Asia Pacific Security Magazine

NCT eXplosive Asia 2014 To maintain the momentum, IB Consultancy is organising the successor event NCT eXplosive Asia 2014 – from May 6 to 8, in Siem Reap, Cambodia. Being organised in official cooperation with the Cambodian Mine Action and Victim Assistance Authority, the third edition of Asia’s leading C-IED and EOD event will include a live C-IED and EOD demonstration. Its aim is to deepen lessons learned from the previous editions held in Mumbai (2012) and Bangkok (2013), exchange best practices and continue to raise awareness of this ongoing threat.


Cyber Security

On the couch with... Asia Pacific Security Magazine’s Director, David Matrai, conducted exclusive interviews with representatives from the world’s leading IT companies: Schneider Electric, Cisco, Trend Micro and Intel. You can watch these interviews at mysecurity.com.au/tv

Philippe Arsonneau - SCHNEIDER ELECTRIC Senior Vice President, Asia Pacific and Japan IT Business Unit. The energy consumer sector and the relationship to the IT sector...

Dave West - CISCO SYSTEMS Chief Technology Officer, Asia Pacific, Japan and China, Systems Engineering and Architectures. How has business to business collaboration changed?...

Richard Sheng - TREND MIRCO Senior Director, Enterprize Marketing Asia Pacific. Give us a brief introduction to Trend Micro...

Balaji Srinivasan - INTEL Business Development Manager, CISCO Account Manager. How has business to business collaboration changed?...

Asia Pacific Security Magazine | 15


Cyber Security

Cyber Security: Skilled professionals required

C

omputer hacking has been around for as long as computers communicated with each other. Some would argue it has been around as long as computers have existed. For a long while hacking was simply a challenge. The competitors ranging from thrill seeking high school kids to academics trying to prove a point. In those days, security was an issue, however, computer systems could be kept safe as long as the IT staff knew their job and were allowed to do their job. The world came to use computers everywhere under the impression that they were relatively safe. Fast forward to today, and things have changed drastically. Cyber crime is professional and no system is safe. Some are safer than others but everything is vulnerable to some extent. For the first time in the history of humanity, the tools required to drastically impact a large commercial organisation or a Government, are freely available. In the past, cutting edge technology has been the privilege of Governments and possibly very large companies due to the tremendous cost and restrictions in availability. For example, weapons grade uranium is thankfully unattainable to the average person. However, the tools for causing harm via cyber crime are, quite literally, freely and easily available. If a person does not know how to effectively use these tools then they can contract others to do the job for them at a relatively low cost. The greatest irony is that intrusion costs less than prevention! Espionage, both industrial and Government, is now almost exclusively done via cyber crime. Companies can now go to war with each other wielding weapons such as denial of service attacks as a means of disrupting their competition’s business. What started as identity and credit card theft aimed at individuals, has mushroomed into full

16 | Asia Pacific Security Magazine

scale war between companies and Governments. An entire black industry has silently grown into existence world-wide. Internet based technology has exploded. No organisation, be it Government or commercial, can operate without being plugged into the internet. The reality is that today, almost all infrastructure, whether civilian or military, is connected to the Internet and this unfortunately leaves it open to attack. The need to have effective cyber security was highlighted in a quote by US Admiral Jonathan Greenert, the Chief of Naval Operations. “The level of investment that we put into cyber in the department is as protected or as focused as it would be in strategic nuclear,” Greenert says in an interview in Singapore, just before the start of the three-day Reuters Cybersecurity Summit in Washington (link.reuters.com/ dam97t). “It’s right up there, in the one-two area, above all other programmes.” But it is not just the military that understands the need for cyber security. The corporate world is heavily dependent on Smartphones and other wireless technology. At the same time, the level of sophistication employed by cyber criminals is rising dramatically. Firmware based malware that is operating system independent, is on the rise. Fragmented attacks where malware is progressively downloaded over a period of weeks to avoid detection, is another example. The tools for detection are also improving but they lag behind the attack mechanisms. There is an emerging need for skilled people to man the defences of every Government and company on the planet. These people have to have deep knowledge of computer communication, operating systems and computer languages in order to know what to look for and how to stop it. In the early days the game was about preventing attacks. Today, it’s still about prevention but it’s also about managing


Cyber Security

and minimising the impact of an attack. It’s about the knowledge that an attack has occurred, what happened and how to prevent it happening again. There is also the problem of persuading companies and Governments that the costs involved in protecting themselves is money well spent. IT generally, and IT security especially are looked on as a burden. Money is spent reluctantly because the perception is that it isn’t contributing to a company’s bottom line. This problem is compounded when the money is spent inappropriately. For example, companies often spend large amounts of money on intrusion detection/protection software, but then fail to support that with the trained staff required to properly configure and monitor the software. The biggest problem is that if the money is well spent, there is no obvious indication to management that it’s working. Hackers intrude silently and discretely, companies tend to conceal the knowledge that they have been attacked. A good analogy is spending money to ensure the electrical wiring in a building is safe and secure. If the money is well spent then nothing happens. On the other hand, if corners are cut, people could be electrocuted or the entire building could burn to the ground. Where the analogy breaks down is that the owner of the building could not conceal the tragedy, however, companies often do conceal the fact that they have been successfully attacked. This leads the corporate world to feel that the issue of computer security is a non-event that isn’t really a significant problem. Finally, there is a skills issue across the whole of ICT. Traditionally, computer security was the domain of the IT support people. Software developers didn’t need to know, neither did the company policy makers. Today, everyone needs an awareness. Software developers need to ensure their applications are as safe as possible. They need to be aware of their legal responsibilities in this regard and they need to be up-to-date with whatever software development infrastructure they are employing. An organisation’s computer security is too significant to simply be something the IT guys do as an extra part of their duties. It requires a dedicated team of people supported by management. They need to have input on business processes, physical plant and office spaces for the organisation. Policy people need to talk to them to understand the policies required to prevent or minimise the impact of an attack. The selection of software (either off the shelf or custom built) must now consider security issues, in addition to whatever functionality is required. Overall, we are in a world where every organisation, both corporate and Government, needs to be plugged into the internet; is totally dependant upon ICT for their daily operations; does not appreciate the significance of the problem; and is reluctant to spend serious money on computer security. Ultimately, there will be no choice and so the demand for skilled computer security professionals will increase. At the same time, any improvements in the tools used by these people will decrease the costs involved by preventing more sophisticated attacks and also easing the workload of the security people involved. The Department of Computing at Curtin University is addressing the problem on two fronts. Firstly, they have

introduced a Graduate Diploma in Computer Security. This is a one-year, full-time course aimed at taking in students, who already have a computing degree and some experience under their belts, and skilling them in a variety of issues ranging from assessing the needs of an organisation to detecting and managing an attack. Related issues such as the impact of cloud technology are also taught. From a research perspective, the department has a long history in the area of pattern recognition and is developing better techniques aimed at providing security professionals with a higher level of assistance in recognising suspicious activity.

For more information

Watch the 2 minute video with Mihai Lazarescu, Associate Professor, Head of Department of Computing, Curtin University, as he tells you what you need to know about cyber security.

Asia Pacific Security Magazine | 17


Feature Article

Space to the subsea - emergence of agnostic integrated systems

During September 2013, Executive Editor, Chris Cubbage, visited global security giant Lockheed Martin’s facilities across the USA for briefings on its business activities in the space, aerospace, maritime, cyber intelligence and defence domains. Special thanks to Trevor Thomas and Lockheed Martin International for the privilege. Here is Part 1: An insight into the business of Lockheed Martin International.

By

Chris Cubbage Executive Editor

18 | Asia Pacific Security Magazine

Business overview

L

ockheed Martin International (LMI) is a leading, global security solutions company with a vast security and defence portfolio. At the forefront of a defence powerhouse and the largest contractor to the United States Military, with 2012 revenues at USD$47 billion, Rick Kirkland, Vice President (VP), Business Development for LMI in Washington DC, outlined the key driver for the business has been the significant shift in global defence spending, with a clear migration to a security solutions focus. Spending is down in the US and Europe, remains stable in the Asia Pacific and is trending upwards in Africa and the Middle East. Not surprisingly, China and Russia are not on the client list but LMI is active

with immediate US allies, in Canada, Australia, Singapore, Philippines, Japan and Korea. LMI’s relationships and businesses are broad, topped by the multi-billion dollar rollout plan for the F-35 Joint Strike Fighter, preparing to launch the latest GPS III Satellite in 2014, signing a USD$223 million deal in April 2013, with South Korea for high-end imagery sensors, and opening its fourth Security Intelligence Centre in Canberra, Australia, in early October 2013. The ‘international’ focus of the business didn’t occur until July 2013, but was a natural, if not surprisingly, late transition. With 350 supplier and contractor partnerships around the world, they’re working on more than 3,000 programs, collectively worth more than US$30 billion. The key take away is that LMI is not just an aerospace manufacturer. It is also the largest IT provider to the US


Feature Article

Lockheed Martin F-35A

Lockheed Martin F-35A Performs First Night Flight

High Altitude Long Endurance – Demonstrator (HALE-D)

Juno Assembly in High Bay Clean Room

F-35B first test flight

Government and writes more lines of code per day than Microsoft. With 27 offices world-wide, 116,000 employees, 60,000 scientists, 500+ facilities in 70 countries, the company has an education program from kindergarten through to Doctorates. Just a few weeks prior to the US Government shut down on October 1 2013, Greg Walters, VP Legislative Affairs, provided insight into the US Congressional Engagement Process. With 94 percent of LMI’s business with the US Government and only five percent with Foreign Governments, LMI has 24 lobbyists working with 88 select US Congress committees and will generally be called to appear before all of them at some point during budget deliberations. The process is heavily bureaucratic and involves budget resolution, with sequestration a critical budgetary

issue. Any budget resolution is followed by an Authorisation Process and then an Appropriations Committee. At the time, congressional priorities LMI faced were with difficulties around undecided defence plan rationality, lack of investment commitments and resulting issues for recruitment, project planning and delivery projections. Sequestration in the US came into effect in May 2013, and requires defence, along with all sectors of Government to cut spending by ten percent per annum for the next ten years. With a US$500 billion defence budget, that’s US$50 billion to cut. By the time the 2014-2015 financial year rolls around, it will most definitely start to have an impact on LMI and other major defence contractors. Ultimately, it will result in program and personnel cuts. Programs could be cut between 10-15 percent and the worst case is an impact on

Asia Pacific Security Magazine | 19


Feature Article

UK F35 Delivery Ceremony Communications satellite delivery to Cape Canaveral Air Force

the F35 related programs. There reportedly remains strong Congressional support for the F35 project with Senators Dr Ash Carter and Frank Kendall, suggesting the F35 will be protected, however, some committees are raising concerns around the software block delivery. LMI staff numbers have already been reduced from 147,000 down to 116,000. On the radar for the company’s leaders is the progressing Iranian nuclear program, Middle Eastern and North Africa conflicts, more than 30 active campaigns attacking its cyber networks and the ongoing, ominous threat of sequestration and securing a minimum funding arrangement. Trouble for LMI is that if sequestration continues, then it may take until the next administration to solve – and that’s three years away. As it happened, LMI warned earlier this year (2013) that automatic spending cuts, included in the sequester, would cost the firm about $825 million. But Chief Financial Officer Bruce Tanner, informed media in October 2013, post the Government shutdown, that the impact was about half that. The Government shutdown, which was not included in the company’s earnings report, cost LMI between $15 million to $20 million per week.

Space Systems Company In mid-September 2013, fresh from having returned to Santa Clara, California, from the World Satellite Business Conference in Paris, Linda Reiners, President of Commercial Ventures for LMI’s Space Systems Company, proudly provided an overview of some of the most exciting and challenging technology in use today. Special developments are being made in nano technologies, optics and electrooptics, telecommunications, modelling and simulation, phenomenology, precision pointing and control and materials development (3D printing). Nano technology (carbon nano tubes used for circuits) provides plastics to replace metal and applying 3D imaging

20 | Asia Pacific Security Magazine

using laser technology. With all that technology in mind, LMI’s Space System’s business units are categorised into Civil Space, Military Space, Subsidiaries, Commercial Ventures, Advanced Technology and Special Programs. Whilst in Paris, Reiners announced technical updates to the A2100 Satellite addressing design architecture and manufacturing processes, offering satellite operators catalogue-to-order solutions that leverage common parts, sub-systems and components to meet specific customer and mission needs. Standard interfaces across LMI’s satellite programs now streamline spacecraft integration and minimise non-recurring engineering costs. There are already 45 A2100 spacecraft in orbit, including 39 commercial satellites and six satellites performing US Government missions. The fleet is equipped with more than 1,500 transponders transmitting data, video and audio for satellite operators world-wide. The satellite platform meets a wide variety of telecommunications needs, including Ka-band broadband and broadcast services, fixed satellite services in C-band, Ku-band and X-band, high-power direct broadcast services using Kuband mobile and satellite services using EHF, UHF, L-band, and S-band payloads. Major mission areas include remote sensing, communications, wind energy and new ventures. The oldest satellite is 17 years in orbit and the 7th generation 3-axis A2100 satellite will have a 1.1million optic camera – capable of seeing 1,000 kilometres with resolution to 0.5 metres. The International Space Station is under 400 kilometres from earth. That’s a capability to read this magazine on the ground from an outer low earth orbit. LMI is clearly out to make space equipment, travel and related research cheaper, easier to access and gain benefit from. When asked if Moore’s Law applies in this field, Reiners replied, “It applies more to capabilities. Instead, when improvements in technology occurs, it tends to be revolutionary.” One example is changing from tin to copper in satellites, where pure tin products developed tin whiskers causing reliability problems in electronics. The Galaxy IV telecommunications satellite was disabled and lost in 1998, due to related short circuits. Using copper revolutionised satellite technologies making them inherently more reliable and safer. There are also ‘so-called’ HAG (Hairy Audacious Goals) concepts, where special projects and researchers do truly reach for the stars. But LMI remains a commercial enterprise, with some project plans out to ten and 20 years and a revised, post GFC business focus of driving costs down, seeking commonality and scalability, whilst also introducing efficiency and affordability. Major developments into the future, with the odd HAG included industrial 3D printing of parts and ultimately sending ships into space with 3D printing capabilities to produce spare parts and indeed, other space vessels. Having been involved in every mission to Mars to-date and amassing 1,000 years of orbit experience, LMI is a key commercial leader in space exploration and the future is almost foreseeable. Part 2 will provide briefings on LMI’s Strategic and Missile Defence, Solar Science, Information Systems and Global Solutions and Unmanned Aerial Systems, and will be published in the Feb/Mar 2014 issue of Australian Security Magazine.


International

The changing drivers of US military spending Despite looming threats of fiscal austerity and budget cuts, the US military expenditure is not expected to decline rapidly. Although the country reduced its Overseas Contingency Operations (OCO) expenditure post decade long wars in Iraq and Afghanistan, its base defence budget increased due to continuous investment in development and acquisition of advanced equipment. By

Berenice Baker

A

sia’s rising military power and turbulence in Middle East to drive American military expenditure in next five years

The growing military might of China and strained relationship with North Korea have stimulated the US Government to shift its strategic focus towards the AsiaPacific region. The ongoing civil war in Syria along with the turmoil in Egypt and other Middle Eastern and African nations are also being closely watched by the US. In 2013, the country allocated an average of 3.5 percent of its Gross Domestic Product (GDP) towards military expenditure. Maintaining superiority of strike power and technology to drive military investments during the next decade Increasing threats from Russia and China’s aggressive development of defence equipment, such as fifth generation fighter planes, are driving the US’s expenditure on military aircraft. China has developed the Chengdu J-20 multi role aircraft that is similar in stealth features and design to the Russian MiG 1.42. In order to retain the supremacy of its air force, the US is investing in the Joint Strike Fighter ( JSF) program, with a plan to procure close to 2,500 multirole aircraft through 2037. Significance of Information Technology (IT) in the defence sector is growing, as the US armed forces rely on technological superiority while executing various missions. As the world’s largest defence

spender, the US is also expected to make significant investments in information management up to 2023. In addition, an increasing number of cyber-attacks, the focus towards the networking of armed forces units, the WikiLeaks incident, the recent digital infiltration of the RQ170 Sentinel drone by Iran, and the ongoing rivalry with Russia and China have resulted in a strong demand for cyber defence in the US. The US, world’s largest arms exporter, imports defence equipment to build strategic relations The country is the world’s top defence exporter with a share of more than 30 percent of total arms transfers during the period 2008-2012. Although, the defence industry is well established in the US, it imports arms from other countries to build and maintain strategic relations and technical collaboration. European nations such as the UK, Germany, Norway, Switzerland, Italy, France, and Spain have contributed for more than two thirds of the country’s defence imports during this period. Although the US Government encourages foreign direct investment in the defence sector, arms trade is heavily regulated. Acquiring domestic defence companies, joint arms development programs, and partnerships with domestic companies are the preferred entry routes for a foreign arms supplier. About the Writer Berenice Baker is Head Defence Editor at Strategic Defence Intelligence. Strategic Defence Intelligence is a real-time business information platform delivering continuously updated customer and competitor intelligence, as well as detailed industry insight and forecast reports on the global defence industry.

Asia Pacific Security Magazine | 21


International

To spend, or not to spend India’s defence budget is predicted to triple in the next decade from the US$50 billion already spent in the past decade, but does the Indian Government really have its finger on its military pulse?

I By Sarosh Bana Correspondent

22 | Asia Pacific Security Magazine

ndia, with the world’s second largest standing army, of 1.13 million, after China’s 1.48 million, has for some years been the world’s biggest purchaser of arms. The country has purchased arms worth US$50 billion in the past decade and is projected to spend triple this amount during the next decade. The average 40 to 45 percent of the defence budget – that was Rs2.04 trillion (US$33 billion) for 2013-1r – earmarked for capital acquisition and modernisation is largely expended on imports. Imports have been the mainstay of India’s defences, as the generous outlays have been incapable of fostering a credible Defence Industrial Base (DIB), or military industry. Defence production has largely been the purview of State-controlled enterprise that has fallen grossly short of meeting the needs of the armed forces. More than 70 percent of India’s military hardware is of foreign origin. During the last few years, the United States, as also Israel and France, have evolved as major armament suppliers to India, which until then had relied almost entirely on the erstwhile Soviet Union with which it had abiding ties bolstered by a convenient rupee-rouble trade link. It has been a vicious cycle. Over-dependence on imports has restrained development of a substantive DIB, while the shortcomings of the Defence Public Sector Undertakings (DPSUs) in indigenising warfare systems have ensured that India remains a purchaser rather than a builder in this field. Such drawbacks have led to failures, and prohibitive cost and time overruns, in the country’s ambitious programme for the indigenous design and production of military hardware. This has ranged from the construction of an aircraft carrier, a nuclear-powered submarine, combat and trainer aircraft, helicopter gunships, battlefield tanks and propulsion equipment. One of the big ticket defence deals signed by India in recent years has been the US$12 billion one last year with

France’s Dassault Aviation for 126 Rafale multi-role fighter aircraft, though the contract has been held up by a cost review. France also signed another deal in 2005, costing US$3.5 billion, for supplying six Scorpène class submarines. Other deals include the US$1.1 billion one with Israel in 2004, for three Phalcon AEW&C (airborne early warning and control) radar systems, a US$1.2 billion purchase, signed in 2008, from the US’s Lockheed Martin of six C-130J Super Hercules tactical airlifters, an expected follow on order of like number and cost, a US$2.1 billion deal in 2009 for the purchase of eight Boeing P-8I long-range maritime reconnaissance (LRMR) aircraft, and one more with Boeing for 10 C-17 Globemaster-III strategic airlift aircraft, topping US$5.8 billion if the ultimate deal is for 16. Washington itself has stopped purchase of these aircraft on costs – US$200 million each, without spares and training – but the deal with India saves 5,000 American jobs. While Indian industry is keen on participating in the defence field, it looks to foreign partnerships at this juncture to marshal the necessary capital, high-end technologies, quality production and management skills. But though India presents a lucrative market to military vendors, they have all along preferred outright sale over joint production on account of a deterrent FDI (foreign direct investment) policy. The Government recently raised the FDI limits in a dozen sectors, but Defence minister AK Antony, countered the Commerce ministry’s proposal to hike the FDI cap in defence from the current 26 percent to 49 percent, arguing that the sector was highly sensitive and strategic. Antony informed the Commerce ministry, “Allowing foreign companies to set up manufacturing assembly facilities here will be retrograde as it will stymie the growth of indigenous design and development, and perpetuate our dependence on foreign countries and OEMs [Original Equipment Manufacturers] for modern weapons.”


International

He specified, however, that any FDI proposal beyond 26 percent will be considered on a ‘case by case’ basis by the Cabinet Committee on Security depending on the technologies on offer. Many derided his stance on grounds that this ‘case by case’ review has for long been his ministry’s stated position without actually being implemented. Indeed, the Ministry of Defence (MoD) itself estimates that just Rs243.6 million (US$3.94 million) of FDI has flowed into the Defence sector in the 13 years between 2000 and 2013. It has no data regarding investments made by private Indian firms in the Defence sector, which was opened up 100 percent for India’s private sector in May 2001. Embarrassed by some high profile scandals that have bedevilled their ministry, Antony, his deputy minister, Jitendra Singh, and Defence secretary, RK Mathur, have been withholding public comments and did not respond to questions put to them for this article. Amber Dubey, Partner and Head of Aerospace and Defence, KPMG in India, finds security concerns on FDI in defence unjustified, because instead of importing complete equipment, it is always safer to manufacture parts of them in India through joint ventures ( JVs). He feels that though Indian companies are allowed 100 percent participation in defence programmes, they lack the capability to design, develop or manufacture advanced defence equipment within the stipulated timeframe. Relaxing the FDI limit will help forge strategic technology partnerships with global OEMs, he

avers, adding that, technically speaking, in terms of corporate control, 49 percent is the same as 26 percent. “No foreign OEM that has developed technologies over decades of work and billions of dollars will just transfer them to Indian companies for a measly 26 percent stake,” he says. “It may either decide to stay out of bidding, which may lead to Indian forces working with weaponry that is not first rate, or the technology that it passes on to Indian entities will always have hidden complexities that ensure technical dependence on the OEM.” KPMG deems a 74 percent stake attractive enough for foreign OEMs, while safeguarding Indian security concerns. The business consultancy suggests stipulation of 80 percent of the management and staff at the JV to be Indian, going up to 100 percent over five to eight years. “India’s automotive and telecom sectors are the best examples how liberalised FDI can transform the country’s capabilities,” says Dubey. “The arrival of foreign brands does not wipe out Indian companies, but actually strengthens them, and their employees move to Indian companies, carrying all their knowledge, experience and relationships to them and enhancing their competitiveness further.” Indicating that self-reliance cannot be equated with Indian ownership, he points out that even in ‘the Mecca of defence production’ – the United States – not all leading defence companies are owned by US citizens. According to Dubey, while the FDI cap is a hindrance, there is also need to remove the tax imbalances, cumbersome

“The price of the platforms will, of course, go up, but then India will be benefited by trained manpower and world class infrastructure.”

Smart Surveillance: Global PerSPectiveS 4-6 February 2014

Papers are being sought for the FP7 SMART Conference, which will examine Smart Surveillance issues. Held over three days and hosted by ECU, the conference will explore how automated recognition of individuals and/or pre-determined traits or risk factors/criteria lie at the basis of smart surveillance systems. Yet new EU regulations and specifically those on information sharing between police and security forces explicitly prohibit automated decision-taking regarding individuals unless “authorised by a law which also lays down measures to safeguard the data subject’s legitimate interests” (Art 7, CFD 2008/977/ JHA). These issues manifest in a world-wide context. Globally, which laws are applicable in this context? What measures are envisioned? What else should the law contain? Can the laws be technology-neutral but sector specific, thus permitting a measured approach to the appropriateness of smart surveillance technologies in key security applications? Can they be extended to all security applications of smart surveillance, even those not covered by existing legislation? Venue

Contact Details

Key Dates

Edith Cowan University 270 Joondalup Drive, Joondalup WA 6027 Tel: +61 8 6304 2160

Conference Coordinator – Lisa Pearson Tel: +61 8 6304 2160 E: fp7.messagestick@ecu-sri.org W: http://fp7.ecu-sri.org/

Paper Submission Deadline – 30 December 2013 Acceptance Notification – 10 January 2014 Camera Ready Papers – 14 January 2014

reachyourpotential.com.au reachyourpotential.com.au

Tel:Tel: +61134 8 6304 ECU 2160 (134 328) E: fp7.messagestick@ecu-sri.org E: futurestudy@ecu.edu.au

★★★★★ ★★★★★ TEACHING TEACHING QUALITY QUALITY ★★★★★ ★★★★★ GRADUATE GRADUATE SATISFACTION SATISFACTION the the Good Good universities universities Guide Guide 20142014

ECUSRI Edith Cowan University Security Research Institute

303LOWE ECU10559 CRICOS IPC 00279B

Asia Pacific Security Magazine | 23


International

China’s own rebalancing act The US is not the only global power rebalancing. China, the object of much discussion in relation to the US pivot, not least whether the ‘rebalancing’ of the Asia Pacific, is in fact, a latter day attempt by Washington at Chinese containment, has also been actively balancing the rest of the globe in its favour. By Jose KL Sousa Santos

24 | Asia Pacific Security Magazine

C

hina has long used the term ‘rebalancing’ largely referring to (although not exclusively) economic reforms. There lies the significance and global reach of China’s own rebalancing act as China’s economic and commercial interests square away Beijing’s influence in strategically important corners of Africa, Asia and the Pacific. Chinese moves in the region to secure sea lanes, oil blocks, potential mineral beds and maritime territories through proxies bring to mind a quasi-pincer movement which indirectly contains not only regional powers but has the potential to isolate and diminish the regional influence of traditional United States allies such as Australia, New Zealand and strategic partnerships with evolving friends such as Indonesia and Singapore from the US pivot. The Chinese approach is multi-pronged with diplomatic, economic and increasingly maritime fronts which may prove to divide and contain the Asia Pacific despite US late efforts towards rebalancing China’s balance of power in the region. In the 21st century, China’s global engagement has primarily been concerned with securing economic power and influence sans ideological overtones. Beijing’s approach is defined by the so-called ‘peaceful rise and peaceful development’ thesis as laid out in China’s 2005 White Paper in which foreign policy is driven by economic interests and the ‘pressure valve’ concept. Arguably, Beijing has achieved few actual foreign policy gains as a consequence but the language has considerable currency with the domestic polity. It also increasingly feeds into the politically manipulated ‘Chinese Dream’ notion where political reform was cleverly replaced with a progressively aspirational nationalism. Tensions in the South China Sea over the Spratley

Islands, for example, are founded on energy security concerns and the imperative to safeguard critical sea lines of communication (SLOC). Linked to this are military reforms and the expansive 2013 Defence White Paper which stated that its military is ‘commensurate with China’s international standing and [to] meet the needs of its security and development interests,’ and outlines the role the People’s Liberation Army will take in shaping a favourable security environment. Other sources of tension include along the Sino-Indian border (‘Line of Actual Control’ (LAC)), and the ‘nine-dashed line’ in the South China Sea which extends Chinese maritime claims well within the EEZ’s of Brunei and Malaysia. The exceptions are, of course, rooted in historical claims, the promulgation of nationalism, and labelled Beijing’s ‘core interests’: Taiwan and Tibet, and the Senkaku/Daioyu Islands dispute with Japan in the East China Sea. Beyond the region, China’s continual investment in Africa’s oil sector reflects a minimalist interest in good governance (hence the appeal of the Chinese deal) as long as domestic politics within African states do not interfere with China’s economic objectives. China is also securing new ports along the ‘String of Pearls’, a geopolitical term referring to a network of Chinese military and commercial facilities and relationships along its SLOC from the Chinese Mainland to Port Sudan. The securing of bases in Gwadar, Pakistan, Yemen, Somalia, Sri Lanka and through Southeast Asia has enabled China to expanding its influence and reach into the Indian Ocean. China’s ‘rebalancing’ of the globe to shore up and increase its economic sphere of influence is significant for two reasons. First, it has both direct and indirect consequences of


International

enclosing key regional players – namely the US and Australia – in a relationship that is both symbiotic and competitive and where Beijing and Chinese companies benefit from the peace dividend achieved by largely Western stabilisation efforts. In Afghanistan, Chinese companies are engaged in the development of immense natural resource wealth and similarly, in Timor Leste, Chinese investment arrived in the wake of the successes of the Australian-led International Stabilisation Force. Moreover, Chinese mediation of talks between the Myanmar Government and the Kachin Independence Organisation in February 2013, were notable because it marked the first time China contravened its foreign policy of non-interference and actively intervened in the internal affairs of another sovereign State. The motivations were less than altruistic but no less different from other interventions of late. Chinese intervention was driven by concern that the Kachin conflict was spilling over its border and impacting on ‘the security and profitability of Chinese investments’ and a desire to counter growing US influence in Burmese politics. Supporting – and underpinning – Chinese economic and commercial interests is Beijing’s swift and seductive engagement with regional militaries – often the smaller and weaker, the better. In the Asia Pacific, Chinese maritime overtures include seeking to build naval ports in the Gulf of Aden, Sri Lanka, and potentially Timor Leste, following the recent strengthening of naval ties between Dili and Beijing.

“It is a tough industry and I feel it can be seen as more of a challenge for females who want to enter the industry as some may feel they have to align with male traits to be accepted and promoted.” China’s ongoing Pacific partnerships with the Fijian military regime and through the Defence Cooperation Agreement with Vanuatu are likely to be mirrored across the region. But aside from the obvious strategic benefits of deep water ports and friends in small places, it is questionable what benefit these partnerships have for China, how sustainable the bilateral relationship will be beyond geo-strategic priorities, and what impact this will have on the weaker partner. Further, Beijing’s economic push is being challenged by non-state owned Chinese companies that are increasingly contesting the right to engage with foreign countries independent of Beijing’s foreign policy agenda. China’s semi-encirclement of Asia and the Pacific is a quasi-pincer manoeuvre. This notion has its roots in Aaron L. Friedberg’s argument which stated in 2003, that China

Training for a better future in...

Security at Brisbane Security Training Centre

Our highly respected industry specialists provide Security Operations training and advice to leading security businesses around the state. Let us help you secure the skills you need to become an effective security operator. Call Wide Bay Institute of TAFE’s Brisbane Security Training Centre on 3806 9633 for further information.

• • • •

Defensive Tactics Edged Weapons Introduction to Terrorism Private Investigator - Certificate III in Investigative Services (CPP30607) • Certificate IV in Security and Risk Management (CPP40707) • RPL available

1300 656 188

www.widebay.tafe.qld.gov.au 40 - 44 Johnson Road, Browns Plains, Queensland 4118

Asia Pacific Security Magazine | 25


Women in Security

The key to success: Just fall Ever wondered what it would be like to work for a large organisation that is leading the way in aerospace, defence, transport and security? Or what path you should take to get there? With world-class technologies and the combined expertise of 67,000 employees in 56 locally based country operations, it is no doubt that Thales is a key player in assuring the security of citizens, infrastructure and nations. Kema Rajandran talked to four women from Thales Australia to find out more about how they came to work in this incredible empire.

Diane Smith

Jeannette Jackson

H By Kema Rajandran Correspondent

26 | Asia Pacific Security Magazine

Chantelle Miruzzi

aving previously worked for defence engineering companies in numerous roles, many would think that it was natural that Jeanette Jackson followed a path to security, but she says it was completely by chance that she fell into a security role. “In my previous role at Thales as Commercial Manager, I volunteered to take on the duties of Assistant Security Officer [ASO] for my business unit. As the ASO, I was exposed to a side of the business that I had not been involved in before.” As time went on, Jeannette learned more in her role, her interest in security started to build and she began seeking more challenges. As one of the largest defence companies in Australia, Jeannette says the diverse range of projects Thales offers was very appealing to her. “A permanent corporate security role became available and I was lucky enough to get it.” Jeannette wasn’t the only one that fell into security. Marie-Antoinette Houssard, Thales Maritime and Aerospace Security Officer says she too fell into security purely by chance.

Marie-Antoinette Houssard

“I was raised in New Caledonia as the fourth generation of hotel owners, so my training was in hotel and restaurant management,” says Marie-Antoinette. “All changed when I moved to Australia. I owned the Adelaide Wine Cellar in George Street, Sydney, for four years, which I then sold. I worked for American Express for ten years, and when I left did catering from home and temp work for Drake before applying to ADI. “The rest is history!” Chantelle Miruzzi, based at the Department of Defence establishment in New South Wales, liaising between Thales Defence units and base security says her move, like Jeannette’s and Marie-Antoinette’s was purely by chance too. “I have always enjoyed roles that let me interact with people, especially focusing on customer service and problem solving,” says Chantelle. “When I was looking at changing jobs, I wanted something that was in my local area, but also a bit different to my previous roles. “I was looking for a new and challenging role. Thales is a large company, which had room for my growth, development


Women in Security

and career movement. I was also aware that Thales is very encouraging in supporting the training and development of its staff.” So far, three out for four women have simply just fallen into security. So how do you think final interviewee Diane Smith, in Business Operations at Thales, came into her role? A career planned out from high school to university and so on? No, she too, fell into it. “I didn’t leave my previous role with any intention of working in the security field. I definitely fell into security, but I’m very glad I did,” says Diane. “I previously worked for Thales in a different field and enjoyed the experience. The new position here sounded really interesting and ticked all the boxes for me, so I thought I’d give it a try.” By now you might be thinking that it’s easy to weave your way into a large organisation and into a great role by simply waiting around to ‘fall into it’ like these four women. But you should note that while these women say they ‘fell into it’ they also brought with them experience and skills that were valuable to their current positions. Diane previously worked as a project manager for Boeing on defence contracts. “That gave me a good grounding with security both at the corporate and defence levels.” And it wasn’t all luck for Jeannette as she had said earlier. She brought with her experience in contract management and negotiation and strong organisational and communication skills that have proved invaluable to her current position as Security Operation Manager. Marie-Antoinette gives credit to her experience in the hotel industry saying meeting a cross-section of people was helpful to her in changing her career along with continuous study. “My development in human skills and management has been of great assistance, and obtaining my Diploma in Security and Risk Management was also an asset to my position.” Being a person who has been quite strategic with my career opportunities, I usually pursue roles according to the skills I will learn and the path it would potentially lay out for me as well as the enjoyment of the duties listed so I was curious to know what happens when you simply do leave it to chance and fall into something you hadn’t planned or considered before. The response I got was a resounding, I love what I do. “I love working in a corporate role as it gives me the chance to work across all business units within the company – I get to meet people who work in all aspects of our business across all our sites,” says Jeannette. Apart from enjoying working with a fun, highly skilled team, Jeannette thoroughly enjoys the enormous variety and challenges that her work offers. “We cover everything from armaments and protected vehicles to air traffic management and communication systems, plus many other aspects of defence contracting such as sonar and ship maintenance. “I have the opportunity to work on projects that are of major importance to the security and wellbeing of our country, and in particular for our armed forces. It is very

“I get to work with people all the time and know that I am helping to keep them safe, as well as the company. And I’m part of a project that is directly responsible for keeping our soldiers alive on operations – it doesn’t get much more satisfying than that.” rewarding knowing the work we do saves lives. “Employee development and training has come a long way since I first started working, and this is one area that Thales excels at.” She explains that Thales has an extensive in-house training organisation that offers employees numerous courses to up-skill, develop, and grow in their role. “Thales also has a set cycle of personal development activity discussions throughout the year, which encourages managers and employees to evaluate, reflect on and set an employee’s objectives and goals. “This gives employees the opportunity to develop their career path. In fact, I actively used this process to inform management about my growing interest in the security space, which ultimately led to my current role.” Career in security rewarding? Tick. “It’s definitely a feel-good job,” comments Diane. “I’ve only been in this job with Thales since March 2013, so I don’t have a lot of memories to share yet from my security role. The one thing I will remember about my role here is that I feel like I’ve been part of something important. “I get to work with people all the time and know that I am helping to keep them safe, as well as the company. And I’m part of a project that is directly responsible for keeping our soldiers alive on operations – it doesn’t get much more satisfying than that.” Career in security gives a sense of value? Tick. “In all honesty, I love my job,” adds Chantelle. “I get to meet different people each day, and there is generally always something happening on base. “I enjoy working closely with Defence, building relationships and being able to assist the individual units on site with security and access control issues. “I also get to travel to our depots throughout Australia, being able to meet the people and see the different facilities that are a part of Thales. “I have been involved in the security of a number of projects on base. There are always funny moments, such as listening to the project manager telling the team [Kangaroo Musters] saying they are not cows and don’t respond well to people clapping at them.” Career in security gives enjoyment? Tick. “The industry has evolved over the years, which makes the work much more interesting and challenging,” says Marie-Antoinette. “No day is alike. I also love dealing with the variety of people and cultures, which is rewarding. ““Defence has improved the Security Officer training and

Asia Pacific Security Magazine | 27


Women CCTV in Security

Analytical technologies for a superhuman command and control Gone are the days of a security officer just sitting and watching a few security monitors. In today’s modern world of CCTV, analytical technologies have made it possible for humans to become superhumans. By

Anthony Caputo

28 | Asia Pacific Security Magazine

T

raditional security command centres included multiple closed circuit television (CCTV) monitors that provided centralised surveillance technology, giving security operators the ability to expand their limited physical area-of-coverage. Thus, instead of patrolling a select location, a security operator can now split their attention to multiple locations, panning back and forth from different areas-of-interest from the comfort of a chair. They can use their keen eye on a wider scale, but at the cost of a more fragmented approach. Active surveillance works better when there’s little activity, but a crowded venue or CCTV monitor creates natural blindness, we are only capturing snapshots in time of the activity. We are only human. Analytical technologies have made it possible to become superhuman. The linear experience made it somewhat less complex and so, all we needed to do was sit back and watch. As an entertainment venue, television delivered information, but there was no interaction. The television changed society by informing the world what was going on around them and world-wide. Just as society became smarter with the information provided by television, security personal became smarter with CCTV.

Monitoring and security professionals are trained to be alert, observant and smart because monitoring security cameras is not linear, but the beginning of our new interactive media world. When a security professional observed or was radioed suspicious activity, they would need to evaluate and respond immediately, based on their experience and training and internal security policies and procedures for risk assessment, criticality and effectiveness. However, there was always an inherent inefficiency in ‘human eye’ surveillance of multiple monitors presenting linear video, because of human nature. We can be easily distracted because we are not wired to absorb every single detail from a linear video presented to us, and studies show that the effectiveness of an operator monitoring two security cameras drops 95 percent in about 22 plus minutes. This is due to a number of issues from environmental ergonomics to behavioral; being bombarded by information overload. Many of the command and control centers I’ve seen (from homeland security to schools, to major corporations and transportation hubs), include multiple video walls, multiple workstations with multiple monitors, multiple televisions playing 24 hour news (still informing us), all


Women in Security

Asia Pacific Security Magazine | 29


Special Feature - Cyber Security Available online! See our website for details

1 YEAR SUBSCRIPTION TO THE AUSTRALIAN SECURITY MAGAZINE

6 print issues per year for only $88.00 SUBSCRIBE TODAY... DON’T MISS AN ISSUE Yes! I wish to subscribe to the Australian Security Magazine, 6 issues (1 year). ☐ ☐

AUSTRALIA INTERNATIONAL

A$ A$

88.00

(inc GST)

1 YEAR

158.00

(inc GST)

1 YEAR

Yes! As an additional bonus I wish to receive direct to my inbox the Asia Pacific Security Magazine (emag), 6 issues (1 year).

No business or government organisation survives in a vacuum. Sharing knowledge is fundamental to the development of successful security planning and implementation. That is the role of our magazine: sharing knowledge of developments in security management for public and private sector organisations, both for internal management and for external obligations in public safety and security.

MY DETAILS

PAYMENT

Salutation: __________First Name: __________________________________________

Please find enclosed my cheque/postal order (made payable to MySecurity Media )

Surname:______________________________________________________________

for $ __________________ or debit my:

Job Title: ______________________________________________________________ Company: _____________________________________________________________ Postal Address:__________________________________________________________ Suburb: _____________________State: _________ Postcode: ____________________ Country: ______________________________________________________________ Email: ________________________________________________________________

Card Holders Name: __________________________________________ Signature: _________________________________________________

Interested in our e-news service? Phone: +61 (8) 6465 4732 during business hours AWST (Australia Only)

Expiry Date:________________ Todays Date: ______________________

PRIORITY FAX Credit Card Details Australia +61 (8) 9467 9155

FREE POST My Security Media 286 Alexander Drive, Dianella. W.A. 6059

Email subscriptions@mysecurity.com.au

GST This document will become a TAX INVOICE for GST when payment is made. My Security Media Pty Ltd ABN 54 145 849 056


To have your company news or latest products featured in our TechTime section, please email promoteme@australiansecuritymagazine.com.au

New generation Network Video Recorder See page 52

Latest News and Products


TechTime - latest news and products

Australian College deploys heritage friendly security solution St Paul’s College in Sydney, Australia, is an all-male Anglican residential college and affiliated with the University of Sydney. The buildings at St Paul’s College date from the late 1850s up through to those constructed in the 1960s, 1970s and 1990s. There had been many changes to the locking installations during the years, meaning the college had ongoing problems with students losing keys, giving them the expense of having to replace locks and keys on a regular basis. Recognising that effective protection against such risks would require an extensive overhaul of their security equipment and procedures, the College decided the answer was to remove mechanical cylinders and keys from their buildings and replace them with a modern electronic access control system. Choosing a solution Derek Watt, Executive Manager at St Paul’s College explains, “When I first met David Rees of SALTO Systems at a conference, I told him about our challenge of wanting to upgrade security but that we needed something suitable for our heritage doors dating from 1858. At that time his response was, ‘I can’t help yet, but we are about to launch a product that is exactly what you want’.” That product was the SALTO GEO (Global Electronic Opening) cylinder.

Deployment With a decision made and a contract awarded,

Installation was straightforward, with no unforeseen surprises that can sometimes

SALTO partner WF O’Brien Pty Ltd, one of Sydney’s leading door and access control specialists, began the job of removing the 200 plus mechanical cylinders from across the College site and replacing them with GEO RIM cylinders, which are designed to fit most doors that are equipped with surface mounted lock cases. Chris Drake of WF O’Brien’s says, “David Rees and I had looked carefully at the layout of the College and noted the position and condition of the various doors to make sure we fully understood what the customer wanted, and then planned the rolling replacement of the locks in a structured manner.

occur when working with older doors and properties. Now the College operates an easy to use, proven, future proof access control security solution that provides 24/7 critical security protection. The end result is a solution that the customer loves, the students find easy to use and that the heritage architect is very happy with.” Due to the installation of its SALTO GEO system, St Paul’s College in Sydney now has a reliable and effective solution for ensuring security across its campus.

IndigoVision reduces Randon Group’s security operation costs by 20 percent With more than 11,000 employees and nearly $2 billion in revenue, the Brazilian transport manufacturer Randon Group, has selected IndigoVision to provide an IP video security solution for its assembly plant in Guaralhos, with plans for future expansion to all locations. The security project requirements were reducing theft, providing real time monitoring from multiple, remote security workstations and increasing operational efficiency. The project also required reusing existing security camera hardware as well as offering the latest IP camera technology with the ability to scale to meet future expansion requirements. The final goal is for all Randon locations world-wide to be monitored from a single security solution. Using IndigoVision’s video security solution, existing cameras were converted through IndigoVision’s IP encoder hardware, delivering

32 | Asia Pacific Security Magazine

benefits including dramatically improved recording quality. IndigoVision’s world-class video compression technology meant that video from existing cameras could be easily streamed to remote sites, which was impossible with the existing security system. In addition to using IndigoVision’s IP encoder hardware, IndigoVision’s IP cameras have been installed providing additional benefits that analogue cameras could not deliver, such as higher image resolution. All video from the IP encoders and cameras is stored on multiple IndigoVision Network Video Recorders (NVRs), with total system management provided by IndigoVision’s Control Centre software user interface. Having deployed IndigoVision’s solution, it is now possible for operators to monitor live video and playback recorded evidence from

the main Randon HQ, located more than 500 miles away. IndigoVision’s unique Distributed Network Architecture (DNA) removes the need for a central management server making future expansion for monitoring all of Randon’s sites incredibly easy. The project was installed by local Brazilian partner, Jetlink Comercio de Equipamentos, alongside security architect and consultant Villa Segura.

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media


TechTime - latest news and products

PNY case study Challenge A global technology leader within the consumer electronics market required an advanced HD surveillance system to protect inventory and employees inside their new 600,000 square foot state-of-the-art manufacturing facility and corporate headquarters. Solution PNY, a New Jersey based electronics manufacturer, uses 21 Avigilon HD cameras to help secure their corporate headquarters, which spans 38 acres with a 600,000 square foot manufacturing plant in Parsippany, New Jersey. Avigilon 5 MP cameras monitor various areas within PNY’s manufacturing warehouse including the company’s assembly areas, packaging lines and shipping. PNY deploys Avigilon 16 MP cameras to oversee activity outside of the building as well as the parking lots. The security team at PNY manages the system from their on-site security control centre using their individual desktops and four wall-mounted monitors using the Avigilon Control Centre network video management software (NVMS) with High-Definition Stream Management™ (HDSM) technology. They also use ACC Mobile to view live and recorded images remotely and Avigilon Network Video Recorders (NVRs) to store up to 30 days of continuous surveillance footage. PNY uses Avigilon encoders to support existing hardware. Benefits With the Avigilon system, PNY can protect and monitor valuable, computer products such as flash memory cards, USB flash drives, HDMI cables and mobile accessories that are produced from their corporate headquarters. Avigilon HD cameras also observe shipment trucks as well as the foot traffic from neighbouring businesses. The Adaptive IR feature on 5 MP H.264 Dome cameras enables the security team to keep an eye on suspicious activity that may occur in the dark and provide clarity on faces and movements. The ACC software allows PNY to accurately identify and resolve incidents – such as theft or accidents – in a timely manner and use the recorded footage as a learning tool to improve business and safety protocols. PNY security officials leverage ACC Mobile to watch over the premise and inside the warehouse on off-hours and weekends. Improve business operations From evaluating production on the assembly

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media

lines to assessing employee efficiency, the Avigilon system has been beneficial from a business operations standpoint. “We have really been able to use the system as a learning tool and a way to improve some of our protocols,” says James Moretti, Security Manager at PNY. “Reviewing footage has been a way for us to identify patterns or employees’ daily habits. We can now adapt and adjust quickly if we see an area we need to improve in.”

to alarm calls on weekends. “Just yesterday, the fire department was dispatched to our headquarters,” he says. “We weren’t open for business, so I used it to monitor the fire department’s activity while I was on the phone with them until I could get someone to the site.” Featured Products

ACC Software User-friendly system With a dozen people, with various levels of experience, using the Avigilon system at PNY, having a simple interface was imperative. “The ACC software is really easy to learn and get new users quickly up to speed on,” says Moretti, who also stated that investigations that previously took days to resolve are now taking minutes because of the playback features. “It is allowing my office to do their work quicker, in more detail and less time. It’s definitely going to save us money in the long run.” Adding on cameras to the system has also been a simple process. “From the feedback that I’ve been getting on the IT side, is that it’s very simple and to install – it’s literally plug and play,” says Moretti. “If I have a project, it’s a matter of running a few wires. In a day – sometimes less than a day – I have my [surveillance] systems up, programmed and their updating themselves through the network.”

2 MP HD Dome Camera

5 MP HD Dome Camera

16 M HD Pro Camera

ACC Mobile

Analog Video Encoder

Remote access There have been several instances where ACC Mobile has been a convenient feature for Moretti, who periodically has to respond

Asia Pacific Security Magazine | 33


TechTime - latest news and products

Biometric ID helps New Guinea medical clinic manage records and services Fulcrum Biometrics, a leading international provider, distributor and integrator of biometric systems and devices, has developed and deployed a customised patient identification solution for the New Tribes Mission Medical Clinic in Papua New Guinea. The system, which is based on Fulcrum’s FbF® Demographica biometric identification application and customised with the FbF® modular development framework, uses an M-Series multispectral fingerprint reader from Lumidigm. The unique imaging capabilities of Lumidigm’s biometric sensors allow the clinic to accurately identify people who come into the clinic for healthcare services even if their fingerprints are worn or damaged – a common characteristic of the demographic. The New Tribes Mission (NTM) Medical Clinic serves a vital role in providing medical care and pharmacy services for several thousand local citizens as well as roughly a thousand missionaries and other expatriates living in Papua New Guinea. Using the modular Fulcrum Biometric Framework (FbF®), Fulcrum was able to quickly customise the FbF Demographica biometric identification system to provide NTM with a fast, accurate and easy way to register patients in the clinic and ensure that each individual’s medical records are always associated with his or her proper identity. The application is browserbased and operates on a standard desktop

PC running a Windows OS. The Lumidigm M-Series multispectral fingerprint reader is used for capturing and identifying fingerprints. Once a patient is enrolled in the system, on each subsequent visit to the clinic he or she can sign in by presenting four fingerprints to the scanner. Advantages of the Lumidigm M-Series Fingerprint Sensors: Because so many residents live and work in challenging physical conditions, their fingerprints can become damaged or worn over time. The Lumidigm device is particularly useful in scanning difficult-to-read fingerprints because it reads not only the surface print but also the subsurface print. “The fingerprint scanner has been a tremendous help in identifying patients,” says Dr Kevin Ludwig, Chief Medical Officer for the New Tribes Mission Medical Clinic. “Biometrics provides the best means of certain identification.”

who do not have the experience or the time required to learn the intricacies of developing biometric solutions. Supporting biometric hardware devices, creating reusable controls and implementing fast and accurate biometric server side systems can be a challenge for even experienced developers. For more information about the FbF line of development products and a wide range of other iris, fingerprint, palm print, face and voice biometric technologies email; info@fulcrumbiometrics.com For more information about Lumidigm solutions, visit www.lumidigm.com

Advantages of using the FbF framework: The Fulcrum Biometrics FbF framework is a rapid biometric application deployment system comprised of several reusable components that developers can quickly deploy in their environment. The FbF components are specially designed to remove all the complexity for developers who need to use high quality biometric identification and authentication but

Context presents dangerous side effects of new browser features Simlat UAS & ISR Training & Simulation systems will be part of the first UAV operator’s training program in Ontario, Canada, conducted by Canadore College. Curriculum design and training system recommendations were provided by ING Robotic Aviation. ING Robotic Aviation will also be providing instructors for the course. Yuval Peshin, CEO of Simlat, says, “We are proud to continue our collaboration with ING Robotic Aviation in this innovative UAS program for Canadore College, Canada, and to provide our various systems that are ideal for UAS Simulation, Training and Research. “Being at the leading edge of the field, we realise that we need to help foster the entire ecosystem, from systems to people,” says Ian

34 | Asia Pacific Security Magazine

Glenn, CEO and CTO of ING Robotic Aviation. “We have extensive experience in operations, and we know that we need both good systems and good people. Our use of Simlat systems at Canadore College is part of the solution.”

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media


TechTime - latest news and products

Restaurants turn to affordable cloud-based surveillance technology Genetec™, a leading provider of unified IP security solutions, has announced that its new cloud-based video monitoring service, Stratocast, is offering restaurants throughout North America an affordable way to help them safeguard their patrons and inventory. One early Canadian-based adopter is the China Rose restaurant, an award winning Asian cuisine establishment located in Calgary, Alberta. According to China Rose Owner and General Manager, Ken Wong, having a video surveillance system has always been a key operations requirement to help keep an eye on who is coming and going from the restaurant, to ensure the well-being of guests and staff, and maintain video records for incidents involving liability claims and inventory theft. Having previously installed an analog-based digital video recorder (DVR) in the restaurant, Wong encountered numerous limitations, including poor picture quality and difficultto-access video footage. So when he heard about Stratocast, a new cloud-based video surveillance system specifically designed for small to mid size businesses, Wong decided to try it out. A few weeks into the installation, China Rose is already seeing huge advantages to its cloud-based surveillance system compared to the older analog-based DVR system. “I was very impressed with Stratocast because it is all web-based and was so simple to learn. I can be

at home, in the office, or elsewhere and tap into the Stratocast viewing app from my smartphone to see what’s happening at the front desk or around the restaurant. With my old DVR, I could only review video while at the restaurant, and the system made it difficult to find what I was looking for without having to sift through hours of recorded footage. When we moved to Stratocast, it was also surprising to see the drastic improvement in the level of detail in the video. It has been really amazing to have such clear images at my disposal,” adds Wong. Since switching to a cloud-based solution, Wong has also been able to retain video recordings for longer periods. While his DVR would only allow him to keep about one week of

recordings, Stratocast now enables him to retain and quickly access up to four weeks of footage. Although the system is still fairly new, Wong has already become an advocate for cloudbased, hosted video surveillance in restaurants. “The system has been so easy to use, and its performance has been flawless, so I would definitely recommend Stratocast to other businesses, especially those upgrading from older DVR technology. The difference for us has been night and day.” For further information please visit www. stratocast.com

First military band type approval for GX terminals Inmarsat, the leading provider of global mobile satellite communications services, has announced that L-3 Global Communications Solutions (L-3 GCS), a specialist in the supply of deployable satellite communications solutions and turnkey systems, has received type approval from Inmarsat for its range of military Ka-band terminals, authorising their use over the Global Xpress (GX) network. This marks an important milestone in the development of GX, the first globally available high-speed broadband network, which is on schedule to achieve full global coverage by the end of 2014. L-3 GCS’ type approval covers its industry leading family of terminals, which are used extensively by military and other Government customers in the US and across the world. The specific devices covered by

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media

the Ka-band type approval announced are the Panther .6m, Hawkeye III Lite 1.2m, and Hawkeye III 1.6m, 2.0m and 2.4m terminals. Peter Hadinger, President of Inmarsat’s US Government Business Unit, says, “Global Xpress is powering ahead and is on course to achieve full global coverage by the close of 2014. Military customers in the US and other countries have shown significant interest in the capabilities of GX and so we are delighted that the first of many GX-capable military grade terminals are now type approved. This will now allow those Government users to augment their use of WGS and other national systems with our GX High Capacity Beams and the exact same SATCOM terminal. To have achieved this in less than 12 months, when L-3 GCS was appointed as a GX launch partner, is testament

to their commitment to Inmarsat’s gamechanging service.” “L-3 GCS is particularly honored to have been the first type approved terminal partner for Global Xpress. Having our military Kaband terminals type approved means our valued customers will now have access to the super-fast, on-demand, global coverage of the GX service with their current ARSTRAT certified terminals,” says Bill Harrington, Vice President of Engineering and L-3 lead for Inmarsat GX programs.

Asia Pacific Security Magazine | 35


TechTime - latest news and products

New network video recorder for retail security OvisLink Corporation, a professional and primary provider of networking and IP solutions, announces CoreNVR series which is a new generation Network Video Recorder for AirLive IP Surveillance Solution. The AirLive CoreNVR series offers 9 channel or 16 channel for various environment with easy to install and user friendly interface. It supports up to 3MP resolution and with HDMI video output to provide you high video quality on Full HD supported monitor, it also supports two way audio and H.264 video compression codec for better video quality and lower storage size. With two internal 3TB SATA HDD with eSATA interface, all video and data can be stored up to few weeks. Furthermore, the AirLive CoreNVR series also supports multiple event detection to protect your property, especially when motion detected, digital input triggered and HDD error causes unable to record video, all the events

can be triggered digital output, SMTP, FTP and OSD display, so you won’t missed any critical information from CoreNVR. You may also use Internet Explorer 7 for live viewing and fully control of CoreNVR, or live viewing via mobile devices which based on iOS or Android operating system. Key features: • Support up to 5M resolution • Up to 3MP Resolution for Storage and Motoring • H.264 Video Codec • HDMI/VGA Video Output • Auto Search and Insert AirLive IP Cameras • Up to 3TB x two internal HDD plus e-SATA for storage • Two-Way Audio • Joystick, Mouse controlling interface for PTZ Cameras

• • •

Event Alarm from Motion Detection, DI/DO, HDD Error Remote Viewing on IE and Campro Mobile Software ONVIF compliance.

For more information visit http://www.airlive.com/product/CoreNVR-9 http://www.airlive.com/product/CoreNVR-16

First FICAM-compliant solution for end-toend physical access control HID Global®, a worldwide leader in secure identity solutions, and Tyco Security Products, part of Tyco, the world’s largest pure-play fire protection and security company, has announced that the companies have joined forces to deliver the industry’s first fully FICAMcompliant solutions for end-to-end physical access control systems (PACS). The complete offering comprises each company’s federal identity solutions, providing added value through increased security, cost efficiencies and interoperability. The US General Services Administration (GSA) introduced the new FICAM testing requirements earlier this year as part of a realignment of its Approved Products List (APL) with the FICAM roadmap for standardisation and a consistent approach to deploying and managing appropriate identity assurance, credentialing, and access control services. The GSA test program included subjecting the system components to dozens of attacks to ensure that the system is not prone denial of service, credential spoofing, or other types of unauthorised access. The FICAM testing program ensures that products conform with existing APL approval procedures, and integrate other vendors’ products to create a complete end-to-end high assurance solution that Government agencies can procure. End-

36 | Asia Pacific Security Magazine

to-end systems are tested both as individual components as well as holistically to ensure that agencies meet all of the requirements in FIPS 201 and SP 800-116. “FICAM testing is by far the most comprehensive testing that we have seen,”states Bob Fontana, Vice President of Engineering, Federal Identity Solutions with HID Global. “HID Global is excited to be part of the first FICAM-compliant system approved by the GSA and available to the US Government. The Government has raised the bar in standardisation and HID Global has met this challenge, offering federal agencies improved security solutions.” The HID Global and Tyco Security Products PACS solution includes: HID Global’s pivCLASS® Registration Engine, pivCLASS Certificate Manager, pivCLASS Reader Services, pivCLASS Authentication Module (PAM), pivCLASS IDPublisher, and pivCLASS RK40/RKCL40 readers, as well as Tyco Security Products’Software House C•CURE 9000 v2.20 security and event management system. The pivCLASS Registration Engine seamlessly integrates with Tyco’s Software House C•CURE 9000 v2.20 for PIV and PIV-I card validation, provisioning, and deprovisioning when a certificate is no longer

valid. Credentials presented at the door are cryptographically challenged by the pivCLASS PAM. If the card is authentic and valid, the card identifier is passed to the Software House iSTAR controller, which performs the authorisation check before admitting the cardholder. A special messaging interface ensures that all invalid transactions are captured and forwarded to the C•CURE 9000 PACS event monitor. “The successful testing of Software House’s C•CURE 9000 for FICAM end-toend compliance, together with HID Global’s pivCLASS Government Solutions portfolio, assures US Federal agencies that they are procuring FICAM solutions that will meet all of the FIPS 201 processing standards,”says Stafford Mahfouz, Manager of Government Programs for Software House with Tyco Security Products. The companies’ solutions on are the GSA Approved Product Listing. For a list of FICAMapproved products, visit idmanagement.gov

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media


TechTime - latest news and products

F5 delivers most comprehensive DDoS protection yet F5 Networks has announced the industry’s most comprehensive on-premises DDoS solution available in a single product. The new solution delivers the widest ranging suite of protections against DDoS attacks that target business applications, the network, SSL, and DNS infrastructures. Fully leveraging the advanced hardware-acceleration capabilities built into the latest F5® BIG-IP® platform offerings, the new solution mitigates as many as 25 DDoS attack vectors in hardware to deliver superior performance and scalability. Now, customers of all sizes can ensure that their business critical applications are protected and available under the most demanding conditions.

The DDoS protection solution is one of several reference architectures connected to F5 Synthesis™, the company’s new architectural vision, F5 Synthesis comprises a catalog of software defined application services™ (SDAS™) and solutions that enable customers to deliver device, network, and application services without constraints across data centre, cloud, and hybrid environments. Supporting these services are multiple reference architectures that give customers prescriptive guidance on how best to implement F5 technology to address specific business challenges. Vice President of Security Product

Management at F5, Mark Vondemkamp, says, “Our new solution makes DDoS mitigation affordable for companies of any size. It delivers the most comprehensive DDoS protection suite of services in the marketplace, provides superior performance results across 25 hardware-accelerated attack vectors, and frees up resources that can be dedicated to providing other security services. Software-only solutions are an excellent choice for certain types of network needs, but when it comes to averting volumetric DDoS attacks, there’s no disputing the advantages of a hardwareaccelerated solution.”

LPG fuel cell powers remote instrumentation The ROAMIO ‘Performer’ P250i is a back-up power source for critical, remote applications. Employing solid oxide fuel cell technology this provides dependable, portable power using readily accessible fuel that takes you into the ‘wild’. It integrates seamlessly with grid, generator, battery, wind or solar power to deliver the assurance needed that critical applications will run, uninterrupted, when other power sources fail. These fuel cells are field-proven and work in blazing sun, rain, hot, cold, blowing sand, snow, or wind. The Performer P250i provides ideal power for inaccessible, remote, or hazardous locations. Powered by commercially available LPG, the Performer is low maintenance: Connect it to an LPG tank and leave it to work on the side of a mountain, in a dense forest, tundra or desert, miles from civilization. Features: • Powered by commercially available LPG or Natural Gas • Delivers 250 watts of continuous, reliable power. Peak >2000watts • Operating Voltage 12-30 VDC • Fuel efficient: 115g LPG/hour • Run time: 3000 hours • Exhaust: Water vapour • Low noise • Lightweight, compact • Simple installation & operation • Panel mounted P250i to easily integrate into hybrid power enclosures. Applications include remote security, meteorological stations, data collection and monitoring, pipeline monitoring and protection, telecommunications, primary power for oil and gas wellhead monitoring and site communications.

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media

Asia Pacific Security Magazine | 37


TechTime - latest news and products

Anti-spit masks to help protect security professionals By Robert Kaiser

Being spat on is not a pleasurable experience and can potentially cause infections and illnesses – it’s a very real threat in today’s society. Anti-spit masks can protect prison and police officers, as well as security professionals and paramedics from such a threat. Unions representing the interest of security professionals in countries around the world have for some time raised serious concerns about the increasing number of spitting incidents, as being spat on has well known serious potential health risks – such as Hepatitis C and other infectious diseases. It’s not just the victim that is affected but also the victim’s family, as tests and treatment for suspected contagious diseases can last for several months. Police in New Zealand have reported difficulties in restraining drunk and drugged people and preventing them from hurting themselves, according to New Zealand police magazine Ten-One. A two-year safety review of 8,000 cases found nearly ten percent of

offenders had spat at officers, who had limited tools to deal with it. The problem and reality are simple. If an extremely volatile or intoxicated member of the public or prisoner is clearly physically aggressive, this person is most likely expressing his aggression by aiming to punch or kick you. However, as soon as this person is arrested or controlled and restrained in one form or another, this person has only limited options to continue expressing his aggression or hate. Physically, there are only really two options left, aiming to head-butt you or to spit at you. Anti-Spit Masks are the difference between staying safe or suffering from a potentially long lasting and severe illness. When confronted by a hostile or intoxicated member of the public, a combatant, prisoner or disturbed hospital patient, the protection from such threat is sensible. These masks are already used by agencies and organisations around the world. They

are extremely compact, easy to deploy, safe, disposable and individually packed. The device is to be slipped over the head of a combatant, prisoner or seriously intoxicated or aggressive member of the public following his arrest. For more information visit http://www.ppssgroup.com/

Unisys-IDG survey shows what business leaders worry about An overwhelming majority of business leaders believe their customers and clients worry about breaches of personal data held by their organisations, according to survey results announced by Unisys Corporation. Recent Unisys-sponsored research conducted by IDG Connect found that 91 percent of business decision makers surveyed were concerned about their customers’ perceptions of their organisation’s ability to protect personal data, with 65 percent of decision makers reporting they believe customers are ‘very concerned.’ The survey also found that business leaders perceive numerous security threats to their data and IT infrastructures, with nearly three-quarters of those surveyed concerned about attacks on their wireless infrastructure (74 percent) or network defenses (72 percent). Nearly twothirds (64 percent) said they were concerned about breaches or attacks on their cloud applications and mobile devices. “Business and technology decision makers are seeing threats from all directions and are looking for new ways to protect their organisations and their clients,” says Steve

38 | Asia Pacific Security Magazine

Vinsik, Vice President of Global Security Solutions at Unisys. “This survey shows that a majority of them are looking for new ways to increase the flexibility of their security solutions, manage costs and address evolving security challenges. It also illustrates that security is no longer considered only an IT challenge, but a business challenge as well.” The survey showed that business decision makers were somewhat more concerned than their technology-focused counterparts about customer anxiety over personal data protection, with 80 percent of business decision makers reporting they are very concerned about their customers’ perceptions of data protection, versus 69 percent of technology decision makers. The results echo findings of the annual Unisys Security Index earlier this year. The Unisys Security Index, which regularly surveys more than 1,000 Americans on various areas of security concern, showed high levels of concern about data breaches among US consumers. Respondents to that survey said they were most worried about data breaches hitting their

banks and financial institutions, with two-thirds (67 percent) reporting concern. A majority of Americans surveyed also reported concern about data breaches involving Government agencies (62 percent), health organisations (60 percent) and telecommunications and Internet service providers (59 percent). The recent survey of enterprise executives, conducted for Unisys by IDG in July 2013, went out to more than 100 US business and technology decision makers at organisations with 1,000 or more employees. The survey was designed to identify respondents’ perceptions of network and data security. Nearly all of the decision makers surveyed expressed an awareness of their organisations’ vulnerability as well as openness to considering alternate cyber security approaches, including software-based solutions as opposed to traditional hardware perimeter-based solutions.

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media


TechTime - latest news and products

The Pakman Parcel Delivery Box™ provides convenience to consumers Mayo Hardware, the leading supplier of outdoor lifestyle and security products, is excited to launch Australia’s first, high security mail box for residential properties. The Pakman Parcel Delivery Box™ has hit the shelves nation-wide in Bunnings Warehouse stores. Designed and patented in Australia, this revolutionary box will be suitable for a wide variety of home deliveries including bulky items such as cases of wine. The Pakman Parcel Delivery Box™ has been designed and scaled around Australia Post’s standard parcel boxes, ensuring common packages can be successfully delivered. National Marketing Manager at Mayo Hardware, Mark Thame, says The Pakman

Parcel Delivery Box™ is available in three different colours; white, charcoal and sand. Optional mailboxes are available which can be attached to the parcel delivery box to accommodate both parcels and regular mail. Each of the three mailbox designs reflect subtle features that have been architecturally designed, ensuring there is a Pakman Parcel Delivery Box™ suitable for every home. The colours selected also match common COLORBOND® colours used in homes. Designed to be placed at the front door or fence line of your home, the Pakman Parcel Delivery Box™ uses My-Locate™ technology which sends an email or SMS text message to the owner when a delivery is made by

Parcel Delivery Box™ will change the way packages are delivered. “The Pakman Parcel Delivery Box™ will offer the ultimate convenience in home delivery and will eliminate customer frustration and disappointment associated with failed mail deliveries. This guarantees online purchases are delivered directly to recipients, hassle free. The rise in online shopping, coupled with our busy lifestyles, has made receiving parcels an increasingly painstaking process. “More and more people find themselves setting aside time to collect their parcels or sending their online purchases to their workplace. The Pakman Parcel Delivery Box™ is designed to save online shoppers’ time and money by ensuring all packages are delivered safely and securely to residential properties,” says Thame. Simple yet modern in design, the Pakman

participating couriers. The Pakman Parcel Delivery Box™ is labelled with a unique 2D scannable barcode code fixed to the parcel chute. This code will be registered to each resident and their unique address. Courier companies can register their drivers Personal Digital Assistant devices (PDA), allowing them to scan the code on delivery to confirm the address and gain access to their locked parcel door. Exclusive to the Pakman Parcel Delivery Box™, this system will provide courier companies with a proof of delivery and avoid the need for multiple delivery attempts, which will ultimately save businesses a substantial amount of time and money. “For added security, the owner of the Pakman Parcel Delivery Box™ can also periodically update their combination lock code online. We believe that the Pakman Parcel Delivery Box™ will not only offer the ultimate

convenience to customers but will also cut down on mail theft,” says Thame. With Fastway Couriers already on board, Thame explains the Pakman Parcel Delivery Box™ system will be available to all national parcel delivery operators. “We are excited to be working with Fastway Couriers and Bunnings on this product. We look forward to expanding availability to all delivery companies nationwide,” says Thame. The Pakman Parcel Delivery Box™ $299 Mailboxes $94-99 Wall Frame Kits $79

World’s only integrated travel risk and crisis response management platform unveiled Global Rescue, provider of the highest quality medical, security, intelligence and crisis response services for corporations and individuals, has announced the release of GRID, the only fully integrated travel risk and crisis response management tool. With GRID, employers can track employees travelling overseas, receive real-time alerts for global events, communicate with employees, and monitor their assets’ locations, all in one place. These capabilities are fully integrated with Global Rescue’s industry-leading crisis management and response services.

Information presented in TechTime is provided by the relevant advertiser and are not necessarily the views of My Security Media

“The likelihood of businesses being impacted by global threats is increasing,” says Dan Richards, CEO and founder of Global Rescue, which has been active in every major global event of the past decade. “Organisations must improve their ability to be resilient and meet the legal duty of care they have to their employees. Global Rescue is the only vertically-integrated provider of medical, security, information and communication services that supports this. With GRID, we have reinvented the way enterprises manage and respond to risks impacting their human capital.”

To meet their ‘duty of care’ obligations, employers must disclose travel-related risks to travellers and expatriates and provide employees with the information, resources, and accommodations necessary to ensure their health, safety, and security. For more information on GRID www.globalrescue.com/ GRID2013

Asia Pacific Security Magazine | 39


By author Vlado Damjanovski

A

CCTV – from light to pixels By Vlado Damjanovski

40 | Asia Pacific Security Magazine

bout 20 years ago, I started conducting seminars about the fundamentals of closed circuit television (CCTV) in Australia. There was little on this topic at the time, so I had to prepare my own material. Later on, this material became the seed for my ‘book idea’. It was a dream of mine to write and publish a book on the subject of CCTV that hadn’t been done before. I knew it would assist installers, consultants and integrators as I had seen this interest for specialised CCTV knowledge during my seminars. The first edition of my book, which I simply called CCTV, was published in 1995, by my own company CCTV Labs. I took out a loan against my house in order to publish this first book. Three years later, this book was brought to the attention of the American publisher ButterworthHeinemann (now Elsevier), who offered to publish an updated and international edition. In 1999, the first hard-cover edition was released, with the following edition in 2005. At that time the 2005 edition was the first CCTV book to encompass analogue and digital technologies. The 2005 edition was, after eight years, in desperate need of an update due to continuing technology advancements. Digital technology had further advanced and diversified and new standard initiatives were ongoing, so an update was long overdue. The 2013 edition, CCTV – from light to pixels, while re-examining known and important topics covered in the previous editions, expands to include new technologies and industry standards – most notably the digitisation of video and network transmission. The book covers the theory and practice of all components and fundamentals of CCTV. This is an extensive industry which includes the various disciplines and technologies of electronics, telecommunications, optics, fibre optics, programming, networking, and digital image processing. The latest edition encompasses the basic concepts of CCTV as well as new trends in digital CCTV, latest standards, video compression and networking concepts. I have simplified fundamental CCTV theories and principles by including many illustrations, tables and graphs. These illustrations enable installers and security professionals to easily comprehend the CCTV subject matter. CCTV – from light to pixels has chapters on system design, system measurement and testing of image quality using the ViDi Labs test chart

(www.vidilabs.com); this chart is used and recommended by international companies and consultants. The chapter ‘CCTV System design’ includes information on budgeting and quoting for a system. The intended audience for my book includes installers, sales people, security managers, consultants, manufacturers, and anyone interested in and using CCTV systems. I am pleased to see that my books are highly regarded by readers and reviewed highly on many web sites, including the popular Amazon.com Previous editions have been translated into Russian, Farsi and other languages, which has also led to the book being internationally successful. Such success motivates me as a specialist author to research and improve each new edition. I use my book when conducting my own CCTV Seminars (www.cctvseminars.com).

Have you recently published a security related book? Or have you just read a new, great security book? Please email us at editor@australiansecuritymagazine.com.au


Are you an IT service provider looking to reach the right decision maker?

Let us be your ladder to the Cloud. We have the solution‌

1-2 April 2014 The Ritz-Carlton, Hong Kong

www.ciopacificseries.com


CCTV

Providing national Security

BY THE CONTINENT National security extends beyond the battlefield, and so does Lockheed Martin. Our leading-edge technologies in aircraft design, pilot training systems, air traffic management, and satellite communications are helping Australia meet its security challenges on multiple fronts. Along with our game-changing defence systems like the F-35, the Aegis Combat System, and the MH-60R helicopter, Lockheed Martin is committed to meeting the security challenges of today — and tomorrow.

www.lockheedmartin.com.au


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.