Conducting Workplace Investigations – Part 2

By Greg Byrne In this edition of the Security Solutions Magazine, I will conclude the two-part article on conducting an internal investigation. In the previous article (in Security Solutions Magazine Issue 106), I discussed that conducting an internal investigation involved a four-step process of: 1. Preparation and information collection 2. Interviewing the relevant parties 3. Making a finding and report 4. … [Read more...]

Cyber Resilience – A Decade After The First Large-Scale Attack

By Dr Rita Parker The fragility of cyber defences worldwide was exposed when malicious software (ransomware) created havoc around the globe in May this year, affecting businesses, individuals and critical infrastructure. The global reach was unprecedented. The first wave of cyberattacks hit 200,000 targets in at least 150 countries, according to a statement by the head of the European Union’s police agency Europol … [Read more...]

What Are Employees Actually Doing?

By Karissa Breen The news or the media are always reporting that outsider threats are the main source of cyberattacks, but who is actually looking at the employees on the inside? What are all these people doing? Is anyone monitoring what the system administrators are doing and ensuring they are not downloading every episode of “House of Cards” under the sun because they can and because they have ‘privileged account … [Read more...]

Leading From Below

By Jason Brown In the world of security, hierarchies are common and leadership tends to be associated with position or rank, but this need not always be the case. If you have the desire, competence and willingness to communicate your ideas you can lead from below (LfB). I would argue that in any well-run organisation, those who demonstrate a capacity to lead from below usually end up with a formal leadership … [Read more...]

The Time To Build Relationships Is Before A Disaster

By Rod Cowan A disproportionate interest in terrorism is resulting in the Government and policy makers failing in the fundamentals of national security, which must entail an all-hazards approach to security and risk mitigation. Having spent more than 14 years building relationships through the Trusted Information Sharing Network (TISN) and the Security in Government (SIG) annual conference, policy wonks scrapped the … [Read more...]

Security Leadership

By Steve Mark Security is 90 percent psychological and 10 percent physical; that is, many see security as protecting people and property from intentional harm, and doing so by focusing on, for example, physical or digital barriers. This is of course entirely appropriate; however, it only forms part of the security ‘picture’, because security also connotes the psychological state of being secure, being free from fear. As … [Read more...]

The Role of CCTV In Resolving Major Incidents

By Vlado Damjanovski I was asked to write an article on the CCTV aspects of a hypothetical incident and “what will/could/should/may happen after a security-related atrocity or major incident occurs”. A worrying thought indeed. A major incident could be, for example, a bomb in a public place which could affect almost everybody in this city. There are such public places in all major cities around Australia. So, to give … [Read more...]

Scenario Design – Building Blocks Of Operational Success

By Richard Kay An instructor’s obligation is to prepare officers for that aspect of their job that has the potential to put them at risk. Preparing officers to survive confrontational situations has several factors: physical skills to control situations and ensure safety, knowledge to make decisions within lawful parameters and emotional resilience for post-incident management, expressed as safety, survivability and … [Read more...]

Preparation is the Best Defence

By Steve Lawson To state the obvious: by far the best response to an atrocity is to make sure that a proper defence is in place before the atrocity. After a security incident has happened, there is pressure to ‘do something’, especially from the media and government. The media tend to look at the spectacular and government looks at the politics. Security professionals should be prepared to weather pressure from both of … [Read more...]

Preparing for the next wave of ransomware attacks

How to defend your business By Kevin Cunningham There’s no doubt about it, ransomware is both destructive and costly to businesses. However, in terms of an attack methodology, it’s nothing new. What has elevated ransomware is the sheer magnitude and the evolving nature of the attacks. Case in point: WannaCry, an unprecedented attack served to organisations on a global scale with estimated economic losses in the billions … [Read more...]

Inside The Shadow Economy

By David Lake It costs money to commit acts of terrorism and field armies to fight the battles of jihad. The cost to pay for fighters, food, equipment, lodging, training, deployment and medical services for the jihadist by the controlling organisation or group is not cheap. When operating beyond the borders of the sponsor of terror, the costs can be five times as much as it would cost to conduct a local operation. For … [Read more...]

Fixing Security Risk Management: focus on the threat actor

Government and private industry place enormous emphasis on the concept of Risk Management and Security Risk Management. In an article published in Security Solutions Magazine in November 2016, it was identified how dangerous and ineffective this concept actually is. It was shown that in areas where the concepts of Risk Management and Security Risk Management were implemented, crime rates actually increased. Such a … [Read more...]

About Pixel Densities And What They Mean

By Vlado Damjanovski An Internet Protocol (IP) surveillance system is most often used to observe and protect people, objects and people’s activity inside and outside the objects, traffic and vehicles, money handling in banks, or games in a casino environment. All of these objects of interest may have different clarity when displayed on a workstation screen. The image clarity depends primarily on the camera used, the … [Read more...]

Intelligent Public Safety – Brains Over Brawn

By Richard Kay The operational environment can be a dangerous place, with interpersonal conflict and violence being very real potential risks to officers as well as the public. Officers require practical solutions to resolve situations and confrontations, and that requires the ability to act from the basis of a planned approach involving strategic thinking. To teach officers how to act, it is important to teach them how … [Read more...]

The Videofied OMV – Outdoor Motion Viewer

The Outdoor Motion Viewer ®, a battery-powered PIR motion sensor with an integrated digital video camera and infrared illuminators, is designed to detect an intrusion, instantaneously record a 10-second video and send video alarm signal to the Videofied control panel via a Military Encrypted RF for cellular relay to a nominated Central Monitoring Station where immediate review/verification can initiate a priority response … [Read more...]

The Immediate Future of Passenger Screening

By Steve Lawson In July 2015, I wrote an article ‘The Future Of Passenger Screening’ that reviewed the International Air Transport Association (IATA) and the Airports Council International (ACI) joint Smart Security project. The idea of the project, according to IATA, “envisions a continuous journey from curb to airside, where passengers proceed through security with minimal inconvenience, where security resources are … [Read more...]