phone number

Archive for the ‘ARTICLES ’ Category

Industry recognises bravery and commitment

Posted on: April 16th, 2014 by

By ASM

Joe Bakhos

By Rod Cowan

In just four years, the Australian Security Medals Foundation Inc. (ASMF) has grown from an idea around a dinner table to an industry institution recognising bravery and contribution to security.

With this year’s medals being presented during a sold-out black-tie charity dinner at the Sydney Opera House, ASMF Chairman, Steve Jackson, said: “Not only is it a huge honour to recognise individuals for their bravery and contribution, to be able to do so at such an iconic venue speaks volumes for how far we have come in such a short space of time.”

Five Australian Security Medals for Valour (ASMV) were awarded this year to:

  • Joe Bakhos for negotiating with a man who was holding a machete to a boy’s throat and threatening to kill him unless his demands to see his family were met.
  • Chris Twal for intervening at personal risk to stop a man who had punched a 62-year-old man in a shopping centre.
  • Mahmoud (Chris) Nemra for protecting a group of eight- to 10-year-old boys from a gang of 30 youths who were threatening them, by putting himself between the boys and the gang.
  • Ross Chapman for breaking up a fight in which he was hit, headbutted and threatened with being shot.
  • Jovan Jovanov for intervening in the attack of an elderly man by another man and dog.

“The ASMV is awarded to recognise security operatives for an outstanding act or acts of valour; an action or actions demonstrating valour, courage and decisiveness above and beyond the call of duty,” said ASMF patron, MP Philip Ruddock.

Two Australian Security Medals (ASMs) were also awarded to Julian Talbot and Bill Forbes.

“The ASM is awarded to recognise the outstanding career and character of the security professional receiving it,” said Ruddock. “ASM recipients have demonstrated a consistent, high-level contribution to the wider community, sometimes through innovative non-core business activities and projects, or through extraordinary performance in their professional role. This award is about more than how a person runs their business or operates in an organisation, but emphasises what they do above and beyond their day-to-day responsibilities.”

Senior corporate security managers form the judging panel for the Medals.

“This means that the nominations are carefully considered by major buyers of security and peers to fellow security managers,” said Jackson. “The Panel not only discusses – at length – the merits of each case but follow up where necessary with further investigation and checking references. The final stage of that process is to submit the finalists to the Patron, not so much for approval but a final proofing, if you like.”

Not every nomination is successful, but is nonetheless worthy of mention, in which case a Certificate of Meritorious Conduct is sent to the person’s employer for presentation to the individual. Two such certificates were sent to: Ibrahim Moustapha from SecureCorp, and Nemani Rainibogi from Southern Cross Protection.

Another step forward this year was the introduction of the Australian Security Medals Foundation and St John Ambulance Save a Life Award.

“Hundreds of lives are saved each year by the quick thinking and training of security officers, in recognition of which, the Australian Security Medals Foundation partnered with St John Ambulance to create a Save a Life Award, presented to security personnel responsible for saving lives through the rendering of first aid,” said Jackson.

On the night, St John Ambulance Chancellor, Mark Compton, presented the inaugural Save a Life Awards along with a First Aid Kit to Damien Stewart and Adriano Villella.

Funds raised from the night will go to this year’s nominated charity, beyondblue.

In the past year, the ASMF launched the partnership between beyondblue and the ASMF to promote the beyondblue National Workplace Program (NWP) in the security industry.

Kate Carnell, beyondblue CEO, said common mental health problems, such as depression and anxiety, can lead to increased absenteeism, high staff turnover and lost productivity.

“Male-dominated industries such as the security industry are particularly at risk because men are less likely than women to take action if they’re having a rough time,” said Carnell.

“Security staff are often the first responders in emergency situations which may be distressing and if the distress is not addressed, it may put people at risk of developing mental health problems.

“The nature of the work often means security staff have little control over the demands of their work environment which is a high risk factor for job stress.”

Subsidised NWP workshops are available to male-dominated workplaces through funding provided by the Federal Department of Health and Ageing’s ‘Taking Action to Tackle Suicide’ strategy. Funding is capped and available till end June 2014. (To find out more, call 1300 134 644 or visit www.inspiringsecurity.com

In addition to support for beyondblue, the ASMF also operates a fund to provide assistance to the families of security operatives killed in the line of duty.

“The ASMF is very much about changing the perception of security by sharing stories about its heroes and leaders, doing good within the wider community, and supporting those that need help within its own community,” says Jackson.

“Security is an integral part of business and society, and the Foundation is currently formulating plans to raise further awareness about the work in the security domain, which contributes to the security and wellbeing of millions of Australians.”

To find out more about the ASMF, please visit www.inspiringsecurity.com

…read more

Source: Industry recognises bravery and commitment

  

Keytracker: The secure key, asset management system

Posted on: April 16th, 2014 by

By ASM

Keytracker

NEW TO AUSTRALIA…

The Keytracker Key Management System is one of the simplest and most cost-effective management systems currently available for keeping track of where an organisation’s keys or assets are and who is using them. This means the organisation saving time, money and minimising frustration.

It is the ideal system for any organisation where a lot of keys are handled by a high number of staff members and where the incidence of lost or misplaced keys is high.

Keytracker Ltd, established in 1966, is based in the West Midlands, United Kingdom. Originally a family business servicing the UK market, it has grown into an international company. It has only recently launched in Australia/New Zealand. Keytracker’s core values are still firmly based on the original family ideology and are reflected in its continued accreditation of both investors in people and ISO 9001.

In the beginning, it concentrated on growth specifically from automotive dealers as the original system was designed by a car sales person. However, it was very quickly realised that absolutely any industry with a similar problem of lost or misplaced keys would benefit from the same system.

Some examples of organisations supplied in the UK are Land Rover, Rolls Royce, Cadbury, Christy’s Hospital, St John’s Ambulance, Homebase, G4S and many more household names and  independent businesses.

Keytracker is a simple, low cost-effective key control system. It keeps control of your keys with a simple peg-in peg-out system. It lets you know immediately who has which set of keys.

Features

  • Controls 5-150 Keys on a single board
  • Anti-tamper seals to prevent theft
  • Tracks any size bunch of keys
  • Additional security of a steel cabinet can be used
  • Only authorised users can have access to keys
  • All systems are expandable by simply adding additional rows.

Benefits

  • Totally power free so no connection, license fee, training, maintenance contract etc
  • Simple and easy to use “peg in-peg out” with instant identification on who has the keys
  • Quick easy access to keys
  • Extremely cost-effective
  • Keeps keys organised and in one place

The Keytracker System consists of a Mechanical Peg Board, Access Pegs. Retention Pegs and Anti-tamper Seals.

The Mechanical Pegboard is a ‘peg in-peg out” system that can hold up to 150 sets of keys or other of the Organization’s Assets (tools etc.).

Each moulded plastic track has five key positions, the port holes for each position has either a “Retention Peg” or  “Access Peg” securely locked in place. Only one Peg can be locked in therefore if a key is missing the staff members Access Peg, which has a unique identifier on the end of the Peg, visibly identifies who has the key.

A stainless steel frame holds the Keytracker’s tracks together in the designated board size. Totally modular these can be easily re-sited or added to, providing a totally flexible management solution.

Access Pegs are issued to staff members to unlock the key/asset required from the Keytracker Board.

Engraved at the end of the Peg with a staff member identification number (unique) for quick and easy reference. Each staff member who needs access to the board has just one Peg which maximizes the management and control however we do realise that this is not always practical and multiple Access Pegs may have to be issued.

Access Pegs come in 14 different colours which provides the ability to allocate a colour to a particular division or department within the organisation, staff ranking or Key or Asset classification.

Retention Pegs are the Pegs that the keys or assets are secured by an Anti-tamper seal. The Pegs have a number engraved on the end which matches the corresponding number on the Keyboard.

Retention Pegs are available in a number of colours (8) however the most effective combination is to use white for the Retention Pegs and colours for the Access Pegs. This leads to less confusion, from a visual point of view, when glancing at the board.

Anti-tamper seals are used to lock the keys or assets onto the Retention Peg which is done by threading the seal through the head of the key/asset fixing point then to the relevant Retention Peg.

Once together, the metal end of the Anti-tamper seal is pushed into the white plastic shaped head where the wire locks back on itself and locks the seal.

Once set, the key/asset can only be removed by wire cutters, which are supplied within the system. It is impossible to remove the keys from the seal without the cutter.

For more information visit www.keytracker.com.au or call 1800 814 716

…read more

Source: Keytracker: The secure key, asset management system

  

McAfee releases free tool to check for Heartbleed affected websites

Posted on: April 14th, 2014 by

By ASM

McAfee, part of Intel Security, has released a free tool to help consumers easily gauge their susceptibility to the potentially dangerous effects of the Heartbleed Bug, a vulnerability in OpenSSL that has placed millions of Internet users’ personal information at risk.

To access McAfee’s free Heartbleed Checker visit: http://tif.mcafee.com/heartbleedtest

By entering website domain names into the Heartbleed Checker tool, consumers can immediately determine if the websites they frequent have been affected by Heartbleed by checking whether or not the sites have been upgraded to the version of OpenSSL that is unsusceptible to the bug.

“It’s important that users first check to make sure the websites they frequent are updated before changing their passwords,” said Gary Davis, vice president of consumer marketing at McAfee, part of Intel Security.

Steps to protect yourself:

  • Go to McAfee’s Heartbleed Checker tool http://tif.mcafee.com/heartbleedtest and enter any website URL to check if it’s vulnerable.
  • If the site is deemed safe your next step is to change your password for that site. Remember, changing your password before a site is patched will not protect you and your information.
  • If the site is vulnerable, then your best bet is to monitor the activity on that account frequently looking for unauthorised activity.
  • Once a site has been patched so it’s no longer vulnerable to the Heartbleed bug, you should change your password. Here are some tips to remember:
    • Use strong passwords that include a combination of letters, numbers and symbols and are longer than 8 characters in length – the longer the better.
    • Use a password manager, like McAfee SafeKey which is included with McAfee LiveSafe™ service that will help you create strong password and remember them for you.
    • Use two-factor authentication for increased security. You get a one-time code every time someone tries to log into the account, such as those for banks, social networks and email.

…read more

Source: McAfee releases free tool to check for Heartbleed affected websites

  

Heartbleed bug found in OpenSSL software

Posted on: April 14th, 2014 by

By ASM

Roland Dobbins, Senior Analyst from Arbor Networks Security Engineering & Response Team (ASERT) comments about the Heartbleed bug; “This is an extremely serious situation, which highlights the manual nature of the tasks required to secure critical Internet services such as basic encryption and privacy protection.

“There are no automated safeguards which can ameliorate these issues.  And what most people don’t realise is that if attackers captured packets in the past from vulnerable systems and retained those captured packets, they’ve the opportunity now to use analysis tools to replay those packets and decrypt the Internet traffic contained in those packets.

“In terms of remediation, there’s a huge amount of work which must be done, not only for servers, but for load-balancers, reverse proxies, VPN concentrators, various types of embedded devices, etc.  Applications which were statically compiled against vulnerable versions of the underlying OpenSSL libraries must be re-complied; private keys must be invalidated, re-generated, and re-issued; certificates must be invalidated, re-generated, and re-issued – and there are a whole host of problems and operational challenges associated with these vital procedures.

“A key lesson here is that OpenSSL, which is a vital component of the confidentiality and integrity of uncounted systems and applications and sites across the Internet, is an underfunded, volunteer-run project which is desperately in need of major sponsorship and attendant allocation of resources.

“Serious questions have been raised regarding the notification process surrounding this vulnerability.  The operational community at large have voiced serious disapproval surrounding the early notification of a single content delivery network (CDN) provider, while operating system vendors and distribution providers, not to mention the governmental and financial sectors, were left in the dark and discovered this issue only after it was publicly disclosed via a marketing-related weblog post by the CDN vendor in question.  It has been suggested that the responsible disclosure best practices developed and adopted by the industry over the last decade were in fact bypassed in this case, and concerns have been voiced regarding the propriety and integrity of the disclosure process in this instance.”

…read more

Source: Heartbleed bug found in OpenSSL software

  

ASIS International – ACT Chapter

Posted on: April 14th, 2014 by

By ASM

Wednesday 14th May 2014
Presentation and Networking Event
Guest Speaker: Cynthia from BLU – Business Liaison Unit
Topic: “About the BLU”
Guest Speaker: Ben from T4
Topic: “The Development of new T4 technical- notes and alignment with PSPF”
About the BLU
The Business Liaison Unit provides a public interface between the Australian Intelligence Community and Australian Business. The BLU administers a secure website on a freesubscription basis. The website contains intelligence-backed unclassified reporting on the
domestic and international security environment.
The BLU provides information through;
 BLU website
 Face-to-face meetings
 Classified sector briefing days hosted at ASIO headquarters
 ASIO Director General briefings to CEOs and executive boards
 Attending/Presenting at industry forums and conferences
The development of new T4 tech-notes and alignment with the PSPF T4 is the directorate within ASIO that provides protective security advice to Australian Government agencies and authorities, and to owners and operators of Critical Infrastructure rated VITAL. T4 protective security advice can be sought an any point in the design life of a facility (or event), from concept through to full operation.
T4 services include;
Protective security advice, technical countermeasures, facility certification, advice on equipment testing and endorsement, practical training of Government security practitioners, endorsement of security professionals for use within government
At the end of the presentation, both speakers will be keen to answer questions.
Time: Doors open 5.30pm (for 6.00pm start)
Location: Majura Theatre at 11 Lancaster Pl Majura (See attached map)
(Parking is available nearby)
Cost: Nil
Wine, Beers, Non-Alcoholic Beverages and Light Snacks will be supplied by Schneider Electric in conjunction with ASIS ACT Chapter.
All are welcome to attend this very enlightening presentation and networking opportunity.
Please forward this invitation to colleagues, clients and others who may wish to attend.
Members’ Lucky Draw:
All Members who attend on the day will have their names entered into a draw at the end of the function. The lucky winner will be entitled to purchase from the ASIS bookshop (or from another source) technical books to the value of A$150.
All members who attend will also have their names entered in the end of year draw, with the winner having the following year’s ASIS International membership paid for. The more times you attend, the more chances you have to win.
Non- Members’ Draw:
All non-members who attend an ASIS ACT function will have their details entered into an end of year draw. The more functions you attend, the more chances you have to win. The lucky winner on joining ASIS International will have their first years joining fee of US $150 fully refunded by the ASIS ACT Chapter.
Support your local ASIS Chapter, advance your knowledge, attend great networking opportunities and be in the chance to win technical reference material.
Please RSVP for catering purposes by 11tyh May to eventsact@asisact.org.au
Please RSVP as soon as possible. Preference for attendance will be given to ASIS members and affiliated organisations. We expect this to be a very popular event.
Please send any general correspondence direct to ASIS ACT : adminact@asisact.org.au
And visit our website: http://www.asisact.org.au
Proudly Sponsored by: Schneider Electric and ASIS ACT Chapter 260

…read more

Source: ASIS International – ACT Chapter

  

Online communities: Utilising emerging technologies to improve crime prevention knowledge, practice and dissemination

Posted on: April 14th, 2014 by

Online communities (OLCs) are increasingly being recognised as a way of sharing ideas and knowledge among different practitioner communities, particularly when practitioners are not able to meet face to face. OLCs are not necessarily difficult to establish, but ongoing maintenance and sustainability may prove challenging.

…read more

Source: Online communities: Utilising emerging technologies to improve crime prevention knowledge, practice and dissemination

  

Imperva appoints Robert de Haan Regional Sales Manager for Qld, NT, NZ and Pacific

Posted on: April 10th, 2014 by

By ASM

Imperva, Inc, pioneering the third pillar of enterprise security with a new layer of protection designed specifically for physical and virtual data centers, today announced the appointment of Robert de Haan as Regional Sales Manager. He has business development responsibility for territories spanning Queensland, Northern Territory, New Zealand, and the Pacific.  He reports to Jason Burn, Area Vice President – Pacific.

From Brisbane, Robert will work directly with Imperva’s channel network to further implement Imperva’s data center security solutions and extend the company’s sales performance locally.

He joins Imperva from a successful career with Brocade Communications where he drove the delivery of innovative solutions for a range of blue chip accounts via an impressive partner marketing program.

Over his extensive career, Robert has developed relationships across multiple industries and technologies including cloud computing, mobility, virtualisation, security and networking. He has experience in product sales, professional services, consulting, and managed services with respected corporations such as Cisco, IronPort, Clariti, JTEC, Volante, and Tektronix.

Robert is seen as an excellent fit for Imperva Pacific. “As our latest asset, Robert extends the breadth of our experienced management team. We believe that his expertise in both channel and direct sales areas across regions and countries will have a deeply positive impact on our relationships with partners and customers,” outlined Jason Burn, Area Vice President – Pacific, Imperva.

…read more

Source: Imperva appoints Robert de Haan Regional Sales Manager for Qld, NT, NZ and Pacific

  

WD® debuts surveillance-class hard drive line

Posted on: April 10th, 2014 by

By ASM

WDPurple_CoverOn_UprightLeft_4TB with icon_1

WD®, a Western Digital company and storage industry leader, has announced the availability of WD Purple™, a purpose-built line of 3.5- inch, high-capacity hard drives for surveillance applications. Designed specifically for video surveillance units, WD Purple hard drives excel in new and existing home and small business security environments with up to eight hard drives and up to 32 high-definition (HD) video cameras. Shipping today, WD Purple hard drives are available in capacities from 1 TB up to 4 TB.

“By expanding our ‘Power of Choice’ product portfolio with WD Purple, we make it simple for our VARs, integrators and consumers to select the right drive engineered for their application and validated with our industry leading surveillance partners,” says Matt Rutledge, Senior Vice President and General Manager of WD’s Storage Technology Group.

“WD optimised the WD Purple line of hard drives for surveillance applications to improve high-definition video playback, and operate in 24

Unofficial evacuation centres and community resilience

Posted on: April 10th, 2014 by

By ASM

During recent bushfires and floods in New South Wales, there has been an increased prevalence of unofficial evacuation centres being established by local community groups to assist affected residents. Significant planning occurs through all levels of government and within the community to ensure that we can assist and care for those affected by disasters. Usually, emergency services and government agencies work alongside not-for-profit organisations to provide a place of safety and security for people during evacuation; in line with basic public expectations of government during disasters.

Mr Mitchell Clout from the NSW Ministry for Police and Emergency Services will present on Unofficial Evacuation Centres and Community Resilience at the Australian & New Zealand Disaster and Emergency Management Conference at the QT Gold Coast, 5th – 7th May 2014.

This presentation will draw on case studies from recent disasters in New South Wales with reference to current policy and guidelines. It will also consider the opportunities and risks which government agencies and emergency services should consider when non-traditional organisations operate unofficial evacuation centres.

To view the educational program with 70+ presentations and the book of abstracts please visit the conference website – www.anzdmc.com.au

…read more

Source: Unofficial evacuation centres and community resilience

  

India’s gory wildlife trade

Posted on: April 7th, 2014 by

By ASM

Wildlife

By Sarosh Bana

The greatness of a nation and its moral progress can be judged by the way its animals are treated – Mahatma Gandhi

India is at war with its wildlife. Widespread poaching and relentless inroads by settlements, industry and farms are decimating wild animals and their habitats at an alarming pace.

While it was previously believed that habitat loss posed the biggest threat to animals in the country, it has now been established that the grave danger is from the illegal trade in the remains of these creatures.

Entrenched poaching syndicates are making survival a grim struggle for the richly diversified wildlife in the homeland of Mahatma Gandhi, the apostle of peace who gave the world the doctrine of ahimsa, or non-violence. No less an institution than the Supreme Court, the country’s highest court, has observed that many animals are being driven to the brink of extinction by ruthless sophisticated operators, some of whom have top level patronage.

At the same time, however, the State High Court of Madhya Pradesh dismissed a plea by a non-Government organisation (NGO) called Prayatna, seeking an inquiry by the Central Bureau of Investigation (CBI) into the disappearance of all 20 tigers in central India’s Panna Tiger Reserve. Though 19 of the 20 tigers were reportedly slain by poachers, a division bench of the court dismissed the plaint, saying, “The CBI has many better things to do.”

Apart from Africa, India is a major hub of clandestine wildlife trade that has been estimated by Interpol at upwards of US$20 billion globally each year. This savagery prevails for a flourishing demand world-wide for animal products, the US being the biggest market.

The problem is serious enough for world leaders from more than 40 nations to have participated in the ‘Illegal Wildlife Trade Conference’ held in London, February 2014, where they collectively pledged to take key actions to stamp out this menace. The conference resulted in ‘The London Declaration’ that contains commitments for practical steps to end this illegal trade, which apart from threatening the survival of entire species, also undermines economic opportunity in developing countries. It prescribes actions that will help eradicate the demand for wildlife products, strengthen law enforcement, and support the development of sustainable livelihoods for communities affected by wildlife crime.

Endowed as it is with great biological diversity in its forests, grasslands, deserts, mountains, including the Himalayas, wetlands and marine areas, India harbours as many as 350 (or 7.6 percent) of the world’s 4,629 known mammalian species, 1,224 (or 12.6 percent) of the world’s 9,702 avian species, 408 (or 6.2 percent) of the 6,550 known reptilian species, 197 (or 4.4 percent) of the world’s 4,522 species of amphibians, and 2,546 (or 11.7 percent) of the 21,760 species of fish.

The global trade in animal parts holds out enormous lucre, being next only to drug-running and arms trafficking in its intensity and profitability. It flourishes in the face of national and international laws that prohibit it.

Article 48A of India’s Constitution requires the State to protect and improve the environment and safeguard forests and wildlife. Article 51A (g) obliges every citizen to protect and improve the natural environment, including wildlife. Enacted for this constitutional purpose was the Wildlife (Protection) Act of 1972, its Chapters V and V-A prohibiting ‘trade or commerce of wild animals, animal articles or trophies’. Chapter VI makes violation of the provisions of the Act a criminal offence. The country is a signatory to both the UN Convention on International Trade in Endangered Species (CITES) and the UN Convention against Transnational Organised Crime (CTOC).

Nothing is sacred

The national Indian animal, the tiger, and the national bird, the peacock, too are under siege. Illicit wildlife trade deals most commonly in tiger and leopard parts and skins, elephant tusks, rhino horn, snakeskin, deer antlers, turtle shells, musk pods, bear bile, mongoose hair, and also live birds such as waterbirds, migratory birds, parakeets, mynas and munias, exotic pets and marine species like seahorses, shells and coral. Those that are not traded are eaten; the wide spectrum of birdlife and even jackals, mongoose, porcupine, monitor lizard, antelope and deer are prized for their flesh both by the forest-dwelling communities and those with a taste for the exotic.

The vigorous wildlife trafficking in India is more for meeting the demand from outside the country, there being relatively little domestic demand for wildlife products. There is a booming cross-border trade as China has always been a huge consumer of wildlife produce. Traditional Chinese medicine is based largely on natural flora and fauna in their various forms. Consumption in that country is also driven by the age-old belief in the aphrodisiacal powers of various animal products, such as tiger penises and rhino horns.

Poachers will find support from politicians, conniving forest guards and officials, and local villagers and tribals, who are often good trackers and trappers. A weak criminal case against two villagers accused of killing two 17-month-old tiger cubs led to their acquittal. This was because the forest authorities ‘failed’ to file a charge sheet against the culprits within the mandatory 60 days. The duo had poisoned the cubs on the outskirts of the Ranthambhore Tiger Reserve in the desert State of Rajasthan after they had killed their goats. Though killing a tiger is a non-bailable offence, bail may be granted if the charge sheet is not filed within the stipulated time – an easy out.

There had been more than 40,000 tigers in India a little over a century ago. Widespread hunting by the erstwhile maharajas and the British colonialists exterminated many of them by the time of Independence in 1947. The first ever all India tiger census conducted in 1972 revealed the survival of only 1,827. Alarmed by the dwindling numbers, the country launched ‘Project Tiger’ in 1973-74 in a concerted effort to salvage the situation. Aimed at conserving tigers in specially constituted reserves, the scheme has seen the establishment of 39 Project Tiger reserves covering a combined area of 32,137 sq km.

The effort did help increase the tiger population to around 3,500 in the ‘90s. Subsequent …read more

Source: India’s gory wildlife trade