Security Focus Africa - Vol 34 No 5 - May 2016

44
The official industry journal for professional risk practitioners: security, safety, health, environment and quality assurance www.securityfocusafrica.com | Vol 34 No 5 2016 | R 46 incl. VAT

description

 

Transcript of Security Focus Africa - Vol 34 No 5 - May 2016

Page 1: Security Focus Africa - Vol 34 No 5 - May 2016

The official industry journal for professional risk practitioners: security, safety, health, environment and quality assurance

www.securityfocusafrica.com | Vol 34 No 5 2016 | R 46 incl. VAT

Page 2: Security Focus Africa - Vol 34 No 5 - May 2016

Does Crime Pay?Qualifications in Police Science, Forensic Investigations and Traffic Police have become central in the fight against crime and transgressions. Crime and transgression levels are high and the growing complexity with which these are being committed requires and challenges all policing agencies, individual police officials, government departments, non-governmental organisations and the private law enforcement sector to acquire suitable adequate skills and knowledge.

The Department of Police Practice at Unisa prides itself for offering superior qualifications that are industry relevant and have academically sound curricula and is pleased to be empowering law enforcement agencies, officers and the security cluster industry. The department offers various qualifications in policing and forensic investigation to ensure that crime in your organisation DOES NOT PAY.

APPLY AND REGISTER FOR POLICING AND FORENSIC INVESTIGATION QUALIFICATIONS AT UNISA.

For more information, please feel free to contact the Call Centre of the College of LawEmail: [email protected]: 012 433 9410/9443

COLLEGE OF LAW

DEPARTMENT OF POLICE PRACTICE

PhD in Criminal Justice

Diploma in Policing

- MTech: Forensic Investigations (Coursework)- MTech: Policing- Master of Arts in Criminal Justice (Coursework)- Master of Arts in Criminal Justice (Full Research)

- BA Honours: Forensic Science and Technology (in the registration process)

- BA Honours: Police Science

- BA: Forensic Science and Technology- BA: Police Science

Higher Certificate inCriminal Justice

Chi

llibu

sh41

55U

nisa

Define tomorrow.

Page 3: Security Focus Africa - Vol 34 No 5 - May 2016

The security you want, at the scale you need.

wd.com/purpose

Capture it inPURPLE

Scale it inDATACENTER

WD® Surveillance Hard Drives

WD, the WD logo and WD Purple are registered trademarks of Western Digital Technologies, Inc in the U.S. and/or other countries. WD Re is a trademark of Western Digital Technologies, Inc in U.S. and other countries. Other marks may be mentioned herein that belong to other companies. Pictures shown may vary from actual products. Total accessible capacity varies depending on operating environment. Not all products are available in all regions of the world.© 2016 Western Digital Technologies, Inc. All rights reserved. 4178-707154-A00 Feb 2016

Page 4: Security Focus Africa - Vol 34 No 5 - May 2016

CONTENTS

COVER STORY

16

10

14

FEATURES10 SPECIAL FEATURE: ACCESS CONTROL The prolific technological development and integration of access control

with new technologies, including biometrics and mobile devices – are just some of the major factors propelling the growth of the local and global access control market.

14 TECHNOLOGY UPDATE The Internet of Things (IoT) will, as it grows, automate and inform an

increasing number of operations, applications and processes.

ADI GLOBAL DISTRIBUTION

ADI invites you to the Johannesburg ADI Expo to attend seminars, meet the suppliers on the Expo, and then network with ADI staff, suppliers’ representatives or your fellow colleagues in the field.

8

VOL 34 NO 5 2016

Page 5: Security Focus Africa - Vol 34 No 5 - May 2016

Official Journal of the Security Association of South Africa

Published by the proprietorContact Publications (Pty) Ltd

(Reg No. 1981/011920/07)

TEL: (031) 764 6977

FAX: 086 762 1867

EMAIL: [email protected]

PUBLISHER: Godfrey King

EDITOR: Andrea Müller

PRODUCTION LEADER: Colleen McCann

LAYOUT & DESIGN: Hayley Mendelow

SUBSCRIPTIONS: Jackie Goosen

HEAD OFFICE PHYSICAL ADDRESS:Suite 1, Fields Shopping Centre,

Old Main Road, Kloof 3610

POSTAL ADDRESS: PO Box 414, Kloof 3640, South Africa

PUBLICATION DETAILS:Security Focus has 11 isues a year and is

published monthly, with the December/January issues combined.

PRINTED BY:Paarl Media KZN

52 Mahogany Road, Westmead www.paarlmedia.co.za

SUBSCRIPTION RATES:Annual subscription for magazine posted in

Republic of South Africa is R650 including VAT and postage.

Subscription rates for addresses outside South Africa can be obtained on application to the

Subscription Department, Box 414, Kloof 3640.

Editorial contributions:Editorial contributions are welcome. For details please email the editor:

[email protected].

Advertising enquiries: Bernadette FentonCell: 082 443 8931Fax: 086 762 1867Email: [email protected]

is a member of Security Focus Africa

Serving the South African security industry for 34 years

www.securityfocusafrica.com

@SecurityFocusza Security Focus

REGULARS4 Comment Cold case justice

6 News Unemployment and its effect

on South Africans.

16 Opinion Piece The importance of surveillance

for security purposes cannot be under-estimated, says Laurence Smith, executive at GIT.

18 Company News Distribution partnership

announced.

20 Residential Security While advanced technology

has the ability to revolutionise risk management for estate security, these technologies are often not applied to their full potential.

22 Commercial Security It’s all about integration these

days, says Laurence Smith, executive at GIT.

24 OH&S When it comes to security in

mines, the major focus tends to be on preventing theft and unauthorised access, says Rhys Evans, director, ALCO-Safe.

25 Case Study At the end of its contract with

a particular security company, a

prominent quarrying company appointed a new entity to render security services at its Limpopo mine.

26 On the Market •Fightingcontraband

cellphones in correctional facilities.

•4Ksurveillancestoragesorted.

•Technicalsurveillancecountermeasures.

•One-stopmobileworkforcemanagement system available.

30 International News •Videotechnologyfrom

Dallmeier protects Ostdeutsche Galerie.

•GJD’sPearldetectorshortlisted for PSI Premier Award.

•Dallmeierlaunchesnewspecial camera for number plate recognition.

•Videosurveillancesecurescrime lab.

•Newfeaturesmakeiteveneasier to find out exactly what happened.

36 Law & Security The Claasen board of inquiry.

38 Index of Advertisers

39 Calendar

40 Directory

24

Page 6: Security Focus Africa - Vol 34 No 5 - May 2016

4 SECURITY FOCUS | VOL 34 NO 5 2016

EDITORS COMMENT

Statements made or opinions expressed in articles in Security Focus do not necessarily reflect the official views of the Security Association of South Africa (SASA) nor those of any of the other security associations listed in Security Focus. Similarly, advertising in this publication does not imply in any way endorsement or approval by these security associations of any products or services.

It is the policy of the Security Association of South Africa that any office-bearer who has an executive position in a company, or companies, which supply security products or services should on no account allow his position to be used to promote his company or its objectives in the editorial content of Security Focus, the official journal of the Association. If, at any time, an office-bearer’s position has been quoted in relation to his company or product, this does not imply the Association’s approval or involvement.

EDITORIAL POLICY

Johannesburg has no shortage of real-life crime stories, but few will restore your faith in the system or in people’s

relentless quest for truth and justice, quite like the story of Betty Ketani. This week saw the launch of the book, Cold Case Confession, by local journalist Alex Eliseev. Cold Case Confession sets out one of the most perplexing crime stories of the decade.

It all started back in 2012, when the owners of a house in Kenilworth ripped up the old carpets in their home to complete some renovations.

A simple, typed letter, which could easily have been tossed aside, began with the

following chilling words: “If you are reading this, then I am dead.”

What follows is a confession that details the kidnapping, torture and murder of single mother of three, Betty Ketani. Like thousands of other mothers around this country, Betty had made her way to the so-called bright lights of Johannesburg, all the way from Queenstown in the Eastern Cape.

She became a chef at Cranks, a restaurant well-known to locals. In her quest to send wages home and provide for her family, Betty spent her life at work. Time with loved ones was restricted to Christmas and Easter.

Then in 1999 all contact between Betty and her children ceased. The bewildered Queenstown family were filled with anguish as their beloved mother, daughter and sister had seemingly disappeared without a trace.

A haphazard police investigation offered no peace or comfort, and Betty’s story was shelved in the abyss of the criminal justice system for nearly 13 years until that fateful day when the letter was found.

In 2012, Eyewitness news reporter, Alex Eliseev was tipped off about a peculiar cold case, and the mystery letter, shortly after the first murder suspects were arrested.

Just this week and almost two decades from the time that the murder was committed, Betty Ketani’s killers were finally brought to justice, when the judge handed down sentencing, most notably 30 years to Carrington Laughton, who it turned out was the author of the three-page typed confession.

So, what’s the big deal about the Betty Ketani case? It’s the fact that against all

odds and despite the best efforts of a few heartless criminals – the story of a little-known woman from a small town captured the attention of a group of dedicated and relentlessly committed individuals.

From the police who re-opened the case, including investigating

officer, Captain Gerhard Van Wyk to lead prosecutor, Herman Broodryk SC (who described the case as the most difficult in his 34-year career) together with his partner, Advocate Namika Kowlas.

Without a body and with no motive provided, this entire case was built on circumstantial evidence and DNA samples sent across the continents for testing.

Then there’s Alex Eliseev, who gave Betty and her family a voice. While Oscar and Dewani captured the attention of millions around the world, Alex remained quietly committed to Betty’s case. He kept a photo of her above his desk at his home office.

So, when free time with his wife and son were sacrificed, when he faced teasing from colleagues about the never-ending cold case, and when the trial seemed to drag on without an end, he would think about the young mother from Queenstown and how desperately her family needed closure.

So, while the wheels of justice turned slowly, this time they turned in the right direction. To this day Betty Ketani’s killers have never provided a reason for why she was murdered. However, Cold Case Confession does much to restore your faith in our system, and some of the stellar individuals who still do everything they can for the ordinary South African. To quote Thuli Madonsela’s words about Eliseev’s book, it just goes to show that – “we are all equal before the law”.

Andrea MüllerEditor

[email protected]

Cold case justice

This book is available at all good bookstores countrywide

Page 7: Security Focus Africa - Vol 34 No 5 - May 2016
Page 8: Security Focus Africa - Vol 34 No 5 - May 2016

6 SECURITY FOCUS | VOL 34 NO 5 2016

NEWS

For more informationPlease visit www.guardtrack.co.za

Tel: 011 888 4982Fax: 011 782 7333email: [email protected] [email protected]

Historical SystemsFor Single / Multiple Site ApplicationNo wiring required on site

With the country’s economy struggling to fight off junk status and the rising cost of living, a

growing number of South African citizens are finding themselves with few options left.

A recent revelation by Pali Lehohla, statistician general of Stats SA, revealed that the unemployment rate in the country has increased by 2.2 per cent in the first quarter of 2016, bringing total unemployment figures in South Africa to a staggering 26.7 per cent.

This is statistically the highest it has been since the 2008 global recession that saw global unemployment rates soar.

Numerous high-profile industries have

been particularly hard hit by declining employment levels. The trade, manufacturing, and construction industries were the biggest victims in this latest downward spiral, accounting for almost 300 000 jobs lost between them.

The issue that South Africa now finds itself facing is the societal impact of unemployment on a portion of the population that is in excess of 14 million citizens.

Despite the government’s renewed attempts to stimulate job creation in the wake of the global recession, more South Africans are finding employment hard to come by. This then begs the question: what happens to this unemployed population?

One of the key issues that the government faces in this fight against unemployment is growing discontent and loss of support among a significant portion of the voting population.

One wouldn’t have to look hard to find support for the reigning ANC government wavering, with the popularity of President Jacob Zuma arguably at an all-time low.

The rise of the Economic Freedom Front party has added to the already competitive climate fostered by the DA, meaning the ANC have reason to sweat under the collar, particularly with the impending nationwide municipal elections.

Alcohol and substance abuse is another factor that is heavily influenced by the unemployment epidemic.

South Africa is one of the highest ranked countries in terms of alcohol consumed

per capita, with the average drinking South African consuming approximately 11 litres per year.

Alcohol or drug abuse often offers those suffering from depression or desperation a way to escape their hardships and switch off from the real world.

Substance abuse has a further knock-on effect of leading to other vices, such as prostitution or petty crime in order to fuel their habits.

With South Africa’s existing reputation as a crime haven, further growth in crime statistics will negatively impact on the country’s standing as a popular tourist destination.

Ultimately, there is no quick fix to the unemployment problem in this country. Instead, it will have to take a concerted effort from government, first and foremost, in conjunction with public and private sectors in order to stimulate job growth and secure the future of South Africa’s people and its economy.

Making education more accessible to a wider portion of the population would be a step in the right direction for fighting youth unemployment and creating a steadier future for the South African workforce.

Unemployment and its effect on South AfricansUnemployment in South Africa is a constant disorder that, instead of being treated, continues to grow and infect growing numbers of disillusioned South Africans.

Page 9: Security Focus Africa - Vol 34 No 5 - May 2016
Page 10: Security Focus Africa - Vol 34 No 5 - May 2016
Page 11: Security Focus Africa - Vol 34 No 5 - May 2016
Page 12: Security Focus Africa - Vol 34 No 5 - May 2016

10 SECURITY FOCUS | VOL 34 NO 5 2016

SPECIAL FEATURE

According to the latest market research by Marketsandmarkets, the access control market is expected to reach $10.4 billion by 2020, at a CAGR of 10.6 per cent between 2014 and 2020.

Locally the increase in crime, and globally the ever-present threat of terrorism attacks are the factors compelling corporate and commercial organisations, as well as government authorities to focus on greater utilisation of access control technology, products and services. The high cost of some products is one of the major restraints for the growth of the access control market.

The report adds that biometrics has played a crucial role in the growth of access control products by unifying both the technologies. Fingerprint, iris, and signature identification are some of the major areas of biometrics that are expected to indicate significant growth in the near future.

Recently, mobile-based access control has been introduced in the market, which follows the principle of bring your own device (BYOD) to access any area or place. All these factors are expected to provide the access control market with a huge growth opportunity in applications such as commercial, industrial, government, military and defence, healthcare, residential, and education. The commercial application of the access control market has the highest market share and is expected to grow tremendously in the coming years.

The access control market report covers the products types such as contact cards and readers, contactless cards and readers, hybrid or all-in-one cards and readers, biometric systems, mobile access readers, management software, database and servers. The biometric systems include fingerprint, iris, hand geometry, palm, signature, and face identification.

The products are widely used in sectors like commercial, residential, military and defence, government, industrial, healthcare, and education. The commercial application in this report covers

different sectors such as airports, enterprises, and financial institutions. The report also covers the geographical analysis of the access control market. The regions analyzed are North America, Europe, Asia-Pacific, and Rest of the World (RoW).

The players involved in the access control market include ASSA ABLOY AB (Sweden), Gallagher Group Ltd (New Zealand), Cross Match Technologies (U.S.), Morpho SA (France), Honeywell Security Group (US), AMAG Technologies (US), Samsung Techwin Co, Ltd (South Korea), Gemalto NV (The Netherlands), 3M Cogent, Inc. (US), and NEC Corporation (Japan).

Notably, the latest market research released by Marketsandmarkets on automated fingerprint identification systems shows that the market is expected to be worth USD 8.49-billion by 2020 at an estimated CAGR of 21.0 per cent between 2015 and 2020.

The transformation and technology evolution from the manual process to digital process and the growing investments in the government and enterprise sectors to support e-governance applications should help drive the AFIS market during the forecast period.

Research analysts found that the major forces driving the automated fingerprint identification system market are the transformation and technology evolution from the manual process to digital process. As the numbers of criminal records keeps on increasing, the need for the digitisation of the data through the use of AFISs would drive the market for law enforcement applications in the government sector. The need for secure transactions in the banking and finance sector would be another major driver in the AFIS market.

In addition, the increasing preference for the mobile payments will also help to drive the AFIS market to ensure safe transactions instead of using passwords as a safety tool. The use of fingerprint identification is expected to play a key role in changing the security

The global rise of

The prolific technological development and integration of access control with new technologies, including biometrics and mobile devices – are just some of the major factors propelling the growth of the local and global access control market.

ACCESS CONTROL

SECURITY FOCUS | VOL 34 NO 5 2016 11

Page 13: Security Focus Africa - Vol 34 No 5 - May 2016

landscape for transactions and would grow at a high rate during the forecast period.

The government and transportation sectors are expected to hold the significant share of the automated fingerprint identification system market. The AFIS market for the government sector is expected to grow at the highest rate between 2015 and 2020. The use of AFIS in e-governance applications and by the law enforcement agencies would drive the AFIS market for the government sector. The market is also estimated to witness growth in banking and finance and hospitality sectors during the forecast period.

North America is expected to have the largest market share and dominate the automated fingerprint identification system market between 2015 and 2020 due to the presence of several players in the region. The North American AFIS market has offered several opportunities in various sectors, such as the law enforcement agencies like Federal Bureau of Investigation (FBI) (U.S.), using AFISs for criminal investigations.

The major vendors in the automated fingerprint identification system market identified within the research include 3M Cogent Inc (US), Morpho SA (France), and NEC Corporation (Japan), among others.

The scope of the report covers detailed information regarding the major factors influencing the growth of the automated fingerprint identification system market such as drivers, restraints, challenges, and opportunities.

A detailed analysis of the key industry players has been done to provide insights into their business overview, products and services, key strategies, new product launches, mergers and acquisitions, partnerships, agreements, collaborations, and recent developments associated with the automated fingerprint identification system market.

SECURITY FOCUS | VOL 34 NO 5 2016 11

Page 14: Security Focus Africa - Vol 34 No 5 - May 2016

XXX

LAUNCHING AT SECUREX 2016

DESIGNED AND MANUFACTURED in Poland, the FPX10 has developed the

biometric technology by expanding its functionality and application in businesses. We, at Active Track (Pty) Ltd, are the Polish manufacturer’s preferred African re-seller.

While it monitors time and attendance, much in the same way as traditional biometric systems, the FPX10 Biometric is able to capture data through fingerprints, as well as RFID tags. While biometrics generally use a five-point fingerprint recognition, FPX10 relies on a 21-point fingerprint identification, which ensures extremely accurate inputs insofar as the roll-call, and clocking in and out of staff is concerned. In addition to fingerprint identification, FPX10 is equipped with RFID tag recognition. This feature enables the FPX10 to monitor inter alia the movements of valuable assets, by attaching an RFID tag to each item, to be scanned when being checked in and out, respectively. As

an additional safeguard, one can demand that employees simultaneously scan their fingerprints, and the relevant RFID tags, when moving assets.

The brilliance of monitoring staff and assets with FPX10, is fully portrayed by the device’s GSM functionality, and Active View – FPX10’s web-based support platform. With these capabilities, employers are able to access data, in real-time. This feature allows the employer to determine, at any given time, exactly which employees and/or assets are clocking in or out of the designated premises, and the precise time thereof. Insofar as no-shows, late arrivals and early departures are concerned, the employer can rely on the data as a record of absenteeism, and take disciplinary action against the relevant member of staff. From a cost perspective, the time and attendance data stored on Activeview can be integrated into the employer’s payroll system, thereby ensuring that the employer only pays for hours worked –

The industry is no stranger to biometrics – a fingerprint scanner, monitoring employees’ clocking in-and-out times. However, the FPX10 has vastly improved and extended biometric capabilities.

FPX10: A cost-effective, revolutionary biometric solution

ADVERTORIAL

securexVisit us at

Stand B15

Tel: 011 551 1687 | Fax: 086 218 2928Email: [email protected]

Twitter: @ActiveTrackRSA

www.activetrack.co.za

MAIN FUNCTIONALITY:• Flexible patrol route• Real time processing of alarm events• Preview current GPS position on

the map• View devices route on the map• Call back request• Customised reports• Panic Button

The Active Track device

is efficient in tracking personnel via GPS. Door to door movements can be viewed and monitored via Google Maps. The system has the capability to record the duration of time a sales person is at a client and your driver is on the road. The Please Call Me button provides easy communication access to a sales person or driver and a Panic Button if the sales person is in distress.

FEATURES:• User Friendly • GSMVoice/SMS • RFID Reader • Panic

Function • Waterproof • Tamper Proof

• Man Down Function • Active View live

web-interface

A REVOLUTIONARY SECURITY DEVICE

that provides GPS location, real time monitoring and critical

two way communication with security guards or personnel

EasyRoster

Integrated with

workforce management

system

Page 15: Security Focus Africa - Vol 34 No 5 - May 2016

XXX

nothing more. In addition, an employer can reduce unwanted overtime, by regularly reviewing the real-time record of time and attendance.

At a practical level, the Active View portal allows the customer to edit and update the functionality and intelligence of each of its FPX10 devices, remotely. This would be particularly useful in a security company, where guards are rotated between a range of sites. The security company would simply log on to the portal, and move the relevant guard’s fingerprint intelligence from an FPX10 device stationed at one site, to an FPX10 device stationed at another. Once actioned, the guard would sign on for his shift at the new site, as he had done at the previous site. The data would automatically

adjust to reflect the new site on the guard’s profile, stored on Active View.

Due to its portable nature, the FPX10 is easy to install, and can be implemented in all labour-intensive industries. In a relatively short space of time, the FPX10 has been implemented in the security, mining, construction, hospitality, medical health, and landscaping industries. This wide-spread implementation bears testament to the diverse functionality and application of the FPX10.

While the primary focus of the FPX10 is to reduce the customer’s payroll, and improve the monitoring of its staff, it also assists in safeguarding the lives of those employees utilising the device, and the premises at which it is installed. This is achieved

through pre-programmed stay-awake, fire, medical, and emergency panic activations, which have been successfully relied on in distress situations.

In striving to be the lead supplier of FPX10 in Africa, Active Track (Pty) Ltd incorporates maintenance and technical support into the customer’s monthly rental fee. This monthly rental fee is substantially lower than industry standard. Reducing these costs, and implementing fixed monthly figures, offers us a sizeable advantage over competitors offering similar biometrics.

We, at Active Track (Pty) Ltd, invite you to contact us to arrange a demonstration on the FPX10 Biometric – the sophisticated professional in biometric technology.

FPX10THE MOBILE, MODERN, COST-EFFECTIVE BIOMETRIC TECHNOLOGY

Tel: 011 551 1687 | Fax: 086 218 2928Email: [email protected] | Twitter: @ActiveTrackRSA

The FPX10 monitors the time, attendance and whereabouts of employees, as well as the whereabouts of valuable assets, in real time, through fingerprint and RFID tag scanning.

This easy-to-install, maintenance-inclusive solution is a must for players in all labour-intensive industries looking to improve control over their staff and assets, and reduce their payroll.

Mobile

No maintenance costs

Suitable for all labour-intensive industries

Configured to specific site requirements

Data capturing through fingerprint and/or RFID tag

Accurate 21-point fingerprint recognition

GSM enabled, allowing for real-time monitoring and roll-call

Functionality and data can be controlled remotely, through the Active View online portal

Data can be integrated into Payroll Management Systems

Reduces unwanted overtime

Eliminates ghost employees

Pre-programmed stay-awake, fire, medical, and emergency panic functions

Can be used in conjunction with a personnel monitoring device – adding value to business

www.activetrack.co.za

Page 16: Security Focus Africa - Vol 34 No 5 - May 2016

14 SECURITY FOCUS | VOL 34 NO 5 2016

TECHNOLOGY UPDATE

With no dedicated infrastructure in place for IoT – i.e., to send, receive or transport IoT signals

– it is critical that first movers in South Africa begin to more fully explore the possibilities. The decisions they make now may well impact the cost and longevity of the solutions they are developing, and help determine the robustness of the foundations the country puts in place for IoT.

In South Africa, IoT presents a huge opportunity in key sectors, but uptake and development of IoT-driven solutions is still low outside of security, vehicle and asset tracking, and point of sale applications.

In addition, the capacity to implement change is lacking – simple solutions, such as tracking of dustbin collection and emptying, is slow to happen because organisations battle to put in place the skills and technology processes needed.

Clearly, more knowledge and awareness is needed in sectors to keep pace with opportunity – along with a sense of urgency.

IoT is coming. Are you ready?The slow pace of change in South Africa is likely to change quickly in the next few years as communication capabilities are built into more and more devices, the IoT

cloud grows exponentially, and disruptive solutions with better value propositions begin to emerge to oust incumbents in various sectors.

Quite simply, customers want better services and cost efficiencies, and IoT-driven applications and solutions offer exactly this.

First movers are already preparing for this future, but they need to focus on more than the development of the IoT solution and the integration of IoT to existing or new processes. They need to now take a careful look at the long-term implications of making use of IoT.

IoT signals vary from a field device sending tiny bits of information every few seconds or minutes, to devices that broadcast a signal every few hours or days. These are tiny bits of data, but for the IoT solution to work, the network that the data is sent along needs to be 100 per cent reliable.

There are few dedicated IoT network solution providers in South Africa. The major telcos all offer their own solutions.

But GSM is expensive for IoT, and with high congestion on most networks and limited remote coverage, it’s not nearly as reliable as it needs to be.

In addition, GSM is power hungry, requiring more bandwidth to move data. IoT data is characterised by small bursts of a few bytes of data.

Thus, using GSM networks, the battery technologies used in field devices, which ideally need to last two to five years or more, are quickly depleted. This will add to the cost of the solution.

Find dedicated IoT network providersIn Europe, the United States and elsewhere, dedicated networks with new topologies are being developed for IoT. These networks are geared to low power devices and

IoT is comingSouth Africa needs a dedicated network, standards, infrastructureThe Internet of Things (IoT) will, as it grows, automate and inform an increasing number of operations, applications and processes.

Page 17: Security Focus Africa - Vol 34 No 5 - May 2016

TECHNOLOGY UPDATE

low volumes of data, and feature a mesh of repeater stations to ensure 100 per cent throughput.

There are some options in South Africa. The globally defined Industrial Scientific and Medical (ISM) band which is also available in South Africa is open for use upon registration but investment in developing such a network is not insignificant.

As the IoT data payload is still low, this is not a very lucrative or attractive market yet, and there are few players champing at the bit to offer these services.

At present, because network choices are limited, companies offering IoT solutions select their own channel partners and mandate use of these networks.

Thus, when customers sign up for the service they may not have a choice of networks.

Similarly, organisations developing proprietary solutions are currently making use of whatever network provider solutions they can find, without fully investigating their options or understanding the long term impacts that network choices may

impose – in terms of costs and management of devices.

What South Africa needs is a set of reliable dedicated IoT network providers that guarantee data throughput and conform to global standards.

With IoT standards developing in China, the US and Europe, it will be important for South Africa to make a choice in terms of standards, and not default to the one most commonly used by operators.

Choosing an IoT network provider – top three considerations Key requirements for companies making use of IoT network providers include the following:• Be specific in terms of defining

requirements and needs – Is national or defined geographic coverage

needed– How often will data need to be sent and

received?– What connect and control specifications

are in play?

• Ensure the network provider is flexible– Can they adapt to your IoT application to,

for example, easily connect more devices, send more data more or less frequently, improve reporting?

– Do meet and incorporate key IoT standards

• High service levels are critical– Does the network service provider have

a network reserved and dedicated to IoT that offers high stability?In South Africa, commercial applications

of IoT are limited, but the opportunity and advantage that IoT presents across sectors is seeing a number of proprietary solutions emerge.

If you are gearing to make use of IoT, consider your options carefully. Be aware of the limitations and challenges and make use of solution providers that are flexible, established and experienced, and demonstrate their understanding of IoT technologies.

IoT technology is an emerging field but it’s going to be one that plays a big role in our digital future.

Page 18: Security Focus Africa - Vol 34 No 5 - May 2016

16 SECURITY FOCUS | VOL 34 NO 5 2016

OPINION PIECE

Contact us for a competitive quoteFULLY COMPLIANT

Tel: 011 551 1600 Fax: 011 485 2802

www.maxisecurity.co.za

WE WANT

BUSINESS!YOUR

Years of Experience25

For businesses or properties with large perimeters, standard CCTV imaging can pose significant

challenges. The biggest issue in surveillance lies in the lighting conditions of the area to be monitored, as regular CCTV cameras require adequate lighting to capture a usable image.

The solution lies in the use of thermal cameras that operate just as effectively by day as by night, without the need for additional lighting.

What are the shortcomings of conventional CCTV cameras? Weather can have a serious detrimental impact on its effectiveness as

Thermal cameras with analytics re-inforce perimeter security

heavy rainfall and dense fog can obstruct the camera’s view.

Such cameras are also affected by bright lights (like car headlights) and smoke which can be used to a criminal’s advantage.

Another vulnerability that’s easy to exploit is the fact that CCTV cameras require an additional source of light at night, which is why criminals do their best work under the cover of darkness.

One of the most useful applications for thermal cameras is perimeter surveillance and monitoring, as these military-grade cameras have low power requirements and multiple lens options to allow surveillance operators to view images in environments with little or no lighting.

Thermal camera technology detects “heat signatures” generated from objects and people to create an image of the environment, which is viewed on screen in black and white; black represents the environment as it should be and white highlights a perimeter threat, or an exception in the environment that triggers an alarm.

Intelligent video analytics applications used in conjunction with these cameras can automatically detect threats and distribute

The importance of surveillance for security purposes cannot be under-estimated. Its objective is to detect, prevent and deter criminals, as well as provide evidence that can be used in their prosecution.

By Laurence Smith, executive at Graphic Image Technologies (GIT) alerts in real time, leaving security personnel to effectively manage threats to the perimeter rather than expend effort in detecting them.

Video analytics technology is able to positively identify and protect against intrusion with up to 98 per cent accuracy and can differentiate between animals, humans and vehicles, which means fewer false alarms.

Knowing the nature and exact location of a perimeter alarm can help security operators to respond quickly and appropriately and stop the intruders before any harm is done, which can be challenging in geographically-isolated areas such as estate, farm and factory perimeters, where the perimeters could be many kilometres long.

The addition of thermal cameras to an existing CCTV system is uncomplicated and is therefore advisable in those areas where conventional CCTV surveillance is insufficient or not viable.

Unaffected by bright light, thermal cameras can penetrate through dust, smoke and any adverse weather conditions with an effective detection range of between 200-400 metres, depending on the lens used. Because of this range, using thermal cameras can even be used to reduce the overall number of cameras required in a surveillance set up.

Ensuring that CCTV surveillance footage is effective on a 24/7 basis no matter what the season, is one of today’s biggest challenges in the security field.

With thermal imaging cameras and video analytics intelligence, security operators can be assured that the perimeter is secure and that intrusion will be detected no matter the weather or time of day.

Page 19: Security Focus Africa - Vol 34 No 5 - May 2016
Page 20: Security Focus Africa - Vol 34 No 5 - May 2016

COMPANY NEWS

As part of the agreement, IPVS will distribute the Genetec portfolio of software and hardware, and

network security appliances throughout Southern Africa.

"The African region represents a significant emerging market for unified open-architecture, IP security solutions, and we are very pleased to add IPVS to our list of authorised distributors," said Ted Ghali, vice-president and managing director, sales EMEA, Genetec Inc.

"With the market knowledge and extensive customer base of IPVS, we are confident we will be able to continue to broaden our market reach in Southern Africa.

Customers will benefit from a solid source of expertise and product choice for all their physical IP security needs, from a company that offers unified, open-platform versatility," added Mr Ghali.

Marnix de Lorm, director, IPVS says Genetec is one of the world's leading manufacturers of unified, open-platform, IP-based security solutions and IPVS is looking forward to playing a significant role in the company’s growth in Southern Africa.

“We look forward to extending Genetec physical IP security solutions to our customers, offering them more choice and the ability to purchase truly independent, open-platform solutions."

Distribution partnership announcedIP Video Solutions (IPVS), a leading security systems distributor and integrator in South Africa, has announced that it has signed a distribution agreement with Genetec Inc. (“GENETEC”), a leading provider of open-platform, unified IP security solutions.

Mr de Lorm says an exciting opportunity for IPVS is to work with the company’s flagship product, Genetec Security Centre – which seamlessly unifies access control, video management systems (VMS) and automated number plate recognition (ANPR) within a single intuitive interface that simplifies operations.

IPVS will also be adding to its channel of certified Genetec resellers in Southern Africa.

“We are very excited about expanding our network of certified integrators and resellers.

“The Genetec appointment will significantly boost the channel as we provide an opportunity to sell the world’s premier IP security system,” concludes Mr de Lorm.

GUARD TOWERS – A major deterrent, from car thieves’ in parking lots to custom designed bullet proof towers for high risk theft/assault applications.

Says Venessa Mitsingas, Managing Director of John Elliott Security: “Our company is the market leader in the design, manufacture and installation of guard towers from moderate risk to ultra-high risk applications. This is done in association with our design and manufacturing facility at our Wadeville, Germiston production facility.”

The guard tower design function is headed up by our Senior Executive Ms Desiree De Andrade who has more than 10 years’ experience in the design, manufacture and installation of guard towers. Desiree manages this division, and her knowledge of customer needs is her speciality.

Says Desiree: “Interpreting and understanding customer needs is paramount. Our company has recently installed three custom designed and built guard towers for a major mining group at their cable storage areas, where cable theft was out of control. Since installing the guard towers cable theft has all but been eliminated. We are currently consulting with San Parks in the North of the Kruger Park bordering Mozambique, on Guard towers to counter Rhino poaching.”

John Elliott SecurityJohn Elliott Security Est. 1980

Please direct all enquiries to Desiree De Andrade Tel: 011 452 3649 | Email: [email protected]

Page 21: Security Focus Africa - Vol 34 No 5 - May 2016

Visit us at Securex 2016 24th – 26th May, Stand C10 Hall 2Gallagher Convention Centre Johannesburg

» For more information visit www.paxton.info/2463

A global brand of access control and door entry systems• ProductsIP ready, wired and wireless electronic access control and door entry solutions

• Seamless IntegrationEasy integration with CCTV, fire alarm, intruder alarm and biometric systems

• Ultimate SupportIndustry leading technical support and five year product guarantee

• Training & EducationFree practical and sales training, ensuring you always offer the best solution

Paxton

www.paxtonaccess.co.za

New training

dates now available

SecurityFocus_Securex2016_Paxton_fp_210x297mm_2016-04.indd 1 22/04/2016 10:30:20

GUARD TOWERS – A major deterrent, from car thieves’ in parking lots to custom designed bullet proof towers for high risk theft/assault applications.

Says Venessa Mitsingas, Managing Director of John Elliott Security: “Our company is the market leader in the design, manufacture and installation of guard towers from moderate risk to ultra-high risk applications. This is done in association with our design and manufacturing facility at our Wadeville, Germiston production facility.”

The guard tower design function is headed up by our Senior Executive Ms Desiree De Andrade who has more than 10 years’ experience in the design, manufacture and installation of guard towers. Desiree manages this division, and her knowledge of customer needs is her speciality.

Says Desiree: “Interpreting and understanding customer needs is paramount. Our company has recently installed three custom designed and built guard towers for a major mining group at their cable storage areas, where cable theft was out of control. Since installing the guard towers cable theft has all but been eliminated. We are currently consulting with San Parks in the North of the Kruger Park bordering Mozambique, on Guard towers to counter Rhino poaching.”

John Elliott SecurityJohn Elliott Security Est. 1980

Please direct all enquiries to Desiree De Andrade Tel: 011 452 3649 | Email: [email protected]

Page 22: Security Focus Africa - Vol 34 No 5 - May 2016

20 SECURITY FOCUS | VOL 34 NO 5 2016

RESIDENTIAL SECURITY

OMEGA

mode management while the IdentiSafe integration for reference checks, criminal record checks, driver’s licences, credit reports, fraud Llstings with SAFPS, and PSIRA registration.

New information and communication technologies allow REMC’s to obtain more (and improved) information and use it to provide more services to the estate management and residents than ever before.

Unless the impact of these technologies on human operators is considered and addressed, the expansion of capabilities and responsibilities for the REMC could potentially create excessive workloads for REMC staff. Furthermore, the introduction of new, complex information display and control systems creates an increased likelihood of system-induced human errors.

Maximising operator effectivenessIn order to maximise the efficiency of REMC operators and systems and minimise error rates, the REMC must be designed from a human factors perspective. This implies that Estate management, together with the designers and installers of the REMC need to explore and define the role of computers and humans within the context of PISM systems. Some of the biggest challenges experienced during implementation at Serengeti have included operator resistance to change, changes in skills set required, motivating the business model and demonstrating the return on investment in terms of efficiency and effectiveness.

To further enhance the security at residential estates they will over the next five years have to migrate

towards adopting some elements of a physical integrated security management system (PSIM). This can be done by borrowing advanced system, information, and control technologies and wedding these to existing, relatively low-technology estate management hardware.

“Omega Security Solutions has been working in close collaboration with the Serengeti Residential Estate on a comprehensive security management system, which includes the installation of a physical integrated security management system (PSIM), that will assist us in increasing the efficiency and effectiveness of our security operation at Serengeti,” says Roy Rawlins, managing director of Omega Risk Solutions.

Hannes Hendriks, Serengeti Estate manager adds that the Axxon Intellect system applied is an advanced physical security software platform that combines intelligent video analytics, universal IP connectivity and event-driven automation capabilities in a single environment. CiiMS Professional is an integrated application, which is further utilised to capture and manage information related to incidents, risk management, investigative and law enforcement environments.

“The installation of these technologies has enabled some core functionality. This allows for the integration of digital video surveillance and audio monitoring systems with existing data systems, various security equipment, and auxiliary software, using integrated open interfaces for data exchange,” adds Mr Hendriks.

It also enables security management to load occurrences, investigations, and incidents and set up automated email/SMS notifications for occurrences, incidents, and completed checklists and job cards.

The Signal Tower integration allows for alarm management, monitoring, the management of response teams and disaster

The human factor in residential estate management centres (REMCs)While advanced technology has the ability to revolutionise risk management for estate security, these technologies are often not applied to their full potential. In order to maximise the application of newly developed systems, it must be designed to be aligned with the needs, expectations, capabilities, and limitations of the day-to-day operator. Full account also need to be given to the increased skill requirement of the operators.

To maximise the benefit, the level of human skills required on the REMC is of a high calibre. A detail skills matrix has been designed and incorporates elements such as conceptual ability, detail orientation, judgement, decision-making and analytical skills at a higher level than is normally required in the typical control room. However, the results speak for themselves. There have been zero perimeter breaches at Serengeti since February 2010.

Maximising the ranger’s (security officer) effectiveness“The installation of technology, processes and systems is only as good as the people that respond to it,” says Mr Hendriks.

“The Rangers (Security Officers) that respond must have the knowledge, skills and ability to attend to the situation, with the right equipment (vehicle, communication, handheld night sight, tabled to navigate on and to send an incident rapport), which integrate directly with the technology and software in the REMCs, to allow operators to make decisions, and to escalate priorities to the management,” he adds.

“Omega Risk Solutions has aligned its manpower and training requirement to specifically meet the additional challenges as outlined above,” says Mr Rawlins. “The Omega Risk Solution Training Academy is uniquely positioned to provide custom designed training that specifically meet the requirement of rangers (security officers), REMC operators, and estate supervisors,” he says.

Taking it furtherThe next step at Serengeti is to integrate some estate management software onto the security platform. This will provide for a total new dimension to security management whereby the security platform will directly contribute towards the efficiencies and effective running of a residential estate.

Page 23: Security Focus Africa - Vol 34 No 5 - May 2016

Keep the essence with Axis’ Zipstream technology. Optimized for video surveillance, Axis’ Zipstream technology is a radically more efficient H.264 implementation. Zipstream lowers bandwidth and storage requirements by an average 50% or more for many common 24/7 surveillance use cases - all without losing forensic details.

www.axis.com/zipstream

Squeezed storage.

axis_ad_zipstream_secfocus_a4_en_1604.indd 1 2016-04-18 13:26:03

Page 24: Security Focus Africa - Vol 34 No 5 - May 2016

22 SECURITY FOCUS | VOL 34 NO 5 2016

COMMERCIAL SECURITY

Employees that commit theft, armed robbery and information security are major concerns, and companies

invest heavily with the aim of bolstering security, protecting people, and solving security problems.

This requires alarms, fire protection systems, video surveillance, access control systems, and intrusion detection devices. All technology that, in the hands of capable security operators, can significantly reduce risk, cut losses and keep people safe.

The problem, however, comes with the challenge of keeping security staff trained on distinct stand-alone systems.

If each of the key components of security – namely intrusion detection, access control, and video surveillance – is purchased separately, the training and administration thereof can become a costly burden.

Instead of having intrusion alarms on one system, administering access control on another standalone database and having intelligent digital video technology run elsewhere on its own dedicated computer equipment. By integrating these separate systems under a flexible automated system, the need to have separate service, maintenance, administration, and training for each system is eliminated.

An integrated solution allows office park administrators and the like to realise a lower upfront investment for a security system that is more powerful. Installation and training

occur on a single system and running costs like service and maintenance are also cut significantly, as one company becomes responsible for all of that.

An efficient, automated integrated system would be worthless without high-quality input devices. CCTV cameras are an important security component at office parks, buildings, in hallways as well as parking areas.

This is where efficiency can be improved even further in the commercial environment, by using next-generation component devices.

Ultra-high resolution cameras (“4K cameras”) can be used in the surveillance security, and these newer cameras have embedded processors that enable video to be compressed within the device and transmitted real-time over IP networks to network video recorders (NVRs) that centrally manage video feeds from numerous IP cameras.

Streaming video can be continuously recorded and if an incident occurs, disk indexing and time-stamping make it easier to find video from a set date and time.

As for the implications of the Protection of Personal Information Act (PoPI) on surveillance footage, the system’s video management software has the facility to re-record over the oldest information.

Where, in some organisations footage is required to be digitally available and stored for a period of 30 days (or longer), the NVR will replace expired footage when the

network storage space has been depleted.Where, for example, PoPI states that

certain information cannot be kept for more than 30 days, the management system can be programmed so that it erases information after 30 days.

How is this possible? Behind the CCTV system lies an intelligent video analytics engine that increases the productivity of security staff that are tasked with monitoring many cameras.

This technology examines the 4K camera’s field of view for patterns of movement that indicate something is happening out of the norm, like someone climbing a fence, running a tripline, etc.

Video analytics allows the security operator to focus on managing surveillance by exception events rather than having to monitor all events for an exception.

By using an integrated approach in commercial properties, the companies and the occupants who work in such buildings will benefit.

Integration means lower installation and operating costs, because it cuts out component and system redundancy and allows for the streamlining of security operations.

As a result, it reduces training requirements and enables security operators to perform their duties more efficiently, which in turn contributes to enhanced safety and security which is, at the end of the day, a massive feat.

By Laurence Smith, Executive at Graphic Image Technologies (GIT)

Owners and operators of commercial facilities are no longer looking for individual security solutions. Today, they want a package that offers all the aspects of security they need. Whether a property is owner-occupied or tenant-occupied, providing the most efficient security to ensure the safety of people and the protection of intellectual and physical property is critical.

It’s all about integration these days

Page 25: Security Focus Africa - Vol 34 No 5 - May 2016
Page 26: Security Focus Africa - Vol 34 No 5 - May 2016

24 SECURITY FOCUS | VOL 34 NO 5 2016

OCCUPATIONAL HEALTH AND SECURITY

When one considers that the mining sector has some of the highest rates of intoxication

in the workplace, the importance of this security aspect becomes clear.

Employees entering the mining workplace while under the influence of alcohol or drugs not only pose a health and safety risk, they are typically less productive than their sober colleagues, effectively stealing time from their employers.

While substance abuse is not traditionally considered an element of mining security, it does introduce risk and an element of theft, and should form part of any comprehensive security solution.

Mining by its very nature is a hazardous environment, involving heavy and often dangerous equipment as well as challenging working conditions.

Accidents can happen even if the entire workforce is sober and alert.

However, the chances of an incident occurring are multiplied drastically when one introduces alcohol and drugs into the mix. Alcohol and drugs have a negative effect on

behaviour and reaction times, not to mention the productivity of employees.

Employees who are not productive as a result of such intoxication are not working to their full capacity, and this theft of time is an aspect that is often not considered as part of security strategy.

In addition, risk mitigation should always form part of security strategy, and reducing employee risk is essential.

In order to achieve this, it is essential to put effective substance abuse policies and procedures into place.

While random testing is typical and can deliver some benefit, this approach fails to identify the majority of mining employees affected by alcohol or drugs.

This not only introduces an unacceptable level of risk; it has the potential to negatively impact the productivity of the entire mine.

Mandatory testing of each employee at the start of every shift needs to be included in the security policies of mining organisations.

This approach has been proven to be highly effective, particularly where safety regulators enforce this as a daily, compulsory practice.

In addition to compulsory daily testing, it is also essential to include educational programmes on the dangers of alcohol consumption in the workplace.

Such programmes should include real-world examples of the consequences of actions taken under the influence. When combined with compulsory alcohol testing, such practices can act as a significant deterrent to the use and abuse of alcohol in the workplace.

The Occupational Health and Safety Act specifies a zero tolerance approach toward alcohol and drug use in the workplace.

In addition, the South African Mine Health and Safety Act states that employers must provide conditions for safe operation, and may not permit intoxicated employees to enter mines.

However, the benefits of minimising the risk posed by substance abuse in mining go beyond simple compliance.

By including substance abuse into security, identifying intoxicated employees and not permitting them to enter a mine, mine owners can improve employee safety as well as ensuring maximum productivity.

Effective substance abuse policies and procedures requiredWhen it comes to security in mines, the major focus tends to be on preventing theft and unauthorised access, as a result of the high value commodities involved in the industry. However, comprehensive safety and security needs to cover so much more, including aspects such as theft of time, as well as risk to employees. By Rhys Evans, Director of ALCO-Safe

Comprehensive mining security

Page 27: Security Focus Africa - Vol 34 No 5 - May 2016

stage. This would afford the syndicate ample time to remove limestone, without raising an alert.

However, the security official was ignorant of the fact that each Active Track device is tamper-proof, and that any attempt to dismantle it, triggers an alarm in the Active Track call centre.

The call centre immediately alerts the customer, who, in turn, dispatches a response vehicle to look into the incident.

Prompted by a call from the Active Track call centre, a member of the security company’s response team arrived on site, shortly after the guard had unscrewed the back of his Active Track device.

The response team member witnessed the syndicate loading its bakkie with limestone, and alerted the police. The police arrived on site, where they apprehended the members of the syndicate as they attempted to flee the mine.

In addition, the security company was able to take the appropriate disciplinary action against the rogue guard, through reliance on Activeview, Active Track’s online portal, which tracks real-time movements of each device; and records all alarms triggered, and panic buttons activated.

CASE STUDY

Of particular importance to the quarrying company was the safeguarding of limestone, the

mineral forming the subject of the company’s mining right, portions of which had been stolen on a number of occasions. Considering that the new security company utilised Active Track devices; and that their managers were properly trained by Active Track to optimally use the technology, their appointment was an easy decision.

Unbeknown to the quarrying company, a syndicate had been targeting security officials posted at its Limpopo mine, for some time. It had been bribing the official posted at the main entrance to the mine, to abandon his post at specified times, to allow its team to enter the mine and remove loads of limestone. The syndicate extended its influence by targeting the new guards posted at the mine’s main entrance.

The first guard who had been persuaded to abandon his post, resolved to sabotage his Active Track device, so that the Active Track 24-hour call centre would not have evidence of a failed patrol (and would consequently not notify the security company) and would, instead, put it down to a technical error, to be remedied by its technical team at a later

ACTIVE TRACK

At the end of its contract with a particular security company, a prominent quarrying company appointed a new entity to render security services at its Limpopo mine.

The tamper-proof guard monitoring device

Active Track is a rugged, reliable tool that creates certainty that the job has

been done.

The Ideal Personnel Monitoring Solution

Tel: 011 551 1687 | Fax: 086 218 2928Email: [email protected]

Twitter: @ActiveTrackRSA

www.activetrack.co.za

The FPX10 monitors the time, attendance and whereabouts of

employees, as well as the whereabouts of valuable

assets, in real time, through fingerprint and

RFID tag scanning.

ACTIVE TRACK

FPX10

SECURITY FOCUS | VOL 34 NO 5 2016 25

Page 28: Security Focus Africa - Vol 34 No 5 - May 2016

26 SECURITY FOCUS | VOL 34 NO 5 2016

ON THE MARKET

Exclusive supplier of cellular telephone detection systems to secure correctional and government facilities!government facilities!

Tel (012) 665-2077 (International +2712)

[email protected] www.celldetect.co.za

According to an article in the Times Live on 23 December 2015, Deputy Minister Thabang Makwetla, said “that the Department of Correctional Services (DCS) should be

embarrassed at the number of cellphones found in prisons during Operation Vala over the festive season.”

The fight against contraband cellular telephones should be based on a number of pillars, such as implementation and enforcing of current laws, rules and regulations that prohibit cellular telephones in the correctional facilities. There should be no fear or favour in enforcing the “no cellphones in prison” rule. It should also be clear to every correctional officer, visitor and others who have access to the prisons what the penalties are when caught with a cellular telephone.

A strategy that proposes a “one size fits all” and does not distinguish between the protection requirements of different types

of facilities is doomed to fail. A facility that caters for awaiting trail prisoners should rather focus on prevention and when inmates come back from court, or when receiving visitors.

A long-term facility, on the other hand should focus more on their own staff and those who have contact with the long term inmates. “At the end of the day it is a correctional officer doing duty at the front door, a correctional officer allowing inmates or visitors in and out and it is a correctional officer [with a hidden cellphone] that can move right from the front door to the most secure cell in the facility” – Gary L Heyward. It is important that correctional departments and facilities procure the correct technology which is appropriate for its own unique situation and challenges.

CellDetect will exhibit the latest and most modern technology at Securex that can prevent cellular telephones from entering correctional facilities such as the SentryHound Cell Phone Detection Portal.

Where a cellular telephone has made its way into a facility, CellDetect has the right technology such as the SearchLight GSM Detection System that can remotely identify cellular telephones in a specific facility and with the right strategy will allow a prison to remotely deactivate cellular telephones, rendering it useless. It is no longer necessary to conduct physical searches that are dangerous, expensive and requires lots of manpower.

Fighting contraband cellphones in correctional facilitiesOne of the critical issues facing correctional facilities in South Africa is the growing problem of contraband cellular telephones inside our prisons. It is a serious security issue that requires continuous attention and the correct strategy and equipment.

Purpose-built for surveillance, WD Purple can handle the stresses of this always-on environment, and is ideal for

high-definition security systems that use up to eight hard drives and up to 32 cameras.

With eight 8TB hard drives in place giving you 64TB of capacity, even 4K video can now be stored with ease.

Advanced technology adds longevity and reliability to these drives, ensuring they are always on and always operational for critical security surveillance installations.

The Purple drives are engineered specifically for surveillance and able to withstand the extreme

4K surveillance storage sortedWith ultra-high definition (4K) surveillance becoming increasingly common, storage space can become a challenge. The WD Purple 8TB drive offers the ideal solution.

Page 29: Security Focus Africa - Vol 34 No 5 - May 2016

SECURITY FOCUS | VOL 34 NO 5 2016 27

ON THE MARKET

Cyber TSCM™ SurveysAll confi dential areas and data

centres for covert surveillance devices

Tel (012) 665-2109 (International +2712)www.tscm-za.com • [email protected]

EDS will be supported during the exhibition by Pete Denson from Research Electronics International

(REI) (USA). EDS and REI will be doing presentations on technical surveillance countermeasures and telephone security in the Securex Seminar Theatre on Tuesday 24 and Thursday 26 May 2016.

We are at the dawn of various cyber technical surveillance risks and many organisations have gaps in their cyber technical surveillance countermeasures risk management programmes.

Given the cross functional and high nature stakes involved to protect corporate information, TSCM resilience can only be achieved through the conduct of regular Cyber TSCM and technical

Technical surveillance countermeasures

surveillance countermeasures surveys. Conducting surveys is not enough unless it is conducted by the correct service provider with the right equipment.

EDS will exhibit a number of new products that have been specifically designed for professional TSCM teams to counter the latest threats on the GSM, Wi-Fi, Bluetooth and IoT networks.

On display will be the new Orion 2.4 HX (3.3W) and the Orion 2.4 HX 6.6W (Government version) Non-Linear Junction Detectors by Research Electronics International (REI) (USA).

The ANDRE (Advanced Near Field Detection Receiver) by REI will be introduced in South Africa for the first time during the exhibition.

4K surveillance storage sorted

Eavesdropping Detection Solutions (EDS) will be exhibiting the latest and most modern technical surveillance countermeasures and Cyber TSCM equipment at the upcoming Securex exhibition.

heat fluctuations and equipment vibrations within a Digital Video Recorder (DVR) environment. This means that video playback will always be reliable and high quality, a necessity in the surveillance environment.

In addition, exclusive WD AllFrame technology improves ATA streaming to reduce errors, pixilation and video interruptions that typically occur when desktop hard drives are incorrectly used as storage in security systems.

WD Purple offers reliable surveillance-class storage, tested for compatibility in a wide range of security systems, with enough capacity

to store footage from even the highest definition security cameras.

With support for up to 32 cameras, WD Purple 8TB drives also offer the flexibility to upgrade and expand security systems in the future, protecting your investment and maximising compatibility.

The WD Purple drives feature a three-year limited warranty for additional peace of mind and confidence.

Page 30: Security Focus Africa - Vol 34 No 5 - May 2016

ON THE MARKET

ORDER NOW [email protected]

www.fsk.co.zaCall Center 0861 105 962

The Rhino 232 Security Alarm Panel is a fully integrated, portable and user friendly life companion – available in the market today.

The Rhino 816 is the most aesthetically

pleasing, feature rich, high performing Security Alarm Panel available in

.yadot tekram eht

BUILT STRONG TO PROTECT

WHAT MATTERS MOST.

FSK IS AT

24-26 MAY ‘16 | HALL 2, STAND D04GALLAGHER CONVENTION CENTRE, JHB

JOIN FSK AT SECUREX TO VIEW THEIR RANGE OF SECURITY ALARM SYSTEMS.

Today, they offer three solutions that provide a full suite of features entirely suited to facilities and field managers.

As a leading time and attendance supplier, Econz mobile solutions enable management to eliminate paper timesheets, track employees via GPS, lower fuel costs, and prevent time theft. Their solutions include:• Econz Eservice GPS – a mobile field service dispatch and work

order management system that works on mobile phones and tablets. Eservice is web-based software that enables a field service team to receive and respond to customer work orders.

• Econz Timecard GPS – a mobile time, attendance, and GPS tracking application that works on mobile devices (Android, Apple, Rugged Phone, etc). Timecard is ideal for companies where time and attendance tracking is helpful for ensuring job completion and maintaining accurate records of working hours

One-stop mobile workforce management system available

Econz Wireless has been providing mobile time and attendance solutions across the globe for more than 30 years and mobile solutions to the global security sector for more than 40 years, and today’s technology is key to operating a leading security business, small medium or large.

and job types. Building contractors, home healthcare, security guards, distribution, utilities, services and manufacturing companies all benefit by using Econz Timecard.

• Timecard Lite GPS – Timecard Lite is our timecard GPS application without the time and attendance reports. For companies that are just looking for GPS tracking, Timecard Lite would be the product of choice. Timecard Lite’s GPS tracking is available on cellphones and tablets – Android, Apple iOS and new BlackBerry.

“Managing a workforce, be they security guards or maintenance staff within a large building or a campus consisting of several buildings, is no easy job,” says Thomas Marshall, Econz Wireless national sales director, South Africa.

“If the building owner or tenants want prompt maintenance service, while containing costs and ensuring jobs are completed

Page 31: Security Focus Africa - Vol 34 No 5 - May 2016

ORDER NOW [email protected]

www.fsk.co.zaCall Center 0861 105 962

The Rhino 232 Security Alarm Panel is a fully integrated, portable and user friendly life companion – available in the market today.

The Rhino 816 is the most aesthetically

pleasing, feature rich, high performing Security Alarm Panel available in

.yadot tekram eht

BUILT STRONG TO PROTECT

WHAT MATTERS MOST.

FSK IS AT

24-26 MAY ‘16 | HALL 2, STAND D04GALLAGHER CONVENTION CENTRE, JHB

JOIN FSK AT SECUREX TO VIEW THEIR RANGE OF SECURITY ALARM SYSTEMS.

properly, timeously and efficiently, then your team has to be managed equally efficiently.”

It’s the same for security, Mr Marshall says. “Whether we look at guarding, on booms and in cars, or checking that routes are being followed precisely, on time, and that staff are always awake, supervisors and contact centres need to know the location of everyone, anywhere, any time.”

Facilities managers often present with a set of very specific challenges. These include:• Time and attendance – for permanent, casual and shift workers.• Team clock in – where a team leader responsible for one

area, floor or building can log in his team on one device. This is transmitted back to head office and integrates into over 100 payroll systems, thus eliminating all inaccurate paper time sheets and relieving the payroll admin staff of hours of checking, as well as ensuring accurate payments and cost savings.

• Staff tracking – the facilities manager can pinpoint all staff via an accurate web-portal from the comfort of his office, as well as produce up to 29 management reports on staff activities.

• Job dispatch and parts management – managers are able to dispatch maintenance staff very efficiently to carry out repairs, receive before and after photos for job completion and quality, and see the completed parts lists, again via a web-portal.Customers have reduced

time theft, consumables theft (such as cleaning products), increased customer service quality and satisfaction, and provides almost immediate return on investment.

ON THE MARKET

BENEFITS INCLUDE:• Low entry cost• Little or no capex• Low monthly cost• Low set up costs • Almost any mobile device • Increased customer

service levels• Fuel savings• Integration with

company payroll• Reports substantiate any

labour disputes• Works anywhere,

anytime

SECURITY FOCUS | VOL 34 NO 5 2016 29 +27 (0) 11 401 6700 www.elvey.co.za

RISCO Stars Partners Program

Choose RISCO, Collect Stars and Benefit!

The RISCO Stars Partners Program is a specialized incentive plan designed for installers of RISCO Group products. Choose RISCO and we will help you to boost both your skills with specialized training courses, and your business with promotional tools for increasing your visibility and attracting more clients.

With every RISCO Group product purchase and every training course completed, you will receive a designated number of Stars. Collect the Stars in your personal account and redeem them for our selected promotional tools designed to help you increase your market reach.

Download the RISCO HandyApp Installer’s app, register, and start earning Stars today!

Boost your Business with RISCO Stars!

r i s c o g r o u p . c o m

Page 32: Security Focus Africa - Vol 34 No 5 - May 2016

30 SECURITY FOCUS | VOL 34 NO 5 2016

INTERNATIONAL NEWS

30 SECURITY FOCUS | VOL 34 NO 3 2016

introduced digital recording to the entire CCTV industry, came from Dallmeier.

The multifocal sensor system Panomera will have a similarly groundbreaking effect. This unique and novel camera technology will revolutionise the market and open up completely new possibilities to the video security industry.

This and the extensive experience in the CCTV and IP field have led to a top position

The emblem of the Ostdeutsche Galerie is the four enormous red pillars at the entrance to the Kunstforum, which were installed in 2006 by Czech artist Magdalena Jetelová.

Regrettably, in June 2014, this work of art was seriously damaged in an arson attack, and the museum management resolved to install a video surveillance system to better protect its art, particularly the items in the outdoor area.

Just a few days later, the video expert Dallmeier supplied a demo system, which was tested thoroughly and ultimately preferred over its competitors.

Today, the four pillars have been completely renovated, resplendent in their restored vibrant red, and the video system from Dallmeier is also working well.

Over the years, Dallmeier has repeatedly given fresh impetus to the market with new developments and extraordinary innovations. The world’s first DVR, for example, which

Video technology from Dallmeier protects Ostdeutsche Galerie Modern video technology from Dallmeier is protecting the Ostdeutsche Galerie in Regensburg. Following an arson attack in 2014, it was clear that more effective security measures were needed. The red pillars were seriously damaged in

an arson attack in June 2014.

The “Kunstforum Ostdeutsche Galerie” in Regensburg is an exceptional art museum with a

unique mission – this is where the artistic heritage of the eastern European cultural regions, previously suffused with German influence, is preserved.

The museum’s collection includes about 2 500 paintings and sculptures, and 30 000 prints by internationally renowned artists.

Page 33: Security Focus Africa - Vol 34 No 5 - May 2016

SECURITY FOCUS | VOL 34 NO 5 2016 31

INTERNATIONAL NEWS

in the international market for digital video surveillance systems.

Installation compliant with monument protection regulationsThe new Dallmeier cameras were mounted in accordance with the strict instructions of the agency for protection of monuments and are trained on the entry portal of the Ostdeutsche Galerie.

The IP cameras are fitted with integral infrared lighting, which enables them to deliver highly detailed images even at night.

Data is recorded on a VideoNetBox II, a compact video appliance that was built into

the museum’s server cabinet. The museum has two video workstations,

where the images from the surveillance cameras can be analysed if there is an incident.

The museum hopes the new cameras will serve as a deterrant and convince potential offenders to abandon their plans.

Investment protection for the foundationMaximilian Obermeier, managing director and a member of the management board of the Ostdeutsche Galerie foundation, is satisfied.

“As a foundation, we are duty-bound to handle budget funds carefully. So when we were looking for a provider of professional video technology, it was important for us to get top-quality products with the latest technology.

“It was also very important to be able to keep the video system up-to-date with new software for many years, and if necessary to expand it with hardware extras. This represents investment security for our foundation,” says Mr Obermeir.

“Dallmeier offers video security systems with a special museum solution. We believe that in Dallmeier, we have found exactly the right partner,” he concludes.

The PSI Premier Awards

are unique as readers of the PSI

magazine, including professional security

installers, specifiers and consultants, vote for their preferred innovative product.

The external Pearl triple-tech wired detector is a highly advanced PIR and microwave technology system, designed to provide extremely effective security against potential crime.

Mark Tibbenham, managing director, comments: “GJD is truly honoured to have the Pearl detector nominated for the PSI Premier Awards for a second year running. This is a strong indication and recognition of all the hard work the team at GJD have invested. I would like to congratulate all our staff whose dedication has resulted in this prestigious nomination”.

GJD was established in 1983 and has an extensive portfolio of security products, which are manufactured in-house. All products are 100 per cent

tested and supported by a dedicated team who provide knowledgeable expertise and support.

The Pearl detector may be small in size yet its quality, reliability and technological performance is exceptional.

The innovative design incorporates PIR,

GJD’s Pearl detector shortlisted for PSI Premier Award

GJD’s Pearl detector has been nominated in the Intruder Product of the Year Award 2016. This is the second year in a row that GJD has been nominated as a finalist in the PSI Premier Awards.

microwave sensing and an anti-masking system, providing robust triple protection.

The Pearl detector is a high-end product designed to protect residential, commercial or industrial premises. Its compact size and unique features make it an ideal solution for all security requirements.

Page 34: Security Focus Africa - Vol 34 No 5 - May 2016

32 SECURITY FOCUS | VOL 34 NO 5 2016

INTERNATIONAL NEWS

The DF5200HD-IR-ANPR is a special camera with integrated IR illumination. The images provided by

the camera are optimised for the automatic recognition of vehicle number plates on a SEDOR ANPR Server appliance.

Equipped with the most advanced sensor and encoder technology, a powerful IR illumination and a special optical filter, the camera provides high-resolution and

monochrome video footage. This is the ideal base for a precise and fast 24-hour number plate recognition, regardless of environmental conditions or changing lighting at day and night.

The camera features an outstanding infrared sensitivity and permanently supplies infrared images with excellent contrast. The restriction on the infrared range allows for the elimination of disturbing daylight and ambient conditions.

In addition, the intense IR reflection of modern number plates is optimally utilised. This enables recordings with brilliant clarity and highest detail resolution, ideal for a precise number plate recognition in a 24/7 operation.

The outstanding infrared sensitivity of the camera is supported by the integrated homogeneous IR illumination. It is based on

Dallmeier launches new special camera for number plate recognition

semi-covert 850 nm high power LEDs and permits an illumination range of up to 18 m.

The camera is equipped with special presets in order to provide optimum recordings for the number plate recognition with SEDOR ANPR Server.

This allows the quick and easy adjustment of the settings to different capture ranges. Individual adjustments of the camera settings are usually not required.

The camera is equipped with a RAM memory that is used by the EdgeStorage function for storing the video stream in case of a network failure.

When the network is restored, the SmartBackfill function ensures a fast transmission to the SMAVIA recording system.

This stores the video stream with high speed and then continues the recording of the live stream seamlessly.

With the DF5200HD-IR-ANPR Dallmeier launches a new special camera whose images are optimised for the automatic recognition of vehicle number plates.

Page 35: Security Focus Africa - Vol 34 No 5 - May 2016

SECURITY SKILLSPROGRAMMES

Introduction

BTC Training Africa is an accredited safety and security sector education and training authority (SASSETA) training provider whopresents the South African Qualifications Authority (SAQA) registered qualification: The National Certificate in general securitypractices (NQF level 3).

The skills programmes 1, 2 and 3 form part of this qualification and each programme has credits towards the full qualification (124credits).

These skills programmes replace the PSIRA Grades E to C.

Each skills programme is for a duraration of six days.

On successful completion of the skills programme you will be awarded a Sasseta certificate.

A payment plan is available.

The SkillsProgrammes

081965442557

ID Unit Standard Title Level Credits

Core 244176 Usesecurityequipment Level2 2

Core 244184 Applylegalaspectsinasecurityenvironment Level3 8

Core 244177 Conductasecuritypatrolinanareaofresponsibility Level3 7

Core 246694 Explaintherequirementsforbecomingasecurityserviceprovider Level3 4

Core 244182 Giveevidenceincourt Level3 4

Core 244179 Handlecomplaintsandproblems Level3 6

Core 244181 Performhandoverandtakeoverresponsibilities Level3 2

Core 12484 Performbasicfirefighting Level2 4

Core 116534 Carryoutbasicfirstaidtreatmentintheworkplace Level3 2

Skills Programme 2: Access Control Officer(Old Grade D) (35 credits)

ID Unit Standard Title Level Credits

Core 244189 Conductaccessandegresscontrol Level4 7

Core 242825 Conductevacuationsandemergencydrills Level4 4

Core 11505 Identify,handleanddefusesecurityrelatedconflict Level4 12

Corel 119465 Write/present/signtextsforarangeofcommunicativecontexts Level3 5

Core 114979 Operateacomputerworkstationinabusinessenvironment Level3 2

Core 117705 DemonstrateknowledgeoftheFirearmsControlAct2000 (ActNo60of2000)applicabletopossessingafirearm Level3 3

Core 113924 Applybasicbusinessethics Level2 2

Skills Programme 3: Asset Protection Officer(Old Grade C) (39 credits)

ID Unit Standard Title Level Credits

Core 119472 Accommodateaudienceandcontextneedsinoral/ Level3 5 signedcommunication

Core 13912 Applyknowledgeofselfandteaminordertodevelopaplan Level3 5 toenhanceteamperformance

Core 113852 Applyoccupationalhealth,safetyandenvironmentalprinciples Level3 10

Core 113909 Coachateammemberinordertoenhanceindividualperformance Level3 5 inworkenvironment

Core 114942 Describehowtomanagereactionsarisingfromatraumaticevent Level3 2

Core 13936 Outlinethelegalenvironmentinaselectedindustry Level3 2

Core 11508 Writesecurityreportsandtakestatements Level4 10

Unit Standards:Skills Programme 1: Patrol Officer(Old Grade E (39 credits)

Security Employers

Security employers who are SASSETA compliant may apply to SASSETA for funded skills programmes. They may also apply for a mandatory grant of 50% of the training costs of the skills programmes.

Call ErrolTelephone: 011 869 1946Cell: 082 414 4898E-mail: [email protected]

Page 36: Security Focus Africa - Vol 34 No 5 - May 2016

34 SECURITY FOCUS | VOL 34 NO 5 2016

INTERNATIONAL NEWS

This solution, which incorporates Video Content Analysis (VCA), as well as 360° fisheye technology,

allows the Greenwood Village police to protect forensic evidence from external threats as well as improve employee accountability and monitor departmental procedure.

The Greenwood Village Police Department’s crime lab is a vital facility inside which evidence from crime scenes is stored, including firearms, narcotics, and cash.

The primary goals for the video surveillance solution were to integrate VCA into the critical areas of the crime lab to boost employee accountability, while creating new security capabilities as well.

“We had a system before but it was very archaic and outdated. There was no recording capability except for live viewing by the dispatch centre.

“It couldn’t detect motion and was in limited areas,” remarked Commander Joe Gutsgell, division commander of the Greenwood Village Police Department’s Investigations Unit.

Safe Systems Inc. in Louisville, Colorado, provided their technical expertise when installing the crime lab’s new video surveillance system.

They chose Hikvision products due to Hikvision’s reliable performance, excellent customer support, and cost-effective product line.

Hikvision’s 6 MP fisheye camera (DS-2CD6362-IV) allows for broad, yet precise, coverage of the evidence room.

The fisheye is designed to capture images from every corner of a particular location and eliminate blind spots: a helpful, cost-effective solution for small, indoor spaces like this one.

One camera takes on the job of what required three or more fixed cameras in the past.

“We’re taking advantage of the 360° fisheye to look at three doors simultaneously: the exterior door, an interior door to another part of the office, and the evidence room,” explained Mark Overland, senior safety and life security consultant of Safe Systems Inc.

Hikvision’s 1.3 MP mini dome cameras (DS-2CD2512F-IS-2.8MM) stand guard in the room where highly sensitive property confiscated by police is stored, and in the vehicle processing room, where Commander Gutsgell’s team collects evidence from vehicles involved in investigations.

Recorded video of this room also provides forensic accountability for the department’s

procedural integrity. Hikvision’s professional series 16-channel

NVR (DS-9616NI-ST) rounds out the solution. This high-performing, 48 TB recorder offers the ability to add cameras to the system as needed in the future.

VCA features such as motion detection further maximise storage efficiency, reducing saved data when it isn’t needed.

All said and done, Greenwood Village Police Department’s crime lab is making good use of a comprehensive surveillance system with features that will serve them well for many years down the road.

“Hikvision works to bolster the natural relationship between the security industry and law enforcement officials,” commented Jeffrey He, president of Hikvision USA and Hikvision Canada.

“We create products and solutions that help make these officials’ jobs easier and more efficient, allowing them to maximise their resources.

“We are proud to support the Greenwood Village Police Department in their tireless efforts to protect their community.”

Video surveillance secures crime lab Hikvision, the world’s leading supplier in innovative, award-winning IP video surveillance and CCTV products, has provided a state-of-the art surveillance solution to Colorado’s Greenwood Village Police Department for use in its crime lab.

As valuable evidence is collected and catalogued by police in Greenwood Village, Colorado, video surveillance

ensures safety and accountability in the police department’s crime lab.

Page 37: Security Focus Africa - Vol 34 No 5 - May 2016

SECURITY FOCUS | VOL 34 NO 5 2016 35

INTERNATIONAL NEWS

The new Spot Monitor Recording plugin facilitates object tracking. Users can drag various cameras onto the Spot Monitor and view images live, record them simultaneously on

another channel and then easily export the overview created using the Spot Monitor.

For example, security services observe a shoplifter using multiple cameras, making it possible to quickly and easily save the entire event on a storage medium and hand it over to the police.

The entire surveillance procedure is documented on the Spot Monitor channel from start to finish. You only need to specify the start and stop times and the back-up is ready.

The new metadata motion search, abbreviated MOS, represents a further optimisation in event analysis. With MOS, users can search for specific movements in freely definable image areas – of course, in both live and in recorded images.

A special feature: Movement data is stored in an SQL database, video streams in Geutebruck’s proprietary video database. This dual architecture provides twice the security, setting a new standard in access speed and flexibility.

As a result, search results are available significantly faster than with other solutions on the video market. Event analysis is extremely comfortable for the user.

New features make it even easier to find out exactly what happenedThe new Geutebruck release has arrived: G-Core 1.4.2. The powerful video engine provided on all G-Scopes makes it easier than ever to find out what happened when an incident occurs, both live and when evaluating recorded images.

Geutebruck’s new release G-Core 1.4.2 has arrived. The powerful video engine provided on all G-Scopes makes it

easier than ever to find out what happened when an incident occurs. The Spot Monitor Recording plugin facilitates

object tracking and documentation of an event over several cameras. Metadata motion search enables intelligent,

lightning fast search for motion in the picture.

© G

eute

brüc

k G

mbH

+27 (0) 11 401 6700 www.elvey.co.za

VENUE DETAILSCape Town7 - 8 JuneGreen Point Stadium, Business LoungeEntrance - P1A

Johannesburg21 - 22 JuneKyalami Grand Prix Circuit, The Brand New Jackie Stewart Conference Room 1Entrance - Cnr Allandale and R55

ONE SHOW DOWN, 2 TO GO...

XPOBringing you the latest in electronic security solutions

2016

BENEFITS OF VISITING

• Exposure to innovative quality products• Intimate interaction with highly knowledgeable

product personnel• Exciting competitions• Amazing product promotions• Transport arrangements from branch (please contact your nearest Elvey branch for bookings)

OUR PARTNERS

CATHEXIS

SHOW TIMES09H30 - 16H00

16H30 - Late(First evening of each show only)

COCKTAIL PARTY

Page 38: Security Focus Africa - Vol 34 No 5 - May 2016

36 SECURITY FOCUS | VOL 34 NO 5 2016

LAW & SECURITY

By Peter Bagshawe

In Cele’s case there was a board of inquiry into his role in the leasing by the South African Police Service of

buildings in Pretoria and Durban where both involved excessive floor space and irregular procurement processes. Both of these leases were cancelled following an investigation by the Public Protector.

The State President convened the board of enquiry and, on its recommendations, replaced Cele as National Police Commissioner on the basis that he was unfit to hold office but was not found guilty of corruption.

The President then replaced Cele with Riah Phiyega in the role of National Police Commissioner, which was the third consecutive appointment of a non-career member of the South African Police Service as National Police Commissioner.

Their immediate predecessors were Jackie Selebi (also not a member of the Police Services prior to his appointment, and resigned as National Commissioner when he was charged with corruption) and George Fivaz, who had a lengthy career in the South African Police Service.

The Claassen board of inquiry was scheduled to last some five weeks and was established in response to recommendations that the fitness of Phiyega to hold office be reviewed in line with the findings of the Farlam Commission into actions and evidence adduced during the hearings.

Given that the Farlam Commission lasted some two years the quantity of evidence available for review was obviously substantial and recommendations on specific allegations that were to be investigated include: • Whether Phiyega and senior police officers

misled the Farlam Commission with regard to the decision on the use of maximum force against the striking platinum mine workers.

• Events and decisions made at a national meeting of senior police leaders the night before the Marikana shooting.

• Remarks made by Phiyega at a police passing out parade shortly after the shootings at which she praised police for their actions.

• Establish if there was an orchestrated cover-up of the killing of mine workers at Scene 2 at Marikana.

The full ambit of the matters to be reviewed fall broadly into categories that are related to or would fall under the umbrella of the three listed above.

The first day of the Claassen inquiry was largely taken up by argument as to whether only evidence adduced at the Farlam Commission could be reviewed.

The Commission decided that additional witnesses who had not testified at the Farlam Commission could be called and that within boundaries, evidence outside the Farlam Commission could be introduced in order to review the actions of the parties in relation to the actions and activities of the parties, as well as evidence that had become available subsequent to the Commission.

The additional evidence and calling of new parties was obviously argued strenuously, but unsuccessfully, against by the lawyers representing Phiyega on the basis that this would be wide of the mandate of the Claassen enquiry.

This was followed by the leading of evidence by the evidence leader which commenced with members of the South African Police Services.

The first of the witnesses was a captain in the North West tactical response team who outlined the decision making chain in the decision to use tactical measures in disarming strikers and removing them from the kopje as having been taken by national management which would have included the relevant generals and Commissioner.

Captain Ntlati was not a witness at the Farlam Commission but his affidavit was read at the Commission and included in the evidence. This was followed by evidence from then Brigadier Lindela Mashigo of the Police Service’s Communications Department who gave evidence that suspended National Commissioner Phiyega instructed that the content of a media release be amended to delete reference to a number of details, including the number of strikers killed in the Police action.

He also stated Phiyega dictated changes to the media release that related to the

actions of the strikers, the escalating levels and mechanisms of response by the Police and the use of force being required to protect members of the Police from the advancing strikers.

During the course of the evidence, e-mail correspondence was led that showed Phiyega had instructed the Police not to respond to a request for assistance in respect of a meeting of the respective expert witnesses on both sides to identify areas of commonality, differences and the reasoning behind their respective stances.

This was particularly applicable to Cees de Rover, an expert witness on behalf of the South African Police Service who, during the Farlam Commission proceedings, gave evidence that he could not obtain clarity on who had issued the order for tactical measures to apply, had not received assistance from Phiyega on this and that it was the international norm that an instruction to use force under these circumstances would have required a written instruction signed by the Executive.

The decision not to co-operate was taken up by the South African Police Service Legal Department whose advice to Phiyega recommending compliance was not acted on.

At the close of the hearing on Friday, 6 May, Advocate Ismail Jamie, who headed the evidence leaders advised that he was closing the case.

This closure came before evidence was adduced for the majority of the witnesses listed by Advocate Ismail Jamie’s team had been heard and on consideration appears to indicate that the evidence leaders are of the opinion that they have established the requirements of at least the three of the four primary points of investigation listed above.

If this is taken as correct, the evidence leaders must have been convinced that they had established that Phiyega’s fitness to hold office had been sufficiently eroded for the Claassen inquiry to find against her.

Even more surprising is that Phiyega’s team also closed their case and this was done without leading witnesses and without Phiyega giving evidence on her behalf.

The option on this side must be that the Phiyega team felt that no case had been presented that required an answering

The Claassen board of inquiryFollowing the suspension of the National Police Commissioner Riah Phiyega by the State President in line with the recommendations of the Farlam Commission of Inquiry into the deaths at Marikana the first comparison that was made was that she, rather like her immediate predecessor, has been subject to enquiries relating to the performance of their duties and fitness to hold office.

Continued on p38

Page 39: Security Focus Africa - Vol 34 No 5 - May 2016

Elvey is a leading distributor of electronic security equipment in Africa.

Our mission is to assist in the protection of people and property by providing

quality, innovative products and solutions to the electronic security industry,

thereby ensuring a safe and secure future for all.

ET E-Pad O2 Wireless KeypadThe E-Pad O2 Wireless Keypad has a compact and stylish design with LED illumination for ease of use in the dark.

Features:• Keyless access control• Rugged weatherproof die cast aluminium

housing• Battery operated keypad (approx. 120 000

operations)• LED illumination for ease of use at night• 1 - 100 users• Fully compatible with all E.T. products

Suprema BioStation 2

Suprema’s BioStation 2 incorporates the latest Suprema technology in a beautiful exterior. It combines a new powerful processor, Suprema’s next generation optical sensor and improved fingerprint sensing & capturing algorithm to offer unrivaled performance. BioStation 2 provides users with instant authentication and rapid data transfer to manage high volume data with ease. It is ideal for applications that require versatility without compromise in style and performance.

Features: • Match and authenticate up to 20 000

fingerprints per second• Manage up to 1 000 000 fingerprint

templates • 500 000 maximum users• Hold up to 3 000 000 logs• Next Generation Optical Sensor• IP65 weather proof• Versatile interface

VisionLine 8/16 Channel HD DVR

The VisionLine 8/16 channel HD DVRs are1080P high definition hybrid DVRs with the ability to connect HD and IP cameras simultaneously. These recorders can meet different security requirements of home, financial, commerce, enterprise, transportation, government, etc. HD video input, 8/16 CH, 720P / 960H / D1 recording

Features:• 16 Ch DVR supports 2 Ch IPC 3MP / 1080P /

720P / 960H / D1 recording• HDMI 1080P output, true high resolution

display• Powerful smart phone surveillance

supporting iPhone, Android• Express and flexible backup via USB,

network• Adopt standard H.264 high profile

compression format to get high-quality video at much lower bit rate

AccessLine Gramma Switch

The AccessLine Gramma Switch is a certified Sabbath compliant remote/receiver unit. This device is intended for use on the Sabbath and Festivals and has been approved by The Tzomet Institute and is endorsed by the Beth Din of Johannesburg.

Pressing the button on a Gramma Switch does not draw power from the battery. There is a computer (microprocessor) inside the Gramma Switch that is always on, unlike a normal remote. This microprocessor sends a pulse, approximately every 10 seconds, which checks to see if the button has been pressed. If the computer (microprocessor) detects that the button has been pressed, the microprocessor waits for the next pulse to confirm that the button was pressed. The microprocessor will then send a signal to change the state of the alarm.

DSC Outdoor Wireless PIR Motion Detector with Integrated CameraThe DSC Outdoor Wireless PIR Motion Detector with built-in camera allows for a high level of reliable motion detection.

Features:• Innovative Octa-Quad technology to

minimize false alarms• Visual verification with image capture• Camera range in parallel to PIR coverage -

no lost areas• Robust housing and patented anti-masking

protection• Market-leading black mirror optics• Built in RF-link status LED• Remote maintenance with configuration

and testing via keypad

This product is compatible with all PowerSeries NEO panels.

Fermax GSM Unit

The Fermax GSM Unit is a digital intercom that allows residents to communicate and trigger the gate via their mobile/cellular phone.

This system is user friendly and very easy to operate and manage for both administrators and users of the system. It is ideal for residential and business properties.

ET Systems E-Pad O2 Wireless Keypad

Page 40: Security Focus Africa - Vol 34 No 5 - May 2016

38 SECURITY FOCUS | VOL 34 NO 5 2016

SU

BS

CR

IBE

TO

To: Security Publications SA (Pty) Ltd, PO Box 414, Kloof, 3640 Tel: (031) 764-6977 Fax: (031) 764-6974 E-mail: [email protected]

p Yes, please, I would like to subscribe to Security Focus. (Cost: R650,00 per year). (RSA Only) The subscription includes an annual Buyer’s Guide.

p Enclosed please find cheque to the amount of R...............................

p Please start my subscription from the..........................................issue.

Do you require a tax invoice pYes pNo (If yes, one will be sent to you on receipt of your payment.)

NB: Please make cheques payable to Security Publications SA (Pty) Ltd

Name: ..................................................................................... Signature: ......................................................................................

Date: ................................................ Company: ............................................. Position: ..................................................................

Address ....................................................................................................................................................... Code:. ........................

Tel: ........................................................................................... Fax: ...............................................................................................

BANKING DETAILS:

First National Bank, Kloof

Branch Code: 221526

Account Number: 50730011968

Account Name: Security Publications SA (Pty) Ltd

ADVERTISER PAGE EMAIL WEBSITEActive Track 11-12, 25 [email protected] www.activetrack.co.za

ADI Global Distribution OFC, 8-9 [email protected] www.adi-expo.com/johannesburg

Axis Communications SA 21 [email protected] www.axis.com/outdoor

Boomgates OBC [email protected] www.boomgatesystems.co.za

BTC Training 33 [email protected] www.btcafrica.co.za

CBIA 27 [email protected] www.tscm-za.com

CellDetect 26 [email protected] www.celldetect.co.za

Elvey Security Technologies 29,35,37 [email protected] www.elvey.co.za

FSK 28 [email protected] www.fsk.co.za

Guard Track 6 [email protected] www.guardtrack.co.za

Hikvision 23 [email protected] www.hikvision.com

John Elliott Security 18 [email protected] www.johnelliottsecurity.co.za

Maxi Security 16 [email protected] www.maxisecurity.co.za

Morpho South Africa 5 [email protected] www.morpho.com

neaMetrics 7 [email protected] www.suprema.co.za

Paxton Access Ltd 19 [email protected] www.paxtonaccess.co.za

Plaslope 39 [email protected] www.plaslope.com

Powell Tronics 17 [email protected] www.p-tron.com

Reditron 11 [email protected] www.reditron.co.za

Regal Distributors SA 15 [email protected] www.regalsecurity.co.za

Sparks & Ellis 32 [email protected] www.sparks.co.za

UNISA IFC [email protected] www.unisa.ac.za

Western Digital Corporation 1 www.wd.com/purpose

argument (following the cross examination of Mashigo and efforts to attack his credibility) and that there was no requirement to rebut to evidence led by Advocate Jamie.

Following on from here it is likely that the Classen inquiry will now be a detailed review of the recorded evidence given by Phiyega to

the Farlam Commission and that proceeding will then be held over pending a decision by the inquiry which will have to report to the State President.

In the interim, it is likely that there will be a focus on the inquiry with a number of stake holders, obviously including the widows of the

deceased miners, who will then review the result and options that are available to them.

PETER BAGSHAWE holds a Bachelor of Law degree from the former University of Rhodesia and a Bachelor of Laws degree from the University of the Witwatersrand.

INDEX OF ADVERTISERS Vol 34 No 5

LAW & SECURITYContinued from p36

Page 41: Security Focus Africa - Vol 34 No 5 - May 2016

SECURITY FOCUS | VOL 34 NO 5 2016 39

CALENDAR

Tel: +27 (0) 11 452-1115Fax: +27 (0) 11 452-3609E-mail: [email protected]: www.plaslope.com

TAMPER EVIDENT SECURITY BAGS

l Reliable, permanent, special security closure to show evidence of tamperl The closure system shows evidence of tamper by freezing, heat, aqua and solvent l The bags are manufactured from high strength coextruded LDPE clear or opaque filml Bags can be customised to your specification with high quality print of up to 5 colours (5 sizes of standard stock printed bags are also available )l Bags have a unique sequential number or barcodel For security purposes the bags are printed along the edge of the side seals

SOUTH AFRICA’S LEADING SECURITY PACKAGING COMPANY

Under Licence to

DEBATINTM

LOCAL EVENTS: 2016May 24-26: SECUREX 2016 | Venue: Gallagher Convention Centre, Midrand, Johannesburg | Joshua Louw | t: (011) 835 1565 | Email: [email protected]

May 24-26: A-OSH EXPO SA 2016 | Venue: Gallagher Convention Centre, Midrand, Johannesburg | Joshua Louw | t: (011) 835 1565 | Email: [email protected]

September 4-7: CAMPROSA CONFERENCE Venue: Fairmont Zimbali Hotel, North Coast | John Tunstall | t: (028) 313 1711 | Cell: 082 566 6898 | Email: [email protected] | www.camprosa.co.za

INTERNATIONAL EVENTS: 2016June 21-23: IFSEC 2016 | Venue: Excel Centre, London Dockland, UK | www.ifsec.co.uk

September 12-13: Fire India South Exhibition and Conference | Venue: Chennai Trade Centre, Chennai, India | www.fire-india.com

September 13-15: EuroSafety – Safety and Security Exhibition. Venue: Tampere Trade Fairs, Finland | www.eurosafety.fi

September 27-30: Security Essen – The World Forum for Security & Fire Prevention | Venue: Essen, Germany | Messe Essen | www.security-essen.de

November 14-16: IFSEC Arabia | Venue: Riyadh, Kingdom of Saudi Arabia | www.ifsec.co.uk

November 16-17: Sectech Denmark 2016 | Venue: Scandic Copenhagen Hotel, Copenhagen | t: +45 33 14 35 35 | www.armedia.se

INTERNATIONAL EVENTS: 2017January 22-24: Intersec 2017 | Venue: Dubai International Convention & Exhibition Centre, Dubai, UAE | Email: [email protected] | www.intersecexpo.com

April 4-7: LAAD Defence & Security | Venue: RioCentre, Rio De Janeiro, Brazil | www.laadsecurity.com.br

June 2-5: KADEX 2016 – Kazakhstan Defence Expo | Venue: Korme Exhibition Centre, Astana, Republic of Kazakhstan | Email: [email protected] or [email protected] | www.kadex.kz

September 11-13: Kazakhstan Security Systems | Venue: Korme Exhibition Centre, Astana, Republic of Kazakhstan | Jack Yasakov | Email: [email protected]

September 12-15: DSEI 2017. World’s leading defence and security exhibition | Venue: ExCeL, London | www.DSEI.co.uk

November 6-9: Defence & Security 2017 | Venue: Impact Exhibition Centre, Bangkok, Thailand | Kallie Vlok | t: (012) 428 2075 | Email: [email protected]

Conferences, events and exhibitions of interest to the security industry

Page 42: Security Focus Africa - Vol 34 No 5 - May 2016

40 SECURITY FOCUS | VOL 34 NO 5 2016

DIRECTORY

PSIRA (Private Security Industry Regulatory Authority) | Eco Park, Centurion | t: (012) 003 0500/1 | Independent Hotline: 0800 220 918 | e: [email protected] | Director: Manabela Chauke. Council Members: Mr T Bopela (chairperson); Ms Z. Holtzman (vice-chairperson); Advocate A. Wiid (council member); and Commissioner A. Dramat (council member).

APPISA (Association for Professional Private Investigators SA) | Box 8064, Minnebron 1549 | c: 073 371 7854 or 072 367 8207 | f: 086 689 0166 | e: [email protected] | www.appelcryn.co.za | President: Ken Appelcryn | Secretary: Dianne.

ASIS International Johannesburg Chapter No. 155. Box 99742, Garsfontein East 0060 | t: (011) 652 2569 | www.asis155jhb.webs.com | President/Chairperson: Johan Hurter | Secretary: Chris Cray.

ASIS International (Chapter 203: Cape Town – South African security professionals) | President/Chairman: Yann A Mouret, CPP | Secretary: Eva Nolle | t: (021) 785 7093 | f: (021) 785 5089 | e: [email protected] | www.asis203.org.za

BAC (Business Against Crime) | Box 784061, Sandton 2146 | Chairman: James Fitzgerald | t: (011) 883 0717 | f: (011) 883 1679 | e: [email protected]. Eastern Cape: Box 40078, Walmer 6065 | t: (041) 373 6401. f: (041) 373 6402 | e: [email protected] | Western Cape: 12th Floor Picbel Arcade, Strand Street | t: (021) 419 2044 | f: (021) 419 2066 | e: [email protected] | KwaZulu-Natal: 2 Hopedene Grove, Morningside, Durban 4001 | t: (031) 207 8273 | f: (031) 207 3900 | Provincial manager: Jody Nair | e: [email protected] | Mpumalanga: Box 430, White River 1240 | General manager: David Pretorius | t: (013) 751 3188 | f: (013) 744 3555 | c: 083 273 5515 | e: david@bac_mp.co.za | Chairperson: Ed Coombes | c: 082 807 3916 | f: (013) 752 6002 | e: [email protected] | North West: Postnet Suite 4415, Private Bag X82323, Rustenburg 0300 | Managing director: Charles Kendall | t/f: (014) 592 3591 | e: [email protected] | Limpopo: Box 784061, Sandton 2146 | t: (011) 883 0717 | f: (011) 883 1679 | e: [email protected] | Free State: Box 784061, Sandton 2146 | t: (011) 883 0717 | f: (011) 883 1679 | e: [email protected].

CAMPROSA (Campus Protection Society of Southern Africa) | President: Roland September | t: (021) 650 4858 | e: [email protected] | Vice President: Derek Huebsch | t: (041) 504 2490 | e: [email protected] | Executive Secretary: John Tunstall | t: (028) 313 1711 | e: [email protected] | www.camprosa.co.za.

CENSEC (Centre for the Study of Economic Crime) | Director: Louis de Koker | t: (011) 489 2134 | e: [email protected]

CISA (Cape Insurance Surveyors Association) | Shahid Sonday | t: (021) 402 8196 | f: (021) 419 1844 | e: [email protected] | Mike Genard t: (021) 557 8414 | e: [email protected]

DRA (Disaster Recovery Association of Southern Africa) | Box 405, Saxonwold 2132 | Chairman: Grahame Wright, | t: (011) 486 0677 | f: (011) 646 5587 | Secretary/ Treasurer: Charles Lourens | t: (011) 639 2346 | f: (011) 834 6881.

EFCMA (Electric Fencing and Components Manufacturers Association) | Box 411164, Craighall 2024 | t: (011) 326 4157 | f: (011) 493 6835 | Chairperson: Cliff Cawood c: 083 744 2159 | Deputy chairperson: John Mostert | c: 082 444

9759 | Secretary: Andre Botha | 083 680 8574.

ESDA (Electronic Security Distributors Association) | Box 17103, Benoni West 1503 | t: (011) 845 4870 | f: (011) 845 4850 | Chairperson: Lee-Ann Andreka | Secretary: Shirley James | www.esda.org.za

ESIA Electronic Security Industry Alliance) | Box 62436, Marshalltown 2107 | t: (011) 498 7468 | f: 086 570 8837 | c: 082 773 9308 | e: [email protected] or [email protected] | www.esia.co.za

FDIA (Fire Detection Installers Association) | Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: 087 808 7527 | f: 086 518 4376 | e: [email protected] | www.fdia.co.za | President/Chairperson: Matt Kielty | Secretary: Jolene van der Westhuizen.

FFETA The Fire Fighting Equipment Traders Association) | Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: (011) 455 3157 | f: 086 518 4374/(011) 455 4126 | e: [email protected] | www.ffeta.co.za | Chairperson: Astrid Wright | Vice-chairperson: Meshack Gabeni.

FPASA (Fire Protection Association of Southern Africa) | Box 15467, Impala Park 1472 | t: (011) 397 1618 | f: (011) 397 1160 | e: [email protected] | www.fpasa.co.za | General Manager: David Poxon.

GFA (Gate & Fence Association) | Box 1338, Johannesburg 2000 | t: (011) 298 9400 | f: (011) 838 1522 | Administrator: Theresa Botha.

HCSA (Hotel & Casino Security Association) | Box 91728, Auckland Park 2006 | Chairman: Dick Glanville | t: (011) 447 2700 | f: (011) 447 3276 | Vice-chairman: Frans Joubert | t: (011) 898 7333 | Secretary/Treasurer: Graham Bendell | t: (011) 728 4405 | c: 082 699 2392

HSA (Helderberg Security Association) | Box 12857, N1 City Parow 7463 | t: (021) 511 5109 | f: (021) 511 5277 | e: [email protected] | www.command.co.za | Chairperson: Stephen van Diggele.

IFE (Institution of Fire Engineers (SA)) | Treasurer: A.E. Greig | Box 1033, Houghton 2041 | t/f: (011) 788 4329 | e: [email protected] | www.ife.org.za | President: John Khoza Mpiyakhe | Secretary: Lindi Mujugira.

ISA (Insurance Surveyors Association) | Box 405, Saxonwold 2132 | Chairman: Graham Wright | t: (011) 486 0677 | Vice-chairman: Alan Ventress | Secretary: Alex dos Santos.

LASA (Locksmiths Association of South Africa) Box 4007, Randburg 2125 | t: (011) 782 1404 | f: (011) 782 3699 | e: [email protected] | www.lasa.co.za | President/Chairman: Alan Jurrius | Secretary: Dora Ryan.

NaFETI (National Firearms Education and Training Institute) | Box 181067, Dalbridge 4014 | Chairman: M.S. Mitten | Vice: Ken Rightford | t: (033) 345 1669 | c: 084 659 1142.

NaFTA (The National Firearms Training Association of SA) Box 8723, Edenglen 1613 | National Chairman: Peter Bagshawe | t: (011) 979 1200 | f: (011) 979 1816 | e: [email protected]

POLSA (Policing Association of Southern Africa) | t: (012) 429 6003 | f: (012) 429 6609 | Chairperson: Anusha Govender | c: 082 655 8759.

PSSPF (Private Security Sector Provident Fund) | Jackson Simon | c: 072 356 6358 | e: jackson@

psspfund.co.za | www.psspfund.co.za

SAESI (Southern African Emergency Services Institute | Box 613, Krugersdorp 1740 | t: (011) 660 5672 | f: (011) 660 1887 | President: DN Naidoo | Secretary: Mrs S.G. Moolman | e:[email protected]

SAIA (South African Insurance Association) | Box 30619, Braamfontein 2017 | Chief Executive: B. Scott | t: (011) 726 5381 | f: (011) 726 5351 | e: [email protected]

SAIDSA (South African Intruder Detection Services Association) | Association House, PO Box 17103, Benoni West 1503 | t: (011) 845 4870 | f: (011) 845 4850 | e: [email protected] | www.saidsa.co.za | President/Chairman: Johan Booysen | Secretary: Cheryl Ogle.

SAIS (South African Institute of Security) Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: (011) 455 3157 or 0861 111 418 | f: 086 518 4374/(011) 455 4126 | e: [email protected] | www.instituteofsecurity.co.za | Chairman: David Dodge | Vice-chairman: Mike Verster | Administrative Manager: Rosemary Cowan.

SAN (Security Association of Namibia) | Box 1926, Windhoek, Namibia | Administrator: André van Zyl | t: +264 61 205 2264 | f: +264 61 205 2350 | e: [email protected]

SANSEA (South African National Security Employers’ Association) Box 62436, Marshalltown 2107 | Administrators: SIA | t: (011) 498 7468 | f: 086 570 8837 | e: [email protected].

SAPFED (Southern African Polygraph Federation) | President: Ben Lombaard | 083 793 1152 | Secretary: Amelia Griesel | 082 786 3347 | e: [email protected] | www.sapfed.org

SAQCC FIRE (South African Qualification Certification Committee) | Postnet Suite 86, Private Bag X10020, Edenvale 1610 | t: (011) 455 3157 | f: 086 518 4374 | e: [email protected] | www.saqccfire.co.za | Management Committee: Chairman: Brett Jones | Vice-Chairman: Duncan Boyes | SAQCC Fire – 1475 Committee: Chairman: Tom Dreyer | Vice-Chairperson: JJ Scholtz. SAQCC Fire – Detection & Suppression Committee: Chairman: Matt Kielty | Vice-Chairperson: Laura Swart.

SARPA (South African Revenue Protection Association) | Box 868, Ferndale 2160 | t: (011) 789 1384 | f: (011) 789 1385. President: Naas du Preez. Secretariat: Mr J. Venter, Van der Walt & Co.

SDOA (Service Dog Operators Association | Box 49554, Hercules 0030 | t: (012) 376 2152/3 | f: (012) 376 2359 | e: [email protected] | Chairperson: Mr F. van Kraayenburg | t: (012) 376 2266.

SIA (Security Industry Alliance) | Box 62436, Marshalltown 2107 | t: (011) 498 7468 | Chief Executive Officer: Steve Conradie | www.securityalliance.co.za

SKZNSA (Southern KwaZulu-Natal Security Association) | t: (039) 315 7448 | f: (039) 315 7324 | Chairman: Anton Verster | c: 082 371 0820.

VESA (Vehicle Security Association of South Africa) | Box 1468, Halfway House 1685 | t: (011) 315 3588/3655 | f: (011) 315 3617 | General Manager: Niresh Reddy.

VIPPASA (VIP Protection Association of SA) Box 41669, Craighall 2024 | t: 082 749 0063 | f: 086 625 1192 | e: [email protected] | www.vippasa.co.za | Enquiries: Chris Rootman | c: 082 749 0063 | e: [email protected]

OTHER SECURITY AND RELATED ASSOCIATIONS AND ORGANISATIONS

SECURITY ASSOCIATION OF SOUTH AFRICA (SASA)SASA OFFICE BEARERS Suite 147 Postnet X2, Helderkruin 1733

National President: Costa Diavastos c: 082 498 4749 | e: [email protected]

National Chairman: Chris Laubscher c: 082 441 4092 | e: [email protected]

National Deputy Chairman: Marchel Coetzee c: 084 440 0087 | e: [email protected]

REGIONAL OFFICE BEARERS

Gauteng: Franz Verhufen c: 082 377 0651 | e: [email protected]

KwaZulu-Natal: Gary Tintinger c: 084 429 4245 | e: [email protected]

Western Cape: Dave Waywell c:083 261 3059 | e: [email protected]

ADMINISTRATION

1st floor, Block A, 153 Ontdekkers Road (cnr Crane Avenue), Horizon Park, Roodepoort

National Administrator: Tony Botes | c: 083 272 1373 | e: [email protected] | f: 0866 709 209

Office & Accounts: Yolandi Evans | t: 0861 100 680 | c: 083 650 4981 | e: [email protected]

Page 43: Security Focus Africa - Vol 34 No 5 - May 2016
Page 44: Security Focus Africa - Vol 34 No 5 - May 2016