Crime for dummies

May 2009 News & Events

I was insane enough to be at Lanseria Airport to catch a 06:15 flight with Kulula on 7 April. Do these Kulula employees realise their canned jokes and comments while trying to be funny at 05:15 in the morning is more likely to produce a psychotic episode than a laugh? That would test their security preparations.

A couple of other things happened on the way to Technews’ Durban branch that brought home to me the stark reality of what absolutely perfect victims we are to criminals. The first incident happened at an ATM.

I have seen videos of criminals engaged in stealing people’s ATM cards and copying the details on the magnetic stripe while watching the user enter their PIN code before returning the card and walking off with the necessary details to make their own card and draw money at leisure with the person’s PIN. These guys are impressively skilful.

However, the talent in these videos is not needed. On that particular morning, while I waited in line to draw money from an ATM, I was able to clearly see the man in front of me entering his PIN. After completing his transaction, he then slipped the card into his shirt pocket and walked away. Now I know his PIN, if I had a little coordination I could bump into him, steal his card and have a nice dinner on him. He made no effort to protect his card or PIN, while the efforts I made to cover mine up probably made me look like a criminal.

The second incident happened when entering a restricted building. The woman in front of me, who obviously worked there and had never seen me before, gave me a big smile, entered her code and walked in, holding the door open for me. I should have mugged her out of principle.

So now I can come and go as I please with her code – apparently every person with a legitimate reason to be in here has a unique code. I could come back one night and pilfer the stationery cupboard on her account. Alternatively, I could come and steal a couple of Apple computers if they had any value in the real world other than being able to say, “oooh, I have an Apple”.

If there was ever a reason for biometrics the carelessness of these people is it. Of course, I realise we are all as careless, all the time. I think I’ll have to stand on the street corner handing out copies of our Access Control Handbook to people as my own contribution to social investment.

Access Control Handbook 2009

The subject of biometrics plays a dominant role in the Access Control Handbook 2009, which is included with this month’s Hi-Tech Security Solutions. This year we wanted to delve a little deeper into the world of integrated access management and see how business is integrating its once stand-alone access control systems into its business applications and processes.

The good news is many companies are doing the work necessary to integrate all their security technology and processes into their business processes and technical infrastructure. This doesn’t always happen without a few issues and turf wars, which is why strong, directive leadership is sometimes required to get the projects going. Sadly, some vendors are still flogging the terminal horse of selling stand-alone proprietary solutions to clients, but I suspect we’ll be hearing less and less from them as time goes by.

Nevertheless, the Access Control Handbook 2009 offers a selection of reading to educate, enlighten and compare with whatever is happening in your organisation; from trends and opinions, through to case studies from a range of industries. We even have a brief summary of a round table debate we held on the topic of integrated access control and identity management. Sadly, there is only space to print a snippet of the interesting and sometime controversial discussion.

There is no other publication in South Africa to offer such an in-depth as well as broad overview of integrated access control and identity management. We hope you enjoy it and, as always, comments are welcome.

If someone has already run off with your copy, you can request another by calling Technews Publishing on +27 (0)11 886 3640, or e-mail me at the address below.

Andrew Seldon

Editor

andrew.technews.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Unlock the future of security operations in Bloemfontein
DeepAlert News & Events Surveillance
Security professionals and business leaders are invited to revolutionise their offsite monitoring operations at the DeepAlert Product Road Show, taking place on 16 – 17 September 2025, at the Schoemanspark Golf Club, Bloemfontein.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Your Wi-Fi router is about to start watching you
News & Events Surveillance Security Services & Risk Management
Advanced algorithms are able to analyse your Wi-Fi signals and create a representation of your movements, turning your home's Wi-Fi into a motion detection and personal identification system.

Read more...
ProtecLink 2025: Ithegi Electronics supports a safer, smarter security ecosystem
News & Events
If you are a security buyer, operations lead, or technology partner, do not miss ProtecLink 2025, to be held in Polokwane on 16 September 2025, at the Polokwane Royal Hotel.

Read more...
Secutel maintains ISO certifications
News & Events Fire & Safety
Secutel Technologies has successfully recertified all four of its ISO standards, a reflection of its continued commitment to excellence, client trust, and operational integrity.

Read more...
SABRIC appoints Andre Wentzel as interim CEO
News & Events Financial (Industry) Associations
The South African Banking Risk Information Centre (SABRIC) has announced the appointment of Andre Wentzel as interim chief executive officer, effective immediately.

Read more...
Choicejacking bypasses smartphone charging security
News & Events Information Security
Choicejacking is a new cyberthreat that bypasses smartphone charging security defences to confirm, without the victim’s input or consent, that the victim wishes to connect in data-transfer mode.

Read more...
Paxton cuts emissions by over a third
Paxton News & Events
Paxton has announced a significant reduction in its carbon footprint, cutting emissions by 961 tonnes of CO2e in its 2023 second reporting year.

Read more...
Most wanted malware
News & Events Information Security
Check Point Software Technologies unveiled its Global Threat Index for June 2025, highlighting a surge in new and evolving threats. Eight African countries are among the most targeted as malware leaders AsyncRAT and FakeUpdates expand.

Read more...
Securex gears up for Cape Town
News & Events
Four industry expos debut in Cape Town from 21–23 October, providing access to Africa’s tech hub and a rapidly expanding local market, through a platform covering security, OSH, facilities management, and fire safety solutions in one venue.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.