Crime for dummies

May 2009 News & Events

I was insane enough to be at Lanseria Airport to catch a 06:15 flight with Kulula on 7 April. Do these Kulula employees realise their canned jokes and comments while trying to be funny at 05:15 in the morning is more likely to produce a psychotic episode than a laugh? That would test their security preparations.

A couple of other things happened on the way to Technews’ Durban branch that brought home to me the stark reality of what absolutely perfect victims we are to criminals. The first incident happened at an ATM.

I have seen videos of criminals engaged in stealing people’s ATM cards and copying the details on the magnetic stripe while watching the user enter their PIN code before returning the card and walking off with the necessary details to make their own card and draw money at leisure with the person’s PIN. These guys are impressively skilful.

However, the talent in these videos is not needed. On that particular morning, while I waited in line to draw money from an ATM, I was able to clearly see the man in front of me entering his PIN. After completing his transaction, he then slipped the card into his shirt pocket and walked away. Now I know his PIN, if I had a little coordination I could bump into him, steal his card and have a nice dinner on him. He made no effort to protect his card or PIN, while the efforts I made to cover mine up probably made me look like a criminal.

The second incident happened when entering a restricted building. The woman in front of me, who obviously worked there and had never seen me before, gave me a big smile, entered her code and walked in, holding the door open for me. I should have mugged her out of principle.

So now I can come and go as I please with her code – apparently every person with a legitimate reason to be in here has a unique code. I could come back one night and pilfer the stationery cupboard on her account. Alternatively, I could come and steal a couple of Apple computers if they had any value in the real world other than being able to say, “oooh, I have an Apple”.

If there was ever a reason for biometrics the carelessness of these people is it. Of course, I realise we are all as careless, all the time. I think I’ll have to stand on the street corner handing out copies of our Access Control Handbook to people as my own contribution to social investment.

Access Control Handbook 2009

The subject of biometrics plays a dominant role in the Access Control Handbook 2009, which is included with this month’s Hi-Tech Security Solutions. This year we wanted to delve a little deeper into the world of integrated access management and see how business is integrating its once stand-alone access control systems into its business applications and processes.

The good news is many companies are doing the work necessary to integrate all their security technology and processes into their business processes and technical infrastructure. This doesn’t always happen without a few issues and turf wars, which is why strong, directive leadership is sometimes required to get the projects going. Sadly, some vendors are still flogging the terminal horse of selling stand-alone proprietary solutions to clients, but I suspect we’ll be hearing less and less from them as time goes by.

Nevertheless, the Access Control Handbook 2009 offers a selection of reading to educate, enlighten and compare with whatever is happening in your organisation; from trends and opinions, through to case studies from a range of industries. We even have a brief summary of a round table debate we held on the topic of integrated access control and identity management. Sadly, there is only space to print a snippet of the interesting and sometime controversial discussion.

There is no other publication in South Africa to offer such an in-depth as well as broad overview of integrated access control and identity management. We hope you enjoy it and, as always, comments are welcome.

If someone has already run off with your copy, you can request another by calling Technews Publishing on +27 (0)11 886 3640, or e-mail me at the address below.

Andrew Seldon

Editor

andrew.technews.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Local manufacturing is still on the rise
Hissco Editor's Choice News & Events Security Services & Risk Management
HISSCO International, Africa's largest manufacturer of security X-ray products, has recently secured a multi-continental contract to supply over 55 baggage X-ray screening systems in 10 countries.

Read more...
SAIDSA achieves ISO 9001 certification
SAIDSA(SA Intruder Detection Services Association) Associations News & Events Training & Education
The South African Intruder Detection Services Association (SAIDSA) has announced that it has achieved ISO 9001:2015 certification. This milestone reflects its commitment to quality management and excellence in the security services industry.

Read more...
Detecting humans within vehicles without opening the doors
Flow Systems News & Events Security Services & Risk Management
Flow Systems has introduced its new product, which detects humans trying to hide within a vehicle, truck, or container. Vehicles will be searched once they have stopped before one of Flow Systems' access control boom barriers.

Read more...
Fluss launches the next wave of IoT solutions
IoT & Automation Access Control & Identity Management News & Events
Fluss has announced its newest IoT product; Fluss+ continues to allow users to manage access from anywhere globally and brings with it all the advantages of Wi-Fi connectivity.

Read more...
A standards-based, app approach to risk assessments
Security Services & Risk Management News & Events
[Sponsored] Risk-IO is web-based and designed to consolidate and guide risk managers through the whole risk process. In this article, SMART Security Solutions asks Zulu Consulting to tell us more about Risk-IO and how it came to be.

Read more...
SMART speakers: Uncovering the hidden S in ESG
SMART Security Solutions News & Events
Chris Galvin from the International Code of Conduct Association speaks about the role of responsible security in sustainable business practice.

Read more...
SMART speakers: Bomb threat management protocols
SMART Security Solutions News & Events
Jimmy Roodt, an explosives expert from Gauntlet Security Solutions, will speak on bomb threat protocols, the lack thereof, and why your fire emergency protocols are not an acceptable substitute.

Read more...
AP Sensing
News & Events
AP Sensing is a leading German provider of distributed fibre optic sensing solutions for monitoring critical infrastructure.

Read more...
Gemini Automation Systems
News & Events
Step into the future of home security and convenience with Gemini Automation Systems at Securex 2024, where it will unveil its latest innovations.

Read more...