Australian Security Corruption Scandal

Author: John Honovich, Published on Jul 01, 2012

A major scandal is rocking the Australian security industry. The government alleges corrupt awards for multi-million dollar surveillance contracts. The case is now before the Commission Against Corruption and the transcripts are amazing presenting a rare glimpse into the underbelly of security contracting. While it is still ongoing, the commission's key allegations identify fundamental risks that all security professionals globally should keep in mind. As of June 1, 2013, this investigation is still ongoing. Full update here

Perhaps the best quote from the transcripts is this:

"*** ******** ****** ** ********* *** ******** *********** **** *** *********** in *** ******** ********."

*********, **** ***** ** **** ******** ** ** ** ** is ** ***** ** **********************. *******, ********* **** ** ** ***** **** **** ******** vendors **** ** ********.

**** *** **** ***** **********:

Sharing ************ *******

****** ** *********** ******* ************ *******, **** *** ********* ****** or *****'* ****, ** '*******' ** *** **********. *** **** friendly *** ********* *** ********** ** ** *** *******/***********, *** more ****** **** ** ** ******.

Free *****

*** ********* ********** ***** * ******* **** ** ********** ****** for ***** ** *********** ***/** ***** ** *** **** (**** las *****!). ** ******, ** ** ****** ******** ** ********** but *** ********** ** ************** ********* ***** *** ********* ******* can **** **** ********** *********** *********** **** ***** ** **** vacations (*.*.,*******).

Fabricating **************

*** ********* ******* **** * ********* **********'* ************** **** ********** to **** ************* **** ********* *********** **** **** ***. **** if ** ** *** **********, ****** *********** *** **** *** other *** ** ***** ************** ** ***** ************** ** ***** a ********* ******. *** *** *************** *********** * ******* **********.

Gifts *** ********* ********

*** ** *** ******** ******** ** *** ********* ** **** an ********** **** ** *** **** ********* ** ******* * year ** ***** * ****. ** ** ******** ** ** unrelated **** ***, *** ***** **** ** ********* *********** *** build ***** **** ***** *** ****** **** *******.

*** ********* *****:

"**** ** *** ******** **** ***** **** *** ***** ** gifts ******. *** ***** ******** **** ****** ** ********* *** **** of ***** *********** ** ***** **** ** *********** ***** *****. **** agencies *** *** ********** ****** ********* ** ******** ******* ***** *** consultants."

******** ************* *** *** **** ***, ****** ***** ****** **** 'just ******* * *** **** *****, *****'* **** * ** guaranteed *** ****'. ******, ** *** **********, *** ********* ******* at *** *****, "* ***'* ** *** ***** ** *** ***, I'll *** *** * ****, **** **** ** *** *** contract."

******* *** **** **** *** **** **** *** ** ** obvious *** **** ** ** *** *** **** *********** *** ***** corporations **** ***** ******* ***** *** ********* - ***** ********* result ** ****** ******** ******* ** *** ********* ** *** buyer's ************.

Open ** ********** **** *******

*** *** ** ********** **** ******* ** ***** ** * corruption ****:

"** **** ****** [***] **** **** ******* ****** **** * tender ** ********** ** ***** ** ******** *** ********* ** *********** and ****** *** *********** *** ********* ******* *********."

***** *********** *** **** ****** *** '****' *******, ** *** also ** ******* ** ****** ***** *** ********** ** ****** towards. **** ******* *** ********* ******* **** ******* **************. *** our ****** ***** ******* ****.

End **** *** **********

*** ********* ********** **** *** ********** ******** **** *****:

"**** ******** ********* ** *** ********** ** *********** * *********** project ** ****** ** ******** ******** ********** ** ******* ******. These ******** ****** ** *** ** ***** *** ********** ** verify *** ****** **** ********. ******* ***** *** * ******* view **** *** ******** ******** *********** ******** * ***** ** probity ** ***** ************ *********** *** *******."

******** ** *** *****, ****** ******** **** ********** ** *********** is * **** *** ** *** *******.

*** ********* *********:

"** **** **** *** *********** **** ****** *** ** *** ******* over *** ******** ******** ** ****** ****** ******** *********** ********** **************."

***** ** *** ** **** **** *** ******* **** *********, end ***** **** ** ***** **** ******* *** **** ********** over *** ******* ** ***** ***********. *********, **** **** ******* into * ******* ********* ** **** ** ********* ** *********. 

[****** **** *, ****]: *** **********'* ******* *** ********** ******** to **** ***** ***** *****, *** ***** ** ***** ****** or ********** *********** *** **** ********. ** ******* ** **** *** New ***** ***** *********** ********** ******* ********** ** *** *** ****** of **** **** *** ** ******** **** *********:

*** ********** ******** *** ***** ** **** *******, ***** ***** it *** ******* *** **** **** ***** *****. ** **** *****, the ********** ** ** *** ******* ** ********* *** ****** into *** *************, ***** **** ******* *** ******** *** *************** that *** ********** ***** ***********. *** ****** **** ** ********* to *** *** ***** ***** ********** ** *** ******, ***** then ***** *** ****** ******.

*** ********** **** ** **** *** **** ** ********* ******** on **** **** **** ******. 

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Most Recent Industry Reports

Security Robots Are Just Entertainment on Jul 21, 2017
Great entertainment, no real security value.  That is the happy (or sad) state of security robots in 2017. Knightscope robot's drowning, the...
Wireless Burglar Alarm Sensors Guide on Jul 21, 2017
Wireless sensors for burglar alarm sensors are an increasingly common option for the historical labor intensive wired alarm systems. However,...
Competing Against ADT on Jul 20, 2017
ADT is one of the biggest players in the security industry, with ~$4 billion revenue. In 2017, they were acquired / merged with Protection...
Hikvision Launching Deep Learning Recorders on Jul 20, 2017
Hikvision has become a common choice for super low cost NVRs. Now, Hikvision is aiming to move up market, with deep learning NVRs that claim far...
PR Campaign Exploiting Manufacturer Cybersecurity on Jul 20, 2017
Manufacturers increasingly have a bulls-eye on their back. As cyber security solutions providers grow, they realize a great way to get publicity...
Axis Door Station Tested (A8105-E) on Jul 19, 2017
Axis continues their push into niche markets, especially audio, with network speakers, an IP horn, and video door stations. We bought and tested...
Manufacturer Favorability Guide on Jul 19, 2017
This 120 page PDF guide may be downloaded inside by all IPVM members. It includes our 20 manufacturer favorability rankings and 20 manufacturer...
$8 Billion Utility Georgia Power Enters Surveillance Business Offering Avigilon And Genetec on Jul 19, 2017
Utilities are typically considered major customers of surveillance integrators but one utility, Georgia Power, with $8+ billion in annual revenue...
Knightscope Laughs off Robot Drowning on Jul 18, 2017
A day after a Knightscope robot drowned, Knightscope has issued an 'official statement' making fun of the issue: The implied message is that...
Microsoft Video AI Cloud Services Examined on Jul 18, 2017
Microsoft has released one of the most amazing video analytics marketing videos ever. In it, they detect oil spills, track individual people giving...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact