Australian Security Corruption Scandal

By: John Honovich, Published on Jul 01, 2012

A major scandal is rocking the Australian security industry. The government alleges corrupt awards [link no longer available] for multi-million dollar surveillance contracts. The case is now before the Commission Against Corruption and the transcripts are amazing [link no longer available] presenting a rare glimpse into the underbelly of security contracting. While it is still ongoing, the commission's key allegations identify fundamental risks that all security professionals globally should keep in mind. As of June 1, 2013, this investigation is still ongoing. Full update here

Perhaps the best quote from the transcripts is this:

"The agencies failed to recognise the security consultants were not independent in the security industry."

Obviously, this comes as zero surprise to us as it is an issue we have examined repeatedly. However, amazingly this is an issue that many security vendors deny or downplay.

Here are more risks identified:

Sharing Confidential Details

Beware of consultants sharing confidential details, like the available budget or rival's bids, to 'friends' of the consultant. The more friendly and connected the consultant is to the bidders/integrators, the more likely this is to happen.

Free Trips

The complaint repeatedly cites a concern with an integrator paying for trips to consultants and/or users to ISC West (viva las vegas!). Of course, it is simply defended as networking but the government is understandably concerned about the influence bidders can have over supposedly independent individuals when taken on free vacations (e.g., crusies).

Fabricating Qualifications

Get Notified of Video Surveillance Breaking News
Get Notified of Video Surveillance Breaking News

The complaint alleges that a preferred integrator's qualifications were fabricated to show significantly more certified technicians than they had. Even if it is not fabricated, biased consultants can look the other way to faked qualifications or shape qualifications to favor a preferred bidder. See our recommendations on selecting a quality integrator.

Gifts and Unrelated Payments

One of the craziest elements of the complaint is that an integrator paid an end user thousands of dollars a year to clean a boat. It is defended as an unrelated side job, but these type of financial connections can build bonds that favor one bidder over another.

The complaint notes:

"Some of the agencies have dealt with the issue of gifts poorly. And those agencies have failed to recognise the risk of gifts influencing or being seen to influencing their staff. Some agencies did not adequately manage conflicts of interest between staff and consultants."

Security manufacturers are the same way, saying inane things like 'just because I buy them gifts, doesn't mean I am guaranteed the deal'. Indeed, in the transcript, the defendant remarks at one point, "I don't go out there to say hey, I'll buy you a beer, make sure we get the contract."

Bidders can play dumb all they want but it is obvious why they do it and why most governments and large corporations have rules against gifts for employees - gifts routinely result in awards favoring bidders at the detriment of the buyer's organization.

Open vs Invitation Only Tenders

The use of invitation only tenders is cited as a corruption risk:

"An open tender [may] have been adopted rather than a tender by invitation in order to increase the prospects of competition and reduce the opportunity for collusion between tenderers."

While invitations may help select the 'best' bidders, it may also be misused to select those the consultant is biased towards. This equally and regularly happens with product specifications. See our review of low quality RFPs.

End User Lax Management

The complaint emphasizes that the government agencies were naive:

"Most agencies responded to the challenges of undertaking a specialised project by hiring an external security consultant to provide advice. These agencies failed to put in place any safeguards to verify the advice they received. Instead there was a general view that the external security consultants provided a layer of probity as their independence safeguarded the process."

Anywhere in the world, simply assuming your consultant is independent is a fast way to get screwed.

The complaint concludes:

"In many ways the consultants were handed end to end control over the security projects as public sector managers effectively outsourced accountability."

While it may be hard work and require more resources, end users need to exert more control and more skepticism over the actions of their consultants. Otherwise, they risk falling into a similar situation to what is happening in Australia. 

[UPDATE June 5, 2013]: The government's inquiry was originally supposed to take about three weeks, but still no final report or additional information has been released. We checked in with the New South Wales Independent Commission Against Corruption to see the status of this case and it released this statement:

The Commission extended the scope of this inquiry, which meant it did proceed for more than three weeks. At this point, the Commission is in the process of preparing its report into the investigation, which will contain any findings and recommendations that the Commission deems appropriate. The report will be furnished to the New South Wales Parliament in due course, which then makes the report public.

The Commission says it does not have an estimated timeline on when this will happen. 

Comments : Members only. Login. or Join.

Related Reports

2020 IP Networking Book Released on Jan 06, 2020
The new IP Networking Book 2020 is a 280 page in-depth guide that teaches you how IT and telecom technologies impact modern security systems,...
Security Sales Course January 2020 - Last Chance on Jan 02, 2020
Notice: This is the last chance to register for the course. This sales course is customized for the current needs and challenges specific to...
Alarm Veteran "Demands A Criminal Investigation" Of UL on Oct 18, 2019
The Interceptor's Project pressure against UL continues to rise. Following Keith Jentoft's allegation that "UL Has Blood On Their Hands", Jentoft...
Top Ways Security Integrators Improve Their Careers on Sep 03, 2019
With DIY products expanding and the future of integration debated, how do integrators stay sharp so they are not left behind? 180+ integrators...
Indonesia Security Association Chairman Interview on Aug 01, 2019
Indonesia is a huge country with a population close to the US and a fast-growing economy. Its security industry is also growing rapidly but faces...
Beware African 50,000 IP Camera Contract Scam on Jul 12, 2019
A “Nigerian Prince” scam for the video surveillance market is going around. You, or at least we, could be lucky enough to be the single bidder for...
Security Dealer 'Social Media Contractor' Program on Jun 25, 2019
A $20,000 video surveillance system can be yours for free if you are willing to post on social media about the security dealer. Good deal, bad...
Congressman Visits Hikvision USA, Admits Unaware of "Company's Background" Before Backtracking on May 31, 2019
A newly-elected US congressman visited Hikvision USA's office in April, posing for a photo with Hikvision's staff: A sitting US congress...
'Independent' Security Consultant Organization Sells Off Speaking Slots To Manufacturers on May 10, 2019
The International Association of Professional Security Consultants (IAPSC) have sold numerous speaking slots to manufacturers. This is part of...
Ex-Integrator Now Growth Strategist Interviewed on Apr 24, 2019
For more than a decade, Scot MacTaggart [link no longer available] was a security integrator (at PA-based PSX). In late 2018, he left the industry....

Most Recent Industry Reports

JCI / Tyco Security Products Layoffs on Jun 05, 2020
Johnson Controls / Tyco Security Products has confirmed COVID-19 related layoffs, expanding upon the April coronavirus cuts the company previously...
EyePark Presents Mobile Driver Authentication on Jun 05, 2020
EyePark presented its long-range QR code parking verification platform at the May 2020 IPVM Startups show. A 30-minute video from EyePark...
Bleenco "Under The Tongue" Temperature Detection Examined on Jun 05, 2020
"Say aah", says Bleenco, a PPE detection video analytics company, offering a different method for measuring body temperature with a thermal...
Hikvision and Uniview Entry Level Thermal Handheld Cameras Tested on Jun 05, 2020
While most screening systems cost $10,000 or more, manufacturers such as Hikvision and Uniview have now released handheld models for $1,000 or...
Sequr Presents HID based Cloud Access Control on Jun 04, 2020
Sequr presented HID based Cloud Access Control at the May 2020 IPVM Startups show. Inside this report: A 30-minute video from Sequr...
VergeSense Presents People Tracking Sensor on Jun 04, 2020
VergeSense presented its people tracking sensor and social distancing insights at the May 2020 IPVM Startups show. A 30-minute video from...
FLIR A Series Temperature Screening Cameras Tested on Jun 04, 2020
FLIR is one of the biggest names in thermal and one of the most conservative. While rivals have marketed fever detection, FLIR has stuck to EST...
"Fever Camera" Show On-Demand Watch Now on Jun 03, 2020
IPVM has successfully completed the world's first "Fever Camera" show. Recordings from both days are posted at the end of this report for on-demand...
Cobalt Robotics Presents Indoor Security and Access Robots on Jun 03, 2020
Cobalt Robotics presented indoor security robots at the May 2020 IPVM Startups show. Inside this report: A 30-minute video from Cobalt...
Dahua Sues Ex-North American President, Says Legal Typo on Jun 03, 2020
Dahua's former North American President Frank Zhang claims he is owed almost $11 million but Dahua counter claims it is just a "scrivener's error",...