Instructor Notes: The term “Conducted Energy Weapons” has been changed to “Electronic Control Devices” in order to maintain consistency in terminology with law enforcement agencies and research groups.Version 14 7/07<number>
INSTRUCTOR NOTES: The TASER X26 and M26 send out short duration, high voltage electrical impulses that overpower the normal electrical signals within the nerve fibers. The TASER device output is similar to the signals used by the nerves. These waves create extra “noise” within the nervous system much like static on the “phone lines” of the human body. Discuss how the body's communication is analogous to having a conversation on a telephone where signals are sent from one phone to another via electrical signals. Should a third person pick up this phone line and begin to scream (analogous to a TASER Wave in the body), the other two persons can no longer hear communication. Just as important, when the screaming stops, communications begins again without damage to the phone line. The graphics on this slide are not actual scope readings. They are simply illustrative of how TASER ECDs cause involuntary muscle contractions.Version 14 7/07<number>
Instructor Notes: Other less-lethal weapons have worked on pain compliance that can be overcome by drugs, alcohol, EDPs (Emotionally Disturbed Persons) or by mental focus.The M26 and X26 do not rely on pain to achieve compliance. They affect the sensory and motor functions of the nervous system and achieve incapacitation.Version 14 7/07<number>
1. International Security Expo
ITPO New Delhi
Firoze Zia Hussain
Former Superintendent of Police Pondicherry
2. India Corporate Security Scenario
 Mumbai blasts - Wake up call for the Indian
industry Leaders have rethink on corporate security
 Incident led the industry to decide to work with
government on security and governance issues rather
than dealing with it as another man’s subject.
 Indian industry hit by global recession and by image
of India as a soft target due to terrorist strikes and
now with the Satyam episode as country lacking in
good corporate governance policies .
 What are the new leadership strategies to overcome
and move forward.
 Foremost concern being safety and security.
3. India's commercial security woes
 More to do with the DNA of the security
professionals rather than the
prevailing threats at presents.
 Commercial security is the gap filler
between the state, servicing the general
public and the corporate requirements to
protect, preserve and maximize their
4. Opportunity-security providers
 India has a greater divide between the capacity of the government and commercial demands, therefore a much
greater opportunity and gap to be filled by security providers.
 The problem with the current approach is that it is still very ex-military or ex-police driven.
 The overall global view of India's security remains below par, and this affects everything from investment to trust
 One of the very outdated practices in India only continues to perpetuate this issue with everyone in security
introducing themselves as Captain, Major, General, etc.
 No one cares! Corporations want business enablers with sound competent business managers first and security
managers second, not professional inhibitors or someone living in the ancient past from their days in the
military/police. If the company wants a war or police department, then then the retention of rank is appropriate but
not for professional commercial security solutions.
 Despite the oversight and protection mandate of security professionals, very few are actually adequately checked to
ensure they meet the corporate needs and technical requirements, merely what did they do in the
army/police/government and so on. This approach is a fundamental flaw globally, and emphasized in India.
5.  In developed countries the escalation of cost for security begins with policy, then
technical measures and manpower last.
 In developed countries, policy, manpower and then technical solutions are the
prescribed route for a number of reasons but largely due to the reality that
manpower is cheaper than technical measures and therefore dominates the solution
 Not necessarily cost effective or mitigation solution based.
6. 05/24/09 6
7. VALUE ADD and corporate security
 Any investment needs to be validated by
VALUE ADD it brings in
 Security is viewed as necessary expense.
 Companies making a business case from
utilizing security devices and systems to
protect life and property (assets), to
helping improve productivity, assist with
training, and decrease losses
8. Leverage Security to Maximize Revenue
Vital partner to protect company assets and IP
 Gives management peace of mind to make decisions for business
 Use security technology to improve business processes and operational
 End user and integrator ingenuity are merging to bring innovative
services eg Video surveillance and access control services
 Internet provides realtime, anywhere access to surveillance cameras,
activities of employees and visitors via access control logs.
 Access provides valuable information on security measures
 Customer and employee patterns begin to emerge.
9. ROI With Security Technology
 Is the new line of merchandise displayed prominently in the front of the store? Do I
need more lunch staff on Thursdays and Fridays? Are my employees being honest
about their hours worked?
 A security director can view and download footage of an incident online in one
city without having to make the roundtrip to pull the incident from the DVR.
 Remote access can potentially save a business in fleet expenses, travel
expenditures, and time and resource management.
 Be in multiple places at one time. A win-win for all parties anytime, anywhere
 Funding is now coming from the customer’s IT, sales and marketing departments.
 Convergence opens new ROI opportunities for security providers, who are
investing R&D dollars to position themselves at the forefront of the convergence
10. Corporate financial fraud
 Financial investigators search for information on the integrity, financial
health and reputation of an organization or company.
 This is done by probing public records and international databases
covering patents, corporations, partnerships, contracts, SEC filings,
news, business references
 Uncover critical information regarding corporate documents, material
contracts and agreements, financial status , litigations, taxation,
insurance and liability, governmental regulation filings, financial history,
and acquisition, partnership, or joint venture agreements.
11. Computer Forensics and Electronic
Specialized team of leading experts in information security, focusing on
computer forensics, electronic discovery, physical & IT security, and
IT practice supports technology-driven litigation and engagements in the
 Computer Forensics/Expert Witness Testimony
 Physical & IT Security
12. Intellectual Property (Brand)
Illegal use of legitimate companies’ brands, trademarks, and
product has increased exponentially and become very
sophisticated in the process.
 Can enhancement of awareness in corporates
prevent terrorist attacks
 Can 10 security guards standing outside a mall
deter a terrorist
14. We need to study how Corporates in
Srilanka and Israel have been coping with
continuous terrorist attacks and yet are
able to develop their economy fairly well.
15. Protecting Assets
 Virtual security Physical security
 Financial security IP intellectual
 Detection Prevention Monitoring
 3 rings of security
 Perimeter Entry point Usage areas
16. Business SEGMENTS
Travel and Tourism Industry-Hotels
 Transportation - aviation security , mass transit rail systems
 Critical Infrastructure - The industries and institutions, buildings and
distribution networks that are essential to everyday life ,refineries,banks
 Ports & Borders -Systems for Customs officers and border protection,
including monitoring cross-border cargo and reducing international shipments
of contraband, screening for explosives, arms and weapons of mass
 Emergency Responders - Enabling emergency response teams to face potential
threats with confidence when dealing with a potentially toxic incident,
equipped with the most advanced technology.
 Military - Meeting the requirements of our armed forces and the application
of smart science on the battlefield, principally the threat from potentially
lethal chemical and biological warfare agents.
 Diagnostics – eg hospital screening programmes for infectious diseases.
17. Security Products
 Modern arms ammunition
 Lethal arms
 Non lethal arms
 Intelligence collection and analysis
 Innovative products
 Ideal non lethal weapon for private
 Can be used extensively by Aviation
personnel –for example to
temporarily disable a drunken
deranged person in an aircraft
Electronic Control Devices (ECD) use propelled wires or direct contact to
conduct energy to affect the sensory and motor functions of the nervous
The TASER X26 and ADVANCED TASER M26 are Electronic Control
Devices manufactured by TASER International, lnc.
Nerve impulse TASER impulse
• The human nervous system communicates with simple electrical
• TASER technology uses similar electrical impulses to cause stimulation
of the nerves that control movement
21. Pain to Incapacitation
• All previous less-lethal weapons have worked on
pain compliance that can be overcome by drugs,
alcohol, emotionally disturbed persons (EDPs), or by
focused, combative individuals.
• The X26 and M26 ECDs do not solely rely on pain
to achieve compliance. They affect the sensory and
motor functions of the nervous system and can cause
22. TASER X26
Constructed of impact resistant sonic welded polymer. Mass = 7 ounces. Available in
Black, Yellow & Clear
Stainless Steel Release Button
Serial No. Plate
High Visibility Sights
Blast Doors LIL: Low Intensity Lights (LEDs)
AFIDs Laser Sight DPM: Digital
05/24/09 Power Magazine 22
 Legal issues in usage of same by
24. TASER video clip
25. CARGO SECURITY
 Whether the container is a seagoing CAN,
carried on flatbed by rail or road, or a long-
haul trailer or aircraft ULD, system secures
 Analyze every equipped container for
chemical indicators, biologicals, volatiles and
radiation and ensure that
dangerous materials and illegal goods are not
given free passage.
 By verifying that the Bill of Lading is
accurate actually speed up the handling
process and throughput for the handling
26. 05/24/09 26
27. Virtual security
 Cyber warfare
 Networked video surveillance
28. Leverage Customer IT Investments
 New video services are changing the way companies conduct business.
 Security providers offer online services that allow a customer to access
their local video surveillance systems via the Internet for realtime and
historical viewing of their cameras, plus control pan/tilt/zoom (p/t/z) units.
 Customers view, store and retrieve video images from their local DVR
unit, while leveraging their existing infrastructure.
 A common misconception by customers is that they need Internet protocol
(IP) video solutions to perform the aforementioned tasks.
 When a customer requests IP video, to access live and stored video footage
using a secure Internet network.
 build robust IT capabilities to provide services without taxing the
customer’s IT infrastructure.
 these systems allow companies to leverage their existing security and IT
29. Innovative video search
 Image Content Navigation (ICN)
 ICN is a tool designed especially to make operator navigation faster and easier
when tracking targets.
 An invisible mesh of hyperlinks connects cameras together in the video.
 To track a target with ICN operators simply need to click areas in the video to
switch cameras and track targets.
 This makes real-time tracking targets easier and faster removing the need to
switch cameras by manually inputting camera id numbers.
Cware 2.5D advanced mapping technology enables a virtual duplicate to be
made of the monitored location in near 3D, improving the site perspective
while enabling intuitive navigation that delivers faster operator response times
 In 3D users can plan new camera sites to improve performance of the system.
30. Monitoring Via Video Auditing
 eVideo Audit is a video monitoring service that provides realtime audits,
notification and exception reporting of a customer’s business processes.
 Connect to the customer’s CCTV system to ensure documented business
practices are followed with immediate notification to customers as needed.
 Regional manager with multiple locations may need to ensure his employees
are wearing the correct attire, the correct promotional items are displayed, the
correct number of employees is behind the service counter, and the sales demo
units are on display.
 However, time and cost to travel to each location to ensure these basic
processes are being followed diverts their time from focusing on customers and
more pressing business activities.
 Work is done remotely & customer notified only if process is not followed.
 This service represents a true business partnership, helping customers ensure
that their business processes are being followed on a daily basis by their
employees at all locations.
31. VIDEO ANALYTICS-MATE
 Mate's Video Analytics offering covers quot;simplequot; Video Motion
Detection to identification of Static Objects (like abandoned
 provides directional counting and Video tailgating solutions for
Physical Access Control
 High End Analytics - including the ability to add logic statements
that create a dependency between two or more alarms (quot;ANDquot; quot;IFquot;
 System Topology - products are available as DSP based appliances
(edge device) and as a Server based system at your monitoring
 End-user experience – a simple user friendly interface
 Total cost of ownership – systems are easy to install, configure, train
and provide ongoing support
 specific additional advantages in specific configurations that include
DVTel, GE (VisioWave), American Dynamics/Tyco (Intellex &
VideoEdge), Milestone, Cisco, Advansis and others ( can add
additional platforms to this integration)
32. On Guard With 24/7 Virtual Security
 Audio and video clips are filtered, reviewed, transmitted and verified.
 Integrates with intrusion and access control systems,
 Monitoring centers a virtual security guard for an organization,
protecting it during or after-hours.
 Systems can be programmed when an activation signal is tripped.
 When someone enters an invalid alarm code after-hours, when an
outside motion detector is crossed or whenever anyone enters a server
 “Innovative alarm companies investing to integrate field systems with
monitoring software .
 Investment in open architecture technology and a common IT
platform allows a to offer their customer online, realtime alarm data
and video that helps a customer improve their security and improve
their business operations.”
33. Managed Access Control Services
 Central station managed access control is ideal.
 Provides 100 percent of the management and
administration of the customer’s local access control
 Provide new employee access cards, photo ID badges,
changing of door lock schedules, deleting or modifying
access levels, generating activity reports and more for the
 Eliminates the customer having to purchase, administer
or manage access control software on their computer.
 Customers can pick up the phone or request all changes
via an online, realtime Web portal.
 Has access to realtime reports and other system and
activity information without an IT infrastructure
34. Corporate Security Advisors
 Develop formulate appropriate (fit-for-purpose) cost effective
strategies,processes, practices, oversee and support the implementation of
 Identify, assess, and control protective security related risks and
effectiveness of controls and processes and programs around protective
 Strategies, policies & practices for protective and technology security
 Relevant processes in support of protective and technical security
 Programme/project performance is up to required standards
 Internal and external customer relationships are developed and
 Protective security incidents and/or crisis do not compromise operations
 Security function as a centre of excellence
 MI and reporting is reflective of risk (appetite, profile, and status)
 Understand the operational, regulatory, compliance, and governance
35. Key outputs:CSO
•Develop maintain quality, timely, risk focused MI and reporting
• Protective security policies in accordance with regulatory requirements
•Provide recommendations ensuring sound leadership and direction
•Co-ordination of resources to ensure cost-effective control
•Identify implications of relevant policies, legislation, and regulation
•Ensure appropriate and consistent compliance with relevant policies
•Ensure business driven requirements and solutions are identified and agreed
•Identify scope (e.g. costs, time scales, benefits) and sponsor key initiatives
•Support, as appropriate, enterprise wide protective security management
•Establish key metrics and measures key performance indicators
•Validate existing protective security management processes
•Ensure awareness training and education programmes are implemented
•satisfy objectives , are delivered on time and within budget
36. SMART ORGANISATIONS
 Make onsite security personnel more efficient.
 Having a security guard stare at a bank of
monitors for an extended period of time is an
ineffective way to detect crime or suspicious
activity. The result is “surveillance information
 Cannot humanly process that much information
fast enough to prevent or even be effective at
minimizing theft or vandalism.
 Smart organizations are making their security
personnel more efficient by integrating video with
security control so that video is pushed directly to
security guard’s monitor, PDA or cell phone.
37.  Bomb proof trash cans equipped with lcd
screens to relay the days news
 Colombian Designer miguel cabelloro
blazors and T shirts -
38. Unprecedented security at the 2008
Technological wonders that officials employed to protect the games
MATE Intelligent Video’s system was part of a large, highly secretive
integrated video surveillance system installed at the Beijing National
 Bird’s Nest, cost $423 million to build and years of planning to protect.
 seating capacity of 80,000 and, in August of 2008, was a central
location of much of the Games
 Officials in Beijing chose MATE’s Trigger, an embedded processor for
video detection and transmission, to upgrade the Bird’s Nest’s CCTV
system to an intelligent video detection system.
 Trigger monitored strategic areas and critical points in and around
the stadium around the clock.
 automated surveillance allowed stadium management to lower
supervising costs and increase response time to security alerts.
39. RISK Assesment
Assess and manage security across your international operations.
Mitigate the risks and threats facing each of your operating
facilities, security consultants will develop a detailed risk
assessment and provide a report with specific, actionable
recommendations to reduce and mitigate your risks.
designed to meet organization’s strategic requirements.
including forecasts for specific countries, risk comparisons of
specific locations, and in-depth reports on threats such as
terrorism, kidnapping and crime.
Identifies the security risks and steps required to protect
organization and assets. Plans cover physical security, personnel
security and emergency response protocols.
40.  Site security management
in high-risk remote locations, experienced security
managers help manage everyday security risks on site.
They also provide a seamless link to our regional
security and medical teams so that immediate support
can be accessed in an emergency.
 Security training
Provide realistic scenarios on personal security
protocols and traveler security awareness and
 Logistics management in high-risk environments
Provide expertise to assist your operations with the
movement and management of resources.
41. A Balanced Approach to Security
 New exciting technologies and service offerings
aside, security providers should never lose sight
of primary objective of asset safety.
 Technology gains have created new
 Successful companies will complement their
security message with tangible business benefits
— a true partnership
42.  Security needs to continue to grow to become a viable and
competent technical skill such as medicine, law, engineering
and the like. India is well short of this objective and the
companies that sell product or people to suit their revenue
projections are and endangered species but until more
professional security personnel, companies, business skills and
vendors come into the market, they will continue to exploit the
uneducated client market and leave a dirty stain in the
industry until it happens.
 Risk management is not discretionary spending and business
resilience is rapidly becoming a competitive edge.