Your SlideShare is downloading. ×

News letter aug 12

194

Published on

You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the …

You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the web-site is given below –
http://www.wix.com/sbtyagi/iciss

I actively encourage you to join ICISS Group at ‘LinkedIn’ and also
motivate other security professionals likewise. I am confident that by
becoming active member of the ICISS Group, not only you professionally will be benefitted; the profession itself will be benefitted by your active support and contribution. The link to the ICISS Group at LinkedIn is given below –
http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
194
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
1
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. N Newslet tter: Au ugust 2 2012 Let’ prof ’s fession nalize t pro the ofessio onals… … http://w www.wix.com/sbtyagi/iciss sOver the last few y years, priso and oth securit sensitive areas hav begun u ons her ty e ve using a dev vicethat scan the who body fo contraba ns ole or and. The s scan produces an image of the skin, and will eshow obj jects like g guns, drugs other we s, eapons und clothing. This pro der ocedure is often used an dalternativ to whole body strip searches The devic uses a low energy x-ray or g ve e p s. ce y gamma sou urceto produc the imag ce ge. T The draw backs to this are 1) o e p privacy issuues; 2) raddiation dose to t the individu 3) rad ual; diation dose to e t worker The nex time you go the rs. xt u through security at th airport, you t he might be told to empty y m your p pockets, pu your hands over y ut your h head and s stand still w while an XX-ray m machine lo ooks for an nything hid dden u under your clothing. r If this body scanning option sou y unds u unappealin ng, you h have another c choice: an “enhance pat do n ed own” c conducted by a T Transporta ation S Security A Administration employyee, w which so ome trav velers h have d described a quite int as timate.The new screening measure have be w g es een hotlydebated, but mostl in theory Now tha in USA ly y. atthere are nearly 24 body sc e 44 canning ma achines inabout 50 domestic airports, w 800 mo on the with oreway, passsengers are facing real-life decisions gabout wh to do. Here’s so hat ome inform mation tohelp you choose.If you so omehow m missed the hoopla, t e there aretwo type of mac es chines bein installe which ng ed,C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 2. have rais sed conce erns about privacy, health risk and eve their ef t ks en ffectivenes at catch ss hingterrorists The more controve s. e ersial “back kscatter” de evices projject an X-r beam o ray onto the boody,creating an image displayed on a mo d onitor view wed in ano other room. The “mil llimeter wa ave”machines which are consi s, idered les risky because th ss hey do no use X- ot -rays, bouunceelectromagnetic waaves off the body to p e produce a ssimilar imag ge.Unlike mmetal detec ctors, these machine can det es tect object made w ts with other materials, likeplastic and ceramic. But they can’t see anything hidden in g nside your body, or detect cer r rtainexplosivees.What the images reveal is also uncle ese s ear.Mr. Kimball said that the T.S.A. us sesfilters to blur the im mages, and the agen d ncyhas pos sted samp ples of th kinds of heimages s screeners see and a video of t thescreening process on its Web si g s ite,tsa.gov. But critic say the cs ese samplesaren’t de etailed ennough for travelers tojudge ho explicit t ow they are, e especially i a ifscreener zooms in on a specific area. rAnother concern is whether the imag r gescan be s saved or transmitted The T.S.A. d.first said this wasn possible, then la d n’t ateradmitted the mach hines can s save photo os,but that this feature had be een disableed.This kind of backtra d acking has added to ttheagency’s credibility problem. sThe ma ain conceerns are how mu uchradiation the sca anners give off (t themanufacturers say the amo y ount is ve erylow), w whether t the scan nners mig ghtmalfunctiion and em more ra mit adiation th hanthey are supposed to, and wh the hea hat altheffects m may be for travelers. Since there is no precedent for routin r t nely screen ning so m manypeople w X-rays - other tha in prison - there a a lot of unknowns. with an ns areAnother issue is th the dev hat vices haven’t been th horoughly t tested. The T.S.A. (T e Transporta ationSecurity Administra ation, USA) claims that the mac chines have been eva aluated by the Food and yDrug Ad on’s Center for D dministratio Devices a and Radio ological HHealth, the Comme e erceDepartment’s National Instit tute for SStandards and Tech hnology and the Jo ohns HopkinsUniversit Applied Physics La ty aboratory. But it is c confirmed t that they b basically te ested only onething - w whether the amount o radiation emitted m e of meets guideelines established by the Ameri y icanC:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 3. National Standards Institute a memb e, bership or rganization of comp n panies and governm d mentagencies s.But gues who was on the c ss committee that develooped the g guidelines for the X-r scanne ray ers?The repr resentative from the compan es nies that m make the m machines and the D Departmen of ntHomelan Security among o nd y, others. In o other words the mac s, chines pass a test developed in sed d,part, by t compa the manufactur them an the government agency that wants to use anies that m re nd tthem.‘Russia T Today’ poin out an important detail bein left out of most ma nts ng ainstream media rep portsabout th new bo he ody scann ning devicces being rolled out in airpo orts everyw where: forrmerDepartment of Homeland Se ecurity Chhief, Micha Chertof who ha been ad ael ff, as dvocating thistechnolog on any news p gy program th hat will ha ave him i persona is ally profitin from t ng theirimplemen ntation. As a Security Consultant and Cha s y airman of the Chertof Group, o of his m ff one mainclients is Rapiscan, a manufa , acturer of th hese devicees.Last year, the Depa artment of Homeland Security a d awarded contracts of US$160 m f million eac to chtwo manuufacturers of these ba ack-scattering device one which was Ra es, apiscan.Beyond t issue o Chertoffs illegal ad the of dvertising h product on news programs by pretend his dingto be a p public serva there is some de ant, ebate about the safety of these new Back- y -scatter X-RayBody Sca anning devvices.One form intellige mer ence agent and prese t ent-day security conssultant, Wa ayne Simmmons, says thatwhile the device is an excellent tool, "T e s There is no dose of backscatte ionizing radiation that erhas ever been prov safe," a that he would pre to see only passengers wh are deem r ven and e efer e ho medto be sus spicious go oing throug these de gh evices, with the bulk going through the metal detect h tors,with whic weve al become a ch ll accustome ed.John W Waynes Five R s Rules1. Money cant buy happine but it’s more com y y ess s mfortable to cry in aMercede than on a bicycle es n e.2. Forgiv your en ve nemy but r remember the basta r ards name e.3. Help s someone w when they are in tro y remember you when theyre in ouble and they will r n ntrouble a again.4. Many people ar alive only because it’s illegal to shoo them. re ot5. Alcohol does no solve any problem but th again, neither do milk. ot ms, hen oesC:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 4. By Capt G Ra Kumar ajThe alar monitor rm ring and r response is very co omplex and tedious function of Secur d s rityManagem ment. Fraught with False Alarms and resource h e-mobilizat tion, alarm monitor m ringalso me eans that systems need to b consta be antly upgr raded and procedures check d ked.There is also need to constantly aud the efficacy of th system return-o s d dit he m, on-investmmentand the integrity of the data for very e yefficient alarm monitorin ng. Since all Ca G Raj Kumar is ICISS C e apt Councilor forthese ac ctivities occupy lot attention and An ndhra Prad desh.priorities of th s he organ nizations, theforward looking managem ments sta arted He has tota 25 year of expe e al rs erience out ofoff-loadiing these activiti e ies to t third- wh hich he ser rved 14 years in the A Armed For rcesparties – specialis in the fie This t st eld. turns and rest 11 years in the indu n ustry. He hasout to be cos effectiv st ve and very unique dist tinction o ofdependa able optio which enhances the serving in Air forces a on s aslevel of ssecurity p preparedne ess. we as in A ell Army. Whil le in Armed For rces he haasSpearhe eading this phenom s menon are few be e een extensivellysecurity agencies who hav establis s ve shed inv volved in Counte n ertheir Cen ntral Moniitoring Staations in ccities Ins surgency O Operations. .all over These centers cater to big r.offices, industries as well as individual He holds degree o s e ofresident ts who wish to avail their MB (HRD) from Ran o BA niservices Large in s. ndustries a in pro are ocess Du urgavati University y,of gettin third pa ng arty monitoring serv vices Jabalpur. Pre esently he is pursuin a Ph. D in e ngand the process seeks our well laid d-out Pe ersonnel M Manageme ent. At p present he is estrategiees. woorking in G GAIL and p posted at V Vizag, And dhra Praadesh.A monito oring centter must provide tim mely, A keen sp ports enth husiast, he represe entsconsistennt, high-qquality ser rvices utilizing Anndhra Prad desh Badm minton Tea am. Previouslystate-of-t the-art technology to customer 24 o rs he has pla e ayed in b badminton tourname entshours a dday, 365 days a year Keeping pace r. conducted by Petroleum Sports Control Bo y oardwith the change e es in technology and of India.maintaini ing alarm system data inte m egritywere crucial to mai intaining go of prov oal viding He can be re e eached at grajkumar r@gail.co.in or nbest-in-class alarm monitori m ing service In on his Mobile number - 78936016 e. e 699.addition to equipm ment need ded, enhan ncingalarm da integrity is also n ata y necessary to ensure the highes level of security is continuously st smaintaine The p ed. planning phase may include f y five critica elements which w al s would beco omefoundatio to succe on essfully connvert in-house alarm monitoring platform t a third-p g to party suppli ier: - ransition te Tr eam identifi ication - Deecision pro ocess to de etermine th service p he provider - Pr roject plannning - Im mplementat tionC:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 5. - Post implementation (continuous improvement)Transition TeamTo successfully convert alarm monitoring to a third-party supplier, a transition team ofcustomer-focused leaders may be selected to design, analyze, and implement the alarmmonitoring transition project. In addition to loss prevention, transition team is to includestakeholders from the following departments: procurement, finance, business unit leaders, IT,real estate, legal, facilities, and operations etc. This team must meet regularly, defining theobjectives, building success criteria, creating performance metrics, and representing theorganization to ensure a seamless transition of alarm monitoring.Any plan for the alarm monitoring transition may include: - Understand the buy – interview stakeholders - Establish operating procedures for supplier - Develop draft scope of work for review by stakeholders - Present sourcing strategy (scope of work, list of suppliers, and timeline) - Develop, distribute, and analyze request for information - Complete supplier bid meetings and site visits - Suppliers complete and return request for information - Present request for proposal (RFP) supplier short list recommendations to stakeholders - Analyze RFP - Negotiate with suppliers - Present overview to stakeholders - Notify suppliers and stakeholders of contract award - Execute contract - Develop performance metrics - Establish quarterly performance meetings to review and track performance metricsDetermining the Service ProviderCollectively, transition team needs to identify suppliers that provided the most comprehensive,customer-focused capabilities. Criteria for a successful service provider are as following: - Fitness to technical and functional requirements - Total cost of ownership - The ability to support current and emerging equipment - Industry reputation and experience - Experience and qualifications of the company and resources - Quality assurance commitment - Financial strength - Proven methodologies, tools, and value added servicesSourcing decision must be based on the “best value/total cost” principle. While cost remains acritical decision factor, the quality of the equipment, and operating efficiencies would be theprimary and most critical aspects.Project PlanningC:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
  • 6. A project task list can be created to identify key issues that can affect the overall project andallow assignment of tasks. Tasks can be assigned milestones in the project file to help balanceworkload for project planning. Clear communication, precise operating procedures, andpartnership with selected solutions provider are the building blocks of our transition plan.ImplementationConverting alarm system monitoring, whether from in-house to third party or third party to in-house, requires absolute understanding of a defined scope of work. To implement the alarmsystem monitoring change, the data from the existing monitoring facility can be gathered andscrubbed to determine its accuracy and freshness. The data then need to be formatted in orderto be inserted into new monitoring systems and reviewed again for accuracy. Once all data isin place in new monitoring systems, the stage is set to develop the schedule for the change-over.Post Implementation – Continuous ImprovementThe alarm monitoring conversion from proprietary monitoring platform to the Third partyMonitoring Center has to be a seamless, successful event. Metrics need to be assigned to allthe alarms and responses. Each metric was assigned a target goal, for example 90 percent ofburglar alarms within 60 seconds. To ensure continuous improvement, it is advisable todevelop quarterly performance business reviews. Business reviews provide the avenue toassess performance metrics, identify opportunities to strengthen partnership, and continue tofocus on achieving both organizations’ internal and external goals.A monitoring center must provide timely, consistent, high-quality services utilizing state-of-the-art technology to customers 24 hours a day, 365 days a year. Keeping pace with the changesin technology and maintaining alarm system data integrity were crucial to maintaining goal ofproviding best-in-class alarm monitoring service.In addition to equipment needed, enhancing alarm data integrity is also necessary to ensurethe highest level of security is continuously maintained. The planning phase may include fivecritical elements which would become foundation to successfully convert in-house alarmmonitoring platform to a third-party supplier: - Transition team identification - Decision process to determine the service provider - Project planning - Implementation - Post implementation (continuous improvement)Transition TeamTo successfully convert alarm monitoring to a third-party supplier, a transition team ofcustomer-focused leaders may be selected to design, analyze, and implement the alarmmonitoring transition project. In addition to loss prevention, transition team is to includestakeholders from the following departments: procurement, finance, business unit leaders, IT,real estate, legal, facilities, and operations etc. This team must meet regularly, defining theC:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
  • 7. objectives, building success criteria, creating performance metrics, and representing theorganization to ensure a seamless transition of alarm monitoring.Any plan for the alarm monitoring transition may include: - Understand the buy – interview stakeholders - Establish operating procedures for supplier - Develop draft scope of work for review by stakeholders - Present sourcing strategy (scope of work, list of suppliers, and timeline) - Develop, distribute, and analyze request for information - Complete supplier bid meetings and site visits - Suppliers complete and return request for information - Present request for proposal (RFP) supplier short list recommendations to stakeholders - Analyze RFP - Negotiate with suppliers - Present overview to stakeholders - Notify suppliers and stakeholders of contract award - Execute contract - Develop performance metrics - Establish quarterly performance meetings to review and track performance metricsDetermining the Service ProviderCollectively, transition team needs to identify suppliers that provided the most comprehensive,customer-focused capabilities. Criteria for a successful service provider are as following: - Fitness to technical and functional requirements - Total cost of ownership - The ability to support current and emerging equipment - Industry reputation and experience - Experience and qualifications of the company and resources - Quality assurance commitment - Financial strength - Proven methodologies, tools, and value added servicesSourcing decision must be based on the “best value/total cost” principle. While cost remains acritical decision factor, the quality of the equipment, and operating efficiencies would be theprimary and most critical aspects.Project PlanningA project task list can be created to identify key issues that can affect the overall project andallow assignment of tasks. Tasks can be assigned milestones in the project file to help balanceworkload for project planning. Clear communication, precise operating procedures, andpartnership with selected solutions provider are the building blocks of our transition plan.ImplementationC:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
  • 8. Convertin alarm s ng system mo onitoring, wwhether from in-house to third p e party or thi party to in- ird ohouse, reequires abbsolute undderstanding of a defined scope of work. To implem g e ment the alarmsystem mmonitoring change, th data fro the exis he om toring facility can be gathered and sting monitscrubbed to determ d mine its acccuracy and freshness. The data then need to be form d matted in orderto be ins serted into new monit toring syste ems and reeviewed ag ccuracy. Once all dat is gain for ac tain place in new mo onitoring sy ystems, the stage is set to dev e velop the sschedule fo the chan or nge-over.Post Imp plementation – Cont tinuous Im mproveme entThe alar monitoring conve rm ersion from propriet m tary monito oring platf form to the Third p partyMonitorin Center has to be a seamles success event. Metrics ne to be a ng ss, sful eed assigned to all othe alarm and responses. Ea metric was assig ms ach c gned a targ goal, fo example 90 percen of get or e ntburglar a alarms within 60 seco onds.To ensur continuo improv re ous vement, it is advisable to develo quarterl performa e op ly ance busin nessreviews. Business reviews provide th avenue to asse he e ess perform mance me etrics, iden ntifyopportunnities to stre engthen pa artnership, and contin to focu on achie nue us eving both organizatio ons’internal a externa goals. and alCCTV systems have on nefundameental flaw – despiteputting u large numbers of upcameras to ma aximize thecoverage of an area, w e weseldom hhave anybbody actua allylooking a much of the area f at f forwhich we are respo e onsible.Sure, we can alwa go ba e ays ackand look at what ha appened, b butmany tim this jus is not goo mes st odenough. It is a problem oflogistics and econoomics. We cannot s e staff the co ontrol room with eno m ough people to view thenumber o cameras we have available. So we have many of these c of s e cameras v views going to gwaste wh it may be useful t view the hen to em.To make it worse, much of what is dis e splayed on monitors will be un n s neventful, or sometim meseven hav content that is irre ve elevant to t risk pr the rofile of the site. This problem o coverag is e s of genot likely to go awa soon. H y ay However, thhere are te echnologies being imp s plemented now or in thenear futu that will change th risk cove ure he erage by C CCTV signif ficantly.Intelligen technology that is b nt being deve eloped can help in a number of ways. Ce n f entral to this istechnolog that can work with the opera in the backgroun performi intellige analysi of gy n h ator nd ing ent isthe came views. eraC:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 9.  Firstly, the c computer ca do thing that com an gs mputers are good at, and free th operator up e he to concentra on othe duties. For example where a ate er e, automated recognition such as f n face ecognition or number plate rec re r cognition c can do the job, it fr e rees the ooperator up to p oncentrate on the m co more releva things that only people ca do. In this way it is ant an opptimizing th use of th system. he he  Seecondly, bbackground sensing and alerts or alarm allow th detectio of susp d s ms he on pect coonditions o camera that ar not cur on as re rrently bein viewed by the o ng d operator. The coomputer ca highlight these or bring thes to the operators a an se attention fo viewing and or inv vestigation This co n. ould includ certain types of movement or the presence of de f e soomebody o somethin in an area for def or ng fined perio ods. Through this, the coverage of e the cameras has been made mor efficient. s re .  Annother option is acting as an ea warning system. In this con arly ntext, the teechnology can hig ghlight con nditions tha could potentially be suspect s at e such as objjects left in an area; c n cars paarked where they sh hould not b or exc be, cessive den nsities of p people in an area. T This technology is starting to become more common with a s advanced D DVR systems.Potentia Areas of Developm al f ments:Other technologies offer sub s bstantial pootential, but have so ome development time still to go obefore th reach e hey effective us Where an operato is viewin a scene and need to divert his se. or ng e ds tor her atttention to something else, para g allel monitooring or tra acking thro ough taggin a partic ng cularobject or person c r could allow operators to come back to th scene later and pick up m w s hat moreeasily on the locatio and mo n on ovement of the target Building up an infor f t. rmation ba on targ ase gets,situations and beh s, haviors to use for ris manage sk ement and future inv vestigation is one of themost neg glected asppects of CCCTV.Intelligent Techno ology:Use of an inte elligent syystem tha atrecognize behavio and con es or nditions cangreatly hhelp by increasing t the amoun ntand qua ality of infformation coming in n.Technolo can als help by simulating ogy so yor verifying operato performa or ance, eithe erin contra asting the number of issue e espicked up by the intelligent s systems, oorthe inser enarios tha should be rtion of sce atpicked u by ope up erators and reviewing dthem ag gainst actu detecti ual ion scoress.Finally, intelligent technolog can be gyused to eextend the normal CC CTV functio by building in alg ons gorithms th allow th detectio of hat he onother thin such a fire, sm ngs as moke, produ uction stop ppages, ov verflows an so on th would add nd hatvalue to t CCTV function. I think the p the potential fo intelligen analysis, sometime called vis or nt es sualanalytics technolo s ogy, goes far beyo ond secur rity-based CCTV to many f o forms of riskmanagem ment and m monitoring. The ques stions on ““what, wheere, when, who, why and how” willincreasinngly becom available in our data retrieval system. me e lC:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 10. Impleme entation Problems:Besides the develo opment nee that ar required to realize some of t ideas fo technolo eds re d e the or ogy,there are some im e mplementation problems with th hose we already hav availabl Cry wo is ve le. olfwhen reppeated waarnings occ without foundatio Eventually, the p cur t on. people star disregard rt dingthe warnings and th potentia of the tec he al chnology becomes ignored.Use of bl lank screenn-based alarm system are a cl ms lassic exam mple, after 90 false alarms popp pingup on sc creen in an hour or tw the screens often get switch off bec wo, n hed cause they are just s y seenas a distrraction. We can also overload t operato with war e the or rnings on w what could be happen ningso that th do not have the t hey time todeal with everything they are faced h ewith. P Priority se etting in suchinstances becomes importan We s s nt.do not wwant CCTV to be reac ctive toonly tech hnology-baased detec ction -people a are still m more efficient atbeing proactive a and pickin up ngdynamics and b s behavior. If weprevent them g searching forincidents we will probably miss s, ysome of the most importan The f t nt.timing of the even occurren f nt nce, orwhen we warn the operator is also esomethin ng that needs t to beconsidere Too so may ju provide a lot of false alarms, too late m be exa ed. oon ust may actly that - too ally, where do we pla the warnings with the displate. Fina e ace hin play enviro onment - does it beco omethe cente of attention, or one of the tools the oper er e rator uses.Envisaged Improv vement in performa n ance: Tec chnology h has the po otential to deliver hig gherperforma ance in a nu umber of w ways:  Th level o work be he of eing perfo ormed - pe eople can concentrat on the important and te higgher priorit issues th need human inter ty hat rpretation.  Th volume of covera of the system - all of thes cameras are really working - not he e age e se s y jus providing a mass of informa st ation that w largely be lost and discarde Clients are will ed. geetting real c capital retu on their system in urn r nvestment. Event gen nerated alarms and viideo monitoring a tracking helps! Privacy ensuring block and kage of pre e-determin areas h ned help grreatly in avoiding litiga ations on b breach-of-pprivacy rela ated matterrs.  Th quality of results delivered This is s he s d: surely going to provid higher security rela g de ated ouut-put: more things are being detected and the base is being laid for a m g d, e d more inttelligence a directe risk man and ed nagement process.In five ye ears time, we will fin intelligent systems on just a nd s about every worthwhile CCTV s y site.However despite a the limit r, all tations with CCTV sy h ystems, the operator is still the key and f e r e finaldecision maker. Th right ope he erators ma a signif ake ficant differ rence to th system. Operators will he scontinue to be able to do thin that tec e ngs chnology is unable to do and w do so fo some ye s o will or earsto come.C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 11. Courtes Col D sy: Deepak Behl Pretty n neat idea Never t a! thought o it befor of re!! Put yo car ke besid your b at nig our eys de bed ght Tell your spo ouse, your children, your ne r , eighbors, y your pareents, your Doctors office, and the check--out girl at the mark everyo you run across. T them to ‘Put your car ket, one n Tell o r keys beside yo bed at night’. If y hear a noise outs s our you side your home or someone trying to get in you house, just r ur pres the panic button f your ca The ala ss for ar. arm will be set off, a the ho will con and orn ntinue to so ound until e either you turn it of or the car batte ff ery dies. This tip c came from am neigghborhood watch co oordinator. Next tim you co me ome hom for the night and you start to put you keys aw me ur way, think of this: It a securi alarm system that you proba k ts ity t ably alrea have a require no instal ady and es llation.Test it.It will go off from m most every ywhere insi your ho ide ouse andwill keep honking u p battery runs down or until you until your breset it w the but with tton on the key fob ch e hain. It works if youpark in yyour drivew or gara way age. If your car alarm goes off r mwhen som meone is trying to bre into yo house, odds are eak ourthe burglar/rapist wwont stick around. AAfter a few secondsall the neeighbors w be look will king out their window to see wswho is out there an sure en nd nough the criminal wont wantthat. And remembe to carry your key while w d er y ys walking toyour car in a park king lot. Th alarm c he can work t the sameway there This is s e. something that should really be shared wit everyone. Maybe i could sav a d th it ve sexual abuse crime.life or a sFood for th hought t:If it is not already with y s you, pr rovably it will harm you: t y l theinform mation, the technolo – in short ‘The Edge’! , ogy n t,P.S. - If you dont like to receive our newslette we apo er, ologize for bothering you. Ple r g easelet us knnow your m addre and we will mov it out fro our co mail ess e ve om ontact list, thank youu!Suggest tions & fee edback ma be sent to us on e-mail: sb ay t btyagi1958 8@gmail.c comC:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx

×