News letter sept 13


Published on

Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (, the ICISSM Goggle group (!forum/icissm), and the ICISSM LinkedIn Group (

Published in: Education, Business, Technology
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

News letter sept 13

  1. 1. New wsletter Septe r: ember 2013 Let’s profes ssiona alize th prof he fession nals… http://www btyagi/iciss Air Commo A odore (Ret Jasjit Singh, one of India's leading strategic th inkers, passed away on td) S y h Sunday, 4th August 13 He was 79. S 3. He was cre H emated at the Brar Square cre S emation gr round with many ser rving and retired officers r fr rom the th hree services prese ent. IAF ch hief Air Ch hief Marsh N.A.K. Browne and other top hal officers laid wreaths. o d Known as a passion nate professio onal, Jasjit Singh tau t ught flying to many top air fo o orce officers. He heade the Institute ed for De efence Studies S and Analyses (IDSA) for a long s tenure a and after re etirement f from there, se up the Centre for Air et r Power S Studies (CA APS), the t think tank ded dicated to modern and o futuristic air power trends. CA c r APS has don many useful studies ne on air po ower strate egic issues for s the India Air Forc (IAF). an ce rote or edited an He wr astonish hing numb ber of bo ooks tributed in positive to the o and cont y go-ahead f India's 1998 nuclear explos g for sion, when IDSA was asked by the gove n ernment ab bout th likely in he nternationa implications. Both he and K. Subrahm al K manyam, h is predece essor in ID DSA, prodded the governm p e ment to go ahead. a Born July 8 1934, Ja B 8, asjit was awarded th Vir Cha a he akra for dis splaying g allantry du uring the 1 1971 War. As a s W squadron l leader then he attac n, cked and destroyed many Pakis m stani tanks and bunk s kers. He displaye determination and devotion to duty of a high order, accord H ed d ding to the citation for the r honour. h n resident AP Abdul Kalam con PJ K nferred Pad dma Bhushan, the c country's second highest In 2006, pr civilian awa on him for his co c ard, m ontributions in strateg thought. s gic Capt SB TyagiCICISSSept.13 B 1
  2. 2. D.C. Nat IPS (Re th, etd.), PPM IPM M, About the Autho t or: Mr. DC Nath is Ch Patron of Internation al Council of Security & Safety Man C hief nagement. Su uperannuate in ed Januar 1995, as the Special Director, Int ry, telligence Bu ureau, Mr. D.C. Nath (IP PS-1960) has been a visiting s faculty to a number of Institutes (like the In s ndian Institute of Public Administration (IIPA), Sar e A n rdar Vallabhb bhai Patel N National Police Academ (SVPNPA Lal Bah my A), hadur Shastr National A ri Academy of Administra ation (LBSNA and Aca AA) ademies, including Mana agement Trai ining Institute covering different asp es, pects of secu urity and ind dustrial security managem ment. Winner of both the honors av r e vailable in th police se he ervice, name Indian P ely, Police Medal for meritorious l service and the P es President’s Police Medal for distinguished services, and the Prime Minis P ster’s Silver Cup Essay Compe etition at the National Po e olice Academ in two su my uccessive ye ears, Mr. Nath had made a ver significant and highlyM ry t -appreciated presentatio at d on IIM Lucknow , on “Image Building for IPS Officers at the Vertical Interac M, s” ction Program for s senior IPS off ficers. Recognition fo his over 40 years’ exp R or 4 perience and expertise in the field ca d ame fro such di gnitaries in this field as the Chair om a rman (Mr. Jeff M. Spiv J vey), American Soc ciety for Industrial Security (ASIS), 2007, the most recognized m au uthority in th e world, who wrote, “You are well kn own to many people I talk to o u y ar round the wo orld. When I mention Ind and your name they either know you dia r or know of you r u…. A good legacy.” The author of a highly acc f claimed book "Intelligenc Imperative for India", Mr. k, ce es Nath earned high plaudi from all around for two of his very signific its cant presentations on: “ “Revisiting th Future of India” (2005 London) and “Lessons from India for the War On he 5, a s r Terroris sm” (2007, USA). Know for his p rofessed tra wn aining ability, he is affec , ctionately ad ddressed as the “Drona acharya” and is considere a security ideologue and as such is in demand from Corpo ed y a d orate Houses for s talking to senior b business exe ecutives as a also to orga anize custom mized trainin g courses for their secu urity personnel. His nam figures in the Americ Police H of Fame, a Trust of the US Natio me n can Hall , t onal Association of Chief of fs Police. In Decembe 2010, the Internationa Who’s Wh Historical Society incl uded his name in the 20 er al ho 0102011 e d edition of the “Internation Who’s W e nal Who of Profe essionals”. All this indeed speaks vo A olume about Mr. Nath’s standing in the field of private secu urity all over the world. Thus, in more than one sense, he is the T e s s only on in the field, combinin the exper ne ng riences of a police office with speciialization in intelligence and er strategic analysis a an indust and trial security expert par excellence. e er S ttack on th Indian Parliament on Decem he P t mber 13 or the r Whethe it is 9/11 in the US or the at blasts at Bali or Istanbul, the terroris have st t sts truck terror in no un mistaken terms. Th t hreat percep ption at eve level ha changed and secu ery as d urity conce erns are no in every ow ybody’s mi ind both in the government an the gen n nd neral public This is good for s c. security industry but the t questio is wheth the men in securiity can deli on her iver the go oods. ty ofession outside the governme is not many yea old, especially in the o e ent ars n Securit as a pro Asian c continent. Private se ecurity has made trem s mendous strides in th US or even in the UK s he e e and ha numeric as cally overtaken the public poli in thes countrie ice se es. Profes ssionally a also, there a now ex are xperts, spe ecializing in different aspects of security. Private security sta n arted growing on scien ntific lines in the deve eloping cou untries only in the ‘60 of the last century It 0s y. gained some mo omentum in the last one or tw decades in Asia a wo s and around but that has d been p possible p primarily because of demands of the industrial s f s sector and compara d ative inability of the s y security ag gencies of the gover rnment to meet the growing challenges on s accoun of their c nt commitmen to over nationa security concerns. nts rall al c Capt SB TyagiCICISSSept.13 B 2
  3. 3. So, the moot question remains: how professional are those in private security, which in most of the countries is being headed or guided by retired folks from the armed forces or public police. Ironically, many among them, even though they had otherwise been bright, might not have any occasion, during the course of their service career anything to deal with security as such. Yes, a disciplined or uniform background can be an asset but that cannot automatically lay claim to expertise in security matters. And, then, on top of this, commercial security is basically a lot different from government security – both in concepts and in execution. While one can or may have to aim at optimal or absolute security system in some government sectors, security management in the private sector will often have to balance between the costs and the returns thereof. The good thing, however, is there are now indications of fresh graduates joining private security directly and trying to make a career in security as a profession. This trend deserves to be encouraged. Conceptually, appreciation of security is, and has to be, largely subjective because too many variable factors are to be considered before someone can arrive at a proper security assessment. A security threat to Mr. X may not be so to Mr. Y. A security threat today may not remain a security threat tomorrow. A security threat in a specific situation may not pose any threat whatsoever in a different context. Then, just like an ailment is often diagnosed differently by different medical professionals, the threat perception of a situation can vary owing to the professional ability or expertise of the security assessor. So the debate raised by some whether security is a vocation or a profession goes on but does not really cut ice any longer. The issue is now settled. Security is as much a scientific profession as many others. Threats can now be professionally analyzed and a threat assessment arrived at according to some settled norms. There is yet another aspect warranting professional approach. The primary aim of any security system should be to prevent or deter mischief-makers but oftentimes breaches in security take place in spite of elaborate arrangements. Some acts of sabotage or subversion or of terrorism these days, particularly when perpetrated by suicide squads, cannot indeed be prevented. So, the best thing in such circumstances is to work out in advance plans to control damages or efficiently manage the post-incident situations. Indeed, management of such crisis situations is a skill that security managers must develop as a part of their professional duty. This could often be the test of professionalism of security men. There could, however, be some caveats in it. Many of the private security agencies do not have training system or facilities worth the name and so professionalism in security industry suffers. As in almost every sector even in the government, expenditure on training is generally considered an avoidable overhead in a majority of the corporate sector as well. It is a pitfall that has to be avoided. As a matter of fact, it is imperative that private security practioners spend adequate time and resources on training and sincerely devote themselves to reach and attain adequate professional knowledge and status. It is only then they would get the recognition they are hankering for but to attain which they are often not doing enough. Professionalism in security is must not only for the security practioners but also for the security and safety of all those they are obliged to serve and protect. Capt SB TyagiCICISSSept.13 3
  4. 4. It has im mmense potential for security a r application ns! Resear rchers at th Georgia Institute o Technology want to put your signature up in ligh -he a of t r e hts tiny lig ghts, that is. Using thousand of nan g ds nometre-sc cale wires , the rese earchers h have developed a sen nsor devic that con ce nverts me echanical pressure - from a signature o a p s or fingerp print -- direc into lig signals that can be captured and proc ctly ght s b d cessed opti ically. The sen nsor device could prov e vide an artif ficial sense of touch offering s h, sensitivity comparable to that of c e the hum skin. B man Beyond colle ecting signa atures and fingerpr rints, the te echnique co ould also b used in be biologic cal imaging and mic g cro-electrom mechanical (MEMS systems. Ultimately it could provide a S) y, new approach for h human-mac chine interfa aces. "You ca write wit your pen and the s an th n sensor will optically detect wh you write at high resolution y hat and with a very fas response rate," said Zhong Lin st Wang, Regents' professor an Hightowe Chair in nd er the Sch hool of Mat terials Science and E ngineering at Geo orgia Tech. "This is a new pr . rinciple for imaging force tha uses pa g at arallel dete ection and avoids many of the comp plications o existing of pressur sensors." re " Individu zinc oxid (ZnO) na ual de anowires th at are part of the d device oper rate as tiny light emitt ing diodes y (LEDS) when placed under strain from the ) mechan nical press sure, allow wing the device to provide detailed in e nformation about the amount of pressur re being applied. Known a as piezophototro onics, the t technology -- first des scribed by Wang i 2009 -- provides a new way to capture in informa ation about pressure applied at very high resolution: up to 6, ,300 dots pe inch. er The re esearch wa scheduled to be reported as e August 11 in the j journal Natu Photon ure nics. It was sponsored by the U.S. Dep e partment of Energy's f Office of Basic E Energy Sciences, the National e Science Founda e ation, and the K d Knowledge Innovat tion Program of the Chinese Ac C cademy of Science es. This sch hematic sho ows a devi ice for ima aging pressure distribution by the pi e n iezo-phototr ronic effect. Th illustratio shows a nanowirehe on -LED based pressure sen nsor array before (a) and after (b) applying a compres ssive strain A n. convex character pattern, su uch as "ABC," molded on a sapph hire substr rate, is use to ed apply the pressure pattern on the top of the e n f indium-tin oxide ( (ITO) elec ctrode. (Cr redit: Courtesy of Zhong L Wang) y Lin Piezoelectric mate erials generate a cha arge polariz zation when they are placed under strain. The n piezo-p phototronic d devices rely on that ph y hysical princ ciple to tune and contro the charg transport and e ol ge t recomb bination by t polariza the ation charge present at the ends of individua nanowires Grown at a es a al s. top gallium nitride (Ga film, the nanowires create pix aN) e s xeled light-e emitters wh hose output varies with the h pressur creating an electro re, oluminescen signal that can be integrated w nt with on-chip photonics for s data tra ansmission, processing and record g ding. under strain you creat a piezoellectric charg at both e n, te ge ends "When you have a zinc oxide nanowire u which f forms a piez zoelectric potential," W p Wang explained. "The presence o the poten of ntial distorts the s Capt SB TyagiCICISSSept.13 B 4
  5. 5. band st tructure in t wire, causing elect rons to rem the main in the p-n junction longer and enhancing the p n d g efficienc of the LE cy ED." The effi iciency incr rease in the LED is pro e oportional to the strain created. Diifferences in the amount of o n strain a applied trans slate to differences in light emitte from the root where the nanow ed wires contac the ct gallium nitride film. To fabrica the dev ices, a lowate -temperatur chemicall growth tec re chnique is u used to creat a patterned array of zinc oxide nanowires on a gallium nitride thiin film subs te m strate with th che axis po ointing upwa ard. The interfaces be etween the nanowires and the ga allium nitrid film form the de m bottom surfaces of the nanow f wires. Story So ource: The abo story is b ove based on mat terials provid by Georg Institute of Technol ded gia e logy, via New wswise. The original a article was w written by Joh Toon. hn Journal Reference: l Caofeng Pan, Lin Do g ong, Guang Zhu, Simiao Niu, Ruome Yu, Qing Yang, Ying Liu, Zhong Lin Wang. Hi Z eng L ighresoluti ion electrolu uminescent imaging of pressure di istribution using a piez u zoelectric na anowire LED D array. N Nature Photonics, 2013; DOI: 10.1038 D 8/nphoton.20 013.191 The In ncident Managemen System can stre nt m eamline th fragme he ented way we use to ys e deal w with challenges. V. Bala achandr ran The author is a for rmer Spec Secreta Cabine Secretar cial ary, et riat www.sun nday-guardian v-balachandra an Karnataka CM Sri Siddaram maiah spe eaks at the workshop on Best I nternational Practice in p es Building Resilient Cities in Bangalore on Monda 5th Augu 13. t B ay ust The Revenue D Department of the K t Karnataka government needs to be con ngratulated for d organis sing a goo "worksh od hop" on "B est Interna ational Pra actices in B Building Resilient Cit ties" (Augus 5-7). The aim of the worksh st t hop was to anticipate, prevent and mitig o t gate hards ships when terrorist att tacks or na atural calam mities strike our expa anding urba agglom an merations. The structurall rigidity th we alw hat ways notic in a go ce overnment seminar was t plea asantly a absent. Chief Minister C Sidd daramaiah , in his h succ cinct address, ou utlined th he role of gove ernment a "proac as ctive and not reac ctive" in h andling su uch situations. Sen nior politica leaders like Reve al enue Minister Srin nivasa Pr rasad, Ho ome Minister K.J. George and Trans a sport Minister Rama alinga Red and se ddy enior cials lent s support to this initiative. offic was Shashidhar Reddy, Also present w o who gave the keynote spe o eech outlining the role of the National Capt SB TyagiCICISSSept.13 B 5
  6. 6. Disaster Management Agency (NDMA), which he is heading. The workshop also assembled Indian and foreign experts on the role of media and in responding to natural calamities and nuclear and biological threats. I gave an example of the "pro-active" role of a government agency in my lead presentation: In April 2008, the US Department of Homeland Security (DHS) had prepared a protection plan to guard America from the danger of 17 million small boats around their coastline. That was the time when Al Qaeda was planning to hit the US through a seaborne attack. The 26/11 attack could have been frustrated had our government agencies in Delhi and the states been as pro-active as DHS in increasing our coastal security after receiving several Central intelligence alerts on the LeT training a seaborne team. Thus when the LeT struck Mumbai, the US police and security systems considered it as a dress rehearsal for a similar attack on US mainland and went on an overdrive in holding training rehearsals on preventive security. The concept of "endless cities" emerged in 2010 after the UN Habitat meeting at Rio when they had warned that huge urban agglomerations would stand cheek by jowl in future, dwarfing the rural habitations. It warned that 70% of the world population would be urban dwellers by 2050. It also warned that rapid urbanization would result in more crime and law and order problems. In fact this concept is not new. While our government agencies and political leadership were ignoring the rising non-traditional security threats (NTS) like migration or climate change, other countries like Singapore and Canada have been focusing on that for years. In October 2007, I had cited these dangers while addressing the Indian Institute of Public Administration (Maharashtra Chapter), pointing out that globalization had loosened states' control over their polity. I had quoted Harvard professor Stanley Hoffman, who called this "erosion" the "emergence of a transnational society that includes multinational corporations, non-governmental organisations, criminals and terrorists". In 2004, the Canadian Security Intelligence Service (CSIS) had warned in an unclassified analysis that climate change and environmental degradation were likely to contribute significantly to conflicts and instability. On 1 August 2013, UC (Berkeley) released a report that climate change would result in growing violence between now and 2050. Rapid urbanisation, migration from other areas and climate change that we see now would pose great challenges to our administration, needing innovative strategies in handling such problems. No state government has realised this danger. Hence the organisers of this seminar, perhaps the first of its kind in India, need to be complimented. In my presentation I also tried to expand the idea of "Incident Management System" (IMS. The IMS is an innovative way in handling urban convulsions instead of the present fragmented way we are dealing with such challenges. During 26/11 the police had to remove the injured, get fire control equipment repaired and water replenished. This concept was further explained in detail by a DHS delegate. IMS, which has been used in the US since 1960s, and is now adopted by several other countries, is a model in which government agencies come together seamlessly under a pre-determined and pre-trained leadership, thus acting in unison and eliminating duplication of resources and confusion. Sunday Guardian (New Delhi) Aug 11, 2013 Capt SB TyagiCICISSSept.13 6
  7. 7. Our vo oices are unique to each p e person (including twins), a and canno be exa ot actly replica ated. Voice recognitio (also known as automatic speech recognitio or com on k c on mputer spe eech recogn nition) conv verts spoke words t text. The term "voice recogn ition" is so en to e ometimes u used to refer to recogn r nition syste ems that m must be tra ained to a particular s speaker - as is the c case for mo desktop recognition softwa ost p are. Recognizing the speaker can simplify the tas of sk transla ating speec ch. Speech recognition is a broader so h b olution which refers to technollogy that can recognize c speech without b h being targe eted at sin ngle speak - such as a call centre sy ker ystem that can recogn nize arbitra voices. Voice re ary . ecognition techno ology utilize the dis es stinctive as spects of the voice to veri the identity of ind ify dividuals. Voice recognitio is occa on asionally confused with sp peech reco ognition, a technolo gy which transla ates what a user is saying (a process a ted hentication). Voice re ecognition unrelat to auth techno ology, by co ontrast verifies ident of the tify individu who is speaking. ual The tw technolo wo ogies are often bundl edo   Speech re ecognition is used to translate the spoken work into an account number, a and Voice rec cognition verifies th vocal he characteris stics again those a nst associated with this account. h s mponents: a physiol logical com mponent ( (the voice tract) an a e nd Speech includes two com Behavi ioural com mponent (t the accent It is almost impo t). ossible to imitate anyone’s v voice perfect tly. Voice recognition systems can disc s criminate between t two very similar voices, s includin twins. The voice ng eprint gene erated upo enrolme is cha on ent aracterized by the v vocal tract, w which is a u unique phy ysiological trait. A cold does not affect the vocal trac so there will t e ct, e be no adverse effect on ac ccuracy lev vels. Only extreme vocal cond v ditions suc as laryn ch ngitis will pre event the user from using the sy ystem. During enrolmen the use is promp nt, er pted to repeat a short passph hrase or a sequenc of ce numbe ers. Voice recognitio can u on utilize vario ous audio capture devices (microphones, o telepho ones and P microp PC phones). T he perform mance of voice recog v gnition sys stem may v vary depend ding on the quality of the aud io signal as well as variation between enrolment and o a e verifica ation devic ces, so acq quisition n ormally ta akes place on a dev ice likely to be used for t d future v verification To preve the risk of unauth n. ent k horized acc cess vie ta recording, the use is ape er asked t repeat r to random phrases. During enrolment an individ dual is pro mpted to select a pa s assphrase or to repeat a seque ence of num mbers. The passphra e ases select ted should be appro d oximately 1 1-1.5 seco onds in len ngthCapt SB TyagiCICISSSept.13 B 7
  8. 8. very sh hort passp phrases lac enough identifying data, and long pas ck g d sswords ha too much, ave both re esulting in reduced accuracy. The indiv n . vidual is generally p g prompted to repeat the passph hrase or n number set a handfu of times making the enrolm t ul s, ment proce somew ess what longer than most other biometrics. E ach person can be uniquely id t u dentified by the soun of y nd his or h voice. A person’s Anatomy (size and shape of vocal tract combine with lear her s y t) ed rned behaviours make up His or her voiice print. Latest spe e eaker reco ognition sy ystems ext tract feature represe es enting phys sical chara acteristics (anatomy and beh y) havioural characteris stics (such a inflection); togethe these un as er niquely def fine the ind dividual. Traditio onal speak recognition system use ‘fix senten ker ms xed nce’ techno ology. A sp peaker utte a ers specific sentence to enrol and repe c e l eats the same sentence (or recorded phonemes to s s) authen nticate. Fixe sentenc technollogy has certain limit ed ce tations suc has certain limitat ch tions such a its inability to iden as ntify a spe eaker durin a live fr form co ng ree conversatio In addition, on. are signifi there a icant secu urity risks as the system ca grant u s an unauthorized access to s fraudul lent parties who sim mply play back a re ecording of the spea aker sayin the pas – ng ss phrase In ‘free s e. speech’ tec chnology t system can ident the spe the m tify eaker durin a free f ng form conver rsation in a langua any age. It doe not req es quire any specific wo s ords or se entences to be o repeate The su ed. ubject can enrol while speaking one langu e g uage and llater be au uthenticate or ed identifie while s ed speaking another lan a nguage. Unlike fixed d-sentence systems, unscrupulous e users m find it extremely difficult to fool the newer automated au may t y o uthenticatio systems by on playing back a re g ecording. To gain access, a random pass phra genera n ase ated by the system m e must be re epeated by the y user. A Authorization is gran nted after the syste determines that the correc words w em ct were spoken by the rig person On-goin g research has prod n ght n. h duced capa abilities that can identify and au uthenticate speakers in any lan e nguage an with free form spe nd eech. Free form spe e eech techno ology offers significan advantag across numerous markets: s nt ges s s Law Enfo orcement and Hom meland Security: as a sup a pporting te echnology for surveillanc and inte ce elligence ga athering, A speaker can be ide r entified du ring a free form conv e versation. IT Security either du y: uring a live conversat e tion or thro ough an au utomated system, s Speaker c be auth can henticated with or withou a spo ut oken ran ndom passphras se. Forensics and Intelligence: a v voice print can be quickly matc n ched against a d database of o Known p persons of interest to o t support major invest tigations. Banking and Call C Cen ntres: determine the identity of us ca allers anonymou and authentica ate Customers to help prevent and s p solve fraud and othe crimes. d er Capt SB TyagiCICISSSept.13 B 8
  9. 9. How c could a w weakened British un of just 6000 troop beat Fr B nit 6 ps rench forc five tim ces mes its siz ze? How c can the planning fr ramework of the D-Day Landings be us sed in the modern day e board drooms? How c strate can egic Intelligence hel turn tab lp bles on a much stro m onger adve ersary? What lessons c busine can esses lear from military ope rn m erations? “Everyman’s War - The recently publ ished book by Random House r” k m & MINT presents the answers to these questions in an engaging and T, gripping narrative. This book examines the lesson that are gleaned g k ns from mi ilitary opera ations in the field of tac e ctics, strategy, decision making n and tea dynamic am cs. The au uthor of the book, Ca Ragu R e apt Raman has a unique blend of career experience Raghu began his career with the Indian Armed es. h Forces and during his 12 year stint th g here, he was in operations in Punjab, then in th frontline at the high , he hest battlef field in the world in Siachin Glacier fol llowed by a tour of du in war to Angola as a UN uty orn Peace K Keeper. We are delighted t inform th all proc to hat ceeds from “Everyman's War” w go to the families o the will e of security forces who died in the line of dut for India. y o e ty you could lo on to Flipkart or A og Amazon to order your copy or ge it from an bookstore, it o et ny While y would b really appreciated if you could s be f share details (on Twitt , Facebo or via email) abou the ter ook e ut book an the caus it's suppo nd se orting, with y your friends and family A simple forward of this mail to your s y. t friends can make a big differe ence. Capt Ra Raman can be reached by - Email at ra agu n aghu@everymanswa | Ce +91 99 1 ell: 1000 4147 | T Twitter: @captraman Capt SB TyagiCICISSSept.13 B 9
  10. 10. Suggestio & feedb ons back may b sent to us on e-ma captsbty be u ail: yagi@yaho If you d not wish to receive this New do h e wsletters, pl lease Reply writing ‘R y REMOVE’ in Subject area and your name w be remo will oved from t the list. ICI ISS does not share em or oth details with mail her any ent tity. Capt SB TyagiCICISSSept.13 B 10