News letter feb 11


Published on

Published in: Business, Technology
  • Be the first to comment

  • Be the first to like this

News letter feb 11

  1. 1. Newsletter: February 2011 Let’s professionalize the professionals…  Today its significantly different! Yesterday we operated with fences, gates, guards and cameras. We were worried about people taking minor items out of the workplace. But the fences, guards and gates are not as important these days for many businesses. Now the assets are electronic; they are built on and live on the Internet. The facility environment today is more open; employees want to come and go with their electronic access card; they dont want to be stoppedby a fence or a gate. Today, they want a card in their hand and the ability to be there!Intellectual electronic assets are much more significant. One CD could have moreproperty on it than you might have in whole office years ago. And yesterday they wouldhave had to steal the entire filing cabinet to get the same amount of information that ison a single CD today.A digital asset / data theft happens today, and tomorrow it is on the six oclock news. Inthe electronic age that we live in, there are not many secrets out there anymore thatcannot be hacked or found.The things we have in place for protection must change tonight. These hackers [whohave fed Wikileaks] were able to disrupt an amazing amount of USA Government in ashort amount of time. Wikileaks is a wake-up call!This has been going on for a period of time all over the world; it justhas become more public than ever before. Capt S B Tyagi For ICISSFOOD FOR THOUGHT:If it is not already with you, provably it will harm you: theinformation, the technology – in short, ‘The Edge’!C:S B TyagiICISSNews Letter Feb 11.doc
  2. 2. How to Enter the Field?It is realized that many international manufactures and distributors of international repute failedwhere small timers were successful in procuring the order. Though this fact is initiallyperplexing, it is realized after careful study that reasons for the failure were - • Inability to contact potential buyer, • Lack of knowledge of procurement procedure in India, • Products incompatibility in Indian climate, and, • No after sale supportThe Original Equipment Manufacturers (OEM) need to be appraised about the openingopportunities of business in India. The manufacturers and distributors of the security gadgetsneed to have overview of the quantum of business, and, to familiarize about the proceduresand formalities relating to procurement of such items.DEVELOPING SENCE OF INSECURITY IN INDIAThe ruthless ambitious nature of the human being shall continue to harness unhealthycompetition. This shall result in personal aggrandizement of wealth in the hands of the few,conversely poverty shall increase, and so shall the numbers that shall be afflicted by it.C:S B TyagiICISSNews Letter Feb 11.doc
  3. 3. The ruthless ambitious nature of the human being shall continue to harness unhealthycompetition. This shall result in personal aggrandizement of wealth in the hands of the few,conversely poverty shall increase, and so shall the numbers that shall be afflicted by it.All the deteriorating conditions shall have multiplier adverse effect on the security of oursociety, as also the Corporate and Industry.That the rate of crime shall definitely continue to rise should be the foregone deduction of theconditions prevailing in our society. Because…. Pearl S Buck, in ‘The Good Earth’ stated that, ‘when the rich get too rich, the poor shall not sit back but react to correct the imbalance’,NEED FOR SECURITY GADGETS IN INDIAThe prevailing conditions in India have focused every body’s attention to the securitymeasures in the industry, which started taking appropriate measures in this regard. Theconcerted and tangible attempts by the industries have been visible since last three decades afar as security manpower is concerned. Introduction of technical gadgets is hardly a decadeold phenomenon.Three developments are taking place in India - • Opening-up of economy • Development of Information technology • Realization that India can, and, will be a major power in the world, and, efforts of Industries to get ready for it.As a result ‘Industrial Security’ has gained importance and it is being treated as profit makingactivity.LARGEST INDUSTRIAL SECURITY FORCE IN THE WORLDGovernment of India has established a central Para-military force called Central IndustrialSecurity Force (CISF), which is the only Government run Industrial security force in the worldwith approximately 1 million. As it is a Central Police Organization, it is also the largest policeforce in the world. Its professional security personnel are deployed in 256 industries and 16airports. Its main efforts are to reduce the manpower by installing the security gadgets. Thus itis also the single largest specifiers and end-user of the security gadgets.Public Sector Undertakings (PSUs) totaling up to more then 600 in number, is the second mostsecurity conscious sector, which also lays great emphasis to keep security unobtrusive andcost effective by installing the security gadgets. Thus this segment is ‘The Largest’ procurer ofthe security gadgets. CISF instead of procuring directly, gets is done through the PSU /organization where its security force is deployed.C:S B TyagiICISSNews Letter Feb 11.doc
  4. 4. ONE OF LARGEST PROCURER OF SECURITY GADGETS IN THE WORLDAs brought out above, Central Industrial Security Force (CISF) is the single largest specifiersand end-user of the security gadgets and Public Sector Undertakings (PSUs) is ‘The LargestProcurer’ of the security gadgets. In addition, there are more then 500 large scale industrieshaving their own security set-up and have started installing security gadgets.DOMESTIC MANUFACTURES OF SECURITY GADGETSIndian Security Gadget Industry itself is in nascent form and is generally assembling theimported items. The ‘State-of-the-Art’ high-tech security gadgets are not being manufactured inIndia. Where from do they get the standards?In India, the Industrial Security Consultancy needs to come to international standards!The Consultants essentially have to be un-biased, truly professional and with up-to-dateinformation, without having stakes in any of the parties – may it be the SolutionProvider, Integrator, Man-power Provider or the Service Provider!The Consultants need to prove themselves to be thorough professionals. They need toattain certain educational and professional standards. Just being out-of-job or retiredfrom service and claiming to be Consultant will not do! Part time consultancy will ruinthis profession! The retired police officers or the officers of armed forces do notautomatically become Security Consultants!They have to do lot of un-learning before learning the skill-sets of the imperatives ofIndustrial Security Management, which is all together different cup-of-tea! For a personto gainfully spend the post-retirement time is noble idea by any standard. But, theconsultancy in the field of Industrial Security Management is not similar to startinginsurance agency or consultancy on feng-sui!In the ‘Consultation Report’, the ‘Return-on-investment’ (ROI) must be indicative interms of increased productivity or decrease in ‘down-time’. The Consultants need tohave scientific and methodical approach to the proposals they are offering to theManagement and must own-up these proposals till they are successfully executed andstart giving proposed ROI!Industry-developed and regulated Standards in the field of Industrial SecurityConsultancy need to go through the process of evolution and need to mature. Whatpresently required are the pragmatic views by the service users as they have to be veryobjective, exacting and careful while awarding the consultancy assignments? TheC:S B TyagiICISSNews Letter Feb 11.doc
  5. 5. demand of professionalism and quality-consultancy from the service-users willpresently set the rule of the game.Only time will tell – where from the Consultants will eventually get the high standards -set them themselves or be forced by the service-users!Sometimes ago, a thief stole a laptop computer from a restricted area in the studentadministration building at the University of California at Berkeley. The laptop contained names,addresses and Social Security numbers of 98,000 people who applied to graduate schoolbetween fall 2001 and spring 2004; students who enrolled in graduate programs between fall1989 and fall 2003; and recipients of doctoral degrees fro m1976 to 1999.A university spokeswoman told the Los Angeles Times that school policy mandates that allpersonal data be encrypted to ensure privacy protection. However, the files on the laptop hadbeen recently downloaded and were not yet encrypted.The university is attempting to notify the individuals whose records might be compromised.Authorities say there’s no evidence yet that the data has been misused. They believe thecomputer was stolen for what it is, not what’s inside it.This is almost old hat for Berkeley. Five months ago a hacker attacked the UC Berkeleycomputer system, compromising the data of some 600,000 Californians involved in a home-care program for seniors and the disabled.But this latest incident raises a new issue: Should sensitive information be stored on portabledevices at all? According to the Times account, a campus employee noticed a woman leavingthe restricted area with a laptop near the time of the theft. It may have been just that simple.Suppose the alleged thief were truly interested in the data and not the machine. Would shehave been a little more conspicuous trying to haul a mini-tower out of there?Maybe it’s ridiculous, considering wide adoption of laptops, PDAs and cell phones, to restricttheir use to the mundane. But the risks are real. In July 2004, CSO explored the issue in “Howto Stop a Laptop Thief.”As reported in that story, Gartner estimates that just one stolen laptop could cost a companymore than more than $6,000 for a new machine, software, restoring data and user downtime.The cost of such an incident increases exponentially if sensitive data is compromised and fallsinto the hands of a competitor or a hacker.Technology is increasingly packing more computing power into smaller and smaller devices:cell phones, PDAs and their hybrid cousins. What should be done to protect the information onthese devices? Biometric locks? Common sense use policies? Tell us what you think. Howdoes your company secure information on portable devices?C:S B TyagiICISSNews Letter Feb 11.doc
  6. 6. Most Recent Responses:The use of portable devices in today’s world is increasing. As security professional we must beable to protect these devices with the knowledge they will be lost or stolen.Lap-Tops are easy to secure so that the date is not available to the thief. Use strongencryption and create a volume for all documents. PGP and other similar tools allow for thisand the use is very simple.Devices like PDA’s and Blackberry Devices are more difficult in that they can have the sametypes of data and are easer to loose or steal. For these devices the solution is generally adevice specific solution.For all the devices a solution is as strong as the training and understanding that is conveyedwith the issuances of the device. That is you can put the tools on the device but if the userdoes not use them or allows the tools to be compromised by walking away while logged in ordecrypted then the loss is the same as with no security.With all access grants all users must have a clear set of training directives for the proper use ofthe information they have and a true accountability action must be enforced for failure tocomply.Basically the user is the weakest link in the design. Training and awareness are the tools usedto keep this weak link at speed with the need for security and protection of the informationassets.How to secure the data?The problem with portable data falling into the wrong hands is best remedied not by preventingthe data from becoming portable but by making the data secure whether it is portable or not.Most modern workplaces empower their staff to send email, print, fax, or even save to portablestorage such as floppy disk or USB keys. With this in mind it is his highly unlikely that anauthorized user can ever be prevented from making data portable. If they really want to take iton the road, then they will. Additionally technology limitations should never prevent a businessjustification for access to data. If employees need that data on their laptop then why should weprevent it because of technology’s inability to protect that data from unauthorized access?The solution therefore is to develop appropriate technology that secures/encrypts informationthat is deemed important enough.....whether it is portable or not. Technology departmentsshould take the option of not having encrypted data out of the hands of the person who uses it.If data is sensitive, then the requirement for it to be encrypted and therefore safe should bemandatory. With this policy in place, the question of whether it should be allowed to leave thecorporate network and reside on a laptop or any other portable device becomes irrelevant.C:S B TyagiICISSNews Letter Feb 11.doc
  7. 7. From: Capt. Rajiv OjhaDear Friends,This is a short note to reflect my feelings, feelings of a plebian amidstagony and pain that descended on common people stretching fromSrinagar to Mumbai when the sun traversed its length on our side ofthe globe to witness the death and destruction.Terror strike in Srinagar is understandable where I have been recentlybut in Mumbai it is very difficult to fathom. Still Mumbai is a resilientcity that has immediately sprung up with sheer determination to helpthose who were suffering the terror inflicted by known people to face another day withsteely resolve.The guts of Mumbaikar are unparallel and are as strong as the resolve of the IndianGovernment. There is not a single person who knows from which side across theBorder the chaos is ordered. Which Military ruler sanctions such heinous crimes andthen presents the paintings to our leader, who smiles and forgets the tears and pain ofhis own countrymen allowing such terrorists to create more mayhem?Where in world, in which country it takes for the government years to make rulesstalling hijacked planes from taking off to distant lands where they are hailed asliberators after killing, maiming and torturing innocent civilians who cannot defendthemselves?Where in the world judiciary gives life imprisonment and keep the terrorists alive andwell fed from the money collected from the tax payers? Where in the world, the terroristguilty of killing innocents and awarded life imprisonment will demand better medicalfacilities and food of his choice? Where indeed???Still the resolve of common man is high. He looks behind the chaos and death of hisfellow citizens and keeping his head high moves on to face another day with deep andpainful memories of the bloody day that he witnessed with prayer on the lips that hemay live for another day or that such incidences may never happen in his lifetime ever!!!I salute this noble plebian of this Republic and his resolve to survive the daily battlefrom Kashmir to Kanyakumari!C:S B TyagiICISSNews Letter Feb 11.doc
  8. 8. Helmet ResearchHelmets have not suddenly arrived At least 50 years of research in various fields have led tothis development. Helmets have been designed based on cadaver studies, animalexperiments, computer simulation studies, biomechanical studies and study of crash injurypatterns. Sir Huge Cairns was the first person to understand the role of helmets in preventingsevere head injuries and deaths. Before a helmet is certified it has to pass through four maintests namely: 1. Shock absorption – Cushioning capabilities of the padding test. 2. Resistance to penetration-to make sure the shell of the helmet is strong. 3. Strength of the retention system-to test the stretching of the chin strap. 4. Rigidity-to test the structural and safety performance. Most injured motorcyclists who do not wear helmets report that they did not expect to be injured; yet 40% of the head injury-associated deaths were ascribed to the motorcyclist’s loss of control, not, apparently, to some action of the driver of another motor vehicle. 5. Studies have shown that when helmet use is voluntary, it is used by 40-50 %; when it is compulsory it is almost 100 %; no other approach has succeeded in raising helmet use to anything close to these levels.How is a helmet useful? • The brain is the only organ in the body with its own safe deposit vault. • When a major impact occurs, the skull however thick cannot absorb the entire force! The impact only slightly attenuated is still transmitted to the underlying brain. When direct injury occurs, the damages to brain are very serious - often irreversible. • A helmet considerably increases the thickness of the container. The blow gets absorbed, spreading the impact over a larger region. The intensity at any one point is considerably diminished. The time lag also reduces the ultimate intensity reaching the brain through the helmet, hair, skin, skull and the meninges of the brainREASONS FOR NOT WEARING HELMETS • “I am a good driver. How can an accident ever happen to me “? • “But, it is not compulsory “ • “I use the scooter for very short distances” (If only the bus driver knew this • “Where do I keep it“ (Where there is a will there is a way ) • “I may loose my hair“(How many bald motor cyclists does one see?) • “It is so hot and uncomfortable“(If only you knew how much hotter it can get without one!!!) • “I may get headache and neck pain” ( at least you will still have a head ) • “Neck & Spinal Cord injuries may increase , reduced hearing &, vision, increased fatigue & overconfidence ( Detailed studies have shown that this is not true) • “Ungainly appendage on a beautiful feminine head” (and we talk about equality and women’s liberation!)C:S B TyagiICISSNews Letter Feb 11.doc
  9. 9. • “What is to be will be” (Alas the bereaved family does not subscribe to this oriental fatalism) • “What about the family” (Buy three for the price of two?) • “I have just not had the time” ( Time and tide wait for no Man) • “A helmet is expensive” ( Obviously the contents are not ) • Adventure, recklessness, misplaced enthusiasm particularly in the young – helmets worn only by “sissies” ( Knowledge is learning from one’s known mistakes, wisdom is learning from another’s mistakes – alas self acquired knowledge may be too late ) • “What about protecting other body parts” (death & major disability is due to brain injury – protecting the brain is easy, pragmatic and effective)The purpose of this Communication is to assist you in communicating effectively. Following areclear practical tips that might be applicable to your daily communication within the company. Give full attention to people while they are talking to you. Encourage other people to talk, and ask appropriate questions. Present your ideas so that others are receptive to your point of view. Treat people fairly and let others know how you want to be treated. Value teamwork and know how to build cooperation and commitment. Show respect for people’s ideas and feelings, even when you disagree with them. Accept differences and conflict as a normal part of any work environment, and Know how to address them constructively. Strive to understand other people and to be empathetic. Be open to negative feedback, and communicate difficult truths in a respectful way. Be able to easily win people’s trust and respect. Check to make sure you haveIn a hierarchy, every employee tends to rise to his level ofincompetence. Work is accomplished by those employees whohave not reached their level of incompetence. Digitally signed by Capt S B Tyagi, COAS CC*, FISM, CSC, CSP Capt S B Tyagi, COAS CC*, DN: CN = Capt S B Tyagi, COAS CC*, FISM, CSC, CSP, C = IN, O = GAIL (India) Limited, OU = Deputy General Manager (Security) FISM, CSC, CSP Date: 2011.01.28 17:18:58 +0530C:S B TyagiICISSNews Letter Feb 11.doc
  10. 10. Here is a serious issue that has been spreading thro out all cosmopolitan and metropolitancities. It has happened in Bombay. We may not even know when this kind of crime will reachyou. So, this is to make you aware of the situation. Also pass on the same to all known nearand dear to make them aware and be alert.We have been informed of the following scam, which is targeting females in particular. Theyreceive a phone call from the Post Office asking them to confirm their company postcode.When this is given, they are told that they have become eligible for some gift vouchers for theirco-operation and are asked to provide their home address and postcode in order to receive thevouchers. So far 90% of the women who have provided this information have been burgled asit is assumed that their homes are empty during office hours. The police are aware of thisscam and the Post Office has confirmed that they are NOT conducting postcode surveys.Also, it has been reported if you receive a telephone call from an individual who identifieshimself/herself as being an AT & T Service technician who is conducting a test on thattelephone line, or anyone else who asks you to do the following, dont do it.They will state that to complete the test the recipient should touch nine, zero, the hash (90#)and then hang up. Once done, this gives full access to your phone line, which allows them toplace a long distance international or chat-line calls billed to your account. The information,which the police have, suggests that many of these calls are emanating from local jails. Theinformation has been checked out by the police and is correct: DO NOT PRESS 90# FORANYONE.Would anyone reading this please pass the information on to colleagues, friends, etc.otherwise it could cost someone a lot of money. It is very prudent and advisable to keep a pet-dog! Elder people staying alone will not only get companion but also very effective early warning system against intrusion. This security system never fails - not even false alarms!Children would love the idea and will have more sense of commitment andresponsibility!C:S B TyagiICISSNews Letter Feb 11.doc
  11. 11. Life is very precious, about security be serious! Be aware of security, to save life & property !! Suggestions & feedback may be sent to us on e-mail: P.S. - If you dont like to receive our newsletter, we apologize for bothering you. Please let me know your mailaddress, we will move it out of our contact list, thank you!C:S B TyagiICISSNews Letter Feb 11.doc