Instructor Notes: The term “Conducted Energy Weapons” has been changed to “Electronic Control Devices” in order to maintain consistency in terminology with law enforcement agencies and research groups.Version 14 7/07<number>
INSTRUCTOR NOTES: The TASER X26 and M26 send out short duration, high voltage electrical impulses that overpower the normal electrical signals within the nerve fibers. The TASER device output is similar to the signals used by the nerves. These waves create extra “noise” within the nervous system much like static on the “phone lines” of the human body. Discuss how the body's communication is analogous to having a conversation on a telephone where signals are sent from one phone to another via electrical signals. Should a third person pick up this phone line and begin to scream (analogous to a TASER Wave in the body), the other two persons can no longer hear communication. Just as important, when the screaming stops, communications begins again without damage to the phone line. The graphics on this slide are not actual scope readings. They are simply illustrative of how TASER ECDs cause involuntary muscle contractions.Version 14 7/07<number>
Instructor Notes: Other less-lethal weapons have worked on pain compliance that can be overcome by drugs, alcohol, EDPs (Emotionally Disturbed Persons) or by mental focus.The M26 and X26 do not rely on pain to achieve compliance. They affect the sensory and motor functions of the nervous system and achieve incapacitation.Version 14 7/07<number>
International Security Expo Itpo New Delhi Finl
International Security Expo
ITPO New Delhi
Firoze Zia Hussain
Former Superintendent of Police Pondicherry
India Corporate Security Scenario
Mumbai blasts - Wake up call for the Indian
industry Leaders have rethink on corporate security
Incident led the industry to decide to work with
government on security and governance issues rather
than dealing with it as another man’s subject.
Indian industry hit by global recession and by image
of India as a soft target due to terrorist strikes and
now with the Satyam episode as country lacking in
good corporate governance policies .
What are the new leadership strategies to overcome
and move forward.
Foremost concern being safety and security.
India's commercial security woes
More to do with the DNA of the security
professionals rather than the
prevailing threats at presents.
Commercial security is the gap filler
between the state, servicing the general
public and the corporate requirements to
protect, preserve and maximize their
India has a greater divide between the capacity of the government and commercial demands, therefore a much
greater opportunity and gap to be filled by security providers.
The problem with the current approach is that it is still very ex-military or ex-police driven.
The overall global view of India's security remains below par, and this affects everything from investment to trust
One of the very outdated practices in India only continues to perpetuate this issue with everyone in security
introducing themselves as Captain, Major, General, etc.
No one cares! Corporations want business enablers with sound competent business managers first and security
managers second, not professional inhibitors or someone living in the ancient past from their days in the
military/police. If the company wants a war or police department, then then the retention of rank is appropriate but
not for professional commercial security solutions.
Despite the oversight and protection mandate of security professionals, very few are actually adequately checked to
ensure they meet the corporate needs and technical requirements, merely what did they do in the
army/police/government and so on. This approach is a fundamental flaw globally, and emphasized in India.
In developed countries the escalation of cost for security begins with policy, then
technical measures and manpower last.
In developed countries, policy, manpower and then technical solutions are the
prescribed route for a number of reasons but largely due to the reality that
manpower is cheaper than technical measures and therefore dominates the solution
Not necessarily cost effective or mitigation solution based.
VALUE ADD and corporate security
Any investment needs to be validated by
VALUE ADD it brings in
Security is viewed as necessary expense.
Companies making a business case from
utilizing security devices and systems to
protect life and property (assets), to
helping improve productivity, assist with
training, and decrease losses
Leverage Security to Maximize Revenue
Vital partner to protect company assets and IP
Gives management peace of mind to make decisions for business
Use security technology to improve business processes and operational
End user and integrator ingenuity are merging to bring innovative
services eg Video surveillance and access control services
Internet provides realtime, anywhere access to surveillance cameras,
activities of employees and visitors via access control logs.
Access provides valuable information on security measures
Customer and employee patterns begin to emerge.
ROI With Security Technology
Is the new line of merchandise displayed prominently in the front of the store? Do I
need more lunch staff on Thursdays and Fridays? Are my employees being honest
about their hours worked?
A security director can view and download footage of an incident online in one
city without having to make the roundtrip to pull the incident from the DVR.
Remote access can potentially save a business in fleet expenses, travel
expenditures, and time and resource management.
Be in multiple places at one time. A win-win for all parties anytime, anywhere
Funding is now coming from the customer’s IT, sales and marketing departments.
Convergence opens new ROI opportunities for security providers, who are
investing R&D dollars to position themselves at the forefront of the convergence
Corporate financial fraud
Financial investigators search for information on the integrity, financial
health and reputation of an organization or company.
This is done by probing public records and international databases
covering patents, corporations, partnerships, contracts, SEC filings,
news, business references
Uncover critical information regarding corporate documents, material
contracts and agreements, financial status , litigations, taxation,
insurance and liability, governmental regulation filings, financial history,
and acquisition, partnership, or joint venture agreements.
Computer Forensics and Electronic
Specialized team of leading experts in information security, focusing on
computer forensics, electronic discovery, physical & IT security, and
IT practice supports technology-driven litigation and engagements in the
Computer Forensics/Expert Witness Testimony
Physical & IT Security
Intellectual Property (Brand)
Illegal use of legitimate companies’ brands, trademarks, and
product has increased exponentially and become very
sophisticated in the process.
Can enhancement of awareness in corporates
prevent terrorist attacks
Can 10 security guards standing outside a mall
deter a terrorist
We need to study how Corporates in
Srilanka and Israel have been coping with
continuous terrorist attacks and yet are
able to develop their economy fairly well.
Virtual security Physical security
Financial security IP intellectual
Detection Prevention Monitoring
3 rings of security
Perimeter Entry point Usage areas
Travel and Tourism Industry-Hotels
Transportation - aviation security , mass transit rail systems
Critical Infrastructure - The industries and institutions, buildings and
distribution networks that are essential to everyday life ,refineries,banks
Ports & Borders -Systems for Customs officers and border protection,
including monitoring cross-border cargo and reducing international shipments
of contraband, screening for explosives, arms and weapons of mass
Emergency Responders - Enabling emergency response teams to face potential
threats with confidence when dealing with a potentially toxic incident,
equipped with the most advanced technology.
Military - Meeting the requirements of our armed forces and the application
of smart science on the battlefield, principally the threat from potentially
lethal chemical and biological warfare agents.
Diagnostics – eg hospital screening programmes for infectious diseases.
Modern arms ammunition
Non lethal arms
Intelligence collection and analysis
Ideal non lethal weapon for private
Can be used extensively by Aviation
personnel –for example to
temporarily disable a drunken
deranged person in an aircraft
Electronic Control Devices (ECD) use propelled wires or direct contact to
conduct energy to affect the sensory and motor functions of the nervous
The TASER X26 and ADVANCED TASER M26 are Electronic Control
Devices manufactured by TASER International, lnc.
Nerve impulse TASER impulse
• The human nervous system communicates with simple electrical
• TASER technology uses similar electrical impulses to cause stimulation
of the nerves that control movement
Pain to Incapacitation
• All previous less-lethal weapons have worked on
pain compliance that can be overcome by drugs,
alcohol, emotionally disturbed persons (EDPs), or by
focused, combative individuals.
• The X26 and M26 ECDs do not solely rely on pain
to achieve compliance. They affect the sensory and
motor functions of the nervous system and can cause
Constructed of impact resistant sonic welded polymer. Mass = 7 ounces. Available in
Black, Yellow & Clear
Stainless Steel Release Button
Serial No. Plate
High Visibility Sights
Blast Doors LIL: Low Intensity Lights (LEDs)
AFIDs Laser Sight DPM: Digital
05/24/09 Power Magazine 22
Legal issues in usage of same by
Whether the container is a seagoing CAN,
carried on flatbed by rail or road, or a long-
haul trailer or aircraft ULD, system secures
Analyze every equipped container for
chemical indicators, biologicals, volatiles and
radiation and ensure that
dangerous materials and illegal goods are not
given free passage.
By verifying that the Bill of Lading is
accurate actually speed up the handling
process and throughput for the handling
Networked video surveillance
Leverage Customer IT Investments
New video services are changing the way companies conduct business.
Security providers offer online services that allow a customer to access
their local video surveillance systems via the Internet for realtime and
historical viewing of their cameras, plus control pan/tilt/zoom (p/t/z) units.
Customers view, store and retrieve video images from their local DVR
unit, while leveraging their existing infrastructure.
A common misconception by customers is that they need Internet protocol
(IP) video solutions to perform the aforementioned tasks.
When a customer requests IP video, to access live and stored video footage
using a secure Internet network.
build robust IT capabilities to provide services without taxing the
customer’s IT infrastructure.
these systems allow companies to leverage their existing security and IT
Innovative video search
Image Content Navigation (ICN)
ICN is a tool designed especially to make operator navigation faster and easier
when tracking targets.
An invisible mesh of hyperlinks connects cameras together in the video.
To track a target with ICN operators simply need to click areas in the video to
switch cameras and track targets.
This makes real-time tracking targets easier and faster removing the need to
switch cameras by manually inputting camera id numbers.
Cware 2.5D advanced mapping technology enables a virtual duplicate to be
made of the monitored location in near 3D, improving the site perspective
while enabling intuitive navigation that delivers faster operator response times
In 3D users can plan new camera sites to improve performance of the system.
Monitoring Via Video Auditing
eVideo Audit is a video monitoring service that provides realtime audits,
notification and exception reporting of a customer’s business processes.
Connect to the customer’s CCTV system to ensure documented business
practices are followed with immediate notification to customers as needed.
Regional manager with multiple locations may need to ensure his employees
are wearing the correct attire, the correct promotional items are displayed, the
correct number of employees is behind the service counter, and the sales demo
units are on display.
However, time and cost to travel to each location to ensure these basic
processes are being followed diverts their time from focusing on customers and
more pressing business activities.
Work is done remotely & customer notified only if process is not followed.
This service represents a true business partnership, helping customers ensure
that their business processes are being followed on a daily basis by their
employees at all locations.
Mate's Video Analytics offering covers quot;simplequot; Video Motion
Detection to identification of Static Objects (like abandoned
provides directional counting and Video tailgating solutions for
Physical Access Control
High End Analytics - including the ability to add logic statements
that create a dependency between two or more alarms (quot;ANDquot; quot;IFquot;
System Topology - products are available as DSP based appliances
(edge device) and as a Server based system at your monitoring
End-user experience – a simple user friendly interface
Total cost of ownership – systems are easy to install, configure, train
and provide ongoing support
specific additional advantages in specific configurations that include
DVTel, GE (VisioWave), American Dynamics/Tyco (Intellex &
VideoEdge), Milestone, Cisco, Advansis and others ( can add
additional platforms to this integration)
On Guard With 24/7 Virtual Security
Audio and video clips are filtered, reviewed, transmitted and verified.
Integrates with intrusion and access control systems,
Monitoring centers a virtual security guard for an organization,
protecting it during or after-hours.
Systems can be programmed when an activation signal is tripped.
When someone enters an invalid alarm code after-hours, when an
outside motion detector is crossed or whenever anyone enters a server
“Innovative alarm companies investing to integrate field systems with
monitoring software .
Investment in open architecture technology and a common IT
platform allows a to offer their customer online, realtime alarm data
and video that helps a customer improve their security and improve
their business operations.”
Managed Access Control Services
Central station managed access control is ideal.
Provides 100 percent of the management and
administration of the customer’s local access control
Provide new employee access cards, photo ID badges,
changing of door lock schedules, deleting or modifying
access levels, generating activity reports and more for the
Eliminates the customer having to purchase, administer
or manage access control software on their computer.
Customers can pick up the phone or request all changes
via an online, realtime Web portal.
Has access to realtime reports and other system and
activity information without an IT infrastructure
Corporate Security Advisors
Develop formulate appropriate (fit-for-purpose) cost effective
strategies,processes, practices, oversee and support the implementation of
Identify, assess, and control protective security related risks and
effectiveness of controls and processes and programs around protective
Strategies, policies & practices for protective and technology security
Relevant processes in support of protective and technical security
Programme/project performance is up to required standards
Internal and external customer relationships are developed and
Protective security incidents and/or crisis do not compromise operations
Security function as a centre of excellence
MI and reporting is reflective of risk (appetite, profile, and status)
Understand the operational, regulatory, compliance, and governance
•Develop maintain quality, timely, risk focused MI and reporting
• Protective security policies in accordance with regulatory requirements
•Provide recommendations ensuring sound leadership and direction
•Co-ordination of resources to ensure cost-effective control
•Identify implications of relevant policies, legislation, and regulation
•Ensure appropriate and consistent compliance with relevant policies
•Ensure business driven requirements and solutions are identified and agreed
•Identify scope (e.g. costs, time scales, benefits) and sponsor key initiatives
•Support, as appropriate, enterprise wide protective security management
•Establish key metrics and measures key performance indicators
•Validate existing protective security management processes
•Ensure awareness training and education programmes are implemented
•satisfy objectives , are delivered on time and within budget
Make onsite security personnel more efficient.
Having a security guard stare at a bank of
monitors for an extended period of time is an
ineffective way to detect crime or suspicious
activity. The result is “surveillance information
Cannot humanly process that much information
fast enough to prevent or even be effective at
minimizing theft or vandalism.
Smart organizations are making their security
personnel more efficient by integrating video with
security control so that video is pushed directly to
security guard’s monitor, PDA or cell phone.
Bomb proof trash cans equipped with lcd
screens to relay the days news
Colombian Designer miguel cabelloro
blazors and T shirts -
Unprecedented security at the 2008
Technological wonders that officials employed to protect the games
MATE Intelligent Video’s system was part of a large, highly secretive
integrated video surveillance system installed at the Beijing National
Bird’s Nest, cost $423 million to build and years of planning to protect.
seating capacity of 80,000 and, in August of 2008, was a central
location of much of the Games
Officials in Beijing chose MATE’s Trigger, an embedded processor for
video detection and transmission, to upgrade the Bird’s Nest’s CCTV
system to an intelligent video detection system.
Trigger monitored strategic areas and critical points in and around
the stadium around the clock.
automated surveillance allowed stadium management to lower
supervising costs and increase response time to security alerts.
Assess and manage security across your international operations.
Mitigate the risks and threats facing each of your operating
facilities, security consultants will develop a detailed risk
assessment and provide a report with specific, actionable
recommendations to reduce and mitigate your risks.
designed to meet organization’s strategic requirements.
including forecasts for specific countries, risk comparisons of
specific locations, and in-depth reports on threats such as
terrorism, kidnapping and crime.
Identifies the security risks and steps required to protect
organization and assets. Plans cover physical security, personnel
security and emergency response protocols.
Site security management
in high-risk remote locations, experienced security
managers help manage everyday security risks on site.
They also provide a seamless link to our regional
security and medical teams so that immediate support
can be accessed in an emergency.
Provide realistic scenarios on personal security
protocols and traveler security awareness and
Logistics management in high-risk environments
Provide expertise to assist your operations with the
movement and management of resources.
A Balanced Approach to Security
New exciting technologies and service offerings
aside, security providers should never lose sight
of primary objective of asset safety.
Technology gains have created new
Successful companies will complement their
security message with tangible business benefits
— a true partnership
Security needs to continue to grow to become a viable and
competent technical skill such as medicine, law, engineering
and the like. India is well short of this objective and the
companies that sell product or people to suit their revenue
projections are and endangered species but until more
professional security personnel, companies, business skills and
vendors come into the market, they will continue to exploit the
uneducated client market and leave a dirty stain in the
industry until it happens.
Risk management is not discretionary spending and business
resilience is rapidly becoming a competitive edge.