Newsletter: February 2014
Let’s professionalize the professionals…
http://sbtyagi.wix.com/icissm
Security professionals in...
Tom Exley & Jaiprakash Vappala, ComNet Europe Ltd
jvappala@comnet.net
Explore the of use of environmentally hardened fiber...
Prior to the introduction of video over IP (or Internet Protocol), a separate network of analog or
digitally encoded video...
These encoders employ signal compression technology to reduce the bandwidth occupied by the
video, so as to increase the n...
The system shall support 10 or 100Mbps Ethernet as well as Pass-through Power over Ethernet
(PoE) over twisted pair cable ...
Jai Kumar Varma, IPS (Retd.)
Naxalites again captured the headlines albeit for a wrong reason by
blowing a jeep in Auranga...
The LWE has a three phase plan.
In the first phase the Naxalites would gain the support of masses through mass movements. ...
officials of police forces should be trained, modern weapons and amenities should be provided to
them.
The need of good an...
Banks / Financial Institutions till date prefer diligences at a restricted level, governed by the biases
of credit ratings...
By Col NN Bhatia (Retd)
Besides numerous other things, I had always
admired two the most in recent times. The
one is ‘The ...
 Is Delhi Metro capable of warding off chemical, biological, radiological and nuclear (CBRN)
threats by terrorists /anti ...
P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please let us know
your mail address a...
Upcoming SlideShare
Loading in …5
×

ICISS Newsletter Feb 14

301 views

Published on

Security professionals in general and Indian security professionals in particular have reasons to rejoice as doyen of Indian Industrial Security has achieved the positions in the governance and decision-making where his rich experience, profound industrial insight and deep-rooted commitment for the betterment of the Indian Security Industry will see some long term initiatives and beginning of new policies aimed to strengthen the overall position and future development of the Industry.

Shri RK Sinha has been nominated as candidate for election as member of the Rajya Sabha (Upper House of Indian Parliament) recently. Shri R K Sinha, fondly known as RK in the security fraternity is a man of many hues. Mr. Sinha started Security & Intelligence Services (India) Limited with a team of two persons from a small rented office in the eastern parts of India in 1974. Today, SIS Group is recognized as one of the leaders in manpower security business in Asia Pacific with over 36,000 permanent employees and 3000 corporate customers.

Mr. Sinha is widely recognized as a pioneer and Industry leader. He represents the private security industry before government bodies for legislation and regulatory matters regularly. Mr. Sinha also served as an Advisor to Ministry of Human Resource Development, Government of India (1999 - 2004).

Capt S B Tyagi
For ICISS

Published in: Education
  • Be the first to comment

  • Be the first to like this

ICISS Newsletter Feb 14

  1. 1. Newsletter: February 2014 Let’s professionalize the professionals… http://sbtyagi.wix.com/icissm Security professionals in general and Indian security professionals in particular have reasons to rejoice as doyen of Indian Industrial Security has achieved the positions in the governance and decision-making where his rich experience, profound industrial insight and deep-rooted commitment for the betterment of the Indian Security Industry will see some long term initiatives and beginning of new policies aimed to strengthen the overall position and future development of the Industry. Shri RK Sinha has been nominated as candidate for election as member of the Rajya Sabha (Upper House of Indian Parliament) recently. Shri R K Sinha, fondly known as RK in the security fraternity is a man of many hues. Mr. Sinha started Security & Intelligence Services (India) Limited with a team of two persons from a small rented office in the eastern parts of India in 1974. Today, SIS Group is recognized as one of the leaders in manpower security business in Asia Pacific with over 36,000 permanent employees and 3000 corporate customers. Mr. Sinha is widely recognized as a pioneer and Industry leader. He represents the private security industry before government bodies for legislation and regulatory matters regularly. Mr. Sinha also served as an Advisor to Ministry of Human Resource Development, Government of India (1999 - 2004). Capt S B Tyagi For ICISS Food for Thought: It takes a lot of courage to release the familiar and seemingly secure, to embrace the new. But there is no real security in what is no longer meaningful. There is more security in the adventurous and exciting, for in movement there is life, and in change there is power. - Alan Cohen
  2. 2. Tom Exley & Jaiprakash Vappala, ComNet Europe Ltd jvappala@comnet.net Explore the of use of environmentally hardened fiber optic and copper-based transmission equipment for deployment in harsh out-of-plant operating environments utilized for the transmission of high quality video, audio, serial and Ethernet data, for CCTV surveillance, perimeter monitoring and data, for control in demanding mission-critical/extreme reliability applications, using a variety of network configurations and architectures. Introduction The industrial automation and process control industry utilizes specialized communications and networking equipment designed to operate reliably in extremely difficult environments. Characterized by wide variations in operating temperature, high humidity, high levels of vibration and mechanical shock, voltage transient conditions, EMI/RFI, and exposure to airborne and particulate matter, these environments demand communications equipment that is specially designed for the task at hand, including highly robust design and construction, to ensure the network remains as reliable as possible. Equipment installed must be designed for deployment in harsh, out-of-plant environments, such as those encountered in petrochemical refineries, oil and gas pipelines, ITS/heavy and light railway/transportation, mining, pulp and paper, discrete manufacturing (food & beverage production and processing, robotics, pharmaceutical production), and virtually all aspects of the industrial automation and process control. The industrial security market has been witnessing the gradual transition to video, audio and data transmission over Ethernet. This change has impacted numerous other markets as well, including the transportation, factory automation/industrial control, and utility/electric power transmission and distribution markets. A key concern amongst petrochemical refining, distribution, and oil and natural gas exploration companies is the reliable and uninterrupted flow of product at all stages of the production process. Ethernet has been widely adopted as the networking technology of choice for nearly all SCADA (Supervisory Control and Data Acquisition) systems deployed in this market, for the control and monitoring of high-volume refining and pipeline/distribution applications. Industrial Ethernet applications must mandate the requirement for security provisions to ensure that the network remains safe from any possible intrusion. The managed switches shall include SSH (Secure Shell), SSL (Secure Sockets Layer), to ensure the security of the network. Wavelength-Division Multiplexing & Self-Healing Ring Tom Exley holds a degree in Electrical and Electronics Engineering from Huddersfield University – UK. Tom has experience within the fiber industry for the last 15 years as field and technical sales and currently holds the position of senior technical sales manager at ComNet based at the EMEA/Asia HQ in Leeds UK. Jaiprakash Vappala holds a Bachelors degree in Electrical & Electronics Engineering from Mangalore University. Gained work experience in Sales, selling Fire Alarm & Electronic Security products and solutions across India. Represented Group4, Tyco, CBC in over 18 Years of work experience as individual contributor, team member & leader, attended a one year executive program on Strategic Management from IIM Kozhikode. Currently, responsible to develop the South Asia market, for a USA head quartered, Innovative manufacturer of fiber optic transmission and networking equipment, doing business as ComNet.
  3. 3. Prior to the introduction of video over IP (or Internet Protocol), a separate network of analog or digitally encoded video was typically utilized for hauling the video from the edge of the network back to the monitoring location. Audio for telephony or a communications intercom system; RS- 232, RS-422, or RS-485 serial data, commonly used for CCTV camera pan-tilt-zoom (PTZ) control or the card access element of the system, was transmitted from the field devices back to the control center on other dedicated and parallel networks. The transmission media of choice was usually optical fiber for reasons of robustness and bandwidth. Using a technique of wavelength-division multiplexing, sending signals of several different wavelengths of light into the fiber simultaneously, allowing multiplication in capacity in addition to making it possible to perform bidirectional communication. A cost-effective system design to a challenging security-related application is a fiber optic drop-and-insert video and data transmission system designed for large-area perimeter surveillance and monitoring applications. It Shall be designed for use with the optical fiber typically configured as a true ring, the optical network shall also be configured in the easier-to-deploy linear add-drop topology and utilizes 10-bit digital encoding of baseband composite video for true broadcast quality video performance, and shall provide an easy to install platform for the video and control data to be inserted and extracted at multiple insert-and-drop (or monitoring) locations throughout the network. Transmission distances of up to 48 km between nodes is available when the single-mode variant of this equipment is employed, making the self-healing ring system ideal for extremely wide area networks and related applications. This technology would help in the judicious use of existing infrastructure of fiber in the plant by way of recycling and maximizing the use of fiber by using the same fiber for both Analog and IP video. The optical technologies and system design approaches are still very viable solutions for hauling high-quality, full-motion video, audio, and data, and when optical fiber is employed as the communications media, extremely long transmission distances and electrically noisy environments are easily accommodated. Why use Ethernet The difficulty of installing and maintaining two or more parallel and technically diverse networks, one for video, one for audio, and another for serial or other data, has motivated many users to consider the use of Ethernet as their preferred communications networking system. The relative ease of integration of the key components of the system onto a common platform has largely made Ethernet the networking solution of choice in the many markets, including the industrial security market. With the advent of Ethernet, it now became practical and cost-effective to consolidate the video, audio, and data elements of a security communications subsystem onto a single network. Although in theory this should be the ideal platform for the typical local or wide area communications network utilized for industrial security and other surveillance applications, in practice several key and recurring issues are frequently encountered by the systems integrator and end-user responsible for the installation, maintenance, and operation of the system. When analog video is to be deployed onto the network, a video encoder is required to convert the camera video output into an electrical signal that is compatible with transmission over an Ethernet- based network.
  4. 4. These encoders employ signal compression technology to reduce the bandwidth occupied by the video, so as to increase the number of potential video, audio, or data signals that may share the finite bandwidth available on the network. Present video compression standards include MPEG-2, MPEG-4 and H.264, with MPEG-4 currently most widely used. The H.264 standard is newer and offers the advantage of enhanced video quality with the benefit of reduced bandwidth. MPEG-2 was originally developed for use by the commercial television broadcast industry, and although capable of superb video quality, its bandwidth requirements are large. As such, it has not been widely accepted for use within those communications networks employing Ethernet. Regardless of the compression standard utilized, hardware decoders or decoding software compatible with the encoded video are required for viewing the video. One major issue involves the relative lack of MPEG-4 or H.264 video encoders that are environmentally hardened when these devices are installed in an out-of-plant operating environment. In this kind of environment, issues such as ambient operating temperature, voltage transient protection, vibration, mechanical shock, and humidity with condensation must be considered to ensure that the video encoders or other field equipment are capable of providing long-term reliability and stable performance. Hardware capable of withstanding the extended operating temperature range, humidity with condensation, and electrical voltage transients and noise encountered in an outdoor or out-of-plant environment are few and far between, and the equipment is costly as a result. The MPEG-4 and H.264 video compression standards are suitable for transmission over Ethernet. As these standards rely upon video compression, the video in these standards is not transmitted in real time, and exhibits a certain amount of latency depending upon the compression standard utilized. The high system bandwidth requirement imposed by the video ultimately limits the total number of video channels and other signal sources that may be inserted onto the Ethernet platform. Many end-users have been disappointed with the video quality of their video-over-Ethernet system, especially when the video is viewed on highly revealing wall monitors. In addition, some video surveillance or monitoring applications mandate the use of high resolution cameras, and much of the resolution provided by these cameras may be lost when the video is compressed to MPEG-4 or H.264 and inserted onto the network. Although Ethernet is based upon the industry accepted IEEE 802.3 standard, and in theory any manufacturer’s Ethernet equipment should be completely interoperable with any other manufacturer’s equipment, in practice this is very frequently not the case. Pass Through PoE The pass through PoE eliminates the need for remote power to Powered device (PD), passing- through up to 30 watts of power per port to the powered device (PD). The IEEE 802.3-compliant Ethernet electrical interface of these Ethernet extenders also meets the requirements for IEEE 802.3af PoE power, passing through power to the PD. It is an advanced and unique technology that extends Ethernet networks beyond the 100 meter limitation encountered when using COAX or UTP for IP Video and Ethernet-based applications. It is a cost-saving alternative that enables you to use existing COAX and UTP cables for significantly greater Ethernet transmission distances.
  5. 5. The system shall support 10 or 100Mbps Ethernet as well as Pass-through Power over Ethernet (PoE) over twisted pair cable (CAT5, UTP) or Coaxial cable. The device shall support transmission distances of up to 500m at 100 Mbps or 900m at 10 Mbps on twisted pair and 1500m on coaxial cable PoE pass-through can be used to provide power redundancy for PoE IP cameras with previously installed power drops. Protecting Copper Media transmission Equipment from the Effects of Lightning and Other Voltage Transient Events With the advent of long-distance transmission of Ethernet data through copper media, such as CAT-5E/6E wiring, unshielded telephone-grade twisted pair (UTP), and coaxial cable, it has become necessary to consider the protection of the field and head-end equipment from voltage transient events, including lightning and other high-voltage conditions. Stray voltage conditions should be considered as well. For the field or outdoor equipment, such as a CCTV camera, access control equipment, etc., the “45 degree cone of protection rule” should be rigorously observed. Ideally, the camera and housing should be located beneath an imaginary 45 degree angle drawn from the top of the supporting structure or building. If it is not practical or possible to do this, a properly grounded lightning rod must be installed in the near-field of the camera, so as to attract lightning or other static discharges away from the equipment. Otherwise, the risk of a near or direct hit to the camera becomes significant, and no existing technology can protect delicate electronic equipment from a direct lightning hit. As an example, unprotected parking-lot cameras installed on metallic support masts, or cameras mounted on metal-skinned buildings are particularly susceptible to lightning damage. If the camera is mounted to a metallic structure, it becomes necessary to electrically and mechanically isolate the camera from the structure. This may be easily accomplished by the use of plastic or nylon screws, washers, and other non-metallic hardware, to effectively isolate the camera housing and its associated wiring away from the structure. The camera and all related equipment must electrically float relative to ground on the structure. If there are grounding attachment points or connections (i.e. screws, nuts, etc.) on the camera, the camera housing, or any other equipment located in the field and related to the camera, they must be individually wired to the modem ground connection with a minimum of 12 gauge solid conductor (not stranded) wire, but do not connect any of this equipment to earth ground. This single-point or star grounding practice is highly effective for protection against high voltage transients and low-voltage ground loops, and can eliminate troublesome video hum bars that otherwise may occur. Standards  RFC-2544 TCP/IP network bandwidth packet transmission standards  IEEE 802.3af PoE,  RFC: 768 UDP, 2068 HTTP, 793 TCP  791 IP, 1783 TFTP, 894 IP over Ethernet.  NEMA TS-1/ TS-2 Environmentally hardened, to the requirements of for most out-of-plant applications Reference: www.comnet.net
  6. 6. Jai Kumar Varma, IPS (Retd.) Naxalites again captured the headlines albeit for a wrong reason by blowing a jeep in Aurangabad on December 4, 2013 killing seven persons including six policemen of Special Auxiliary Police (SAP). The SAP was raised in 2006 to handle the problem of Left Wing Extremism in Bihar. The Naxalites also looted the arms & ammunition including the Self Loading Rifles of the SAP. Aurangabad which is abutting Palamu District of Jharkhand is a stronghold of Naxals. Although no group has taken the responsibility of this dastardly act but according to informed sources Communist Party of India (CPI) (Maoist) which is strongest and largest is behind this attack. In fact TPC (Tritiya Prastuti Committee) a faction of CPI (Maoist) is active in this area but TPC does not involve in such attacks. The aim of Naxalites or Left Wing Extremism (LWE) is to overthrow the lawful government through mass mobilization and armed struggle. LWE wants to capture the power, territory and resources. They proclaim that they are fighting against exploitation of poor and for the rights of landless farmers, sharecroppers, untouchables and tribal people of India. The Maoists have neither faith in the democratic government of India nor owe allegiance to the Constitution of the country. In the early years both state and central governments treated LWE solely as a law and order problem and dealt it with iron hand hence it appeared that the insurgency is curbed but it was only suppressed outwardly and cropped again with augmented force. Several groups of Naxal movement joined together and merged in CPI (M) which became the biggest and most powerful group of LWE. Naxalites have powerful presence in several states of India including Andhra Pradesh, Bihar, Chhattisgarh, Jharkhand, Madhya Pradesh, Maharashtra, Orissa, Uttar Pradesh and West Bengal. In 2011 LWE had influence in 182 Districts of India. The LWE threat is enhanced up to the extent that Prime Minister Manmohan Singh stated on May 24, 2010 that Naxalism remains the biggest internal security challenge and it is imperative to control Left-wing extremism for the country’s growth. The Maoists controlled tribal region, mineral rich forest areas are called ‘Red Corridor’. The tribal of Red Corridor are fully exploited by industrialists, corrupt bureaucrats and politicians who have displaced them by grabbing their mineral rich forest land for mining, establishment of wild life parks and sanctuaries. These tribals were displaced from their land and neither government nor industrialists made any viable arrangement for them. According to an estimate about 20-24 million tribal people were displaced between 1951-2005 due to various mega hydro- electric projects, dams, mines excavations etc. The Naxalites earn the good will and faith of these tribal when they attack security personnel, rural landlord, businessmen, politicians, government officials or anybody who are close to administration. The author has retired as Director, Cabinet Secretariat in 2007. He has attended several courses in India and abroad related to collection of intelligence, analysis of reports and preparation of notes under which current situation was depicted as well as future scenario is predicted. Besides this, it is also suggested in the notes what measures should be adopted so that the situation becomes in favour of the country. He has handled the internal security matters at National level beside administration of large work team. He had various overseas tenures in several countries including Pakistan. Presently he is working as Consultant in India Strategic magazine (www.indiastrategic.in). Besides working he is also writing articles in the magazine and delivering lectures in various Para military & intelligence organizations. He has special interest in internal security, terrorism, terrorist organizations in India and abroad, Naxalism, Foreign relations. He can be reached at - jai_pushpa@hotmail.com
  7. 7. The LWE has a three phase plan. In the first phase the Naxalites would gain the support of masses through mass movements. In the second phase LWE will build bases in forest areas and distant places and will wage guerrilla war against administration and political system. LWE will seize control of countryside. In the third and final phase LWE will overthrow the lawful government of the land and will take control of the state. Fortunately in most of the areas Maoists are still in first phase. Besides waging an armed struggle against central and state governments LWE has also created several frontal organizations including NGOs. These organizations safeguard their interests, raise funds, make propaganda in their favor, render legal support and also provide them places of safety at the hour of need. Not only this when security forces kill any Naxalites these frontal organizations raise lot of hue and cry but generally remain silent when LWE kill security forces personnel, innocent villagers or contractors men. According to intelligence reports LWE has relations with secessionist groups of North Eastern States of India, Liberation Tigers of Tamil Elam (LTTE) and Maoists of Nepal. LWE is getting arms & ammunition from LTTE and training from terrorist groups of North East. Maoists of Nepal extend all type of assistance to LWE. Foreign agencies like Inter Service Intelligence (ISI) of Pakistan support separatists either directly or through dummy organizations. The Maoists have a better intelligence network then the security forces. According to a rough estimate there are about 15000 to 20000 armed LWE fighters and a large number of sympathizers all over the country which includes so called intellectuals, media persons and others. The LWE problem is not merely a law and order problem and the effected state governments cannot solve it separately or jointly. The Central government must take the lead and play a pro active role. In 2009 Naxal Management Division under Ministry of Home Affairs (MHA) started looking after the LWE problem. Several units of Commando Battalion for Resolute Action (COBRA) were constituted under Central Reserve Police Force (CRPF). These units are especially trained in guerrilla warfare. Besides these units about 50000 officers and men of Para military forces were sent in troubled states. Secondly the problem has to be dealt politically as well as economically. The main aim is to persuade the so called terrorists to surrender their arms and join the mainstream. Hence several poverty eradication programs, for improvement in rural housing, removal of malnutrition among children, construction of roads in rural areas, electrification etc. were introduced. Unfortunately these poverty alleviation programs could not achieve desired results due to rampant corruption in their implementation and severe opposition and propaganda by LWE. The administration should impart job oriented education to its growing youth population so that the unemployment can be curbed. Several political leaders, bureaucrats, businessmen, have developed selfish interest as well as close relations with the LWE. It is essential to break this nexus as they do not want to eradicate the influence of LWE in the area of their interest. The government should give more powers to local administration so that tribals are recruited for the implementation of various poverty eradication programs. The surplus government land can be distributed among the landless tribals. The police forces of all the LWE affected states except Andhra Pradesh are poorly funded; have obsolete weapons, age old communication system, neither they have adequate training nor will to combat Naxalites. The local administration is corrupt and lacks the will to counter the LWE. The
  8. 8. officials of police forces should be trained, modern weapons and amenities should be provided to them. The need of good and timely intelligence for security operations cannot be over emphasized. The Para military forces are dependent on the intelligence network of state police as well as of Intelligence Bureau. However very less actionable intelligence, was received by Para military forces from them because of various reasons. Now CRPF has created its own intelligence wing, hence it is expected that soon CRPF will be capable to collect actionable intelligence itself which will be helpful in conducting more result oriented operations. In most of the countries offensive counter-insurgency operations are conducted by army. However Indian army is reluctant to take over these operations as LWE effected areas are far-off from international borders and army’s primary responsibility is to safeguard the borders of the country. Hence a specialized force on the pattern of Greyhounds of Andhra Pradesh with specialized powers, weapons, training, and facilities should be created to encounter the LWE problem. There should be an Integrated Action Plan and inter-state coordination should be enhanced. A long term strategy should be chalked out between Centre and all Naxalite affected states and all planning, resources, intelligence should be disseminated from there for action against LWE. Sagarika Chakraborty With more than 13,000 investors waiting for their default debts to be paid off by National Spot Exchange Ltd (NSEL) (amounting to approximately INR 5,600 crores), the Indian corporate tapestry has been re-introduced to some old fears. The mandates are already out to initiate civil and criminal proceedings against NSEL however, what really lacks a mandate is the process or the lack of it that landed the investors in here in the first place. The boon of the corporate sector also brings along with itself the bane of increased cases on non-paybacks of loans. With the IBA and the RBI already setting stringent norms on asset disclosure or Know Your Customer (KYC), little is needed from the policy point of view – however, what goes into practice is another story. The pledged assets at times of stress are often found inadequate to cover exposures and cash flows often a trickle versus the outstanding amount. Perpetrators of serious financial/ corporate crimes, use advanced technological and other measure to easily hide the flow of stolen funds or immoveable/ moveable assets and attempt to conceal them from detection. The ideal solution to the above for banks / financial institutions, to the problem seems to identify all avenues of cash flow, asset assimilation and keep the list handy before the rough times hit the shore. The Central Banks across the globe have in recent times, under numerous circumstances emphasized on the need of a checklist to be adopted by financial institutions while dealing with new debtors. The checklist and its usage, coupled by the credit ratings and financial diligences are found to be the only way to manage contingent risks related to non-repayment of dues. However, saying that – such a scenario is only followed in policies and on paper. Author is the Head - Western Region for Pinkerton India (www.pinkertonindia.co m) and alumnus of ISB, Hyderabad (Year 2012). She specializes in corporate investigations and security risk consulting.
  9. 9. Banks / Financial Institutions till date prefer diligences at a restricted level, governed by the biases of credit ratings and checks. Aspects of risk management of physical assets and overall reputation of the debtors are still not given the due thought that the current situation mandates. Due Diligence as the term indicates in common parlance is the necessary steps that need to be taken up by a creditor at the outset of extension of credit or renewal of old credit facilities. The commonly red flagged areas of due-diligence that are ignored by financial institutions are:  Checking into the market reputation of the corporate or its promoters on a ground level  Checking with other financial institutions as an informal method of reference about the credit history and list of assets forwarded by the debtor  Conducting a revalidation into the list of assets during renewal of extension of credit lines The above coupled by the absence of exposure to asset tracing experts add to the woes of the financial institutions including banks. Further, even for experts identifying assets that are stashed across jurisdiction is no easy a task. It is to be remembered that asset tracing investigations generally require a focused and consistent approach in order to achieve their ultimate objective: identify assets underlying a business deal or recover assets that were misappropriated. Also, there are no fixed rules when it comes to tracing of misappropriated assets, even for the experts. The most experienced ones often resort to a 3 pronged approach to conduct a holistic diligence study all aspects with regard to the debtor and his business. The process starts with establishing a linkage between the parties via an intelligent analysis to determine the title of assets or to identify cross links between different entities and individuals (Link Analysis) and then connecting the dots between the various assets - moveable, non-moveable and funds (Charting Analysis) to know about pertinent ownership of such assets. Apart from the technical sources and various forensic tools involved the entire process is heavily dependent on the tapping of human resources in gathering information and intelligence about the parties involved in the transactions (Human Network Analysis). Though it all sounds good and extremely suave, the lack of clarity for various aspects of law in India, the unwillingness of banks / financial institutions to accredit the above mentioned modalities poise a lot of hindrance and delay. Quite often than not, the time lag in taking a decision on conducting such an exercise also gives the debtor ample opportunity to wash away his hands from such assets and make tracing almost impossible. The immediate step is to realize that the advancement of technology and intelligence can be used both to ensure that corporate misgivings are avoided as well as to execute them to near perfection. It is therefore essential that financial institutions wake up to the need of credibility checks of debtors on a holistic level in order to reduce instances of contingent fugitive recovery and stabilize the corporate debt tapestry of the economy.
  10. 10. By Col NN Bhatia (Retd) Besides numerous other things, I had always admired two the most in recent times. The one is ‘The Delhi Metro’ and the other Mr Elattuvalapil Sridharan who constructed it. This extra ordinary Indian engineer has not only made Delhi Metro but was also involved in the construction of the Kolkata Metro, Cochin Shipyard Limited as its CMD, Konkan Railway and has been bestowed with over 60 national and international honours and awards that include Man of the Year by The Times of India (2002) CII (Confederation of Indian Industry) Juror's Award for leadership in infrastructure development (2002–03), One of Asia's Heroes by TIME (2003), Padma Shri and Padma Vibhushan. The Metro Ordeal I had unscheduled visit to Kirtinagar on 9 Dec 2013 by Delhi Metro to attend the prayer meeting of a distant relation’s demise. I walked up to Golf Ground Metro Station at 1445 hrs and caught the train at 1500 hrs that should have reached Motinagar Station around 1540 hrs. To my horror Metro was crawling and halting intermittently before and after every station for 5-10 minutes. The train was overcrowded and I had to stand perforce amidst shrills and cries of numerous babies getting restless. Since there are no toilets in Metro trains and doors remained shut, many oldies like me with bladders to brim had harrowing times. Unfortunately, there was no announcement but passengers were talking that there was some technical snag. To make matter worst the train stopped over the Jamuna River Bridge for over 30 minutes. From Rajiv Chowk onwards the train moved smoothly and I reached Motinagar 5 minutes to 5 pm. The next day’s Times of India carried the big news ‘Cable missing, Metro services on Dwarka line held up’. The paper says the damage was intentional there by suggesting major cable theft of 700m length that could be sabotage as well. The fact that the signaling cable theft in Delhi Metro‘s Blue Line caused inordinate delays and overcrowding at stations on Monday the 9 Dec 2013, needs to be thoroughly investigated. I am sure the Metro Management along with police and the CISF deployed for its protection must have formulated its security management keeping the threat analysis in mind, highlighting every possible threat to Metro and counter measures to optimize its security along with that of passengers and its infrastructure. Also, any compromise to its security would be fodder for the media denting our good governance and credibility. The Delhi Metro Corporate Office must deliberate and answer these questions:-  Is track being patrolled in the intervening night period between the last night trains to the time first trains starting the next morning? If yes, what is the frequency and if no why it is not being patrolled? There is need to have armed patrol cars to keep up the surveillance.  Is the entire track under the CCTV coverage or not and what are the tell tale signs?  What measures Metro administration would be taking to ensure safety and security of its property and the passengers?
  11. 11.  Is Delhi Metro capable of warding off chemical, biological, radiological and nuclear (CBRN) threats by terrorists /anti national elements (ANEs)?  The SCADA (Supervisory Control and Data Acquisition) also called Industrial Control Systems (ICS) widely used in totally computerized management in mass transit industry like Metro, power generation, sewage management, ports, airports, refineries, steel plants and shipyards etc, can be hacked easily by our anti national elements (ANEs), terrorists and enemy countries to project our country adversely in the world’s eyes as soft state unfit for investment. We need to develop SCADA hacking counter measures and our experts know what these are and Government’s desire should not be lacking to implement them. It is amazingly shocking that 700 meters of signaling cable goes missing/damaged and Metro administration comes to know that only after that had happened so late to rectify defects and normalize its operations. We need to ward off acts of sabotage both in underground and elevated sections including derailments, accidents, fires, earthquakes, flash floods and the sarin gas like attack witnessed on the Tokyo subway as act perpetrated by members of Aum Shinnkyo on 20 March 1995. We need to learn that there had been major attacks on such trains in Madrid, Moscow and London in the recent past. ICISS at LinkedIn: http://www.linkedin.com/groups?gid=4413505&trk=hb_side_g ICISS at Google Group: https://groups.google.com/forum/?fromgroups#!forum/icissm Suggestions & feedback may be sent to us on e-mail: onlineicissm@gmail.com
  12. 12. P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please let us know your mail address and we will move it out from our contact list, thank you!

×