tter: Au
ugust 2

Let’ profe
fessionalize t pro
the ofessio
sed in 20
007 while writing the forwa
ard of th book “Industria Security –
ment and Strategies ...
Security planners have to learn to pinpoint and protect the critical complex networks for
producing and distributing energ...
strict stan
ndards of p
physical se
ecurity can be devast
tated by at
ttacks on it information resourc
One of th b...
Col N N Bhatia (Retd)
Industrial Security Consultant
It takes o
only 2 minu
utes for a c thief to run away w your c No ma
Project O
O-sint (Op
pen Source Intelligence) has gained m
momentum with polic
receiving interest fr
rom as man as 18...
Answer is Yes, only if the laid down system and procedure would have been scrupulously
In case of Bodh Gaya, ...
understand any difficulty and in ensuring proper execution of the scheme. Timely remedial
action should be the key-word fo...
On Jul 8 2013, Ca Manish Chandra
om> wrote Dear Cap Tyagi,
Thanks ...
If you do no wish to r
receive this Newslette
ers, please Reply, ‘RE
EMOVE’ in subject an your nam will
be remo...
Upcoming SlideShare
Loading in …5

News letter aug 13


Published on

Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)

Published in: Education, Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

News letter aug 13

  1. 1. N Newslet tter: Au ugust 2 2013 Let’ profe ’s fessionalize t pro the ofessio onals… http://w www.wix.com/ /sbtyagi/iciss Th month, India c his celebrate its Ind es dependen Day. nce W What a g glorious day, as this d s day has shown the w s n world tha path to at Independe ence need not be trough v violence! ! his has wn world tha non-vio at olence is even m s more potent tool for Th day h show the w independe ence that weapon of viol t ns lence! his own the world th Indep hat pendenc can be obtain ce ned witho out Th day has sho sh hedding t blood the d! C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  2. 2. (Express sed in 20 007 while writing the forwa e ard of th book “Industria Security – he al y Managem ment and Strategies by Shri DC Nath, IPS (Retd and Ca SB Tya his vie s” i , d.) apt agi, ews are cont temporary even now y w!) The conc cept and pr ractice of industrial security are as old as industry e itself. It is essentia that they keep pac with the technolog al y ce gical and evelopments in indu ustry; and the chan nging patt terns of other de The origin and ba vulnerabilities and threats. T nal asic objec ctives of l were the prevention/d detection o pilferage (mostly of e industrial security w by disho onest workers) and sabotag (mostly by disgruntled d ge workers). New development and tec ts chnologies in indust have try created new vulne erabilities a and it has become necessary for the s y rs actitioners of industrial security to adapt to face y manager and pra such vuln nerabilities and devic s ce/learn new techniqu w ues. ation and g globalizatio have led to the growth of on Economic liberaliza rial enterprises, man of them transny m large and diversified industr er. of at te national in characte Some o the very factors tha contribut to the ful ning of su uch Multin national Co ompanies (MNCs) successf function tend to become security vul lnerabilities Many M s. MNCs inclu ude a mul ltitude of e economic and technolog gical syste ems (that are like networks) for their efficient functionin ) r ng. The m more develope and com ed mplex the interconne ected netw works beco ome, the m more they have featu ures that mak their b ke behavior n non-linear; i.e. a sm mall shock to a cri k e itical node produces a disproportionately large disruption. MNC also ten to dispe Cs nd erse their m manufactur ring facilitie in es different countries, based on availabilit of raw materials, inexpensiv real estate / pow / n ty ve wer to the f tensive pro oducts by b building larg produc ger ction labor etc. They try t reduce t cost of capital-int equipment and highly skilled pe y eople in a single location provi ides facilities. Placing expensive e er fficiency a and synerg gies that lead to t the creatio of wea on alth. for easie access, more ef Manufacturing and storage fa acilities of many MNC are like to contain device packed w ely es with Cs energy, c combustibles, and po oisons; crea ating speci ialized vuln nerabilities. The conc centration of high-va alue and/or hazardou assets in relatively compac locations in us ct s, order to achieve economie of scale, creates extraord es s dinary vuln nerabilities that call for extraordinary effort from thos respons ts se sible for ind dustrial sec curity. Indu ustrial secu urity manag gers and prac ctitioners ar required to be able to advise their man re d e e nagements about pos s ssible step to ps reduce th vulnera he abilities rela ated to com mplex tech hnologies u used by th hem. They have to le earn about the possible dispersal of high-va e alue assets loosenin the coup s, ng plings in th corpora he ate’s networks building buffers in these networks, introducin "circuit breakers" that inter s, nto ng rrupt dangerou feedbac etc. us ck, Though t terrorism is itself not a new phe s enomenon, internation nalized net tworking (o often based on d religious considerations) pose security threats to industrial units, bas on cau es y o sed uses that m may lie far fro the loc om cation of th industrial unit, e.g. real or imaginary grievance against the he y es government and/or the preva r ailing dispa arate economic order. Sophisticated terro orists are m may increasin ngly use non-weapon technolo n ogies for d destructive ends. Tec chnologica advances in al communications an informa nd ation techn nology (IT) help them to give another m m meaning to the acronym WMD - W Weapons of Mass Disr ruption, not necessarily of Mass Destructio t s on. C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  3. 3. Security planners have to learn to pinpoint and protect the critical complex networks for producing and distributing energy, information, water, and food. Disruption of these would be most susceptible to the multiplier effect of technology-amplified emotional response. Systems handling energy and hazardous materials are easy targets for turning supposedly benign technology to destructive ends. Specialist analysts around the world have warned that future terrorist acts may include more sophisticated forms of destruction and extortion, such as disabling or penetrating vital commercial computer systems. Sheikh Omar Bakri Muhammad, Syrian-born founder of the London-based group Jama'at Al-Muhajirun and the spokesman for Osama bin Laden's International Islamic Front for Jihad Against Jews and Crusaders, had claimed in an interview, that "I would not be surprised if tomorrow I hear of a big economic collapse because of somebody attacking the main technical systems in big companies." "Cyber-terrorism" is often used as a blanket term covering the threat of viruses, hackers and miscellaneous security breaches, regardless of whether or not they actually originated from terrorists. Although it is theoretically possible for electronic intrusions to damage critical infrastructure, taking control of well protected systems from the outside is extremely difficult; and can be almost totally prevented through well-planned computerized and non-computerized fail-safe measures. Digital intrusions can also compromise intellectual property and sensitive research data that can lead to long-term economic loss. They can place customer data at risk and erode confidence and trust in an enterprise and its affiliates. The number of organized hacking syndicates targeting financial and investment institutions around the world are growing at a disturbingly rapid rate. The financial industry's increasing dependence on the public telecommunications system, rapid adoption of wireless systems and outsourcing of operations to third parties pose growing security challenges. Cyber-security within an enterprise is not merely a technical problem, but should be handled as a management challenge. The scope of the risks is such that it can be effectively managed only by engaging senior corporate leadership. Preparedness plans should ensure that digital security is factored into the overall operations of the enterprise. Business espionage often referred to by the elegant euphemism of "competitive intelligence" probably started when the first competitor set up business. Though many companies already go to great lengths to obtain trade secrets and other business information about their competitors, it has been assessed that these efforts will intensify and be more aggressively pursued in the coming years. They may use any combination of legal, illegal, ethical, and unethical techniques. The ushering in of the digital and information age has brought about a sea change in the methods of business espionage. Many new and not-so-widely-recognized threats and points of vulnerability have been created. Some of the new threats may seem to belong to the realm of science fiction, but they are very real. What others get to know about a company can make or break the company's ability to compete effectively. Many companies are gradually starting to recognize that fences and gates, locks and guards, cameras and alarm systems no longer provide adequate protection. Even a company that has C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
  4. 4. strict stan ndards of p physical se ecurity can be devast tated by at ttacks on it information resourc ts ces. One of th basic pr he remises of counterinte elligence is that there is no such thing as coincidenc s e h ce. ntelligence programs should be in plac to reco e s ce ognize the indicators of busin e s ness Counterin espionag operatio that co ge ons ould advers sely affect the comp pany. It wo ould be a g grave mista ake, however, to assum that the old rules o physical security no longer apply. Thou all secu me of o ugh urity requirem ments shou uld becom an int me tegral par of ever compan rt ry ny's busin ness strate egy, managem ments would expect t industri security division to be primar respons the ial y o rily sible. he of ulnerability is a weak y kness in th system and he Risk is th result o vulnerabilities and threats. Vu threat is what some eone can d to hurt y by exploiting vuln do you nerability. A threats a most likely As are to origina from ho ate ostile elem ments, one may not be able to e eliminate th hem. Total elimination of vulnerabilities may however, require unaccepta y, ably drastic measur res. The m most pract tical measure in most situ uations would therefo be to p ore prioritize th vulnera he abilities and to d counterm reduce th risk thro he ough them. e nough to d discourage anyone f from A listing of all the possible security threats would be en to e er titioner of i industrial s security. It is not realistic to exp pect wanting t become a manage or pract any indiv vidual to be totally co e onversant with all kin of vuln nds nerabilities threats a s, and preven ntive measure A succe es. essful indus strial secur practitio rity oner or ma anager should be awa of the r are risks and be a able to get n necessary expert help to tackle them. (R. Swa aminatha an) 22 Octob 2007 ber A 1954 IPS officer from And r dhra Prade esh, he wa a foundi membe and Vice-Presiden of as ing er nt the Che ennai Cent for Ch tre hina Studie (CCCS) as well as President of the Internatio es ) e onal Institute of Security and Safe Manage y ety ement, New Delhi. w He was a China sp pecialist, ha aving serve the Gov ed vernment o India for long years and retire in of s ed ecretary an Director General ( nd r (Security), Cabinet Se ecretariat. 1990 as Special Se ssociated w many t with think-tanks and discu s ussion groups in Indi and was an ia s He was closely as articipant in many na n ational and internation semina He authored man publicati nal ars. ny ions active pa dealing with differ rent issues relating t nationa security and foreig policies with spe s to al gn s, ecial referenc to China India and Sri Lanka ce a, d a. C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  5. 5. Col N N Bhatia (Retd) Industrial Security Consultant It takes o only 2 minu utes for a c thief to run away w your c No ma car with car. atter if you h have a trac cker and auto o-alarming devices fit tted in you car. The off-cou ur ese urse help in locating your car o n once stolen! Lo ow-cost ca tracker c be impr ar can rovised and used for your car at one tenth of the cos of d h st The best safety fo your ca is a live and activ Mobile Phone hid or ar e ve dden in a safe place in e r: your car 1. Bu any low price mo uy w obile phon with lon ne nger standby time (Q Qmobile ha one mo as odel wh hich runs fo 10 days on standb and cost around R or s by t Rs.2,200/-). 2. Install a mob connec bile ction which has best n h network in the countr ry. urn obile on co omplete SILENT mode (double check it should not vibrate w e t while 3. Tu this mo yo turn it on SILENT m ou n mode). Wrap it up s slightly in a plastic sh heet so tha it should not get d at d dirty and dusty during its g 4. W hid dden use. t ing mber from a another mo obile phone e. 5. Make sure it is perfectly respondi by calling its num ide obile in a sa place in your car. And that’s it…!!! afe n s 6. Hi this mo 7. If by any chance yo car is s our stolen, imm mediately in nform your local Polic Give th r ce. hem the ph hone of bile n car. Police can easily track the location b calling that y e by number o the mob hidden in your c number. Chances are that y you may get back your car w within the shortest p possible ti ime. And finally do not fo orget to ch harge this m mobile at le east twice a week and hide it ba in your car d ack r in active position. Food fo tho F or ought: If it is not already with y f you, pr rovably it wil harm you: the y ll m in nforma ation, th tech he hnology – in s short, ‘ ‘The Ed dge’! C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  6. 6. Project O O-sint (Op pen Source Intelligence) has gained m momentum with polic ce receiving interest fr g rom as man as 18 IT giants for its implem ny T r mentation. What is it? O-sint is a strategic initiative by Delhi Po y olice to let them snoo on socia op al Project O networks and the in s nternet to t track anti-s social elem ments. Polic claim they intend t ce to collect on the info nly ormation that is availa able in the public dom main. Features s Apart fro the ge om eographica identifica al ation featu ure to tra ack the loc cation of a criminal's or suspe s ect's move ements through his presence on the in nternet, th he project a also featur res sentime analys that ide ent sis entifies the positive or negativ e ve vibes in a communi ication for detecting c criminal intent. IT giants involved s As many as 18 glob IT gian includin IBM, HC Wipro, Oracle and TCS.hav y bal nts, ng CL, d ve pitched in with the Delhi P Police to im mplement this proje and he them in ect elp accessing the data. ms ace Problem it may fa Experts w warn that the project may run in problem because of certain limitations nto ms e n s namely: Ge eographica tracking of criminals on the in al nternet will have limita ations. Many websit have se tes ecurity rest trictions on accessing content. n g Re estricted b blogs and w web- sites can be ac ccessed on with pa nly asswords o or dig gital sig gnatures. Co ommercial sites will block web crawle ers, making it difficu to trac ult ck movements. On Jul 8 2013, Ca Pran Prasad, Vet 8, apt teran <pra an.prasad@ @yahoo.c com> wrote e 13 etter is ve ery good. Write-up with pho otographs on the c catastrophe in e July 201 Newsle Uttarakha is very good and so is an a and y d alert report on Frauds by Col. N N Bhati Veteran ster ia, n. ast ys re us n. erial Some other happenings in la few day across country ar of seriou concern Could se ast abodhi Tem mple, Bodh Gaya and nearly tw dozen s h d wo school child dren’s deat in th bomb bla at Maha Bihar afte eating M er Mid-day Me have be avoided? eal een C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  7. 7. Answer is Yes, only if the laid down system and procedure would have been scrupulously followed. 1. In case of Bodh Gaya, what is being seen as security lapse has nothing to do with the number of security personnel or weapons in-adequacy, but it happened as a result of not following the laid down procedure as per ‘SOP’ (Standard Operating Procedure). Invariably, personnel tend to become complacent, if they are on regular duty at the same place for very long period of time (months), or else remaining on overtime duty. We often find casual attitude of security guards carrying frisking with Hand Held Metal Detectors (HHMD), as if they must carry out this drill as a daily routine. Placing of CCTV cameras are necessary surveillance requirement but, good quality camera for capturing sharp pictures under dim light should only be preferred. Cost cutting in compromising with the quality and required quantity of any security related material may prove to be disastrous during hours of crisis. Thorough security audit of the area under consideration is a must prior to providing the required type of security. Putting right type of personnel to carry out the assigned duty in proper perspective is very important task for the management. Any such happening can easily be attributed to the lapse of not following ‘Do’s & Don’ts’ of ‘SOP’. 2. These bombs could have been noticed by the guard on duty if every individual would have been subjected to body and baggage frisking while entering the premises through gate, at any point of time. Even if they are presumed to have entered by trespassing by climbing the boundary wall, yet ‘SOP’ would mention the methods to be adopted in keeping constant vigil in such places. Come what may, we must understand the importance of going by the Security Audit and SOP. Even if CCTV cameras are in place, it will require adequate and quick action by the security providing personnel, for which Control Room would be required to be manned by alert personnel on 24x7 basis, with ‘ERS’ (Emergency Response System) in place which must include Fire Fighting Department too. Reasons for entry of unscrupulous people inside the temple area could be from luring the corrupt guard to forcible approach. Therefore, every loophole has to be tightened and monitored on continuous basis. Explaining the reason after misadventure does not sound well. Security is all about being ‘PROACTIVE’. 3. In the case of death of a large number of school children in a single day, after eating mid-day meal too can be seen as a case due to deviation from the laid down mandatory norms of tasting meals by the Principal/ Head of School/ Adult persons and members of Education Committee prior to be served to the children. In this case definite doubt arises due to these authorized persons avoiding tasting the food. Were they aware of any deficiency in raw material and their cooking ingredients? Importance of laid down procedure should never be overlooked. Of course there are whole lot of matters to be taken care of right from procurement and storage of food materials to proper cookhouse and hygienic dining place with clean utensils. Above tragedy is a result of callousness due to negligence at one or more stage on above accounts. The efficiency of cooks and their wages too needs to be assessed and taken care of. In nutshell, supervisory control by the competent authority must be exercised to C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
  8. 8. understand any difficulty and in ensuring proper execution of the scheme. Timely remedial action should be the key-word for these authorities. We must understand that every life is important and there shall not be any laxity by anyone in putting someone’s life in danger or taking it to the extent of life threatening stage. 4. Unprecedented catastrophe in Uttarakhand has caused damage to Kedarnath Temple Complex. Archaeological Survey of India (ASI) has been entrusted with the task of its repair and renovation. A team from the department has visited the site to assess the extent of damage and to finalise the method of conservation to be adopted. Now a detailed report is under preparation supported by drawings and photographs. ASI has the expertise to take up such tasks. It has successfully carried out intricate conservation work of temples across country. ASI has carried out conservation and restoration work in other countries also. At present it is engaged in such work in Cambodia, Philippines and Myanmar. 5. There are specialized branches in ASI to take care of various types of work. They are Conservation Branch, Temple Survey Project (North & South), Building Survey Project, Excavation Branch, Science Branch, Epigraphy Branch, Horticulture Branch & Security Wing. Besides these specialized components, there are 24 Circle Offices and 44 Museums under ASI across our country. ASI was entrusted by the Union Govt. in the beginning of 21st Century to prepare factual report of Ayodhya (Faizabad), U.P.; after carrying out survey of the disputed site. This was carried out meticulously and report was submitted to the concerned authorities within a reasonable time. We hope ASI will carry out this assigned task too with great skill and in shortest possible time. Archaeological conservation work is intricate and different from PWD nature of work, therefore it is time taking. Conservation by ASI shall have to be carried out with the similar material and cementing chemicals with which the structure had originally been built. Use of cement and other new available construction materials are totally prohibited under Conservation Policy of our Country. C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
  9. 9. On Jul 8 2013, Ca Manish Chandra 8, apt h ayan <captain nmanish.c chandraya an@rrd.co om> wrote Dear Cap Tyagi, pt Thanks f the lates newslett I alway await the latest edi for st ter. ys e ition and enjoy readin and pick ng king up useful informatio on. I am writi to you to point two issues w ing which are re elated with the curren issue nt  Th map of India is inc he correct on f first page.  On of the p ne pictures of rescue is not from India. The troops lyin down ar very cle ng re early no of India origin a ot an and neithe is the uniform th of Indian Army or any other er hat pa aramilitary organizatio on. Hope the would b rectified ese be d. Thanks a regards and Capt Ma anish Chan ndrayan 8, 4:45 PM, S Tyagi C SB Capt <sbty yagi1958@ @gmail.com wrote: m> On Jul 8 2013 at 4 Dear Capt Manish, n e Map ghtly wron but my mistake is gross! I did ng You are correct on both the counts! M is slig esearch on the pictu which was plac n ure h ced on a w website in context of Kedarn n nath some re rescue o operation but it turn ned out to be of Ch o hinese arm involve in rescu during the my ed ue floods some years back. I w publish apologie and clarification. s will h es gards Best reg Capt S B Tyagi, CO OAS’CC* C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  10. 10. If you do no wish to r ot receive this Newslette s ers, please Reply, ‘RE EMOVE’ in subject an your nam will nd me be removed from the li ICISS d e ist. does not sh hare email o other de or etails with a entity. any Sug ggestions & feedbac may be sent to u on e-ma sbtyagi1958@gm ck e us ail: mail.com C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx