SlideShare a Scribd company logo
N
Newslet
tter: Au
ugust 2
2013

Let’ profe
’s
fessionalize t pro
the ofessio
onals…
http://w
www.wix.com/
/sbtyagi/iciss

Th month, India c
his
celebrate its Ind
es
dependen Day.
nce
W
What a g
glorious day, as this d
s
day has shown the w
s
n
world tha path to
at
Independe
ence need not be trough v
violence!
!
his
has
wn
world tha non-vio
at
olence is even m
s
more potent tool for
Th day h show the w
independe
ence that weapon of viol
t
ns
lence!
his
own the world th Indep
hat
pendenc can be obtain
ce
ned witho
out
Th day has sho
sh
hedding t blood
the
d!

C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
(Express
sed in 20
007 while writing the forwa
e
ard of th book “Industria Security –
he
al
y
Managem
ment and Strategies by Shri DC Nath, IPS (Retd and Ca SB Tya his vie
s”
i
,
d.)
apt
agi,
ews
are cont
temporary even now
y
w!)
The conc
cept and pr
ractice of industrial security are as old as industry
e
itself. It is essentia that they keep pac with the technolog
al
y
ce
gical and
evelopments in indu
ustry; and the chan
nging patt
terns of
other de
The origin and ba
vulnerabilities and threats. T
nal
asic objec
ctives of
l
were the prevention/d
detection o pilferage (mostly
of
e
industrial security w
by disho
onest workers) and sabotag (mostly by disgruntled
d
ge
workers). New development and tec
ts
chnologies in indust have
try
created new vulne
erabilities a
and it has become necessary for the
s
y
rs
actitioners of industrial security to adapt to face
y
manager and pra
such vuln
nerabilities and devic
s
ce/learn new techniqu
w
ues.
ation and g
globalizatio have led to the growth of
on
Economic liberaliza
rial enterprises, man of them transny
m
large and diversified industr
er.
of
at
te
national in characte Some o the very factors tha contribut to the
ful
ning of su
uch Multin
national Co
ompanies (MNCs)
successf function
tend to become security vul
lnerabilities Many M
s.
MNCs inclu
ude a mul
ltitude of e
economic and
technolog
gical syste
ems (that are like networks) for their efficient functionin
)
r
ng. The m
more
develope and com
ed
mplex the interconne
ected netw
works beco
ome, the m
more they have featu
ures
that mak their b
ke
behavior n
non-linear; i.e. a sm
mall shock to a cri
k
e
itical node produces a
disproportionately large disruption. MNC also ten to dispe
Cs
nd
erse their m
manufactur
ring facilitie in
es
different countries, based on availabilit of raw materials, inexpensiv real estate / pow /
n
ty
ve
wer
to
the
f
tensive pro
oducts by b
building larg produc
ger
ction
labor etc. They try t reduce t cost of capital-int
equipment and highly skilled pe
y
eople in a single location provi
ides
facilities. Placing expensive e
er
fficiency a
and synerg
gies that lead to t
the creatio of wea
on
alth.
for easie access, more ef
Manufacturing and storage fa
acilities of many MNC are like to contain device packed w
ely
es
with
Cs
energy, c
combustibles, and po
oisons; crea
ating speci
ialized vuln
nerabilities.
The conc
centration of high-va
alue and/or hazardou assets in relatively compac locations in
us
ct
s,
order to achieve economie of scale, creates extraord
es
s
dinary vuln
nerabilities that call for
extraordinary effort from thos respons
ts
se
sible for ind
dustrial sec
curity. Indu
ustrial secu
urity manag
gers
and prac
ctitioners ar required to be able to advise their man
re
d
e
e
nagements about pos
s
ssible step to
ps
reduce th vulnera
he
abilities rela
ated to com
mplex tech
hnologies u
used by th
hem. They have to le
earn
about the possible dispersal of high-va
e
alue assets loosenin the coup
s,
ng
plings in th corpora
he
ate’s
networks building buffers in these networks, introducin "circuit breakers" that inter
s,
nto
ng
rrupt
dangerou feedbac etc.
us
ck,
Though t
terrorism is itself not a new phe
s
enomenon, internation
nalized net
tworking (o
often based on
d
religious considerations) pose security threats to industrial units, bas on cau
es
y
o
sed
uses that m
may
lie far fro the loc
om
cation of th industrial unit, e.g. real or imaginary grievance against the
he
y
es
government and/or the preva
r
ailing dispa
arate economic order. Sophisticated terro
orists are m
may
increasin
ngly use non-weapon technolo
n
ogies for d
destructive ends. Tec
chnologica advances in
al
communications an informa
nd
ation techn
nology (IT) help them to give another m
m
meaning to the
acronym WMD - W
Weapons of Mass Disr
ruption, not necessarily of Mass Destructio
t
s
on.
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
Security planners have to learn to pinpoint and protect the critical complex networks for
producing and distributing energy, information, water, and food. Disruption of these would be
most susceptible to the multiplier effect of technology-amplified emotional response. Systems
handling energy and hazardous materials are easy targets for turning supposedly benign
technology to destructive ends.
Specialist analysts around the world have warned that future terrorist acts may include more
sophisticated forms of destruction and extortion, such as disabling or penetrating vital
commercial computer systems. Sheikh Omar Bakri Muhammad, Syrian-born founder of the
London-based group Jama'at Al-Muhajirun and the spokesman for Osama bin Laden's
International Islamic Front for Jihad Against Jews and Crusaders, had claimed in an interview,
that "I would not be surprised if tomorrow I hear of a big economic collapse because of
somebody attacking the main technical systems in big companies."
"Cyber-terrorism" is often used as a blanket term covering the threat of viruses, hackers and
miscellaneous security breaches, regardless of whether or not they actually originated from
terrorists. Although it is theoretically possible for electronic intrusions to damage critical
infrastructure, taking control of well protected systems from the outside is extremely difficult;
and can be almost totally prevented through well-planned computerized and non-computerized
fail-safe measures. Digital intrusions can also compromise intellectual property and sensitive
research data that can lead to long-term economic loss.
They can place customer data at risk and erode confidence and trust in an enterprise and its
affiliates. The number of organized hacking syndicates targeting financial and investment
institutions around the world are growing at a disturbingly rapid rate. The financial industry's
increasing dependence on the public telecommunications system, rapid adoption of wireless
systems and outsourcing of operations to third parties pose growing security challenges.
Cyber-security within an enterprise is not merely a technical problem, but should be handled
as a management challenge.
The scope of the risks is such that it can be effectively managed only by engaging senior
corporate leadership. Preparedness plans should ensure that digital security is factored into
the overall operations of the enterprise.
Business espionage often referred to by the elegant euphemism of "competitive intelligence"
probably started when the first competitor set up business. Though many companies already
go to great lengths to obtain trade secrets and other business information about their
competitors, it has been assessed that these efforts will intensify and be more aggressively
pursued in the coming years. They may use any combination of legal, illegal, ethical, and
unethical techniques. The ushering in of the digital and information age has brought about a
sea change in the methods of business espionage. Many new and not-so-widely-recognized
threats and points of vulnerability have been created. Some of the new threats may seem to
belong to the realm of science fiction, but they are very real. What others get to know about a
company can make or break the company's ability to compete effectively.
Many companies are gradually starting to recognize that fences and gates, locks and guards,
cameras and alarm systems no longer provide adequate protection. Even a company that has

C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
strict stan
ndards of p
physical se
ecurity can be devast
tated by at
ttacks on it information resourc
ts
ces.
One of th basic pr
he
remises of counterinte
elligence is that there is no such thing as coincidenc
s
e
h
ce.
ntelligence programs should be in plac to reco
e
s
ce
ognize the indicators of busin
e
s
ness
Counterin
espionag operatio that co
ge
ons
ould advers
sely affect the comp
pany. It wo
ould be a g
grave mista
ake,
however, to assum that the old rules o physical security no longer apply. Thou all secu
me
of
o
ugh
urity
requirem
ments shou
uld becom an int
me
tegral par of ever compan
rt
ry
ny's busin
ness strate
egy,
managem
ments would expect t industri security division to be primar respons
the
ial
y
o
rily
sible.
he
of
ulnerability is a weak
y
kness in th system and
he
Risk is th result o vulnerabilities and threats. Vu
threat is what some
eone can d to hurt y by exploiting vuln
do
you
nerability. A threats a most likely
As
are
to origina from ho
ate
ostile elem
ments, one may not be able to e
eliminate th
hem. Total elimination of
vulnerabilities may however, require unaccepta
y,
ably drastic measur
res. The m
most pract
tical
measure in most situ
uations would therefo be to p
ore
prioritize th vulnera
he
abilities and to
d
counterm
reduce th risk thro
he
ough them.
e
nough to d
discourage anyone f
from
A listing of all the possible security threats would be en
to
e
er
titioner of i
industrial s
security. It is not realistic to exp
pect
wanting t become a manage or pract
any indiv
vidual to be totally co
e
onversant with all kin of vuln
nds
nerabilities threats a
s,
and preven
ntive
measure A succe
es.
essful indus
strial secur practitio
rity
oner or ma
anager should be awa of the r
are
risks
and be a
able to get n
necessary expert help to tackle them.

(R. Swa
aminatha
an)
22 Octob 2007
ber
A 1954 IPS officer from And
r
dhra Prade
esh, he wa a foundi membe and Vice-Presiden of
as
ing
er
nt
the Che
ennai Cent for Ch
tre
hina Studie (CCCS) as well as President of the Internatio
es
)
e
onal
Institute of Security and Safe Manage
y
ety
ement, New Delhi.
w
He was a China sp
pecialist, ha
aving serve the Gov
ed
vernment o India for long years and retire in
of
s
ed
ecretary an Director General (
nd
r
(Security), Cabinet Se
ecretariat.
1990 as Special Se
ssociated w many t
with
think-tanks and discu
s
ussion groups in Indi and was an
ia
s
He was closely as
articipant in many na
n
ational and internation semina He authored man publicati
nal
ars.
ny
ions
active pa
dealing with differ
rent issues relating t nationa security and foreig policies with spe
s
to
al
gn
s,
ecial
referenc to China India and Sri Lanka
ce
a,
d
a.

C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
Col N N Bhatia (Retd)
Industrial Security Consultant
It takes o
only 2 minu
utes for a c thief to run away w your c No ma
car
with
car.
atter if you h
have a trac
cker
and auto
o-alarming devices fit
tted in you car. The off-cou
ur
ese
urse help in locating your car o
n
once
stolen! Lo
ow-cost ca tracker c be impr
ar
can
rovised and used for your car at one tenth of the cos of
d
h
st
The best safety fo your ca is a live and activ Mobile Phone hid
or
ar
e
ve
dden in a safe place in
e
r:
your car
1. Bu any low price mo
uy
w
obile phon with lon
ne
nger standby time (Q
Qmobile ha one mo
as
odel
wh
hich runs fo 10 days on standb and cost around R
or
s
by
t
Rs.2,200/-).
2. Install a mob connec
bile
ction which has best n
h
network in the countr
ry.
urn
obile on co
omplete SILENT mode (double check it should not vibrate w
e
t
while
3. Tu this mo
yo turn it on SILENT m
ou
n
mode).
Wrap it up s
slightly in a plastic sh
heet so tha it should not get d
at
d
dirty and dusty during its
g
4. W
hid
dden use.
t
ing
mber from a
another mo
obile phone
e.
5. Make sure it is perfectly respondi by calling its num
ide
obile in a sa place in your car. And that’s it…!!!
afe
n
s
6. Hi this mo
7.
If by any chance yo car is s
our
stolen, imm
mediately in
nform your local Polic Give th
r
ce.
hem the ph
hone
of
bile
n
car. Police can easily track the location b calling that
y
e
by
number o the mob hidden in your c
number. Chances are that y
you may get back your car w
within the shortest p
possible ti
ime.
And finally do not fo
orget to ch
harge this m
mobile at le
east twice a week and hide it ba in your car
d
ack
r
in active position.

Food fo tho
F
or ought:
If it is not already with y
f
you, pr
rovably it wil harm you: the
y
ll
m
in
nforma
ation, th tech
he
hnology – in s
short, ‘
‘The Ed
dge’!
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
Project O
O-sint (Op
pen Source Intelligence) has gained m
momentum with polic
ce
receiving interest fr
g
rom as man as 18 IT giants for its implem
ny
T
r
mentation.
What is it?
O-sint is a strategic initiative by Delhi Po
y
olice to let them snoo on socia
op
al
Project O
networks and the in
s
nternet to t
track anti-s
social elem
ments. Polic claim they intend t
ce
to
collect on the info
nly
ormation that is availa
able in the public dom
main.
Features
s
Apart fro the ge
om
eographica identifica
al
ation featu
ure to tra
ack the loc
cation of a
criminal's or suspe
s
ect's move
ements through his presence on the in
nternet, th
he
project a
also featur
res sentime analys that ide
ent
sis
entifies the positive or negativ
e
ve
vibes in a communi
ication for detecting c
criminal intent.
IT giants involved
s
As many as 18 glob IT gian includin IBM, HC Wipro, Oracle and TCS.hav
y
bal
nts,
ng
CL,
d
ve
pitched in with the Delhi P
Police to im
mplement this proje and he them in
ect
elp
accessing the data.
ms
ace
Problem it may fa
Experts w
warn that the project may run in problem because of certain limitations
nto
ms
e
n
s
namely:
Ge
eographica tracking of criminals on the in
al
nternet will have limita
ations.
Many websit have se
tes
ecurity rest
trictions on accessing content.
n
g
Re
estricted b
blogs and w
web- sites can be ac
ccessed on with pa
nly
asswords o
or
dig
gital
sig
gnatures.
Co
ommercial sites will block web crawle
ers, making it difficu to trac
ult
ck
movements.

On Jul 8 2013, Ca Pran Prasad, Vet
8,
apt
teran <pra
an.prasad@
@yahoo.c
com> wrote e
13
etter is ve
ery good. Write-up with pho
otographs on the c
catastrophe in
e
July 201 Newsle
Uttarakha is very good and so is an a
and
y
d
alert report on Frauds by Col. N N Bhati Veteran
ster
ia,
n.
ast
ys
re
us
n.
erial
Some other happenings in la few day across country ar of seriou concern Could se
ast
abodhi Tem
mple, Bodh Gaya and nearly tw dozen s
h
d
wo
school child
dren’s deat in
th
bomb bla at Maha
Bihar afte eating M
er
Mid-day Me have be avoided?
eal
een

C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
Answer is Yes, only if the laid down system and procedure would have been scrupulously
followed.
1.
In case of Bodh Gaya, what is being seen as security lapse has nothing to do with the
number of security personnel or weapons in-adequacy, but it happened as a result of not
following the laid down procedure as per ‘SOP’ (Standard Operating Procedure). Invariably,
personnel tend to become complacent, if they are on regular duty at the same place for very
long period of time (months), or else remaining on overtime duty. We often find casual attitude
of security guards carrying frisking with Hand Held Metal Detectors (HHMD), as if they must
carry out this drill as a daily routine. Placing of CCTV cameras are necessary surveillance
requirement but, good quality camera for capturing sharp pictures under dim light should only
be preferred. Cost cutting in compromising with the quality and required quantity of any
security related material may prove to be disastrous during hours of crisis. Thorough security
audit of the area under consideration is a must prior to providing the required type of security.
Putting right type of personnel to carry out the assigned duty in proper perspective is very
important task for the management. Any such happening can easily be attributed to the lapse
of not following ‘Do’s & Don’ts’ of ‘SOP’.
2.
These bombs could have been noticed by the guard on duty if every individual would
have been subjected to body and baggage frisking while entering the premises through gate,
at any point of time. Even if they are presumed to have entered by trespassing by climbing the
boundary wall, yet ‘SOP’ would mention the methods to be adopted in keeping constant vigil in
such places. Come what may, we must understand the importance of going by the Security
Audit and SOP. Even if CCTV cameras are in place, it will require adequate and quick action
by the security providing personnel, for which Control Room would be required to be manned
by alert personnel on 24x7 basis, with ‘ERS’ (Emergency Response System) in place which
must include Fire Fighting Department too. Reasons for entry of unscrupulous people inside
the temple area could be from luring the corrupt guard to forcible approach. Therefore, every
loophole has to be tightened and monitored on continuous basis. Explaining the reason after
misadventure does not sound well.
Security is all about being ‘PROACTIVE’.
3.
In the case of death of a large number of school children in a single day, after eating
mid-day meal too can be seen as a case due to deviation from the laid down mandatory norms
of tasting meals by the Principal/ Head of School/ Adult persons and members of Education
Committee prior to be served to the children. In this case definite doubt arises due to these
authorized persons avoiding tasting the food. Were they aware of any deficiency in raw
material and their cooking ingredients? Importance of laid down procedure should never be
overlooked. Of course there are whole lot of matters to be taken care of right from procurement
and storage of food materials to proper cookhouse and hygienic dining place with clean
utensils. Above tragedy is a result of callousness due to negligence at one or more stage on
above accounts. The efficiency of cooks and their wages too needs to be assessed and taken
care of. In nutshell, supervisory control by the competent authority must be exercised to
C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
understand any difficulty and in ensuring proper execution of the scheme. Timely remedial
action should be the key-word for these authorities. We must understand that every life is
important and there shall not be any laxity by anyone in putting someone’s life in danger or
taking it to the extent of life threatening stage.
4.
Unprecedented catastrophe in Uttarakhand has caused damage to Kedarnath Temple
Complex. Archaeological Survey of India (ASI) has been entrusted with the task of its repair
and renovation. A team from the department has visited the site to assess the extent of
damage and to finalise the method of conservation to be adopted. Now a detailed report is
under preparation supported by drawings and photographs. ASI has the expertise to take up
such tasks. It has successfully carried out intricate conservation work of temples across
country. ASI has carried out conservation and restoration work in other countries also. At
present it is engaged in such work in Cambodia, Philippines and Myanmar.
5.
There are specialized branches in ASI to take care of various types of work. They are
Conservation Branch, Temple Survey Project (North & South), Building Survey Project,
Excavation Branch, Science Branch, Epigraphy Branch, Horticulture Branch & Security Wing.
Besides these specialized components, there are 24 Circle Offices and 44 Museums under
ASI across our country. ASI was entrusted by the Union Govt. in the beginning of 21st Century
to prepare factual report of Ayodhya (Faizabad), U.P.; after carrying out survey of the disputed
site. This was carried out meticulously and report was submitted to the concerned authorities
within a reasonable time. We hope ASI will carry out this assigned task too with great skill and
in shortest possible time. Archaeological conservation work is intricate and different from PWD
nature of work, therefore it is time taking. Conservation by ASI shall have to be carried out with
the similar material and cementing chemicals with which the structure had originally been built.
Use of cement and other new available construction materials are totally prohibited under
Conservation Policy of our Country.

C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
On Jul 8 2013, Ca Manish Chandra
8,
apt
h
ayan
<captain
nmanish.c
chandraya
an@rrd.co
om> wrote Dear Cap Tyagi,
pt
Thanks f the lates newslett I alway await the latest edi
for
st
ter.
ys
e
ition and enjoy readin and pick
ng
king
up useful informatio
on.
I am writi to you to point two issues w
ing
which are re
elated with the curren issue nt
 Th map of India is inc
he
correct on f
first page.
 On of the p
ne
pictures of rescue is not from India. The troops lyin down ar very cle
ng
re
early
no of India origin a
ot
an
and neithe is the uniform th of Indian Army or any other
er
hat
pa
aramilitary organizatio
on.
Hope the would b rectified
ese
be
d.
Thanks a regards
and
Capt Ma
anish Chan
ndrayan
8,
4:45 PM, S Tyagi C
SB
Capt <sbty
yagi1958@
@gmail.com wrote:
m>
On Jul 8 2013 at 4
Dear Capt Manish,
n
e
Map
ghtly wron but my mistake is gross! I did
ng
You are correct on both the counts! M is slig
esearch on the pictu which was plac
n
ure
h
ced on a w
website in context of Kedarn
n
nath
some re
rescue o
operation but it turn
ned out to be of Ch
o
hinese arm involve in rescu during the
my
ed
ue
floods some years back. I w publish apologie and clarification.
s
will
h
es
gards
Best reg
Capt S B Tyagi, CO
OAS’CC*

C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
If you do no wish to r
ot
receive this Newslette
s
ers, please Reply, ‘RE
EMOVE’ in subject an your nam will
nd
me
be removed from the li ICISS d
e
ist.
does not sh
hare email o other de
or
etails with a entity.
any

Sug
ggestions & feedbac may be sent to u on e-ma sbtyagi1958@gm
ck
e
us
ail:
mail.com

C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx

More Related Content

What's hot

Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
Henry Worth
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
naveen p
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
Austin Eppstein
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
Silvia Cardona
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
Daren Dunkel
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
Frank Backes
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
ijtsrd
 

What's hot (20)

Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Cyber Security small
Cyber Security smallCyber Security small
Cyber Security small
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Delusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceoDelusions of-safety-cyber-savvy-ceo
Delusions of-safety-cyber-savvy-ceo
 
Cyber savvy (2)
Cyber savvy (2)Cyber savvy (2)
Cyber savvy (2)
 
Sivasubramanian Risk Management In The Web 2.0 Environment
Sivasubramanian Risk  Management In The  Web 2.0  EnvironmentSivasubramanian Risk  Management In The  Web 2.0  Environment
Sivasubramanian Risk Management In The Web 2.0 Environment
 
SIA-Q1-2016
SIA-Q1-2016SIA-Q1-2016
SIA-Q1-2016
 
Darktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystemDarktrace_WhitePaper_EnterpriseImmuneSystem
Darktrace_WhitePaper_EnterpriseImmuneSystem
 
Business blackout
Business blackoutBusiness blackout
Business blackout
 
Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014Wef risk responsibility_hyperconnectedworld_report_2014
Wef risk responsibility_hyperconnectedworld_report_2014
 
Hiring Guide to the Information Security Profession
Hiring Guide to the Information Security ProfessionHiring Guide to the Information Security Profession
Hiring Guide to the Information Security Profession
 
Ask the Experts final
Ask the Experts finalAsk the Experts final
Ask the Experts final
 
Security Feature Cover Story
Security Feature Cover StorySecurity Feature Cover Story
Security Feature Cover Story
 
American Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standardsAmerican Bar Association guidelines on Cyber Security standards
American Bar Association guidelines on Cyber Security standards
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
CISO Survey Report 2010
CISO Survey Report 2010CISO Survey Report 2010
CISO Survey Report 2010
 
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
The Best Articles of 2016 DEVELOPING AND CONNECTING CYBERSECURITY LEADERS GLO...
 
Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109Cybersecurity A Community Approach - 20151109
Cybersecurity A Community Approach - 20151109
 
Cybersecurity report
Cybersecurity reportCybersecurity report
Cybersecurity report
 
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in NigeriaCyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
Cyber Security Awareness and Corporate Agility of Deposit Money Banks in Nigeria
 

Similar to News letter aug 13

Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
ssuserc1c354
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
Adela Cocic
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
Numaan Huq
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
bagotjesusa
 
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docxBulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
RAHUL126667
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
duketjoy27252
 

Similar to News letter aug 13 (20)

Digital danger zone tackling cyber security
Digital danger zone tackling cyber securityDigital danger zone tackling cyber security
Digital danger zone tackling cyber security
 
Strengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdfStrengthening Critical Infrastructure Security.pdf
Strengthening Critical Infrastructure Security.pdf
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
wp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industrywp-cyber-threats-to-the-mining-industry
wp-cyber-threats-to-the-mining-industry
 
2022 Cybersecurity Predictions
2022 Cybersecurity Predictions2022 Cybersecurity Predictions
2022 Cybersecurity Predictions
 
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docxSECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
SECURITY AND SAFETY OF THE POWER GRID AND ITS RELATED COMPUTER INF.docx
 
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
Shifting Risks and IT Complexities Create Demands for New Enterprise Security...
 
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber SecurityThreat, Attack and Vulnerability Play a Key Role in Cyber Security
Threat, Attack and Vulnerability Play a Key Role in Cyber Security
 
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docxBulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
Bulletinof theAtomicScientistsIT IS 5 MINUTES TO MID.docx
 
A1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for CybersecurityA1 - Cibersegurança - Raising the Bar for Cybersecurity
A1 - Cibersegurança - Raising the Bar for Cybersecurity
 
Top Industries Looking for Cyber Security Experts.pdf
Top Industries Looking for Cyber Security Experts.pdfTop Industries Looking for Cyber Security Experts.pdf
Top Industries Looking for Cyber Security Experts.pdf
 
Discussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docxDiscussion Questions The difficulty in predicting the future is .docx
Discussion Questions The difficulty in predicting the future is .docx
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Insa cyber intelligence 2011
Insa cyber intelligence 2011Insa cyber intelligence 2011
Insa cyber intelligence 2011
 
Ics white paper report 2017
Ics white paper report 2017Ics white paper report 2017
Ics white paper report 2017
 
Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...Cybersecurity, a priority for leaders today. Not only operational and financi...
Cybersecurity, a priority for leaders today. Not only operational and financi...
 
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS  K. JeniferA STUDY ON CYBER SECURITY AND ITS RISKS  K. Jenifer
A STUDY ON CYBER SECURITY AND ITS RISKS K. Jenifer
 

More from Capt SB Tyagi, COAC'CC*,FISM,CSC,

ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 

More from Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 
News letter jan 13
News letter jan 13News letter jan 13
News letter jan 13
 
Saw security awareness part v
Saw   security awareness part vSaw   security awareness part v
Saw security awareness part v
 

Recently uploaded

plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
parmarsneha2
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 

Recently uploaded (20)

PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
plant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated cropsplant breeding methods in asexually or clonally propagated crops
plant breeding methods in asexually or clonally propagated crops
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptxMatatag-Curriculum and the 21st Century Skills Presentation.pptx
Matatag-Curriculum and the 21st Century Skills Presentation.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve ThomasonThe Art Pastor's Guide to Sabbath | Steve Thomason
The Art Pastor's Guide to Sabbath | Steve Thomason
 
NLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptxNLC-2024-Orientation-for-RO-SDO (1).pptx
NLC-2024-Orientation-for-RO-SDO (1).pptx
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
50 ĐỀ LUYỆN THI IOE LỚP 9 - NĂM HỌC 2022-2023 (CÓ LINK HÌNH, FILE AUDIO VÀ ĐÁ...
 
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdfINU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
INU_CAPSTONEDESIGN_비밀번호486_업로드용 발표자료.pdf
 
How to Break the cycle of negative Thoughts
How to Break the cycle of negative ThoughtsHow to Break the cycle of negative Thoughts
How to Break the cycle of negative Thoughts
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdfDanh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
Danh sách HSG Bộ môn cấp trường - Cấp THPT.pdf
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 
B.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdfB.ed spl. HI pdusu exam paper-2023-24.pdf
B.ed spl. HI pdusu exam paper-2023-24.pdf
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 

News letter aug 13

  • 1. N Newslet tter: Au ugust 2 2013 Let’ profe ’s fessionalize t pro the ofessio onals… http://w www.wix.com/ /sbtyagi/iciss Th month, India c his celebrate its Ind es dependen Day. nce W What a g glorious day, as this d s day has shown the w s n world tha path to at Independe ence need not be trough v violence! ! his has wn world tha non-vio at olence is even m s more potent tool for Th day h show the w independe ence that weapon of viol t ns lence! his own the world th Indep hat pendenc can be obtain ce ned witho out Th day has sho sh hedding t blood the d! C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  • 2. (Express sed in 20 007 while writing the forwa e ard of th book “Industria Security – he al y Managem ment and Strategies by Shri DC Nath, IPS (Retd and Ca SB Tya his vie s” i , d.) apt agi, ews are cont temporary even now y w!) The conc cept and pr ractice of industrial security are as old as industry e itself. It is essentia that they keep pac with the technolog al y ce gical and evelopments in indu ustry; and the chan nging patt terns of other de The origin and ba vulnerabilities and threats. T nal asic objec ctives of l were the prevention/d detection o pilferage (mostly of e industrial security w by disho onest workers) and sabotag (mostly by disgruntled d ge workers). New development and tec ts chnologies in indust have try created new vulne erabilities a and it has become necessary for the s y rs actitioners of industrial security to adapt to face y manager and pra such vuln nerabilities and devic s ce/learn new techniqu w ues. ation and g globalizatio have led to the growth of on Economic liberaliza rial enterprises, man of them transny m large and diversified industr er. of at te national in characte Some o the very factors tha contribut to the ful ning of su uch Multin national Co ompanies (MNCs) successf function tend to become security vul lnerabilities Many M s. MNCs inclu ude a mul ltitude of e economic and technolog gical syste ems (that are like networks) for their efficient functionin ) r ng. The m more develope and com ed mplex the interconne ected netw works beco ome, the m more they have featu ures that mak their b ke behavior n non-linear; i.e. a sm mall shock to a cri k e itical node produces a disproportionately large disruption. MNC also ten to dispe Cs nd erse their m manufactur ring facilitie in es different countries, based on availabilit of raw materials, inexpensiv real estate / pow / n ty ve wer to the f tensive pro oducts by b building larg produc ger ction labor etc. They try t reduce t cost of capital-int equipment and highly skilled pe y eople in a single location provi ides facilities. Placing expensive e er fficiency a and synerg gies that lead to t the creatio of wea on alth. for easie access, more ef Manufacturing and storage fa acilities of many MNC are like to contain device packed w ely es with Cs energy, c combustibles, and po oisons; crea ating speci ialized vuln nerabilities. The conc centration of high-va alue and/or hazardou assets in relatively compac locations in us ct s, order to achieve economie of scale, creates extraord es s dinary vuln nerabilities that call for extraordinary effort from thos respons ts se sible for ind dustrial sec curity. Indu ustrial secu urity manag gers and prac ctitioners ar required to be able to advise their man re d e e nagements about pos s ssible step to ps reduce th vulnera he abilities rela ated to com mplex tech hnologies u used by th hem. They have to le earn about the possible dispersal of high-va e alue assets loosenin the coup s, ng plings in th corpora he ate’s networks building buffers in these networks, introducin "circuit breakers" that inter s, nto ng rrupt dangerou feedbac etc. us ck, Though t terrorism is itself not a new phe s enomenon, internation nalized net tworking (o often based on d religious considerations) pose security threats to industrial units, bas on cau es y o sed uses that m may lie far fro the loc om cation of th industrial unit, e.g. real or imaginary grievance against the he y es government and/or the preva r ailing dispa arate economic order. Sophisticated terro orists are m may increasin ngly use non-weapon technolo n ogies for d destructive ends. Tec chnologica advances in al communications an informa nd ation techn nology (IT) help them to give another m m meaning to the acronym WMD - W Weapons of Mass Disr ruption, not necessarily of Mass Destructio t s on. C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  • 3. Security planners have to learn to pinpoint and protect the critical complex networks for producing and distributing energy, information, water, and food. Disruption of these would be most susceptible to the multiplier effect of technology-amplified emotional response. Systems handling energy and hazardous materials are easy targets for turning supposedly benign technology to destructive ends. Specialist analysts around the world have warned that future terrorist acts may include more sophisticated forms of destruction and extortion, such as disabling or penetrating vital commercial computer systems. Sheikh Omar Bakri Muhammad, Syrian-born founder of the London-based group Jama'at Al-Muhajirun and the spokesman for Osama bin Laden's International Islamic Front for Jihad Against Jews and Crusaders, had claimed in an interview, that "I would not be surprised if tomorrow I hear of a big economic collapse because of somebody attacking the main technical systems in big companies." "Cyber-terrorism" is often used as a blanket term covering the threat of viruses, hackers and miscellaneous security breaches, regardless of whether or not they actually originated from terrorists. Although it is theoretically possible for electronic intrusions to damage critical infrastructure, taking control of well protected systems from the outside is extremely difficult; and can be almost totally prevented through well-planned computerized and non-computerized fail-safe measures. Digital intrusions can also compromise intellectual property and sensitive research data that can lead to long-term economic loss. They can place customer data at risk and erode confidence and trust in an enterprise and its affiliates. The number of organized hacking syndicates targeting financial and investment institutions around the world are growing at a disturbingly rapid rate. The financial industry's increasing dependence on the public telecommunications system, rapid adoption of wireless systems and outsourcing of operations to third parties pose growing security challenges. Cyber-security within an enterprise is not merely a technical problem, but should be handled as a management challenge. The scope of the risks is such that it can be effectively managed only by engaging senior corporate leadership. Preparedness plans should ensure that digital security is factored into the overall operations of the enterprise. Business espionage often referred to by the elegant euphemism of "competitive intelligence" probably started when the first competitor set up business. Though many companies already go to great lengths to obtain trade secrets and other business information about their competitors, it has been assessed that these efforts will intensify and be more aggressively pursued in the coming years. They may use any combination of legal, illegal, ethical, and unethical techniques. The ushering in of the digital and information age has brought about a sea change in the methods of business espionage. Many new and not-so-widely-recognized threats and points of vulnerability have been created. Some of the new threats may seem to belong to the realm of science fiction, but they are very real. What others get to know about a company can make or break the company's ability to compete effectively. Many companies are gradually starting to recognize that fences and gates, locks and guards, cameras and alarm systems no longer provide adequate protection. Even a company that has C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
  • 4. strict stan ndards of p physical se ecurity can be devast tated by at ttacks on it information resourc ts ces. One of th basic pr he remises of counterinte elligence is that there is no such thing as coincidenc s e h ce. ntelligence programs should be in plac to reco e s ce ognize the indicators of busin e s ness Counterin espionag operatio that co ge ons ould advers sely affect the comp pany. It wo ould be a g grave mista ake, however, to assum that the old rules o physical security no longer apply. Thou all secu me of o ugh urity requirem ments shou uld becom an int me tegral par of ever compan rt ry ny's busin ness strate egy, managem ments would expect t industri security division to be primar respons the ial y o rily sible. he of ulnerability is a weak y kness in th system and he Risk is th result o vulnerabilities and threats. Vu threat is what some eone can d to hurt y by exploiting vuln do you nerability. A threats a most likely As are to origina from ho ate ostile elem ments, one may not be able to e eliminate th hem. Total elimination of vulnerabilities may however, require unaccepta y, ably drastic measur res. The m most pract tical measure in most situ uations would therefo be to p ore prioritize th vulnera he abilities and to d counterm reduce th risk thro he ough them. e nough to d discourage anyone f from A listing of all the possible security threats would be en to e er titioner of i industrial s security. It is not realistic to exp pect wanting t become a manage or pract any indiv vidual to be totally co e onversant with all kin of vuln nds nerabilities threats a s, and preven ntive measure A succe es. essful indus strial secur practitio rity oner or ma anager should be awa of the r are risks and be a able to get n necessary expert help to tackle them. (R. Swa aminatha an) 22 Octob 2007 ber A 1954 IPS officer from And r dhra Prade esh, he wa a foundi membe and Vice-Presiden of as ing er nt the Che ennai Cent for Ch tre hina Studie (CCCS) as well as President of the Internatio es ) e onal Institute of Security and Safe Manage y ety ement, New Delhi. w He was a China sp pecialist, ha aving serve the Gov ed vernment o India for long years and retire in of s ed ecretary an Director General ( nd r (Security), Cabinet Se ecretariat. 1990 as Special Se ssociated w many t with think-tanks and discu s ussion groups in Indi and was an ia s He was closely as articipant in many na n ational and internation semina He authored man publicati nal ars. ny ions active pa dealing with differ rent issues relating t nationa security and foreig policies with spe s to al gn s, ecial referenc to China India and Sri Lanka ce a, d a. C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  • 5. Col N N Bhatia (Retd) Industrial Security Consultant It takes o only 2 minu utes for a c thief to run away w your c No ma car with car. atter if you h have a trac cker and auto o-alarming devices fit tted in you car. The off-cou ur ese urse help in locating your car o n once stolen! Lo ow-cost ca tracker c be impr ar can rovised and used for your car at one tenth of the cos of d h st The best safety fo your ca is a live and activ Mobile Phone hid or ar e ve dden in a safe place in e r: your car 1. Bu any low price mo uy w obile phon with lon ne nger standby time (Q Qmobile ha one mo as odel wh hich runs fo 10 days on standb and cost around R or s by t Rs.2,200/-). 2. Install a mob connec bile ction which has best n h network in the countr ry. urn obile on co omplete SILENT mode (double check it should not vibrate w e t while 3. Tu this mo yo turn it on SILENT m ou n mode). Wrap it up s slightly in a plastic sh heet so tha it should not get d at d dirty and dusty during its g 4. W hid dden use. t ing mber from a another mo obile phone e. 5. Make sure it is perfectly respondi by calling its num ide obile in a sa place in your car. And that’s it…!!! afe n s 6. Hi this mo 7. If by any chance yo car is s our stolen, imm mediately in nform your local Polic Give th r ce. hem the ph hone of bile n car. Police can easily track the location b calling that y e by number o the mob hidden in your c number. Chances are that y you may get back your car w within the shortest p possible ti ime. And finally do not fo orget to ch harge this m mobile at le east twice a week and hide it ba in your car d ack r in active position. Food fo tho F or ought: If it is not already with y f you, pr rovably it wil harm you: the y ll m in nforma ation, th tech he hnology – in s short, ‘ ‘The Ed dge’! C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  • 6. Project O O-sint (Op pen Source Intelligence) has gained m momentum with polic ce receiving interest fr g rom as man as 18 IT giants for its implem ny T r mentation. What is it? O-sint is a strategic initiative by Delhi Po y olice to let them snoo on socia op al Project O networks and the in s nternet to t track anti-s social elem ments. Polic claim they intend t ce to collect on the info nly ormation that is availa able in the public dom main. Features s Apart fro the ge om eographica identifica al ation featu ure to tra ack the loc cation of a criminal's or suspe s ect's move ements through his presence on the in nternet, th he project a also featur res sentime analys that ide ent sis entifies the positive or negativ e ve vibes in a communi ication for detecting c criminal intent. IT giants involved s As many as 18 glob IT gian includin IBM, HC Wipro, Oracle and TCS.hav y bal nts, ng CL, d ve pitched in with the Delhi P Police to im mplement this proje and he them in ect elp accessing the data. ms ace Problem it may fa Experts w warn that the project may run in problem because of certain limitations nto ms e n s namely: Ge eographica tracking of criminals on the in al nternet will have limita ations. Many websit have se tes ecurity rest trictions on accessing content. n g Re estricted b blogs and w web- sites can be ac ccessed on with pa nly asswords o or dig gital sig gnatures. Co ommercial sites will block web crawle ers, making it difficu to trac ult ck movements. On Jul 8 2013, Ca Pran Prasad, Vet 8, apt teran <pra an.prasad@ @yahoo.c com> wrote e 13 etter is ve ery good. Write-up with pho otographs on the c catastrophe in e July 201 Newsle Uttarakha is very good and so is an a and y d alert report on Frauds by Col. N N Bhati Veteran ster ia, n. ast ys re us n. erial Some other happenings in la few day across country ar of seriou concern Could se ast abodhi Tem mple, Bodh Gaya and nearly tw dozen s h d wo school child dren’s deat in th bomb bla at Maha Bihar afte eating M er Mid-day Me have be avoided? eal een C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  • 7. Answer is Yes, only if the laid down system and procedure would have been scrupulously followed. 1. In case of Bodh Gaya, what is being seen as security lapse has nothing to do with the number of security personnel or weapons in-adequacy, but it happened as a result of not following the laid down procedure as per ‘SOP’ (Standard Operating Procedure). Invariably, personnel tend to become complacent, if they are on regular duty at the same place for very long period of time (months), or else remaining on overtime duty. We often find casual attitude of security guards carrying frisking with Hand Held Metal Detectors (HHMD), as if they must carry out this drill as a daily routine. Placing of CCTV cameras are necessary surveillance requirement but, good quality camera for capturing sharp pictures under dim light should only be preferred. Cost cutting in compromising with the quality and required quantity of any security related material may prove to be disastrous during hours of crisis. Thorough security audit of the area under consideration is a must prior to providing the required type of security. Putting right type of personnel to carry out the assigned duty in proper perspective is very important task for the management. Any such happening can easily be attributed to the lapse of not following ‘Do’s & Don’ts’ of ‘SOP’. 2. These bombs could have been noticed by the guard on duty if every individual would have been subjected to body and baggage frisking while entering the premises through gate, at any point of time. Even if they are presumed to have entered by trespassing by climbing the boundary wall, yet ‘SOP’ would mention the methods to be adopted in keeping constant vigil in such places. Come what may, we must understand the importance of going by the Security Audit and SOP. Even if CCTV cameras are in place, it will require adequate and quick action by the security providing personnel, for which Control Room would be required to be manned by alert personnel on 24x7 basis, with ‘ERS’ (Emergency Response System) in place which must include Fire Fighting Department too. Reasons for entry of unscrupulous people inside the temple area could be from luring the corrupt guard to forcible approach. Therefore, every loophole has to be tightened and monitored on continuous basis. Explaining the reason after misadventure does not sound well. Security is all about being ‘PROACTIVE’. 3. In the case of death of a large number of school children in a single day, after eating mid-day meal too can be seen as a case due to deviation from the laid down mandatory norms of tasting meals by the Principal/ Head of School/ Adult persons and members of Education Committee prior to be served to the children. In this case definite doubt arises due to these authorized persons avoiding tasting the food. Were they aware of any deficiency in raw material and their cooking ingredients? Importance of laid down procedure should never be overlooked. Of course there are whole lot of matters to be taken care of right from procurement and storage of food materials to proper cookhouse and hygienic dining place with clean utensils. Above tragedy is a result of callousness due to negligence at one or more stage on above accounts. The efficiency of cooks and their wages too needs to be assessed and taken care of. In nutshell, supervisory control by the competent authority must be exercised to C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
  • 8. understand any difficulty and in ensuring proper execution of the scheme. Timely remedial action should be the key-word for these authorities. We must understand that every life is important and there shall not be any laxity by anyone in putting someone’s life in danger or taking it to the extent of life threatening stage. 4. Unprecedented catastrophe in Uttarakhand has caused damage to Kedarnath Temple Complex. Archaeological Survey of India (ASI) has been entrusted with the task of its repair and renovation. A team from the department has visited the site to assess the extent of damage and to finalise the method of conservation to be adopted. Now a detailed report is under preparation supported by drawings and photographs. ASI has the expertise to take up such tasks. It has successfully carried out intricate conservation work of temples across country. ASI has carried out conservation and restoration work in other countries also. At present it is engaged in such work in Cambodia, Philippines and Myanmar. 5. There are specialized branches in ASI to take care of various types of work. They are Conservation Branch, Temple Survey Project (North & South), Building Survey Project, Excavation Branch, Science Branch, Epigraphy Branch, Horticulture Branch & Security Wing. Besides these specialized components, there are 24 Circle Offices and 44 Museums under ASI across our country. ASI was entrusted by the Union Govt. in the beginning of 21st Century to prepare factual report of Ayodhya (Faizabad), U.P.; after carrying out survey of the disputed site. This was carried out meticulously and report was submitted to the concerned authorities within a reasonable time. We hope ASI will carry out this assigned task too with great skill and in shortest possible time. Archaeological conservation work is intricate and different from PWD nature of work, therefore it is time taking. Conservation by ASI shall have to be carried out with the similar material and cementing chemicals with which the structure had originally been built. Use of cement and other new available construction materials are totally prohibited under Conservation Policy of our Country. C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
  • 9. On Jul 8 2013, Ca Manish Chandra 8, apt h ayan <captain nmanish.c chandraya an@rrd.co om> wrote Dear Cap Tyagi, pt Thanks f the lates newslett I alway await the latest edi for st ter. ys e ition and enjoy readin and pick ng king up useful informatio on. I am writi to you to point two issues w ing which are re elated with the curren issue nt  Th map of India is inc he correct on f first page.  On of the p ne pictures of rescue is not from India. The troops lyin down ar very cle ng re early no of India origin a ot an and neithe is the uniform th of Indian Army or any other er hat pa aramilitary organizatio on. Hope the would b rectified ese be d. Thanks a regards and Capt Ma anish Chan ndrayan 8, 4:45 PM, S Tyagi C SB Capt <sbty yagi1958@ @gmail.com wrote: m> On Jul 8 2013 at 4 Dear Capt Manish, n e Map ghtly wron but my mistake is gross! I did ng You are correct on both the counts! M is slig esearch on the pictu which was plac n ure h ced on a w website in context of Kedarn n nath some re rescue o operation but it turn ned out to be of Ch o hinese arm involve in rescu during the my ed ue floods some years back. I w publish apologie and clarification. s will h es gards Best reg Capt S B Tyagi, CO OAS’CC* C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx
  • 10. If you do no wish to r ot receive this Newslette s ers, please Reply, ‘RE EMOVE’ in subject an your nam will nd me be removed from the li ICISS d e ist. does not sh hare email o other de or etails with a entity. any Sug ggestions & feedbac may be sent to u on e-ma sbtyagi1958@gm ck e us ail: mail.com C:Userss sbtyagiDocum mentsICISSNews Letter Aug 13.doc r cx