Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
1. N
Newslet
tter: Au
ugust 2
2013
Let’ profe
’s
fessionalize t pro
the ofessio
onals…
http://w
www.wix.com/
/sbtyagi/iciss
Th month, India c
his
celebrate its Ind
es
dependen Day.
nce
W
What a g
glorious day, as this d
s
day has shown the w
s
n
world tha path to
at
Independe
ence need not be trough v
violence!
!
his
has
wn
world tha non-vio
at
olence is even m
s
more potent tool for
Th day h show the w
independe
ence that weapon of viol
t
ns
lence!
his
own the world th Indep
hat
pendenc can be obtain
ce
ned witho
out
Th day has sho
sh
hedding t blood
the
d!
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
2. (Express
sed in 20
007 while writing the forwa
e
ard of th book “Industria Security –
he
al
y
Managem
ment and Strategies by Shri DC Nath, IPS (Retd and Ca SB Tya his vie
s”
i
,
d.)
apt
agi,
ews
are cont
temporary even now
y
w!)
The conc
cept and pr
ractice of industrial security are as old as industry
e
itself. It is essentia that they keep pac with the technolog
al
y
ce
gical and
evelopments in indu
ustry; and the chan
nging patt
terns of
other de
The origin and ba
vulnerabilities and threats. T
nal
asic objec
ctives of
l
were the prevention/d
detection o pilferage (mostly
of
e
industrial security w
by disho
onest workers) and sabotag (mostly by disgruntled
d
ge
workers). New development and tec
ts
chnologies in indust have
try
created new vulne
erabilities a
and it has become necessary for the
s
y
rs
actitioners of industrial security to adapt to face
y
manager and pra
such vuln
nerabilities and devic
s
ce/learn new techniqu
w
ues.
ation and g
globalizatio have led to the growth of
on
Economic liberaliza
rial enterprises, man of them transny
m
large and diversified industr
er.
of
at
te
national in characte Some o the very factors tha contribut to the
ful
ning of su
uch Multin
national Co
ompanies (MNCs)
successf function
tend to become security vul
lnerabilities Many M
s.
MNCs inclu
ude a mul
ltitude of e
economic and
technolog
gical syste
ems (that are like networks) for their efficient functionin
)
r
ng. The m
more
develope and com
ed
mplex the interconne
ected netw
works beco
ome, the m
more they have featu
ures
that mak their b
ke
behavior n
non-linear; i.e. a sm
mall shock to a cri
k
e
itical node produces a
disproportionately large disruption. MNC also ten to dispe
Cs
nd
erse their m
manufactur
ring facilitie in
es
different countries, based on availabilit of raw materials, inexpensiv real estate / pow /
n
ty
ve
wer
to
the
f
tensive pro
oducts by b
building larg produc
ger
ction
labor etc. They try t reduce t cost of capital-int
equipment and highly skilled pe
y
eople in a single location provi
ides
facilities. Placing expensive e
er
fficiency a
and synerg
gies that lead to t
the creatio of wea
on
alth.
for easie access, more ef
Manufacturing and storage fa
acilities of many MNC are like to contain device packed w
ely
es
with
Cs
energy, c
combustibles, and po
oisons; crea
ating speci
ialized vuln
nerabilities.
The conc
centration of high-va
alue and/or hazardou assets in relatively compac locations in
us
ct
s,
order to achieve economie of scale, creates extraord
es
s
dinary vuln
nerabilities that call for
extraordinary effort from thos respons
ts
se
sible for ind
dustrial sec
curity. Indu
ustrial secu
urity manag
gers
and prac
ctitioners ar required to be able to advise their man
re
d
e
e
nagements about pos
s
ssible step to
ps
reduce th vulnera
he
abilities rela
ated to com
mplex tech
hnologies u
used by th
hem. They have to le
earn
about the possible dispersal of high-va
e
alue assets loosenin the coup
s,
ng
plings in th corpora
he
ate’s
networks building buffers in these networks, introducin "circuit breakers" that inter
s,
nto
ng
rrupt
dangerou feedbac etc.
us
ck,
Though t
terrorism is itself not a new phe
s
enomenon, internation
nalized net
tworking (o
often based on
d
religious considerations) pose security threats to industrial units, bas on cau
es
y
o
sed
uses that m
may
lie far fro the loc
om
cation of th industrial unit, e.g. real or imaginary grievance against the
he
y
es
government and/or the preva
r
ailing dispa
arate economic order. Sophisticated terro
orists are m
may
increasin
ngly use non-weapon technolo
n
ogies for d
destructive ends. Tec
chnologica advances in
al
communications an informa
nd
ation techn
nology (IT) help them to give another m
m
meaning to the
acronym WMD - W
Weapons of Mass Disr
ruption, not necessarily of Mass Destructio
t
s
on.
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
3. Security planners have to learn to pinpoint and protect the critical complex networks for
producing and distributing energy, information, water, and food. Disruption of these would be
most susceptible to the multiplier effect of technology-amplified emotional response. Systems
handling energy and hazardous materials are easy targets for turning supposedly benign
technology to destructive ends.
Specialist analysts around the world have warned that future terrorist acts may include more
sophisticated forms of destruction and extortion, such as disabling or penetrating vital
commercial computer systems. Sheikh Omar Bakri Muhammad, Syrian-born founder of the
London-based group Jama'at Al-Muhajirun and the spokesman for Osama bin Laden's
International Islamic Front for Jihad Against Jews and Crusaders, had claimed in an interview,
that "I would not be surprised if tomorrow I hear of a big economic collapse because of
somebody attacking the main technical systems in big companies."
"Cyber-terrorism" is often used as a blanket term covering the threat of viruses, hackers and
miscellaneous security breaches, regardless of whether or not they actually originated from
terrorists. Although it is theoretically possible for electronic intrusions to damage critical
infrastructure, taking control of well protected systems from the outside is extremely difficult;
and can be almost totally prevented through well-planned computerized and non-computerized
fail-safe measures. Digital intrusions can also compromise intellectual property and sensitive
research data that can lead to long-term economic loss.
They can place customer data at risk and erode confidence and trust in an enterprise and its
affiliates. The number of organized hacking syndicates targeting financial and investment
institutions around the world are growing at a disturbingly rapid rate. The financial industry's
increasing dependence on the public telecommunications system, rapid adoption of wireless
systems and outsourcing of operations to third parties pose growing security challenges.
Cyber-security within an enterprise is not merely a technical problem, but should be handled
as a management challenge.
The scope of the risks is such that it can be effectively managed only by engaging senior
corporate leadership. Preparedness plans should ensure that digital security is factored into
the overall operations of the enterprise.
Business espionage often referred to by the elegant euphemism of "competitive intelligence"
probably started when the first competitor set up business. Though many companies already
go to great lengths to obtain trade secrets and other business information about their
competitors, it has been assessed that these efforts will intensify and be more aggressively
pursued in the coming years. They may use any combination of legal, illegal, ethical, and
unethical techniques. The ushering in of the digital and information age has brought about a
sea change in the methods of business espionage. Many new and not-so-widely-recognized
threats and points of vulnerability have been created. Some of the new threats may seem to
belong to the realm of science fiction, but they are very real. What others get to know about a
company can make or break the company's ability to compete effectively.
Many companies are gradually starting to recognize that fences and gates, locks and guards,
cameras and alarm systems no longer provide adequate protection. Even a company that has
C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
4. strict stan
ndards of p
physical se
ecurity can be devast
tated by at
ttacks on it information resourc
ts
ces.
One of th basic pr
he
remises of counterinte
elligence is that there is no such thing as coincidenc
s
e
h
ce.
ntelligence programs should be in plac to reco
e
s
ce
ognize the indicators of busin
e
s
ness
Counterin
espionag operatio that co
ge
ons
ould advers
sely affect the comp
pany. It wo
ould be a g
grave mista
ake,
however, to assum that the old rules o physical security no longer apply. Thou all secu
me
of
o
ugh
urity
requirem
ments shou
uld becom an int
me
tegral par of ever compan
rt
ry
ny's busin
ness strate
egy,
managem
ments would expect t industri security division to be primar respons
the
ial
y
o
rily
sible.
he
of
ulnerability is a weak
y
kness in th system and
he
Risk is th result o vulnerabilities and threats. Vu
threat is what some
eone can d to hurt y by exploiting vuln
do
you
nerability. A threats a most likely
As
are
to origina from ho
ate
ostile elem
ments, one may not be able to e
eliminate th
hem. Total elimination of
vulnerabilities may however, require unaccepta
y,
ably drastic measur
res. The m
most pract
tical
measure in most situ
uations would therefo be to p
ore
prioritize th vulnera
he
abilities and to
d
counterm
reduce th risk thro
he
ough them.
e
nough to d
discourage anyone f
from
A listing of all the possible security threats would be en
to
e
er
titioner of i
industrial s
security. It is not realistic to exp
pect
wanting t become a manage or pract
any indiv
vidual to be totally co
e
onversant with all kin of vuln
nds
nerabilities threats a
s,
and preven
ntive
measure A succe
es.
essful indus
strial secur practitio
rity
oner or ma
anager should be awa of the r
are
risks
and be a
able to get n
necessary expert help to tackle them.
(R. Swa
aminatha
an)
22 Octob 2007
ber
A 1954 IPS officer from And
r
dhra Prade
esh, he wa a foundi membe and Vice-Presiden of
as
ing
er
nt
the Che
ennai Cent for Ch
tre
hina Studie (CCCS) as well as President of the Internatio
es
)
e
onal
Institute of Security and Safe Manage
y
ety
ement, New Delhi.
w
He was a China sp
pecialist, ha
aving serve the Gov
ed
vernment o India for long years and retire in
of
s
ed
ecretary an Director General (
nd
r
(Security), Cabinet Se
ecretariat.
1990 as Special Se
ssociated w many t
with
think-tanks and discu
s
ussion groups in Indi and was an
ia
s
He was closely as
articipant in many na
n
ational and internation semina He authored man publicati
nal
ars.
ny
ions
active pa
dealing with differ
rent issues relating t nationa security and foreig policies with spe
s
to
al
gn
s,
ecial
referenc to China India and Sri Lanka
ce
a,
d
a.
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
5. Col N N Bhatia (Retd)
Industrial Security Consultant
It takes o
only 2 minu
utes for a c thief to run away w your c No ma
car
with
car.
atter if you h
have a trac
cker
and auto
o-alarming devices fit
tted in you car. The off-cou
ur
ese
urse help in locating your car o
n
once
stolen! Lo
ow-cost ca tracker c be impr
ar
can
rovised and used for your car at one tenth of the cos of
d
h
st
The best safety fo your ca is a live and activ Mobile Phone hid
or
ar
e
ve
dden in a safe place in
e
r:
your car
1. Bu any low price mo
uy
w
obile phon with lon
ne
nger standby time (Q
Qmobile ha one mo
as
odel
wh
hich runs fo 10 days on standb and cost around R
or
s
by
t
Rs.2,200/-).
2. Install a mob connec
bile
ction which has best n
h
network in the countr
ry.
urn
obile on co
omplete SILENT mode (double check it should not vibrate w
e
t
while
3. Tu this mo
yo turn it on SILENT m
ou
n
mode).
Wrap it up s
slightly in a plastic sh
heet so tha it should not get d
at
d
dirty and dusty during its
g
4. W
hid
dden use.
t
ing
mber from a
another mo
obile phone
e.
5. Make sure it is perfectly respondi by calling its num
ide
obile in a sa place in your car. And that’s it…!!!
afe
n
s
6. Hi this mo
7.
If by any chance yo car is s
our
stolen, imm
mediately in
nform your local Polic Give th
r
ce.
hem the ph
hone
of
bile
n
car. Police can easily track the location b calling that
y
e
by
number o the mob hidden in your c
number. Chances are that y
you may get back your car w
within the shortest p
possible ti
ime.
And finally do not fo
orget to ch
harge this m
mobile at le
east twice a week and hide it ba in your car
d
ack
r
in active position.
Food fo tho
F
or ought:
If it is not already with y
f
you, pr
rovably it wil harm you: the
y
ll
m
in
nforma
ation, th tech
he
hnology – in s
short, ‘
‘The Ed
dge’!
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
6. Project O
O-sint (Op
pen Source Intelligence) has gained m
momentum with polic
ce
receiving interest fr
g
rom as man as 18 IT giants for its implem
ny
T
r
mentation.
What is it?
O-sint is a strategic initiative by Delhi Po
y
olice to let them snoo on socia
op
al
Project O
networks and the in
s
nternet to t
track anti-s
social elem
ments. Polic claim they intend t
ce
to
collect on the info
nly
ormation that is availa
able in the public dom
main.
Features
s
Apart fro the ge
om
eographica identifica
al
ation featu
ure to tra
ack the loc
cation of a
criminal's or suspe
s
ect's move
ements through his presence on the in
nternet, th
he
project a
also featur
res sentime analys that ide
ent
sis
entifies the positive or negativ
e
ve
vibes in a communi
ication for detecting c
criminal intent.
IT giants involved
s
As many as 18 glob IT gian includin IBM, HC Wipro, Oracle and TCS.hav
y
bal
nts,
ng
CL,
d
ve
pitched in with the Delhi P
Police to im
mplement this proje and he them in
ect
elp
accessing the data.
ms
ace
Problem it may fa
Experts w
warn that the project may run in problem because of certain limitations
nto
ms
e
n
s
namely:
Ge
eographica tracking of criminals on the in
al
nternet will have limita
ations.
Many websit have se
tes
ecurity rest
trictions on accessing content.
n
g
Re
estricted b
blogs and w
web- sites can be ac
ccessed on with pa
nly
asswords o
or
dig
gital
sig
gnatures.
Co
ommercial sites will block web crawle
ers, making it difficu to trac
ult
ck
movements.
On Jul 8 2013, Ca Pran Prasad, Vet
8,
apt
teran <pra
an.prasad@
@yahoo.c
com> wrote e
13
etter is ve
ery good. Write-up with pho
otographs on the c
catastrophe in
e
July 201 Newsle
Uttarakha is very good and so is an a
and
y
d
alert report on Frauds by Col. N N Bhati Veteran
ster
ia,
n.
ast
ys
re
us
n.
erial
Some other happenings in la few day across country ar of seriou concern Could se
ast
abodhi Tem
mple, Bodh Gaya and nearly tw dozen s
h
d
wo
school child
dren’s deat in
th
bomb bla at Maha
Bihar afte eating M
er
Mid-day Me have be avoided?
eal
een
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
7. Answer is Yes, only if the laid down system and procedure would have been scrupulously
followed.
1.
In case of Bodh Gaya, what is being seen as security lapse has nothing to do with the
number of security personnel or weapons in-adequacy, but it happened as a result of not
following the laid down procedure as per ‘SOP’ (Standard Operating Procedure). Invariably,
personnel tend to become complacent, if they are on regular duty at the same place for very
long period of time (months), or else remaining on overtime duty. We often find casual attitude
of security guards carrying frisking with Hand Held Metal Detectors (HHMD), as if they must
carry out this drill as a daily routine. Placing of CCTV cameras are necessary surveillance
requirement but, good quality camera for capturing sharp pictures under dim light should only
be preferred. Cost cutting in compromising with the quality and required quantity of any
security related material may prove to be disastrous during hours of crisis. Thorough security
audit of the area under consideration is a must prior to providing the required type of security.
Putting right type of personnel to carry out the assigned duty in proper perspective is very
important task for the management. Any such happening can easily be attributed to the lapse
of not following ‘Do’s & Don’ts’ of ‘SOP’.
2.
These bombs could have been noticed by the guard on duty if every individual would
have been subjected to body and baggage frisking while entering the premises through gate,
at any point of time. Even if they are presumed to have entered by trespassing by climbing the
boundary wall, yet ‘SOP’ would mention the methods to be adopted in keeping constant vigil in
such places. Come what may, we must understand the importance of going by the Security
Audit and SOP. Even if CCTV cameras are in place, it will require adequate and quick action
by the security providing personnel, for which Control Room would be required to be manned
by alert personnel on 24x7 basis, with ‘ERS’ (Emergency Response System) in place which
must include Fire Fighting Department too. Reasons for entry of unscrupulous people inside
the temple area could be from luring the corrupt guard to forcible approach. Therefore, every
loophole has to be tightened and monitored on continuous basis. Explaining the reason after
misadventure does not sound well.
Security is all about being ‘PROACTIVE’.
3.
In the case of death of a large number of school children in a single day, after eating
mid-day meal too can be seen as a case due to deviation from the laid down mandatory norms
of tasting meals by the Principal/ Head of School/ Adult persons and members of Education
Committee prior to be served to the children. In this case definite doubt arises due to these
authorized persons avoiding tasting the food. Were they aware of any deficiency in raw
material and their cooking ingredients? Importance of laid down procedure should never be
overlooked. Of course there are whole lot of matters to be taken care of right from procurement
and storage of food materials to proper cookhouse and hygienic dining place with clean
utensils. Above tragedy is a result of callousness due to negligence at one or more stage on
above accounts. The efficiency of cooks and their wages too needs to be assessed and taken
care of. In nutshell, supervisory control by the competent authority must be exercised to
C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
8. understand any difficulty and in ensuring proper execution of the scheme. Timely remedial
action should be the key-word for these authorities. We must understand that every life is
important and there shall not be any laxity by anyone in putting someone’s life in danger or
taking it to the extent of life threatening stage.
4.
Unprecedented catastrophe in Uttarakhand has caused damage to Kedarnath Temple
Complex. Archaeological Survey of India (ASI) has been entrusted with the task of its repair
and renovation. A team from the department has visited the site to assess the extent of
damage and to finalise the method of conservation to be adopted. Now a detailed report is
under preparation supported by drawings and photographs. ASI has the expertise to take up
such tasks. It has successfully carried out intricate conservation work of temples across
country. ASI has carried out conservation and restoration work in other countries also. At
present it is engaged in such work in Cambodia, Philippines and Myanmar.
5.
There are specialized branches in ASI to take care of various types of work. They are
Conservation Branch, Temple Survey Project (North & South), Building Survey Project,
Excavation Branch, Science Branch, Epigraphy Branch, Horticulture Branch & Security Wing.
Besides these specialized components, there are 24 Circle Offices and 44 Museums under
ASI across our country. ASI was entrusted by the Union Govt. in the beginning of 21st Century
to prepare factual report of Ayodhya (Faizabad), U.P.; after carrying out survey of the disputed
site. This was carried out meticulously and report was submitted to the concerned authorities
within a reasonable time. We hope ASI will carry out this assigned task too with great skill and
in shortest possible time. Archaeological conservation work is intricate and different from PWD
nature of work, therefore it is time taking. Conservation by ASI shall have to be carried out with
the similar material and cementing chemicals with which the structure had originally been built.
Use of cement and other new available construction materials are totally prohibited under
Conservation Policy of our Country.
C:UserssbtyagiDocumentsICISSNews Letter Aug 13.docx
9. On Jul 8 2013, Ca Manish Chandra
8,
apt
h
ayan
<captain
nmanish.c
chandraya
an@rrd.co
om> wrote Dear Cap Tyagi,
pt
Thanks f the lates newslett I alway await the latest edi
for
st
ter.
ys
e
ition and enjoy readin and pick
ng
king
up useful informatio
on.
I am writi to you to point two issues w
ing
which are re
elated with the curren issue nt
Th map of India is inc
he
correct on f
first page.
On of the p
ne
pictures of rescue is not from India. The troops lyin down ar very cle
ng
re
early
no of India origin a
ot
an
and neithe is the uniform th of Indian Army or any other
er
hat
pa
aramilitary organizatio
on.
Hope the would b rectified
ese
be
d.
Thanks a regards
and
Capt Ma
anish Chan
ndrayan
8,
4:45 PM, S Tyagi C
SB
Capt <sbty
yagi1958@
@gmail.com wrote:
m>
On Jul 8 2013 at 4
Dear Capt Manish,
n
e
Map
ghtly wron but my mistake is gross! I did
ng
You are correct on both the counts! M is slig
esearch on the pictu which was plac
n
ure
h
ced on a w
website in context of Kedarn
n
nath
some re
rescue o
operation but it turn
ned out to be of Ch
o
hinese arm involve in rescu during the
my
ed
ue
floods some years back. I w publish apologie and clarification.
s
will
h
es
gards
Best reg
Capt S B Tyagi, CO
OAS’CC*
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx
10. If you do no wish to r
ot
receive this Newslette
s
ers, please Reply, ‘RE
EMOVE’ in subject an your nam will
nd
me
be removed from the li ICISS d
e
ist.
does not sh
hare email o other de
or
etails with a entity.
any
Sug
ggestions & feedbac may be sent to u on e-ma sbtyagi1958@gm
ck
e
us
ail:
mail.com
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 13.doc
r
cx