The document discusses different types of security including:
1) Traditional state security focused on protecting borders from external threats.
2) Industrial security which encompasses infrastructure, access control, and employee security.
3) Human security which focuses on individual freedoms from fear, want, and ensuring basic needs and rights are met.
4) Security has evolved beyond state actors to include threats from non-state actors like terrorists. Ensuring security requires considering different stakeholders and perspectives.
You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the web-site is given below –
http://www.wix.com/sbtyagi/iciss
I actively encourage you to join ICISS Group at ‘LinkedIn’ and also
motivate other security professionals likewise. I am confident that by
becoming active member of the ICISS Group, not only you professionally will be benefitted; the profession itself will be benefitted by your active support and contribution. The link to the ICISS Group at LinkedIn is given below –
http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm
INAICTA 2011 adalah ajang kreativitas ICT tingkat nasional untuk profesional dan mahasiswa. Peserta dapat berkompetisi dalam kategori e-business, e-government, dan lainnya untuk profesional, serta aplikasi, audio visual digital, dan media interaktif digital untuk mahasiswa. Hadiah menarik disediakan oleh UNIKOM untuk para juara, mulai dari Rp. 15 juta untuk juara 1 hingga beasiswa S1/S2/S3.
Profesor Duma Cornel Lucian from Romania was awarded the European Quality Label for his project "Different but equal" by the National Support Service in Romania and the Central Support Service. The award was given on October 6, 2009 to recognize his work promoting equality and inclusion.
This PowerPoint presentation by Beth Shepherd covers an agenda including animation fun and ends with the text "Shazaam!". It has sections labeled "Agenda", "Animation fun", and ends with magic and excitement in the form of "Shazaam!".
This document provides prayer concerns and updates from a church. It requests prayers for Carrie Davis who is in a coma after a car accident, for members of the military, and for those with illness or who are spiritually lost. It also provides praise that Joe and Becky have a new granddaughter and announces various prayer meetings and church activities occurring over the next few weeks.
ISM2008 presentation: "Semantics Meets UX: Mediating Intelligent Indexing of Consumers’ Multimedia Collections for Multifaceted Visualization and Media Creation" by Hibino, Loui, Wood, Fryer and Cerosaletti (Eastman Kodak Company)
You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the web-site is given below –
http://www.wix.com/sbtyagi/iciss
I actively encourage you to join ICISS Group at ‘LinkedIn’ and also
motivate other security professionals likewise. I am confident that by
becoming active member of the ICISS Group, not only you professionally will be benefitted; the profession itself will be benefitted by your active support and contribution. The link to the ICISS Group at LinkedIn is given below –
http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm
INAICTA 2011 adalah ajang kreativitas ICT tingkat nasional untuk profesional dan mahasiswa. Peserta dapat berkompetisi dalam kategori e-business, e-government, dan lainnya untuk profesional, serta aplikasi, audio visual digital, dan media interaktif digital untuk mahasiswa. Hadiah menarik disediakan oleh UNIKOM untuk para juara, mulai dari Rp. 15 juta untuk juara 1 hingga beasiswa S1/S2/S3.
Profesor Duma Cornel Lucian from Romania was awarded the European Quality Label for his project "Different but equal" by the National Support Service in Romania and the Central Support Service. The award was given on October 6, 2009 to recognize his work promoting equality and inclusion.
This PowerPoint presentation by Beth Shepherd covers an agenda including animation fun and ends with the text "Shazaam!". It has sections labeled "Agenda", "Animation fun", and ends with magic and excitement in the form of "Shazaam!".
This document provides prayer concerns and updates from a church. It requests prayers for Carrie Davis who is in a coma after a car accident, for members of the military, and for those with illness or who are spiritually lost. It also provides praise that Joe and Becky have a new granddaughter and announces various prayer meetings and church activities occurring over the next few weeks.
ISM2008 presentation: "Semantics Meets UX: Mediating Intelligent Indexing of Consumers’ Multimedia Collections for Multifaceted Visualization and Media Creation" by Hibino, Loui, Wood, Fryer and Cerosaletti (Eastman Kodak Company)
'Computer Hardware' - A PPT good for summer home work for Class VIIIcaptsbtyagi
The document discusses the various components that make up a typical computer system. It describes the personal computer case and laptop form factors. It then explains the differences between hardware and software. The major internal computer components are outlined including the motherboard, CPU, RAM, storage devices like hard drives and removable media. Common input devices such as keyboards, mice, and webcams are also defined. The document provides an overview of the key parts and technologies that comprise modern personal computers.
This document discusses the importance of developing a thorough background screening policy for employees and extended workforce. It begins by explaining how background screening has become standard practice but can be ineffective without a carefully formulated plan. It then discusses understanding hiring vulnerabilities, closing loopholes for contract workers, and developing a standard policy that requires comprehensive screening for all positions. The policy should specify what checks are required for different roles and comply with legal standards. Overall, the document advocates for a centralized, consistent approach to background screening to protect the organization.
The document discusses a theft at the University of California, Berkeley where a laptop containing personal information on 98,000 people was stolen from an administration building. While university policy mandates encrypting personal data, the files on the stolen laptop had not yet been encrypted. The university is attempting to notify those affected and authorities do not believe the data has been misused yet. The incident raises questions about storing sensitive data on portable devices.
The document discusses lessons that can be learned from the 2010 Manila hostage crisis in the Philippines. It provides three key lessons: 1) authorities should have standard procedures for managing media coverage during security incidents to avoid interfering with operations and endangering lives; 2) police should assign crowd control units to prevent interference and ensure bystander safety; 3) individuals should avoid trusting strangers, especially armed ones, for their own safety. The document advocates learning from tragic events to help prevent future incidents and promote peace.
The newsletter discusses central monitoring stations that provide alarm monitoring and security services for large offices, industries, and residential customers. These central monitoring stations take over activities like alarm monitoring, response, auditing systems, and equipment upgrades from organizations' internal security teams. This allows security teams to focus on other priorities while still providing a high level of protection through reliable, cost-effective third-party monitoring. The lead article will discuss establishing central monitoring stations.
A massive computer worm called Stuxnet targeted Iran's nuclear facilities and spread globally. Stuxnet code samples have raised concerns it could be used to target other countries' critical infrastructure systems. The sophisticated Stuxnet code has reportedly been offered for sale on underground forums, potentially enabling cyber terrorists to adapt it for disruptive purposes. A major global cyber espionage operation dubbed "Operation Shady RAT" targeted over 70 organizations for years and is believed to have been masterminded by China to steal military, economic and diplomatic secrets.
This newsletter discusses preparing for and responding to terrorist attacks. It recommends developing an emergency communication plan, designating a safe space in your home, establishing meeting places, and assembling disaster supply kits. It also suggests checking your children's school emergency plans and knowing your roles and responsibilities if an attack occurs, such as giving first aid, directing traffic, or donating blood. The newsletter emphasizes remaining calm, listening to emergency instructions, and understanding that hostile surveillance is often used by terrorists to gather target information.
Brief Resume of Capt. S B Tyagi, FISM, CSC
• Holds Masters’ degrees in Philosophy, Sociology, Defense Studies & Political Science beside B.Sc. and LLB. He is also holding master’s degree in Business Administration and post graduate diplomas in Business Administration, Personnel Management & Industrial Relations and Safety & Security Management.
• Twenty eight years experience (including Army) in the field. Presently working in GAIL (India) Limited as Chief of Security at its Corporate Office.
• Have been regular faculty in Management Institutes. Various articles are published in related magazines and internet sites.
• Writer of best selling book on Industrial Security - “Industrial Security: Management & Strategies”.
• Made presentations in more then 18 international seminars on the subjects of homeland security and industrial security.
• The Honorable Lt. Governor of Delhi bestowed the most coveted ‘Best Security Manger’ award to Capt S B Tyagi on 30th August 2007 instituted by Security Today, a leading niche magazine for the protection industry. The award is testimony of untiring efforts, constant application of noble approaches in security management, innovation and leadership in the profession which have been distinctly displayed by Capt S B Tyagi. He has been recognized in past too for the similar qualities when he was awarded ‘Best Security Manager’ in 2002 and ‘Best Security Operation Manager’ in 2004 by IISSM (International Institute of Security and Safety Management).
• Given ‘Certification of Recognition’ and awarded as ‘Best Security Practitioner’ in GAIL in year 2009.
• Recipient of “Award of Fellowship (FISM)” and is “Certified Security & Safety Consultant (CSC)” by the “International Institute of Security & Safety Management”.
• Co-founder of “International Council of Industrial Security and Safety”.
• Mail id: sbtyagi1958@gmail.com ; sbtyagi@gail.co.in
• Blog: http://captsbtyagi.blogspot.com
• Web-site: http://www.wix.com/sbtyagi/iciss
• Holds Masters’ degrees in Philosophy, Sociology, Defense Studies & Political Science beside B.Sc. and LLB. He is also holding master’s degree in Business Administration and post graduate diplomas in Business Administration, Personnel Management & Industrial Relations and Safety & Security Management.
• Twenty eight years experience (including Army) in the field. Presently working in GAIL (India) Limited as Chief of Security at its Corporate Office.
• Have been regular faculty in Management Institutes. Various articles are published in related magazines and internet sites.
• Writer of best selling book on Industrial Security - “Industrial Security: Management & Strategies”.
• Made presentations in more then 18 international seminars on the subjects of homeland security and industrial security.
• The Honorable Lt. Governor of Delhi bestowed the most coveted ‘Best Security Manger’ award to Capt S B Tyagi on 30th August 2007 instituted by Security Today, a leading niche magazine for the protection industry. The award is testimony of untiring efforts, constant application of noble approaches in security management, innovation and leadership in the profession which have been distinctly displayed by Capt S B Tyagi. He has been recognized in past too for the similar qualities when he was awarded ‘Best Security Manager’ in 2002 and ‘Best Security Operation Manager’ in 2004 by IISSM (International Institute of Security and Safety Management).
• Given ‘Certification of Recognition’ and awarded as ‘Best Security Practitioner’ in GAIL in year 2009.
• Recipient of “Award of Fellowship (FISM)” and is “Certified Security & Safety Consultant (CSC)” by the “International Institute of Security & Safety Management”.
• Co-founder of “International Council of Industrial Security and Safety”.
• My mail id: sbtyagi1958@gmail.com ; sbtyagi@gail.co.in
• Blog: http://captsbtyagi.blogspot.com
• My web-site: http://www.wix.com/sbtyagi/iciss
The document discusses the use of intelligent technology to improve CCTV surveillance systems. It notes that current CCTV systems have limited monitoring capabilities as it is not possible to have someone constantly watching all camera feeds. Intelligent technology can help by performing automated analysis to detect events and alert operators. This allows operators to focus on more important tasks. The technology also enables detection of events even when camera views are not being actively monitored. While such intelligent technology has potential, implementation challenges remain around avoiding "cry wolf" scenarios from false alarms and not overloading operators with too many alerts.
The document discusses several trends in physical security systems moving from analog to IP-based networks:
1) More surveillance cameras, access controls, and sensors are connecting to IP networks which allows for features like priority tagging, automatic device discovery, and network access control.
2) HD video and video analytics software are improving surveillance capabilities like facial recognition while reducing bandwidth needs.
3) Building access controls are integrating with IP networks to automate policies and incident response.
4) Open standards are promoting interoperability between physical security systems and other communication technologies.
This document discusses accidental gun discharges and provides recommendations to prevent them. It notes that accidental gun discharges often involve single or double barrel guns, with no witnesses, and defective firing pins are a common cause. Accidents may occur when guns are banged on the ground, activating the firing mechanism. To prevent accidents, the document recommends providing proper gun racks for safe keeping of weapons wherever gunmen are deployed.
This document provides tips to prevent child abduction. It discusses the importance of educating children about stranger danger and teaching them safety techniques like knowing their full name and contact information. Parents are advised to be involved in their children's activities, know their friends, and encourage open communication. Signs of potential abduction include non-custodial abductions by a parent, runaways who could be exploited, and rare non-family abductions which usually end tragically. Prevention focuses on awareness, empowering children, and having plans in case of emergency.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
'Computer Hardware' - A PPT good for summer home work for Class VIIIcaptsbtyagi
The document discusses the various components that make up a typical computer system. It describes the personal computer case and laptop form factors. It then explains the differences between hardware and software. The major internal computer components are outlined including the motherboard, CPU, RAM, storage devices like hard drives and removable media. Common input devices such as keyboards, mice, and webcams are also defined. The document provides an overview of the key parts and technologies that comprise modern personal computers.
This document discusses the importance of developing a thorough background screening policy for employees and extended workforce. It begins by explaining how background screening has become standard practice but can be ineffective without a carefully formulated plan. It then discusses understanding hiring vulnerabilities, closing loopholes for contract workers, and developing a standard policy that requires comprehensive screening for all positions. The policy should specify what checks are required for different roles and comply with legal standards. Overall, the document advocates for a centralized, consistent approach to background screening to protect the organization.
The document discusses a theft at the University of California, Berkeley where a laptop containing personal information on 98,000 people was stolen from an administration building. While university policy mandates encrypting personal data, the files on the stolen laptop had not yet been encrypted. The university is attempting to notify those affected and authorities do not believe the data has been misused yet. The incident raises questions about storing sensitive data on portable devices.
The document discusses lessons that can be learned from the 2010 Manila hostage crisis in the Philippines. It provides three key lessons: 1) authorities should have standard procedures for managing media coverage during security incidents to avoid interfering with operations and endangering lives; 2) police should assign crowd control units to prevent interference and ensure bystander safety; 3) individuals should avoid trusting strangers, especially armed ones, for their own safety. The document advocates learning from tragic events to help prevent future incidents and promote peace.
The newsletter discusses central monitoring stations that provide alarm monitoring and security services for large offices, industries, and residential customers. These central monitoring stations take over activities like alarm monitoring, response, auditing systems, and equipment upgrades from organizations' internal security teams. This allows security teams to focus on other priorities while still providing a high level of protection through reliable, cost-effective third-party monitoring. The lead article will discuss establishing central monitoring stations.
A massive computer worm called Stuxnet targeted Iran's nuclear facilities and spread globally. Stuxnet code samples have raised concerns it could be used to target other countries' critical infrastructure systems. The sophisticated Stuxnet code has reportedly been offered for sale on underground forums, potentially enabling cyber terrorists to adapt it for disruptive purposes. A major global cyber espionage operation dubbed "Operation Shady RAT" targeted over 70 organizations for years and is believed to have been masterminded by China to steal military, economic and diplomatic secrets.
This newsletter discusses preparing for and responding to terrorist attacks. It recommends developing an emergency communication plan, designating a safe space in your home, establishing meeting places, and assembling disaster supply kits. It also suggests checking your children's school emergency plans and knowing your roles and responsibilities if an attack occurs, such as giving first aid, directing traffic, or donating blood. The newsletter emphasizes remaining calm, listening to emergency instructions, and understanding that hostile surveillance is often used by terrorists to gather target information.
Brief Resume of Capt. S B Tyagi, FISM, CSC
• Holds Masters’ degrees in Philosophy, Sociology, Defense Studies & Political Science beside B.Sc. and LLB. He is also holding master’s degree in Business Administration and post graduate diplomas in Business Administration, Personnel Management & Industrial Relations and Safety & Security Management.
• Twenty eight years experience (including Army) in the field. Presently working in GAIL (India) Limited as Chief of Security at its Corporate Office.
• Have been regular faculty in Management Institutes. Various articles are published in related magazines and internet sites.
• Writer of best selling book on Industrial Security - “Industrial Security: Management & Strategies”.
• Made presentations in more then 18 international seminars on the subjects of homeland security and industrial security.
• The Honorable Lt. Governor of Delhi bestowed the most coveted ‘Best Security Manger’ award to Capt S B Tyagi on 30th August 2007 instituted by Security Today, a leading niche magazine for the protection industry. The award is testimony of untiring efforts, constant application of noble approaches in security management, innovation and leadership in the profession which have been distinctly displayed by Capt S B Tyagi. He has been recognized in past too for the similar qualities when he was awarded ‘Best Security Manager’ in 2002 and ‘Best Security Operation Manager’ in 2004 by IISSM (International Institute of Security and Safety Management).
• Given ‘Certification of Recognition’ and awarded as ‘Best Security Practitioner’ in GAIL in year 2009.
• Recipient of “Award of Fellowship (FISM)” and is “Certified Security & Safety Consultant (CSC)” by the “International Institute of Security & Safety Management”.
• Co-founder of “International Council of Industrial Security and Safety”.
• Mail id: sbtyagi1958@gmail.com ; sbtyagi@gail.co.in
• Blog: http://captsbtyagi.blogspot.com
• Web-site: http://www.wix.com/sbtyagi/iciss
• Holds Masters’ degrees in Philosophy, Sociology, Defense Studies & Political Science beside B.Sc. and LLB. He is also holding master’s degree in Business Administration and post graduate diplomas in Business Administration, Personnel Management & Industrial Relations and Safety & Security Management.
• Twenty eight years experience (including Army) in the field. Presently working in GAIL (India) Limited as Chief of Security at its Corporate Office.
• Have been regular faculty in Management Institutes. Various articles are published in related magazines and internet sites.
• Writer of best selling book on Industrial Security - “Industrial Security: Management & Strategies”.
• Made presentations in more then 18 international seminars on the subjects of homeland security and industrial security.
• The Honorable Lt. Governor of Delhi bestowed the most coveted ‘Best Security Manger’ award to Capt S B Tyagi on 30th August 2007 instituted by Security Today, a leading niche magazine for the protection industry. The award is testimony of untiring efforts, constant application of noble approaches in security management, innovation and leadership in the profession which have been distinctly displayed by Capt S B Tyagi. He has been recognized in past too for the similar qualities when he was awarded ‘Best Security Manager’ in 2002 and ‘Best Security Operation Manager’ in 2004 by IISSM (International Institute of Security and Safety Management).
• Given ‘Certification of Recognition’ and awarded as ‘Best Security Practitioner’ in GAIL in year 2009.
• Recipient of “Award of Fellowship (FISM)” and is “Certified Security & Safety Consultant (CSC)” by the “International Institute of Security & Safety Management”.
• Co-founder of “International Council of Industrial Security and Safety”.
• My mail id: sbtyagi1958@gmail.com ; sbtyagi@gail.co.in
• Blog: http://captsbtyagi.blogspot.com
• My web-site: http://www.wix.com/sbtyagi/iciss
The document discusses the use of intelligent technology to improve CCTV surveillance systems. It notes that current CCTV systems have limited monitoring capabilities as it is not possible to have someone constantly watching all camera feeds. Intelligent technology can help by performing automated analysis to detect events and alert operators. This allows operators to focus on more important tasks. The technology also enables detection of events even when camera views are not being actively monitored. While such intelligent technology has potential, implementation challenges remain around avoiding "cry wolf" scenarios from false alarms and not overloading operators with too many alerts.
The document discusses several trends in physical security systems moving from analog to IP-based networks:
1) More surveillance cameras, access controls, and sensors are connecting to IP networks which allows for features like priority tagging, automatic device discovery, and network access control.
2) HD video and video analytics software are improving surveillance capabilities like facial recognition while reducing bandwidth needs.
3) Building access controls are integrating with IP networks to automate policies and incident response.
4) Open standards are promoting interoperability between physical security systems and other communication technologies.
This document discusses accidental gun discharges and provides recommendations to prevent them. It notes that accidental gun discharges often involve single or double barrel guns, with no witnesses, and defective firing pins are a common cause. Accidents may occur when guns are banged on the ground, activating the firing mechanism. To prevent accidents, the document recommends providing proper gun racks for safe keeping of weapons wherever gunmen are deployed.
This document provides tips to prevent child abduction. It discusses the importance of educating children about stranger danger and teaching them safety techniques like knowing their full name and contact information. Parents are advised to be involved in their children's activities, know their friends, and encourage open communication. Signs of potential abduction include non-custodial abductions by a parent, runaways who could be exploited, and rare non-family abductions which usually end tragically. Prevention focuses on awareness, empowering children, and having plans in case of emergency.
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPRAHUL
This Dissertation explores the particular circumstances of Mirzapur, a region located in the
core of India. Mirzapur, with its varied terrains and abundant biodiversity, offers an optimal
environment for investigating the changes in vegetation cover dynamics. Our study utilizes
advanced technologies such as GIS (Geographic Information Systems) and Remote sensing to
analyze the transformations that have taken place over the course of a decade.
The complex relationship between human activities and the environment has been the focus
of extensive research and worry. As the global community grapples with swift urbanization,
population expansion, and economic progress, the effects on natural ecosystems are becoming
more evident. A crucial element of this impact is the alteration of vegetation cover, which plays a
significant role in maintaining the ecological equilibrium of our planet.Land serves as the foundation for all human activities and provides the necessary materials for
these activities. As the most crucial natural resource, its utilization by humans results in different
'Land uses,' which are determined by both human activities and the physical characteristics of the
land.
The utilization of land is impacted by human needs and environmental factors. In countries
like India, rapid population growth and the emphasis on extensive resource exploitation can lead
to significant land degradation, adversely affecting the region's land cover.
Therefore, human intervention has significantly influenced land use patterns over many
centuries, evolving its structure over time and space. In the present era, these changes have
accelerated due to factors such as agriculture and urbanization. Information regarding land use and
cover is essential for various planning and management tasks related to the Earth's surface,
providing crucial environmental data for scientific, resource management, policy purposes, and
diverse human activities.
Accurate understanding of land use and cover is imperative for the development planning
of any area. Consequently, a wide range of professionals, including earth system scientists, land
and water managers, and urban planners, are interested in obtaining data on land use and cover
changes, conversion trends, and other related patterns. The spatial dimensions of land use and
cover support policymakers and scientists in making well-informed decisions, as alterations in
these patterns indicate shifts in economic and social conditions. Monitoring such changes with the
help of Advanced technologies like Remote Sensing and Geographic Information Systems is
crucial for coordinated efforts across different administrative levels. Advanced technologies like
Remote Sensing and Geographic Information Systems
9
Changes in vegetation cover refer to variations in the distribution, composition, and overall
structure of plant communities across different temporal and spatial scales. These changes can
occur natural.
Strategies for Effective Upskilling is a presentation by Chinwendu Peace in a Your Skill Boost Masterclass organisation by the Excellence Foundation for South Sudan on 08th and 09th June 2024 from 1 PM to 3 PM on each day.
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
বাংলাদেশের অর্থনৈতিক সমীক্ষা ২০২৪ [Bangladesh Economic Review 2024 Bangla.pdf] কম্পিউটার , ট্যাব ও স্মার্ট ফোন ভার্সন সহ সম্পূর্ণ বাংলা ই-বুক বা pdf বই " সুচিপত্র ...বুকমার্ক মেনু 🔖 ও হাইপার লিংক মেনু 📝👆 যুক্ত ..
আমাদের সবার জন্য খুব খুব গুরুত্বপূর্ণ একটি বই ..বিসিএস, ব্যাংক, ইউনিভার্সিটি ভর্তি ও যে কোন প্রতিযোগিতা মূলক পরীক্ষার জন্য এর খুব ইম্পরট্যান্ট একটি বিষয় ...তাছাড়া বাংলাদেশের সাম্প্রতিক যে কোন ডাটা বা তথ্য এই বইতে পাবেন ...
তাই একজন নাগরিক হিসাবে এই তথ্য গুলো আপনার জানা প্রয়োজন ...।
বিসিএস ও ব্যাংক এর লিখিত পরীক্ষা ...+এছাড়া মাধ্যমিক ও উচ্চমাধ্যমিকের স্টুডেন্টদের জন্য অনেক কাজে আসবে ...
Walmart Business+ and Spark Good for Nonprofits.pdfTechSoup
"Learn about all the ways Walmart supports nonprofit organizations.
You will hear from Liz Willett, the Head of Nonprofits, and hear about what Walmart is doing to help nonprofits, including Walmart Business and Spark Good. Walmart Business+ is a new offer for nonprofits that offers discounts and also streamlines nonprofits order and expense tracking, saving time and money.
The webinar may also give some examples on how nonprofits can best leverage Walmart Business+.
The event will cover the following::
Walmart Business + (https://business.walmart.com/plus) is a new shopping experience for nonprofits, schools, and local business customers that connects an exclusive online shopping experience to stores. Benefits include free delivery and shipping, a 'Spend Analytics” feature, special discounts, deals and tax-exempt shopping.
Special TechSoup offer for a free 180 days membership, and up to $150 in discounts on eligible orders.
Spark Good (walmart.com/sparkgood) is a charitable platform that enables nonprofits to receive donations directly from customers and associates.
Answers about how you can do more with Walmart!"
How to Build a Module in Odoo 17 Using the Scaffold MethodCeline George
Odoo provides an option for creating a module by using a single line command. By using this command the user can make a whole structure of a module. It is very easy for a beginner to make a module. There is no need to make each file manually. This slide will show how to create a module using the scaffold method.
How to Setup Warehouse & Location in Odoo 17 InventoryCeline George
In this slide, we'll explore how to set up warehouses and locations in Odoo 17 Inventory. This will help us manage our stock effectively, track inventory levels, and streamline warehouse operations.
हिंदी वर्णमाला पीपीटी, hindi alphabet PPT presentation, hindi varnamala PPT, Hindi Varnamala pdf, हिंदी स्वर, हिंदी व्यंजन, sikhiye hindi varnmala, dr. mulla adam ali, hindi language and literature, hindi alphabet with drawing, hindi alphabet pdf, hindi varnamala for childrens, hindi language, hindi varnamala practice for kids, https://www.drmullaadamali.com
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
ICSSM Newsletter Dec11
1. New
wslette Dec
er: cember 2011
r
Let’s profe
’s ession
nalize the pro
t ofessio
onals…
…
http://w
www.wix.com/
/sbtyagi/iciss
s
The most ess
e sential qu
uality, whic we hav but ign
ch ve nored, is the power
t r
of o
observatio
on.
We see but we don’t ob
w bserve. Observation is not ju seeing thing but
n ust t
und
derstandin the im
ng mplication of wh
ns hat we see. So effective e
observatiion of wh goes on around us is a very impo
hat o d v ortant requ uirement for better
r
security sense. W
Wherever you are, b it at ho
y be ome or ouutside in a public place look
p k
around and try and see through thing rather th just see them.
d gs han s
Try and ggauge the need for a thing to be present at a particular p
e o p place, for a person
r n
to be sta
anding at a particula place. D
ar Don’t igno anything that s
ore seems unu usual. Pry
y
harder an you wil come ou with sur
nd ll ut rprising re
esults. Ma observ
ake vation a habit.
Capt S B Tyagii
For ICISS
S
Digitally signed by Capt SB Tyagi, COAS'CC
DN: cn=Capt SB Tyagi, COAS'CC, o=International
Council of Security & Safety Management, ou=Co-
founder, email=sbtyagi1958@gmail.com, c=IN
Date: 2011.12.01 14:05:06 +05'30'
2. Before my joining as a Security Executive, I served as a Commissioned Officer with the
Indian Army. During my service, I got the opportunity of deployment at Indo-Bangladesh
border, Indo-Pakistan border, Indo-Myanmar border and Indo-China border. These ground
scenarios taught me to define security as protecting the political and physical integrity of
sovereign nations like that of our country.
In its traditional form, security is centered on the preservation of the sovereign state from
external threats and the activities of other states. It thus requires internationally recognized
boundaries protected if necessary by military action, prohibition of the use of force
between states and non-intervention in the affairs of other states. Under the UN Charter,
individual state security is supported by collective security. The Security Council’s primary
responsibility is to maintain international peace and security. The Security Council can
authorize the use of all necessary means in response to a breach of the peace, threat to
the peace or act of aggression. The ‘collective security’ is defined simply as the Security
Council, rather than as any broader community of states or other interests. The veto
ensures the agreement of the five permanent members in any such collective action and is
thus a safeguard against contested action. The decision to use the veto is political. Well,
these were my learning when I was trained in the Officers’ Training Academy of Indian
Army and thereafter serving at International Borders of our nation.
But soon after I joined my new assignment, I saw and learnt a different aspect of security.
Though we name it as Industrial security, but it can always be seen in conjunction with
Human Security. This includes almost everything from Infrastructure, Installation,
Perimeter, Access control, Township security to all sorts of employee insecurities and so
on and so forth.
Coming to the International security it is assumed that the action of one or more states that
threatens the security of other state(s). This means that less attention has been paid to the
role of non-state actors, such as terrorists, extremists, in generating insecurity. However in
the context of terrorism this has now changed. For example post 9/11; the UN Security
Council recognized terrorist acts as constituting a threat to international security.
Human security denotes individual freedom from basic insecurities, whatever the root of
that insecurity may be. It is also caused by internal conflict, by collapse of state institutions
and vital installations like that of ours. It also emanates from violence and abusive actions
by non-state actors like the present day scenario of Terrorism and Naxalism. Human
insecurity is also caused by violations of economic and social rights such as the right to
food, health and housing, as well as civil and political rights such as fearing torture,
deprivation of life and liberty. However although denial of human rights contributes to
human insecurity and human insecurity generates further violations of human rights, it is a
wider concept than human rights. It encompasses physical security, economic security,
legal security, political security, food security, gender security and relational security.
Human security is perhaps best summarized by the inclusion of ‘freedom from fear’ and
‘freedom from want’ among the four freedoms proclaimed by President Roosevelt during
World War Two. The Report on the Commission on Human Security, May 2005 added that
it also includes the freedom to take action on one's own behalf, which is the enjoyment of
3. autonomy and self-esteem. Human security thus goes beyond and supplements
y d s
internation security
nal y.
Human se ecurity does not depend upon internatio
n onal law’s distinction betwee conflict,
ns en ,
military acction, inter
rnal affairs and polic action. In so-calle post-co
s ce ed onflict situa
ations, the
e
forms of vviolence typpically mut tate from c
conflicts lik bombing military attacks into criminal
ke gs, l
violence like murd der, lootinng, abduc ctions, kid dnappings, corruptio
, on, armed crimes,
d ,
organized crime etc Where the state government cannot guarantee security within the
d c. e e
state, oth actors may assu
her ume that r responsibil xample an occupying army or
lity, for ex g r
internation peacek
nal keepers lik Indian A
ke Army is doi Peace-
ing -keeping in Lebanon Somalia,
n n, ,
Congo etc Howeve such bod
c. er dies tend to perceive security within state security terms or in
o e w e t n
terms of the security of their own forc ces rather than in that of the human security of
r t e s f
civilians w
within the s
state.
To summ marize we can say that securiity in any form or at any lev does not have a
t a vel
measuring yard and the threat cannot be calculate correctly Hence t task of a security
g d e ed y. the y
man at a any level is importa and ch
ant hallenging. But when the sec
. curity meaasures aree
practiced by one an all, it gives confid
nd dence to security professional s to make sure that
s e t
security is for everyb
s body!
Som ste yo ca take while tra nsact
me eps ou an ting
onlin to e
ne ensur sec
re curity
While all b
banks hav made all efforts to ensure se
ve o ecurity for the custom
mer’s inter
rest, listed
below are some tips to ensure maximum security:
e s e m
Ch hange your HPIN after your firs login and change it at least o
st d t once a mon
nth
Ch hange you HPIN after you access Citibank On
ur a nline Intern Banking using
net
sha ared PCs
De estroy the HPIN mailer after meemorizing it
Ke eep your HPIN a secret an don't disclose it to anyon (includ
nd d t ne ding bank
emmployees)
Do not write the HPIN on your A
o e ATM/Debit Card or Citibank Cre Card.
edit
Do not hand over your ATM/Deb Card or Credit Car to anyon
o d r bit rd ne.
Do not use common names as HPINs - choose passwords that are difficult for
o s d
othhers to gue
ess
Use a differe passw
ent word for ea of your accounts.
ach
Use both let tters and numbers a a combination of lower cas and capital letters
n and f se
if th passwo
he ords or HPI
INS are ca sensitiv
ase ve
If y
you believ that so
ve omeone is trying to commit fraud by pretending to be a
s o g
conncerned b banks’ bussiness ass
sociate and such ac ctivities ra
aise doubts, please
conntact the co
oncerned bank imme
b ediately.
Be alert for scam e-m
e mails. The
ese are de esigned to trick you into downnloading a
viru or jumping to a fra
us audulent w
website and disclosing sensitive informatio
d g e on.
4. Be
eware! Pho "look alike" webs
ony a sites are designed to trick con
d nsumers and collect
you persona information. Make s
ur al sure that websites on which yo transact business
w n ou t
pos privacy a security stateme
st and ents and reeview them carefully.
m
Verify the ad ddress of every web bsite, know as the URL.
wn
Ma sure th the UR you wa appea in the "address" or "locat
ake hat RL ant ars " " tion" box
on your bro owser window. So ome websites may appear to be legiti
o imate but
act
tually are ccounterfeits Take a f
s. few extra seconds an type the URL your
s nd e rself.
Do
on't reply to any e- -mail that requests your personal inf
s formation. Be very
sus
spicious o any bus
of siness or person who asks for your p
w f password, passport
dettails, other banks det
r tails or som other highly sensitive inform
me mation.
Oppen e-mails only when you know the sender. Be espec
w e cially care
eful about
opeening an e e-mail with an attach hment. Eve a friend may acciidentally se an e-
en d end
ma with a virus.
ail
Many e-ccommerce websites utilize state-of-th
e s he-art enccryption a
and other security
procedure to give y a conv
es you venient and secure shopping an banking experienc
d nd g ce.
If y
you suspe a webs is not w
ect site rports to be leave the site. Do not follow
what it pur e, e
any of the ins
y structions it may pres sent you.
Ask yourself if the inf formation you are asked to provide m
a p makes sens for the
se
acttivity you a engage in. For e
are ed example, an online auction site should not ask for
a a e n
you driver's license nu
ur umber or th PIN for your credi card. If a site or e-
he it -mail asks
for informatio that doe
on esn't feel rig do not respond.
ght, t
Keeep a Paper Trial. Print out th "addres of the company site you are on-it’s
P he ss" a
Uniform Reso ource Loca ator (URL) The URL ensures that you a dealing with the
). are g
righ compan It's als a good idea to print out a copy of your order and
ht ny. so d t o
connfirmation number for your reco ords.
Look for the padlock symbol a the bott
e at tom right of a web page to ensure the
e
site is running in secure mode BE
e g e EFORE you input sen
u nsitive inforrmation.
Maake sure y your hom compu ter has th most current an
me he c nti-virus software.
s
Ant ti-virus sofftware needs frequen updates to guard against new viruses.
nt a w
Insstall a personal firewall to he preven unautho
elp nt orized acc cess to yo home
our
commputer, es specially if you conne through a cable or DSL mo
f ect h o odem.
Log off. Do not just close your browser. Follow the secure a
e area exit instructions
to e
ensure you protectio
ur on.
Do not kee computers onlin when not in use. Either shut the off or
o ep ne r em
phyysically dissconnect th hem from I nternet connection.
Moonitor you transac
ur ctions. Re eview your order co
r onfirmation credit card, and
ns, c
ban stateme
nk ents as so oon as you receive them to make sure that you are being
u m
chaarged only for transactions you made. Immediately report any irregularit
y u y ties.
Reegularly do ownload security pa
s atches from your sof ftware ven dors.
5. The Supe Trackstic is the perfect too l for individ
er ck p duals, law enforceme and go
ent overnment t
agencies looking for a way to track anyt
thing that moves. Th Super T
he Trackstick records its
r s
own location, time, d
date, spee heading altitude and tempe
ed, g, a erature at p
preset inter
rvals. With
h
over 4Mb of memor it can st
ry, tore month of travel informatio
hs on.
The inclu
uded magn netic mount makes the Supe Trackstick
er
attach and remove from any metal surface. It has
easy to a d h
seamless integration into Google Earth™
n ™
orks
How it wo
The Sup per Tracks
stick receives signa als from twenty fo
our
satellites orbiting the earth With this infor
h. rmation, the
t
Trackstick Pro ca precise
k an ely calcula
ate its own positi
o ion
anywhere on the pla
e anet to with fifteen meters.
hin
Where it w
works
The Supe Trackstic will wor anywhe re on the planet Ear
er ck rk rth.
oute travelled can be viewed and
Your exac location and the ro
ct e a
played ba ack direct within Google E
tly Earth™. Everything is
E
included a there a no mon
and are nthly fees.
Applications / Feat
tures
Proofessional GPS
loc
cation Recoorder
Vehicle location and
rou historie
ute es
Package / coontainer
shipment hist tory
Emmployee an nd
vehhicle monittoring
Mileage recording
and verificatio
d on
Hoomeland Se ecurity
Search and R Rescue
Military Operaations
Priv
vate Invesstigation
Public Safetyy
Law Enforcem
w ment
Child / Family Safety
y
Rou record ed with Super Trackstick in B
ute Burbank, California
a
6. In retail m
marketing, sshrinkage is a proble faced by the secu
em b urity profes
ssional wor over on
rld n
daily basi Loss p
is. prevention is one criiterion use by the managem
ed ment to evaluate the e
effectiveness of the security profession
e nals hired by them. Certain chheck list th
herefore in
n
order whic can be used for performanc management of se
ch ce ecurity proffessionals. Following
g
factors mi ight be helpful to do the same -
t
Managem ments reco
orded a 75 improv
5% vement he ere, attribu
uting this t training support,
to g, ,
targets giv to offic
ven cers and th change of attitude.
heir e
Although the actual unknow losses measure during the trial did not show an
wn s ed n
improvem ment, Mana agements were impr ressed with the officcers’ desire and kno
e owledge too
assist in r
reducing su losses The surv recorde a 119% improvem
uch s. vey ed % ment in awaareness of
f
store lossses, and a 4
46% impro
ovement in security officers’ ability to redu stock losses.
n o uce
This show wed an 80% improveement, wit 11 store recordin improve net loss during
th es ng ed ses g
the trial. M
Managemeents are no involvin officers at till-focu
ow ng used meetiings, and sharing all
s l
data.
Overall, thhere was a 30% improvement, with Mana agements rating the service ‘sa
atisfactory’
’
prior to the training a ‘very good’ or ‘ex
and g xcellent’ af
fterwards.
By helping security officers to understa
o and basic manageme skills a
m ent and the rud
diments of
f
loss prevention, the were th
ey hen able t commu
to unicate mo effectiv
ore vely with managers.
m .
There wa a measured 55% improvem
as ment here. However, it was re
ecognized that some e
officers were still str
ruggling an would n eed extra assistance
nd e.
Managemments rated officers as valuab membe of the store team recording a 45%
d ble ers m, %
improvem
ment.
Managem ments believed that offficers had consisten helped to raise se
d ntly ecurity awareness inn
their store and sig
es gnificantly improved o
i overall sec
curity, with many off
h ficers atten
nding staff
f
7. meetings and help ping staff to under rstand ho they could help improve security.
ow c p e .
Managem ments were also impr
e ressed with the way in which officers car
h o rried out th duties,
heir ,
and with t
their personal commi itment to th manage and stor
he er re.
hese results – taken together with the quantitative data – d
Overall, th n r demonstra that by
ate y
training oofficers on loss prevention there is a measu urable im provement in their r
performan that ad value to the secu
nce dds t urity guardi role and justifies client expe
ing enditure.
Although security is typically viewed as a drain on the bottom line, the re are man ways in
v m ny n
which it can – and often does – ad value to the hos busines Modern security
d dd t st ss. y
managem ment should envision security a integral to all act
d n as tivities with the org
hin ganization,
and not as a separa function ‘living life on the ed
s ate n e dge’.
The value of securit can be loosely cat
e ty tegorized into hard and soft be
a enefits. Har benefits
rd s
pertain to the quantifiable aspects of s
o security, an can usu
nd ually be de
escribed in financiall
terminolog Soft be
gy. enefits are equally im
mportant, but are som
b mewhat mo qualita
ore ative. They
y
describe t more in
the ntangible benefits of security.
b
Ultimately the secu
y, urity sector desperat
tely needs to develo a strate
s op egy – both internally
h y
and exterrnally-led – that will cement iits rightful place at the top o the orga
l of anizational
l
agenda. T That strate
egy must be holisti c, take ac ccount of each and every threat to all
d l
organizati
ional proceesses and be comple etely aligne with cor
ed rporate obj ectives.
Employee Theft fro
e om a retai store is a term that is use when an employ
il s t ed yee steals
s
merchanddise, food, cash, or supplies w
s while on th job. How
he wever, in tthe eyes of the law,
o ,
employee theft is ju theft…t
ust the elemen of the crime are identical. T commit theft, the
nts To t e
employee must “int tend” to permanently deprive their employer of th value of the item
p y he o m
stolen.
Employee theft can occur ju like sh
e n ust hoplifting by concealing merch
b handise in a purse,
n ,
pocket, or bag and removing it from the store. It can also oc
r e c ccur by ste
ealing cash allowing
h, g
others to steal merchandise, eating fo
, ood, and by refund, credit ca
b ard, or check fraud. .
Employee theft can sometime be char
e es rged as em mbezzlemen due to t
nt the trusted fiduciary
d y
status of the emplo
oyee. All of these me
f ethods lead to loss of inventor (shrinkage) and/or
d o ry r
profit for the merch
hant. Employee thef is an insidious cr
ft rime becauuse the merchant is s
paying a w benefits to the thief o n top of pa
wage and b aying for th cost of t
he their dishonestly.
In Europe ean countr ries where the retail
e ling busine
ess has already see the boo and is
en om s
stabilized relatively, the Retail loss prev
vention is a professio
onal divers
sification of security
o y
professionnals that is responsible for re educing invventory los
sses inside retail sto
e ores. Losss
prevention professionals ma
n anage in-s tore security programs that focus on reducing g
inventory losses du to employee theft shoplifting, fraud, vendor th
ue t, heft, and accounting
a g
errors.
Like other in the se
rs ecurity ind
dustry, reta loss pre
ail evention prrofessiona ls must int
teract with
h
store pers
sonnel and store cust
d tomers wh hen dishonestly or carelessness occurs. As you can
s A n
8. imagine, a
accusing ssomeone of dishones stly or care
elessness is not a sm
mall matter and must
r t
be done w
with the utm
most care and profess
a sionalism.
In India to this tren is sure to set-in! T
oo nd The prolife
eration of malls and m
m mega-store such as
es s
Spencer’s Wal-Mart Reliance and Big B
s, t, e Bazaars shharply focu the nee of such specialist
us ed t
security pprofessiona and for the respon from protection profession - time is now!
als nse p
Today our country is on a road to develo
r s d opment staarting many l energy ventures and critical
y a l
infrastruct
tures which will go a long way into developing our national ssecurity. Th present
he t
security situation po
ortrays a gr picture asserting the need to di-risk a safegu
rim e, g and uards such
h
assets and ventures Thus
s.
India in th year 200
he 09-2010 sppent Rs.59
9052.95 croores on ho omeland se
ecurity prot
tecting 1.2
2
billion peo
ople. The mmarket seggment of s
security sol
lutions and man gua
d arding combined was s
around US I.57 billion for 20 and the major se
S$ 010 e ectors were airports, mass tran
e nsport andd
maritime. This mark is estim
ket mated to be UD$9.7 billion by ye 2016. T Indian electronic
e b ear The c
security mmarket is gr
rowing at 23% CAGR with pote
2 R ential to gro at 40%
ow %.
The organized play
yers comp prise only 20% of th market but acco
he t ount for 80 of the
0% e
revenues and is in
ndicative that the la
arge part of the ma
arket is st untappe by the
till ed e
organized lot.
d
Indians ha been s
ave splurging huge mone on secu
h ey uring their houses an d new-found wealth,
h ,
pushing d demand fo security gadgets by over 50% to Rs 200 cr
or y 5 s1, rores. Burg
glar alarm
m
systems, video sur rveillance and door-
-phones, access con
a ntrol, wall mount air sensors, ,
motion de etectors, tw way ke fobs, W
wo- ey Wi-Fi camer wireless external siren and wristband
ra, d
transmitte are some of the ultra-sma devices that are in deman with in
ers e art s nd ncreasingly
y
affluent In
ndians.
“While th total s
he security market is
m
growing a the rate o 25-26%, the real
at of
estate and resident security market
tial
is almos double at almo
st ost 52%
annually,” said Dire
” ector (Sec
curity) of
Honeywel South A
ll, Asia.
The real estate s security market is
m
worth Rs1 1200 crore and the security
es e
gadgets inndustry is expecting to piggy
back on this gro owth, it is said.
Manufactu urers’ unve
eiled nearly 25 new
y
products at a security fair - IFSEC
India-2008 - that underlin
8 t nes the
demand for hom me secur rity and
automatio devices. “Also, 30 of the
on 0%
stalls at t
the fair we visited by real
ere d
estate deevelopers aand individ
dual end uusers who wanted security an home automation
s nd a n
9. devices,” IFSEC In oordinator said. This year mo
ndia-2008 project co s ore than 280 world
2 d
leading ccompanies from 23 countries (26% more than 20 009) are llikely to be present
b t
highlightin the burg
ng geoning bu
usiness in the field of industria security management. There
o al e
would be 11,341 G Governmen and sec
nt curity profe
essional fro 43 cou
om untries in this event
t
which sho ows the siz and importance of the home security market of In
ze f m ndia.
The grow drivers of this phenomenal market ar governm
wth re ment secto corpora sectors
or, ate s
and retail and resid dential sect
tors. This market is import driv to larg extent but seeing
ven ge b g
that the iinitial India entrepr
an reneurs an corpora
nd ates who ventured in the fiel of local
ld l
manufactu uring of h hardware, system co omponents and dev
s veloping so
oftware, have been
h n
ccessful in short time others ar encoura
rather suc e, re aged to follo suit.
ow
Beware if the ATM screen goe blank a
f es after you sw
wipe your card. It co
ould be a mischief by
m y
fraudsters to withdra cash fr
s aw rom your a account aft you lea the AT in a hu A bit of
ter ave TM uff. f
adhesive and a screewdriver ar all that's needed to outwit hi-
re s o -tech safet gadgets.
ty
These swindlers are pa of a powerful inter-state
art e
networ spread across the country. Assam Police and
rk . P d
Kolkat Police have recently rounded up three swindlers
ta d e s
who h have masteered the tampering of ATMs. The trick
t k
applies only to ATM mach
s A hines that need a cu ustomer to
o
insert and extra the car to start operation (as op-
act rd t ns -
posed to ATMs where the card pops out after the
s t e
transa ction is complete). Many n nationalize banks,
ed ,
includi ng SBI an Bank of Baroda, use this system at
nd o t
their ATM most of which are unmanne d.
Ms,
So, what is this low w-tech, highly effec ctive modu operand Frauds
us di? sters, who generally y
strike in p
pairs, enter ATM by swiping va lid debit ca at the gate, press down a key on ke-
r s ard g s k -
yboard an stick it with adhe
nd esive so th it does not retur to its or
hat s rn riginal pos
sition. This
s
switches on the ma achine. The then w
ey walk out an wait for a victim t step into the trap!
nd to o !
When a c customer e enters the ATM and swipes the card, he does not realize tha the ma-
e at -
chine is aalready on. A message flashes for him to key his PIN, which he does. But since
. s o P h e
the mach hine has been swi itched on in an im mproper way, the screen go
w oes blank k
automatic cally as a s
security fea
ature to sto fraudule withdrawals.
op ent
The custoomer thinks it is a system fault and gives it a secon try. He has no clu that the
s s nd ue e
two 'custo
omers' gettting impatient outside are actually criminals waiting to steal his money.
e g h .
They start abusing h for tak
t him king too mu time and force him to leav in a huff Exit cus-
uch a h ve f. -
tomer, ennter fraudstter. They simply use a screwd
s e driver to 're
elease' the key. The ATM res-
e -
tarts automatically. What it ha in store is PIN of the last customer w
as e who swiped his card.
d .
The gang enters the amount and walks o with ca
e a out ash.
The SBI h been r
has receiving several suc complaints. "We were at a lo to loca the fra-
ch w oss ate -
ud becaus the CCT showe the cus
se TVs ed stomer swip
ping his ca But cu
ard. ustomers complained d
that they c
couldn't withdraw mooney," an S official said.
SBI Times of India, New Delhi Edition
10. Suggestions & feedback ma be sent to us on e-mail: sb
ay t btyagi1958
8@gmail.c
com
P.S. - If y
you don't like to receive ou newsle
t r ur etter, we apologize for bothe
a ering you. .
Please le us know your ma address and we will move it out fro our co
et w ail s e om ontact list,
,
thank you u!