+ All Categories
Home > Education > News letter aug 13

News letter aug 13

Date post: 12-Nov-2014
Category:
Upload: capt-sb-tyagi-coacccfismcsc
View: 172 times
Download: 0 times
Share this document with a friend
Description:
Monthly newsletter of International Council of Security and Safety Management. The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
10
Th W In Th in Th sh C:\Users\s his mont What a g depende his day h depende his day hedding t sbtyagi\Docum Leth, India c glorious ence nee has show ence that has sho the blood ments\ICISS N s profe celebrate day, as d not be wn the w t weapon own the d! \News Letter Newslet ession http://w es its Ind s this d trough v world tha ns of viol world th r Aug 13.doc tter: Au alize t www.wix.com/ dependen day has violence! at non-vio lence! hat Indep cx ugust 2 the pro /sbtyagi/iciss nce Day. s shown ! olence is pendenc 2013 ofessio n the w s even m ce can b onals… world tha more pot e obtain at path ent tool ned witho to for out
Transcript
Page 1: News letter aug 13

ThWInThinThsh

C:\Users\s

his montWhat a g

dependehis day hdepende

his day hedding t

sbtyagi\Docum

Let’

h, India cglorious ence neehas showence thathas shothe blood

ments\ICISS

N

’s profe

celebrateday, as

d not be wn the wt weapon

own the d!

\News Letter

Newslet

fessionhttp://w

es its Inds this dtrough v

world thans of violworld th

r Aug 13.doc

tter: Au

alize twww.wix.com/

dependenday hasviolence!

at non-violence! hat Indep

cx

ugust 2

the pro/sbtyagi/iciss

nce Day.s shown! olence is

pendenc

2013

ofessio

n the w

s even m

ce can b

onals…

world tha

more pot

e obtain

at path

ent tool

ned witho

to

for

out

Page 2: News letter aug 13

C:\Users\s

(ExpressManagemare cont The concitself. It iother devulnerabindustrialby dishoworkers)created managersuch vuln Economilarge annational successftend to technologdevelopethat makdispropodifferent labor etcfacilities. for easieManufacenergy, c The concorder toextraordiand pracreduce thabout thenetworksdangerou Though treligious lie far frogovernmincreasincommunacronym

sbtyagi\Docum

sed in 20ment and temporary

cept and prs essentia

evelopmenilities and l security wonest wo. New denew vulners and pranerabilities

c liberalizad diversifiin characteful functionbecome sgical systeed and comke their brtionately lcountries,. They try tPlacing e

er accessturing and combustibl

centration achieve nary effort

ctitioners arhe vulnerae possible s, building us feedbac

terrorism isconsidera

om the locent and/or

ngly use nications anWMD - W

ments\ICISS

007 whileStrategies

y even now

ractice of ial that theyts in induthreats. T

were the prkers) andvelopment

erabilities aactitioners s and devic

ation and ged industrer. Some oning of suecurity vulems (that mplex the behavior narge disru based onto reduce txpensive e, more efstorage fa

es, and po

of high-vaeconomie

ts from thosre required

abilities reladispersal buffers in

ck, etc.

s itself not tions) posecation of thr the prevaon-weaponnd informa

Weapons of

\News Letter

e writing s” by Shri

w!)

ndustrial sy keep pacustry; andThe originrevention/dd sabotagts and tecand it hasof industri

ce/learn new

globalizatiorial enterpof the very uch Multinlnerabilities

are like interconne

non-linear; ption. MNC

n availabilitthe cost of equipment fficiency aacilities of oisons; crea

alue and/oes of scalse responsd to be ableated to comof high-va

nto these

a new phees securityhe industrailing dispan technoloation technMass Disr

r Aug 13.doc

the forwai DC Nath,

ecurity arece with the the chan

nal and badetection oge (mostlchnologies s become al securityw techniqu

on have lerises, manfactors tha

national Cos. Many Mnetworks)

ected netwi.e. a sm

Cs also tenty of raw f capital-int

and highlyand synergmany MNCating speci

r hazardoue, createssible for inde to advisemplex tech

alue assetsnetworks,

enomenon, y threats toial unit, e.arate econogies for dnology (IT)ruption, not

cx

ard of th, IPS (Retd

e as old as technolog

nging pattasic objecof pilferagey by dis

in industnecessary

y to adapt ues.

d to the gny of themat contributompanies MNCs inclu) for their

works becomall shocknd to dispematerials, tensive proy skilled pegies that Cs are likeialized vuln

us assets s extraorddustrial sece their manhnologies us, loosenin

introducin

internationo industriag. real or omic orde

destructive help themt necessar

he book d.) and Ca

industry gical and terns of ctives of e (mostly gruntled try have y for the

to face

rowth of m trans-te to the (MNCs)

ude a mulr efficient ome, the mk to a crierse their m

inexpensivoducts by beople in a lead to t

ely to contnerabilities

in relativedinary vulncurity. Indunagementsused by th

ng the coupng "circuit

nalized netl units, basimaginaryr. Sophistiends. Tec

m to give ily of Mass

“Industriaapt SB Tya

ltitude of efunctionin

more they itical node

manufacturve real es

building largsingle loc

the creatioain device.

ly compacnerabilities ustrial secus about poshem. They plings in thbreakers"

tworking (osed on cau

y grievancecated terrochnologicaanother m

s Destructio

al Securityagi, his vie

economic ng. The mhave featu

e producering facilitietate / powger producation provion of wea

es packed w

ct locationsthat call

urity managssible stephave to le

he corporathat inter

often baseduses that mes against orists are m

al advancemeaning to on.

y – ews

and more ures s a

es in wer / ction ides alth. with

s, in for

gers ps to earn ate’s rrupt

d on may the

may s in the

Page 3: News letter aug 13

C:\Users\sbtyagi\Documents\ICISS\News Letter Aug 13.docx

Security planners have to learn to pinpoint and protect the critical complex networks for producing and distributing energy, information, water, and food. Disruption of these would be most susceptible to the multiplier effect of technology-amplified emotional response. Systems handling energy and hazardous materials are easy targets for turning supposedly benign technology to destructive ends. Specialist analysts around the world have warned that future terrorist acts may include more sophisticated forms of destruction and extortion, such as disabling or penetrating vital commercial computer systems. Sheikh Omar Bakri Muhammad, Syrian-born founder of the London-based group Jama'at Al-Muhajirun and the spokesman for Osama bin Laden's International Islamic Front for Jihad Against Jews and Crusaders, had claimed in an interview, that "I would not be surprised if tomorrow I hear of a big economic collapse because of somebody attacking the main technical systems in big companies." "Cyber-terrorism" is often used as a blanket term covering the threat of viruses, hackers and miscellaneous security breaches, regardless of whether or not they actually originated from terrorists. Although it is theoretically possible for electronic intrusions to damage critical infrastructure, taking control of well protected systems from the outside is extremely difficult; and can be almost totally prevented through well-planned computerized and non-computerized fail-safe measures. Digital intrusions can also compromise intellectual property and sensitive research data that can lead to long-term economic loss. They can place customer data at risk and erode confidence and trust in an enterprise and its affiliates. The number of organized hacking syndicates targeting financial and investment institutions around the world are growing at a disturbingly rapid rate. The financial industry's increasing dependence on the public telecommunications system, rapid adoption of wireless systems and outsourcing of operations to third parties pose growing security challenges. Cyber-security within an enterprise is not merely a technical problem, but should be handled as a management challenge. The scope of the risks is such that it can be effectively managed only by engaging senior corporate leadership. Preparedness plans should ensure that digital security is factored into the overall operations of the enterprise. Business espionage often referred to by the elegant euphemism of "competitive intelligence" probably started when the first competitor set up business. Though many companies already go to great lengths to obtain trade secrets and other business information about their competitors, it has been assessed that these efforts will intensify and be more aggressively pursued in the coming years. They may use any combination of legal, illegal, ethical, and unethical techniques. The ushering in of the digital and information age has brought about a sea change in the methods of business espionage. Many new and not-so-widely-recognized threats and points of vulnerability have been created. Some of the new threats may seem to belong to the realm of science fiction, but they are very real. What others get to know about a company can make or break the company's ability to compete effectively. Many companies are gradually starting to recognize that fences and gates, locks and guards, cameras and alarm systems no longer provide adequate protection. Even a company that has

Page 4: News letter aug 13

C:\Users\s

strict stanOne of th Counterinespionaghoweverrequiremmanagem Risk is ththreat is to originavulnerabcountermreduce th A listing wanting tany indivmeasureand be a (R. Swa22 Octob

A 1954 the CheInstitute He was 1990 as He was active padealing referenc

sbtyagi\Docum

ndards of phe basic pr

ntelligencege operatio, to assum

ments shouments wou

he result owhat someate from hoilities may

measure inhe risk thro

of all theto becomevidual to bees. A succeable to get n

aminathaber 2007

IPS officerennai Cent

of Security

a China spSpecial Se

closely asarticipant inwith differ

ce to China

ments\ICISS

physical seremises of

e programsons that co

me that the uld becomld expect t

of vulnerabeone can dostile elemy, howeve most situ

ough them.

e possible e a managee totally co

essful indusnecessary

an)

r from Andtre for Chy and Safe

pecialist, haecretary an

ssociated wn many narent issuesa, India and

\News Letter

ecurity cancounterinte

s should ould adversold rules o

me an intthe industri

ilities and do to hurt y

ments, one r, require

uations wo

security ter or practonversant strial securexpert hel

dhra Pradehina Studieety Manage

aving servend Director

with many tational and s relating td Sri Lanka

r Aug 13.doc

be devastelligence is

be in placsely affect of physical tegral parial security

threats. Vuyou by expmay not bunaccepta

uld therefo

hreats wotitioner of iwith all kin

rity practitiop to tackle

esh, he waes (CCCS)ement, New

ed the Govr General (

think-tanksinternationto nationa

a.

cx

tated by ats that there

ce to reco the compsecurity no

rt of every division to

ulnerabilityloiting vulne able to eably drastore be to p

uld be enindustrial snds of vulnoner or ma them.

as a foundi) as well w Delhi.

vernment o(Security),

s and discunal semina

al security

ttacks on ite is no such

ognize thepany. It woo longer ary compano be primar

y is a weaknerability. Aeliminate thic measurprioritize th

nough to dsecurity. It nerabilities

anager sho

ing membeas Presid

of India for Cabinet Se

ussion groars. He aut

and foreig

ts informath thing as

e indicatorsould be a gpply. Thouny's businrily respons

kness in thAs threats ahem. Totalres. The mhe vulnera

discourage is not real

s, threats auld be awa

er and Vicent of the

long yearsecretariat.

ups in Indihored mangn policies

ion resourccoincidenc

s of busingrave mistaugh all secuness stratesible.

he system are most li eliminatiomost practabilities and

anyone fistic to exp

and prevenare of the r

e-Presidene Internatio

s and retire

ia and wasny publicatis, with spe

ces. ce.

ness ake, urity egy,

and kely n of tical d to

from pect ntive risks

nt of onal

ed in

s an ions ecial

Page 5: News letter aug 13

FIfin

C:\Users\s

It takes oand autostolen! Lo The besyour car

1. Buwh

2. In

3. Tuyo

4. Whid

5. M

6. Hi7.

If by any number onumber. And finalin active

Food fof it is nforma

sbtyagi\Docum

only 2 minuo-alarming ow-cost ca

t safety for:

uy any lowhich runs fo

stall a mob

urn this moou turn it on

Wrap it up sdden use.

ake sure it

ide this mo

chance yoof the mobChances

ly do not foposition.

or thonot al

ation, th

ments\ICISS

utes for a cdevices fit

ar tracker c

or your ca

w price moor 10 days

bile connec

obile on con SILENT m

slightly in a

t is perfectl

obile in a sa

our car is sbile hiddenare that y

orget to ch

ought: ready he tech

\News Letter

ColIndustri

car thief to tted in you

can be impr

ar is a live

obile phons on standb

ction which

omplete Smode).

a plastic sh

y respondi

afe place in

stolen, immn in your cyou may

harge this m

with y

hnolog

r Aug 13.doc

N N Bhatal Securit

run away wur car. Therovised and

e and activ

ne with lonby and cost

h has best n

ILENT mo

heet so tha

ing by calli

n your car.

mediately incar. Police get back

mobile at le

you, pry – in s

cx

ia (Retd)y Consult

with your cese off-coud used for

ve Mobile

nger standt around R

network in

de (double

at it should

ng its num

And that’s

nform yourcan easily

your car weast twice a

rovablyshort, ‘

ant

car. No maurse help in

your car a

Phone hid

by time (QRs.2,200/-).

the countr

e check it

d not get d

mber from a

s it…!!!

r local Policy track thewithin the a week and

y it wil‘The Ed

atter if you hn locating t one tenth

dden in a

Qmobile ha

ry.

should not

dirty and d

another mo

ce. Give the location b

shortest pd hide it ba

ll harmdge’!

have a tracyour car o

h of the cos

safe place

as one mo

t vibrate w

usty during

obile phone

hem the phby calling possible tiack in your

m you:

cker once st of

e in

odel

while

g its

e.

hone that ime. r car

the

Page 6: News letter aug 13

C:\Users\s

Project Oreceiving What is Project Onetworkscollect on FeaturesApart frocriminal'sproject avibes in a IT giantsAs manypitched accessin Problem Experts wnamely:

Ge

M

Redigsig

Com

On Jul 8 July 201Uttarakha Some otbomb blaBihar afte

sbtyagi\Docum

O-sint (Opg interest fr

it? O-sint is a s and the innly the info

s om the ges or suspealso featura communi

s involvedy as 18 globin with thg the data

ms it may fa

warn that t

eographica

any websit

estricted bgital gnatures.

ommercial ovements.

8, 2013, Ca

13 Newsleand is very

her happeast at Mahaer eating M

ments\ICISS

pen Sourcrom as man

strategic internet to tormation th

eographicaect's moveres sentimeication for

bal IT giane Delhi P.

ace

he project

al tracking

tes have se

blogs and w

sites wil

apt Pran P

etter is vey good and

nings in laabodhi Tem

Mid-day Me

\News Letter

e Intelligeny as 18 IT

nitiative bytrack anti-sat is availa

al identificaements thent analysdetecting c

nts, includinPolice to im

may run in

of criminal

ecurity rest

web- sites

l block w

rasad, Vet

ery good. d so is an a

ast few daymple, Bodheal have be

r Aug 13.doc

nce) has T giants for

y Delhi Posocial elemable in the

ation featurough his

sis that idecriminal int

ng IBM, HCmplement

nto problem

s on the in

trictions on

can be ac

eb crawle

teran <pra

Write-up alert report

ys across h Gaya andeen avoide

cx

gained mr its implem

olice to let ments. Polic

public dom

ure to trapresence

entifies theent.

CL, Wipro, this proje

ms because

nternet will

n accessing

ccessed on

ers, makin

an.prasad@

with phoon Frauds

country ard nearly twd?

momentum mentation.

them snooce claim th

main.

ack the locon the in

e positive

Oracle andect and he

e of certain

have limita

g content.

nly with pa

g it difficu

@yahoo.c

otographs ster by Col.

re of seriouwo dozen s

with polic

op on sociaey intend t

cation of nternet, thor negativ

d TCS.havelp them

n limitations

ations.

asswords o

ult to trac

com> wrote

on the c N N Bhati

us concernschool child

ce

al to

a he ve

ve in

s

or

ck

e -

catastropheia, Veteran

n. Could sedren’s deat

e in n.

erial th in

Page 7: News letter aug 13

C:\Users\sbtyagi\Documents\ICISS\News Letter Aug 13.docx

Answer is Yes, only if the laid down system and procedure would have been scrupulously followed. 1. In case of Bodh Gaya, what is being seen as security lapse has nothing to do with the number of security personnel or weapons in-adequacy, but it happened as a result of not following the laid down procedure as per ‘SOP’ (Standard Operating Procedure). Invariably, personnel tend to become complacent, if they are on regular duty at the same place for very long period of time (months), or else remaining on overtime duty. We often find casual attitude of security guards carrying frisking with Hand Held Metal Detectors (HHMD), as if they must carry out this drill as a daily routine. Placing of CCTV cameras are necessary surveillance requirement but, good quality camera for capturing sharp pictures under dim light should only be preferred. Cost cutting in compromising with the quality and required quantity of any security related material may prove to be disastrous during hours of crisis. Thorough security audit of the area under consideration is a must prior to providing the required type of security. Putting right type of personnel to carry out the assigned duty in proper perspective is very important task for the management. Any such happening can easily be attributed to the lapse of not following ‘Do’s & Don’ts’ of ‘SOP’. 2. These bombs could have been noticed by the guard on duty if every individual would have been subjected to body and baggage frisking while entering the premises through gate, at any point of time. Even if they are presumed to have entered by trespassing by climbing the boundary wall, yet ‘SOP’ would mention the methods to be adopted in keeping constant vigil in such places. Come what may, we must understand the importance of going by the Security Audit and SOP. Even if CCTV cameras are in place, it will require adequate and quick action by the security providing personnel, for which Control Room would be required to be manned by alert personnel on 24x7 basis, with ‘ERS’ (Emergency Response System) in place which must include Fire Fighting Department too. Reasons for entry of unscrupulous people inside the temple area could be from luring the corrupt guard to forcible approach. Therefore, every loophole has to be tightened and monitored on continuous basis. Explaining the reason after misadventure does not sound well.

Security is all about being ‘PROACTIVE’. 3. In the case of death of a large number of school children in a single day, after eating mid-day meal too can be seen as a case due to deviation from the laid down mandatory norms of tasting meals by the Principal/ Head of School/ Adult persons and members of Education Committee prior to be served to the children. In this case definite doubt arises due to these authorized persons avoiding tasting the food. Were they aware of any deficiency in raw material and their cooking ingredients? Importance of laid down procedure should never be overlooked. Of course there are whole lot of matters to be taken care of right from procurement and storage of food materials to proper cookhouse and hygienic dining place with clean utensils. Above tragedy is a result of callousness due to negligence at one or more stage on above accounts. The efficiency of cooks and their wages too needs to be assessed and taken care of. In nutshell, supervisory control by the competent authority must be exercised to

Page 8: News letter aug 13

C:\Users\sbtyagi\Documents\ICISS\News Letter Aug 13.docx

understand any difficulty and in ensuring proper execution of the scheme. Timely remedial action should be the key-word for these authorities. We must understand that every life is important and there shall not be any laxity by anyone in putting someone’s life in danger or taking it to the extent of life threatening stage. 4. Unprecedented catastrophe in Uttarakhand has caused damage to Kedarnath Temple Complex. Archaeological Survey of India (ASI) has been entrusted with the task of its repair and renovation. A team from the department has visited the site to assess the extent of damage and to finalise the method of conservation to be adopted. Now a detailed report is under preparation supported by drawings and photographs. ASI has the expertise to take up such tasks. It has successfully carried out intricate conservation work of temples across country. ASI has carried out conservation and restoration work in other countries also. At present it is engaged in such work in Cambodia, Philippines and Myanmar.

5. There are specialized branches in ASI to take care of various types of work. They are Conservation Branch, Temple Survey Project (North & South), Building Survey Project, Excavation Branch, Science Branch, Epigraphy Branch, Horticulture Branch & Security Wing. Besides these specialized components, there are 24 Circle Offices and 44 Museums under ASI across our country. ASI was entrusted by the Union Govt. in the beginning of 21st Century to prepare factual report of Ayodhya (Faizabad), U.P.; after carrying out survey of the disputed site. This was carried out meticulously and report was submitted to the concerned authorities within a reasonable time. We hope ASI will carry out this assigned task too with great skill and in shortest possible time. Archaeological conservation work is intricate and different from PWD nature of work, therefore it is time taking. Conservation by ASI shall have to be carried out with the similar material and cementing chemicals with which the structure had originally been built. Use of cement and other new available construction materials are totally prohibited under Conservation Policy of our Country.

Page 9: News letter aug 13

C:\Users\s

On Jul 8 <captain Dear CapThanks fup usefuI am writi

Th On

nopa

Hope theThanks aCapt Ma On Jul 8 Dear Ca You are some rerescue ofloods s Best reg Capt S B

sbtyagi\Docum

8, 2013, Canmanish.c

pt Tyagi, for the latesl informatioing to you he map of ne of the pot of Indiaaramilitary ese would band regardanish Chan

8, 2013 at 4

pt Manish

correct onesearch onoperation ome years

gards

B Tyagi, CO

ments\ICISS

apt Manishchandraya

st newsletton. to point twIndia is incpictures of an origin aorganizatiobe rectifieds ndrayan

4:45 PM, S

,

n both then the pictubut it turns back. I w

OAS’CC*

\News Letter

h [email protected]

ter. I alway

o issues wcorrect on f

rescue is and neitheon. d.

SB Tyagi C

e counts! Mure whichned out towill publish

r Aug 13.doc

ayan om> wrote

ys await the

which are refirst page.not from I

er is the

Capt <sbty

Map is sligh was placo be of Chh apologie

cx

-

e latest edi

elated with

ndia. The uniform th

yagi1958@

ghtly wronced on a whinese armes and cla

ition and e

the curren

troops lyinhat of Ind

@gmail.com

ng but my website in

my involverification.

njoy readin

nt issue -

ng down arian Army

m> wrote:

mistake in context ed in rescu

ng and pick

re very cleor any o

s gross! I of Kedarnue during

king

early ther

did nath

the

Page 10: News letter aug 13

If be

C:\Users\s

you do noe removed

Sug

sbtyagi\Docum

ot wish to rfrom the li

ggestions

ments\ICISS

receive thisist. ICISS d

& feedbac

\News Letter

s Newslettedoes not sh

ck may be

r Aug 13.doc

ers, pleasehare email o

e sent to u

cx

Reply, ‘REor other de

us on e-ma

EMOVE’ in etails with a

ail: sbtyag

subject anany entity.

i1958@gm

nd your nam

mail.com

me will


Recommended