Post on 12-Nov-2014
description
ThWInThinThsh
C:\Users\s
his montWhat a g
dependehis day hdepende
his day hedding t
sbtyagi\Docum
Let’
h, India cglorious ence neehas showence thathas shothe blood
ments\ICISS
N
’s profe
celebrateday, as
d not be wn the wt weapon
own the d!
\News Letter
Newslet
fessionhttp://w
es its Inds this dtrough v
world thans of violworld th
r Aug 13.doc
tter: Au
alize twww.wix.com/
dependenday hasviolence!
at non-violence! hat Indep
cx
ugust 2
the pro/sbtyagi/iciss
nce Day.s shown! olence is
pendenc
2013
ofessio
n the w
s even m
ce can b
onals…
world tha
more pot
e obtain
at path
ent tool
ned witho
to
for
out
C:\Users\s
(ExpressManagemare cont The concitself. It iother devulnerabindustrialby dishoworkers)created managersuch vuln Economilarge annational successftend to technologdevelopethat makdispropodifferent labor etcfacilities. for easieManufacenergy, c The concorder toextraordiand pracreduce thabout thenetworksdangerou Though treligious lie far frogovernmincreasincommunacronym
sbtyagi\Docum
sed in 20ment and temporary
cept and prs essentia
evelopmenilities and l security wonest wo. New denew vulners and pranerabilities
c liberalizad diversifiin characteful functionbecome sgical systeed and comke their brtionately lcountries,. They try tPlacing e
er accessturing and combustibl
centration achieve nary effort
ctitioners arhe vulnerae possible s, building us feedbac
terrorism isconsidera
om the locent and/or
ngly use nications anWMD - W
ments\ICISS
007 whileStrategies
y even now
ractice of ial that theyts in induthreats. T
were the prkers) andvelopment
erabilities aactitioners s and devic
ation and ged industrer. Some oning of suecurity vulems (that mplex the behavior narge disru based onto reduce txpensive e, more efstorage fa
es, and po
of high-vaeconomie
ts from thosre required
abilities reladispersal buffers in
ck, etc.
s itself not tions) posecation of thr the prevaon-weaponnd informa
Weapons of
\News Letter
e writing s” by Shri
w!)
ndustrial sy keep pacustry; andThe originrevention/dd sabotagts and tecand it hasof industri
ce/learn new
globalizatiorial enterpof the very uch Multinlnerabilities
are like interconne
non-linear; ption. MNC
n availabilitthe cost of equipment fficiency aacilities of oisons; crea
alue and/oes of scalse responsd to be ableated to comof high-va
nto these
a new phees securityhe industrailing dispan technoloation technMass Disr
r Aug 13.doc
the forwai DC Nath,
ecurity arece with the the chan
nal and badetection oge (mostlchnologies s become al securityw techniqu
on have lerises, manfactors tha
national Cos. Many Mnetworks)
ected netwi.e. a sm
Cs also tenty of raw f capital-int
and highlyand synergmany MNCating speci
r hazardoue, createssible for inde to advisemplex tech
alue assetsnetworks,
enomenon, y threats toial unit, e.arate econogies for dnology (IT)ruption, not
cx
ard of th, IPS (Retd
e as old as technolog
nging pattasic objecof pilferagey by dis
in industnecessary
y to adapt ues.
d to the gny of themat contributompanies MNCs inclu) for their
works becomall shocknd to dispematerials, tensive proy skilled pegies that Cs are likeialized vuln
us assets s extraorddustrial sece their manhnologies us, loosenin
introducin
internationo industriag. real or omic orde
destructive help themt necessar
he book d.) and Ca
industry gical and terns of ctives of e (mostly gruntled try have y for the
to face
rowth of m trans-te to the (MNCs)
ude a mulr efficient ome, the mk to a crierse their m
inexpensivoducts by beople in a lead to t
ely to contnerabilities
in relativedinary vulncurity. Indunagementsused by th
ng the coupng "circuit
nalized netl units, basimaginaryr. Sophistiends. Tec
m to give ily of Mass
“Industriaapt SB Tya
ltitude of efunctionin
more they itical node
manufacturve real es
building largsingle loc
the creatioain device.
ly compacnerabilities ustrial secus about poshem. They plings in thbreakers"
tworking (osed on cau
y grievancecated terrochnologicaanother m
s Destructio
al Securityagi, his vie
economic ng. The mhave featu
e producering facilitietate / powger producation provion of wea
es packed w
ct locationsthat call
urity managssible stephave to le
he corporathat inter
often baseduses that mes against orists are m
al advancemeaning to on.
y – ews
and more ures s a
es in wer / ction ides alth. with
s, in for
gers ps to earn ate’s rrupt
d on may the
may s in the
C:\Users\sbtyagi\Documents\ICISS\News Letter Aug 13.docx
Security planners have to learn to pinpoint and protect the critical complex networks for producing and distributing energy, information, water, and food. Disruption of these would be most susceptible to the multiplier effect of technology-amplified emotional response. Systems handling energy and hazardous materials are easy targets for turning supposedly benign technology to destructive ends. Specialist analysts around the world have warned that future terrorist acts may include more sophisticated forms of destruction and extortion, such as disabling or penetrating vital commercial computer systems. Sheikh Omar Bakri Muhammad, Syrian-born founder of the London-based group Jama'at Al-Muhajirun and the spokesman for Osama bin Laden's International Islamic Front for Jihad Against Jews and Crusaders, had claimed in an interview, that "I would not be surprised if tomorrow I hear of a big economic collapse because of somebody attacking the main technical systems in big companies." "Cyber-terrorism" is often used as a blanket term covering the threat of viruses, hackers and miscellaneous security breaches, regardless of whether or not they actually originated from terrorists. Although it is theoretically possible for electronic intrusions to damage critical infrastructure, taking control of well protected systems from the outside is extremely difficult; and can be almost totally prevented through well-planned computerized and non-computerized fail-safe measures. Digital intrusions can also compromise intellectual property and sensitive research data that can lead to long-term economic loss. They can place customer data at risk and erode confidence and trust in an enterprise and its affiliates. The number of organized hacking syndicates targeting financial and investment institutions around the world are growing at a disturbingly rapid rate. The financial industry's increasing dependence on the public telecommunications system, rapid adoption of wireless systems and outsourcing of operations to third parties pose growing security challenges. Cyber-security within an enterprise is not merely a technical problem, but should be handled as a management challenge. The scope of the risks is such that it can be effectively managed only by engaging senior corporate leadership. Preparedness plans should ensure that digital security is factored into the overall operations of the enterprise. Business espionage often referred to by the elegant euphemism of "competitive intelligence" probably started when the first competitor set up business. Though many companies already go to great lengths to obtain trade secrets and other business information about their competitors, it has been assessed that these efforts will intensify and be more aggressively pursued in the coming years. They may use any combination of legal, illegal, ethical, and unethical techniques. The ushering in of the digital and information age has brought about a sea change in the methods of business espionage. Many new and not-so-widely-recognized threats and points of vulnerability have been created. Some of the new threats may seem to belong to the realm of science fiction, but they are very real. What others get to know about a company can make or break the company's ability to compete effectively. Many companies are gradually starting to recognize that fences and gates, locks and guards, cameras and alarm systems no longer provide adequate protection. Even a company that has
C:\Users\s
strict stanOne of th Counterinespionaghoweverrequiremmanagem Risk is ththreat is to originavulnerabcountermreduce th A listing wanting tany indivmeasureand be a (R. Swa22 Octob
A 1954 the CheInstitute He was 1990 as He was active padealing referenc
sbtyagi\Docum
ndards of phe basic pr
ntelligencege operatio, to assum
ments shouments wou
he result owhat someate from hoilities may
measure inhe risk thro
of all theto becomevidual to bees. A succeable to get n
aminathaber 2007
IPS officerennai Cent
of Security
a China spSpecial Se
closely asarticipant inwith differ
ce to China
ments\ICISS
physical seremises of
e programsons that co
me that the uld becomld expect t
of vulnerabeone can dostile elemy, howeve most situ
ough them.
e possible e a managee totally co
essful indusnecessary
an)
r from Andtre for Chy and Safe
pecialist, haecretary an
ssociated wn many narent issuesa, India and
\News Letter
ecurity cancounterinte
s should ould adversold rules o
me an intthe industri
ilities and do to hurt y
ments, one r, require
uations wo
security ter or practonversant strial securexpert hel
dhra Pradehina Studieety Manage
aving servend Director
with many tational and s relating td Sri Lanka
r Aug 13.doc
be devastelligence is
be in placsely affect of physical tegral parial security
threats. Vuyou by expmay not bunaccepta
uld therefo
hreats wotitioner of iwith all kin
rity practitiop to tackle
esh, he waes (CCCS)ement, New
ed the Govr General (
think-tanksinternationto nationa
a.
cx
tated by ats that there
ce to reco the compsecurity no
rt of every division to
ulnerabilityloiting vulne able to eably drastore be to p
uld be enindustrial snds of vulnoner or ma them.
as a foundi) as well w Delhi.
vernment o(Security),
s and discunal semina
al security
ttacks on ite is no such
ognize thepany. It woo longer ary compano be primar
y is a weaknerability. Aeliminate thic measurprioritize th
nough to dsecurity. It nerabilities
anager sho
ing membeas Presid
of India for Cabinet Se
ussion groars. He aut
and foreig
ts informath thing as
e indicatorsould be a gpply. Thouny's businrily respons
kness in thAs threats ahem. Totalres. The mhe vulnera
discourage is not real
s, threats auld be awa
er and Vicent of the
long yearsecretariat.
ups in Indihored mangn policies
ion resourccoincidenc
s of busingrave mistaugh all secuness stratesible.
he system are most li eliminatiomost practabilities and
anyone fistic to exp
and prevenare of the r
e-Presidene Internatio
s and retire
ia and wasny publicatis, with spe
ces. ce.
ness ake, urity egy,
and kely n of tical d to
from pect ntive risks
nt of onal
ed in
s an ions ecial
FIfin
C:\Users\s
It takes oand autostolen! Lo The besyour car
1. Buwh
2. In
3. Tuyo
4. Whid
5. M
6. Hi7.
If by any number onumber. And finalin active
Food fof it is nforma
sbtyagi\Docum
only 2 minuo-alarming ow-cost ca
t safety for:
uy any lowhich runs fo
stall a mob
urn this moou turn it on
Wrap it up sdden use.
ake sure it
ide this mo
chance yoof the mobChances
ly do not foposition.
or thonot al
ation, th
ments\ICISS
utes for a cdevices fit
ar tracker c
or your ca
w price moor 10 days
bile connec
obile on con SILENT m
slightly in a
t is perfectl
obile in a sa
our car is sbile hiddenare that y
orget to ch
ought: ready he tech
\News Letter
ColIndustri
car thief to tted in you
can be impr
ar is a live
obile phons on standb
ction which
omplete Smode).
a plastic sh
y respondi
afe place in
stolen, immn in your cyou may
harge this m
with y
hnolog
r Aug 13.doc
N N Bhatal Securit
run away wur car. Therovised and
e and activ
ne with lonby and cost
h has best n
ILENT mo
heet so tha
ing by calli
n your car.
mediately incar. Police get back
mobile at le
you, pry – in s
cx
ia (Retd)y Consult
with your cese off-coud used for
ve Mobile
nger standt around R
network in
de (double
at it should
ng its num
And that’s
nform yourcan easily
your car weast twice a
rovablyshort, ‘
ant
car. No maurse help in
your car a
Phone hid
by time (QRs.2,200/-).
the countr
e check it
d not get d
mber from a
s it…!!!
r local Policy track thewithin the a week and
y it wil‘The Ed
atter if you hn locating t one tenth
dden in a
Qmobile ha
ry.
should not
dirty and d
another mo
ce. Give the location b
shortest pd hide it ba
ll harmdge’!
have a tracyour car o
h of the cos
safe place
as one mo
t vibrate w
usty during
obile phone
hem the phby calling possible tiack in your
m you:
cker once st of
e in
odel
while
g its
e.
hone that ime. r car
the
C:\Users\s
Project Oreceiving What is Project Onetworkscollect on FeaturesApart frocriminal'sproject avibes in a IT giantsAs manypitched accessin Problem Experts wnamely:
Ge
M
Redigsig
Com
On Jul 8 July 201Uttarakha Some otbomb blaBihar afte
sbtyagi\Docum
O-sint (Opg interest fr
it? O-sint is a s and the innly the info
s om the ges or suspealso featura communi
s involvedy as 18 globin with thg the data
ms it may fa
warn that t
eographica
any websit
estricted bgital gnatures.
ommercial ovements.
8, 2013, Ca
13 Newsleand is very
her happeast at Mahaer eating M
ments\ICISS
pen Sourcrom as man
strategic internet to tormation th
eographicaect's moveres sentimeication for
bal IT giane Delhi P.
ace
he project
al tracking
tes have se
blogs and w
sites wil
apt Pran P
etter is vey good and
nings in laabodhi Tem
Mid-day Me
\News Letter
e Intelligeny as 18 IT
nitiative bytrack anti-sat is availa
al identificaements thent analysdetecting c
nts, includinPolice to im
may run in
of criminal
ecurity rest
web- sites
l block w
rasad, Vet
ery good. d so is an a
ast few daymple, Bodheal have be
r Aug 13.doc
nce) has T giants for
y Delhi Posocial elemable in the
ation featurough his
sis that idecriminal int
ng IBM, HCmplement
nto problem
s on the in
trictions on
can be ac
eb crawle
teran <pra
Write-up alert report
ys across h Gaya andeen avoide
cx
gained mr its implem
olice to let ments. Polic
public dom
ure to trapresence
entifies theent.
CL, Wipro, this proje
ms because
nternet will
n accessing
ccessed on
ers, makin
an.prasad@
with phoon Frauds
country ard nearly twd?
momentum mentation.
them snooce claim th
main.
ack the locon the in
e positive
Oracle andect and he
e of certain
have limita
g content.
nly with pa
g it difficu
@yahoo.c
otographs ster by Col.
re of seriouwo dozen s
with polic
op on sociaey intend t
cation of nternet, thor negativ
d TCS.havelp them
n limitations
ations.
asswords o
ult to trac
com> wrote
on the c N N Bhati
us concernschool child
ce
al to
a he ve
ve in
s
or
ck
e -
catastropheia, Veteran
n. Could sedren’s deat
e in n.
erial th in
C:\Users\sbtyagi\Documents\ICISS\News Letter Aug 13.docx
Answer is Yes, only if the laid down system and procedure would have been scrupulously followed. 1. In case of Bodh Gaya, what is being seen as security lapse has nothing to do with the number of security personnel or weapons in-adequacy, but it happened as a result of not following the laid down procedure as per ‘SOP’ (Standard Operating Procedure). Invariably, personnel tend to become complacent, if they are on regular duty at the same place for very long period of time (months), or else remaining on overtime duty. We often find casual attitude of security guards carrying frisking with Hand Held Metal Detectors (HHMD), as if they must carry out this drill as a daily routine. Placing of CCTV cameras are necessary surveillance requirement but, good quality camera for capturing sharp pictures under dim light should only be preferred. Cost cutting in compromising with the quality and required quantity of any security related material may prove to be disastrous during hours of crisis. Thorough security audit of the area under consideration is a must prior to providing the required type of security. Putting right type of personnel to carry out the assigned duty in proper perspective is very important task for the management. Any such happening can easily be attributed to the lapse of not following ‘Do’s & Don’ts’ of ‘SOP’. 2. These bombs could have been noticed by the guard on duty if every individual would have been subjected to body and baggage frisking while entering the premises through gate, at any point of time. Even if they are presumed to have entered by trespassing by climbing the boundary wall, yet ‘SOP’ would mention the methods to be adopted in keeping constant vigil in such places. Come what may, we must understand the importance of going by the Security Audit and SOP. Even if CCTV cameras are in place, it will require adequate and quick action by the security providing personnel, for which Control Room would be required to be manned by alert personnel on 24x7 basis, with ‘ERS’ (Emergency Response System) in place which must include Fire Fighting Department too. Reasons for entry of unscrupulous people inside the temple area could be from luring the corrupt guard to forcible approach. Therefore, every loophole has to be tightened and monitored on continuous basis. Explaining the reason after misadventure does not sound well.
Security is all about being ‘PROACTIVE’. 3. In the case of death of a large number of school children in a single day, after eating mid-day meal too can be seen as a case due to deviation from the laid down mandatory norms of tasting meals by the Principal/ Head of School/ Adult persons and members of Education Committee prior to be served to the children. In this case definite doubt arises due to these authorized persons avoiding tasting the food. Were they aware of any deficiency in raw material and their cooking ingredients? Importance of laid down procedure should never be overlooked. Of course there are whole lot of matters to be taken care of right from procurement and storage of food materials to proper cookhouse and hygienic dining place with clean utensils. Above tragedy is a result of callousness due to negligence at one or more stage on above accounts. The efficiency of cooks and their wages too needs to be assessed and taken care of. In nutshell, supervisory control by the competent authority must be exercised to
C:\Users\sbtyagi\Documents\ICISS\News Letter Aug 13.docx
understand any difficulty and in ensuring proper execution of the scheme. Timely remedial action should be the key-word for these authorities. We must understand that every life is important and there shall not be any laxity by anyone in putting someone’s life in danger or taking it to the extent of life threatening stage. 4. Unprecedented catastrophe in Uttarakhand has caused damage to Kedarnath Temple Complex. Archaeological Survey of India (ASI) has been entrusted with the task of its repair and renovation. A team from the department has visited the site to assess the extent of damage and to finalise the method of conservation to be adopted. Now a detailed report is under preparation supported by drawings and photographs. ASI has the expertise to take up such tasks. It has successfully carried out intricate conservation work of temples across country. ASI has carried out conservation and restoration work in other countries also. At present it is engaged in such work in Cambodia, Philippines and Myanmar.
5. There are specialized branches in ASI to take care of various types of work. They are Conservation Branch, Temple Survey Project (North & South), Building Survey Project, Excavation Branch, Science Branch, Epigraphy Branch, Horticulture Branch & Security Wing. Besides these specialized components, there are 24 Circle Offices and 44 Museums under ASI across our country. ASI was entrusted by the Union Govt. in the beginning of 21st Century to prepare factual report of Ayodhya (Faizabad), U.P.; after carrying out survey of the disputed site. This was carried out meticulously and report was submitted to the concerned authorities within a reasonable time. We hope ASI will carry out this assigned task too with great skill and in shortest possible time. Archaeological conservation work is intricate and different from PWD nature of work, therefore it is time taking. Conservation by ASI shall have to be carried out with the similar material and cementing chemicals with which the structure had originally been built. Use of cement and other new available construction materials are totally prohibited under Conservation Policy of our Country.
C:\Users\s
On Jul 8 <captain Dear CapThanks fup usefuI am writi
Th On
nopa
Hope theThanks aCapt Ma On Jul 8 Dear Ca You are some rerescue ofloods s Best reg Capt S B
sbtyagi\Docum
8, 2013, Canmanish.c
pt Tyagi, for the latesl informatioing to you he map of ne of the pot of Indiaaramilitary ese would band regardanish Chan
8, 2013 at 4
pt Manish
correct onesearch onoperation ome years
gards
B Tyagi, CO
ments\ICISS
apt Manishchandraya
st newsletton. to point twIndia is incpictures of an origin aorganizatiobe rectifieds ndrayan
4:45 PM, S
,
n both then the pictubut it turns back. I w
OAS’CC*
\News Letter
h Chandraan@rrd.co
ter. I alway
o issues wcorrect on f
rescue is and neitheon. d.
SB Tyagi C
e counts! Mure whichned out towill publish
r Aug 13.doc
ayan om> wrote
ys await the
which are refirst page.not from I
er is the
Capt <sbty
Map is sligh was placo be of Chh apologie
cx
-
e latest edi
elated with
ndia. The uniform th
yagi1958@
ghtly wronced on a whinese armes and cla
ition and e
the curren
troops lyinhat of Ind
@gmail.com
ng but my website in
my involverification.
njoy readin
nt issue -
ng down arian Army
m> wrote:
mistake in context ed in rescu
ng and pick
re very cleor any o
s gross! I of Kedarnue during
king
early ther
did nath
the
If be
C:\Users\s
you do noe removed
Sug
sbtyagi\Docum
ot wish to rfrom the li
ggestions
ments\ICISS
receive thisist. ICISS d
& feedbac
\News Letter
s Newslettedoes not sh
ck may be
r Aug 13.doc
ers, pleasehare email o
e sent to u
cx
Reply, ‘REor other de
us on e-ma
EMOVE’ in etails with a
ail: sbtyag
subject anany entity.
i1958@gm
nd your nam
mail.com
me will