icssm newsletter dec11

10
observati security around a Try and g to be sta harder an Let’s The of o We und ion of wh sense. W nd try and gauge the anding at a nd you wil New s profe e most ess observatio see but w derstandin hat goes o Wherever y d see thro e need for a particula ll come ou wslette ession http://w sential qu on. we don’t ob ng the im on around you are, b ugh thing a thing to ar place. D ut with sur er: Dec nalize t www.wix.com/ uality, whic bserve. O mplication d us is a v be it at ho gs rather th o be pres Don’t igno rprising re cember the pro /sbtyagi/iciss ch we hav bservation ns of wh very impo ome or ou han just s ent at a p ore anyth esults. Ma r 2011 ofessio s ve but ign n is not ju hat we ortant requ utside in a see them. particular p ing that s ake observ onalsnored, is t ust seeing see. So uirement a public p place, for seems unu vation a h Capt S F the power thing but effective for better place look a person usual. Pry abit. B Tyagi or ICISS r t e r k n y i S

Upload: captsbtyagi

Post on 02-Dec-2014

501 views

Category:

Education


2 download

DESCRIPTION

Newsletter of International Council of Security & Safety Management co-founded by Capt SB Tyagi

TRANSCRIPT

Page 1: ICSSM Newsletter Dec11

observatisecurity around a Try and gto be staharder an

Let’s

Theof o We und

ion of whsense. Wnd try and

gauge theanding at and you wil

New

’s profe

e most essobservatio

see but wderstandinhat goes o

Wherever yd see thro

e need fora particulall come ou

wslette

essionhttp://w

sential quon.

we don’t obng the imon aroundyou are, bugh thing

a thing toar place. Dut with sur

er: Dec

nalize twww.wix.com/

uality, whic

bserve. Omplication

d us is a vbe it at hogs rather th

o be presDon’t ignorprising re

cember

the pro/sbtyagi/iciss

ch we hav

bservationns of whvery impo

ome or ouhan just s

ent at a pore anythesults. Ma

r 2011

ofessios

ve but ign

n is not juhat we

ortant requutside in asee them.

particular ping that s

ake observ

onals…

nored, is t

ust seeingsee. So uirement a public p

place, forseems unuvation a h

Capt S F

the power

thing buteffective

for betterplace look

r a personusual. Pryabit.

B Tyagior ICISS

r

t e r k

n y

i S

Page 2: ICSSM Newsletter Dec11

Before my joining as a Security Executive, I served as a Commissioned Officer with the Indian Army. During my service, I got the opportunity of deployment at Indo-Bangladesh border, Indo-Pakistan border, Indo-Myanmar border and Indo-China border. These ground scenarios taught me to define security as protecting the political and physical integrity of sovereign nations like that of our country. In its traditional form, security is centered on the preservation of the sovereign state from external threats and the activities of other states. It thus requires internationally recognized boundaries protected if necessary by military action, prohibition of the use of force between states and non-intervention in the affairs of other states. Under the UN Charter, individual state security is supported by collective security. The Security Council’s primary responsibility is to maintain international peace and security. The Security Council can authorize the use of all necessary means in response to a breach of the peace, threat to the peace or act of aggression. The ‘collective security’ is defined simply as the Security Council, rather than as any broader community of states or other interests. The veto ensures the agreement of the five permanent members in any such collective action and is thus a safeguard against contested action. The decision to use the veto is political. Well, these were my learning when I was trained in the Officers’ Training Academy of Indian Army and thereafter serving at International Borders of our nation. But soon after I joined my new assignment, I saw and learnt a different aspect of security. Though we name it as Industrial security, but it can always be seen in conjunction with Human Security. This includes almost everything from Infrastructure, Installation, Perimeter, Access control, Township security to all sorts of employee insecurities and so on and so forth. Coming to the International security it is assumed that the action of one or more states that threatens the security of other state(s). This means that less attention has been paid to the role of non-state actors, such as terrorists, extremists, in generating insecurity. However in the context of terrorism this has now changed. For example post 9/11; the UN Security Council recognized terrorist acts as constituting a threat to international security. Human security denotes individual freedom from basic insecurities, whatever the root of that insecurity may be. It is also caused by internal conflict, by collapse of state institutions and vital installations like that of ours. It also emanates from violence and abusive actions by non-state actors like the present day scenario of Terrorism and Naxalism. Human insecurity is also caused by violations of economic and social rights such as the right to food, health and housing, as well as civil and political rights such as fearing torture, deprivation of life and liberty. However although denial of human rights contributes to human insecurity and human insecurity generates further violations of human rights, it is a wider concept than human rights. It encompasses physical security, economic security, legal security, political security, food security, gender security and relational security. Human security is perhaps best summarized by the inclusion of ‘freedom from fear’ and ‘freedom from want’ among the four freedoms proclaimed by President Roosevelt during World War Two. The Report on the Commission on Human Security, May 2005 added that it also includes the freedom to take action on one's own behalf, which is the enjoyment of

Page 3: ICSSM Newsletter Dec11

autonomyinternation Human semilitary acforms of vviolence organizedstate, othinternationCongo etcterms of civilians w To summmeasuringman at apracticed security is

Som

While all bbelow are

Ch Ch

sha De Ke

em Do Do Do

oth Us Us

if th

If yconcon

Beviru

y and senal security

ecurity doction, interviolence typ

like murdd crime etcher actors nal peacekc. Howevethe secur

within the s

marize we g yard andany level

by one ans for everyb

me ste

banks have some tips

hange youhange youared PCs

estroy the eep your mployees) o not writeo not hando not use hers to guee a differee both lethe passwo

you believncerned bntact the co

e alert for us or jump

lf-esteem. y.

es not dernal affairspically mutder, lootinc. Where may assu

keepers liker such bodity of thei

state.

can say td the threais importand all, it gbody!

eps yoonlin

ve made als to ensure

r HPIN aftur HPIN a HPIN mailHPIN a

e the HPINd over your

common ess ent passwtters and nords or HPI

ve that sobanks’ busoncerned bscam e-ming to a fra

Human

pend upons and polictate from cng, abducthe state

ume that rke Indian Adies tend tor own forc

that securit cannot be

ant and chives confid

ou cane to e

l efforts toe maximum

er your firsafter you

er after mesecret an

on your Ar ATM/Debnames as

word for eanumbers aINS are ca

omeone issiness assbank immemails. Theaudulent w

security

n internatioce action. conflicts likctions, kidgovernmeresponsibilArmy is doio perceiveces rather

ity in any e calculatehallenging.dence to s

an takensuro ensure sem security:

st login andaccess C

emorizing nd don't d

ATM/Debit bit Card or s HPINs -

ach of your and a comase sensitiv

s trying tosociate anediately. ese are de

website and

thus goe

onal law’sIn so-calle

ke bombingdnappings,nt cannot lity, for exing Peace-

e security wr than in t

form or aed correctly. But whesecurity pr

e whire sececurity for

d change ititibank On

it disclose it

Card or CiCredit Carchoose p

accounts.bination ofve

o commit d such ac

esigned to d disclosing

s beyond

distinctioned post-cogs, military , corruptioguarantee

xample an -keeping inwithin statethat of the

at any levy. Hence tn the secofessional

le tracurity

the custom

t at least online Intern

t to anyon

tibank Crerd to anyonasswords

f lower cas

fraud by ctivities ra

trick you g sensitive

d and su

ns betweeonflict situa

attacks inon, armede security

occupyingn Lebanone security te human s

vel does nthe task of curity meas to make

nsact

mer’s inter

once a monnet Banki

ne (includ

edit Card. ne. that are d

se and cap

pretendingaise doubt

into downe informatio

pplements

en conflict,ations, theto criminald crimes,within theg army or

n, Somalia,terms or insecurity of

ot have aa security

asures aree sure that

ting

rest, listed

nth ng using

ding bank

difficult for

ital letters

g to be a s, please

nloading a on.

s

, e l ,

e r ,

n f

a y e t

Page 4: ICSSM Newsletter Dec11

Beyoupos

Ve Ma

on act

Dosusdet

Opopema

Many e-cprocedure

If yany

Asactyoufor

KeUnrighcon

Losite

MaAnt

Inscom

Loto e

Dophy

Mobancha

Re

eware! Phour personast privacy arify the ad

ake sure thyour bro

tually are con't reply spicious otails, other

pen e-maiening an eail with a vi

commercees to give y

you suspey of the insk yourseltivity you aur driver's informatio

eep a Papiform Resoht compannfirmation

ok for thee is runningake sure yti-virus sof

stall a permputer, esg off. Do ensure you

o not keeysically disonitor younk statemearged only

egularly do

ony "look aal informatiand securiddress of hat the URowser wicounterfeitsto any e-

of any busr banks detls only w

e-mail withrus.

e websitesyou a conv

ect a websstructions if if the inf

are engagelicense nu

on that doeer Trial. Pource Locany. It's alsnumber fo

e padlock g in secureyour homftware neesonal firespecially ifnot just cur protectio

ep compusconnect thur transacents as so

y for transaownload s

alike" webson. Make sty statemeevery webRL you wandow. Sos. Take a f-mail that siness or tails or som

when you an attach

s utilize venient and

site is not wt may presformation ed in. For eumber or thesn't feel rigPrint out thator (URL)so a goodr your reco

symbol ae mode BE

me compuds frequenwall to hef you connelose your on. ters onlin

hem from Ictions. Reoon as youctions you

security pa

sites are dsure that w

ents and rebsite, knowant appeaome websfew extra s requestsperson w

me other hknow the

hment. Eve

state-of-thd secure s

what it pursent you. you are aexample, ahe PIN for ght, do nothe "addres). The URd idea toords.

at the bottEFORE youter has th

nt updates elp prevenect throughbrowser.

ne when nternet co

eview youru receive

u made. Imatches fro

designed twebsites oneview themwn as the

ars in the "ites may

seconds ans your pewho asks f

ighly sense sender.en a friend

he-art enchopping an

rports to be

asked to pan online ayour credi

t respond. ss" of the L ensures print out

tom right u input senhe most cto guard a

nt unauthoh a cable oFollow the

not in unnection. r order cothem to mmediately m your sof

o trick conn which yo

m carefully. URL.

"address"appear to

nd type thersonal inffor your pitive inform

Be especd may acci

cryption and banking

e, leave the

provide mauction siteit card. If a company that you a

t a copy

of a web nsitive inforcurrent an

against neworized accor DSL moe secure a

se. Either

onfirmationmake sure

report anyftware ven

nsumers aou transact

" or "locato be legitie URL yourformationpassword,

mation. cially careidentally se

and otherg experienc

e site. Do

makes sense should na site or e-

site you aare dealingof your o

page to ermation. nti-virus sw viruses. cess to yoodem. area exit in

r shut the

ns, credit cthat you

y irregularitdors.

nd collect t business

tion" box imate but rself. . Be very passport

eful about end an e-

security ce.

not follow

se for the not ask for -mail asks

are on-it’s g with the order and

ensure the

software.

our home

structions

em off or

card, and are being ties.

Page 5: ICSSM Newsletter Dec11

The Supeagencies own locatover 4Mb The inclueasy to aseamless

How it wo The Supsatellites Trackstickanywhere Where it w The SupeYour exacplayed baincluded a Applicati

Proloc

Verou

Pashi

Emveh

Miland

Ho Se Mil Priv Pu Law Ch

er Tracksticlooking foion, time, dof memor

uded magnattach andintegration

orks

per Tracksorbiting

k Pro cae on the pla

works

er Tracksticct location ack directand there a

ons / Feat

ofessional cation Recohicle locat

ute historieckage / copment hist

mployee anhicle moniteage recod verificatio

omeland Search and Ritary Operavate Invesblic Safetyw Enforcemild / Family

ck is the pr a way to date, speery, it can stnetic moud remove n into Goo

stick recethe earth

an preciseanet to with

ck will worand the ro

tly within are no mon

tures

GPS order ion and

es ontainer tory

nd toring rding on ecurity Rescue ations

stigation y ment y Safety

Rou

perfect tootrack anyt

ed, headingtore monthnt makes from any gle Earth™

ives signah. With ely calculahin fifteen

rk anywheoute travelGoogle E

nthly fees.

ute record

l for individthing that g, altitude ahs of trave

the Supemetal su

als from this inforate its ometers.

re on the led can beEarth™. E

ed with S

duals, law moves. Thand tempel informatioer Trackstrface. It h

twenty formation, town positi

planet Eare viewed aEverything

uper Trac

enforcemehe Super Terature at pon. ick

has

our the ion

rth. and

is

kstick in B

ent and goTrackstick rpreset inter

Burbank,

overnmentrecords itsrvals. With

California

t s h

a

Page 6: ICSSM Newsletter Dec11

In retail mdaily basieffectivenorder whicfactors mi

Managemtargets giv

Although improvemassist in rstore loss

This showthe trial. Mdata.

Overall, thprior to th

By helpinloss prevThere waofficers w

Managemimprovem

Managemtheir store

marketing, sis. Loss pess of thech can be ight be hel

ments recoven to offic

the actument, Manareducing suses, and a 4

wed an 80Manageme

here was ae training a

g security ention, the

as a measere still str

ments ratedment.

ments beliees and sig

shrinkage prevention e security used for ppful to do t

orded a 75cers and th

al unknowagements uch losses46% impro

% improveents are no

a 30% impand ‘very g

officers toey were thured 55% ruggling an

d officers

ved that ofgnificantly i

is a probleis one criprofessionerformancthe same -

5% improvheir change

wn losseswere impr

s. The survovement in

ement, witow involvin

rovement, good’ or ‘ex

o understahen able timprovem

nd would n

as valuab

fficers hadimproved o

em faced biterion use

nals hired ce manage-

vement hee of attitud

s measureressed witvey recorden security o

th 11 storeng officers

with Manaxcellent’ af

and basic mto commu

ment here. eed extra

ble membe

d consistenoverall sec

by the secued by the by them. ment of se

ere, attribue.

ed during h the officed a 119%officers’ ab

es recordinat till-focu

agements fterwards.

managemeunicate mo

However,assistance

ers of the

ntly helped curity, with

urity profesmanagemCertain ch

ecurity prof

uting this t

the trial cers’ desire

% improvemility to redu

ng improveused meeti

rating the

ent skills aore effectiv it was re

e.

store team

to raise seh many off

ssional worment to evheck list thfessionals.

to training

did not e and kno

ment in awauce stock l

ed net lossings, and s

service ‘sa

and the rudvely with mecognized

m, recordi

ecurity awficers atten

rld over onaluate the

herefore in Following

g, support,

show anowledge toareness ofosses.

ses duringsharing all

atisfactory’

diments ofmanagers.that some

ng a 45%

areness innding staff

n e n g

,

n o f

g l

f .

e

%

n f

Page 7: ICSSM Newsletter Dec11

meetings Managemand with t

Overall, thtraining operforman

Although which it managemand not as

The valuepertain toterminologdescribe t

Ultimatelyand exteragenda. Torganizati

Employeemerchandemployee employee stolen. Employeepocket, orothers to Employeestatus of profit for paying a w In Europestabilized professionpreventioninventory errors. Like otherstore pers

and helpments weretheir perso

hese resuofficers once that ad

security iscan – an

ment shoulds a separa

e of securito the quangy. Soft bethe more in

y, the securnally-led –That strateional proce

e Theft frodise, food,

theft is jumust “int

e theft canr bag and

steal mee theft can the emplothe merch

wage and b

ean countrrelatively,

nals that in professlosses du

rs in the sesonnel and

ping staff e also imprnal commi

lts – takenn loss pdds value t

typically vd often dd envision

ate function

ty can be ltifiable as

enefits are ntangible b

urity secto– that willegy must esses and

om a retaicash, or s

ust theft…ttend” to p

n occur juremoving rchandise,sometime

oyee. All ofhant. Empbenefits to

ries where the Retais responsionals maue to emp

ecurity indd store cust

to underressed withitment to th

n together revention to the secu

viewed as does – adn security an ‘living life

oosely catpects of sequally im

benefits of

r desperatl cement ibe holistibe comple

il store issupplies wthe elemen

permanently

ust like shit from the, eating foes be charf these meloyee thefthe thief o

e the retaill loss previble for re

anage in-sloyee theft

dustry, retatomers wh

rstand hoh the way he manage

r with the there is

urity guardi

a drain ondd value tas integra

e on the ed

tegorized isecurity, anmportant, bsecurity.

tely needsits rightful c, take ac

etely aligne

s a term twhile on thnts of the y deprive

hoplifting be store. It cood, and brged as emethods leadft is an inn top of pa

ling businevention is educing invtore secut, shoplifti

ail loss prehen dishon

ow they cin which o

er and stor

quantitativa measu

ing role an

the bottomto the hosl to all act

dge’.

nto hard and can usubut are som

s to developlace at

ccount of ed with cor

that is usehe job. Howcrime are their emp

by conceacan also ocby refund,

mbezzlemend to loss osidious cr

aying for th

ess has aa professioventory losrity progrng, fraud,

evention prestly or ca

could helpofficers carre.

e data – durable imd justifies

m line, thest businestivities with

and soft beually be demewhat mo

op a stratethe top oeach and

rporate obj

ed when wever, in tidentical. Tloyer of th

ling merchccur by ste credit cant due to tof inventorrime becauhe cost of t

lready seeonal diverssses insideams that vendor th

rofessionarelessness

p improverried out th

demonstraprovemenclient expe

re are manss. Moderhin the org

enefits. Harescribed iore qualita

egy – bothof the orgad every thectives.

an employthe eyes oTo commithe value o

handise inealing cashard, or chthe trusted

ry (shrinkause the mtheir disho

en the boosification oe retail stofocus on

heft, and a

ls must ints occurs. A

e security.heir duties,

ate that byt in theirenditure.

ny ways inn securityganization,

rd benefitsn financial

ative. They

h internallyanizationalreat to all

yee stealsof the law,t theft, the

of the item

n a purse,h, allowingeck fraud.d fiduciaryge) and/orerchant isnestly.

om and isof securityores. Loss reducing

accounting

teract withAs you can

. ,

y r

n y

s l

y

y l l

s ,

e m

, g .

y r s

s y s g g

h n

Page 8: ICSSM Newsletter Dec11

imagine, abe done w In India toSpencer’ssecurity p

Today ourinfrastructsecurity sassets an India in thbillion peoaround USmaritime. security m The orgarevenues organized Indians hapushing dsystems, motion detransmitteaffluent In “While thgrowing aestate anis almosannually,”Honeywel The real worth Rs1gadgets inback on Manufactuproducts India-2008demand automatiostalls at testate de

accusing swith the utm

oo this trens, Wal-Martprofessiona

r country istures whicituation pod ventures

he year 200ople. The mS$ I.57 bilThis mark

market is gr

nized playand is in

d lot.

ave been sdemand fovideo sur

etectors, twers are sondians.

he total sat the rate od resident

st double ” said Direll, South A

estate s1200 crorendustry is

this grourers’ unveat a sec

8 - thatfor hom

on devicesthe fair we

evelopers a

someone omost care a

nd is sure t, Relianceals and for

s on a roadh will go a

ortrays a grs. Thus

09-2010 spmarket seglion for 20

ket is estimrowing at 2

yers compndicative t

splurging hor securityrveillance wo- way keme of the

security mof 25-26%tial securit

at almoector (Sec

Asia.

security mes and theexpecting

owth, it eiled nearlyurity fair t underlin

me secur. “Also, 30ere visitedand individ

f dishonesand profess

to set-in! Te and Big B

the respon

d to develoa long way rim picture

pent Rs.59gment of s010 and the

mated to be23% CAGR

prise only hat the la

huge money gadgets and door-ey fobs, We ultra-sma

market is , the real y market

ost 52% curity) of

market is e security

to piggy is said. y 25 new - IFSEC nes the rity and 0% of the d by real dual end u

stly or caresionalism.

The prolifeBazaars shnse from p

opment stainto deve

e, asserting

9052.95 crosecurity sole major se

e UD$9.7 bR with pote

20% of tharge part

ey on secuby over 5

-phones, aWi-Fi camer

art devices

users who

elessness

eration of mharply focurotection p

arting manyloping our

g the need

ores on holutions andectors werebillion by yeential to gro

he marketof the ma

uring their h50% to Rsaccess conra, wireless that are

wanted s

is not a sm

malls and mus the neeprofession

y l energy national sto di-risk a

omeland sed man guae airports, ear 2016. Tow at 40%

t but accoarket is st

houses ans1, 200 crntrol, wall s external in deman

security an

mall matter

mega-storeed of such

- time is n

ventures asecurity. Thand safegu

ecurity protarding com mass tranThe Indian

%.

ount for 80till untappe

d new-fourores. Burg

mount aisiren and

nd with in

nd home a

r and must

es such as specialistow!

and criticalhe presentuards such

tecting 1.2bined wasnsport and electronic

0% of theed by the

nd wealth,glar alarmr sensors,wristband

ncreasingly

automation

t

s t

l t h

2 s d c

e e

, m

, d y

n

Page 9: ICSSM Newsletter Dec11

devices,” leading chighlightinwould be which sho The growand retail that the imanufacturather suc

Beware if fraudstersadhesive

their ATM So, what strike in pyboard answitches When a cchine is athe machautomatic The custotwo 'custoThey starttomer, entarts autoThe gang The SBI hud becausthat they c

IFSEC Incompanies ng the burg

11,341 Gows the siz

wth drivers and resid

initial Indiauring of hccessful in

f the ATM s to withdraand a scre

Ms, most of

is this lowpairs, enternd stick it on the ma

customer ealready on.hine has cally as a s

omer thinksomers' gettt abusing h

nter fraudstmatically. enters the

has been rse the CCTcouldn't wi

ndia-2008 from 23

geoning buGovernmenze and imp

of this phdential sectan entreprhardware,

short time

screen goeaw cash frewdriver ar

which are

w-tech, hir ATM by swith adhe

achine. Theenters the . A messabeen swi

security fea

s it is a syting impatihim for takter. They sWhat it ha

e amount a

receiving sTVs showethdraw mo

project cocountries usiness in nt and secortance of

enomenal tors. This reneurs ansystem co

e, others ar

es blank arom your are all that's

These networKolkatwho happliesinsert posed transaincludi

unmanne

ghly effecswiping vaesive so they then wATM and ge flashesitched on ature to sto

stem fault ent outside

king too musimply useas in storeand walks o

everal suced the cusoney," an S

oordinator (26% mothe field o

curity profef the home

market armarket is nd corporaomponentsre encoura

after you swaccount afts needed to

swindlerrk spread ta Police hhave mastes only to Aand extrato ATMs

ction is ng SBI and.

ctive modulid debit cahat it does

walk out answipes the

s for him toin an im

op fraudule

and givese are actuuch time ae a screwde is PIN of out with ca

ch complaistomer swipSBI official

said. Thisre than 20

of industriaessional fro

security m

re governmimport driv

ates who s and devaged to follo

wipe your ter you leao outwit hi-

s are paacross thave recenered the tATM machact the cars where tcomplete)nd Bank o

us operandard at the gs not returnd wait for e card, heo key his Pmproper went withdra

s it a seconally crimin

and force hdriver to 're

the last cash.

nts. "We wping his casaid.

s year mo009) are l

al security om 43 cou

market of In

ment sectoven to largventured

veloping soow suit.

card. It coave the AT-tech safet

art of a e country.tly roundedtampering hines that rd to startthe card . Many n

of Baroda,

di? Fraudsgate, pressrn to its ora victim t does not PIN, whichway, the wals.

nd try. He als waiting

him to leavelease' theustomer w

were at a loard. But cu Times

ore than 2likely to bmanagemuntries in ndia.

or, corporage extent bin the fieloftware, h

ould be a mTM in a huty gadgets

powerful . Assam Pd up threeof ATMs.need a cu

t operationpops out nationalize use this

sters, whos down a kriginal posto step intorealize tha

h he does.screen go

has no clug to steal hve in a huffe key. Thewho swiped

oss to locaustomers c

of India, New

280 worldbe presentent. Therethis event

ate sectorsbut seeingld of localhave been

mischief byuff. A bit of.

inter-statePolice ande swindlers The trick

ustomer tons (as op-

after theed banks,system at

generallykey on ke-sition. Thiso the trap!at the ma- But sinceoes blank

ue that thehis money.f. Exit cus-ATM res-

d his card.

ate the fra-omplainedDelhi Edition

d t

e t

s g l

n

y f

e d s k o -e , t

y -s ! -e k

e . --.

-d

Page 10: ICSSM Newsletter Dec11

Suggesti

P.S. - If yPlease lethank you

ons & fee

you don'tet us knowu!

dback ma

t like to rw your ma

ay be sent

receive ouail address

t to us on

ur newsles and we

e-mail: sb

etter, we awill move

btyagi1958

apologize e it out fro

[email protected]

for botheom our co

com

ering you.ontact list,

. ,