Upload
captsbtyagi
View
503
Download
2
Embed Size (px)
DESCRIPTION
Newsletter of International Council of Security & Safety Management co-founded by Capt SB Tyagi
Citation preview
observatisecurity around a Try and gto be staharder an
Let’s
Theof o We und
ion of whsense. Wnd try and
gauge theanding at and you wil
New
’s profe
e most essobservatio
see but wderstandinhat goes o
Wherever yd see thro
e need fora particulall come ou
wslette
essionhttp://w
sential quon.
we don’t obng the imon aroundyou are, bugh thing
a thing toar place. Dut with sur
er: Dec
nalize twww.wix.com/
uality, whic
bserve. Omplication
d us is a vbe it at hogs rather th
o be presDon’t ignorprising re
cember
the pro/sbtyagi/iciss
ch we hav
bservationns of whvery impo
ome or ouhan just s
ent at a pore anythesults. Ma
r 2011
ofessios
ve but ign
n is not juhat we
ortant requutside in asee them.
particular ping that s
ake observ
onals…
nored, is t
ust seeingsee. So uirement a public p
place, forseems unuvation a h
Capt S F
…
the power
thing buteffective
for betterplace look
r a personusual. Pryabit.
B Tyagior ICISS
r
t e r k
n y
i S
Before my joining as a Security Executive, I served as a Commissioned Officer with the Indian Army. During my service, I got the opportunity of deployment at Indo-Bangladesh border, Indo-Pakistan border, Indo-Myanmar border and Indo-China border. These ground scenarios taught me to define security as protecting the political and physical integrity of sovereign nations like that of our country. In its traditional form, security is centered on the preservation of the sovereign state from external threats and the activities of other states. It thus requires internationally recognized boundaries protected if necessary by military action, prohibition of the use of force between states and non-intervention in the affairs of other states. Under the UN Charter, individual state security is supported by collective security. The Security Council’s primary responsibility is to maintain international peace and security. The Security Council can authorize the use of all necessary means in response to a breach of the peace, threat to the peace or act of aggression. The ‘collective security’ is defined simply as the Security Council, rather than as any broader community of states or other interests. The veto ensures the agreement of the five permanent members in any such collective action and is thus a safeguard against contested action. The decision to use the veto is political. Well, these were my learning when I was trained in the Officers’ Training Academy of Indian Army and thereafter serving at International Borders of our nation. But soon after I joined my new assignment, I saw and learnt a different aspect of security. Though we name it as Industrial security, but it can always be seen in conjunction with Human Security. This includes almost everything from Infrastructure, Installation, Perimeter, Access control, Township security to all sorts of employee insecurities and so on and so forth. Coming to the International security it is assumed that the action of one or more states that threatens the security of other state(s). This means that less attention has been paid to the role of non-state actors, such as terrorists, extremists, in generating insecurity. However in the context of terrorism this has now changed. For example post 9/11; the UN Security Council recognized terrorist acts as constituting a threat to international security. Human security denotes individual freedom from basic insecurities, whatever the root of that insecurity may be. It is also caused by internal conflict, by collapse of state institutions and vital installations like that of ours. It also emanates from violence and abusive actions by non-state actors like the present day scenario of Terrorism and Naxalism. Human insecurity is also caused by violations of economic and social rights such as the right to food, health and housing, as well as civil and political rights such as fearing torture, deprivation of life and liberty. However although denial of human rights contributes to human insecurity and human insecurity generates further violations of human rights, it is a wider concept than human rights. It encompasses physical security, economic security, legal security, political security, food security, gender security and relational security. Human security is perhaps best summarized by the inclusion of ‘freedom from fear’ and ‘freedom from want’ among the four freedoms proclaimed by President Roosevelt during World War Two. The Report on the Commission on Human Security, May 2005 added that it also includes the freedom to take action on one's own behalf, which is the enjoyment of
autonomyinternation Human semilitary acforms of vviolence organizedstate, othinternationCongo etcterms of civilians w To summmeasuringman at apracticed security is
Som
While all bbelow are
Ch Ch
sha De Ke
em Do Do Do
oth Us Us
if th
If yconcon
Beviru
y and senal security
ecurity doction, interviolence typ
like murdd crime etcher actors nal peacekc. Howevethe secur
within the s
marize we g yard andany level
by one ans for everyb
me ste
banks have some tips
hange youhange youared PCs
estroy the eep your mployees) o not writeo not hando not use hers to guee a differee both lethe passwo
you believncerned bntact the co
e alert for us or jump
lf-esteem. y.
es not dernal affairspically mutder, lootinc. Where may assu
keepers liker such bodity of thei
state.
can say td the threais importand all, it gbody!
eps yoonlin
ve made als to ensure
r HPIN aftur HPIN a HPIN mailHPIN a
e the HPINd over your
common ess ent passwtters and nords or HPI
ve that sobanks’ busoncerned bscam e-ming to a fra
Human
pend upons and polictate from cng, abducthe state
ume that rke Indian Adies tend tor own forc
that securit cannot be
ant and chives confid
ou cane to e
l efforts toe maximum
er your firsafter you
er after mesecret an
on your Ar ATM/Debnames as
word for eanumbers aINS are ca
omeone issiness assbank immemails. Theaudulent w
security
n internatioce action. conflicts likctions, kidgovernmeresponsibilArmy is doio perceiveces rather
ity in any e calculatehallenging.dence to s
an takensuro ensure sem security:
st login andaccess C
emorizing nd don't d
ATM/Debit bit Card or s HPINs -
ach of your and a comase sensitiv
s trying tosociate anediately. ese are de
website and
thus goe
onal law’sIn so-calle
ke bombingdnappings,nt cannot lity, for exing Peace-
e security wr than in t
form or aed correctly. But whesecurity pr
e whire sececurity for
d change ititibank On
it disclose it
Card or CiCredit Carchoose p
accounts.bination ofve
o commit d such ac
esigned to d disclosing
s beyond
distinctioned post-cogs, military , corruptioguarantee
xample an -keeping inwithin statethat of the
at any levy. Hence tn the secofessional
le tracurity
the custom
t at least online Intern
t to anyon
tibank Crerd to anyonasswords
f lower cas
fraud by ctivities ra
trick you g sensitive
d and su
ns betweeonflict situa
attacks inon, armede security
occupyingn Lebanone security te human s
vel does nthe task of curity meas to make
nsact
mer’s inter
once a monnet Banki
ne (includ
edit Card. ne. that are d
se and cap
pretendingaise doubt
into downe informatio
pplements
en conflict,ations, theto criminald crimes,within theg army or
n, Somalia,terms or insecurity of
ot have aa security
asures aree sure that
ting
rest, listed
nth ng using
ding bank
difficult for
ital letters
g to be a s, please
nloading a on.
s
, e l ,
e r ,
n f
a y e t
Beyoupos
Ve Ma
on act
Dosusdet
Opopema
Many e-cprocedure
If yany
Asactyoufor
KeUnrighcon
Losite
MaAnt
Inscom
Loto e
Dophy
Mobancha
Re
eware! Phour personast privacy arify the ad
ake sure thyour bro
tually are con't reply spicious otails, other
pen e-maiening an eail with a vi
commercees to give y
you suspey of the insk yourseltivity you aur driver's informatio
eep a Papiform Resoht compannfirmation
ok for thee is runningake sure yti-virus sof
stall a permputer, esg off. Do ensure you
o not keeysically disonitor younk statemearged only
egularly do
ony "look aal informatiand securiddress of hat the URowser wicounterfeitsto any e-
of any busr banks detls only w
e-mail withrus.
e websitesyou a conv
ect a websstructions if if the inf
are engagelicense nu
on that doeer Trial. Pource Locany. It's alsnumber fo
e padlock g in secureyour homftware neesonal firespecially ifnot just cur protectio
ep compusconnect thur transacents as so
y for transaownload s
alike" webson. Make sty statemeevery webRL you wandow. Sos. Take a f-mail that siness or tails or som
when you an attach
s utilize venient and
site is not wt may presformation ed in. For eumber or thesn't feel rigPrint out thator (URL)so a goodr your reco
symbol ae mode BE
me compuds frequenwall to hef you connelose your on. ters onlin
hem from Ictions. Reoon as youctions you
security pa
sites are dsure that w
ents and rebsite, knowant appeaome websfew extra s requestsperson w
me other hknow the
hment. Eve
state-of-thd secure s
what it pursent you. you are aexample, ahe PIN for ght, do nothe "addres). The URd idea toords.
at the bottEFORE youter has th
nt updates elp prevenect throughbrowser.
ne when nternet co
eview youru receive
u made. Imatches fro
designed twebsites oneview themwn as the
ars in the "ites may
seconds ans your pewho asks f
ighly sense sender.en a friend
he-art enchopping an
rports to be
asked to pan online ayour credi
t respond. ss" of the L ensures print out
tom right u input senhe most cto guard a
nt unauthoh a cable oFollow the
not in unnection. r order cothem to mmediately m your sof
o trick conn which yo
m carefully. URL.
"address"appear to
nd type thersonal inffor your pitive inform
Be especd may acci
cryption and banking
e, leave the
provide mauction siteit card. If a company that you a
t a copy
of a web nsitive inforcurrent an
against neworized accor DSL moe secure a
se. Either
onfirmationmake sure
report anyftware ven
nsumers aou transact
" or "locato be legitie URL yourformationpassword,
mation. cially careidentally se
and otherg experienc
e site. Do
makes sense should na site or e-
site you aare dealingof your o
page to ermation. nti-virus sw viruses. cess to yoodem. area exit in
r shut the
ns, credit cthat you
y irregularitdors.
nd collect t business
tion" box imate but rself. . Be very passport
eful about end an e-
security ce.
not follow
se for the not ask for -mail asks
are on-it’s g with the order and
ensure the
software.
our home
structions
em off or
card, and are being ties.
The Supeagencies own locatover 4Mb The inclueasy to aseamless
How it wo The Supsatellites Trackstickanywhere Where it w The SupeYour exacplayed baincluded a Applicati
Proloc
Verou
Pashi
Emveh
Miland
Ho Se Mil Priv Pu Law Ch
er Tracksticlooking foion, time, dof memor
uded magnattach andintegration
orks
per Tracksorbiting
k Pro cae on the pla
works
er Tracksticct location ack directand there a
ons / Feat
ofessional cation Recohicle locat
ute historieckage / copment hist
mployee anhicle moniteage recod verificatio
omeland Search and Ritary Operavate Invesblic Safetyw Enforcemild / Family
ck is the pr a way to date, speery, it can stnetic moud remove n into Goo
stick recethe earth
an preciseanet to with
ck will worand the ro
tly within are no mon
tures
GPS order ion and
es ontainer tory
nd toring rding on ecurity Rescue ations
stigation y ment y Safety
Rou
perfect tootrack anyt
ed, headingtore monthnt makes from any gle Earth™
ives signah. With ely calculahin fifteen
rk anywheoute travelGoogle E
nthly fees.
ute record
l for individthing that g, altitude ahs of trave
the Supemetal su
™
als from this inforate its ometers.
re on the led can beEarth™. E
ed with S
duals, law moves. Thand tempel informatioer Trackstrface. It h
twenty formation, town positi
planet Eare viewed aEverything
uper Trac
enforcemehe Super Terature at pon. ick
has
our the ion
rth. and
is
kstick in B
ent and goTrackstick rpreset inter
Burbank,
overnmentrecords itsrvals. With
California
t s h
a
In retail mdaily basieffectivenorder whicfactors mi
Managemtargets giv
Although improvemassist in rstore loss
This showthe trial. Mdata.
Overall, thprior to th
By helpinloss prevThere waofficers w
Managemimprovem
Managemtheir store
marketing, sis. Loss pess of thech can be ight be hel
ments recoven to offic
the actument, Manareducing suses, and a 4
wed an 80Manageme
here was ae training a
g security ention, the
as a measere still str
ments ratedment.
ments beliees and sig
shrinkage prevention e security used for ppful to do t
orded a 75cers and th
al unknowagements uch losses46% impro
% improveents are no
a 30% impand ‘very g
officers toey were thured 55% ruggling an
d officers
ved that ofgnificantly i
is a probleis one criprofessionerformancthe same -
5% improvheir change
wn losseswere impr
s. The survovement in
ement, witow involvin
rovement, good’ or ‘ex
o understahen able timprovem
nd would n
as valuab
fficers hadimproved o
em faced biterion use
nals hired ce manage-
vement hee of attitud
s measureressed witvey recorden security o
th 11 storeng officers
with Manaxcellent’ af
and basic mto commu
ment here. eed extra
ble membe
d consistenoverall sec
by the secued by the by them. ment of se
ere, attribue.
ed during h the officed a 119%officers’ ab
es recordinat till-focu
agements fterwards.
managemeunicate mo
However,assistance
ers of the
ntly helped curity, with
urity profesmanagemCertain ch
ecurity prof
uting this t
the trial cers’ desire
% improvemility to redu
ng improveused meeti
rating the
ent skills aore effectiv it was re
e.
store team
to raise seh many off
ssional worment to evheck list thfessionals.
to training
did not e and kno
ment in awauce stock l
ed net lossings, and s
service ‘sa
and the rudvely with mecognized
m, recordi
ecurity awficers atten
rld over onaluate the
herefore in Following
g, support,
show anowledge toareness ofosses.
ses duringsharing all
atisfactory’
diments ofmanagers.that some
ng a 45%
areness innding staff
n e n g
,
n o f
g l
’
f .
e
%
n f
meetings Managemand with t
Overall, thtraining operforman
Although which it managemand not as
The valuepertain toterminologdescribe t
Ultimatelyand exteragenda. Torganizati
Employeemerchandemployee employee stolen. Employeepocket, orothers to Employeestatus of profit for paying a w In Europestabilized professionpreventioninventory errors. Like otherstore pers
and helpments weretheir perso
hese resuofficers once that ad
security iscan – an
ment shoulds a separa
e of securito the quangy. Soft bethe more in
y, the securnally-led –That strateional proce
e Theft frodise, food,
theft is jumust “int
e theft canr bag and
steal mee theft can the emplothe merch
wage and b
ean countrrelatively,
nals that in professlosses du
rs in the sesonnel and
ping staff e also imprnal commi
lts – takenn loss pdds value t
typically vd often dd envision
ate function
ty can be ltifiable as
enefits are ntangible b
urity secto– that willegy must esses and
om a retaicash, or s
ust theft…ttend” to p
n occur juremoving rchandise,sometime
oyee. All ofhant. Empbenefits to
ries where the Retais responsionals maue to emp
ecurity indd store cust
to underressed withitment to th
n together revention to the secu
viewed as does – adn security an ‘living life
oosely catpects of sequally im
benefits of
r desperatl cement ibe holistibe comple
il store issupplies wthe elemen
permanently
ust like shit from the, eating foes be charf these meloyee thefthe thief o
e the retaill loss previble for re
anage in-sloyee theft
dustry, retatomers wh
rstand hoh the way he manage
r with the there is
urity guardi
a drain ondd value tas integra
e on the ed
tegorized isecurity, anmportant, bsecurity.
tely needsits rightful c, take ac
etely aligne
s a term twhile on thnts of the y deprive
hoplifting be store. It cood, and brged as emethods leadft is an inn top of pa
ling businevention is educing invtore secut, shoplifti
ail loss prehen dishon
ow they cin which o
er and stor
quantitativa measu
ing role an
the bottomto the hosl to all act
dge’.
nto hard and can usubut are som
s to developlace at
ccount of ed with cor
that is usehe job. Howcrime are their emp
by conceacan also ocby refund,
mbezzlemend to loss osidious cr
aying for th
ess has aa professioventory losrity progrng, fraud,
evention prestly or ca
could helpofficers carre.
e data – durable imd justifies
m line, thest businestivities with
and soft beually be demewhat mo
op a stratethe top oeach and
rporate obj
ed when wever, in tidentical. Tloyer of th
ling merchccur by ste credit cant due to tof inventorrime becauhe cost of t
lready seeonal diverssses insideams that vendor th
rofessionarelessness
p improverried out th
demonstraprovemenclient expe
re are manss. Moderhin the org
enefits. Harescribed iore qualita
egy – bothof the orgad every thectives.
an employthe eyes oTo commithe value o
handise inealing cashard, or chthe trusted
ry (shrinkause the mtheir disho
en the boosification oe retail stofocus on
heft, and a
ls must ints occurs. A
e security.heir duties,
ate that byt in theirenditure.
ny ways inn securityganization,
rd benefitsn financial
ative. They
h internallyanizationalreat to all
yee stealsof the law,t theft, the
of the item
n a purse,h, allowingeck fraud.d fiduciaryge) and/orerchant isnestly.
om and isof securityores. Loss reducing
accounting
teract withAs you can
. ,
y r
n y
s l
y
y l l
s ,
e m
, g .
y r s
s y s g g
h n
imagine, abe done w In India toSpencer’ssecurity p
Today ourinfrastructsecurity sassets an India in thbillion peoaround USmaritime. security m The orgarevenues organized Indians hapushing dsystems, motion detransmitteaffluent In “While thgrowing aestate anis almosannually,”Honeywel The real worth Rs1gadgets inback on Manufactuproducts India-2008demand automatiostalls at testate de
accusing swith the utm
oo this trens, Wal-Martprofessiona
r country istures whicituation pod ventures
he year 200ople. The mS$ I.57 bilThis mark
market is gr
nized playand is in
d lot.
ave been sdemand fovideo sur
etectors, twers are sondians.
he total sat the rate od resident
st double ” said Direll, South A
estate s1200 crorendustry is
this grourers’ unveat a sec
8 - thatfor hom
on devicesthe fair we
evelopers a
someone omost care a
nd is sure t, Relianceals and for
s on a roadh will go a
ortrays a grs. Thus
09-2010 spmarket seglion for 20
ket is estimrowing at 2
yers compndicative t
splurging hor securityrveillance wo- way keme of the
security mof 25-26%tial securit
at almoector (Sec
Asia.
security mes and theexpecting
owth, it eiled nearlyurity fair t underlin
me secur. “Also, 30ere visitedand individ
f dishonesand profess
to set-in! Te and Big B
the respon
d to develoa long way rim picture
pent Rs.59gment of s010 and the
mated to be23% CAGR
prise only hat the la
huge money gadgets and door-ey fobs, We ultra-sma
market is , the real y market
ost 52% curity) of
market is e security
to piggy is said. y 25 new - IFSEC nes the rity and 0% of the d by real dual end u
stly or caresionalism.
The prolifeBazaars shnse from p
opment stainto deve
e, asserting
9052.95 crosecurity sole major se
e UD$9.7 bR with pote
20% of tharge part
ey on secuby over 5
-phones, aWi-Fi camer
art devices
users who
elessness
eration of mharply focurotection p
arting manyloping our
g the need
ores on holutions andectors werebillion by yeential to gro
he marketof the ma
uring their h50% to Rsaccess conra, wireless that are
wanted s
is not a sm
malls and mus the neeprofession
y l energy national sto di-risk a
omeland sed man guae airports, ear 2016. Tow at 40%
t but accoarket is st
houses ans1, 200 crntrol, wall s external in deman
security an
mall matter
mega-storeed of such
- time is n
ventures asecurity. Thand safegu
ecurity protarding com mass tranThe Indian
%.
ount for 80till untappe
d new-fourores. Burg
mount aisiren and
nd with in
nd home a
r and must
es such as specialistow!
and criticalhe presentuards such
tecting 1.2bined wasnsport and electronic
0% of theed by the
nd wealth,glar alarmr sensors,wristband
ncreasingly
automation
t
s t
l t h
2 s d c
e e
, m
, d y
n
devices,” leading chighlightinwould be which sho The growand retail that the imanufacturather suc
Beware if fraudstersadhesive
their ATM So, what strike in pyboard answitches When a cchine is athe machautomatic The custotwo 'custoThey starttomer, entarts autoThe gang The SBI hud becausthat they c
IFSEC Incompanies ng the burg
11,341 Gows the siz
wth drivers and resid
initial Indiauring of hccessful in
f the ATM s to withdraand a scre
Ms, most of
is this lowpairs, enternd stick it on the ma
customer ealready on.hine has cally as a s
omer thinksomers' gettt abusing h
nter fraudstmatically. enters the
has been rse the CCTcouldn't wi
ndia-2008 from 23
geoning buGovernmenze and imp
of this phdential sectan entreprhardware,
short time
screen goeaw cash frewdriver ar
which are
w-tech, hir ATM by swith adhe
achine. Theenters the . A messabeen swi
security fea
s it is a syting impatihim for takter. They sWhat it ha
e amount a
receiving sTVs showethdraw mo
project cocountries usiness in nt and secortance of
enomenal tors. This reneurs ansystem co
e, others ar
es blank arom your are all that's
These networKolkatwho happliesinsert posed transaincludi
unmanne
ghly effecswiping vaesive so they then wATM and ge flashesitched on ature to sto
stem fault ent outside
king too musimply useas in storeand walks o
everal suced the cusoney," an S
oordinator (26% mothe field o
curity profef the home
market armarket is nd corporaomponentsre encoura
after you swaccount afts needed to
swindlerrk spread ta Police hhave mastes only to Aand extrato ATMs
ction is ng SBI and.
ctive modulid debit cahat it does
walk out answipes the
s for him toin an im
op fraudule
and givese are actuuch time ae a screwde is PIN of out with ca
ch complaistomer swipSBI official
said. Thisre than 20
of industriaessional fro
security m
re governmimport driv
ates who s and devaged to follo
wipe your ter you leao outwit hi-
s are paacross thave recenered the tATM machact the cars where tcomplete)nd Bank o
us operandard at the gs not returnd wait for e card, heo key his Pmproper went withdra
s it a seconally crimin
and force hdriver to 're
the last cash.
nts. "We wping his casaid.
s year mo009) are l
al security om 43 cou
market of In
ment sectoven to largventured
veloping soow suit.
card. It coave the AT-tech safet
art of a e country.tly roundedtampering hines that rd to startthe card . Many n
of Baroda,
di? Fraudsgate, pressrn to its ora victim t does not PIN, whichway, the wals.
nd try. He als waiting
him to leavelease' theustomer w
were at a loard. But cu Times
ore than 2likely to bmanagemuntries in ndia.
or, corporage extent bin the fieloftware, h
ould be a mTM in a huty gadgets
powerful . Assam Pd up threeof ATMs.need a cu
t operationpops out nationalize use this
sters, whos down a kriginal posto step intorealize tha
h he does.screen go
has no clug to steal hve in a huffe key. Thewho swiped
oss to locaustomers c
of India, New
280 worldbe presentent. Therethis event
ate sectorsbut seeingld of localhave been
mischief byuff. A bit of.
inter-statePolice ande swindlers The trick
ustomer tons (as op-
after theed banks,system at
generallykey on ke-sition. Thiso the trap!at the ma- But sinceoes blank
ue that thehis money.f. Exit cus-ATM res-
d his card.
ate the fra-omplainedDelhi Edition
d t
e t
s g l
n
y f
e d s k o -e , t
y -s ! -e k
e . --.
-d
Suggesti
P.S. - If yPlease lethank you
ons & fee
you don'tet us knowu!
dback ma
t like to rw your ma
ay be sent
receive ouail address
t to us on
ur newsles and we
e-mail: sb
etter, we awill move
btyagi1958
apologize e it out fro
for botheom our co
com
ering you.ontact list,
. ,