SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
New
                         wslette Dec
                               er: cember 2011
                                        r
            Let’s profe
               ’s     ession
                           nalize the pro
                                  t     ofessio
                                              onals

                                                   

                                http://w
                                       www.wix.com/
                                                  /sbtyagi/iciss
                                                               s




               The most ess
                  e         sential qu
                                     uality, whic we hav but ign
                                                ch     ve      nored, is the power
                                                                         t       r
               of o
                  observatio
                           on.

               We see but we don’t ob
                          w          bserve. Observation is not ju seeing thing but
                                                       n         ust                t
               und
                 derstandin the im
                          ng        mplication of wh
                                              ns       hat we see. So effective     e
observatiion of wh goes on around us is a very impo
                 hat      o         d         v       ortant requ uirement for better
                                                                                    r
security sense. W
                Wherever you are, b it at ho
                          y        be        ome or ouutside in a public place look
                                                                          p         k
around and try and see through thing rather th just see them.
                 d                 gs         han     s

Try and ggauge the need for a thing to be present at a particular p
                 e                   o                  p         place, for a person
                                                                           r         n
to be sta
        anding at a particula place. D
                            ar       Don’t igno anything that s
                                               ore               seems unu  usual. Pry
                                                                                     y
harder an you wil come ou with sur
        nd        ll       ut        rprising re
                                               esults. Ma observ
                                                        ake       vation a habit.




                                                                                          Capt S B Tyagii
                                                                                               For ICISS
                                                                                                       S




                                                     Digitally signed by Capt SB Tyagi, COAS'CC
                                                     DN: cn=Capt SB Tyagi, COAS'CC, o=International
                                                     Council of Security & Safety Management, ou=Co-
                                                     founder, email=sbtyagi1958@gmail.com, c=IN
                                                     Date: 2011.12.01 14:05:06 +05'30'
Before my joining as a Security Executive, I served as a Commissioned Officer with the
Indian Army. During my service, I got the opportunity of deployment at Indo-Bangladesh
border, Indo-Pakistan border, Indo-Myanmar border and Indo-China border. These ground
scenarios taught me to define security as protecting the political and physical integrity of
sovereign nations like that of our country.

In its traditional form, security is centered on the preservation of the sovereign state from
external threats and the activities of other states. It thus requires internationally recognized
boundaries protected if necessary by military action, prohibition of the use of force
between states and non-intervention in the affairs of other states. Under the UN Charter,
individual state security is supported by collective security. The Security Council’s primary
responsibility is to maintain international peace and security. The Security Council can
authorize the use of all necessary means in response to a breach of the peace, threat to
the peace or act of aggression. The ‘collective security’ is defined simply as the Security
Council, rather than as any broader community of states or other interests. The veto
ensures the agreement of the five permanent members in any such collective action and is
thus a safeguard against contested action. The decision to use the veto is political. Well,
these were my learning when I was trained in the Officers’ Training Academy of Indian
Army and thereafter serving at International Borders of our nation.

But soon after I joined my new assignment, I saw and learnt a different aspect of security.
Though we name it as Industrial security, but it can always be seen in conjunction with
Human Security. This includes almost everything from Infrastructure, Installation,
Perimeter, Access control, Township security to all sorts of employee insecurities and so
on and so forth.

Coming to the International security it is assumed that the action of one or more states that
threatens the security of other state(s). This means that less attention has been paid to the
role of non-state actors, such as terrorists, extremists, in generating insecurity. However in
the context of terrorism this has now changed. For example post 9/11; the UN Security
Council recognized terrorist acts as constituting a threat to international security.

Human security denotes individual freedom from basic insecurities, whatever the root of
that insecurity may be. It is also caused by internal conflict, by collapse of state institutions
and vital installations like that of ours. It also emanates from violence and abusive actions
by non-state actors like the present day scenario of Terrorism and Naxalism. Human
insecurity is also caused by violations of economic and social rights such as the right to
food, health and housing, as well as civil and political rights such as fearing torture,
deprivation of life and liberty. However although denial of human rights contributes to
human insecurity and human insecurity generates further violations of human rights, it is a
wider concept than human rights. It encompasses physical security, economic security,
legal security, political security, food security, gender security and relational security.
Human security is perhaps best summarized by the inclusion of ‘freedom from fear’ and
‘freedom from want’ among the four freedoms proclaimed by President Roosevelt during
World War Two. The Report on the Commission on Human Security, May 2005 added that
it also includes the freedom to take action on one's own behalf, which is the enjoyment of
autonomy and self-esteem. Human security thus goes beyond and supplements
          y                                             d               s
internation security
          nal      y.

Human se   ecurity does not depend upon internatio
                                            n            onal law’s distinction betwee conflict,
                                                                               ns          en         ,
military acction, inter
                      rnal affairs and polic action. In so-calle post-co
                                 s          ce                       ed        onflict situa
                                                                                           ations, the
                                                                                                     e
forms of vviolence typpically mut tate from c
                                            conflicts lik bombing military attacks into criminal
                                                        ke          gs,                               l
violence like murd    der, lootinng, abduc  ctions, kid  dnappings, corruptio
                                                                     ,         on, armed crimes,
                                                                                            d         ,
organized crime etc Where the state government cannot guarantee security within the
          d           c.                                                       e                     e
state, oth actors may assu
          her                    ume that r responsibil             xample an occupying army or
                                                         lity, for ex                       g        r
internation peacek
           nal        keepers lik Indian A
                                 ke         Army is doi Peace-
                                                         ing         -keeping in Lebanon Somalia,
                                                                               n          n,          ,
Congo etc Howeve such bod
           c.        er          dies tend to perceive security within state security terms or in
                                             o          e           w          e           t         n
terms of the security of their own forc     ces rather than in that of the human security of
                                                        r           t          e           s          f
civilians w
          within the s
                     state.

To summ marize we can say that securiity in any form or at any lev does not have a
                             t                            a         vel
measuring yard and the threat cannot be calculate correctly Hence t task of a security
          g         d                  e         ed        y.        the                y
man at a  any level is importa and ch
                             ant       hallenging. But when the sec
                                                 .                  curity meaasures aree
practiced by one an all, it gives confid
                     nd                dence to security professional s to make sure that
                                                 s                            e         t
security is for everyb
          s          body!


   Som ste yo ca take while tra nsact
     me eps ou an                   ting
          onlin to e
              ne   ensur sec
                       re curity
While all b
          banks hav made all efforts to ensure se
                  ve                  o         ecurity for the custom
                                                                     mer’s inter
                                                                               rest, listed
below are some tips to ensure maximum security:
         e        s         e         m


      Ch hange your HPIN after your firs login and change it at least o
                                        st        d         t          once a mon
                                                                                nth
      Ch hange you HPIN after you access Citibank On
                    ur        a                            nline Intern Banking using
                                                                        net
       sha ared PCs
      De estroy the HPIN mailer after meemorizing it
      Ke eep your HPIN a secret an don't disclose it to anyon (includ
                                        nd        d        t            ne      ding bank
       emmployees)
      Do not write the HPIN on your A
          o         e                   ATM/Debit Card or Citibank Cre Card.
                                                                       edit
      Do not hand over your ATM/Deb Card or Credit Car to anyon
          o         d         r         bit                 rd          ne.
      Do not use common names as HPINs - choose passwords that are difficult for
          o                              s                                      d
       othhers to gue
                    ess
      Use a differe passw
                    ent      word for ea of your accounts.
                                        ach
      Use both let tters and numbers a a combination of lower cas and capital letters
                              n         and                f           se
       if th passwo
           he       ords or HPI
                              INS are ca sensitiv
                                        ase       ve



      If y
          you believ that so
                     ve       omeone is trying to commit fraud by pretending to be a
                                        s         o                              g
       conncerned b banks’ bussiness ass
                                       sociate and such ac  ctivities ra
                                                                       aise doubts, please
       conntact the co
                     oncerned bank imme
                               b        ediately.
      Be alert for scam e-m
         e                    mails. The
                                       ese are de esigned to trick you into downnloading a
       viru or jumping to a fra
          us                  audulent w
                                       website and disclosing sensitive informatio
                                                  d         g          e         on.
   Be
        eware! Pho "look alike" webs
                     ony        a           sites are designed to trick con
                                                      d                   nsumers and collect
       you persona information. Make s
         ur          al                     sure that websites on which yo transact business
                                                      w         n         ou          t
       pos privacy a security stateme
          st          and                  ents and reeview them carefully.
                                                               m
      Verify the ad ddress of every web   bsite, know as the URL.
                                                       wn
      Ma sure th the UR you wa appea in the "address" or "locat
         ake          hat       RL         ant        ars       "         "           tion" box
       on your bro    owser window. So     ome websites may appear to be legiti
                                                                          o           imate but
       act
         tually are ccounterfeits Take a f
                                s.         few extra seconds an type the URL your
                                                      s         nd        e           rself.
      Do
        on't reply to any e-    -mail that requests your personal inf
                                                      s                    formation. Be very
       sus
         spicious o any bus
                     of         siness or person who asks for your p
                                                     w           f         password, passport
       dettails, other banks det
                     r          tails or som other highly sensitive inform
                                           me                             mation.
      Oppen e-mails only when you know the sender. Be espec
                               w                       e                    cially care
                                                                                      eful about
       opeening an e e-mail with an attach hment. Eve a friend may acciidentally se an e-
                                                      en       d                      end
       ma with a virus.
         ail



Many e-ccommerce websites utilize state-of-th
                 e        s                 he-art enccryption a
                                                               and other security
procedure to give y a conv
        es        you    venient and secure shopping an banking experienc
                                   d                  nd       g        ce.

      If y
          you suspe a webs is not w
                     ect       site                   rports to be leave the site. Do not follow
                                            what it pur          e,        e
       any of the ins
          y          structions it may pres sent you.
      Ask yourself if the inf  formation you are asked to provide m
                                                      a          p        makes sens for the
                                                                                      se
       acttivity you a engage in. For e
                     are        ed          example, an online auction site should not ask for
                                                      a          a         e         n
       you driver's license nu
          ur                   umber or th PIN for your credi card. If a site or e-
                                            he                   it                  -mail asks
       for informatio that doe
                     on        esn't feel rig do not respond.
                                            ght,      t
      Keeep a Paper Trial. Print out th "addres of the company site you are on-it’s
                                P           he        ss"                            a
       Uniform Reso   ource Loca ator (URL) The URL ensures that you a dealing with the
                                            ).                             are        g
       righ compan It's als a good idea to print out a copy of your order and
          ht          ny.        so          d                   t                   o
       connfirmation number for your reco   ords.



      Look for the padlock symbol a the bott
                      e                     at          tom right of a web page to ensure the
                                                                                        e
       site is running in secure mode BE
          e            g           e        EFORE you input sen
                                                        u         nsitive inforrmation.
      Maake sure y    your hom compu ter has th most current an
                                 me                     he         c           nti-virus software.
                                                                                         s
       Ant ti-virus sofftware needs frequen updates to guard against new viruses.
                                             nt                   a           w
      Insstall a personal firewall to he preven unautho
                                             elp       nt         orized acc  cess to yo home
                                                                                        our
       commputer, es    specially if you conne through a cable or DSL mo
                                   f         ect        h         o          odem.
      Log off. Do not just close your browser. Follow the secure a
                                                                  e          area exit instructions
       to e
          ensure you protectio
                       ur          on.
      Do not kee computers onlin when not in use. Either shut the off or
         o           ep                      ne                               r          em
       phyysically dissconnect th  hem from I nternet connection.
      Moonitor you transac
                      ur          ctions. Re eview your order co
                                                        r        onfirmation credit card, and
                                                                             ns,         c
       ban stateme
          nk           ents as so  oon as you receive them to make sure that you are being
                                             u                   m
       chaarged only for transactions you made. Immediately report any irregularit
                      y                     u                                 y          ties.
      Reegularly do  ownload security pa
                                  s          atches from your sof ftware ven dors.
The Supe Trackstic is the perfect too l for individ
        er          ck       p                    duals, law enforceme and go
                                                                       ent       overnment  t
agencies looking for a way to track anyt
                                       thing that moves. Th Super T
                                                           he         Trackstick records its
                                                                                 r         s
own location, time, d
                    date, spee heading altitude and tempe
                             ed,       g,         a        erature at p
                                                                      preset inter
                                                                                 rvals. With
                                                                                           h
over 4Mb of memor it can st
                   ry,        tore month of travel informatio
                                       hs                   on.
The inclu
        uded magn   netic mount makes the Supe Trackstick
                                                 er
        attach and remove from any metal surface. It has
easy to a          d                                        h
seamless integration into Google Earthℱ
                    n                  ℱ

        orks
How it wo

The Sup   per Tracks
                   stick receives signa als from twenty fo
                                                         our
satellites orbiting the earth With this infor
                              h.                rmation, the
                                                         t
Trackstick Pro ca precise
          k        an         ely calcula
                                        ate its own positi
                                                o        ion
anywhere on the pla
          e        anet to with fifteen meters.
                              hin

Where it w
         works

The Supe Trackstic will wor anywhe re on the planet Ear
         er        ck       rk                           rth.
                            oute travelled can be viewed and
Your exac location and the ro
         ct                                     e        a
played ba ack direct within Google E
                   tly                Earthℱ. Everything is
                                                E
included a there a no mon
         and       are      nthly fees.

Applications / Feat
                  tures

      Proofessional GPS
       loc
         cation Recoorder
      Vehicle location and
       rou historie
         ute       es
      Package / coontainer
       shipment hist tory
      Emmployee an nd
       vehhicle monittoring
      Mileage recording
       and verificatio
          d          on
      Hoomeland Se ecurity
      Search and R Rescue
      Military Operaations
      Priv
          vate Invesstigation
      Public Safetyy
      Law Enforcem
          w          ment
      Child / Family Safety
                     y


                           Rou record ed with Super Trackstick in B
                             ute                                  Burbank, California
                                                                                    a
In retail m
          marketing, sshrinkage is a proble faced by the secu
                                          em        b        urity profes
                                                                        ssional wor over on
                                                                                   rld       n
daily basi Loss p
           is.       prevention is one criiterion use by the managem
                                                    ed                  ment to evaluate the e
effectiveness of the security profession
                     e                    nals hired by them. Certain chheck list th
                                                                                   herefore in
                                                                                             n
order whic can be used for performanc management of se
           ch                             ce                 ecurity proffessionals. Following
                                                                                             g
factors mi ight be helpful to do the same -
                                 t



Managem  ments reco
                  orded a 75 improv
                             5%     vement he  ere, attribu
                                                          uting this t training support,
                                                                     to       g,       ,
targets giv to offic
          ven      cers and th change of attitude.
                             heir   e



Although the actual unknow losses measure during the trial did not show an
                             wn       s          ed                                          n
improvem ment, Mana agements were impr ressed with the officcers’ desire and kno
                                                                         e         owledge too
assist in r
          reducing su losses The surv recorde a 119% improvem
                     uch     s.       vey        ed         %            ment in awaareness of
                                                                                             f
store lossses, and a 4
                     46% impro
                             ovement in security officers’ ability to redu stock losses.
                                      n          o                       uce



This show  wed an 80% improveement, wit 11 store recordin improve net loss during
                                      th       es           ng       ed         ses      g
the trial. M
           Managemeents are no involvin officers at till-focu
                             ow       ng                    used meetiings, and sharing all
                                                                                s         l
data.



Overall, thhere was a 30% improvement, with Mana    agements rating the service ‘sa
                                                                                  atisfactory’
                                                                                             ’
prior to the training a ‘very good’ or ‘ex
                      and     g          xcellent’ af
                                                    fterwards.



By helping security officers to understa
                                o       and basic manageme skills a
                                                   m         ent     and the rud
                                                                               diments of
                                                                                        f
loss prevention, the were th
                      ey        hen able t commu
                                         to        unicate mo effectiv
                                                             ore     vely with managers.
                                                                               m         .
There wa a measured 55% improvem
         as                             ment here. However, it was re
                                                                    ecognized that some e
officers were still str
                      ruggling an would n eed extra assistance
                                nd                           e.



Managemments rated officers as valuab membe of the store team recording a 45%
                 d                  ble   ers               m,              %
improvem
       ment.



Managem  ments believed that offficers had consisten helped to raise se
                                         d          ntly                ecurity awareness inn
their store and sig
          es       gnificantly improved o
                               i          overall sec
                                                    curity, with many off
                                                               h        ficers atten
                                                                                   nding staff
                                                                                             f
meetings and help   ping staff to under  rstand ho they could help improve security.
                                                 ow       c          p          e       .
Managem ments were also impr
                   e         ressed with the way in which officers car
                                         h                o          rried out th duties,
                                                                                heir    ,
and with t
         their personal commi itment to th manage and stor
                                         he      er       re.

          hese results – taken together with the quantitative data – d
Overall, th                  n        r                               demonstra that by
                                                                                ate       y
training oofficers on loss prevention there is a measu      urable im provement in their  r
performan that ad value to the secu
          nce       dds      t        urity guardi role and justifies client expe
                                                 ing                            enditure.




Although security is typically viewed as a drain on the bottom line, the re are man ways in
                               v                             m                    ny        n
which it can – and often does – ad value to the hos busines Modern security
                               d        dd         t         st          ss.                y
managem ment should envision security a integral to all act
                    d         n          as                  tivities with the org
                                                                         hin      ganization,
and not as a separa function ‘living life on the ed
         s         ate         n        e         dge’.

The value of securit can be loosely cat
         e         ty                    tegorized into hard and soft be
                                                             a         enefits. Har benefits
                                                                                  rd        s
pertain to the quantifiable aspects of s
         o                              security, an can usu
                                                   nd         ually be de
                                                                        escribed in financiall
terminolog Soft be
          gy.      enefits are equally im
                                        mportant, but are som
                                                   b         mewhat mo qualita
                                                                        ore       ative. They
                                                                                            y
describe t more in
          the      ntangible benefits of security.
                             b

Ultimately the secu
         y,         urity sector desperat
                                        tely needs to develo a strate
                                                   s         op        egy – both internally
                                                                                  h        y
and exterrnally-led – that will cement iits rightful place at the top o the orga
                               l                                       of         anizational
                                                                                            l
agenda. T That strate
                    egy must be holisti c, take ac ccount of each and every threat to all
                                                                       d                    l
organizati
         ional proceesses and be comple etely aligne with cor
                                                   ed        rporate obj ectives.




Employee Theft fro
        e          om a retai store is a term that is use when an employ
                             il       s         t        ed                   yee steals
                                                                                       s
merchanddise, food, cash, or supplies w
                             s        while on th job. How
                                                he       wever, in tthe eyes of the law,
                                                                             o          ,
employee theft is ju theft
t
                   ust       the elemen of the crime are identical. T commit theft, the
                                      nts                           To        t        e
employee must “int tend” to permanently deprive their employer of th value of the item
                            p          y                            he       o        m
stolen.

Employee theft can occur ju like sh
         e         n         ust         hoplifting by concealing merch
                                                     b                     handise in a purse,
                                                                                     n          ,
pocket, or bag and removing it from the store. It can also oc
          r                              e           c          ccur by ste
                                                                          ealing cash allowing
                                                                                     h,        g
others to steal merchandise, eating fo
                              ,           ood, and by refund, credit ca
                                                     b                    ard, or check fraud.  .
Employee theft can sometime be char
         e                    es         rged as em  mbezzlemen due to t
                                                                nt         the trusted fiduciary
                                                                                     d         y
status of the emplo
                  oyee. All of these me
                              f          ethods lead to loss of inventor (shrinkage) and/or
                                                     d          o         ry                   r
profit for the merch
                   hant. Employee thef is an insidious cr
                                          ft                    rime becauuse the merchant is  s
paying a w         benefits to the thief o n top of pa
          wage and b                                 aying for th cost of t
                                                                he        their dishonestly.

In Europe ean countr ries where the retail
                               e           ling busine
                                                     ess has already see the boo and is
                                                                         en         om        s
stabilized relatively, the Retail loss prev
                                          vention is a professio
                                                               onal divers
                                                                         sification of security
                                                                                    o         y
professionnals that is responsible for re educing invventory los
                                                               sses inside retail sto
                                                                         e          ores. Losss
prevention professionals ma
          n                    anage in-s tore security programs that focus on reducing       g
inventory losses du to employee theft shoplifting, fraud, vendor th
                     ue                    t,                            heft, and accounting
                                                                                    a         g
errors.

Like other in the se
         rs        ecurity ind
                             dustry, reta loss pre
                                        ail      evention prrofessiona ls must int
                                                                                 teract with
                                                                                           h
store pers
         sonnel and store cust
                  d           tomers wh hen dishonestly or carelessness occurs. As you can
                                                                      s          A         n
imagine, a
         accusing ssomeone of dishones stly or care
                                                  elessness is not a sm
                                                                      mall matter and must
                                                                                r        t
be done w
        with the utm
                   most care and profess
                             a         sionalism.

In India to this tren is sure to set-in! T
          oo        nd                   The prolife
                                                   eration of malls and m
                                                              m         mega-store such as
                                                                                 es      s
Spencer’s Wal-Mart Reliance and Big B
          s,        t,       e           Bazaars shharply focu the nee of such specialist
                                                              us        ed               t
security pprofessiona and for the respon from protection profession - time is now!
                    als                  nse                  p




Today our country is on a road to develo
          r          s         d        opment staarting many l energy ventures and critical
                                                            y                     a         l
infrastruct
          tures which will go a long way into developing our national ssecurity. Th present
                                                                                  he       t
security situation po
                    ortrays a gr picture asserting the need to di-risk a safegu
                               rim     e,        g                     and        uards such
                                                                                           h
assets and ventures Thus
                    s.

India in th year 200
          he         09-2010 sppent Rs.59
                                        9052.95 croores on ho omeland se
                                                                       ecurity prot
                                                                                  tecting 1.2
                                                                                            2
billion peo
          ople. The mmarket seggment of s
                                        security sol
                                                   lutions and man gua
                                                              d        arding combined was  s
around US I.57 billion for 20 and the major se
           S$                 010        e         ectors were airports, mass tran
                                                               e                  nsport andd
maritime. This mark is estim
                    ket      mated to be UD$9.7 billion by ye 2016. T Indian electronic
                                        e         b           ear      The                  c
security mmarket is gr
                     rowing at 23% CAGR with pote
                               2        R          ential to gro at 40%
                                                               ow     %.

The organized play
                 yers comp prise only 20% of th market but acco
                                               he      t         ount for 80 of the
                                                                           0%     e
revenues and is in
                 ndicative that the la
                                     arge part of the ma
                                                       arket is st untappe by the
                                                                 till      ed     e
organized lot.
        d

Indians ha been s
          ave        splurging huge mone on secu
                               h        ey       uring their houses an d new-found wealth,
                                                             h                              ,
pushing d demand fo security gadgets by over 50% to Rs 200 cr
                     or        y                 5          s1,         rores. Burg
                                                                                  glar alarm
                                                                                           m
systems, video sur   rveillance and door-
                                        -phones, access con
                                                 a           ntrol, wall mount air sensors, ,
motion de etectors, tw way ke fobs, W
                     wo-        ey     Wi-Fi camer wireless external siren and wristband
                                                 ra,                                       d
transmitte are some of the ultra-sma devices that are in deman with in
          ers                  e        art       s                     nd       ncreasingly
                                                                                           y
affluent In
          ndians.

“While th total s
         he       security market is
                           m
growing a the rate o 25-26%, the real
        at         of
estate and resident security market
                   tial
is almos double at almo
        st                  ost 52%
annually,” said Dire
         ”         ector (Sec
                            curity) of
Honeywel South A
          ll,    Asia.

The real estate s   security market is
                             m
worth Rs1 1200 crore and the security
                    es       e
gadgets inndustry is expecting to piggy
back on this gro    owth, it is said.
Manufactu urers’ unve
                    eiled nearly 25 new
                               y
products at a security fair - IFSEC
India-2008 - that underlin
          8          t         nes the
demand for hom      me secur  rity and
automatio devices. “Also, 30 of the
         on                   0%
stalls at t
          the fair we visited by real
                    ere       d
estate deevelopers aand individ
                              dual end uusers who wanted security an home automation
                                                         s         nd     a        n
devices,” IFSEC In                     oordinator said. This year mo
                    ndia-2008 project co                      s         ore than 280 world
                                                                                   2       d
leading ccompanies from 23 countries (26% more than 20        009) are llikely to be present
                                                                                  b         t
highlightin the burg
          ng        geoning bu
                             usiness in the field of industria security management. There
                                                  o          al                            e
would be 11,341 G  Governmen and sec
                             nt        curity profe
                                                  essional fro 43 cou
                                                              om        untries in this event
                                                                                            t
which sho ows the siz and importance of the home security market of In
                    ze                 f                     m         ndia.

The grow drivers of this phenomenal market ar governm
        wth                                          re        ment secto corpora sectors
                                                                        or,       ate     s
and retail and resid dential sect
                                tors. This market is import driv to larg extent but seeing
                                                                ven      ge        b      g
that the iinitial India entrepr
                      an        reneurs an corpora
                                          nd         ates who ventured in the fiel of local
                                                                                   ld      l
manufactu uring of h hardware, system co  omponents and dev
                                                    s          veloping so
                                                                         oftware, have been
                                                                                  h       n
         ccessful in short time others ar encoura
rather suc                     e,         re        aged to follo suit.
                                                                ow




Beware if the ATM screen goe blank a
         f                   es         after you sw
                                                   wipe your card. It co
                                                                       ould be a mischief by
                                                                                 m         y
fraudsters to withdra cash fr
         s          aw       rom your a account aft you lea the AT in a hu A bit of
                                                   ter      ave        TM        uff.      f
adhesive and a screewdriver ar all that's needed to outwit hi-
                             re         s          o         -tech safet gadgets.
                                                                        ty

                              These swindlers are pa of a powerful inter-state
                                                      art                            e
                              networ spread across the country. Assam Police and
                                     rk                           .         P        d
                              Kolkat Police have recently rounded up three swindlers
                                    ta                            d         e        s
                              who h have masteered the tampering of ATMs. The trick
                                                       t                             k
                              applies only to ATM mach
                                     s        A        hines that need a cu ustomer to
                                                                                     o
                              insert and extra the car to start operation (as op-
                                             act       rd        t          ns       -
                              posed to ATMs where the card pops out after the
                                              s        t                             e
                              transa ction is complete). Many n   nationalize banks,
                                                                            ed        ,
                              includi ng SBI an Bank of Baroda, use this system at
                                              nd       o                              t
their ATM most of which are unmanne d.
        Ms,

So, what is this low  w-tech, highly effec ctive modu operand Frauds
                                                    us       di?        sters, who generally  y
strike in p
          pairs, enter ATM by swiping va lid debit ca at the gate, press down a key on ke-
                     r          s                   ard       g          s          k         -
yboard an stick it with adhe
          nd                    esive so th it does not retur to its or
                                            hat     s        rn          riginal pos
                                                                                   sition. This
                                                                                              s
switches on the ma   achine. The then w
                                 ey       walk out an wait for a victim t step into the trap!
                                                    nd                  to         o           !
When a c  customer e enters the ATM and swipes the card, he does not realize tha the ma-
                                                     e                              at        -
chine is aalready on. A message flashes for him to key his PIN, which he does. But since
                      .                    s         o        P         h                     e
the mach  hine has been swi     itched on in an im  mproper way, the screen go
                                                             w                     oes blank  k
automatic cally as a s
                     security fea
                                ature to sto fraudule withdrawals.
                                           op       ent

The custoomer thinks it is a system fault and gives it a secon try. He has no clu that the
                    s                             s           nd                   ue      e
two 'custo
         omers' gettting impatient outside are actually criminals waiting to steal his money.
                                          e                             g          h        .
They start abusing h for tak
          t          him       king too mu time and force him to leav in a huff Exit cus-
                                          uch     a           h         ve         f.       -
tomer, ennter fraudstter. They simply use a screwd
                               s         e        driver to 're
                                                              elease' the key. The ATM res-
                                                                        e                   -
tarts automatically. What it ha in store is PIN of the last customer w
                               as        e                              who swiped his card.
                                                                                   d        .
The gang enters the amount and walks o with ca
                    e         a           out     ash.

The SBI h been r
         has        receiving several suc complaints. "We were at a lo to loca the fra-
                                        ch                  w         oss          ate            -
ud becaus the CCT showe the cus
          se         TVs       ed       stomer swip
                                                  ping his ca But cu
                                                            ard.     ustomers complained         d
that they c
          couldn't withdraw mooney," an S official said.
                                        SBI                      Times of India, New Delhi Edition
Suggestions & feedback ma be sent to us on e-mail: sb
                        ay      t                   btyagi1958
                                                             8@gmail.c
                                                                     com


P.S. - If y
          you don't like to receive ou newsle
                  t         r        ur     etter, we apologize for bothe
                                                      a                 ering you. .
Please le us know your ma address and we will move it out fro our co
         et      w          ail      s                e        om       ontact list,
                                                                                   ,
thank you u!

Weitere Àhnliche Inhalte

Mehr von captsbtyagi

'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIIIcaptsbtyagi
 
Background screening
Background screeningBackground screening
Background screeningcaptsbtyagi
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11captsbtyagi
 
News letter jan 12
News letter jan 12News letter jan 12
News letter jan 12captsbtyagi
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 
News letter July 11
News letter July 11News letter July 11
News letter July 11captsbtyagi
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
News letter May 11
News letter May 11News letter May 11
News letter May 11captsbtyagi
 
News letter april 11
News letter april 11News letter april 11
News letter april 11captsbtyagi
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11captsbtyagi
 
Contingency planning train
Contingency planning  trainContingency planning  train
Contingency planning traincaptsbtyagi
 
Child abduction
Child abductionChild abduction
Child abductioncaptsbtyagi
 

Mehr von captsbtyagi (14)

'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII
 
Background screening
Background screeningBackground screening
Background screening
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11
 
News letter jan 12
News letter jan 12News letter jan 12
News letter jan 12
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
News letter July 11
News letter July 11News letter July 11
News letter July 11
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
News letter May 11
News letter May 11News letter May 11
News letter May 11
 
News letter april 11
News letter april 11News letter april 11
News letter april 11
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11
 
Contingency planning train
Contingency planning  trainContingency planning  train
Contingency planning train
 
Child abduction
Child abductionChild abduction
Child abduction
 

KĂŒrzlich hochgeladen

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxRamakrishna Reddy Bijjam
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxDr. Sarita Anand
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jisc
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsKarakKing
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxheathfieldcps1
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxPooja Bhuva
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17Celine George
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...pradhanghanshyam7136
 
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...Nguyen Thanh Tu Collection
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...Nguyen Thanh Tu Collection
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024Elizabeth Walsh
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17Celine George
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...ZurliaSoop
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfNirmal Dwivedi
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxPooja Bhuva
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

KĂŒrzlich hochgeladen (20)

Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỏ TUYỂN SINH TIáșŸNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
TỔNG ÔN TáșŹP THI VÀO LỚP 10 MÔN TIáșŸNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGở Â...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
Jual Obat Aborsi Hongkong ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

ICSSM Newsletter Dec11

  • 1. New wslette Dec er: cember 2011 r Let’s profe ’s ession nalize the pro t ofessio onals
 
 http://w www.wix.com/ /sbtyagi/iciss s The most ess e sential qu uality, whic we hav but ign ch ve nored, is the power t r of o observatio on. We see but we don’t ob w bserve. Observation is not ju seeing thing but n ust t und derstandin the im ng mplication of wh ns hat we see. So effective e observatiion of wh goes on around us is a very impo hat o d v ortant requ uirement for better r security sense. W Wherever you are, b it at ho y be ome or ouutside in a public place look p k around and try and see through thing rather th just see them. d gs han s Try and ggauge the need for a thing to be present at a particular p e o p place, for a person r n to be sta anding at a particula place. D ar Don’t igno anything that s ore seems unu usual. Pry y harder an you wil come ou with sur nd ll ut rprising re esults. Ma observ ake vation a habit. Capt S B Tyagii For ICISS S Digitally signed by Capt SB Tyagi, COAS'CC DN: cn=Capt SB Tyagi, COAS'CC, o=International Council of Security & Safety Management, ou=Co- founder, email=sbtyagi1958@gmail.com, c=IN Date: 2011.12.01 14:05:06 +05'30'
  • 2. Before my joining as a Security Executive, I served as a Commissioned Officer with the Indian Army. During my service, I got the opportunity of deployment at Indo-Bangladesh border, Indo-Pakistan border, Indo-Myanmar border and Indo-China border. These ground scenarios taught me to define security as protecting the political and physical integrity of sovereign nations like that of our country. In its traditional form, security is centered on the preservation of the sovereign state from external threats and the activities of other states. It thus requires internationally recognized boundaries protected if necessary by military action, prohibition of the use of force between states and non-intervention in the affairs of other states. Under the UN Charter, individual state security is supported by collective security. The Security Council’s primary responsibility is to maintain international peace and security. The Security Council can authorize the use of all necessary means in response to a breach of the peace, threat to the peace or act of aggression. The ‘collective security’ is defined simply as the Security Council, rather than as any broader community of states or other interests. The veto ensures the agreement of the five permanent members in any such collective action and is thus a safeguard against contested action. The decision to use the veto is political. Well, these were my learning when I was trained in the Officers’ Training Academy of Indian Army and thereafter serving at International Borders of our nation. But soon after I joined my new assignment, I saw and learnt a different aspect of security. Though we name it as Industrial security, but it can always be seen in conjunction with Human Security. This includes almost everything from Infrastructure, Installation, Perimeter, Access control, Township security to all sorts of employee insecurities and so on and so forth. Coming to the International security it is assumed that the action of one or more states that threatens the security of other state(s). This means that less attention has been paid to the role of non-state actors, such as terrorists, extremists, in generating insecurity. However in the context of terrorism this has now changed. For example post 9/11; the UN Security Council recognized terrorist acts as constituting a threat to international security. Human security denotes individual freedom from basic insecurities, whatever the root of that insecurity may be. It is also caused by internal conflict, by collapse of state institutions and vital installations like that of ours. It also emanates from violence and abusive actions by non-state actors like the present day scenario of Terrorism and Naxalism. Human insecurity is also caused by violations of economic and social rights such as the right to food, health and housing, as well as civil and political rights such as fearing torture, deprivation of life and liberty. However although denial of human rights contributes to human insecurity and human insecurity generates further violations of human rights, it is a wider concept than human rights. It encompasses physical security, economic security, legal security, political security, food security, gender security and relational security. Human security is perhaps best summarized by the inclusion of ‘freedom from fear’ and ‘freedom from want’ among the four freedoms proclaimed by President Roosevelt during World War Two. The Report on the Commission on Human Security, May 2005 added that it also includes the freedom to take action on one's own behalf, which is the enjoyment of
  • 3. autonomy and self-esteem. Human security thus goes beyond and supplements y d s internation security nal y. Human se ecurity does not depend upon internatio n onal law’s distinction betwee conflict, ns en , military acction, inter rnal affairs and polic action. In so-calle post-co s ce ed onflict situa ations, the e forms of vviolence typpically mut tate from c conflicts lik bombing military attacks into criminal ke gs, l violence like murd der, lootinng, abduc ctions, kid dnappings, corruptio , on, armed crimes, d , organized crime etc Where the state government cannot guarantee security within the d c. e e state, oth actors may assu her ume that r responsibil xample an occupying army or lity, for ex g r internation peacek nal keepers lik Indian A ke Army is doi Peace- ing -keeping in Lebanon Somalia, n n, , Congo etc Howeve such bod c. er dies tend to perceive security within state security terms or in o e w e t n terms of the security of their own forc ces rather than in that of the human security of r t e s f civilians w within the s state. To summ marize we can say that securiity in any form or at any lev does not have a t a vel measuring yard and the threat cannot be calculate correctly Hence t task of a security g d e ed y. the y man at a any level is importa and ch ant hallenging. But when the sec . curity meaasures aree practiced by one an all, it gives confid nd dence to security professional s to make sure that s e t security is for everyb s body! Som ste yo ca take while tra nsact me eps ou an ting onlin to e ne ensur sec re curity While all b banks hav made all efforts to ensure se ve o ecurity for the custom mer’s inter rest, listed below are some tips to ensure maximum security: e s e m  Ch hange your HPIN after your firs login and change it at least o st d t once a mon nth  Ch hange you HPIN after you access Citibank On ur a nline Intern Banking using net sha ared PCs  De estroy the HPIN mailer after meemorizing it  Ke eep your HPIN a secret an don't disclose it to anyon (includ nd d t ne ding bank emmployees)  Do not write the HPIN on your A o e ATM/Debit Card or Citibank Cre Card. edit  Do not hand over your ATM/Deb Card or Credit Car to anyon o d r bit rd ne.  Do not use common names as HPINs - choose passwords that are difficult for o s d othhers to gue ess  Use a differe passw ent word for ea of your accounts. ach  Use both let tters and numbers a a combination of lower cas and capital letters n and f se if th passwo he ords or HPI INS are ca sensitiv ase ve  If y you believ that so ve omeone is trying to commit fraud by pretending to be a s o g conncerned b banks’ bussiness ass sociate and such ac ctivities ra aise doubts, please conntact the co oncerned bank imme b ediately.  Be alert for scam e-m e mails. The ese are de esigned to trick you into downnloading a viru or jumping to a fra us audulent w website and disclosing sensitive informatio d g e on.
  • 4.  Be eware! Pho "look alike" webs ony a sites are designed to trick con d nsumers and collect you persona information. Make s ur al sure that websites on which yo transact business w n ou t pos privacy a security stateme st and ents and reeview them carefully. m  Verify the ad ddress of every web bsite, know as the URL. wn  Ma sure th the UR you wa appea in the "address" or "locat ake hat RL ant ars " " tion" box on your bro owser window. So ome websites may appear to be legiti o imate but act tually are ccounterfeits Take a f s. few extra seconds an type the URL your s nd e rself.  Do on't reply to any e- -mail that requests your personal inf s formation. Be very sus spicious o any bus of siness or person who asks for your p w f password, passport dettails, other banks det r tails or som other highly sensitive inform me mation.  Oppen e-mails only when you know the sender. Be espec w e cially care eful about opeening an e e-mail with an attach hment. Eve a friend may acciidentally se an e- en d end ma with a virus. ail Many e-ccommerce websites utilize state-of-th e s he-art enccryption a and other security procedure to give y a conv es you venient and secure shopping an banking experienc d nd g ce.  If y you suspe a webs is not w ect site rports to be leave the site. Do not follow what it pur e, e any of the ins y structions it may pres sent you.  Ask yourself if the inf formation you are asked to provide m a p makes sens for the se acttivity you a engage in. For e are ed example, an online auction site should not ask for a a e n you driver's license nu ur umber or th PIN for your credi card. If a site or e- he it -mail asks for informatio that doe on esn't feel rig do not respond. ght, t  Keeep a Paper Trial. Print out th "addres of the company site you are on-it’s P he ss" a Uniform Reso ource Loca ator (URL) The URL ensures that you a dealing with the ). are g righ compan It's als a good idea to print out a copy of your order and ht ny. so d t o connfirmation number for your reco ords.  Look for the padlock symbol a the bott e at tom right of a web page to ensure the e site is running in secure mode BE e g e EFORE you input sen u nsitive inforrmation.  Maake sure y your hom compu ter has th most current an me he c nti-virus software. s Ant ti-virus sofftware needs frequen updates to guard against new viruses. nt a w  Insstall a personal firewall to he preven unautho elp nt orized acc cess to yo home our commputer, es specially if you conne through a cable or DSL mo f ect h o odem.  Log off. Do not just close your browser. Follow the secure a e area exit instructions to e ensure you protectio ur on.  Do not kee computers onlin when not in use. Either shut the off or o ep ne r em phyysically dissconnect th hem from I nternet connection.  Moonitor you transac ur ctions. Re eview your order co r onfirmation credit card, and ns, c ban stateme nk ents as so oon as you receive them to make sure that you are being u m chaarged only for transactions you made. Immediately report any irregularit y u y ties.  Reegularly do ownload security pa s atches from your sof ftware ven dors.
  • 5. The Supe Trackstic is the perfect too l for individ er ck p duals, law enforceme and go ent overnment t agencies looking for a way to track anyt thing that moves. Th Super T he Trackstick records its r s own location, time, d date, spee heading altitude and tempe ed, g, a erature at p preset inter rvals. With h over 4Mb of memor it can st ry, tore month of travel informatio hs on. The inclu uded magn netic mount makes the Supe Trackstick er attach and remove from any metal surface. It has easy to a d h seamless integration into Google Earthℱ n ℱ orks How it wo The Sup per Tracks stick receives signa als from twenty fo our satellites orbiting the earth With this infor h. rmation, the t Trackstick Pro ca precise k an ely calcula ate its own positi o ion anywhere on the pla e anet to with fifteen meters. hin Where it w works The Supe Trackstic will wor anywhe re on the planet Ear er ck rk rth. oute travelled can be viewed and Your exac location and the ro ct e a played ba ack direct within Google E tly Earthℱ. Everything is E included a there a no mon and are nthly fees. Applications / Feat tures  Proofessional GPS loc cation Recoorder  Vehicle location and rou historie ute es  Package / coontainer shipment hist tory  Emmployee an nd vehhicle monittoring  Mileage recording and verificatio d on  Hoomeland Se ecurity  Search and R Rescue  Military Operaations  Priv vate Invesstigation  Public Safetyy  Law Enforcem w ment  Child / Family Safety y Rou record ed with Super Trackstick in B ute Burbank, California a
  • 6. In retail m marketing, sshrinkage is a proble faced by the secu em b urity profes ssional wor over on rld n daily basi Loss p is. prevention is one criiterion use by the managem ed ment to evaluate the e effectiveness of the security profession e nals hired by them. Certain chheck list th herefore in n order whic can be used for performanc management of se ch ce ecurity proffessionals. Following g factors mi ight be helpful to do the same - t Managem ments reco orded a 75 improv 5% vement he ere, attribu uting this t training support, to g, , targets giv to offic ven cers and th change of attitude. heir e Although the actual unknow losses measure during the trial did not show an wn s ed n improvem ment, Mana agements were impr ressed with the officcers’ desire and kno e owledge too assist in r reducing su losses The surv recorde a 119% improvem uch s. vey ed % ment in awaareness of f store lossses, and a 4 46% impro ovement in security officers’ ability to redu stock losses. n o uce This show wed an 80% improveement, wit 11 store recordin improve net loss during th es ng ed ses g the trial. M Managemeents are no involvin officers at till-focu ow ng used meetiings, and sharing all s l data. Overall, thhere was a 30% improvement, with Mana agements rating the service ‘sa atisfactory’ ’ prior to the training a ‘very good’ or ‘ex and g xcellent’ af fterwards. By helping security officers to understa o and basic manageme skills a m ent and the rud diments of f loss prevention, the were th ey hen able t commu to unicate mo effectiv ore vely with managers. m . There wa a measured 55% improvem as ment here. However, it was re ecognized that some e officers were still str ruggling an would n eed extra assistance nd e. Managemments rated officers as valuab membe of the store team recording a 45% d ble ers m, % improvem ment. Managem ments believed that offficers had consisten helped to raise se d ntly ecurity awareness inn their store and sig es gnificantly improved o i overall sec curity, with many off h ficers atten nding staff f
  • 7. meetings and help ping staff to under rstand ho they could help improve security. ow c p e . Managem ments were also impr e ressed with the way in which officers car h o rried out th duties, heir , and with t their personal commi itment to th manage and stor he er re. hese results – taken together with the quantitative data – d Overall, th n r demonstra that by ate y training oofficers on loss prevention there is a measu urable im provement in their r performan that ad value to the secu nce dds t urity guardi role and justifies client expe ing enditure. Although security is typically viewed as a drain on the bottom line, the re are man ways in v m ny n which it can – and often does – ad value to the hos busines Modern security d dd t st ss. y managem ment should envision security a integral to all act d n as tivities with the org hin ganization, and not as a separa function ‘living life on the ed s ate n e dge’. The value of securit can be loosely cat e ty tegorized into hard and soft be a enefits. Har benefits rd s pertain to the quantifiable aspects of s o security, an can usu nd ually be de escribed in financiall terminolog Soft be gy. enefits are equally im mportant, but are som b mewhat mo qualita ore ative. They y describe t more in the ntangible benefits of security. b Ultimately the secu y, urity sector desperat tely needs to develo a strate s op egy – both internally h y and exterrnally-led – that will cement iits rightful place at the top o the orga l of anizational l agenda. T That strate egy must be holisti c, take ac ccount of each and every threat to all d l organizati ional proceesses and be comple etely aligne with cor ed rporate obj ectives. Employee Theft fro e om a retai store is a term that is use when an employ il s t ed yee steals s merchanddise, food, cash, or supplies w s while on th job. How he wever, in tthe eyes of the law, o , employee theft is ju theft
t ust the elemen of the crime are identical. T commit theft, the nts To t e employee must “int tend” to permanently deprive their employer of th value of the item p y he o m stolen. Employee theft can occur ju like sh e n ust hoplifting by concealing merch b handise in a purse, n , pocket, or bag and removing it from the store. It can also oc r e c ccur by ste ealing cash allowing h, g others to steal merchandise, eating fo , ood, and by refund, credit ca b ard, or check fraud. . Employee theft can sometime be char e es rged as em mbezzlemen due to t nt the trusted fiduciary d y status of the emplo oyee. All of these me f ethods lead to loss of inventor (shrinkage) and/or d o ry r profit for the merch hant. Employee thef is an insidious cr ft rime becauuse the merchant is s paying a w benefits to the thief o n top of pa wage and b aying for th cost of t he their dishonestly. In Europe ean countr ries where the retail e ling busine ess has already see the boo and is en om s stabilized relatively, the Retail loss prev vention is a professio onal divers sification of security o y professionnals that is responsible for re educing invventory los sses inside retail sto e ores. Losss prevention professionals ma n anage in-s tore security programs that focus on reducing g inventory losses du to employee theft shoplifting, fraud, vendor th ue t, heft, and accounting a g errors. Like other in the se rs ecurity ind dustry, reta loss pre ail evention prrofessiona ls must int teract with h store pers sonnel and store cust d tomers wh hen dishonestly or carelessness occurs. As you can s A n
  • 8. imagine, a accusing ssomeone of dishones stly or care elessness is not a sm mall matter and must r t be done w with the utm most care and profess a sionalism. In India to this tren is sure to set-in! T oo nd The prolife eration of malls and m m mega-store such as es s Spencer’s Wal-Mart Reliance and Big B s, t, e Bazaars shharply focu the nee of such specialist us ed t security pprofessiona and for the respon from protection profession - time is now! als nse p Today our country is on a road to develo r s d opment staarting many l energy ventures and critical y a l infrastruct tures which will go a long way into developing our national ssecurity. Th present he t security situation po ortrays a gr picture asserting the need to di-risk a safegu rim e, g and uards such h assets and ventures Thus s. India in th year 200 he 09-2010 sppent Rs.59 9052.95 croores on ho omeland se ecurity prot tecting 1.2 2 billion peo ople. The mmarket seggment of s security sol lutions and man gua d arding combined was s around US I.57 billion for 20 and the major se S$ 010 e ectors were airports, mass tran e nsport andd maritime. This mark is estim ket mated to be UD$9.7 billion by ye 2016. T Indian electronic e b ear The c security mmarket is gr rowing at 23% CAGR with pote 2 R ential to gro at 40% ow %. The organized play yers comp prise only 20% of th market but acco he t ount for 80 of the 0% e revenues and is in ndicative that the la arge part of the ma arket is st untappe by the till ed e organized lot. d Indians ha been s ave splurging huge mone on secu h ey uring their houses an d new-found wealth, h , pushing d demand fo security gadgets by over 50% to Rs 200 cr or y 5 s1, rores. Burg glar alarm m systems, video sur rveillance and door- -phones, access con a ntrol, wall mount air sensors, , motion de etectors, tw way ke fobs, W wo- ey Wi-Fi camer wireless external siren and wristband ra, d transmitte are some of the ultra-sma devices that are in deman with in ers e art s nd ncreasingly y affluent In ndians. “While th total s he security market is m growing a the rate o 25-26%, the real at of estate and resident security market tial is almos double at almo st ost 52% annually,” said Dire ” ector (Sec curity) of Honeywel South A ll, Asia. The real estate s security market is m worth Rs1 1200 crore and the security es e gadgets inndustry is expecting to piggy back on this gro owth, it is said. Manufactu urers’ unve eiled nearly 25 new y products at a security fair - IFSEC India-2008 - that underlin 8 t nes the demand for hom me secur rity and automatio devices. “Also, 30 of the on 0% stalls at t the fair we visited by real ere d estate deevelopers aand individ dual end uusers who wanted security an home automation s nd a n
  • 9. devices,” IFSEC In oordinator said. This year mo ndia-2008 project co s ore than 280 world 2 d leading ccompanies from 23 countries (26% more than 20 009) are llikely to be present b t highlightin the burg ng geoning bu usiness in the field of industria security management. There o al e would be 11,341 G Governmen and sec nt curity profe essional fro 43 cou om untries in this event t which sho ows the siz and importance of the home security market of In ze f m ndia. The grow drivers of this phenomenal market ar governm wth re ment secto corpora sectors or, ate s and retail and resid dential sect tors. This market is import driv to larg extent but seeing ven ge b g that the iinitial India entrepr an reneurs an corpora nd ates who ventured in the fiel of local ld l manufactu uring of h hardware, system co omponents and dev s veloping so oftware, have been h n ccessful in short time others ar encoura rather suc e, re aged to follo suit. ow Beware if the ATM screen goe blank a f es after you sw wipe your card. It co ould be a mischief by m y fraudsters to withdra cash fr s aw rom your a account aft you lea the AT in a hu A bit of ter ave TM uff. f adhesive and a screewdriver ar all that's needed to outwit hi- re s o -tech safet gadgets. ty These swindlers are pa of a powerful inter-state art e networ spread across the country. Assam Police and rk . P d Kolkat Police have recently rounded up three swindlers ta d e s who h have masteered the tampering of ATMs. The trick t k applies only to ATM mach s A hines that need a cu ustomer to o insert and extra the car to start operation (as op- act rd t ns - posed to ATMs where the card pops out after the s t e transa ction is complete). Many n nationalize banks, ed , includi ng SBI an Bank of Baroda, use this system at nd o t their ATM most of which are unmanne d. Ms, So, what is this low w-tech, highly effec ctive modu operand Frauds us di? sters, who generally y strike in p pairs, enter ATM by swiping va lid debit ca at the gate, press down a key on ke- r s ard g s k - yboard an stick it with adhe nd esive so th it does not retur to its or hat s rn riginal pos sition. This s switches on the ma achine. The then w ey walk out an wait for a victim t step into the trap! nd to o ! When a c customer e enters the ATM and swipes the card, he does not realize tha the ma- e at - chine is aalready on. A message flashes for him to key his PIN, which he does. But since . s o P h e the mach hine has been swi itched on in an im mproper way, the screen go w oes blank k automatic cally as a s security fea ature to sto fraudule withdrawals. op ent The custoomer thinks it is a system fault and gives it a secon try. He has no clu that the s s nd ue e two 'custo omers' gettting impatient outside are actually criminals waiting to steal his money. e g h . They start abusing h for tak t him king too mu time and force him to leav in a huff Exit cus- uch a h ve f. - tomer, ennter fraudstter. They simply use a screwd s e driver to 're elease' the key. The ATM res- e - tarts automatically. What it ha in store is PIN of the last customer w as e who swiped his card. d . The gang enters the amount and walks o with ca e a out ash. The SBI h been r has receiving several suc complaints. "We were at a lo to loca the fra- ch w oss ate - ud becaus the CCT showe the cus se TVs ed stomer swip ping his ca But cu ard. ustomers complained d that they c couldn't withdraw mooney," an S official said. SBI Times of India, New Delhi Edition
  • 10. Suggestions & feedback ma be sent to us on e-mail: sb ay t btyagi1958 8@gmail.c com P.S. - If y you don't like to receive ou newsle t r ur etter, we apologize for bothe a ering you. . Please le us know your ma address and we will move it out fro our co et w ail s e om ontact list, , thank you u!