Micro-Scholarship, What it is, How can it help me.pdf
Â
ICSSM Newsletter Dec11
1. New
wslette Dec
er: cember 2011
r
Letâs profe
âs ession
nalize the pro
t ofessio
onalsâŠ
âŠ
http://w
www.wix.com/
/sbtyagi/iciss
s
The most ess
e sential qu
uality, whic we hav but ign
ch ve nored, is the power
t r
of o
observatio
on.
We see but we donât ob
w bserve. Observation is not ju seeing thing but
n ust t
und
derstandin the im
ng mplication of wh
ns hat we see. So effective e
observatiion of wh goes on around us is a very impo
hat o d v ortant requ uirement for better
r
security sense. W
Wherever you are, b it at ho
y be ome or ouutside in a public place look
p k
around and try and see through thing rather th just see them.
d gs han s
Try and ggauge the need for a thing to be present at a particular p
e o p place, for a person
r n
to be sta
anding at a particula place. D
ar Donât igno anything that s
ore seems unu usual. Pry
y
harder an you wil come ou with sur
nd ll ut rprising re
esults. Ma observ
ake vation a habit.
Capt S B Tyagii
For ICISS
S
Digitally signed by Capt SB Tyagi, COAS'CC
DN: cn=Capt SB Tyagi, COAS'CC, o=International
Council of Security & Safety Management, ou=Co-
founder, email=sbtyagi1958@gmail.com, c=IN
Date: 2011.12.01 14:05:06 +05'30'
2. Before my joining as a Security Executive, I served as a Commissioned Officer with the
Indian Army. During my service, I got the opportunity of deployment at Indo-Bangladesh
border, Indo-Pakistan border, Indo-Myanmar border and Indo-China border. These ground
scenarios taught me to define security as protecting the political and physical integrity of
sovereign nations like that of our country.
In its traditional form, security is centered on the preservation of the sovereign state from
external threats and the activities of other states. It thus requires internationally recognized
boundaries protected if necessary by military action, prohibition of the use of force
between states and non-intervention in the affairs of other states. Under the UN Charter,
individual state security is supported by collective security. The Security Councilâs primary
responsibility is to maintain international peace and security. The Security Council can
authorize the use of all necessary means in response to a breach of the peace, threat to
the peace or act of aggression. The âcollective securityâ is defined simply as the Security
Council, rather than as any broader community of states or other interests. The veto
ensures the agreement of the five permanent members in any such collective action and is
thus a safeguard against contested action. The decision to use the veto is political. Well,
these were my learning when I was trained in the Officersâ Training Academy of Indian
Army and thereafter serving at International Borders of our nation.
But soon after I joined my new assignment, I saw and learnt a different aspect of security.
Though we name it as Industrial security, but it can always be seen in conjunction with
Human Security. This includes almost everything from Infrastructure, Installation,
Perimeter, Access control, Township security to all sorts of employee insecurities and so
on and so forth.
Coming to the International security it is assumed that the action of one or more states that
threatens the security of other state(s). This means that less attention has been paid to the
role of non-state actors, such as terrorists, extremists, in generating insecurity. However in
the context of terrorism this has now changed. For example post 9/11; the UN Security
Council recognized terrorist acts as constituting a threat to international security.
Human security denotes individual freedom from basic insecurities, whatever the root of
that insecurity may be. It is also caused by internal conflict, by collapse of state institutions
and vital installations like that of ours. It also emanates from violence and abusive actions
by non-state actors like the present day scenario of Terrorism and Naxalism. Human
insecurity is also caused by violations of economic and social rights such as the right to
food, health and housing, as well as civil and political rights such as fearing torture,
deprivation of life and liberty. However although denial of human rights contributes to
human insecurity and human insecurity generates further violations of human rights, it is a
wider concept than human rights. It encompasses physical security, economic security,
legal security, political security, food security, gender security and relational security.
Human security is perhaps best summarized by the inclusion of âfreedom from fearâ and
âfreedom from wantâ among the four freedoms proclaimed by President Roosevelt during
World War Two. The Report on the Commission on Human Security, May 2005 added that
it also includes the freedom to take action on one's own behalf, which is the enjoyment of
3. autonomy and self-esteem. Human security thus goes beyond and supplements
y d s
internation security
nal y.
Human se ecurity does not depend upon internatio
n onal lawâs distinction betwee conflict,
ns en ,
military acction, inter
rnal affairs and polic action. In so-calle post-co
s ce ed onflict situa
ations, the
e
forms of vviolence typpically mut tate from c
conflicts lik bombing military attacks into criminal
ke gs, l
violence like murd der, lootinng, abduc ctions, kid dnappings, corruptio
, on, armed crimes,
d ,
organized crime etc Where the state government cannot guarantee security within the
d c. e e
state, oth actors may assu
her ume that r responsibil xample an occupying army or
lity, for ex g r
internation peacek
nal keepers lik Indian A
ke Army is doi Peace-
ing -keeping in Lebanon Somalia,
n n, ,
Congo etc Howeve such bod
c. er dies tend to perceive security within state security terms or in
o e w e t n
terms of the security of their own forc ces rather than in that of the human security of
r t e s f
civilians w
within the s
state.
To summ marize we can say that securiity in any form or at any lev does not have a
t a vel
measuring yard and the threat cannot be calculate correctly Hence t task of a security
g d e ed y. the y
man at a any level is importa and ch
ant hallenging. But when the sec
. curity meaasures aree
practiced by one an all, it gives confid
nd dence to security professional s to make sure that
s e t
security is for everyb
s body!
Som ste yo ca take while tra nsact
me eps ou an ting
onlin to e
ne ensur sec
re curity
While all b
banks hav made all efforts to ensure se
ve o ecurity for the custom
merâs inter
rest, listed
below are some tips to ensure maximum security:
e s e m
ï· Ch hange your HPIN after your firs login and change it at least o
st d t once a mon
nth
ï· Ch hange you HPIN after you access Citibank On
ur a nline Intern Banking using
net
sha ared PCs
ï· De estroy the HPIN mailer after meemorizing it
ï· Ke eep your HPIN a secret an don't disclose it to anyon (includ
nd d t ne ding bank
emmployees)
ï· Do not write the HPIN on your A
o e ATM/Debit Card or Citibank Cre Card.
edit
ï· Do not hand over your ATM/Deb Card or Credit Car to anyon
o d r bit rd ne.
ï· Do not use common names as HPINs - choose passwords that are difficult for
o s d
othhers to gue
ess
ï· Use a differe passw
ent word for ea of your accounts.
ach
ï· Use both let tters and numbers a a combination of lower cas and capital letters
n and f se
if th passwo
he ords or HPI
INS are ca sensitiv
ase ve
ï· If y
you believ that so
ve omeone is trying to commit fraud by pretending to be a
s o g
conncerned b banksâ bussiness ass
sociate and such ac ctivities ra
aise doubts, please
conntact the co
oncerned bank imme
b ediately.
ï· Be alert for scam e-m
e mails. The
ese are de esigned to trick you into downnloading a
viru or jumping to a fra
us audulent w
website and disclosing sensitive informatio
d g e on.
4. ï· Be
eware! Pho "look alike" webs
ony a sites are designed to trick con
d nsumers and collect
you persona information. Make s
ur al sure that websites on which yo transact business
w n ou t
pos privacy a security stateme
st and ents and reeview them carefully.
m
ï· Verify the ad ddress of every web bsite, know as the URL.
wn
ï· Ma sure th the UR you wa appea in the "address" or "locat
ake hat RL ant ars " " tion" box
on your bro owser window. So ome websites may appear to be legiti
o imate but
act
tually are ccounterfeits Take a f
s. few extra seconds an type the URL your
s nd e rself.
ï· Do
on't reply to any e- -mail that requests your personal inf
s formation. Be very
sus
spicious o any bus
of siness or person who asks for your p
w f password, passport
dettails, other banks det
r tails or som other highly sensitive inform
me mation.
ï· Oppen e-mails only when you know the sender. Be espec
w e cially care
eful about
opeening an e e-mail with an attach hment. Eve a friend may acciidentally se an e-
en d end
ma with a virus.
ail
Many e-ccommerce websites utilize state-of-th
e s he-art enccryption a
and other security
procedure to give y a conv
es you venient and secure shopping an banking experienc
d nd g ce.
ï· If y
you suspe a webs is not w
ect site rports to be leave the site. Do not follow
what it pur e, e
any of the ins
y structions it may pres sent you.
ï· Ask yourself if the inf formation you are asked to provide m
a p makes sens for the
se
acttivity you a engage in. For e
are ed example, an online auction site should not ask for
a a e n
you driver's license nu
ur umber or th PIN for your credi card. If a site or e-
he it -mail asks
for informatio that doe
on esn't feel rig do not respond.
ght, t
ï· Keeep a Paper Trial. Print out th "addres of the company site you are on-itâs
P he ss" a
Uniform Reso ource Loca ator (URL) The URL ensures that you a dealing with the
). are g
righ compan It's als a good idea to print out a copy of your order and
ht ny. so d t o
connfirmation number for your reco ords.
ï· Look for the padlock symbol a the bott
e at tom right of a web page to ensure the
e
site is running in secure mode BE
e g e EFORE you input sen
u nsitive inforrmation.
ï· Maake sure y your hom compu ter has th most current an
me he c nti-virus software.
s
Ant ti-virus sofftware needs frequen updates to guard against new viruses.
nt a w
ï· Insstall a personal firewall to he preven unautho
elp nt orized acc cess to yo home
our
commputer, es specially if you conne through a cable or DSL mo
f ect h o odem.
ï· Log off. Do not just close your browser. Follow the secure a
e area exit instructions
to e
ensure you protectio
ur on.
ï· Do not kee computers onlin when not in use. Either shut the off or
o ep ne r em
phyysically dissconnect th hem from I nternet connection.
ï· Moonitor you transac
ur ctions. Re eview your order co
r onfirmation credit card, and
ns, c
ban stateme
nk ents as so oon as you receive them to make sure that you are being
u m
chaarged only for transactions you made. Immediately report any irregularit
y u y ties.
ï· Reegularly do ownload security pa
s atches from your sof ftware ven dors.
5. The Supe Trackstic is the perfect too l for individ
er ck p duals, law enforceme and go
ent overnment t
agencies looking for a way to track anyt
thing that moves. Th Super T
he Trackstick records its
r s
own location, time, d
date, spee heading altitude and tempe
ed, g, a erature at p
preset inter
rvals. With
h
over 4Mb of memor it can st
ry, tore month of travel informatio
hs on.
The inclu
uded magn netic mount makes the Supe Trackstick
er
attach and remove from any metal surface. It has
easy to a d h
seamless integration into Google Earthâą
n âą
orks
How it wo
The Sup per Tracks
stick receives signa als from twenty fo
our
satellites orbiting the earth With this infor
h. rmation, the
t
Trackstick Pro ca precise
k an ely calcula
ate its own positi
o ion
anywhere on the pla
e anet to with fifteen meters.
hin
Where it w
works
The Supe Trackstic will wor anywhe re on the planet Ear
er ck rk rth.
oute travelled can be viewed and
Your exac location and the ro
ct e a
played ba ack direct within Google E
tly Earthâą. Everything is
E
included a there a no mon
and are nthly fees.
Applications / Feat
tures
ï· Proofessional GPS
loc
cation Recoorder
ï· Vehicle location and
rou historie
ute es
ï· Package / coontainer
shipment hist tory
ï· Emmployee an nd
vehhicle monittoring
ï· Mileage recording
and verificatio
d on
ï· Hoomeland Se ecurity
ï· Search and R Rescue
ï· Military Operaations
ï· Priv
vate Invesstigation
ï· Public Safetyy
ï· Law Enforcem
w ment
ï· Child / Family Safety
y
Rou record ed with Super Trackstick in B
ute Burbank, California
a
6. In retail m
marketing, sshrinkage is a proble faced by the secu
em b urity profes
ssional wor over on
rld n
daily basi Loss p
is. prevention is one criiterion use by the managem
ed ment to evaluate the e
effectiveness of the security profession
e nals hired by them. Certain chheck list th
herefore in
n
order whic can be used for performanc management of se
ch ce ecurity proffessionals. Following
g
factors mi ight be helpful to do the same -
t
Managem ments reco
orded a 75 improv
5% vement he ere, attribu
uting this t training support,
to g, ,
targets giv to offic
ven cers and th change of attitude.
heir e
Although the actual unknow losses measure during the trial did not show an
wn s ed n
improvem ment, Mana agements were impr ressed with the officcersâ desire and kno
e owledge too
assist in r
reducing su losses The surv recorde a 119% improvem
uch s. vey ed % ment in awaareness of
f
store lossses, and a 4
46% impro
ovement in security officersâ ability to redu stock losses.
n o uce
This show wed an 80% improveement, wit 11 store recordin improve net loss during
th es ng ed ses g
the trial. M
Managemeents are no involvin officers at till-focu
ow ng used meetiings, and sharing all
s l
data.
Overall, thhere was a 30% improvement, with Mana agements rating the service âsa
atisfactoryâ
â
prior to the training a âvery goodâ or âex
and g xcellentâ af
fterwards.
By helping security officers to understa
o and basic manageme skills a
m ent and the rud
diments of
f
loss prevention, the were th
ey hen able t commu
to unicate mo effectiv
ore vely with managers.
m .
There wa a measured 55% improvem
as ment here. However, it was re
ecognized that some e
officers were still str
ruggling an would n eed extra assistance
nd e.
Managemments rated officers as valuab membe of the store team recording a 45%
d ble ers m, %
improvem
ment.
Managem ments believed that offficers had consisten helped to raise se
d ntly ecurity awareness inn
their store and sig
es gnificantly improved o
i overall sec
curity, with many off
h ficers atten
nding staff
f
7. meetings and help ping staff to under rstand ho they could help improve security.
ow c p e .
Managem ments were also impr
e ressed with the way in which officers car
h o rried out th duties,
heir ,
and with t
their personal commi itment to th manage and stor
he er re.
hese results â taken together with the quantitative data â d
Overall, th n r demonstra that by
ate y
training oofficers on loss prevention there is a measu urable im provement in their r
performan that ad value to the secu
nce dds t urity guardi role and justifies client expe
ing enditure.
Although security is typically viewed as a drain on the bottom line, the re are man ways in
v m ny n
which it can â and often does â ad value to the hos busines Modern security
d dd t st ss. y
managem ment should envision security a integral to all act
d n as tivities with the org
hin ganization,
and not as a separa function âliving life on the ed
s ate n e dgeâ.
The value of securit can be loosely cat
e ty tegorized into hard and soft be
a enefits. Har benefits
rd s
pertain to the quantifiable aspects of s
o security, an can usu
nd ually be de
escribed in financiall
terminolog Soft be
gy. enefits are equally im
mportant, but are som
b mewhat mo qualita
ore ative. They
y
describe t more in
the ntangible benefits of security.
b
Ultimately the secu
y, urity sector desperat
tely needs to develo a strate
s op egy â both internally
h y
and exterrnally-led â that will cement iits rightful place at the top o the orga
l of anizational
l
agenda. T That strate
egy must be holisti c, take ac ccount of each and every threat to all
d l
organizati
ional proceesses and be comple etely aligne with cor
ed rporate obj ectives.
Employee Theft fro
e om a retai store is a term that is use when an employ
il s t ed yee steals
s
merchanddise, food, cash, or supplies w
s while on th job. How
he wever, in tthe eyes of the law,
o ,
employee theft is ju theftâŠt
ust the elemen of the crime are identical. T commit theft, the
nts To t e
employee must âint tendâ to permanently deprive their employer of th value of the item
p y he o m
stolen.
Employee theft can occur ju like sh
e n ust hoplifting by concealing merch
b handise in a purse,
n ,
pocket, or bag and removing it from the store. It can also oc
r e c ccur by ste
ealing cash allowing
h, g
others to steal merchandise, eating fo
, ood, and by refund, credit ca
b ard, or check fraud. .
Employee theft can sometime be char
e es rged as em mbezzlemen due to t
nt the trusted fiduciary
d y
status of the emplo
oyee. All of these me
f ethods lead to loss of inventor (shrinkage) and/or
d o ry r
profit for the merch
hant. Employee thef is an insidious cr
ft rime becauuse the merchant is s
paying a w benefits to the thief o n top of pa
wage and b aying for th cost of t
he their dishonestly.
In Europe ean countr ries where the retail
e ling busine
ess has already see the boo and is
en om s
stabilized relatively, the Retail loss prev
vention is a professio
onal divers
sification of security
o y
professionnals that is responsible for re educing invventory los
sses inside retail sto
e ores. Losss
prevention professionals ma
n anage in-s tore security programs that focus on reducing g
inventory losses du to employee theft shoplifting, fraud, vendor th
ue t, heft, and accounting
a g
errors.
Like other in the se
rs ecurity ind
dustry, reta loss pre
ail evention prrofessiona ls must int
teract with
h
store pers
sonnel and store cust
d tomers wh hen dishonestly or carelessness occurs. As you can
s A n
8. imagine, a
accusing ssomeone of dishones stly or care
elessness is not a sm
mall matter and must
r t
be done w
with the utm
most care and profess
a sionalism.
In India to this tren is sure to set-in! T
oo nd The prolife
eration of malls and m
m mega-store such as
es s
Spencerâs Wal-Mart Reliance and Big B
s, t, e Bazaars shharply focu the nee of such specialist
us ed t
security pprofessiona and for the respon from protection profession - time is now!
als nse p
Today our country is on a road to develo
r s d opment staarting many l energy ventures and critical
y a l
infrastruct
tures which will go a long way into developing our national ssecurity. Th present
he t
security situation po
ortrays a gr picture asserting the need to di-risk a safegu
rim e, g and uards such
h
assets and ventures Thus
s.
India in th year 200
he 09-2010 sppent Rs.59
9052.95 croores on ho omeland se
ecurity prot
tecting 1.2
2
billion peo
ople. The mmarket seggment of s
security sol
lutions and man gua
d arding combined was s
around US I.57 billion for 20 and the major se
S$ 010 e ectors were airports, mass tran
e nsport andd
maritime. This mark is estim
ket mated to be UD$9.7 billion by ye 2016. T Indian electronic
e b ear The c
security mmarket is gr
rowing at 23% CAGR with pote
2 R ential to gro at 40%
ow %.
The organized play
yers comp prise only 20% of th market but acco
he t ount for 80 of the
0% e
revenues and is in
ndicative that the la
arge part of the ma
arket is st untappe by the
till ed e
organized lot.
d
Indians ha been s
ave splurging huge mone on secu
h ey uring their houses an d new-found wealth,
h ,
pushing d demand fo security gadgets by over 50% to Rs 200 cr
or y 5 s1, rores. Burg
glar alarm
m
systems, video sur rveillance and door-
-phones, access con
a ntrol, wall mount air sensors, ,
motion de etectors, tw way ke fobs, W
wo- ey Wi-Fi camer wireless external siren and wristband
ra, d
transmitte are some of the ultra-sma devices that are in deman with in
ers e art s nd ncreasingly
y
affluent In
ndians.
âWhile th total s
he security market is
m
growing a the rate o 25-26%, the real
at of
estate and resident security market
tial
is almos double at almo
st ost 52%
annually,â said Dire
â ector (Sec
curity) of
Honeywel South A
ll, Asia.
The real estate s security market is
m
worth Rs1 1200 crore and the security
es e
gadgets inndustry is expecting to piggy
back on this gro owth, it is said.
Manufactu urersâ unve
eiled nearly 25 new
y
products at a security fair - IFSEC
India-2008 - that underlin
8 t nes the
demand for hom me secur rity and
automatio devices. âAlso, 30 of the
on 0%
stalls at t
the fair we visited by real
ere d
estate deevelopers aand individ
dual end uusers who wanted security an home automation
s nd a n
9. devices,â IFSEC In oordinator said. This year mo
ndia-2008 project co s ore than 280 world
2 d
leading ccompanies from 23 countries (26% more than 20 009) are llikely to be present
b t
highlightin the burg
ng geoning bu
usiness in the field of industria security management. There
o al e
would be 11,341 G Governmen and sec
nt curity profe
essional fro 43 cou
om untries in this event
t
which sho ows the siz and importance of the home security market of In
ze f m ndia.
The grow drivers of this phenomenal market ar governm
wth re ment secto corpora sectors
or, ate s
and retail and resid dential sect
tors. This market is import driv to larg extent but seeing
ven ge b g
that the iinitial India entrepr
an reneurs an corpora
nd ates who ventured in the fiel of local
ld l
manufactu uring of h hardware, system co omponents and dev
s veloping so
oftware, have been
h n
ccessful in short time others ar encoura
rather suc e, re aged to follo suit.
ow
Beware if the ATM screen goe blank a
f es after you sw
wipe your card. It co
ould be a mischief by
m y
fraudsters to withdra cash fr
s aw rom your a account aft you lea the AT in a hu A bit of
ter ave TM uff. f
adhesive and a screewdriver ar all that's needed to outwit hi-
re s o -tech safet gadgets.
ty
These swindlers are pa of a powerful inter-state
art e
networ spread across the country. Assam Police and
rk . P d
Kolkat Police have recently rounded up three swindlers
ta d e s
who h have masteered the tampering of ATMs. The trick
t k
applies only to ATM mach
s A hines that need a cu ustomer to
o
insert and extra the car to start operation (as op-
act rd t ns -
posed to ATMs where the card pops out after the
s t e
transa ction is complete). Many n nationalize banks,
ed ,
includi ng SBI an Bank of Baroda, use this system at
nd o t
their ATM most of which are unmanne d.
Ms,
So, what is this low w-tech, highly effec ctive modu operand Frauds
us di? sters, who generally y
strike in p
pairs, enter ATM by swiping va lid debit ca at the gate, press down a key on ke-
r s ard g s k -
yboard an stick it with adhe
nd esive so th it does not retur to its or
hat s rn riginal pos
sition. This
s
switches on the ma achine. The then w
ey walk out an wait for a victim t step into the trap!
nd to o !
When a c customer e enters the ATM and swipes the card, he does not realize tha the ma-
e at -
chine is aalready on. A message flashes for him to key his PIN, which he does. But since
. s o P h e
the mach hine has been swi itched on in an im mproper way, the screen go
w oes blank k
automatic cally as a s
security fea
ature to sto fraudule withdrawals.
op ent
The custoomer thinks it is a system fault and gives it a secon try. He has no clu that the
s s nd ue e
two 'custo
omers' gettting impatient outside are actually criminals waiting to steal his money.
e g h .
They start abusing h for tak
t him king too mu time and force him to leav in a huff Exit cus-
uch a h ve f. -
tomer, ennter fraudstter. They simply use a screwd
s e driver to 're
elease' the key. The ATM res-
e -
tarts automatically. What it ha in store is PIN of the last customer w
as e who swiped his card.
d .
The gang enters the amount and walks o with ca
e a out ash.
The SBI h been r
has receiving several suc complaints. "We were at a lo to loca the fra-
ch w oss ate -
ud becaus the CCT showe the cus
se TVs ed stomer swip
ping his ca But cu
ard. ustomers complained d
that they c
couldn't withdraw mooney," an S official said.
SBI Times of India, New Delhi Edition
10. Suggestions & feedback ma be sent to us on e-mail: sb
ay t btyagi1958
8@gmail.c
com
P.S. - If y
you don't like to receive ou newsle
t r ur etter, we apologize for bothe
a ering you. .
Please le us know your ma address and we will move it out fro our co
et w ail s e om ontact list,
,
thank you u!