The document discusses new full body scanning technologies being implemented in airports to screen passengers for contraband or weapons, outlining concerns about privacy, health risks from radiation exposure, and the effectiveness of the machines. It notes that former Department of Homeland Security chief Michael Chertoff advocates for the technology as a security consultant for one of the manufacturers. The document also discusses considerations for transitioning in-house alarm monitoring to a third-party provider, including identifying a transition team, determining the service provider, project planning, implementation, and continuous improvement after implementation.
1. N
Newslet
tter: Au
ugust 2
2012
Let’ prof
’s fession
nalize t pro
the ofessio
onals…
…
http://w
www.wix.com/sbtyagi/iciss
s
Over the last few y years, priso and oth securit sensitive areas hav begun u
ons her ty e ve using a dev
vice
that scan the who body fo contraba
ns ole or and. The s
scan produces an image of the skin, and will
e
show obj jects like g
guns, drugs other we
s, eapons und clothing. This pro
der ocedure is often used an
d
alternativ to whole body strip searches The devic uses a low energy x-ray or g
ve e p s. ce y gamma sou urce
to produc the imag
ce ge.
T
The draw backs to this are 1)
o e
p
privacy issuues; 2) raddiation dose to
t
the individu 3) rad
ual; diation dose to
e
t worker The nex time you go
the rs. xt u
through security at th airport, you
t he
might be told to empty y
m your
p
pockets, pu your hands over y
ut your
h
head and s stand still w
while an XX-ray
m
machine lo ooks for an nything hid
dden
u
under your clothing.
r
If this body scanning option sou
y unds
u
unappealin ng, you h have another
c
choice: an “enhance pat do
n ed own”
c
conducted by a T Transporta
ation
S
Security A Administration employyee,
w
which so
ome trav
velers h
have
d
described a quite int
as timate.
The new screening measure have be
w g es een hotly
debated, but mostl in theory Now tha in USA
ly y. at
there are nearly 24 body sc
e 44 canning ma
achines in
about 50 domestic airports, w 800 mo on the
with ore
way, passsengers are facing real-life decisions
g
about wh to do. Here’s so
hat ome inform
mation to
help you choose.
If you so
omehow m
missed the hoopla, t
e there are
two type of mac
es chines bein installe which
ng ed,
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx
2. have rais sed conce
erns about privacy, health risk and eve their ef
t ks en ffectivenes at catch
ss hing
terrorists The more controve
s. e ersial “back
kscatter” de
evices projject an X-r beam o
ray onto the boody,
creating an image displayed on a mo
d onitor view
wed in ano other room. The “mil llimeter wa
ave”
machines which are consi
s, idered les risky because th
ss hey do no use X-
ot -rays, bouunce
electromagnetic waaves off the body to p
e produce a ssimilar imag
ge.
Unlike mmetal detec
ctors, these machine can det
es tect object made w
ts with other materials, like
plastic and ceramic. But they can’t see anything hidden in
g nside your body, or detect cer
r rtain
explosivees.
What the images reveal is also uncle
ese s ear.
Mr. Kimball said that the T.S.A. us ses
filters to blur the im
mages, and the agen
d ncy
has pos sted samp ples of th kinds of
he
images s screeners see and a video of t the
screening process on its Web si
g s ite,
tsa.gov. But critic say the
cs ese samples
aren’t de etailed ennough for travelers to
judge ho explicit t
ow they are, e
especially i a
if
screener zooms in on a specific area.
r
Another concern is whether the imag
r ges
can be s saved or transmitted The T.S.A.
d.
first said this wasn possible, then la
d n’t ater
admitted the mach hines can s save photo
os,
but that this feature had be een disableed.
This kind of backtra
d acking has added to tthe
agency’s credibility problem.
s
The ma ain conceerns are how mu uch
radiation the sca anners give off (t the
manufacturers say the amo
y ount is ve ery
low), w whether t the scan nners mig ght
malfunctiion and em more ra
mit adiation th
han
they are supposed to, and wh the hea
hat alth
effects m
may be for travelers. Since there is no precedent for routin
r t nely screen
ning so m
many
people w X-rays - other tha in prison - there a a lot of unknowns.
with an ns are
Another issue is th the dev
hat vices haven’t been th horoughly t
tested. The T.S.A. (T
e Transporta
ation
Security Administra ation, USA) claims that the mac chines have been eva aluated by the Food and
y
Drug Ad on’s Center for D
dministratio Devices a and Radio ological HHealth, the Comme
e erce
Department’s National Instit tute for SStandards and Tech hnology and the Jo ohns Hopkins
Universit Applied Physics La
ty aboratory. But it is c
confirmed t
that they b
basically te
ested only one
thing - w
whether the amount o radiation emitted m
e of meets guideelines established by the Ameri
y ican
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx
3. National Standards Institute a memb
e, bership or
rganization of comp
n panies and governm
d ment
agencies
s.
But gues who was on the c
ss committee that develooped the g
guidelines for the X-r scanne
ray ers?
The repr resentative from the compan
es nies that m
make the m
machines and the D Departmen of
nt
Homelan Security among o
nd y, others. In o
other words the mac
s, chines pass a test developed in
sed d,
part, by t compa
the manufactur them an the government agency that wants to use
anies that m re nd t
them.
‘Russia T Today’ poin out an important detail bein left out of most ma
nts ng ainstream media rep ports
about th new bo
he ody scann ning devicces being rolled out in airpo orts everyw where: forrmer
Department of Homeland Se ecurity Chhief, Micha Chertof who ha been ad
ael ff, as dvocating this
technolog on any news p
gy program th hat will ha
ave him i persona
is ally profitin from t
ng their
implemen ntation. As a Security Consultant and Cha
s y airman of the Chertof Group, o of his m
ff one main
clients is Rapiscan, a manufa
, acturer of th
hese devicees.
Last year, the Depa
artment of Homeland Security a
d awarded contracts of US$160 m
f million eac to
ch
two manuufacturers of these ba
ack-scattering device one which was Ra
es, apiscan.
Beyond t issue o Chertoff''s illegal ad
the of dvertising h product on news programs by pretend
his ding
to be a p
public serva there is some de
ant, ebate about the safety of these new Back-
y -scatter X-Ray
Body Sca anning devvices.
One form intellige
mer ence agent and prese
t ent-day security conssultant, Wa
ayne Simmmons, says that
while the device is an excellent tool, "T
e s There is no dose of backscatte ionizing radiation that
er
has ever been prov safe," a that he would pre to see only passengers wh are deem
r ven and e efer e ho med
to be sus
spicious go
oing throug these de
gh evices, with the bulk going through the metal detect
h tors,
with whic we've al become a
ch ll accustome ed.
John W
Wayne's Five R
s Rules
1. Money can't buy happine but it’s more com
y y ess s mfortable to cry in a
Mercede than on a bicycle
es n e.
2. Forgiv your en
ve nemy but r
remember the basta
r ard's name
e.
3. Help s
someone w
when they are in tro
y remember you when they're in
ouble and they will r n n
trouble a
again.
4. Many people ar alive only because it’s illegal to shoo them.
re ot
5. Alcohol does no solve any problem but th again, neither do milk.
ot ms, hen oes
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx
4. By Capt G Ra Kumar
aj
The alar monitor
rm ring and r response is very co omplex and tedious function of Secur
d s rity
Managem ment. Fraught with False Alarms and resource
h e-mobilizat tion, alarm monitor
m ring
also me eans that systems need to b consta be antly upgr raded and procedures check
d ked.
There is also need to constantly aud the efficacy of th system return-o
s d dit he m, on-investmment
and the integrity of the data for very
e y
efficient alarm monitorin ng. Since all Ca G Raj Kumar is ICISS C
e apt Councilor for
these ac ctivities occupy lot attention and An ndhra Prad desh.
priorities of th
s he organ nizations, the
forward looking managem ments sta arted He has tota 25 year of expe
e al rs erience out of
off-loadiing these activiti
e ies to t third- wh hich he ser rved 14 years in the A Armed For rces
parties – specialis in the fie This t
st eld. turns and rest 11 years in the indu
n ustry. He has
out to be cos effectiv
st ve and very unique dist tinction o of
dependa able optio which enhances the serving in Air forces a
on s as
level of ssecurity p
preparedne ess. we as in A
ell Army. Whil le
in Armed For rces he haas
Spearhe eading this phenom
s menon are few be
e een extensivelly
security agencies who hav establis
s ve shed inv volved in Counte
n er
their Cen ntral Moniitoring Staations in ccities Ins surgency O Operations. .
all over These centers cater to big
r.
offices, industries as well as individual He holds degree o
s e of
resident ts who wish to avail their MB (HRD) from Ran
o BA ni
services Large in
s. ndustries a in pro
are ocess Du urgavati University
y,
of gettin third pa
ng arty monitoring serv vices Jabalpur. Pre esently he is pursuin a Ph. D in
e ng
and the process seeks our well laid d-out Pe ersonnel M Manageme ent. At p present he is
e
strategiees. woorking in G GAIL and p posted at V Vizag, And
dhra
Praadesh.
A monito oring centter must provide tim mely,
A keen sp ports enth husiast, he represe ents
consistennt, high-qquality ser rvices utilizing
Anndhra Prad desh Badm minton Tea am. Previously
state-of-t
the-art technology to customer 24
o rs
he has pla
e ayed in b badminton tourname ents
hours a dday, 365 days a year Keeping pace
r.
conducted by Petroleum Sports Control Bo
y oard
with the change
e es in technology and
of India.
maintaini ing alarm system data inte
m egrity
were crucial to mai intaining go of prov
oal viding He can be re
e eached at grajkumar r@gail.co.in or
n
best-in-class alarm monitori
m ing service In on his Mobile number - 78936016
e. e 699.
addition to equipm ment need ded, enhan ncing
alarm da integrity is also n
ata y necessary to ensure the highes level of security is continuously
st s
maintaine The p
ed. planning phase may include f
y five critica elements which w
al s would beco ome
foundatio to succe
on essfully connvert in-house alarm monitoring platform t a third-p
g to party suppli
ier:
- ransition te
Tr eam identifi
ication
- Deecision pro
ocess to de
etermine th service p
he provider
- Pr
roject plannning
- Im
mplementat tion
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx
5. - Post implementation (continuous improvement)
Transition Team
To successfully convert alarm monitoring to a third-party supplier, a transition team of
customer-focused leaders may be selected to design, analyze, and implement the alarm
monitoring transition project. In addition to loss prevention, transition team is to include
stakeholders from the following departments: procurement, finance, business unit leaders, IT,
real estate, legal, facilities, and operations etc. This team must meet regularly, defining the
objectives, building success criteria, creating performance metrics, and representing the
organization to ensure a seamless transition of alarm monitoring.
Any plan for the alarm monitoring transition may include:
- Understand the buy – interview stakeholders
- Establish operating procedures for supplier
- Develop draft scope of work for review by stakeholders
- Present sourcing strategy (scope of work, list of suppliers, and timeline)
- Develop, distribute, and analyze request for information
- Complete supplier bid meetings and site visits
- Suppliers complete and return request for information
- Present request for proposal (RFP) supplier short list recommendations to stakeholders
- Analyze RFP
- Negotiate with suppliers
- Present overview to stakeholders
- Notify suppliers and stakeholders of contract award
- Execute contract
- Develop performance metrics
- Establish quarterly performance meetings to review and track performance metrics
Determining the Service Provider
Collectively, transition team needs to identify suppliers that provided the most comprehensive,
customer-focused capabilities. Criteria for a successful service provider are as following:
- Fitness to technical and functional requirements
- Total cost of ownership
- The ability to support current and emerging equipment
- Industry reputation and experience
- Experience and qualifications of the company and resources
- Quality assurance commitment
- Financial strength
- Proven methodologies, tools, and value added services
Sourcing decision must be based on the “best value/total cost” principle. While cost remains a
critical decision factor, the quality of the equipment, and operating efficiencies would be the
primary and most critical aspects.
Project Planning
C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
6. A project task list can be created to identify key issues that can affect the overall project and
allow assignment of tasks. Tasks can be assigned milestones in the project file to help balance
workload for project planning. Clear communication, precise operating procedures, and
partnership with selected solutions provider are the building blocks of our transition plan.
Implementation
Converting alarm system monitoring, whether from in-house to third party or third party to in-
house, requires absolute understanding of a defined scope of work. To implement the alarm
system monitoring change, the data from the existing monitoring facility can be gathered and
scrubbed to determine its accuracy and freshness. The data then need to be formatted in order
to be inserted into new monitoring systems and reviewed again for accuracy. Once all data is
in place in new monitoring systems, the stage is set to develop the schedule for the change-
over.
Post Implementation – Continuous Improvement
The alarm monitoring conversion from proprietary monitoring platform to the Third party
Monitoring Center has to be a seamless, successful event. Metrics need to be assigned to all
the alarms and responses. Each metric was assigned a target goal, for example 90 percent of
burglar alarms within 60 seconds. To ensure continuous improvement, it is advisable to
develop quarterly performance business reviews. Business reviews provide the avenue to
assess performance metrics, identify opportunities to strengthen partnership, and continue to
focus on achieving both organizations’ internal and external goals.
A monitoring center must provide timely, consistent, high-quality services utilizing state-of-the-
art technology to customers 24 hours a day, 365 days a year. Keeping pace with the changes
in technology and maintaining alarm system data integrity were crucial to maintaining goal of
providing best-in-class alarm monitoring service.
In addition to equipment needed, enhancing alarm data integrity is also necessary to ensure
the highest level of security is continuously maintained. The planning phase may include five
critical elements which would become foundation to successfully convert in-house alarm
monitoring platform to a third-party supplier:
- Transition team identification
- Decision process to determine the service provider
- Project planning
- Implementation
- Post implementation (continuous improvement)
Transition Team
To successfully convert alarm monitoring to a third-party supplier, a transition team of
customer-focused leaders may be selected to design, analyze, and implement the alarm
monitoring transition project. In addition to loss prevention, transition team is to include
stakeholders from the following departments: procurement, finance, business unit leaders, IT,
real estate, legal, facilities, and operations etc. This team must meet regularly, defining the
C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
7. objectives, building success criteria, creating performance metrics, and representing the
organization to ensure a seamless transition of alarm monitoring.
Any plan for the alarm monitoring transition may include:
- Understand the buy – interview stakeholders
- Establish operating procedures for supplier
- Develop draft scope of work for review by stakeholders
- Present sourcing strategy (scope of work, list of suppliers, and timeline)
- Develop, distribute, and analyze request for information
- Complete supplier bid meetings and site visits
- Suppliers complete and return request for information
- Present request for proposal (RFP) supplier short list recommendations to stakeholders
- Analyze RFP
- Negotiate with suppliers
- Present overview to stakeholders
- Notify suppliers and stakeholders of contract award
- Execute contract
- Develop performance metrics
- Establish quarterly performance meetings to review and track performance metrics
Determining the Service Provider
Collectively, transition team needs to identify suppliers that provided the most comprehensive,
customer-focused capabilities. Criteria for a successful service provider are as following:
- Fitness to technical and functional requirements
- Total cost of ownership
- The ability to support current and emerging equipment
- Industry reputation and experience
- Experience and qualifications of the company and resources
- Quality assurance commitment
- Financial strength
- Proven methodologies, tools, and value added services
Sourcing decision must be based on the “best value/total cost” principle. While cost remains a
critical decision factor, the quality of the equipment, and operating efficiencies would be the
primary and most critical aspects.
Project Planning
A project task list can be created to identify key issues that can affect the overall project and
allow assignment of tasks. Tasks can be assigned milestones in the project file to help balance
workload for project planning. Clear communication, precise operating procedures, and
partnership with selected solutions provider are the building blocks of our transition plan.
Implementation
C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
8. Convertin alarm s
ng system mo onitoring, wwhether from in-house to third p
e party or thi party to in-
ird o
house, reequires abbsolute undderstanding of a defined scope of work. To implem
g e ment the alarm
system mmonitoring change, th data fro the exis
he om toring facility can be gathered and
sting monit
scrubbed to determ
d mine its acccuracy and freshness. The data then need to be form
d matted in order
to be ins
serted into new monit toring syste
ems and reeviewed ag ccuracy. Once all dat is
gain for ac ta
in place in new mo onitoring sy
ystems, the stage is set to dev
e velop the sschedule fo the chan
or nge-
over.
Post Imp
plementation – Cont
tinuous Im
mproveme
ent
The alar monitoring conve
rm ersion from propriet
m tary monito
oring platf
form to the Third p
party
Monitorin Center has to be a seamles success event. Metrics ne to be a
ng ss, sful eed assigned to all
o
the alarm and responses. Ea metric was assig
ms ach c gned a targ goal, fo example 90 percen of
get or e nt
burglar a
alarms within 60 seco
onds.
To ensur continuo improv
re ous vement, it is advisable to develo quarterl performa
e op ly ance busin ness
reviews. Business reviews provide th avenue to asse
he e ess perform
mance me etrics, iden
ntify
opportunnities to stre
engthen pa
artnership, and contin to focu on achie
nue us eving both organizatio
ons’
internal a externa goals.
and al
CCTV systems have on ne
fundameental flaw – despite
putting u large numbers of
up
cameras to ma aximize the
coverage of an area, w
e we
seldom hhave anybbody actua
ally
looking a much of the area f
at f for
which we are respo
e onsible.
Sure, we can alwa go ba
e ays ack
and look at what ha
appened, b
but
many tim this jus is not goo
mes st od
enough. It is a problem of
logistics and econoomics. We cannot s
e staff the co
ontrol room with eno
m ough people to view the
number o cameras we have available. So we have many of these c
of s e cameras' v
views going to
g
waste wh it may be useful t view the
hen to em.
To make it worse, much of what is dis
e splayed on monitors will be un
n s neventful, or sometim
mes
even hav content that is irre
ve elevant to t risk pr
the rofile of the site. This problem o coverag is
e s of ge
not likely to go awa soon. H
y ay However, thhere are te
echnologies being imp
s plemented now or in the
near futu that will change th risk cove
ure he erage by C
CCTV signif ficantly.
Intelligen technology that is b
nt being deve
eloped can help in a number of ways. Ce
n f entral to this is
technolog that can work with the opera in the backgroun performi intellige analysi of
gy n h ator nd ing ent is
the came views.
era
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx
9. Firstly, the c
computer ca do thing that com
an gs mputers are good at, and free th operator up
e he
to concentra on othe duties. For example where a
ate er e, automated recognition such as f
n face
ecognition or number plate rec
re r cognition c
can do the job, it fr
e rees the ooperator up to
p
oncentrate on the m
co more releva things that only people ca do. In this way it is
ant an
opptimizing th use of th system.
he he
Seecondly, bbackground sensing and alerts or alarm allow th detectio of susp
d s ms he on pect
coonditions o camera that ar not cur
on as re rrently bein viewed by the o
ng d operator. The
coomputer ca highlight these or bring thes to the operators' a
an se attention fo viewing and
or
inv
vestigation This co
n. ould includ certain types of movement or the presence of
de f e
soomebody o somethin in an area for def
or ng fined perio
ods. Through this, the coverage of
e
the cameras has been made mor efficient.
s re .
Annother option is acting as an ea warning system. In this con
arly ntext, the teechnology can
hig
ghlight con
nditions tha could potentially be suspect s
at e such as objjects left in an area; c
n cars
paarked where they sh hould not b or exc
be, cessive den
nsities of p
people in an area. T This
technology is starting to become more common with a
s advanced D DVR systems.
Potentia Areas of Developm
al f ments:
Other technologies offer sub
s bstantial pootential, but have so ome development time still to go
o
before th reach e
hey effective us Where an operato is viewin a scene and need to divert his
se. or ng e ds t
or her atttention to something else, para
g allel monitooring or tra
acking thro
ough taggin a partic
ng cular
object or person c
r could allow operators to come back to th scene later and pick up m
w s hat more
easily on the locatio and mo
n on ovement of the target Building up an infor
f t. rmation ba on targ
ase gets,
situations and beh
s, haviors to use for ris manage
sk ement and future inv vestigation is one of the
most neg glected asppects of CCCTV.
Intelligent Techno
ology:
Use of an inte elligent syystem tha at
recognize behavio and con
es or nditions can
greatly hhelp by increasing t the amoun nt
and qua ality of infformation coming in n.
Technolo can als help by simulating
ogy so y
or verifying operato performa
or ance, eithe
er
in contra asting the number of issue
e es
picked up by the intelligent s systems, oor
the inser enarios tha should be
rtion of sce at
picked u by ope
up erators and reviewing
d
them ag gainst actu detecti
ual ion scoress.
Finally, intelligent technolog can be
gy
used to eextend the normal CC CTV functio by building in alg
ons gorithms th allow th detectio of
hat he on
other thin such a fire, sm
ngs as moke, produ uction stop
ppages, ov verflows an so on th would add
nd hat
value to t CCTV function. I think the p
the potential fo intelligen analysis, sometime called vis
or nt es sual
analytics technolo
s ogy, goes far beyo ond secur rity-based CCTV to many f
o forms of risk
managem ment and m monitoring. The ques stions on ““what, wheere, when, who, why and how” will
increasinngly becom available in our data retrieval system.
me e l
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx
10. Impleme
entation Problems:
Besides the develo
opment nee that ar required to realize some of t ideas fo technolo
eds re d e the or ogy,
there are some im
e mplementation problems with th hose we already hav availabl Cry wo is
ve le. olf
when reppeated waarnings occ without foundatio Eventually, the p
cur t on. people star disregard
rt ding
the warnings and th potentia of the tec
he al chnology becomes ignored.
Use of bl lank screenn-based alarm system are a cl
ms lassic exam
mple, after 90 false alarms popp ping
up on sc creen in an hour or tw the screens often get switch off bec
wo, n hed cause they are just s
y seen
as a distrraction. We can also overload t operato with war
e the or rnings on w
what could be happen ning
so that th do not have the t
hey time to
deal with everything they are faced
h e
with. P Priority se etting in such
instances becomes importan We
s s nt.
do not wwant CCTV to be reac ctive to
only tech hnology-baased detec ction -
people a are still m
more efficient at
being proactive a and pickin up
ng
dynamics and b
s behavior. If we
prevent them g
searching for
incidents we will probably miss
s, y
some of the most importan The
f t nt.
timing of the even occurren
f nt nce, or
when we warn the operator is also
e
somethin ng that needs t to be
considere Too so may ju provide a lot of false alarms, too late m be exa
ed. oon ust may actly that - too
ally, where do we pla the warnings with the disp
late. Fina e ace hin play enviro
onment - does it beco ome
the cente of attention, or one of the tools the oper
er e rator uses.
Envisaged Improv vement in performa
n ance: Tec
chnology h
has the po
otential to deliver hig
gher
performa
ance in a nu
umber of w
ways:
Th level o work be
he of eing perfo
ormed - pe eople can concentrat on the important and
te
higgher priorit issues th need human inter
ty hat rpretation.
Th volume of covera of the system - all of thes cameras are really working - not
he e age e se s y
jus providing a mass of informa
st ation that w largely be lost and discarde Clients are
will ed.
geetting real c
capital retu on their system in
urn r nvestment. Event gen nerated alarms and viideo
monitoring a tracking helps! Privacy ensuring block
and kage of pre
e-determin areas h
ned help
grreatly in avoiding litiga
ations on b
breach-of-pprivacy rela
ated matterrs.
Th quality of results delivered This is s
he s d: surely going to provid higher security rela
g de ated
ouut-put: more things are being detected and the base is being laid for a m
g d, e d more
inttelligence a directe risk man
and ed nagement process.
In five ye
ears' time, we will fin intelligent systems on just a
nd s about every worthwhile CCTV s
y site.
However despite a the limit
r, all tations with CCTV sy
h ystems, the operator is still the key and f
e r e final
decision maker. Th right ope
he erators ma a signif
ake ficant differ
rence to th system. Operators will
he s
continue to be able to do thin that tec
e ngs chnology is unable to do and w do so fo some ye
s o will or ears
to come.
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx
11. Courtes Col D
sy: Deepak Behl
Pretty n
neat idea Never t
a! thought o it befor
of re!!
Put yo car ke besid your b at nig
our eys de bed ght
Tell your spo ouse, your children, your ne
r , eighbors, y your
pareents, your Doctor's office, and the check--out girl at the
mark everyo you run across. T them to ‘Put your car
ket, one n Tell o r
keys beside yo bed at night’. If y hear a noise outs
s our you side
your home or someone trying to get in you house, just
r ur
pres the panic button f your ca The ala
ss for ar. arm will be set
off, a the ho will con
and orn ntinue to so
ound until e
either you turn
it of or the car batte
ff ery dies. This tip c came from am
neigghborhood watch co oordinator. Next tim you co
me ome
hom for the night and you start to put you keys aw
me ur way,
think of this: It a securi alarm system that you proba
k t's ity t ably
alrea have a require no instal
ady and es llation.
Test it.
It will go off from m
most every ywhere insi your ho
ide ouse and
will keep honking u
p battery runs down or until you
until your b
reset it w the but
with tton on the key fob ch
e hain. It works if you
park in yyour drivew or gara
way age. If your car alarm goes off
r m
when som meone is trying to bre into yo house, odds are
eak our
the burglar/rapist wwon't stick around. AAfter a few seconds
all the neeighbors w be look
will king out their window to see
ws
who is out there an sure en
nd nough the criminal won't want
that. And remembe to carry your key while w
d er y ys walking to
your car in a park king lot. Th alarm c
he can work t the same
way there This is s
e. something that should really be shared wit everyone. Maybe i could sav a
d th it ve
sexual abuse crime.
life or a s
Food for th
hought
t:
If it is not already with y
s you, pr
rovably it will harm you: t
y l the
inform mation, the technolo – in short ‘The Edge’!
, ogy n t,
P.S. - If you don't like to receive our newslette we apo
er, ologize for bothering you. Ple
r g ease
let us knnow your m addre and we will mov it out fro our co
mail ess e ve om ontact list, thank youu!
Suggest
tions & fee
edback ma be sent to us on e-mail: sb
ay t btyagi1958
8@gmail.c
com
C:Userss
sbtyagiDocum
mentsICISSNews Letter Aug 12.doc
r cx