SlideShare ist ein Scribd-Unternehmen logo
1 von 10
Downloaden Sie, um offline zu lesen
New
wsletter Septe
r:
ember 2013

Let’s profes
ssiona
alize th prof
he
fession
nals…
http://www
w.wix.com/sb
btyagi/iciss

Air Commo
A
odore (Ret Jasjit Singh, one of India's leading strategic th inkers, passed away on
td)
S
y
h
Sunday, 4th August 13 He was 79.
S
3.
He was cre
H
emated at the Brar Square cre
S
emation gr
round with many ser
rving and retired officers
r
fr
rom the th
hree services prese
ent. IAF ch
hief Air Ch
hief Marsh N.A.K. Browne and other top
hal
officers laid wreaths.
o
d
Known
as
a
passion
nate
professio
onal, Jasjit Singh tau
t
ught
flying to many top air fo
o
orce
officers. He heade the Institute
ed
for
De
efence
Studies
S
and
Analyses (IDSA) for a long
s
tenure a
and after re
etirement f
from
there, se up the Centre for Air
et
r
Power S
Studies (CA
APS), the t
think
tank ded
dicated to modern and
o
futuristic air power trends. CA
c
r
APS
has don many useful studies
ne
on air po
ower strate
egic issues for
s
the India Air Forc (IAF).
an
ce
rote
or edited
an
He
wr
astonish
hing numb
ber of bo
ooks
tributed in positive to the
o
and cont
y
go-ahead f India's 1998 nuclear explos
g
for
sion, when IDSA was asked by the gove
n
ernment ab
bout
th likely in
he
nternationa implications. Both he and K. Subrahm
al
K
manyam, h is predece
essor in ID
DSA,
prodded the governm
p
e
ment to go ahead.
a
Born July 8 1934, Ja
B
8,
asjit was awarded th Vir Cha
a
he
akra for dis
splaying g allantry du
uring the 1
1971
War. As a s
W
squadron l
leader then he attac
n,
cked and destroyed many Pakis
m
stani tanks and bunk
s
kers.
He displaye determination and devotion to duty of a high order, accord
H
ed
d
ding to the citation for the
r
honour.
h
n
resident AP Abdul Kalam con
PJ
K
nferred Pad
dma Bhushan, the c
country's second highest
In 2006, pr
civilian awa on him for his co
c
ard,
m
ontributions in strateg thought.
s
gic

Capt SB TyagiCICISSSept.13
B

1
D.C. Nat IPS (Re
th,
etd.), PPM IPM
M,
About the Autho
t
or:
Mr. DC Nath is Ch Patron of Internation al Council of Security & Safety Man
C
hief
nagement. Su
uperannuate in
ed
Januar 1995, as the Special Director, Int
ry,
telligence Bu
ureau, Mr. D.C. Nath (IP
PS-1960) has been a visiting
s
faculty to a number of Institutes (like the In
s
ndian Institute of Public Administration (IIPA), Sar
e
A
n
rdar Vallabhb
bhai
Patel N
National Police Academ (SVPNPA Lal Bah
my
A),
hadur Shastr National A
ri
Academy of Administra
ation
(LBSNA and Aca
AA)
ademies, including Mana
agement Trai
ining Institute covering different asp
es,
pects of secu
urity
and ind
dustrial security managem
ment.
Winner of both the honors av
r
e
vailable in th police se
he
ervice, name Indian P
ely,
Police Medal for meritorious
l
service and the P
es
President’s Police Medal for distinguished services, and the Prime Minis
P
ster’s Silver Cup
Essay Compe
etition at the National Po
e
olice Academ in two su
my
uccessive ye
ears,
Mr. Nath had made a ver significant and highlyM
ry
t
-appreciated presentatio at
d
on
IIM Lucknow , on “Image Building for IPS Officers at the Vertical Interac
M,
s”
ction
Program for s
senior IPS off
ficers.
Recognition fo his over 40 years’ exp
R
or
4
perience and expertise in the field ca
d
ame
fro such di gnitaries in this field as the Chair
om
a
rman (Mr. Jeff M. Spiv
J
vey),
American Soc
ciety for Industrial Security (ASIS), 2007, the most recognized
m
au
uthority in th e world, who wrote, “You are well kn own to many people I talk to
o
u
y
ar
round the wo
orld. When I mention Ind and your name they either know you
dia
r
or know of you
r
u…. A good legacy.”
The author of a highly acc
f
claimed book "Intelligenc Imperative for India", Mr.
k,
ce
es
Nath earned high plaudi from all around for two of his very signific
its
cant
presentations on: “
“Revisiting th Future of India” (2005 London) and “Lessons from India for the War On
he
5,
a
s
r
Terroris
sm” (2007, USA). Know for his p rofessed tra
wn
aining ability, he is affec
,
ctionately ad
ddressed as the
“Drona
acharya” and is considere a security ideologue and as such is in demand from Corpo
ed
y
a
d
orate Houses for
s
talking to senior b
business exe
ecutives as a
also to orga
anize custom
mized trainin g courses for their secu
urity
personnel.
His nam figures in the Americ Police H of Fame, a Trust of the US Natio
me
n
can
Hall
,
t
onal Association of Chief of
fs
Police. In Decembe 2010, the Internationa Who’s Wh Historical Society incl uded his name in the 20
er
al
ho
0102011 e
d
edition of the “Internation Who’s W
e
nal
Who of Profe
essionals”. All this indeed speaks vo
A
olume about Mr.
Nath’s standing in the field of private secu
urity all over the world. Thus, in more than one sense, he is the
T
e
s
s
only on in the field, combinin the exper
ne
ng
riences of a police office with speciialization in intelligence and
er
strategic analysis a an indust
and
trial security expert par excellence.
e

er
S
ttack on th Indian Parliament on Decem
he
P
t
mber 13 or the
r
Whethe it is 9/11 in the US or the at
blasts at Bali or Istanbul, the terroris have st
t
sts
truck terror in no un mistaken terms. Th
t
hreat
percep
ption at eve level ha changed and secu
ery
as
d
urity conce
erns are no in every
ow
ybody’s mi ind
both in the government an the gen
n
nd
neral public This is good for s
c.
security industry but the
t
questio is wheth the men in securiity can deli
on
her
iver the go
oods.
ty
ofession outside the governme is not many yea old, especially in the
o
e
ent
ars
n
Securit as a pro
Asian c
continent. Private se
ecurity has made trem
s
mendous strides in th US or even in the UK
s
he
e
e
and ha numeric
as
cally overtaken the public poli in thes countrie
ice
se
es. Profes
ssionally a
also,
there a now ex
are
xperts, spe
ecializing in different aspects of security. Private security sta
n
arted
growing on scien
ntific lines in the deve
eloping cou
untries only in the ‘60 of the last century It
0s
y.
gained some mo
omentum in the last one or tw decades in Asia a
wo
s
and around but that has
d
been p
possible p
primarily because of demands of the industrial s
f
s
sector and compara
d
ative
inability of the s
y
security ag
gencies of the gover
rnment to meet the growing challenges on
s
accoun of their c
nt
commitmen to over nationa security concerns.
nts
rall
al
c
Capt SB TyagiCICISSSept.13
B

2
So, the moot question remains: how professional are those in private security, which in
most of the countries is being headed or guided by retired folks from the armed forces or
public police. Ironically, many among them, even though they had otherwise been bright,
might not have any occasion, during the course of their service career anything to deal with
security as such.
Yes, a disciplined or uniform background can be an asset but that cannot automatically lay
claim to expertise in security matters. And, then, on top of this, commercial security is
basically a lot different from government security – both in concepts and in execution.
While one can or may have to aim at optimal or absolute security system in some
government sectors, security management in the private sector will often have to balance
between the costs and the returns thereof. The good thing, however, is there are now
indications of fresh graduates joining private security directly and trying to make a career in
security as a profession. This trend deserves to be encouraged.
Conceptually, appreciation of security is, and has to be, largely subjective because too
many variable factors are to be considered before someone can arrive at a proper security
assessment. A security threat to Mr. X may not be so to Mr. Y. A security threat today may
not remain a security threat tomorrow. A security threat in a specific situation may not pose
any threat whatsoever in a different context. Then, just like an ailment is often diagnosed
differently by different medical professionals, the threat perception of a situation can vary
owing to the professional ability or expertise of the security assessor. So the debate raised
by some whether security is a vocation or a profession goes on but does not really cut ice
any longer. The issue is now settled. Security is as much a scientific profession as many
others. Threats can now be professionally analyzed and a threat assessment arrived at
according to some settled norms.
There is yet another aspect warranting professional approach. The primary aim of any
security system should be to prevent or deter mischief-makers but oftentimes breaches in
security take place in spite of elaborate arrangements. Some acts of sabotage or
subversion or of terrorism these days, particularly when perpetrated by suicide squads,
cannot indeed be prevented. So, the best thing in such circumstances is to work out in
advance plans to control damages or efficiently manage the post-incident situations.
Indeed, management of such crisis situations is a skill that security managers must develop
as a part of their professional duty. This could often be the test of professionalism of
security men.
There could, however, be some caveats in it. Many of the private security agencies do not
have training system or facilities worth the name and so professionalism in security industry
suffers. As in almost every sector even in the government, expenditure on training is
generally considered an avoidable overhead in a majority of the corporate sector as well. It
is a pitfall that has to be avoided. As a matter of fact, it is imperative that private security
practioners spend adequate time and resources on training and sincerely devote
themselves to reach and attain adequate professional knowledge and status. It is only then
they would get the recognition they are hankering for but to attain which they are often not
doing enough.
Professionalism in security is must not only for the security practioners but also for the
security and safety of all those they are obliged to serve and protect.
Capt SB TyagiCICISSSept.13

3
It has im
mmense potential for security a
r
application
ns!
Resear
rchers at th Georgia Institute o Technology want to put your signature up in ligh -he
a
of
t
r
e
hts
tiny lig
ghts, that is. Using thousand of nan
g
ds
nometre-sc
cale wires , the rese
earchers h
have
developed a sen
nsor devic that con
ce
nverts me
echanical pressure - from a signature o a
p
s
or
fingerp
print -- direc into lig signals that can be captured and proc
ctly
ght
s
b
d
cessed opti
ically.
The sen
nsor device could prov
e
vide an artif
ficial sense
of touch offering s
h,
sensitivity comparable to that of
c
e
the hum skin. B
man
Beyond colle
ecting signa
atures and
fingerpr
rints, the te
echnique co
ould also b used in
be
biologic
cal imaging and mic
g
cro-electrom
mechanical
(MEMS systems. Ultimately it could provide a
S)
y,
new approach for h
human-mac
chine interfa
aces.
"You ca write wit your pen and the s
an
th
n
sensor will
optically detect wh you write at high resolution
y
hat
and with a very fas response rate," said Zhong Lin
st
Wang, Regents' professor an Hightowe Chair in
nd
er
the Sch
hool of Mat
terials Science and E ngineering
at Geo
orgia Tech. "This is a new pr
.
rinciple for
imaging force tha uses pa
g
at
arallel dete
ection and
avoids many of the comp
plications o existing
of
pressur sensors."
re
"
Individu zinc oxid (ZnO) na
ual
de
anowires th at are part
of the d
device oper
rate as tiny light emitt ing diodes
y
(LEDS) when placed under strain from the
)
mechan
nical press
sure, allow
wing the device to
provide detailed in
e
nformation about the amount of
pressur
re being applied. Known a
as piezophototro
onics, the t
technology -- first des
scribed by
Wang i 2009 -- provides a new way to capture
in
informa
ation about pressure applied at very high
resolution: up to 6,
,300 dots pe inch.
er
The re
esearch wa scheduled to be reported
as
e
August 11 in the j
journal Natu Photon
ure
nics. It was
sponsored by the U.S. Dep
e
partment of Energy's
f
Office of Basic E
Energy Sciences, the National
e
Science Founda
e
ation, and the K
d
Knowledge
Innovat
tion Program of the Chinese Ac
C
cademy of
Science
es.

This sch
hematic sho
ows a devi
ice for ima
aging
pressure distribution by the pi
e
n
iezo-phototr
ronic
effect. Th illustratio shows a nanowirehe
on
-LED
based pressure sen
nsor array before (a) and
after (b) applying a compres
ssive strain A
n.
convex character pattern, su
uch as "ABC,"
molded on a sapph
hire substr
rate, is use to
ed
apply the pressure pattern on the top of the
e
n
f
indium-tin oxide (
(ITO) elec
ctrode. (Cr
redit:
Courtesy of Zhong L Wang)
y
Lin

Piezoelectric mate
erials generate a cha
arge polariz
zation when they are placed under strain. The
n
piezo-p
phototronic d
devices rely on that ph
y
hysical princ
ciple to tune and contro the charg transport and
e
ol
ge
t
recomb
bination by t polariza
the
ation charge present at the ends of individua nanowires Grown at a
es
a
al
s.
top
gallium nitride (Ga film, the nanowires create pix
aN)
e
s
xeled light-e
emitters wh
hose output varies with the
h
pressur creating an electro
re,
oluminescen signal that can be integrated w
nt
with on-chip photonics for
s
data tra
ansmission, processing and record
g
ding.
under strain you creat a piezoellectric charg at both e
n,
te
ge
ends
"When you have a zinc oxide nanowire u
which f
forms a piez
zoelectric potential," W
p
Wang explained. "The presence o the poten
of
ntial distorts the
s

Capt SB TyagiCICISSSept.13
B

4
band st
tructure in t wire, causing elect rons to rem
the
main in the p-n junction longer and enhancing the
p
n
d
g
efficienc of the LE
cy
ED."
The effi
iciency incr
rease in the LED is pro
e
oportional to the strain created. Diifferences in the amount of
o
n
strain a
applied trans
slate to differences in light emitte from the root where the nanow
ed
wires contac the
ct
gallium nitride film. To fabrica the dev ices, a lowate
-temperatur chemicall growth tec
re
chnique is u
used
to creat a patterned array of zinc oxide nanowires on a gallium nitride thiin film subs
te
m
strate with th che
axis po
ointing upwa
ard. The interfaces be
etween the nanowires and the ga
allium nitrid film form the
de
m
bottom surfaces of the nanow
f
wires.
Story So
ource:
The abo story is b
ove
based on mat
terials provid by Georg Institute of Technol
ded
gia
e
logy, via New
wswise. The
original a
article was w
written by Joh Toon.
hn
Journal Reference:
l
Caofeng Pan, Lin Do
g
ong, Guang Zhu, Simiao Niu, Ruome Yu, Qing Yang, Ying Liu, Zhong Lin Wang. Hi
Z
eng
L
ighresoluti
ion electrolu
uminescent imaging of pressure di
istribution using a piez
u
zoelectric na
anowire LED
D
array. N
Nature Photonics, 2013; DOI: 10.1038
D
8/nphoton.20
013.191

The In
ncident Managemen System can stre
nt
m
eamline th fragme
he
ented way we use to
ys
e
deal w
with challenges.

V. Bala
achandr
ran
The author is a for
rmer Spec Secreta Cabine Secretar
cial
ary,
et
riat
www.sun
nday-guardian
n.com/profile/v
v-balachandra
an

Karnataka CM Sri Siddaram
maiah spe
eaks at the workshop on Best I nternational Practice in
p
es
Building Resilient Cities in Bangalore on Monda 5th Augu 13.
t
B
ay
ust
The Revenue D
Department of the K
t
Karnataka government needs to be con
ngratulated for
d
organis
sing a goo "worksh
od
hop" on "B est Interna
ational Pra
actices in B
Building Resilient Cit
ties"
(Augus 5-7). The aim of the worksh
st
t
hop was to anticipate, prevent and mitig
o
t
gate hards
ships
when terrorist att
tacks or na
atural calam
mities strike our expa
anding urba agglom
an
merations.
The structurall rigidity th we alw
hat
ways
notic in a go
ce
overnment seminar was
t
plea
asantly a
absent. Chief Minister
C
Sidd
daramaiah ,
in
his
h
succ
cinct
address, ou
utlined th
he role of
gove
ernment a "proac
as
ctive and not
reac
ctive" in h andling su
uch situations.
Sen
nior politica leaders like Reve
al
enue
Minister Srin
nivasa Pr
rasad, Ho
ome
Minister K.J. George and Trans
a
sport
Minister Rama
alinga Red and se
ddy
enior
cials lent s
support to this initiative.
offic
was Shashidhar Reddy,
Also present w
o
who gave the keynote spe
o
eech
outlining the role of the National

Capt SB TyagiCICISSSept.13
B

5
Disaster Management Agency (NDMA), which he is heading. The workshop also
assembled Indian and foreign experts on the role of media and in responding to natural
calamities and nuclear and biological threats.
I gave an example of the "pro-active" role of a government agency in my lead presentation:
In April 2008, the US Department of Homeland Security (DHS) had prepared a protection
plan to guard America from the danger of 17 million small boats around their coastline. That
was the time when Al Qaeda was planning to hit the US through a seaborne attack. The
26/11 attack could have been frustrated had our government agencies in Delhi and the
states been as pro-active as DHS in increasing our coastal security after receiving several
Central intelligence alerts on the LeT training a seaborne team. Thus when the LeT struck
Mumbai, the US police and security systems considered it as a dress rehearsal for a similar
attack on US mainland and went on an overdrive in holding training rehearsals on
preventive security.
The concept of "endless cities" emerged in 2010 after the UN Habitat meeting at Rio when
they had warned that huge urban agglomerations would stand cheek by jowl in future,
dwarfing the rural habitations. It warned that 70% of the world population would be urban
dwellers by 2050. It also warned that rapid urbanization would result in more crime and law
and order problems. In fact this concept is not new. While our government agencies and
political leadership were ignoring the rising non-traditional security threats (NTS) like
migration or climate change, other countries like Singapore and Canada have been
focusing on that for years.
In October 2007, I had cited these dangers while addressing the Indian Institute of Public
Administration (Maharashtra Chapter), pointing out that globalization had loosened states'
control over their polity. I had quoted Harvard professor Stanley Hoffman, who called this
"erosion" the "emergence of a transnational society that includes multinational corporations,
non-governmental organisations, criminals and terrorists". In 2004, the Canadian Security
Intelligence Service (CSIS) had warned in an unclassified analysis that climate change and
environmental degradation were likely to contribute significantly to conflicts and instability.
On 1 August 2013, UC (Berkeley) released a report that climate change would result in
growing violence between now and 2050. Rapid urbanisation, migration from other areas
and climate change that we see now would pose great challenges to our administration,
needing innovative strategies in handling such problems. No state government has realised
this danger. Hence the organisers of this seminar, perhaps the first of its kind in India, need
to be complimented.
In my presentation I also tried to expand the idea of "Incident Management System" (IMS.
The IMS is an innovative way in handling urban convulsions instead of the present
fragmented way we are dealing with such challenges. During 26/11 the police had to
remove the injured, get fire control equipment repaired and water replenished. This concept
was further explained in detail by a DHS delegate. IMS, which has been used in the US
since 1960s, and is now adopted by several other countries, is a model in which
government agencies come together seamlessly under a pre-determined and pre-trained
leadership, thus acting in unison and eliminating duplication of resources and confusion.

Sunday Guardian (New Delhi) Aug 11, 2013
http://www.sunday-guardian.com/analysis/how-to-subdue-urban-convulsions
Capt SB TyagiCICISSSept.13

6
Our vo
oices are unique to each p
e
person (including twins), a
and canno be exa
ot
actly
replica
ated.
Voice recognitio (also known as automatic speech recognitio or com
on
k
c
on
mputer spe
eech
recogn
nition) conv
verts spoke words t text. The term "voice recogn ition" is so
en
to
e
ometimes u
used
to refer to recogn
r
nition syste
ems that m
must be tra
ained to a particular s
speaker - as is the c
case
for mo desktop recognition softwa
ost
p
are. Recognizing the speaker can simplify the tas of
sk
transla
ating speec
ch.
Speech recognition is a broader so
h
b
olution which refers to technollogy that can recognize
c
speech without b
h
being targe
eted at sin
ngle speak - such as a call centre sy
ker
ystem that can
recogn
nize arbitra voices. Voice re
ary
.
ecognition
techno
ology utilize the dis
es
stinctive as
spects of
the voice to veri the identity of ind
ify
dividuals.
Voice recognitio is occa
on
asionally confused
with sp
peech reco
ognition, a technolo gy which
transla
ates what a user is saying (a process
a
ted
hentication). Voice re
ecognition
unrelat to auth
techno
ology, by co
ontrast verifies ident of the
tify
individu who is speaking.
ual
The tw technolo
wo
ogies are often bundl edo




Speech re
ecognition is used to translate
the spoken work into an account
number, a
and
Voice rec
cognition verifies th vocal
he
characteris
stics again those a
nst
associated with this account.

h
s
mponents: a physiol
logical com
mponent (
(the voice tract) an a
e
nd
Speech includes two com
Behavi
ioural com
mponent (t
the accent It is almost impo
t).
ossible to imitate anyone’s v
voice
perfect
tly. Voice recognition systems can disc
s
criminate between t
two very similar voices,
s
includin twins. The voice
ng
eprint gene
erated upo enrolme is cha
on
ent
aracterized by the v
vocal
tract, w
which is a u
unique phy
ysiological trait. A cold does not affect the vocal trac so there will
t
e
ct,
e
be no adverse effect on ac
ccuracy lev
vels. Only extreme vocal cond
v
ditions suc as laryn
ch
ngitis
will pre
event the user from using the sy
ystem.
During enrolmen the use is promp
nt,
er
pted to repeat a short passph
hrase or a sequenc of
ce
numbe
ers. Voice recognitio can u
on
utilize vario
ous audio capture devices (microphones,
o
telepho
ones and P microp
PC
phones). T he perform
mance of voice recog
v
gnition sys
stem may v
vary
depend
ding on the quality of the aud io signal as well as variation between enrolment and
o
a
e
verifica
ation devic
ces, so acq
quisition n ormally ta
akes place on a dev ice likely to be used for
t
d
future v
verification To preve the risk of unauth
n.
ent
k
horized acc
cess vie ta recording, the use is
ape
er
asked t repeat r
to
random phrases.
During enrolment an individ
dual is pro mpted to select a pa
s
assphrase or to repeat a seque
ence
of num
mbers. The passphra
e
ases select
ted should be appro
d
oximately 1
1-1.5 seco
onds in len
ngthCapt SB TyagiCICISSSept.13
B

7
very sh
hort passp
phrases lac enough identifying data, and long pas
ck
g
d
sswords ha too much,
ave
both re
esulting in reduced accuracy. The indiv
n
.
vidual is generally p
g
prompted to repeat the
passph
hrase or n
number set a handfu of times making the enrolm
t
ul
s,
ment proce somew
ess
what
longer than most other biometrics. E ach person can be uniquely id
t
u
dentified by the soun of
y
nd
his or h voice. A person’s Anatomy (size and shape of vocal tract combine with lear
her
s
y
t)
ed
rned
behaviours make up His or her voiice print. Latest spe
e
eaker reco
ognition sy
ystems ext
tract
feature represe
es
enting phys
sical chara
acteristics (anatomy and beh
y)
havioural characteris
stics
(such a inflection); togethe these un
as
er
niquely def
fine the ind
dividual.
Traditio
onal speak recognition system use ‘fix senten
ker
ms
xed
nce’ techno
ology. A sp
peaker utte a
ers
specific sentence to enrol and repe
c
e
l
eats the same sentence (or recorded phonemes to
s
s)
authen
nticate. Fixe sentenc technollogy has certain limit
ed
ce
tations suc has certain limitat
ch
tions
such a its inability to iden
as
ntify a spe
eaker durin a live fr form co
ng
ree
conversatio In addition,
on.
are signifi
there a
icant secu
urity risks as the system ca grant u
s
an
unauthorized access to
s
fraudul
lent parties who sim
mply play back a re
ecording of the spea
aker sayin the pas –
ng
ss
phrase In ‘free s
e.
speech’ tec
chnology t system can ident the spe
the
m
tify
eaker durin a free f
ng
form
conver
rsation in a langua
any
age. It doe not req
es
quire any specific wo
s
ords or se
entences to be
o
repeate The su
ed.
ubject can enrol while speaking one langu
e
g
uage and llater be au
uthenticate or
ed
identifie while s
ed
speaking another lan
a
nguage. Unlike fixed
d-sentence systems, unscrupulous
e
users m find it extremely difficult to fool the newer automated au
may
t
y
o
uthenticatio systems by
on
playing back a re
g
ecording.
To gain access, a random pass phra genera
n
ase
ated by the system m
e
must be re
epeated by the
y
user. A
Authorization is gran
nted after the syste determines that the correc words w
em
ct
were
spoken by the rig person On-goin g research has prod
n
ght
n.
h
duced capa
abilities that can identify
and au
uthenticate speakers in any lan
e
nguage an with free form spe
nd
eech. Free form spe
e
eech
techno
ology offers significan advantag across numerous markets:
s
nt
ges
s
s
Law Enfo
orcement and Hom
meland Security: as a sup
a
pporting te
echnology for
surveillanc and inte
ce
elligence ga
athering,
A speaker can be ide
r
entified du ring a free form conv
e
versation.
IT Security either du
y:
uring a live conversat
e
tion or thro
ough an au
utomated system,
s
Speaker c be auth
can
henticated with
or withou a spo
ut
oken ran
ndom
passphras
se.
Forensics and Intelligence: a v
voice
print can be quickly matc
n
ched
against a d
database of
o
Known p
persons of interest to
o
t
support major invest
tigations.
Banking
and
Call
C
Cen
ntres:
determine
the
identity
of
us
ca
allers
anonymou
and
authentica
ate
Customers to help prevent and
s
p
solve fraud and othe crimes.
d
er

Capt SB TyagiCICISSSept.13
B

8
How c
could a w
weakened British un of just 6000 troop beat Fr
B
nit
6
ps
rench forc five tim
ces
mes
its siz
ze?
How c
can the planning fr
ramework of the D-Day Landings be us
sed in the modern day
e
board
drooms?
How c strate
can
egic Intelligence hel turn tab
lp
bles on a much stro
m
onger adve
ersary?
What lessons c busine
can
esses lear from military ope
rn
m
erations?
“Everyman’s War - The recently publ ished book by Random House
r”
k
m
& MINT presents the answers to these questions in an engaging and
T,
gripping narrative. This book examines the lesson that are gleaned
g
k
ns
from mi
ilitary opera
ations in the field of tac
e
ctics, strategy, decision making
n
and tea dynamic
am
cs.
The au
uthor of the book, Ca Ragu R
e
apt
Raman has a unique blend of
career experience Raghu began his career with the Indian Armed
es.
h
Forces and during his 12 year stint th
g
here, he was in operations in
Punjab, then in th frontline at the high
,
he
hest battlef
field in the world in
Siachin Glacier fol
llowed by a tour of du in war to Angola as a UN
uty
orn
Peace K
Keeper.
We are delighted t inform th all proc
to
hat
ceeds from “Everyman's War” w go to the families o the
will
e
of
security forces who died in the line of dut for India.
y
o
e
ty
you could lo on to Flipkart or A
og
Amazon to order your copy or ge it from an bookstore, it
o
et
ny
While y
would b really appreciated if you could s
be
f
share details (on Twitt , Facebo or via email) abou the
ter
ook
e
ut
book an the caus it's suppo
nd
se
orting, with y
your friends and family A simple forward of this mail to your
s
y.
t
friends can make a big differe
ence.
Capt Ra Raman can be reached by - Email at ra
agu
n
aghu@everymanswa
ar.com | Ce +91 99 1
ell:
1000
4147 | T
Twitter: @captraman

Capt SB TyagiCICISSSept.13
B

9
Suggestio & feedb
ons
back may b sent to us on e-ma captsbty
be
u
ail:
yagi@yaho
oo.co.in
If you d not wish to receive this New
do
h
e
wsletters, pl
lease Reply writing ‘R
y
REMOVE’ in Subject area
and your name w be remo
will
oved from t
the list. ICI
ISS does not share em or oth details with
mail
her
any ent
tity.

Capt SB TyagiCICISSSept.13
B

10

Weitere ähnliche Inhalte

Ähnlich wie News letter sept 13

Development Of Open And Private Security
Development Of Open And Private SecurityDevelopment Of Open And Private Security
Development Of Open And Private SecurityBrittney Simmons
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were assimba35
 
LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx
LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docxLEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx
LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docxsmile790243
 
www.asse.org NOVEMBER 2013 ProfessionalSafety 59.docx
www.asse.org      NOVEMBER 2013      ProfessionalSafety   59.docxwww.asse.org      NOVEMBER 2013      ProfessionalSafety   59.docx
www.asse.org NOVEMBER 2013 ProfessionalSafety 59.docxlynnalix61619
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0theonassiokas
 
Monitor Magazine Relaunched-2 copy
Monitor Magazine Relaunched-2 copyMonitor Magazine Relaunched-2 copy
Monitor Magazine Relaunched-2 copyJohn Palser
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. TakishaPeck109
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. ariysn
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11captsbtyagi
 
SECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABADSECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABADAli Faizan Wattoo
 
Central Eastern Europe-Part of our continent you cannot ignore
Central Eastern Europe-Part of our continent you cannot ignoreCentral Eastern Europe-Part of our continent you cannot ignore
Central Eastern Europe-Part of our continent you cannot ignoreSebastian Blazkiewicz
 

Ähnlich wie News letter sept 13 (20)

Development Of Open And Private Security
Development Of Open And Private SecurityDevelopment Of Open And Private Security
Development Of Open And Private Security
 
Hello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were asHello dr. aguiar and classmates,for this week’s forum we were as
Hello dr. aguiar and classmates,for this week’s forum we were as
 
LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx
LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docxLEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx
LEE JACOB GARCIAHello Classmates,1. Describe the framework for.docx
 
DYN_May-June2015_FINAL_v2
DYN_May-June2015_FINAL_v2DYN_May-June2015_FINAL_v2
DYN_May-June2015_FINAL_v2
 
14 aug
14 aug14 aug
14 aug
 
www.asse.org NOVEMBER 2013 ProfessionalSafety 59.docx
www.asse.org      NOVEMBER 2013      ProfessionalSafety   59.docxwww.asse.org      NOVEMBER 2013      ProfessionalSafety   59.docx
www.asse.org NOVEMBER 2013 ProfessionalSafety 59.docx
 
Essay On Safety
Essay On SafetyEssay On Safety
Essay On Safety
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
The Business Of Information Security V2.0
The Business Of Information Security V2.0The Business Of Information Security V2.0
The Business Of Information Security V2.0
 
Monitor Magazine Relaunched-2 copy
Monitor Magazine Relaunched-2 copyMonitor Magazine Relaunched-2 copy
Monitor Magazine Relaunched-2 copy
 
StetsonNelsonResume
StetsonNelsonResumeStetsonNelsonResume
StetsonNelsonResume
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment. This week’s forum discussion is all about training and equipment.
This week’s forum discussion is all about training and equipment.
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11
 
SECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABADSECURITY AT NUST H12 ISLAMABAD
SECURITY AT NUST H12 ISLAMABAD
 
The 10 most trusted security solution companies
The 10 most trusted security solution companiesThe 10 most trusted security solution companies
The 10 most trusted security solution companies
 
Central Eastern Europe-Part of our continent you cannot ignore
Central Eastern Europe-Part of our continent you cannot ignoreCentral Eastern Europe-Part of our continent you cannot ignore
Central Eastern Europe-Part of our continent you cannot ignore
 
PR Poland seminar
PR Poland seminarPR Poland seminar
PR Poland seminar
 
DYN Sept-Oct 2016
DYN Sept-Oct 2016DYN Sept-Oct 2016
DYN Sept-Oct 2016
 
Board of certified safety professionals
Board of certified safety professionalsBoard of certified safety professionals
Board of certified safety professionals
 

Mehr von Capt SB Tyagi, COAC'CC*,FISM,CSC,

Mehr von Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 
News letter jan 13
News letter jan 13News letter jan 13
News letter jan 13
 
Saw security awareness part v
Saw   security awareness part vSaw   security awareness part v
Saw security awareness part v
 
Security Awareness Part II - women security tips
Security Awareness Part II - women security tipsSecurity Awareness Part II - women security tips
Security Awareness Part II - women security tips
 
Security Awareness Part I
Security Awareness Part ISecurity Awareness Part I
Security Awareness Part I
 

Kürzlich hochgeladen

How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptxSandy Millin
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational PhilosophyShuvankar Madhu
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxEduSkills OECD
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.raviapr7
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfYu Kanazawa / Osaka University
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17Celine George
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.EnglishCEIPdeSigeiro
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphNetziValdelomar1
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfMohonDas
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxDr. Santhosh Kumar. N
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxKatherine Villaluna
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRATanmoy Mishra
 

Kürzlich hochgeladen (20)

How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
2024.03.23 What do successful readers do - Sandy Millin for PARK.pptx
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
Philosophy of Education and Educational Philosophy
Philosophy of Education  and Educational PhilosophyPhilosophy of Education  and Educational Philosophy
Philosophy of Education and Educational Philosophy
 
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptxPISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
PISA-VET launch_El Iza Mohamedou_19 March 2024.pptx
 
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdfPersonal Resilience in Project Management 2 - TV Edit 1a.pdf
Personal Resilience in Project Management 2 - TV Edit 1a.pdf
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.Drug Information Services- DIC and Sources.
Drug Information Services- DIC and Sources.
 
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdfP4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
P4C x ELT = P4ELT: Its Theoretical Background (Kanazawa, 2024 March).pdf
 
How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17How to Use api.constrains ( ) in Odoo 17
How to Use api.constrains ( ) in Odoo 17
 
Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.Easter in the USA presentation by Chloe.
Easter in the USA presentation by Chloe.
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Presentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a ParagraphPresentation on the Basics of Writing. Writing a Paragraph
Presentation on the Basics of Writing. Writing a Paragraph
 
Diploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdfDiploma in Nursing Admission Test Question Solution 2023.pdf
Diploma in Nursing Admission Test Question Solution 2023.pdf
 
M-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptxM-2- General Reactions of amino acids.pptx
M-2- General Reactions of amino acids.pptx
 
Practical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptxPractical Research 1 Lesson 9 Scope and delimitation.pptx
Practical Research 1 Lesson 9 Scope and delimitation.pptx
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRADUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
DUST OF SNOW_BY ROBERT FROST_EDITED BY_ TANMOY MISHRA
 

News letter sept 13

  • 1. New wsletter Septe r: ember 2013 Let’s profes ssiona alize th prof he fession nals… http://www w.wix.com/sb btyagi/iciss Air Commo A odore (Ret Jasjit Singh, one of India's leading strategic th inkers, passed away on td) S y h Sunday, 4th August 13 He was 79. S 3. He was cre H emated at the Brar Square cre S emation gr round with many ser rving and retired officers r fr rom the th hree services prese ent. IAF ch hief Air Ch hief Marsh N.A.K. Browne and other top hal officers laid wreaths. o d Known as a passion nate professio onal, Jasjit Singh tau t ught flying to many top air fo o orce officers. He heade the Institute ed for De efence Studies S and Analyses (IDSA) for a long s tenure a and after re etirement f from there, se up the Centre for Air et r Power S Studies (CA APS), the t think tank ded dicated to modern and o futuristic air power trends. CA c r APS has don many useful studies ne on air po ower strate egic issues for s the India Air Forc (IAF). an ce rote or edited an He wr astonish hing numb ber of bo ooks tributed in positive to the o and cont y go-ahead f India's 1998 nuclear explos g for sion, when IDSA was asked by the gove n ernment ab bout th likely in he nternationa implications. Both he and K. Subrahm al K manyam, h is predece essor in ID DSA, prodded the governm p e ment to go ahead. a Born July 8 1934, Ja B 8, asjit was awarded th Vir Cha a he akra for dis splaying g allantry du uring the 1 1971 War. As a s W squadron l leader then he attac n, cked and destroyed many Pakis m stani tanks and bunk s kers. He displaye determination and devotion to duty of a high order, accord H ed d ding to the citation for the r honour. h n resident AP Abdul Kalam con PJ K nferred Pad dma Bhushan, the c country's second highest In 2006, pr civilian awa on him for his co c ard, m ontributions in strateg thought. s gic Capt SB TyagiCICISSSept.13 B 1
  • 2. D.C. Nat IPS (Re th, etd.), PPM IPM M, About the Autho t or: Mr. DC Nath is Ch Patron of Internation al Council of Security & Safety Man C hief nagement. Su uperannuate in ed Januar 1995, as the Special Director, Int ry, telligence Bu ureau, Mr. D.C. Nath (IP PS-1960) has been a visiting s faculty to a number of Institutes (like the In s ndian Institute of Public Administration (IIPA), Sar e A n rdar Vallabhb bhai Patel N National Police Academ (SVPNPA Lal Bah my A), hadur Shastr National A ri Academy of Administra ation (LBSNA and Aca AA) ademies, including Mana agement Trai ining Institute covering different asp es, pects of secu urity and ind dustrial security managem ment. Winner of both the honors av r e vailable in th police se he ervice, name Indian P ely, Police Medal for meritorious l service and the P es President’s Police Medal for distinguished services, and the Prime Minis P ster’s Silver Cup Essay Compe etition at the National Po e olice Academ in two su my uccessive ye ears, Mr. Nath had made a ver significant and highlyM ry t -appreciated presentatio at d on IIM Lucknow , on “Image Building for IPS Officers at the Vertical Interac M, s” ction Program for s senior IPS off ficers. Recognition fo his over 40 years’ exp R or 4 perience and expertise in the field ca d ame fro such di gnitaries in this field as the Chair om a rman (Mr. Jeff M. Spiv J vey), American Soc ciety for Industrial Security (ASIS), 2007, the most recognized m au uthority in th e world, who wrote, “You are well kn own to many people I talk to o u y ar round the wo orld. When I mention Ind and your name they either know you dia r or know of you r u…. A good legacy.” The author of a highly acc f claimed book "Intelligenc Imperative for India", Mr. k, ce es Nath earned high plaudi from all around for two of his very signific its cant presentations on: “ “Revisiting th Future of India” (2005 London) and “Lessons from India for the War On he 5, a s r Terroris sm” (2007, USA). Know for his p rofessed tra wn aining ability, he is affec , ctionately ad ddressed as the “Drona acharya” and is considere a security ideologue and as such is in demand from Corpo ed y a d orate Houses for s talking to senior b business exe ecutives as a also to orga anize custom mized trainin g courses for their secu urity personnel. His nam figures in the Americ Police H of Fame, a Trust of the US Natio me n can Hall , t onal Association of Chief of fs Police. In Decembe 2010, the Internationa Who’s Wh Historical Society incl uded his name in the 20 er al ho 0102011 e d edition of the “Internation Who’s W e nal Who of Profe essionals”. All this indeed speaks vo A olume about Mr. Nath’s standing in the field of private secu urity all over the world. Thus, in more than one sense, he is the T e s s only on in the field, combinin the exper ne ng riences of a police office with speciialization in intelligence and er strategic analysis a an indust and trial security expert par excellence. e er S ttack on th Indian Parliament on Decem he P t mber 13 or the r Whethe it is 9/11 in the US or the at blasts at Bali or Istanbul, the terroris have st t sts truck terror in no un mistaken terms. Th t hreat percep ption at eve level ha changed and secu ery as d urity conce erns are no in every ow ybody’s mi ind both in the government an the gen n nd neral public This is good for s c. security industry but the t questio is wheth the men in securiity can deli on her iver the go oods. ty ofession outside the governme is not many yea old, especially in the o e ent ars n Securit as a pro Asian c continent. Private se ecurity has made trem s mendous strides in th US or even in the UK s he e e and ha numeric as cally overtaken the public poli in thes countrie ice se es. Profes ssionally a also, there a now ex are xperts, spe ecializing in different aspects of security. Private security sta n arted growing on scien ntific lines in the deve eloping cou untries only in the ‘60 of the last century It 0s y. gained some mo omentum in the last one or tw decades in Asia a wo s and around but that has d been p possible p primarily because of demands of the industrial s f s sector and compara d ative inability of the s y security ag gencies of the gover rnment to meet the growing challenges on s accoun of their c nt commitmen to over nationa security concerns. nts rall al c Capt SB TyagiCICISSSept.13 B 2
  • 3. So, the moot question remains: how professional are those in private security, which in most of the countries is being headed or guided by retired folks from the armed forces or public police. Ironically, many among them, even though they had otherwise been bright, might not have any occasion, during the course of their service career anything to deal with security as such. Yes, a disciplined or uniform background can be an asset but that cannot automatically lay claim to expertise in security matters. And, then, on top of this, commercial security is basically a lot different from government security – both in concepts and in execution. While one can or may have to aim at optimal or absolute security system in some government sectors, security management in the private sector will often have to balance between the costs and the returns thereof. The good thing, however, is there are now indications of fresh graduates joining private security directly and trying to make a career in security as a profession. This trend deserves to be encouraged. Conceptually, appreciation of security is, and has to be, largely subjective because too many variable factors are to be considered before someone can arrive at a proper security assessment. A security threat to Mr. X may not be so to Mr. Y. A security threat today may not remain a security threat tomorrow. A security threat in a specific situation may not pose any threat whatsoever in a different context. Then, just like an ailment is often diagnosed differently by different medical professionals, the threat perception of a situation can vary owing to the professional ability or expertise of the security assessor. So the debate raised by some whether security is a vocation or a profession goes on but does not really cut ice any longer. The issue is now settled. Security is as much a scientific profession as many others. Threats can now be professionally analyzed and a threat assessment arrived at according to some settled norms. There is yet another aspect warranting professional approach. The primary aim of any security system should be to prevent or deter mischief-makers but oftentimes breaches in security take place in spite of elaborate arrangements. Some acts of sabotage or subversion or of terrorism these days, particularly when perpetrated by suicide squads, cannot indeed be prevented. So, the best thing in such circumstances is to work out in advance plans to control damages or efficiently manage the post-incident situations. Indeed, management of such crisis situations is a skill that security managers must develop as a part of their professional duty. This could often be the test of professionalism of security men. There could, however, be some caveats in it. Many of the private security agencies do not have training system or facilities worth the name and so professionalism in security industry suffers. As in almost every sector even in the government, expenditure on training is generally considered an avoidable overhead in a majority of the corporate sector as well. It is a pitfall that has to be avoided. As a matter of fact, it is imperative that private security practioners spend adequate time and resources on training and sincerely devote themselves to reach and attain adequate professional knowledge and status. It is only then they would get the recognition they are hankering for but to attain which they are often not doing enough. Professionalism in security is must not only for the security practioners but also for the security and safety of all those they are obliged to serve and protect. Capt SB TyagiCICISSSept.13 3
  • 4. It has im mmense potential for security a r application ns! Resear rchers at th Georgia Institute o Technology want to put your signature up in ligh -he a of t r e hts tiny lig ghts, that is. Using thousand of nan g ds nometre-sc cale wires , the rese earchers h have developed a sen nsor devic that con ce nverts me echanical pressure - from a signature o a p s or fingerp print -- direc into lig signals that can be captured and proc ctly ght s b d cessed opti ically. The sen nsor device could prov e vide an artif ficial sense of touch offering s h, sensitivity comparable to that of c e the hum skin. B man Beyond colle ecting signa atures and fingerpr rints, the te echnique co ould also b used in be biologic cal imaging and mic g cro-electrom mechanical (MEMS systems. Ultimately it could provide a S) y, new approach for h human-mac chine interfa aces. "You ca write wit your pen and the s an th n sensor will optically detect wh you write at high resolution y hat and with a very fas response rate," said Zhong Lin st Wang, Regents' professor an Hightowe Chair in nd er the Sch hool of Mat terials Science and E ngineering at Geo orgia Tech. "This is a new pr . rinciple for imaging force tha uses pa g at arallel dete ection and avoids many of the comp plications o existing of pressur sensors." re " Individu zinc oxid (ZnO) na ual de anowires th at are part of the d device oper rate as tiny light emitt ing diodes y (LEDS) when placed under strain from the ) mechan nical press sure, allow wing the device to provide detailed in e nformation about the amount of pressur re being applied. Known a as piezophototro onics, the t technology -- first des scribed by Wang i 2009 -- provides a new way to capture in informa ation about pressure applied at very high resolution: up to 6, ,300 dots pe inch. er The re esearch wa scheduled to be reported as e August 11 in the j journal Natu Photon ure nics. It was sponsored by the U.S. Dep e partment of Energy's f Office of Basic E Energy Sciences, the National e Science Founda e ation, and the K d Knowledge Innovat tion Program of the Chinese Ac C cademy of Science es. This sch hematic sho ows a devi ice for ima aging pressure distribution by the pi e n iezo-phototr ronic effect. Th illustratio shows a nanowirehe on -LED based pressure sen nsor array before (a) and after (b) applying a compres ssive strain A n. convex character pattern, su uch as "ABC," molded on a sapph hire substr rate, is use to ed apply the pressure pattern on the top of the e n f indium-tin oxide ( (ITO) elec ctrode. (Cr redit: Courtesy of Zhong L Wang) y Lin Piezoelectric mate erials generate a cha arge polariz zation when they are placed under strain. The n piezo-p phototronic d devices rely on that ph y hysical princ ciple to tune and contro the charg transport and e ol ge t recomb bination by t polariza the ation charge present at the ends of individua nanowires Grown at a es a al s. top gallium nitride (Ga film, the nanowires create pix aN) e s xeled light-e emitters wh hose output varies with the h pressur creating an electro re, oluminescen signal that can be integrated w nt with on-chip photonics for s data tra ansmission, processing and record g ding. under strain you creat a piezoellectric charg at both e n, te ge ends "When you have a zinc oxide nanowire u which f forms a piez zoelectric potential," W p Wang explained. "The presence o the poten of ntial distorts the s Capt SB TyagiCICISSSept.13 B 4
  • 5. band st tructure in t wire, causing elect rons to rem the main in the p-n junction longer and enhancing the p n d g efficienc of the LE cy ED." The effi iciency incr rease in the LED is pro e oportional to the strain created. Diifferences in the amount of o n strain a applied trans slate to differences in light emitte from the root where the nanow ed wires contac the ct gallium nitride film. To fabrica the dev ices, a lowate -temperatur chemicall growth tec re chnique is u used to creat a patterned array of zinc oxide nanowires on a gallium nitride thiin film subs te m strate with th che axis po ointing upwa ard. The interfaces be etween the nanowires and the ga allium nitrid film form the de m bottom surfaces of the nanow f wires. Story So ource: The abo story is b ove based on mat terials provid by Georg Institute of Technol ded gia e logy, via New wswise. The original a article was w written by Joh Toon. hn Journal Reference: l Caofeng Pan, Lin Do g ong, Guang Zhu, Simiao Niu, Ruome Yu, Qing Yang, Ying Liu, Zhong Lin Wang. Hi Z eng L ighresoluti ion electrolu uminescent imaging of pressure di istribution using a piez u zoelectric na anowire LED D array. N Nature Photonics, 2013; DOI: 10.1038 D 8/nphoton.20 013.191 The In ncident Managemen System can stre nt m eamline th fragme he ented way we use to ys e deal w with challenges. V. Bala achandr ran The author is a for rmer Spec Secreta Cabine Secretar cial ary, et riat www.sun nday-guardian n.com/profile/v v-balachandra an Karnataka CM Sri Siddaram maiah spe eaks at the workshop on Best I nternational Practice in p es Building Resilient Cities in Bangalore on Monda 5th Augu 13. t B ay ust The Revenue D Department of the K t Karnataka government needs to be con ngratulated for d organis sing a goo "worksh od hop" on "B est Interna ational Pra actices in B Building Resilient Cit ties" (Augus 5-7). The aim of the worksh st t hop was to anticipate, prevent and mitig o t gate hards ships when terrorist att tacks or na atural calam mities strike our expa anding urba agglom an merations. The structurall rigidity th we alw hat ways notic in a go ce overnment seminar was t plea asantly a absent. Chief Minister C Sidd daramaiah , in his h succ cinct address, ou utlined th he role of gove ernment a "proac as ctive and not reac ctive" in h andling su uch situations. Sen nior politica leaders like Reve al enue Minister Srin nivasa Pr rasad, Ho ome Minister K.J. George and Trans a sport Minister Rama alinga Red and se ddy enior cials lent s support to this initiative. offic was Shashidhar Reddy, Also present w o who gave the keynote spe o eech outlining the role of the National Capt SB TyagiCICISSSept.13 B 5
  • 6. Disaster Management Agency (NDMA), which he is heading. The workshop also assembled Indian and foreign experts on the role of media and in responding to natural calamities and nuclear and biological threats. I gave an example of the "pro-active" role of a government agency in my lead presentation: In April 2008, the US Department of Homeland Security (DHS) had prepared a protection plan to guard America from the danger of 17 million small boats around their coastline. That was the time when Al Qaeda was planning to hit the US through a seaborne attack. The 26/11 attack could have been frustrated had our government agencies in Delhi and the states been as pro-active as DHS in increasing our coastal security after receiving several Central intelligence alerts on the LeT training a seaborne team. Thus when the LeT struck Mumbai, the US police and security systems considered it as a dress rehearsal for a similar attack on US mainland and went on an overdrive in holding training rehearsals on preventive security. The concept of "endless cities" emerged in 2010 after the UN Habitat meeting at Rio when they had warned that huge urban agglomerations would stand cheek by jowl in future, dwarfing the rural habitations. It warned that 70% of the world population would be urban dwellers by 2050. It also warned that rapid urbanization would result in more crime and law and order problems. In fact this concept is not new. While our government agencies and political leadership were ignoring the rising non-traditional security threats (NTS) like migration or climate change, other countries like Singapore and Canada have been focusing on that for years. In October 2007, I had cited these dangers while addressing the Indian Institute of Public Administration (Maharashtra Chapter), pointing out that globalization had loosened states' control over their polity. I had quoted Harvard professor Stanley Hoffman, who called this "erosion" the "emergence of a transnational society that includes multinational corporations, non-governmental organisations, criminals and terrorists". In 2004, the Canadian Security Intelligence Service (CSIS) had warned in an unclassified analysis that climate change and environmental degradation were likely to contribute significantly to conflicts and instability. On 1 August 2013, UC (Berkeley) released a report that climate change would result in growing violence between now and 2050. Rapid urbanisation, migration from other areas and climate change that we see now would pose great challenges to our administration, needing innovative strategies in handling such problems. No state government has realised this danger. Hence the organisers of this seminar, perhaps the first of its kind in India, need to be complimented. In my presentation I also tried to expand the idea of "Incident Management System" (IMS. The IMS is an innovative way in handling urban convulsions instead of the present fragmented way we are dealing with such challenges. During 26/11 the police had to remove the injured, get fire control equipment repaired and water replenished. This concept was further explained in detail by a DHS delegate. IMS, which has been used in the US since 1960s, and is now adopted by several other countries, is a model in which government agencies come together seamlessly under a pre-determined and pre-trained leadership, thus acting in unison and eliminating duplication of resources and confusion. Sunday Guardian (New Delhi) Aug 11, 2013 http://www.sunday-guardian.com/analysis/how-to-subdue-urban-convulsions Capt SB TyagiCICISSSept.13 6
  • 7. Our vo oices are unique to each p e person (including twins), a and canno be exa ot actly replica ated. Voice recognitio (also known as automatic speech recognitio or com on k c on mputer spe eech recogn nition) conv verts spoke words t text. The term "voice recogn ition" is so en to e ometimes u used to refer to recogn r nition syste ems that m must be tra ained to a particular s speaker - as is the c case for mo desktop recognition softwa ost p are. Recognizing the speaker can simplify the tas of sk transla ating speec ch. Speech recognition is a broader so h b olution which refers to technollogy that can recognize c speech without b h being targe eted at sin ngle speak - such as a call centre sy ker ystem that can recogn nize arbitra voices. Voice re ary . ecognition techno ology utilize the dis es stinctive as spects of the voice to veri the identity of ind ify dividuals. Voice recognitio is occa on asionally confused with sp peech reco ognition, a technolo gy which transla ates what a user is saying (a process a ted hentication). Voice re ecognition unrelat to auth techno ology, by co ontrast verifies ident of the tify individu who is speaking. ual The tw technolo wo ogies are often bundl edo   Speech re ecognition is used to translate the spoken work into an account number, a and Voice rec cognition verifies th vocal he characteris stics again those a nst associated with this account. h s mponents: a physiol logical com mponent ( (the voice tract) an a e nd Speech includes two com Behavi ioural com mponent (t the accent It is almost impo t). ossible to imitate anyone’s v voice perfect tly. Voice recognition systems can disc s criminate between t two very similar voices, s includin twins. The voice ng eprint gene erated upo enrolme is cha on ent aracterized by the v vocal tract, w which is a u unique phy ysiological trait. A cold does not affect the vocal trac so there will t e ct, e be no adverse effect on ac ccuracy lev vels. Only extreme vocal cond v ditions suc as laryn ch ngitis will pre event the user from using the sy ystem. During enrolmen the use is promp nt, er pted to repeat a short passph hrase or a sequenc of ce numbe ers. Voice recognitio can u on utilize vario ous audio capture devices (microphones, o telepho ones and P microp PC phones). T he perform mance of voice recog v gnition sys stem may v vary depend ding on the quality of the aud io signal as well as variation between enrolment and o a e verifica ation devic ces, so acq quisition n ormally ta akes place on a dev ice likely to be used for t d future v verification To preve the risk of unauth n. ent k horized acc cess vie ta recording, the use is ape er asked t repeat r to random phrases. During enrolment an individ dual is pro mpted to select a pa s assphrase or to repeat a seque ence of num mbers. The passphra e ases select ted should be appro d oximately 1 1-1.5 seco onds in len ngthCapt SB TyagiCICISSSept.13 B 7
  • 8. very sh hort passp phrases lac enough identifying data, and long pas ck g d sswords ha too much, ave both re esulting in reduced accuracy. The indiv n . vidual is generally p g prompted to repeat the passph hrase or n number set a handfu of times making the enrolm t ul s, ment proce somew ess what longer than most other biometrics. E ach person can be uniquely id t u dentified by the soun of y nd his or h voice. A person’s Anatomy (size and shape of vocal tract combine with lear her s y t) ed rned behaviours make up His or her voiice print. Latest spe e eaker reco ognition sy ystems ext tract feature represe es enting phys sical chara acteristics (anatomy and beh y) havioural characteris stics (such a inflection); togethe these un as er niquely def fine the ind dividual. Traditio onal speak recognition system use ‘fix senten ker ms xed nce’ techno ology. A sp peaker utte a ers specific sentence to enrol and repe c e l eats the same sentence (or recorded phonemes to s s) authen nticate. Fixe sentenc technollogy has certain limit ed ce tations suc has certain limitat ch tions such a its inability to iden as ntify a spe eaker durin a live fr form co ng ree conversatio In addition, on. are signifi there a icant secu urity risks as the system ca grant u s an unauthorized access to s fraudul lent parties who sim mply play back a re ecording of the spea aker sayin the pas – ng ss phrase In ‘free s e. speech’ tec chnology t system can ident the spe the m tify eaker durin a free f ng form conver rsation in a langua any age. It doe not req es quire any specific wo s ords or se entences to be o repeate The su ed. ubject can enrol while speaking one langu e g uage and llater be au uthenticate or ed identifie while s ed speaking another lan a nguage. Unlike fixed d-sentence systems, unscrupulous e users m find it extremely difficult to fool the newer automated au may t y o uthenticatio systems by on playing back a re g ecording. To gain access, a random pass phra genera n ase ated by the system m e must be re epeated by the y user. A Authorization is gran nted after the syste determines that the correc words w em ct were spoken by the rig person On-goin g research has prod n ght n. h duced capa abilities that can identify and au uthenticate speakers in any lan e nguage an with free form spe nd eech. Free form spe e eech techno ology offers significan advantag across numerous markets: s nt ges s s Law Enfo orcement and Hom meland Security: as a sup a pporting te echnology for surveillanc and inte ce elligence ga athering, A speaker can be ide r entified du ring a free form conv e versation. IT Security either du y: uring a live conversat e tion or thro ough an au utomated system, s Speaker c be auth can henticated with or withou a spo ut oken ran ndom passphras se. Forensics and Intelligence: a v voice print can be quickly matc n ched against a d database of o Known p persons of interest to o t support major invest tigations. Banking and Call C Cen ntres: determine the identity of us ca allers anonymou and authentica ate Customers to help prevent and s p solve fraud and othe crimes. d er Capt SB TyagiCICISSSept.13 B 8
  • 9. How c could a w weakened British un of just 6000 troop beat Fr B nit 6 ps rench forc five tim ces mes its siz ze? How c can the planning fr ramework of the D-Day Landings be us sed in the modern day e board drooms? How c strate can egic Intelligence hel turn tab lp bles on a much stro m onger adve ersary? What lessons c busine can esses lear from military ope rn m erations? “Everyman’s War - The recently publ ished book by Random House r” k m & MINT presents the answers to these questions in an engaging and T, gripping narrative. This book examines the lesson that are gleaned g k ns from mi ilitary opera ations in the field of tac e ctics, strategy, decision making n and tea dynamic am cs. The au uthor of the book, Ca Ragu R e apt Raman has a unique blend of career experience Raghu began his career with the Indian Armed es. h Forces and during his 12 year stint th g here, he was in operations in Punjab, then in th frontline at the high , he hest battlef field in the world in Siachin Glacier fol llowed by a tour of du in war to Angola as a UN uty orn Peace K Keeper. We are delighted t inform th all proc to hat ceeds from “Everyman's War” w go to the families o the will e of security forces who died in the line of dut for India. y o e ty you could lo on to Flipkart or A og Amazon to order your copy or ge it from an bookstore, it o et ny While y would b really appreciated if you could s be f share details (on Twitt , Facebo or via email) abou the ter ook e ut book an the caus it's suppo nd se orting, with y your friends and family A simple forward of this mail to your s y. t friends can make a big differe ence. Capt Ra Raman can be reached by - Email at ra agu n aghu@everymanswa ar.com | Ce +91 99 1 ell: 1000 4147 | T Twitter: @captraman Capt SB TyagiCICISSSept.13 B 9
  • 10. Suggestio & feedb ons back may b sent to us on e-ma captsbty be u ail: yagi@yaho oo.co.in If you d not wish to receive this New do h e wsletters, pl lease Reply writing ‘R y REMOVE’ in Subject area and your name w be remo will oved from t the list. ICI ISS does not share em or oth details with mail her any ent tity. Capt SB TyagiCICISSSept.13 B 10