SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
New
                         wslette Nov
                               er: vember 2012
                                        r
            Let’s profe
               ’s     ession
                           nalize the pro
                                  t     ofessio
                                              onals…
                                                   …
                                http://w
                                       www.wix.com/
                                                  /sbtyagi/iciss
                                                               s




                              Bet
                                tter Secur S
                                     S   rity Sense
                                                  e...
                     The mo essen tial quality, which we have b ignored is the p
                           ost                        w       but     d,       power
                     of obse
                           ervation.

                     We see but we don’t obs
                           e                 serve. Obsservation is not jus seeing thing
                                                                          st
                     but unnderstand ing the im
                                              mplication of wha we see So effe
                                                       ns       at        e.      ective
                     observvation of what go oes on around us is a very impo
                                                       a        s         v       ortant
                     require
                           ement for better se
                                    r         ecurity se
                                                       ense. Wheerever you are, be it at
                     home or outsid in a pu
                                   de         ublic plac look a round and try and see
                                                       ce                         d
through t
        things rath than ju see th
                  her      ust     hem.

Try and ggauge the need for a thing to be prese at a pa
                 e                    o        ent      articular p
                                                                  place, for a person to be
standing at a particular plac Don’t i
                            ce.       ignore any
                                               ything tha seems u
                                                        at        unusual. Pry harder and
                                                                             P
you will c
         come out wwith surpr
                            rising resu
                                      ults. Make observat
                                               e        tion a habbit.

‘Festival of Lights’ celebratted in Indi with fervor is round the c
                                        ia                         corner! Its message has
                                                                             s       e
universal appeal a
         l        and applic cation – vvictory of light over darknes victory of good over
                                                                   ss,       y
bad! Let t
         there be li
                   ight to lea all on v
                             ad       virtuous paath!




                                                                        Cap S B T
                                                                          pt     Tyagi
                                                                             For IC
                                                                                  CISS
Pr
      rivate Sec
           e curity Guard: Use of licen
                                  f   nsed
             weaapons while on duty
                             n    y
                              Capt SB Ty
                              C        yagi, COAS
                                                S’CC**, FISM CSC
                                                           M,

There is la of consensus in Man-guard
          ack                           ding indust and the Users reg
                                                   try       e          garding the arms lice
                                                                                    e        ensing
requiremeents and c conditions in the Pr ivate Secu
                                                  urity Agencies Regu   ulation (PS SAR) Act 2 2005.
While the Act does not recogn nize armed guarding services as a distinc category of service the
                                       d                      a          ct          y         e,
increasing demand for armed security is leading to unregulated and random employme of
          g                   d                   g                     d                     ent
individuals as privat security guards wh hold per
          s         te                 ho          rsonal licen
                                                              nses. Ironi cally, while the PSAR has
                                                                                     e        R
nothing deefined, the Arms Act 1959, on allows individual applicants to hold arms license As
                    e         t,       nly                    a                               es.
a result, private seecurity age
                              encies hav been compelled to employ people who hold Arms
                                       ve         c                     y            w
License in individual capacity.
         n

About this prevailing situat   tion Capt Arvind Mahajan, Senior VP at Reliance Infra
                                        t                  ,          R
(http://in.li
            inkedin.com
                      m/pub/arvi
                               ind-mahaja
                                        an/30/208/
                                                 /b16) questions –

       “Th weapo that a guard carries, strictly sp
         he         on                                       peaking is for HIS PERSO
                                                                      s         S       ONAL
       PRROTECTIO It is by default t
                   ON.       y          that the in
                                                  nstallation (where su
                                                                      uch a gua carryin his
                                                                               ard      ng
       perrsonal weaapon, meant for his p
                                        personal protection), gets arme protectio But, ca we
                                                                      ed        on.     an
       as Principal E
                    Employer ask vendor agencies to provide us Armed Guard?”
                             a          r                    e        d

To this C Col. Saten ndra Kuma CPO, C
                               ar       CPO (I), G. M. (Tra
                                                 G         aining) at G4S Sec
                                                                            curity Serv
                                                                                      vices
(http://in.li
            inkedin.com
                      m/pub/sate
                               endra-kum
                                       mar-cpo-cpo
                                                 o-i/16/88b/
                                                           /57b) says –

       “Ye anyone with valid license ca use his weapon in self- defe
          es                             an                      n          ense but
       onu of proving that us of weap
          us                    se        pon was in Self Defense lies w
                                                      n                      with the
       perrson using it. Now next que
                    g                    estion is what is self-defense If a
                                                      w                      e?
       susspected crriminal is without an weapon and only trespasse on a
                                w        ny          n           y          es
       priv
          vate propeerty can th ASG us his wea
                               he        se           apon? You be rest a
                                                                 u           assured
       crim
          minal with intent of committing a crime will never co  ome with a double
       or single barrel gun vissible from miles! He will come with a co ncealed
       weeapon and use it at point blan There are very ifs and b uts and
                                          nk.
       unlless law sp
                    pecifies leg authori ty it is difficult to bail out an AS if he
                                gal                                         SG
       use weapon Surely no client wiill come in his suppo even wh
          es        n.         n                                 ort         hen he ha used we
                                                                                      as     eapon
       to s
          save client life!”
                    t's

For issues relating t security guards us
         s          to                 sing weapo while on duty, w need to understan the
                                                 ons       o       we                nd
scope of Right to pprivate defe        efined in section 96 & 97 of I ndian Pen Code, w
                              ense as de         s                            nal     which
provides t
         that -

    Noothing is an offence which is do in the exercise of private d
                               w         one                o       defense [T
                                                                             There are some
     res
       strictions in the Sec 99]
                   n          9
    Eve person has a right to def
        ery        n                    fend his ow body and the bo
                                                   wn       a        ody of any other pe
                                                                               y         erson,
     agaainst any ooffence affe
                              ecting the human body.
    Eve person have a right to de
        ery         n                   efend the property whether m
                                                            w      movable or immovab
                                                                              r          ble, of
     him
       mself or of any other person, a
                              r         against any act which is an offence fa
                                                   y                           alling unde the
                                                                                         er
     deffinition of theft, robb
                              bery, mischhief or criminal trespass, o which is an attem to
                                                                    or        s         mpt
     commmit theft, robbery, mischief or criminal tr
                              m         r          respass.
Thus we know that as a law abiding citizen any security guard who is on duty with his licensed
weapon can use his weapon in exercise of his right to ‘private defense, even when his employer
doesn’t order him to do so or even when scope of his employment or jurisdiction of duty does
not provide so. In fact it is not only expected of him, but is also his duty as law-abiding citizen to
use the licensed weapon while preventing attempt or commitment of crime. We also further
need to study the scope of grant of arms’ licenses under Indian Arms Act, which in very clear
terms is for the purpose of ‘private defense’.

About armed security guards there is reference in PSAR Act 2005 in Section 2, Subsection (a)
which says that –

       “Armored car service” means the service provided by deployment of armed guards along
       with armored car…”

Further, Section2, Subsection (h) says that –

       “Private security guard” means a person providing private security with or without arms to
       another person or property or both and includes a supervisor.”

Surprisingly there is no reference of armed security guards or the definition in PSAR Rules
2006. Thus we have to understand the scope of duties and validity of using licensed arms under
Arms Act 1959 and also understand 'Right to Private Defense' as defined in Indian Penal Code
(Section 96 onwards) especially on ‘use of force’.

Under the Arms Act 1959, the arms licenses are issued but no specific purposes are
enumerated for obtaining the licenses. It is only inferred that the arms under licenses are to be
used in exercise of ‘Right to Private Defense’ (ROPD) or for ‘sports’ or special reasons such as
cinematography. Hunting is not permitted anymore and thus only sport left is marksmanship.
Good news is that Arms Act 1959 does provide in its Section 40 the protection of action taken in
good faith. It says that, “No suit, prosecution or other legal proceeding shall lie against any
person for anything which is in good faith done or intended to be done under this Act.”

At this point Arvind Mahajan, Sr. VP at Reliance Infra is in quandary and he says -

       “Knowing fully well that the Armed Guard has the weapon for his personal protection -- Is
       it right to call him an Armed Guard? (I am not going into ROPD provisions - whether he
       fires or not, that's immaterial). But, Can I deploy him as an Armed Guard? How do I
       differentiate his duties from the unarmed Guard?

His predicament goes further,

       “How does one justify that an Armed Guard needs to be paid extra? Aren’t we by default
       admitting that he is being deployed for providing Armed Protection, which as per Arms
       Act he is not supposed to provide? The individual got an Arms License, because he
       convinced the authorities of threat to his life, and NOT for performing an Armed Guard
       duty.”

There were times when organizations or the companies used to get Arms Licensees under
retainer ship basis (Section 13 of Arms Rules 1962), under which the licenses were issued on
the name of the company and the arms were to be used by notified persons of the organization
or the companies. These licenses were found to be cumbersome to obtain and had inherent
difficulties for the a
           s          actual licen holder in some case a bu directo or the rich owner of a
                                 nse       r                 usy       or     r          r
factories s since there was Sec
                       e         ction 33 of Arms Act 1959 whic held the respon
                                           f                  ch       em     nsible for a
                                                                                         action
by the reta ainers of th licenses
                       he        s.
The Section 33 of A  Arms Act sa ays, “

       “Offfences by companie es.-(1) Whe
                                        enever an offence unnder this Ac has bee committed by
                                                                      Act       en
       accompany, e every perso who at the time th offence was comm
                               on                he                    mitted was in charge of, or
       wa responsi
         as         ible to the company f the con
                                         for     nduct of, th busines of the co
                                                            he        ss        ompany, as well
                                                                                           s
       as the company, shall be deeme to be guilty of the offence and shall be liable to be
                                        ed       g
         oceeded ag
       pro          gainst and punished accordingly.”

Maj. Dh himan B  Bose, VP of T
                          P        TigerSwan India (http://in. linkedin.co
                                            n                               om/pub/dhiman-
bose/22/4
        456/739) ha valuable recomme
                  as       e        endations for security agencies which the must follow –
                                                         y        s         ey

      Ask all the pe
           k        ersonnel with arms t have the license to be ente
                               w          to        eir                  ered in thee
       loc police ju
          cal       urisdiction - now this takes time and the police statiion carries
                                                    e         p                     s
       out a verifica
           t        ation of th
                              heir license from the jurisdictio and the issue of
                                          e         e         on         e          f
       lice
          ense place It needs leg work a money to get the process d
                   e.                    and                            done.

      On the gun entry is made in the neares police station the individual
         nce                                        st       s                   l
       with his wea
                  apon is summoned b the Loc Arms DEPT.(PO
                                         by        cal        D       OLICE HQ) )
       where the sa
                  ame is cros checked that the license is genuine a
                               ss         d,                           and the All
                                                                                 l
       Ind permit is true,-- lia
         dia                   aison acts by the sec
                                                   curity agency is must .

      On these t
        nce        two things are in pla the pe
                              s        ace       erson can display hi s weapon when standing
       gua
         ard. A register is kep by the o
                              pt       organizatio regardin the duty shift. The roving p
                                                 on       ng        y/                 police/
       bea constables do com and che this against the gun numbe and licen
         at                  me        eck                g         er        nse.

Thus arm med security guard is a guard who per
                              i          d           rforms his duties whhile carryin his lice
                                                                                    ng       ensed
weapon, f which h might be paid ext
          for       he        b           tra. Neithe his employer nor h principle employe will
                                                     er                  his                 er
have any legal con
         y          ntrol over his decis ion to use his weapon nor c
                                                     e                   can these be contra actual
obligation. He would be well within his llegal right to refuse use of his weapon on the orde of
                    d         w                                                    o         ers
his emplooyer / princ
                    ciple emplo
                              oyer. It wil l be his an only his decisions to use or not to us his
                                                     nd        s         s                   se
         weapon in any given circumstan
licensed w                                nces.

The need to amen the Arm Act, 1 959 has been long since fe and tim to pres for
          d        nd          ms                             g         elt        me        ss
amendme in the A has co
         ent        Act       ome! My u  understandding of the Arms Act and the PSAR Act as of
                                                                         t          P
now is tha the arm licenses are issue for exer
          at      ms          s          ed        rcising righ to private defense of self or other
                                                              ht          e
person an that of p
          nd        property of self or oth person When to use the w
                               f          her      n.         o          weapon an how to u is
                                                                                   nd        use
purely at the discre
                   etion and wisdom of the holder of the we
                              w                     r         eapons an of the license. No third
                                                                        nd                   o
party can give the h
                   holder of th weapon / license on how and when t use the firearms. A
                               he         n                              to                   Arms’
licenses aand weapo ons as of now cann be use for ear
                                          not       ed        rning liveli hood. Indi
                                                                                    ian law do
                                                                                             oesn’t
provide fo ‘guns-on
         or        n-hire’. The security a
                              e           agencies having ‘arm securiity guards on hire’ ca be
                                                   h          med                             an
easily treated by police office as ‘me
                               ers        ercenaries armies’ since law doesn’t provide for such
                                                   s           s
usages.

         herefore like to summ
I would th                     marize that the PSAR Act 2009 has been hastily dra
                                                      R                              afted and le
                                                                                                eaves
much to desire! I o often said in the pre  esence of past Joint Secretar (Police Moderniza
                                                                           ry                  ation),
Ministry o Home Af
         of          ffairs, who is the offiicial directl concerned with the PSAR Act that “this Act
                               o                        ly                  e       A
has been apparent written by the po
         n          tly                   olice officer to retain police co
                                                                n          ontrol over the act a
                                                                                     r          and it
appears t be so superfluou that ev
          to                   us        ven the broad head
                                                  b         dings are not expla   ained propperly!”
Interesting even w
          gly        when PSA Act 20
                              AR         005 provid
                                                  des for lot many thiings, it no
                                                            t                     owhere claarifies
whether s security gu
                    uards are to be trea ted as skilled, semi-
                                                             -skilled or non-skilled workers The
                                                                                            s.
Labor Dep partment’s gazette notifications on minim
                    s                    s        mum wages mentione the categories of ‘w
                                                            s          ed                    watch
and ward duties’ b
         d          besides oth but do not have ‘security guard’, ‘a
                               her       o         e                    armed sec curity guar as
                                                                                             rd’
categories Unfortun
          s.         nate part here is tha even ‘W
                                         at       Watch and Ward’ se   ervices are duties ar not
                                                                                  e         re
defined in any Act o the Orde
         n          or        er!




       E ergin S curit T nds
       Eme ng Sec ty Tren
                                                                   The nature of world-wide
                                                                   espio
                                                                       onage      is   currrently
                                                                   expe
                                                                      eriencing a dramatic shift.

                                                                   A re
                                                                      ecent analysis of trends
                                                                   sugggests the need to red
                                                                                   n        define
                                                                   the problem and to de
                                                                                    a      evelop
                                                                   new strategie   es to co ombat
                                                                   growwing threa  ats to na
                                                                                           ational
                                                                   secuurity     from    econ
                                                                                            nomic
                                                                   intellligence gathering and
                                                                                    g
                                                                   corpo orate espioonage.

                                                                   If le
                                                                       eft unchecked, ana  alysts
                                                                   estim
                                                                       mate losses could gro an
                                                                                  s        ow
                                                                   addit
                                                                       tional 50% by the year
                                                                                 %
                                                                   the n
                                                                       next year.

A New N
      National S
               Security Perspect
                               tive

The rapid pace of change in the post
         d                   n        t-Cold Wa era dem
                                               ar      mands a n  new definittion of na
                                                                                      ational
security is
          ssues. The developm
                   e        ment of th e Europea Commu
                                               an      unity, brea k-up of the Soviet U
                                                                             e        Union,
economic and political shifts within th former Warsaw Pact natiions, the reunificatio of
         c                  s         he                                               on
Germany, and the b
          ,        brisk economic grow of Pacific Rim co
                                     wth               ountries haave led to a new wo of
                                                                                      orld
opportunit and thre
          ty       eat.

The challenge to the intellige ence com munity is to discern and disr
                                                           n        rupt econo omic espio
                                                                                        onage
directed t
         towards na ational com
                              mpanies a and interes A fund
                                                      sts. damental s
                                                                    shift in our understanding
                                                                               r
and protection of the nation's secrets willl require:
                    e          s

      Re
        edefining th concept of nationa security secrets and moving beyond protection o the
                   he          t          al                             g         p          of
       def
         fense industry to asssisting the e
                                          entire priva sector in combatiing corpora espiona
                                                     ate                            ate       age.
      Mo explicitly connect
         ore                  ting the im pact of inddustrial esp
                                                                pionage on the natio
                                                                         n         onal economy to
       nat
         tional secu
                   urity issues
                              s.
      Bro
         oadening tthe role of personne security in non-defense ind
                                          el         y                   dustries, in
                                                                                    ncluding a new
       per
         rspective o "clearan
                   on         nces," train
                                         ning, and thhreat awar reness.
   Pro
         oviding mo informa
                   ore       ation to the corporate commun from th intellige
                                        e          e         nity      he       ence comm  munity
       reg
         garding esp
                   pionage threats, sour countries, and targets and means.
                                         rce
      Aggressively prosecutin those in
                             ng         nvolved in illegal econ
                                                              nomic and competitiv intellige
                                                                      d          ve        ence.

Emergin Espion
      ng     nage Tar
                    rgets

Every industry and every country has im
                                      mportant economic resources which mus be prote
                                               e           r               st        ected.
Generally the focu of econ
        y,        us       nomic esp ionage ac ctivities can be brok
                                                                   ken down into two b
                                                                                     broad
categories
         s.

The first is formula proces
                   ae,      sses, com ponents, structure, characteris
                                               s                    stics, and applicatio
                                                                                        ons of
new techn          Examples include:
         nologies. E

      Fift generat
          th         tion compu  uter archit
                                           tecture; ne computer chip d
                                                     ew               designs, co
                                                                                onductivity and
                                                                                          y,
       bio
         ochip reseaarch; and software de
                                s          evelopmen nt.
      Bio
         otechnolog gy.
      Supercomput    ting and su
                                upercondu ctivity.
      Hoolographic and las      ser rese arch, ap   pplications, and
       moodeling.
      Opptics and fib optics technology
                      ber                  y.
      Aerospace te echnologies.
      Meedical techn nologies, in
                                 ncluding p harmaceuticals.
      Advvanced co ommunicati   ions techn ologies an processe
                                                     nd          es.
      Advvances in satellite usage and space te
                                 u         d          echnologie and
                                                                es
       appplications.
      Ele
         ectromecha  anical prodducts and ttechnologiees.
      Chemical pro ocess techn  nology and research.
                                           d
      Inte
          egrated cirrcuit technoologies.

The secoond catego is facto associa
                  ory       ors   ated with th marketi
                                             he                ction, and security of new
                                                     ing, produc
technolog
        gies. Examples includ
                            de:

      Pricing inform
                    mation.
      Maarketing ressearch on demand a nd consum profiles
                                                     mer        s.
      Pro
         oducts nee eded for co ompatibility and applicability.
                                           y
      Pro
         oduction timmetables and produc release dates.
                                a          ct         d
      Pro
         oduction qu uantities.
      Maarket target and schedules and overseas marketing plans.
                     ts                     d         s         g
      Security equipment, sensors, and processes.
                                           d
      Ele
         ectronic baanking equi            terfaces, and protoco
                                 ipment, int                    ols.
      Tecchnology-u upgrade sc chedules a planned changes in techno
                                           and                  s    ology.
      Sofftware devvelopments especia lly those enhancing new techn
                                s,                   e                nologies, networking and
                                                                                n        g,
       tec
         chnological integration.
                     l

Two Vul
      lnerable T
               Targets: Compute and Intellectu Prope
                              ers   I        ual   erty

Computer provide both a ta
         rs                arget and a tool for industria espionag The new inform
                                                        al        ge.      n        mation
highways provided by networ systems (like Inte
                           rk       s        ernet, Milne and Bit
                                                         et,      tnet) and other adva
                                                                                     ances
like Elect
         tronic Data Exchang (EDI) a
                   a       ge       and SWIF (Society for Wor International Fina
                                             FT          y       rld                 ancial
Transactio
         ons) also can mean increase access for illegit
                          n        ed      s          timate pur
                                                               rposes. Co
                                                                        omputer-re
                                                                                 elated
crimes ca be broke down into four ma categor
        an        en               ain     ries.

Compute as Targ
          ers      gets: This relates to unlawful accessing of comput
                                        o           a                    ters to gain informati or
                                                                                    n          ion
to damage programs or hardw
           e                 ware. A wid array of crimes fall into this c
                                        de                              category inncluding: th of
                                                                                              heft
intellectua property or marke
          al       y         eting informmation, blackmail, sabotage o files, ac
                                                            s           of         ccessing a and/or
changing government record    ds, techn o-vandalis sm (causin interna damage to com
                                                            ng          al          e        mputer
systems) and techno o-trespass (violating the privac of computer files).
                             s                     cy

      Coomputers a Crime Instrumen
                     as                  nts: Comp puter proce
                                                             esses used as instruments of c
                                                                        d                    crime.
       Exaamples include: ATM fraud, rounding off moneta entries credit card fraud, and
                                                     o        ary        s,       c
       frauudulent co
                    omputer traansactions, and telec
                                         ,         communica ations fraud
                                                                        d.
      Inccidental CCriminal Computer Use: Co
                               C                   omputers used to in
                                                             u          ncrease th efficiency of
                                                                                 he
       tradditional crimes, for example money launderin
                                r        e:                   ng, off-shhore bankking, pedo  ophile
       info
          ormation e exchanges organize crime record ke
                               s,        ed                  eeping, m urder (thr rough changing
       info
          ormation in hospital records or other cont system and bo
                     n         r                    trol    ms),        ookmaking.
      Criimes Associated With Comp
                               W         puter Prev valence: The adven of micro
                                                             T          nt        ocomputers has
                                                                                             s
       opeened new crime and espionag e targets. These include: softw
                               d                                        ware piracyy/counterfe
                                                                                             eiting,
       coppyright vi iolations, counterfe
                                        eit and black
                                                    b
       maarket comp puter equipment and programs.

Another growing target of economiic / indu        ustrial
espionage is intellectual property. I consists of
          e                  p           It
concepts, ideas, planning docume        ents, des signs,
formulae, and other materials intended for produc or
                    r                              cts
services wwhich have commer   rcial value and repreesent
original th
          hought or work. It may be cle
                             m           early prote
                                                   ected
(with coppyrights, tr
                    rade-marks patents or as trade
                              s,         s,         t
secrets) o less w
          or       well defined (in the case of non-
protected research, incomplete new con  ncepts or id
                                                   deas,
and public domain in
          c         nformation which has been individually modified or refined).
                             n           s                 m

Intellectua property is increas
          al       y          singly soug through industrial espionag because it can ref
                                        ght      h                   ge         e          flect a
valuable iinvestment involving lengthy r
                              g         research and development effo
                                                 a                    orts. Moreover, it is often
stored on computer media which are the  em-selves an increas
                                                           sing target of espiona
                                                                                age.

Methods of Espionage
      s

In addition to unlaw computer access many of the traditi
          n        wful                 s,        f        ional meth
                                                                    hods emplo
                                                                             oyed in na
                                                                                      ational
security aand indust
                   trial espion
                              nage will c
                                        continue to be prom
                                                  o       minent. Ammong the many mea
                                                                             m        ans of
obtaining information are:

      Op source (Right to Informati on Act req
         pen        es          o                  quests, pubblished gov
                                                                        vernment documents and
                                                                                         s
       bid
         dding speci ifications, opened bid and technical journals).
                                 o        ds
      Coonsultants or outsourcing co    ontractors from targ geted firm who provide "inside
                                                                       ms        p
       info
          ormation" t competitors.
                     to
      "Mooles" wor rking insid a partiicular indu
                                de                  ustry or company with acce
                                                              c                 ess to de
                                                                                        esired
       info
          ormation.
      Coomputer ha acking and data transsmission in
                                                   nterruption.
      Coompromisin employe throug h blackma set ups, corruption and bribery.
                    ng           ees               ail,                 n,
   The use of st
          e         tudent rese
                              earchers a nd interns to gain ac
                                                             ccess to ressearch.
      Surveillance of corporate employe ees.
      Inte
          ercepting c
                    communica ations thro
                                        ough faxes, telephone etc.
                                                              es,
      Burglary.
      Gaaining acce to records throug h janitorial or service personne
                   ess                             l         e          el.
      Neew techno ologies an techniq
                              nd         ques ada apted as detection devices or espio
                                                                                    onage
       couuntermeassures.

Motivations for E
                Espionag
                       ge

In genera the prim
         al,        mary motiv vation for eengaging in espiona age is mo netary. Ho owever, seeveral
factors haave emerg  ged in reccent years that may make it easier for employee or othe to
                                                   y                     r          es        ers
participate in econo
          e          omic espioonage. As espionage activity has shifte away fr
                                                                         ed         rom a focu on
                                                                                              us
national ssecurity, th profitab
                     he        bility of sp
                                          pying has increased. In additiion, econo  omic espioonage
(especially when information is divulged to traditi
          y                                d        ional natio
                                                              onal allies) is less morally repu
                                                                         )         m          ulsive
than betraaying a nattional secu
                               urity secret and does not incur the same t
                                          t                    t         threat of pu
                                                                                    unishment..

Employer should w
         rs        watch for a number of key cha
                                               aracteristic that ma indicate a security risk.
                                                          cs      ay                  y
Security th
          hreats may include employees who:
                   y         e

      Are generally unhappy on the job , or unhap with the location o their ass
         e         y                               ppy       e          of        signment.
      Believe they have been overlook    ked for pro
                                                    omotion, salary incre
                                                                        eases, or commenda
                                                                                  c         ations
       and rewards.
         d
      Fee their con
         el        ntributions to the commpany are ignored an uncomp
                                                             nd         pensated.
      Are facing pe
         e         ersonal fina
                              ancial diffic
                                          culties.
      Ha persona problem
        ave         al       ms.

Preventi
       ion

There are a number of measu
        e                   ures that e
                                      employers can take to reduce industrial espionage The
                                                            t                         e.
most cruc of these are relate to effec
        cial     e          ed        ctive personnel policie and pro
                                                            es      ocedures.

Selection Employe
        n:          ees should be recrruited and screened on the b
                                                                 basis of th
                                                                           heir knowle
                                                                                     edge,
competennce, loyalty and psyc
                   y,       chological a social stability.
                                       and

Training: Employee training should inclu inform
                 e          s          ude    mation abou security threats an procedures.
                                                        ut                  nd

Surveillance: Maintaining control over and limitin access to sensitiv informa
                                                 ng                 ve      ation will re
                                                                                        educe
potential losses.

Supervision: Attenntive super
                            rvisors can both ide
                                      n        entify security violatio
                                                                      ons as we as intervene
                                                                              ell
before pro
         oblems occ by rem
                  cur      maining aler to warnin signals.
                                      rt        ng

Accounta           nsuring tha employe es follow procedures perform efficiently, and adhe to
         ability: En         at                  p           s,                         ere
organizati
         ional value will help maintain p
                   es                   personnel integrity.

Target Hardening: Measures should b taken to protect crucial inf
                               s        be t                   formation and to improve
security in order to r
          n          reduce tem
                              mptation.
Positive W
         Work Env  vironment: Increasin g employe
                              :                    ees' sense of worth w
                                                                       within the organization can
                                                                                   o
increase t
         their sense of obligat
                   e          tion and loy
                                         yalty, there decrea
                                                    eby      asing the p
                                                                       possibility of espionag
                                                                                   o         ge.

Realistic Sanction Employ
                   ns:      yees must have a realistic se
                                    t        r          ense that s
                                                                  security violations w be
                                                                                      will
identified and severe punished.
                    ely

Positive R
         Rewards: To balanc the threa of discip
                          ce        at        pline, posit
                                                         tive contrib
                                                                    butions to the organiz
                                                                               t         zation
must be re
         einforced a reward
                   and    ded.

Reinforce
        ement of E Ethics and Values: The organ
                            d                  nization mu strengt
                                                         ust      then its em
                                                                            mployees' s
                                                                                      sense
of moral obligation through a stateme of org
                  n                   ent      ganizationa values, reinforcem
                                                         al                 ment of eethical
standards and high standards of profess
        s,                  s         sionalism.

Imagine a world wh  here Licens Plate R
                              se      Recognition (LPR) tec
                                                  n        chnology aand advances in city     y-wide
video surveillance make it possible to spot suspects and crs         riminals so quickly and
comprehe  ensively tha law enfo
                     at       orcement is able to apprehend them virtu
                                        s         a                  ually at will, with little to no
struggle involved. T There wou be no shots fire no high
                              uld                 ed,      h-speed c chases, or other high-risk
activity.

Let’s take one scen
         e          nario as an example LPR ca
                              a           e.       ameras mo  ounted at the entran of a t
                                                                                 nce    tunnel
capture th license plate number of a su
         he                               uspect as his vehicle heads to
                                                              e
a major metropolitan area. Another v      video survveillance camera is
                                                              c
focused o the car. Working in tandem the licen plate number is
         on                              m,         nse        n
indexed to video fo
          o        ootage prev viously takken of the car, after which an
operator c
         confirms it is the one in questio
                                         on.

An alarm is immediately sent to law e nforcemen officials who right
                            t                 nt
away zon in on t
          ne      the vehicle with oth strateg
                            e        her      gically plac
                                                         ced video
surveillance camera The ca
                  as.      ameras tra the veh
                                    ack       hicle as it makes its
way throu the tun
         ugh     nnel.

As the car enters the city and nears an iintersection, it is watched by la enforcement offici
                                                                         aw                  ials in
various loocations, a these are network cameras easily accessed fro remote locations The
                    as                   k         s                     om       e         s.
cameras a also part of a municipal ne
           are                          etwork that connects various d
                                                    t          s         department includin the
                                                                                  ts,       ng
traffic dep
          partment re
                    esponsible for the co
                                        omputerized network of stopligh through
                                                                         hts      hout the cit As
                                                                                             ty.
the car gets closer to the inttersection, an officia from cen
                                                   al          ntral commmand turns the light from
                                                                                  s         t
green to rred.

The light continues to stay re which quickly cr
                             ed,                  reates grid
                                                            dlock in the already crowded u
                                                                       e                   urban
area. This gives var
         s         rious unde
                            ercover offficers time to approach the veh hicle from various an
                                                                                           ngles.
Before the suspects are able to realize how it ha
         e         s                             appened, th are su
                                                             hey       urrounded by officers with
                                                                                           s
guns draw and ha no way out. They are quickl arrested and taken into custo
         wn,      ave       y         y            ly                  n         ody.

Because o these ad
         of       dvances in LPR and video surv
                           n                  veillance technology a high-sp
                                                                   y,         peed chase that
                                                                                       e
could hav potentia injured or killed b
        ve       ally                bystanders other dr
                                              s,        rivers, or t
                                                                   the officers and susp
                                                                              s        pects,
was avoid and the suspects were app
        ded      e         s        prehended without a struggle.
                                                         s

This is not a farfet tched scenario. It’s actually happening right now in variou metrop
                                                    h                  w          us      politan
centers th
         hroughout the world. In what f   follows, we will explore recent innovatio in LPR and
                                                    e                    t        ons      R
video surv veillance t
                     technology that allow law enfo
                              y           w         orcement divisions t fight crime and ensure
                                                                        to
public saf
         fety much m more effec
                              ctively than could hav been im
                                         n          ve       magined jus a few short years a
                                                                        st                 ago.
Advanc in V
     ces Video Surveilla
                       ance Tec
                              chnolog
                                    gy
Video surrveillance ccameras and manag
                             a           gement syystems hav come a long way from the early
                                                             ve                    y
days of CCCTV whe grainy, analog im ages and limited fun
                   en                                         nctionality was the rule of the day.
                                                                                    r         e
Digital (IP) techno ology now offers a host of advantages, inclu
                             w                     f                     uding ope multi-ve
                                                                                   en          endor
architectu
         ures suppo orting cam
                             meras with clearer picture quality, a va
                                        h         p                      ariety of flexible ne
                                                                                   f         etwork
architectu options including wireless camera connectivity enhance scalability and fa
         ure        s,       g                    c          y,          ed                  ailover
and redunndancy options. Mor so, inno vative feat
                             re                    tures in ad
                                                             dvanced viideo surve  eillance sys
                                                                                              stems
have help ped cities attain ob
                             bjectives thhey never before deemed po
                                                  r          d           ossible. Essentially, truly
                                                                                  E
advanced systems allow multiple inde
         d                              ependent systems fr
                                                  s          rom nume rous organizations to be
managed as if they were a sinngle unified system, regardless of geograp
                                        d         r                      phic bounddaries.

Similarly, developm  ments in viddeo analyttics have also added a layer of intellige ence that make
these cam  meras and systems much mor effective crime fig
                     d                     re                   ghting toolls, so that instead o just
                                                                                     t         of
viewing s scenes, the cameras look for a
                      e         s          abandoned objects on the roa
                                                     d                     adway, loitering or v
                                                                                               virtual
fencing ne critical infrastruc
           ear                  ctures, and can insta
                                          d         antly alert law enforceement whe a suspi
                                                                                     en        icious
activity is spotted. TThese netw work cameeras can tyypically be easily ac
                                                               e          ccessed fro laptops cell
                                                                                     om        s,
phones a  and other devices which not o
                                w          only cut down on th need fo tradition surveillance
                                                    d           he         or        nal
technique but also improve overall co
          es,         o                    ommunication and collaboratio within the munici
                                                                c         on          t        ipality
while shar ring infrast
                      tructure co
                                osts betwee various departments.
                                           en

IP video ssurveillance is definitely more a more the wave of the future just as digital adva
                     e                     and                  o         e,       d         ances
have take over so much of the rest o the techn
          en        o                      of          nological landscape. However for those who
                                                                          .       r,         e
wish to mmaintain all or part of their CCT systems in place, the good news is th they ca do
                                f          TV          s                           hat       an
so, and at the same time, ben
                     e          nefit from ddigital adv
                                                      vances via encoders to gradually migrate their
                                                                                             e
existing in
          nvestments to the dig
                     s          gital age.

Advanc in L
     ces License Plate R
                       Recogni
                             ition LP Tech
                                    PR   hnology
                                               y
                                          Challeenges arise when it c
                                                           e          comes to reading lic cense
                                          plates at var    rious spe eeds and in va
                                                                                 d         arious
                                          environmental co onditions (
                                                                     (i.e., day, night, rain fog,
                                                                                           n,
                                          etc.). This is a case wh   here not just any C   CCTV
                                          camer and OC (optica charact
                                                ra         CR         al         ter recognnition)
                                          technoology will do. Extern infra-re lighting, high
                                                           d         nal        ed          ,
                                          shutter speed progressiive scan camera, and
                                          chromatically co orrected le
                                                                     enses are some o the
                                                                                e          of
features necessary for the license pla image to be cl
                   y          l       ate       e          lear, of suufficient quality and well
                                                                                           d
contrasted at any sp
         d          peed or tim of day and night for it to
                              me
be read perfectly by an LPR engine.
                   y

For law e enforcemen and nat
                      nt        tional secuurity agenc cies the
good new is that not only is such LPR tech
          ws          t         y                       hnology
available, but accur racy in cap
                               pturing lice nse plates is very
                                                       s
high. One advanced LPR sys
          e           d         stem in pa rticular can attain
more tha 93-perc
          an         cent accur racy, or 9 percent when
                                           99
considerin OCR eq
          ng          quivalents. Along wit that, the ability
                                            th          e
to link video feeds a LPR, and view b
                     and         a         both in one single
                                                        e
unified sooftware inte
                     erface is a serious st forward that is
                                           tep         d
already b benefiting law enforc cement off fficials thro
                                                       oughout
the world. Being able to index video footage and instantly link it to a license plate number is not
just a convenience, but as seen from our previous example with the car full of suspects entering
a city, can be essential to pro-active enforcement.

The One-Two Punch for Municipalities: Advanced Video Surveillance and
LPR Technology
Most city departments, including police, fire, water, gas and electric, transportation etc. are more
and more tied-in to one another. In the United States, as in many countries, the goal is not just
interagency cooperation at the federal level, but the ability for cities to quickly marshal their
defenses in the event of an emergency situation, and more importantly to use modern
technology advances to try to be more pro-active in addressing public safety. On a more day-to-
day level, with cities struggling for sources of revenue because of difficult economic times, it is
important that such technology also benefit cities’ financial bottom lines as well.

All this is possible now because of highly intelligent video surveillance and advanced LPR
technology. Dispatch centers can instantly know through video cameras placed on highways
and streets whether an ambulance should be sent to an accident scene. Law enforcement
officers can observe criminal gang-related or illegal drug-selling activity in a neighborhood and
do so un-detected by suspects. LPR technology can be used in both fixed applications for
surveillance or traffic management or in mobile applications where LPR cameras are mounted
on the vehicle to spot wanted criminals, scofflaw vehicles or vehicles without proper parking
permits or parked overtime. In a day and age in which every dollar a city spends is scrutinized
more closely, the ability to do more with less is a constant theme. The ability of video
surveillance and LPR technologies to work in tandem so that, for example, a license plate is
matched to previous video footage of a suspect’s car, reduces the amount of hours that might
have been spent on such a task if this level of integration with new technologies did not exist.

For budget-conscious municipalities, the benefits of advanced video surveillance and LPR
techniques have also been extended to mass transit. This includes controlling traffic through
automated tolling, as well as monitoring traffic density, volume, and flow. Besides cutting down
on gridlock, the cameras can also be used to check for speeding violations by calculating a
vehicle’s time spent traveling between two points.

The Road Ahead
As the populations of major cities of the world continue to grow, traffic issues typically get
worse, not better. Along with such population growth, crime often increases, particularly in times
of economic distress. At the same time, governments worldwide – at the federal, state and local
levels – are facing even greater budgetary constraints than usual.

With all this in mind, the need for automation and greater intelligence in reference to security
technology should become even more paramount. Fortunately, the innovations that have taken
place in city-wide video surveillance and LPR in recent years have not only increased the
automation factor, but increased intelligence and functionality. These technologies have now
become even greater crime fighting partners for law enforcement, as well as have helped to
reduce total cost of ownership for cities. As the technology gets even smarter over time, such
benefits can only be expected to increase.
Reference: http://www.securitymagazine.com/Articles/Online_Exclusives/BNP_GUID_9-5-2006_A_10000000000000919930
tions & fee
Suggest         edback may be sen to us on e-mail: sbtyagi195
                                nt       n                  58@gmail.com




P.S. - If y
          you don't like to receive our newslette we apo
                                      r         er,    ologize fo botherin you. Please
                                                                or         ng
let us kno your m address and we will mov it out fro our co
          ow      mail                e        ve      om       ontact list, thank you!
                                                                           ,

Weitere ähnliche Inhalte

Andere mochten auch

Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016
Jos Feyaerts
 
Ap 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chaoAp 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chao
cc50043
 

Andere mochten auch (8)

Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016Digitalisation of financial supply chain some trends 2015 to 2016
Digitalisation of financial supply chain some trends 2015 to 2016
 
Assessing the sales margins in new business models (SAAS, e-commerce) Bryo Le...
Assessing the sales margins in new business models (SAAS, e-commerce) Bryo Le...Assessing the sales margins in new business models (SAAS, e-commerce) Bryo Le...
Assessing the sales margins in new business models (SAAS, e-commerce) Bryo Le...
 
Hábitos en la búsqueda de trabajo del talento peruano 2015
Hábitos en la búsqueda de trabajo del talento peruano 2015Hábitos en la búsqueda de trabajo del talento peruano 2015
Hábitos en la búsqueda de trabajo del talento peruano 2015
 
Impact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP LandscapeImpact of platformization on your business processes and ERP Landscape
Impact of platformization on your business processes and ERP Landscape
 
Ap 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chaoAp 2.2 que te gusta y manu chao
Ap 2.2 que te gusta y manu chao
 
Visual Design with Data
Visual Design with DataVisual Design with Data
Visual Design with Data
 
3 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 20173 Things Every Sales Team Needs to Be Thinking About in 2017
3 Things Every Sales Team Needs to Be Thinking About in 2017
 
How to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your NicheHow to Become a Thought Leader in Your Niche
How to Become a Thought Leader in Your Niche
 

Mehr von Capt SB Tyagi, COAC'CC*,FISM,CSC,

ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 

Mehr von Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 

News letter nov 12

  • 1. New wslette Nov er: vember 2012 r Let’s profe ’s ession nalize the pro t ofessio onals… … http://w www.wix.com/ /sbtyagi/iciss s Bet tter Secur S S rity Sense e... The mo essen tial quality, which we have b ignored is the p ost w but d, power of obse ervation. We see but we don’t obs e serve. Obsservation is not jus seeing thing st but unnderstand ing the im mplication of wha we see So effe ns at e. ective observvation of what go oes on around us is a very impo a s v ortant require ement for better se r ecurity se ense. Wheerever you are, be it at home or outsid in a pu de ublic plac look a round and try and see ce d through t things rath than ju see th her ust hem. Try and ggauge the need for a thing to be prese at a pa e o ent articular p place, for a person to be standing at a particular plac Don’t i ce. ignore any ything tha seems u at unusual. Pry harder and P you will c come out wwith surpr rising resu ults. Make observat e tion a habbit. ‘Festival of Lights’ celebratted in Indi with fervor is round the c ia corner! Its message has s e universal appeal a l and applic cation – vvictory of light over darknes victory of good over ss, y bad! Let t there be li ight to lea all on v ad virtuous paath! Cap S B T pt Tyagi For IC CISS
  • 2. Pr rivate Sec e curity Guard: Use of licen f nsed weaapons while on duty n y Capt SB Ty C yagi, COAS S’CC**, FISM CSC M, There is la of consensus in Man-guard ack ding indust and the Users reg try e garding the arms lice e ensing requiremeents and c conditions in the Pr ivate Secu urity Agencies Regu ulation (PS SAR) Act 2 2005. While the Act does not recogn nize armed guarding services as a distinc category of service the d a ct y e, increasing demand for armed security is leading to unregulated and random employme of g d g d ent individuals as privat security guards wh hold per s te ho rsonal licen nses. Ironi cally, while the PSAR has e R nothing deefined, the Arms Act 1959, on allows individual applicants to hold arms license As e t, nly a es. a result, private seecurity age encies hav been compelled to employ people who hold Arms ve c y w License in individual capacity. n About this prevailing situat tion Capt Arvind Mahajan, Senior VP at Reliance Infra t , R (http://in.li inkedin.com m/pub/arvi ind-mahaja an/30/208/ /b16) questions – “Th weapo that a guard carries, strictly sp he on peaking is for HIS PERSO s S ONAL PRROTECTIO It is by default t ON. y that the in nstallation (where su uch a gua carryin his ard ng perrsonal weaapon, meant for his p personal protection), gets arme protectio But, ca we ed on. an as Principal E Employer ask vendor agencies to provide us Armed Guard?” a r e d To this C Col. Saten ndra Kuma CPO, C ar CPO (I), G. M. (Tra G aining) at G4S Sec curity Serv vices (http://in.li inkedin.com m/pub/sate endra-kum mar-cpo-cpo o-i/16/88b/ /57b) says – “Ye anyone with valid license ca use his weapon in self- defe es an n ense but onu of proving that us of weap us se pon was in Self Defense lies w n with the perrson using it. Now next que g estion is what is self-defense If a w e? susspected crriminal is without an weapon and only trespasse on a w ny n y es priv vate propeerty can th ASG us his wea he se apon? You be rest a u assured crim minal with intent of committing a crime will never co ome with a double or single barrel gun vissible from miles! He will come with a co ncealed weeapon and use it at point blan There are very ifs and b uts and nk. unlless law sp pecifies leg authori ty it is difficult to bail out an AS if he gal SG use weapon Surely no client wiill come in his suppo even wh es n. n ort hen he ha used we as eapon to s save client life!” t's For issues relating t security guards us s to sing weapo while on duty, w need to understan the ons o we nd scope of Right to pprivate defe efined in section 96 & 97 of I ndian Pen Code, w ense as de s nal which provides t that -  Noothing is an offence which is do in the exercise of private d w one o defense [T There are some res strictions in the Sec 99] n 9  Eve person has a right to def ery n fend his ow body and the bo wn a ody of any other pe y erson, agaainst any ooffence affe ecting the human body.  Eve person have a right to de ery n efend the property whether m w movable or immovab r ble, of him mself or of any other person, a r against any act which is an offence fa y alling unde the er deffinition of theft, robb bery, mischhief or criminal trespass, o which is an attem to or s mpt commmit theft, robbery, mischief or criminal tr m r respass.
  • 3. Thus we know that as a law abiding citizen any security guard who is on duty with his licensed weapon can use his weapon in exercise of his right to ‘private defense, even when his employer doesn’t order him to do so or even when scope of his employment or jurisdiction of duty does not provide so. In fact it is not only expected of him, but is also his duty as law-abiding citizen to use the licensed weapon while preventing attempt or commitment of crime. We also further need to study the scope of grant of arms’ licenses under Indian Arms Act, which in very clear terms is for the purpose of ‘private defense’. About armed security guards there is reference in PSAR Act 2005 in Section 2, Subsection (a) which says that – “Armored car service” means the service provided by deployment of armed guards along with armored car…” Further, Section2, Subsection (h) says that – “Private security guard” means a person providing private security with or without arms to another person or property or both and includes a supervisor.” Surprisingly there is no reference of armed security guards or the definition in PSAR Rules 2006. Thus we have to understand the scope of duties and validity of using licensed arms under Arms Act 1959 and also understand 'Right to Private Defense' as defined in Indian Penal Code (Section 96 onwards) especially on ‘use of force’. Under the Arms Act 1959, the arms licenses are issued but no specific purposes are enumerated for obtaining the licenses. It is only inferred that the arms under licenses are to be used in exercise of ‘Right to Private Defense’ (ROPD) or for ‘sports’ or special reasons such as cinematography. Hunting is not permitted anymore and thus only sport left is marksmanship. Good news is that Arms Act 1959 does provide in its Section 40 the protection of action taken in good faith. It says that, “No suit, prosecution or other legal proceeding shall lie against any person for anything which is in good faith done or intended to be done under this Act.” At this point Arvind Mahajan, Sr. VP at Reliance Infra is in quandary and he says - “Knowing fully well that the Armed Guard has the weapon for his personal protection -- Is it right to call him an Armed Guard? (I am not going into ROPD provisions - whether he fires or not, that's immaterial). But, Can I deploy him as an Armed Guard? How do I differentiate his duties from the unarmed Guard? His predicament goes further, “How does one justify that an Armed Guard needs to be paid extra? Aren’t we by default admitting that he is being deployed for providing Armed Protection, which as per Arms Act he is not supposed to provide? The individual got an Arms License, because he convinced the authorities of threat to his life, and NOT for performing an Armed Guard duty.” There were times when organizations or the companies used to get Arms Licensees under retainer ship basis (Section 13 of Arms Rules 1962), under which the licenses were issued on the name of the company and the arms were to be used by notified persons of the organization or the companies. These licenses were found to be cumbersome to obtain and had inherent
  • 4. difficulties for the a s actual licen holder in some case a bu directo or the rich owner of a nse r usy or r r factories s since there was Sec e ction 33 of Arms Act 1959 whic held the respon f ch em nsible for a action by the reta ainers of th licenses he s. The Section 33 of A Arms Act sa ays, “ “Offfences by companie es.-(1) Whe enever an offence unnder this Ac has bee committed by Act en accompany, e every perso who at the time th offence was comm on he mitted was in charge of, or wa responsi as ible to the company f the con for nduct of, th busines of the co he ss ompany, as well s as the company, shall be deeme to be guilty of the offence and shall be liable to be ed g oceeded ag pro gainst and punished accordingly.” Maj. Dh himan B Bose, VP of T P TigerSwan India (http://in. linkedin.co n om/pub/dhiman- bose/22/4 456/739) ha valuable recomme as e endations for security agencies which the must follow – y s ey  Ask all the pe k ersonnel with arms t have the license to be ente w to eir ered in thee loc police ju cal urisdiction - now this takes time and the police statiion carries e p s out a verifica t ation of th heir license from the jurisdictio and the issue of e e on e f lice ense place It needs leg work a money to get the process d e. and done.  On the gun entry is made in the neares police station the individual nce st s l with his wea apon is summoned b the Loc Arms DEPT.(PO by cal D OLICE HQ) ) where the sa ame is cros checked that the license is genuine a ss d, and the All l Ind permit is true,-- lia dia aison acts by the sec curity agency is must .  On these t nce two things are in pla the pe s ace erson can display hi s weapon when standing gua ard. A register is kep by the o pt organizatio regardin the duty shift. The roving p on ng y/ police/ bea constables do com and che this against the gun numbe and licen at me eck g er nse. Thus arm med security guard is a guard who per i d rforms his duties whhile carryin his lice ng ensed weapon, f which h might be paid ext for he b tra. Neithe his employer nor h principle employe will er his er have any legal con y ntrol over his decis ion to use his weapon nor c e can these be contra actual obligation. He would be well within his llegal right to refuse use of his weapon on the orde of d w o ers his emplooyer / princ ciple emplo oyer. It wil l be his an only his decisions to use or not to us his nd s s se weapon in any given circumstan licensed w nces. The need to amen the Arm Act, 1 959 has been long since fe and tim to pres for d nd ms g elt me ss amendme in the A has co ent Act ome! My u understandding of the Arms Act and the PSAR Act as of t P now is tha the arm licenses are issue for exer at ms s ed rcising righ to private defense of self or other ht e person an that of p nd property of self or oth person When to use the w f her n. o weapon an how to u is nd use purely at the discre etion and wisdom of the holder of the we w r eapons an of the license. No third nd o party can give the h holder of th weapon / license on how and when t use the firearms. A he n to Arms’ licenses aand weapo ons as of now cann be use for ear not ed rning liveli hood. Indi ian law do oesn’t provide fo ‘guns-on or n-hire’. The security a e agencies having ‘arm securiity guards on hire’ ca be h med an easily treated by police office as ‘me ers ercenaries armies’ since law doesn’t provide for such s s usages. herefore like to summ I would th marize that the PSAR Act 2009 has been hastily dra R afted and le eaves much to desire! I o often said in the pre esence of past Joint Secretar (Police Moderniza ry ation), Ministry o Home Af of ffairs, who is the offiicial directl concerned with the PSAR Act that “this Act o ly e A has been apparent written by the po n tly olice officer to retain police co n ontrol over the act a r and it
  • 5. appears t be so superfluou that ev to us ven the broad head b dings are not expla ained propperly!” Interesting even w gly when PSA Act 20 AR 005 provid des for lot many thiings, it no t owhere claarifies whether s security gu uards are to be trea ted as skilled, semi- -skilled or non-skilled workers The s. Labor Dep partment’s gazette notifications on minim s s mum wages mentione the categories of ‘w s ed watch and ward duties’ b d besides oth but do not have ‘security guard’, ‘a her o e armed sec curity guar as rd’ categories Unfortun s. nate part here is tha even ‘W at Watch and Ward’ se ervices are duties ar not e re defined in any Act o the Orde n or er! E ergin S curit T nds Eme ng Sec ty Tren The nature of world-wide espio onage is currrently expe eriencing a dramatic shift. A re ecent analysis of trends sugggests the need to red n define the problem and to de a evelop new strategie es to co ombat growwing threa ats to na ational secuurity from econ nomic intellligence gathering and g corpo orate espioonage. If le eft unchecked, ana alysts estim mate losses could gro an s ow addit tional 50% by the year % the n next year. A New N National S Security Perspect tive The rapid pace of change in the post d n t-Cold Wa era dem ar mands a n new definittion of na ational security is ssues. The developm e ment of th e Europea Commu an unity, brea k-up of the Soviet U e Union, economic and political shifts within th former Warsaw Pact natiions, the reunificatio of c s he on Germany, and the b , brisk economic grow of Pacific Rim co wth ountries haave led to a new wo of orld opportunit and thre ty eat. The challenge to the intellige ence com munity is to discern and disr n rupt econo omic espio onage directed t towards na ational com mpanies a and interes A fund sts. damental s shift in our understanding r and protection of the nation's secrets willl require: e s  Re edefining th concept of nationa security secrets and moving beyond protection o the he t al g p of def fense industry to asssisting the e entire priva sector in combatiing corpora espiona ate ate age.  Mo explicitly connect ore ting the im pact of inddustrial esp pionage on the natio n onal economy to nat tional secu urity issues s.  Bro oadening tthe role of personne security in non-defense ind el y dustries, in ncluding a new per rspective o "clearan on nces," train ning, and thhreat awar reness.
  • 6. Pro oviding mo informa ore ation to the corporate commun from th intellige e e nity he ence comm munity reg garding esp pionage threats, sour countries, and targets and means. rce  Aggressively prosecutin those in ng nvolved in illegal econ nomic and competitiv intellige d ve ence. Emergin Espion ng nage Tar rgets Every industry and every country has im mportant economic resources which mus be prote e r st ected. Generally the focu of econ y, us nomic esp ionage ac ctivities can be brok ken down into two b broad categories s. The first is formula proces ae, sses, com ponents, structure, characteris s stics, and applicatio ons of new techn Examples include: nologies. E  Fift generat th tion compu uter archit tecture; ne computer chip d ew designs, co onductivity and y, bio ochip reseaarch; and software de s evelopmen nt.  Bio otechnolog gy.  Supercomput ting and su upercondu ctivity.  Hoolographic and las ser rese arch, ap pplications, and moodeling.  Opptics and fib optics technology ber y.  Aerospace te echnologies.  Meedical techn nologies, in ncluding p harmaceuticals.  Advvanced co ommunicati ions techn ologies an processe nd es.  Advvances in satellite usage and space te u d echnologie and es appplications.  Ele ectromecha anical prodducts and ttechnologiees.  Chemical pro ocess techn nology and research. d  Inte egrated cirrcuit technoologies. The secoond catego is facto associa ory ors ated with th marketi he ction, and security of new ing, produc technolog gies. Examples includ de:  Pricing inform mation.  Maarketing ressearch on demand a nd consum profiles mer s.  Pro oducts nee eded for co ompatibility and applicability. y  Pro oduction timmetables and produc release dates. a ct d  Pro oduction qu uantities.  Maarket target and schedules and overseas marketing plans. ts d s g  Security equipment, sensors, and processes. d  Ele ectronic baanking equi terfaces, and protoco ipment, int ols.  Tecchnology-u upgrade sc chedules a planned changes in techno and s ology.  Sofftware devvelopments especia lly those enhancing new techn s, e nologies, networking and n g, tec chnological integration. l Two Vul lnerable T Targets: Compute and Intellectu Prope ers I ual erty Computer provide both a ta rs arget and a tool for industria espionag The new inform al ge. n mation highways provided by networ systems (like Inte rk s ernet, Milne and Bit et, tnet) and other adva ances like Elect tronic Data Exchang (EDI) a a ge and SWIF (Society for Wor International Fina FT y rld ancial
  • 7. Transactio ons) also can mean increase access for illegit n ed s timate pur rposes. Co omputer-re elated crimes ca be broke down into four ma categor an en ain ries. Compute as Targ ers gets: This relates to unlawful accessing of comput o a ters to gain informati or n ion to damage programs or hardw e ware. A wid array of crimes fall into this c de category inncluding: th of heft intellectua property or marke al y eting informmation, blackmail, sabotage o files, ac s of ccessing a and/or changing government record ds, techn o-vandalis sm (causin interna damage to com ng al e mputer systems) and techno o-trespass (violating the privac of computer files). s cy  Coomputers a Crime Instrumen as nts: Comp puter proce esses used as instruments of c d crime. Exaamples include: ATM fraud, rounding off moneta entries credit card fraud, and o ary s, c frauudulent co omputer traansactions, and telec , communica ations fraud d.  Inccidental CCriminal Computer Use: Co C omputers used to in u ncrease th efficiency of he tradditional crimes, for example money launderin r e: ng, off-shhore bankking, pedo ophile info ormation e exchanges organize crime record ke s, ed eeping, m urder (thr rough changing info ormation in hospital records or other cont system and bo n r trol ms), ookmaking.  Criimes Associated With Comp W puter Prev valence: The adven of micro T nt ocomputers has s opeened new crime and espionag e targets. These include: softw d ware piracyy/counterfe eiting, coppyright vi iolations, counterfe eit and black b maarket comp puter equipment and programs. Another growing target of economiic / indu ustrial espionage is intellectual property. I consists of e p It concepts, ideas, planning docume ents, des signs, formulae, and other materials intended for produc or r cts services wwhich have commer rcial value and repreesent original th hought or work. It may be cle m early prote ected (with coppyrights, tr rade-marks patents or as trade s, s, t secrets) o less w or well defined (in the case of non- protected research, incomplete new con ncepts or id deas, and public domain in c nformation which has been individually modified or refined). n s m Intellectua property is increas al y singly soug through industrial espionag because it can ref ght h ge e flect a valuable iinvestment involving lengthy r g research and development effo a orts. Moreover, it is often stored on computer media which are the em-selves an increas sing target of espiona age. Methods of Espionage s In addition to unlaw computer access many of the traditi n wful s, f ional meth hods emplo oyed in na ational security aand indust trial espion nage will c continue to be prom o minent. Ammong the many mea m ans of obtaining information are:  Op source (Right to Informati on Act req pen es o quests, pubblished gov vernment documents and s bid dding speci ifications, opened bid and technical journals). o ds  Coonsultants or outsourcing co ontractors from targ geted firm who provide "inside ms p info ormation" t competitors. to  "Mooles" wor rking insid a partiicular indu de ustry or company with acce c ess to de esired info ormation.  Coomputer ha acking and data transsmission in nterruption.  Coompromisin employe throug h blackma set ups, corruption and bribery. ng ees ail, n,
  • 8. The use of st e tudent rese earchers a nd interns to gain ac ccess to ressearch.  Surveillance of corporate employe ees.  Inte ercepting c communica ations thro ough faxes, telephone etc. es,  Burglary.  Gaaining acce to records throug h janitorial or service personne ess l e el.  Neew techno ologies an techniq nd ques ada apted as detection devices or espio onage couuntermeassures. Motivations for E Espionag ge In genera the prim al, mary motiv vation for eengaging in espiona age is mo netary. Ho owever, seeveral factors haave emerg ged in reccent years that may make it easier for employee or othe to y r es ers participate in econo e omic espioonage. As espionage activity has shifte away fr ed rom a focu on us national ssecurity, th profitab he bility of sp pying has increased. In additiion, econo omic espioonage (especially when information is divulged to traditi y d ional natio onal allies) is less morally repu ) m ulsive than betraaying a nattional secu urity secret and does not incur the same t t t threat of pu unishment.. Employer should w rs watch for a number of key cha aracteristic that ma indicate a security risk. cs ay y Security th hreats may include employees who: y e  Are generally unhappy on the job , or unhap with the location o their ass e y ppy e of signment.  Believe they have been overlook ked for pro omotion, salary incre eases, or commenda c ations and rewards. d  Fee their con el ntributions to the commpany are ignored an uncomp nd pensated.  Are facing pe e ersonal fina ancial diffic culties.  Ha persona problem ave al ms. Preventi ion There are a number of measu e ures that e employers can take to reduce industrial espionage The t e. most cruc of these are relate to effec cial e ed ctive personnel policie and pro es ocedures. Selection Employe n: ees should be recrruited and screened on the b basis of th heir knowle edge, competennce, loyalty and psyc y, chological a social stability. and Training: Employee training should inclu inform e s ude mation abou security threats an procedures. ut nd Surveillance: Maintaining control over and limitin access to sensitiv informa ng ve ation will re educe potential losses. Supervision: Attenntive super rvisors can both ide n entify security violatio ons as we as intervene ell before pro oblems occ by rem cur maining aler to warnin signals. rt ng Accounta nsuring tha employe es follow procedures perform efficiently, and adhe to ability: En at p s, ere organizati ional value will help maintain p es personnel integrity. Target Hardening: Measures should b taken to protect crucial inf s be t formation and to improve security in order to r n reduce tem mptation.
  • 9. Positive W Work Env vironment: Increasin g employe : ees' sense of worth w within the organization can o increase t their sense of obligat e tion and loy yalty, there decrea eby asing the p possibility of espionag o ge. Realistic Sanction Employ ns: yees must have a realistic se t r ense that s security violations w be will identified and severe punished. ely Positive R Rewards: To balanc the threa of discip ce at pline, posit tive contrib butions to the organiz t zation must be re einforced a reward and ded. Reinforce ement of E Ethics and Values: The organ d nization mu strengt ust then its em mployees' s sense of moral obligation through a stateme of org n ent ganizationa values, reinforcem al ment of eethical standards and high standards of profess s, s sionalism. Imagine a world wh here Licens Plate R se Recognition (LPR) tec n chnology aand advances in city y-wide video surveillance make it possible to spot suspects and crs riminals so quickly and comprehe ensively tha law enfo at orcement is able to apprehend them virtu s a ually at will, with little to no struggle involved. T There wou be no shots fire no high uld ed, h-speed c chases, or other high-risk activity. Let’s take one scen e nario as an example LPR ca a e. ameras mo ounted at the entran of a t nce tunnel capture th license plate number of a su he uspect as his vehicle heads to e a major metropolitan area. Another v video survveillance camera is c focused o the car. Working in tandem the licen plate number is on m, nse n indexed to video fo o ootage prev viously takken of the car, after which an operator c confirms it is the one in questio on. An alarm is immediately sent to law e nforcemen officials who right t nt away zon in on t ne the vehicle with oth strateg e her gically plac ced video surveillance camera The ca as. ameras tra the veh ack hicle as it makes its way throu the tun ugh nnel. As the car enters the city and nears an iintersection, it is watched by la enforcement offici aw ials in various loocations, a these are network cameras easily accessed fro remote locations The as k s om e s. cameras a also part of a municipal ne are etwork that connects various d t s department includin the ts, ng traffic dep partment re esponsible for the co omputerized network of stopligh through hts hout the cit As ty. the car gets closer to the inttersection, an officia from cen al ntral commmand turns the light from s t green to rred. The light continues to stay re which quickly cr ed, reates grid dlock in the already crowded u e urban area. This gives var s rious unde ercover offficers time to approach the veh hicle from various an ngles. Before the suspects are able to realize how it ha e s appened, th are su hey urrounded by officers with s guns draw and ha no way out. They are quickl arrested and taken into custo wn, ave y y ly n ody. Because o these ad of dvances in LPR and video surv n veillance technology a high-sp y, peed chase that e could hav potentia injured or killed b ve ally bystanders other dr s, rivers, or t the officers and susp s pects, was avoid and the suspects were app ded e s prehended without a struggle. s This is not a farfet tched scenario. It’s actually happening right now in variou metrop h w us politan centers th hroughout the world. In what f follows, we will explore recent innovatio in LPR and e t ons R video surv veillance t technology that allow law enfo y w orcement divisions t fight crime and ensure to public saf fety much m more effec ctively than could hav been im n ve magined jus a few short years a st ago.
  • 10. Advanc in V ces Video Surveilla ance Tec chnolog gy Video surrveillance ccameras and manag a gement syystems hav come a long way from the early ve y days of CCCTV whe grainy, analog im ages and limited fun en nctionality was the rule of the day. r e Digital (IP) techno ology now offers a host of advantages, inclu w f uding ope multi-ve en endor architectu ures suppo orting cam meras with clearer picture quality, a va h p ariety of flexible ne f etwork architectu options including wireless camera connectivity enhance scalability and fa ure s, g c y, ed ailover and redunndancy options. Mor so, inno vative feat re tures in ad dvanced viideo surve eillance sys stems have help ped cities attain ob bjectives thhey never before deemed po r d ossible. Essentially, truly E advanced systems allow multiple inde d ependent systems fr s rom nume rous organizations to be managed as if they were a sinngle unified system, regardless of geograp d r phic bounddaries. Similarly, developm ments in viddeo analyttics have also added a layer of intellige ence that make these cam meras and systems much mor effective crime fig d re ghting toolls, so that instead o just t of viewing s scenes, the cameras look for a e s abandoned objects on the roa d adway, loitering or v virtual fencing ne critical infrastruc ear ctures, and can insta d antly alert law enforceement whe a suspi en icious activity is spotted. TThese netw work cameeras can tyypically be easily ac e ccessed fro laptops cell om s, phones a and other devices which not o w only cut down on th need fo tradition surveillance d he or nal technique but also improve overall co es, o ommunication and collaboratio within the munici c on t ipality while shar ring infrast tructure co osts betwee various departments. en IP video ssurveillance is definitely more a more the wave of the future just as digital adva e and o e, d ances have take over so much of the rest o the techn en o of nological landscape. However for those who . r, e wish to mmaintain all or part of their CCT systems in place, the good news is th they ca do f TV s hat an so, and at the same time, ben e nefit from ddigital adv vances via encoders to gradually migrate their e existing in nvestments to the dig s gital age. Advanc in L ces License Plate R Recogni ition LP Tech PR hnology y Challeenges arise when it c e comes to reading lic cense plates at var rious spe eeds and in va d arious environmental co onditions ( (i.e., day, night, rain fog, n, etc.). This is a case wh here not just any C CCTV camer and OC (optica charact ra CR al ter recognnition) technoology will do. Extern infra-re lighting, high d nal ed , shutter speed progressiive scan camera, and chromatically co orrected le enses are some o the e of features necessary for the license pla image to be cl y l ate e lear, of suufficient quality and well d contrasted at any sp d peed or tim of day and night for it to me be read perfectly by an LPR engine. y For law e enforcemen and nat nt tional secuurity agenc cies the good new is that not only is such LPR tech ws t y hnology available, but accur racy in cap pturing lice nse plates is very s high. One advanced LPR sys e d stem in pa rticular can attain more tha 93-perc an cent accur racy, or 9 percent when 99 considerin OCR eq ng quivalents. Along wit that, the ability th e to link video feeds a LPR, and view b and a both in one single e unified sooftware inte erface is a serious st forward that is tep d already b benefiting law enforc cement off fficials thro oughout
  • 11. the world. Being able to index video footage and instantly link it to a license plate number is not just a convenience, but as seen from our previous example with the car full of suspects entering a city, can be essential to pro-active enforcement. The One-Two Punch for Municipalities: Advanced Video Surveillance and LPR Technology Most city departments, including police, fire, water, gas and electric, transportation etc. are more and more tied-in to one another. In the United States, as in many countries, the goal is not just interagency cooperation at the federal level, but the ability for cities to quickly marshal their defenses in the event of an emergency situation, and more importantly to use modern technology advances to try to be more pro-active in addressing public safety. On a more day-to- day level, with cities struggling for sources of revenue because of difficult economic times, it is important that such technology also benefit cities’ financial bottom lines as well. All this is possible now because of highly intelligent video surveillance and advanced LPR technology. Dispatch centers can instantly know through video cameras placed on highways and streets whether an ambulance should be sent to an accident scene. Law enforcement officers can observe criminal gang-related or illegal drug-selling activity in a neighborhood and do so un-detected by suspects. LPR technology can be used in both fixed applications for surveillance or traffic management or in mobile applications where LPR cameras are mounted on the vehicle to spot wanted criminals, scofflaw vehicles or vehicles without proper parking permits or parked overtime. In a day and age in which every dollar a city spends is scrutinized more closely, the ability to do more with less is a constant theme. The ability of video surveillance and LPR technologies to work in tandem so that, for example, a license plate is matched to previous video footage of a suspect’s car, reduces the amount of hours that might have been spent on such a task if this level of integration with new technologies did not exist. For budget-conscious municipalities, the benefits of advanced video surveillance and LPR techniques have also been extended to mass transit. This includes controlling traffic through automated tolling, as well as monitoring traffic density, volume, and flow. Besides cutting down on gridlock, the cameras can also be used to check for speeding violations by calculating a vehicle’s time spent traveling between two points. The Road Ahead As the populations of major cities of the world continue to grow, traffic issues typically get worse, not better. Along with such population growth, crime often increases, particularly in times of economic distress. At the same time, governments worldwide – at the federal, state and local levels – are facing even greater budgetary constraints than usual. With all this in mind, the need for automation and greater intelligence in reference to security technology should become even more paramount. Fortunately, the innovations that have taken place in city-wide video surveillance and LPR in recent years have not only increased the automation factor, but increased intelligence and functionality. These technologies have now become even greater crime fighting partners for law enforcement, as well as have helped to reduce total cost of ownership for cities. As the technology gets even smarter over time, such benefits can only be expected to increase. Reference: http://www.securitymagazine.com/Articles/Online_Exclusives/BNP_GUID_9-5-2006_A_10000000000000919930
  • 12. tions & fee Suggest edback may be sen to us on e-mail: sbtyagi195 nt n 58@gmail.com P.S. - If y you don't like to receive our newslette we apo r er, ologize fo botherin you. Please or ng let us kno your m address and we will mov it out fro our co ow mail e ve om ontact list, thank you! ,