You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the web-site is given below –
http://www.wix.com/sbtyagi/iciss
I actively encourage you to join ICISS Group at ‘LinkedIn’ and also
motivate other security professionals likewise. I am confident that by
becoming active member of the ICISS Group, not only you professionally will be benefitted; the profession itself will be benefitted by your active support and contribution. The link to the ICISS Group at LinkedIn is given below –
http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm
1. New
wslette Nov
er: vember 2012
r
Let’s profe
’s ession
nalize the pro
t ofessio
onals…
…
http://w
www.wix.com/
/sbtyagi/iciss
s
Bet
tter Secur S
S rity Sense
e...
The mo essen tial quality, which we have b ignored is the p
ost w but d, power
of obse
ervation.
We see but we don’t obs
e serve. Obsservation is not jus seeing thing
st
but unnderstand ing the im
mplication of wha we see So effe
ns at e. ective
observvation of what go oes on around us is a very impo
a s v ortant
require
ement for better se
r ecurity se
ense. Wheerever you are, be it at
home or outsid in a pu
de ublic plac look a round and try and see
ce d
through t
things rath than ju see th
her ust hem.
Try and ggauge the need for a thing to be prese at a pa
e o ent articular p
place, for a person to be
standing at a particular plac Don’t i
ce. ignore any
ything tha seems u
at unusual. Pry harder and
P
you will c
come out wwith surpr
rising resu
ults. Make observat
e tion a habbit.
‘Festival of Lights’ celebratted in Indi with fervor is round the c
ia corner! Its message has
s e
universal appeal a
l and applic cation – vvictory of light over darknes victory of good over
ss, y
bad! Let t
there be li
ight to lea all on v
ad virtuous paath!
Cap S B T
pt Tyagi
For IC
CISS
2. Pr
rivate Sec
e curity Guard: Use of licen
f nsed
weaapons while on duty
n y
Capt SB Ty
C yagi, COAS
S’CC**, FISM CSC
M,
There is la of consensus in Man-guard
ack ding indust and the Users reg
try e garding the arms lice
e ensing
requiremeents and c conditions in the Pr ivate Secu
urity Agencies Regu ulation (PS SAR) Act 2 2005.
While the Act does not recogn nize armed guarding services as a distinc category of service the
d a ct y e,
increasing demand for armed security is leading to unregulated and random employme of
g d g d ent
individuals as privat security guards wh hold per
s te ho rsonal licen
nses. Ironi cally, while the PSAR has
e R
nothing deefined, the Arms Act 1959, on allows individual applicants to hold arms license As
e t, nly a es.
a result, private seecurity age
encies hav been compelled to employ people who hold Arms
ve c y w
License in individual capacity.
n
About this prevailing situat tion Capt Arvind Mahajan, Senior VP at Reliance Infra
t , R
(http://in.li
inkedin.com
m/pub/arvi
ind-mahaja
an/30/208/
/b16) questions –
“Th weapo that a guard carries, strictly sp
he on peaking is for HIS PERSO
s S ONAL
PRROTECTIO It is by default t
ON. y that the in
nstallation (where su
uch a gua carryin his
ard ng
perrsonal weaapon, meant for his p
personal protection), gets arme protectio But, ca we
ed on. an
as Principal E
Employer ask vendor agencies to provide us Armed Guard?”
a r e d
To this C Col. Saten ndra Kuma CPO, C
ar CPO (I), G. M. (Tra
G aining) at G4S Sec
curity Serv
vices
(http://in.li
inkedin.com
m/pub/sate
endra-kum
mar-cpo-cpo
o-i/16/88b/
/57b) says –
“Ye anyone with valid license ca use his weapon in self- defe
es an n ense but
onu of proving that us of weap
us se pon was in Self Defense lies w
n with the
perrson using it. Now next que
g estion is what is self-defense If a
w e?
susspected crriminal is without an weapon and only trespasse on a
w ny n y es
priv
vate propeerty can th ASG us his wea
he se apon? You be rest a
u assured
crim
minal with intent of committing a crime will never co ome with a double
or single barrel gun vissible from miles! He will come with a co ncealed
weeapon and use it at point blan There are very ifs and b uts and
nk.
unlless law sp
pecifies leg authori ty it is difficult to bail out an AS if he
gal SG
use weapon Surely no client wiill come in his suppo even wh
es n. n ort hen he ha used we
as eapon
to s
save client life!”
t's
For issues relating t security guards us
s to sing weapo while on duty, w need to understan the
ons o we nd
scope of Right to pprivate defe efined in section 96 & 97 of I ndian Pen Code, w
ense as de s nal which
provides t
that -
Noothing is an offence which is do in the exercise of private d
w one o defense [T
There are some
res
strictions in the Sec 99]
n 9
Eve person has a right to def
ery n fend his ow body and the bo
wn a ody of any other pe
y erson,
agaainst any ooffence affe
ecting the human body.
Eve person have a right to de
ery n efend the property whether m
w movable or immovab
r ble, of
him
mself or of any other person, a
r against any act which is an offence fa
y alling unde the
er
deffinition of theft, robb
bery, mischhief or criminal trespass, o which is an attem to
or s mpt
commmit theft, robbery, mischief or criminal tr
m r respass.
3. Thus we know that as a law abiding citizen any security guard who is on duty with his licensed
weapon can use his weapon in exercise of his right to ‘private defense, even when his employer
doesn’t order him to do so or even when scope of his employment or jurisdiction of duty does
not provide so. In fact it is not only expected of him, but is also his duty as law-abiding citizen to
use the licensed weapon while preventing attempt or commitment of crime. We also further
need to study the scope of grant of arms’ licenses under Indian Arms Act, which in very clear
terms is for the purpose of ‘private defense’.
About armed security guards there is reference in PSAR Act 2005 in Section 2, Subsection (a)
which says that –
“Armored car service” means the service provided by deployment of armed guards along
with armored car…”
Further, Section2, Subsection (h) says that –
“Private security guard” means a person providing private security with or without arms to
another person or property or both and includes a supervisor.”
Surprisingly there is no reference of armed security guards or the definition in PSAR Rules
2006. Thus we have to understand the scope of duties and validity of using licensed arms under
Arms Act 1959 and also understand 'Right to Private Defense' as defined in Indian Penal Code
(Section 96 onwards) especially on ‘use of force’.
Under the Arms Act 1959, the arms licenses are issued but no specific purposes are
enumerated for obtaining the licenses. It is only inferred that the arms under licenses are to be
used in exercise of ‘Right to Private Defense’ (ROPD) or for ‘sports’ or special reasons such as
cinematography. Hunting is not permitted anymore and thus only sport left is marksmanship.
Good news is that Arms Act 1959 does provide in its Section 40 the protection of action taken in
good faith. It says that, “No suit, prosecution or other legal proceeding shall lie against any
person for anything which is in good faith done or intended to be done under this Act.”
At this point Arvind Mahajan, Sr. VP at Reliance Infra is in quandary and he says -
“Knowing fully well that the Armed Guard has the weapon for his personal protection -- Is
it right to call him an Armed Guard? (I am not going into ROPD provisions - whether he
fires or not, that's immaterial). But, Can I deploy him as an Armed Guard? How do I
differentiate his duties from the unarmed Guard?
His predicament goes further,
“How does one justify that an Armed Guard needs to be paid extra? Aren’t we by default
admitting that he is being deployed for providing Armed Protection, which as per Arms
Act he is not supposed to provide? The individual got an Arms License, because he
convinced the authorities of threat to his life, and NOT for performing an Armed Guard
duty.”
There were times when organizations or the companies used to get Arms Licensees under
retainer ship basis (Section 13 of Arms Rules 1962), under which the licenses were issued on
the name of the company and the arms were to be used by notified persons of the organization
or the companies. These licenses were found to be cumbersome to obtain and had inherent
4. difficulties for the a
s actual licen holder in some case a bu directo or the rich owner of a
nse r usy or r r
factories s since there was Sec
e ction 33 of Arms Act 1959 whic held the respon
f ch em nsible for a
action
by the reta ainers of th licenses
he s.
The Section 33 of A Arms Act sa ays, “
“Offfences by companie es.-(1) Whe
enever an offence unnder this Ac has bee committed by
Act en
accompany, e every perso who at the time th offence was comm
on he mitted was in charge of, or
wa responsi
as ible to the company f the con
for nduct of, th busines of the co
he ss ompany, as well
s
as the company, shall be deeme to be guilty of the offence and shall be liable to be
ed g
oceeded ag
pro gainst and punished accordingly.”
Maj. Dh himan B Bose, VP of T
P TigerSwan India (http://in. linkedin.co
n om/pub/dhiman-
bose/22/4
456/739) ha valuable recomme
as e endations for security agencies which the must follow –
y s ey
Ask all the pe
k ersonnel with arms t have the license to be ente
w to eir ered in thee
loc police ju
cal urisdiction - now this takes time and the police statiion carries
e p s
out a verifica
t ation of th
heir license from the jurisdictio and the issue of
e e on e f
lice
ense place It needs leg work a money to get the process d
e. and done.
On the gun entry is made in the neares police station the individual
nce st s l
with his wea
apon is summoned b the Loc Arms DEPT.(PO
by cal D OLICE HQ) )
where the sa
ame is cros checked that the license is genuine a
ss d, and the All
l
Ind permit is true,-- lia
dia aison acts by the sec
curity agency is must .
On these t
nce two things are in pla the pe
s ace erson can display hi s weapon when standing
gua
ard. A register is kep by the o
pt organizatio regardin the duty shift. The roving p
on ng y/ police/
bea constables do com and che this against the gun numbe and licen
at me eck g er nse.
Thus arm med security guard is a guard who per
i d rforms his duties whhile carryin his lice
ng ensed
weapon, f which h might be paid ext
for he b tra. Neithe his employer nor h principle employe will
er his er
have any legal con
y ntrol over his decis ion to use his weapon nor c
e can these be contra actual
obligation. He would be well within his llegal right to refuse use of his weapon on the orde of
d w o ers
his emplooyer / princ
ciple emplo
oyer. It wil l be his an only his decisions to use or not to us his
nd s s se
weapon in any given circumstan
licensed w nces.
The need to amen the Arm Act, 1 959 has been long since fe and tim to pres for
d nd ms g elt me ss
amendme in the A has co
ent Act ome! My u understandding of the Arms Act and the PSAR Act as of
t P
now is tha the arm licenses are issue for exer
at ms s ed rcising righ to private defense of self or other
ht e
person an that of p
nd property of self or oth person When to use the w
f her n. o weapon an how to u is
nd use
purely at the discre
etion and wisdom of the holder of the we
w r eapons an of the license. No third
nd o
party can give the h
holder of th weapon / license on how and when t use the firearms. A
he n to Arms’
licenses aand weapo ons as of now cann be use for ear
not ed rning liveli hood. Indi
ian law do
oesn’t
provide fo ‘guns-on
or n-hire’. The security a
e agencies having ‘arm securiity guards on hire’ ca be
h med an
easily treated by police office as ‘me
ers ercenaries armies’ since law doesn’t provide for such
s s
usages.
herefore like to summ
I would th marize that the PSAR Act 2009 has been hastily dra
R afted and le
eaves
much to desire! I o often said in the pre esence of past Joint Secretar (Police Moderniza
ry ation),
Ministry o Home Af
of ffairs, who is the offiicial directl concerned with the PSAR Act that “this Act
o ly e A
has been apparent written by the po
n tly olice officer to retain police co
n ontrol over the act a
r and it
5. appears t be so superfluou that ev
to us ven the broad head
b dings are not expla ained propperly!”
Interesting even w
gly when PSA Act 20
AR 005 provid
des for lot many thiings, it no
t owhere claarifies
whether s security gu
uards are to be trea ted as skilled, semi-
-skilled or non-skilled workers The
s.
Labor Dep partment’s gazette notifications on minim
s s mum wages mentione the categories of ‘w
s ed watch
and ward duties’ b
d besides oth but do not have ‘security guard’, ‘a
her o e armed sec curity guar as
rd’
categories Unfortun
s. nate part here is tha even ‘W
at Watch and Ward’ se ervices are duties ar not
e re
defined in any Act o the Orde
n or er!
E ergin S curit T nds
Eme ng Sec ty Tren
The nature of world-wide
espio
onage is currrently
expe
eriencing a dramatic shift.
A re
ecent analysis of trends
sugggests the need to red
n define
the problem and to de
a evelop
new strategie es to co ombat
growwing threa ats to na
ational
secuurity from econ
nomic
intellligence gathering and
g
corpo orate espioonage.
If le
eft unchecked, ana alysts
estim
mate losses could gro an
s ow
addit
tional 50% by the year
%
the n
next year.
A New N
National S
Security Perspect
tive
The rapid pace of change in the post
d n t-Cold Wa era dem
ar mands a n new definittion of na
ational
security is
ssues. The developm
e ment of th e Europea Commu
an unity, brea k-up of the Soviet U
e Union,
economic and political shifts within th former Warsaw Pact natiions, the reunificatio of
c s he on
Germany, and the b
, brisk economic grow of Pacific Rim co
wth ountries haave led to a new wo of
orld
opportunit and thre
ty eat.
The challenge to the intellige ence com munity is to discern and disr
n rupt econo omic espio
onage
directed t
towards na ational com
mpanies a and interes A fund
sts. damental s
shift in our understanding
r
and protection of the nation's secrets willl require:
e s
Re
edefining th concept of nationa security secrets and moving beyond protection o the
he t al g p of
def
fense industry to asssisting the e
entire priva sector in combatiing corpora espiona
ate ate age.
Mo explicitly connect
ore ting the im pact of inddustrial esp
pionage on the natio
n onal economy to
nat
tional secu
urity issues
s.
Bro
oadening tthe role of personne security in non-defense ind
el y dustries, in
ncluding a new
per
rspective o "clearan
on nces," train
ning, and thhreat awar reness.
6. Pro
oviding mo informa
ore ation to the corporate commun from th intellige
e e nity he ence comm munity
reg
garding esp
pionage threats, sour countries, and targets and means.
rce
Aggressively prosecutin those in
ng nvolved in illegal econ
nomic and competitiv intellige
d ve ence.
Emergin Espion
ng nage Tar
rgets
Every industry and every country has im
mportant economic resources which mus be prote
e r st ected.
Generally the focu of econ
y, us nomic esp ionage ac ctivities can be brok
ken down into two b
broad
categories
s.
The first is formula proces
ae, sses, com ponents, structure, characteris
s stics, and applicatio
ons of
new techn Examples include:
nologies. E
Fift generat
th tion compu uter archit
tecture; ne computer chip d
ew designs, co
onductivity and
y,
bio
ochip reseaarch; and software de
s evelopmen nt.
Bio
otechnolog gy.
Supercomput ting and su
upercondu ctivity.
Hoolographic and las ser rese arch, ap pplications, and
moodeling.
Opptics and fib optics technology
ber y.
Aerospace te echnologies.
Meedical techn nologies, in
ncluding p harmaceuticals.
Advvanced co ommunicati ions techn ologies an processe
nd es.
Advvances in satellite usage and space te
u d echnologie and
es
appplications.
Ele
ectromecha anical prodducts and ttechnologiees.
Chemical pro ocess techn nology and research.
d
Inte
egrated cirrcuit technoologies.
The secoond catego is facto associa
ory ors ated with th marketi
he ction, and security of new
ing, produc
technolog
gies. Examples includ
de:
Pricing inform
mation.
Maarketing ressearch on demand a nd consum profiles
mer s.
Pro
oducts nee eded for co ompatibility and applicability.
y
Pro
oduction timmetables and produc release dates.
a ct d
Pro
oduction qu uantities.
Maarket target and schedules and overseas marketing plans.
ts d s g
Security equipment, sensors, and processes.
d
Ele
ectronic baanking equi terfaces, and protoco
ipment, int ols.
Tecchnology-u upgrade sc chedules a planned changes in techno
and s ology.
Sofftware devvelopments especia lly those enhancing new techn
s, e nologies, networking and
n g,
tec
chnological integration.
l
Two Vul
lnerable T
Targets: Compute and Intellectu Prope
ers I ual erty
Computer provide both a ta
rs arget and a tool for industria espionag The new inform
al ge. n mation
highways provided by networ systems (like Inte
rk s ernet, Milne and Bit
et, tnet) and other adva
ances
like Elect
tronic Data Exchang (EDI) a
a ge and SWIF (Society for Wor International Fina
FT y rld ancial
7. Transactio
ons) also can mean increase access for illegit
n ed s timate pur
rposes. Co
omputer-re
elated
crimes ca be broke down into four ma categor
an en ain ries.
Compute as Targ
ers gets: This relates to unlawful accessing of comput
o a ters to gain informati or
n ion
to damage programs or hardw
e ware. A wid array of crimes fall into this c
de category inncluding: th of
heft
intellectua property or marke
al y eting informmation, blackmail, sabotage o files, ac
s of ccessing a and/or
changing government record ds, techn o-vandalis sm (causin interna damage to com
ng al e mputer
systems) and techno o-trespass (violating the privac of computer files).
s cy
Coomputers a Crime Instrumen
as nts: Comp puter proce
esses used as instruments of c
d crime.
Exaamples include: ATM fraud, rounding off moneta entries credit card fraud, and
o ary s, c
frauudulent co
omputer traansactions, and telec
, communica ations fraud
d.
Inccidental CCriminal Computer Use: Co
C omputers used to in
u ncrease th efficiency of
he
tradditional crimes, for example money launderin
r e: ng, off-shhore bankking, pedo ophile
info
ormation e exchanges organize crime record ke
s, ed eeping, m urder (thr rough changing
info
ormation in hospital records or other cont system and bo
n r trol ms), ookmaking.
Criimes Associated With Comp
W puter Prev valence: The adven of micro
T nt ocomputers has
s
opeened new crime and espionag e targets. These include: softw
d ware piracyy/counterfe
eiting,
coppyright vi iolations, counterfe
eit and black
b
maarket comp puter equipment and programs.
Another growing target of economiic / indu ustrial
espionage is intellectual property. I consists of
e p It
concepts, ideas, planning docume ents, des signs,
formulae, and other materials intended for produc or
r cts
services wwhich have commer rcial value and repreesent
original th
hought or work. It may be cle
m early prote
ected
(with coppyrights, tr
rade-marks patents or as trade
s, s, t
secrets) o less w
or well defined (in the case of non-
protected research, incomplete new con ncepts or id
deas,
and public domain in
c nformation which has been individually modified or refined).
n s m
Intellectua property is increas
al y singly soug through industrial espionag because it can ref
ght h ge e flect a
valuable iinvestment involving lengthy r
g research and development effo
a orts. Moreover, it is often
stored on computer media which are the em-selves an increas
sing target of espiona
age.
Methods of Espionage
s
In addition to unlaw computer access many of the traditi
n wful s, f ional meth
hods emplo
oyed in na
ational
security aand indust
trial espion
nage will c
continue to be prom
o minent. Ammong the many mea
m ans of
obtaining information are:
Op source (Right to Informati on Act req
pen es o quests, pubblished gov
vernment documents and
s
bid
dding speci ifications, opened bid and technical journals).
o ds
Coonsultants or outsourcing co ontractors from targ geted firm who provide "inside
ms p
info
ormation" t competitors.
to
"Mooles" wor rking insid a partiicular indu
de ustry or company with acce
c ess to de
esired
info
ormation.
Coomputer ha acking and data transsmission in
nterruption.
Coompromisin employe throug h blackma set ups, corruption and bribery.
ng ees ail, n,
8. The use of st
e tudent rese
earchers a nd interns to gain ac
ccess to ressearch.
Surveillance of corporate employe ees.
Inte
ercepting c
communica ations thro
ough faxes, telephone etc.
es,
Burglary.
Gaaining acce to records throug h janitorial or service personne
ess l e el.
Neew techno ologies an techniq
nd ques ada apted as detection devices or espio
onage
couuntermeassures.
Motivations for E
Espionag
ge
In genera the prim
al, mary motiv vation for eengaging in espiona age is mo netary. Ho owever, seeveral
factors haave emerg ged in reccent years that may make it easier for employee or othe to
y r es ers
participate in econo
e omic espioonage. As espionage activity has shifte away fr
ed rom a focu on
us
national ssecurity, th profitab
he bility of sp
pying has increased. In additiion, econo omic espioonage
(especially when information is divulged to traditi
y d ional natio
onal allies) is less morally repu
) m ulsive
than betraaying a nattional secu
urity secret and does not incur the same t
t t threat of pu
unishment..
Employer should w
rs watch for a number of key cha
aracteristic that ma indicate a security risk.
cs ay y
Security th
hreats may include employees who:
y e
Are generally unhappy on the job , or unhap with the location o their ass
e y ppy e of signment.
Believe they have been overlook ked for pro
omotion, salary incre
eases, or commenda
c ations
and rewards.
d
Fee their con
el ntributions to the commpany are ignored an uncomp
nd pensated.
Are facing pe
e ersonal fina
ancial diffic
culties.
Ha persona problem
ave al ms.
Preventi
ion
There are a number of measu
e ures that e
employers can take to reduce industrial espionage The
t e.
most cruc of these are relate to effec
cial e ed ctive personnel policie and pro
es ocedures.
Selection Employe
n: ees should be recrruited and screened on the b
basis of th
heir knowle
edge,
competennce, loyalty and psyc
y, chological a social stability.
and
Training: Employee training should inclu inform
e s ude mation abou security threats an procedures.
ut nd
Surveillance: Maintaining control over and limitin access to sensitiv informa
ng ve ation will re
educe
potential losses.
Supervision: Attenntive super
rvisors can both ide
n entify security violatio
ons as we as intervene
ell
before pro
oblems occ by rem
cur maining aler to warnin signals.
rt ng
Accounta nsuring tha employe es follow procedures perform efficiently, and adhe to
ability: En at p s, ere
organizati
ional value will help maintain p
es personnel integrity.
Target Hardening: Measures should b taken to protect crucial inf
s be t formation and to improve
security in order to r
n reduce tem
mptation.
9. Positive W
Work Env vironment: Increasin g employe
: ees' sense of worth w
within the organization can
o
increase t
their sense of obligat
e tion and loy
yalty, there decrea
eby asing the p
possibility of espionag
o ge.
Realistic Sanction Employ
ns: yees must have a realistic se
t r ense that s
security violations w be
will
identified and severe punished.
ely
Positive R
Rewards: To balanc the threa of discip
ce at pline, posit
tive contrib
butions to the organiz
t zation
must be re
einforced a reward
and ded.
Reinforce
ement of E Ethics and Values: The organ
d nization mu strengt
ust then its em
mployees' s
sense
of moral obligation through a stateme of org
n ent ganizationa values, reinforcem
al ment of eethical
standards and high standards of profess
s, s sionalism.
Imagine a world wh here Licens Plate R
se Recognition (LPR) tec
n chnology aand advances in city y-wide
video surveillance make it possible to spot suspects and crs riminals so quickly and
comprehe ensively tha law enfo
at orcement is able to apprehend them virtu
s a ually at will, with little to no
struggle involved. T There wou be no shots fire no high
uld ed, h-speed c chases, or other high-risk
activity.
Let’s take one scen
e nario as an example LPR ca
a e. ameras mo ounted at the entran of a t
nce tunnel
capture th license plate number of a su
he uspect as his vehicle heads to
e
a major metropolitan area. Another v video survveillance camera is
c
focused o the car. Working in tandem the licen plate number is
on m, nse n
indexed to video fo
o ootage prev viously takken of the car, after which an
operator c
confirms it is the one in questio
on.
An alarm is immediately sent to law e nforcemen officials who right
t nt
away zon in on t
ne the vehicle with oth strateg
e her gically plac
ced video
surveillance camera The ca
as. ameras tra the veh
ack hicle as it makes its
way throu the tun
ugh nnel.
As the car enters the city and nears an iintersection, it is watched by la enforcement offici
aw ials in
various loocations, a these are network cameras easily accessed fro remote locations The
as k s om e s.
cameras a also part of a municipal ne
are etwork that connects various d
t s department includin the
ts, ng
traffic dep
partment re
esponsible for the co
omputerized network of stopligh through
hts hout the cit As
ty.
the car gets closer to the inttersection, an officia from cen
al ntral commmand turns the light from
s t
green to rred.
The light continues to stay re which quickly cr
ed, reates grid
dlock in the already crowded u
e urban
area. This gives var
s rious unde
ercover offficers time to approach the veh hicle from various an
ngles.
Before the suspects are able to realize how it ha
e s appened, th are su
hey urrounded by officers with
s
guns draw and ha no way out. They are quickl arrested and taken into custo
wn, ave y y ly n ody.
Because o these ad
of dvances in LPR and video surv
n veillance technology a high-sp
y, peed chase that
e
could hav potentia injured or killed b
ve ally bystanders other dr
s, rivers, or t
the officers and susp
s pects,
was avoid and the suspects were app
ded e s prehended without a struggle.
s
This is not a farfet tched scenario. It’s actually happening right now in variou metrop
h w us politan
centers th
hroughout the world. In what f follows, we will explore recent innovatio in LPR and
e t ons R
video surv veillance t
technology that allow law enfo
y w orcement divisions t fight crime and ensure
to
public saf
fety much m more effec
ctively than could hav been im
n ve magined jus a few short years a
st ago.
10. Advanc in V
ces Video Surveilla
ance Tec
chnolog
gy
Video surrveillance ccameras and manag
a gement syystems hav come a long way from the early
ve y
days of CCCTV whe grainy, analog im ages and limited fun
en nctionality was the rule of the day.
r e
Digital (IP) techno ology now offers a host of advantages, inclu
w f uding ope multi-ve
en endor
architectu
ures suppo orting cam
meras with clearer picture quality, a va
h p ariety of flexible ne
f etwork
architectu options including wireless camera connectivity enhance scalability and fa
ure s, g c y, ed ailover
and redunndancy options. Mor so, inno vative feat
re tures in ad
dvanced viideo surve eillance sys
stems
have help ped cities attain ob
bjectives thhey never before deemed po
r d ossible. Essentially, truly
E
advanced systems allow multiple inde
d ependent systems fr
s rom nume rous organizations to be
managed as if they were a sinngle unified system, regardless of geograp
d r phic bounddaries.
Similarly, developm ments in viddeo analyttics have also added a layer of intellige ence that make
these cam meras and systems much mor effective crime fig
d re ghting toolls, so that instead o just
t of
viewing s scenes, the cameras look for a
e s abandoned objects on the roa
d adway, loitering or v
virtual
fencing ne critical infrastruc
ear ctures, and can insta
d antly alert law enforceement whe a suspi
en icious
activity is spotted. TThese netw work cameeras can tyypically be easily ac
e ccessed fro laptops cell
om s,
phones a and other devices which not o
w only cut down on th need fo tradition surveillance
d he or nal
technique but also improve overall co
es, o ommunication and collaboratio within the munici
c on t ipality
while shar ring infrast
tructure co
osts betwee various departments.
en
IP video ssurveillance is definitely more a more the wave of the future just as digital adva
e and o e, d ances
have take over so much of the rest o the techn
en o of nological landscape. However for those who
. r, e
wish to mmaintain all or part of their CCT systems in place, the good news is th they ca do
f TV s hat an
so, and at the same time, ben
e nefit from ddigital adv
vances via encoders to gradually migrate their
e
existing in
nvestments to the dig
s gital age.
Advanc in L
ces License Plate R
Recogni
ition LP Tech
PR hnology
y
Challeenges arise when it c
e comes to reading lic cense
plates at var rious spe eeds and in va
d arious
environmental co onditions (
(i.e., day, night, rain fog,
n,
etc.). This is a case wh here not just any C CCTV
camer and OC (optica charact
ra CR al ter recognnition)
technoology will do. Extern infra-re lighting, high
d nal ed ,
shutter speed progressiive scan camera, and
chromatically co orrected le
enses are some o the
e of
features necessary for the license pla image to be cl
y l ate e lear, of suufficient quality and well
d
contrasted at any sp
d peed or tim of day and night for it to
me
be read perfectly by an LPR engine.
y
For law e enforcemen and nat
nt tional secuurity agenc cies the
good new is that not only is such LPR tech
ws t y hnology
available, but accur racy in cap
pturing lice nse plates is very
s
high. One advanced LPR sys
e d stem in pa rticular can attain
more tha 93-perc
an cent accur racy, or 9 percent when
99
considerin OCR eq
ng quivalents. Along wit that, the ability
th e
to link video feeds a LPR, and view b
and a both in one single
e
unified sooftware inte
erface is a serious st forward that is
tep d
already b benefiting law enforc cement off fficials thro
oughout
11. the world. Being able to index video footage and instantly link it to a license plate number is not
just a convenience, but as seen from our previous example with the car full of suspects entering
a city, can be essential to pro-active enforcement.
The One-Two Punch for Municipalities: Advanced Video Surveillance and
LPR Technology
Most city departments, including police, fire, water, gas and electric, transportation etc. are more
and more tied-in to one another. In the United States, as in many countries, the goal is not just
interagency cooperation at the federal level, but the ability for cities to quickly marshal their
defenses in the event of an emergency situation, and more importantly to use modern
technology advances to try to be more pro-active in addressing public safety. On a more day-to-
day level, with cities struggling for sources of revenue because of difficult economic times, it is
important that such technology also benefit cities’ financial bottom lines as well.
All this is possible now because of highly intelligent video surveillance and advanced LPR
technology. Dispatch centers can instantly know through video cameras placed on highways
and streets whether an ambulance should be sent to an accident scene. Law enforcement
officers can observe criminal gang-related or illegal drug-selling activity in a neighborhood and
do so un-detected by suspects. LPR technology can be used in both fixed applications for
surveillance or traffic management or in mobile applications where LPR cameras are mounted
on the vehicle to spot wanted criminals, scofflaw vehicles or vehicles without proper parking
permits or parked overtime. In a day and age in which every dollar a city spends is scrutinized
more closely, the ability to do more with less is a constant theme. The ability of video
surveillance and LPR technologies to work in tandem so that, for example, a license plate is
matched to previous video footage of a suspect’s car, reduces the amount of hours that might
have been spent on such a task if this level of integration with new technologies did not exist.
For budget-conscious municipalities, the benefits of advanced video surveillance and LPR
techniques have also been extended to mass transit. This includes controlling traffic through
automated tolling, as well as monitoring traffic density, volume, and flow. Besides cutting down
on gridlock, the cameras can also be used to check for speeding violations by calculating a
vehicle’s time spent traveling between two points.
The Road Ahead
As the populations of major cities of the world continue to grow, traffic issues typically get
worse, not better. Along with such population growth, crime often increases, particularly in times
of economic distress. At the same time, governments worldwide – at the federal, state and local
levels – are facing even greater budgetary constraints than usual.
With all this in mind, the need for automation and greater intelligence in reference to security
technology should become even more paramount. Fortunately, the innovations that have taken
place in city-wide video surveillance and LPR in recent years have not only increased the
automation factor, but increased intelligence and functionality. These technologies have now
become even greater crime fighting partners for law enforcement, as well as have helped to
reduce total cost of ownership for cities. As the technology gets even smarter over time, such
benefits can only be expected to increase.
Reference: http://www.securitymagazine.com/Articles/Online_Exclusives/BNP_GUID_9-5-2006_A_10000000000000919930
12. tions & fee
Suggest edback may be sen to us on e-mail: sbtyagi195
nt n 58@gmail.com
P.S. - If y
you don't like to receive our newslette we apo
r er, ologize fo botherin you. Please
or ng
let us kno your m address and we will mov it out fro our co
ow mail e ve om ontact list, thank you!
,