SlideShare una empresa de Scribd logo
1 de 11
Descargar para leer sin conexión
N
                              Newslet
                                    tter: Au
                                           ugust 2
                                                 2012
              Let’ prof
                 ’s   fession
                            nalize t pro
                                   the ofessio
                                             onals…
                                                  …
                                     http://w
                                            www.wix.com/sbtyagi/iciss
                                                                    s




Over the last few y years, priso and oth securit sensitive areas hav begun u
                               ons      her     ty       e         ve        using a dev
                                                                                       vice
that scan the who body fo contraba
         ns         ole        or      and. The s
                                                scan produces an image of the skin, and will
                                                                            e
show obj jects like g
                    guns, drugs other we
                               s,      eapons und clothing. This pro
                                                 der               ocedure is often used an
                                                                                       d
alternativ to whole body strip searches The devic uses a low energy x-ray or g
         ve         e          p       s.        ce                y         gamma sou urce
to produc the imag
         ce          ge.

                                                                   T
                                                                   The draw backs to this are 1)
                                                                                          o         e
                                                                   p
                                                                   privacy issuues; 2) raddiation dose to
                                                                   t
                                                                   the individu 3) rad
                                                                               ual;      diation dose to
                                                                                                     e
                                                                   t worker The nex time you go
                                                                   the        rs.         xt         u
                                                                   through security at th airport, you
                                                                   t                      he
                                                                   might be told to empty y
                                                                   m                                 your
                                                                   p
                                                                   pockets, pu your hands over y
                                                                               ut                    your
                                                                   h
                                                                   head and s stand still w
                                                                                          while an XX-ray
                                                                   m
                                                                   machine lo ooks for an nything hid
                                                                                                    dden
                                                                   u
                                                                   under your clothing.
                                                                              r

                                                                   If this body scanning option sou
                                                                              y                   unds
                                                                   u
                                                                   unappealin ng, you h  have another
                                                                   c
                                                                   choice: an “enhance pat do
                                                                               n         ed       own”
                                                                   c
                                                                   conducted by a T      Transporta
                                                                                                  ation
                                                                   S
                                                                   Security A Administration employyee,
                                                                   w
                                                                   which      so
                                                                               ome    trav
                                                                                         velers   h
                                                                                                  have
                                                                   d
                                                                   described a quite int
                                                                               as        timate.

The new screening measure have be
       w           g        es        een hotly
debated, but mostl in theory Now tha in USA
                  ly         y.       at
there are nearly 24 body sc
        e         44        canning ma
                                     achines in
about 50 domestic airports, w 800 mo on the
                            with      ore
way, passsengers are facing real-life decisions
                            g
about wh to do. Here’s so
        hat                  ome inform
                                      mation to
help you choose.



If you so
        omehow m
               missed the hoopla, t
                        e          there are
two type of mac
        es     chines bein installe which
                         ng       ed,


C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx
have rais sed conce
                  erns about privacy, health risk and eve their ef
                             t                     ks         en         ffectivenes at catch
                                                                                   ss         hing
terrorists The more controve
         s.       e          ersial “back
                                        kscatter” de
                                                   evices projject an X-r beam o
                                                                        ray        onto the boody,
creating an image displayed on a mo
                             d          onitor view
                                                  wed in ano other room. The “mil  llimeter wa
                                                                                             ave”
machines which are consi
          s,                  idered les risky because th
                                        ss                    hey do no use X-
                                                                        ot         -rays, bouunce
electromagnetic waaves off the body to p
                             e          produce a ssimilar imag
                                                              ge.

Unlike mmetal detec
                  ctors, these machine can det
                                     es        tect object made w
                                                         ts       with other materials, like
plastic and ceramic. But they can’t see anything hidden in
                                               g         nside your body, or detect cer
                                                                  r                    rtain
explosivees.



What the images reveal is also uncle
          ese        s                    ear.
Mr. Kimball said that the T.S.A. us        ses
filters to blur the im
                     mages, and the agen
                                d          ncy
has pos   sted samp  ples of th kinds of
                                he
images s  screeners see and a video of t   the
screening process on its Web si
           g          s                    ite,
tsa.gov. But critic say the
                     cs         ese samples
aren’t de  etailed ennough for travelers to
judge ho explicit t
          ow          they are, e
                                especially i a
                                           if
screener zooms in on a specific area.
          r

Another concern is whether the imag
                              r        ges
can be s saved or transmitted The T.S.A.
                             d.
first said this wasn possible, then la
         d          n’t                ater
admitted the mach  hines can s save photo
                                        os,
but that this feature had be een disableed.
This kind of backtra
         d         acking has added to tthe
agency’s credibility problem.
         s



The ma   ain conceerns are how mu     uch
radiation the sca anners give off (t   the
manufacturers say the amo
                  y         ount is ve ery
low), w whether t the scan nners mig   ght
malfunctiion and em more ra
                  mit       adiation th
                                      han
they are supposed to, and wh the hea
                           hat        alth
effects m
        may be for travelers. Since there is no precedent for routin
                  r                                     t          nely screen
                                                                             ning so m
                                                                                     many
people w X-rays - other tha in prison - there a a lot of unknowns.
        with               an         ns       are

Another issue is th the dev
                   hat        vices haven’t been th horoughly t
                                                              tested. The T.S.A. (T
                                                                         e          Transporta
                                                                                             ation
Security Administra ation, USA) claims that the mac chines have been eva aluated by the Food and
                                                                                   y
Drug Ad              on’s Center for D
          dministratio                  Devices a   and Radio ological HHealth, the Comme
                                                                                    e        erce
Department’s National Instit  tute for SStandards and Tech    hnology and the Jo    ohns Hopkins
Universit Applied Physics La
         ty                    aboratory. But it is c
                                                    confirmed t
                                                              that they b
                                                                        basically te
                                                                                   ested only one
thing - w
        whether the amount o radiation emitted m
                   e         of                    meets guideelines established by the Ameri
                                                                                   y          ican



C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx
National Standards Institute a memb
                           e,     bership or
                                           rganization of comp
                                                     n       panies and governm
                                                                      d       ment
agencies
       s.

But gues who was on the c
        ss                    committee that develooped the g
                                                            guidelines for the X-r scanne
                                                                                 ray    ers?
The repr resentative from the compan
                   es                    nies that m
                                                   make the m
                                                            machines and the D  Departmen of
                                                                                        nt
Homelan Security among o
        nd         y,         others. In o
                                         other words the mac
                                                   s,       chines pass a test developed in
                                                                       sed              d,
part, by t compa
         the                  manufactur them an the government agency that wants to use
                   anies that m           re       nd                            t
them.

‘Russia T Today’ poin out an important detail bein left out of most ma
                     nts                            ng                   ainstream media rep ports
about th new bo
         he          ody scann ning devicces being rolled out in airpo orts everyw where: forrmer
Department of Homeland Se      ecurity Chhief, Micha Chertof who ha been ad
                                                   ael        ff,       as          dvocating this
technolog on any news p
          gy                  program th  hat will ha
                                                    ave him i persona
                                                               is       ally profitin from t
                                                                                    ng        their
implemen  ntation. As a Security Consultant and Cha
                    s          y                    airman of the Chertof Group, o of his m
                                                                        ff        one        main
clients is Rapiscan, a manufa
                     ,        acturer of th
                                          hese devicees.

Last year, the Depa
                  artment of Homeland Security a
                                      d          awarded contracts of US$160 m
                                                                    f        million eac to
                                                                                       ch
two manuufacturers of these ba
                             ack-scattering device one which was Ra
                                                 es,                apiscan.

Beyond t issue o Chertoff''s illegal ad
         the       of                 dvertising h product on news programs by pretend
                                                 his                                     ding
to be a p
        public serva there is some de
                   ant,               ebate about the safety of these new Back-
                                                           y                  -scatter X-Ray
Body Sca anning devvices.

One form intellige
        mer       ence agent and prese
                             t          ent-day security conssultant, Wa
                                                                       ayne Simmmons, says that
while the device is an excellent tool, "T
        e         s                     There is no dose of backscatte ionizing radiation that
                                                                        er
has ever been prov safe," a that he would pre to see only passengers wh are deem
        r         ven       and         e          efer     e                   ho         med
to be sus
        spicious go
                  oing throug these de
                            gh          evices, with the bulk going through the metal detect
                                                   h                                       tors,
with whic we've al become a
        ch         ll       accustome  ed.




John W
     Wayne's Five R
           s      Rules

1. Money can't buy happine but it’s more com
       y         y       ess      s        mfortable to cry in a
Mercede than on a bicycle
       es       n        e.
2. Forgiv your en
        ve      nemy but r
                         remember the basta
                                r         ard's name
                                                   e.
3. Help s
        someone w
                when they are in tro
                        y                              remember you when they're in
                                   ouble and they will r               n          n
trouble a
        again.
4. Many people ar alive only because it’s illegal to shoo them.
                re                                      ot
5. Alcohol does no solve any problem but th again, neither do milk.
                 ot                ms,    hen               oes




C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx
By Capt G Ra Kumar
                                                  aj

The alar monitor
        rm          ring and r response is very co   omplex and tedious function of Secur
                                                                  d         s                     rity
Managem  ment. Fraught with False Alarms and resource
                              h                                  e-mobilizat tion, alarm monitor
                                                                                       m          ring
also me eans that systems need to b consta be        antly upgr  raded and procedures check
                                                                            d                    ked.
There is also need to constantly aud the efficacy of th system return-o
        s            d                    dit                    he        m,         on-investmment
and the integrity of the data for very
        e          y
efficient alarm monitorin     ng. Since all Ca G Raj Kumar is ICISS C
                                          e          apt                               Councilor for
these ac ctivities occupy lot attention and An       ndhra Prad  desh.
priorities of th
          s        he organ   nizations, the
forward looking managem        ments sta   arted He has tota 25 year of expe
                                                     e           al         rs         erience out of
off-loadiing these activiti
                    e           ies to t  third- wh  hich he ser rved 14 years in the A Armed For rces
parties – specialis in the fie This t
                    st          eld.       turns and rest 11 years in the indu
                                                                            n          ustry. He has
out to be cos effectiv
                   st           ve and very unique dist           tinction o of
dependa  able optio which enhances the serving in Air forces a
                   on                     s                                 as
level of ssecurity p
                   preparedne  ess.                we as in A
                                                     ell         Army. Whil  le
                                                   in Armed For   rces he haas
Spearhe eading this phenom
                    s         menon are few be
                                          e          een           extensivelly
security agencies who hav establis
                   s           ve           shed inv volved in Counte
                                                                 n           er
their Cen ntral Moniitoring Staations in ccities Ins  surgency O Operations. .
all over These centers cater to big
         r.
offices, industries as well as individual He holds degree o
                    s                                e                       of
resident ts who wish to avail their MB (HRD) from Ran
                              o                       BA                     ni
services Large in
        s.         ndustries a in pro
                                are       ocess Du   urgavati       University
                                                                             y,
of gettin third pa
        ng          arty monitoring serv   vices Jabalpur. Pre    esently he is pursuin a Ph. D in
                                                                            e           ng
and the process seeks our well laid        d-out Pe  ersonnel M  Manageme   ent. At p  present he is
                                                                                                  e
strategiees.                                       woorking in G GAIL and p posted at V Vizag, And
                                                                                                 dhra
                                                   Praadesh.
A monito  oring centter must provide tim   mely,
                                                   A keen sp     ports enth husiast, he represe   ents
consistennt, high-qquality ser  rvices utilizing
                                                   Anndhra Prad  desh Badm minton Tea  am. Previously
state-of-t
         the-art technology to customer 24
                               o           rs
                                                   he has pla
                                                     e           ayed in b   badminton tourname   ents
hours a dday, 365 days a year Keeping pace
                               r.
                                                   conducted by Petroleum Sports Control Bo
                                                                  y                              oard
with the change
         e          es in technology and
                                                   of India.
maintaini ing alarm system data inte
                   m                       egrity
were crucial to mai intaining go of prov
                                oal       viding He can be re
                                                     e            eached at grajkumar  r@gail.co.in or
                                                                                                  n
best-in-class alarm monitori
                   m            ing service In on his Mobile number - 78936016
                                           e.                    e                     699.
addition to equipm ment need   ded, enhan  ncing
alarm da integrity is also n
         ata        y          necessary to ensure the highes level of security is continuously
                                                                  st                    s
maintaine The p
          ed.      planning phase may include f
                                          y           five critica elements which w
                                                                 al          s         would beco ome
foundatio to succe
         on         essfully connvert in-house alarm monitoring platform t a third-p
                                                                 g           to        party suppli
                                                                                                  ier:

   -    ransition te
       Tr          eam identifi
                              ication
   -   Deecision pro
                   ocess to de
                             etermine th service p
                                       he        provider
   -   Pr
        roject plannning
   -   Im
        mplementat  tion


C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx
-   Post implementation (continuous improvement)

Transition Team

To successfully convert alarm monitoring to a third-party supplier, a transition team of
customer-focused leaders may be selected to design, analyze, and implement the alarm
monitoring transition project. In addition to loss prevention, transition team is to include
stakeholders from the following departments: procurement, finance, business unit leaders, IT,
real estate, legal, facilities, and operations etc. This team must meet regularly, defining the
objectives, building success criteria, creating performance metrics, and representing the
organization to ensure a seamless transition of alarm monitoring.

Any plan for the alarm monitoring transition may include:

   -   Understand the buy – interview stakeholders
   -   Establish operating procedures for supplier
   -   Develop draft scope of work for review by stakeholders
   -   Present sourcing strategy (scope of work, list of suppliers, and timeline)
   -   Develop, distribute, and analyze request for information
   -   Complete supplier bid meetings and site visits
   -   Suppliers complete and return request for information
   -   Present request for proposal (RFP) supplier short list recommendations to stakeholders
   -   Analyze RFP
   -   Negotiate with suppliers
   -   Present overview to stakeholders
   -   Notify suppliers and stakeholders of contract award
   -   Execute contract
   -   Develop performance metrics
   -   Establish quarterly performance meetings to review and track performance metrics

Determining the Service Provider

Collectively, transition team needs to identify suppliers that provided the most comprehensive,
customer-focused capabilities. Criteria for a successful service provider are as following:

   -   Fitness to technical and functional requirements
   -   Total cost of ownership
   -   The ability to support current and emerging equipment
   -   Industry reputation and experience
   -   Experience and qualifications of the company and resources
   -   Quality assurance commitment
   -   Financial strength
   -   Proven methodologies, tools, and value added services

Sourcing decision must be based on the “best value/total cost” principle. While cost remains a
critical decision factor, the quality of the equipment, and operating efficiencies would be the
primary and most critical aspects.

Project Planning

C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
A project task list can be created to identify key issues that can affect the overall project and
allow assignment of tasks. Tasks can be assigned milestones in the project file to help balance
workload for project planning. Clear communication, precise operating procedures, and
partnership with selected solutions provider are the building blocks of our transition plan.

Implementation

Converting alarm system monitoring, whether from in-house to third party or third party to in-
house, requires absolute understanding of a defined scope of work. To implement the alarm
system monitoring change, the data from the existing monitoring facility can be gathered and
scrubbed to determine its accuracy and freshness. The data then need to be formatted in order
to be inserted into new monitoring systems and reviewed again for accuracy. Once all data is
in place in new monitoring systems, the stage is set to develop the schedule for the change-
over.

Post Implementation – Continuous Improvement

The alarm monitoring conversion from proprietary monitoring platform to the Third party
Monitoring Center has to be a seamless, successful event. Metrics need to be assigned to all
the alarms and responses. Each metric was assigned a target goal, for example 90 percent of
burglar alarms within 60 seconds. To ensure continuous improvement, it is advisable to
develop quarterly performance business reviews. Business reviews provide the avenue to
assess performance metrics, identify opportunities to strengthen partnership, and continue to
focus on achieving both organizations’ internal and external goals.

A monitoring center must provide timely, consistent, high-quality services utilizing state-of-the-
art technology to customers 24 hours a day, 365 days a year. Keeping pace with the changes
in technology and maintaining alarm system data integrity were crucial to maintaining goal of
providing best-in-class alarm monitoring service.

In addition to equipment needed, enhancing alarm data integrity is also necessary to ensure
the highest level of security is continuously maintained. The planning phase may include five
critical elements which would become foundation to successfully convert in-house alarm
monitoring platform to a third-party supplier:

   -   Transition team identification
   -   Decision process to determine the service provider
   -   Project planning
   -   Implementation
   -   Post implementation (continuous improvement)

Transition Team

To successfully convert alarm monitoring to a third-party supplier, a transition team of
customer-focused leaders may be selected to design, analyze, and implement the alarm
monitoring transition project. In addition to loss prevention, transition team is to include
stakeholders from the following departments: procurement, finance, business unit leaders, IT,
real estate, legal, facilities, and operations etc. This team must meet regularly, defining the

C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
objectives, building success criteria, creating performance metrics, and representing the
organization to ensure a seamless transition of alarm monitoring.

Any plan for the alarm monitoring transition may include:

   -   Understand the buy – interview stakeholders
   -   Establish operating procedures for supplier
   -   Develop draft scope of work for review by stakeholders
   -   Present sourcing strategy (scope of work, list of suppliers, and timeline)
   -   Develop, distribute, and analyze request for information
   -   Complete supplier bid meetings and site visits
   -   Suppliers complete and return request for information
   -   Present request for proposal (RFP) supplier short list recommendations to stakeholders
   -   Analyze RFP
   -   Negotiate with suppliers
   -   Present overview to stakeholders
   -   Notify suppliers and stakeholders of contract award
   -   Execute contract
   -   Develop performance metrics
   -   Establish quarterly performance meetings to review and track performance metrics

Determining the Service Provider

Collectively, transition team needs to identify suppliers that provided the most comprehensive,
customer-focused capabilities. Criteria for a successful service provider are as following:

   -   Fitness to technical and functional requirements
   -   Total cost of ownership
   -   The ability to support current and emerging equipment
   -   Industry reputation and experience
   -   Experience and qualifications of the company and resources
   -   Quality assurance commitment
   -   Financial strength
   -   Proven methodologies, tools, and value added services

Sourcing decision must be based on the “best value/total cost” principle. While cost remains a
critical decision factor, the quality of the equipment, and operating efficiencies would be the
primary and most critical aspects.

Project Planning

A project task list can be created to identify key issues that can affect the overall project and
allow assignment of tasks. Tasks can be assigned milestones in the project file to help balance
workload for project planning. Clear communication, precise operating procedures, and
partnership with selected solutions provider are the building blocks of our transition plan.



Implementation

C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
Convertin alarm s
         ng        system mo onitoring, wwhether from in-house to third p
                                                              e          party or thi party to in-
                                                                                    ird       o
house, reequires abbsolute undderstanding of a defined scope of work. To implem
                                          g                  e                     ment the alarm
system mmonitoring change, th data fro the exis
                              he         om                   toring facility can be gathered and
                                                    sting monit
scrubbed to determ
        d         mine its acccuracy and freshness. The data then need to be form
                                                                        d          matted in order
to be ins
        serted into new monit  toring syste
                                          ems and reeviewed ag          ccuracy. Once all dat is
                                                              gain for ac                     ta
in place in new mo onitoring sy
                              ystems, the stage is set to dev
                                          e                  velop the sschedule fo the chan
                                                                                    or        nge-
over.
Post Imp
       plementation – Cont
                         tinuous Im
                                  mproveme
                                         ent
The alar monitoring conve
        rm                   ersion from propriet
                                       m        tary monito
                                                          oring platf
                                                                    form to the Third p
                                                                                      party
Monitorin Center has to be a seamles success event. Metrics ne to be a
        ng                             ss,      sful                eed      assigned to all
                                                                                       o
the alarm and responses. Ea metric was assig
        ms                   ach       c        gned a targ goal, fo example 90 percen of
                                                          get       or       e         nt
burglar a
        alarms within 60 seco
                            onds.

To ensur continuo improv
         re          ous      vement, it is advisable to develo quarterl performa
                                                    e         op       ly        ance busin ness
reviews. Business reviews provide th avenue to asse
                                         he        e         ess perform
                                                                       mance me  etrics, iden
                                                                                            ntify
opportunnities to stre
                     engthen pa
                              artnership, and contin to focu on achie
                                                   nue       us        eving both organizatio
                                                                                            ons’
internal a externa goals.
         and         al




CCTV systems have on       ne
fundameental flaw – despite
putting u large numbers of
        up
cameras to ma    aximize the
coverage of an area, w
        e                  we
seldom hhave anybbody actua
                          ally
looking a much of the area f
        at       f         for
which we are respo
        e        onsible.

Sure, we can alwa go ba
         e        ays      ack
and look at what ha
                  appened, b
                           but
many tim this jus is not goo
        mes       st        od
enough. It is a problem of
logistics and econoomics. We cannot s
                           e        staff the co
                                               ontrol room with eno
                                                         m        ough people to view the
number o cameras we have available. So we have many of these c
          of       s       e                                      cameras' v
                                                                           views going to
                                                                                     g
waste wh it may be useful t view the
         hen                to      em.

To make it worse, much of what is dis
         e                             splayed on monitors will be un
                                                 n          s           neventful, or sometim
                                                                                            mes
even hav content that is irre
         ve                 elevant to t risk pr
                                       the      rofile of the site. This problem o coverag is
                                                            e          s          of       ge
not likely to go awa soon. H
         y         ay      However, thhere are te
                                                echnologies being imp
                                                            s           plemented now or in the
near futu that will change th risk cove
         ure                he         erage by C
                                                CCTV signif  ficantly.

Intelligen technology that is b
         nt                   being deve
                                       eloped can help in a number of ways. Ce
                                                n                   f        entral to this is
technolog that can work with the opera in the backgroun performi intellige analysi of
          gy       n         h         ator               nd        ing      ent         is
the came views.
         era




C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx
   Firstly, the c
                    computer ca do thing that com
                              an       gs        mputers are good at, and free th operator up
                                                           e                    he
       to concentra on othe duties. For example where a
                    ate      er                  e,       automated recognition such as f
                                                                                n        face
        ecognition or number plate rec
       re                     r        cognition c
                                                 can do the job, it fr
                                                           e         rees the ooperator up to
                                                                                         p
        oncentrate on the m
       co                    more releva things that only people ca do. In this way it is
                                       ant                           an
       opptimizing th use of th system.
                    he        he

      Seecondly, bbackground sensing and alerts or alarm allow th detectio of susp
                            d                   s         ms         he         on        pect
       coonditions o camera that ar not cur
                   on       as        re        rrently bein viewed by the o
                                                           ng       d           operator. The
       coomputer ca highlight these or bring thes to the operators' a
                   an                           se                  attention fo viewing and
                                                                               or
       inv
         vestigation This co
                   n.       ould includ certain types of movement or the presence of
                                      de                   f                             e
       soomebody o somethin in an area for def
                   or       ng                   fined perio
                                                           ods. Through this, the coverage of
                                                                                          e
       the cameras has been made mor efficient.
                   s                   re        .

      Annother option is acting as an ea warning system. In this con
                                        arly                           ntext, the teechnology can
       hig
         ghlight con
                   nditions tha could potentially be suspect s
                              at                   e         such as objjects left in an area; c
                                                                                    n          cars
       paarked where they sh  hould not b or exc
                                        be,        cessive den
                                                             nsities of p
                                                                        people in an area. T   This
       technology is starting to become more common with a
                    s                                        advanced D DVR systems.
Potentia Areas of Developm
       al       f        ments:
Other technologies offer sub
                    s          bstantial pootential, but have so ome development time still to go
                                                                                               o
before th reach e
        hey         effective us Where an operato is viewin a scene and need to divert his
                               se.                    or         ng        e          ds        t
or her atttention to something else, para
                              g           allel monitooring or tra
                                                                 acking thro
                                                                           ough taggin a partic
                                                                                      ng       cular
object or person c
         r          could allow operators to come back to th scene later and pick up m
                              w           s                      hat                           more
easily on the locatio and mo
        n            on        ovement of the target Building up an infor
                                          f           t.                    rmation ba on targ
                                                                                     ase       gets,
situations and beh
         s,         haviors to use for ris manage
                                          sk          ement and future inv vestigation is one of the
most neg glected asppects of CCCTV.
Intelligent Techno
                 ology:
Use of an inte      elligent syystem tha at
recognize behavio and con
          es         or       nditions can
greatly hhelp by increasing t  the amoun nt
and qua  ality of infformation coming in n.
Technolo can als help by simulating
         ogy         so        y
or verifying operato performa
                    or         ance, eithe
                                         er
in contra asting the number of issue
                    e                    es
picked up by the intelligent s systems, oor
the inser           enarios tha should be
         rtion of sce         at
picked u by ope
         up         erators and reviewing
                               d
them ag  gainst actu detecti
                    ual        ion scoress.
Finally, intelligent technolog can be
                               gy
used to eextend the normal CC  CTV functio by building in alg
                                          ons                  gorithms th allow th detectio of
                                                                         hat      he        on
other thin such a fire, sm
          ngs        as       moke, produ uction stop
                                                    ppages, ov verflows an so on th would add
                                                                         nd        hat
value to t CCTV function. I think the p
          the                            potential fo intelligen analysis, sometime called vis
                                                    or         nt                 es         sual
analytics technolo
         s          ogy, goes far beyo   ond secur  rity-based CCTV to many f
                                                                         o        forms of risk
managem  ment and m  monitoring. The ques stions on ““what, wheere, when, who, why and how” will
increasinngly becom available in our data retrieval system.
                   me          e                     l




C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx
Impleme
      entation Problems:

Besides the develo
                 opment nee that ar required to realize some of t ideas fo technolo
                           eds        re       d        e        the        or       ogy,
there are some im
        e       mplementation problems with th hose we already hav availabl Cry wo is
                                                                 ve        le.      olf
when reppeated waarnings occ without foundatio Eventually, the p
                           cur        t        on.               people star disregard
                                                                           rt        ding
the warnings and th potentia of the tec
                  he       al         chnology becomes ignored.

Use of bl lank screenn-based alarm system are a cl
                                         ms         lassic exam
                                                              mple, after 90 false alarms popp  ping
up on sc creen in an hour or tw the screens often get switch off bec
                               wo,                 n          hed        cause they are just s
                                                                                   y           seen
as a distrraction. We can also overload t operato with war
                     e                   the       or         rnings on w
                                                                        what could be happen    ning
so that th do not have the t
         hey                    time to
deal with everything they are faced
         h                     e
with. P Priority se etting in such
instances becomes importan We
          s          s         nt.
do not wwant CCTV to be reac   ctive to
only tech hnology-baased detec  ction -
people a  are still m
                    more efficient at
being proactive a    and pickin up
                                ng
dynamics and b
          s         behavior. If we
prevent      them              g
                       searching     for
incidents we will probably miss
         s,                    y
some of the most importan The
         f           t         nt.
timing of the even occurren
          f         nt         nce, or
when we warn the operator is also
         e
somethin ng that needs t       to be
considere Too so may ju provide a lot of false alarms, too late m be exa
          ed.       oon        ust                                      may         actly that - too
         ally, where do we pla the warnings with the disp
late. Fina          e          ace                 hin        play enviro
                                                                        onment - does it beco  ome
the cente of attention, or one of the tools the oper
         er                    e                   rator uses.

Envisaged Improv  vement in performa
                           n       ance: Tec
                                           chnology h
                                                    has the po
                                                             otential to deliver hig
                                                                                   gher
performa
       ance in a nu
                  umber of w
                           ways:

      Th level o work be
         he         of           eing perfo
                                          ormed - pe  eople can concentrat on the important and
                                                                            te
       higgher priorit issues th need human inter
                     ty          hat                  rpretation.
      Th volume of covera of the system - all of thes cameras are really working - not
         he         e            age       e                     se         s        y
       jus providing a mass of informa
          st                               ation that w largely be lost and discarde Clients are
                                                      will                           ed.
       geetting real c
                     capital retu on their system in
                                 urn       r          nvestment. Event gen nerated alarms and viideo
       monitoring a tracking helps! Privacy ensuring block
                    and                                           kage of pre
                                                                            e-determin areas h
                                                                                     ned        help
       grreatly in avoiding litiga
                                 ations on b
                                           breach-of-pprivacy rela
                                                                 ated matterrs.
      Th quality of results delivered This is s
         he                      s         d:         surely going to provid higher security rela
                                                                  g        de                   ated
       ouut-put: more things are being detected and the base is being laid for a m
                                           g          d,         e                    d        more
       inttelligence a directe risk man
                     and         ed        nagement process.

In five ye
         ears' time, we will fin intelligent systems on just a
                               nd                   s           about every worthwhile CCTV s
                                                                           y                  site.
However despite a the limit
         r,        all         tations with CCTV sy
                                          h         ystems, the operator is still the key and f
                                                                 e        r         e         final
decision maker. Th right ope
                   he          erators ma a signif
                                         ake        ficant differ
                                                                rence to th system. Operators will
                                                                          he                 s
continue to be able to do thin that tec
                   e           ngs        chnology is unable to do and w do so fo some ye
                                                    s           o         will      or        ears
to come.


C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx
Courtes Col D
                                      sy:   Deepak Behl
                      Pretty n
                             neat idea Never t
                                     a!      thought o it befor
                                                     of       re!!
                       Put yo car ke besid your b at nig
                            our      eys     de     bed      ght

                                       Tell your spo   ouse, your children, your ne
                                                                 r         ,        eighbors, y your
                                       pareents, your Doctor's office, and the check--out girl at the
                                       mark everyo you run across. T them to ‘Put your car
                                            ket,       one       n        Tell       o          r
                                       keys beside yo bed at night’. If y hear a noise outs
                                            s          our                you                    side
                                       your home or someone trying to get in you house, just
                                            r                                        ur
                                       pres the panic button f your ca The ala
                                           ss                   for       ar.       arm will be set
                                       off, a the ho will con
                                            and       orn      ntinue to so
                                                                          ound until e
                                                                                     either you turn
                                       it of or the car batte
                                             ff                 ery dies. This tip c came from am
                                       neigghborhood watch co   oordinator. Next tim you co
                                                                                    me          ome
                                       hom for the night and you start to put you keys aw
                                          me                                         ur         way,
                                       think of this: It a securi alarm system that you proba
                                            k          t's       ity                 t           ably
                                       alrea have a require no instal
                                            ady        and     es          llation.

Test it.

It will go off from m
                    most every ywhere insi your ho
                                          ide        ouse and
will keep honking u
         p                     battery runs down or until you
                    until your b
reset it w the but
         with        tton on the key fob ch
                               e          hain. It works if you
park in yyour drivew or gara
                   way         age. If your car alarm goes off
                                          r         m
when som  meone is trying to bre into yo house, odds are
                                eak       our
the burglar/rapist wwon't stick around. AAfter a few seconds
all the neeighbors w be look
                    will       king out their window to see
                                                    ws
who is out there an sure en
                     nd        nough the criminal won't want
that. And remembe to carry your key while w
          d          er         y         ys        walking to
your car in a park  king lot. Th alarm c
                               he         can work t the same
way there This is s
          e.        something that should really be shared wit everyone. Maybe i could sav a
                                          d                     th             it        ve
          sexual abuse crime.
life or a s



Food for th
          hought
               t:
If it is not already with y
       s                  you, pr
                                rovably it will harm you: t
                                      y       l           the
inform mation, the technolo – in short ‘The Edge’!
              ,           ogy n       t,

P.S. - If you don't like to receive our newslette we apo
                                                er,    ologize for bothering you. Ple
                                                                 r          g         ease
let us knnow your m addre and we will mov it out fro our co
                  mail       ess       e        ve      om       ontact list, thank youu!

Suggest
      tions & fee
                edback ma be sent to us on e-mail: sb
                        ay      t                   btyagi1958
                                                             8@gmail.c
                                                                     com


C:Userss
         sbtyagiDocum
                     mentsICISSNews Letter Aug 12.doc
                                           r          cx

Más contenido relacionado

Destacado

C:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta Avenida
C:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta AvenidaC:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta Avenida
C:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta AvenidaAnibal Chajon
 
Trastorno bipolar impacto sobre la calidad de vida
Trastorno bipolar impacto sobre la calidad de vidaTrastorno bipolar impacto sobre la calidad de vida
Trastorno bipolar impacto sobre la calidad de vidavitriolum
 
6 Najwiekszych Błędów W Rozmowie Z Kobietą
6 Najwiekszych Błędów W Rozmowie Z Kobietą6 Najwiekszych Błędów W Rozmowie Z Kobietą
6 Najwiekszych Błędów W Rozmowie Z Kobietąuncleuwo
 
Iiep presentacion pubertad adolescencia
Iiep presentacion pubertad adolescenciaIiep presentacion pubertad adolescencia
Iiep presentacion pubertad adolescenciacandeabalos
 
Teorías sobre la cultura en la era posmoderna Harris Marvin
Teorías sobre la cultura en la era posmoderna   Harris MarvinTeorías sobre la cultura en la era posmoderna   Harris Marvin
Teorías sobre la cultura en la era posmoderna Harris MarvinOberdose
 
Dislalia actividades-1
Dislalia actividades-1Dislalia actividades-1
Dislalia actividades-1Bárbara Toro
 
The APEX QA Plugin
The APEX QA PluginThe APEX QA Plugin
The APEX QA PluginOliver Lemm
 
Apgar familiar ponencia dr santiagotm@gmail.com
Apgar familiar ponencia  dr santiagotm@gmail.comApgar familiar ponencia  dr santiagotm@gmail.com
Apgar familiar ponencia dr santiagotm@gmail.comSantiago Torres
 
ACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REY
ACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REYACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REY
ACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REYGCBA
 
Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...
Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...
Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...Indian dental academy
 
Análisis de la Seguridad Social en Chile
Análisis de la Seguridad Social en ChileAnálisis de la Seguridad Social en Chile
Análisis de la Seguridad Social en ChileNelson Leiva®
 
Esperienze e osservazioni scientifiche in classe seconda primaria
Esperienze e osservazioni scientifiche in classe seconda primaria Esperienze e osservazioni scientifiche in classe seconda primaria
Esperienze e osservazioni scientifiche in classe seconda primaria icpego
 
Rx endo 6 b
Rx endo 6 bRx endo 6 b
Rx endo 6 b4paulo74
 

Destacado (19)

C:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta Avenida
C:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta AvenidaC:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta Avenida
C:\Documents And Settings\Achajon\Escritorio\Presentaciones\Sexta Avenida
 
EL RIESGO SÍSMICO Y LA NORMATIVIDAD EN EL ESTADO DE JALISCO
EL RIESGO SÍSMICO Y LA NORMATIVIDAD EN EL ESTADO DE JALISCOEL RIESGO SÍSMICO Y LA NORMATIVIDAD EN EL ESTADO DE JALISCO
EL RIESGO SÍSMICO Y LA NORMATIVIDAD EN EL ESTADO DE JALISCO
 
Presentacion completacorpacero
Presentacion completacorpaceroPresentacion completacorpacero
Presentacion completacorpacero
 
Trastorno bipolar impacto sobre la calidad de vida
Trastorno bipolar impacto sobre la calidad de vidaTrastorno bipolar impacto sobre la calidad de vida
Trastorno bipolar impacto sobre la calidad de vida
 
Consultorio
ConsultorioConsultorio
Consultorio
 
6 Najwiekszych Błędów W Rozmowie Z Kobietą
6 Najwiekszych Błędów W Rozmowie Z Kobietą6 Najwiekszych Błędów W Rozmowie Z Kobietą
6 Najwiekszych Błędów W Rozmowie Z Kobietą
 
Iiep presentacion pubertad adolescencia
Iiep presentacion pubertad adolescenciaIiep presentacion pubertad adolescencia
Iiep presentacion pubertad adolescencia
 
FFG Eventos y congresos - Algunos eventos
FFG Eventos y congresos - Algunos eventosFFG Eventos y congresos - Algunos eventos
FFG Eventos y congresos - Algunos eventos
 
Teorías sobre la cultura en la era posmoderna Harris Marvin
Teorías sobre la cultura en la era posmoderna   Harris MarvinTeorías sobre la cultura en la era posmoderna   Harris Marvin
Teorías sobre la cultura en la era posmoderna Harris Marvin
 
Situación Calentadores Solares de Agua en México 2014
Situación Calentadores Solares de Agua en México 2014 Situación Calentadores Solares de Agua en México 2014
Situación Calentadores Solares de Agua en México 2014
 
Dislalia actividades-1
Dislalia actividades-1Dislalia actividades-1
Dislalia actividades-1
 
The APEX QA Plugin
The APEX QA PluginThe APEX QA Plugin
The APEX QA Plugin
 
Apgar familiar ponencia dr santiagotm@gmail.com
Apgar familiar ponencia  dr santiagotm@gmail.comApgar familiar ponencia  dr santiagotm@gmail.com
Apgar familiar ponencia dr santiagotm@gmail.com
 
ACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REY
ACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REYACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REY
ACUPUNTURA 10 PREGUNTAS POR EL DR. OSVALDO ANDRES REY
 
Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...
Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...
Maxillofacial trauma mandible /certified fixed orthodontic courses by Indian ...
 
Análisis de la Seguridad Social en Chile
Análisis de la Seguridad Social en ChileAnálisis de la Seguridad Social en Chile
Análisis de la Seguridad Social en Chile
 
Métodos ac naturales
Métodos ac naturalesMétodos ac naturales
Métodos ac naturales
 
Esperienze e osservazioni scientifiche in classe seconda primaria
Esperienze e osservazioni scientifiche in classe seconda primaria Esperienze e osservazioni scientifiche in classe seconda primaria
Esperienze e osservazioni scientifiche in classe seconda primaria
 
Rx endo 6 b
Rx endo 6 bRx endo 6 b
Rx endo 6 b
 

Más de Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 

Newsletter: Making an Informed Choice About Airport Screening

  • 1. N Newslet tter: Au ugust 2 2012 Let’ prof ’s fession nalize t pro the ofessio onals… … http://w www.wix.com/sbtyagi/iciss s Over the last few y years, priso and oth securit sensitive areas hav begun u ons her ty e ve using a dev vice that scan the who body fo contraba ns ole or and. The s scan produces an image of the skin, and will e show obj jects like g guns, drugs other we s, eapons und clothing. This pro der ocedure is often used an d alternativ to whole body strip searches The devic uses a low energy x-ray or g ve e p s. ce y gamma sou urce to produc the imag ce ge. T The draw backs to this are 1) o e p privacy issuues; 2) raddiation dose to t the individu 3) rad ual; diation dose to e t worker The nex time you go the rs. xt u through security at th airport, you t he might be told to empty y m your p pockets, pu your hands over y ut your h head and s stand still w while an XX-ray m machine lo ooks for an nything hid dden u under your clothing. r If this body scanning option sou y unds u unappealin ng, you h have another c choice: an “enhance pat do n ed own” c conducted by a T Transporta ation S Security A Administration employyee, w which so ome trav velers h have d described a quite int as timate. The new screening measure have be w g es een hotly debated, but mostl in theory Now tha in USA ly y. at there are nearly 24 body sc e 44 canning ma achines in about 50 domestic airports, w 800 mo on the with ore way, passsengers are facing real-life decisions g about wh to do. Here’s so hat ome inform mation to help you choose. If you so omehow m missed the hoopla, t e there are two type of mac es chines bein installe which ng ed, C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 2. have rais sed conce erns about privacy, health risk and eve their ef t ks en ffectivenes at catch ss hing terrorists The more controve s. e ersial “back kscatter” de evices projject an X-r beam o ray onto the boody, creating an image displayed on a mo d onitor view wed in ano other room. The “mil llimeter wa ave” machines which are consi s, idered les risky because th ss hey do no use X- ot -rays, bouunce electromagnetic waaves off the body to p e produce a ssimilar imag ge. Unlike mmetal detec ctors, these machine can det es tect object made w ts with other materials, like plastic and ceramic. But they can’t see anything hidden in g nside your body, or detect cer r rtain explosivees. What the images reveal is also uncle ese s ear. Mr. Kimball said that the T.S.A. us ses filters to blur the im mages, and the agen d ncy has pos sted samp ples of th kinds of he images s screeners see and a video of t the screening process on its Web si g s ite, tsa.gov. But critic say the cs ese samples aren’t de etailed ennough for travelers to judge ho explicit t ow they are, e especially i a if screener zooms in on a specific area. r Another concern is whether the imag r ges can be s saved or transmitted The T.S.A. d. first said this wasn possible, then la d n’t ater admitted the mach hines can s save photo os, but that this feature had be een disableed. This kind of backtra d acking has added to tthe agency’s credibility problem. s The ma ain conceerns are how mu uch radiation the sca anners give off (t the manufacturers say the amo y ount is ve ery low), w whether t the scan nners mig ght malfunctiion and em more ra mit adiation th han they are supposed to, and wh the hea hat alth effects m may be for travelers. Since there is no precedent for routin r t nely screen ning so m many people w X-rays - other tha in prison - there a a lot of unknowns. with an ns are Another issue is th the dev hat vices haven’t been th horoughly t tested. The T.S.A. (T e Transporta ation Security Administra ation, USA) claims that the mac chines have been eva aluated by the Food and y Drug Ad on’s Center for D dministratio Devices a and Radio ological HHealth, the Comme e erce Department’s National Instit tute for SStandards and Tech hnology and the Jo ohns Hopkins Universit Applied Physics La ty aboratory. But it is c confirmed t that they b basically te ested only one thing - w whether the amount o radiation emitted m e of meets guideelines established by the Ameri y ican C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 3. National Standards Institute a memb e, bership or rganization of comp n panies and governm d ment agencies s. But gues who was on the c ss committee that develooped the g guidelines for the X-r scanne ray ers? The repr resentative from the compan es nies that m make the m machines and the D Departmen of nt Homelan Security among o nd y, others. In o other words the mac s, chines pass a test developed in sed d, part, by t compa the manufactur them an the government agency that wants to use anies that m re nd t them. ‘Russia T Today’ poin out an important detail bein left out of most ma nts ng ainstream media rep ports about th new bo he ody scann ning devicces being rolled out in airpo orts everyw where: forrmer Department of Homeland Se ecurity Chhief, Micha Chertof who ha been ad ael ff, as dvocating this technolog on any news p gy program th hat will ha ave him i persona is ally profitin from t ng their implemen ntation. As a Security Consultant and Cha s y airman of the Chertof Group, o of his m ff one main clients is Rapiscan, a manufa , acturer of th hese devicees. Last year, the Depa artment of Homeland Security a d awarded contracts of US$160 m f million eac to ch two manuufacturers of these ba ack-scattering device one which was Ra es, apiscan. Beyond t issue o Chertoff''s illegal ad the of dvertising h product on news programs by pretend his ding to be a p public serva there is some de ant, ebate about the safety of these new Back- y -scatter X-Ray Body Sca anning devvices. One form intellige mer ence agent and prese t ent-day security conssultant, Wa ayne Simmmons, says that while the device is an excellent tool, "T e s There is no dose of backscatte ionizing radiation that er has ever been prov safe," a that he would pre to see only passengers wh are deem r ven and e efer e ho med to be sus spicious go oing throug these de gh evices, with the bulk going through the metal detect h tors, with whic we've al become a ch ll accustome ed. John W Wayne's Five R s Rules 1. Money can't buy happine but it’s more com y y ess s mfortable to cry in a Mercede than on a bicycle es n e. 2. Forgiv your en ve nemy but r remember the basta r ard's name e. 3. Help s someone w when they are in tro y remember you when they're in ouble and they will r n n trouble a again. 4. Many people ar alive only because it’s illegal to shoo them. re ot 5. Alcohol does no solve any problem but th again, neither do milk. ot ms, hen oes C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 4. By Capt G Ra Kumar aj The alar monitor rm ring and r response is very co omplex and tedious function of Secur d s rity Managem ment. Fraught with False Alarms and resource h e-mobilizat tion, alarm monitor m ring also me eans that systems need to b consta be antly upgr raded and procedures check d ked. There is also need to constantly aud the efficacy of th system return-o s d dit he m, on-investmment and the integrity of the data for very e y efficient alarm monitorin ng. Since all Ca G Raj Kumar is ICISS C e apt Councilor for these ac ctivities occupy lot attention and An ndhra Prad desh. priorities of th s he organ nizations, the forward looking managem ments sta arted He has tota 25 year of expe e al rs erience out of off-loadiing these activiti e ies to t third- wh hich he ser rved 14 years in the A Armed For rces parties – specialis in the fie This t st eld. turns and rest 11 years in the indu n ustry. He has out to be cos effectiv st ve and very unique dist tinction o of dependa able optio which enhances the serving in Air forces a on s as level of ssecurity p preparedne ess. we as in A ell Army. Whil le in Armed For rces he haas Spearhe eading this phenom s menon are few be e een extensivelly security agencies who hav establis s ve shed inv volved in Counte n er their Cen ntral Moniitoring Staations in ccities Ins surgency O Operations. . all over These centers cater to big r. offices, industries as well as individual He holds degree o s e of resident ts who wish to avail their MB (HRD) from Ran o BA ni services Large in s. ndustries a in pro are ocess Du urgavati University y, of gettin third pa ng arty monitoring serv vices Jabalpur. Pre esently he is pursuin a Ph. D in e ng and the process seeks our well laid d-out Pe ersonnel M Manageme ent. At p present he is e strategiees. woorking in G GAIL and p posted at V Vizag, And dhra Praadesh. A monito oring centter must provide tim mely, A keen sp ports enth husiast, he represe ents consistennt, high-qquality ser rvices utilizing Anndhra Prad desh Badm minton Tea am. Previously state-of-t the-art technology to customer 24 o rs he has pla e ayed in b badminton tourname ents hours a dday, 365 days a year Keeping pace r. conducted by Petroleum Sports Control Bo y oard with the change e es in technology and of India. maintaini ing alarm system data inte m egrity were crucial to mai intaining go of prov oal viding He can be re e eached at grajkumar r@gail.co.in or n best-in-class alarm monitori m ing service In on his Mobile number - 78936016 e. e 699. addition to equipm ment need ded, enhan ncing alarm da integrity is also n ata y necessary to ensure the highes level of security is continuously st s maintaine The p ed. planning phase may include f y five critica elements which w al s would beco ome foundatio to succe on essfully connvert in-house alarm monitoring platform t a third-p g to party suppli ier: - ransition te Tr eam identifi ication - Deecision pro ocess to de etermine th service p he provider - Pr roject plannning - Im mplementat tion C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 5. - Post implementation (continuous improvement) Transition Team To successfully convert alarm monitoring to a third-party supplier, a transition team of customer-focused leaders may be selected to design, analyze, and implement the alarm monitoring transition project. In addition to loss prevention, transition team is to include stakeholders from the following departments: procurement, finance, business unit leaders, IT, real estate, legal, facilities, and operations etc. This team must meet regularly, defining the objectives, building success criteria, creating performance metrics, and representing the organization to ensure a seamless transition of alarm monitoring. Any plan for the alarm monitoring transition may include: - Understand the buy – interview stakeholders - Establish operating procedures for supplier - Develop draft scope of work for review by stakeholders - Present sourcing strategy (scope of work, list of suppliers, and timeline) - Develop, distribute, and analyze request for information - Complete supplier bid meetings and site visits - Suppliers complete and return request for information - Present request for proposal (RFP) supplier short list recommendations to stakeholders - Analyze RFP - Negotiate with suppliers - Present overview to stakeholders - Notify suppliers and stakeholders of contract award - Execute contract - Develop performance metrics - Establish quarterly performance meetings to review and track performance metrics Determining the Service Provider Collectively, transition team needs to identify suppliers that provided the most comprehensive, customer-focused capabilities. Criteria for a successful service provider are as following: - Fitness to technical and functional requirements - Total cost of ownership - The ability to support current and emerging equipment - Industry reputation and experience - Experience and qualifications of the company and resources - Quality assurance commitment - Financial strength - Proven methodologies, tools, and value added services Sourcing decision must be based on the “best value/total cost” principle. While cost remains a critical decision factor, the quality of the equipment, and operating efficiencies would be the primary and most critical aspects. Project Planning C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
  • 6. A project task list can be created to identify key issues that can affect the overall project and allow assignment of tasks. Tasks can be assigned milestones in the project file to help balance workload for project planning. Clear communication, precise operating procedures, and partnership with selected solutions provider are the building blocks of our transition plan. Implementation Converting alarm system monitoring, whether from in-house to third party or third party to in- house, requires absolute understanding of a defined scope of work. To implement the alarm system monitoring change, the data from the existing monitoring facility can be gathered and scrubbed to determine its accuracy and freshness. The data then need to be formatted in order to be inserted into new monitoring systems and reviewed again for accuracy. Once all data is in place in new monitoring systems, the stage is set to develop the schedule for the change- over. Post Implementation – Continuous Improvement The alarm monitoring conversion from proprietary monitoring platform to the Third party Monitoring Center has to be a seamless, successful event. Metrics need to be assigned to all the alarms and responses. Each metric was assigned a target goal, for example 90 percent of burglar alarms within 60 seconds. To ensure continuous improvement, it is advisable to develop quarterly performance business reviews. Business reviews provide the avenue to assess performance metrics, identify opportunities to strengthen partnership, and continue to focus on achieving both organizations’ internal and external goals. A monitoring center must provide timely, consistent, high-quality services utilizing state-of-the- art technology to customers 24 hours a day, 365 days a year. Keeping pace with the changes in technology and maintaining alarm system data integrity were crucial to maintaining goal of providing best-in-class alarm monitoring service. In addition to equipment needed, enhancing alarm data integrity is also necessary to ensure the highest level of security is continuously maintained. The planning phase may include five critical elements which would become foundation to successfully convert in-house alarm monitoring platform to a third-party supplier: - Transition team identification - Decision process to determine the service provider - Project planning - Implementation - Post implementation (continuous improvement) Transition Team To successfully convert alarm monitoring to a third-party supplier, a transition team of customer-focused leaders may be selected to design, analyze, and implement the alarm monitoring transition project. In addition to loss prevention, transition team is to include stakeholders from the following departments: procurement, finance, business unit leaders, IT, real estate, legal, facilities, and operations etc. This team must meet regularly, defining the C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
  • 7. objectives, building success criteria, creating performance metrics, and representing the organization to ensure a seamless transition of alarm monitoring. Any plan for the alarm monitoring transition may include: - Understand the buy – interview stakeholders - Establish operating procedures for supplier - Develop draft scope of work for review by stakeholders - Present sourcing strategy (scope of work, list of suppliers, and timeline) - Develop, distribute, and analyze request for information - Complete supplier bid meetings and site visits - Suppliers complete and return request for information - Present request for proposal (RFP) supplier short list recommendations to stakeholders - Analyze RFP - Negotiate with suppliers - Present overview to stakeholders - Notify suppliers and stakeholders of contract award - Execute contract - Develop performance metrics - Establish quarterly performance meetings to review and track performance metrics Determining the Service Provider Collectively, transition team needs to identify suppliers that provided the most comprehensive, customer-focused capabilities. Criteria for a successful service provider are as following: - Fitness to technical and functional requirements - Total cost of ownership - The ability to support current and emerging equipment - Industry reputation and experience - Experience and qualifications of the company and resources - Quality assurance commitment - Financial strength - Proven methodologies, tools, and value added services Sourcing decision must be based on the “best value/total cost” principle. While cost remains a critical decision factor, the quality of the equipment, and operating efficiencies would be the primary and most critical aspects. Project Planning A project task list can be created to identify key issues that can affect the overall project and allow assignment of tasks. Tasks can be assigned milestones in the project file to help balance workload for project planning. Clear communication, precise operating procedures, and partnership with selected solutions provider are the building blocks of our transition plan. Implementation C:UserssbtyagiDocumentsICISSNews Letter Aug 12.docx
  • 8. Convertin alarm s ng system mo onitoring, wwhether from in-house to third p e party or thi party to in- ird o house, reequires abbsolute undderstanding of a defined scope of work. To implem g e ment the alarm system mmonitoring change, th data fro the exis he om toring facility can be gathered and sting monit scrubbed to determ d mine its acccuracy and freshness. The data then need to be form d matted in order to be ins serted into new monit toring syste ems and reeviewed ag ccuracy. Once all dat is gain for ac ta in place in new mo onitoring sy ystems, the stage is set to dev e velop the sschedule fo the chan or nge- over. Post Imp plementation – Cont tinuous Im mproveme ent The alar monitoring conve rm ersion from propriet m tary monito oring platf form to the Third p party Monitorin Center has to be a seamles success event. Metrics ne to be a ng ss, sful eed assigned to all o the alarm and responses. Ea metric was assig ms ach c gned a targ goal, fo example 90 percen of get or e nt burglar a alarms within 60 seco onds. To ensur continuo improv re ous vement, it is advisable to develo quarterl performa e op ly ance busin ness reviews. Business reviews provide th avenue to asse he e ess perform mance me etrics, iden ntify opportunnities to stre engthen pa artnership, and contin to focu on achie nue us eving both organizatio ons’ internal a externa goals. and al CCTV systems have on ne fundameental flaw – despite putting u large numbers of up cameras to ma aximize the coverage of an area, w e we seldom hhave anybbody actua ally looking a much of the area f at f for which we are respo e onsible. Sure, we can alwa go ba e ays ack and look at what ha appened, b but many tim this jus is not goo mes st od enough. It is a problem of logistics and econoomics. We cannot s e staff the co ontrol room with eno m ough people to view the number o cameras we have available. So we have many of these c of s e cameras' v views going to g waste wh it may be useful t view the hen to em. To make it worse, much of what is dis e splayed on monitors will be un n s neventful, or sometim mes even hav content that is irre ve elevant to t risk pr the rofile of the site. This problem o coverag is e s of ge not likely to go awa soon. H y ay However, thhere are te echnologies being imp s plemented now or in the near futu that will change th risk cove ure he erage by C CCTV signif ficantly. Intelligen technology that is b nt being deve eloped can help in a number of ways. Ce n f entral to this is technolog that can work with the opera in the backgroun performi intellige analysi of gy n h ator nd ing ent is the came views. era C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 9. Firstly, the c computer ca do thing that com an gs mputers are good at, and free th operator up e he to concentra on othe duties. For example where a ate er e, automated recognition such as f n face ecognition or number plate rec re r cognition c can do the job, it fr e rees the ooperator up to p oncentrate on the m co more releva things that only people ca do. In this way it is ant an opptimizing th use of th system. he he  Seecondly, bbackground sensing and alerts or alarm allow th detectio of susp d s ms he on pect coonditions o camera that ar not cur on as re rrently bein viewed by the o ng d operator. The coomputer ca highlight these or bring thes to the operators' a an se attention fo viewing and or inv vestigation This co n. ould includ certain types of movement or the presence of de f e soomebody o somethin in an area for def or ng fined perio ods. Through this, the coverage of e the cameras has been made mor efficient. s re .  Annother option is acting as an ea warning system. In this con arly ntext, the teechnology can hig ghlight con nditions tha could potentially be suspect s at e such as objjects left in an area; c n cars paarked where they sh hould not b or exc be, cessive den nsities of p people in an area. T This technology is starting to become more common with a s advanced D DVR systems. Potentia Areas of Developm al f ments: Other technologies offer sub s bstantial pootential, but have so ome development time still to go o before th reach e hey effective us Where an operato is viewin a scene and need to divert his se. or ng e ds t or her atttention to something else, para g allel monitooring or tra acking thro ough taggin a partic ng cular object or person c r could allow operators to come back to th scene later and pick up m w s hat more easily on the locatio and mo n on ovement of the target Building up an infor f t. rmation ba on targ ase gets, situations and beh s, haviors to use for ris manage sk ement and future inv vestigation is one of the most neg glected asppects of CCCTV. Intelligent Techno ology: Use of an inte elligent syystem tha at recognize behavio and con es or nditions can greatly hhelp by increasing t the amoun nt and qua ality of infformation coming in n. Technolo can als help by simulating ogy so y or verifying operato performa or ance, eithe er in contra asting the number of issue e es picked up by the intelligent s systems, oor the inser enarios tha should be rtion of sce at picked u by ope up erators and reviewing d them ag gainst actu detecti ual ion scoress. Finally, intelligent technolog can be gy used to eextend the normal CC CTV functio by building in alg ons gorithms th allow th detectio of hat he on other thin such a fire, sm ngs as moke, produ uction stop ppages, ov verflows an so on th would add nd hat value to t CCTV function. I think the p the potential fo intelligen analysis, sometime called vis or nt es sual analytics technolo s ogy, goes far beyo ond secur rity-based CCTV to many f o forms of risk managem ment and m monitoring. The ques stions on ““what, wheere, when, who, why and how” will increasinngly becom available in our data retrieval system. me e l C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 10. Impleme entation Problems: Besides the develo opment nee that ar required to realize some of t ideas fo technolo eds re d e the or ogy, there are some im e mplementation problems with th hose we already hav availabl Cry wo is ve le. olf when reppeated waarnings occ without foundatio Eventually, the p cur t on. people star disregard rt ding the warnings and th potentia of the tec he al chnology becomes ignored. Use of bl lank screenn-based alarm system are a cl ms lassic exam mple, after 90 false alarms popp ping up on sc creen in an hour or tw the screens often get switch off bec wo, n hed cause they are just s y seen as a distrraction. We can also overload t operato with war e the or rnings on w what could be happen ning so that th do not have the t hey time to deal with everything they are faced h e with. P Priority se etting in such instances becomes importan We s s nt. do not wwant CCTV to be reac ctive to only tech hnology-baased detec ction - people a are still m more efficient at being proactive a and pickin up ng dynamics and b s behavior. If we prevent them g searching for incidents we will probably miss s, y some of the most importan The f t nt. timing of the even occurren f nt nce, or when we warn the operator is also e somethin ng that needs t to be considere Too so may ju provide a lot of false alarms, too late m be exa ed. oon ust may actly that - too ally, where do we pla the warnings with the disp late. Fina e ace hin play enviro onment - does it beco ome the cente of attention, or one of the tools the oper er e rator uses. Envisaged Improv vement in performa n ance: Tec chnology h has the po otential to deliver hig gher performa ance in a nu umber of w ways:  Th level o work be he of eing perfo ormed - pe eople can concentrat on the important and te higgher priorit issues th need human inter ty hat rpretation.  Th volume of covera of the system - all of thes cameras are really working - not he e age e se s y jus providing a mass of informa st ation that w largely be lost and discarde Clients are will ed. geetting real c capital retu on their system in urn r nvestment. Event gen nerated alarms and viideo monitoring a tracking helps! Privacy ensuring block and kage of pre e-determin areas h ned help grreatly in avoiding litiga ations on b breach-of-pprivacy rela ated matterrs.  Th quality of results delivered This is s he s d: surely going to provid higher security rela g de ated ouut-put: more things are being detected and the base is being laid for a m g d, e d more inttelligence a directe risk man and ed nagement process. In five ye ears' time, we will fin intelligent systems on just a nd s about every worthwhile CCTV s y site. However despite a the limit r, all tations with CCTV sy h ystems, the operator is still the key and f e r e final decision maker. Th right ope he erators ma a signif ake ficant differ rence to th system. Operators will he s continue to be able to do thin that tec e ngs chnology is unable to do and w do so fo some ye s o will or ears to come. C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx
  • 11. Courtes Col D sy: Deepak Behl Pretty n neat idea Never t a! thought o it befor of re!! Put yo car ke besid your b at nig our eys de bed ght Tell your spo ouse, your children, your ne r , eighbors, y your pareents, your Doctor's office, and the check--out girl at the mark everyo you run across. T them to ‘Put your car ket, one n Tell o r keys beside yo bed at night’. If y hear a noise outs s our you side your home or someone trying to get in you house, just r ur pres the panic button f your ca The ala ss for ar. arm will be set off, a the ho will con and orn ntinue to so ound until e either you turn it of or the car batte ff ery dies. This tip c came from am neigghborhood watch co oordinator. Next tim you co me ome hom for the night and you start to put you keys aw me ur way, think of this: It a securi alarm system that you proba k t's ity t ably alrea have a require no instal ady and es llation. Test it. It will go off from m most every ywhere insi your ho ide ouse and will keep honking u p battery runs down or until you until your b reset it w the but with tton on the key fob ch e hain. It works if you park in yyour drivew or gara way age. If your car alarm goes off r m when som meone is trying to bre into yo house, odds are eak our the burglar/rapist wwon't stick around. AAfter a few seconds all the neeighbors w be look will king out their window to see ws who is out there an sure en nd nough the criminal won't want that. And remembe to carry your key while w d er y ys walking to your car in a park king lot. Th alarm c he can work t the same way there This is s e. something that should really be shared wit everyone. Maybe i could sav a d th it ve sexual abuse crime. life or a s Food for th hought t: If it is not already with y s you, pr rovably it will harm you: t y l the inform mation, the technolo – in short ‘The Edge’! , ogy n t, P.S. - If you don't like to receive our newslette we apo er, ologize for bothering you. Ple r g ease let us knnow your m addre and we will mov it out fro our co mail ess e ve om ontact list, thank youu! Suggest tions & fee edback ma be sent to us on e-mail: sb ay t btyagi1958 8@gmail.c com C:Userss sbtyagiDocum mentsICISSNews Letter Aug 12.doc r cx