SlideShare una empresa de Scribd logo
1 de 12
Descargar para leer sin conexión
Interna
ational Coun for Secu
ncil
urity & Safet Man
ty
nagem
ment
News
sletter: O
October 2013
r

Let’s profes
ssiona
alize th prof
he
fession
nals…
http://www
w.wix.com/sb
btyagi/iciss

68 De And 175 in
ead
d
njured From 1 Nati
14
ions: D
Details of Ken
nya
Terro
orist A
Attack V
Victims begins to em
s
merge…
…

All s
security and safety frat
d
ternity in th world mu feel the pain and a
he
ust
anguish felt by the members of IC
CISS. The
pictu
ures above could have been from any count facing th menace of terrorism Be it 9/11 in USA o 26/11 in
e
m
try
he
m!
or
India or even 2
a
22/9 at Ken
nya, the fan
natics have spread mindless mas
ssacre in w
which victims were inno
s
ocent and
help
pless unarm / unprep
med
pared citizens! Kenyan President Uhuru Keny
n
yatta - who has lost relatives in th attack he
reite
erated his g
government determin
t's
nation to c
continue fighting Al-Sh
habaab. ‘W
We... went into Somalia to help
stab
bilize the cou
untry and m
most importa
antly to fight terror that had been u
t
unleashed o Kenya an the world he said.
on
nd
d,’
‘We shall not relent on th war on terror’, he said. In IC
he
CISS we ap
ppreciate th sentimen and commitment
he
nts
indic
cated in the statement and hope s
e
same will reverberate a echo fro all the co
and
om
orners of the world whe
erever the
terro
orism has played havoc
c!
At le
east 68 peo
ople killed in attack at W
n
Westgate sh
hopping Ce
entre. Soma
alian terroris group Al-S
st
Shabaab - w
which has
links to Al Qaed - claims responsibility for attac on Saturd
s
da
ck
day, 22nd Se
ept.13. 'If th found m I'm white... so I'm
hey
me,
dead Survivor reveal ho gunman executed non-Muslim - after as
d':
rs
ow
ms
sking them to name P
Prophet Moh
hammed's
ey
moth
her. Survivo said the saw fellow shoppe merciles
ors
ers
ssly execute after be
ed
eing singled out as no
d
on-Muslim.
Sho
oppers said people were lined up a gunned down for fa
e
and
ailing to recit passages from the K
te
s
Koran.
ls
sible that a woman from Northern Ireland whose husban blew him
m
nd
mself up in
Kenyan Official said that it was poss
mong the A
the July 7, 200 terror at
05,
ttacks on L
London's tra
ansport system was am
Al-Shabaab militants b
behind the
sieg on the W
ge
Westgate M in Nairo
Mall
obi, Kenya. On Monda 24th Sep 13, the K
ay,
pt
Kenyan For
reign Minist Amina
ter
Moh
hamed told PBS that tw or three U.S. nationals and one British woman were a
wo
e
among the a
attackers in the siege
and hostage dr
rama. Moha
amed said th woman i
he
involved had, "done thi many tim before," adding wei
is
mes
ight to the
spec
culation tha Samantha Lewthwaite, who se
at
ecurity offici
ials believe did travel to East Af
e
frica, and s
specifically
Som
malia, several years ago. She is w
wanted in Ke
enya for inv
volvement in an alleged terror plot to
n
bom locations on Kenya's coast last year. Lew
mb
s
t
wthwaite was dubbed th White W
s
he
Widow after her
husb
band blew h
himself up o July 7, 20 in London. She con
on
005
nverted to Is
slam as a te
eenager.

1
S
Shopping M
Malls and o
other soft targets sh
hould increase securi measur and up
ity
res
pdate emer
rgency
re
esponse plans in the aftermath of the Ken
nyan mall m
massacre t
that killed a least 72 people.
at
W
While overa security at so-calle soft targ
all
ed
gets like sp
ports arena hotels, r
as,
restaurants movie th
s,
heatres
a
and housing complex has inc
xes
creased dr
ramatically in recent years, Saturday 22n Sept.13 mass
y
nd
3
s
shooting in Nairobi sh
hould have an immed
diate impac among th
ct
hose who s
safeguard s
such comm
mercial
a residen
and
ntial locatio
ons.
They see t attentio that this receives and that’s what terro
the
on
s
orists want said one security e
t,”
e
expert.
“T
“T
They want this kind o coverage that’s wh they cal it terrorism. They’re getting maximum ba for
of
e;
hy
ll
e
ang
th
heir buck f
from a ma
arketing sta
andpoint. T
That’s kind of a perve
erse way t look at it, but ther
to
re’s no
s
stealth invo
olved.”
T
The primar challeng to secure a sho
ry
ge
opping ma is to m
all
maintain a sense of openness while
s
s
simultaneou
usly emplo
oying a high level o security measures like surv
of
s
veillance cameras, g
guards,
a
adequate lighting. Ut
tilizing the overall d
e
design of t
the proper
rty, particu
ularly near primary a
access
p
points, is also crucial to the “dyn
namic discipline”.
T
Typically, in
ncidents lik purse sn
ke
natchings a flash m
and
mobs are th type of c
he
crimes on t minds of mall
the
s
security pe
ersonnel, b at least three U.S malls h
but
t
S.
have been the scene of mass shootings since
e
s
O
October, most recently in April w
when an 18-year-old man wounded two a a mall in Christian
d
at
n
nsburg,
V The de
Va.
eadliest U.S. mall s
shooting in history o
n
occurred in Dec. 5, 2007, wh
n
hen nine p
people,
in
ncluding th gunman, died at the Wes
he
t
stroads Ma in Oma
all
aha, Neb. There ha
ave been similar
in
ncidents at Noida, Ind and oth parts of the world.
t
dia
her
f
“W have quietly added differe measu
We
ent
ures to ma
ake what w
was consid
dered a soft target a little
h
harder,” one mall own said. “W recognized a long time ago that shopp
e
ner
We
g
ping malls are soft ta
argets.”
B
Besides ow
wners, indiv
viduals als bear som of the responsibility for their safety at soft targe like
so
me
t
ets
m
malls. Here the impo
e
ortance is stressed of identify
ying a “saf haven,” or a pre
fe
”
eviously-ide
entified
lo
ocation tha can prov
at
vide protec
ction in the event of a emerge
e
an
ency. “Iden
ntifying thos places to and
se
2
fr
rom work, or during your morning routin is a gr
ne,
reat idea,” one expe says, “B all too often,
ert
But
p
people don have a p
n’t
plan.” Rest
taurants m
make great safe have
ens, he sai since th can no
id,
hey
ormally
a
accommoda large c
ate
crowds, hav basic fir aid mate
ve
rst
erials and a
access to f
food and w
water.
In what could be a fi
n
irst anywh
here in the world, th Mumba police pl to grad malls a
e
he
ai
lan
de
across
th city by their secu
he
urity-prepa
aredness.
A they rec
As
ceive large crowds, m
malls have always
b
been considered pot
tential terr
ror targets Now,
s.
w
with the att
tack on th Westgate Centre Mall in
he
N
Nairobi by m
militants loyal to Som
malia’s al Shabaab
g
group, the police wa to expedite their plans.
ant
r
“T
The attack is an u
k…
unfortunate example of how
e
m
malls are s
soft targets They ha
s.
ave multipl entry
le
a
and exit po
oints and a crowde through
are
ed
hout the
d
day. This m
makes secu
uring them a mammo task.
oth
G
Grading them will k
keep their owners o their
on
to
oes,” a senior polic officer told. The
ce
ere are
ro
oughly 24 mega-malls in Mum
mbai. They will be
g
graded from A to F, with category ‘A’ denoting
m
th best. If the grade is low, t
he
f
e
the owner will be
w
warned. Co
onsistent b
breaches in security w result in revocatio of licen
n
will
on
nse. “This i the first time a
is
g
government agency is doing su a rating If a mal is graded poorly, it may lose its patrons. The
s
uch
g.
ll
d
t
o
owner could also lose his license. So we e
d
e
expect that the desire to meet se
e
ecurity requirements will be
h
high,” said a source in the Mumb police.
n
bai
The police w use 25 paramet
e
will
5
ters for gr
rading.
The
ese include security at entry and exit points,
e
CCT
TV cover
rage, evac
cuation p
plans, employee
veri
ification, th deploym
he
ment of a licensed security
age
ency, the ability of police de
ecoys to b
breach
sec
curity and the number of mo
ock drills done.
Sur
rprise chec
cks by the police h
have throw up
wn
sho
ocking resu
ults.
s
5
ecoys were sent to b
breach
This year, 145 police de
sec
curity in ma
alls. Of the
ese, 89 m
managed to enter
o
the premises w explos
with
sives or we
eapons. “T
Though
alm
most all the malls in th city have metal det
he
e
tectors
and frisking m
d
mechanisms in place, our succes rate
s
ss
n
g
curity has b
been more than 75 pe cent. The figures a shockin We hav time
er
are
ng.
ve
in breaching their sec
a again w
and
written to the malls to upgrade their security but the have fai
o
ey
iled to do s
so,” said a police
s
source.

http://w
www.thehindu.com/new
ws/national/o
other-states/
/mumbai-ma
alls-to-get-security-rating/article5164832.ece

3
Embracing Globa Chan and Parad
al
nge d
digm Shift – B
Being a
an
In
ntellige and Secur Orga
ent d
re
anizatio for t Fut
on
the ture!
D.C. Nath IPS (Ret
h,
td.), PPM, IPM
About the Author:
Mr. DC Nath is Chief Pa
h
atron of Inter
rnational Cou
uncil of Secu
urity & Safety Manageme Superannuated in Ja
y
ent.
anuary,
1995, as the Special Dire
e
ector, Intellig
gence Bureau Mr. D.C. N
u,
Nath (IPS-19
960) has bee a visiting f
en
faculty to a n
number
of Institutes (like the In
ndian Institute of Public Administrat
c
tion (IIPA), Sardar Valla
abhbhai Pat National Police
tel
Academy (SVPNPA), L Bahadur Shastri Natio
Lal
onal Academ of Admini
my
istration (LBS
SNAA)
emies, includ
ding Manage
ement Trainin Institutes, covering d
ng
different aspe
ects of
and Acade
security and industrial s
d
security mana
agement.
both the hon
nors available in the polic service, n
e
ce
namely, India Police Me
an
edal for
Winner of b
meritorious services an the Presid
s
nd
dent’s Police Medal for d
e
distinguished services, a
d
and the
Prime Mini
ister’s Silver Cup Essay Competition at the Na
r
y
ational Police Academy in two
e
successive years, Mr Nath had made a very signif
r.
d
ficant and highly-appre
eciated
on
cknow, on “Im
mage Building for IPS Off
g
ficers” at the Vertical Interaction
presentatio at IIM, Luc
Program fo senior IPS officers.
or
r
acclaimed bo
ook, "Intellige
ence Imperatives for India Mr. Nath e
a",
earned
The author of a highly a
high plaudits from all ar
round for two of his very significant presentations on: “Revisiti the
o
ing
Future of In
ndia” (2005, London) and “Lessons fr
d
rom India for the War On Terrorism” (2007,
r
n
USA). Know for his prof
wn
fessed trainin ability, he is affectiona
ng
e
ately address as the “D
sed
Dronacharya” and is cons
”
sidered
a security ide
eologue.
gures in the A
American Po
olice Hall of F
Fame, a Trus of the US National Ass
st
sociation of C
Chiefs of Police. In
His name fig
December 2
2010, the Inte
ernational W
Who’s Who H
Historical Soc
ciety included his name in the 2010-2
d
2011 edition of the
“Internationa Who’s Who of Profess
al
sionals”. All t
this indeed s
speaks volum about Mr. Nath’s stan
me
.
nding in the f
field of
private secu
urity all over the world. T
Thus, in more than one sense, he i the only o
is
one in the field, combining the
experiences of a police officer with specializatio in intelligence and st
on
trategic anal
lysis and an industrial s
security
xcellence.
expert par ex

t
sary to kno and ap
ow
ppreciate w
what is the threat or challenge before us today – b
both as
It is necess
h
human bein per se and as se
ngs
ecurity prof
fessionals i particula The con
in
ar.
ncept of a c
convention war
nal
b
between tw countrie is now c
wo
es
considered a passé. So has ob
bserved Jo Horgan Director of the
ohn
n,
r
C
Centre for Science W
Writings at Stevens In
nstitute of Technolog in a brilliant writegy,
-up, “The End of
T Age of War”, app
The
f
pearing in the Newsw
week Spec Edition – Issues 2010: “Wa seems to be a
cial
n
ar
c
cultural phe
enomenon, which cu
ulture is no helping us eradica
ow
ate. Some scholars even cau
e
s
utiously
s
speculate th the era of traditio
hat
a
onal war – fought by two uniform
med, state
e-sponsored armies – might
d
b drawing to a clo
be
g
ose.” “Wa could b on the verge of ceasing to exist a a subs
ar
be
e
f
as
stantial
p
phenomeno said Jo Muelle a politica scientist at Ohio St
on,”
ohn
er,
al
t
tate Univer
rsity.
T real thr
The
reat today comprises continued acts of vio
d
olence, sta
ate-sponsor or othe
red
erwise in di
ifferent
p
parts of the world, mo popular describe as acts of terrorism Transn
e
ore
rly
ed
m.
national ter
rrorism is th real
he
th
hreat today before a of us. N
all
Notwithstan
nding the fact that s many a
so
advanced c
countries spend
fo
ortunes in military sp
pending, “T past ye saw inc
The
ear
creasing th
hreats to se
ecurity, sta
ability, and peace
in nearly ev
n
very corner of the glo
obe,” the S
Stockholm Internation Peace Research Institute re
nal
ecently
w
warned. M
Many nation and countries are now in fac faced wit the phen
ns
ct
th
nomenon w
what can b best
be
d
described a ‘globaliz
as
zation of violence’, b that gen
be
nuine libera
ation move
ements or m
motivated g
groups
p
practicing te
errorism co
overed by a very thin veil of poli
itical preten
nsions.
4
Coming down to more specifics - even though unanimity of opinion is still lacking over the definition
of terrorism, common refrain in all understanding or analyses of terrorism, veers round to what is
described as jihad or jihadi terrorism. Jihad is a war or struggle against unbelievers and is waged
by a number of groups owing allegiance to Islam. This was proved most emphatically in the 26/11
massacre at Mumbai (India). Reputed international commentators have described it as the seminal
event in the history of international terrorism and particularly in the history of global jihad.
“It would be a gross error to treat the terrorism facing India — including the terrible recent
atrocities — as simply a problem for New Delhi alone. In a very real sense, the outage in
Bombay was fundamentally a species of global terrorism not merely because the assailants
happened to believe in an obscurantist brand of Islam but, more importantly, because killing
Indians turned out to be simply interchangeable with killing citizens of some fifteen different
nationalities for no apparent reason whatsoever.”
- Mr. Ashley J Tellis, Senior Associate, Carnegie Endowment of International Peace.
(Indian Express – January 29, 2009)

There is thus an imperative need to appreciate the precise nature of the threat which marks the
major paradigm shift in the history and growth of terrorism. One has to acknowledge this
unambiguously. It is now global or universal jihad, which is a threat to all free world countries and it
is a war that can be won only if we acknowledge that it is a war against humanity. Unless this is
appreciated in the correct manner, the entire approach to handle terrorist threat could be faulted.
Perhaps it is this lack of political will, to call a spade a spade is causing such enormous problem
today in Pakistan which is at the receiving end from the Talibans. Much of the problem in India also
could be attributed to the lack of admission of reality and feeble attempts at taking cover in the
name of functioning in a democratic form of government. LeT is now the virtual substitute for AlQaeda with Yemen as the latest base station. The United States of America and UK have also
been warned of 26/11-like acts of terror. The problem there has become more complex because
such threats are no longer posed by non-state actors from outside but are also from home-gown
terrorists, a fast emerging phenomenon. Female participation in jihad adds a further and new
dimension. “A significant development in women participation in the global jihad has been the
dissemination of radical ideologies on-line”, writes Mia Bloom in a draft of her forthcoming book,
“Bombshell: Women and Terror” (Time, February 1, 2010).
Another major paradigm shift is in the technique of perpetrating acts of terrorism. Apart from
perfecting the art of suicidal Fedayeen attacks, there has been tremendous sophistication in the
methodology being adopted by the terrorists. There has also been substantial qualitative
improvement in the profile of the terrorists involved, as revealed in the analysis of the character and
antecedents of those involved in 9/11 or the series of terror attacks in India, involving educated and
technically equipped youth representing the Student Islamic Movement of India (SIMI).
Talking about the 9/11 group, Steve Coll, a Pulitzer Prize Winner, has said in an interview, “those
guys were not nuclear physicists but they were well-educated, smart, determined, careful and willing
to learn.” He further added that while AL Qaeda had thus been able to put together really talented
people, Lashkar’s style of talent is more worrying. Some of the proselytizing networks have been
able to recruit and radicalize scientists, doctors and other such talented people from here and there,
as seen in 26/11. They can wreak a lot of havoc. (Steve Coll, Pulitzer Prize Winner, The Indian
Express, New Delhi, January 26, 2010).

5
There has been a distinct trend in exploiting knowledge gathered from information technology, as
seen in a spurt in the number of websites, which were earlier hosted for raising funds but now are
being used for offering training and dissemination of ideology and other technical know-how.
Steganography, that is, sending coded messages through pornographic pictures, was adopted in
the December 13-attack on the Indian Parliament. Threat of cyber-attack has indeed pushed the
United States to plan for independent Cyber Command. This is nothing but the real case of power
of information technology, another paradigm shift!
A new and vital paradigm shift in approach to tackle terrorism should, therefore, lie in spending
more time and thought on preventing terrorism to grow or take roots and tackle it with a long term
perspective and with societal participation. As it is said, security is business of all, for all and by all.
That is why it is recommended that the corporate world should try to educate its employees in the
matter of security concerns by way of encapsulating security doctrines in their corporate social
responsibility (CSR) policy. Employees will then help build up the national resilience against all
forms of security threats including terrorism.
The paradigm shift in approach to tackling terrorism problem today really lies in the concept of
public-private partnership. Countering terrorism is not just a job for the security and intelligence
services. Yes, there is indeed an imperative need for improving infrastructure and intelligence
gathering. The difference between victory and defeat has been rightly described as availability of
good intelligence or the absence of it. Such good intelligence could really come up and be built
through the module of perfect public-private partnership. Intelligence is the backbone of all political
stability which can in other words be put as the by-product of good internal security mechanism.
Modules of private-public partnership have been very successfully worked out in the UK through
Project Argus and Project Griffin.
Project Argus relates to “resilience planning”. “Responding to a growing concern amongst business
for a need to be prepared in the face of terrorism and to bring vast public and private sector
expertise together, London First has established a growing Business Security and Resilience
Network since 9/11. The Network brings employers, police and government emergency planners
together to share expertise and encourage co-ordination of business continuity activities across
sectors. Members are also linked up to London-wide fast-time incident alerts as well just launching
a quarterly political and fraud intelligence briefing service.”
Project Griffin deals with how police can take advantage of the bulk of private security force
available in the country. It is a community outreach program institutionalizing cooperation between
the police and private security agencies under three basic formats, within the overall scheme of
Counterterrorism measures known as Preventing Extremism Together (PET). These modules are
being implemented in many other countries.
It is, in this context, incumbent on the corporate world to undertake security audit and then
undertake risk management study, not only to get the Return on Investment (RoM) but also to
ensure what is popularly known as business continuity planning.
Diligent business continuity
planning leads to saving of expenditure. That will also lead to real convergence of both business
interests and security interests.
If a forward-looking business entity spends money on
modernization of its management technology and on methods of improving production technology,
why cannot it also think in the present-day security ambience of spending money on modernization
of security technology, investment of some money on research relating to security management?
6
In
nvestment in security will never go waste. Unfortunately, man
y
r
.
nagement o
often forgets that sec
curity is
a
amongst its vital too to incr
s
ols
rease operational or functiona efficienc and thu to incr
r
al
cy
us
reasing
p
production under secu conditio
ure
ons. This paradigm s
shift is also essentiall called fo
o
ly
or.
T Americ
The
cans have, therefore, been advi
ised, “By tr
reating terr
rorism as a hazard to be manag by
o
ged
a America
all
ans, terroris can als be starv
sm
so
ved of its ability to g
generate dread, panic, and par
ralysis.
T
Terror work only if it convinces people th are vu
ks
t
s
hey
ulnerable a powerless. By b
and
being candid with
th America people, about the threat they face, a
he
an
e
and by giving Americ
cans ways to addres their
ss
v
vulnerabilities – such as provid
h
ding detaile guidance on wha suspicio
ed
at
ous activitie to repo and
es
ort
e
encouraging citizens to get eme
ergency pr
reparednes training – Washin
ss
ngton could make ter
d
rrorism
fa less terr
ar
rifying.” (S
Stephen Fly
ynn, Presid
dent of the Centre for National Policy in W
r
Washington DC),
n,
N
Newsweek Special Ed
dition, 2010
0.
t
worth noting in the sa
g
ame conte what ha been su
ext
as
uggested f the mo ticklish terrorfor
ost
It is also w
ri
idden coun Afghan
ntry
nistan: “The White H
House say it unders
ys
stands tha the solut
at
tion to the war in
A
Afghanistan is not pur
n
rely military Officials have declared a con
y.
ncomitant “
“civilian sur
rge” of exp
perts to
b
bolster the embattled country’s bureaucracy and eco
onomy alon with the greater n
ng
e
number of t
troops.
B if the U
But
U.S. is truly committ
ted to long term sec
g
curity and stability in Afghanist
n
tan, it should be
in
nvesting in the one pivotal sector tha has rec
n
e
at
ceived sca
ant attention from t
the international
c
community: education (Comm
:
n.”
mentary: Learning Cur
rve, Argon Baker, Tim Januar 25, 2010
me,
ry
0).
T
Thus, in or
rder to build up an in
ntelligent a
and secure organization for the future, it is not enough to
e
re
evitalize th internal security m
he
mechanism or even reforming the entire c
criminal jus
stice system in a
c
country. Eq
qually, if n more, important will be to help dev
not
o
velop the s
spirit of na
ational res
silience
th
hrough a c
carefully s
structured p
public-priva partne
ate
ership, edu
ucating the people at large and thus
e
le
eading to t
the creatio of what we would like to cal “good cit
on
ll
tizens.” Th concept of ‘good c
he
citizen’
h to take root in the manner e
has
e
envisaged in Article 5
51-A of the Constitutio of India spelling o the
on
a,
out
fu
undamenta duties of the people. All of us need to e
al
f
s
embrace an imbibe t
nd
that culture and the s
e
spirit in
to and tha is the ma
oto
at
antra for su
uccess and survival.
d

Inve In S
est Securi Tod Fo Stre Fre Tom
ity
day or
ess ee
morrow
w
M
Making of Security F
Force More Effective to Protec Industri Installa
e
e
ct
ial
ations
S
Security is a vital function of fos
stering an appropriat environm
te
ment conducive for d
developme and
ent
g
growth. In t wake o growing security co
the
of
oncern at national an internat
nd
tional levels, it has be
ecome
im
mperative for all the establish
e
hments inc
cluding industrial ent
tities to up
pgrade and moderniz the
d
ze
s
security sys
stems for e
effectively m
meeting the growing c
e
challenges
s.
S
Security is not any m
more regarded as pe
eripheral f
function en
ntailing add
ditional ex
xpenditure to the
o
organization but is co
n
onsidered a a critical and integral part of the organization for t preven
as
l
the
ntion of
lo that th organiz
oss
he
zation migh suffer in absence of effective security system. This is co
ht
n
e
y
ontrast
d
departure f
from traditi
ional appro
oach whic manage
ch
ement uses to have only few years back. Any
s
fo
orward looking mana
agement wi sincere concern fo the secu
ith
or
urity of plan and pers
nt
sonnel has either
s
c
changed their approach or is in the proces of chang
ss
ging it with the under
rstanding th security is no
hat
y
m
more side function b it is m
but
main line f
function with bearing on organization’s productivit and
g
ty
p
profitability.
.
7
W mana
Why
agement m
must invest in Secur
rity
It is the duty of mana
t
agement to protect t
o
the person
nnel and property of the installations by having
n
necessary security in
nfrastructur It is er
re.
rroneous im
mpression that secu
urity is resp
ponsibility of the
s
security off
ficers and not of the management. Sec
e
curity office is to ad
er
dvise the manageme on
ent
s
security ma
atters and implemen their dire
nt
ectives and instructions. Thus managem
ment will b well
be
a
advised to appreciate security related prop
e
posals in e
earnestnes and lay i
ss
importance to best security
e
p
practices. T
The secur
rity measures need to be con
nstantly up
pgraded an this mu be tak
nd
ust
ken as
in
nvestment and not ex
xpenditure for secur work env
e,
re
vironment today will be harbing of stres free
ger
ss
to
omorrow fu of prosp
ull
perity.
In
ndustrial S
Security no only incr
ot
reases the profitabili and pro
e
ity
oductivity o the orga
or
anization, it also
in
ncreases the trust and confi
idence of investors and the common people a large. M
at
Market
p
perceptions and credi
s
ibility is known to hav changed drastically soon aft major b
ve
d
ter
breach of security
o industria accidents Prudent managem
or
al
s.
t
ment, there
efore, lays emphasis on cost s
-effective y unyet
b
breach able security plans. Indu
e
ustry needs to be rea to not only hand disaster in any form but
ady
dle
r
s
should also needs to be capab of fores
o
o
ble
seeing them and kee such ev
ep
ventualities as part o their
s
of
p
planning. T
The rapid pace of progress a
allows less opportunity for le
earning by trial, making it
y
n
necessary t get desi and op
to
ign
perating pro
ocedure rig from th first time With this philosoph the
ght
he
e.
s
hy,
in
ndustries m
must also p
plan for the faster reco
e
overy, should at all a disaster o
occur.
P
Public conc
cern at mu
ultiple injuri and de
ies
eaths from spectacular events such as a major exp
plosion
in
nvariably leads to c
calls for ad
dditional c
control. It is therefor important particul
re
larly for projects
in
nvolving th storage and use o hazardou chemica to addr
he
of
us
als
ress both o
on-site and off-site security
d
w
when decid
ding on security mea
asures to b applied. Rapid gro
be
.
owth in ind
dustrial field has bro
ought a
s
significant i
increase in number of people both work
n
kers and m
members of general p
f
public who life
ose
c
could endan
nger at any point of time by acc
y
cident invol
lving hazar
rdous mate
erials and p
processes.
.
“
“Security P
Preparedn
ness is war-like exer
rcise and l
like war, it decides n who is right, bu who
t
not
s
ut,
is left!”
s

C
Click frau
ud
T
The latest scam to hit the he
eadlines is the mult
s
ti-million dollar Click
kfraud whic occurs when
ch
a
advertising network a
affiliates for paid vi
rce
iews or clic to ads on their o
cks
s
own websit via Spy
tes
yware,
th affiliate is then pa a comm
he
aid
mission on the cost-p
n
per-click th was art
hat
tificially ge
enerated. A
Affiliate
p
programs s
such as Go
oogle's Ads
sense cap
pability pay high commissions t
y
that drive t genera
the
ation of
b
bogus click With pa clicks c
ks.
aid
costing as much as $100 and an online advertisin industry worth
ng
y
m
more than $ Billion, this form of Internet fraud is on the increa
$10
,
n
ase.

In
nternatio
onal mod
dem diali
ing
M
Many consumers con
nnect to the Internet using a m
modem calling a local telephone number. Some
e
w sites, n
web
normally co
ontaining a
adult conte use inte
ent,
ernational dialing to t
trick consu
umers into paying
to view con
o
ntent on their web sit Often th
te.
hese sites purport to be free a adverti that no credit
o
and
ise
o
c
card is needed. They then prom the use to downl
mpt
er
load a "vie
ewer" or "dialer" to all
low them t view
to
th content Once the program is downlo
he
t.
e
m
oaded it di
isconnects the comp
puter from the Internet and
8
proceeds to dial an international long distance or premium rate number, charging anything up to
US$7-8 per minute. An international block is recommended to prevent this, but in the U.S. and
Canada, calls to the Caribbean (except Haiti) can be dialed with a "1" and a three-digit area code,
so such numbers, as well as "10-10 dial-round" phone company prefixes, can circumvent an
international block.

Phishing
"Phishing" is the act of attempting to fraudulently acquire sensitive information, such as passwords
and credit card details, by masquerading as a trustworthy person or business with a real need for
such information in a seemingly official electronic notification or message (most often an email, or
an instant message). It is a form of social engineering attack.
The term was coined in the mid-1990s by crackers attempting to steal AOL accounts. An attacker
would pose as an AOL staff member and send an instant message to a potential victim. The
message would ask the victim to reveal his or her password, for instance to "verify your account" or
to "confirm billing information". Once the victim gave over the password, the attacker could access
the victim's account and use it for criminal purposes, such as spamming. Phishing has been widely
used by fraudsters using spam messages masquerading as large banks (Citibank, Bank of
America) or PayPal. These fraudsters can copy the code and graphics from legitimate websites and
use them on their own sites to create legitimate-looking scam web pages.
They can also link to the graphics on the legitimate sites to use on their own scam site. These
pages are so well done that most people cannot tell that they have navigated to a scam site.
Fraudsters will also put the text of a link to a legitimate site in an e-mail but use the source code to
links to own fake site. This can be revealed by using the "view source" feature in the e-mail
application to look at the destination of the link or putting the cursor over the link and looking at the
code in the status bar of the browser. Although many people don't fall for it, the small percentage of
people that do fall for it, multiplied by the sheer numbers of spam messages sent, presents the
fraudster with a substantial incentive to keep doing it.

Pharming
Pharming is the exploitation of vulnerability in the DNS server software that allows a hacker to
acquire the domain name for a site, and to redirect that website's traffic to another web site. DNS
servers are the machines responsible for resolving internet names into their real addresses - the
"signposts" of the internet.
If the web site receiving the traffic is a fake web site, such as a copy of a bank's website, it can be
used to "phish" or steal a computer user's passwords, PIN or account number. Note that this is only
possible when the original site was not SSL protected, or when the user is ignoring warnings about
invalid server certificates.
For example, in January 2005, the domain name for a large New York ISP, Panix, was hijacked to a
site in Australia. In 2004 a German teenager hijacked the eBay.de domain name.
Secure e-mail provider Hushmail was also caught by this attack on 24th of April 2005 when the
attacker rang up the domain registrar and gained enough information to redirect users to a defaced
webpage.

9
Auction and retail schemes online
Fraudsters launch auctions on eBay or TradeMe with very low prices and no reservations especially
for high priced items like watches, computers or high value collectibles. They received payment but
never deliver, or deliver an item that is less valuable than the one offered, such as counterfeit,
refurbished or used. Some fraudsters also create complete ‘web stores’ that appear to be legitimate,
but they never deliver the goods. In some cases, some stores or auctioneers are legitimate but
eventually they stopped shipping after cashing the customers' payments.
Sometimes fraudsters will combine phishing to hijacking legitimate member accounts on eBay,
typically with very high numbers of positive feedback, and then set up a phony online store. They
received payment usually via check, money-order, cash or wire transfer but never deliver the goods;
then they leave the poor, unknowing eBay member to sort out the mess. In this case the fraudster
collects the money while ruining the reputation of the conned eBay member and leaving a large
number of people without the goods they thought they purchased.

Stock market manipulation schemes
These are also called investment schemes online. Criminals use these to try to manipulate
securities prices on the market, for their personal profit. According to enforcement officials of the
Securities and Exchange Commission, the 2 main methods used by these criminals are:

Avoiding Internet investment scams
The Internet allows individuals or companies to communicate with a large audience without
spending a lot of time, effort, or money. Anyone can reach tens of thousands of people by building
an Internet web site, posting a message on an online bulletin board, entering a discussion in a live
"chat" room, or sending mass e-mails. If you want to invest wisely and steer clear of frauds, you
must get the facts. The types of investment fraud seen online mirror the frauds perpetrated over the
phone or through the mail. Consider all offers with skepticism.

There are many "don't steal my bandwidth" pages on the web. They are often long winded and hard
for the novice or even the experienced web designer to understand. "Don't Even Think About It" is
short and to the point. You will know what stealing bandwidth is in the 3 short minutes it takes you to
read this page that is written without any sugar-coating at all.
What is Stealing Bandwidth?
There are many forms of bandwidth stealing on the web today. However, the bandwidth theft
focusing on here is image/graphic stealing, and is the bandwidth theft that occurs most. That is
when you find an image you like and you are:
1.
2.
3.

Too cheap to have server space of your own to use -and/orToo lazy to upload the image to your own server -and/orUneducated about the crime you are committing -or all of the above-Crime?

10
Yes, it is a crime. The person whose site the image is on that you are linking to for the source of the
image is paying to display their image on your site.
First of all, the image belongs to them, not you. What right do you have to say; "Oh, wouldn't this
look great on my site?" and just copy the image URL and use it on your site. You have no right at
all. It is not your graphic. Even if it is a very common graphic, for example a bullet or an arrow, and
you have seen it on many sites. The operative word here is "on." Get it? It is on a site.
That site owner is paying one way or another to have that graphic displayed on the web. Perhaps
they pay a monthly fee. Perhaps, they use a 'free' web service, however, they have limits on the
amount of bandwidth they are allowed to use. By linking to the graphic, YOU have STOLEN from
them one way or another. Secondly, if it is an original graphic that the site owner designed them
self, and you link to the source of the graphic to be displayed on your site, you are not only stealing
the bandwidth, you are now plagiarizing their work too.
It seems a big culprit these days are the "community" type websites (MSN Groups & Yahoo groups
are a fine examples). A person can easily set up a little web site lickety-split - and it's even faster
when you link to the source of the graphics you have seen on the web & like rather than uploading
them in YOUR space. Not to mention writing to the owner of the graphic and asking their permission
first. People do this because it is a fast and cheap way to put something up quickly. In doing this,
you are stealing!
One other area that is festering boil for bandwidth stealing are the Bulletin Boards that offer the
members an ability to have a cutesy little icon next to their name. People remember that cute little
picture of a dancing potato they saw on a web site and link to the image source for their member
icon. Now, the site owner who's dancing potato graphic you are linking to is looking through their
server logs and see 15,048 hits to this one little graphic. "What the heck," they say in disbelief! Or,
they get a notice from their 'free' web site host telling them that they have exceeded their allowable
bandwidth for the month and their site will be shut off OR they have to pay extra money to keep it
up.
Bottom line, if you want to use a graphic on your site, you must do these things: write to the site
owner of the graphic that you would like to use on your site. •>ASK<•, repeat ASK them if you can
use that graphic on your site. If they say yes, then thank them and be certain to thank them in the
credits of your site. If they say no, swear a bit under your breath but under no circumstances do you
link to the graphic thinking that "I'm not really using it on my site, since it is not on my server. Leave
it alone and go find something else instead.
Does this text make you angry or are you grinning ear to ear? If you are feeling angry, you are one
of those snatch and grab people who take what they want and say the heck with the rules. If you are
smiling ear to ear, you are a site owner who is glad to see the text you have just read. It is in plain
English and not sugar coated in any way. PhenomenalWomen.com understands this because so
many images on this site are linked to and bandwidth stolen daily.
A warning: many site owners can track down and pinpoint exactly where their images are being
used on other sites. When that happens, you will be in trouble. If you are new to the web, take the
advice of this page as your first lesson and don't forget it.

11
U
Upcom
ming E
Event

F more de
For
etails, pleas visit - ht
se
ttp://www.pc
cstconsultan
nt.com/2nd-global-energ
gy-security-conference
e/

Su
uggestions & feedba may b sent to u on e-m
s
ack
be
us
mail: sbtyag
gi1958@gmail.com
P
P.S. - If you don't lik to receiv our new
u
ke
ve
wsletter, w apologi for bot
we
ize
thering you. Please let us
k
know your mail addr
r
ress and w will mo it out f
we
ove
from our c
contact list thank yo
t,
ou!

12

Más contenido relacionado

Destacado

Aprender3c Vigilancia Tecnológica
Aprender3c Vigilancia TecnológicaAprender3c Vigilancia Tecnológica
Aprender3c Vigilancia TecnológicaAprender 3C
 
The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...
The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...
The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...Swiss Data Forum Swiss Data Forum
 
programa de riego
programa de riegoprograma de riego
programa de riegomashul
 
Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional Level - Il...
Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional  Level - Il...Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional  Level - Il...
Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional Level - Il...Civil Service Exam Info
 
NCFM vs-CFA
NCFM vs-CFANCFM vs-CFA
NCFM vs-CFAeduCBA
 
Layer structure for Normally off GaN HEMT
Layer structure for Normally off GaN HEMTLayer structure for Normally off GaN HEMT
Layer structure for Normally off GaN HEMTSarjon Murad
 
Irrigación, drenaje y linfático - Cara
Irrigación, drenaje y linfático -  CaraIrrigación, drenaje y linfático -  Cara
Irrigación, drenaje y linfático - CaraSol Alarcón
 
Quiste del conducto tirogloso expoooo
Quiste del conducto tirogloso expooooQuiste del conducto tirogloso expoooo
Quiste del conducto tirogloso expooooMICHAEL GUTARRA
 

Destacado (20)

Inmigrantes en Boston (Spanish Version)
Inmigrantes en Boston (Spanish Version)Inmigrantes en Boston (Spanish Version)
Inmigrantes en Boston (Spanish Version)
 
Socrates
SocratesSocrates
Socrates
 
Wealth
WealthWealth
Wealth
 
Aprender3c Vigilancia Tecnológica
Aprender3c Vigilancia TecnológicaAprender3c Vigilancia Tecnológica
Aprender3c Vigilancia Tecnológica
 
Hub barona
Hub baronaHub barona
Hub barona
 
Maratonistas do Saber
Maratonistas do SaberMaratonistas do Saber
Maratonistas do Saber
 
SEO. ME POSICIONO LUEGO EXISTO.
SEO. ME POSICIONO LUEGO EXISTO.SEO. ME POSICIONO LUEGO EXISTO.
SEO. ME POSICIONO LUEGO EXISTO.
 
Ppt dificultades del lenguaje (1)
Ppt dificultades del lenguaje (1)Ppt dificultades del lenguaje (1)
Ppt dificultades del lenguaje (1)
 
The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...
The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...
The Power of Mobile & Cloud: Building a Homesecurity-System with Microsoft Az...
 
programa de riego
programa de riegoprograma de riego
programa de riego
 
Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional Level - Il...
Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional  Level - Il...Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional  Level - Il...
Notice of School Assignment of Oct. 26, 2014 CSE-PPT Professional Level - Il...
 
NCFM vs-CFA
NCFM vs-CFANCFM vs-CFA
NCFM vs-CFA
 
6a. picture ratio
6a. picture ratio6a. picture ratio
6a. picture ratio
 
Objeciones
ObjecionesObjeciones
Objeciones
 
Layer structure for Normally off GaN HEMT
Layer structure for Normally off GaN HEMTLayer structure for Normally off GaN HEMT
Layer structure for Normally off GaN HEMT
 
BOLERO JÚRAME
BOLERO JÚRAMEBOLERO JÚRAME
BOLERO JÚRAME
 
El camino del Marketing Digital
El camino del Marketing DigitalEl camino del Marketing Digital
El camino del Marketing Digital
 
Irrigación, drenaje y linfático - Cara
Irrigación, drenaje y linfático -  CaraIrrigación, drenaje y linfático -  Cara
Irrigación, drenaje y linfático - Cara
 
Quiste del conducto tirogloso expoooo
Quiste del conducto tirogloso expooooQuiste del conducto tirogloso expoooo
Quiste del conducto tirogloso expoooo
 
Paint ppt
Paint pptPaint ppt
Paint ppt
 

Similar a News letter oct 13

Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyInternet Law Center
 
How (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docx
How (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docxHow (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docx
How (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docxadampcarr67227
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11captsbtyagi
 
Disaster Planning: Are You Prepared?
Disaster Planning: Are You Prepared?Disaster Planning: Are You Prepared?
Disaster Planning: Are You Prepared?Juval Aviv
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Govarii827
 
Website That Write Essays For You.pdf
Website That Write Essays For You.pdfWebsite That Write Essays For You.pdf
Website That Write Essays For You.pdfJacqueline Simpson
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
 
Safety tips during a terror attack
Safety tips during a terror attackSafety tips during a terror attack
Safety tips during a terror attackAdam Quirk
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorismAbdulAzeez938159
 

Similar a News letter oct 13 (15)

Paris Attacks
Paris AttacksParis Attacks
Paris Attacks
 
14 nov
14 nov14 nov
14 nov
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon ValleyRand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
Rand's Brian Michael Jenkins on Cyber Terrorism and Silicon Valley
 
How (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docx
How (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docxHow (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docx
How (Not) to Spot a Terrorist Source Foreign Policy, May-Ju.docx
 
Newsletter sept 11
Newsletter sept 11Newsletter sept 11
Newsletter sept 11
 
Disaster Planning: Are You Prepared?
Disaster Planning: Are You Prepared?Disaster Planning: Are You Prepared?
Disaster Planning: Are You Prepared?
 
Power Point Gov
Power Point GovPower Point Gov
Power Point Gov
 
Website That Write Essays For You.pdf
Website That Write Essays For You.pdfWebsite That Write Essays For You.pdf
Website That Write Essays For You.pdf
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
Safety tips during a terror attack
Safety tips during a terror attackSafety tips during a terror attack
Safety tips during a terror attack
 
VictoriaSisler1
VictoriaSisler1VictoriaSisler1
VictoriaSisler1
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorism
 

Más de Capt SB Tyagi, COAC'CC*,FISM,CSC,

Más de Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 
News letter jan 13
News letter jan 13News letter jan 13
News letter jan 13
 
Saw security awareness part v
Saw   security awareness part vSaw   security awareness part v
Saw security awareness part v
 
Security Awareness Part II - women security tips
Security Awareness Part II - women security tipsSecurity Awareness Part II - women security tips
Security Awareness Part II - women security tips
 

Último

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersChitralekhaTherkar
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 

Último (20)

A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Micromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of PowdersMicromeritics - Fundamental and Derived Properties of Powders
Micromeritics - Fundamental and Derived Properties of Powders
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 

News letter oct 13

  • 1. Interna ational Coun for Secu ncil urity & Safet Man ty nagem ment News sletter: O October 2013 r Let’s profes ssiona alize th prof he fession nals… http://www w.wix.com/sb btyagi/iciss 68 De And 175 in ead d njured From 1 Nati 14 ions: D Details of Ken nya Terro orist A Attack V Victims begins to em s merge… … All s security and safety frat d ternity in th world mu feel the pain and a he ust anguish felt by the members of IC CISS. The pictu ures above could have been from any count facing th menace of terrorism Be it 9/11 in USA o 26/11 in e m try he m! or India or even 2 a 22/9 at Ken nya, the fan natics have spread mindless mas ssacre in w which victims were inno s ocent and help pless unarm / unprep med pared citizens! Kenyan President Uhuru Keny n yatta - who has lost relatives in th attack he reite erated his g government determin t's nation to c continue fighting Al-Sh habaab. ‘W We... went into Somalia to help stab bilize the cou untry and m most importa antly to fight terror that had been u t unleashed o Kenya an the world he said. on nd d,’ ‘We shall not relent on th war on terror’, he said. In IC he CISS we ap ppreciate th sentimen and commitment he nts indic cated in the statement and hope s e same will reverberate a echo fro all the co and om orners of the world whe erever the terro orism has played havoc c! At le east 68 peo ople killed in attack at W n Westgate sh hopping Ce entre. Soma alian terroris group Al-S st Shabaab - w which has links to Al Qaed - claims responsibility for attac on Saturd s da ck day, 22nd Se ept.13. 'If th found m I'm white... so I'm hey me, dead Survivor reveal ho gunman executed non-Muslim - after as d': rs ow ms sking them to name P Prophet Moh hammed's ey moth her. Survivo said the saw fellow shoppe merciles ors ers ssly execute after be ed eing singled out as no d on-Muslim. Sho oppers said people were lined up a gunned down for fa e and ailing to recit passages from the K te s Koran. ls sible that a woman from Northern Ireland whose husban blew him m nd mself up in Kenyan Official said that it was poss mong the A the July 7, 200 terror at 05, ttacks on L London's tra ansport system was am Al-Shabaab militants b behind the sieg on the W ge Westgate M in Nairo Mall obi, Kenya. On Monda 24th Sep 13, the K ay, pt Kenyan For reign Minist Amina ter Moh hamed told PBS that tw or three U.S. nationals and one British woman were a wo e among the a attackers in the siege and hostage dr rama. Moha amed said th woman i he involved had, "done thi many tim before," adding wei is mes ight to the spec culation tha Samantha Lewthwaite, who se at ecurity offici ials believe did travel to East Af e frica, and s specifically Som malia, several years ago. She is w wanted in Ke enya for inv volvement in an alleged terror plot to n bom locations on Kenya's coast last year. Lew mb s t wthwaite was dubbed th White W s he Widow after her husb band blew h himself up o July 7, 20 in London. She con on 005 nverted to Is slam as a te eenager. 1
  • 2. S Shopping M Malls and o other soft targets sh hould increase securi measur and up ity res pdate emer rgency re esponse plans in the aftermath of the Ken nyan mall m massacre t that killed a least 72 people. at W While overa security at so-calle soft targ all ed gets like sp ports arena hotels, r as, restaurants movie th s, heatres a and housing complex has inc xes creased dr ramatically in recent years, Saturday 22n Sept.13 mass y nd 3 s shooting in Nairobi sh hould have an immed diate impac among th ct hose who s safeguard s such comm mercial a residen and ntial locatio ons. They see t attentio that this receives and that’s what terro the on s orists want said one security e t,” e expert. “T “T They want this kind o coverage that’s wh they cal it terrorism. They’re getting maximum ba for of e; hy ll e ang th heir buck f from a ma arketing sta andpoint. T That’s kind of a perve erse way t look at it, but ther to re’s no s stealth invo olved.” T The primar challeng to secure a sho ry ge opping ma is to m all maintain a sense of openness while s s simultaneou usly emplo oying a high level o security measures like surv of s veillance cameras, g guards, a adequate lighting. Ut tilizing the overall d e design of t the proper rty, particu ularly near primary a access p points, is also crucial to the “dyn namic discipline”. T Typically, in ncidents lik purse sn ke natchings a flash m and mobs are th type of c he crimes on t minds of mall the s security pe ersonnel, b at least three U.S malls h but t S. have been the scene of mass shootings since e s O October, most recently in April w when an 18-year-old man wounded two a a mall in Christian d at n nsburg, V The de Va. eadliest U.S. mall s shooting in history o n occurred in Dec. 5, 2007, wh n hen nine p people, in ncluding th gunman, died at the Wes he t stroads Ma in Oma all aha, Neb. There ha ave been similar in ncidents at Noida, Ind and oth parts of the world. t dia her f “W have quietly added differe measu We ent ures to ma ake what w was consid dered a soft target a little h harder,” one mall own said. “W recognized a long time ago that shopp e ner We g ping malls are soft ta argets.” B Besides ow wners, indiv viduals als bear som of the responsibility for their safety at soft targe like so me t ets m malls. Here the impo e ortance is stressed of identify ying a “saf haven,” or a pre fe ” eviously-ide entified lo ocation tha can prov at vide protec ction in the event of a emerge e an ency. “Iden ntifying thos places to and se 2
  • 3. fr rom work, or during your morning routin is a gr ne, reat idea,” one expe says, “B all too often, ert But p people don have a p n’t plan.” Rest taurants m make great safe have ens, he sai since th can no id, hey ormally a accommoda large c ate crowds, hav basic fir aid mate ve rst erials and a access to f food and w water. In what could be a fi n irst anywh here in the world, th Mumba police pl to grad malls a e he ai lan de across th city by their secu he urity-prepa aredness. A they rec As ceive large crowds, m malls have always b been considered pot tential terr ror targets Now, s. w with the att tack on th Westgate Centre Mall in he N Nairobi by m militants loyal to Som malia’s al Shabaab g group, the police wa to expedite their plans. ant r “T The attack is an u k… unfortunate example of how e m malls are s soft targets They ha s. ave multipl entry le a and exit po oints and a crowde through are ed hout the d day. This m makes secu uring them a mammo task. oth G Grading them will k keep their owners o their on to oes,” a senior polic officer told. The ce ere are ro oughly 24 mega-malls in Mum mbai. They will be g graded from A to F, with category ‘A’ denoting m th best. If the grade is low, t he f e the owner will be w warned. Co onsistent b breaches in security w result in revocatio of licen n will on nse. “This i the first time a is g government agency is doing su a rating If a mal is graded poorly, it may lose its patrons. The s uch g. ll d t o owner could also lose his license. So we e d e expect that the desire to meet se e ecurity requirements will be h high,” said a source in the Mumb police. n bai The police w use 25 paramet e will 5 ters for gr rading. The ese include security at entry and exit points, e CCT TV cover rage, evac cuation p plans, employee veri ification, th deploym he ment of a licensed security age ency, the ability of police de ecoys to b breach sec curity and the number of mo ock drills done. Sur rprise chec cks by the police h have throw up wn sho ocking resu ults. s 5 ecoys were sent to b breach This year, 145 police de sec curity in ma alls. Of the ese, 89 m managed to enter o the premises w explos with sives or we eapons. “T Though alm most all the malls in th city have metal det he e tectors and frisking m d mechanisms in place, our succes rate s ss n g curity has b been more than 75 pe cent. The figures a shockin We hav time er are ng. ve in breaching their sec a again w and written to the malls to upgrade their security but the have fai o ey iled to do s so,” said a police s source. http://w www.thehindu.com/new ws/national/o other-states/ /mumbai-ma alls-to-get-security-rating/article5164832.ece 3
  • 4. Embracing Globa Chan and Parad al nge d digm Shift – B Being a an In ntellige and Secur Orga ent d re anizatio for t Fut on the ture! D.C. Nath IPS (Ret h, td.), PPM, IPM About the Author: Mr. DC Nath is Chief Pa h atron of Inter rnational Cou uncil of Secu urity & Safety Manageme Superannuated in Ja y ent. anuary, 1995, as the Special Dire e ector, Intellig gence Bureau Mr. D.C. N u, Nath (IPS-19 960) has bee a visiting f en faculty to a n number of Institutes (like the In ndian Institute of Public Administrat c tion (IIPA), Sardar Valla abhbhai Pat National Police tel Academy (SVPNPA), L Bahadur Shastri Natio Lal onal Academ of Admini my istration (LBS SNAA) emies, includ ding Manage ement Trainin Institutes, covering d ng different aspe ects of and Acade security and industrial s d security mana agement. both the hon nors available in the polic service, n e ce namely, India Police Me an edal for Winner of b meritorious services an the Presid s nd dent’s Police Medal for d e distinguished services, a d and the Prime Mini ister’s Silver Cup Essay Competition at the Na r y ational Police Academy in two e successive years, Mr Nath had made a very signif r. d ficant and highly-appre eciated on cknow, on “Im mage Building for IPS Off g ficers” at the Vertical Interaction presentatio at IIM, Luc Program fo senior IPS officers. or r acclaimed bo ook, "Intellige ence Imperatives for India Mr. Nath e a", earned The author of a highly a high plaudits from all ar round for two of his very significant presentations on: “Revisiti the o ing Future of In ndia” (2005, London) and “Lessons fr d rom India for the War On Terrorism” (2007, r n USA). Know for his prof wn fessed trainin ability, he is affectiona ng e ately address as the “D sed Dronacharya” and is cons ” sidered a security ide eologue. gures in the A American Po olice Hall of F Fame, a Trus of the US National Ass st sociation of C Chiefs of Police. In His name fig December 2 2010, the Inte ernational W Who’s Who H Historical Soc ciety included his name in the 2010-2 d 2011 edition of the “Internationa Who’s Who of Profess al sionals”. All t this indeed s speaks volum about Mr. Nath’s stan me . nding in the f field of private secu urity all over the world. T Thus, in more than one sense, he i the only o is one in the field, combining the experiences of a police officer with specializatio in intelligence and st on trategic anal lysis and an industrial s security xcellence. expert par ex t sary to kno and ap ow ppreciate w what is the threat or challenge before us today – b both as It is necess h human bein per se and as se ngs ecurity prof fessionals i particula The con in ar. ncept of a c convention war nal b between tw countrie is now c wo es considered a passé. So has ob bserved Jo Horgan Director of the ohn n, r C Centre for Science W Writings at Stevens In nstitute of Technolog in a brilliant writegy, -up, “The End of T Age of War”, app The f pearing in the Newsw week Spec Edition – Issues 2010: “Wa seems to be a cial n ar c cultural phe enomenon, which cu ulture is no helping us eradica ow ate. Some scholars even cau e s utiously s speculate th the era of traditio hat a onal war – fought by two uniform med, state e-sponsored armies – might d b drawing to a clo be g ose.” “Wa could b on the verge of ceasing to exist a a subs ar be e f as stantial p phenomeno said Jo Muelle a politica scientist at Ohio St on,” ohn er, al t tate Univer rsity. T real thr The reat today comprises continued acts of vio d olence, sta ate-sponsor or othe red erwise in di ifferent p parts of the world, mo popular describe as acts of terrorism Transn e ore rly ed m. national ter rrorism is th real he th hreat today before a of us. N all Notwithstan nding the fact that s many a so advanced c countries spend fo ortunes in military sp pending, “T past ye saw inc The ear creasing th hreats to se ecurity, sta ability, and peace in nearly ev n very corner of the glo obe,” the S Stockholm Internation Peace Research Institute re nal ecently w warned. M Many nation and countries are now in fac faced wit the phen ns ct th nomenon w what can b best be d described a ‘globaliz as zation of violence’, b that gen be nuine libera ation move ements or m motivated g groups p practicing te errorism co overed by a very thin veil of poli itical preten nsions. 4
  • 5. Coming down to more specifics - even though unanimity of opinion is still lacking over the definition of terrorism, common refrain in all understanding or analyses of terrorism, veers round to what is described as jihad or jihadi terrorism. Jihad is a war or struggle against unbelievers and is waged by a number of groups owing allegiance to Islam. This was proved most emphatically in the 26/11 massacre at Mumbai (India). Reputed international commentators have described it as the seminal event in the history of international terrorism and particularly in the history of global jihad. “It would be a gross error to treat the terrorism facing India — including the terrible recent atrocities — as simply a problem for New Delhi alone. In a very real sense, the outage in Bombay was fundamentally a species of global terrorism not merely because the assailants happened to believe in an obscurantist brand of Islam but, more importantly, because killing Indians turned out to be simply interchangeable with killing citizens of some fifteen different nationalities for no apparent reason whatsoever.” - Mr. Ashley J Tellis, Senior Associate, Carnegie Endowment of International Peace. (Indian Express – January 29, 2009) There is thus an imperative need to appreciate the precise nature of the threat which marks the major paradigm shift in the history and growth of terrorism. One has to acknowledge this unambiguously. It is now global or universal jihad, which is a threat to all free world countries and it is a war that can be won only if we acknowledge that it is a war against humanity. Unless this is appreciated in the correct manner, the entire approach to handle terrorist threat could be faulted. Perhaps it is this lack of political will, to call a spade a spade is causing such enormous problem today in Pakistan which is at the receiving end from the Talibans. Much of the problem in India also could be attributed to the lack of admission of reality and feeble attempts at taking cover in the name of functioning in a democratic form of government. LeT is now the virtual substitute for AlQaeda with Yemen as the latest base station. The United States of America and UK have also been warned of 26/11-like acts of terror. The problem there has become more complex because such threats are no longer posed by non-state actors from outside but are also from home-gown terrorists, a fast emerging phenomenon. Female participation in jihad adds a further and new dimension. “A significant development in women participation in the global jihad has been the dissemination of radical ideologies on-line”, writes Mia Bloom in a draft of her forthcoming book, “Bombshell: Women and Terror” (Time, February 1, 2010). Another major paradigm shift is in the technique of perpetrating acts of terrorism. Apart from perfecting the art of suicidal Fedayeen attacks, there has been tremendous sophistication in the methodology being adopted by the terrorists. There has also been substantial qualitative improvement in the profile of the terrorists involved, as revealed in the analysis of the character and antecedents of those involved in 9/11 or the series of terror attacks in India, involving educated and technically equipped youth representing the Student Islamic Movement of India (SIMI). Talking about the 9/11 group, Steve Coll, a Pulitzer Prize Winner, has said in an interview, “those guys were not nuclear physicists but they were well-educated, smart, determined, careful and willing to learn.” He further added that while AL Qaeda had thus been able to put together really talented people, Lashkar’s style of talent is more worrying. Some of the proselytizing networks have been able to recruit and radicalize scientists, doctors and other such talented people from here and there, as seen in 26/11. They can wreak a lot of havoc. (Steve Coll, Pulitzer Prize Winner, The Indian Express, New Delhi, January 26, 2010). 5
  • 6. There has been a distinct trend in exploiting knowledge gathered from information technology, as seen in a spurt in the number of websites, which were earlier hosted for raising funds but now are being used for offering training and dissemination of ideology and other technical know-how. Steganography, that is, sending coded messages through pornographic pictures, was adopted in the December 13-attack on the Indian Parliament. Threat of cyber-attack has indeed pushed the United States to plan for independent Cyber Command. This is nothing but the real case of power of information technology, another paradigm shift! A new and vital paradigm shift in approach to tackle terrorism should, therefore, lie in spending more time and thought on preventing terrorism to grow or take roots and tackle it with a long term perspective and with societal participation. As it is said, security is business of all, for all and by all. That is why it is recommended that the corporate world should try to educate its employees in the matter of security concerns by way of encapsulating security doctrines in their corporate social responsibility (CSR) policy. Employees will then help build up the national resilience against all forms of security threats including terrorism. The paradigm shift in approach to tackling terrorism problem today really lies in the concept of public-private partnership. Countering terrorism is not just a job for the security and intelligence services. Yes, there is indeed an imperative need for improving infrastructure and intelligence gathering. The difference between victory and defeat has been rightly described as availability of good intelligence or the absence of it. Such good intelligence could really come up and be built through the module of perfect public-private partnership. Intelligence is the backbone of all political stability which can in other words be put as the by-product of good internal security mechanism. Modules of private-public partnership have been very successfully worked out in the UK through Project Argus and Project Griffin. Project Argus relates to “resilience planning”. “Responding to a growing concern amongst business for a need to be prepared in the face of terrorism and to bring vast public and private sector expertise together, London First has established a growing Business Security and Resilience Network since 9/11. The Network brings employers, police and government emergency planners together to share expertise and encourage co-ordination of business continuity activities across sectors. Members are also linked up to London-wide fast-time incident alerts as well just launching a quarterly political and fraud intelligence briefing service.” Project Griffin deals with how police can take advantage of the bulk of private security force available in the country. It is a community outreach program institutionalizing cooperation between the police and private security agencies under three basic formats, within the overall scheme of Counterterrorism measures known as Preventing Extremism Together (PET). These modules are being implemented in many other countries. It is, in this context, incumbent on the corporate world to undertake security audit and then undertake risk management study, not only to get the Return on Investment (RoM) but also to ensure what is popularly known as business continuity planning. Diligent business continuity planning leads to saving of expenditure. That will also lead to real convergence of both business interests and security interests. If a forward-looking business entity spends money on modernization of its management technology and on methods of improving production technology, why cannot it also think in the present-day security ambience of spending money on modernization of security technology, investment of some money on research relating to security management? 6
  • 7. In nvestment in security will never go waste. Unfortunately, man y r . nagement o often forgets that sec curity is a amongst its vital too to incr s ols rease operational or functiona efficienc and thu to incr r al cy us reasing p production under secu conditio ure ons. This paradigm s shift is also essentiall called fo o ly or. T Americ The cans have, therefore, been advi ised, “By tr reating terr rorism as a hazard to be manag by o ged a America all ans, terroris can als be starv sm so ved of its ability to g generate dread, panic, and par ralysis. T Terror work only if it convinces people th are vu ks t s hey ulnerable a powerless. By b and being candid with th America people, about the threat they face, a he an e and by giving Americ cans ways to addres their ss v vulnerabilities – such as provid h ding detaile guidance on wha suspicio ed at ous activitie to repo and es ort e encouraging citizens to get eme ergency pr reparednes training – Washin ss ngton could make ter d rrorism fa less terr ar rifying.” (S Stephen Fly ynn, Presid dent of the Centre for National Policy in W r Washington DC), n, N Newsweek Special Ed dition, 2010 0. t worth noting in the sa g ame conte what ha been su ext as uggested f the mo ticklish terrorfor ost It is also w ri idden coun Afghan ntry nistan: “The White H House say it unders ys stands tha the solut at tion to the war in A Afghanistan is not pur n rely military Officials have declared a con y. ncomitant “ “civilian sur rge” of exp perts to b bolster the embattled country’s bureaucracy and eco onomy alon with the greater n ng e number of t troops. B if the U But U.S. is truly committ ted to long term sec g curity and stability in Afghanist n tan, it should be in nvesting in the one pivotal sector tha has rec n e at ceived sca ant attention from t the international c community: education (Comm : n.” mentary: Learning Cur rve, Argon Baker, Tim Januar 25, 2010 me, ry 0). T Thus, in or rder to build up an in ntelligent a and secure organization for the future, it is not enough to e re evitalize th internal security m he mechanism or even reforming the entire c criminal jus stice system in a c country. Eq qually, if n more, important will be to help dev not o velop the s spirit of na ational res silience th hrough a c carefully s structured p public-priva partne ate ership, edu ucating the people at large and thus e le eading to t the creatio of what we would like to cal “good cit on ll tizens.” Th concept of ‘good c he citizen’ h to take root in the manner e has e envisaged in Article 5 51-A of the Constitutio of India spelling o the on a, out fu undamenta duties of the people. All of us need to e al f s embrace an imbibe t nd that culture and the s e spirit in to and tha is the ma oto at antra for su uccess and survival. d Inve In S est Securi Tod Fo Stre Fre Tom ity day or ess ee morrow w M Making of Security F Force More Effective to Protec Industri Installa e e ct ial ations S Security is a vital function of fos stering an appropriat environm te ment conducive for d developme and ent g growth. In t wake o growing security co the of oncern at national an internat nd tional levels, it has be ecome im mperative for all the establish e hments inc cluding industrial ent tities to up pgrade and moderniz the d ze s security sys stems for e effectively m meeting the growing c e challenges s. S Security is not any m more regarded as pe eripheral f function en ntailing add ditional ex xpenditure to the o organization but is co n onsidered a a critical and integral part of the organization for t preven as l the ntion of lo that th organiz oss he zation migh suffer in absence of effective security system. This is co ht n e y ontrast d departure f from traditi ional appro oach whic manage ch ement uses to have only few years back. Any s fo orward looking mana agement wi sincere concern fo the secu ith or urity of plan and pers nt sonnel has either s c changed their approach or is in the proces of chang ss ging it with the under rstanding th security is no hat y m more side function b it is m but main line f function with bearing on organization’s productivit and g ty p profitability. . 7
  • 8. W mana Why agement m must invest in Secur rity It is the duty of mana t agement to protect t o the person nnel and property of the installations by having n necessary security in nfrastructur It is er re. rroneous im mpression that secu urity is resp ponsibility of the s security off ficers and not of the management. Sec e curity office is to ad er dvise the manageme on ent s security ma atters and implemen their dire nt ectives and instructions. Thus managem ment will b well be a advised to appreciate security related prop e posals in e earnestnes and lay i ss importance to best security e p practices. T The secur rity measures need to be con nstantly up pgraded an this mu be tak nd ust ken as in nvestment and not ex xpenditure for secur work env e, re vironment today will be harbing of stres free ger ss to omorrow fu of prosp ull perity. In ndustrial S Security no only incr ot reases the profitabili and pro e ity oductivity o the orga or anization, it also in ncreases the trust and confi idence of investors and the common people a large. M at Market p perceptions and credi s ibility is known to hav changed drastically soon aft major b ve d ter breach of security o industria accidents Prudent managem or al s. t ment, there efore, lays emphasis on cost s -effective y unyet b breach able security plans. Indu e ustry needs to be rea to not only hand disaster in any form but ady dle r s should also needs to be capab of fores o o ble seeing them and kee such ev ep ventualities as part o their s of p planning. T The rapid pace of progress a allows less opportunity for le earning by trial, making it y n necessary t get desi and op to ign perating pro ocedure rig from th first time With this philosoph the ght he e. s hy, in ndustries m must also p plan for the faster reco e overy, should at all a disaster o occur. P Public conc cern at mu ultiple injuri and de ies eaths from spectacular events such as a major exp plosion in nvariably leads to c calls for ad dditional c control. It is therefor important particul re larly for projects in nvolving th storage and use o hazardou chemica to addr he of us als ress both o on-site and off-site security d w when decid ding on security mea asures to b applied. Rapid gro be . owth in ind dustrial field has bro ought a s significant i increase in number of people both work n kers and m members of general p f public who life ose c could endan nger at any point of time by acc y cident invol lving hazar rdous mate erials and p processes. . “ “Security P Preparedn ness is war-like exer rcise and l like war, it decides n who is right, bu who t not s ut, is left!” s C Click frau ud T The latest scam to hit the he eadlines is the mult s ti-million dollar Click kfraud whic occurs when ch a advertising network a affiliates for paid vi rce iews or clic to ads on their o cks s own websit via Spy tes yware, th affiliate is then pa a comm he aid mission on the cost-p n per-click th was art hat tificially ge enerated. A Affiliate p programs s such as Go oogle's Ads sense cap pability pay high commissions t y that drive t genera the ation of b bogus click With pa clicks c ks. aid costing as much as $100 and an online advertisin industry worth ng y m more than $ Billion, this form of Internet fraud is on the increa $10 , n ase. In nternatio onal mod dem diali ing M Many consumers con nnect to the Internet using a m modem calling a local telephone number. Some e w sites, n web normally co ontaining a adult conte use inte ent, ernational dialing to t trick consu umers into paying to view con o ntent on their web sit Often th te. hese sites purport to be free a adverti that no credit o and ise o c card is needed. They then prom the use to downl mpt er load a "vie ewer" or "dialer" to all low them t view to th content Once the program is downlo he t. e m oaded it di isconnects the comp puter from the Internet and 8
  • 9. proceeds to dial an international long distance or premium rate number, charging anything up to US$7-8 per minute. An international block is recommended to prevent this, but in the U.S. and Canada, calls to the Caribbean (except Haiti) can be dialed with a "1" and a three-digit area code, so such numbers, as well as "10-10 dial-round" phone company prefixes, can circumvent an international block. Phishing "Phishing" is the act of attempting to fraudulently acquire sensitive information, such as passwords and credit card details, by masquerading as a trustworthy person or business with a real need for such information in a seemingly official electronic notification or message (most often an email, or an instant message). It is a form of social engineering attack. The term was coined in the mid-1990s by crackers attempting to steal AOL accounts. An attacker would pose as an AOL staff member and send an instant message to a potential victim. The message would ask the victim to reveal his or her password, for instance to "verify your account" or to "confirm billing information". Once the victim gave over the password, the attacker could access the victim's account and use it for criminal purposes, such as spamming. Phishing has been widely used by fraudsters using spam messages masquerading as large banks (Citibank, Bank of America) or PayPal. These fraudsters can copy the code and graphics from legitimate websites and use them on their own sites to create legitimate-looking scam web pages. They can also link to the graphics on the legitimate sites to use on their own scam site. These pages are so well done that most people cannot tell that they have navigated to a scam site. Fraudsters will also put the text of a link to a legitimate site in an e-mail but use the source code to links to own fake site. This can be revealed by using the "view source" feature in the e-mail application to look at the destination of the link or putting the cursor over the link and looking at the code in the status bar of the browser. Although many people don't fall for it, the small percentage of people that do fall for it, multiplied by the sheer numbers of spam messages sent, presents the fraudster with a substantial incentive to keep doing it. Pharming Pharming is the exploitation of vulnerability in the DNS server software that allows a hacker to acquire the domain name for a site, and to redirect that website's traffic to another web site. DNS servers are the machines responsible for resolving internet names into their real addresses - the "signposts" of the internet. If the web site receiving the traffic is a fake web site, such as a copy of a bank's website, it can be used to "phish" or steal a computer user's passwords, PIN or account number. Note that this is only possible when the original site was not SSL protected, or when the user is ignoring warnings about invalid server certificates. For example, in January 2005, the domain name for a large New York ISP, Panix, was hijacked to a site in Australia. In 2004 a German teenager hijacked the eBay.de domain name. Secure e-mail provider Hushmail was also caught by this attack on 24th of April 2005 when the attacker rang up the domain registrar and gained enough information to redirect users to a defaced webpage. 9
  • 10. Auction and retail schemes online Fraudsters launch auctions on eBay or TradeMe with very low prices and no reservations especially for high priced items like watches, computers or high value collectibles. They received payment but never deliver, or deliver an item that is less valuable than the one offered, such as counterfeit, refurbished or used. Some fraudsters also create complete ‘web stores’ that appear to be legitimate, but they never deliver the goods. In some cases, some stores or auctioneers are legitimate but eventually they stopped shipping after cashing the customers' payments. Sometimes fraudsters will combine phishing to hijacking legitimate member accounts on eBay, typically with very high numbers of positive feedback, and then set up a phony online store. They received payment usually via check, money-order, cash or wire transfer but never deliver the goods; then they leave the poor, unknowing eBay member to sort out the mess. In this case the fraudster collects the money while ruining the reputation of the conned eBay member and leaving a large number of people without the goods they thought they purchased. Stock market manipulation schemes These are also called investment schemes online. Criminals use these to try to manipulate securities prices on the market, for their personal profit. According to enforcement officials of the Securities and Exchange Commission, the 2 main methods used by these criminals are: Avoiding Internet investment scams The Internet allows individuals or companies to communicate with a large audience without spending a lot of time, effort, or money. Anyone can reach tens of thousands of people by building an Internet web site, posting a message on an online bulletin board, entering a discussion in a live "chat" room, or sending mass e-mails. If you want to invest wisely and steer clear of frauds, you must get the facts. The types of investment fraud seen online mirror the frauds perpetrated over the phone or through the mail. Consider all offers with skepticism. There are many "don't steal my bandwidth" pages on the web. They are often long winded and hard for the novice or even the experienced web designer to understand. "Don't Even Think About It" is short and to the point. You will know what stealing bandwidth is in the 3 short minutes it takes you to read this page that is written without any sugar-coating at all. What is Stealing Bandwidth? There are many forms of bandwidth stealing on the web today. However, the bandwidth theft focusing on here is image/graphic stealing, and is the bandwidth theft that occurs most. That is when you find an image you like and you are: 1. 2. 3. Too cheap to have server space of your own to use -and/orToo lazy to upload the image to your own server -and/orUneducated about the crime you are committing -or all of the above-Crime? 10
  • 11. Yes, it is a crime. The person whose site the image is on that you are linking to for the source of the image is paying to display their image on your site. First of all, the image belongs to them, not you. What right do you have to say; "Oh, wouldn't this look great on my site?" and just copy the image URL and use it on your site. You have no right at all. It is not your graphic. Even if it is a very common graphic, for example a bullet or an arrow, and you have seen it on many sites. The operative word here is "on." Get it? It is on a site. That site owner is paying one way or another to have that graphic displayed on the web. Perhaps they pay a monthly fee. Perhaps, they use a 'free' web service, however, they have limits on the amount of bandwidth they are allowed to use. By linking to the graphic, YOU have STOLEN from them one way or another. Secondly, if it is an original graphic that the site owner designed them self, and you link to the source of the graphic to be displayed on your site, you are not only stealing the bandwidth, you are now plagiarizing their work too. It seems a big culprit these days are the "community" type websites (MSN Groups & Yahoo groups are a fine examples). A person can easily set up a little web site lickety-split - and it's even faster when you link to the source of the graphics you have seen on the web & like rather than uploading them in YOUR space. Not to mention writing to the owner of the graphic and asking their permission first. People do this because it is a fast and cheap way to put something up quickly. In doing this, you are stealing! One other area that is festering boil for bandwidth stealing are the Bulletin Boards that offer the members an ability to have a cutesy little icon next to their name. People remember that cute little picture of a dancing potato they saw on a web site and link to the image source for their member icon. Now, the site owner who's dancing potato graphic you are linking to is looking through their server logs and see 15,048 hits to this one little graphic. "What the heck," they say in disbelief! Or, they get a notice from their 'free' web site host telling them that they have exceeded their allowable bandwidth for the month and their site will be shut off OR they have to pay extra money to keep it up. Bottom line, if you want to use a graphic on your site, you must do these things: write to the site owner of the graphic that you would like to use on your site. •>ASK<•, repeat ASK them if you can use that graphic on your site. If they say yes, then thank them and be certain to thank them in the credits of your site. If they say no, swear a bit under your breath but under no circumstances do you link to the graphic thinking that "I'm not really using it on my site, since it is not on my server. Leave it alone and go find something else instead. Does this text make you angry or are you grinning ear to ear? If you are feeling angry, you are one of those snatch and grab people who take what they want and say the heck with the rules. If you are smiling ear to ear, you are a site owner who is glad to see the text you have just read. It is in plain English and not sugar coated in any way. PhenomenalWomen.com understands this because so many images on this site are linked to and bandwidth stolen daily. A warning: many site owners can track down and pinpoint exactly where their images are being used on other sites. When that happens, you will be in trouble. If you are new to the web, take the advice of this page as your first lesson and don't forget it. 11
  • 12. U Upcom ming E Event F more de For etails, pleas visit - ht se ttp://www.pc cstconsultan nt.com/2nd-global-energ gy-security-conference e/ Su uggestions & feedba may b sent to u on e-m s ack be us mail: sbtyag gi1958@gmail.com P P.S. - If you don't lik to receiv our new u ke ve wsletter, w apologi for bot we ize thering you. Please let us k know your mail addr r ress and w will mo it out f we ove from our c contact list thank yo t, ou! 12