SlideShare a Scribd company logo
1 of 11
Download to read offline
Newsletter: September 2011
                  Let s professionalize the professionals
                               http://www.wix.com/sbtyagi/iciss




   Blast at Delhi High Court




If readers recall, last editions of ICISS Newsletters had the front page with
collage of photos with bleeding bodies and mangled parts of victims of mindless
mayhem of terrorists in Mumbai and Norway. There were screaming headlines
from newspapers condemning the brutal attacks.

New Delhi has been chosen targets of terrorists in India followed by Mumbai.
With unfailing frequency these cities have been targeted alternatively that such



Capt. S B Tyagi                                                             1
incidents can be predicted by even a child! Their being the cities identified with
what is good about India, securing them becomes all the more important!

                  Common citizens all over the country and especially in Mumbai
                  and Delhi have shown great certitude and resolve and willingly
                  came forward to help the affected and wounded persons. There
                  were long queue of persons willing to donate blood. There were
                  ladies out in the streets extending all possible help. Hospitals
                  also responded responsibly and professionally and after initial
                  chaos, patients were attended properly.

And how is the intelligence collected and disseminated? Ill provided and ill-
motivated, not to forget ill-trained intelligence personnel of central and state
agencies gleam through the local and national newspapers, watch all news
channel and sometimes have luxury of surfing internet thus concoct their
reports which are laced with juicy tit-bits collected from local pan-walla. Their
informers also do likewise and a report is prepared which goes like

        It has been reportedly learnt through unidentified sources that few of the
       fundamentalists from across the country are allegedly examining the
       possibilities of targeting public places and areas of national importance
       with the likely aim of planning violent attacks with possible use of
       improvised explosive devices.

Now, can anyone make out anything out of such reports? Can a security
professional find anything in this report to work upon? Is it actionable report?
Yet such are the reports which fly thick-n-fast between home departments of
Centre and states and such are the reports which our worthy ministers claim to
have shared with either the Centre or States!

While terrorists attack with carefree frequencies and callous regards to the
police and security establishments, the Nation waits with baited breath and
wonders which city would be struck by the terrorists next!

Without making a political statement, can we say that this is the time that
Government took some tough action! Instead of issuing tough statements after
terrorist acts, can the Government work silently with eloquent results!




                                                              Capt S B Tyagi
                                                                   For ICISS

Capt. S B Tyagi                                                               2
The cyber-crime is any crime that is committed by means of special knowledge or
expert use of computer technology and can be at best kept under three categories
of cyber-crimes against person, cyber-crimes against property and cyber terrorism.

Internet-related crimes are on the rise and can pose serious threats if remain un-
checked for long. Intelligent Hydra viruses which replicate and steal sensitive
information sending e-mails using another s identity and the source code theft are
just some of the challenges authorities have come up against. In the case of an
attempted cyber murder, an unidentified individual hacked into a hospital s computer
system and altered the prescription for a patient the intended victim to include
dangerous drugs. Hospital authorities detected the alteration and prevented any
untoward incident.

The overall Information Warfare is the most dreaded form of terrorism facing the
civilized society a true model of globalization of terrorism which would respect no
national boundaries or international borders either in space or on the ground. The
defense, police, banking, trade, transportation, scientific work and a large
percentage of government s as well as private sector s transactions are now on-line.
That exposes enormous vital areas of national life to mischief or sabotage by any
competent computer hacker. Hence there is the speculation and threat about info-
terrorism , cyber warfare.




Cyber bullying refers to the new, and growing, practice of using technology to
harass, or bully, someone else. Bullies used to be restricted to methods such as
physical intimidation, postal mail, or the telephone. Now, developments in electronic
media offer forums such as email, instant messaging, web pages, and digital photos
to add to the arsenal. Computers, cell phones, and PDAs are new tools that can be
applied to an old practice.

Forms of cyber bullying can range in severity from cruel or embarrassing rumors to
threats, harassment, or stalking. It can affect any age group; however, teenagers
and young adults are common victims, and cyber bullying is a growing problem in
schools.

Why has cyber bullying become such a problem?

The relative anonymity of the internet is appealing for bullies because it enhances
the intimidation and makes tracing the activity more difficult. Some bullies also find it
easier to be more vicious because there is no personal contact. Unfortunately, the
internet and email can also increase the visibility of the activity. Information or
pictures posted online or forwarded in mass emails can reach a larger audience
faster than more traditional methods, causing more damage to the victims. And
because of the amount of personal information available online, bullies may be able
to arbitrarily choose their victims.

Cyber bullying may also indicate a tendency toward more serious behavior. While
bullying has always been an unfortunate reality, most bullies grow out of it. Cyber

Capt. S B Tyagi                                                                       3
bullying has not existed long enough to have solid research, but there is evidence
that it may be an early warning for more violent behavior.

How can you protect yourself?

Be careful where you post personal information

By limiting the number of people who have access to your contact information or
details about your interests, habits, or employment, you reduce your exposure to
bullies that you do not know. This may limit your risk of becoming a victim and may
make it easier to identify the bully if you are victimized.

Avoid escalating the situation

Responding with hostility is likely to provoke a bully and escalate the situation.
Depending on the circumstances, consider ignoring the issue. Often, bullies thrive on
the reaction of their victims. Other options include subtle actions. For example, if you
are receiving unwanted email messages, consider changing your email address. If
the bully does not have access to the new address, the problem may stop. If you
continue to get messages at your new account, you may have a stronger case for
legal action.

Document the activity

Keep a record of any online activity (emails, web pages, instant messages, etc.),
including relevant dates and times. In addition to archiving an electronic version,
consider printing a copy.

Report cyber bullying to the appropriate authorities

If you are being harassed or threatened, report the activity to the local authorities.
Law enforcement agencies have different policies, but your local police department
or FBI branch are good starting points. Unfortunately, there is a distinction between
free speech and punishable offenses, but the legal implications should be decided by
the law enforcement officials and the prosecutors. Depending on the activity, it may
also be appropriate to report it to school officials who may have separate policies for
dealing with activity that involves students.




Riches and honors are what men desire. If they cannot be obtained in the
proper way, they should not be held!
Poverty and meanness are what men dislike. If they cannot be avoided in
the proper way, they should not be avoided!!                      Confucius
Capt. S B Tyagi                                                                      4
By: Col R K Mishra, COAC CC*

Several cases across the country have happened involving
accidental firing of single barrel / double barrel guns resulting in
unfortunate injuries or death to the owner of the gun / passersby.

Most of the times, there would be no eye witnesses to the incident
and as such it is difficult to surmise the exact cause of firing. On
examination of the gun, in majority of the cases, it
is found that the firing pin mechanism had become              About the author
defective. Probable causes may be such that the
                                                      An avid reader and equally prolific
guard would have banged the gun to the ground writer, Col Ram Kishore Mishra is
which would have activated the firing mechanism Management                  Professional
resulting in the accidental firing.                   possessing outstanding leadership
                                                           qualities with 27 years of well-honed
To avoid accidents of this nature following                expertise and cross functional
                                                           experience.
precautions may be taken wherever gunmen are
deployed. A proper gun rack should be provided for         Hand-picked by Army Headquarters
safe keeping of the gun.                                   to Command an Assam Rifles
                                                           Battalion and launch them into high
The gun must be checked by the guard for the               intensity counter insurgency combat
                                                           zone (OP HIFAZAT).
following every time before duty mounting.
                                                           He    also    ensured      complete
o Check butt plate. Most of the guns have rubber           domination of area of responsibility
  butt plates. The rubber should be elastic and            over rugged mountains of North
  the plate firmly fixed to the butt. The rubber butt      J&K along line of control under (OP
                                                           RAKSHAK).
  plate absorbs shock on being hit on any hard
  object i.e., ground. Ensure that the butt is not         He is recipient of Chief of the Army
  loose.                                                   Staff s Commendation for gallantry
                                                           beside Commendation of General
o Check the cocking lever for play and mal-                Officer Commanding in Chief,
                                                           Southern Command for devotion
  functioning.                                             to duty and distinguished service

o Check play between the barrel and the butt.              He    can   be    contacted        at
                                                           rkmishra58@gmail.com
o Check barrel for cleanliness.

o Check foresight.

o Check the firing mechanism as follows:

           ·      Break the gun and insert a thick paper in between the butt plate and
                  the barrel. Lock the gun and then bang it on the ground. Remove the
                  paper and check for perforation. If perforated, the gun is defective and
                  should not be used.
           ·      Insert the paper as explained above, disengage the safety catch or
                  cock the cocking lever as the case may be, press the trigger and
                  examine the paper for perforation. If the firing pin has perforated the
                  paper, the gun is in good working condition.

Capt. S B Tyagi                                                                              5
Whenever the guard is completing his duty, he should ensure that the gun is
unloaded. The weapon must be handled by the holder only. The holder of the gun or
the security guard should ensure that the gun is unloaded before the gun is put in the
gun rack. It must be also be ensured that the guns are inspected and overhauled
annually and any defects noticed are rectified. The cartridges manufactured by
authorized manufacturers only should be used. Generally the cartridges that have
become more than 02 years old are not considered serviceable. Such cartridges
may be used for testing of gun / training purposes.

All such gunmen wherever deployed may be instructed to be cautious and vigilant in
handling of the guns at all times.




         Shhh ...You know they're listening
Are you paranoid? Have good reason? The Mini Bug Detector offers
protection against wireless microphones and transmitters. This device is
perfect for securing homes, offices and hotel rooms. It has a LED signal
strength display and audio tone that help pinpoint the precise location of
                   bugs. The audio alarm can be turned off for discreet
                   sweeps, while the sensitivity adjustment eliminates
                   false alarms. The Mini Bug Detector features wide
                   range circuitry that enables it to detect concealed
                   transmitters operating on frequencies from 50 MHz to
                   3 GHz.

   ·   Weight: 10.5 oz.
   ·   Dimensions: 5 1/2" x 3" x 7/8"
   ·   Requires one 9-Volt battery (not included)
                                            http://www.thinkgeek.com/gadgets/security/5a42/



Capt. S B Tyagi                                                                         6
Following is the reproduction of the e-mail received (with some editing) by one of the
IISSM Chapter members, and appears to be benevolent in nature! However, on
further investigation it was found that it was an attempt to gather important personal /
financial information. The given link with lots of difficulty got connected after repeated
attempts over three months time, but for a short while without getting any useful
information, indicating that these were non-functional URLs. The yellow button
asking to click here to activate your account was sending the information to third
party!

Readers are advised not to respond to such mails unless they verify the background
of the sender of the mails.




Information Regarding Your account:                 Protect Your Account Info
Dear PayPal Member!
                                              Make sure you never provide your
Attention! Your PayPal account has            password to fraudulent websites.
been violated! Someone with IP
address 86.34.211.83 tried to access          To safely and securely access the
your personal account! Please click           PayPal website or your account, open
the link below and enter your account         a new web browser (e.g. Internet
information to confirm that you are not       Explorer or Netscape) and type in the
currently away. You have 3 days to            PayPal login page (http://paypal.com/)
confirm account information or your           to be sure you are on the real PayPal
account will be locked.                       site. PayPal will never ask you to enter
                                              your    password      in    an    email.
 Click here to activate your account
                                              For more information on protecting
You can also confirm your email address       yourself from fraud, please review our
by logging into your PayPal account at        Security Tips at
http://www.paypal.com/ Click on the
"Confirm email" link in the Activate          https://www.paypal.com/us/securitytips
Account box and then enter this
confirmation number: 1099-81971-4441-                 Protect Your Password
9833-3990

Thank      you    for    using    PayPal!     You should never give your PayPal
- The PayPal Team                             password to anyone.




Capt. S B Tyagi                                                                          7
Notice something in the photograph!
See the helmet, it is there but not where it could have saved the life!




    Surely there are still few people who will question the utility of a helmet!

Suggestions:

   ·   Please reconsider your decision not to wear helmet.

   ·   Young ladies, please decide to use helmet while you comfortably sit at the
       back seat. On the Women's day, please take some positive decisions and

Capt. S B Tyagi                                                                    8
convince your brothers, husband, friends, father, etc. to use helmet. I am sure
       you do not bother about your hair-style and use helmet yourself.

   ·   Car drivers, use seat belt, avoid mobile phones while driving.

   ·   Follow all traffic rules, even if someone is not watching you. And do not
       celebrate when you dodge a traffic man, ultimately we will suffer.

   ·   Please do not try to save some petrol by driving on wrong side to avoid taking
       a U-Turn some distance away.


                  Burundanga Drug Warning
                  Share if you care       with your friends ..
Share with everybody you know, particularly your wife, sisters, daughters,
nieces, mother, female friends and colleagues. In fact even guys should
also be careful...

At a petrol pump, a man came over and offered his services as a painter to a lady
filling petrol in her car and left his visiting card. She said nothing but accepted his
card out of sheer kindness and got into the car. The man then got into a car driven
by another person.

As the lady left the service station, she saw the men following her out of the station
at the same time. Almost immediately, she started to feel dizzy and could not catch
her breath. She tried to open the window and realized that the odor was on her
hand; the same hand with which she had received the card from the person at the
service station.

She then noticed the men were immediately behind her and she felt she needed to
do something at that moment. She drove into the first driveway and began to honk
her horn repeatedly to ask for help. The men drove away but the lady still felt pretty
bad for several minutes after she could finally catch her breath.

Apparently, there was a substance on the card that could have seriously injured
her.

This drug is called 'BURUNDANGA' aka scopolamine - Not known to people so far
but sufficient Information Is available in the Net) and it is used by people who wish
to incapacitate a victim in order to steal from or take advantage of them. This drug
is four times more dangerous than the date rape drug and is transferable on a
simple card or paper.

Take heed and make sure you don't accept cards when you are alone or from
someone on the streets. This applies to those making house calls and slipping you
a card when they offer their services.

Capt. S B Tyagi                                                                    9
http://www.lonelyplanet.com/thorntree/thread.jspa?threadID=1889527




Threats aimed at people and properties are on the rise in all
parts of the world. Companies and private individuals are
increasingly looking for protection that is more effective and
more dynamic than that provided by traditional security
measures.

There are many security companies which provide customized training of a VIP dog to suit
the customer s needs. The customer can lease a VIP dog over a period up to 5 years. These
security agencies maintain the various protection capabilities of the VIP dog over the course
of the lease. Examples of protection capabilities of a VIP dog are as given below -

The VIP dog must without command:

 prevent an armed attack.

 prevent an unarmed attack.

 keep several attackers at a distance from its owner.

 reject food from an unauthorized person.

 identify unauthorized access by barking.

 remain calm if weapons are used.

The VIP dog must on command:

 demonstrate unconditional and immediate obedience regardless of circumstances.

 track and find a person irrespective of terrain and other environmental factors.

 apprehend a fleeing person.

 guard an apprehended person.

 guide an apprehended person.

 search for and indicate the presence of explosives.

 search for and indicate the presence of drugs.




Capt. S B Tyagi                                                                          10
Suggestions & feedback may be sent to us on e-mail:
                              captsbtyagi@yahoo.co.in




Capt. S B Tyagi                                                         11

More Related Content

Viewers also liked

Kukruse ja Mäetaguse mõisad ning Kauksi
Kukruse ja Mäetaguse mõisad ning KauksiKukruse ja Mäetaguse mõisad ning Kauksi
Kukruse ja Mäetaguse mõisad ning KauksiJana Pavlenkova
 
Optimization for Human Beings
Optimization for Human BeingsOptimization for Human Beings
Optimization for Human BeingsMartin Linkov
 
Professional development day elearning
Professional development day elearningProfessional development day elearning
Professional development day elearningMichael Shepard
 
ISM Papaya Partnership
ISM Papaya PartnershipISM Papaya Partnership
ISM Papaya PartnershipMike Oomens
 
2010 macro trend highlights
2010 macro trend highlights2010 macro trend highlights
2010 macro trend highlightsSphere Trending
 

Viewers also liked (7)

Kukruse ja Mäetaguse mõisad ning Kauksi
Kukruse ja Mäetaguse mõisad ning KauksiKukruse ja Mäetaguse mõisad ning Kauksi
Kukruse ja Mäetaguse mõisad ning Kauksi
 
Optimization for Human Beings
Optimization for Human BeingsOptimization for Human Beings
Optimization for Human Beings
 
Professional development day elearning
Professional development day elearningProfessional development day elearning
Professional development day elearning
 
Being a Great Leader/CEO
Being a Great Leader/CEOBeing a Great Leader/CEO
Being a Great Leader/CEO
 
ISM Papaya Partnership
ISM Papaya PartnershipISM Papaya Partnership
ISM Papaya Partnership
 
2010 macro trend highlights
2010 macro trend highlights2010 macro trend highlights
2010 macro trend highlights
 
Raport swimathon 2012
Raport swimathon 2012Raport swimathon 2012
Raport swimathon 2012
 

Similar to Newsletter sept 11

Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismREVULN
 
Research Paper Method Research Paper, Writing A
Research Paper Method Research Paper, Writing AResearch Paper Method Research Paper, Writing A
Research Paper Method Research Paper, Writing AElaine Ake
 
How To Write A Letter In Business Letter Format T
How To Write A Letter In Business Letter Format  THow To Write A Letter In Business Letter Format  T
How To Write A Letter In Business Letter Format TLeslie Sanchez
 
Essay Dead Poets Society Carpe Diem
Essay Dead Poets Society Carpe DiemEssay Dead Poets Society Carpe Diem
Essay Dead Poets Society Carpe DiemDana French
 
250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docxwrite12
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxphilipnelson29183
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...ElmeBaje
 
Cpj journalists safety guide 2012
Cpj journalists safety guide 2012 Cpj journalists safety guide 2012
Cpj journalists safety guide 2012 Tawanda Kanhema
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technologyijtsrd
 

Similar to Newsletter sept 11 (12)

Traditional Terrorists
Traditional TerroristsTraditional Terrorists
Traditional Terrorists
 
Hks Essay Sample
Hks Essay SampleHks Essay Sample
Hks Essay Sample
 
Isao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalismIsao MATSUNAMI - Digital security in japanese journalism
Isao MATSUNAMI - Digital security in japanese journalism
 
Research Paper Method Research Paper, Writing A
Research Paper Method Research Paper, Writing AResearch Paper Method Research Paper, Writing A
Research Paper Method Research Paper, Writing A
 
How To Write A Letter In Business Letter Format T
How To Write A Letter In Business Letter Format  THow To Write A Letter In Business Letter Format  T
How To Write A Letter In Business Letter Format T
 
Essay Dead Poets Society Carpe Diem
Essay Dead Poets Society Carpe DiemEssay Dead Poets Society Carpe Diem
Essay Dead Poets Society Carpe Diem
 
250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx250 word discussion response james wk 7.docx
250 word discussion response james wk 7.docx
 
Cell Phone
Cell PhoneCell Phone
Cell Phone
 
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docxWHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
WHAT ARE THE METHODS THAT CAN BE EMPLOYED TO REDUCE THE TH.docx
 
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
SUPER-FINAL-PPT_SMISHING.pptx Stop the smishing: A pragmatic Analysis on Dece...
 
Cpj journalists safety guide 2012
Cpj journalists safety guide 2012 Cpj journalists safety guide 2012
Cpj journalists safety guide 2012
 
Cyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to TechnologyCyber-Stalking Threat to People or Bane to Technology
Cyber-Stalking Threat to People or Bane to Technology
 

More from captsbtyagi

'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIIIcaptsbtyagi
 
Background screening
Background screeningBackground screening
Background screeningcaptsbtyagi
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11captsbtyagi
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11captsbtyagi
 
News letter jan 12
News letter jan 12News letter jan 12
News letter jan 12captsbtyagi
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11captsbtyagi
 
News letter July 11
News letter July 11News letter July 11
News letter July 11captsbtyagi
 
News letter June 11
News letter June 11News letter June 11
News letter June 11captsbtyagi
 
News letter May 11
News letter May 11News letter May 11
News letter May 11captsbtyagi
 
News letter april 11
News letter april 11News letter april 11
News letter april 11captsbtyagi
 
ICSSM Newsletter Dec11
ICSSM Newsletter Dec11ICSSM Newsletter Dec11
ICSSM Newsletter Dec11captsbtyagi
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11captsbtyagi
 
Contingency planning train
Contingency planning  trainContingency planning  train
Contingency planning traincaptsbtyagi
 

More from captsbtyagi (14)

'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII'Computer Hardware' - A PPT good for summer home work for Class VIII
'Computer Hardware' - A PPT good for summer home work for Class VIII
 
Background screening
Background screeningBackground screening
Background screening
 
News letter feb 11
News letter feb 11News letter feb 11
News letter feb 11
 
News letter jan 11
News letter jan 11News letter jan 11
News letter jan 11
 
News letter jan 12
News letter jan 12News letter jan 12
News letter jan 12
 
News letter aug 11
News letter aug 11News letter aug 11
News letter aug 11
 
News letter July 11
News letter July 11News letter July 11
News letter July 11
 
News letter June 11
News letter June 11News letter June 11
News letter June 11
 
News letter May 11
News letter May 11News letter May 11
News letter May 11
 
News letter april 11
News letter april 11News letter april 11
News letter april 11
 
ICSSM Newsletter Dec11
ICSSM Newsletter Dec11ICSSM Newsletter Dec11
ICSSM Newsletter Dec11
 
News letter oct 11
News letter oct 11News letter oct 11
News letter oct 11
 
Contingency planning train
Contingency planning  trainContingency planning  train
Contingency planning train
 
Child abduction
Child abductionChild abduction
Child abduction
 

Recently uploaded

MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 

Recently uploaded (20)

VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 

Newsletter sept 11

  • 1. Newsletter: September 2011 Let s professionalize the professionals http://www.wix.com/sbtyagi/iciss Blast at Delhi High Court If readers recall, last editions of ICISS Newsletters had the front page with collage of photos with bleeding bodies and mangled parts of victims of mindless mayhem of terrorists in Mumbai and Norway. There were screaming headlines from newspapers condemning the brutal attacks. New Delhi has been chosen targets of terrorists in India followed by Mumbai. With unfailing frequency these cities have been targeted alternatively that such Capt. S B Tyagi 1
  • 2. incidents can be predicted by even a child! Their being the cities identified with what is good about India, securing them becomes all the more important! Common citizens all over the country and especially in Mumbai and Delhi have shown great certitude and resolve and willingly came forward to help the affected and wounded persons. There were long queue of persons willing to donate blood. There were ladies out in the streets extending all possible help. Hospitals also responded responsibly and professionally and after initial chaos, patients were attended properly. And how is the intelligence collected and disseminated? Ill provided and ill- motivated, not to forget ill-trained intelligence personnel of central and state agencies gleam through the local and national newspapers, watch all news channel and sometimes have luxury of surfing internet thus concoct their reports which are laced with juicy tit-bits collected from local pan-walla. Their informers also do likewise and a report is prepared which goes like It has been reportedly learnt through unidentified sources that few of the fundamentalists from across the country are allegedly examining the possibilities of targeting public places and areas of national importance with the likely aim of planning violent attacks with possible use of improvised explosive devices. Now, can anyone make out anything out of such reports? Can a security professional find anything in this report to work upon? Is it actionable report? Yet such are the reports which fly thick-n-fast between home departments of Centre and states and such are the reports which our worthy ministers claim to have shared with either the Centre or States! While terrorists attack with carefree frequencies and callous regards to the police and security establishments, the Nation waits with baited breath and wonders which city would be struck by the terrorists next! Without making a political statement, can we say that this is the time that Government took some tough action! Instead of issuing tough statements after terrorist acts, can the Government work silently with eloquent results! Capt S B Tyagi For ICISS Capt. S B Tyagi 2
  • 3. The cyber-crime is any crime that is committed by means of special knowledge or expert use of computer technology and can be at best kept under three categories of cyber-crimes against person, cyber-crimes against property and cyber terrorism. Internet-related crimes are on the rise and can pose serious threats if remain un- checked for long. Intelligent Hydra viruses which replicate and steal sensitive information sending e-mails using another s identity and the source code theft are just some of the challenges authorities have come up against. In the case of an attempted cyber murder, an unidentified individual hacked into a hospital s computer system and altered the prescription for a patient the intended victim to include dangerous drugs. Hospital authorities detected the alteration and prevented any untoward incident. The overall Information Warfare is the most dreaded form of terrorism facing the civilized society a true model of globalization of terrorism which would respect no national boundaries or international borders either in space or on the ground. The defense, police, banking, trade, transportation, scientific work and a large percentage of government s as well as private sector s transactions are now on-line. That exposes enormous vital areas of national life to mischief or sabotage by any competent computer hacker. Hence there is the speculation and threat about info- terrorism , cyber warfare. Cyber bullying refers to the new, and growing, practice of using technology to harass, or bully, someone else. Bullies used to be restricted to methods such as physical intimidation, postal mail, or the telephone. Now, developments in electronic media offer forums such as email, instant messaging, web pages, and digital photos to add to the arsenal. Computers, cell phones, and PDAs are new tools that can be applied to an old practice. Forms of cyber bullying can range in severity from cruel or embarrassing rumors to threats, harassment, or stalking. It can affect any age group; however, teenagers and young adults are common victims, and cyber bullying is a growing problem in schools. Why has cyber bullying become such a problem? The relative anonymity of the internet is appealing for bullies because it enhances the intimidation and makes tracing the activity more difficult. Some bullies also find it easier to be more vicious because there is no personal contact. Unfortunately, the internet and email can also increase the visibility of the activity. Information or pictures posted online or forwarded in mass emails can reach a larger audience faster than more traditional methods, causing more damage to the victims. And because of the amount of personal information available online, bullies may be able to arbitrarily choose their victims. Cyber bullying may also indicate a tendency toward more serious behavior. While bullying has always been an unfortunate reality, most bullies grow out of it. Cyber Capt. S B Tyagi 3
  • 4. bullying has not existed long enough to have solid research, but there is evidence that it may be an early warning for more violent behavior. How can you protect yourself? Be careful where you post personal information By limiting the number of people who have access to your contact information or details about your interests, habits, or employment, you reduce your exposure to bullies that you do not know. This may limit your risk of becoming a victim and may make it easier to identify the bully if you are victimized. Avoid escalating the situation Responding with hostility is likely to provoke a bully and escalate the situation. Depending on the circumstances, consider ignoring the issue. Often, bullies thrive on the reaction of their victims. Other options include subtle actions. For example, if you are receiving unwanted email messages, consider changing your email address. If the bully does not have access to the new address, the problem may stop. If you continue to get messages at your new account, you may have a stronger case for legal action. Document the activity Keep a record of any online activity (emails, web pages, instant messages, etc.), including relevant dates and times. In addition to archiving an electronic version, consider printing a copy. Report cyber bullying to the appropriate authorities If you are being harassed or threatened, report the activity to the local authorities. Law enforcement agencies have different policies, but your local police department or FBI branch are good starting points. Unfortunately, there is a distinction between free speech and punishable offenses, but the legal implications should be decided by the law enforcement officials and the prosecutors. Depending on the activity, it may also be appropriate to report it to school officials who may have separate policies for dealing with activity that involves students. Riches and honors are what men desire. If they cannot be obtained in the proper way, they should not be held! Poverty and meanness are what men dislike. If they cannot be avoided in the proper way, they should not be avoided!! Confucius Capt. S B Tyagi 4
  • 5. By: Col R K Mishra, COAC CC* Several cases across the country have happened involving accidental firing of single barrel / double barrel guns resulting in unfortunate injuries or death to the owner of the gun / passersby. Most of the times, there would be no eye witnesses to the incident and as such it is difficult to surmise the exact cause of firing. On examination of the gun, in majority of the cases, it is found that the firing pin mechanism had become About the author defective. Probable causes may be such that the An avid reader and equally prolific guard would have banged the gun to the ground writer, Col Ram Kishore Mishra is which would have activated the firing mechanism Management Professional resulting in the accidental firing. possessing outstanding leadership qualities with 27 years of well-honed To avoid accidents of this nature following expertise and cross functional experience. precautions may be taken wherever gunmen are deployed. A proper gun rack should be provided for Hand-picked by Army Headquarters safe keeping of the gun. to Command an Assam Rifles Battalion and launch them into high The gun must be checked by the guard for the intensity counter insurgency combat zone (OP HIFAZAT). following every time before duty mounting. He also ensured complete o Check butt plate. Most of the guns have rubber domination of area of responsibility butt plates. The rubber should be elastic and over rugged mountains of North the plate firmly fixed to the butt. The rubber butt J&K along line of control under (OP RAKSHAK). plate absorbs shock on being hit on any hard object i.e., ground. Ensure that the butt is not He is recipient of Chief of the Army loose. Staff s Commendation for gallantry beside Commendation of General o Check the cocking lever for play and mal- Officer Commanding in Chief, Southern Command for devotion functioning. to duty and distinguished service o Check play between the barrel and the butt. He can be contacted at rkmishra58@gmail.com o Check barrel for cleanliness. o Check foresight. o Check the firing mechanism as follows: · Break the gun and insert a thick paper in between the butt plate and the barrel. Lock the gun and then bang it on the ground. Remove the paper and check for perforation. If perforated, the gun is defective and should not be used. · Insert the paper as explained above, disengage the safety catch or cock the cocking lever as the case may be, press the trigger and examine the paper for perforation. If the firing pin has perforated the paper, the gun is in good working condition. Capt. S B Tyagi 5
  • 6. Whenever the guard is completing his duty, he should ensure that the gun is unloaded. The weapon must be handled by the holder only. The holder of the gun or the security guard should ensure that the gun is unloaded before the gun is put in the gun rack. It must be also be ensured that the guns are inspected and overhauled annually and any defects noticed are rectified. The cartridges manufactured by authorized manufacturers only should be used. Generally the cartridges that have become more than 02 years old are not considered serviceable. Such cartridges may be used for testing of gun / training purposes. All such gunmen wherever deployed may be instructed to be cautious and vigilant in handling of the guns at all times. Shhh ...You know they're listening Are you paranoid? Have good reason? The Mini Bug Detector offers protection against wireless microphones and transmitters. This device is perfect for securing homes, offices and hotel rooms. It has a LED signal strength display and audio tone that help pinpoint the precise location of bugs. The audio alarm can be turned off for discreet sweeps, while the sensitivity adjustment eliminates false alarms. The Mini Bug Detector features wide range circuitry that enables it to detect concealed transmitters operating on frequencies from 50 MHz to 3 GHz. · Weight: 10.5 oz. · Dimensions: 5 1/2" x 3" x 7/8" · Requires one 9-Volt battery (not included) http://www.thinkgeek.com/gadgets/security/5a42/ Capt. S B Tyagi 6
  • 7. Following is the reproduction of the e-mail received (with some editing) by one of the IISSM Chapter members, and appears to be benevolent in nature! However, on further investigation it was found that it was an attempt to gather important personal / financial information. The given link with lots of difficulty got connected after repeated attempts over three months time, but for a short while without getting any useful information, indicating that these were non-functional URLs. The yellow button asking to click here to activate your account was sending the information to third party! Readers are advised not to respond to such mails unless they verify the background of the sender of the mails. Information Regarding Your account: Protect Your Account Info Dear PayPal Member! Make sure you never provide your Attention! Your PayPal account has password to fraudulent websites. been violated! Someone with IP address 86.34.211.83 tried to access To safely and securely access the your personal account! Please click PayPal website or your account, open the link below and enter your account a new web browser (e.g. Internet information to confirm that you are not Explorer or Netscape) and type in the currently away. You have 3 days to PayPal login page (http://paypal.com/) confirm account information or your to be sure you are on the real PayPal account will be locked. site. PayPal will never ask you to enter your password in an email. Click here to activate your account For more information on protecting You can also confirm your email address yourself from fraud, please review our by logging into your PayPal account at Security Tips at http://www.paypal.com/ Click on the "Confirm email" link in the Activate https://www.paypal.com/us/securitytips Account box and then enter this confirmation number: 1099-81971-4441- Protect Your Password 9833-3990 Thank you for using PayPal! You should never give your PayPal - The PayPal Team password to anyone. Capt. S B Tyagi 7
  • 8. Notice something in the photograph! See the helmet, it is there but not where it could have saved the life! Surely there are still few people who will question the utility of a helmet! Suggestions: · Please reconsider your decision not to wear helmet. · Young ladies, please decide to use helmet while you comfortably sit at the back seat. On the Women's day, please take some positive decisions and Capt. S B Tyagi 8
  • 9. convince your brothers, husband, friends, father, etc. to use helmet. I am sure you do not bother about your hair-style and use helmet yourself. · Car drivers, use seat belt, avoid mobile phones while driving. · Follow all traffic rules, even if someone is not watching you. And do not celebrate when you dodge a traffic man, ultimately we will suffer. · Please do not try to save some petrol by driving on wrong side to avoid taking a U-Turn some distance away. Burundanga Drug Warning Share if you care with your friends .. Share with everybody you know, particularly your wife, sisters, daughters, nieces, mother, female friends and colleagues. In fact even guys should also be careful... At a petrol pump, a man came over and offered his services as a painter to a lady filling petrol in her car and left his visiting card. She said nothing but accepted his card out of sheer kindness and got into the car. The man then got into a car driven by another person. As the lady left the service station, she saw the men following her out of the station at the same time. Almost immediately, she started to feel dizzy and could not catch her breath. She tried to open the window and realized that the odor was on her hand; the same hand with which she had received the card from the person at the service station. She then noticed the men were immediately behind her and she felt she needed to do something at that moment. She drove into the first driveway and began to honk her horn repeatedly to ask for help. The men drove away but the lady still felt pretty bad for several minutes after she could finally catch her breath. Apparently, there was a substance on the card that could have seriously injured her. This drug is called 'BURUNDANGA' aka scopolamine - Not known to people so far but sufficient Information Is available in the Net) and it is used by people who wish to incapacitate a victim in order to steal from or take advantage of them. This drug is four times more dangerous than the date rape drug and is transferable on a simple card or paper. Take heed and make sure you don't accept cards when you are alone or from someone on the streets. This applies to those making house calls and slipping you a card when they offer their services. Capt. S B Tyagi 9
  • 10. http://www.lonelyplanet.com/thorntree/thread.jspa?threadID=1889527 Threats aimed at people and properties are on the rise in all parts of the world. Companies and private individuals are increasingly looking for protection that is more effective and more dynamic than that provided by traditional security measures. There are many security companies which provide customized training of a VIP dog to suit the customer s needs. The customer can lease a VIP dog over a period up to 5 years. These security agencies maintain the various protection capabilities of the VIP dog over the course of the lease. Examples of protection capabilities of a VIP dog are as given below - The VIP dog must without command: prevent an armed attack. prevent an unarmed attack. keep several attackers at a distance from its owner. reject food from an unauthorized person. identify unauthorized access by barking. remain calm if weapons are used. The VIP dog must on command: demonstrate unconditional and immediate obedience regardless of circumstances. track and find a person irrespective of terrain and other environmental factors. apprehend a fleeing person. guard an apprehended person. guide an apprehended person. search for and indicate the presence of explosives. search for and indicate the presence of drugs. Capt. S B Tyagi 10
  • 11. Suggestions & feedback may be sent to us on e-mail: captsbtyagi@yahoo.co.in Capt. S B Tyagi 11