SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
Newsletter: February 2014
Let’s professionalize the professionals…
http://sbtyagi.wix.com/icissm
Security professionals in general and Indian security professionals in particular have
reasons to rejoice as doyen of Indian Industrial Security has achieved the positions
in the governance and decision-making where his rich experience, profound
industrial insight and deep-rooted commitment for the betterment of the Indian
Security Industry will see some long term initiatives and beginning of new policies
aimed to strengthen the overall position and future development of the Industry.
Shri RK Sinha has been nominated as candidate for election as
member of the Rajya Sabha (Upper House of Indian
Parliament) recently. Shri R K Sinha, fondly known as RK in the
security fraternity is a man of many hues. Mr. Sinha started
Security & Intelligence Services (India) Limited with a team of
two persons from a small rented office in the eastern parts of
India in 1974. Today, SIS Group is recognized as one of the
leaders in manpower security business in Asia Pacific with over
36,000 permanent employees and 3000 corporate customers.
Mr. Sinha is widely recognized as a pioneer and Industry leader. He represents the
private security industry before government bodies for legislation and regulatory
matters regularly. Mr. Sinha also served as an Advisor to Ministry of Human
Resource Development, Government of India (1999 - 2004).
Capt S B Tyagi
For ICISS
Food for Thought:
It takes a lot of courage to release the familiar and seemingly
secure, to embrace the new. But there is no real security in what is
no longer meaningful. There is more security in the adventurous and
exciting, for in movement there is life, and in change there is power.
- Alan Cohen
Tom Exley & Jaiprakash Vappala, ComNet Europe Ltd
jvappala@comnet.net
Explore the of use of environmentally hardened fiber
optic and copper-based transmission equipment for
deployment in harsh out-of-plant operating environments
utilized for the transmission of high quality video, audio,
serial and Ethernet data, for CCTV surveillance,
perimeter monitoring and data, for control in demanding
mission-critical/extreme reliability applications, using a
variety of network configurations and architectures.
Introduction
The industrial automation and process control industry
utilizes specialized communications and networking
equipment designed to operate reliably in extremely
difficult environments. Characterized by wide variations
in operating temperature, high humidity, high levels of
vibration and mechanical shock, voltage transient
conditions, EMI/RFI, and exposure to airborne and
particulate matter, these environments demand
communications equipment that is specially designed for
the task at hand, including highly robust design and
construction, to ensure the network remains as reliable
as possible. Equipment installed must be designed for
deployment in harsh, out-of-plant environments, such as
those encountered in petrochemical refineries, oil and
gas pipelines, ITS/heavy and light railway/transportation,
mining, pulp and paper, discrete manufacturing (food &
beverage production and processing, robotics,
pharmaceutical production), and virtually all aspects of the industrial automation and process
control.
The industrial security market has been witnessing the gradual transition to video, audio and data
transmission over Ethernet. This change has impacted numerous other markets as well, including
the transportation, factory automation/industrial control, and utility/electric power transmission and
distribution markets.
A key concern amongst petrochemical refining, distribution, and oil and natural gas exploration
companies is the reliable and uninterrupted flow of product at all stages of the production process.
Ethernet has been widely adopted as the networking technology of choice for nearly all SCADA
(Supervisory Control and Data Acquisition) systems deployed in this market, for the control and
monitoring of high-volume refining and pipeline/distribution applications.
Industrial Ethernet applications must mandate the requirement for security provisions to ensure
that the network remains safe from any possible intrusion. The managed switches shall include
SSH (Secure Shell), SSL (Secure Sockets Layer), to ensure the security of the network.
Wavelength-Division Multiplexing & Self-Healing Ring
Tom Exley holds a
degree in Electrical and
Electronics Engineering
from Huddersfield
University – UK.
Tom has experience
within the fiber industry
for the last 15 years as
field and technical
sales and currently holds the position of senior
technical sales manager at ComNet based at
the EMEA/Asia HQ in Leeds UK.
Jaiprakash Vappala
holds a Bachelors
degree in Electrical &
Electronics Engineering
from Mangalore
University. Gained work
experience in Sales,
selling Fire Alarm & Electronic Security
products and solutions across India.
Represented Group4, Tyco, CBC in over 18
Years of work experience as individual
contributor, team member & leader, attended
a one year executive program on Strategic
Management from IIM Kozhikode. Currently,
responsible to develop the South Asia market,
for a USA head quartered, Innovative
manufacturer of fiber optic transmission and
networking equipment, doing business as
ComNet.
Prior to the introduction of video over IP (or Internet Protocol), a separate network of analog or
digitally encoded video was typically utilized for hauling the video from the edge of the network
back to the monitoring location. Audio for telephony or a communications intercom system; RS-
232, RS-422, or RS-485 serial data, commonly used for CCTV camera pan-tilt-zoom (PTZ) control
or the card access element of the system, was transmitted from the field devices back to the
control center on other dedicated and parallel networks. The transmission media of choice was
usually optical fiber for reasons of robustness and bandwidth.
Using a technique of wavelength-division multiplexing, sending signals of several different
wavelengths of light into the fiber simultaneously, allowing multiplication in capacity in addition to
making it possible to perform bidirectional communication. A cost-effective system design to a
challenging security-related application is a fiber optic drop-and-insert video and data transmission
system designed for large-area perimeter surveillance and monitoring applications.
It Shall be designed for use with the optical fiber typically configured as a true ring, the optical
network shall also be configured in the easier-to-deploy linear add-drop topology and utilizes 10-bit
digital encoding of baseband composite video for true broadcast quality video performance, and
shall provide an easy to install platform for the video and control data to be inserted and extracted
at multiple insert-and-drop (or monitoring) locations throughout the network.
Transmission distances of up to 48 km between nodes is available when the single-mode variant
of this equipment is employed, making the self-healing ring system ideal for extremely wide area
networks and related applications.
This technology would help in the judicious use of existing infrastructure of fiber in the plant by way
of recycling and maximizing the use of fiber by using the same fiber for both Analog and IP video.
The optical technologies and system design approaches are still very viable solutions for hauling
high-quality, full-motion video, audio, and data, and when optical fiber is employed as the
communications media, extremely long transmission distances and electrically noisy environments
are easily accommodated.
Why use Ethernet
The difficulty of installing and maintaining two or more parallel and technically diverse networks,
one for video, one for audio, and another for serial or other data, has motivated many users to
consider the use of Ethernet as their preferred communications networking system. The relative
ease of integration of the key components of the system onto a common platform has largely
made Ethernet the networking solution of choice in the many markets, including the industrial
security market.
With the advent of Ethernet, it now became practical and cost-effective to consolidate the video,
audio, and data elements of a security communications subsystem onto a single network. Although
in theory this should be the ideal platform for the typical local or wide area communications
network utilized for industrial security and other surveillance applications, in practice several key
and recurring issues are frequently encountered by the systems integrator and end-user
responsible for the installation, maintenance, and operation of the system.
When analog video is to be deployed onto the network, a video encoder is required to convert the
camera video output into an electrical signal that is compatible with transmission over an Ethernet-
based network.
These encoders employ signal compression technology to reduce the bandwidth occupied by the
video, so as to increase the number of potential video, audio, or data signals that may share the
finite bandwidth available on the network.
Present video compression standards include MPEG-2, MPEG-4 and H.264, with MPEG-4
currently most widely used. The H.264 standard is newer and offers the advantage of enhanced
video quality with the benefit of reduced bandwidth. MPEG-2 was originally developed for use by
the commercial television broadcast industry, and although capable of superb video quality, its
bandwidth requirements are large.
As such, it has not been widely accepted for use within those communications networks employing
Ethernet. Regardless of the compression standard utilized, hardware decoders or decoding
software compatible with the encoded video are required for viewing the video.
One major issue involves the relative lack of MPEG-4 or H.264 video encoders that are
environmentally hardened when these devices are installed in an out-of-plant operating
environment. In this kind of environment, issues such as ambient operating temperature, voltage
transient protection, vibration, mechanical shock, and humidity with condensation must be
considered to ensure that the video encoders or other field equipment are capable of providing
long-term reliability and stable performance.
Hardware capable of withstanding the extended operating temperature range, humidity with
condensation, and electrical voltage transients and noise encountered in an outdoor or out-of-plant
environment are few and far between, and the equipment is costly as a result.
The MPEG-4 and H.264 video compression standards are suitable for transmission over Ethernet.
As these standards rely upon video compression, the video in these standards is not transmitted in
real time, and exhibits a certain amount of latency depending upon the compression standard
utilized.
The high system bandwidth requirement imposed by the video ultimately limits the total number of
video channels and other signal sources that may be inserted onto the Ethernet platform. Many
end-users have been disappointed with the video quality of their video-over-Ethernet system,
especially when the video is viewed on highly revealing wall monitors. In addition, some video
surveillance or monitoring applications mandate the use of high resolution cameras, and much of
the resolution provided by these cameras may be lost when the video is compressed to MPEG-4
or H.264 and inserted onto the network. Although Ethernet is based upon the industry accepted
IEEE 802.3 standard, and in theory any manufacturer’s Ethernet equipment should be completely
interoperable with any other manufacturer’s equipment, in practice this is very frequently not the
case.
Pass Through PoE
The pass through PoE eliminates the need for remote power to Powered device (PD), passing-
through up to 30 watts of power per port to the powered device (PD). The IEEE 802.3-compliant
Ethernet electrical interface of these Ethernet extenders also meets the requirements for IEEE
802.3af PoE power, passing through power to the PD.
It is an advanced and unique technology that extends Ethernet networks beyond the 100 meter
limitation encountered when using COAX or UTP for IP Video and Ethernet-based applications. It
is a cost-saving alternative that enables you to use existing COAX and UTP cables for significantly
greater Ethernet transmission distances.
The system shall support 10 or 100Mbps Ethernet as well as Pass-through Power over Ethernet
(PoE) over twisted pair cable (CAT5, UTP) or Coaxial cable. The device shall support transmission
distances of up to 500m at 100 Mbps or 900m at 10 Mbps on twisted pair and 1500m on coaxial
cable PoE pass-through can be used to provide power redundancy for PoE IP cameras with
previously installed power drops.
Protecting Copper Media transmission Equipment from the Effects of Lightning and Other
Voltage Transient Events
With the advent of long-distance transmission of Ethernet data through copper media, such as
CAT-5E/6E wiring, unshielded telephone-grade twisted pair (UTP), and coaxial cable, it has
become necessary to consider the protection of the field and head-end equipment from voltage
transient events, including lightning and other high-voltage conditions. Stray voltage conditions
should be considered as well.
For the field or outdoor equipment, such as a CCTV camera, access control equipment, etc., the
“45 degree cone of protection rule” should be rigorously observed. Ideally, the camera and housing
should be located beneath an imaginary 45 degree angle drawn from the top of the supporting
structure or building.
If it is not practical or possible to do this, a properly grounded lightning rod must be installed in the
near-field of the camera, so as to attract lightning or other static discharges away from the
equipment. Otherwise, the risk of a near or direct hit to the camera becomes significant, and no
existing technology can protect delicate electronic equipment from a direct lightning hit.
As an example, unprotected parking-lot cameras installed on metallic support masts, or cameras
mounted on metal-skinned buildings are particularly susceptible to lightning damage. If the camera
is mounted to a metallic structure, it becomes necessary to electrically and mechanically isolate
the camera from the structure. This may be easily accomplished by the use of plastic or nylon
screws, washers, and other non-metallic hardware, to effectively isolate the camera housing and
its associated wiring away from the structure.
The camera and all related equipment must electrically float relative to ground on the structure. If
there are grounding attachment points or connections (i.e. screws, nuts, etc.) on the camera, the
camera housing, or any other equipment located in the field and related to the camera, they must
be individually wired to the modem ground connection with a minimum of 12 gauge solid conductor
(not stranded) wire, but do not connect any of this equipment to earth ground.
This single-point or star grounding practice is highly effective for protection against high voltage
transients and low-voltage ground loops, and can eliminate troublesome video hum bars that
otherwise may occur.
Standards
 RFC-2544 TCP/IP network bandwidth packet transmission standards
 IEEE 802.3af PoE,
 RFC: 768 UDP, 2068 HTTP, 793 TCP
 791 IP, 1783 TFTP, 894 IP over Ethernet.
 NEMA TS-1/ TS-2 Environmentally hardened, to the requirements of for most out-of-plant applications
Reference: www.comnet.net
Jai Kumar Varma, IPS (Retd.)
Naxalites again captured the headlines albeit for a wrong reason by
blowing a jeep in Aurangabad on December 4, 2013 killing seven
persons including six policemen of Special Auxiliary Police (SAP). The
SAP was raised in 2006 to handle the problem of Left Wing Extremism in
Bihar. The Naxalites also looted the arms & ammunition including the
Self Loading Rifles of the SAP. Aurangabad which is abutting Palamu
District of Jharkhand is a stronghold of Naxals. Although no group has
taken the responsibility of this dastardly act but according to informed
sources Communist Party of India (CPI) (Maoist) which is
strongest and largest is behind this attack. In fact TPC (Tritiya
Prastuti Committee) a faction of CPI (Maoist) is active in this
area but TPC does not involve in such attacks.
The aim of Naxalites or Left Wing Extremism (LWE) is to
overthrow the lawful government through mass mobilization
and armed struggle. LWE wants to capture the power, territory
and resources. They proclaim that they are fighting against
exploitation of poor and for the rights of landless farmers,
sharecroppers, untouchables and tribal people of India. The
Maoists have neither faith in the democratic government of
India nor owe allegiance to the Constitution of the country.
In the early years both state and central governments treated
LWE solely as a law and order problem and dealt it with iron
hand hence it appeared that the insurgency is curbed but it was
only suppressed outwardly and cropped again with augmented
force. Several groups of Naxal movement joined together and
merged in CPI (M) which became the biggest and most
powerful group of LWE. Naxalites have powerful presence in
several states of India including Andhra Pradesh, Bihar,
Chhattisgarh, Jharkhand, Madhya Pradesh, Maharashtra,
Orissa, Uttar Pradesh and West Bengal. In 2011 LWE had
influence in 182 Districts of India. The LWE threat is enhanced
up to the extent that Prime Minister Manmohan Singh stated on
May 24, 2010 that Naxalism remains the biggest internal
security challenge and it is imperative to control Left-wing
extremism for the country’s growth.
The Maoists controlled tribal region, mineral rich forest areas
are called ‘Red Corridor’. The tribal of Red Corridor are fully
exploited by industrialists, corrupt bureaucrats and politicians
who have displaced them by grabbing their mineral rich forest land for mining, establishment of
wild life parks and sanctuaries. These tribals were displaced from their land and neither
government nor industrialists made any viable arrangement for them. According to an estimate
about 20-24 million tribal people were displaced between 1951-2005 due to various mega hydro-
electric projects, dams, mines excavations etc. The Naxalites earn the good will and faith of these
tribal when they attack security personnel, rural landlord, businessmen, politicians, government
officials or anybody who are close to administration.
The author has retired as Director,
Cabinet Secretariat in 2007. He
has attended several courses in
India and abroad related to
collection of intelligence, analysis
of reports and preparation of notes
under which current situation was
depicted as well as future scenario
is predicted.
Besides this, it is also suggested in
the notes what measures should
be adopted so that the situation
becomes in favour of the country.
He has handled the internal
security matters at National level
beside administration of large work
team. He had various overseas
tenures in several countries
including Pakistan.
Presently he is working as
Consultant in India Strategic
magazine (www.indiastrategic.in).
Besides working he is also writing
articles in the magazine and
delivering lectures in various Para
military & intelligence
organizations. He has special
interest in internal security,
terrorism, terrorist organizations in
India and abroad, Naxalism,
Foreign relations.
He can be reached at -
jai_pushpa@hotmail.com
The LWE has a three phase plan.
In the first phase the Naxalites would gain the support of masses through mass movements. In the
second phase LWE will build bases in forest areas and distant places and will wage guerrilla war
against administration and political system. LWE will seize control of countryside. In the third and
final phase LWE will overthrow the lawful government of the land and will take control of the state.
Fortunately in most of the areas Maoists are still in first phase.
Besides waging an armed struggle against central and state governments LWE has also created
several frontal organizations including NGOs. These organizations safeguard their interests, raise
funds, make propaganda in their favor, render legal support and also provide them places of safety
at the hour of need. Not only this when security forces kill any Naxalites these frontal organizations
raise lot of hue and cry but generally remain silent when LWE kill security forces personnel,
innocent villagers or contractors men.
According to intelligence reports LWE has relations with secessionist groups of North Eastern
States of India, Liberation Tigers of Tamil Elam (LTTE) and Maoists of Nepal. LWE is getting arms
& ammunition from LTTE and training from terrorist groups of North East. Maoists of Nepal extend
all type of assistance to LWE. Foreign agencies like Inter Service Intelligence (ISI) of Pakistan
support separatists either directly or through dummy organizations. The Maoists have a better
intelligence network then the security forces. According to a rough estimate there are about 15000
to 20000 armed LWE fighters and a large number of sympathizers all over the country which
includes so called intellectuals, media persons and others.
The LWE problem is not merely a law and order problem and the effected state governments
cannot solve it separately or jointly. The Central government must take the lead and play a pro
active role. In 2009 Naxal Management Division under Ministry of Home Affairs (MHA) started
looking after the LWE problem. Several units of Commando Battalion for Resolute Action
(COBRA) were constituted under Central Reserve Police Force (CRPF). These units are
especially trained in guerrilla warfare. Besides these units about 50000 officers and men of Para
military forces were sent in troubled states.
Secondly the problem has to be dealt politically as well as economically. The main aim is to
persuade the so called terrorists to surrender their arms and join the mainstream. Hence several
poverty eradication programs, for improvement in rural housing, removal of malnutrition among
children, construction of roads in rural areas, electrification etc. were introduced. Unfortunately
these poverty alleviation programs could not achieve desired results due to rampant corruption in
their implementation and severe opposition and propaganda by LWE.
The administration should impart job oriented education to its growing youth population so that the
unemployment can be curbed. Several political leaders, bureaucrats, businessmen, have
developed selfish interest as well as close relations with the LWE. It is essential to break this
nexus as they do not want to eradicate the influence of LWE in the area of their interest.
The government should give more powers to local administration so that tribals are recruited for
the implementation of various poverty eradication programs. The surplus government land can be
distributed among the landless tribals.
The police forces of all the LWE affected states except Andhra Pradesh are poorly funded; have
obsolete weapons, age old communication system, neither they have adequate training nor will to
combat Naxalites. The local administration is corrupt and lacks the will to counter the LWE. The
officials of police forces should be trained, modern weapons and amenities should be provided to
them.
The need of good and timely intelligence for security operations cannot be over emphasized. The
Para military forces are dependent on the intelligence network of state police as well as of
Intelligence Bureau. However very less actionable intelligence, was received by Para military
forces from them because of various reasons. Now CRPF has created its own intelligence wing,
hence it is expected that soon CRPF will be capable to collect actionable intelligence itself which
will be helpful in conducting more result oriented operations.
In most of the countries offensive counter-insurgency operations are conducted by army. However
Indian army is reluctant to take over these operations as LWE effected areas are far-off from
international borders and army’s primary responsibility is to safeguard the borders of the country.
Hence a specialized force on the pattern of Greyhounds of Andhra Pradesh with specialized
powers, weapons, training, and facilities should be created to encounter the LWE problem.
There should be an Integrated Action Plan and inter-state coordination should be enhanced. A
long term strategy should be chalked out between Centre and all Naxalite affected states and all
planning, resources, intelligence should be disseminated from there for action against LWE.
Sagarika Chakraborty
With more than 13,000 investors waiting for their default debts to be paid
off by National Spot Exchange Ltd (NSEL) (amounting to approximately
INR 5,600 crores), the Indian corporate tapestry has been re-introduced to
some old fears. The mandates are already out to initiate civil and criminal
proceedings against NSEL however, what really lacks a mandate is the
process or the lack of it that landed the investors in here in the first place.
The boon of the corporate sector also brings along with itself the bane of
increased cases on non-paybacks of loans. With the IBA and the RBI
already setting stringent norms on asset disclosure or Know Your
Customer (KYC), little is needed from the policy point of view – however,
what goes into practice is another story.
The pledged assets at times of stress are often found inadequate to cover
exposures and cash flows often a trickle versus the outstanding amount.
Perpetrators of serious financial/ corporate crimes, use advanced
technological and other measure to easily hide the flow of stolen funds or
immoveable/ moveable assets and attempt to conceal them from
detection.
The ideal solution to the above for banks / financial institutions, to the
problem seems to identify all avenues of cash flow, asset assimilation and keep the list handy
before the rough times hit the shore. The Central Banks across the globe have in recent times,
under numerous circumstances emphasized on the need of a checklist to be adopted by financial
institutions while dealing with new debtors. The checklist and its usage, coupled by the credit
ratings and financial diligences are found to be the only way to manage contingent risks related to
non-repayment of dues. However, saying that – such a scenario is only followed in policies and on
paper.
Author is the Head -
Western Region for
Pinkerton India
(www.pinkertonindia.co
m) and alumnus of ISB,
Hyderabad (Year
2012).
She specializes in
corporate
investigations and
security risk consulting.
Banks / Financial Institutions till date prefer diligences at a restricted level, governed by the biases
of credit ratings and checks. Aspects of risk management of physical assets and overall reputation
of the debtors are still not given the due thought that the current situation mandates. Due Diligence
as the term indicates in common parlance is the necessary steps that need to be taken up by a
creditor at the outset of extension of credit or renewal of old credit facilities. The commonly red
flagged areas of due-diligence that are ignored by financial institutions are:
 Checking into the market reputation of the corporate or its promoters on a ground level
 Checking with other financial institutions as an informal method of reference about the credit
history and list of assets forwarded by the debtor
 Conducting a revalidation into the list of assets during renewal of extension of credit lines
The above coupled by the absence of exposure to asset tracing experts add to the woes of the
financial institutions including banks. Further, even for experts identifying assets that are stashed
across jurisdiction is no easy a task. It is to be remembered that asset tracing investigations
generally require a focused and consistent approach in order to achieve their ultimate objective:
identify assets underlying a business deal or recover assets that were misappropriated.
Also, there are no fixed rules when it comes to tracing of misappropriated assets, even for the
experts. The most experienced ones often resort to a 3 pronged approach to conduct a holistic
diligence study all aspects with regard to the debtor and his business. The process starts with
establishing a linkage between the parties via an intelligent analysis to determine the title of assets
or to identify cross links between different entities and individuals (Link Analysis) and then
connecting the dots between the various assets - moveable, non-moveable and funds (Charting
Analysis) to know about pertinent ownership of such assets. Apart from the technical sources and
various forensic tools involved the entire process is heavily dependent on the tapping of human
resources in gathering information and intelligence about the parties involved in the transactions
(Human Network Analysis).
Though it all sounds good and extremely suave, the lack of clarity for various aspects of law in
India, the unwillingness of banks / financial institutions to accredit the above mentioned modalities
poise a lot of hindrance and delay. Quite often than not, the time lag in taking a decision on
conducting such an exercise also gives the debtor ample opportunity to wash away his hands from
such assets and make tracing almost impossible.
The immediate step is to realize that the advancement of technology and intelligence can be used
both to ensure that corporate misgivings are avoided as well as to execute them to near perfection.
It is therefore essential that financial institutions wake up to the need of credibility checks of
debtors on a holistic level in order to reduce instances of contingent fugitive recovery and stabilize
the corporate debt tapestry of the economy.
By Col NN Bhatia (Retd)
Besides numerous other things, I had always
admired two the most in recent times. The
one is ‘The Delhi Metro’ and the other Mr
Elattuvalapil Sridharan who constructed it.
This extra ordinary Indian engineer has not
only made Delhi Metro but was also involved
in the construction of the Kolkata Metro,
Cochin Shipyard Limited as its CMD, Konkan
Railway and has been bestowed with over 60
national and international honours and
awards that include Man of the Year by The
Times of India (2002) CII (Confederation of
Indian Industry) Juror's Award for leadership in infrastructure development (2002–03), One of
Asia's Heroes by TIME (2003), Padma Shri and Padma Vibhushan.
The Metro Ordeal
I had unscheduled visit to Kirtinagar on 9 Dec 2013 by Delhi Metro to attend the prayer meeting of
a distant relation’s demise. I walked up to Golf Ground Metro Station at 1445 hrs and caught the
train at 1500 hrs that should have reached Motinagar Station around 1540 hrs. To my horror Metro
was crawling and halting intermittently before and after every station for 5-10 minutes. The train
was overcrowded and I had to stand perforce amidst shrills and cries of numerous babies getting
restless. Since there are no toilets in Metro trains and doors remained shut, many oldies like me
with bladders to brim had harrowing times. Unfortunately, there was no announcement but
passengers were talking that there was some technical snag. To make matter worst the train
stopped over the Jamuna River Bridge for over 30 minutes. From Rajiv Chowk onwards the train
moved smoothly and I reached Motinagar 5 minutes to 5 pm.
The next day’s Times of India carried the big news ‘Cable missing, Metro services on Dwarka
line held up’. The paper says the damage was intentional there by suggesting major cable theft of
700m length that could be sabotage as well. The fact that the signaling cable theft in Delhi Metro‘s
Blue Line caused inordinate delays and overcrowding at stations on Monday the 9 Dec 2013,
needs to be thoroughly investigated. I am sure the Metro Management along with police and the
CISF deployed for its protection must have formulated its security management keeping the threat
analysis in mind, highlighting every possible threat to Metro and counter measures to optimize its
security along with that of passengers and its infrastructure. Also, any compromise to its security
would be fodder for the media denting our good governance and credibility. The Delhi Metro
Corporate Office must deliberate and answer these questions:-
 Is track being patrolled in the intervening night period between the last night trains to the
time first trains starting the next morning? If yes, what is the frequency and if no why it is not
being patrolled? There is need to have armed patrol cars to keep up the surveillance.
 Is the entire track under the CCTV coverage or not and what are the tell tale signs?
 What measures Metro administration would be taking to ensure safety and security of its
property and the passengers?
 Is Delhi Metro capable of warding off chemical, biological, radiological and nuclear (CBRN)
threats by terrorists /anti national elements (ANEs)?
 The SCADA (Supervisory Control and Data Acquisition) also called Industrial Control
Systems (ICS) widely used in totally computerized management in mass transit industry
like Metro, power generation, sewage management, ports, airports, refineries, steel plants
and shipyards etc, can be hacked easily by our anti national elements (ANEs), terrorists and
enemy countries to project our country adversely in the world’s eyes as soft state unfit for
investment. We need to develop SCADA hacking counter measures and our experts know
what these are and Government’s desire should not be lacking to implement them.
It is amazingly shocking that 700 meters of signaling cable goes missing/damaged and Metro
administration comes to know that only after that had happened so late to rectify defects and
normalize its operations. We need to ward off acts of sabotage both in underground and elevated
sections including derailments, accidents, fires, earthquakes, flash floods and the sarin gas like
attack witnessed on the Tokyo subway as act perpetrated by members of Aum Shinnkyo on
20 March 1995. We need to learn that there had been major attacks on such trains in
Madrid, Moscow and London in the recent past.
ICISS at LinkedIn: http://www.linkedin.com/groups?gid=4413505&trk=hb_side_g
ICISS at Google Group: https://groups.google.com/forum/?fromgroups#!forum/icissm
Suggestions & feedback may be sent to us on e-mail: onlineicissm@gmail.com
P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please let us know
your mail address and we will move it out from our contact list, thank you!

Mais conteúdo relacionado

Mais procurados

Profinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek LaneProfinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek Lane
PROFIBUS and PROFINET InternationaI - PI UK
 
Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cip
RoutecoMarketing
 

Mais procurados (20)

IOT Presentation 100
IOT Presentation 100IOT Presentation 100
IOT Presentation 100
 
Profinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek LaneProfinet for IIoT and Industry 4 - Derek Lane
Profinet for IIoT and Industry 4 - Derek Lane
 
Safety for Automation and Control Networks - Peter Brown
Safety for Automation and Control Networks - Peter BrownSafety for Automation and Control Networks - Peter Brown
Safety for Automation and Control Networks - Peter Brown
 
PROFIBUS and PROFINET device configuration - Phil Waterworth
PROFIBUS and PROFINET device configuration - Phil WaterworthPROFIBUS and PROFINET device configuration - Phil Waterworth
PROFIBUS and PROFINET device configuration - Phil Waterworth
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
 
Current trends involving PROFIsafe - Peter Brown
Current trends involving PROFIsafe - Peter BrownCurrent trends involving PROFIsafe - Peter Brown
Current trends involving PROFIsafe - Peter Brown
 
Industrial Wireless Network Components and Equipment
Industrial Wireless Network Components and EquipmentIndustrial Wireless Network Components and Equipment
Industrial Wireless Network Components and Equipment
 
IRJET- Wireless Car using WIFI – IoT – Bluetooth
IRJET-  	  Wireless Car using WIFI – IoT – BluetoothIRJET-  	  Wireless Car using WIFI – IoT – Bluetooth
IRJET- Wireless Car using WIFI – IoT – Bluetooth
 
Eaton El-Pro TecWise
Eaton El-Pro TecWiseEaton El-Pro TecWise
Eaton El-Pro TecWise
 
A Brief Review on Wireless Networks
A Brief Review on Wireless NetworksA Brief Review on Wireless Networks
A Brief Review on Wireless Networks
 
A Review on Wireless Technologies
A Review on Wireless TechnologiesA Review on Wireless Technologies
A Review on Wireless Technologies
 
FFT fibre optic intrusion detection
FFT fibre optic intrusion detectionFFT fibre optic intrusion detection
FFT fibre optic intrusion detection
 
Engineering with PROFIsafe - Peter Brown
Engineering with PROFIsafe - Peter BrownEngineering with PROFIsafe - Peter Brown
Engineering with PROFIsafe - Peter Brown
 
IO-Link for the last metres communication - Derek Lane
IO-Link for the last metres communication - Derek LaneIO-Link for the last metres communication - Derek Lane
IO-Link for the last metres communication - Derek Lane
 
Internet of things
Internet of thingsInternet of things
Internet of things
 
The characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fiThe characteristic of li fi technology comparing with wi-fi
The characteristic of li fi technology comparing with wi-fi
 
Data tele standards-2
Data tele standards-2Data tele standards-2
Data tele standards-2
 
Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cip
 
Industry 4.0 at the Sensor Level - Simon Sumner
Industry 4.0 at the Sensor Level - Simon SumnerIndustry 4.0 at the Sensor Level - Simon Sumner
Industry 4.0 at the Sensor Level - Simon Sumner
 
PROFIBUS Maintenance & Monitoring in Process Automation - Andy Verwer & Dave ...
PROFIBUS Maintenance & Monitoring in Process Automation - Andy Verwer & Dave ...PROFIBUS Maintenance & Monitoring in Process Automation - Andy Verwer & Dave ...
PROFIBUS Maintenance & Monitoring in Process Automation - Andy Verwer & Dave ...
 

Semelhante a ICISS Newsletter Feb 14

Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security final
neerajchor
 
5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015
ProjectENhANCE
 
Digital Satellites Profile (2)
Digital Satellites Profile (2)Digital Satellites Profile (2)
Digital Satellites Profile (2)
Digital Satellites
 

Semelhante a ICISS Newsletter Feb 14 (20)

Industrial Wireless Networking Solutions
Industrial Wireless Networking SolutionsIndustrial Wireless Networking Solutions
Industrial Wireless Networking Solutions
 
Wireless World
Wireless World Wireless World
Wireless World
 
Communication & information security final
Communication & information security finalCommunication & information security final
Communication & information security final
 
teltonika-networks-use-case-catalog-v1.2.pdf
teltonika-networks-use-case-catalog-v1.2.pdfteltonika-networks-use-case-catalog-v1.2.pdf
teltonika-networks-use-case-catalog-v1.2.pdf
 
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
Prof. Jyri Hämäläinen_What comes after 4G? 5G of Course_ENhANCE Telecom Forum...
 
5 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_20155 g talk_das_jyri_hamalainen_jan_2015
5 g talk_das_jyri_hamalainen_jan_2015
 
Converge IT Siemon
Converge IT SiemonConverge IT Siemon
Converge IT Siemon
 
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
 
D-Link Industrial Networking Brochure
D-Link Industrial Networking BrochureD-Link Industrial Networking Brochure
D-Link Industrial Networking Brochure
 
final doc
final docfinal doc
final doc
 
Digital Satellites Profile (2)
Digital Satellites Profile (2)Digital Satellites Profile (2)
Digital Satellites Profile (2)
 
fiber optic cables
fiber optic cables fiber optic cables
fiber optic cables
 
An overview of wireless solutions from Extronics
An overview of wireless solutions from ExtronicsAn overview of wireless solutions from Extronics
An overview of wireless solutions from Extronics
 
Pub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetipPub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetip
 
Pub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetipPub00138 r2 cip_adv_tech_series_ethernetip
Pub00138 r2 cip_adv_tech_series_ethernetip
 
Developing and evolving cctv surveillance systems
Developing and evolving cctv surveillance systemsDeveloping and evolving cctv surveillance systems
Developing and evolving cctv surveillance systems
 
Overview – M2M Equipment’s Manufacturer
Overview – M2M Equipment’s ManufacturerOverview – M2M Equipment’s Manufacturer
Overview – M2M Equipment’s Manufacturer
 
Ceragon 15PI2-IDC-ET-EOW-GBE
Ceragon 15PI2-IDC-ET-EOW-GBECeragon 15PI2-IDC-ET-EOW-GBE
Ceragon 15PI2-IDC-ET-EOW-GBE
 
Case study
Case studyCase study
Case study
 
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
Migrating mobile networks to 5 g a smooth and secure approach 01.10.20
 

Mais de Capt SB Tyagi, COAC'CC*,FISM,CSC,

ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 

Mais de Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 
News letter jan 13
News letter jan 13News letter jan 13
News letter jan 13
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 

Último (20)

Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural ResourcesEnergy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
Energy Resources. ( B. Pharmacy, 1st Year, Sem-II) Natural Resources
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 

ICISS Newsletter Feb 14

  • 1. Newsletter: February 2014 Let’s professionalize the professionals… http://sbtyagi.wix.com/icissm Security professionals in general and Indian security professionals in particular have reasons to rejoice as doyen of Indian Industrial Security has achieved the positions in the governance and decision-making where his rich experience, profound industrial insight and deep-rooted commitment for the betterment of the Indian Security Industry will see some long term initiatives and beginning of new policies aimed to strengthen the overall position and future development of the Industry. Shri RK Sinha has been nominated as candidate for election as member of the Rajya Sabha (Upper House of Indian Parliament) recently. Shri R K Sinha, fondly known as RK in the security fraternity is a man of many hues. Mr. Sinha started Security & Intelligence Services (India) Limited with a team of two persons from a small rented office in the eastern parts of India in 1974. Today, SIS Group is recognized as one of the leaders in manpower security business in Asia Pacific with over 36,000 permanent employees and 3000 corporate customers. Mr. Sinha is widely recognized as a pioneer and Industry leader. He represents the private security industry before government bodies for legislation and regulatory matters regularly. Mr. Sinha also served as an Advisor to Ministry of Human Resource Development, Government of India (1999 - 2004). Capt S B Tyagi For ICISS Food for Thought: It takes a lot of courage to release the familiar and seemingly secure, to embrace the new. But there is no real security in what is no longer meaningful. There is more security in the adventurous and exciting, for in movement there is life, and in change there is power. - Alan Cohen
  • 2. Tom Exley & Jaiprakash Vappala, ComNet Europe Ltd jvappala@comnet.net Explore the of use of environmentally hardened fiber optic and copper-based transmission equipment for deployment in harsh out-of-plant operating environments utilized for the transmission of high quality video, audio, serial and Ethernet data, for CCTV surveillance, perimeter monitoring and data, for control in demanding mission-critical/extreme reliability applications, using a variety of network configurations and architectures. Introduction The industrial automation and process control industry utilizes specialized communications and networking equipment designed to operate reliably in extremely difficult environments. Characterized by wide variations in operating temperature, high humidity, high levels of vibration and mechanical shock, voltage transient conditions, EMI/RFI, and exposure to airborne and particulate matter, these environments demand communications equipment that is specially designed for the task at hand, including highly robust design and construction, to ensure the network remains as reliable as possible. Equipment installed must be designed for deployment in harsh, out-of-plant environments, such as those encountered in petrochemical refineries, oil and gas pipelines, ITS/heavy and light railway/transportation, mining, pulp and paper, discrete manufacturing (food & beverage production and processing, robotics, pharmaceutical production), and virtually all aspects of the industrial automation and process control. The industrial security market has been witnessing the gradual transition to video, audio and data transmission over Ethernet. This change has impacted numerous other markets as well, including the transportation, factory automation/industrial control, and utility/electric power transmission and distribution markets. A key concern amongst petrochemical refining, distribution, and oil and natural gas exploration companies is the reliable and uninterrupted flow of product at all stages of the production process. Ethernet has been widely adopted as the networking technology of choice for nearly all SCADA (Supervisory Control and Data Acquisition) systems deployed in this market, for the control and monitoring of high-volume refining and pipeline/distribution applications. Industrial Ethernet applications must mandate the requirement for security provisions to ensure that the network remains safe from any possible intrusion. The managed switches shall include SSH (Secure Shell), SSL (Secure Sockets Layer), to ensure the security of the network. Wavelength-Division Multiplexing & Self-Healing Ring Tom Exley holds a degree in Electrical and Electronics Engineering from Huddersfield University – UK. Tom has experience within the fiber industry for the last 15 years as field and technical sales and currently holds the position of senior technical sales manager at ComNet based at the EMEA/Asia HQ in Leeds UK. Jaiprakash Vappala holds a Bachelors degree in Electrical & Electronics Engineering from Mangalore University. Gained work experience in Sales, selling Fire Alarm & Electronic Security products and solutions across India. Represented Group4, Tyco, CBC in over 18 Years of work experience as individual contributor, team member & leader, attended a one year executive program on Strategic Management from IIM Kozhikode. Currently, responsible to develop the South Asia market, for a USA head quartered, Innovative manufacturer of fiber optic transmission and networking equipment, doing business as ComNet.
  • 3. Prior to the introduction of video over IP (or Internet Protocol), a separate network of analog or digitally encoded video was typically utilized for hauling the video from the edge of the network back to the monitoring location. Audio for telephony or a communications intercom system; RS- 232, RS-422, or RS-485 serial data, commonly used for CCTV camera pan-tilt-zoom (PTZ) control or the card access element of the system, was transmitted from the field devices back to the control center on other dedicated and parallel networks. The transmission media of choice was usually optical fiber for reasons of robustness and bandwidth. Using a technique of wavelength-division multiplexing, sending signals of several different wavelengths of light into the fiber simultaneously, allowing multiplication in capacity in addition to making it possible to perform bidirectional communication. A cost-effective system design to a challenging security-related application is a fiber optic drop-and-insert video and data transmission system designed for large-area perimeter surveillance and monitoring applications. It Shall be designed for use with the optical fiber typically configured as a true ring, the optical network shall also be configured in the easier-to-deploy linear add-drop topology and utilizes 10-bit digital encoding of baseband composite video for true broadcast quality video performance, and shall provide an easy to install platform for the video and control data to be inserted and extracted at multiple insert-and-drop (or monitoring) locations throughout the network. Transmission distances of up to 48 km between nodes is available when the single-mode variant of this equipment is employed, making the self-healing ring system ideal for extremely wide area networks and related applications. This technology would help in the judicious use of existing infrastructure of fiber in the plant by way of recycling and maximizing the use of fiber by using the same fiber for both Analog and IP video. The optical technologies and system design approaches are still very viable solutions for hauling high-quality, full-motion video, audio, and data, and when optical fiber is employed as the communications media, extremely long transmission distances and electrically noisy environments are easily accommodated. Why use Ethernet The difficulty of installing and maintaining two or more parallel and technically diverse networks, one for video, one for audio, and another for serial or other data, has motivated many users to consider the use of Ethernet as their preferred communications networking system. The relative ease of integration of the key components of the system onto a common platform has largely made Ethernet the networking solution of choice in the many markets, including the industrial security market. With the advent of Ethernet, it now became practical and cost-effective to consolidate the video, audio, and data elements of a security communications subsystem onto a single network. Although in theory this should be the ideal platform for the typical local or wide area communications network utilized for industrial security and other surveillance applications, in practice several key and recurring issues are frequently encountered by the systems integrator and end-user responsible for the installation, maintenance, and operation of the system. When analog video is to be deployed onto the network, a video encoder is required to convert the camera video output into an electrical signal that is compatible with transmission over an Ethernet- based network.
  • 4. These encoders employ signal compression technology to reduce the bandwidth occupied by the video, so as to increase the number of potential video, audio, or data signals that may share the finite bandwidth available on the network. Present video compression standards include MPEG-2, MPEG-4 and H.264, with MPEG-4 currently most widely used. The H.264 standard is newer and offers the advantage of enhanced video quality with the benefit of reduced bandwidth. MPEG-2 was originally developed for use by the commercial television broadcast industry, and although capable of superb video quality, its bandwidth requirements are large. As such, it has not been widely accepted for use within those communications networks employing Ethernet. Regardless of the compression standard utilized, hardware decoders or decoding software compatible with the encoded video are required for viewing the video. One major issue involves the relative lack of MPEG-4 or H.264 video encoders that are environmentally hardened when these devices are installed in an out-of-plant operating environment. In this kind of environment, issues such as ambient operating temperature, voltage transient protection, vibration, mechanical shock, and humidity with condensation must be considered to ensure that the video encoders or other field equipment are capable of providing long-term reliability and stable performance. Hardware capable of withstanding the extended operating temperature range, humidity with condensation, and electrical voltage transients and noise encountered in an outdoor or out-of-plant environment are few and far between, and the equipment is costly as a result. The MPEG-4 and H.264 video compression standards are suitable for transmission over Ethernet. As these standards rely upon video compression, the video in these standards is not transmitted in real time, and exhibits a certain amount of latency depending upon the compression standard utilized. The high system bandwidth requirement imposed by the video ultimately limits the total number of video channels and other signal sources that may be inserted onto the Ethernet platform. Many end-users have been disappointed with the video quality of their video-over-Ethernet system, especially when the video is viewed on highly revealing wall monitors. In addition, some video surveillance or monitoring applications mandate the use of high resolution cameras, and much of the resolution provided by these cameras may be lost when the video is compressed to MPEG-4 or H.264 and inserted onto the network. Although Ethernet is based upon the industry accepted IEEE 802.3 standard, and in theory any manufacturer’s Ethernet equipment should be completely interoperable with any other manufacturer’s equipment, in practice this is very frequently not the case. Pass Through PoE The pass through PoE eliminates the need for remote power to Powered device (PD), passing- through up to 30 watts of power per port to the powered device (PD). The IEEE 802.3-compliant Ethernet electrical interface of these Ethernet extenders also meets the requirements for IEEE 802.3af PoE power, passing through power to the PD. It is an advanced and unique technology that extends Ethernet networks beyond the 100 meter limitation encountered when using COAX or UTP for IP Video and Ethernet-based applications. It is a cost-saving alternative that enables you to use existing COAX and UTP cables for significantly greater Ethernet transmission distances.
  • 5. The system shall support 10 or 100Mbps Ethernet as well as Pass-through Power over Ethernet (PoE) over twisted pair cable (CAT5, UTP) or Coaxial cable. The device shall support transmission distances of up to 500m at 100 Mbps or 900m at 10 Mbps on twisted pair and 1500m on coaxial cable PoE pass-through can be used to provide power redundancy for PoE IP cameras with previously installed power drops. Protecting Copper Media transmission Equipment from the Effects of Lightning and Other Voltage Transient Events With the advent of long-distance transmission of Ethernet data through copper media, such as CAT-5E/6E wiring, unshielded telephone-grade twisted pair (UTP), and coaxial cable, it has become necessary to consider the protection of the field and head-end equipment from voltage transient events, including lightning and other high-voltage conditions. Stray voltage conditions should be considered as well. For the field or outdoor equipment, such as a CCTV camera, access control equipment, etc., the “45 degree cone of protection rule” should be rigorously observed. Ideally, the camera and housing should be located beneath an imaginary 45 degree angle drawn from the top of the supporting structure or building. If it is not practical or possible to do this, a properly grounded lightning rod must be installed in the near-field of the camera, so as to attract lightning or other static discharges away from the equipment. Otherwise, the risk of a near or direct hit to the camera becomes significant, and no existing technology can protect delicate electronic equipment from a direct lightning hit. As an example, unprotected parking-lot cameras installed on metallic support masts, or cameras mounted on metal-skinned buildings are particularly susceptible to lightning damage. If the camera is mounted to a metallic structure, it becomes necessary to electrically and mechanically isolate the camera from the structure. This may be easily accomplished by the use of plastic or nylon screws, washers, and other non-metallic hardware, to effectively isolate the camera housing and its associated wiring away from the structure. The camera and all related equipment must electrically float relative to ground on the structure. If there are grounding attachment points or connections (i.e. screws, nuts, etc.) on the camera, the camera housing, or any other equipment located in the field and related to the camera, they must be individually wired to the modem ground connection with a minimum of 12 gauge solid conductor (not stranded) wire, but do not connect any of this equipment to earth ground. This single-point or star grounding practice is highly effective for protection against high voltage transients and low-voltage ground loops, and can eliminate troublesome video hum bars that otherwise may occur. Standards  RFC-2544 TCP/IP network bandwidth packet transmission standards  IEEE 802.3af PoE,  RFC: 768 UDP, 2068 HTTP, 793 TCP  791 IP, 1783 TFTP, 894 IP over Ethernet.  NEMA TS-1/ TS-2 Environmentally hardened, to the requirements of for most out-of-plant applications Reference: www.comnet.net
  • 6. Jai Kumar Varma, IPS (Retd.) Naxalites again captured the headlines albeit for a wrong reason by blowing a jeep in Aurangabad on December 4, 2013 killing seven persons including six policemen of Special Auxiliary Police (SAP). The SAP was raised in 2006 to handle the problem of Left Wing Extremism in Bihar. The Naxalites also looted the arms & ammunition including the Self Loading Rifles of the SAP. Aurangabad which is abutting Palamu District of Jharkhand is a stronghold of Naxals. Although no group has taken the responsibility of this dastardly act but according to informed sources Communist Party of India (CPI) (Maoist) which is strongest and largest is behind this attack. In fact TPC (Tritiya Prastuti Committee) a faction of CPI (Maoist) is active in this area but TPC does not involve in such attacks. The aim of Naxalites or Left Wing Extremism (LWE) is to overthrow the lawful government through mass mobilization and armed struggle. LWE wants to capture the power, territory and resources. They proclaim that they are fighting against exploitation of poor and for the rights of landless farmers, sharecroppers, untouchables and tribal people of India. The Maoists have neither faith in the democratic government of India nor owe allegiance to the Constitution of the country. In the early years both state and central governments treated LWE solely as a law and order problem and dealt it with iron hand hence it appeared that the insurgency is curbed but it was only suppressed outwardly and cropped again with augmented force. Several groups of Naxal movement joined together and merged in CPI (M) which became the biggest and most powerful group of LWE. Naxalites have powerful presence in several states of India including Andhra Pradesh, Bihar, Chhattisgarh, Jharkhand, Madhya Pradesh, Maharashtra, Orissa, Uttar Pradesh and West Bengal. In 2011 LWE had influence in 182 Districts of India. The LWE threat is enhanced up to the extent that Prime Minister Manmohan Singh stated on May 24, 2010 that Naxalism remains the biggest internal security challenge and it is imperative to control Left-wing extremism for the country’s growth. The Maoists controlled tribal region, mineral rich forest areas are called ‘Red Corridor’. The tribal of Red Corridor are fully exploited by industrialists, corrupt bureaucrats and politicians who have displaced them by grabbing their mineral rich forest land for mining, establishment of wild life parks and sanctuaries. These tribals were displaced from their land and neither government nor industrialists made any viable arrangement for them. According to an estimate about 20-24 million tribal people were displaced between 1951-2005 due to various mega hydro- electric projects, dams, mines excavations etc. The Naxalites earn the good will and faith of these tribal when they attack security personnel, rural landlord, businessmen, politicians, government officials or anybody who are close to administration. The author has retired as Director, Cabinet Secretariat in 2007. He has attended several courses in India and abroad related to collection of intelligence, analysis of reports and preparation of notes under which current situation was depicted as well as future scenario is predicted. Besides this, it is also suggested in the notes what measures should be adopted so that the situation becomes in favour of the country. He has handled the internal security matters at National level beside administration of large work team. He had various overseas tenures in several countries including Pakistan. Presently he is working as Consultant in India Strategic magazine (www.indiastrategic.in). Besides working he is also writing articles in the magazine and delivering lectures in various Para military & intelligence organizations. He has special interest in internal security, terrorism, terrorist organizations in India and abroad, Naxalism, Foreign relations. He can be reached at - jai_pushpa@hotmail.com
  • 7. The LWE has a three phase plan. In the first phase the Naxalites would gain the support of masses through mass movements. In the second phase LWE will build bases in forest areas and distant places and will wage guerrilla war against administration and political system. LWE will seize control of countryside. In the third and final phase LWE will overthrow the lawful government of the land and will take control of the state. Fortunately in most of the areas Maoists are still in first phase. Besides waging an armed struggle against central and state governments LWE has also created several frontal organizations including NGOs. These organizations safeguard their interests, raise funds, make propaganda in their favor, render legal support and also provide them places of safety at the hour of need. Not only this when security forces kill any Naxalites these frontal organizations raise lot of hue and cry but generally remain silent when LWE kill security forces personnel, innocent villagers or contractors men. According to intelligence reports LWE has relations with secessionist groups of North Eastern States of India, Liberation Tigers of Tamil Elam (LTTE) and Maoists of Nepal. LWE is getting arms & ammunition from LTTE and training from terrorist groups of North East. Maoists of Nepal extend all type of assistance to LWE. Foreign agencies like Inter Service Intelligence (ISI) of Pakistan support separatists either directly or through dummy organizations. The Maoists have a better intelligence network then the security forces. According to a rough estimate there are about 15000 to 20000 armed LWE fighters and a large number of sympathizers all over the country which includes so called intellectuals, media persons and others. The LWE problem is not merely a law and order problem and the effected state governments cannot solve it separately or jointly. The Central government must take the lead and play a pro active role. In 2009 Naxal Management Division under Ministry of Home Affairs (MHA) started looking after the LWE problem. Several units of Commando Battalion for Resolute Action (COBRA) were constituted under Central Reserve Police Force (CRPF). These units are especially trained in guerrilla warfare. Besides these units about 50000 officers and men of Para military forces were sent in troubled states. Secondly the problem has to be dealt politically as well as economically. The main aim is to persuade the so called terrorists to surrender their arms and join the mainstream. Hence several poverty eradication programs, for improvement in rural housing, removal of malnutrition among children, construction of roads in rural areas, electrification etc. were introduced. Unfortunately these poverty alleviation programs could not achieve desired results due to rampant corruption in their implementation and severe opposition and propaganda by LWE. The administration should impart job oriented education to its growing youth population so that the unemployment can be curbed. Several political leaders, bureaucrats, businessmen, have developed selfish interest as well as close relations with the LWE. It is essential to break this nexus as they do not want to eradicate the influence of LWE in the area of their interest. The government should give more powers to local administration so that tribals are recruited for the implementation of various poverty eradication programs. The surplus government land can be distributed among the landless tribals. The police forces of all the LWE affected states except Andhra Pradesh are poorly funded; have obsolete weapons, age old communication system, neither they have adequate training nor will to combat Naxalites. The local administration is corrupt and lacks the will to counter the LWE. The
  • 8. officials of police forces should be trained, modern weapons and amenities should be provided to them. The need of good and timely intelligence for security operations cannot be over emphasized. The Para military forces are dependent on the intelligence network of state police as well as of Intelligence Bureau. However very less actionable intelligence, was received by Para military forces from them because of various reasons. Now CRPF has created its own intelligence wing, hence it is expected that soon CRPF will be capable to collect actionable intelligence itself which will be helpful in conducting more result oriented operations. In most of the countries offensive counter-insurgency operations are conducted by army. However Indian army is reluctant to take over these operations as LWE effected areas are far-off from international borders and army’s primary responsibility is to safeguard the borders of the country. Hence a specialized force on the pattern of Greyhounds of Andhra Pradesh with specialized powers, weapons, training, and facilities should be created to encounter the LWE problem. There should be an Integrated Action Plan and inter-state coordination should be enhanced. A long term strategy should be chalked out between Centre and all Naxalite affected states and all planning, resources, intelligence should be disseminated from there for action against LWE. Sagarika Chakraborty With more than 13,000 investors waiting for their default debts to be paid off by National Spot Exchange Ltd (NSEL) (amounting to approximately INR 5,600 crores), the Indian corporate tapestry has been re-introduced to some old fears. The mandates are already out to initiate civil and criminal proceedings against NSEL however, what really lacks a mandate is the process or the lack of it that landed the investors in here in the first place. The boon of the corporate sector also brings along with itself the bane of increased cases on non-paybacks of loans. With the IBA and the RBI already setting stringent norms on asset disclosure or Know Your Customer (KYC), little is needed from the policy point of view – however, what goes into practice is another story. The pledged assets at times of stress are often found inadequate to cover exposures and cash flows often a trickle versus the outstanding amount. Perpetrators of serious financial/ corporate crimes, use advanced technological and other measure to easily hide the flow of stolen funds or immoveable/ moveable assets and attempt to conceal them from detection. The ideal solution to the above for banks / financial institutions, to the problem seems to identify all avenues of cash flow, asset assimilation and keep the list handy before the rough times hit the shore. The Central Banks across the globe have in recent times, under numerous circumstances emphasized on the need of a checklist to be adopted by financial institutions while dealing with new debtors. The checklist and its usage, coupled by the credit ratings and financial diligences are found to be the only way to manage contingent risks related to non-repayment of dues. However, saying that – such a scenario is only followed in policies and on paper. Author is the Head - Western Region for Pinkerton India (www.pinkertonindia.co m) and alumnus of ISB, Hyderabad (Year 2012). She specializes in corporate investigations and security risk consulting.
  • 9. Banks / Financial Institutions till date prefer diligences at a restricted level, governed by the biases of credit ratings and checks. Aspects of risk management of physical assets and overall reputation of the debtors are still not given the due thought that the current situation mandates. Due Diligence as the term indicates in common parlance is the necessary steps that need to be taken up by a creditor at the outset of extension of credit or renewal of old credit facilities. The commonly red flagged areas of due-diligence that are ignored by financial institutions are:  Checking into the market reputation of the corporate or its promoters on a ground level  Checking with other financial institutions as an informal method of reference about the credit history and list of assets forwarded by the debtor  Conducting a revalidation into the list of assets during renewal of extension of credit lines The above coupled by the absence of exposure to asset tracing experts add to the woes of the financial institutions including banks. Further, even for experts identifying assets that are stashed across jurisdiction is no easy a task. It is to be remembered that asset tracing investigations generally require a focused and consistent approach in order to achieve their ultimate objective: identify assets underlying a business deal or recover assets that were misappropriated. Also, there are no fixed rules when it comes to tracing of misappropriated assets, even for the experts. The most experienced ones often resort to a 3 pronged approach to conduct a holistic diligence study all aspects with regard to the debtor and his business. The process starts with establishing a linkage between the parties via an intelligent analysis to determine the title of assets or to identify cross links between different entities and individuals (Link Analysis) and then connecting the dots between the various assets - moveable, non-moveable and funds (Charting Analysis) to know about pertinent ownership of such assets. Apart from the technical sources and various forensic tools involved the entire process is heavily dependent on the tapping of human resources in gathering information and intelligence about the parties involved in the transactions (Human Network Analysis). Though it all sounds good and extremely suave, the lack of clarity for various aspects of law in India, the unwillingness of banks / financial institutions to accredit the above mentioned modalities poise a lot of hindrance and delay. Quite often than not, the time lag in taking a decision on conducting such an exercise also gives the debtor ample opportunity to wash away his hands from such assets and make tracing almost impossible. The immediate step is to realize that the advancement of technology and intelligence can be used both to ensure that corporate misgivings are avoided as well as to execute them to near perfection. It is therefore essential that financial institutions wake up to the need of credibility checks of debtors on a holistic level in order to reduce instances of contingent fugitive recovery and stabilize the corporate debt tapestry of the economy.
  • 10. By Col NN Bhatia (Retd) Besides numerous other things, I had always admired two the most in recent times. The one is ‘The Delhi Metro’ and the other Mr Elattuvalapil Sridharan who constructed it. This extra ordinary Indian engineer has not only made Delhi Metro but was also involved in the construction of the Kolkata Metro, Cochin Shipyard Limited as its CMD, Konkan Railway and has been bestowed with over 60 national and international honours and awards that include Man of the Year by The Times of India (2002) CII (Confederation of Indian Industry) Juror's Award for leadership in infrastructure development (2002–03), One of Asia's Heroes by TIME (2003), Padma Shri and Padma Vibhushan. The Metro Ordeal I had unscheduled visit to Kirtinagar on 9 Dec 2013 by Delhi Metro to attend the prayer meeting of a distant relation’s demise. I walked up to Golf Ground Metro Station at 1445 hrs and caught the train at 1500 hrs that should have reached Motinagar Station around 1540 hrs. To my horror Metro was crawling and halting intermittently before and after every station for 5-10 minutes. The train was overcrowded and I had to stand perforce amidst shrills and cries of numerous babies getting restless. Since there are no toilets in Metro trains and doors remained shut, many oldies like me with bladders to brim had harrowing times. Unfortunately, there was no announcement but passengers were talking that there was some technical snag. To make matter worst the train stopped over the Jamuna River Bridge for over 30 minutes. From Rajiv Chowk onwards the train moved smoothly and I reached Motinagar 5 minutes to 5 pm. The next day’s Times of India carried the big news ‘Cable missing, Metro services on Dwarka line held up’. The paper says the damage was intentional there by suggesting major cable theft of 700m length that could be sabotage as well. The fact that the signaling cable theft in Delhi Metro‘s Blue Line caused inordinate delays and overcrowding at stations on Monday the 9 Dec 2013, needs to be thoroughly investigated. I am sure the Metro Management along with police and the CISF deployed for its protection must have formulated its security management keeping the threat analysis in mind, highlighting every possible threat to Metro and counter measures to optimize its security along with that of passengers and its infrastructure. Also, any compromise to its security would be fodder for the media denting our good governance and credibility. The Delhi Metro Corporate Office must deliberate and answer these questions:-  Is track being patrolled in the intervening night period between the last night trains to the time first trains starting the next morning? If yes, what is the frequency and if no why it is not being patrolled? There is need to have armed patrol cars to keep up the surveillance.  Is the entire track under the CCTV coverage or not and what are the tell tale signs?  What measures Metro administration would be taking to ensure safety and security of its property and the passengers?
  • 11.  Is Delhi Metro capable of warding off chemical, biological, radiological and nuclear (CBRN) threats by terrorists /anti national elements (ANEs)?  The SCADA (Supervisory Control and Data Acquisition) also called Industrial Control Systems (ICS) widely used in totally computerized management in mass transit industry like Metro, power generation, sewage management, ports, airports, refineries, steel plants and shipyards etc, can be hacked easily by our anti national elements (ANEs), terrorists and enemy countries to project our country adversely in the world’s eyes as soft state unfit for investment. We need to develop SCADA hacking counter measures and our experts know what these are and Government’s desire should not be lacking to implement them. It is amazingly shocking that 700 meters of signaling cable goes missing/damaged and Metro administration comes to know that only after that had happened so late to rectify defects and normalize its operations. We need to ward off acts of sabotage both in underground and elevated sections including derailments, accidents, fires, earthquakes, flash floods and the sarin gas like attack witnessed on the Tokyo subway as act perpetrated by members of Aum Shinnkyo on 20 March 1995. We need to learn that there had been major attacks on such trains in Madrid, Moscow and London in the recent past. ICISS at LinkedIn: http://www.linkedin.com/groups?gid=4413505&trk=hb_side_g ICISS at Google Group: https://groups.google.com/forum/?fromgroups#!forum/icissm Suggestions & feedback may be sent to us on e-mail: onlineicissm@gmail.com
  • 12. P.S. - If you don't like to receive our newsletter, we apologize for bothering you. Please let us know your mail address and we will move it out from our contact list, thank you!