Saturday, January 12, 2008

Electronic Security

Over the last decade, globally, several Governments have increasingly adopted the PPP (Public Private Partnership) model wherein investments from the private sector and public has accounted for a significant share and the Governments funding in projects, etc. has progressively declined. As a working model, particularly, in the area of creating infrastructure, this has attained measurable success in Power, Highways, Water Projects, Urban Transport, Airports, Seaports, Aviation, etc. Privatization of many of the Public Sector Undertakings has become a reality and the government disinvesting its stake to the investing public and also opening of avenues for Foreign Director Investment (FDI) and FII’s up to the specified sectoral limits. All these transactions are done in a transparent manner for the larger good of the Companies who are really starved of the capital needed for expanding their activities and in turn providing better services to the public.

The theme of this discussion extends to synergy between public and private sector in Security Systems. In a way, it is closely aligned to the general philosophy applicable to the PPP model in the economy. I would confine myself to the areas concerning physical security within India to our national assets. I am fully alive and aware of a totally different model adopted in US and some other countries where more than 85% of the nation’s critical infrastructure is in the control of the private sector and it is private sector civilians who have to respond to protect their national assets in crisis situations. It would be inequitable to draw any comparisons between the US model and the Indian model. My comments are made with particular reference to the banking system, with which experience I am somewhat familiar. There are other sensitized systems exclusively maintained and controlled by the Government and its designated agencies for the protection of nuclear plants, defence installations (including manufacture of aircraft and warships and military hardware), satellite launching systems and several other public buildings, valuable national assets, power systems, dams, bridges, border control at international boundaries, airports and seaports, etc. Each one of them eminently qualifies to have highly sophisticated systems for their protection at all times on a 365 days x 24/7 basis. The entire defence forces, the police, the national security and intelligence apparatus and other agencies do have a clear oversight in this area, particularly, with increasing terrorist attacks on civilian targets.

Any protective security system must address these concerns irrespective of the agency delivering the needed security. The persons working within the organizations which need this protection must be sensitized and every individual in the organization must be aware and conscious of the need for security. Periodic meetings with the key personnel and heads of departments are held and most organizations carry the post of a Chief Security Officer, who invariably is a retired defence personnel or a high ranking official from the Police Department. These men have the necessary vision and the practical experience to look at all the vulnerabilities to which a particular organization can be exposed to. Therefore, first comes the putting up of an effective system against Perimeter intrusion. Large project areas, factories, etc occupy several hundreds of acres of land, which are guarded by boundary walls and also by physical personnel carrying suitable weapons for protection purposes and in sensitive installations it is not uncommon to have observation towers at regular intervals and night vision glasses are also provided apart from powerful binoculars for observation purposes. The staff is provided with walkie talkie sets also. Most such installations observe the very valid and time tested principle of single ingress and egress to a site. Only authorized vehicles and personnel are given access. Further, thanks to the revolution which has taken place in Information Technology and photography, particularly, digital photography and videography, it is possible to see from a remote point in a control room, the images coming from different locations where the surveillance cameras are installed, concealed from the public gaze. After the entry staff are satisfied with a authorized vehicle and with it the persons who are authorized to enter the premises through the single air-locked system, the vehicles are physically inspected with undercarriage mirrors and even the engine area and the luggage boot are also checked and the persons are bodily frisked and scanned with handheld devices who are also made to pass through Door Frame Metal Detectors (DFMD). X-ray baggage scanners have now become a routine in large installations for scanning the handbags etc. The Chief Security Officer and his men and the management of any company or organization and its staff must develop that sharp eye and remain perpetually alert as the exit point for any mischief-maker is often narrow and passage through that narrow point can always be kept under tight observation and surveillance. Also the facial expressions, body language and behaviour, often reveal invariably, the ultimate intentions. Technology by itself is not adequate. What is needed is the men who operate the Technology and interpret the vast amount of information coming to them in the form of intelligence reports, images or any other input. In some locations, only selected personnel are allowed access to a limited area who are provided with biometric access cards. It is not uncommon to store the fingerprint images of the staff working in an organization who are given access cards for this purpose. All the others need to be escorted to a particular visitor’s room where meetings and discussions are held. Seldom, a visitor is given access to the actual shop floor area alone by himself. The biometric technology, the proximity cards, the digital technology using PTZ cameras have all become a part of today’s survival for existence. All the staff are sensitized by mock-drills at irregular intervals to keep them in a state of alertness and any suspicious objects are isolated and destroyed by a device using IED technology. In some locations, before the boom barrier gates, there are mechanically operated sharp ‘Tyre Busters’, should the vehicles not stop and attempt to barge inside. Bollards are also used in some areas and the men on duty are generally persons who are trained to spot the unusual mischief-maker by studying the facial expressions, and such persons are given greater attention.

Within an organization after a person enters with a proper ID card which also acts as a proximity card, the access is confined only to the areas to which he is permitted to enter. In other words, with one proximity card it is not possible to enter into another location in the same organization. In this country ‘iris’ recognition is considered to be fool-proof just as the fingerprints are also considered fool proof. Inside large factories, infra-red detecting equipments and alarm systems are also to be in place, so that the alarms get triggered whenever there is a breach and immediately alerts the police control room to which these are linked.

All these security devices underscore the need for state of art technology in protecting national assets which cannot be the responsibility of only the State and therefore, the Public Private Partnership becomes more important. While still the Government spends very large sums of money on defence expenses which are part of the overall national security plan, the demand for installing such systems for civilians in the areas has become very wide. Thus, every Company whether in the private sector or public sector has become extremely aware of the need for the sophisticated equipment, particularly, when cash and bullion and other valuables are moved from one centre to another. To the robbers there could be nothing more attractive than looting a cash van or breaking into a bank and walking away with the cash. The concerned frontline bank staff are provided with emergency panic buttons linked to the alarm systems in the event of a holdup during business hours. A large number of companies in the private sector in collaborative joint ventures with foreign companies specialized in manufacturing these equipments, have opened businesses in this country and are meeting the security needs, while the police system provide the general security for the national assets and its citizens.

In this note, I have not touched upon Computer related security systems and any disaster management processes. Practically, any worthwhile organization is now fully computerized and therefore, IT security protection the LAN and WAN systems, Firewalls, PK1, encryption etc. are all relevant and need to be acquired and put in place to prevent stealing the data or indulging in cyber crimes. Lastly, there is nothing like absolute security as each day new strategies are being hatched by the law breakers, calling for determined solutions to deal effectively every situation that arises. The companies operating in the economy need to protect themselves with all these surveillance systems and there is no substitute than sensitizing the man power to the security requirements which are relevant to a particular organization. Each nation evolves its own solutions in this area, so that they are able to nip the crime at its origin even before it takes off.

Monday, December 10, 2007

The State Of Fear

Lets Remember where we live. We live on the third planet from a medium-size sun. Our planet is 5 Billion years old, and it has been changing constantly all during this time. The is Earth is now on its third atmosphere.


The first atmosphere was helium and hydrogen. It dissipated early n, because the planet was so hot. Then, as the planet cooled, there were volcanic eruptions produced in the second atmosphere of steam and carbon dioxide. Later the water vapour condensed, forming the oceans that cover most of the planet. Then around three million years ago, some bacteria evolved to consume carbon dioxide and excrete a highly toxic gas, oxygen. Other bacteria released nitrogen. The atmospheric concentration of these gases slowly increased. Organisms that could not adapt died out.


Meanwhile the planet’s land masses, floating on huge tectonic plates, eventually came together in a configuration that inferred with the circulation of ocean currents. It began to get cold for the first time. The first ice appeared two billion years ago.


And for the last seven hundred thousand years, our planet has been in a geological ice age, characterised by advancing and retreating glacial ice. No one is entirely sure why, but ice now covers the planet every hundred thousand years, with smaller advances every twenty thousand or so. The last advance was twenty thousand years ago, so we’re due for the next one.


And even today, after five billion years, our planet remains amazingly active. We have five hundred volcanoes, and an eruption every two weeks. Earthquakes are continuous: a million and half a year, a moderate Richter 5 quake every six hours, a big earthquake every ten days. Tsunamis race across the
Pacific Ocean every three months.


Our atmosphere is as violent as the land beneath it. At any moment there are one thousand five hundred electrical storms across the planet. Eleven lightening bolts strike the ground every second. A tornado teas across the surface every six hours. And every four days, a giant cyclonic storm, hundreds of miles in diameter, spins over the ocean and wreaks havoc on the land.


The nasty little apes that call themselves human beings can do nothing except run and hide. For these same apes to imagine they can stabilise this atmosphere is arrogant beyond belief. They cant control the climate.


The reality is, they run from the storms.


Conclusion:


  • We know astonishingly little about every aspect of the environment, from its past history to its present state, to how to conserve and protect it.
  • Natural warming trend began in the year 1850, as we emerged from a 400- year cold spell known as the “Little Ice Age”
  • Nobody knows how much of the present warming trend might be a natural phenomenon.
  • Nobody knows how much of the present warming trend might be man- made.
  • Nobody know how much warming will occur in the next century.


We cant ‘assess’ the future, nor can we ‘predict’ it. These are euphemisms. We can only guess. An informed guess is just a guess.

Friday, November 2, 2007

You Are'nt My Friend

In the pre-internet days neither of us would have even thought of calling each other friends. We’d have called ourselves friends of friends who met once and yet, for some reason, kept sending each other grammatically challenged, inappropriately flirty letters with photos of ourselves attached. Police might have gotten involved.

But now we are definitively friends, having taken public vow on friendship on friend-based websites, wearing meta-phorical friendship bracelets on the earnest Facebook, Orkut etc. You message me and comment about me and write on my walls and dedicate songs to me and invite me to join groups. More than once you have taken it upon yourself to poke me.

This is hard to say to a friend, but our relationship is starting to take too much time. Its weird that I know more about you than I do about my actual friends that I hang out with in person- whom I propose to distinguish by calling non-metafriends. In fact I know more about you than I know about myself.

Also you’re a bit aggressive in our friendship. Would a non-metafriend call me up and say” Hey! Guess what? I have a bunch of new pictures of me?” or tell that he has coloured on the map all the places he has been to. Its as if I suddenly met a new group of people who were all in the special classes.

The horror is, I cant opt out. Just as I cant stop making money or my metafriends will have more stuff than I do, I cant stop running up my tally of Orkut friends or I will be a loser. Just as money made wealth quantifiable social networks have provided a metric of popularity.

I am sure social networks serves many a functions that improve our lives, such as reconnecting us with our old friends and finding out that the people we used to date are still good looking. And all networks have a messaging function, which would have made an excellent way of sending messages if no one invented e-mail.

But frankly these sites are not about connecting or reconnecting, its all about Self- branding. We’re not sharing things which we don’t want others to know. We are showing our best posed, retouched photos. We’re listing the Pynchon Books we want to think we have read all the way through. We’re allowing others to write whatever they want about us on our walls, unless we don’t like it, in which case we erase it. If we had so much privacy in real life the bathrooms at the Mumbai airport would be empty.

And like the abrasively direct ads for soaps and cleaning products at the beginning of the advertising age, our self branding is none too subtle. We’re a blunt lot, in our bikinis and our demands that our friends go right now to check out our blog postings. We are, as a social network, all so awesome that we will soon not be able to type the number 1, because we will have worn out the exclamation mark that shares its key.

Until we come out with something where we can portray our true flawed selves – perhaps a genius could invent something that takes place in the house over dinner with wine-I say we strip down our online communities to just the important ones.

With enough venture funding- by which I mean the volunteer services of a dude who knows how to make a website- I hope to launch a Truestatus.com on which people are allowed to submit their names, their occupation, a photo, a square footage of their home and a list of any celebrities they happen to know. Then other people can vote from the scale of 1 to 100 on how awesome they are. At the end of the year the ones with the most n. of votes are made the king and queen, which if I remember correctly, should send their scores plummeting. If nothing else, it should finally rid us of Tila Tequila.

Inspired from Joel Stein- TIME magazine

Monday, October 22, 2007

City Of Angles( Dialogue)

I would rather have had
One breath of her hair
One kiss of her mouth
One touch of her hand
Than an eternity without it
One

City Of Angles

“And I give up forever to touch you
Cause I know that your feeling is so nice
You’re the closest heaven that I’ll ever be
And I don’t want to go home right now
And all I can taste is this moment
And all I can breathe is your lie
When sooner or later it over
I just don’t want to miss you tonight
And I don’t want the world to see me
Cause I don’t think that they’d understand
When everything is made to be broken
I just want you to know who I am”.

Moonstruck(Definition of Love)

“I love you. Not like they told you love is. And didn’t know this either, love don’t make things nice- it ruins everything. It breaks your heart. It makes things a mess. . We aren’t here to make things perfect. Not us. Not us! We are here to ruin ourselves and break our hearts and love the wrong people and die… Now I want you to come upstairs with me and get in my bed!”

Eternal Sunshine of a Spotless Mind

“How happy is the blameless vessels lot?
The world forgetting by the world forgot
Eternal sunshine of a spotless mind
Each prayers accepted and Each wishes resigned”.