Thursday, January 15, 2009

Security Cover of Apartments

Apartment Complex

High rise Apartments have become the main stay of urban living. This community living places at the door steps of occupants, very many conveniences that are easily not easily available. Definitely, life in these complexes are better organized and controlled and therefore more and more people are shifting into these complexes.

However, community living has its inherent problems of security. Large number of servants, vendors all move in and out at free will and are a security threat to occupants. Also, complexes often have sex offenders, pedophiles, kleptomaniacs, schizophrenics all part of affluent societies. Our near and dear ones are exposed to these threats and it is always best to ensure that a functional security system is in place.

IRIS deploys a three tier security system in Apartment Complexes. It consists of:

TIER I.
  • RFID based Access Control System at the Gate with boom barriers at the entrance and exit will ensure that only authorised vehicles enter or leave the complex.
  • All visitor vehicles will be linked to particular Apartment and license plate and driver photograph will be taken for record.
  • Perimeter watch/ protection.
  • Basement car parking, children play ground will be covered by cctv.
TIER II. Both Ground Floor and Basement to each of the tower will be through Access Control Systems. It will ensure that only authorised personnel enter a tower/ block. All logs of such entrances will be kept so as to analyse on culpability in case of any untoward incidents. This can either be:
  • Magnetic Cards.
  • RFID Cards
  • Multi Layered Audio Access Systems.
  • Multi Layered Video Access System.
  • Most preferred system is Multi Level Video access system as no unauthorised person can make an entry without the permission of the Apartment owner.
  • All lifts will be covered with cctv coverage in case required.
TIER III
  • Intrusion system.
  • Fire Alarms.
  • Gas Leak Detector.
  • Medical watch for elderly.
  • Child Watch.
The IRIS Differentiator

At IRIS we give an end to solution which encompasses all aspects of security with a single vendor. Additionally, there are no capital costs as IRIS will take care of specific requirements on a chargeable on pay as use model

Wednesday, January 14, 2009

What is Security

SECURITY THE BUZZ WORD
A MANAGER'S CHECK SHEET FOR ASSESSING SECURITY REQUIREMENTS

Post 26/11, Security is the buzz word in all forums of conversation. Many firms, establishment and individuals are all taking a fresh look at Security. Many firms and companies are in the market providing various kinds of security. A clear perception of Security has therefore become important when we analyse our requirements.

The current perception generally is 'let us put some cameras' or ' let us beef up the security by hiring another X number of guards'. Will cameras and few guards provide the necessary security. The cameras at the Chatrapati Shivaji Station picked Kasab walking in with weapon but did it prevent the heinous blood bath he let loose on innocents. In the same way, the cameras at Taj also picked up the terrorists walking in and it is not that the facility did not have guards but what followed is still fresh in our minds.

Another greatest drawback when we go in for equipment is technology evolution. Six months down the lane most electronic equipment reach obsolescence especially CCTV cameras. Added to this aspect is the collusion of guards.
The return on investment is quite low because of these factors.

It is also important that we assess the present system we have. All the systems we have currently is based on human observation and intervention. In other words if the threats are not in the visual field or if the video feed is not being watched, there will be a risk to the area being guarded. In the case of CCTVs, it is not possible for a person to continously watch a monitor or bank of monitors. More often than not some incidents will get un-noticed.
guards in criminal frauds.

It is also important that we assess the present system we have. All the systems we have currently is based on human observation and intervention. In other words if the threats are not in the visual field or if the video feed is not being watched, there will be a risk to the area being guarded. In the case of CC TVs, it is not possible for a person to continuously watch a monitor or bank of monitors. More often than not, many some incidents will not get noticed.

As on date in most of our facilities a Security plan is based on products and not on process. If products alone were enough, then many facilities would have become absolutely sterile to any threats. But this not so as products without man power cannot provide any meaningful security. In actuality, security is met counter measures are installed in depth against all possible threats. Synergised deployment of dependable electronic sensors and trained man power is the only method which provide fail safe Security. What then is the modality to arrive at a security plan or process.

One suggested method is:-
  • Carryout a Security Audit of the facility. Best is to give it to a third party who will do dis passionated assessment.
  • Assess all possible risks. This will change from place to place and facility to facility.
  • Assess all the threats that can manifest itself.
  • Plan counter measures for each of the threats.
  • These measures should be in depth so that even if one is compromised there is always a backup.
  • What monitoring facilities will be required to provide a 24/7 electronic watch.
  • What Reaction Measures need to be installed to react to the threats when it develops.
  • Formulate a Security Plan in consultation with the client.
  • Phase the plan so that it becomes more meaningful.
  • Implement the Plan.
  • Cater for maintenance plan.
  • Training of personnel in operation of the system.
  • Periodic rehearsals.
The best form of Security can be ensured if we appoint a process based company who will look after the complete system ie from assessment, formulation of plan, installation, maintenance, monitoring and response services. In this format one can well avoid the blame game which often happens in the security environment. In order to avoid large capital investments there are companies who provide all needed security services by fielding their own equipments either on an amortised model or rental model.

Iris Interactive Security Services is a company headed by Security professionals from the Army Special Forces Wing and who provide all the functions of security. It provides a single portal interaction and ensures that your facility is secured 24/7, 365 days of the year.


Security Cover for ATMs



ATMS AND PHYSICAL SECURITY

Introduction

India is in the process of a transformation from an agriculture-based society to a modern multidimensional economy. It is estimated that India will become the fourth largest economy in the world by 2020. Such transformation has several ramifications on the social structure of the society because of the widening gap between the ‘HAVES’ and “HAVE NOTS’. Fallout from these differences will be increased criminal activities which will, as days go by will become more and more sophisticated.

In the wake of deregulations in banking industry, a number of banks have come up and almost all these banks have large number ATMs established to provide best of services to their clients. While most of the possibilities of cyber/ electronic crimes are being taken care of by the banks themselves, not much attention has been given for the physical protection of ATMs. Use of brute force attacks on ATMs is on the increase globally and as the number and ferocity - of these attacks grow, the industry needs to protect not only the cash inside ATMs, but also minimize the damage to premises and, most importantly, prevent the risk of - harm to personnel.

Criminals tend to avoid areas which ensure fail safe security measures. The current practice for providing physical security to an ATM is deploying a single guard for the night at less important localities, to round the clock vigilance which means three Guards with adequate backup for leave and absence in important localities. However, this security by itself is also not fail safe as it all depends on the alertness of the guards.

A GROWING TARGET

On its own, the increased number of ATMs does not explain why they have become a point of attack for criminals. However, their placement in often less secure locations and to a lower security specification than bank-based ATMs does. For the criminal fraternity, attacks on these ‘off-premise’ machines involve limited planning and a relatively small ‘investment’. Further, the potential rewards are high with little chance of being apprehended.

A theft in these locality in addition to the bad publicity the bank will have to face, the loss also include the cash, the cost of repairing or replacing machines, damage to premises, loss of income etc. While other losses can be made up certainly the incalculable losses to the reputation of the ATM deployer will take a beating.

TYPES OF ATTACK

Physical attacks on ATMs can be divided into two categories: ‘in situ’ attacks where the ATM is not removed from the premises but attacked with tools such as car-jacks, levers and hammers where it stands; and those that involve the removal of the ATM to a different location where more time can be spent attempting to breach it.

Attacks that involve the theft of the whole ATM may be further divided into ‘ram-raids’ and ‘dig-outs’. Ram-raids involve stolen vehicles that are used to smash into the premises and then take the ATM away. This form of attack is most frequently committed against convenience ATMs in shops and other non-bank locations.

Heavier, through-the-wall ATMs in financial institutions, petrol stations, etc, are more frequently the target of dig-out attacks using construction plant such as a bucket digger to load the ATM into the pan of a heavy truck. Attacks like these have been completed in very less time.

BUSINESS VERSUS SECURITY?

When it comes to ATMs, the needs of the business and for security may compete head on. From a business perspective, an ATM should offer a low-cost, easily accessible means of delivering cash and services 24 hours a day. However, a low cost solution is not always effective from a security perspective and so could adversely impact the reputation of the business brand.

BEST PRACTICE SECURITY?

ATM security measures can be divided into three categories: first, those that provide evidence after the crime – digital TV circuits/ closed circuit TV, cameras within the ATM, access controls to the ATM and its safe that provide an audit trail. Second is by having a stronger safe to hold cash (though the safe in 90% of installed ATMs is built to a standards, it will easily be broken into by today’s sophisticated criminals and tools) and complementary features of installing the ATMs. The third group of security measures consists of deterrents - things that adversely increase the risk/reward ratio for the criminals. That is, things that increase the chances of getting caught or reduce the amount or value of cash they get away with. These include alarms intended to draw attention to the scene of the crime, and also the ability of system to acquire evidences against the crime.

There is also the possibility of ink staining the notes, but without an RBI guideline the process will not be successful. The use of Close circuit TV is also not a practical solution as an expert criminal will take the video recorder away with him, hence the solution lies in off the site recording possible through digital network cameras

Collaboration between all sectors in the ATM life cycle and law enforcement agencies or a Security Response Service provider is the key to defeating ATM crime.

THE SOLUTION

The best solution is a fine mix of man and machine combination which will in the long act as a deterrent to any criminal activity against the ATMs. This involves the following steps:

Step 1

The ATM is wired for electronic security. This will have a Control Panel, programmable Key Pad, a Seismic Sensor and a Motion Detector (optional). The ATM will also have tilt enabled network camera installed. Once the system is wired in, the control panel will be connected over the communication network to the Central Monitoring Station. The Motion Detector can be installed to pick up any movement within the ATM and when connected to the deactivation system in the main door, the detector will turn itself off when an authorized entry is made.

Step 2

In case a motion is detected or if there is any effort made to drill a hole or cut the glass and make an entry, the seismic sensor/ motion detector will get activated. The signal generated when the sensor is activated will pass through the control panel to the Central Monitoring Station where the premises are being guarded 24/7, 365 days.

Step 3

In case of a trigger, the Central Monitoring Station will immediately view the area through the pan tilt cameras and also immediately video pictures will start getting recorded. The operator will tilt the camera and start obtaining all possible evidences. In the mean time the response will also get activated and within 20 minutes uniformed professional security personnel will be at the location. All notified personnel will also be informed.

Step 4

The Police are also informed simultaneously. In due course arrest will be an automatic outcome of such criminal activities and criminals will avoid these areas.

FINANCIAL IMPLICATIONS

The cost of a complete solution will be less than Rs 5,000/- per month as against the present cost of deploying a Guard for which the Banks are paying a salary of approximately Rs 6,000/-. In the second year this will further come down to Rs 3,500/- plus AMC of the equipment whereas the expenses for the Guard will still remain at Rs 6,000/- or would be higher keeping in mind inflation and other market forces.

The solution is practical, economical and will provide round the clock security to ATMS

Tuesday, January 13, 2009

Analysis of Security for Hotels & Resorts

AN ANALYSIS OF SECURITY COVER FOR RESORTS AND HOTELS

Security Threats

  • It is very difficult to assess the type and level of threats that can manifest in the modern day socio-political scenario against a resort or a high end hotel chain. Nobody at Marriot Hotel in Pakistan had any known enmity with the Jihadis nor was it done for monetary gains. The only qualifying aspect that makes a facility, a possible target is the presence of large number of Western Tourists or an area frequented by financially affluent.

  • In addition is the requirement of insulating the facility from criminals and ensuring that the clients enjoy the facility without any harassment.

  • Lastly is the security threat that emanate from the staff and common day to day administration of the facility.

Security Concepts

In simple terms Security should be Preventive or system should be in place so that a possible threat do not manifest. Second important aspect is that it should be Deterrent and lastly it should be Investigative i.e. enough data is available to apprehend the perpetrator.


It is therefore important that we carryout a proper security analysis before arriving at a plan. A common misnomer is that Security is just few Guards and CCTV cameras. At Marriot Hotel, the Security cameras picked up the speeding truck crashing through the gate and detonating the explosives close to the hotel. The cameras in no way could prevent the attack. Therefore, it is important that an overall plan exists and then Security can be met.

A proper way to ensure safety is by analyzing the requirement on the following lines:

  • RISK – Analyze possible events which could cause a loss/ damage.

  • THREAT – What are the threats that can trigger a risk event that is dangerous?

  • COUNTER MEASURE – What countermeasures are in place to stop a threat from triggering a risk event.

  • DEFENCE IN DEPTH – Have a series of measures so that even if one is compromised the second will detect the threat.

  • ASSURANCE - assurance is the level of guarantee that a security system will behave as expected

Security Plan

No two areas can have the same security and will vary from place to place and many issues like land/ building configuration, proximity to water bodies and the local population. The type of Security cover that can be put in place will include:-

  • Access Control.

  • It is important to ensure that all entries and exits into the compound are monitored. An automated Boom Barrier with Tier Killers will ensure that no vehicle barge through a gate. A proper entry/ exit control would involve photographing the number plate and the driver. This will ensure that a tag is maintained on all the people who have made the entry into the facility. Also, at the end of the day one can easily document the people who are at the facility.

  • In addition, Access Control can be put into place in each of the building, thus preventing un-authorized entry. Any attempt at forcible entry will be known in the Central Monitoring Station and necessary reaction to limit the damage can be made.

  • Access Control can be put in place in each individual room, so that all entries can be logged and any forced entries prevented.

  • Perimeter Protection. It is very difficult to provide perimeter protection. Some of the ways it can be prevented is by having:

  • Four Quad Photo Beam Sensors. It involves four light rays so that an alarm is raised only if all four rays are cut to avoid false alarms caused by falling leaves or animals.

  • Directional Motion Detector. All weather motion detectors can be placed to ensure perimeter security.

  • Camera Solutions. Depending on the requirement and threat cameras can be placed to detect any un-warranted movements near the perimeter.

  • Camera Cover. Many types of cameras are available in the market today. With advancement in technology, the digital IP Cameras are better suited for security requirements. Also, it is important that the cameras have diagnostic capabilities to detect and prevent any threat. Some of the features are:

  • Diagnostic Cameras. One of the best diagnostic cameras is Sight Logix with a range of 1.5km. These cameras can be deployed on the sea face. These cameras have a facility where we can create virtual walls or safe areas. A camera facing the sea can be instructed to notify any movement towards the facility at 500 meters. Any such intrusion will be available to the Central Monitoring Station with a GPS fix.

  • Surveillance Cameras. Many cameras with various capabilities are available to carry out surveillance. The choice will depend on the area, light conditions and the type of surveillance. Cash Counters, lobby area, or any area that will have a larger crowd can be monitored round the clock.

  • In the past storage of video feeds were done through a DVR. With IP cameras we can do off site recording so that nobody can tamper with data.

  • Lastly any of the officials of the facility can view the area under surveillance from any part of the world.

  • People Screening and Baggage Checks. In most of the hotels there is no proper check of people entering the facility or are the baggage screened. Also, it will be in bad form if we put the normal maetal detectors in place.

    • A best form of screening people is by making them move through revolving doors fitted with metal detectors. Also each of the individual can be photographed while moving through the doors.

    • All baggage should be screened and this should be done by bell boys who receive the luggage and move them through the Xray scanner.

  • Security of Specific Areas. We will be able to provide security to any specified areas like strong room, cash tills, and store rooms. Security systems that will leave behind electronic logs of all opening and closing will ensure that a proper record is always available.

  • Fire & Smoke Detection. An efficient fire and smoke detection can be put in place. We superimpose heat detectors to give us an early warning of fire.

  • Gas Leak Sensors. Gas leak sensors to give advance notice of any leak will ensure safety.


The IRIS Advantage

It is important to understand the advantage IRIS gives to client. IRIS is an end to end solution provider and includes security assessment, formulation of security plan, installation & commissioning of electronic security systems, Central Monitoring round the clock and reaction in case of any alarm trigger. Some of the major advantages are:

  • Process based Security cover and not Product based.

  • Single vendor from start to finish.

  • IRIS Package. Any facility investing in equipment will always look at Return on Investments. In the case of Security equipment/ Cameras the technology evolution is an important aspect. Six months down the lane the equipments are obscelete and also the Security requirement may undergo a change. Secondly when we procure cameras we also need people to maintain and operate the same again adding to the cost. Lastly is the collusion factor when data is not maintained correctly. At IRIS we ask our client to define the Security Requirement, we then work out the plan in consultation with the facility and implements the plan.

  • IRIS also provides three models of Security Cover:-

  • Equipment bought by the client model.

  • Equipment amortized over 12 to 18 months period.

  • Rental Model.

Financial Advantage

The IRIS Model in the long run will always be cheaper than conventional security models. Security cover is provided with an optimal mix of high end electronic sensors and highly trained security personnel. In most of the facilities we have been able to bring down man power deployment to 50% thereby effecting large savings. Also major breakthroughs have been made in limiting pilferages.