Advertisment

Column : Security Beyond Devices

author-image
DQI Bureau
New Update

We are a young
nation, and as we grow, our nation will come across new challenges and yes, we
will learn how to overcome them. But what does not need to be learnt the
difficult way is the realization that even we as a nation are today vulnerable
to the new face of terrorism. The attack on the Parliament, or potential attack
on sensitive government installations is a pass. Today militant organizations
with sleeper cells across cities, assailants with arms and hi-tech equipment
that our policemen are not equipped withtarget soft, vulnerable public areas
like hotels, hospitals, office complexes, railway stations, etc. Their only goal
is to cause maximum mayhem and damage. The siege of South Mumbai by a handful of
men brought that fact home. Chillingly.

Advertisment

The need of the hour is not only to
neutralize those men with guns but also to build a security blanket that
detects, preempts and prevents such threats at every sensitive government
installation, tourist spot, public/office area, be it private or government.

Are We Doing Enough?

We dont need research to prove that the adoption of technology in the
security architecture helps reduce vulnerability and minimize risks. We see some
of it around us every dayat home, or at work. CCTV surveillance, for example,
helps monitor activities in designated zones, metal detectors trace all things
concealed, baggage screeners help detect explosives and weapons, access control
to secure admission in premises, and intrusion detection systems to identify and
bar intrusion, among others.

The CCTV grabs in Mumbai helped cops in
identifying Ajmal Kasab, and I am sure it will help the authorities in
establishing...but what did it do beyond that? Did it aid authorities in ceasing
or minimizing the mayhem caused? There is more technology can do than to merely
identify terrorists after a strike. It can help detect and deter the terrorists,
and also enable the rapid deployment of relief and rescue operations.

Advertisment

Managing Risk

Managing security is all about managing risk. Risk is a function of the
threats we face; how vulnerable are we to those threats; and finally, what the
consequences may be if those threats are successful. Risk does not remain
constant, however, a baseline risk profiling can be used for design and
implementation of a security system, but it must be understood that risk profile
will change both from the baseline level as well as in real-time. The security
system must be able to adapt to this dynamically changing risk profile.

It is critical that it is realized by all
involved in our system for security that there is no single solution. Mere
deployment of CCTV surveillance, baggage screeners or explosive detectors alone
will not help minimize threats. Yes they deter, but they just land up being
isolated islands of checks, with false alarms going like promotional calls on
our cellphones.

To adequately secure an environment, we
need an integrated approach to synchronize policy with process, technology,
intelligence, and on ground policing. The key is convergence of information,
communication and security technologies. This convergence and integration
allows for the coordination and adaptation of the security system to meet the
threat at hand in the fastest and most efficient manner. Such a convergence and
integration would offer actionable intelligence.

Advertisment

The key is to build a security cover that
has the ability to trigger actionable intelligence which enables authorities
to act, and react, in a security threat situation, in a focused manner so as to
prevent an attack or minimize the impact of an attack. Convergence of
information, communication, and security technologies allows coordination and
adaptation within a security system to meet the threat in the quickest and the
most efficient manner.

Beyond Cameras

Note that the system has offered more than just monitoring, it has
collected inputs from panic buttons and responded by activating CCTV cameras
over the alert zone. When multiple alerts were generated, the system
automatically responded and communicated the issue to the authorities and ground
police. Besides alerting people in the premises, the system pro-actively engaged
a premeditated response mechanism to contain damage. This is actionable
intelligence. It is not only about terminal devices, but also managing
information to minimize risks, and its impact.

Actualize Actionable Intelligence

This is exactly what P Chidambaram did after taking over as the Union Home
Minister after the Mumbai terror attack on November 26 last year. He set in
motion a quick overhaul of homeland security. This includes raising maritime
protection, borders, airports, mass-transport networks, and critical
infrastructure security.

Advertisment



A Case Scenario
Various sensors with varied functions are installed in a
building, including CCTV cameras, panic buttons, public address systems, and
gunshot detectors, among others. These components are connected to a command
and control center (C&C) and the latter, in turn, is connected to a master
C&C that operates at a central level across multiple centers. Now, the panic
button is pressed. What happens?
  • CCTV focused on the panic button focuses on to the spot where the
    panic button is pressed.
  • A signal from the panic button reaches the zonal C&C through a secure
    connection; the system directs other cameras in the region towards the
    intimated spot with operators assistance.
  • The display module simultaneously displays feeds from all these
    cameras onto the video wall.
  • The control module will flash check points to facilitate operator
    through the decision making process and decide on further course of
    action.
  • The system, besides performing these activities, can automatically
    communicate feeds to nearby ground police and headquarters.
  • The ground police locations will be mapped with the help of GIS
    modules, which are an integral component of the C&C center architecture.
  • Access control systems can be activated to prevent entry into the core
    area of the alert zone.
  • The public address system will be automatically activated to alert and
    guide people to evacuate the area.
  • Similar address systems in nearby areas will alert people to avoid
    getting close to the hotspot.
  • Training and drills can be periodically carried out to hone the
    skills, reduce response times in the event of an actual crisis.

Besides immediately operationalizing the multi-agency
center, which enables analysis of intelligence inputs on a real-time basis and
sharing of information among intelligence agencies and police forces,
Chidambaram has also talked of legislative actions like strengthening the
Prevention of Unlawful Activities Act and creation of the National Investigative
Agency.

What we need is not mere tinkering of
institutional mechanisms but a total overhaul of the security system. A report
prepared by a FICCI taskforce on national security and terrorism, which charts
out what went wrong during the Mumbai attacks that killed over 180 people,
recommends:

Advertisment

a) A compelling need to improve the countrys capabilities
with respect to terrorism related intelligence; b) Better coordination between
various government agencies in connection with the information they have access
to; c) Need to convert such information to actionable intelligence, and to
communicate it to the concerned operational agencies in the fastest way
possible.

What is required is to take a lesson from
the US post 9/11. The need of the hour is to put in place a comprehensive
national security policy framework and enable investigative agencies, on ground
policing, prosecution and the courts, to foil terror plots internally as well as
externally.

What Needs to be Done?

On the first anniversary to that black blot on the calendar, what we need is
a change in mindset. Securing our borders alone will not help, as unfortunately
the threat is closer home than we often perceive.

Advertisment



Ajai Chowdhry,

chairman & CEO, HCL Infosystems and chairman, HCL Security

Post 26/11, there have been talks about
proper training for private security guards since they are the first line of
defense in homeland security. What is also required is to make it mandatory for
the custodians of private and public places to deploy proper integrated security
systems. Further, evacuation and disaster management plans also needs to be
built in. These cannot be the responsibility of the government alone. It is
critical to bring in professional security companies in the design and
deployment of such systems, further their needs to be an integration with local
law enforcement agencies in the form of regular meeting to establish rapport,
ensure readiness, share advance intelligence and enable coordinated responses.

It is also imperative to create awareness
among citizens to take on security responsibilities on themselves. In the West,
every household invests in the basic CCTV, alarm monitoring and response, gas
detection systems, fire detection systems, and guarding services. In India,
hi-tech security is still an area of the privileged. Though the cost of such
equipment could be a barrier, creating awareness, linking insurance to security
cover enabled, legislation, etc, will help enable this transition. It will also
help create standards and competition. Therefore, mass adoption will control
costs automatically.

Advertisment

As a nation we are on the threshold of a
wave of growth that can transform the lives of millions in our country. To
achieve this, and if we are to be a destination of choice for global
investments, it is imperative that we secure our society and nation. A
legislation to make security mandatory for every Indian will go a long way in
securing our homes and society.

As citizens, a right to be secured must be
made a fundamental right.

Advertisment