news letter july 12

10
Au Spend jus to stockpi research matter of familiar w BulkAmm knockdow be fired by Luckgunn your AR-1 Again, “T getting 41 Let’s rora th st a few mi ile 6,000 r on interne minutes a ith gun ow o.com is wn prices. O y an AR15 ner.com sto 15!". When The Guard ,000 round s profe heatre s rou inutes brow rounds of et and foun nd can be wnership in one of m On the we 5 assault rif ocks Fiocc n “The Gua ian” we w ds delivere Newsle ession http://ww suspec unds o wsing the i ammunitio nd that hu shipped s the US are many webs ebsite one fle, for just hi .223 rem ardian” per were able t ed within th etter: J alize t ww.wix.com/ ct Jame of amm internet an on without ge amoun straight to c e unlikely t sites which can buy 1 t $250, or 2 mington ro used the w to follow t hree days, July 20 the pro /sbtyagi/iciss es Holm unition nd it becom any alarm nts of amm customers to have be h allow fo ,000 .223 25 cents a unds in bo website on the purcha for $17,42 012 ofessio mes st n onlin mes clear h ms soundin munition ca ' doors, no een surpris or the purc , 62grain T round. oxes of 1,0 Monday th asing proc 28.39. onalstockpil e. how James ng. “The G an be purc o questions ed. chase of TulAmmo 000, descri here were cedure thro ed 6,00 s Holmes w Guardian” chased onl s asked. Y lots of ro rounds, wh bed as "pe 41 boxes ough – po 00 was able did little line in a Yet those ounds at hich can erfect for in stock. otentially

Upload: capt-sb-tyagi-coacccfismcsc

Post on 12-Nov-2014

586 views

Category:

Documents


0 download

DESCRIPTION

You will be happy to know that this e-zine goes to more than seven thousand select security professional in the world as direct mail and is also placed in our web-site of ICISS. The link of the web-site is given below – http://www.wix.com/sbtyagi/iciss I actively encourage you to join ICISS Group at ‘LinkedIn’ and also motivate other security professionals likewise. I am confident that by becoming active member of the ICISS Group, not only you professionally will be benefitted; the profession itself will be benefitted by your active support and contribution. The link to the ICISS Group at LinkedIn is given below – http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm

TRANSCRIPT

Page 1: News letter july 12

Au

Spend justo stockpiresearch matter of familiar w BulkAmmknockdowbe fired by

Luckgunnyour AR-1Again, “Tgetting 41

Let’s

rora th

st a few miile 6,000 ron interneminutes aith gun ow

o.com is wn prices. Oy an AR15

ner.com sto15!". When

The Guard,000 round

s profe

heatre srou

inutes browrounds of et and founnd can be

wnership in

one of mOn the we

5 assault rif

ocks Fioccn “The Guaian” we wds delivere

Newsle

essionhttp://ww

suspecunds o

wsing the iammunitio

nd that hushipped sthe US are

many websebsite one fle, for just

hi .223 remardian” perwere able ted within th

etter: J

alize tww.wix.com/

ct Jameof amm

internet anon without ge amoun

straight to ce unlikely t

sites whichcan buy 1

t $250, or 2

mington rorused the wto follow three days,

July 20

the pro/sbtyagi/iciss

es Holmunition

nd it becomany alarm

nts of ammcustomersto have be

h allow fo,000 .223

25 cents a

unds in bowebsite on the purchafor $17,42

012

ofessio

mes stn onlin

mes clear hms soundinmunition ca' doors, no

een surpris

or the purc, 62grain Tround.

oxes of 1,0Monday th

asing proc28.39.

onals…

tockpile.

how Jamesng. “The Gan be purco questionsed.

rchase of TulAmmo

000, descrihere were cedure thro

ed 6,00

s Holmes wGuardian” chased onls asked. Y

lots of rorounds, wh

bed as "pe41 boxes ough – po

00

was able did little line in a

Yet those

ounds at hich can

erfect for in stock. otentially

Page 2: News letter july 12

C

Today it'sgates, guaitems out important An IT sephilosophlocking ttechnologindividual Planning deep knowcalls for ngood guys Physical aauthorizatcan be enticket chefences toaccess coa system (transportcountry. In physicarestrictingpersons. Pbouncer, keys, or tlike the mmay also access to Physical acontrol syare alloweHistoricallWhen a ddoor depekeys do nMechanicany speciunauthorizuse the pr

Courtesy: C

s significaards and cof the worthese day

ervices comy is unlikethe emplo

gies, for eas a roadb

for acceswledge of not only kes to come

access bytion, etc. Anforced by

ecker, etc.,o avoid cirontrol in th

of checkitation). A v

al securityg entrance Physical aor receptiothrough tec

mantrap. Wbe employmechanic

access conystem deteed to exit oly this wadoor is lockending on

not allow recal locks afic door anzed personrotected ar

Col D R Se

ntly differecameras. Wrkplace. Buys for many

mpany thaely to appreoyee popxample. Sblock to be

ss control the busineeeping thein without

y a person Also there y personne or with a rcumventine strict seing authorvariant is e

y, the termto a prop

ccess contonist), throchnologica

Within theseyed as a m

cally keyed

ntrol is a mermines whor enter, a

as partiallyked only show the

estriction ond keys dnd the keysn. When area, the loc

emwal (ca

ent! YesteWe were wut the fency business

at prides eciate a sepulation oStaff and e surmount

system ness and woe bad guyshassle!

may be amay be o

el such asdevice su

ng this acnse (physirized preseexit control

m access cperty, a butrol can beugh mecha

al means se environmmeans of fu areas or a

matter of whho is allownd when t

y accomplisomeone wlock is co

of the key ho not provs can be e

a mechaniccks must b

allsamydr@

erday we oworried aboces, guardses.

itself on iecurity leadout of nemanagemeted rather

needs innoork-cultures out bust

allowed deone-way tras a border ch as a tu

ccess contically contrence, see l, e.g. of a

control refuilding, or e achieved anical measuch as ac

ments, physurther manaccess to c

ho, where,wed to entthey are alished thro

with a key onfigured. Mholder to svide recordeasily copiecal key is be re-keyed

@yahoo.c

operated wout people s and gate

its relaxedder whoseewer coment may lthan a par

ovative ape of the org

also enco

epending oaffic of peguard, a

urnstile. Thtrol. An alrolling acce.g. Ticke

a shop (che

fers to thea room toby a huma

ans such access contsical key mnaging andcertain sma

and whener or exit, lowed to e

ough keys can enter Mechanica

specific timds of the ked or translost or thed.

com)

with fencetaking min

es are not a

d and opee focus is ommunicatioook at th

rtner.

proach anganization. ouraging th

on paymenople. Thesdoorman,

here may bternative ess itself) et controlleeckout) or

practice o authorizean (a guaras locks antrol system

managemed monitorinall assets.

n. An acceswhere the

enter or exand lock

through thal locks anes or date

key used osferred to ae key holde

es, nor as

en on on at

nd It he

nt, se a

be of is er a

of ed rd, nd ms ent ng

ss ey xit. ks. he nd es. on an er is no lon

He is (29 yIndianprovemanagsecurestabmanagresoulogist Col. experfor pr& echangDelhi Area commBattalArmy turnedarea! He wrestorland activitwith EnviroGover

He haand IndusSafetywith eEnviroEcolocommSHSESafety He is NCR R

nger autho

highly expeyears’ servn Army) n skillsging Safetity issuelishments, ging large rce deploics & mobili

Semwal ience & otection of environmenged the f

in Bhati while h

manding lion of Te

in Delhd it into lus

was succesration of

by afforties in coord

Deptt onment, rnment of D

as vast expknowledg

trial Secury in combexpertise reonment gy. He is

mitted in the (Security; y & Environm

ICISS CounRegion.

orized to

erienced vice in

with s in ty and es of

human yments, ity.

has passion ecology

nt. He face of

Mines e was

Eco-erritorial hi and sh green

ssful in mining

estation dination

of

elhi.

perience ge in rity and bination

elated to and

deeply e field of Health ment).

ncilor for

Page 3: News letter july 12

Electronicwide rangsystem grunlocked door remaand alarm

When a cnumber, credentialtransactio When accmatch betturn unlocthe readegreen LED The abovthus subvBob doesserver roopresentedbe a PIN, There are

som som som

Passwordsystems. where anowhere syspassworddesignatethe extancredential

A credentbeing, thasystem. Tyou have combinatiare manybit card-swhich areinclude fin

c access coge of crederants accefor a pred

ains lockedm if the doo

redential isto a conl's number

on log to a

cess is detween the cks the dooer providesD for an ac

ve descriptverting the s not. Aliceom. To pred credentia

a second

e three type

mething themething themething the

ds are a coIn additio

other persostems have, but hav

ed cohorts,t factor ofl, and three

tial is a phat enables Typically, c

(such as on of thes

y card techswipe, cone more comngerprint, f

ontrol usesentials caness based determinedd and the aor is forced

s presentetrol panel

r to an accdatabase.

enied basecredential

or. The cons feedbackccess gran

tion illustraaccess coe either gi

event this, tal and a secredential

es (factors

e user knowe user has, se user is, su

ommon men, a fourthon who kne been sete forgotte, the cohof the user e factors o

hysical/tangan individu

credentialsan access

se items. Thnologies inntact smartmpact thanfacial recog

s computen be used t

on the crd time and attempted open or h

d to a read, a highlyess contro

ed on the aand the a

ntrol panel k, such as nted.

ates a singntrol list. Fves Bob htwo-factor

econd facto, operator

) of authen

s, e.g. a pasuch as smch as finger

ans of verh factor oows you ct up to allon their smrts may prin questioverall to al

gible objecual access

s can be ss badge), sThe typical ncluding mt cards, an ID cardsgnition, iris

ers to solveto replace redential p

the transaaccess is

held open t

der, the reay reliable ol list, gran

access coccess conalso ignora flashing

gle factor tFor examplher credenauthentica

or are needinterventio

nticating in

assword, paart card rprint, verifi

ifying a usf authentic

can provideow for suchmart card.rovide thei

on and thullow acces

ct, a pieces to a givesomething somethingcredential

magnetic stand contacs and attacs recognitio

e the limitamechanic

presented. action is rerecorded. oo long aft

ader sendsprocesso

ts or denie

ontrol list, ttrol list, theres a door g red LED

transactionle, Alice hantial or Boation can bded for ac

on, or a bio

formation:

ss-phrase o

ed by biom

er's identitcation is ne a human h scenario In such ir smart ca

us provide s.

of knowlen physical you know

g you are (l is an acctripe, bar c

ctless smach to a keon, retinal s

ations of mcal keys. T

When accecorded. WThe syste

ter being u

s the credeor. The coes the pres

the door ree control popen signa for an ac

n. Credentas access b takes it;

be used. In cess to be

ometric inpu

or PIN

etric measu

ty before anow recogelement o

s. For exaa scenari

ard and patwo factor

edge, or a facility or (such as

(such as acess card, code, Wieg

art cards. Aey ring. Tyscan, voice

mechanical The electrocess is graWhen acceem will alsounlocked.

ential’s infoontrol pansented req

remains locpanel operaal to preveccess deni

tials can brights to th; he now h a two fact

e granted; ut.

urement

access is ggnized: somof authenticample, a usio, if the assword inrs for the

facet of acomputer-number o

a biometrickey fob, ogand, 125 Also avail

ypical biome, and han

locks and nic accessanted, theess is refuo monitor t

ormation, unel compaquest, and

cked. If thates a rela

ent an alarmied and a

be passed he server rhas accestor transacanother fa

iven to infomeone yocation in siser may hauser is kn

n combinatuser with

person's -based infoor PIN), soc feature) or other keykHz proxi

able are kmetric technnd geometr

keys. A s control

e door is sed, the the door

usually a ares the sends a

here is a ay that in m. Often flashing

around, room but ss to the ction, the actor can

ormation u know, ituations ave their nown to tion with missing

physical ormation omething or some y. There mity, 26 key-fobs nologies ry

Page 4: News letter july 12

An accesbarrier whAn electroalone elecinterventiocould be adecision baccess lisswitch is nuncontrollthe door. used. Reqpushed owhile the mechanicelectrically

Access colookup cadevelopmhost to thspoke witfunctions RS485. Sthe door. networks

Access co Basi

caseis usClocsuch

SemcontaPIN, to thUsuasuch

IntelmemintellconfiInfoP

The mostlegitimate

s control phere grantionic accesctric lock. on is replaa card reabut send ast. To monnot unlike tled. In casIn cases wquest-to-er the motiodoor is o

cal free egy unlocked

ontrol decan be don

ment of acche edge ofth a controare by the

Some manuThe cont

ontrol read

ic (non-intee of biometrsed for trank/Data are

h readers armi-intelligen

act, exit butthe reader

he main coally semi-inh readers arligent read

mory and prigent readeiguration upProx IPO200

t common e user throu

point, whicng accesss control dThe lock is

aced by a der, or it c

a card numnitor the dthose on rees where ewhere exit xit deviceson detectopened. Ex

gress. Thisd on exit, th

cisions arene by a hcess controf the systeol panel ae control pufactures atrollers are

ders may b

elligent) rearic identificansmitting danot uncomm

re RF Tiny bnt readers: tton), but d

r sends infontroller is itelligent rea

re InfoProx ders: have rocessing pers they arepdates and0 by CEM S

security rugh a door

ch can be can be ele

door can cos unlockedreader. Th

could be a mber to andoor positioefrigeratorexit is alsois not con

s can be or detects xiting a dos is an imhe request

made byhost or seol systemsem, or the s the hub

panel. The are pushinge IP enabl

e classified

aders: simpation, such rata to the cmon. This iby RFLOGIChave all inpo not make

ormation to nterrupted, aders are cLite IPL200all inputs aower neces

e connected retrieves e

Systems an

risk of intrr. Often the

a door, tuectronicallyontain sevd by an ophe reader biometric

n access con a mag

rs or car doo controlledntrolled, frea push-bumotion at

oor withoutportant sat-to-exit de

y comparinerver, by as has seen

reader. Thand the rspokes co

g the decisled and co

d by functi

ply read careaders outcontrol pans the most CS, ProxPoputs and oue any accesthe main co such readconnected t0 by CEM Sand outputs ssary to mad to a controevents fromd AP-500 b

rusion of ae legitimate

urnstile, pay controlle

veral elemeperator with

could be reader. Reontrol pannetic door

oors. Gened a secondee exit, a dutton or a

the door, t having toafety featuvice also u

ng the credan accessn a steady he predomreaders asommunicatsion makinonnect to

ons they a

rd number otput ID num

nel, but othepopular typ

oint by HID,utputs necess decisionsontroller anders stop wto a controystems andnecessary

ake access ol panel viam the readeby Apollo.

an accesse user will

arking gated. Typicall

ents. At its h a switcha keypad

eaders do el that verr switch iserally only e reader is

device callemotion dethe door a

o electricalre. In cas

unlocks the

dential to s control p

push of thminant topos the spokte through g to the eda host an

are able to

or PIN and mber of a user options pe of acces

and P300 ssary to cos. When a d waits for

working or fol panel via d AP-510 by

to control ddecisions

a an RS-485ers. Examp

control syhold the d

e, elevator,ly the accemost basi. To automwhere a cnot usuall

rifies the ns used. In entry is coused on thed a requeetector. Walarm is telly unlock es where e door.

an accesspanel, or he lookup ology circakes. The lo a serial cdge by placnd databas

perform –

forward it tser. Typicalsuch as R

ss control reby Farpoint

ontrol door huser preseits responsfunction in an RS-485y Apollo. door hardwindependen5 bus. The ples of suc

system is sdoor for the

, or other ess point isc there is

mate this, ocode is eny make an

number agconcept t

ontrolled anhe oppositeest-to-exit (

When the bemporarily the door ithe lock m

s control lby a readout from a

a 2009 is hookup and

connection;cing a conse using s

o a control ly WiegandS-232, RS-

eaders. Exate Data. hardware (lonts a card ose. If the co

a degrade5 bus. Exa

ware, they antly. Same control pan

ch readers

simply folle intruder. T

physical s a door. a stand-operator

ntered, it n access ainst an the door nd exit is e side of (RTE) is button is

ignored is called must be

ist. This der. The a central hub and d control ; usually troller at standard

panel. In d protocol -485 and amples of

ock, door or enters

onnection ed mode. mples of

also have as semi-

nel sends could be

owing a This risk

Page 5: News letter july 12

can be minimized through security awareness training of the user population or more active means such as turnstiles. In very high security applications this risk is minimized by using a sally port, sometimes called a security vestibule or mantrap where operator intervention is required presumably to assure valid identification.[citation needed] The second most common risk is from levering the door open. This is surprisingly simple and effective on most doors. The lever could be as small as a screw driver or big as a crow bar. Fully implemented access control systems include forced door monitoring alarms. These vary in effectiveness usually failing from high false positive alarms, poor database configuration, or lack of active intrusion monitoring. Similar to levering is crashing through cheap partition walls. In shared tenant spaces the divisional wall is vulnerability. Along the same lines is breaking sidelights. Spoofing locking hardware is fairly simple and more elegant than levering. A strong magnet can operate the solenoid controlling bolts in electric locking hardware. Motor locks, more prevalent in Europe than in the US, are also susceptible to this attack using a donut shaped magnet. It is also possible to manipulate the power to the lock either by removing or adding current. Access cards themselves have proven vulnerable to sophisticated attacks. Enterprising hackers have built portable readers that capture the card number from a user’s proximity card. The hacker simply walks by the user, reads the card, and then presents the number to a reader securing the door. This is possible because card numbers are sent in the clear, no encryption being used. Finally, most electric locking hardware still have mechanical keys as a fail-over. Mechanical key locks are vulnerable to bumping

Components of Access Control System

Turn stile

Printer

TRIPOD MOTORISED VEHICLE BARRIER

Drop barrier

PC

Door Controller

Card Reader

Page 6: News letter july 12

This appereceived f There is acirculate ta week oworld. It works lifrom sompackage fAnd sure and winecertainly d Intrigued deliverymsent sepa He then wcharge" adoorstep tHe then severything My husbacard, and machine wPIN and s To our charged/wshore arecarried whusband s Upon findwhich issuto the Polbeen simi Warning:personallyor packagidentificat Above all,yourself in

Forward

ears to be from a frien

a new andthis to ever so ago i

ke this: We outfit cafor me, anenough, a. I was vedidn't expe

about whan's reply

arately; (the

went on toas proof thato just be ssaid that tg is proper

and, who, 'John', the

which hadsecurity nu

surprise, withdrawn fea! It appeas able toswiped our

ding out theued us theice, wherelarly hit.

: Be wary y ordered, ge. Also, nion of who

, the only tnitiated the

ded by - C

another cnd in Sydn

d clever crryone you n Singapo

ednesday lled "Expred the calle

about an hery surprisect anything

ho would was, he w

e card has

o explain tat he had stolen or tahe comparly account

by this time "delivery a small smber. A re

betweenfrom our cears that so duplicater card and

e illegal trae card, ande it was co

of acceptespecially

never acceo the sende

time you se purchase

ol NN Bha

credit / debney. Well w

redit card know, esp

ore , and it

a week agess Courieer said thatour later, a

sed since g like it.

send me was only d

never arri

hat becausactually deaken by anny requireted for.

me, was staman", ask

screen andeceipt was

n Thursdaredit/debit somehow e and crea

entered th

ansactionsd our credinfirmed tha

ing any "sy if it involvept anythiner is.

hould givee or transac

atia, Veter

bit card scworth a rea

scam - bepecially yot can prett

go, I had aers" askingt the delivea deliverymit did not

such a gdelivering tved!). The

se the giftelivered thnyone. Thied the pay

anding beked my husd keypad wprinted ou

ay and account athe "mobi

ate a "dumhe requeste

s on our cait/debit accat it is defi

surprise gifves any king if you do

e out any pction!

ran (narind

cam startind....

e wary of tour family aty well now

a phone ca if I was gery would man turnedinvolve an

gift, I inquthe gift pacre was als

t containedhe packageis soundedyment to b

side me, psband to swwhere Franut and give

the folloat various Ale credit c

mmy" carded PIN and

ard, of coucount had initely a sc

ft or packand of paymo not pers

personal cr

dra_bhatia

ng to make

those who and friendsw be happ

all from somoing to bearrive at md up with any special

uired as tckage, buto a consig

d alcohol, e to an adud logical ane by cred

pulled out wipe the cank was alsn to us.

wing MoATM machcard mach(?) with ald security

urse, we imbeen close

cam becau

age", whicment as a c

onally kno

redit/debitc

a@hotmai

e the roun

o come beas. It just hapening any

meone whoe home becmy home ina beautiful occasion

to who tht allegedly gnment not

there wasult, and nond I offeredit or debit

of his walard on theso asked t

onday, $4hines, partichine" whichll our cardnumber.

mmediatelyed. We als

use severa

ch you neicondition oow and/or

card inform

il.com)

ds. Bewar

aring gifts.appened toywhere els

o said thatcause thern roughly a Basket ofor holiday

e sender a card wa

te with the

s a $3.50 "ot just left d to pay hicard only

llet his cre small mobto enter th

4,000 hadcularly in th the delivd details, a

y notified tso personal househol

ther expecof receivingthere is no

mation is w

re! - just

. Please o friends se in the

t he was re was a an hour. f flowers y, and I

is. The as being gift.

"delivery it on the im cash.

y so that

edit/debit bile card e card's

d been he north veryman after my

he bank ally went lds have

cted nor g the gift o proper

when you

Page 7: News letter july 12

Following benevolengather imafter repeinformatiohere to ac Readers aof the ma

InfoDea Atte86.3enteconf

You http:then Than- Th

is the repnt in naturportant pe

eated attemon, indicatictivate yo

are adviseils.

ormationar PayPal M

ention! Yo34.211.83 trer your accofirm accoun

can also //www.payp enter this c

nk you for uhe PayPal

productionre! Howevrsonal / fin

mpts over ing that th

our accoun

d not to re

n RegardMember!

ur PayPalried to account informat informatio

confirm ypal.com/ Clconfirmation

using PayPaTeam

Click he

of the e-ver, on furtnancial infothree mon

hese were nt was sen

espond to s

ding You

l account cess your ation to conon or your ac

your emailick on the n number: 1

al!

re to activ

-mail receirther invesormation. Tnths’ time,

non-functnding the in

such mails

ur accoun

has beepersonal firm that yoccount will

address "Confirm e

1099-81971

vate your a

ved by onstigation it The given

but for a tional URLnformation

s unless the

nt:

en violatedaccount! P

ou are not cbe locked.

by loggingemail" link

1-4441-9833

account

ne acquainwas found

link with loshort while

Ls. The Yeto third pa

ey verify th

d! SomeonPlease clicurrently awa

g into youin the Acti

3-3990

ntance whd that it w

ots of diffice without

ellow Buttoarty!

he backgro

ne with Ick the link way. You hav

ur PayPal ivate Accou

ich appeawas an attulty got cogetting an

on asking

ound of the

IP addressbelow and

ve 3 days to

account aunt box and

rs to be tempt to

onnected ny useful

to click

e sender

s d o

at d

Page 8: News letter july 12

Please taletter. I aszooming agone to sloud bangnot have N More thainjured indrivers. Atwenty fou At 60 mpdrivers’ juAccidents

Do The Dro Do Ad Us

We manunever thowhen the At last we Function When theNAP will bat preset a The angletrack of th Salient Fe

Ve Co

Erg Low Ea

cos Low

ke a minussure you at high spsleep befog! All is finiNO NAP a

n 2 million accidentAll of us arur hour soc

ph if you cudgment iss by dozing

ozing drivere impact isowsiness /

o not build sequate rese doze off

ufacture anought of m

driver is ine have deve

al Descrip

e gadget isbuzz loudlyangle.

e can be vahe position

eatures

ry light weompact andgonomicallw maintenasy to use ast effectivew cost and

For

ute from yowill not re

peed and sre you canished! You

an in- expe

n people ts caused re at a riskciety where

lose your s impaired

g drivers ar

rs do not bs at high sp/ sleepinessleep debtst before a alert gadg

nd purchaanufacturi

n danger ofeloped an

ption

s active any and insta

aried accoof the driv

ight d y designedance cost and very e d high relia

more info

our busy sgret it. Ima

suddenly yn take con

ur car had nsive safe

die and aby dozin

k of drowse a lot of p

eyes for ad, sleepinere generall

brake beforpeed and ts is red ale

t long journ

gets

se the mong a safetf dozing ofintelligent

nd driver'santly bring

ording to rever's head.

d

bility

ormation –

schedule aagine youryou see thntrol of theall the gadty device

an equal ng / drowsy driving; eople are

a second yess inducely fatal bec

re an accidthis can beert

ney is reco

ost expensty device wff and prevsafety dev

s head fallsthe driver

equirement If not in us

– Visit: http

and read thrself in a ce driver hae situationdgets but d

number awsy / slee

we live intired all the

you have es tunnel

cause

dent e fatal.

mmended

sive cars which cou

venting a povice.

s forward to full conc

t. The gravse, the sw

p://www.th

his car as a

did

are py a e time.

traveled 8vision it’s

with latestld warn thossible acc

due to drocentration.

vity switch itch should

enonap.co

88 feet. Mus a recipe

t comfort he driver acident.

owsiness, . The gadg

inside thed be kept a

om/nni-fd.h

uch worsee for an a

gadgets band co-pas

the intelligget gives th

e gadget keat OFF pos

htm

e drowsy accident.

but have ssengers

gent NO he alarm

eeps the sition.

Page 9: News letter july 12

Bringing attend evvalue cha

Se Sat Tel

Inte Tec Se Fen CC Info Ins Act Act

together svent will adain, partic

curity and tellite and lecommunerpretationchnologiescurity Riskncing and

CTV, Infrareormation S

surance ants of Militativism, Cor

senior-levddress keularly in u

Patrol ForSurveillanications D

n s used for Ck Analysis Other Phyed, SCADA

Security nd Liability ncy and Terporate So

vel securitey topics iupstream a

rces ce ata Feeds

Cyber and

ysical SecuA

errorism cial Respo

ty, businesn the formand midst

, Analysis

Maritime

urity Measu

onsibility

ss resilienm of case stream oil a

and Instan

Security

ures, Sens

nce and sastudies anand gas o

nt

ors

afety persnd cover aperations

sonnel, thiaspects of, including

is must f the g:

Page 10: News letter july 12

Su

P.S. - If youwill move it

uggestion

u don't like toout of our co

ns & feedb

o receive our ontact list, tha

back may b

newsletter, wank you!

be sent to

we apologize

o us on e-m

for bothering

mail: capts

g you. Please

sbtyagi@y

e let us know

yahoo.co.

w your mail ad

.in

ddress, we