Monthly newsletter of International Council of Security and Safety Management.
The ICISSM web-site (http://sbtyagi.wix.com/icissm), the ICISSM Goggle group (https://groups.google.com/forum/?fromgroups#!forum/icissm), and the ICISSM LinkedIn Group (http://www.linkedin.com/groups?home=&gid=4413505&trk=anet_ug_hm)
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
News letter sept 13
1. New
wsletter Septe
r:
ember 2013
Let’s profes
ssiona
alize th prof
he
fession
nals…
http://www
w.wix.com/sb
btyagi/iciss
Air Commo
A
odore (Ret Jasjit Singh, one of India's leading strategic th inkers, passed away on
td)
S
y
h
Sunday, 4th August 13 He was 79.
S
3.
He was cre
H
emated at the Brar Square cre
S
emation gr
round with many ser
rving and retired officers
r
fr
rom the th
hree services prese
ent. IAF ch
hief Air Ch
hief Marsh N.A.K. Browne and other top
hal
officers laid wreaths.
o
d
Known
as
a
passion
nate
professio
onal, Jasjit Singh tau
t
ught
flying to many top air fo
o
orce
officers. He heade the Institute
ed
for
De
efence
Studies
S
and
Analyses (IDSA) for a long
s
tenure a
and after re
etirement f
from
there, se up the Centre for Air
et
r
Power S
Studies (CA
APS), the t
think
tank ded
dicated to modern and
o
futuristic air power trends. CA
c
r
APS
has don many useful studies
ne
on air po
ower strate
egic issues for
s
the India Air Forc (IAF).
an
ce
rote
or edited
an
He
wr
astonish
hing numb
ber of bo
ooks
tributed in positive to the
o
and cont
y
go-ahead f India's 1998 nuclear explos
g
for
sion, when IDSA was asked by the gove
n
ernment ab
bout
th likely in
he
nternationa implications. Both he and K. Subrahm
al
K
manyam, h is predece
essor in ID
DSA,
prodded the governm
p
e
ment to go ahead.
a
Born July 8 1934, Ja
B
8,
asjit was awarded th Vir Cha
a
he
akra for dis
splaying g allantry du
uring the 1
1971
War. As a s
W
squadron l
leader then he attac
n,
cked and destroyed many Pakis
m
stani tanks and bunk
s
kers.
He displaye determination and devotion to duty of a high order, accord
H
ed
d
ding to the citation for the
r
honour.
h
n
resident AP Abdul Kalam con
PJ
K
nferred Pad
dma Bhushan, the c
country's second highest
In 2006, pr
civilian awa on him for his co
c
ard,
m
ontributions in strateg thought.
s
gic
Capt SB TyagiCICISSSept.13
B
1
2. D.C. Nat IPS (Re
th,
etd.), PPM IPM
M,
About the Autho
t
or:
Mr. DC Nath is Ch Patron of Internation al Council of Security & Safety Man
C
hief
nagement. Su
uperannuate in
ed
Januar 1995, as the Special Director, Int
ry,
telligence Bu
ureau, Mr. D.C. Nath (IP
PS-1960) has been a visiting
s
faculty to a number of Institutes (like the In
s
ndian Institute of Public Administration (IIPA), Sar
e
A
n
rdar Vallabhb
bhai
Patel N
National Police Academ (SVPNPA Lal Bah
my
A),
hadur Shastr National A
ri
Academy of Administra
ation
(LBSNA and Aca
AA)
ademies, including Mana
agement Trai
ining Institute covering different asp
es,
pects of secu
urity
and ind
dustrial security managem
ment.
Winner of both the honors av
r
e
vailable in th police se
he
ervice, name Indian P
ely,
Police Medal for meritorious
l
service and the P
es
President’s Police Medal for distinguished services, and the Prime Minis
P
ster’s Silver Cup
Essay Compe
etition at the National Po
e
olice Academ in two su
my
uccessive ye
ears,
Mr. Nath had made a ver significant and highlyM
ry
t
-appreciated presentatio at
d
on
IIM Lucknow , on “Image Building for IPS Officers at the Vertical Interac
M,
s”
ction
Program for s
senior IPS off
ficers.
Recognition fo his over 40 years’ exp
R
or
4
perience and expertise in the field ca
d
ame
fro such di gnitaries in this field as the Chair
om
a
rman (Mr. Jeff M. Spiv
J
vey),
American Soc
ciety for Industrial Security (ASIS), 2007, the most recognized
m
au
uthority in th e world, who wrote, “You are well kn own to many people I talk to
o
u
y
ar
round the wo
orld. When I mention Ind and your name they either know you
dia
r
or know of you
r
u…. A good legacy.”
The author of a highly acc
f
claimed book "Intelligenc Imperative for India", Mr.
k,
ce
es
Nath earned high plaudi from all around for two of his very signific
its
cant
presentations on: “
“Revisiting th Future of India” (2005 London) and “Lessons from India for the War On
he
5,
a
s
r
Terroris
sm” (2007, USA). Know for his p rofessed tra
wn
aining ability, he is affec
,
ctionately ad
ddressed as the
“Drona
acharya” and is considere a security ideologue and as such is in demand from Corpo
ed
y
a
d
orate Houses for
s
talking to senior b
business exe
ecutives as a
also to orga
anize custom
mized trainin g courses for their secu
urity
personnel.
His nam figures in the Americ Police H of Fame, a Trust of the US Natio
me
n
can
Hall
,
t
onal Association of Chief of
fs
Police. In Decembe 2010, the Internationa Who’s Wh Historical Society incl uded his name in the 20
er
al
ho
0102011 e
d
edition of the “Internation Who’s W
e
nal
Who of Profe
essionals”. All this indeed speaks vo
A
olume about Mr.
Nath’s standing in the field of private secu
urity all over the world. Thus, in more than one sense, he is the
T
e
s
s
only on in the field, combinin the exper
ne
ng
riences of a police office with speciialization in intelligence and
er
strategic analysis a an indust
and
trial security expert par excellence.
e
er
S
ttack on th Indian Parliament on Decem
he
P
t
mber 13 or the
r
Whethe it is 9/11 in the US or the at
blasts at Bali or Istanbul, the terroris have st
t
sts
truck terror in no un mistaken terms. Th
t
hreat
percep
ption at eve level ha changed and secu
ery
as
d
urity conce
erns are no in every
ow
ybody’s mi ind
both in the government an the gen
n
nd
neral public This is good for s
c.
security industry but the
t
questio is wheth the men in securiity can deli
on
her
iver the go
oods.
ty
ofession outside the governme is not many yea old, especially in the
o
e
ent
ars
n
Securit as a pro
Asian c
continent. Private se
ecurity has made trem
s
mendous strides in th US or even in the UK
s
he
e
e
and ha numeric
as
cally overtaken the public poli in thes countrie
ice
se
es. Profes
ssionally a
also,
there a now ex
are
xperts, spe
ecializing in different aspects of security. Private security sta
n
arted
growing on scien
ntific lines in the deve
eloping cou
untries only in the ‘60 of the last century It
0s
y.
gained some mo
omentum in the last one or tw decades in Asia a
wo
s
and around but that has
d
been p
possible p
primarily because of demands of the industrial s
f
s
sector and compara
d
ative
inability of the s
y
security ag
gencies of the gover
rnment to meet the growing challenges on
s
accoun of their c
nt
commitmen to over nationa security concerns.
nts
rall
al
c
Capt SB TyagiCICISSSept.13
B
2
3. So, the moot question remains: how professional are those in private security, which in
most of the countries is being headed or guided by retired folks from the armed forces or
public police. Ironically, many among them, even though they had otherwise been bright,
might not have any occasion, during the course of their service career anything to deal with
security as such.
Yes, a disciplined or uniform background can be an asset but that cannot automatically lay
claim to expertise in security matters. And, then, on top of this, commercial security is
basically a lot different from government security – both in concepts and in execution.
While one can or may have to aim at optimal or absolute security system in some
government sectors, security management in the private sector will often have to balance
between the costs and the returns thereof. The good thing, however, is there are now
indications of fresh graduates joining private security directly and trying to make a career in
security as a profession. This trend deserves to be encouraged.
Conceptually, appreciation of security is, and has to be, largely subjective because too
many variable factors are to be considered before someone can arrive at a proper security
assessment. A security threat to Mr. X may not be so to Mr. Y. A security threat today may
not remain a security threat tomorrow. A security threat in a specific situation may not pose
any threat whatsoever in a different context. Then, just like an ailment is often diagnosed
differently by different medical professionals, the threat perception of a situation can vary
owing to the professional ability or expertise of the security assessor. So the debate raised
by some whether security is a vocation or a profession goes on but does not really cut ice
any longer. The issue is now settled. Security is as much a scientific profession as many
others. Threats can now be professionally analyzed and a threat assessment arrived at
according to some settled norms.
There is yet another aspect warranting professional approach. The primary aim of any
security system should be to prevent or deter mischief-makers but oftentimes breaches in
security take place in spite of elaborate arrangements. Some acts of sabotage or
subversion or of terrorism these days, particularly when perpetrated by suicide squads,
cannot indeed be prevented. So, the best thing in such circumstances is to work out in
advance plans to control damages or efficiently manage the post-incident situations.
Indeed, management of such crisis situations is a skill that security managers must develop
as a part of their professional duty. This could often be the test of professionalism of
security men.
There could, however, be some caveats in it. Many of the private security agencies do not
have training system or facilities worth the name and so professionalism in security industry
suffers. As in almost every sector even in the government, expenditure on training is
generally considered an avoidable overhead in a majority of the corporate sector as well. It
is a pitfall that has to be avoided. As a matter of fact, it is imperative that private security
practioners spend adequate time and resources on training and sincerely devote
themselves to reach and attain adequate professional knowledge and status. It is only then
they would get the recognition they are hankering for but to attain which they are often not
doing enough.
Professionalism in security is must not only for the security practioners but also for the
security and safety of all those they are obliged to serve and protect.
Capt SB TyagiCICISSSept.13
3
4. It has im
mmense potential for security a
r
application
ns!
Resear
rchers at th Georgia Institute o Technology want to put your signature up in ligh -he
a
of
t
r
e
hts
tiny lig
ghts, that is. Using thousand of nan
g
ds
nometre-sc
cale wires , the rese
earchers h
have
developed a sen
nsor devic that con
ce
nverts me
echanical pressure - from a signature o a
p
s
or
fingerp
print -- direc into lig signals that can be captured and proc
ctly
ght
s
b
d
cessed opti
ically.
The sen
nsor device could prov
e
vide an artif
ficial sense
of touch offering s
h,
sensitivity comparable to that of
c
e
the hum skin. B
man
Beyond colle
ecting signa
atures and
fingerpr
rints, the te
echnique co
ould also b used in
be
biologic
cal imaging and mic
g
cro-electrom
mechanical
(MEMS systems. Ultimately it could provide a
S)
y,
new approach for h
human-mac
chine interfa
aces.
"You ca write wit your pen and the s
an
th
n
sensor will
optically detect wh you write at high resolution
y
hat
and with a very fas response rate," said Zhong Lin
st
Wang, Regents' professor an Hightowe Chair in
nd
er
the Sch
hool of Mat
terials Science and E ngineering
at Geo
orgia Tech. "This is a new pr
.
rinciple for
imaging force tha uses pa
g
at
arallel dete
ection and
avoids many of the comp
plications o existing
of
pressur sensors."
re
"
Individu zinc oxid (ZnO) na
ual
de
anowires th at are part
of the d
device oper
rate as tiny light emitt ing diodes
y
(LEDS) when placed under strain from the
)
mechan
nical press
sure, allow
wing the device to
provide detailed in
e
nformation about the amount of
pressur
re being applied. Known a
as piezophototro
onics, the t
technology -- first des
scribed by
Wang i 2009 -- provides a new way to capture
in
informa
ation about pressure applied at very high
resolution: up to 6,
,300 dots pe inch.
er
The re
esearch wa scheduled to be reported
as
e
August 11 in the j
journal Natu Photon
ure
nics. It was
sponsored by the U.S. Dep
e
partment of Energy's
f
Office of Basic E
Energy Sciences, the National
e
Science Founda
e
ation, and the K
d
Knowledge
Innovat
tion Program of the Chinese Ac
C
cademy of
Science
es.
This sch
hematic sho
ows a devi
ice for ima
aging
pressure distribution by the pi
e
n
iezo-phototr
ronic
effect. Th illustratio shows a nanowirehe
on
-LED
based pressure sen
nsor array before (a) and
after (b) applying a compres
ssive strain A
n.
convex character pattern, su
uch as "ABC,"
molded on a sapph
hire substr
rate, is use to
ed
apply the pressure pattern on the top of the
e
n
f
indium-tin oxide (
(ITO) elec
ctrode. (Cr
redit:
Courtesy of Zhong L Wang)
y
Lin
Piezoelectric mate
erials generate a cha
arge polariz
zation when they are placed under strain. The
n
piezo-p
phototronic d
devices rely on that ph
y
hysical princ
ciple to tune and contro the charg transport and
e
ol
ge
t
recomb
bination by t polariza
the
ation charge present at the ends of individua nanowires Grown at a
es
a
al
s.
top
gallium nitride (Ga film, the nanowires create pix
aN)
e
s
xeled light-e
emitters wh
hose output varies with the
h
pressur creating an electro
re,
oluminescen signal that can be integrated w
nt
with on-chip photonics for
s
data tra
ansmission, processing and record
g
ding.
under strain you creat a piezoellectric charg at both e
n,
te
ge
ends
"When you have a zinc oxide nanowire u
which f
forms a piez
zoelectric potential," W
p
Wang explained. "The presence o the poten
of
ntial distorts the
s
Capt SB TyagiCICISSSept.13
B
4
5. band st
tructure in t wire, causing elect rons to rem
the
main in the p-n junction longer and enhancing the
p
n
d
g
efficienc of the LE
cy
ED."
The effi
iciency incr
rease in the LED is pro
e
oportional to the strain created. Diifferences in the amount of
o
n
strain a
applied trans
slate to differences in light emitte from the root where the nanow
ed
wires contac the
ct
gallium nitride film. To fabrica the dev ices, a lowate
-temperatur chemicall growth tec
re
chnique is u
used
to creat a patterned array of zinc oxide nanowires on a gallium nitride thiin film subs
te
m
strate with th che
axis po
ointing upwa
ard. The interfaces be
etween the nanowires and the ga
allium nitrid film form the
de
m
bottom surfaces of the nanow
f
wires.
Story So
ource:
The abo story is b
ove
based on mat
terials provid by Georg Institute of Technol
ded
gia
e
logy, via New
wswise. The
original a
article was w
written by Joh Toon.
hn
Journal Reference:
l
Caofeng Pan, Lin Do
g
ong, Guang Zhu, Simiao Niu, Ruome Yu, Qing Yang, Ying Liu, Zhong Lin Wang. Hi
Z
eng
L
ighresoluti
ion electrolu
uminescent imaging of pressure di
istribution using a piez
u
zoelectric na
anowire LED
D
array. N
Nature Photonics, 2013; DOI: 10.1038
D
8/nphoton.20
013.191
The In
ncident Managemen System can stre
nt
m
eamline th fragme
he
ented way we use to
ys
e
deal w
with challenges.
V. Bala
achandr
ran
The author is a for
rmer Spec Secreta Cabine Secretar
cial
ary,
et
riat
www.sun
nday-guardian
n.com/profile/v
v-balachandra
an
Karnataka CM Sri Siddaram
maiah spe
eaks at the workshop on Best I nternational Practice in
p
es
Building Resilient Cities in Bangalore on Monda 5th Augu 13.
t
B
ay
ust
The Revenue D
Department of the K
t
Karnataka government needs to be con
ngratulated for
d
organis
sing a goo "worksh
od
hop" on "B est Interna
ational Pra
actices in B
Building Resilient Cit
ties"
(Augus 5-7). The aim of the worksh
st
t
hop was to anticipate, prevent and mitig
o
t
gate hards
ships
when terrorist att
tacks or na
atural calam
mities strike our expa
anding urba agglom
an
merations.
The structurall rigidity th we alw
hat
ways
notic in a go
ce
overnment seminar was
t
plea
asantly a
absent. Chief Minister
C
Sidd
daramaiah ,
in
his
h
succ
cinct
address, ou
utlined th
he role of
gove
ernment a "proac
as
ctive and not
reac
ctive" in h andling su
uch situations.
Sen
nior politica leaders like Reve
al
enue
Minister Srin
nivasa Pr
rasad, Ho
ome
Minister K.J. George and Trans
a
sport
Minister Rama
alinga Red and se
ddy
enior
cials lent s
support to this initiative.
offic
was Shashidhar Reddy,
Also present w
o
who gave the keynote spe
o
eech
outlining the role of the National
Capt SB TyagiCICISSSept.13
B
5
6. Disaster Management Agency (NDMA), which he is heading. The workshop also
assembled Indian and foreign experts on the role of media and in responding to natural
calamities and nuclear and biological threats.
I gave an example of the "pro-active" role of a government agency in my lead presentation:
In April 2008, the US Department of Homeland Security (DHS) had prepared a protection
plan to guard America from the danger of 17 million small boats around their coastline. That
was the time when Al Qaeda was planning to hit the US through a seaborne attack. The
26/11 attack could have been frustrated had our government agencies in Delhi and the
states been as pro-active as DHS in increasing our coastal security after receiving several
Central intelligence alerts on the LeT training a seaborne team. Thus when the LeT struck
Mumbai, the US police and security systems considered it as a dress rehearsal for a similar
attack on US mainland and went on an overdrive in holding training rehearsals on
preventive security.
The concept of "endless cities" emerged in 2010 after the UN Habitat meeting at Rio when
they had warned that huge urban agglomerations would stand cheek by jowl in future,
dwarfing the rural habitations. It warned that 70% of the world population would be urban
dwellers by 2050. It also warned that rapid urbanization would result in more crime and law
and order problems. In fact this concept is not new. While our government agencies and
political leadership were ignoring the rising non-traditional security threats (NTS) like
migration or climate change, other countries like Singapore and Canada have been
focusing on that for years.
In October 2007, I had cited these dangers while addressing the Indian Institute of Public
Administration (Maharashtra Chapter), pointing out that globalization had loosened states'
control over their polity. I had quoted Harvard professor Stanley Hoffman, who called this
"erosion" the "emergence of a transnational society that includes multinational corporations,
non-governmental organisations, criminals and terrorists". In 2004, the Canadian Security
Intelligence Service (CSIS) had warned in an unclassified analysis that climate change and
environmental degradation were likely to contribute significantly to conflicts and instability.
On 1 August 2013, UC (Berkeley) released a report that climate change would result in
growing violence between now and 2050. Rapid urbanisation, migration from other areas
and climate change that we see now would pose great challenges to our administration,
needing innovative strategies in handling such problems. No state government has realised
this danger. Hence the organisers of this seminar, perhaps the first of its kind in India, need
to be complimented.
In my presentation I also tried to expand the idea of "Incident Management System" (IMS.
The IMS is an innovative way in handling urban convulsions instead of the present
fragmented way we are dealing with such challenges. During 26/11 the police had to
remove the injured, get fire control equipment repaired and water replenished. This concept
was further explained in detail by a DHS delegate. IMS, which has been used in the US
since 1960s, and is now adopted by several other countries, is a model in which
government agencies come together seamlessly under a pre-determined and pre-trained
leadership, thus acting in unison and eliminating duplication of resources and confusion.
Sunday Guardian (New Delhi) Aug 11, 2013
http://www.sunday-guardian.com/analysis/how-to-subdue-urban-convulsions
Capt SB TyagiCICISSSept.13
6
7. Our vo
oices are unique to each p
e
person (including twins), a
and canno be exa
ot
actly
replica
ated.
Voice recognitio (also known as automatic speech recognitio or com
on
k
c
on
mputer spe
eech
recogn
nition) conv
verts spoke words t text. The term "voice recogn ition" is so
en
to
e
ometimes u
used
to refer to recogn
r
nition syste
ems that m
must be tra
ained to a particular s
speaker - as is the c
case
for mo desktop recognition softwa
ost
p
are. Recognizing the speaker can simplify the tas of
sk
transla
ating speec
ch.
Speech recognition is a broader so
h
b
olution which refers to technollogy that can recognize
c
speech without b
h
being targe
eted at sin
ngle speak - such as a call centre sy
ker
ystem that can
recogn
nize arbitra voices. Voice re
ary
.
ecognition
techno
ology utilize the dis
es
stinctive as
spects of
the voice to veri the identity of ind
ify
dividuals.
Voice recognitio is occa
on
asionally confused
with sp
peech reco
ognition, a technolo gy which
transla
ates what a user is saying (a process
a
ted
hentication). Voice re
ecognition
unrelat to auth
techno
ology, by co
ontrast verifies ident of the
tify
individu who is speaking.
ual
The tw technolo
wo
ogies are often bundl edo
Speech re
ecognition is used to translate
the spoken work into an account
number, a
and
Voice rec
cognition verifies th vocal
he
characteris
stics again those a
nst
associated with this account.
h
s
mponents: a physiol
logical com
mponent (
(the voice tract) an a
e
nd
Speech includes two com
Behavi
ioural com
mponent (t
the accent It is almost impo
t).
ossible to imitate anyone’s v
voice
perfect
tly. Voice recognition systems can disc
s
criminate between t
two very similar voices,
s
includin twins. The voice
ng
eprint gene
erated upo enrolme is cha
on
ent
aracterized by the v
vocal
tract, w
which is a u
unique phy
ysiological trait. A cold does not affect the vocal trac so there will
t
e
ct,
e
be no adverse effect on ac
ccuracy lev
vels. Only extreme vocal cond
v
ditions suc as laryn
ch
ngitis
will pre
event the user from using the sy
ystem.
During enrolmen the use is promp
nt,
er
pted to repeat a short passph
hrase or a sequenc of
ce
numbe
ers. Voice recognitio can u
on
utilize vario
ous audio capture devices (microphones,
o
telepho
ones and P microp
PC
phones). T he perform
mance of voice recog
v
gnition sys
stem may v
vary
depend
ding on the quality of the aud io signal as well as variation between enrolment and
o
a
e
verifica
ation devic
ces, so acq
quisition n ormally ta
akes place on a dev ice likely to be used for
t
d
future v
verification To preve the risk of unauth
n.
ent
k
horized acc
cess vie ta recording, the use is
ape
er
asked t repeat r
to
random phrases.
During enrolment an individ
dual is pro mpted to select a pa
s
assphrase or to repeat a seque
ence
of num
mbers. The passphra
e
ases select
ted should be appro
d
oximately 1
1-1.5 seco
onds in len
ngthCapt SB TyagiCICISSSept.13
B
7
8. very sh
hort passp
phrases lac enough identifying data, and long pas
ck
g
d
sswords ha too much,
ave
both re
esulting in reduced accuracy. The indiv
n
.
vidual is generally p
g
prompted to repeat the
passph
hrase or n
number set a handfu of times making the enrolm
t
ul
s,
ment proce somew
ess
what
longer than most other biometrics. E ach person can be uniquely id
t
u
dentified by the soun of
y
nd
his or h voice. A person’s Anatomy (size and shape of vocal tract combine with lear
her
s
y
t)
ed
rned
behaviours make up His or her voiice print. Latest spe
e
eaker reco
ognition sy
ystems ext
tract
feature represe
es
enting phys
sical chara
acteristics (anatomy and beh
y)
havioural characteris
stics
(such a inflection); togethe these un
as
er
niquely def
fine the ind
dividual.
Traditio
onal speak recognition system use ‘fix senten
ker
ms
xed
nce’ techno
ology. A sp
peaker utte a
ers
specific sentence to enrol and repe
c
e
l
eats the same sentence (or recorded phonemes to
s
s)
authen
nticate. Fixe sentenc technollogy has certain limit
ed
ce
tations suc has certain limitat
ch
tions
such a its inability to iden
as
ntify a spe
eaker durin a live fr form co
ng
ree
conversatio In addition,
on.
are signifi
there a
icant secu
urity risks as the system ca grant u
s
an
unauthorized access to
s
fraudul
lent parties who sim
mply play back a re
ecording of the spea
aker sayin the pas –
ng
ss
phrase In ‘free s
e.
speech’ tec
chnology t system can ident the spe
the
m
tify
eaker durin a free f
ng
form
conver
rsation in a langua
any
age. It doe not req
es
quire any specific wo
s
ords or se
entences to be
o
repeate The su
ed.
ubject can enrol while speaking one langu
e
g
uage and llater be au
uthenticate or
ed
identifie while s
ed
speaking another lan
a
nguage. Unlike fixed
d-sentence systems, unscrupulous
e
users m find it extremely difficult to fool the newer automated au
may
t
y
o
uthenticatio systems by
on
playing back a re
g
ecording.
To gain access, a random pass phra genera
n
ase
ated by the system m
e
must be re
epeated by the
y
user. A
Authorization is gran
nted after the syste determines that the correc words w
em
ct
were
spoken by the rig person On-goin g research has prod
n
ght
n.
h
duced capa
abilities that can identify
and au
uthenticate speakers in any lan
e
nguage an with free form spe
nd
eech. Free form spe
e
eech
techno
ology offers significan advantag across numerous markets:
s
nt
ges
s
s
Law Enfo
orcement and Hom
meland Security: as a sup
a
pporting te
echnology for
surveillanc and inte
ce
elligence ga
athering,
A speaker can be ide
r
entified du ring a free form conv
e
versation.
IT Security either du
y:
uring a live conversat
e
tion or thro
ough an au
utomated system,
s
Speaker c be auth
can
henticated with
or withou a spo
ut
oken ran
ndom
passphras
se.
Forensics and Intelligence: a v
voice
print can be quickly matc
n
ched
against a d
database of
o
Known p
persons of interest to
o
t
support major invest
tigations.
Banking
and
Call
C
Cen
ntres:
determine
the
identity
of
us
ca
allers
anonymou
and
authentica
ate
Customers to help prevent and
s
p
solve fraud and othe crimes.
d
er
Capt SB TyagiCICISSSept.13
B
8
9. How c
could a w
weakened British un of just 6000 troop beat Fr
B
nit
6
ps
rench forc five tim
ces
mes
its siz
ze?
How c
can the planning fr
ramework of the D-Day Landings be us
sed in the modern day
e
board
drooms?
How c strate
can
egic Intelligence hel turn tab
lp
bles on a much stro
m
onger adve
ersary?
What lessons c busine
can
esses lear from military ope
rn
m
erations?
“Everyman’s War - The recently publ ished book by Random House
r”
k
m
& MINT presents the answers to these questions in an engaging and
T,
gripping narrative. This book examines the lesson that are gleaned
g
k
ns
from mi
ilitary opera
ations in the field of tac
e
ctics, strategy, decision making
n
and tea dynamic
am
cs.
The au
uthor of the book, Ca Ragu R
e
apt
Raman has a unique blend of
career experience Raghu began his career with the Indian Armed
es.
h
Forces and during his 12 year stint th
g
here, he was in operations in
Punjab, then in th frontline at the high
,
he
hest battlef
field in the world in
Siachin Glacier fol
llowed by a tour of du in war to Angola as a UN
uty
orn
Peace K
Keeper.
We are delighted t inform th all proc
to
hat
ceeds from “Everyman's War” w go to the families o the
will
e
of
security forces who died in the line of dut for India.
y
o
e
ty
you could lo on to Flipkart or A
og
Amazon to order your copy or ge it from an bookstore, it
o
et
ny
While y
would b really appreciated if you could s
be
f
share details (on Twitt , Facebo or via email) abou the
ter
ook
e
ut
book an the caus it's suppo
nd
se
orting, with y
your friends and family A simple forward of this mail to your
s
y.
t
friends can make a big differe
ence.
Capt Ra Raman can be reached by - Email at ra
agu
n
aghu@everymanswa
ar.com | Ce +91 99 1
ell:
1000
4147 | T
Twitter: @captraman
Capt SB TyagiCICISSSept.13
B
9
10. Suggestio & feedb
ons
back may b sent to us on e-ma captsbty
be
u
ail:
yagi@yaho
oo.co.in
If you d not wish to receive this New
do
h
e
wsletters, pl
lease Reply writing ‘R
y
REMOVE’ in Subject area
and your name w be remo
will
oved from t
the list. ICI
ISS does not share em or oth details with
mail
her
any ent
tity.
Capt SB TyagiCICISSSept.13
B
10