securitylinkindia

How Access Control Trends are Moving Towards Software-Defined Ecosystems

The future trends of physical access control market are evolving from a hardware centric business to a software-driven ecosystem. Advanced technologies are transforming how organizations manage security, workplace operations and building intelligence. The biometric access control technology is rapidly evolving, shaped by technological advancements and shifting user expectations. Here are key trends currently defining the application of biometric access control in various application scenarios. While some aspects of the biometric access market remain constant such as the importance of privacy protection and rising attention on ease of use and efficiency, new trends have emerged which are transforming the way users interact with their surroundings. Understanding these key trends can help access control solution providers and property managers navigate the market more effectively and better serve users. The latest trends in access control are taking this segment of physical security management to the next level of technology evolution. New biometric technologies The market research agency ResearchAndMarkets estimates the global biometric authentication market will reach around $8.8 billion in 2026, growing at a CAGR of 16.3%. Biometric technologies – like iris and palm recognition – have made significant strides, becoming increasingly applicable in high-security environments. They provide superior security compared to traditional or pure face recognition access control systems, remarkably reducing the risk of unauthorized access. Hikvision is revolutionizing access control with its latest innovations, embracing a software-defined ecosystem. Its second-generation professional access control products boast advanced features like web management, flexible authentication, and converged security solutions. This shift enables seamless integration with video security, intercom, and alarm systems, providing a unified security solution. With the overwhelming response to MinMoe face recognition terminal series, Hikvision has been at the forefront of biometric innovation, now offering more advanced biometric access control solutions including iris recognition terminal, face & palm recognition terminal to bolster access control security. These technologies make biometric access systems more versatile and reliable. Hikvision is leveraging biometric technologies like iris and palm recognition for enhanced security. Software-defined ecosystem HikCentral: A unified security and management platform offering open APIs for third-party integrations. Hikvision’s focus on innovation, cybersecurity, and sustainability positions it as a leader in the access control market. Convergence of security systems with access control In residential properties, access control is being combined with video intercom and security systems, creating seamless user experiences and improving security. For office buildings, the integration of access control with elevator systems, advertising displays, and time attendance systems is increasingly in demand, streamlining operations while providing valuable insights. Hikvision consistently leads the way in integrated solutions, offering comprehensive packages that seamlessly blend biometric access control with Hikvision’s own or third-party building management systems, encompassing video security, elevator control, smart automation, and more. Moreover, Hikvision facilitates integrated building management on a unified platform, allowing subsystems to interconnect and be managed cohesively, enhancing both efficiency and security. Modular designs are trending Flexibility and cost-effectiveness are becoming more essential when property managers considering deploying new or upgrading existing access control solutions. Modern biometric access systems often feature modular designs, enabling the addition or removal of components such as face recognition, fingerprint scanning, and QR code readers based on specific needs and budgets. This modular approach enhances functionality, offering the ability to scale and customize biometric access control solutions to different environments. Hikvision has been committed to delivering practical and cost-efficient access control solutions, with the DS-K1T671, DS-K1T673 and DS-KIT681 MinMoe series offering a variety of access control modules including face, card, fingerprint, QR code and physical button. Now our range has been extended to palm, and mobile credential modules, to meet diverse requirements and budgets. Demand for outdoor access control system grows Biometric access control systems are moving beyond indoor applications to outdoor environments. For example, modern office complexes and manufacturing parks are increasingly installing biometric access systems outdoors. This shift necessitates robust solutions designed to withstand various weather and outdoor conditions. Manufacturers are innovating products with durable materials and protective features to ensure reliable performance outdoors. Hikvision’s MinMoe face recognition products are engineered for durability. Our outdoor offerings feature waterproof and vandal-resistant designs, utilizing premium aluminium alloy materials along with rain shield accessories. The IP65 rating ensures exceptional protection for outdoor use, making these biometric access control solutions reliable even in challenging environments. Future trends The future trends of access control are betting big bets on advanced access control solutions. The future of access control systems market is looking bright, with several trends shaping the industry. We expect to see more advanced biometric technologies offering enhanced security and convenience. The smartphone or mobile phone credentials has become the key, allowing for seamless and contactless entry. Hikvision continues to make strides at the forefront, integrating advanced with access control for smarter outcomes and offering more secure environments. Read More

Read More
Siddharth

The New Wage Code & Its Impact on Guarding Operations : Challenges and Opportunities

Siddharth Dahiya CEO, Peregrine Guarding The private security industry is one of India’s most people-intensive sectors, employing millions of guards across commercial, industrial, and residential establishments. As the regulatory landscape evolves, the introduction of the New Wage Code has emerged as a significant turning point for guarding operations. The Code aims to streamline wage definitions, strengthen employee rights, health & safety and ensure fair remuneration – all critical objectives for a sector built entirely on human capital. Yet, implementation of the Code presents both operational challenges and long-term opportunities for the industry. Understanding these nuances is essential for stakeholders, employers, and clients who depend heavily on uninterrupted, reliable security services. A shift in wage structure and its immediate effects The New Wage Code introduces a standardized definition of ‘wages,’ ensuring transparency and reducing the variability that previously existed across states and organizations. For guarding operations, where salaries form the largest portion of operating costs, this change has immediate implications. Under the new framework, components like basic pay and dearness allowance must constitute at least 50% of total wages. This increases the base on which social security contributions are calculated. While this enhances long-term benefits for guards – such as provident fund, gratuity, and leave encashment – it also increases total cost-to-company for employers. For a sector operating on already thin margins, the increase in statutory payouts requires recalibration of budgets, pricing structures, and contract terms. Many clients, accustomed to previous cost models, may initially resist the upward revision in service fees, creating short-term friction. Key considerations for guarding operations under the new wage code Beyond wage adjustments, guarding operations face several practical challenges: The private security industry is one of India’s most people-intensive sectors, employing millions of guards across commercial, industrial, and residential establishments. As the regulatory landscape evolves, the introduction of the New Wage Code has emerged as a significant turning point for guarding operations. The Code aims to streamline wage definitions, strengthen employee rights, health & safety and ensure fair remuneration – all critical objectives for a sector built entirely on human capital A pathway to professionalization and industry growth Despite the challenges, the New Wage Code opens the door to several positive shifts in the industry. The most significant opportunity lies in the professionalization of the guarding workforce. With clearer wage structures and enhanced social security coverage, the sector becomes more attractive for long-term careers. Guards who feel secure, protected, and fairly compensated are more motivated, reliable, and committed – directly improving service outcomes for clients. Another benefit is the level playing field the Code creates. Historically, wage disparities allowed non-compliant agencies to offer artificially low prices, undermining quality and ethics. The new Code standardizes compliance requirements, discouraging unfair competition and encouraging clients to choose partners on the basis of capability rather than cost alone. Finally, the change incentivizes the industry to explore technology integration and process efficiencies. As wage-linked costs rise, organizations will increasingly look to deploy automation, digital reporting, remote monitoring, and smart tools to optimize manpower deployment. This creates a future-ready model of guarding that blends human vigilance with technological enhancement. Conclusion The New Wage Code is a transformative development for guarding operations in India. While it brings undeniable challenges – increased financial pressure, administrative restructuring, and contractual realignments – its long-term impact is largely positive. By strengthening wage transparency, improving guard welfare, and promoting fair competition, the Code lays the foundation for a more mature, structured, and respected security industry. Stakeholders who adapt early, embrace transparency, and engage clients proactively will be best positioned to thrive in this new landscape. Summary of the New Labour Code 2025: As India moves toward the New Labour Code 2025, the guarding sector stands at an important juncture. The Code brings together a unified regulatory framework that simplifies obligations for employers while reducing ambiguity across states. Its expanded coverage ensures that a wider segment of the workforce receives formal protections. With standardized compliance norms, organisations gain clarity and consistency in implementation. Most importantly, the focus on enhanced workers’ welfare underscores the need to safeguard the dignity, financial security, and long-term well-being of guards. Collectively, these reforms promote a more empowered and resilient workforce and a more accountable operational landscape. Read More

Read More
Shivane

Rebuilding India’s Internal Security : From Siloed Defences to a Citizens’ Fortress

Lt Gen A B ShivanePVSM, AVSM, VSM (Retd)Former Director General Mechanised Forces of the Indian Army and presently the Strategic Advisor to the Chairman CAPSI. India’s internal security will no longer rest on walls, uniforms or after-action reports. It will rest on millions of informed citizens, fused intelligence and resilient systems that deny disruption before it spreads. In a world where adversaries weaponise disinformation and subvert institutions, India’s strength will be people, participation and pre-emption. This will turn the largest population and its youth bulge into deterrence and society itself as the strongest line of defence India is sitting on a contradiction; it can no longer turn a blind eye. The same population scale that fuels economic ambition is now a surface area that adversaries actively game. Internal security is no longer about guarding borders or counting battalions. It plays out in neighbourhoods, chat groups, power substations, trading floors and server rooms. Threats are no longer trying to seize territory. They are trying to fracture trust, exhaust institutions and paralyse society. Treating this with yesterday’s tools is strategic negligence. What India faces is not a policing problem. It is a systems problem. Internal security has shifted from a state-owned function to a national behaviour. Until that shift is acknowledged, India will keep reacting late, with the wrong tools and at high cost. Society is the battlefield now The threat matrix no longer fits neat labels. Terror groups, criminal syndicates, cyber operators and state proxies operate in overlapping layers. Geography barely matters and remains borderless and boundaryless. Encrypted platforms, financial pipes and logistics chains do the moving. A single manipulated video can trigger communal flashpoints faster than any armed unit can deploy. The battlespace geometry has enlarged the dimensions of the threat spectrum battlespace targeting the cognitive domain. Technology has flattened the cost curve of disruption. Cheap drones can map or strike sensitive sites. Ransomware can freeze hospitals and ports. Algorithmic amplification can turn fringe narratives into mass panic within hours. The centre of gravity is society itself. Trust in institutions, cohesion between communities and confidence in information flows are now prime targets. India has already seen the asymmetry. A physical attack causes casualties and grief. A coordinated hoax shuts airports, empties schools and agitations bleed the economy nationwide. The cyber spooking of seven airports, the cyber-attacks in 2025 and the 10/ 11 terror attack all point towards this new warfare. Historical baggage compounds the exposure. Centuries of invasion encouraged reactive and defensive mindsets over anticipatory and predictive requirements. Colonial governance normalised fragmented comfort zones and mistrust between institutions. That legacy still shows in siloed agencies and procedural lethargy. Add cultural complacency that mistakes calm for capability, and the result is predictable vulnerability. Added to this is the public approach of ostrich culture and lack of initiative. This is a critical national cultural deficit which the Government ignore as it does not relate to vote banks. Structural gaps keep India reactive At the core lies a strategic vacuum. India still operates without a formal National Security Strategy that clearly defines internal security threats, desired capabilities, convergence and doctrine. Surveillance boundaries, data governance, inter-agency command lines and escalation thresholds remain fuzzy. When responsibility is blurred, accountability dissolves. The need is to transition from the much spoken slogan of ‘Whole of the Nation’ approach to ‘ Whole of Society’ Approach. Post Mumbai 26/1, reforms improved capacity but not coherence. In spite of NIA and NATGRID, Intelligence streams remain unevenly fused. Immigration records, financial trails, telecom data and open-source sentiment analysis rarely converge in real time. Adversaries exploit these seams with patience. The state, by contrast, arrives after damage is done. Policing is the most visible stress point. India runs well below global norms in police to population ratios, with chronic vacancies in critical states. Political interference weakens professionalism. Training to address 21st-century threats lags behind the tools and talent. One force is expected to handle left-wing extremism, urban unrest, cyber fraud, terror financing and deepfake-driven panic. Conviction rates tell the story. Low certainty of punishment breeds confidence among offenders. Urban security mirrors the same imbalance. India’s cities host financial arteries, transport hubs, data centres and energy nodes, yet oversight remains fragmented. Private security has expanded fast, but without standardisation or integration. The biggest pan-India national source of the Private Security Industry, whose strength is more than the combined armed forces and CAPF, remains untapped and unrecognised. Resilience remains thin and optimisation weak. Banking, logistics, energy infrastructure and society remain exposed to blended attacks that combine physical disruption with digital denial. The most dangerous gap is civic passivity. India lacks a structured National Citizens Security Culture. While in the US the slogan is ‘See Something, Say Something;’ India remains ‘See Something, Hear Something, But Never Say Something.’ An apprehension of harassment by law-enforcing agencies rather than being rewarded for it. People consume threats instead of intercepting them. Hoaxes spread faster than corrections. Disinformation thrives inside closed messaging loops. Deepfakes and organised agitation fracture social cohesion at almost zero cost to the instigator. Demography becomes a liability when awareness is absent. Building an integrated citizens security grid What India needs is not more agencies but an integrated architecture. An Integrated Citizens Security Grid should replace linear defence with layered resilience. Think of it as a honeycomb, linking neighbourhoods to cities, cities to states and states to the national spine. It could be a node for Internal Security Responses, Civil Defence, Disaster Relief and Awareness Education. It could also serve several state welfare aspects and build communal trust. The payoffs are unlimited. The grid would operationalise four internal security functions. ‘Detect and report; pre-empt and prevent; protect and contain; and respond and defeat. This applies equally to bombs, cyber intrusions, financial sabotage and psychological operations. The most dangerous gap is civic passivity. India lacks a structured National Citizens Security Culture. While in the US the slogan is ‘See Something, Say Something;’ India remains ‘See Something, Hear Something, But Never Say Something.’ An apprehension of harassment…

Read More

Protection Against Harm to property : Dominion, Deprivation, Prop-tech and Remedies

Introduction: The Shifting Sands of Property Protection In this article we discuss briefly about the concept of property. ‘Property’ lies at the heart of both economic organization and individual liberty. Property represents not merely material possessions but also the social, legal, and moral recognition of ownership and control over tangible and intangible assets. In legal terms, property entails a bundle of rights – possession, enjoyment, and transfer that define the individual’s relationship with things and society’s recognition of those relationships. According to the Allianz Global Wealth Report 2025, in a study, covering nearly 60 countries, it was revealed that financial assets of Indian households rose strongly to 14.5% in 2024. The structure of Indian households’ financial savings has deposits, gold as well as instruments such as stocks, small savings and government bonds, and provident and pension funds. The structure of the assets primarily has deposits, gold and silver, immovable property (residential or commercial), market shares, and to some people, intellectual property. About 73% of households own a house, 50% own a two-wheeler and 8% own a car as property.1 This article hence, puts effort to address cardinal laws governing both movable and immovable property along with brief discourse on various aspects critical to their legal attributes. Dominion: Charting the Evolution of Property and Ownership In ancient India, private land ownership, including the right of alienation, was primarily held by the priestly elite and acquired through formal land grants. Over time, the notion of private land ownership evolved into a vital social institution based on confluence of factors, including economic challenges of the period and allocation of land to officers, religious institutions, and other entities in exchange for services rendered. Historically, the evolution of ‘property’ as a legal concept can be traced to the colonial imposition of English common law through the Indian Penal Code, 1860 (IPC). Under the Constitution, the right to property was originally enshrined as a fundamental right under Articles 19(1)(f) and 31 of the Constitution in 1950, protecting citizens against arbitrary deprivation of property. However, due to socio-economic reform needs especially in land reforms along with its redistribution, and conflicts between individual rights and public interest the right to property underwent several constitutional amendments. The most significant change occurred with the 44th Amendment Act of 1978, which removed the right to property from the list of fundamental rights and relegated it to a legal right under Article 300A. This shift empowered the state to acquire private property for public purposes under authority of law, while still protecting owners from arbitrary deprivation. The judicial system has also played a key role in interpreting and reshaping these rights through landmark rulings over the years, balancing development needs and individual rights. Case of Kesavananda Bharati vs. State of Kerala (1973), while primarily concerned with the scope of Parliament’s amending power under Article 368, significantly illuminated the constitutional dimension of property. Though the right to property ceased to be a fundamental right after the 44th Constitutional Amendment (1978), it remains a vital constitutional and statutory right under Article 300A. The judgment reaffirmed the notion that property, though modifiable by the state, cannot be arbitrarily deprived, and that the rule of law forms an immutable part of the basic structure of the Constitution. In international law, Article 17 of the Universal Declaration of Human Rights (UDHR) asserts that every individual has the right to own property and cannot be arbitrarily deprived of it. Notably, the right to property was excluded from the 1966 International Covenants, making it one of the few rights articulated in the UDHR not incorporated into legally binding treaties. Furthermore, the International Convention on the Elimination of All Forms of Racial Discrimination (ICERD) (1965) and the Convention on the Elimination of All Forms of Discrimination against Women (CEDAW) (1979) refer property rights, underlining the principle of non-discrimination. The Property Landscape Under Indian Law The Transfer of Property Act, 1882 establishes the framework for property transfer in India, using terms such as movable, immovable, tangible, and intangible to categorize property types. While these terms are not defined in this Act, they are clarified in the Registration Act, 1908. Movable and Immovable Property Unlike immovable property – such as land or buildings – movable property can be physically relocated from one place to another without altering their essential character or value. Tangible and Intangible Property Tangible property has a physical presence and economic value, including items like jewelry and vehicles. In contrast, intangible property, which lacks physical existence, includes securities, software, and intellectual property. Intellectual property arises from creative endeavors and are governed by laws that are distinct from general property law. Corporeal and Incorporeal Property Corporeal property has physical existence and can be owned such as jewellery and electronics unlike incorporeal property that consists of rights like copyrights and lease rights. Public and Private Property Public property is owned by the government for public use, including parks and hospitals, while private property is owned by individuals or entities for personal use, such as land and houses, trademarks, etc. Property in Indian Penal Code, 1860 and Bharatiya Nyaya Sanhita, 2023 The Indian Penal Code, 1860 (IPC) Chapter XVII, titled ‘Offences Against Property,’ encapsulated this protection through provisions on theft, extortion, robbery, dacoity, criminal misappropriation, and criminal breach of trust. However, the rise of the digital economy, cyber assets, and intangible property forms such as data, cryptocurrency, and intellectual content have blurred the traditional boundaries between ‘things’ and ‘information.’ This called for a re-examination of how ‘harm’ to property is conceptualized in modern law. The Bharatiya Nyaya Sanhita, 2023 (BNS), enacted to replace the IPC, attempts to modernize this approach by reclassifying and redefining several offences against property. While maintaining the structural resemblance to Chapter XVII of the IPC, the BNS incorporates technological realities that increasingly define harm in the 21st century. Recognition under BNS of electronic data and digital assets Hacking (i.e., unauthorised access) Section 378 IPC is now Section 303 BNS, that provides – although digital data is intangible,…

Read More

5 Ways How AI is Helping Businesses Navigate the Complex World of Cross-Border Trade

Sunil KharbandaCo-founder & COO at Trezix Navigating cross-border trade can feel like solving a puzzle, tariffs, regulations, and supply chain disruptions constantly shift the pieces. Thankfully, AI is turning this challenge into an opportunity. From automatically tracking international trade laws and ensuring compliance, to predicting demand and optimizing inventory, AI is helping businesses stay ahead of the curve. On top of that, AI-powered language translation tools are breaking down communication barriers with global partners, reducing errors and misunderstandings. In short, AI is making international trade smarter, faster, and far less stressful. Here are five ways of how AI is making international trade smarter, faster, and far less stressful: 1. Automated Customs Compliance Global trade regulations and tariff structures change constantly. AI tools monitor and analyze these changes in real-time, flagging necessary adjustments and mapping their impact on shipments. This ensures businesses remain compliant, avoid penalties, and manage cross-border operations with confidence. 2. Predictive Approaches in Trade Analysis Instead of merely reacting, AI takes a forward-looking view of cross-border trade. By analyzing historical flows, market signals, and regulatory trends, it predicts potential bottlenecks, tariff impacts, and supply chain risks. This predictive lens enables businesses to plan smarter, optimize trade routes, and stay ahead of disruptions. 3. Building Credibility in Exports Trust is currency in international trade. AI helps exporters strengthen credibility by ensuring documentation accuracy, validating records, and reducing inconsistencies. At the same time, AI-driven translation and data checks minimize communication errors with global partners building stronger relationships and increasing acceptance across markets. 4. Streamlined Logistics & Supply Chain Control Cross-border logistics involves multiple stakeholders, documents, and checkpoints – making it vulnerable to errors or inefficiencies. AI optimizes shipping routes, chooses the most efficient transport modes, and detects anomalies in shipments or payments. The result: faster clearance, reduced transit costs, and more reliable deliveries. 5. Sanction Party Screening & Risk Management Fraud and compliance risks remain major concerns in global trade. AI strengthens defenses by screening against sanction party lists, identifying high-risk entities, and monitoring transactions for unusual activity. Businesses gain a proactive safeguard protecting themselves from regulatory exposure and reputational damage. AI is no longer just a tech buzzword, it’s a strategic advantage for global businesses. By simplifying compliance, improving communication, optimizing supply chains, and mitigating risks, AI empowers companies to navigate cross-border trade with confidence and efficiency. Read More

Read More

Protection Against Harm To Life, Limb and Liberty

In Indian criminal jurisprudence, offences against life, limb and liberty form the cornerstone. It embodies the State’s fundamental duty to safeguard life, bodily integrity, physical autonomy, and personal liberty. These offences spanning across spectrum of the gravest to heinous nature strike at the very heart of human dignity and social order, demanding a robust legal framework to ensure justice, deterrence, and rehabilitation. The total FIRs (First Information Reports) registered in the year 2022 was 58,24,946 for crimes under Indian Penal Code (IPC) and Special & Local Laws (SLL); and among them 32.5% are for offences affecting the human body as per the report of National Crimes Records Bureau (NCRB). Urban areas continue to have higher crime rates when compared to rural areas. The constitutional foundation for protection of life, limb and liberty lies in Article 21 of the Constitution of India, which guarantees the right to life and personal liberty – a right, judicially expanded to include dignity, bodily security, and freedom from physical harm. Articles 14, 15, and 20 further complement this protection by ensuring equality before law, non-discrimination, and safeguards against arbitrary punishment. Criminal law operationalises these guarantees through substantive, procedural, and evidentiary provisions that criminalise acts infringing life, limb, and liberty. The legal response to such crimes has undergone a profound transformation from the fragmented pre-colonial justice systems to the codified Indian Penal Code (IPC), 1860, and now to the transformative Bhartiya Nyaya Sanhita (BNS), 2023. “The soul of our criminal justice system must reflect the spirit of our Republic, not the shadows of colonial governance” – Extract from the Parliamentary Debate in 2023 on amending the Indian Penal Code. This article presents a structured commentary on the transition from the IPC to the BNS and relevant legal principles. STATUTORY FRAMEWORK For over 160 years, the IPC’s Chapter XVI, ‘Offences Affecting the Human Body,’ defined how the State would respond when life, limb, and liberty were violated or harmed. Since 2023, Bhartiya Nyaya Sanhita, (BNS, 2023) ushers a modernised statutory framework that preserves the substantive core of the IPC while refining its drafting, structure, and penalties based on contemporary realities. It adopts a graded punishment structure based on severity and culpability, thereby upholding public order, human dignity and evidentiary rules remain responsive to evolving forms of violence, advances in technology, and the expectations of victims. Historical Background and Evolution of the IPC Historically, India’s criminal justice system was a fragmented amalgamation of religious, customary, and colonial laws and marked by inconsistency and bias. This includes justice delivery in terms of Manusmriti, Yajnavalkya Smriti, Arthashastra or Sharia. Among tribal communities, justice was administered through unwritten customs, community mediation, and compensation in the form of livestock, land, or goods. The arrival of the British East India Company in the seventeenth century introduced partial codification, most notably through the Cornwallis Code of 1793 in Bengal, which sought uniformity but retained the elements of religious law for personal matters. Punishments for similar offences varied drastically between regions, undermining fairness and public trust. This patchwork system created inconsistency and administrative inefficiency. The consolidation of British rule promoted the need for a uniform penal law to ensure consistency, fairness, and effective governance drawing from English common law, the Napoleonic Code, and utilitarian principles. In 1834, the First Law Commission under Lord Thomas Babington Macaulay drafted the IPC, which was passed on 6 October 1860 and came into force on 1 January 1862. Comprising 511 sections in 23 chapters, IPC became the comprehensive criminal law framework for British India. Since then, IPC has undergone numerous amendments and few cardinal ones are as given hereunder; Year & Amendment Key Changes Purpose/ Context 1870 Amendment Clarified provisions for abetment (Sections 107-120) – Clarified joint liability (Sections 34, 149) Strengthened accountability for group crimes such as gang-related murders or assaults. 1983 & 1986 Amendments Introduced Section 304B (dowry death) Addressed dowry-related violence and rising incidents of bride-burning, influenced by feminist activism and public outrage. 2013 Amendment (Post-Nirbhaya) Added Sections 326A & 326B (acid attacks) – Expanded definitions of sexual offences Response to 2012 Delhi gang-rape; aimed at stronger protection for women and deterrence against sexual violence. 2018 Amendment Strengthened laws on sexual offences against minors – Alignment with POCSO Act, 2012 Tackled child abuse and exploitation; enhanced penalties and protections. There are several landmark decisions that also shaped up the evolution of IPC. Four such case laws are picturised below; Transition from IPC to BNS, 2023 The Indian Penal Code (IPC), drafted under colonial era in archaic language had significant gaps in addressing modern crimes including cyber offences, victim protection etc. Its punitive focus overlooked rehabilitation, and limited victim rights clashed with contemporary justice principles. The focus was also to deliver justice rather than to penalise i.e., from ‘dand’ to ‘nyay.’ In 2023, the Bharatiya Nyaya Sanhita, (BNS), 2023, was enacted as part of a legal reform trio alongside the Bharatiya Nagarik Suraksha Sanhita, 2023 and the Bharatiya Sakshya Adhiniyam, 2023 replacing the IPC, CrPC, and Evidence Act respectively. Effective from 1 July 2024, the BNS reduces 511 sections of the erstwhile IPC to 358, uses plain and culturally resonant language, and incorporates gender-neutral and victim-centric provisions. It introduces community service for minor offences, clearer definitions, and new categories such as: By modernising certain terminology, recognising emerging crimes, and embedding restorative justice, the BNS seeks to decolonise India’s criminal law and align it with constitutional ideals and global human rights standards. Significant Legal Principles and Maxims Analysis of The Offences Part A: Homicide & Murder Provisions (100–110 BNS) Culpable Homicide (Section 100 BNS, 2023; IPC Section 299) Murder (Section 101 BNS, 2023; IPC Section 300) Culpable Homicide by Causing Death of Person Other Than Intended (Section 102 BNS, 2023; IPC Section 301) Punishment For over 160 years, the IPC’s Chapter XVI, ‘Offences Affecting the Human Body,’ defined how the State would respond when life, limb, and liberty were violated or harmed. Since 2023, Bhartiya Nyaya Sanhita, (BNS, 2023) ushers a modernised statutory framework that preserves the…

Read More
Communication

The Invisible Leaders : Power of Communication

Rekha GairolaDirector, India – Global Safety & Security, Adobe In an era of high-stakes corporate risk where uncertainty, reputational damage or business disruption is one incident away, the role of the corporate security leader has never been more important. These leaders, in the boardrooms and beyond, are the under-the-radar forces who are ensuring the safety of employees; protecting assets; ensuring a continuity for brands. But even as their job has become more significant and crucial, many security heads are still shut out from strategic decisions. It’s not really about performance, it’s all perception – and the essence of that perception problem is communication.Let’s unpack why communication – the spoken word, non-verbals and vocals, are no longer a ‘soft skill’ for today’s corporate security professional. It is the divide between influence and invisibility. That’s the difference between being perceived as a cost centre, or as a strategic partner. And for most, it is the piece that is missing in their leadership. The Quiet Side of the Corporate Map Corporate security function has evolved at a fairly fast pace in India and at other regions as well. Security teams who used to focus only on guarding and gatekeeping manage a wide spectrum of tasks today – insider threats, investigations, business continuity, regulatory risk, workplace violence and even political intelligence. But they have not ridden this trend to increased access to decision-making rooms. Too often, security is: And the result? A critical function that’s marginalized in business conversations – tools that we need for the future, but no one seems to want them in a business conversation. Why the Gap? A Communication Deficit The disconnect is seldom a failure of expertise. In fact, the vast majority of security people have great operational excellence. But they also stem from military, police or engineering backgrounds, environments that reward directness and execution, not always headline writing and persuasion. This creates a communication gap: And security is in itself, preventive. But here’s the twist – when you successfully avert something, nothing happens. And then when everything doesn’t, you have to tell the audience very clearly and forcefully what could have happened but didn’t. Communication: The Power and Art of Persuasion In this fresh paradigm, communication is not add-on – it’s fundamental leadership capability. As they lead their organizations through multifaceted, complex risk, security professionals must understand the business lens and know how to influence peers across functional lines in building trust at every level. One useful lens through which we can view this is by using Maslow’s Five Levels of Communication: Well, most security communication lives at level 2. Leadership is alive on levels 4 and 5. Here are the 3 Principles Of ‘Leadership Communication’ Verbal: Framing the message A poignant message begins with resonant words. Security executives need to contextualize risk for the business, and not just in technical detail. Examples: Non-verbal: How you show up The way you stand, the way you look, how your eyes meet, what’s on your slides, even what you put in an email, helps shape that message. Confidence attracts attention long before competence. Build executive presence by – when meeting with others, the gestures should be calm and open; designing narratives through crisp and bold visuals; and writing to be read and acted upon. Vocal: The Energetics of Communication Monotone delivery drains attention. Dynamic vocal delivery builds trust. Work on pitch, tone, pausing and modulation to bring energy to your delivery, particularly when giving a crisis briefing or board update. A Missed Opportunity: A True Anecdote I had the pleasure of meeting Rajesh (Changed the name and related info to maintain confidentiality) at a regional leadership workshop in Mumbai. He was responsible for all corporate security at several manufacturing facilities throughout western India. He was battle-tested, unflappable under pressure and had quietly stewarded the city through crises as varied as labor strikes and flood evacuations. During one of the breaks, over a cup of tea, he mentioned something almost in passing – how, a few weeks earlier, his team had quietly leaned on local community leaders to spare his plant from yet another protest before it reached its gates. That one act enabled a full production run to take place, avoided any bad press and ensured that 600 of our employees worked for the rest of the year safely, never knowing there had been a threat. When I asked whether he had brought this up with the leadership team, he shrugged – “It’s part of the job,” he said, “If nothing was done, yeah, we did well.” That moment stuck with me, because it expressed the very challenge this article is concerned with. The point isn’t that security leaders aren’t doing good work it’s that they’re not talking about it. Rajesh didn’t lack impact. He didn’t have an outlet or perhaps license to talk about it in ways the business could relate to and value. And he’s not alone. From one industry to the next, countless professionals like him are cutting down on risk, protecting their companies’ brand reputation and protecting people every day, all while being mostly out of sight for decision makers. So, How Much Is Poor Communication Costing? The results are nuanced, but profound: When security leaders abandon their own voice, others define their value. From Good to Great: What Security Leaders Need to Do Now The Voice Behind the Shield The world does not simply require security professionals to defeat threats. It requires leadership that predicts them, communicates them and affects action. Security is possibly behind, but the voice surely should not be. You already have a seat at the table. Now speak like it! Because when corporate security speaks with authority, the business pays attention. (The author is also an Internationally Certified Life Skills Trainer) Read More

Read More

Executive Protection :The Unseen Discipline Behind Visible Safety

Veena GuptaFounder & MD, Seam Risk Consultancy Executive Protection (EP) is often misunderstood by the general public – and even by many practitioners entering the field. Popular imagery portrays a protector as a tall, muscular figure dressed in black, wearing sunglasses, scanning the environment like a hawk. While physical fitness and vigilance matter, they represent only a fraction of what the profession truly requires. In reality, Executive Protection is not a show of strength. It is a strategic discipline, combining intelligence analysis, risk management, human psychology, logistical planning, and discreet operational execution. It is a profession where small details save lives, and invisibility is often the strongest armour. The myth vs. the reality Most people believe that EP is just about a forceful person specifically with military background, physical intimidation, a certain bodyguard look – walking shoulder-to-shoulder with the principal and similar on. But the truth is simpler – and more demanding. Effective EP is built on the ability to think ahead, anticipate risks, and eliminate them before the principal even becomes aware of them. A protector must be a planner, reader of people, strategist, communicator, and problem-solver. Strength may stop a threat; preparation prevents it entirely. The microscopic details that matter In the field, it is often the small, easily ignored details that define the safety of the principal. These details go beyond the traditional security scope and enter the domain of holistic protection. Consider the following examples – rarely visible to an outsider but critical for an EP operator: 1. Vehicles and drivers 2. Aircraft and charter checks 3. Hotels, dining, and hospitality 4. Movement and logistics These details may appear insignificant, but for EP, the difference between safety and vulnerability is often a matter of seconds – and those seconds depend on preparation. The professional scope of executive protection A skilled Executive Protection Officer must master several core areas such as: Executive Protection (EP) is often misunderstood by the general public – and even by many practitioners entering the field. Popular imagery portrays a protector as a tall, muscular figure dressed in black, wearing sunglasses, scanning the environment like a hawk. While physical fitness and vigilance matter, they represent only a fraction of what the profession truly requires The real definition of executive protection Executive Protection is not a physical shield. It is a mental discipline, a strategic art, and a lifestyle of constant vigilance. It is knowing that a tyre with low air pressure can cause a fatal accident; a small crowd can suddenly become uncontrollable; an unreserved hotel table can create exposure; a distracted driver can become a liability; a wrong seat position in a restaurant can compromise safety; and a pigeon nest on a charter aircraft can delay takeoff and disrupt movement security. Most people see the protector walking beside the principal. They never see the hundred invisible tasks that make that walk safe. Conclusion In every sense, Executive Protection is an art that blends intelligence, discipline, anticipation, and humility. The best protector is not the one who looks dangerous – but the one who thinks deeper, plans wider, and moves smarter. EP is not about muscles – it is about mastery. Read More

Read More

White Collar Terror : Why Universities and Doctors Have Become the New Frontier

Prof. (Dr.) Rajiv MathurPartner, MIGS Global Consulting On 10 November 2025, a car exploded near the Red Fort in New Delhi, killing more than a dozen people and injuring many others. The nature of the attack shocked the nation. This was not a crude roadside bombing by fringe actors, but a meticulously planned terror act. What may be even more disturbing is the emerging picture – the people behind it were doctors, highly educated professionals employed by Al-Falah University in Faridabad. As investigations deepen, a pattern is emerging – one that points to a chilling evolution in terrorist recruitment. Terror groups are no longer content with uneducated foot soldiers alone; they are now trying to radicalise white-collar professionals, especially in places we think of as safe – universities, hospitals, academic labs etc. Why a University, Why Doctors? Radicalisation at the Right Age, in the Right Place Radicalisers pick their targets when they are vulnerable – in a ‘tough time’ in life. For medical students or early-career doctors, this is very true. Medical education is grueling – long hours, high stress, emotional trauma, financial pressures, and a strong desire to ‘do better.’ Those pressures can make young professionals susceptible to ideological promises that offer meaning, belonging, and even a kind of ‘jannat’ (paradise) reward. In the Red Fort case, key people involved were doctors from Al-Falah University. Among them were: These are not random, peripheral actors. These are people with education, professional standing, and access to infrastructure (labs, storage, networks). Why might they be appealing recruits? Because: Symbolic Value of Targeting a University A university is not just a physical space; it carries symbolic weight – it is a place of learning, progress, enlightenment. That is what makes it attractive to radical ideology: In the Red Fort case, investigators believe that one of the rooms in the Al-Falah campus (building no. 17, room no. 13) was used as a secret meeting place for the conspirators. According to reports, this room was very close to their lab – underlining how academic infrastructure was allegedly exploited. Security Blind Spots: Why Universities, Hospitals, and Management Institutes Are Vulnerable These are places with minimal security awareness, or where security is not part of the academic curriculum. That is a serious systemic weakness. Lack of Institutional Security Culture Traditionally, universities (especially in India) focus on education, research, and administration. Security is often treated as an operational afterthought – limited to campus guards, typical access control, and maybe CCTV. But deeper security (counter-terror, radicalisation prevention) is rarely part of university planning. Gap in Management Education Even management schools (especially those teaching healthcare management, operations, or supply chain) do not include security modules. This is a serious blind spot. This absence in curriculum means that when radical elements try to infiltrate, they face little institutional resistance or scrutiny. The New Terrorist Playbook: White-Collar Radicalisation The Red Fort incident seems to reflect a dangerous evolution in how terror modules operate. White-Collar Jihadis Many analysts now call this ‘white-collar jihad’ – where terrorists are not uneducated foot-soldiers, but skilled professionals such as doctors, engineers, faculty, researchers. This has several strategic advantages for them: In the case of the Delhi blast, investigators reportedly believe that university labs might have been used to produce or store components for bombs (e.g., RDX synthesis). That’s a terrifying escalation. Also, encrypted communication, digital funding, and cross-border ideological influence seem to be part of the module’s operational design. Recruitment via Academic Networks Recruiters are increasingly using academic and religious networks: This shows a deliberate strategy – using respected professionals as radical agents, embedded in academic institutions, with both ideological indoctrination and operational capacity. Institutional Accountability and Recruitment Failures Point of poor recruitment processes is very concerning, and facts emerging in the case support serious lapses. Questionable Hiring Practices According to reports, one of the detained persons, Mohammad Jamil, was responsible for recruitment at Al-Falah University. Investigators say he forwarded files for doctors’ appointments, raising the possibility of infiltration. There are concerns whether the University did proper background checks. These revelations raise crucial questions about institutional due diligence – what are the checks and balances when hiring critical faculty? Who authorises these appointments, and how rigorous is the vetting? Financial Irregularities and Oversight There are also deeper institutional concerns beyond just hiring: When higher education institutions have weak governance, poor transparency, and limited oversight, it becomes easier for extremist networks to infiltrate and operate under the cover of a ‘charitable’ or ‘educational’ mission. Psychological and Ideological Drivers Let us explore more deeply why radicalisation might work so effectively in such a context. Identity, Belonging, and Purpose Young professionals, especially from marginalized or conflict regions (e.g., Kashmir), may feel alienated. Despite achieving academic success, they may still struggle with: Moral Justification and Religious Framing Terror groups often frame their message in religious-laden moral terms – ‘jihad’, ‘sacrifice’, ‘paradise.’ For educated recruits, this is combined with a narrative of struggle: The contrast between a ‘tough life’ (long study hours, pressure, low recognition) and the promise of spiritual reward (jannat) becomes highly attractive. When radical ideology is wrapped in religious duty, it gives recruits a moral justification for violence – especially if they believe their professional status doesn’t exempt them from ‘sacred struggle.’ Broader Threat Implications What emerged from the Red Fort investigation is deeply worrying – not just for this incident, but for India’s broader national security and academic landscape. What Can Be Done: Prevention, Awareness, Reform Given this emerging threat, what should society, institutions, and government do? Here are some concrete suggestions, informed by your insight and my analysis. Curriculum and Awareness Building Institutional Governance and Oversight Policy and National-Level Response Conclusion The Red Fort blast and the link to Al-Falah University are a wake-up call. Terrorism is changing. Radicalisation is becoming more professional, more white-collar, and more insidious. Traditional security paradigms – focused on uneducated militants – must evolve to meet this new threat. Universities, hospitals, management schools are not just innocuous institutions. They are now…

Read More

Redefining System Integration for Airport Security Operations

Milind BorkarStrategic Growth Advisor, Vicon This section is focused on best practices and considerations for integrating elements of airport physical security systems. Systems integration is the coupling of various discrete hardware and software systems into a unified system. The objective of assembling individual pieces into a whole functioning unit often requires detailed planning that clearly defines the operational requirements of the integrated system, the functional requirements of the integrated components, and the internal interfaces between all components as well as all external (input and output) interfaces. Well-conceived and tested, integration can provide the airport operator with several benefits: Integration can also introduce complexities into security system design which are best mitigated by the careful determination of operational requirements (the ConOps process) technical specifications that address component compatibility details, and proof-of-integration testing. The complexity of the process usually necessitates an iterative approach where small pieces are integrated together in steps with each step resulting in a larger functional unit until the whole system is successfully integrated together, so that the end result meets the user’s requirements. Integrated systems can provide a range of decision-making resources and tools for operators. Those tools can automate some response processes (e.g., alert notifications) or guide response actions. Integrated tools also provide platforms through which response activities can be coordinated and directed though a range of tools including radio, data and telephony. Integration Process Figure 1 diagrams the major process for integrating physical security systems. a) Detection/ Perception Airport decision makers can draw upon a variety of system inputs including – Fire Alarms, Pressure Sensors, Motion Sensors, Audio Sensors, Physical Access Control Systems (PACS) including credentialing systems, Perimeter Intrusion Detection Systems (PIDS), Video Surveillance Systems, including both visible CCTV and infrared sensors, Computer-Aided Dispatch (CAD) systems, Geographical Information Systems (GIS), Building Automation Systems (BAS), CBRNE sensors, Global Positioning System (GPS) data, Network Communications including network monitoring systems, and Human assets equipped with voice or data communications devices-radios cellphones, data terminals. Sensor data may come directly into a common platform, or it may be filtered or prioritized by management software such as VMS, PIDS, BAS or CAD systems. In addition to sensory data there are a range of other information sources that help to develop a picture of an incident or occurrence, i.e., situational awareness. These inputs can include – Event Management Systems (Web EOC, eTeam, Esponder), Work Order and Maintenance Management Systems, GIS Data, FIDS Data, Personnel Data (Biometrics/ Credentialing), Key Control Management Programs, Gate Management Systems, Airfield Management Systems, and Safety Management Systems. b) Assess/ Analyze This phase of the integration process should begin with a ConOps, this being the best means of determining operational requirements from which technical specifications and decision rules can be derived. Some tools like CAD, PIDS, CMMS and VMS programs can help in bringing meaning to differing pieces of data and relating that to action programs. PSIM software generally provide richer integration linking more data fields and supporting security functions across the full operational spectrum. c) Direction/ Response Integration is most effective when it supports the actions of responders. The focus of system integration is to facilitate the operator’s access to and ability to exploit, in real time, information converged from diverse sensors and other inputs. Integration at the system level enables intelligent decision-making to be applied for response functions. This occurs through subsystems designed for task execution including radio/ telephone/ data communication systems; automated command to remote access points or barrier or access control systems; mass notification systems; and alarm/ audio and public address systems. The extent to which these inputs and functions should be integrated will vary for each airport operator. Defining operational requirements by a thorough ConOps is the first step in this process. The criteria for making these decisions should be: The outputs of system engineering will include documentation of the system design, trade-off studies of system and component alternatives, system and component specifications, estimates of probable cost, management plans and schedules, contractual documents etc. Model specifications are available from several sources, but two sections of the Construction Standards Several industry groups have standardized protocols for digital video systems and for their integration with other elements of physical security systems. Their common goal is improved hardware and software compatibility, but each group has its own focus, and their standards differ in important respects including their span of coverage and how they specify and test for compatibility compliance. All of these groups have published specifications and/ or standards, which continue to be developed and refined, and all continue to expand their memberships. Stating that an item of equipment such as a video camera, ‘complies’ with a published industry standard does not assure that it will interoperate with ‘compliant’ products of other manufacturers. Even within a given camera product line, there can be models which comply with a given standards while other models do not comply. Equipment specifications, however detailed, are not sufficient to reveal to an airport operator the full level of operational performance or the compliance of a specific device to a standard. Always check equipment model details against the standards to which they have been tested, and whenever possible physically test the products under local operational and environmental conditions of use. A major issue is often the ability to upgrade or replace an item of hardware or software independently of a manufacturer’s proprietary design data and protocols. Airport design and procurement packages should: Choosing a Platform Before the widespread adoption of networked digital systems, most security systems were integrated around access control devices. Access control systems were the first line of defense, alerting security staff to unauthorized intrusions and providing basic video coverage of these events. Not all incidents are triggered by a physical security breach, nor do all incidents carry a physical security risk. Such incidents are geared more towards airport operations, but nevertheless they are issues that arise and must be addressed. As security systems became more complex, as users increased the quantities of video cameras, and as all of these devices…

Read More