New security realities facing CISF


The Central Industrial Security Force (CISF) was created to protect the nation’s economic wealth but has diversified into other specialised areas like airport security. Having strength of around one-lakh personnel, the force has recently entered into providing consultancy services to the establishments in the private sector also. Director General of CISF, SIS Ahmed tells Amitabh Shukla that continuous training to the personnel has improved the airport security scenario in the days following the Kandahar hijack.



Q: What changes have taken place after the CISF took over airport security from the local police?

A: When CISF was inducted in airport security after the Kandahar episode, we were relatively young in the field. We accepted the responsibility and through proper and well-modulated training adjusted to the new job effectively. Since then, the level of security has gone up without any inconvenience to the passengers. We had conducted a passenger survey in January-February this year on various parameters like frisking, communication skills of the personnel, general security etc. and found that the response was very positive. The feedback of around 1.6 lakh passengers was taken for the survey.


Q: What kind of training is imparted to the personnel to handle a sensitive area like the airport?

A: We have specialised training module for the personnel and they are trained at the National Industrial Security Authority (NISA) at Hyderabad. Model aviation security is imparted. They also undergo training with the Indian Airlines and other organisations. Behaviour and communications skill is taught to the personnel before they are posted at the airports. The trained people are kept at the airports for longer period though the airports are changed after an interval. Continuous upgradation, briefing and debriefing, decoy checks etc. are a part of this exercise.


Q: Have there been any serious lapses in recent months on the part of the CISF personnel?

A: No lapse has been reported recently. Through the decoy checks we monitor the situation on a continuous basis and if a lapse is found in the decoy checks corrective action is taken immediately. Through these checks, the level of alertness is always high.


Q: Has the CISF adopted any new technology to upgrade the level of security?

A: Upgradation of technology is a continuous process. The Bureau of Civil Aviation Security (BCAS) and Ministry of Civil Aviation are consulted for the type of gadgets and equipments required. Perimeter fencing, explosive detection gadgets are being upgraded and monitored on a regular basis.


Q: VIP Security is to be entrusted to the CISF. Is there any plan to raise a specific battalion for the purpose?

A: There was a proposal in this regard from the Group of Ministers (GoM). We have been deployed in VIP security to some extent and steps would be taken in accordance with the government directive.


Q: The role of the CISF was primarily industrial security. It has diversified into several areas now. What happens to the core specialisation of the force?

A: We are still providing security to the establishments related to economic activity, strategic importance and critical infrastructure. We are also providing security to the government buildings in Delhi, Punjab and Haryana secretariat at Chandigarh, Indian embassy at Kathmandu, national monuments like the Taj Mahal and the Red Fort etc.


Q: CISF has been chosen to provide security in Delhi Metro? What progress has taken place on this front?

A: The Ministry of Home Affairs wanted our assessment on Metro security after the London blasts. We have given a detailed presentation to the Home Secretary. A view has to be taken by the MHA on the issue. For the Kolkata Metro too , we would be providing security. An assessment is being made on Kolkata Metro too.


Q: The force has ventured into providing consultancy to the private sector too. How successful is this new venture?

A: Several organisations are coming to us for providing security related consultancy. We prepare a report on the basis of security threat and infrastructure at the site. We study the entire security system and then make suggestions. (6.8.2005)

No comments:

Post a Comment