Thursday, December 25, 2008

Lesson learnt from Mumbai Terror Attacks!

They were only ten! They took nation of 110 crore to ransom for three days! Imagine if they were thirty and two other cities namely Delhi and Kolkata were also their targets! The scope can be widened and one can imagine with shudder down the spine the chilling scenario – the entire Nation surrendering to few terrorists!! No army needed to cripple our nation which is already eaten away from inside by the corrupt politicians and babus with the help of criminals and underworld elements. All it will take is few well trained, highly motivated, and fully armed youths to carry out their plan to permanently scar the world’s largest democracy.

The US State Department has consistently listed India as the country with the second-highest number of terrorism casualties after Iraq. However Western media has given scant regard to the problem and this is sometimes resented in India. All that is likely to change with terror attacks in Mumbai. Mumbai unwittingly has become the epicenter of India's terrorist problem but there have been many attacks in other key cities.

The terrorists attacked on every level. They killed middle class workers when they shot up the railway station, they killed the elite in the luxury hotels, they killed tourists and kids as they ate in a café and they while attacking hospital they killed the sick and dying or those trying hard not to. They shot people on the roads, in railway station, hotel or residential building. They killed Indians, Britons, Americans, Israelis and several other nationalities. They killed men, women, children, policemen, firemen, doctors and patients. This was systematic cold blooded slaughter.

The saga of personal valor, dedication to duty, service to society and patriotism of common man will be told and retold, but along with it will be tales of un-professionalism, foolhardiness, cowardice and corruption. It will be prudent to pause for a moment and think whether there are lessons for security professionals to learn from this gory incident? Admittedly there are few lessons we can learn. The Internet sites, the Blogs and the Communities are overflowing with ideas. Honestly few ideas are picked up from there. There are many lessons learnt from the whole incident and some of them are-

Terror’s Third dimension – by the land, air and now sea!

It has been often times said that the Mumbai terror attacks were unexpected as much as audacious since sea approach was used to reach Mumbai. This might appear so but ask any old war-horse and he will confirm that the chances of successes of any operation are directly related to the quantum of the audacity an operation has. The frontal attack is generally considered to be most dangerous and therefore very rarely tried. But, when it is a decision that is required to be taken by the fidayeen terrorists then there are very high chances that the least practical and least expected route will be chosen for that reason alone.

The air space for terrorism has been used in 9/11 and ever after. The Tamil Tigers have got hold of aircrafts – that too fighter aircrafts! It will be matter of time that other various categories of aircrafts are also used by the terrorists. There are unmanned aircraft such as Predators in the border areas to take care of. Then there are remote controlled toy aircrafts laden with IED with timer devices or designed to explode on impact. Suddenly sky seems to be not friendly any more.

Business verticals of terrorism: out sourcing

The mid-sixties saw smuggling of gold turning out to be very lucrative business of the underworld. It soon became the narcotics which was most sought after item for smuggling. Soon arms, narcotics and havala trading became lethal combination and small time smugglers no more operated independently. They were used by the big-timers to work for them. And soon corporate culture was emulated by the smugglers.

The D - Company has run its business from far away land using its front men and small time operatives. Thus smuggling and mafia activities in India and elsewhere are run like a corporate business. The terrorism have also started undergoing the same changes and if early indications are to be believed, the LeT, JeM or many other terrorist outfit operating from Pakistan need not get its cadre directly involved as local ‘talent’ is easily available. So ‘terrorism’ is being out- sourced as any ‘Corporate’ will out source house-keeping and maintenance services. Similarly terrorists are also more and more getting involved in real estate, havala trading and smuggling as their business verticals so that loss of one business can be absorbed by other business activities or one business can be funded by the profits of other businesses – mostly the terror operations in theirs case!

No 8 figure grid reference – it is intelligence, Silly!

World over the autobiographies of sleuths have never even once mentioned the single instances when they could generate cent-percent accurate intelligence. Those who did - had not lived enough to tell the tale! The business of intelligence collection, collation and dissemination is so full of ifs’ and buts that by the time it reaches the end-user it has been many times removed of it’s time and place value.

It appears to have been a massive intelligence failure as a result of which Indian security agencies were caught napping; this despite reports that Indian Authorities had been aware for some time of rumors of an impending attack, including even mention of the Taj Mahal Hotel.

But one has to remember that the operational intelligence leaves lot of scope for addition or deletion. In any case, the steady stream of intelligence will only help the expert to draw a pattern and make projection or intelligent guesses! It will be really very silly to expect that any agency in the world will generate the intelligence giving time in milliseconds and location in ‘eight figure grid reference’! Even if once, some intelligence is so gathered, by the time it reaches the end-user, the variables might change as terrorists can always change their locations, timings, numbers, weapons or modus-operandi! Remember, they too have Plan Bs! Out of all persons, Admiral Sunil Mehta should know this and also remember that if one wants to do things best, it is best to do oneself!

However, “the fact that the boat used by the terrorist to enter Mumbai was undetected for 72 hours does not augur well for India’s security. Unmolested by any naval action to intercept, the terrorists sailed leisurely towards Mumbai. There were no signs of warships, conducting radar sweeps conjointly with the Navy and Coast Guard run Dornier surveillance sorties or more intensive searches seaward by the naval and coast guard vessels” writes Bharat Karnad, Professor of national security studies at the Centre for Policy Research.

I said that first!

Aftermath of terrorist attack on Mumbai saw how the big time politicians and administrator alike tried to take the claim for giving early warnings. The Chief Ministers, Ministers, Secretaries and Director Generals all clamored to take credit of ‘I-said-that-first’. One would wonder that if so many people knew so much and so much in advance then what all they did! Beside twiddling their thumbs and now taking the claims of giving warning to concerned, they did sweet nothing as if doing nothing was their basic duty. The saga of usurpers, false-claimants and pretenders is slowly unfolding and it is amazing that without any remorse or empathy for the victims of the carnage, these famous personalities now stack claims for their prior knowledge of imminent terror attack on Mumbai though about which they did nothing!

Security Forces - take time but be timely!

For the security forces, the dilemma very often is to pinpoint when it is too early to too late to move-in in hostage like situations. If it is too early, security forces will suffer the losses! If it is too late, the innocents may die!

World over security forces take time to acclimatize with the ground situation. No security force or commando operation can be undertaken without proper planning involving the reconnaissance of the area to have ‘feel of the ground’ and to have ‘Plan B’. Only fools rush-in! The deliberate and prudent planning takes time as failure endangers precious lives and no ready made ‘one-size-fits-all’ solution can be applied to all the situations.

Therefore expecting the commandos to rush-in the moment they reach the venue of their operation will be rather foolish. They will not immediately after their arrival swoop the whole area and neutralize the terrorists in a jiffy! They will tale deliberate time. However, once the course of action has been decided the entire operation must be conducted with time and precision.

Rushing like fools, ending like angles!

It is part of Indian culture not to criticize some one who is no more to defend himself. But, in the case of security and armed forces, if past botched-up operations are not examined thread bare, no lessons will ever be learnt! This post-event examination involves analyzing the deeds or misdeeds of deceased.

Kamte was notorious to always keep loaded AK 47 on the floor of his car. Salaskar was sharp shooter known to always move fully prepared. Karkare was extremely efficient officer known to move with full compliment of security! But when all three met their nemesis…

The sequence of action leading to deaths of Karkare, Kamte and Salaskar needs to be done in right earnestness then only we will come to know why all three of the traveled in one vehicle to the place of their encounter if they came from three different places and assembled at one location? One also needs to know why their individual vehicles and security contingent did not follow them. We all repeatedly saw a TV footage in which Karkare was unhurriedly putting on a helmet, but, this footage obviously is of different place and time. What about others? One wonders where their helmets were if not in the Qualis or on their bodies and also what happened to their bullet-proof jackets. There are silent murmurs that they rushed- in carelessly to the scene of their encounter, ill prepared and least expecting the kind of attacks they came under!

Mr. Ten Percents galore in India

The ignominious title which Mr. Asif Ali Zardari got stuck with is embarrassing - to say the least. There are many worthies of such titles in India. The corruption in security and armed forces’ procurement departments has made deep inroads as a result of which no procurement done is without allegation of corruption.

There are rumors that the bullet proof jackets used by Maharashtra ATS were of sub-standard and rejected twice in past. While valiant soldiers and commandos are treated no more then security guards by the politicians, their lives do not mean much to them. The realization that secured security personnel can only secure them provably has not occurred to these politicians who want their share from every arms deal. The morale and ethics of these politicians have stooped to so lowly levels that total overhaul of the system is needed to be undertaken. Sooner the better!!

The neighbor we love to hate!

The Rogue Nation! The Terrorist Nation!! The Dangerous Laboratory of Democracy!! Pakistan has been labeled differently though all meaning same – the nation is rudderless for decades and now with nuclear capabilities, the nation is provably the most dangerous nation in the world. Pakistan has been carved out of us and this fact has never let its leader live in peace. Nor has this fact given any comfort to Indians for we know that the feeling of disparity and inferiority in average Pakistani is mainly not due to what they do not have but due to what Indians have! The hard work, grit and toil which Indians have put-in while developing the country is of no consideration to Pakistani leadership, there only point of comparison is that they do not have those resources which India enjoys. This over-jealous neighbor has been thorn in our side and demanding to be removed since long!

Indian authorities and commentators point to Pakistan, and especially the secretive Inter-Services Intelligence, as having a hand in the Indian attacks. After an attack on the parliament in December 2001, India mobilized against Pakistan and the two very nearly slipped into a war - a frightening prospect for nuclear-armed powers. It is clear that arms and training have been provided by Pakistani groups, such as Lashkar-e-Toiyaba; that the ISI has been heavily engaged in helping insurgents and terrorists in Indian Kashmir; and that Pakistan has refused to extradite accused terrorists to India.

Those who know little Greek mythology will understand that cutting the snakes was never a solution as solution was cutting the head of Medusa! We can eliminate terrorism only by eliminating its breeding and feeding ground which is Pakistan.

There is nothing called Muslim Terrorism or Hindu Terrorism

There were reportedly jubilations in the Muslim world that a ‘Hindu terrorist’ has been found after the arrest of Sadhvi Pragyan Singh! More then sense of exhilaration, there should have been gloom all over the world. The oldest and most tolerant religion has not produced even a single Hindu terrorist so far! In fact there was not even a muslin terrorist from India and this was the influence the Hinduism has over all the citizens of Hindustan!

Not all Muslims are terrorists, but all terrorists are Muslims hold true in most of the blasts. While most Indians think the issue of the bomb blast is way above Hindu Muslims problem, Muslim people and organizations should come in large numbers and show protests to the attack. People taking the name of Islam and killing innocent people is Un-Islamic. And if there are no protests from the Muslim Community, it somewhere shows that it is tolerant to these attacks!

But just even for a second we assume (without believing!) that the trend of Hindu militancy is there to stay then Muslims instead of rejoicing must fear it most. The sheer number of Hindus in Hindustan must impress the Muslim militants (if there is any such term!) and they must realize that it is just impossible to eliminate or over power the Hinduism. Has Muslims not ruled us for more then 500 years? What happened thereafter? Has not Hinduism rebounded? They would be better advised to see the ground realties and come to terms – live and let live! There is no point fighting and getting killed when battle is already lost before it began!

What do we do with the politicians?

Throwing them in the Indian Sea is the easiest option. A lot has been said and written about them – about their shameless behavior, their insensitivity, their lust, greed and corruption! We are well aware that these chief ministers and ministers are all paid servants and unlike other regular employees are entitled lifelong pensions even when they may serve for one and half years! Then what about their accountability? How is it that they only resign on morale grounds and are not sacked due to inefficiency and their services are never terminated on official grounds? Shamelessly they increase their salaries without discussion and dither on pay increase of armed forces. These are same politicians who want to make armed forces subservient to them and also expect them to make supreme sacrifices while protecting them.

Our leaders shy away even naming Pakistan as country behind terrorists activities and on sly name it as ‘neighboring country’ when actually they should name it as Pakistan. Terrorism can not be eliminated by tough talks; it can be eliminated only by tough actions. Taking decision is the most difficulty part; actions are easier for security forces to take. Is there any doubt that the training camps in Pakistan are the breeding grounds for serial blasts? Isn’t this what we have been telling our un-named neighbors since decades? Why are our leaders shy or afraid of naming Pakistan? If Pakistan is training the terrorists then it must feel the heat and pain!

Finally, we need a tougher Head of State - With due respect, we are sorry M’am - Hon. President of India Mrs. Pratibha Patil - your say on the whole episode seemed more of a general message. ‘Address to the Nation’ with Zombie like glazed looks and monotone - devoid of feelings and emotions can not instill the trust and confidence of the citizens in the national leadership. We would expect more, at least one public assurance on National TV, your plans on how you can prevent such things happening in the future. Let’s have a strong leadership at the center so that he / she can issue orders and execute plans to prevent such things in the future.


***

Monday, December 22, 2008

Sole for soul!

Politicians are at it again, playing their dirty games as usual! First it was blame game in which politicians of all hues blamed each other for the shortcomings and mistakes in handling the Mumbai terror attacks. Thereafter they started taking credits of handling past incidents successfully forgetting the lives lost in those incidents. 13th December came and went and barring few leaders (who understandably could not be elsewhere on that day) no one came to pay tribute to those brave security personnel who lost their lives so that politicians hiding inside the parliament that day could once again play their dirty games today!

Now they are playing the 'Vote Bank Game' very earnestly! The age at which the sanity becomes questionable in person, there is a minister making statements which can not be even laughed as they are coming from the ‘right honorable mouth’ of the distinguished minister whose singular distinction is that he has done sweet nothing about the minorities though he had ingenious ways to deal with cement!

When Society needs balm on recent wounds, these politicians are sprinkling chilly powder and to make it worse, they claim it to be the right medicine. In the name of votes they can stoop to any depths. They have no ‘soul’, it is known to us. But people have ‘soles’, this has been proven very recently at a heavy price which Bush had to pay recently.

There is nothing wrong in asking the questions about the death of Late Hemant Karkare and others. The security experts have been asking similar questions since the very first day, but, the way Anatule has questioned is itself questionable. His question is not in pursuit of the truth but the votes. Otherwise he shouldn’t have linked it to Hindus and the Malegaon Case.

It is part of Indian culture not to criticize some one who is no more to defend himself. But, in the case of security and armed forces, if past botched-up operations are not examined thread bare, no lessons will ever be learnt! This post-event examination involves analyzing the deeds or misdeeds of deceased.

Yes, there is need for inquiry about the circumstances in which Karkare, Kamte and Saluskar were killed! There are many questions needed to be answered. For instance there are following questions for which correct answers must be found –

1. Kamte was notorious to always keep loaded AK 47 on the floor of his car. Salaskar was sharp shooter known to always move fully prepared. Karkare was extremely efficient officer known to move with full compliment of security! But when all three met their nemesis…

2. The sequence of action leading to deaths of Karkare, Kamte and Salaskar needs to be done in right earnestness then only we will come to know why all three of the traveled in one vehicle to the place of their encounter if they came from three different places and assembled at one location?

3. We all repeatedly saw a TV footage in which Karkare was unhurriedly putting on a helmet, but, this footage obviously is of different place and time. What about others? One wonders where their helmets were if not in the Qualis in which they were traveling or on their bodies

4. What happened to their bullet-proof jackets? Were they not supposed to be using them? What was the past practice followed by them individually. Indications are that they always came prepared with weapon, bullet-proof jackets, helmets and what it takes! Why is it then that they all were ill prepared on that fateful night?

5. At least two out of the three slain cops were sanctioned their personal security contingent moving in the separate vehicles in addition to the PSOs they were permitted. How is it that all three sat in one vehicle and their escorts did not follow in their respective vehicles?

6. Today even the Director General of Home Guards move with AK-47 wielding commandos! On the contrary, Shri Hemant Karkare was not only DG level officer but also the chief of ATS. He was under death threat too! As per threat perception as practice of ATS he was always with PSO if not more security at certain times. Was it present at the time of his death? If yes, why this is not reported so far, and, if not, why not?

7. If the escorting security contingents of DG and DIG level officers are asked not to follow then there must be very cogent reasons which these officers must have conveyed to them. These need to be ascertained and verified.

8. If they were no such reasons conveyed to the escorting security contingent then why they did not follow the officers? If for some inexplicable reasons they could not follow the officers, what was done by these contingents and what should have been done as per SOP?

The conspiracy theory depends only on one assumption that for some reasons all three or at least Karkare will be lured to reach Cama Hospital where there will be an ambush by the terrorists hiding behind the bushes. Poor Anatule and his supporters such as Digvijay and others don’t even know the details of the fast paced sequence of events and changing venue of the dramas unfolding that night!

Not even for few seconds events were under the control of security forces or the terrorists! Thinking that in such situation, the plot previously hatched to eliminate Karkare could have been so perfectly executed is sheer foolishness. If any one thinks it was possible, he deserves to be dressed in straight jacket serving his time in a lunatic asylum!

There are however silent murmurs that all three slain cops, throwing all cautions in the wind, rushed-in carelessly to the scene of their encounter, ill prepared and least expecting the kind of attacks they came under! It is said in hushed manner that all three somehow realized that their presence at all the sites of attacks will boost the morale of their force and since they were facing the terrorists holed inside the buildings they were under no apparent threats while on the road.

Let’s have the inquiry to found out the truth since it is said, “Speak the truth and shame the devil!” Devil here is in the shape of Anatules and his ilk!

Saturday, December 20, 2008

How mobile phones let spies see our every move


The UK Government's secret Celldar project will allow surveillance of anyone, at any time and anywhere there is a phone signal. Secret radar technology research that will allow the biggest-ever extension of 'Big Brother'-style surveillance in the UK is being funded by the Government.

The radical new system, which has outraged civil liberties groups, uses mobile phone masts to allow security authorities to watch vehicles and individuals 'in real time' almost anywhere in Britain.

The technology 'sees' the shapes made when radio waves emitted by mobile phone masts meet an obstruction. Signals bounced back by immobile objects, such as walls or trees, are filtered out by the receiver. This allows anything moving, such as cars or people, to be tracked. Previously, radar needed massive fixed equipment to work and transmissions from mobile phone masts were thought too weak to be useful.

The system works wherever a mobile phone can pick up a signal. By using receivers attached to mobile phone masts, users of the new technology could focus in on areas hundreds of miles away and bring up a display showing any moving vehicles and people.

An individual with one type of receiver, a portable unit little bigger than a laptop computer, could even use it as a 'personal radar' covering the area around the user. Researchers are working to give the new equipment 'X-ray vision' - the capability to 'see' through walls and look into people's homes.

Ministry of Defence officials are hoping to introduce the system as soon as resources allow. Police and security services are known to be interested in a variety of possible surveillance applications. The researchers themselves say the system, known as Celldar, is aimed at anti-terrorism defense, security and road traffic management.
However civil liberties groups have been swift to condemn the plan.

'It's an appalling idea,' said Simon Davies, director of Privacy International. 'The Government is just capitalizing on current public fears over security to introduce new systems that are neither desirable nor necessary.'

The system, used alongside technology which allows individuals to be identified by their mobile phone handsets, will mean that individuals can be located and their movements watched on a screen from hundreds of miles away. Prototypes have been effective over 50 to 100 meters but the developers are confident that range can be extended.

Private security specialists have welcomed the new technology. 'It will be enormously useful,' the director of one private security firm said. 'Instead of setting up expensive and cumbersome surveillance equipment, police or the security services could start work quickly and easily almost anywhere. For tracking a suspect, preventing a potential crime or a terrorist strike or simply locating people [the system] has enormous advantages.'

It is likely that the technology would be used at first to protect sensitive installations such as ports and airfields. The perimeter of a nuclear power station or an air base could be watched without having a bank of CCTV screens and dozens of expensive cameras. If the radar picked up movement then a single camera could be focused on a specific area.

Celldar could also monitor roads when poor visibility due to bad weather rendered cameras useless. 'The equipment could pick up traffic flows towards an accident site and the details of a crash; that is where and so on,' said Peter Lloyd of Roke Manor. Lloyd also outlined a number of military applications for the technology. Individual armored vehicles or even soldiers could carry the detectors which could tell them where enemy troops were.

Security specialists point out how useful personal radars would be in siege situations. However there are significant concerns that the technology might be abused by authorities or fall into the wrong hands. 'Like all intrusive surveillance, we need to be sure that it is properly regulated, preferably by the judiciary,' said Roger Bingham of Liberty. Bingham expressed concerns that the new equipment, which would be virtually undetectable, could be used by private detectives or others for personal or commercial gain.

Modern technology has brought massive opportunities for wider surveillance. Since the 11 September terrorist attacks on Washington and New York, the government has been pushing through a package of anti-terrorism legislation which targets electronic communications.

The system works wherever a mobile phone can pick up a signal. By using receivers attached to mobile phone masts, users of the new technology could focus in on areas hundreds of miles away and bring up a display showing any moving vehicles and people.

An individual with one type of receiver, a portable unit little bigger than a laptop computer, could even use it as 'personal radar' covering the area around the user. Researchers are working to give the new equipment 'X-ray vision' - the capability to 'see' through walls and look into people's homes.

Ministry of Defence officials are hoping to introduce the system as soon as resources allow. Police and security services are known to be interested in a variety of possible surveillance applications. The researchers themselves say the system, known as Celldar, is aimed at anti-terrorism Defence, security and road traffic management.
However civil liberties groups have been swift to condemn the plan.

'It's an appalling idea,' said Simon Davies, director of Privacy International. 'The Government is just capitalizing on current public fears over security to introduce new systems that are neither desirable nor necessary.'

The system, used alongside technology which allows individuals to be identified by their mobile phone handsets, will mean that individuals can be located and their movements watched on a screen from hundreds of miles away. Prototypes have been effective over 50 to 100 meters but the developers are confident that range can be extended.

After a series of meetings with Roke Manor, a private research company in Romsey, Hants, MoD officials have started funding the multi-million pound project. Reports of the meetings are 'classified'. Whitehall officials involved in radar confirmed that the MoD was 'very interested' last week. 'It's all about resources now,' said one. Private security specialists have also welcomed the new technology. 'It will be enormously useful,' the director of one private security firm said. 'Instead of setting up expensive and cumbersome surveillance equipment, police or the security services could start work quickly and easily almost anywhere.

'For tracking a suspect, preventing a potential crime or a terrorist strike or simply locating people [the system] has enormous advantages.' It is likely that the technology would be used at first to protect sensitive installations such as ports and airfields.

The perimeter of a nuclear power station or an RAF base could be watched without having a bank of CCTV screens and dozens of expensive cameras. If the radar picked up movement then a single camera could be focused on a specific area. Celldar could also monitor roads when poor visibility due to bad weather rendered cameras useless.

'The equipment could pick up traffic flows towards an accident site and the details of a crash; that is where and so on,' said Peter Lloyd of Roke Manor. Lloyd also outlined a number of military applications for the technology. Individual armored vehicles or even soldiers could carry the detectors which could tell them where enemy troops were.

Security specialists point out how useful personal radars would be in siege situations. However there are significant concerns that the technology might be abused by authorities or fall into the wrong hands. 'Like all intrusive surveillance, we need to be sure that it is properly regulated, preferably by the judiciary,' said Roger Bingham of Liberty.

Bingham expressed concerns that the new equipment, which would be virtually undetectable, could be used by private detectives or others for personal or commercial gain.

Modern technology has brought massive opportunities for wider surveillance. Since the 11 September terrorist attacks on Washington and New York, the government has been pushing through a package of anti-terrorism legislation which targets electronic communications.

Senior police officers are now allowed to access mobile telephone and email records without judicial or executive assent. Within two years, all mobile phones are expected to have satellite-locating devices built into them.

Sunday, December 14, 2008

Careers in Pakistan

If we were in Pakistan, our options for professional courses after Std. XII would be as follows :

JEE - Jehadic Entrance Examination
IIT - Islamic Institute of Terrorism
IIM - Institute of Infiltration Management
CAT - Career in Alqaida & Taliban
IAS - Iraq after Saddam
M Tech - Masters in Terror Technology
GATE - General Aptitude in Terror and Extremism
TOEFL - Test of Extremist Foreign Languages
GRE - Graduate in Relocation Extremism
MBBS - Master of Bomb Blasting Strategies
MBA - Master of Bombing Administration

Saturday, December 13, 2008

Crime Investigation

What makes a serial killer tick? How do forensic experts solve crimes using cutting-edge technology? Who are the men and women that risk their lives to put criminals behind bars?

These questions and more are related to the subject of Crime Investigation. Real crime, real people, real drama - Crime Investigation is the hard work by the true professionals who work meticulously and methodically to solve the mystery behind the crime – motive, the modus-operendai and men involved in crime! Crime Investigation opens the door to crime labs, police archives and courtrooms, providing a behind-the-scenes look at criminal investigations and probing unexplained mysteries.


Physical Evidence at a Crime Scene

Evidence used to resolve an issue can be split into 2 areas - testimonial evidence and physical evidence. The testimonial evidence would be any witnessed accounts of an incident. The physical evidence would refer to any material items that would be present on the crime scene. These items would be presented in an issue or incident to prove or disprove the facts of the issue. What will evidence collected at a scene do for the investigation -

* May prove that a crime has been committed.
* Establish any key elements of a crime.
* Link a suspect with a scene or a victim.
* Establish the identity of a victim or suspect.
* Corroborate verbal witness testimony.
* Exonerate the innocent.

The evidence that is located and recovered at a scene will give the detectives responsible for the investigation leads to work with in the case.

Types of Evidence

o Impressions include fingerprints, tool marks, footwear, fabric impressions, tire
marks and bite marks.
o Forensic Biology includes blood, semen, body fluids, hair, nail scrapings, blood stain
ptterns,
o Trace Evidence includes gun shot residues, arson accelerant, paint, glass and fibers.
o Firearms - includes weapons, gun powder patterns, casings, projectiles, fragments,
pellets, wadding and cartridges.

Personnel Duties and Responsibilities

There are certain personnel duties and responsibilities which are necessary in almost any major crime investigation operation. Those enumerated herein concentrate on the ones which are typically crucial to ensure that such efforts are conducted in an organized and methodical fashion. It is important to note it may not be feasible to have one person assigned to each duty. It is relatively common for one person to accomplish two or more duties.
For all positions, interest and attitude of personnel are paramount concerns. Training and experience will only be used to best potential when team members possess a positive attitude. This human side of evidence response teams is significant due to the long hours and attention to detail often required of personnel.

The major assignments, as well as corresponding general duties and responsibilities, are set forth as follows:
* Team Leader
* Photographer and Photographic Log Recorder
* Sketch Preparer
* Evidence Recorder/Evidence Recovery Personnel
* Specialists

Team Leader

1. Assume control - ensure safety of personnel and security at scene. Ensure personnel use appropriate protective equipment and follow standard recommendations to protect them from any health hazard which might be presented by blood or any other human body fluid.
2. Conduct initial walk-through for purposes of making a preliminary survey, evaluating potential evidence, and preparing a narrative description.
3. Determine search patterns, and make appropriate assignments for team members.
4. Designate command post location and ensure exchange of information between search and investigative personnel.
5. Coordinate with other law enforcement agencies and make sure a cooperative spirit is maintained.
6. Ensure that sufficient supplies and equipment are available for personnel.
7. Control access to the scene and designate an individual to log everyone into the scene.
8. Continuously reevaluate efficiency of search during entire course of operation.
9. Release the scene after a final survey and inventory of the evidence has been done.

Photographer and Photographic Log Recorder

1. Photograph entire area before it is entered.
2. Photograph victims, crowd, and vehicles.
3. Photograph entire scene with overall, medium and close-up coverage, using measurement
scale when appropriate.
4. Photograph major evidence items before they are moved; coordinate this effort with Sketch
Preparer, Evidence Recorder, and Evidence Recovery Personnel.
5. Photograph all latent fingerprints and other impression evidence before lifting and casting are
accomplished.
6. Prepare photographic log and photographic sketch.

Sketch Preparer

· Diagram immediate area of scene and orient diagram with sketch.
· Set forth major items of evidence on sketch.
· Designate and label areas to be searched and advise team leader and all other search members of nomenclature for designated areas.
· Obtain appropriate assistance for taking measurements and double check measurements.
· Ensure necessary administrative information, such as scale disclaimer (not drawn to scale), is recorded on sketch.

Evidence Recorder / Custodian

o Have significant evidence photographed before collection.
o Describe evidence and its location on appropriate bag or envelope.
o Sign and date evidence container/maintain chain of custody.
o Appropriately collect and package evidence to maximize evidence integrity.
o Maintain evidence log.
o Use appropriate protective equipment (gloves) and methods when dealing with potentially infective evidence (blood).
o Documents in question

Processing the Crime Scene

In an Organized approach to Crime Scene Investigations there are three (3) basic and simple stages in properly processing the crime scene. Those stages consist of –

· Scene Recognition,
· Scene Documentation and
· Evidence Collection.

An organized approach is a sequence of established and excepted duties and protocols.

An organized approach assures:

oo A thorough and legal search is conducted.
oo Expeditious processing without compromise.
oo Proper scene documentation.
oo Proper methods and techniques for evidence recovery.
oo Proper use and knowledge of resources and equipment.
oo All pertinent evidence recovery.
oo Proper handling and packaging of evidence.
oo Proper distribution points for evidence analysis.
oo Proper safety precautions are followed.

Challenges in security training after the PSAR Act

Scene before passing of PSAR:

"The private security business employs more people than the police forces of all States combined and pays to the exchequer Rs. 10,000 crore by way of service tax, provident fund and contribution to the Employees' State Insurance Corporation.” The Hindu: 04.12.2006

It is not that there were no training needs for security professionals before PSAR. There were security agencies, there were contract security personnel and then there were proprietary security in many PSUs. They all needed training. Then there were DGR sponsored security agencies providing ex-servicemen.

As security personnel need to unlearn more then the learning to come out of fixed mindset working only in confined and constrained environment and straight-jacketed hierarchical structure, their training needs were found to be very peculiar in which they had to mostly unlearn what was leaned in armed forces so that they freshly approach the subject of industrial security which is different to national security!

As proven by the IT sector, every sector creates it niche and also creates it own trained professionals! The NIIT certification course is not the one given by any university, nor was initially approved by the Government. Same is the case with ‘Aptech”. Their quality of contents and training got the approval of the industry players and soon these certificate courses became eligibility criterion for employment in IT sector. Similarly the ‘Industrial Security Sector’ also created it demand of true security professionals and there supply of trained manpower became scarce. Few training institute got their act together and raised their training standards. All this was before passing of PSAR. There was still no benchmarking, there was no minimum syllabus nor were there any minimum training hours fixed. Mostly this was due to no regulatory authority and sector’s own internal co-ordination and self regulation failed to materialize.

Why PSAR and what it says about Training:

Statement of Objects and Reasons for PSAR Act - Due to increase in the number of business establishments and increasing demands for security, there has been a proliferation of private security agencies in the recent years. The growing tendency to hire security guards from private sources by an industrial or business undertaking has led to coming up of large number of private security agencies all over the country.

1. Though these private security agencies have helped in meeting the security needs of business establishments, there has been a growing concern about the manner of functioning of these agencies, many of which seem to conduct their operations without due care for verifying the antecedents of the personnel employed as private security guards and supervision.

2. There is also a danger of the employees of the private security agencies encroaching upon the duties of the police, using weapons in an illegal manner and wearing uniforms which resemble those of the police. In many instances, personnel employed by these agencies have also been involved in criminal activities.

3. For all these reasons, Union Government has been considering to regulate the functioning of these private security agencies, so that they are run within legal parameters and are accountable to a regulatory mechanism. In view of above, it is proposed to regulate the private security agencies through an Act which provides for a Controlling Authority to be appointed by the State Governments for the purpose of granting licenses and also to make holding of licenses mandatory for the carrying on of business of security agencies and other related matters.
Following are the sections of the PSAR Act which deal with the aspects of training -

9. Conditions for commencement of operation and engagement of supervisors-

(2) Every private security agency shall ensure imparting of such training and skills to its private security guards and supervisors as may be prescribed: Provided that the person carrying on the business of private security agency, before the commencement of this Act, shall ensure the required training to its security guards and supervisors within a period of one year from the date of such commencement.

10. Eligibility to be a private security guard-

(1) (d) Has completed the prescribed security training successfully;
(e) Fulfils such physical standards as may be prescribed; and
(f) Satisfies such other conditions as may be prescribed.

11. Conditions of license-

(1) The State Government may frame rules to prescribe the conditions on which license shall be granted under this Act and such conditions shall include requirements as to the training which the licensee is to undergo, details of the person or persons forming the agency, obligation as to the information to be provided from time to time to the Controlling Authority regarding any change in their address, change of management and also about any criminal charge made against them in the course of their performance of duties of the private security agency or as the case may be, a private security guard employed or engaged by them.

(2) The State Government may make provision in the rules to verify about imparting of required training by the private security agency under sub-section (2) of Section 9 and to review continuation or otherwise of license of such private security agency which may not have adhered to the condition of ensuring the required training.

13. Cancellation and suspension of license-

(1) The Controlling Authority may cancel any license on any one or more of the following grounds, namely:-

(c) That the license holder has violated the provisions of this Act or the rules made there under or any of the conditions of the license;

15. Register to be maintained by a private security agency-

(1) Every private security agency shall maintain a register containing—
(d) Such other particulars as may be prescribed.

24. Framing of model rules for adoption by States-

The Central Government may frame model rules in respect of all or any of the matters with respect to which the State Government may make rules under this Act, and where any such model rules have been framed the State Government shall, while making any rules in respect of that matter under Section 25, so far as is practicable, conform to such model rules.

25. Power of State Government to make rules-

(1) The State Government may, by notification, make rules for carrying out the provisions of this Act.

(2) In particular, and without prejudice to the generality of the foregoing power, such rules may provide for all or any of the following matters, namely:-

(g) Particulars to be maintained in a register under sub-section (1) of Section 15;

What are the challenges?

Training institutes of repute: accreditation by central / state governments
Training infrastructure: benchmarking
Training syllabus: elaborate training hour / subject basis
Training faculties: ranking system
Reading & reference material: Indian publication
Finances involved in separate training activities by Individual security agencies


Training institutes of repute: accreditation by central / state governments

"It is estimated that in the next five years, requirement of private security will increase to one crore security personnel which works out to be nine times the present strength of our Army. The private security industry today is operating in the most haphazard manner totally unregulated and suitable to meet the challenges. The manner in which most of the private security agencies function has become a matter of great concern. Many of these agencies conduct their operations without due care for verifying the antecedents of the personnel employed as private security guards and supervisors," pointed out Major General Satbir Singh,

"The private security personnel are required to be highly skilled, capable of understanding and using the modem security equipments." says Singh.
Gurgaon Plus – Digital 8.3.2006

There are many training institute which have mushroomed all over the country post PSAR. Some of them have capitalized the opportunity purely on commercial considerations since training has been given major emphasis in the Act. They will need more seasoning time to earn good repute.

Training infrastructure: benchmarking

All the training institutes need to have required training infrastructure including the training aids. It has to be kept in mind that the trainees can not be taught in ‘class room style’. All of them would be mature age, sufficient exposure to the industrial world and will also have some experience in industrial security. Understandably they may not be the brightest of the students as other-wise they would have had better career options but still they can be treated as fresh college students. For this purpose the training infrastructure must be appropriate most preferably multi-media based. Flip charts, overhead projectors etc. are no more suitable. Class rooms also must be suitable for circulation of the instructors and effortless interaction with the participants. They must also have wi-fy networking and suitable for LCD projection with good audio system.

Training syllabus: training hours / subjects-wise

The training syllabus drafted so far by certain states appears to be without practical approach and application of industrial experience. More then the security professionals these appear to be drafted by the police officers with foggy idea about security duties being synonymous to policing duties. This may not be the case and at least security professionals know it! In fact in one of the article recently published in ‘Security Today’, one of the retired IG has questioned the justification of keeping the subject of “Crowd Psychology and Techniques of crowd control” in the training syllabus of the security guards. Since it will take some time for ‘dust to settle down’, different training institutes will continue to have their own training syllabus. The Directorate General of Resettlement, Ministry of Defense, one government organization which could have taken some initiative at-least for the security agencies run by ex-armed force personnel has woefully disappointed in this aspect. It could have but done nothing so far regarding finalizing the security training syllabus for ex-servicemen security guards under their sponsored security agencies.
The DGR made half-hearted attempts to specify the training aspects in their ‘Guidelines’. Half hearted in the sense that though there was mention of specific training need in different sectors such as oil sector, mining sector etc, there was no syllabus or training hours specified! Further, there were few courses being run by DGR only to train the officers with the emphasis on how to run a security agency rather then becoming security professionals. These courses were conducted by sundry Training Institutes (?) with grandiose proclamation of being “International” when they had no separate one room office even and classes were being held in evening hours in some schools!

****

Wednesday, December 3, 2008

India's Antiterror Blunders: Years of appeasing militants has made the problem worse...

By : Sadanad Dhume

As the story of the carnage in Mumbai unfolds, it is tempting to dismiss it as merely another sorry episode in India's flailing effort to combat terrorism. Over the past four years, Islamist groups have struck in New Delhi, Jaipur, Bangalore and Ahmedabad, among other places. The death toll from terrorism -- not counting at least 119 killed in Mumbai on Wednesday and Thursday -- stands at over 4,000, which gives India the dubious distinction of suffering more casualties since 2004 than any country except Iraq.


The attacks highlight India's particular vulnerability to terrorist violence. But they are also a warning to any country that values what Mumbai symbolizes for Indians: pluralism, enterprise and an open society. Put simply, India's failure to protect its premier city offers a textbook example for fellow democracies on how not to deal with militant Islam. The litany of errors is long. Unlike their counterparts in the West, or in East Asia, India's perpetually squabbling leaders have failed to put national security above partisan politics. The country's antiterrorism effort is reactive and episodic rather than proactive and sustained. Its public discourse on Islam oscillates between crude, anti-Muslim bigotry and mindless sympathy for largely unjustified Muslim grievance-mongering. Its failure to either charm or cow its Islamist-friendly neighbors -- Pakistan and Bangladesh -- reveals a limited grasp of statecraft.


Finally, India's inability to modernize its 150-million strong Muslim population, the second largest after Indonesia's, has spawned a community that is ill-equipped to seize new economic opportunities and susceptible to militant Islam's faith-based appeal. To be sure, not all of India's problems are of its own making. In Pakistan, it has a neighbor founded on the basis of religion, whose government -- along with those of Iran and Saudi Arabia -- has long been one of the world's principal exporters of militant Islamic fervor.

Bangladesh also hosts a panoply of jihadist groups. As in Pakistan, public sympathy with the militant Islamic worldview forestalls any meaningful effort against those who regularly use the country as a sanctuary to plan mayhem in India. America's unsuccessful Pakistan policy -- too many carrots and too few sticks -- has also contributed to a fundamentally unstable neighborhood.

Nonetheless, the reflexive Indian response to most every act of terrorism is to apportion blame rather than to seek a solution that will prevent, or at least minimize, its recurrence. Even Indonesia -- a still-poor Muslim-majority nation where sympathy for militants runs deeper than it does in India -- has done an infinitely better job of recognizing that the protection of citizens' lives is any government's first responsibility. A superbly trained, federal antiterrorism force called Detachment 88 has ensured that country has not suffered a terrorist attack in more than three years.

By contrast, India's leaders -- who invariably swan around with armed guards paid for by the taxpayer -- can't even agree on a legal framework to keep the country safe. On taking office in 2004, one of the first acts of the ruling Congress Party was to scrap a federal antiterrorism law that strengthened witness protection and enhanced police powers.


The Congress Party has stalled similar state-level legislation in Gujarat, which is ruled by the opposition Hindu-nationalist Bharatiya Janata Party. And it was a Congress government that kowtowed to fundamentalist pressure and made India the first country to ban Mumbai-born Salman Rushdie's "Satanic Verses" in 1988.
The BJP hasn't exactly distinguished itself either. In 1999, the hijacking of an Indian aircraft to then Taliban-ruled Afghanistan led a BJP government to release three hardened militants, including Omar Sheikh Saeed, the former London School of Economics student who would go on to murder Wall Street Journal reporter Daniel Pearl.


More recently, the BJP, driven by tribal religious solidarity and a penchant for conspiracy theories, has failed to demand the same tough treatment for alleged Hindu terrorists as it does for Muslims. Minor parties, especially those dependent on the Muslim vote, compete to earn fundamentalists' favor.

In sum, the Indian approach to terrorism has been consistently haphazard and weak-kneed. When faced with fundamentalist demands, India's democratically elected leaders have regularly preferred caving to confrontation on a point of principle. The country's institutions and culture have abetted a widespread sense of Muslim separateness from the national mainstream. The country's diplomats and soldiers have failed to stabilize the neighborhood. The ongoing drama in Mumbai underscores the price both Indians and non-Indians caught unawares must now pay.
Mr. Dhume is a Washington-based writer and the author of "My Friend the Fanatic: Travels with an Indonesian Islamist" (Text Publishing, 2008).


Saturday, November 29, 2008

The lessons learnt from Mumbai Terror Attack

Our collective heads are hanging in shame…
Where was the Crisis Management Group, and, what was it doing all this while? If popular Delhi FM radio station is to be believed, it took precious 9 hours for CMG to assemble and decide about sending NSG team to Mumbai. When it reached there, same source revealed, how they were brought to the venue of their action? No prize for guessing – in BEST buses, no less!

To break the somnambulistic lethargy emanating out of sense of being in power is provably the toughest challenge which Nation faces! Facing the terrorism or hostile nation is consequent and easier!! Leadership changing the dresses and changing the words still spewed same rhetoric! Not only the concerned ministry but the whole country takes the concerned Minister as a liability. ‘Address to the Nation’ with Zombie like glazed looks and monotone - devoid of feelings and emotions can not instill the trust and confidence of the citizens in the national leadership.

Where are the tough anti-terror laws they have been talking about? Where are the tough actions promised time and again?? When police from one Indian state can not enter other state on hot-pursuit then how doctrine of hot pursuit can be practiced when terrorists come from Pakistan and run back to it? Our leaders shy away even naming Pakistan as country behind terrorists activities and on sly name it as ‘neighboring country’ when actually they should name it as Pakistan. Terrorism can not be eliminated by tough talks; it can be eliminated only by tough actions. Taking decision is the most difficulty part; actions are easier for politicians and police forces respectively.


How one redeems his name, ask Hemant Karkare who led from front and sacrificed his life? Till few days back his name was being maligned and now he is a martyr! The political appointment – Director General of Maharashtra Police chose to issue statements from the comforts of his office using brave words when other Director General – in this case – of National Security Guards was in battle fatigue and supervised the whole operation rushing from place to place wherever his guidance was needed. He did not forget to introduce his team of officer involved in operation when he addressed the media. But when a local congress leader faced the camera, not only his followers chanted slogans in his favor as if he was addressing election rally, he himself made it a point to credit his leadership for planning to formulate ‘tough anti-terror law’. Hollow words, all these!

Security personnel and law enforcing agencies are routinely rubbished for being utterly unprofessional, criminally lethargic, poor in intelligence and shabby in action! There have been routinely departmental cases and guilty are punished. What about punishing the leadership? To whom they are answerable?

Some terrorist apprehended will be put through the long drawn legal battle. They might not get punishment, and, even when that happens there is no guarantee that the Government will not dither? Has Afzal been hanged so far? The family members of security personnel who laid down their lives defending the Parliament are still waiting the final decision on Afzal. The Top Executive of the country takes ages deciding on a ‘non-issue’ related to a dreaded terrorist but is always ‘pleased’ to punish some ‘Babu’ coming late to the office!

Those talking bravely about removing ‘North Indians’ from their Land had lapsed in tongue tormenting paralysis and are yet to speak even a single word condemning the terrorist attacks and about their plans to remove the terrorists from their Land.

There were already two ‘Senas” in Mumbai specially trained to bully and tormenting the innocents and vandalizing the public and private property. Surely these ‘Senas” could have handled the ‘terror situation’ in Mumbai without the help of ‘outsiders’ for this would otherwise sully the ‘Asmita’ (self dignity) of ‘Marathi Manoos’! Why was it not done remains a mystery! In fact other mystery is what were the ‘Senapatis’ doing at the time of crisis if not hiding in some bunkers?

When India demands America to declare Pakistan as ‘Rogue Nation’ or ‘Terrorist Nation’ it becomes laughing stock as it is same India which has accorded Pakistan the status of ‘Most Favored Nation’. We don’t have to present so called clinching evidences to USA for Pakistan’s involvement in terrorism in India. If we are so convinced about them, what stops us taking drastic actions? Super Power a country doesn’t become by pretensions, one only becomes by tough actions. Time for tough action is now, if there ever was any!

Our collective heads are hanging in shame for the way country’s leadership so irresponsibly and callously handled the situation in Mumbai! Those who know little Greek mythology will understand that cutting the snakes was never a solution as solution was cutting the head of Medusa! We can eliminate terrorism only by eliminating its breeding and feeding ground which is Pakistan.


Lessons learnnt from Mumbai terror Attacks...,
There are few lessons learnt from the whole 60 hours long operation which ended with more then 195 casualties and more then 280 injured –

Be ever ready!

It pays to be ‘battle ready’ as ‘shahadat’ of Karkare, Kamte and Saluskar has proved. If one is in security duty, do not forget to secure self! No need to be over protective to the verge of being coward, but ensure that reasonable precautions are taken! Dead heroes are history whereas living ones are the national assets.

Remain in control of the situation…

Do not let the situation control you! NSG has proved it more eloquently. Soon after they took charge, not even for a minute it appeared to those watching the whole scene in front of TVs that they were loosing control. They never appeared to be hassled and at receiving end and throughout the operation maintained high level of professionalism. One of the cherubic NSG Commando when asked what was toughest part of operation, nonchalantly commented that “nothing is difficult or tough for them!”


Think out-of-the box!

The terrorists’ strategies can not be taught in the class room from training books. The conventional tactics and strategies are for the conventional warfare for conventional armed forces. Terrorists use almost every time the most audacious and impractical approach for that reasons alone! The security forces need to think out-of-the box! The water-front was not used by the terrorist as approach route so far. But it never was a guarantee for no future use by them. When they did use it, no one was prepared. We have to start thinking the ‘impossible’ as surely someone is capable to convert it into ‘possible’.

Security Force! No hurry, take time! But be timely!!

It takes time to acclimatize with the ground. No security force or commando operation can be undertaken without proper planning involving the reconnaissance of the area to have ‘feel of the ground’. Only fools rush-in! The deliberate and prudent planning takes time as failure endangers precious lives and no ready made ‘one-size-fits-all’ solution can be applied to all the situations. However once the course of action has been decided the entire operation must be conducted with time and precision.

Power of taking Decisions

The Political Leadership takes time to decide, in fact their specialization is in delaying the decision taking and therefore expecting quick or timely decision is asking for too much. It is time that the onus of taking the decision is divested from the politicians and invested to the head of “Anti-Terrorist Federal Agency”, which needs to be created sooner.

NSG Deployment.

If presently National Security Guard (NSG) is expected to handle terrorist strike, hostage situation etc. then why must it remain located in Delhi? If NSG is expected to react to any situation occurring in any part of India, then it must be strategically located in various well connected cities preferably the metropolises. By the time the NSG team reaches the site of their operation, the least local police can do is to barricade the area, ensure smooth traffic movement for ambulance and vehicles of security forces.

Reliable & Timely Communication

Communication through Ham Radios, ‘blogging’ and ‘twittering’ can be very important for common citizens as networks are known to jam in such situations. Keeping the citizens informed is very important in such situations as rumor-mongering will not only demoralize them but may cause another law-and-order problem which law enforcing agencies can ill afford at the time.

Don’t be naĂŻve, we are the terrorists!

Very naively one of the leading English daily describes a typical ‘fidayeen’ as “armed with an assault AK-47 rifle, a 9 mm pistol and several Chinese made hand grenades, with spare bullet magazines in his pouches an knapsack, apart from dry fruits and other eatables to sustain ..” This caricature of fidayeen terrorist is far from truth. The terrorists are not like soldiers of conventional armed forces that they will be always in ‘battle order’ when in battle. They have in past and will be in future too ‘dressed for the occasions’! the terrorists will dress as per the time and location related to their action and will be equipped as per the need and as per the Just because terrorists this time were equipped and accoutered like this doesn’t mean they will be similarly seen in future also. Most likely they will be looking different for the reasons that their appearance of similar type will draw attention in future.

Media! Please don’t mess-up with security personnel!

The media people have to realize that even when they have important duty to perform, their duty is still not more important then that of security forces. In their eagerness of ‘me-first’ they sometimes enter the area where they have no business to be in. There presence in such situation not only hinders the activities of the security personnel, they also become the liabilities of those security personnel who were risking their own lives to save others. The foolhardiness of one such correspondent surely must not have missed the attention of TV viewers when some correspondent was shown telling with bravado of having gone to the area where from he was rescued by the NSG commandos!

Media Ethics, what is that?

The TV channels are known to have gone overboard in such situation in past and this time was also no exception. It was not appreciated by the TV channel while live telecasting the talk with the terrorist that it was almost verging at “offering a platform to espouse their cause”. A fact was overlooked by the channel that a ‘legitimate reporting duty’ of the channel may jeopardize the innocent lives, create law-and-order situation or incite some part of the society for more violence.

Credibility of Media News: Mom no homework!

Common people must understand the most of the media people are ‘generalist’ journalist and being in young as most of them are, are not suppose to know all, even when they pretend otherwise. Their reporting may not be factually accurate or they might not have recourse to cross check the veracity of the facts when reporting live. In one case Kamte was referred as ACP and Additional CP in same breath! In other case NSG Havaldar was referred as senior officer! In both the cases the reporters had shown their very poor knowledge of rank structure of police and armed forces. Understand the affect on the police force of the news of death of Additional Commissioner of Police Addl. CP) when actually Assistant Commissioner of Police (ACP) died. Similarly people will tend to agree more with the news when it is reported that sources of the information is very senior army officer were as it was actually a havaldar! So, morale is that take the media reporting with pinch of salt. They are known to be wrong some times.

*****

Saturday, November 15, 2008

IISSM GOA 2008

On the eve of annual seminar of IISSM held at Goa, meeting of Board of Governors of IISSM was held on 12th November 2008. Following office bearers were present -
  1. Mr. K P Medhekar, IPS (Retd.) - Chairman
  2. Mr. R Swaminathan, IPS (Retd) - President & Director General
  3. Capt. S B Tyagi (Retd.), FISM, CPP - First Vice President
  4. Maj. P Kalastree (Retd.) - Vice Chairman - Pacific Region
  5. Prof. Kris Pillai, FISM - Vice Chairman - Africa
  6. Col. Stanlay J Grogan (Retd.), CPP - Vice Chairman - US, Canada & West Indies
  7. Mr. G S D'souza - Provider Represntative
  8. Mr. Uday Singh - Foundation Representative
  9. Mr. BG Deopujari - Sapcial Invitee
  10. Mr. D C Nath, IPS (Retd.) - Executive President & CEO
  11. Lt..Gen. Prem Sagar (Retd.) - Executive Presedent (M&F)

The meeting was held at the International Cullinary & Catering Acadamy (ICCA) having acredition with world renowned Swiss Catering Institute, started by young entrepreneur Mr. GS D’souza who is also the moving force of Goa Chapter of IISSM, the co-host of the annual seminar. The meeting was followed by cocktail - dinner for which ladies also joined-in later.


































The annual seminar begun from 13-15 November at Hotel Cidade de Goa and was inaugurated by His Exellency, The Governor of Goa.

Few glimpses of the seminar are given below -


Sunday, November 9, 2008

Lost Laptops : Lost Data

Laptop computers are essential for organizations to make sure their employees have access to information they need wherever they are working…at home, in a meeting, or on the road. A lost laptop creates a two-dimensional problem. First, the laptop itself must be recovered or replaced. Second, and even more unsettling, is the prospect that critical information on the company, its plans, and its customers could have been lost as well.

This article looks at both types of losses, from a statistical and cost point of view. It also examines the internal and external factors that contribute to laptop theft. Who steals laptops? What motivates their actions? Why are companies targeted repeatedly?

Based on an extensive review of published research, the report explores the scope of the problem. A range of detailed solutions is offered. In a sample of worldwide jurisdictions, current legislative efforts impose new sanctions. Several product innovations may help to prevent thefts. Disrupting the ways thieves can unload their bounty is another deterrent. The appendices include exhaustive lists of physical, electronic, and procedural security enhancement, so organizations have specific ways to discourage or prevent thefts. The report encourages companies to set goals to counter laptop theft and then implement those goals through situational prevention techniques and the seven steps of loss prevention. Additional research could aid in preventing the theft of laptops and the data that resides on them. The report concludes with suggestions for further exploration by academic and corporate investigators. Laptop computers are essential tools in today’s global economy. Employees at all levels, in all business sectors, must be mobile. They must have access to information whether they are at home, on a sales call, or in a hotel.

Because laptops are portable, they are highly susceptible to theft. The theft of business laptops and the loss of the confidential and propriety information residing on them can occur when the user is in the office or on the road. Researchers have determined that 25% of laptops are stolen from the office or the owner’s car. Another 14% are lost in airports or on airplanes.


Laptop theft is a two-dimensional problem. On the surface, companies must devise ways to secure the actual devices from crafty thieves with easy access to pawnshops and fences. Even more sinister, the data on a stolen laptop has enormous value among the illicit networks that prey on unsuspecting consumers, or reap rewards from insider information. In their attempts to stay competitive in the world marketplace, companies cannot afford to overlook the seemingly insignificant loss of a laptop. Details on the scope of the problem, the high price of ignorance, and the determined thieves looking for loopholes will convince even the most ardent skeptic to take the actions recommended in this report.

Stolen laptops

The chance that a laptop will be stolen or lost during any twelve months is one in ten, according to a 2002 Gartner Group study. Estimates among industry analysts confirm the frequency with which laptops disappear. A 2004 InfoWorld article, for example, estimated that the annual number of stolen laptops ranges from 700,000 to 1 million. That same year, an Entrepreneur Magazine article used an FBI estimate to report that 1.5 million laptops had been stolen in 2004, a 50% increase from the year before. Both public and private sector organizations are at risk worldwide. In a 2006 report, the Committee on Government Reform noted that in the previous five years 1,137 U.S. Department of Commerce laptops had been lost, stolen, or reported missing. A 2006 Australian Computer Emergency Response Team survey of 17 industries found that 58% of the 389 respondents detected laptop thefts during the year of the survey. Between 2005 and 2007, 4,700 laptops were stolen from offices in Calgary, Canada, according to a 2007 survey by the Calgary Public Safety Committee of the Building Owners and Managers Association (BOMA). Medical, financial, oil and gas, legal, engineering, transportation, personnel, and property management industries were included in the study. Appendix A is a checklist that can be used to track a company’s laptop inventory and monitor how the laptops are being used.

Stolen confidential information

Statistics that measure the loss of business and personal information residing on laptops are even more alarming. A 2006 Ponemon Institute survey found that 81% of the U.S. companies studied reported the loss of one or more laptops containing sensitive information in a twelve-month period. The computer security Web site, www.attrition.org, includes an extensive list of laptop and data thefts. In early 2008, the site reported more than 900 data breaches yielding 310 million records.

Lost productivity

Productivity is the first victim of a stolen laptop. Should an employee lose his or her laptop, that employee’s ability to work is compromised, often for days. At one company, for example, eight laptops used by key employees were stolen, including those in the firm’s finance and engineering departments. It took three days for replacement units and back-up data discs to be found before the business could resume operations.

Recreating data

Depending on a company’s data back-up practices and its use of a central server for data storage, data may be replaced in a few minutes—or be lost forever. In developing adequate data replacement and recreation strategies, company executives must resolve many questions, such as what procedures must be developed to ensure that important data is secured, as well as how quickly it can be replaced or retrieved, and at what cost.

Lost business

When customers learn of a data breach, their faith in the company incurring the loss can be shaken. They may shift their business to competitors. According to the 2007 Ponemon survey, data breaches exposing customer data can cost a company $128 in lost business, per victim. In a similar Ponemon study conducted in 2005, researchers found data breaches seriously affected corporate reputation, corporate brand, and customer retention. When notified of a breach, almost 20% of customers terminated their relationship with the company. Another 40% considered termination.

Internal Factors Contributing to Stolen Laptops and Lost Data

Why are laptops easy targets for gaining access to data? The answer involves a combination of misperceptions on the part of the company and the users of the laptops. Some companies simply fail to maintain an adequate inventory of their laptops, while others completely refuse to invest in appropriate security policies and procedures. Users often fail to understand the value—not only of the units themselves—but also of the information they contain. Consequently, they can resist applying appropriate security policies and procedures when they are enacted.

Accountability

A 2004 survey by Ernst & Young found that few organizations and individuals feel they should be held accountable for failing to protect laptops and data. In many organizations, when a laptop is stolen, the affected employee simply acquires another from inventory. Even some security practitioners hesitate to emphasize laptop theft. One corporate security professional admitted that he had more global issues to confront than

Inadequate security

When finally caught, one Calgary laptop thief responsible for hundreds of thefts over several years admitted to the arresting officers, “companies made it too easy for these types of crimes to be committed, because of the lack of appropriate security measures.” Even when adequate security measures are in place, they are often ignored for two reasons: the security staff is not available, not credible, or unable to sell the value of protective strategies; or employees are uninterested or have been poorly trained.

Perception

The relatively low price of laptops can suggest that they do not merit protection. Even though many organizations spend thousands of dollars on individual laptops, they are often viewed as a minor part of a departmental or organizational budget. Organizations that embrace this thinking fail to understand the true cost of a laptop, or the value of the data residing on it. Even privacy legislation assigns a value to data by assessing fines for losing it.

External Factors Contributing to Stolen Laptops and Lost Data

Even a well-designed security program must be tweaked constantly to keep ahead of external factors that are determined to uncover its weaknesses. The market for a company’s proprietary information and personal data on customers and clients is lucrative. Determined thieves are more than willing to take the risks to reap the rewards. Once thieves have been successful at one property, research shows that they are likely to return.

Determined thieves

According to the 2003 BSI Computer Theft Survey, 99% of survey respondents who experienced computer theft reported that the thief was never caught. Some thieves are simply opportunistic and take advantage of situations to steal laptops. In interviews conducted for the 2007 BOMA survey, one thief admitted that he made between $500 and $600 per unit, and had stolen as many as fifteen laptops at a time. At the other end of the spectrum, thieves admitted they sold laptops for as little as $40 of crack cocaine. Thieves intent on stealing laptops will put tremendous effort into overcoming significant security measures. They will conduct security assessments to look for weak entry points. They will bring props, such as maintenance, janitorial, or security uniforms, so they appear to fit in. They will make phony identification badges, develop cover stories, and communicate with partners using cell phones and radios. One offender indicated that he would conduct research on the latest equipment and develop “want lists” before orchestrating a hit. Organizations are vulnerable to laptop thefts from both outsiders and employees. Research is contradictory about which poses a greater threat. But there is no doubt that those inside organizations are also stealing laptops. Authors Clarke and Eck posit that laptops are “CRAVED” by thieves. The acronym explains why.

Concealable: Because they are small, laptops are easy to hide beneath a jacket, layer between other items, place in a backpack, or put in a gym bag. Removable: The portability of the device is partially what makes the laptop desirable to both companies and individuals.
Available: Many individuals and companies use laptops extensively. As a result, considerable numbers are available to be stolen.
Valuable: Many people are willing to pay large enough sums of money for stolen
laptops. Thieves tapping into this lucrative market are willing to go to extremes to satisfy the demand.
Enjoyable: As computers become more essential for both business and pleasure, the demand continues to grow.
Disposable: An illegal market is readily available, allowing thieves to dispose of laptops easily.

Managing the Threat

Ultimately, preventing laptop thefts and the resulting data loss requires a permanent solution. Countering the threat requires company management to commit to a course of action prescribed by basic security principles. These principles are used by corporations of all types, in all corners of the world, to prevent and deter myriad risks to a company’s well-being. Bringing these same principles to bear on this specific crime can reduce the threat from both internal and external sources. Implementing these principles requires a review of the many resources and options available, including: physical, electronic, and procedural security enhancements; legislation; and product design. In conjunction with law enforcement, preventive measures should also disrupt the market for the stolen goods.

Physical, electronic, and procedural security enhancements

A comprehensive and converged physical, procedural, and information security program is essential for every organization, regardless of size, industry, or ownership. And part of that program must address laptop security and the related loss of potentially sensitive data. Implementing the appropriate security measures requires money, time, and effort. Companies must be committed to supplying all three. Management must realize that a lack of funding is a serious impediment to a comprehensive protection program. Many companies have implemented successful strategies. But research shows that companies that have failed to do so lack a comprehensive, layered approach to security that takes into account physical, electronic, and procedural measures. Also, these measures must be embraced by all employees, including laptop users, management, and security professionals from both physical and electronic disciplines.

Seven steps to prevent loss

These two goals can be achieved by adopting the situational prevention techniques. They can be implemented by adopting the following seven steps:

Step 1: Conduct an audit to determine where laptops are used within the organization. This audit determines specific information about a company’s laptops, such as where they are being used in the organization, how many are in the inventory, which is using them, for what purpose, and what type of data is residing on each one.

Step 2: Determine whether specific employees need a laptop to do their jobs. If a laptop is not required, it should be replaced with a desktop unit. If the laptop is an essential part of the employee’s work, the next steps should be pursued.

Step 3: Classify data on the laptop according to organizational guidelines. The classification scheme should be specific to the organization and its culture. A number of classification models are available. The one selected should be clearly understood, implemented, and followed by all employees. The example of Sample Identification and Classification of Data can help categorize the relative value of “Public Documents,” “Proprietary Information,” or “Highly Confidential Information.” The latter group includes human resources, financial, security, and organizational plans and strategies, as well as test results, assessments, surveys, or other information the organization has spent money collecting or developing.

Step 4: Determine if data residing on each laptop is necessary for employees to complete their jobs. If not, the data should be removed. If the data is necessary, the next step should be pursued.

Step 5: Conduct a risk assessment to determine possible theft scenarios for the data stored, processed, or transmitted by laptop. Devise appropriate security measures to protect both the data and the laptop. The assessment puts the required physical, procedural, and electronic security measures into perspective, as well as the necessary security awareness training. Obviously, the higher the classification of the data, the more security measures should be in place. A number of risk assessment methodologies are available. In addition, ASIS International has published a General Security Risk Assessment Guideline, available to download for free at
http://www.asisonline.org/.

Step 6: Implement the required protection strategies. Protective strategies start with security awareness programs; employees must understand their obligation to use the security measures required to protect laptops and data. Employees should be required to indicate, in writing, that they understand the established laptop and data protection guidelines. Department managers and senior managers should show their support for the policy by signing similar forms. Both facility and IT security personnel have special responsibilities for implementing the policy, and should indicate their willingness to assist on the appropriate forms.

Step 7: Create a loss response team to monitor laptops and data. Should a loss occur, the affected employees should be required to report the loss in writing. The team then responds to the report by investigating the losses and determining the scope of the data breach. In addition, the team should be regularly educating users, conducting audits to ensure compliance, annually assessing data needs, and destroying or removing data when it is no longer required. This process is cyclical, since new laptops and data enter and leave the organization on a regular basis.