Purushottam Sharma


Published on

Presentation given by Purushottam Sharma, IG of Police, SCRB, Madhya Pradesh on August 2nd, 2011 at eWorld Forum (www.eworldforum.net) in the session Public Safety, Security and Disaster Management

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Thus iris being the most accurate and fastest biometric can be used for very accurate and rapid identification of criminals
  • Purushottam Sharma

    1. 1. Public Safety, Security and Disaster Management by MP Police Presentation by Purushottam Sharma,IPS IGP, Madhya Pradesh, Bhopal
    2. 2. Challenges to Law Enforcing Agency <ul><li>Policing in our country has become increasingly complex over the years. Social tensions, religious disputes, growing economic disparities and regional, linguistic and ethnic differences, terrorism and Naxalism have long been major challenges to effective policing in India today. </li></ul><ul><li>Crime is present in various forms in India . Organized crime include drug trafficking, gunrunning, money laundering, extortion, murder for hire, fraud, human trafficking and poaching. Many criminal operations engage in black marketing, political violence, religiously motivated violence, terrorism, and abduction. Other crimes are homicide, robbery, assault etc. Property crimes include burglary, theft, motor vehicle theft, and arson. </li></ul>
    3. 3. Government ‘s Plan To Overcome Challenges <ul><li>Crime and Criminal Tracking Network and System (CCTNS) </li></ul><ul><li>Biometrics Security </li></ul><ul><ul><li>Presently- Automated Fingerprint Identification System(AFIS) </li></ul></ul><ul><ul><li>Future-Automated Multi-modal Biometric System(AMBIS ) </li></ul></ul><ul><li>GIS/GPS based AVLS Project </li></ul><ul><li>MP Police Website </li></ul><ul><li>Network & Database Security </li></ul>
    4. 4. CCTNS <ul><li>CCTNS aims at creating a comprehensive and integrated system for enhancing the efficiency and effectiveness of policing at all levels and especially at the Police Station level through adoption of principles of e-Governance, and creation of a nationwide networked infrastructure for evolution of IT-enabled state-of-the-art tracking system around “investigation of crime and detection of criminals” in the real time, which is a critical requirement in the context of the present day internal security scenario. </li></ul><ul><li>CCTNS covers all 35 States and Union Territories and all police stations (approximately 15,000) and all higher police offices (approximately 6,000) in the country . The CCTNS project includes vertical connectivity of police units (linking police units at various levels within the States – police stations, district police offices, state headquarters, SCRB and other police formations) as well as horizontal connectivity (linking police functions at State and Central level to external entities). </li></ul>
    5. 5. AFIS <ul><li>AFIS is acronyms of Automated Fingerprint Identification System </li></ul><ul><li>This is fully automatic computerized system for Fingerprint Identification which reduce expert intervention. </li></ul><ul><li>It is very useful system for quick & accurate search in Ten digit as well as in chance print. </li></ul>
    6. 6. AFIS STRUCTURE IN MP <ul><li>Central server of AFIS system is established at SCRB, PHQ, Bhopal </li></ul><ul><li>Remote Query Stations (RQS) are established at all Distt.of MP & three SRP’s. </li></ul><ul><li>Each RQS connected to central server through router. </li></ul><ul><li>RQS having the records of that distt.while all distt. Records are available at AFIS Central Server, Bhopal </li></ul><ul><li>All 51 RQS(Distts.) connected to central server through dial-up connection . </li></ul>
    7. 7. Architecture of AFIS Control Server Comm. Server IND BPL JBP DWS KWA HBD BTL BHD GWL SHR Matcher Server
    8. 8. AMBIS <ul><li>AMBIS (Automated Multi-Modal Biometrics Identification System) </li></ul><ul><li>Incorporates State of the Art biometric technologies to serve law enforcement applications beyond traditional AFIS capabilities </li></ul><ul><li>Modalities used today </li></ul><ul><ul><li>Finger (Ten print flats and rolls, latent) </li></ul></ul><ul><ul><li>Face (Mug shot and latent face) </li></ul></ul><ul><ul><li>Iris (Dual iris scans) </li></ul></ul><ul><ul><li>Palm (Print and latent) </li></ul></ul>
    9. 9. Why Multi-modal Biometrics ? <ul><li>Collectively the system will have more capabilities, reduced total cost of ownership and increased accuracy. </li></ul><ul><li>NCRB will build database in alignment with UIDAI standards and thus the national residents database. </li></ul><ul><li>Finger is used for traditional applications. </li></ul><ul><ul><li>Chance print investigation </li></ul></ul><ul><ul><li>Identification in case of other missing biometrics </li></ul></ul>
    10. 10. Multi-modal Biometrics- Empowerment <ul><li>Iris </li></ul><ul><li>Iris is nothing but just a photo of your iris taken using a special camera. </li></ul><ul><ul><li>Iris inherently has the lowest False Acceptance Rate which makes detection and linking of criminals records very effective (Only one result in the scores list). </li></ul></ul><ul><ul><li>Iris matching algorithm is also inherently the fastest biometric, reducing hardware footprint and response time thus making total cost of owner ship low </li></ul></ul><ul><ul><li>By incorporating iris in the AMBIS NCRB database will be inline with UIDAI database </li></ul></ul>
    11. 11. Power of Multi-modal Biometrics <ul><li>Face </li></ul><ul><ul><li>Only biometrics that can be captured covertly </li></ul></ul><ul><ul><li>Mug shot identification and Digital Line-up </li></ul></ul><ul><ul><li>Face Latent matching from surveillance videos </li></ul></ul><ul><li>Palm </li></ul><ul><ul><li>Latent palm matching </li></ul></ul>
    12. 12. GIS/GPS based AVLS Project <ul><li>MP Police has implemented an Automated Vehicle Tracking System for Bhopal and Indore City for providing an Integrated Disciplined system for Traffic Control and maintaining Law and Order in the district, where in 100 vehicles of the MP Police would be tracked and monitored each city. </li></ul>
    13. 13. Advantage to Police Department <ul><li>To optimize and automate the emergency response services of the police department.. </li></ul><ul><li>To enhance public safety by making more timely, accurate and complete Information </li></ul><ul><li>To make available for effective Police Operations </li></ul><ul><li>  To Utilize information technology to improve public safety service to the community </li></ul><ul><li>To increase productivity by eliminating redundancy and unnecessary tasks </li></ul><ul><li>To improve the mobile unit(s) asset management by increasing the control and remote control capabilities </li></ul><ul><li>To utilize and manage technology in a cost effective manner </li></ul>
    14. 14. Advantage to Public <ul><li>Reduce waiting time for citizens on roads while during surprise checks to verify the possible involvement of person and property especially in Motor vehicle and other Crimes. </li></ul><ul><li>. To enhance public safety with more availability of information. </li></ul><ul><li>Public get immediate service like –police assistance , ambulance & fire service. </li></ul><ul><li>Public will get information related to traffic diversion owing to VVIP movement and public/political agitation </li></ul><ul><li>Voice recording or caller log </li></ul>
    15. 15. MP Police Website
    16. 16. New Services in Website <ul><li>For Department </li></ul><ul><ul><li>Web based Modules for Monthly Analysis of Crime. </li></ul></ul><ul><ul><li>Heinous Crime Monitoring Module. </li></ul></ul><ul><ul><li>Daily Situation Report Module. </li></ul></ul><ul><ul><li>PRO Module (Press release of PHQ and State) </li></ul></ul><ul><ul><li>Future upgradability, e-tendering etc . </li></ul></ul><ul><li>For Public </li></ul><ul><ul><li>Improved Complaint Module. </li></ul></ul><ul><ul><li>Dynamic Information of Districts, displayed geographically. </li></ul></ul><ul><ul><li>Press Release and News Flash for Police Head Quarters and Districts. </li></ul></ul><ul><ul><li>To improve the access speed of website the bandwidth of Internet Lease Port is upgraded from 1 Mbps to 3 Mbps. </li></ul></ul><ul><ul><li>User Friendly Design </li></ul></ul>
    17. 17. Prominent Features “Services” <ul><ul><li>General </li></ul></ul><ul><ul><ul><li>User Friendly Design. </li></ul></ul></ul><ul><ul><ul><li>Powerful Administrative Tool. </li></ul></ul></ul><ul><ul><ul><li>New Improved Complaint Facility . </li></ul></ul></ul><ul><ul><li>Technical </li></ul></ul><ul><ul><ul><li>Modular and Scalable for future enhancements. </li></ul></ul></ul><ul><ul><ul><li>Bilingual Support for Hindi and English. </li></ul></ul></ul><ul><ul><ul><li>User Management / Access Management. </li></ul></ul></ul><ul><ul><ul><li>Enhanced Security. </li></ul></ul></ul><ul><ul><ul><li>3 - Tier Architecture. </li></ul></ul></ul><ul><ul><ul><li>Built on .NET Technologies. </li></ul></ul></ul><ul><ul><ul><li>Microsoft SQL Server 2005 Enterprise Edition. </li></ul></ul></ul>
    18. 18. Security Risk to Database & Network <ul><li>Unauthorized or unintended activity or misuse by authorized database users, database administrators, or network/systems managers, or by unauthorized users or hackers ; </li></ul><ul><li>Malware infections causing incidents such as unauthorized access, leakage or disclosure of personal or proprietary data, deletion of or damage to the data or programs, interruption or denial of authorized access to the database, attacks on other systems and the unanticipated failure of database services; </li></ul><ul><li>Overloads, performance constraints and capacity issues resulting in the inability of authorized users to use databases as intended; </li></ul>
    19. 19. <ul><li>Physical damage to database servers caused by computer room fires or floods, overheating, lightning, accidental liquid spills, static discharge, electronic breakdowns/equipment failures and obsolescence; </li></ul><ul><li>Design flaws and programming bugs in databases and the associated programs and systems, creating various security vulnerabilities (e.g. unauthorized privilege escalation), data loss/corruption, performance degradation etc.; </li></ul><ul><li>Data corruption and/or loss caused by the entry of invalid data or commands, mistakes in database or system administration processes, sabotage/criminal damage etc. </li></ul>Security Risk to Database & Network Continue
    20. 20. Security Policies Adopted by MP Police at Central Data Center <ul><li>Responsibility for information security </li></ul><ul><ul><li>involved personnel, their roles, and involved systems </li></ul></ul><ul><li>Password Policy </li></ul><ul><li>Server Security Policy </li></ul><ul><li>Router Policy </li></ul><ul><li>Switch Security Policy </li></ul><ul><li>Antivirus Policy </li></ul><ul><li>Patch Management Policy </li></ul><ul><li>Firewall Policy </li></ul><ul><li>IPS Policy </li></ul><ul><li>Web Usage Policy </li></ul><ul><li>E-mail Usage Policy </li></ul>
    21. 21. Firewall Policy at Data Center <ul><li>Firewalls can be hardware, software or a combination of both. </li></ul><ul><li>Firewalls are used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. </li></ul><ul><li>In either case, it must have at least two network interfaces, one for the network it is intended to protect, and one for the network it is exposed to. </li></ul><ul><li>All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria. </li></ul><ul><li>The term firewall comes from the fact that by segmenting a network into different physical sub-networks, they limited the damage that could spread from one subnet to another just like firedoors or firewalls . </li></ul>
    22. 22. Services Provided By Firewall <ul><li>At our Data Center we are using “CISCO PIX’ firewall which provide following services:- </li></ul><ul><li>Determine trust zones </li></ul><ul><li>Determine ports that need opening </li></ul><ul><li>Determine packet type (TCP/UDP) </li></ul><ul><li>Determines direction of packet flow </li></ul><ul><li>Determine any limitations you can set on (Source/Destination) </li></ul><ul><li>To let traffic flow from a high security level to a lower level, use the nat and global commands. For the opposite direction, from lower to higher, use the static and access-list commands </li></ul><ul><li>The PIX does not pass multicast traffic </li></ul><ul><li>The PIX does support RIP </li></ul>
    23. 23. THANK YOU