The document discusses the need for a robust homeland security mechanism in India modeled after the US Department of Homeland Security. It proposes a Technological Framework for Safe and Secure Cities in India (TFSSC) consisting of various components like Command and Control Centers, Interception Systems, Video Surveillance, radio networks, geospatial technology, database integration, and managerial response systems. All these technologies would be executed at the city level and integrated at the national level to create a National Homeland Security Resource Base and Incident Support System (NHLS-RBISS). This would form the basis of a future National Homeland Security Blueprint to develop a comprehensive homeland security framework for India.
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it.
My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...AmmLibera AL
RAPPORTO 2013 SULLA CYBER SECURITY
Il rapporto, realizzato dal Centro di ricerca per la Cyber intelligence and information security (CIS) della Sapienza, analizza lo stato della protezione delle infrastrutture critiche nazionali e dei settori economici sensibili da attacchi cibernetici. Si tratta di un tema di particolare rilevanza in questo momento storico, alla luce delle diverse vicende internazionali che hanno riguardato fughe di dati, intrusioni informatiche e intercettazioni del traffico internet, quali recentemente il caso Snowden e le attività realizzate dalla NSA americana.
IMPROVE SECURITY IN SMART CITIES BASED ON IOT, SOLVE CYBER ELECTRONIC ATTACKS...IJNSA Journal
Smart cities are expected to significantly improve people's quality of life, promote sustainable development, and enhance the efficiency of operations. With the implementation of many smart devices, c problems have become a serious challenge that needs strong treatments, especially the cyber-attack, which most countries suffer from it.
My study focuses on the security of smart city systems, which include equipment like air conditioning, alarm systems, lighting, and doors. Some of the difficulties that arise daily may be found in the garage. This research aims to come up with a simulation of smart devices that can be and reduce cyber attach. Use of Cisco Packet tracer Features Simulated smart home and c devices are monitored. Simulation results show that smart objects can be connected to the home portal and objects can be successfullymonitored which leads to the idea of real-life implementation and see. In my research make manysolutions for attachingissues,which was great, and apply some wirelessprotocol.
2013 Italian Report on Cyber Security - Critical Infrastructure and other sen...AmmLibera AL
RAPPORTO 2013 SULLA CYBER SECURITY
Il rapporto, realizzato dal Centro di ricerca per la Cyber intelligence and information security (CIS) della Sapienza, analizza lo stato della protezione delle infrastrutture critiche nazionali e dei settori economici sensibili da attacchi cibernetici. Si tratta di un tema di particolare rilevanza in questo momento storico, alla luce delle diverse vicende internazionali che hanno riguardato fughe di dati, intrusioni informatiche e intercettazioni del traffico internet, quali recentemente il caso Snowden e le attività realizzate dalla NSA americana.
Information Security Management Education Program - Concept Document Dinesh O Bareja
Information security training is incomplete which ever way one sees it - the techie lacks a lot of stuff and so does the non-techie. This is a concept to make changes and build an education program which will actually create professionals having good skills.
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
In the past few years, a new approach to cybersecurity has emerged, based on the analysis of data on successful attacks. In this approach, continuous diagnostics and mitigation replace the reactive network security methods used in the past. The approach combines continuous monitoring of network health with relatively straightforward mitigation strategies. The strategies used in this approach reduce the opportunities for attack and force attackers to develop more sophisticated (and expensive) techniques or to give up on the target. In combination, continuous monitoring and mitigation strategies provide the basis for better cybersecurity.
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, we address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis.
Indian Market for Video Surveillance and Electronic SecurityNeil Dave
This presentation sheds light on some of the key trends witnessed across the video surveillance and electronic security market in India and mentions some of the top end-user infrastructure development segments which are expected to provide sales opportunities for security providers.
Event report from Cyber Security roundtable discussions held in 5 cities. Manila on 31August 2016, Jakarta 6 October 2016, Kuala Lumpur 21 October 2016, Singapore 27 October 2016 and Hong Kong 11 November 2016. Organised by CIO Academy Asia and its partner Fortinet.
1. Sean WroteThe first and most critical success factor is effe.docxjackiewalcutt
1. Sean Wrote:
The first and most critical success factor is effective commitment and support from top management. The cybersecurity portion of a business continuity plan cannot hope to be successful without leadership buy-in. Because C-Suite members shoulder the ultimate responsibility for the business, the planning and strategy must involve concurrence from company leadership. They must be made to understand the threats to the business, how the threats manifest into risk, and how those risks impact the business process (Hour, 2012).
Another reason for top level buy-in is that management will be releasing company resources, to include funding and time, to the creation of the BCP. As strategic planning occurs, stakeholders and other critical designees should participate in relevant policy creation. If a BCP that includes cybersecurity is not relevant or in line with company/management goals, it will not succeed. A Business Impact Analysis (BIA) will assist in providing that focus by identifying key business processes and how their diminished performance affects the bottom line. Additionally, legal and regulatory concerns should be considered during the BIA process (UMUC, 2014).
There’s a great quote attributed to Mike Tyson- “Everyone has a plan until they’re punched in the face”- and it describes crisis management. If all of the safety measures put in place to prevent an intrusion have failed, crisis management will drive you to focus on the recovery and resilience of critical business functions (NIST.gov, 2014). In December of 2013, Target and other retailers received a punch in the face when it was reported over 70 million customers had their debit and credit card data stolen by hackers (). Effective strategic communication in Target’s crisis management approach played a critical role in the overall recovery effort. Although the media outlets picked up and ran with this story, the only thing that seems to matter to the American consumer is that it doesn’t happen again. Judging by their stock price and continuing sales numbers, this was nothing more than a bump in the road for Target.
Larry wrote:
2. It is first important to understand that the Business Continuity Plan (BCP) is different from the Disaster Recovery Plan (DRP) as the reason for the BCP is to know how to handle a temporary outage of the company’s network and/or business resources. These temporary outages can be the result of power outage, network outage due to a fiber cut or other incident or a major equipment failure resulting in loss of data. (SANS Institute, 2002) The DRP is in preparation of a major disaster in where the facilities are rendered inoperable or completely destroyed. This can occur from hurricanes, tornados or fires resulting in total loss of company assets. It will be part of the BCP being developed to decide when the BCP should be conducted versus when the DRP will be required.
There are several important steps that should be included when creating a Busines ...
Operational technology threats in developing countries and possible solutionFaysal Ghauri
My first paper on Cybersecurity, especially to Operational Technology and the challenges in developing countries although I have found similar challenges in the developed countries as well. This paper has been published by the International Journal of Computer Science and Information Security (IJCSIS) in April 2021, Vol. 19 No. 4 Publication.
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Building Actionable Security Intelligence - Protection of people, properties & profits from a Physical security perspective.
A Vision White Paper - December 2006
A review: Artificial intelligence and expert systems for cyber securitybijejournal
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats
in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The
essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The
system uses various datasets like a machine and deep learning as well as reinforced learning in order to make
intelligent decisions. The Internet of Things (IoT) is one of the major concerns for cyber security because it is
potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily
gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest
and potentially the weakest link in the cyber security environment. This review intends to present AI and expert
systems for cyber security
Information Security Management Education Program - Concept Document Dinesh O Bareja
Information security training is incomplete which ever way one sees it - the techie lacks a lot of stuff and so does the non-techie. This is a concept to make changes and build an education program which will actually create professionals having good skills.
A1 - Cibersegurança - Raising the Bar for CybersecuritySpark Security
In the past few years, a new approach to cybersecurity has emerged, based on the analysis of data on successful attacks. In this approach, continuous diagnostics and mitigation replace the reactive network security methods used in the past. The approach combines continuous monitoring of network health with relatively straightforward mitigation strategies. The strategies used in this approach reduce the opportunities for attack and force attackers to develop more sophisticated (and expensive) techniques or to give up on the target. In combination, continuous monitoring and mitigation strategies provide the basis for better cybersecurity.
A3 - Análise de ameaças - Threat analysis in goal oriented security requireme...Spark Security
Goal and threat modelling are important activities of security requirements engineering: goals express why a system is needed, while threats motivate the need for security. Unfortunately, existing approaches mostly consider goals and threats separately, and thus neglect the mutual influence between them. In this paper, we address this deficiency by proposing an approach that extends goal modelling with threat modelling and analysis.
Indian Market for Video Surveillance and Electronic SecurityNeil Dave
This presentation sheds light on some of the key trends witnessed across the video surveillance and electronic security market in India and mentions some of the top end-user infrastructure development segments which are expected to provide sales opportunities for security providers.
Event report from Cyber Security roundtable discussions held in 5 cities. Manila on 31August 2016, Jakarta 6 October 2016, Kuala Lumpur 21 October 2016, Singapore 27 October 2016 and Hong Kong 11 November 2016. Organised by CIO Academy Asia and its partner Fortinet.
1. Sean WroteThe first and most critical success factor is effe.docxjackiewalcutt
1. Sean Wrote:
The first and most critical success factor is effective commitment and support from top management. The cybersecurity portion of a business continuity plan cannot hope to be successful without leadership buy-in. Because C-Suite members shoulder the ultimate responsibility for the business, the planning and strategy must involve concurrence from company leadership. They must be made to understand the threats to the business, how the threats manifest into risk, and how those risks impact the business process (Hour, 2012).
Another reason for top level buy-in is that management will be releasing company resources, to include funding and time, to the creation of the BCP. As strategic planning occurs, stakeholders and other critical designees should participate in relevant policy creation. If a BCP that includes cybersecurity is not relevant or in line with company/management goals, it will not succeed. A Business Impact Analysis (BIA) will assist in providing that focus by identifying key business processes and how their diminished performance affects the bottom line. Additionally, legal and regulatory concerns should be considered during the BIA process (UMUC, 2014).
There’s a great quote attributed to Mike Tyson- “Everyone has a plan until they’re punched in the face”- and it describes crisis management. If all of the safety measures put in place to prevent an intrusion have failed, crisis management will drive you to focus on the recovery and resilience of critical business functions (NIST.gov, 2014). In December of 2013, Target and other retailers received a punch in the face when it was reported over 70 million customers had their debit and credit card data stolen by hackers (). Effective strategic communication in Target’s crisis management approach played a critical role in the overall recovery effort. Although the media outlets picked up and ran with this story, the only thing that seems to matter to the American consumer is that it doesn’t happen again. Judging by their stock price and continuing sales numbers, this was nothing more than a bump in the road for Target.
Larry wrote:
2. It is first important to understand that the Business Continuity Plan (BCP) is different from the Disaster Recovery Plan (DRP) as the reason for the BCP is to know how to handle a temporary outage of the company’s network and/or business resources. These temporary outages can be the result of power outage, network outage due to a fiber cut or other incident or a major equipment failure resulting in loss of data. (SANS Institute, 2002) The DRP is in preparation of a major disaster in where the facilities are rendered inoperable or completely destroyed. This can occur from hurricanes, tornados or fires resulting in total loss of company assets. It will be part of the BCP being developed to decide when the BCP should be conducted versus when the DRP will be required.
There are several important steps that should be included when creating a Busines ...
Operational technology threats in developing countries and possible solutionFaysal Ghauri
My first paper on Cybersecurity, especially to Operational Technology and the challenges in developing countries although I have found similar challenges in the developed countries as well. This paper has been published by the International Journal of Computer Science and Information Security (IJCSIS) in April 2021, Vol. 19 No. 4 Publication.
SECURETI: ADVANCED SDLC AND PROJECT MANAGEMENT TOOL FOR TI(PHILIPPINES)ijcsit
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
There are essential security considerations in the systems used by semiconductor companies like TI. Along
with other semiconductor companies, TI has recognized that IT security is highly crucial during web
application developers' system development life cycle (SDLC). The challenges faced by TI web developers
were consolidated via questionnaires starting with how risk management and secure coding can be
reinforced in SDLC; and how to achieve IT Security, PM and SDLC initiatives by developing a prototype
which was evaluated considering the aforementioned goals. This study aimed to practice NIST strategies
by integrating risk management checkpoints in the SDLC; enforce secure coding using static code analysis
tool by developing a prototype application mapped with IT Security goals, project management and SDLC
initiatives and evaluation of the impact of the proposed solution. This paper discussed how SecureTI was
able to satisfy IT Security requirements in the SDLC and PM phases.
Building Actionable Security Intelligence - Protection of people, properties & profits from a Physical security perspective.
A Vision White Paper - December 2006
A review: Artificial intelligence and expert systems for cyber securitybijejournal
Artificial intelligence (AI) and expert systems are essential and vital tools to counter potentially dangerous threats
in cyber security. The protection of data requires skilled cyber security technicians for various types of roles. The
essential role of an expert system is to monitor the threats and assist the technician to strengthen security. The
system uses various datasets like a machine and deep learning as well as reinforced learning in order to make
intelligent decisions. The Internet of Things (IoT) is one of the major concerns for cyber security because it is
potentially the second most likely vulnerable link in the cyber security environment because an attacker can easily
gain access to the system by breaching any IoT device that is connected to the system. Still human is the strongest
and potentially the weakest link in the cyber security environment. This review intends to present AI and expert
systems for cyber security
Attacks on the enterprise are getting increasingly sophisticated. Current solutions available do not seem to be adequate given the innovativeness, precision and persistence of these attacks in different forms and of different dimensions. Organisations thus want to increase the sophistication of their employees and also of the solutions to be deployed given this backdrop.
Similar to Homeland security – A Robust Counter Terrorism Mechanism (20)
My article on Smart Policing Published In Express Computer, Jan '16 Edition, where i have covered Emerging Technologies for Better Policing and Technologies for Safe Cities in depth.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Homeland security – A Robust Counter Terrorism Mechanism
1. 1
Homeland Security – A Robust Counter Terrorism Mechanism
Sanjay Sahay
Introduction
The attack on the World Trade Center in 2001 has been by far the single most important
event in the history of the modern world and more so because it forced the world to
change its perception on the nature of organization, the usage of technology, the
responses, the consolidation of activities and spread of mechanisms needed to thwart the
ever growing terrorism the world over.
The creation of Department for
Homeland Security in the US has been
the singular event going in for
transformational change in the
philosophy, blueprint and
execution of the counter terrorism
initiative. Last 12 years stands as a
tribute to the work being done
ceaselessly by this organization and its
demonstrated capability of keeping
US safe and sound since 2001.
Being an internal security expert with over two decades of experience, the natural
tendency was to speak out my mind in seminars and workshops on this issue. I gave a
presentation on this topic a couple of times in the year 2009-2010, the ones I remember
vividly were the eGov Conference in Hyderabad and HCL CXO Summit at Udaipur.
During these talks and discussions I had the first brush with the concept of Homeland
Security in the US.
As Public Safety and Security is meaningless without talking about the anti-terror
mechanism which also takes care of most of the organized crime, I went on straying into
this sector, till the time I realized that Homeland Security is the future of Internal
Security. Homeland Security pertains to the anti-terror mechanism laid and
operated in the US. The features and functionalities remain the same across the globe,
the difference is manifested in the technical and police professional expertise and also the
capability to legislate and lay down correct operating procedures and also put in
place the monitoring, supervision and the oversight mechanism.
2. 2
In India a plug and play mechanism is still a long way off and so a technological
framework is the need of the hour. In the FICCI Conference on Homeland Security in
New Delhi in 2011, I proposed the Technological Framework for Safe and Secure Cities in
India. This would lay a solid foundation for Homeland Security in India besides CCTNS
and NATGRID projects which aims at providing information to the police in general and
thus caters the anti-terror segment as well, sometimes directly and at other times
indirectly.
Mega City
Mega City Policing Project initiated in 2005 underlined the criticality of big cities as the
economic growth engines of the nation and a counter terrorism mechanism for these
cities would be a formidable beginning in our against terrorism. The consolidation of the
same would lead to the connecting of the cities on a national network, functionally and
otherwise and help facilitate the extension of this network across the country at a later
stage.
Even if we consider 9/11 as the first major city terrorist attack, the intensity of which
shook the world for all times to come there is no denying the fact that the world is
replete with incidents when its major cities have been the target of terrorist
attacks and the life in that city and country got completely paralyzed, getting back to
normal a nearly insurmountable task, with economy shaken to the core. Mumbai 26/11 is
a case in point and all Indians have nearly accepted the fact that terrorist attacks are a
part of city living and we have to live with it. There is no single Indian big city which
has not been the target of this attack.
How do we leverage technology to counter terrorism is the question? The gaping holes
in the technologies used for Homeland Security and its spread has a singularly
dangerous impact on the counter terrorism scenario in the country. We intend to
achieve the functionalities when the basic issues related to execution, backend processes
and it its robustness is still in question. What is the need of the hour is the identification
of technological platforms as the first foundation stone of Homeland Security in India. I
proposed the Technological Framework for Safe and Secure Cities in India (TFSSC) at a
FICCI Conference in June 2011 and since then gained acceptability at a very fast pace
amongst the stakeholder community.
3. 3
Technological Framework (TFSSC)
Technological Framework intends to be the game changer for Homeland Security,
providing the precursor to generating the functionalities, the output of the Homeland
Security System. Lack of standardization and uniformity of technological platforms
has been the major drawback. This is the basis for the creation of smart cities and their
integration, a technological framework on which the nations Homeland Security
Mechanism would function. This would lead to the creation of National Homeland
Security Resource Base and Incident Support System. (NHLS – RBISS). I would
be discussing the main components of the TFSSC in the ensuing paragraphs.
Command and Control Center (CCC)
City based command and control centers integrating all feeds radio, audio, video,
text, data, images and graphics from different channels, through a viable command
and control center software, creating in the process a state of art C4I command and
control center. It would have the capability to handle worst of the terror attacks and
natural disasters at one end and day to day responsive policing at the other end.
Interception Systems (IS)
The capability to monitor and penetrate into any mode of communication and
storage for the required suspected information/data and the capability to analyze and
connect to our requirements on a real time basis is the urgent need and utility of the
Interception Systems which needs to be put in place, upgraded or scaled up, as the case
may be.
City Based Video Surveillance System (CBVSS)
CBVSS has the proven track record for providing the best information (video footage)
to investigators of terror attacks across the globe, Kasab, being the prime example
here. Technologically, way ahead of CCTV networks, with video analytics in built into the
system, it helps find meaning in hours and hours of video footage, giving the precise
output and the connects the investigator is looking for. A deterrent and a must for any
big city today.
4. 4
TETRA Radio Network (TRN)
TETRA telecommunications system takes the Police Communication to the fully digital
mode with a complete integration of all communication gadgets and delivery of
high quality voice/data and other related outputs. TETRA eludes India. In reality it is an
excellent public safety communication network, improves our response to War on Terror,
organized crime and disaster management.
Geospatial Technology for HLS (GTHLS)
Conventional inputs are unable to provide actionable data. The map of today is
geospatial imagery/information, the third eye as it is nicknamed. Geospatial products
and intelligence are critical to planning, preparation and response to terror attacks,
natural & other disasters and supports incident management. It is a great tool for
regulation, enforcement, monitoring and supervision.
ERP Solution, RDBMS and Integration (ERI)
RDBMS is critical to the functioning of any organization and ERP provides for
populating the data on a real time basis, bringing the complete functioning of the
department on the ERP, in Karnataka, the POLICE IT. Then integration of the legacy
5. 5
systems with the ERP provides for the functionalities with which the end users have been
accustomed for long, on a single sign in sign out concept.
Managerial Response to War on Terror (MRWT)
Gap analysis shows a huge gap in the learning, skills and attitude of internal
security managers which ought to be bridged. The human resources should be better
than the technical system created and made functional. Utility is how best we utilize.
Innovative methods inclusive of outbound learning needs to inculcated as a part of high
end training. Change management is the most critical component of our way forward.
Professionalism leading to globally accepted deliverables is the ultimate value
addition.
Integration to NHLS – RBISS
All the technologies are extremely complex given the nature of planning, execution,
robust functioning for a country of the size of India and differential levels of technologies
and differential levels of mental frames in existence in the establishment. All the above
mentioned technologies has to be executed at the division level in each of the seven
cities, then integrated intra at the city level and integrated inter at the national level. For
technologies that cannot be broken down to the division level, the infrastructure has to
be created at the city level and integrated at the national level. Needless to say, it will not
need intra city integration. The national integration of a single technology can be
done at any desired place depending on lot many critical inputs and the integration
of all technologies, I feel should be done in or around Delhi and a mirror image of the
same at a strategic location selected after considering all critical inputs. This integrated
network would be called as National Homeland Security – Resource Base and
Incident Support System. (NHLS – RBISS)
6. 6
National Homeland Security Blueprint
The beginning of this grandiose plan set to have a transformational impact on the
Homeland Security scenario of the country is yet to be made. The world’s best
buildings were a blueprint one day. A blueprint is the first to crystallize our thoughts, it
could take a large number of revisions, nonetheless it has to start. Time seems to be
running out. A documentary shape to this dream can be given by way of National
Homeland Security Blueprint, which would later become a proof of concept and
finally a working document ushering in the Homeland Security age in India, a robust
Homeland Security functional mechanism, thus taking this dialogue to its logical
conclusion.
Conclusion
The American experience and its
successes have been the reference
points world-wide, our journey at its
best can be marginally different. The
integration of administrative
mechanisms, the geographies, the
technologies and an ideal
managerial component to create
and run the system is only way out
of the whirlpool, we are in. Any
delay will lead to resurrection more and more difficult and the chance of catching up with
the enemies of mankind and beating them might be lost for a considerable time to come
which unimaginable adverse impact on the economy, society, polity and the Indian
psyche. National resolve is to solve the most intractable issue that terrorism is.