The 26/11 Mumbai attacks were one of the most grievous assaults on Indian soil, an incident that challenged the combined efforts of the US, British and Indian anti-terrorism agencies.
With the terrorists displaying unprecedented access and competence in electronic tradecraft, it opened a new need for government agencies to massively up the ante on strategies and practices that effectively monitor and utilise electronics and web technologies to counter this new capability. Post the attacks, the Indian government has launched numerous initiatives to help it better secure its own data, while introducing surveillance systems that can monitor potentially harmful activity:
The grid has access to 21 sets of databases that are networked to achieve quick, seamless and secure access to key information for intelligence and enforcement agencies.
This ambitious counter terrorism programme uses Big Data and Analytics to study large amounts of information generated from various intelligence and enforcement agencies, simultaneously analysing events to get a better composite picture. This system enables law enforcement agencies to track suspects by monitoring their digital footprints.
This initiative facilitates effective policing and sharing data of crimes and criminals among 14,000 police stations across all the 35 states and Union Territories of India using a comprehensive and integrated system.
LIM systems have broad surveillance capabilities with access to all Internet activity that expands beyond IP addresses, email addresses, URLs or emails. It does an in-depth analysis of all Internet traffic using keywords and keyphrases.
NETRA, a software network developed by India's Centre for Artificial Intelligence and Robotics (CAIR), a Defence Research and Development Organisation (DRDO) laboratory, helps to gai insight into what type of traffic/network packets or data is flowing through a network. Apart from detecting suspect keywords and keyphrases in social media, blogs, tweets, instant messaging services, emails, and in other online content, this software can also analyse dubious voice traffic passing through software such as Skype and Google Talk.
No, it’s now real.
The CMS which ran multiple successful pilot tests in 2013 gives law enforcement agencies centralised access to India's telecommunications network. Investigating officers can now listen to or record mobile, landline and satellite calls and voice over Internet Protocol (VoIP) of anyone within the country. They can read private emails, SMS and MMS and geolocate people via their cell phones, all in real time.
Though this system had looped in several strong criticisms by media, this is a significant breakthrough that could potentially help stall terrorist intentions.
With the terrorists displaying unprecedented access and competence in electronic tradecraft, it opened a new need for government agencies to massively up the ante on strategies and practices that effectively monitor and utilise electronics and web technologies to counter this new capability. Post the attacks, the Indian government has launched numerous initiatives to help it better secure its own data, while introducing surveillance systems that can monitor potentially harmful activity:
1. National Intelligence Grid (NATGRID)
National Intelligence Grid (NATGRID), a post Mumbai 26/11 attack measure, aims to bring access to relevant, real-time information—a major obstacle in the path of detecting US terror suspect David Headley's movement across the country during his multiple visits between 2006 and 2009.The grid has access to 21 sets of databases that are networked to achieve quick, seamless and secure access to key information for intelligence and enforcement agencies.
This ambitious counter terrorism programme uses Big Data and Analytics to study large amounts of information generated from various intelligence and enforcement agencies, simultaneously analysing events to get a better composite picture. This system enables law enforcement agencies to track suspects by monitoring their digital footprints.
2. Crime and Criminal Tracking Network & Systems (CCTNS)
CCTNS has successfully tapped into the multiple crime-based networks to facilitate the collection, storage, retrieval, analysis, transfer and sharing of data and information at the police stations and between the police stations and the State Headquarters, syncing it with the Central Police Organisations.This initiative facilitates effective policing and sharing data of crimes and criminals among 14,000 police stations across all the 35 states and Union Territories of India using a comprehensive and integrated system.
3. Lawful Intercept & Monitoring (LIM) Systems
Although electronic eavesdropping or hacking can yield valuable data, there is every possibility of missing a ‘tantalizing’ clue if the technology is not closely monitored. Here’s where LIM comes to the rescue: it was deployed by the Centre for Development of Telematics (C-DOT) to closely monitor Internet traffic, emails, web browsing, Skype and any other Internet activity across Indian public data networks.LIM systems have broad surveillance capabilities with access to all Internet activity that expands beyond IP addresses, email addresses, URLs or emails. It does an in-depth analysis of all Internet traffic using keywords and keyphrases.
4. Network Traffic Analysis (NETRA) system
As company intranets are mushrooming rapidly, they provide a fertile ground for cyber-terrorism to tap into. It is increasingly important to intercept and analyse internet traffic using pre-defined filters.NETRA, a software network developed by India's Centre for Artificial Intelligence and Robotics (CAIR), a Defence Research and Development Organisation (DRDO) laboratory, helps to gai insight into what type of traffic/network packets or data is flowing through a network. Apart from detecting suspect keywords and keyphrases in social media, blogs, tweets, instant messaging services, emails, and in other online content, this software can also analyse dubious voice traffic passing through software such as Skype and Google Talk.
5. Central Monitoring System (CMS)
Every conversation you have on your landlines and mobile phones can be heard; some can be recorded too. You make a search on the Internet and it can be tracked. Fiction?No, it’s now real.
The CMS which ran multiple successful pilot tests in 2013 gives law enforcement agencies centralised access to India's telecommunications network. Investigating officers can now listen to or record mobile, landline and satellite calls and voice over Internet Protocol (VoIP) of anyone within the country. They can read private emails, SMS and MMS and geolocate people via their cell phones, all in real time.
Though this system had looped in several strong criticisms by media, this is a significant breakthrough that could potentially help stall terrorist intentions.
No comments:
Post a Comment