SlideShare a Scribd company logo
1 of 32
CombatingIndia’sInternalSecurityChallengesbyUsing
AdvancesinForensicScienceTechnology:AnInsight
Dr. Prashant Mehta
National Law University, Jodhpur
Our Problems
• The continuing tensions between India and Pakistan have a direct bearing on the
internal situation in India.
• The presence of hostile neighbor's enables the internal conflicts to get external
support, which includes money, arms, and sanctuaries.
• The rise of contentious politics based on sectarian, ethnic, linguistic or other
divisive criteria, is primarily responsible for the many communal and secessionist
movements flourishing in India.
• The democratic institutions and the state structures are still not strong enough to
fully harmonise these conflicts in a peaceful manner.
• India has been facing all types of violent conflicts based on religion, caste,
language, ethnicity and regional loyalties. Political insecurity further compounds
the problem.
• The police-politician-criminal nexus can embolden the criminal elements. Their
activities can create an environment of lawlessness
Our Problems
• The crime syndicates are finding the new communication and information
technology very useful.
• Many of the insurgent and militant groups are not driven by ideology, but by sheer
greed. Money power is a bigger motivating factor than ideology.
• With the ‘Golden Crescent’, and the ‘Golden Triangle’ in India’s neighborhood,
drug trafficking poses yet another threat to our security.
• In North East some groups seek secession from the Indian Union, some others
seek separate states and yet others greater autonomy within the existing state.
• The root cause for the rise in Left extremism is the inability of the states to address
the many genuine grievances of the people. A callous district administration,
especially in the rural areas, a clogged judicial system and feudal attitudes have
compounded the problem.
• Their aim is to overthrow what they call an unjust socio-economic system. Corrupt
politicians, policemen and civil servants have made their own adjustments with
these groups. A live-and-let live attitude is mutually beneficial to all of them.
Forensic Science
• Forensic science is the use of science in the service of the law.
• Sciences used in forensics include any discipline that can aid in the collection,
preservation and analysis of evidence such as chemistry (for the identification of
explosives), engineering (for examination of structural design) or biology (for DNA
identification or matching).
• Analysis of forensic evidence is used in the investigation and prosecution of civil
and criminal proceedings.
• Forensic evidence is also used to link crimes that are thought to be related to one
another. For example, DNA evidence can link one offender to several different
crimes or crime scenes.
• Linking crimes helps law enforcement authorities to narrow the range of possible
suspects and to establish patterns of for crimes, which are useful in identifying and
prosecuting suspects.
• New technology can be used and refined not only to keep forensic scientist on the
cutting edge of science, but to maintain the highest standards of quality and
accuracy.
Digital Evidence
• Digital devices are everywhere in today’s world, helping people communicate
locally and globally with ease.
• Computers, cell phones and the Internet as the only sources for digital evidence,
but any piece of technology that processes information can be used in a criminal
way.
• The important thing to know is that responders need to be able to recognize and
properly seize potential digital evidence.
• Digital evidence is defined as information and data of value to an investigation that
is stored on, received or transmitted by an electronic device. This evidence can be
acquired when electronic devices are seized and secured for examination. Digital
evidence:
– Is latent (hidden), like fingerprints or DNA evidence
– Crosses jurisdictional borders quickly and easily
– Can be altered, damaged or destroyed with little effort, Can be time sensitive
• There are many sources of digital evidence, where evidence can be
found: Internet-based, Stand-alone computers or devices, and Mobile devices.
• These areas tend to have different evidence-gathering processes, tools and
concerns, and different types of crimes tend to lend themselves to one device or
the other.
Explosives Analysis
• A detailed investigation of a blast site will reveal crucial clues to lead the
investigation. By thoroughly documenting the condition of the scene, including any
structural damage and injuries or fatalities, investigators can slowly piece together
what occurred.
• Fragments of an exploded device will often be left intact, including switches,
wiring, timers and circuit boards. Fragments of circuit boards, fingerprints, even
pieces of pet hair have been used to help narrow the investigation and nab a
perpetrator.
• After an explosion, residue from the explosive that was used will be left behind. To
identify the type of explosive used, investigators may use an ion mobility
spectrometer (IMS), a handheld chemical detection device, to identify residues
that may be present around the blast site.
• In addition to collecting physical evidence, video footage may be available from
security cameras or from witnesses’ cell phones.
Narcotic Drugs
• The illegal drug trade creates a global black market economy that puts the public
at risk, not just from the substances being distributed, but also from the
subsequent crimes committed by users, traffickers and manufacturers.
• These crimes typically include burglary, assault and fraud, but can also involve
more serious crimes such as homicide, abduction and human trafficking.
• Forensic drug chemistry uses a series of processes performed in the field or
laboratory to detect the presence or absence of controlled substances.
• Chemical analysis performed in the laboratory on submitted evidence detects and
identifies illegal drugs, and helps law enforcement prosecute offenders.
• This practice uses a variety of chemical analysis methods to conduct both
presumptive and confirmatory tests on seized material suspected to be or contain
illegal substances.
• Results from this analysis often serve as the basis for criminal proceedings and
help to determine sentencing for convicted offenders.
Fire Arms
• The field of forensic firearms identification, sometimes called ballistics, is at its
heart the ability of a firearms examiner to determine if a particular bullet or
cartridge case was fired from a specific firearm.
• This determination can be made thanks to small, often microscopic markings
on bullets or cartridge cases that are unique to ammunition fired from that
firearm.
• Although the examiner cannot determine who actually fired a weapon,
matching the ammunition to a weapon provides vital facts for the
investigation.
• In conjunction with this, the examiner has the ability to explain how a firearm
functions and what safety features a firearm might have.
• This can have an impact on investigations of suicides, unintentional shootings
and accidental firearm discharge.
DNA
• The establishment of DNA analysis within the criminal justice system in the
mid-1980s revolutionized the field of forensic science.
• With subsequent refinement of DNA analysis methods in crime laboratories,
even minute amounts of blood, saliva, semen, skin cells or other biological
material may be used to develop investigative leads, link a perpetrator or
victim to a crime scene, or confirm or disprove an account of the crime.
• Because of the accuracy and reliability of forensic DNA analysis, this evidence
has also become an invaluable tool for exonerating individuals who have been
wrongfully convicted.
• Jurors now increasingly expect DNA evidence to be presented in a wider array
of cases, even when other types of evidence may be more valuable to the
investigation.
Finger Prints
• We touch things every day: a coffee cup, a car door, a computer keyboard. Each
time we do, it is likely that we leave behind our unique signature—in our
fingerprints.
• No two people have exactly the same fingerprints. Even identical twins, with
identical DNA, have different fingerprints.
• This uniqueness allows fingerprints to be used in all sorts of ways, including for
background checks, biometric security, mass disaster identification, and of course,
in criminal situations.
• Fingerprint analysis has been used to identify suspects and solve crimes for more
than 100 years, and it remains an extremely valuable tool for law enforcement.
• One of the most important uses for fingerprints is to help investigators link one
crime scene to another involving the same person.
• Fingerprint identification also helps investigators to track a criminal’s record, their
previous arrests and convictions, to aid in sentencing, probation, parole and
pardoning decisions.
Biometrics
• A biometric is a physiological or behavioral characteristic of a human being that can
distinguish one person from another and that theoretically can be used for
identification or verification of identity.
• Why Biometrics:
– Identity thefts,
– Something you know can be stolen,
– Predicted or hacked,
– Reliability on manual verification.
• Biometric applications available today are categorized into 2 sectors
• Psychological: Iris, Fingerprints, Hand, Retinal, and Face recognition
• Behavioral: Voice, Typing pattern, Signature
Technique Strength Weakness
Retina Highly Accurate Inconvenient for persons with eyeglasses;
dislike contact with device and light beam
Iris Highly accurate; works with eyeglasses;
more acceptable to users than retina scan
New technology, cost, although this is
rapidly changing
Finger Print Mature technology; highly accurate; low
cost; small size, becoming widely acceptable
Users can create high FRR; some persons
dislike contact with device
Hand/Finger Geometry accurate and flexible; widely acceptable to
users
User interface is bulky; dislike contact with
device
Face Recognition Widely acceptable to users; low cost; no
direct contact; passive monitoring possible
Face recognition is less accurate than other
methods
Voice Recognition Usable over existing telephone system;
good for remote access and monitoring;
Less accuracy; subject to background noise
Signature Recognition Widely acceptable to users Less accuracy; not widely used yet, but has
potential with PDAs
Keystroke Recognition Widely acceptable to users; low cost; uses
existing hardware
Less accuracy
Document Examination
• The discipline of forensic document examination, often referred to as “questioned
documents,” is frequently associated with white-collar crimes such as check fraud;
however, in practice, this area of forensic science can be used in a wide array of
cases from medical malpractice to art forgeries to homicides.
• Armed with sophisticated technology, forensic document examiners can peer into
the visible and invisible marks on a document to extract an abundance of details
that may verify authenticity or provide additional information crucial to the
investigation.
• The digital age has made the work of forensic document examiners even more
important.
• With the availability of powerful software programs such as Adobe® Photoshop®,
Acrobat® and others, it has become significantly easier for criminals to create and
manipulate all manner of fraudulent documents from contracts to currency.
• Counterfeit currency can also be identified easily using forensic tools.
Conclusions
• The internal security problems should not be treated as merely law and order
problems.
• They have to be dealt with comprehensively in all their dimensions and at all levels
— political, economic and social. They are all interlinked. At times, the required
measures will conflict with each other. Going too far in one direction could be
counter-productive.
• The security requirements have to be met, but that does not mean giving the
security agencies a free hand. Striking the right balance is the key to success in
meeting these challenges effectively.
• We need a comprehensive security policy that will be implemented effectively at
all levels.
• Effective use of Forensic Science techniques can help solve many problems related
to internal security.
Internal security and forensic science

More Related Content

What's hot

Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime scene
BlancoScience
 
History And Scope
History And ScopeHistory And Scope
History And Scope
annperry09
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
guest8cbcb02
 

What's hot (20)

Blood Spatters Analysis
Blood Spatters AnalysisBlood Spatters Analysis
Blood Spatters Analysis
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 
History development of forensic science
History  development of forensic scienceHistory  development of forensic science
History development of forensic science
 
GEQD Kolkata
GEQD KolkataGEQD Kolkata
GEQD Kolkata
 
Henry’s 10 digit classification of fingerprint
Henry’s 10 digit classification of fingerprintHenry’s 10 digit classification of fingerprint
Henry’s 10 digit classification of fingerprint
 
Searching the crime scene
Searching the crime sceneSearching the crime scene
Searching the crime scene
 
History And Scope
History And ScopeHistory And Scope
History And Scope
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Introduction to Forensic Science
Introduction to Forensic ScienceIntroduction to Forensic Science
Introduction to Forensic Science
 
Chain of custody
Chain of custodyChain of custody
Chain of custody
 
Presumptive Tests For Blood
Presumptive Tests For BloodPresumptive Tests For Blood
Presumptive Tests For Blood
 
Forensicphotography
ForensicphotographyForensicphotography
Forensicphotography
 
crime scene investigation
crime scene investigationcrime scene investigation
crime scene investigation
 
Fingerprint Identification
Fingerprint IdentificationFingerprint Identification
Fingerprint Identification
 
Firearms
FirearmsFirearms
Firearms
 
Fingerprint history0911
Fingerprint history0911Fingerprint history0911
Fingerprint history0911
 
Introduction to forensic science
Introduction to forensic scienceIntroduction to forensic science
Introduction to forensic science
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Latent fingerprint development
Latent fingerprint developmentLatent fingerprint development
Latent fingerprint development
 
Brain fingerprinting
Brain fingerprintingBrain fingerprinting
Brain fingerprinting
 

Similar to Internal security and forensic science

Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
sabtolinux
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
alizain9604
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistan
awaisajaz
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
toltonkendal
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
Government
 

Similar to Internal security and forensic science (20)

Forensic Science
Forensic ScienceForensic Science
Forensic Science
 
HELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptxHELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptx
 
1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptx1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptx
 
Special Crime Scenes 1.pptx
Special Crime Scenes 1.pptxSpecial Crime Scenes 1.pptx
Special Crime Scenes 1.pptx
 
Special types of crime scenes Part-1.pptx
Special types of crime scenes Part-1.pptxSpecial types of crime scenes Part-1.pptx
Special types of crime scenes Part-1.pptx
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : Forensics
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistan
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Forensic techniques and crime scene investigation
Forensic techniques and crime scene investigationForensic techniques and crime scene investigation
Forensic techniques and crime scene investigation
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Introduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaIntroduction to Forensic science labs in India
Introduction to Forensic science labs in India
 
Crime in the Philippines
Crime in the PhilippinesCrime in the Philippines
Crime in the Philippines
 
Chapter12
Chapter12Chapter12
Chapter12
 

More from Prashant Mehta

More from Prashant Mehta (20)

Elements facts
Elements factsElements facts
Elements facts
 
Gases physical properties
Gases physical propertiesGases physical properties
Gases physical properties
 
Communicable Diseases
Communicable DiseasesCommunicable Diseases
Communicable Diseases
 
Industrial processes
Industrial processesIndustrial processes
Industrial processes
 
Alloys
AlloysAlloys
Alloys
 
New education policy 2020
New education policy 2020New education policy 2020
New education policy 2020
 
India's New Education Policy 2020
India's New Education Policy 2020 India's New Education Policy 2020
India's New Education Policy 2020
 
Green house effect
Green house effectGreen house effect
Green house effect
 
Human induced climate change
Human induced climate changeHuman induced climate change
Human induced climate change
 
Smog
SmogSmog
Smog
 
Acid rain
Acid rainAcid rain
Acid rain
 
Healthcare Wastes
Healthcare WastesHealthcare Wastes
Healthcare Wastes
 
Opportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare SectorOpportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare Sector
 
Healthcare Waste Trail in India
Healthcare Waste Trail in IndiaHealthcare Waste Trail in India
Healthcare Waste Trail in India
 
Healthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian CourtsHealthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian Courts
 
Challenges in Indian Healthcare Sector
Challenges in Indian Healthcare SectorChallenges in Indian Healthcare Sector
Challenges in Indian Healthcare Sector
 
Atmospheric Oxidants
Atmospheric OxidantsAtmospheric Oxidants
Atmospheric Oxidants
 
Atmosphere
AtmosphereAtmosphere
Atmosphere
 
Global Warming
Global WarmingGlobal Warming
Global Warming
 
Smog
SmogSmog
Smog
 

Recently uploaded

Recently uploaded (20)

UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 

Internal security and forensic science

  • 2.
  • 3. Our Problems • The continuing tensions between India and Pakistan have a direct bearing on the internal situation in India. • The presence of hostile neighbor's enables the internal conflicts to get external support, which includes money, arms, and sanctuaries. • The rise of contentious politics based on sectarian, ethnic, linguistic or other divisive criteria, is primarily responsible for the many communal and secessionist movements flourishing in India. • The democratic institutions and the state structures are still not strong enough to fully harmonise these conflicts in a peaceful manner. • India has been facing all types of violent conflicts based on religion, caste, language, ethnicity and regional loyalties. Political insecurity further compounds the problem. • The police-politician-criminal nexus can embolden the criminal elements. Their activities can create an environment of lawlessness
  • 4. Our Problems • The crime syndicates are finding the new communication and information technology very useful. • Many of the insurgent and militant groups are not driven by ideology, but by sheer greed. Money power is a bigger motivating factor than ideology. • With the ‘Golden Crescent’, and the ‘Golden Triangle’ in India’s neighborhood, drug trafficking poses yet another threat to our security. • In North East some groups seek secession from the Indian Union, some others seek separate states and yet others greater autonomy within the existing state. • The root cause for the rise in Left extremism is the inability of the states to address the many genuine grievances of the people. A callous district administration, especially in the rural areas, a clogged judicial system and feudal attitudes have compounded the problem. • Their aim is to overthrow what they call an unjust socio-economic system. Corrupt politicians, policemen and civil servants have made their own adjustments with these groups. A live-and-let live attitude is mutually beneficial to all of them.
  • 5.
  • 6.
  • 7.
  • 8. Forensic Science • Forensic science is the use of science in the service of the law. • Sciences used in forensics include any discipline that can aid in the collection, preservation and analysis of evidence such as chemistry (for the identification of explosives), engineering (for examination of structural design) or biology (for DNA identification or matching). • Analysis of forensic evidence is used in the investigation and prosecution of civil and criminal proceedings. • Forensic evidence is also used to link crimes that are thought to be related to one another. For example, DNA evidence can link one offender to several different crimes or crime scenes. • Linking crimes helps law enforcement authorities to narrow the range of possible suspects and to establish patterns of for crimes, which are useful in identifying and prosecuting suspects. • New technology can be used and refined not only to keep forensic scientist on the cutting edge of science, but to maintain the highest standards of quality and accuracy.
  • 9.
  • 10.
  • 11.
  • 12. Digital Evidence • Digital devices are everywhere in today’s world, helping people communicate locally and globally with ease. • Computers, cell phones and the Internet as the only sources for digital evidence, but any piece of technology that processes information can be used in a criminal way. • The important thing to know is that responders need to be able to recognize and properly seize potential digital evidence. • Digital evidence is defined as information and data of value to an investigation that is stored on, received or transmitted by an electronic device. This evidence can be acquired when electronic devices are seized and secured for examination. Digital evidence: – Is latent (hidden), like fingerprints or DNA evidence – Crosses jurisdictional borders quickly and easily – Can be altered, damaged or destroyed with little effort, Can be time sensitive • There are many sources of digital evidence, where evidence can be found: Internet-based, Stand-alone computers or devices, and Mobile devices. • These areas tend to have different evidence-gathering processes, tools and concerns, and different types of crimes tend to lend themselves to one device or the other.
  • 13.
  • 14.
  • 15. Explosives Analysis • A detailed investigation of a blast site will reveal crucial clues to lead the investigation. By thoroughly documenting the condition of the scene, including any structural damage and injuries or fatalities, investigators can slowly piece together what occurred. • Fragments of an exploded device will often be left intact, including switches, wiring, timers and circuit boards. Fragments of circuit boards, fingerprints, even pieces of pet hair have been used to help narrow the investigation and nab a perpetrator. • After an explosion, residue from the explosive that was used will be left behind. To identify the type of explosive used, investigators may use an ion mobility spectrometer (IMS), a handheld chemical detection device, to identify residues that may be present around the blast site. • In addition to collecting physical evidence, video footage may be available from security cameras or from witnesses’ cell phones.
  • 16.
  • 17. Narcotic Drugs • The illegal drug trade creates a global black market economy that puts the public at risk, not just from the substances being distributed, but also from the subsequent crimes committed by users, traffickers and manufacturers. • These crimes typically include burglary, assault and fraud, but can also involve more serious crimes such as homicide, abduction and human trafficking. • Forensic drug chemistry uses a series of processes performed in the field or laboratory to detect the presence or absence of controlled substances. • Chemical analysis performed in the laboratory on submitted evidence detects and identifies illegal drugs, and helps law enforcement prosecute offenders. • This practice uses a variety of chemical analysis methods to conduct both presumptive and confirmatory tests on seized material suspected to be or contain illegal substances. • Results from this analysis often serve as the basis for criminal proceedings and help to determine sentencing for convicted offenders.
  • 18.
  • 19.
  • 20. Fire Arms • The field of forensic firearms identification, sometimes called ballistics, is at its heart the ability of a firearms examiner to determine if a particular bullet or cartridge case was fired from a specific firearm. • This determination can be made thanks to small, often microscopic markings on bullets or cartridge cases that are unique to ammunition fired from that firearm. • Although the examiner cannot determine who actually fired a weapon, matching the ammunition to a weapon provides vital facts for the investigation. • In conjunction with this, the examiner has the ability to explain how a firearm functions and what safety features a firearm might have. • This can have an impact on investigations of suicides, unintentional shootings and accidental firearm discharge.
  • 21.
  • 22. DNA • The establishment of DNA analysis within the criminal justice system in the mid-1980s revolutionized the field of forensic science. • With subsequent refinement of DNA analysis methods in crime laboratories, even minute amounts of blood, saliva, semen, skin cells or other biological material may be used to develop investigative leads, link a perpetrator or victim to a crime scene, or confirm or disprove an account of the crime. • Because of the accuracy and reliability of forensic DNA analysis, this evidence has also become an invaluable tool for exonerating individuals who have been wrongfully convicted. • Jurors now increasingly expect DNA evidence to be presented in a wider array of cases, even when other types of evidence may be more valuable to the investigation.
  • 23.
  • 24. Finger Prints • We touch things every day: a coffee cup, a car door, a computer keyboard. Each time we do, it is likely that we leave behind our unique signature—in our fingerprints. • No two people have exactly the same fingerprints. Even identical twins, with identical DNA, have different fingerprints. • This uniqueness allows fingerprints to be used in all sorts of ways, including for background checks, biometric security, mass disaster identification, and of course, in criminal situations. • Fingerprint analysis has been used to identify suspects and solve crimes for more than 100 years, and it remains an extremely valuable tool for law enforcement. • One of the most important uses for fingerprints is to help investigators link one crime scene to another involving the same person. • Fingerprint identification also helps investigators to track a criminal’s record, their previous arrests and convictions, to aid in sentencing, probation, parole and pardoning decisions.
  • 25.
  • 26. Biometrics • A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity. • Why Biometrics: – Identity thefts, – Something you know can be stolen, – Predicted or hacked, – Reliability on manual verification. • Biometric applications available today are categorized into 2 sectors • Psychological: Iris, Fingerprints, Hand, Retinal, and Face recognition • Behavioral: Voice, Typing pattern, Signature
  • 27. Technique Strength Weakness Retina Highly Accurate Inconvenient for persons with eyeglasses; dislike contact with device and light beam Iris Highly accurate; works with eyeglasses; more acceptable to users than retina scan New technology, cost, although this is rapidly changing Finger Print Mature technology; highly accurate; low cost; small size, becoming widely acceptable Users can create high FRR; some persons dislike contact with device Hand/Finger Geometry accurate and flexible; widely acceptable to users User interface is bulky; dislike contact with device Face Recognition Widely acceptable to users; low cost; no direct contact; passive monitoring possible Face recognition is less accurate than other methods Voice Recognition Usable over existing telephone system; good for remote access and monitoring; Less accuracy; subject to background noise Signature Recognition Widely acceptable to users Less accuracy; not widely used yet, but has potential with PDAs Keystroke Recognition Widely acceptable to users; low cost; uses existing hardware Less accuracy
  • 28.
  • 29. Document Examination • The discipline of forensic document examination, often referred to as “questioned documents,” is frequently associated with white-collar crimes such as check fraud; however, in practice, this area of forensic science can be used in a wide array of cases from medical malpractice to art forgeries to homicides. • Armed with sophisticated technology, forensic document examiners can peer into the visible and invisible marks on a document to extract an abundance of details that may verify authenticity or provide additional information crucial to the investigation. • The digital age has made the work of forensic document examiners even more important. • With the availability of powerful software programs such as Adobe® Photoshop®, Acrobat® and others, it has become significantly easier for criminals to create and manipulate all manner of fraudulent documents from contracts to currency. • Counterfeit currency can also be identified easily using forensic tools.
  • 30.
  • 31. Conclusions • The internal security problems should not be treated as merely law and order problems. • They have to be dealt with comprehensively in all their dimensions and at all levels — political, economic and social. They are all interlinked. At times, the required measures will conflict with each other. Going too far in one direction could be counter-productive. • The security requirements have to be met, but that does not mean giving the security agencies a free hand. Striking the right balance is the key to success in meeting these challenges effectively. • We need a comprehensive security policy that will be implemented effectively at all levels. • Effective use of Forensic Science techniques can help solve many problems related to internal security.