SlideShare a Scribd company logo
1 of 32
CombatingIndia’sInternalSecurityChallengesbyUsing
AdvancesinForensicScienceTechnology:AnInsight
Dr. Prashant Mehta
National Law University, Jodhpur
Our Problems
• The continuing tensions between India and Pakistan have a direct bearing on the
internal situation in India.
• The presence of hostile neighbor's enables the internal conflicts to get external
support, which includes money, arms, and sanctuaries.
• The rise of contentious politics based on sectarian, ethnic, linguistic or other
divisive criteria, is primarily responsible for the many communal and secessionist
movements flourishing in India.
• The democratic institutions and the state structures are still not strong enough to
fully harmonise these conflicts in a peaceful manner.
• India has been facing all types of violent conflicts based on religion, caste,
language, ethnicity and regional loyalties. Political insecurity further compounds
the problem.
• The police-politician-criminal nexus can embolden the criminal elements. Their
activities can create an environment of lawlessness
Our Problems
• The crime syndicates are finding the new communication and information
technology very useful.
• Many of the insurgent and militant groups are not driven by ideology, but by sheer
greed. Money power is a bigger motivating factor than ideology.
• With the ‘Golden Crescent’, and the ‘Golden Triangle’ in India’s neighborhood,
drug trafficking poses yet another threat to our security.
• In North East some groups seek secession from the Indian Union, some others
seek separate states and yet others greater autonomy within the existing state.
• The root cause for the rise in Left extremism is the inability of the states to address
the many genuine grievances of the people. A callous district administration,
especially in the rural areas, a clogged judicial system and feudal attitudes have
compounded the problem.
• Their aim is to overthrow what they call an unjust socio-economic system. Corrupt
politicians, policemen and civil servants have made their own adjustments with
these groups. A live-and-let live attitude is mutually beneficial to all of them.
Forensic Science
• Forensic science is the use of science in the service of the law.
• Sciences used in forensics include any discipline that can aid in the collection,
preservation and analysis of evidence such as chemistry (for the identification of
explosives), engineering (for examination of structural design) or biology (for DNA
identification or matching).
• Analysis of forensic evidence is used in the investigation and prosecution of civil
and criminal proceedings.
• Forensic evidence is also used to link crimes that are thought to be related to one
another. For example, DNA evidence can link one offender to several different
crimes or crime scenes.
• Linking crimes helps law enforcement authorities to narrow the range of possible
suspects and to establish patterns of for crimes, which are useful in identifying and
prosecuting suspects.
• New technology can be used and refined not only to keep forensic scientist on the
cutting edge of science, but to maintain the highest standards of quality and
accuracy.
Digital Evidence
• Digital devices are everywhere in today’s world, helping people communicate
locally and globally with ease.
• Computers, cell phones and the Internet as the only sources for digital evidence,
but any piece of technology that processes information can be used in a criminal
way.
• The important thing to know is that responders need to be able to recognize and
properly seize potential digital evidence.
• Digital evidence is defined as information and data of value to an investigation that
is stored on, received or transmitted by an electronic device. This evidence can be
acquired when electronic devices are seized and secured for examination. Digital
evidence:
– Is latent (hidden), like fingerprints or DNA evidence
– Crosses jurisdictional borders quickly and easily
– Can be altered, damaged or destroyed with little effort, Can be time sensitive
• There are many sources of digital evidence, where evidence can be
found: Internet-based, Stand-alone computers or devices, and Mobile devices.
• These areas tend to have different evidence-gathering processes, tools and
concerns, and different types of crimes tend to lend themselves to one device or
the other.
Explosives Analysis
• A detailed investigation of a blast site will reveal crucial clues to lead the
investigation. By thoroughly documenting the condition of the scene, including any
structural damage and injuries or fatalities, investigators can slowly piece together
what occurred.
• Fragments of an exploded device will often be left intact, including switches,
wiring, timers and circuit boards. Fragments of circuit boards, fingerprints, even
pieces of pet hair have been used to help narrow the investigation and nab a
perpetrator.
• After an explosion, residue from the explosive that was used will be left behind. To
identify the type of explosive used, investigators may use an ion mobility
spectrometer (IMS), a handheld chemical detection device, to identify residues
that may be present around the blast site.
• In addition to collecting physical evidence, video footage may be available from
security cameras or from witnesses’ cell phones.
Narcotic Drugs
• The illegal drug trade creates a global black market economy that puts the public
at risk, not just from the substances being distributed, but also from the
subsequent crimes committed by users, traffickers and manufacturers.
• These crimes typically include burglary, assault and fraud, but can also involve
more serious crimes such as homicide, abduction and human trafficking.
• Forensic drug chemistry uses a series of processes performed in the field or
laboratory to detect the presence or absence of controlled substances.
• Chemical analysis performed in the laboratory on submitted evidence detects and
identifies illegal drugs, and helps law enforcement prosecute offenders.
• This practice uses a variety of chemical analysis methods to conduct both
presumptive and confirmatory tests on seized material suspected to be or contain
illegal substances.
• Results from this analysis often serve as the basis for criminal proceedings and
help to determine sentencing for convicted offenders.
Fire Arms
• The field of forensic firearms identification, sometimes called ballistics, is at its
heart the ability of a firearms examiner to determine if a particular bullet or
cartridge case was fired from a specific firearm.
• This determination can be made thanks to small, often microscopic markings
on bullets or cartridge cases that are unique to ammunition fired from that
firearm.
• Although the examiner cannot determine who actually fired a weapon,
matching the ammunition to a weapon provides vital facts for the
investigation.
• In conjunction with this, the examiner has the ability to explain how a firearm
functions and what safety features a firearm might have.
• This can have an impact on investigations of suicides, unintentional shootings
and accidental firearm discharge.
DNA
• The establishment of DNA analysis within the criminal justice system in the
mid-1980s revolutionized the field of forensic science.
• With subsequent refinement of DNA analysis methods in crime laboratories,
even minute amounts of blood, saliva, semen, skin cells or other biological
material may be used to develop investigative leads, link a perpetrator or
victim to a crime scene, or confirm or disprove an account of the crime.
• Because of the accuracy and reliability of forensic DNA analysis, this evidence
has also become an invaluable tool for exonerating individuals who have been
wrongfully convicted.
• Jurors now increasingly expect DNA evidence to be presented in a wider array
of cases, even when other types of evidence may be more valuable to the
investigation.
Finger Prints
• We touch things every day: a coffee cup, a car door, a computer keyboard. Each
time we do, it is likely that we leave behind our unique signature—in our
fingerprints.
• No two people have exactly the same fingerprints. Even identical twins, with
identical DNA, have different fingerprints.
• This uniqueness allows fingerprints to be used in all sorts of ways, including for
background checks, biometric security, mass disaster identification, and of course,
in criminal situations.
• Fingerprint analysis has been used to identify suspects and solve crimes for more
than 100 years, and it remains an extremely valuable tool for law enforcement.
• One of the most important uses for fingerprints is to help investigators link one
crime scene to another involving the same person.
• Fingerprint identification also helps investigators to track a criminal’s record, their
previous arrests and convictions, to aid in sentencing, probation, parole and
pardoning decisions.
Biometrics
• A biometric is a physiological or behavioral characteristic of a human being that can
distinguish one person from another and that theoretically can be used for
identification or verification of identity.
• Why Biometrics:
– Identity thefts,
– Something you know can be stolen,
– Predicted or hacked,
– Reliability on manual verification.
• Biometric applications available today are categorized into 2 sectors
• Psychological: Iris, Fingerprints, Hand, Retinal, and Face recognition
• Behavioral: Voice, Typing pattern, Signature
Technique Strength Weakness
Retina Highly Accurate Inconvenient for persons with eyeglasses;
dislike contact with device and light beam
Iris Highly accurate; works with eyeglasses;
more acceptable to users than retina scan
New technology, cost, although this is
rapidly changing
Finger Print Mature technology; highly accurate; low
cost; small size, becoming widely acceptable
Users can create high FRR; some persons
dislike contact with device
Hand/Finger Geometry accurate and flexible; widely acceptable to
users
User interface is bulky; dislike contact with
device
Face Recognition Widely acceptable to users; low cost; no
direct contact; passive monitoring possible
Face recognition is less accurate than other
methods
Voice Recognition Usable over existing telephone system;
good for remote access and monitoring;
Less accuracy; subject to background noise
Signature Recognition Widely acceptable to users Less accuracy; not widely used yet, but has
potential with PDAs
Keystroke Recognition Widely acceptable to users; low cost; uses
existing hardware
Less accuracy
Document Examination
• The discipline of forensic document examination, often referred to as “questioned
documents,” is frequently associated with white-collar crimes such as check fraud;
however, in practice, this area of forensic science can be used in a wide array of
cases from medical malpractice to art forgeries to homicides.
• Armed with sophisticated technology, forensic document examiners can peer into
the visible and invisible marks on a document to extract an abundance of details
that may verify authenticity or provide additional information crucial to the
investigation.
• The digital age has made the work of forensic document examiners even more
important.
• With the availability of powerful software programs such as Adobe® Photoshop®,
Acrobat® and others, it has become significantly easier for criminals to create and
manipulate all manner of fraudulent documents from contracts to currency.
• Counterfeit currency can also be identified easily using forensic tools.
Conclusions
• The internal security problems should not be treated as merely law and order
problems.
• They have to be dealt with comprehensively in all their dimensions and at all levels
— political, economic and social. They are all interlinked. At times, the required
measures will conflict with each other. Going too far in one direction could be
counter-productive.
• The security requirements have to be met, but that does not mean giving the
security agencies a free hand. Striking the right balance is the key to success in
meeting these challenges effectively.
• We need a comprehensive security policy that will be implemented effectively at
all levels.
• Effective use of Forensic Science techniques can help solve many problems related
to internal security.
Internal security and forensic science

More Related Content

What's hot

Evidence power point final
Evidence power point finalEvidence power point final
Evidence power point finalMaria Donohue
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic pptSuchita Rawat
 
Forensic photography
Forensic photographyForensic photography
Forensic photographyPina Patel
 
1. clandestine laboratory investigation
1. clandestine laboratory investigation1. clandestine laboratory investigation
1. clandestine laboratory investigationsalvador dagoon
 
Role of Forensic Science in Mass Disaster Management
Role of Forensic Science in Mass Disaster ManagementRole of Forensic Science in Mass Disaster Management
Role of Forensic Science in Mass Disaster ManagementSiddhiKuperkar1
 
Intro to Forensic Science
Intro to Forensic ScienceIntro to Forensic Science
Intro to Forensic Sciencenicollins
 
Chapter 5 death investigation customized
Chapter 5 death investigation customizedChapter 5 death investigation customized
Chapter 5 death investigation customizedLinda Huber
 
Material slideshare. interpretacion de la escena del crimen
Material slideshare. interpretacion de la escena del crimenMaterial slideshare. interpretacion de la escena del crimen
Material slideshare. interpretacion de la escena del crimencristhian viscaya
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPointts0001718
 
Crime Scene Response Guidelines
Crime Scene Response GuidelinesCrime Scene Response Guidelines
Crime Scene Response GuidelinesRoland Stockton
 
Forensic science investigators
Forensic science investigatorsForensic science investigators
Forensic science investigatorsNeha Agarwal
 
La Criminalística y su aporte en la Investigación Fiscal
La Criminalística y su aporte en la Investigación FiscalLa Criminalística y su aporte en la Investigación Fiscal
La Criminalística y su aporte en la Investigación FiscalJohana1408
 
Introduction to forensics
Introduction to forensicsIntroduction to forensics
Introduction to forensics06426345
 

What's hot (20)

Evidence power point final
Evidence power point finalEvidence power point final
Evidence power point final
 
Digital Forensic ppt
Digital Forensic pptDigital Forensic ppt
Digital Forensic ppt
 
Criminalistica
CriminalisticaCriminalistica
Criminalistica
 
Criminalistica de Campo
Criminalistica de CampoCriminalistica de Campo
Criminalistica de Campo
 
Forensic photography
Forensic photographyForensic photography
Forensic photography
 
Forensic Pathology
Forensic PathologyForensic Pathology
Forensic Pathology
 
1. clandestine laboratory investigation
1. clandestine laboratory investigation1. clandestine laboratory investigation
1. clandestine laboratory investigation
 
Role of Forensic Science in Mass Disaster Management
Role of Forensic Science in Mass Disaster ManagementRole of Forensic Science in Mass Disaster Management
Role of Forensic Science in Mass Disaster Management
 
Intro to Forensic Science
Intro to Forensic ScienceIntro to Forensic Science
Intro to Forensic Science
 
Chapter 5 death investigation customized
Chapter 5 death investigation customizedChapter 5 death investigation customized
Chapter 5 death investigation customized
 
Material slideshare. interpretacion de la escena del crimen
Material slideshare. interpretacion de la escena del crimenMaterial slideshare. interpretacion de la escena del crimen
Material slideshare. interpretacion de la escena del crimen
 
First Responder Officer in Cyber Crime
First Responder Officer in Cyber CrimeFirst Responder Officer in Cyber Crime
First Responder Officer in Cyber Crime
 
Crime Scene Basics PowerPoint
Crime Scene Basics PowerPointCrime Scene Basics PowerPoint
Crime Scene Basics PowerPoint
 
Social Media Forensics
Social Media ForensicsSocial Media Forensics
Social Media Forensics
 
Crime Scene Response Guidelines
Crime Scene Response GuidelinesCrime Scene Response Guidelines
Crime Scene Response Guidelines
 
Forensic science investigators
Forensic science investigatorsForensic science investigators
Forensic science investigators
 
Computer Forensic
Computer ForensicComputer Forensic
Computer Forensic
 
FORENSIC SCIENCE.pptx
FORENSIC SCIENCE.pptxFORENSIC SCIENCE.pptx
FORENSIC SCIENCE.pptx
 
La Criminalística y su aporte en la Investigación Fiscal
La Criminalística y su aporte en la Investigación FiscalLa Criminalística y su aporte en la Investigación Fiscal
La Criminalística y su aporte en la Investigación Fiscal
 
Introduction to forensics
Introduction to forensicsIntroduction to forensics
Introduction to forensics
 

Similar to Internal security and forensic science

HELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptxHELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptxAshwinChaurasia2
 
1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptx1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptxDICKSON26
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : ForensicsKaruna Kak
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensicsabtolinux
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigationAsadMalik120
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfalizain9604
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistanawaisajaz
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptSurajgroupsvideo
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Forensic techniques and crime scene investigation
Forensic techniques and crime scene investigationForensic techniques and crime scene investigation
Forensic techniques and crime scene investigationHumnaSaif1
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxtoltonkendal
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxadnis1
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...Government
 
Introduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaIntroduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaSaurabh Bhargava
 

Similar to Internal security and forensic science (20)

Forensic Science
Forensic ScienceForensic Science
Forensic Science
 
HELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptxHELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptx
 
1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptx1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptx
 
Special Crime Scenes 1.pptx
Special Crime Scenes 1.pptxSpecial Crime Scenes 1.pptx
Special Crime Scenes 1.pptx
 
Special types of crime scenes Part-1.pptx
Special types of crime scenes Part-1.pptxSpecial types of crime scenes Part-1.pptx
Special types of crime scenes Part-1.pptx
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : Forensics
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistan
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Forensic techniques and crime scene investigation
Forensic techniques and crime scene investigationForensic techniques and crime scene investigation
Forensic techniques and crime scene investigation
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Introduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaIntroduction to Forensic science labs in India
Introduction to Forensic science labs in India
 
Crime in the Philippines
Crime in the PhilippinesCrime in the Philippines
Crime in the Philippines
 
Chapter12
Chapter12Chapter12
Chapter12
 

More from Prashant Mehta

More from Prashant Mehta (20)

Elements facts
Elements factsElements facts
Elements facts
 
Gases physical properties
Gases physical propertiesGases physical properties
Gases physical properties
 
Communicable Diseases
Communicable DiseasesCommunicable Diseases
Communicable Diseases
 
Industrial processes
Industrial processesIndustrial processes
Industrial processes
 
Alloys
AlloysAlloys
Alloys
 
New education policy 2020
New education policy 2020New education policy 2020
New education policy 2020
 
India's New Education Policy 2020
India's New Education Policy 2020 India's New Education Policy 2020
India's New Education Policy 2020
 
Green house effect
Green house effectGreen house effect
Green house effect
 
Human induced climate change
Human induced climate changeHuman induced climate change
Human induced climate change
 
Smog
SmogSmog
Smog
 
Acid rain
Acid rainAcid rain
Acid rain
 
Healthcare Wastes
Healthcare WastesHealthcare Wastes
Healthcare Wastes
 
Opportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare SectorOpportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare Sector
 
Healthcare Waste Trail in India
Healthcare Waste Trail in IndiaHealthcare Waste Trail in India
Healthcare Waste Trail in India
 
Healthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian CourtsHealthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian Courts
 
Challenges in Indian Healthcare Sector
Challenges in Indian Healthcare SectorChallenges in Indian Healthcare Sector
Challenges in Indian Healthcare Sector
 
Atmospheric Oxidants
Atmospheric OxidantsAtmospheric Oxidants
Atmospheric Oxidants
 
Atmosphere
AtmosphereAtmosphere
Atmosphere
 
Global Warming
Global WarmingGlobal Warming
Global Warming
 
Smog
SmogSmog
Smog
 

Recently uploaded

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...Pooja Nehwal
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...anjaliyadav012327
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 

Recently uploaded (20)

Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...Russian Call Girls in Andheri Airport Mumbai WhatsApp  9167673311 💞 Full Nigh...
Russian Call Girls in Andheri Airport Mumbai WhatsApp 9167673311 💞 Full Nigh...
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
JAPAN: ORGANISATION OF PMDA, PHARMACEUTICAL LAWS & REGULATIONS, TYPES OF REGI...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 

Internal security and forensic science

  • 2.
  • 3. Our Problems • The continuing tensions between India and Pakistan have a direct bearing on the internal situation in India. • The presence of hostile neighbor's enables the internal conflicts to get external support, which includes money, arms, and sanctuaries. • The rise of contentious politics based on sectarian, ethnic, linguistic or other divisive criteria, is primarily responsible for the many communal and secessionist movements flourishing in India. • The democratic institutions and the state structures are still not strong enough to fully harmonise these conflicts in a peaceful manner. • India has been facing all types of violent conflicts based on religion, caste, language, ethnicity and regional loyalties. Political insecurity further compounds the problem. • The police-politician-criminal nexus can embolden the criminal elements. Their activities can create an environment of lawlessness
  • 4. Our Problems • The crime syndicates are finding the new communication and information technology very useful. • Many of the insurgent and militant groups are not driven by ideology, but by sheer greed. Money power is a bigger motivating factor than ideology. • With the ‘Golden Crescent’, and the ‘Golden Triangle’ in India’s neighborhood, drug trafficking poses yet another threat to our security. • In North East some groups seek secession from the Indian Union, some others seek separate states and yet others greater autonomy within the existing state. • The root cause for the rise in Left extremism is the inability of the states to address the many genuine grievances of the people. A callous district administration, especially in the rural areas, a clogged judicial system and feudal attitudes have compounded the problem. • Their aim is to overthrow what they call an unjust socio-economic system. Corrupt politicians, policemen and civil servants have made their own adjustments with these groups. A live-and-let live attitude is mutually beneficial to all of them.
  • 5.
  • 6.
  • 7.
  • 8. Forensic Science • Forensic science is the use of science in the service of the law. • Sciences used in forensics include any discipline that can aid in the collection, preservation and analysis of evidence such as chemistry (for the identification of explosives), engineering (for examination of structural design) or biology (for DNA identification or matching). • Analysis of forensic evidence is used in the investigation and prosecution of civil and criminal proceedings. • Forensic evidence is also used to link crimes that are thought to be related to one another. For example, DNA evidence can link one offender to several different crimes or crime scenes. • Linking crimes helps law enforcement authorities to narrow the range of possible suspects and to establish patterns of for crimes, which are useful in identifying and prosecuting suspects. • New technology can be used and refined not only to keep forensic scientist on the cutting edge of science, but to maintain the highest standards of quality and accuracy.
  • 9.
  • 10.
  • 11.
  • 12. Digital Evidence • Digital devices are everywhere in today’s world, helping people communicate locally and globally with ease. • Computers, cell phones and the Internet as the only sources for digital evidence, but any piece of technology that processes information can be used in a criminal way. • The important thing to know is that responders need to be able to recognize and properly seize potential digital evidence. • Digital evidence is defined as information and data of value to an investigation that is stored on, received or transmitted by an electronic device. This evidence can be acquired when electronic devices are seized and secured for examination. Digital evidence: – Is latent (hidden), like fingerprints or DNA evidence – Crosses jurisdictional borders quickly and easily – Can be altered, damaged or destroyed with little effort, Can be time sensitive • There are many sources of digital evidence, where evidence can be found: Internet-based, Stand-alone computers or devices, and Mobile devices. • These areas tend to have different evidence-gathering processes, tools and concerns, and different types of crimes tend to lend themselves to one device or the other.
  • 13.
  • 14.
  • 15. Explosives Analysis • A detailed investigation of a blast site will reveal crucial clues to lead the investigation. By thoroughly documenting the condition of the scene, including any structural damage and injuries or fatalities, investigators can slowly piece together what occurred. • Fragments of an exploded device will often be left intact, including switches, wiring, timers and circuit boards. Fragments of circuit boards, fingerprints, even pieces of pet hair have been used to help narrow the investigation and nab a perpetrator. • After an explosion, residue from the explosive that was used will be left behind. To identify the type of explosive used, investigators may use an ion mobility spectrometer (IMS), a handheld chemical detection device, to identify residues that may be present around the blast site. • In addition to collecting physical evidence, video footage may be available from security cameras or from witnesses’ cell phones.
  • 16.
  • 17. Narcotic Drugs • The illegal drug trade creates a global black market economy that puts the public at risk, not just from the substances being distributed, but also from the subsequent crimes committed by users, traffickers and manufacturers. • These crimes typically include burglary, assault and fraud, but can also involve more serious crimes such as homicide, abduction and human trafficking. • Forensic drug chemistry uses a series of processes performed in the field or laboratory to detect the presence or absence of controlled substances. • Chemical analysis performed in the laboratory on submitted evidence detects and identifies illegal drugs, and helps law enforcement prosecute offenders. • This practice uses a variety of chemical analysis methods to conduct both presumptive and confirmatory tests on seized material suspected to be or contain illegal substances. • Results from this analysis often serve as the basis for criminal proceedings and help to determine sentencing for convicted offenders.
  • 18.
  • 19.
  • 20. Fire Arms • The field of forensic firearms identification, sometimes called ballistics, is at its heart the ability of a firearms examiner to determine if a particular bullet or cartridge case was fired from a specific firearm. • This determination can be made thanks to small, often microscopic markings on bullets or cartridge cases that are unique to ammunition fired from that firearm. • Although the examiner cannot determine who actually fired a weapon, matching the ammunition to a weapon provides vital facts for the investigation. • In conjunction with this, the examiner has the ability to explain how a firearm functions and what safety features a firearm might have. • This can have an impact on investigations of suicides, unintentional shootings and accidental firearm discharge.
  • 21.
  • 22. DNA • The establishment of DNA analysis within the criminal justice system in the mid-1980s revolutionized the field of forensic science. • With subsequent refinement of DNA analysis methods in crime laboratories, even minute amounts of blood, saliva, semen, skin cells or other biological material may be used to develop investigative leads, link a perpetrator or victim to a crime scene, or confirm or disprove an account of the crime. • Because of the accuracy and reliability of forensic DNA analysis, this evidence has also become an invaluable tool for exonerating individuals who have been wrongfully convicted. • Jurors now increasingly expect DNA evidence to be presented in a wider array of cases, even when other types of evidence may be more valuable to the investigation.
  • 23.
  • 24. Finger Prints • We touch things every day: a coffee cup, a car door, a computer keyboard. Each time we do, it is likely that we leave behind our unique signature—in our fingerprints. • No two people have exactly the same fingerprints. Even identical twins, with identical DNA, have different fingerprints. • This uniqueness allows fingerprints to be used in all sorts of ways, including for background checks, biometric security, mass disaster identification, and of course, in criminal situations. • Fingerprint analysis has been used to identify suspects and solve crimes for more than 100 years, and it remains an extremely valuable tool for law enforcement. • One of the most important uses for fingerprints is to help investigators link one crime scene to another involving the same person. • Fingerprint identification also helps investigators to track a criminal’s record, their previous arrests and convictions, to aid in sentencing, probation, parole and pardoning decisions.
  • 25.
  • 26. Biometrics • A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity. • Why Biometrics: – Identity thefts, – Something you know can be stolen, – Predicted or hacked, – Reliability on manual verification. • Biometric applications available today are categorized into 2 sectors • Psychological: Iris, Fingerprints, Hand, Retinal, and Face recognition • Behavioral: Voice, Typing pattern, Signature
  • 27. Technique Strength Weakness Retina Highly Accurate Inconvenient for persons with eyeglasses; dislike contact with device and light beam Iris Highly accurate; works with eyeglasses; more acceptable to users than retina scan New technology, cost, although this is rapidly changing Finger Print Mature technology; highly accurate; low cost; small size, becoming widely acceptable Users can create high FRR; some persons dislike contact with device Hand/Finger Geometry accurate and flexible; widely acceptable to users User interface is bulky; dislike contact with device Face Recognition Widely acceptable to users; low cost; no direct contact; passive monitoring possible Face recognition is less accurate than other methods Voice Recognition Usable over existing telephone system; good for remote access and monitoring; Less accuracy; subject to background noise Signature Recognition Widely acceptable to users Less accuracy; not widely used yet, but has potential with PDAs Keystroke Recognition Widely acceptable to users; low cost; uses existing hardware Less accuracy
  • 28.
  • 29. Document Examination • The discipline of forensic document examination, often referred to as “questioned documents,” is frequently associated with white-collar crimes such as check fraud; however, in practice, this area of forensic science can be used in a wide array of cases from medical malpractice to art forgeries to homicides. • Armed with sophisticated technology, forensic document examiners can peer into the visible and invisible marks on a document to extract an abundance of details that may verify authenticity or provide additional information crucial to the investigation. • The digital age has made the work of forensic document examiners even more important. • With the availability of powerful software programs such as Adobe® Photoshop®, Acrobat® and others, it has become significantly easier for criminals to create and manipulate all manner of fraudulent documents from contracts to currency. • Counterfeit currency can also be identified easily using forensic tools.
  • 30.
  • 31. Conclusions • The internal security problems should not be treated as merely law and order problems. • They have to be dealt with comprehensively in all their dimensions and at all levels — political, economic and social. They are all interlinked. At times, the required measures will conflict with each other. Going too far in one direction could be counter-productive. • The security requirements have to be met, but that does not mean giving the security agencies a free hand. Striking the right balance is the key to success in meeting these challenges effectively. • We need a comprehensive security policy that will be implemented effectively at all levels. • Effective use of Forensic Science techniques can help solve many problems related to internal security.