SlideShare a Scribd company logo
1 of 32
CombatingIndia’sInternalSecurityChallengesbyUsing
AdvancesinForensicScienceTechnology:AnInsight
Dr. Prashant Mehta
National Law University, Jodhpur
Our Problems
• The continuing tensions between India and Pakistan have a direct bearing on the
internal situation in India.
• The presence of hostile neighbor's enables the internal conflicts to get external
support, which includes money, arms, and sanctuaries.
• The rise of contentious politics based on sectarian, ethnic, linguistic or other
divisive criteria, is primarily responsible for the many communal and secessionist
movements flourishing in India.
• The democratic institutions and the state structures are still not strong enough to
fully harmonise these conflicts in a peaceful manner.
• India has been facing all types of violent conflicts based on religion, caste,
language, ethnicity and regional loyalties. Political insecurity further compounds
the problem.
• The police-politician-criminal nexus can embolden the criminal elements. Their
activities can create an environment of lawlessness
Our Problems
• The crime syndicates are finding the new communication and information
technology very useful.
• Many of the insurgent and militant groups are not driven by ideology, but by sheer
greed. Money power is a bigger motivating factor than ideology.
• With the ‘Golden Crescent’, and the ‘Golden Triangle’ in India’s neighborhood,
drug trafficking poses yet another threat to our security.
• In North East some groups seek secession from the Indian Union, some others
seek separate states and yet others greater autonomy within the existing state.
• The root cause for the rise in Left extremism is the inability of the states to address
the many genuine grievances of the people. A callous district administration,
especially in the rural areas, a clogged judicial system and feudal attitudes have
compounded the problem.
• Their aim is to overthrow what they call an unjust socio-economic system. Corrupt
politicians, policemen and civil servants have made their own adjustments with
these groups. A live-and-let live attitude is mutually beneficial to all of them.
Forensic Science
• Forensic science is the use of science in the service of the law.
• Sciences used in forensics include any discipline that can aid in the collection,
preservation and analysis of evidence such as chemistry (for the identification of
explosives), engineering (for examination of structural design) or biology (for DNA
identification or matching).
• Analysis of forensic evidence is used in the investigation and prosecution of civil
and criminal proceedings.
• Forensic evidence is also used to link crimes that are thought to be related to one
another. For example, DNA evidence can link one offender to several different
crimes or crime scenes.
• Linking crimes helps law enforcement authorities to narrow the range of possible
suspects and to establish patterns of for crimes, which are useful in identifying and
prosecuting suspects.
• New technology can be used and refined not only to keep forensic scientist on the
cutting edge of science, but to maintain the highest standards of quality and
accuracy.
Digital Evidence
• Digital devices are everywhere in today’s world, helping people communicate
locally and globally with ease.
• Computers, cell phones and the Internet as the only sources for digital evidence,
but any piece of technology that processes information can be used in a criminal
way.
• The important thing to know is that responders need to be able to recognize and
properly seize potential digital evidence.
• Digital evidence is defined as information and data of value to an investigation that
is stored on, received or transmitted by an electronic device. This evidence can be
acquired when electronic devices are seized and secured for examination. Digital
evidence:
– Is latent (hidden), like fingerprints or DNA evidence
– Crosses jurisdictional borders quickly and easily
– Can be altered, damaged or destroyed with little effort, Can be time sensitive
• There are many sources of digital evidence, where evidence can be
found: Internet-based, Stand-alone computers or devices, and Mobile devices.
• These areas tend to have different evidence-gathering processes, tools and
concerns, and different types of crimes tend to lend themselves to one device or
the other.
Explosives Analysis
• A detailed investigation of a blast site will reveal crucial clues to lead the
investigation. By thoroughly documenting the condition of the scene, including any
structural damage and injuries or fatalities, investigators can slowly piece together
what occurred.
• Fragments of an exploded device will often be left intact, including switches,
wiring, timers and circuit boards. Fragments of circuit boards, fingerprints, even
pieces of pet hair have been used to help narrow the investigation and nab a
perpetrator.
• After an explosion, residue from the explosive that was used will be left behind. To
identify the type of explosive used, investigators may use an ion mobility
spectrometer (IMS), a handheld chemical detection device, to identify residues
that may be present around the blast site.
• In addition to collecting physical evidence, video footage may be available from
security cameras or from witnesses’ cell phones.
Narcotic Drugs
• The illegal drug trade creates a global black market economy that puts the public
at risk, not just from the substances being distributed, but also from the
subsequent crimes committed by users, traffickers and manufacturers.
• These crimes typically include burglary, assault and fraud, but can also involve
more serious crimes such as homicide, abduction and human trafficking.
• Forensic drug chemistry uses a series of processes performed in the field or
laboratory to detect the presence or absence of controlled substances.
• Chemical analysis performed in the laboratory on submitted evidence detects and
identifies illegal drugs, and helps law enforcement prosecute offenders.
• This practice uses a variety of chemical analysis methods to conduct both
presumptive and confirmatory tests on seized material suspected to be or contain
illegal substances.
• Results from this analysis often serve as the basis for criminal proceedings and
help to determine sentencing for convicted offenders.
Fire Arms
• The field of forensic firearms identification, sometimes called ballistics, is at its
heart the ability of a firearms examiner to determine if a particular bullet or
cartridge case was fired from a specific firearm.
• This determination can be made thanks to small, often microscopic markings
on bullets or cartridge cases that are unique to ammunition fired from that
firearm.
• Although the examiner cannot determine who actually fired a weapon,
matching the ammunition to a weapon provides vital facts for the
investigation.
• In conjunction with this, the examiner has the ability to explain how a firearm
functions and what safety features a firearm might have.
• This can have an impact on investigations of suicides, unintentional shootings
and accidental firearm discharge.
DNA
• The establishment of DNA analysis within the criminal justice system in the
mid-1980s revolutionized the field of forensic science.
• With subsequent refinement of DNA analysis methods in crime laboratories,
even minute amounts of blood, saliva, semen, skin cells or other biological
material may be used to develop investigative leads, link a perpetrator or
victim to a crime scene, or confirm or disprove an account of the crime.
• Because of the accuracy and reliability of forensic DNA analysis, this evidence
has also become an invaluable tool for exonerating individuals who have been
wrongfully convicted.
• Jurors now increasingly expect DNA evidence to be presented in a wider array
of cases, even when other types of evidence may be more valuable to the
investigation.
Finger Prints
• We touch things every day: a coffee cup, a car door, a computer keyboard. Each
time we do, it is likely that we leave behind our unique signature—in our
fingerprints.
• No two people have exactly the same fingerprints. Even identical twins, with
identical DNA, have different fingerprints.
• This uniqueness allows fingerprints to be used in all sorts of ways, including for
background checks, biometric security, mass disaster identification, and of course,
in criminal situations.
• Fingerprint analysis has been used to identify suspects and solve crimes for more
than 100 years, and it remains an extremely valuable tool for law enforcement.
• One of the most important uses for fingerprints is to help investigators link one
crime scene to another involving the same person.
• Fingerprint identification also helps investigators to track a criminal’s record, their
previous arrests and convictions, to aid in sentencing, probation, parole and
pardoning decisions.
Biometrics
• A biometric is a physiological or behavioral characteristic of a human being that can
distinguish one person from another and that theoretically can be used for
identification or verification of identity.
• Why Biometrics:
– Identity thefts,
– Something you know can be stolen,
– Predicted or hacked,
– Reliability on manual verification.
• Biometric applications available today are categorized into 2 sectors
• Psychological: Iris, Fingerprints, Hand, Retinal, and Face recognition
• Behavioral: Voice, Typing pattern, Signature
Technique Strength Weakness
Retina Highly Accurate Inconvenient for persons with eyeglasses;
dislike contact with device and light beam
Iris Highly accurate; works with eyeglasses;
more acceptable to users than retina scan
New technology, cost, although this is
rapidly changing
Finger Print Mature technology; highly accurate; low
cost; small size, becoming widely acceptable
Users can create high FRR; some persons
dislike contact with device
Hand/Finger Geometry accurate and flexible; widely acceptable to
users
User interface is bulky; dislike contact with
device
Face Recognition Widely acceptable to users; low cost; no
direct contact; passive monitoring possible
Face recognition is less accurate than other
methods
Voice Recognition Usable over existing telephone system;
good for remote access and monitoring;
Less accuracy; subject to background noise
Signature Recognition Widely acceptable to users Less accuracy; not widely used yet, but has
potential with PDAs
Keystroke Recognition Widely acceptable to users; low cost; uses
existing hardware
Less accuracy
Document Examination
• The discipline of forensic document examination, often referred to as “questioned
documents,” is frequently associated with white-collar crimes such as check fraud;
however, in practice, this area of forensic science can be used in a wide array of
cases from medical malpractice to art forgeries to homicides.
• Armed with sophisticated technology, forensic document examiners can peer into
the visible and invisible marks on a document to extract an abundance of details
that may verify authenticity or provide additional information crucial to the
investigation.
• The digital age has made the work of forensic document examiners even more
important.
• With the availability of powerful software programs such as Adobe® Photoshop®,
Acrobat® and others, it has become significantly easier for criminals to create and
manipulate all manner of fraudulent documents from contracts to currency.
• Counterfeit currency can also be identified easily using forensic tools.
Conclusions
• The internal security problems should not be treated as merely law and order
problems.
• They have to be dealt with comprehensively in all their dimensions and at all levels
— political, economic and social. They are all interlinked. At times, the required
measures will conflict with each other. Going too far in one direction could be
counter-productive.
• The security requirements have to be met, but that does not mean giving the
security agencies a free hand. Striking the right balance is the key to success in
meeting these challenges effectively.
• We need a comprehensive security policy that will be implemented effectively at
all levels.
• Effective use of Forensic Science techniques can help solve many problems related
to internal security.
Internal security and forensic science

More Related Content

What's hot

Forensic Serology
Forensic SerologyForensic Serology
Forensic Serology
annperry09
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
nicollins
 

What's hot (20)

Explosives and its classification
Explosives and its classificationExplosives and its classification
Explosives and its classification
 
Video Spectral Comparator
Video Spectral ComparatorVideo Spectral Comparator
Video Spectral Comparator
 
TOOL MARKS
TOOL MARKSTOOL MARKS
TOOL MARKS
 
Criminal Profiling.pptx
Criminal Profiling.pptxCriminal Profiling.pptx
Criminal Profiling.pptx
 
Police and Detective Training Schools
Police and Detective Training SchoolsPolice and Detective Training Schools
Police and Detective Training Schools
 
Interpretation of dna typing results and codis
Interpretation of dna typing results and codis Interpretation of dna typing results and codis
Interpretation of dna typing results and codis
 
Gunshot residue, forensic analysis and interpretation ppt 03
Gunshot residue, forensic analysis and interpretation ppt 03Gunshot residue, forensic analysis and interpretation ppt 03
Gunshot residue, forensic analysis and interpretation ppt 03
 
forensic analysis of serological evidences
forensic analysis of serological evidencesforensic analysis of serological evidences
forensic analysis of serological evidences
 
Forensic Serology
Forensic SerologyForensic Serology
Forensic Serology
 
restoration of toolmarks
restoration of toolmarksrestoration of toolmarks
restoration of toolmarks
 
Crime Scene Investigation
Crime Scene InvestigationCrime Scene Investigation
Crime Scene Investigation
 
The polygraph test
The polygraph testThe polygraph test
The polygraph test
 
Types of Crime Scenes
Types of Crime ScenesTypes of Crime Scenes
Types of Crime Scenes
 
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCEANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
ANALYTICAL CHEMISTRY IN FORENSIC SCIENCE
 
Modus operandi
Modus operandiModus operandi
Modus operandi
 
Crime scene management
Crime scene managementCrime scene management
Crime scene management
 
Fingerprints
FingerprintsFingerprints
Fingerprints
 
Henry’s 10 digit classification of fingerprint
Henry’s 10 digit classification of fingerprintHenry’s 10 digit classification of fingerprint
Henry’s 10 digit classification of fingerprint
 
Forensic techniques and crime scene investigation
Forensic techniques and crime scene investigationForensic techniques and crime scene investigation
Forensic techniques and crime scene investigation
 
Forensic Chemistry - Explosives
Forensic Chemistry - ExplosivesForensic Chemistry - Explosives
Forensic Chemistry - Explosives
 

Similar to Internal security and forensic science

Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
sabtolinux
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
alizain9604
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistan
awaisajaz
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
toltonkendal
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
Government
 

Similar to Internal security and forensic science (20)

Forensic Science
Forensic ScienceForensic Science
Forensic Science
 
HELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptxHELIX (forensic theme).edited version.pptx
HELIX (forensic theme).edited version.pptx
 
1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptx1_INTRODUCTION FORENSIC SCIENCE.pptx
1_INTRODUCTION FORENSIC SCIENCE.pptx
 
Special Crime Scenes 1.pptx
Special Crime Scenes 1.pptxSpecial Crime Scenes 1.pptx
Special Crime Scenes 1.pptx
 
Special types of crime scenes Part-1.pptx
Special types of crime scenes Part-1.pptxSpecial types of crime scenes Part-1.pptx
Special types of crime scenes Part-1.pptx
 
Social Issues in Computing : Forensics
Social Issues in Computing : ForensicsSocial Issues in Computing : Forensics
Social Issues in Computing : Forensics
 
Latihan2 comp-forensic
Latihan2 comp-forensicLatihan2 comp-forensic
Latihan2 comp-forensic
 
Forensic investigation
Forensic investigationForensic investigation
Forensic investigation
 
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdfforensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
forensicscienceinpakistan-150214040113-conversion-gate01 (1).pdf
 
Forensic science in pakistan
Forensic science in pakistanForensic science in pakistan
Forensic science in pakistan
 
Lecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.pptLecture2 Introduction to Digital Forensics.ppt
Lecture2 Introduction to Digital Forensics.ppt
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docxRunning head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
Running head RESEARCH REPORT TOPIC OUTLINERESEARCH REPORT TOPIC.docx
 
Cybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptxCybercrimes in cybersecurity Investigations.pptx
Cybercrimes in cybersecurity Investigations.pptx
 
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
icmss-2015_Usage of Forensics Science In Intelligence Gathering (Forensics In...
 
Predictive Policing
Predictive PolicingPredictive Policing
Predictive Policing
 
Introduction to Forensic science labs in India
Introduction to Forensic science labs in IndiaIntroduction to Forensic science labs in India
Introduction to Forensic science labs in India
 
Crime in the Philippines
Crime in the PhilippinesCrime in the Philippines
Crime in the Philippines
 
Chapter12
Chapter12Chapter12
Chapter12
 
Trends of crime in pakistan and investigation by forensic and analytical appr...
Trends of crime in pakistan and investigation by forensic and analytical appr...Trends of crime in pakistan and investigation by forensic and analytical appr...
Trends of crime in pakistan and investigation by forensic and analytical appr...
 

More from Prashant Mehta

More from Prashant Mehta (20)

Elements facts
Elements factsElements facts
Elements facts
 
Gases physical properties
Gases physical propertiesGases physical properties
Gases physical properties
 
Communicable Diseases
Communicable DiseasesCommunicable Diseases
Communicable Diseases
 
Industrial processes
Industrial processesIndustrial processes
Industrial processes
 
Alloys
AlloysAlloys
Alloys
 
New education policy 2020
New education policy 2020New education policy 2020
New education policy 2020
 
India's New Education Policy 2020
India's New Education Policy 2020 India's New Education Policy 2020
India's New Education Policy 2020
 
Green house effect
Green house effectGreen house effect
Green house effect
 
Human induced climate change
Human induced climate changeHuman induced climate change
Human induced climate change
 
Smog
SmogSmog
Smog
 
Acid rain
Acid rainAcid rain
Acid rain
 
Healthcare Wastes
Healthcare WastesHealthcare Wastes
Healthcare Wastes
 
Opportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare SectorOpportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare Sector
 
Healthcare Waste Trail in India
Healthcare Waste Trail in IndiaHealthcare Waste Trail in India
Healthcare Waste Trail in India
 
Healthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian CourtsHealthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian Courts
 
Challenges in Indian Healthcare Sector
Challenges in Indian Healthcare SectorChallenges in Indian Healthcare Sector
Challenges in Indian Healthcare Sector
 
Atmospheric Oxidants
Atmospheric OxidantsAtmospheric Oxidants
Atmospheric Oxidants
 
Atmosphere
AtmosphereAtmosphere
Atmosphere
 
Global Warming
Global WarmingGlobal Warming
Global Warming
 
Smog
SmogSmog
Smog
 

Recently uploaded

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 

Recently uploaded (20)

General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Role Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptxRole Of Transgenic Animal In Target Validation-1.pptx
Role Of Transgenic Animal In Target Validation-1.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-IIFood Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
Food Chain and Food Web (Ecosystem) EVS, B. Pharmacy 1st Year, Sem-II
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 

Internal security and forensic science

  • 2.
  • 3. Our Problems • The continuing tensions between India and Pakistan have a direct bearing on the internal situation in India. • The presence of hostile neighbor's enables the internal conflicts to get external support, which includes money, arms, and sanctuaries. • The rise of contentious politics based on sectarian, ethnic, linguistic or other divisive criteria, is primarily responsible for the many communal and secessionist movements flourishing in India. • The democratic institutions and the state structures are still not strong enough to fully harmonise these conflicts in a peaceful manner. • India has been facing all types of violent conflicts based on religion, caste, language, ethnicity and regional loyalties. Political insecurity further compounds the problem. • The police-politician-criminal nexus can embolden the criminal elements. Their activities can create an environment of lawlessness
  • 4. Our Problems • The crime syndicates are finding the new communication and information technology very useful. • Many of the insurgent and militant groups are not driven by ideology, but by sheer greed. Money power is a bigger motivating factor than ideology. • With the ‘Golden Crescent’, and the ‘Golden Triangle’ in India’s neighborhood, drug trafficking poses yet another threat to our security. • In North East some groups seek secession from the Indian Union, some others seek separate states and yet others greater autonomy within the existing state. • The root cause for the rise in Left extremism is the inability of the states to address the many genuine grievances of the people. A callous district administration, especially in the rural areas, a clogged judicial system and feudal attitudes have compounded the problem. • Their aim is to overthrow what they call an unjust socio-economic system. Corrupt politicians, policemen and civil servants have made their own adjustments with these groups. A live-and-let live attitude is mutually beneficial to all of them.
  • 5.
  • 6.
  • 7.
  • 8. Forensic Science • Forensic science is the use of science in the service of the law. • Sciences used in forensics include any discipline that can aid in the collection, preservation and analysis of evidence such as chemistry (for the identification of explosives), engineering (for examination of structural design) or biology (for DNA identification or matching). • Analysis of forensic evidence is used in the investigation and prosecution of civil and criminal proceedings. • Forensic evidence is also used to link crimes that are thought to be related to one another. For example, DNA evidence can link one offender to several different crimes or crime scenes. • Linking crimes helps law enforcement authorities to narrow the range of possible suspects and to establish patterns of for crimes, which are useful in identifying and prosecuting suspects. • New technology can be used and refined not only to keep forensic scientist on the cutting edge of science, but to maintain the highest standards of quality and accuracy.
  • 9.
  • 10.
  • 11.
  • 12. Digital Evidence • Digital devices are everywhere in today’s world, helping people communicate locally and globally with ease. • Computers, cell phones and the Internet as the only sources for digital evidence, but any piece of technology that processes information can be used in a criminal way. • The important thing to know is that responders need to be able to recognize and properly seize potential digital evidence. • Digital evidence is defined as information and data of value to an investigation that is stored on, received or transmitted by an electronic device. This evidence can be acquired when electronic devices are seized and secured for examination. Digital evidence: – Is latent (hidden), like fingerprints or DNA evidence – Crosses jurisdictional borders quickly and easily – Can be altered, damaged or destroyed with little effort, Can be time sensitive • There are many sources of digital evidence, where evidence can be found: Internet-based, Stand-alone computers or devices, and Mobile devices. • These areas tend to have different evidence-gathering processes, tools and concerns, and different types of crimes tend to lend themselves to one device or the other.
  • 13.
  • 14.
  • 15. Explosives Analysis • A detailed investigation of a blast site will reveal crucial clues to lead the investigation. By thoroughly documenting the condition of the scene, including any structural damage and injuries or fatalities, investigators can slowly piece together what occurred. • Fragments of an exploded device will often be left intact, including switches, wiring, timers and circuit boards. Fragments of circuit boards, fingerprints, even pieces of pet hair have been used to help narrow the investigation and nab a perpetrator. • After an explosion, residue from the explosive that was used will be left behind. To identify the type of explosive used, investigators may use an ion mobility spectrometer (IMS), a handheld chemical detection device, to identify residues that may be present around the blast site. • In addition to collecting physical evidence, video footage may be available from security cameras or from witnesses’ cell phones.
  • 16.
  • 17. Narcotic Drugs • The illegal drug trade creates a global black market economy that puts the public at risk, not just from the substances being distributed, but also from the subsequent crimes committed by users, traffickers and manufacturers. • These crimes typically include burglary, assault and fraud, but can also involve more serious crimes such as homicide, abduction and human trafficking. • Forensic drug chemistry uses a series of processes performed in the field or laboratory to detect the presence or absence of controlled substances. • Chemical analysis performed in the laboratory on submitted evidence detects and identifies illegal drugs, and helps law enforcement prosecute offenders. • This practice uses a variety of chemical analysis methods to conduct both presumptive and confirmatory tests on seized material suspected to be or contain illegal substances. • Results from this analysis often serve as the basis for criminal proceedings and help to determine sentencing for convicted offenders.
  • 18.
  • 19.
  • 20. Fire Arms • The field of forensic firearms identification, sometimes called ballistics, is at its heart the ability of a firearms examiner to determine if a particular bullet or cartridge case was fired from a specific firearm. • This determination can be made thanks to small, often microscopic markings on bullets or cartridge cases that are unique to ammunition fired from that firearm. • Although the examiner cannot determine who actually fired a weapon, matching the ammunition to a weapon provides vital facts for the investigation. • In conjunction with this, the examiner has the ability to explain how a firearm functions and what safety features a firearm might have. • This can have an impact on investigations of suicides, unintentional shootings and accidental firearm discharge.
  • 21.
  • 22. DNA • The establishment of DNA analysis within the criminal justice system in the mid-1980s revolutionized the field of forensic science. • With subsequent refinement of DNA analysis methods in crime laboratories, even minute amounts of blood, saliva, semen, skin cells or other biological material may be used to develop investigative leads, link a perpetrator or victim to a crime scene, or confirm or disprove an account of the crime. • Because of the accuracy and reliability of forensic DNA analysis, this evidence has also become an invaluable tool for exonerating individuals who have been wrongfully convicted. • Jurors now increasingly expect DNA evidence to be presented in a wider array of cases, even when other types of evidence may be more valuable to the investigation.
  • 23.
  • 24. Finger Prints • We touch things every day: a coffee cup, a car door, a computer keyboard. Each time we do, it is likely that we leave behind our unique signature—in our fingerprints. • No two people have exactly the same fingerprints. Even identical twins, with identical DNA, have different fingerprints. • This uniqueness allows fingerprints to be used in all sorts of ways, including for background checks, biometric security, mass disaster identification, and of course, in criminal situations. • Fingerprint analysis has been used to identify suspects and solve crimes for more than 100 years, and it remains an extremely valuable tool for law enforcement. • One of the most important uses for fingerprints is to help investigators link one crime scene to another involving the same person. • Fingerprint identification also helps investigators to track a criminal’s record, their previous arrests and convictions, to aid in sentencing, probation, parole and pardoning decisions.
  • 25.
  • 26. Biometrics • A biometric is a physiological or behavioral characteristic of a human being that can distinguish one person from another and that theoretically can be used for identification or verification of identity. • Why Biometrics: – Identity thefts, – Something you know can be stolen, – Predicted or hacked, – Reliability on manual verification. • Biometric applications available today are categorized into 2 sectors • Psychological: Iris, Fingerprints, Hand, Retinal, and Face recognition • Behavioral: Voice, Typing pattern, Signature
  • 27. Technique Strength Weakness Retina Highly Accurate Inconvenient for persons with eyeglasses; dislike contact with device and light beam Iris Highly accurate; works with eyeglasses; more acceptable to users than retina scan New technology, cost, although this is rapidly changing Finger Print Mature technology; highly accurate; low cost; small size, becoming widely acceptable Users can create high FRR; some persons dislike contact with device Hand/Finger Geometry accurate and flexible; widely acceptable to users User interface is bulky; dislike contact with device Face Recognition Widely acceptable to users; low cost; no direct contact; passive monitoring possible Face recognition is less accurate than other methods Voice Recognition Usable over existing telephone system; good for remote access and monitoring; Less accuracy; subject to background noise Signature Recognition Widely acceptable to users Less accuracy; not widely used yet, but has potential with PDAs Keystroke Recognition Widely acceptable to users; low cost; uses existing hardware Less accuracy
  • 28.
  • 29. Document Examination • The discipline of forensic document examination, often referred to as “questioned documents,” is frequently associated with white-collar crimes such as check fraud; however, in practice, this area of forensic science can be used in a wide array of cases from medical malpractice to art forgeries to homicides. • Armed with sophisticated technology, forensic document examiners can peer into the visible and invisible marks on a document to extract an abundance of details that may verify authenticity or provide additional information crucial to the investigation. • The digital age has made the work of forensic document examiners even more important. • With the availability of powerful software programs such as Adobe® Photoshop®, Acrobat® and others, it has become significantly easier for criminals to create and manipulate all manner of fraudulent documents from contracts to currency. • Counterfeit currency can also be identified easily using forensic tools.
  • 30.
  • 31. Conclusions • The internal security problems should not be treated as merely law and order problems. • They have to be dealt with comprehensively in all their dimensions and at all levels — political, economic and social. They are all interlinked. At times, the required measures will conflict with each other. Going too far in one direction could be counter-productive. • The security requirements have to be met, but that does not mean giving the security agencies a free hand. Striking the right balance is the key to success in meeting these challenges effectively. • We need a comprehensive security policy that will be implemented effectively at all levels. • Effective use of Forensic Science techniques can help solve many problems related to internal security.