Thursday, November 27, 2008

Terror attacks...ಭಯೋತ್ಪಾದಕ ಕೃತ್ಯಗಳು

Some forces kept Mumbai ATS/ anti terror cell busy in the past month, over some irrelavent case...
all this when the terror groups were planning an attack on the financial capital of our country...
there are lessons to be learnt...
  • Agencies involved in investigations should never be seen/ heard (in contrast everyone in this country was exposed to ATS team- thanks to the "intrusive media")
  • Identity of team of investigators/forensic experts should never be revealed- as they can be harmed/ pressurized by terro groups...
  • These teams not to lose primary focus-mitigation of threats...

ಮಾಧ್ಯಮಗಳಲ್ಲಿ ಕಾಲ ಕಳೆದ ಎ ಟಿ ಎಸ್...ಪ್ರಚಾರ ಪ್ರಿಯತೆಗೆ ಬಲಿಪಶು ?

ಮುಂಬೈ ಆತಂಕವಾದಿ ಕೃತ್ಯಗಳು...ನಾವೇನು ಮಾಡಬೇಕು? ಚಿತ್ರ ಕ್ಲಿಕ್ ಮಾಡಿ...
Our response to on image
Re- Published in the wake of Mumbai Serial Blasts 27.11.2008
(more on Mumbai blasts/ events)
photo: rons/ daijiworld

Technology and Security
Security technology has until lately been believed to represent the ultimate solution for threat. It is, however, prudent to identify and accept the limitations of technology to function only as a tool for the detection (not determination or deployment) of suspicion. For example, an explosive trace detection machine can detect traces of explosives, however, these traces might be a result of gun powder residue from a law abiding citizen who went to a shooting range a day prior to his belongings being checked. In another example, explosive “sniffers” are very sensitive to glycerin, which is a common ingredient of both explosive material and cosmetic creams. The task of discerning whether the detection is a result of the presence of a bomb versus a makeup case is strictly up to the human operator. Technology is a good tool for streamlining security operations and to assist human operators with their tasks, but it cannot be relied upon independently and applied without a threat-oriented and human procedure to support it.
The problem associated with any automated system or algorithm is the security or screening routine that it presents. Terrorists can patiently and successfully learn the system and craft methods to circumvent this security obstacle. Technology therefore has to offer an ever-changing security environment for the terrorist. Since technology has a defined boundary to its capability, the only things that can change in the security system are the “wet” processes (human) and “hard” algorithms (automated) that apply it in the context of a given environment or threat. Applying technology with an evolving and ever-changing mitigation procedure will add contingencies and unknowns for the terrorist and will subsequently harden the target.


No comments: