Upload
others
View
2
Download
0
Embed Size (px)
Citation preview
The�Magazine�of�Raksha�Shakti�UniversityKAVACH
Fourth�Issue
India's�First�Internal�Security�University
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
KAVACHThe�Magazine�of�Raksha�Shakti�University
FOURTH ISSUE
New�Mental�Corner,�Meghaninagar,�Ahmedabad�-�380�016�(Gujarat)�INDIA.Ph.:�079-22683624,�22684173�•�Fax�:�079�-�22683762E-mail�:�[email protected]
www.rakshashaktiuniversity.edu.in
RAKSHA�SHAKTI�UNIVERSITY
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
KAVACHThe�Magazine�of�Raksha�Shakti�University
FOURTH ISSUE
New�Mental�Corner,�Meghaninagar,�Ahmedabad�-�380�016�(Gujarat)�INDIA.Ph.:�079-22683624,�22684173�•�Fax�:�079�-�22683762E-mail�:�[email protected]
www.rakshashaktiuniversity.edu.in
RAKSHA�SHAKTI�UNIVERSITY
Chief�Patron Shri�O.P.�Mathur,�IPS�(Retd.)Director�General,�Raksha�Shakti�University
Patron Shri�Vikas�Sahay,�IPSDy.�Director�General,�Raksha�Shakti�University
Editor Dr.�(Smt.)�S.�L.�VayaDirector,�Research�and�Development,�Raksha�Shakti�University
Editorial�Board Dr.�Priyanka�Sharma�(Professor,�IT�-�Raksha�Shakti�University)Shri�Abhishek�Awadh�(Asst.�Professor,�Police�Administration�-�Raksha�Shakti�University)Shri�Pragneshkumar�Parekh�(Asst.�Librarian�-�Raksha�Shakti�University)Shri�Sumit�Choudhary�(Asst.�Professor,�Forensic�Science�-�Raksha�Shakti�University)Shri�Chandreh�Parekh�(Asst.�Professor,�Telecommunication�-�Raksha�Shakti�University)Dr.�Anand�Kumar�Tripathi�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Dr.�Dimpal�Raval,�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Shri�Ravi�Sheth�(Asst.�Professor,�IT�-�Raksha�Shakti�University)
Contribution The�aim�of�this�magazine�is�to�disseminate�information�related�to�Internal�Security�and�other�allied�areas.�The�magazine�will�contain�articles�and�papers�written�by�educators,�researchers,�professionals�and�students�and�other�individuals�associated�with�Internal�Security.�The�Magazine�will�also�have�information�related�to�the�progress�made�by�the�university�and�the�spheres�in�which�this�university�is�associated�in�terms�of�study�and�research.�Contribution�in�the�form�of�article�paper�or�easy�can�be�sent�to�the�editor�by�e-mail�on�[email protected]
Copyright The�contents�of�this�magazine�are�designed�for�creating�awareness,�providing�support�to�education�and�research�in�the�area�of�Internal�Security.�Use�of�any�part�of�contents�for�any�purpose�other�than�research�and�education�is�not�permitted�without�prior�consent�of�the�Editor.
The�Publisher,�Editor�and�Associate�Editors�are�not�responsible�for�any�opinion,�statements�of�facts�other�than�official�announcements,�news�and�information�related�to�Raksha�Shakti�University.
Language English,�Hindi�and�Gujarati
Name�and�Address�Publisher
Preeth�Padmanabhan,�I/C�Registrar,Raksha�Shakti�UniversityNew�Mental�Corner,�Meghaninagar,Ahmedabad�-�380�016�(Gujarat)�India.
Phone�No. 079-22683624,�22684222,�22684173
Fax�No. 079-22683762
E-mail [email protected]
Website The�electronic�version�of�this�magazine�can�be�accessed�at�www.rakshashaktiuniversity.edu.in
KavachThe�Magazine�of�Raksha�Shakti�University Index
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
1. Multimedia�Security�and�Authentication�for�Digital�Images 1
2. †eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk 7
3. Road�Rage�‒�An�Analysis 11
4. Biometric�System:�In�Crime�Prevention 14
5. Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil 16
6. E-Commerce�Threats� 19
7. Credit�Card�Frauds 24
8. Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security 27
9. Intra�Organizational�Conflicts�In�Gujarat�Police 30
10. TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance 36
11. siiflyigiiWii; amiDiviiD Sih!r pii!li&si 40
12. Activities�of�Institute�of�Research�&�Development 42
13. Important�News�related�to�Internal�Security 43
14. RSU�in�News 44
15. Guidelines�for�contribution�in�ʻKavachʼ 45
Chief�Patron Shri�O.P.�Mathur,�IPS�(Retd.)Director�General,�Raksha�Shakti�University
Patron Shri�Vikas�Sahay,�IPSDy.�Director�General,�Raksha�Shakti�University
Editor Dr.�(Smt.)�S.�L.�VayaDirector,�Research�and�Development,�Raksha�Shakti�University
Editorial�Board Dr.�Priyanka�Sharma�(Professor,�IT�-�Raksha�Shakti�University)Shri�Abhishek�Awadh�(Asst.�Professor,�Police�Administration�-�Raksha�Shakti�University)Shri�Pragneshkumar�Parekh�(Asst.�Librarian�-�Raksha�Shakti�University)Shri�Sumit�Choudhary�(Asst.�Professor,�Forensic�Science�-�Raksha�Shakti�University)Shri�Chandreh�Parekh�(Asst.�Professor,�Telecommunication�-�Raksha�Shakti�University)Dr.�Anand�Kumar�Tripathi�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Dr.�Dimpal�Raval,�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Shri�Ravi�Sheth�(Asst.�Professor,�IT�-�Raksha�Shakti�University)
Contribution The�aim�of�this�magazine�is�to�disseminate�information�related�to�Internal�Security�and�other�allied�areas.�The�magazine�will�contain�articles�and�papers�written�by�educators,�researchers,�professionals�and�students�and�other�individuals�associated�with�Internal�Security.�The�Magazine�will�also�have�information�related�to�the�progress�made�by�the�university�and�the�spheres�in�which�this�university�is�associated�in�terms�of�study�and�research.�Contribution�in�the�form�of�article�paper�or�easy�can�be�sent�to�the�editor�by�e-mail�on�[email protected]
Copyright The�contents�of�this�magazine�are�designed�for�creating�awareness,�providing�support�to�education�and�research�in�the�area�of�Internal�Security.�Use�of�any�part�of�contents�for�any�purpose�other�than�research�and�education�is�not�permitted�without�prior�consent�of�the�Editor.
The�Publisher,�Editor�and�Associate�Editors�are�not�responsible�for�any�opinion,�statements�of�facts�other�than�official�announcements,�news�and�information�related�to�Raksha�Shakti�University.
Language English,�Hindi�and�Gujarati
Name�and�Address�Publisher
Preeth�Padmanabhan,�I/C�Registrar,Raksha�Shakti�UniversityNew�Mental�Corner,�Meghaninagar,Ahmedabad�-�380�016�(Gujarat)�India.
Phone�No. 079-22683624,�22684222,�22684173
Fax�No. 079-22683762
E-mail [email protected]
Website The�electronic�version�of�this�magazine�can�be�accessed�at�www.rakshashaktiuniversity.edu.in
KavachThe�Magazine�of�Raksha�Shakti�University Index
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
1. Multimedia�Security�and�Authentication�for�Digital�Images 1
2. †eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk 7
3. Road�Rage�‒�An�Analysis 11
4. Biometric�System:�In�Crime�Prevention 14
5. Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil 16
6. E-Commerce�Threats� 19
7. Credit�Card�Frauds 24
8. Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security 27
9. Intra�Organizational�Conflicts�In�Gujarat�Police 30
10. TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance 36
11. siiflyigiiWii; amiDiviiD Sih!r pii!li&si 40
12. Activities�of�Institute�of�Research�&�Development 42
13. Important�News�related�to�Internal�Security 43
14. RSU�in�News 44
15. Guidelines�for�contribution�in�ʻKavachʼ 45
From�the�desk�of�
EditorIt�gives�me�immense�pleasure�to�share�with�you�the�publication�of�fourth�issue�of�Raksha�Shakti�University�Magazine�'Kavach'.�Based�on�reader's�feedback,�the�University�has�decided�to�publish�'Kavach'�on�regular�basis.�Hope�to�share�the�knowledge�and�circulate�among�our�reader�community�about�issues�related�to�Internal�Security�in�India.��
This�issue�contains�articles�by�the�internal�faculty�and�students�of�Raksha�Shakti�University�related�to�internal�security.�The�topics� �are�covered�are�Multimedia�Security,�Harassment�of�Women,� Road� Rage,� Biometric� Security� System,� Armed� Forces� Special� Power� Act,� E-Commerce�Threat,�Credit�Card�Frauds,�Neurocriminology,�Intra�Organizational�Conflicts�in�Gujarat� Police� and� Tele-Forensic� Technology.� A� special� article� on� Success� Story� of�Ahmedabad�City�Police� is�an�added�attraction�of�this� issue.� Important�news�published�in�various�newspapers�related�to�Internal�Security�is�also�compiled.�
I�feel�unfortunate�while�sharing�the�sad�demise�of�Jim�Hilborn,�a�Canadian�Criminologist,�who�introduced�Neurocriminology�to�Raksha�Shakti�University�by�his�Skype�lectures,�was�among�the� pioneers� in� shaping� the� practicing� knowledge� of� Neurocriminology� in� correctional�services.�On�behalf�of�the�Raksha�Shakti�University,�I�present�my�sincere�condolences�to�his�family,�friends�and�all�those�who�knew�him.
I� sincerely� hope� that� going� through� this� fourth� issue� of� "Kavach"� will� be� a� pleasurable�experience�for�you.�I�look�forward�to�your�comments�and�feedback.�I�also�welcome�you�all�to�contribute�by�sending�articles�(English,�Hindi�and�Gujarati)�which�can�be�printed�in�the�future�editions�of�"Kavach".
Dr.�S.�L.�VayaThe�Editor,�“Kavach”,
Director,�Research�&�Development,Raksha�Shakti�University
Kavach:�The�Magazine�of�Raksha�Shakti�University
Abstract:�Digital�Images�are�very�easy�to�manipulate�and�edit�due�to�availability�of�some�powerful�software�
like�Photoshop.� In� this�paper�a� reviewed�of,�different� tampering�or� forgery�applied�on� images�such�as�
enhancing,�composition�and�copy-move�and�some�of�the�techniques�which�are�useful�to�prevent�or��detect��
them�such�as�authentication� techniques�and�water�marking� is�presented.� In�authentication� technique�
copy-move�forgery�detection�technique�and�in�watermarking,�digital�watermarking,�fragile�watermarking,�
semi-fragile�watermarking�and�self-embedded�watermarking�is�presented
Keywords:�Multimedia�security,�Forensic�authentication,�Copy-move�forgery,�Digital�watermarking,�fragile�
watermarking,�Semi-fragile�watermarking,�self�embedded�watermarking.
I.� INTRODUCTION
Now� days� digital� images� are� easily� manipulate� and� edit���
using�some�powerful� tools�or�software� like�Photoshop[1].�
An�example�is�shown�in�figure�1.�In�first�part�of�figure,�two�
people� are� present� at� the� right� bottom� corner� shown� in�
yellow� region� and� it� has� been� removed�by� pasting� same�
region�from�the�image�shown�in�by�red�region.�In�this�paper�
we�have�discussed�how�this�kind�of�forgery�is�detected.
Another�example�of�tampering�was�given�by�Dr.�Tomaso�at�
Electronic�Imaging�in�Santa�Clara.�In�his�talk,�he�showed�how�
engineers�can�come�to�know�the�lip�movements�of�any�person�from�a�short�video�clip�and�then�digitally�
manipulate�the� lips� to�arbitrarily�alter� the�spoken�content.� In�example,�a�video�segment�showing�a�TV�
anchor�announcing�evening�news�was�altered�to�make�the�anchor�appear�singing�a�popular�song�instead,�
while�reserving�the�match�between�the�sound�and�lip�movement�[1].
We�have�discussed�three�major�parts�in�this�paper�is�kindly�listed�as�below
•�����Identify�image�tampering�methods.
•�����Assess�methods�available�for�protecting�images.
•�����Assess�image�authentication�techniques.�
Multimedia�Security�and�Authentication�for�Digital�Images
Figure1:�copy�move�forgery�in�image
Kavach:�The�Magazine�of�Raksha�Shakti�University
*Ravi�K.�Sheth
*Asst.�Professor�(IT),�Raksha�Shakti�University,�Ahmedabad
1
From�the�desk�of�
EditorIt�gives�me�immense�pleasure�to�share�with�you�the�publication�of�fourth�issue�of�Raksha�Shakti�University�Magazine�'Kavach'.�Based�on�reader's�feedback,�the�University�has�decided�to�publish�'Kavach'�on�regular�basis.�Hope�to�share�the�knowledge�and�circulate�among�our�reader�community�about�issues�related�to�Internal�Security�in�India.��
This�issue�contains�articles�by�the�internal�faculty�and�students�of�Raksha�Shakti�University�related�to�internal�security.�The�topics� �are�covered�are�Multimedia�Security,�Harassment�of�Women,� Road� Rage,� Biometric� Security� System,� Armed� Forces� Special� Power� Act,� E-Commerce�Threat,�Credit�Card�Frauds,�Neurocriminology,�Intra�Organizational�Conflicts�in�Gujarat� Police� and� Tele-Forensic� Technology.� A� special� article� on� Success� Story� of�Ahmedabad�City�Police� is�an�added�attraction�of�this� issue.� Important�news�published�in�various�newspapers�related�to�Internal�Security�is�also�compiled.�
I�feel�unfortunate�while�sharing�the�sad�demise�of�Jim�Hilborn,�a�Canadian�Criminologist,�who�introduced�Neurocriminology�to�Raksha�Shakti�University�by�his�Skype�lectures,�was�among�the� pioneers� in� shaping� the� practicing� knowledge� of� Neurocriminology� in� correctional�services.�On�behalf�of�the�Raksha�Shakti�University,�I�present�my�sincere�condolences�to�his�family,�friends�and�all�those�who�knew�him.
I� sincerely� hope� that� going� through� this� fourth� issue� of� "Kavach"� will� be� a� pleasurable�experience�for�you.�I�look�forward�to�your�comments�and�feedback.�I�also�welcome�you�all�to�contribute�by�sending�articles�(English,�Hindi�and�Gujarati)�which�can�be�printed�in�the�future�editions�of�"Kavach".
Dr.�S.�L.�VayaThe�Editor,�“Kavach”,
Director,�Research�&�Development,Raksha�Shakti�University
Kavach:�The�Magazine�of�Raksha�Shakti�University
Abstract:�Digital�Images�are�very�easy�to�manipulate�and�edit�due�to�availability�of�some�powerful�software�
like�Photoshop.� In� this�paper�a� reviewed�of,�different� tampering�or� forgery�applied�on� images�such�as�
enhancing,�composition�and�copy-move�and�some�of�the�techniques�which�are�useful�to�prevent�or��detect��
them�such�as�authentication� techniques�and�water�marking� is�presented.� In�authentication� technique�
copy-move�forgery�detection�technique�and�in�watermarking,�digital�watermarking,�fragile�watermarking,�
semi-fragile�watermarking�and�self-embedded�watermarking�is�presented
Keywords:�Multimedia�security,�Forensic�authentication,�Copy-move�forgery,�Digital�watermarking,�fragile�
watermarking,�Semi-fragile�watermarking,�self�embedded�watermarking.
I.� INTRODUCTION
Now� days� digital� images� are� easily� manipulate� and� edit���
using�some�powerful� tools�or�software� like�Photoshop[1].�
An�example�is�shown�in�figure�1.�In�first�part�of�figure,�two�
people� are� present� at� the� right� bottom� corner� shown� in�
yellow� region� and� it� has� been� removed�by� pasting� same�
region�from�the�image�shown�in�by�red�region.�In�this�paper�
we�have�discussed�how�this�kind�of�forgery�is�detected.
Another�example�of�tampering�was�given�by�Dr.�Tomaso�at�
Electronic�Imaging�in�Santa�Clara.�In�his�talk,�he�showed�how�
engineers�can�come�to�know�the�lip�movements�of�any�person�from�a�short�video�clip�and�then�digitally�
manipulate�the� lips� to�arbitrarily�alter� the�spoken�content.� In�example,�a�video�segment�showing�a�TV�
anchor�announcing�evening�news�was�altered�to�make�the�anchor�appear�singing�a�popular�song�instead,�
while�reserving�the�match�between�the�sound�and�lip�movement�[1].
We�have�discussed�three�major�parts�in�this�paper�is�kindly�listed�as�below
•�����Identify�image�tampering�methods.
•�����Assess�methods�available�for�protecting�images.
•�����Assess�image�authentication�techniques.�
Multimedia�Security�and�Authentication�for�Digital�Images
Figure1:�copy�move�forgery�in�image
Kavach:�The�Magazine�of�Raksha�Shakti�University
*Ravi�K.�Sheth
*Asst.�Professor�(IT),�Raksha�Shakti�University,�Ahmedabad
1
Kavach:�The�Magazine�of�Raksha�Shakti�University
There�are�three�main�categories�of�image�tampering:
•�����Enhancing•�����Composition
•�����Copy/Move
Enhancing�has�been�done�by�changing�the�color�of�image,�means�original�color�of�image�is�replaced�by�
another�color�as�shown�in�figure2(a),�it�has�been�done�by�changing�weather�condition�and�blurring�out�
object�also�as�shown�in�figure�2(b,�c).�Composition�has�been�done�by�combining�two�different�images�in�to�
one�single�image�.And�copy�‒move�images�means�a�part�of�image�is�pasted�on�to�the�same�image�for�hiding�
some�information�as�shown�in�figure�1.
What�can�be�done�to�protect�digital�images?
We�have�reviewed�some�of�the�techniques�which�has�been�used�to�detect�tampering�or�forgery.�Some�of�the�
techniques�are�listed�below.
Watermarking
•�����Digital�watermarking
•�����Fragile�and�Semi-fragile�watermarks
•�����Self-embedding�watermarks�Authentication�technique
•�����Detecting�copy�move
In� second� section� we� have� described� different� watermarking�
techniques�which�are�used�for�detecting�tampered� images�and�also�
recovered� it.� In� third� section� we� have� described� authentication�
technique�which�is�used�for�detecting�copy�move�forgery�in�images.�
And�finally�we�have�listed�an�efficient�conclusion�of�this�study.
II.� WATERMARKING
An� idea� behind� watermarking� is� information� is� embedded� in� to�
images�which�cannot�be�removed�or�altered�without�making�entire�
object�unusable�[2].�Basically�watermarking�technique�is�divided�in�to�
four�parts�such�as�digital�watermarking,�fragile�watermarking,�semi�
fragile�watermarking�and�self�embedded�watermarking. Figure�2(a):�color�changed,�(b):�weather�condition�changed,�
(c):�blurring�out�object.�
Kavach:�The�Magazine�of�Raksha�Shakti�University
�A.��Digital�watermarking
A�basic�concept�of�digital�water�marking�is�embedding�information�into�a�digital�signal�in�a�way�that�is�
difficult�to�remove.�For�example�if�signal�is�copied�from�one�place�to�another�place�the�information�is�also�
carried�copy�[2].This�signal�is�referred�as�watermark.�The�system�also�contains�a�key�which�should�be�either�
public�or�secrete.�The�key�is�generally�used�for�security�purpose�through�which�unauthorized�user�has�been��
prevented.�The�process�of�encoding�water�mark�in�image�is�shown�in�figure�3(a),�(b)�[2].
The�watermark�can�be�used�as�audio,� text�or� images.�For�sending�process� input�data�are� input� image,�
secrete�or�public�key�and�watermark.�At�the�receiver�side�watermarked�data�is�decoded�and�actual�water�
mark�is�received�by�receiver.
One�of�the�application�of�digital�watermarking�is�copyright�protection�system,�which�is�used�for�prevent�
unauthorized�copying�of�digital�media.�In�this�receiver�retrieves�digital�water�mark�before�creating�a�copy�
and�he�makes�decision�to�make�copy�or�not�by�observing�content�of�watermark�[3].
B.��Fragile�and�Semi-fragile�watermarking
Basically� there� are� two� types� of� authentication� exist� such� as� exact� authentication� and� selective�
authentication�[4].�Exact�authentication�accomplished�by�fragile�watermarking�and�selective
A� fragile� watermark� is� a� watermark� that� is� really� altered� or� destroyed�when� any� linear� or� non� linear�
modification�made.�Fragile�watermarking�is�generally�used�for�authentication�purpose.�Receiver�parties�
check�whether�any�tampering�is�done�with�image�or�not�with�the�movement�of�watermark.
Fragile�watermarking�systems�are�categorized�into�two�categories� �according� �to� �the� �working� �domain.��
First,fragile�watermarking�that�works�directly� in�the�spatial�domain.�Second,� fragile�watermarking�that�
works�in�a�transform�domain�[4].
Most�fragile�watermarking�systems�embed�the�mark�directly�through�the�spatial�domain�of�a�Work.�These�
techniques�embed�the�mark�in�the�least�significant�bit�(LSB)�plane�for�perceptual�transparency�[5].Fragile�
watermarks�are�designed�to�detect�every�possible�change�in�pixel�values.�Variety�of�Techniques�but�in�most�
Watermark W
Cover image C
Secrete/public key K
Encoder Watermarked image
Watermarked image CW
Secrete/public key K
Decoder Watermark w
Figure�3(a):�digital�watermarking�encoding Figure�3(b):�digital�watermarking�decoding
32
Kavach:�The�Magazine�of�Raksha�Shakti�University
There�are�three�main�categories�of�image�tampering:
•�����Enhancing•�����Composition
•�����Copy/Move
Enhancing�has�been�done�by�changing�the�color�of�image,�means�original�color�of�image�is�replaced�by�
another�color�as�shown�in�figure2(a),�it�has�been�done�by�changing�weather�condition�and�blurring�out�
object�also�as�shown�in�figure�2(b,�c).�Composition�has�been�done�by�combining�two�different�images�in�to�
one�single�image�.And�copy�‒move�images�means�a�part�of�image�is�pasted�on�to�the�same�image�for�hiding�
some�information�as�shown�in�figure�1.
What�can�be�done�to�protect�digital�images?
We�have�reviewed�some�of�the�techniques�which�has�been�used�to�detect�tampering�or�forgery.�Some�of�the�
techniques�are�listed�below.
Watermarking
•�����Digital�watermarking
•�����Fragile�and�Semi-fragile�watermarks
•�����Self-embedding�watermarks�Authentication�technique
•�����Detecting�copy�move
In� second� section� we� have� described� different� watermarking�
techniques�which�are�used�for�detecting�tampered� images�and�also�
recovered� it.� In� third� section� we� have� described� authentication�
technique�which�is�used�for�detecting�copy�move�forgery�in�images.�
And�finally�we�have�listed�an�efficient�conclusion�of�this�study.
II.� WATERMARKING
An� idea� behind� watermarking� is� information� is� embedded� in� to�
images�which�cannot�be�removed�or�altered�without�making�entire�
object�unusable�[2].�Basically�watermarking�technique�is�divided�in�to�
four�parts�such�as�digital�watermarking,�fragile�watermarking,�semi�
fragile�watermarking�and�self�embedded�watermarking. Figure�2(a):�color�changed,�(b):�weather�condition�changed,�
(c):�blurring�out�object.�
Kavach:�The�Magazine�of�Raksha�Shakti�University
�A.��Digital�watermarking
A�basic�concept�of�digital�water�marking�is�embedding�information�into�a�digital�signal�in�a�way�that�is�
difficult�to�remove.�For�example�if�signal�is�copied�from�one�place�to�another�place�the�information�is�also�
carried�copy�[2].This�signal�is�referred�as�watermark.�The�system�also�contains�a�key�which�should�be�either�
public�or�secrete.�The�key�is�generally�used�for�security�purpose�through�which�unauthorized�user�has�been��
prevented.�The�process�of�encoding�water�mark�in�image�is�shown�in�figure�3(a),�(b)�[2].
The�watermark�can�be�used�as�audio,� text�or� images.�For�sending�process� input�data�are� input� image,�
secrete�or�public�key�and�watermark.�At�the�receiver�side�watermarked�data�is�decoded�and�actual�water�
mark�is�received�by�receiver.
One�of�the�application�of�digital�watermarking�is�copyright�protection�system,�which�is�used�for�prevent�
unauthorized�copying�of�digital�media.�In�this�receiver�retrieves�digital�water�mark�before�creating�a�copy�
and�he�makes�decision�to�make�copy�or�not�by�observing�content�of�watermark�[3].
B.��Fragile�and�Semi-fragile�watermarking
Basically� there� are� two� types� of� authentication� exist� such� as� exact� authentication� and� selective�
authentication�[4].�Exact�authentication�accomplished�by�fragile�watermarking�and�selective
A� fragile� watermark� is� a� watermark� that� is� really� altered� or� destroyed�when� any� linear� or� non� linear�
modification�made.�Fragile�watermarking�is�generally�used�for�authentication�purpose.�Receiver�parties�
check�whether�any�tampering�is�done�with�image�or�not�with�the�movement�of�watermark.
Fragile�watermarking�systems�are�categorized�into�two�categories� �according� �to� �the� �working� �domain.��
First,fragile�watermarking�that�works�directly� in�the�spatial�domain.�Second,� fragile�watermarking�that�
works�in�a�transform�domain�[4].
Most�fragile�watermarking�systems�embed�the�mark�directly�through�the�spatial�domain�of�a�Work.�These�
techniques�embed�the�mark�in�the�least�significant�bit�(LSB)�plane�for�perceptual�transparency�[5].Fragile�
watermarks�are�designed�to�detect�every�possible�change�in�pixel�values.�Variety�of�Techniques�but�in�most�
Watermark W
Cover image C
Secrete/public key K
Encoder Watermarked image
Watermarked image CW
Secrete/public key K
Decoder Watermark w
Figure�3(a):�digital�watermarking�encoding Figure�3(b):�digital�watermarking�decoding
32
Kavach:�The�Magazine�of�Raksha�Shakti�University
cases,�the�watermark�is�embedded�in�the�least�significant�bit�(LSB)�of�the�image.
Semi-fragile�watermarking� scheme� for� image� authentication� is� presented,� which� focuses� the� issue� of�
protecting�images�from�illegal�manipulations�and�modifications.�The�scheme�extracts�a�watermark�from�
the�original�image�and�inserts�this�signature�back�into�the�image,�avoiding�additional�watermark.�The�error�
correction�coding�(ECC)�is�used�to�encode�the�signatures�that�are�extracted�from�the�image.�To�increase�the�
security�of� this� scheme,�user�private�key� is�employed� for�encryption�and�decryption�of� the�watermark�
during�watermark�extraction�and�insertion�procedures�[5].
C.��Self�embedded�watermarking
In� self� embedded� technique� as�watermarks� image� itself� is� used.� Self� embedding�watermarking� is� the�
technique�for�embedding�an�image�into�itself�for�protecting�its�content�from�tampering.�The�whole�image�
or�portions�of�it�may�be�recovered�after�they�have�been�cropped,�replaced�or�generally�tampered�[6].�In�this�
technique�tampering�is�detected�as�well�as�it�has�been�recovered�from�the�stored�watermark.
We�reviewed�an�algorithm�[7]�for�this�technique�as�described�follows:
The�initial�image�is�divided�into�blocks�of�8X8�pixels�that�are�quantized.�Two�least�significant�bits�of�an�
arbitrarily�block�is�selected�and�placed�most�coefficient�block�are�placed�in�it.�The�quantization�matrix�is�
properly�selected�so�that�the�resulting�bit�stream�to�be�exactly�128�bits�long.�The�algorithm�can�trace�if�some�
block�is�tampered�and�can�retrieve�its�original�content�from�the�coefficients�of�the�corresponding�distant�
block.�Additionally,�an�alternative�anti-tampering�method�is�presented�that�embeds�the�JPEG�compressed�
image�on� four� equal� discrete� areas� of� the� same� image.� The� coefficients� of� the� compressed� image� are�
embedded�in�the�last�two�significant�bits�of�these�areas.�If�some�area�is�tampered,�the�recovered�images�will�
have�different�qualities�but�at�least�two�of�them�will�have�the�same�quality.�Thus,�the�initial�image�can�be�
recovered�by�an�inverse�procedure�selecting�the�coefficients�from�the�areas�that�left�intact.
Characteristics�of�self�embedded�technique�listed�below.
•�����A�tampered�image�contains�lost�information.�The�previous�techniques�will�only�detect�and�localize�areas�
of�interest�when�authentication�is�carried�out.�Self-embedding�has�been�allowed�tamper�detection�and�
recovery�of�missing�information.
•����General�concept�is�that�the�image�is�embedded�in�itself�in�an�original�or�encrypted�form.�From�encryption�
purpose�key�is�required.
Kavach:�The�Magazine�of�Raksha�Shakti�University
III.� AUTHENTICATION�TECHNIQUE
Copy-move�tampering�or�forgery�is�a�special�type�of�attack�where�a�part�of�the�image�is�copied�and�pasted�
on�another�part�of�same�image�to�hide�unwanted�portions�of�the�image.�Hence�it�is�necessary�to�detect�this�
kind�of�forgery�[8].�A�copy�move�detection�technique�illustrated�how�the�forgery�is�detected�while�this�kind�
of�attack�has�been�occurred.
A.��Copy�move�detection�technique
A�copy�move�attach�is�a�very�special�type�of�attack�in�which�one�part�of�image�is�copied�and�pasted�on�to�the�
part�of�same�image�for�hiding�some�data.�We�have�reviewed�one�of�the�copy�move�detection�technique�and�
described�it�[9].�Algorithm�includes�following�steps�Step1:�Divide�image�in�to�four�parts.Step�2:�Find�out�the�phase�correlation�between�all�the�images.Step�3:�Using�phase�correlation�find�out�the�offset.Step�4:�Modify�image�with�the�use�of�offset�coordinators.Step�5:�Take�the�difference�between�original�image�and�modified�image.Step�6:�Apply�morphological�operation�for�better�result.
We�have�implemented�this�algorithm�in�Matlab�and�applied�it�on�figure�4.�We�have�copied�some�portion�of�
image�and�pasted�on�to�the�same�image.�Copied�region�is�shown�in�figure�by�red�color�and�pasted�region�is�
shown�by�yellow�color.�After�that�according�to�step�1,�we�have�divided�this�image�in�to�four�parts�as�shown�in�
figure�5.�In�this�case�we�have�directly�found�phase�correlation�between�figure�5(b),�and�(c).�Next�we�have�
modified�image�based�on�offset�coordinator�as�shown�in�figure�5(e).�And�at�last�applied�step�5�and�copy�
move�region�isdetected�as�shown�in�figure�5(f).�Copy�move�region�is�shown�by�blue�region
Figure�4:�Copy�move�image
(a) (b) (c)
(d) (e) (f)
54
Kavach:�The�Magazine�of�Raksha�Shakti�University
cases,�the�watermark�is�embedded�in�the�least�significant�bit�(LSB)�of�the�image.
Semi-fragile�watermarking� scheme� for� image� authentication� is� presented,� which� focuses� the� issue� of�
protecting�images�from�illegal�manipulations�and�modifications.�The�scheme�extracts�a�watermark�from�
the�original�image�and�inserts�this�signature�back�into�the�image,�avoiding�additional�watermark.�The�error�
correction�coding�(ECC)�is�used�to�encode�the�signatures�that�are�extracted�from�the�image.�To�increase�the�
security�of� this� scheme,�user�private�key� is�employed� for�encryption�and�decryption�of� the�watermark�
during�watermark�extraction�and�insertion�procedures�[5].
C.��Self�embedded�watermarking
In� self� embedded� technique� as�watermarks� image� itself� is� used.� Self� embedding�watermarking� is� the�
technique�for�embedding�an�image�into�itself�for�protecting�its�content�from�tampering.�The�whole�image�
or�portions�of�it�may�be�recovered�after�they�have�been�cropped,�replaced�or�generally�tampered�[6].�In�this�
technique�tampering�is�detected�as�well�as�it�has�been�recovered�from�the�stored�watermark.
We�reviewed�an�algorithm�[7]�for�this�technique�as�described�follows:
The�initial�image�is�divided�into�blocks�of�8X8�pixels�that�are�quantized.�Two�least�significant�bits�of�an�
arbitrarily�block�is�selected�and�placed�most�coefficient�block�are�placed�in�it.�The�quantization�matrix�is�
properly�selected�so�that�the�resulting�bit�stream�to�be�exactly�128�bits�long.�The�algorithm�can�trace�if�some�
block�is�tampered�and�can�retrieve�its�original�content�from�the�coefficients�of�the�corresponding�distant�
block.�Additionally,�an�alternative�anti-tampering�method�is�presented�that�embeds�the�JPEG�compressed�
image�on� four� equal� discrete� areas� of� the� same� image.� The� coefficients� of� the� compressed� image� are�
embedded�in�the�last�two�significant�bits�of�these�areas.�If�some�area�is�tampered,�the�recovered�images�will�
have�different�qualities�but�at�least�two�of�them�will�have�the�same�quality.�Thus,�the�initial�image�can�be�
recovered�by�an�inverse�procedure�selecting�the�coefficients�from�the�areas�that�left�intact.
Characteristics�of�self�embedded�technique�listed�below.
•�����A�tampered�image�contains�lost�information.�The�previous�techniques�will�only�detect�and�localize�areas�
of�interest�when�authentication�is�carried�out.�Self-embedding�has�been�allowed�tamper�detection�and�
recovery�of�missing�information.
•����General�concept�is�that�the�image�is�embedded�in�itself�in�an�original�or�encrypted�form.�From�encryption�
purpose�key�is�required.
Kavach:�The�Magazine�of�Raksha�Shakti�University
III.� AUTHENTICATION�TECHNIQUE
Copy-move�tampering�or�forgery�is�a�special�type�of�attack�where�a�part�of�the�image�is�copied�and�pasted�
on�another�part�of�same�image�to�hide�unwanted�portions�of�the�image.�Hence�it�is�necessary�to�detect�this�
kind�of�forgery�[8].�A�copy�move�detection�technique�illustrated�how�the�forgery�is�detected�while�this�kind�
of�attack�has�been�occurred.
A.��Copy�move�detection�technique
A�copy�move�attach�is�a�very�special�type�of�attack�in�which�one�part�of�image�is�copied�and�pasted�on�to�the�
part�of�same�image�for�hiding�some�data.�We�have�reviewed�one�of�the�copy�move�detection�technique�and�
described�it�[9].�Algorithm�includes�following�steps�Step1:�Divide�image�in�to�four�parts.Step�2:�Find�out�the�phase�correlation�between�all�the�images.Step�3:�Using�phase�correlation�find�out�the�offset.Step�4:�Modify�image�with�the�use�of�offset�coordinators.Step�5:�Take�the�difference�between�original�image�and�modified�image.Step�6:�Apply�morphological�operation�for�better�result.
We�have�implemented�this�algorithm�in�Matlab�and�applied�it�on�figure�4.�We�have�copied�some�portion�of�
image�and�pasted�on�to�the�same�image.�Copied�region�is�shown�in�figure�by�red�color�and�pasted�region�is�
shown�by�yellow�color.�After�that�according�to�step�1,�we�have�divided�this�image�in�to�four�parts�as�shown�in�
figure�5.�In�this�case�we�have�directly�found�phase�correlation�between�figure�5(b),�and�(c).�Next�we�have�
modified�image�based�on�offset�coordinator�as�shown�in�figure�5(e).�And�at�last�applied�step�5�and�copy�
move�region�isdetected�as�shown�in�figure�5(f).�Copy�move�region�is�shown�by�blue�region
Figure�4:�Copy�move�image
(a) (b) (c)
(d) (e) (f)
54
Kavach:�The�Magazine�of�Raksha�Shakti�University
IV.� CONCLUSION
Watermarking�techniques�are�very�useful�for�secure�transmission�of�an�image�from�one�place�to�another�
place�we�can�add�secrete�or�public�key� for� increase�security.�Fragile�watermarking�detect� if�any�single�
modification�is�done�with�your�image�but�in�case
of�semi�fragile�it�is�focused�on�only�selected��pat��of�image�means�if�modification�is�done�in�selective�part�of�
image�then�and�then�only�it�will�detect.�Self�embedded�water�marking�detect�as�well�as�regenerate�original�
image�if�any�tampering�is�made.�In�copy�move�detection�technique�a�major�drawback�is�if�pasted�image�is�
rotated�compare�to�copied�image�then�we�cannot�directly�applied�this�algorithm;�we�have�to�apply�some�
image�processing�operation�on�it.
REFERENCES[1]�� Rotation,�Scale�and�Translation�Invariant�Digital�Image�Watermarking,�J.J.K.�O'Ruanaidh�and�T.�Pun,�Proceedings�
of�the�ICIP,�VOl.�1,�pp�536-539,�Santa�Barbara,�California,�Oct�1997.[2]�� Navneet�Kumar�Mandhani,�A�Thesis�”�WATERMARKING�USING�DECIMAL�SEQUENCES”,�Louisiana�State�University�
and�Agricultural�and�Mechanical�College.[3]�� R.�J.�Rummel,�“Understanding�Correlation”�Honolulu:�Department�of�Political�Science�University�of�Hawaii,�1976.� URL:�http://www.mega.nu/ampp/rummel/uc.htm[4]�� H.P.�Solomon,�“Integration�of�haemodynamic�and�electrocardiographic�waveform�data�with�DICOM�images,”�Int�J�
Card�Imaging,�vol.�14(5),�1998,�pp.�301-3066.[5]�� F.�Hartung�and�M.�Kutter,�“Multimedia�watermarking�techniques,”��IEEE��Proceeding,��vol.��87,��no.��7,��July��1999,� pp.1079�‒1107.[6]�� G.�Voyatzis,�I.�Pitas,�“Applications�of�Toral�Automorphism�in�Image�Watermarking,”�ICIP,�Vol�II,�1996,�pp.237-240,�
1996.�“Handwriting�Recognition�Systems”,[7]�� Alin� C.� Popescu� and� Hany� Farid,� Exposing� Digital� Forgeries� in� Color� Filter� Array� Interpolated� Images,� IEEE�
Transactions�on�Signal�Processing,�Vol.�53,�Issue�10,�Part�2,�October�2005,�pp�3948-3959[8]�� M.Wu�A.�Swaminathan�and�K.�J.�Ray�Liu,�“Image�tamperingidentification�using�blind�deconvolution,”�Proc.�IEEE�
ICIP,�2006.[9]�� T.�Ng,�S.F.Chang,�Q.�Sun,�“Blind�detection�of�Photomontage�Using�Higher�Order�Statistics,”�IEEE�International�
Symposium�on�Circuits�and�Systems,�Vancouver,�Canada,�May�2004.
«MíkkðLkk
fk{Lkkt MÚk¤u †eykuLke òíkeÞ Mkíkk{ýe Mk{økú rðïV÷f Ãkh ð»kkuoÚke Mk¤økíke Mk{MÞk çkLke økR Au. Mk{ks ykðk çkLkkðkuLku Zktfe hk¾ðk {kxu
Mkíkík «ÞíLkþe÷ hÌkku Au. ÷øk¼øk çkÄu s ykðe fLkzøkík ÃkwÁ»kkuÚke fhkÞ Au yLku {rn÷kyku ðzu íku ðuXe ÷uðkÞ Au. {uLkus{uLx íku «íÞu
ykt¾r{[k{ýk fhu Au yLku fkuR íkuLkku rðhkuÄ WXkððk ykøk¤ ykðíkw LkÚke. òu †eLkkufh, ðþ Lk ÚkkÞ íkku íkuLku Lkkufhe{ktÚke Ëqh fhðkLke Ä{fe Ãký
ykÃku Au. MkuõMkwy÷ nuhuMk{uLx Võík yuÂõÍõÞwxeð ykurVMkku{kt s Lknª, Ãkhtíkw Mkwfk ¾uíkhku{kt, rþûkýÄk{Úke ÷RLku {LkkuhtsLkLkkt MÚk¤ku MkwÄe yLku
çkÄk s ûkuºkku, ÄtÄk, Wãkuøkku, íkÚkk ðuÃkkh yLku WíÃkkËLkLkkt MÚk¤kuyu Ãký Ëu¾k Ëu Au. Wå[ rþûký Ãkk{u÷e, rLkhûkh, ykurVMk f{o[khe, {nuLkíkfþ,
ÔÞðMkkrÞf yLku ½hfk{ fhLkkhe yuðe Ëhuf {rn÷k òríkÞ Mkíkk{ýeLkku ¼kuøk çkLku Au. rðãkÚkeoLkeyku Ãký çkkfkík LkÚke. yk{ nkuðk AíkktÞ
{rn÷kyku íku [qÃk[kÃk ðuXe ÷u Au fu Lkkufhe yÇÞkMk Akuze Ëu Au. ð¤e, ßÞkhu íkuLke Mkk{u yðks WXkðkÞku Au íÞkhu íkuLkku øk÷r÷Þk fhkðu íkuðk
y¾çkkhe ðýoLkku {kxu WÃkÞkuøk fhkÞku Au fkhý fu y¾çkkh {kxu Ãký Ëw»f{oLkku rð»kÞ ©uc økýkÞ.
òíkeÞ Mkíkk{ýeLke Mk{MÞk Võík ¼khíkLke s LkÚke Mk{økú rðïLke yk Mk{MÞk Au. “Ä LÞqÞkufo rhÔÞw ykuV çkwõMk” Lkkt 05-02-2015Lkku {wsçk
íÞktLke fku÷tçkeÞk ÞwrLkðŠMkxeLke nkRMfw÷{kt ¼ýíke Ëefheykuyu Mkh½Mk fkZâwt yLku nkRMfw÷Lkkt rþûkfku yLku xeLkush-rðãkÚkeoyku Mfq÷Lke
AkufheykuLku huÃk fhu Au íkuLkku rðhkuÄ fÞkuo níkku.
økuxMxkuLk RÂLMxxTâqx Lkk{Lke LkkrhðkËe MktMÚkkyu ÷ÏÞw Au fu ÷tzLk{kt yuf hurzÞku MxuþLk{kt {uz{ «kuøkúk{ {kMíkh yu yuf rçkLk yurþÞLkLku rðLktíke
fhe níke fu íkuLke [kiË ð»koLke rËfheLku íkuLke ËkËe ËkËkLkkt ½hu {qfe ykðu yLku Mkq[Lkk fhe níke fu ÷tzLk{kt xuõMkeyku{kt [k÷eMk xfk {rn÷k zÙkRðhku
Au íku {rn÷k zÙkRðhðk¤e xuõMke ¼kzu hk¾u. ÷tzLkLkkt økkuhk xuõMkeðk¤k íkku Mfq÷Lke xeLkush 11-12-17 ð»koLke AkufheykuLku s Ãkfzu Au. ÷tzLk{kt
y{wf økUøkku ykrMkMxLx økwtzk hk¾u Au su LkkLke AkufheLku «Úk{ Ãkkuíku huÃk fhu ÃkAe íkuLku VkuMk÷kðeLku økwtzk ÃkkMku ÷R òÞ. ÷tzLk{kt Ëh ð»kuo 1125 huÃk
ÚkkÞ Au. Ãkhtíkw çkeçkeMke «{kýu ¾hu¾hku yktfzku 12000 WÃkh Au. yhu {kL[uMxhLkk økkuhk xuõMkeðk¤k íkku Mfq÷Lkk YÃkk¤k [kufhk fu YÃkk¤k
ðÞMf ÃkuMkuLshLku Ãký Akuzíkk LkÚke.
søkík¼h{kt Úkíkk huÃk rð»ku íkkswt Mkðuoûký {éÞw Au (1) LÞqÞkufo xkRBMk fnu Au fu, ÞwrLkðŠMkxe nuX¤Lke r{© Mfq÷kuLke xeLkush AkufheykuLku huÃk
fhkÞ Au... yhu xuõMkkMk hkßÞLkkt ÌkwMxLk þnuhLkk Ãkku÷eMk ykurVMkhkuyu 6600 sux÷k çk¤kífkhkuLku nuLz÷ fhíke VkR÷ íkiÞkh fhe Au. yu
çkÄkLkk zeyuLkyu ðøkuhu íkÃkkMkðk{kt ºký-ºký ËkÞfk ÷køÞk Au. huÃk ¼khíkLkku Lknª Ãkrù{Lkku ðÄw hkuøk[k¤ku Au. (2) LÞwÞkufo heÔÞw ykuV çkwõMkLkkt
(5-2-2015) fnuðk «{kýu, Yxøkh ÞwrLkðŠMkxeLke ykurVMk{kt ðkÞku÷tLMk r«ðuLþLk ykMkeMxLx Lkk{Lke ykurVMk hk¾ðe Ãkze Au. yux÷k {kxu
fu, yuB{k MkwÕfkuðeÍ Lkk{Lke MkeLkeÞh nkRMfq÷ - rðãkÚkeoLkeyu VrhÞkË fhe fu íkuLke MkkÚku ¼ýíkk íkuLkk fnuðkíkk r{ºku s íkuLku huÃk fhe níke. (3)
y{urhfkLke nkRMfq÷kuLke rðãkÚkeoLkeyu fku÷us{kt ykðu íÞkhu s fçkw÷ fhu Au fu, íku{ktLke 20 xfkLku íkku fku÷us{kt ykðe íÞkt MkwÄe{kt Mfq÷Lkkt
Akufhkyu huÃk fhu÷e Au. yk{ktÚke y{urhfLkku Aíkkt {kºk 5 xfk s Ãkku÷eMk{kt VrhÞkË fhu Au. yksu y{urhfkLkk rzÃkkxo{uLx ykuV yußÞwfuþLk
y{urhfkLke 84 nkRMfq÷ku{kt xeLkush rðãkŠÚkykuLku huÃk fhkR íkuLke VrhÞkËLke íkÃkkMk fhu Au. (4) LkkuðuoLkk ykuM÷ku ËuþLkk økkuhk {uÞhu ÃkkuíkkLkwt
LkkuðuoLkwt íkqík [÷kÔÞwt Au fu, LkkuðuoLkk ykuM÷ku þnuh{kt íkku 43 ð»koLke †eLku Ãký huÃk fhkR níke yLku yu çk¤kífkh yuf {wÂM÷{u fÞkuo níkku. LÞwÞkufou
†eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk
Kavach:�The�Magazine�of�Raksha�Shakti�University
*Dr.�Dimpal�T.�Raval
*Asst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad
76
Kavach:�The�Magazine�of�Raksha�Shakti�University
IV.� CONCLUSION
Watermarking�techniques�are�very�useful�for�secure�transmission�of�an�image�from�one�place�to�another�
place�we�can�add�secrete�or�public�key� for� increase�security.�Fragile�watermarking�detect� if�any�single�
modification�is�done�with�your�image�but�in�case
of�semi�fragile�it�is�focused�on�only�selected��pat��of�image�means�if�modification�is�done�in�selective�part�of�
image�then�and�then�only�it�will�detect.�Self�embedded�water�marking�detect�as�well�as�regenerate�original�
image�if�any�tampering�is�made.�In�copy�move�detection�technique�a�major�drawback�is�if�pasted�image�is�
rotated�compare�to�copied�image�then�we�cannot�directly�applied�this�algorithm;�we�have�to�apply�some�
image�processing�operation�on�it.
REFERENCES[1]�� Rotation,�Scale�and�Translation�Invariant�Digital�Image�Watermarking,�J.J.K.�O'Ruanaidh�and�T.�Pun,�Proceedings�
of�the�ICIP,�VOl.�1,�pp�536-539,�Santa�Barbara,�California,�Oct�1997.[2]�� Navneet�Kumar�Mandhani,�A�Thesis�”�WATERMARKING�USING�DECIMAL�SEQUENCES”,�Louisiana�State�University�
and�Agricultural�and�Mechanical�College.[3]�� R.�J.�Rummel,�“Understanding�Correlation”�Honolulu:�Department�of�Political�Science�University�of�Hawaii,�1976.� URL:�http://www.mega.nu/ampp/rummel/uc.htm[4]�� H.P.�Solomon,�“Integration�of�haemodynamic�and�electrocardiographic�waveform�data�with�DICOM�images,”�Int�J�
Card�Imaging,�vol.�14(5),�1998,�pp.�301-3066.[5]�� F.�Hartung�and�M.�Kutter,�“Multimedia�watermarking�techniques,”��IEEE��Proceeding,��vol.��87,��no.��7,��July��1999,� pp.1079�‒1107.[6]�� G.�Voyatzis,�I.�Pitas,�“Applications�of�Toral�Automorphism�in�Image�Watermarking,”�ICIP,�Vol�II,�1996,�pp.237-240,�
1996.�“Handwriting�Recognition�Systems”,[7]�� Alin� C.� Popescu� and� Hany� Farid,� Exposing� Digital� Forgeries� in� Color� Filter� Array� Interpolated� Images,� IEEE�
Transactions�on�Signal�Processing,�Vol.�53,�Issue�10,�Part�2,�October�2005,�pp�3948-3959[8]�� M.Wu�A.�Swaminathan�and�K.�J.�Ray�Liu,�“Image�tamperingidentification�using�blind�deconvolution,”�Proc.�IEEE�
ICIP,�2006.[9]�� T.�Ng,�S.F.Chang,�Q.�Sun,�“Blind�detection�of�Photomontage�Using�Higher�Order�Statistics,”�IEEE�International�
Symposium�on�Circuits�and�Systems,�Vancouver,�Canada,�May�2004.
«MíkkðLkk
fk{Lkkt MÚk¤u †eykuLke òíkeÞ Mkíkk{ýe Mk{økú rðïV÷f Ãkh ð»kkuoÚke Mk¤økíke Mk{MÞk çkLke økR Au. Mk{ks ykðk çkLkkðkuLku Zktfe hk¾ðk {kxu
Mkíkík «ÞíLkþe÷ hÌkku Au. ÷øk¼øk çkÄu s ykðe fLkzøkík ÃkwÁ»kkuÚke fhkÞ Au yLku {rn÷kyku ðzu íku ðuXe ÷uðkÞ Au. {uLkus{uLx íku «íÞu
ykt¾r{[k{ýk fhu Au yLku fkuR íkuLkku rðhkuÄ WXkððk ykøk¤ ykðíkw LkÚke. òu †eLkkufh, ðþ Lk ÚkkÞ íkku íkuLku Lkkufhe{ktÚke Ëqh fhðkLke Ä{fe Ãký
ykÃku Au. MkuõMkwy÷ nuhuMk{uLx Võík yuÂõÍõÞwxeð ykurVMkku{kt s Lknª, Ãkhtíkw Mkwfk ¾uíkhku{kt, rþûkýÄk{Úke ÷RLku {LkkuhtsLkLkkt MÚk¤ku MkwÄe yLku
çkÄk s ûkuºkku, ÄtÄk, Wãkuøkku, íkÚkk ðuÃkkh yLku WíÃkkËLkLkkt MÚk¤kuyu Ãký Ëu¾k Ëu Au. Wå[ rþûký Ãkk{u÷e, rLkhûkh, ykurVMk f{o[khe, {nuLkíkfþ,
ÔÞðMkkrÞf yLku ½hfk{ fhLkkhe yuðe Ëhuf {rn÷k òríkÞ Mkíkk{ýeLkku ¼kuøk çkLku Au. rðãkÚkeoLkeyku Ãký çkkfkík LkÚke. yk{ nkuðk AíkktÞ
{rn÷kyku íku [qÃk[kÃk ðuXe ÷u Au fu Lkkufhe yÇÞkMk Akuze Ëu Au. ð¤e, ßÞkhu íkuLke Mkk{u yðks WXkðkÞku Au íÞkhu íkuLkku øk÷r÷Þk fhkðu íkuðk
y¾çkkhe ðýoLkku {kxu WÃkÞkuøk fhkÞku Au fkhý fu y¾çkkh {kxu Ãký Ëw»f{oLkku rð»kÞ ©uc økýkÞ.
òíkeÞ Mkíkk{ýeLke Mk{MÞk Võík ¼khíkLke s LkÚke Mk{økú rðïLke yk Mk{MÞk Au. “Ä LÞqÞkufo rhÔÞw ykuV çkwõMk” Lkkt 05-02-2015Lkku {wsçk
íÞktLke fku÷tçkeÞk ÞwrLkðŠMkxeLke nkRMfw÷{kt ¼ýíke Ëefheykuyu Mkh½Mk fkZâwt yLku nkRMfw÷Lkkt rþûkfku yLku xeLkush-rðãkÚkeoyku Mfq÷Lke
AkufheykuLku huÃk fhu Au íkuLkku rðhkuÄ fÞkuo níkku.
økuxMxkuLk RÂLMxxTâqx Lkk{Lke LkkrhðkËe MktMÚkkyu ÷ÏÞw Au fu ÷tzLk{kt yuf hurzÞku MxuþLk{kt {uz{ «kuøkúk{ {kMíkh yu yuf rçkLk yurþÞLkLku rðLktíke
fhe níke fu íkuLke [kiË ð»koLke rËfheLku íkuLke ËkËe ËkËkLkkt ½hu {qfe ykðu yLku Mkq[Lkk fhe níke fu ÷tzLk{kt xuõMkeyku{kt [k÷eMk xfk {rn÷k zÙkRðhku
Au íku {rn÷k zÙkRðhðk¤e xuõMke ¼kzu hk¾u. ÷tzLkLkkt økkuhk xuõMkeðk¤k íkku Mfq÷Lke xeLkush 11-12-17 ð»koLke AkufheykuLku s Ãkfzu Au. ÷tzLk{kt
y{wf økUøkku ykrMkMxLx økwtzk hk¾u Au su LkkLke AkufheLku «Úk{ Ãkkuíku huÃk fhu ÃkAe íkuLku VkuMk÷kðeLku økwtzk ÃkkMku ÷R òÞ. ÷tzLk{kt Ëh ð»kuo 1125 huÃk
ÚkkÞ Au. Ãkhtíkw çkeçkeMke «{kýu ¾hu¾hku yktfzku 12000 WÃkh Au. yhu {kL[uMxhLkk økkuhk xuõMkeðk¤k íkku Mfq÷Lkk YÃkk¤k [kufhk fu YÃkk¤k
ðÞMf ÃkuMkuLshLku Ãký Akuzíkk LkÚke.
søkík¼h{kt Úkíkk huÃk rð»ku íkkswt Mkðuoûký {éÞw Au (1) LÞqÞkufo xkRBMk fnu Au fu, ÞwrLkðŠMkxe nuX¤Lke r{© Mfq÷kuLke xeLkush AkufheykuLku huÃk
fhkÞ Au... yhu xuõMkkMk hkßÞLkkt ÌkwMxLk þnuhLkk Ãkku÷eMk ykurVMkhkuyu 6600 sux÷k çk¤kífkhkuLku nuLz÷ fhíke VkR÷ íkiÞkh fhe Au. yu
çkÄkLkk zeyuLkyu ðøkuhu íkÃkkMkðk{kt ºký-ºký ËkÞfk ÷køÞk Au. huÃk ¼khíkLkku Lknª Ãkrù{Lkku ðÄw hkuøk[k¤ku Au. (2) LÞwÞkufo heÔÞw ykuV çkwõMkLkkt
(5-2-2015) fnuðk «{kýu, Yxøkh ÞwrLkðŠMkxeLke ykurVMk{kt ðkÞku÷tLMk r«ðuLþLk ykMkeMxLx Lkk{Lke ykurVMk hk¾ðe Ãkze Au. yux÷k {kxu
fu, yuB{k MkwÕfkuðeÍ Lkk{Lke MkeLkeÞh nkRMfq÷ - rðãkÚkeoLkeyu VrhÞkË fhe fu íkuLke MkkÚku ¼ýíkk íkuLkk fnuðkíkk r{ºku s íkuLku huÃk fhe níke. (3)
y{urhfkLke nkRMfq÷kuLke rðãkÚkeoLkeyu fku÷us{kt ykðu íÞkhu s fçkw÷ fhu Au fu, íku{ktLke 20 xfkLku íkku fku÷us{kt ykðe íÞkt MkwÄe{kt Mfq÷Lkkt
Akufhkyu huÃk fhu÷e Au. yk{ktÚke y{urhfLkku Aíkkt {kºk 5 xfk s Ãkku÷eMk{kt VrhÞkË fhu Au. yksu y{urhfkLkk rzÃkkxo{uLx ykuV yußÞwfuþLk
y{urhfkLke 84 nkRMfq÷ku{kt xeLkush rðãkŠÚkykuLku huÃk fhkR íkuLke VrhÞkËLke íkÃkkMk fhu Au. (4) LkkuðuoLkk ykuM÷ku ËuþLkk økkuhk {uÞhu ÃkkuíkkLkwt
LkkuðuoLkwt íkqík [÷kÔÞwt Au fu, LkkuðuoLkk ykuM÷ku þnuh{kt íkku 43 ð»koLke †eLku Ãký huÃk fhkR níke yLku yu çk¤kífkh yuf {wÂM÷{u fÞkuo níkku. LÞwÞkufou
†eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk
Kavach:�The�Magazine�of�Raksha�Shakti�University
*Dr.�Dimpal�T.�Raval
*Asst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad
76
Kavach:�The�Magazine�of�Raksha�Shakti�University
xkRBMku 24-10-2011Lkk ytf{kt [kuϾw ÷ÏÞwt Au fu, Lkkuðuo{kt †e-ÃkwÁ»k Mk{kLkíkkLkk çkýøkk VqtfkÞ Au, Ãký Lkkuðuo{kt ÃkíLkeyku MkuõMk Lk RåAíke
nkuÞ íkku íkuLku huÃk fhkÞ Au. íkuLkwt fkhý Au 90 xfk LkkuðuoSÞLk ÃkwÁ»kku ½hu çkk¤fkuLku Mkk[ðu Au yLku hMkkuR Ãký fhu Au. Ãký íku{kt nuhkMk{uLx LkÚke.
yk{ MkuõMkwy÷ nuhMk{uLxLkku rð»kÞ yktíkhhkr»xÙÞ çkLÞku Au. “Ä LkuþLk” Lkk{Lkwt y{urhfLk {uøkurÍLk fnu Au fu, søkík{kt Ëhuf 1 r{rLkxu yuf huÃk
ÚkkÞ Au.
f{o[khe fu yuf ÔÞÂõík íkhefu †eLke ¼qr{fkLkwt yð{wÕÞLk ÚkkÞ Au. yuf çkksw fkÞËku †eykuLku yrÄfkhku ykÃku Au, ßÞkhu çkeS çkksw †e þku»kýLkkt
økwLkkyku yrðhík ðÄu s òÞ Au. Mkk{kLÞ heíku ßÞkhu †eykuLkkt þku»kýLke fu íku{Lke WÃkh ÚkR hnu÷k yíÞk[khkuLke ðkík fhðk{kt ykðu Au íÞkhu {kuxu
¼køku íku{kt þkrhhef fu {kLkrMkf ºkkMkLke ðkíkku s [[koÞ Au. ¾qçk ykuAk ÷kufku †eykuLku ðuXðk Ãkzíkk ºkeò «fkhLkkt ºkkMk rðþu [[ko fhíkkt nkuÞ Au.
yk ºkkMkLku òíkeÞ ºkkMk fu òíkeÞ Mkíkk{ýe fne þfkÞ. Mkíkk{ýe yuf Mðk¼krðf çkkçkík Au yu{ {kLkðk{kt ykðu Au. yksu †e ½hLke [kh
rËðk÷ku{kt ÃkwhkRLku hnuíke LkÚke, hnuðw þõÞ Ãký LkÚke. SðLkrLkðkon, fwxwtçkLkwt økwshkLk, rþûký {u¤ððk fu ÃkkuíkkLke fkhrfíkeo {kxu fu fkuR Ãký fkhýu
çknkh Lkef¤ðwt s yrLkðkÞo çkLÞw Au. òíkeÞ Mkíkk{ýe †eykuLke Mkk{krsf økrík þe÷íkk Ãkh MkeÄku «nkh fhu Au.
òríkÞ Mkíkk{ýeLkku ¼kuøk ÚkLkkh †e {kxu Lkkufhe Akuze ËuðkLkku rðfÕÃk çkkfe hnu Au. yuf MktþkuÄLk {wsçk ¼kuøk çkLku÷ 40 xfkÚke WÃkh †eykuyu
hkSLkk{ww ykÃku÷ Au. 30 xfk fhíkk ðÄw rðãkÚkeoLkeyku yÇÞkMk Akuze Ëu Au.
òíkeÞ Mkíkk{ýeLkkt rfMMkkyku ðÄðkLkwt fkhý:
ª yrLkðkÞo Mktòuøkku íkhefu Mðefkhu÷ {wÏÞ fkhý Au fu †e îkhk «ríkhkuÄ fhkíkku LkÚke, †e ½hhϾw, {eík¼k»ke, Lk{ú, yk¿kkfkhe yLku ykrÄLk
hnuðe òuRyu yLku {wtøkk {kuZu Mkne ÷uíke òuðk {¤u Au, suLkk ÷eÄu ÃkwÁ»k Lkezh çkLku Au yLku yk Mkíkk{ýe ðkhtðkh fhíkku òuðk {¤u Au.
ª çkesw fkhý yu Au fu ÃkÁ»kLkwt òríkÞ Mkíkk{ýe {kxu y÷øk {kÃkËtz. yuf s ÃkwÁ»k yuf s yk[hý ÃkkuíkkLke çkuLk fu ÃkíLke {kxu y¼ÿ, yr&÷÷
økýþu yLku yu s yk[hý ÃkkuíkkLke yrÄLkMÚk fu Mknf{o[khe †eykuLke çkkçkík{kt MkkÄkhý {ò fu rðLkkuË fu ÃkAe ykÄwrLkfíkk Lkkt YÃk{kt ÷R
÷u Au.
þwt òríkÞ Mkíkk{ýe yu {kºk Mkk{krsf Mk{MÞk Au fu çkeswt fktR Ãký ?
Mk{ksþkMkúe yuLku {kºk Mkk{krsf Mk{MÞk {kLku Au ßÞkhu {Lkkuði¿kkrLkf íkuLku ÔÞÂõíkLkkt {LkkurðfkhLkwt Ãkrhýk{ {kLku Au. xqtf{kt òríkÞ Mkíkk{ýe
Mkk{krsf Mk{MÞk Ãký Au. yLku MkkÚkuMkkÚku {Lkkuði¿kkrLkf Mk{MÞk Ãký Au. òu yk Mk{MÞkLku Ëirnf {LkkuMkk{krsf Mk{MÞk fneþwt íkku ÞkuøÞ økýkþu.
30 Ëuþku{kt òíkeÞ Mkíkk{ýe ytøkuLkk fkÞËk Au. ¼khík Ëuþ{kt MkuõMkwy÷ nuhuMk{uLx rçk÷, 2004{kt ÃkMkkh ÚkÞw suLke f÷{ 2(0) {kt òíkeÞ
Mkíkk{ýeLke ÔÞkÏÞk ykÃku÷e Au. yLku yk ytøku Mkwr«{fkuxoLkku Mke{kr[ö [wfkËku rðþk¾k rð Mxux ykuV hksMÚkkLkLkkt fuMk{kt Mkwr«{ fkuxou íkuLke
ÔÞkÏÞk fhe yLku yk yttøku fux÷kf {køkoËþof rMkæÄktíkku ykÃÞk yLku XhkÔÞw fu ßÞkt MkwÄe MkktMkË fkÞËku ½zu Lknª íÞkt MkwÄe yk rMkæÄktíkkuLku
yLkwMkhðk. íÞkh çkkË ð»ko 2013{kt †eykuLke fk{fksLkkt MÚk¤u òíkeÞ Mkíkk{ýe (rLkÞtºký, rLk»kuÄ yLku rLkðkhý) yrÄLkeÞ{ y{÷{kt
ykðu÷ Au, su {wsçk...
òíkeÞ Mkíkk{ýe yux÷u –
yuðwt ðýòuRíkwt fu yMðefkÞo òíkeÞíkk íkhV íkfkÞu÷w «íÞûk fu økŠ¼ík heíkLkwt ðíkoLk fu su{kt,
Kavach:�The�Magazine�of�Raksha�Shakti�University
ª þkrhhef MktÃkfo fu íkuLkku «ÞíLk, (òýe òuRLku nkÚk yzkzðku fu ¾U[ðku)
ª òíkeÞ MktçktÄ {kxu Ëçkký fhðw fu fnuðw – su{ fu, yrÄfkhe îkhk «{kuþLk {kxu ½hu ykððkLke ðkík fnuðe.
ª yr&÷÷ heíku ftR fnuðw, (fkuRLkkt fÃkzkt çkku÷ðk, [k÷ðkLke heík Ãkh ÔÞtøk fhðku)
ª yr&÷÷ r[ºkku Ëþkoððk (ÃkkuLkkuoøkúkVe)
ª yLÞ Lk þku¼u íkuðku þkrhhef, {kir¾f fu rçkLk{kir¾f ÔÞðnkh fhðku, su{ fu – yr&÷÷ Rþkhk ðøkuhu..
yk ÔÞkÏÞk LÞkrÞf Mkr¢ÞíkkLkkt ¼køkYÃku LÞkÞíktºk (Mkwr«{ fkuxou) yLku 2013{kt Lkðk ykðu÷ òíkeÞ Mkíkk{ýe «ríkçktÄf yrÄrLkÞ{ {wsçkLke
Au.íkËTWÃkhktík ykRÃkeMke f÷{ - 294 {wsçk... “su fkuR ÔÞÂõík çkeòLku ºkkMk ÚkkÞ íku heíku ònuh MÚk¤u yr&÷÷ f]íÞ fhu, ònuh MÚk¤u yr&÷÷
økeík økkÞ, fkÔÞku Mkt¼¤kðu fu þçËku Wå[khu íkuLku 3 {kMkLke fuË Ëtz Lke MkòLke òuøkðkR Au.
yk f÷{{kt yr&÷÷ þçËLke fkuR ÔÞkÏÞk fhu÷ LkÚke. Ãkhtíkw ðkMkLkkÃkqýo RåAkyku òøk]ík fhe ¼úü fhðkLkwt ð÷ý níkw fu Lknª íku yr&÷÷íkkLke
fMkkuxe Au. suLkkÚke Mkkt¼¤Lkkh fu VrhÞkËeLkwt {Lk rð[r÷ík fu ¼úü ÚkÞw nkuðwt òuRyu.
LÞkrÞf Mkr¢Þíkk
ª yuÃkhu÷ yuûÃkkuxo «{kuþLk fkWÂLMk÷ ðe yu. fu. [kuÃkhk (1999, Mkwr«{ fkuxo 759)
yu. fu [kuÃkhkLku fkWÂLMk÷Lke yuf †eLkkufhLku ÃksððkLkkt «ÞíLk {kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku níkku. [kuÃkhk fkWÂLMk÷Lkkt [uh{uLkLkku
«kRðux Mku¢uxhe níkku. íku íkuLkk nkÚk Lke[uLke {rn÷k xkRrÃkMxLku Ëçkký fhe íkks nkux÷{kt, ßÞkt íkuLkku [uh{uLk hnuíkku níkku, íÞkt ÷R økÞku yLku
nkux÷Lkkt ¼kUÞhk{kt íkuýe ÃkkMku xkRÃk fhðkLkkt çknkLku íkuýeLku yuLke ðktÄksLkf ðíkoýqtfÚke Mkíkk{ýe yLku Ãksðýe fhLkk {ktze. yufktíkLkku ÷k¼ ÷R
íkuýu xkRÃkeMxLke ÷økku÷øk çkuMkðkLkku ðkhtðkh «ÞíLk fÞkuo. xkRÃkeMxu r÷^xLkwt R{hsLMke çkxLk ËkçkeLku ÃkkuíkkLke òíkLku Mk÷k{ík hk¾e. çkkË{kt
íkuýeyu rzhuõxhLku ÷ur¾ík VrhÞkË fhe yLku [kuÃkhkLku Lkiríkf rLkÞ{kuLke rðÁØ sR xkRÃkeMx MktçktÄ{kt fhu÷ yrþü yLku MkÇÞíkk rðÁØLkkt fkÞkuo
{kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku. Íkuýu hex fhe yLku íkuLku Lkkufhe{kt ÃkkAku ÷uðkLkku ykËuþ nkRfkuxuo fÞkuo. yuBÃ÷kuÞhu íku Mkk{u ÷uxMko ÃkuxLx
yÃke÷ fhe, su hË ÚkR Ãkrhýk{u yuBÃ÷kuÞhu Mkwr«{{kt MÃkuÂ~Þ÷ ÷eð ÃkexeþLk fhíkkt Mkwr«{ fkuxuo íkuLku fhu÷e Mkò {tsqh hk¾e nkRfkuxo{kt
ykËuþLku hÆ fÞkuo. – rðþk¾k fuMkLku æÞkLk{kt ÷uðk{kt ykÔÞku.
ª Ãktòçk{kt ºkkMkðkË LkkÚkðk{kt MkV¤íkk {u¤ðLkkh yLku MkwÃkhfkuÃk íkhefu rçkYË Ãkk{u÷k fu.Ãke.yuMk. øke÷Lku Mkwr«{fkuxuo YÃkLk Ëuyku÷ çkòsLke
Auzíke çkË÷ Mkò fhkðe. yk fuMk 17 ð»ko MkwÄe [kÕÞku, su{kt çktLku Wå[ fûkkLkkt Mkhfkhe yrÄfkhe níkkt yLku çktLkuLku fwxwtçkLkku xufku {éÞku níkku.
Ãkhtíkw rLkíktçk Ãkh xÃk÷e {khðkLkku fuMk 17 ð»ko [k÷u íkuLke ÃkkA¤ Mk{Þ íku{s ÃkiMkkLkwt Ãkký ÚkkÞ íku Mkk{kLÞ f{o[khe MknLk fhu ¾hku. ( sw÷kR
1988 – yZe ÷k¾Lkwt ð¤íkh, Mkò fhe Ãký yÃke÷{kt ð¤íkh {tswh ÚkÞw)
ª hks©e ðk½nhu - «kuçkuþLk Ãkh níkk íÞkhu yuMk.ze. {khu yu íku{Lku fkh{kt ¾U[eLku çkeS ykurVMku ÷R sR A ðkøÞk MkwÄe çkuMkkze hkÏÞk. ½hu
sðkLke hswykík fhe íkku ¾¼ku Ãkfze çkuMkkzeLku f÷uõxh fnu yu fhðw – òu yLÞ {rn÷k yrÄfkhe nkuík íkku þhýu ykðe òík, íkwt fu{ hzâk fhu
Au – ËMk ð»ko ÷zâk çkkË {wtçkRLke nkRfkuxuo ¾huLku A ð»koLke fuË yLku 25000 Ëtz fÞkuo.
98
Kavach:�The�Magazine�of�Raksha�Shakti�University
xkRBMku 24-10-2011Lkk ytf{kt [kuϾw ÷ÏÞwt Au fu, Lkkuðuo{kt †e-ÃkwÁ»k Mk{kLkíkkLkk çkýøkk VqtfkÞ Au, Ãký Lkkuðuo{kt ÃkíLkeyku MkuõMk Lk RåAíke
nkuÞ íkku íkuLku huÃk fhkÞ Au. íkuLkwt fkhý Au 90 xfk LkkuðuoSÞLk ÃkwÁ»kku ½hu çkk¤fkuLku Mkk[ðu Au yLku hMkkuR Ãký fhu Au. Ãký íku{kt nuhkMk{uLx LkÚke.
yk{ MkuõMkwy÷ nuhMk{uLxLkku rð»kÞ yktíkhhkr»xÙÞ çkLÞku Au. “Ä LkuþLk” Lkk{Lkwt y{urhfLk {uøkurÍLk fnu Au fu, søkík{kt Ëhuf 1 r{rLkxu yuf huÃk
ÚkkÞ Au.
f{o[khe fu yuf ÔÞÂõík íkhefu †eLke ¼qr{fkLkwt yð{wÕÞLk ÚkkÞ Au. yuf çkksw fkÞËku †eykuLku yrÄfkhku ykÃku Au, ßÞkhu çkeS çkksw †e þku»kýLkkt
økwLkkyku yrðhík ðÄu s òÞ Au. Mkk{kLÞ heíku ßÞkhu †eykuLkkt þku»kýLke fu íku{Lke WÃkh ÚkR hnu÷k yíÞk[khkuLke ðkík fhðk{kt ykðu Au íÞkhu {kuxu
¼køku íku{kt þkrhhef fu {kLkrMkf ºkkMkLke ðkíkku s [[koÞ Au. ¾qçk ykuAk ÷kufku †eykuLku ðuXðk Ãkzíkk ºkeò «fkhLkkt ºkkMk rðþu [[ko fhíkkt nkuÞ Au.
yk ºkkMkLku òíkeÞ ºkkMk fu òíkeÞ Mkíkk{ýe fne þfkÞ. Mkíkk{ýe yuf Mðk¼krðf çkkçkík Au yu{ {kLkðk{kt ykðu Au. yksu †e ½hLke [kh
rËðk÷ku{kt ÃkwhkRLku hnuíke LkÚke, hnuðw þõÞ Ãký LkÚke. SðLkrLkðkon, fwxwtçkLkwt økwshkLk, rþûký {u¤ððk fu ÃkkuíkkLke fkhrfíkeo {kxu fu fkuR Ãký fkhýu
çknkh Lkef¤ðwt s yrLkðkÞo çkLÞw Au. òíkeÞ Mkíkk{ýe †eykuLke Mkk{krsf økrík þe÷íkk Ãkh MkeÄku «nkh fhu Au.
òríkÞ Mkíkk{ýeLkku ¼kuøk ÚkLkkh †e {kxu Lkkufhe Akuze ËuðkLkku rðfÕÃk çkkfe hnu Au. yuf MktþkuÄLk {wsçk ¼kuøk çkLku÷ 40 xfkÚke WÃkh †eykuyu
hkSLkk{ww ykÃku÷ Au. 30 xfk fhíkk ðÄw rðãkÚkeoLkeyku yÇÞkMk Akuze Ëu Au.
òíkeÞ Mkíkk{ýeLkkt rfMMkkyku ðÄðkLkwt fkhý:
ª yrLkðkÞo Mktòuøkku íkhefu Mðefkhu÷ {wÏÞ fkhý Au fu †e îkhk «ríkhkuÄ fhkíkku LkÚke, †e ½hhϾw, {eík¼k»ke, Lk{ú, yk¿kkfkhe yLku ykrÄLk
hnuðe òuRyu yLku {wtøkk {kuZu Mkne ÷uíke òuðk {¤u Au, suLkk ÷eÄu ÃkwÁ»k Lkezh çkLku Au yLku yk Mkíkk{ýe ðkhtðkh fhíkku òuðk {¤u Au.
ª çkesw fkhý yu Au fu ÃkÁ»kLkwt òríkÞ Mkíkk{ýe {kxu y÷øk {kÃkËtz. yuf s ÃkwÁ»k yuf s yk[hý ÃkkuíkkLke çkuLk fu ÃkíLke {kxu y¼ÿ, yr&÷÷
økýþu yLku yu s yk[hý ÃkkuíkkLke yrÄLkMÚk fu Mknf{o[khe †eykuLke çkkçkík{kt MkkÄkhý {ò fu rðLkkuË fu ÃkAe ykÄwrLkfíkk Lkkt YÃk{kt ÷R
÷u Au.
þwt òríkÞ Mkíkk{ýe yu {kºk Mkk{krsf Mk{MÞk Au fu çkeswt fktR Ãký ?
Mk{ksþkMkúe yuLku {kºk Mkk{krsf Mk{MÞk {kLku Au ßÞkhu {Lkkuði¿kkrLkf íkuLku ÔÞÂõíkLkkt {LkkurðfkhLkwt Ãkrhýk{ {kLku Au. xqtf{kt òríkÞ Mkíkk{ýe
Mkk{krsf Mk{MÞk Ãký Au. yLku MkkÚkuMkkÚku {Lkkuði¿kkrLkf Mk{MÞk Ãký Au. òu yk Mk{MÞkLku Ëirnf {LkkuMkk{krsf Mk{MÞk fneþwt íkku ÞkuøÞ økýkþu.
30 Ëuþku{kt òíkeÞ Mkíkk{ýe ytøkuLkk fkÞËk Au. ¼khík Ëuþ{kt MkuõMkwy÷ nuhuMk{uLx rçk÷, 2004{kt ÃkMkkh ÚkÞw suLke f÷{ 2(0) {kt òíkeÞ
Mkíkk{ýeLke ÔÞkÏÞk ykÃku÷e Au. yLku yk ytøku Mkwr«{fkuxoLkku Mke{kr[ö [wfkËku rðþk¾k rð Mxux ykuV hksMÚkkLkLkkt fuMk{kt Mkwr«{ fkuxou íkuLke
ÔÞkÏÞk fhe yLku yk yttøku fux÷kf {køkoËþof rMkæÄktíkku ykÃÞk yLku XhkÔÞw fu ßÞkt MkwÄe MkktMkË fkÞËku ½zu Lknª íÞkt MkwÄe yk rMkæÄktíkkuLku
yLkwMkhðk. íÞkh çkkË ð»ko 2013{kt †eykuLke fk{fksLkkt MÚk¤u òíkeÞ Mkíkk{ýe (rLkÞtºký, rLk»kuÄ yLku rLkðkhý) yrÄLkeÞ{ y{÷{kt
ykðu÷ Au, su {wsçk...
òíkeÞ Mkíkk{ýe yux÷u –
yuðwt ðýòuRíkwt fu yMðefkÞo òíkeÞíkk íkhV íkfkÞu÷w «íÞûk fu økŠ¼ík heíkLkwt ðíkoLk fu su{kt,
Kavach:�The�Magazine�of�Raksha�Shakti�University
ª þkrhhef MktÃkfo fu íkuLkku «ÞíLk, (òýe òuRLku nkÚk yzkzðku fu ¾U[ðku)
ª òíkeÞ MktçktÄ {kxu Ëçkký fhðw fu fnuðw – su{ fu, yrÄfkhe îkhk «{kuþLk {kxu ½hu ykððkLke ðkík fnuðe.
ª yr&÷÷ heíku ftR fnuðw, (fkuRLkkt fÃkzkt çkku÷ðk, [k÷ðkLke heík Ãkh ÔÞtøk fhðku)
ª yr&÷÷ r[ºkku Ëþkoððk (ÃkkuLkkuoøkúkVe)
ª yLÞ Lk þku¼u íkuðku þkrhhef, {kir¾f fu rçkLk{kir¾f ÔÞðnkh fhðku, su{ fu – yr&÷÷ Rþkhk ðøkuhu..
yk ÔÞkÏÞk LÞkrÞf Mkr¢ÞíkkLkkt ¼køkYÃku LÞkÞíktºk (Mkwr«{ fkuxou) yLku 2013{kt Lkðk ykðu÷ òíkeÞ Mkíkk{ýe «ríkçktÄf yrÄrLkÞ{ {wsçkLke
Au.íkËTWÃkhktík ykRÃkeMke f÷{ - 294 {wsçk... “su fkuR ÔÞÂõík çkeòLku ºkkMk ÚkkÞ íku heíku ònuh MÚk¤u yr&÷÷ f]íÞ fhu, ònuh MÚk¤u yr&÷÷
økeík økkÞ, fkÔÞku Mkt¼¤kðu fu þçËku Wå[khu íkuLku 3 {kMkLke fuË Ëtz Lke MkòLke òuøkðkR Au.
yk f÷{{kt yr&÷÷ þçËLke fkuR ÔÞkÏÞk fhu÷ LkÚke. Ãkhtíkw ðkMkLkkÃkqýo RåAkyku òøk]ík fhe ¼úü fhðkLkwt ð÷ý níkw fu Lknª íku yr&÷÷íkkLke
fMkkuxe Au. suLkkÚke Mkkt¼¤Lkkh fu VrhÞkËeLkwt {Lk rð[r÷ík fu ¼úü ÚkÞw nkuðwt òuRyu.
LÞkrÞf Mkr¢Þíkk
ª yuÃkhu÷ yuûÃkkuxo «{kuþLk fkWÂLMk÷ ðe yu. fu. [kuÃkhk (1999, Mkwr«{ fkuxo 759)
yu. fu [kuÃkhkLku fkWÂLMk÷Lke yuf †eLkkufhLku ÃksððkLkkt «ÞíLk {kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku níkku. [kuÃkhk fkWÂLMk÷Lkkt [uh{uLkLkku
«kRðux Mku¢uxhe níkku. íku íkuLkk nkÚk Lke[uLke {rn÷k xkRrÃkMxLku Ëçkký fhe íkks nkux÷{kt, ßÞkt íkuLkku [uh{uLk hnuíkku níkku, íÞkt ÷R økÞku yLku
nkux÷Lkkt ¼kUÞhk{kt íkuýe ÃkkMku xkRÃk fhðkLkkt çknkLku íkuýeLku yuLke ðktÄksLkf ðíkoýqtfÚke Mkíkk{ýe yLku Ãksðýe fhLkk {ktze. yufktíkLkku ÷k¼ ÷R
íkuýu xkRÃkeMxLke ÷økku÷øk çkuMkðkLkku ðkhtðkh «ÞíLk fÞkuo. xkRÃkeMxu r÷^xLkwt R{hsLMke çkxLk ËkçkeLku ÃkkuíkkLke òíkLku Mk÷k{ík hk¾e. çkkË{kt
íkuýeyu rzhuõxhLku ÷ur¾ík VrhÞkË fhe yLku [kuÃkhkLku Lkiríkf rLkÞ{kuLke rðÁØ sR xkRÃkeMx MktçktÄ{kt fhu÷ yrþü yLku MkÇÞíkk rðÁØLkkt fkÞkuo
{kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku. Íkuýu hex fhe yLku íkuLku Lkkufhe{kt ÃkkAku ÷uðkLkku ykËuþ nkRfkuxuo fÞkuo. yuBÃ÷kuÞhu íku Mkk{u ÷uxMko ÃkuxLx
yÃke÷ fhe, su hË ÚkR Ãkrhýk{u yuBÃ÷kuÞhu Mkwr«{{kt MÃkuÂ~Þ÷ ÷eð ÃkexeþLk fhíkkt Mkwr«{ fkuxuo íkuLku fhu÷e Mkò {tsqh hk¾e nkRfkuxo{kt
ykËuþLku hÆ fÞkuo. – rðþk¾k fuMkLku æÞkLk{kt ÷uðk{kt ykÔÞku.
ª Ãktòçk{kt ºkkMkðkË LkkÚkðk{kt MkV¤íkk {u¤ðLkkh yLku MkwÃkhfkuÃk íkhefu rçkYË Ãkk{u÷k fu.Ãke.yuMk. øke÷Lku Mkwr«{fkuxuo YÃkLk Ëuyku÷ çkòsLke
Auzíke çkË÷ Mkò fhkðe. yk fuMk 17 ð»ko MkwÄe [kÕÞku, su{kt çktLku Wå[ fûkkLkkt Mkhfkhe yrÄfkhe níkkt yLku çktLkuLku fwxwtçkLkku xufku {éÞku níkku.
Ãkhtíkw rLkíktçk Ãkh xÃk÷e {khðkLkku fuMk 17 ð»ko [k÷u íkuLke ÃkkA¤ Mk{Þ íku{s ÃkiMkkLkwt Ãkký ÚkkÞ íku Mkk{kLÞ f{o[khe MknLk fhu ¾hku. ( sw÷kR
1988 – yZe ÷k¾Lkwt ð¤íkh, Mkò fhe Ãký yÃke÷{kt ð¤íkh {tswh ÚkÞw)
ª hks©e ðk½nhu - «kuçkuþLk Ãkh níkk íÞkhu yuMk.ze. {khu yu íku{Lku fkh{kt ¾U[eLku çkeS ykurVMku ÷R sR A ðkøÞk MkwÄe çkuMkkze hkÏÞk. ½hu
sðkLke hswykík fhe íkku ¾¼ku Ãkfze çkuMkkzeLku f÷uõxh fnu yu fhðw – òu yLÞ {rn÷k yrÄfkhe nkuík íkku þhýu ykðe òík, íkwt fu{ hzâk fhu
Au – ËMk ð»ko ÷zâk çkkË {wtçkRLke nkRfkuxuo ¾huLku A ð»koLke fuË yLku 25000 Ëtz fÞkuo.
98
ª y{urhfkLkkt ¼qíkÃkqðo hk»xÙÃkrík (rçk÷ ®õ÷xLk)Lke Mkk{u Ãký òíkeÞ Mkíkk{ýe ytøku yËk÷ík{kt fkÞoðkne ÚkR, su y{urhfkLkkt RríknkMk{kt
Ãknu÷e s ðkh çkLÞw. fu su{kt hk»xÙÃkríkLku yËk÷ík{kt nksh Úkðw Ãkzâw. yk rfMMkku íÞkhu çkLku÷ku fu ßÞkhu íkuyku yuõMkkMkLkkt økðLkoh níkk. íÞkhu
ÃkkW÷k fkuŠçkLk {uLMk ©e ®õ÷xLkLke Mkhfkhe f{o[khe níke. íku Mk{Þu rçk÷ ®õ÷xLku íkuLke òíkeÞ Mkíkk{ýe fhe níke. su{kt yuf nkux÷{kt
®õ÷xLku íkuLkkt fÃkzkt Wíkkhðk fÌkw níkw. 18-01-98 yu íkuLke MkwLkðýe ÚkR níke. {kurLkfk ÷u®ðøMkfeLke çkkçkík{kt Ãký íkuykuLku ònuh{kt {kVe
{ktøkðe Ãkze níke.
yk{ Aíkkt †eyku Ãkh yk heíkuLkkt yíÞk[kh ðÄe hÌkk Au. rËÕne{kt ÚkÞu÷ rLk¼oÞk økUøk huÃk yLku çkËkÞwLke Ëw½oxLkk yu íkku Ãkqhk Mk{ksLku òýu
n[{[kðe {qfu÷ Au. íkksuíkh{kt s ¼khík{kt f÷f¥kk ÃkkMkuLkkt hktLkøkx økk{Lke fkuLðuLx Mfq÷Lkkt 73 ð»koLke LkLk Ãkh økUøk huÃk ÚkÞu÷ su Mk{ks {kxu
Ãký yuf f÷tfYÃk ½xLkkt Au.
yk çkÄe ½xLkkykuÚke fkÞËkyku{kt Ãký MkwÄkhk fhðk{kt ykðu÷ Au. su{ fu...
Vuõxhe yuõx{kt ykÄwrLkf MkwÄkhk {wsçk - †eyku ºkeS Ãkk¤e{kt fk{ fhþu. yk MkwÄkhku fhíkk {krníke yLku «Mkkhý {tºke ©e sÞÃkk÷ huzeyu
sýkÔÞw fu †eyku nðu fkuR Ãký søÞkyu hkºke Ãkk¤e yux÷u fu hkíkLkt 12 Úke MkðkhLkkt 7 MkwÄe fkÞo fhe þfþu, þhík yu hnuþu fu yk Vhs çkòðíke
†e f{o[kheLke Mk÷k{íke, Mðkr¼{kLk yLku {kLk suðk rníkkuLkt hûký íku Vuõxhe, ftÃkLke fu MktMÚkk îkhk Úkðw sYhe Au.
yíÞkh MkwÄe zkìõxh, LkMko yLku ykÞkyku íku{s yuhnkuMxuMk suðe †e f{o[khe hkrºk Vhs çkòðíke Ãkhtíkw nk÷Lke ÃkrhÂMÚkíke çkË÷kR Au. †eLke
Ëhuf ÔÞðMkkrÞ ûkuºk{kt hkrºk Vhs{kt nkshe òuðk {¤u Au. {kfuo®xøk, þuhçkòh, ykRxe «kuVuþLkÕMk, {rn÷k ÃkkÞ÷kux, Vuõxhe{kt fk{ fhíke
yuÂLsrLkÞh, xe.ðe.,ykfkþðkýe yLku Ãkku÷eMk {rn÷kyku yk ík{k{Lku fkÞËkLkkt yk MkwÄkhkÚke fkhrfËeo çkLkkððkLkwt «kuíMkknLk {éÞw Au.
ÞwLkkRxuz LkuþLkLkkt [kxohLkkt yk{w¾{kt (24 ykuõxku, 1945) {uLþLk fhu÷w Au fu,
“�To�reaffirm�the�faith�In�fundamental�human�rights,�is�the�dignity�and�worth�of�the�human�person,�in�the�
equal�rights�of�men�and�women�and�to�employ�international�machinery�for�the�promotion�of�the�economic�
and�social�advancement�of�the�people.”
¼khíkLkkt çktÄkhý yLku çkeò fkÞËkyku{kt Mk{Þktíkhu MkwÄkhk Úkíkkt hÌkk Au. su{kt fkR Ãký LkkøkrhfLku Ä{o, òrík, ¿kkrík fu ®÷økLkkt ¼u˼kðrðLkk
Mk{kLk Ëhßòu yLku íkf ykÃkðk{kt ykðu Au. íku{s Mkwr«{ fkuxuo Ãký ð¾íkku ð¾ík Mke{kr[Ln YÃk [wfkËkyku ykÃku÷ Au. fkÞËkykuLke yAík LkÚke,
Ãkhtíkw «© Au Mkk{kSf MktðuËLkþe÷íkkLkku. Ëh ð¾íku Lkðk fkÞËkyku ½zðk yu R÷ks LkÚke Ãkhtíkw Mk{ksLke {kLkMkefíkk çkË÷kðe yu Ãký yux÷w s
sYhe Au. ßÞkt MkwÄe †eykuLke yuf ÔÞÂõík íkhefuLke økýíkhe fhðk{kt ykðþu íkku s yk heíkLkkt Ëw»kýku yxfþu.
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
Introduction
An�aggressive�or�angry�behavior�of�a�vehicle�driver�can�cause�road�rage.�It�starts�with�tailgating,�rude�gestures,�
verbal�insults,�deliberately�driving�in�an�unsafe�or�threatening�manner,�or�making�threats.�Driver�may�make�a�
momentary�error�of�judgment�but�the�perception�of�another�driver�is�that�he�or�she�is�driving�aggressively.�
There�are�many� factors�which� contribute� to� road� rage� i.e.� circumstances,� environments,�psychological�
factors�and�variety�of�events�etc.�
ª Environmental�conditions�plays�very�important�role�in�road�rage.�These�conditions�can�be�listed�as�heat,�
light,�humidity,�fogs,�dense�traffics,�road�conditions,�noise,�speed�and�shortage�of�time.
ª Nonspecific�psychological�factors�such�as�showing�anger,�habit�of�blaming�others,�stressful�working�
condition,�shortage�of�rest�period�may�contribute�to�road�rage.�
ª Some�of�research�finding�showed�that�personality�disorders�may�cause�to�road�rage,�particularly�those�
who�uses�more�alcohol�than�the�prescribed�levels�and�substance�misuse.�
ª Individuals�with�anxiety,�depression�and�somatic�symptoms�were�found�with�severe�forms�of�road�rage.
ª Borderline� personality� disorder� (BPD)� is� characterized� by� impulsivity� (e.g.,� reckless� driving),�
intermittent�intense�dysphoria,�inappropriate�intense�anger,�difficulty�controlling�anger,�and�transient�
paranoid�ideation.�
ª Several�studies�have�examined�the�relationship�between�reckless�and/or�aggressive�driving�and�found�
that�there�is�association�between�hazardous�driving�and�BPD.�
What�Instigate�Road�Rage?
ª An�argument�over�a�parking�space
ª Overtaking
ª Showing�finger�or�rude�gesture
ª Honking�and�honking�his�horn�continuously
ª Driving�too�slowly
ª Signaling�high�beams.
Road�Rage�‒�An�Analysis*Dr.�S.�R.�Tripathi
*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad
1110
ª y{urhfkLkkt ¼qíkÃkqðo hk»xÙÃkrík (rçk÷ ®õ÷xLk)Lke Mkk{u Ãký òíkeÞ Mkíkk{ýe ytøku yËk÷ík{kt fkÞoðkne ÚkR, su y{urhfkLkkt RríknkMk{kt
Ãknu÷e s ðkh çkLÞw. fu su{kt hk»xÙÃkríkLku yËk÷ík{kt nksh Úkðw Ãkzâw. yk rfMMkku íÞkhu çkLku÷ku fu ßÞkhu íkuyku yuõMkkMkLkkt økðLkoh níkk. íÞkhu
ÃkkW÷k fkuŠçkLk {uLMk ©e ®õ÷xLkLke Mkhfkhe f{o[khe níke. íku Mk{Þu rçk÷ ®õ÷xLku íkuLke òíkeÞ Mkíkk{ýe fhe níke. su{kt yuf nkux÷{kt
®õ÷xLku íkuLkkt fÃkzkt Wíkkhðk fÌkw níkw. 18-01-98 yu íkuLke MkwLkðýe ÚkR níke. {kurLkfk ÷u®ðøMkfeLke çkkçkík{kt Ãký íkuykuLku ònuh{kt {kVe
{ktøkðe Ãkze níke.
yk{ Aíkkt †eyku Ãkh yk heíkuLkkt yíÞk[kh ðÄe hÌkk Au. rËÕne{kt ÚkÞu÷ rLk¼oÞk økUøk huÃk yLku çkËkÞwLke Ëw½oxLkk yu íkku Ãkqhk Mk{ksLku òýu
n[{[kðe {qfu÷ Au. íkksuíkh{kt s ¼khík{kt f÷f¥kk ÃkkMkuLkkt hktLkøkx økk{Lke fkuLðuLx Mfq÷Lkkt 73 ð»koLke LkLk Ãkh økUøk huÃk ÚkÞu÷ su Mk{ks {kxu
Ãký yuf f÷tfYÃk ½xLkkt Au.
yk çkÄe ½xLkkykuÚke fkÞËkyku{kt Ãký MkwÄkhk fhðk{kt ykðu÷ Au. su{ fu...
Vuõxhe yuõx{kt ykÄwrLkf MkwÄkhk {wsçk - †eyku ºkeS Ãkk¤e{kt fk{ fhþu. yk MkwÄkhku fhíkk {krníke yLku «Mkkhý {tºke ©e sÞÃkk÷ huzeyu
sýkÔÞw fu †eyku nðu fkuR Ãký søÞkyu hkºke Ãkk¤e yux÷u fu hkíkLkt 12 Úke MkðkhLkkt 7 MkwÄe fkÞo fhe þfþu, þhík yu hnuþu fu yk Vhs çkòðíke
†e f{o[kheLke Mk÷k{íke, Mðkr¼{kLk yLku {kLk suðk rníkkuLkt hûký íku Vuõxhe, ftÃkLke fu MktMÚkk îkhk Úkðw sYhe Au.
yíÞkh MkwÄe zkìõxh, LkMko yLku ykÞkyku íku{s yuhnkuMxuMk suðe †e f{o[khe hkrºk Vhs çkòðíke Ãkhtíkw nk÷Lke ÃkrhÂMÚkíke çkË÷kR Au. †eLke
Ëhuf ÔÞðMkkrÞ ûkuºk{kt hkrºk Vhs{kt nkshe òuðk {¤u Au. {kfuo®xøk, þuhçkòh, ykRxe «kuVuþLkÕMk, {rn÷k ÃkkÞ÷kux, Vuõxhe{kt fk{ fhíke
yuÂLsrLkÞh, xe.ðe.,ykfkþðkýe yLku Ãkku÷eMk {rn÷kyku yk ík{k{Lku fkÞËkLkkt yk MkwÄkhkÚke fkhrfËeo çkLkkððkLkwt «kuíMkknLk {éÞw Au.
ÞwLkkRxuz LkuþLkLkkt [kxohLkkt yk{w¾{kt (24 ykuõxku, 1945) {uLþLk fhu÷w Au fu,
“�To�reaffirm�the�faith�In�fundamental�human�rights,�is�the�dignity�and�worth�of�the�human�person,�in�the�
equal�rights�of�men�and�women�and�to�employ�international�machinery�for�the�promotion�of�the�economic�
and�social�advancement�of�the�people.”
¼khíkLkkt çktÄkhý yLku çkeò fkÞËkyku{kt Mk{Þktíkhu MkwÄkhk Úkíkkt hÌkk Au. su{kt fkR Ãký LkkøkrhfLku Ä{o, òrík, ¿kkrík fu ®÷økLkkt ¼u˼kðrðLkk
Mk{kLk Ëhßòu yLku íkf ykÃkðk{kt ykðu Au. íku{s Mkwr«{ fkuxuo Ãký ð¾íkku ð¾ík Mke{kr[Ln YÃk [wfkËkyku ykÃku÷ Au. fkÞËkykuLke yAík LkÚke,
Ãkhtíkw «© Au Mkk{kSf MktðuËLkþe÷íkkLkku. Ëh ð¾íku Lkðk fkÞËkyku ½zðk yu R÷ks LkÚke Ãkhtíkw Mk{ksLke {kLkMkefíkk çkË÷kðe yu Ãký yux÷w s
sYhe Au. ßÞkt MkwÄe †eykuLke yuf ÔÞÂõík íkhefuLke økýíkhe fhðk{kt ykðþu íkku s yk heíkLkkt Ëw»kýku yxfþu.
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
Introduction
An�aggressive�or�angry�behavior�of�a�vehicle�driver�can�cause�road�rage.�It�starts�with�tailgating,�rude�gestures,�
verbal�insults,�deliberately�driving�in�an�unsafe�or�threatening�manner,�or�making�threats.�Driver�may�make�a�
momentary�error�of�judgment�but�the�perception�of�another�driver�is�that�he�or�she�is�driving�aggressively.�
There�are�many� factors�which� contribute� to� road� rage� i.e.� circumstances,� environments,�psychological�
factors�and�variety�of�events�etc.�
ª Environmental�conditions�plays�very�important�role�in�road�rage.�These�conditions�can�be�listed�as�heat,�
light,�humidity,�fogs,�dense�traffics,�road�conditions,�noise,�speed�and�shortage�of�time.
ª Nonspecific�psychological�factors�such�as�showing�anger,�habit�of�blaming�others,�stressful�working�
condition,�shortage�of�rest�period�may�contribute�to�road�rage.�
ª Some�of�research�finding�showed�that�personality�disorders�may�cause�to�road�rage,�particularly�those�
who�uses�more�alcohol�than�the�prescribed�levels�and�substance�misuse.�
ª Individuals�with�anxiety,�depression�and�somatic�symptoms�were�found�with�severe�forms�of�road�rage.
ª Borderline� personality� disorder� (BPD)� is� characterized� by� impulsivity� (e.g.,� reckless� driving),�
intermittent�intense�dysphoria,�inappropriate�intense�anger,�difficulty�controlling�anger,�and�transient�
paranoid�ideation.�
ª Several�studies�have�examined�the�relationship�between�reckless�and/or�aggressive�driving�and�found�
that�there�is�association�between�hazardous�driving�and�BPD.�
What�Instigate�Road�Rage?
ª An�argument�over�a�parking�space
ª Overtaking
ª Showing�finger�or�rude�gesture
ª Honking�and�honking�his�horn�continuously
ª Driving�too�slowly
ª Signaling�high�beams.
Road�Rage�‒�An�Analysis*Dr.�S.�R.�Tripathi
*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad
1110
Kavach:�The�Magazine�of�Raksha�Shakti�University
ª Tailgating�
ª Hit-and-run�minor�collision.
ª Crossing�the�lanes�without�signaling
ª Abusing�and�Hitting
The�statistics�of�NHTSA�(National�Highway�Traffic�Security�Administration�and�the�Auto�Vantage�auto�club)�
show�that�-
ª 66%�of�traffic�fatalities�are�caused�by�aggressive�driving.
ª 37%�of�aggressive�driving�incidents�involve�a�firearm.
ª Males�under�the�age�of�19�are�the�most�likely�to�exhibit�road�rage.
ª Half�of�drivers�who�are�on�the�receiving�end�of�an�aggressive�behavior,�such�as�horn�honking,�a�rude�
gesture,�or�tailgating�admit�to�responding�with�aggressive�behavior�themselves.�
Road�accidents�Statistics�(India)*
ª In�India,�1,20,000�people�die�and�12,70,000�sustain�serious�injuries�every�year�in�Road�Traffic�Accidents.�
ª Every�six�minutes�there�is�one�death�due�to�road�accident;�it�may�rise�to�one�death�in�every�three�minutes�
by�2020.�
ª 1.4� million� Serious� road� accidents/� collisions� occurring� annually� in� India,� hardly� 0.4� million� are�
recorded.(Institute�of�Road�Traffic�Education�2006)
ª In�rural�areas�all� road�accidents�are�not�recorded�and�similarly� late�deaths�after� the�discharge�from�
hospital�also�are�not�recorded.�(Indian�Journal�Of�Neurotrauma�(�IJNI)�2008�vol.5�No.2,pp.63-67.)
ª India�accounts�for�about�10%�of�road�accident�fatalities�worldwide�
ª The�number�of�accidents�for�1000�vehicles�in�India�is�as�high�as�35�while�the�figure�ranges�from�4�to�10�in�
developed�countries.
ª More�people�die�in�road�accidents�in�India�than�anywhere�else�in�the�world�(World�Health�Organization,�
Global�status�report�on�Road�safety2009).
ª In� comparison� to� developed� countries� accidents� in� India� is� 3time� higher.(National� Transportation�
Planning�and�Reasearch�Centre(NTPRC).
Kavach:�The�Magazine�of�Raksha�Shakti�University
ª Although�India�accounts�for�only�1%�of�the�registered�motor�vehicles,�it�accounts�for�nearly�9�%�of�R� T A�
deaths.�
ª 85�%�of�the�victims�of�these�fatalities�are�men�in�the�age�group�20-50�years.
ª *Alarming�Facts�of�Road�Accidents�in�India,�Dr.Rajsekaran.President�Indian�Orthopedic�Association.��
Key�facts�(WHO)
ª About�1.24�million�people�die�each�year�as�a�result�of�road�traffic�crashes.
ª Road�traffic�injuries�are�the�leading�cause�of�death�among�young�people,�aged�15‒29�years.
ª 91%�of� the�world's� fatalities�on� the� roads�occur� in� low-income�and�middle-income�countries,�even�
though�these�countries�have�approximately�half�of�the�world's�vehicles.
ª Half� of� those� dying� on� the� world's� roads� are� “vulnerable� road� users”:� pedestrians,� cyclists� and�
motorcyclists.
ª Without�action,�road�traffic�crashes�are�predicted�to�result�in�the�deaths�of�around�1.9�million�people�
annually�by�2020.
ª Only�28�countries,�representing�416�million�people�(7%�of�the�world's�population),�have�adequate�laws�
that�address�all�five�risk�factors�(speed,�drink-driving,�helmets,�seat-belts�and�child�restraints).
A�Decade�of�Action�for�Road�Safety�(2011‒2020)�was�launched�by�United�Nations�General�Assembly�resolution�
in�May�2011,�in�over�110�countries,�for�improving�the�safety�of�roads�and�vehicles;�changing�the�behaviour�and�
attitude�of�road�users;�and�improving�emergency�services.�
Further,�"Road�Safety�in�10�Countries�(RS10)�Project"�supports�the�governments�of�Brazil,�Cambodia,�China,�
Egypt,�India,�Kenya,�Mexico,�the�Russian�Federation,�Turkey�and�Viet�Nam�by�focusing�on�selected�key�risks�for�
road�traffic�crashes.�World�Health�Organization�(WHO)�works�across�the�spectrum�in�countries,�and�provide�
the�technical�guidance.�
1312
Kavach:�The�Magazine�of�Raksha�Shakti�University
ª Tailgating�
ª Hit-and-run�minor�collision.
ª Crossing�the�lanes�without�signaling
ª Abusing�and�Hitting
The�statistics�of�NHTSA�(National�Highway�Traffic�Security�Administration�and�the�Auto�Vantage�auto�club)�
show�that�-
ª 66%�of�traffic�fatalities�are�caused�by�aggressive�driving.
ª 37%�of�aggressive�driving�incidents�involve�a�firearm.
ª Males�under�the�age�of�19�are�the�most�likely�to�exhibit�road�rage.
ª Half�of�drivers�who�are�on�the�receiving�end�of�an�aggressive�behavior,�such�as�horn�honking,�a�rude�
gesture,�or�tailgating�admit�to�responding�with�aggressive�behavior�themselves.�
Road�accidents�Statistics�(India)*
ª In�India,�1,20,000�people�die�and�12,70,000�sustain�serious�injuries�every�year�in�Road�Traffic�Accidents.�
ª Every�six�minutes�there�is�one�death�due�to�road�accident;�it�may�rise�to�one�death�in�every�three�minutes�
by�2020.�
ª 1.4� million� Serious� road� accidents/� collisions� occurring� annually� in� India,� hardly� 0.4� million� are�
recorded.(Institute�of�Road�Traffic�Education�2006)
ª In�rural�areas�all� road�accidents�are�not�recorded�and�similarly� late�deaths�after� the�discharge�from�
hospital�also�are�not�recorded.�(Indian�Journal�Of�Neurotrauma�(�IJNI)�2008�vol.5�No.2,pp.63-67.)
ª India�accounts�for�about�10%�of�road�accident�fatalities�worldwide�
ª The�number�of�accidents�for�1000�vehicles�in�India�is�as�high�as�35�while�the�figure�ranges�from�4�to�10�in�
developed�countries.
ª More�people�die�in�road�accidents�in�India�than�anywhere�else�in�the�world�(World�Health�Organization,�
Global�status�report�on�Road�safety2009).
ª In� comparison� to� developed� countries� accidents� in� India� is� 3time� higher.(National� Transportation�
Planning�and�Reasearch�Centre(NTPRC).
Kavach:�The�Magazine�of�Raksha�Shakti�University
ª Although�India�accounts�for�only�1%�of�the�registered�motor�vehicles,�it�accounts�for�nearly�9�%�of�R� T A�
deaths.�
ª 85�%�of�the�victims�of�these�fatalities�are�men�in�the�age�group�20-50�years.
ª *Alarming�Facts�of�Road�Accidents�in�India,�Dr.Rajsekaran.President�Indian�Orthopedic�Association.��
Key�facts�(WHO)
ª About�1.24�million�people�die�each�year�as�a�result�of�road�traffic�crashes.
ª Road�traffic�injuries�are�the�leading�cause�of�death�among�young�people,�aged�15‒29�years.
ª 91%�of� the�world's� fatalities�on� the� roads�occur� in� low-income�and�middle-income�countries,�even�
though�these�countries�have�approximately�half�of�the�world's�vehicles.
ª Half� of� those� dying� on� the� world's� roads� are� “vulnerable� road� users”:� pedestrians,� cyclists� and�
motorcyclists.
ª Without�action,�road�traffic�crashes�are�predicted�to�result�in�the�deaths�of�around�1.9�million�people�
annually�by�2020.
ª Only�28�countries,�representing�416�million�people�(7%�of�the�world's�population),�have�adequate�laws�
that�address�all�five�risk�factors�(speed,�drink-driving,�helmets,�seat-belts�and�child�restraints).
A�Decade�of�Action�for�Road�Safety�(2011‒2020)�was�launched�by�United�Nations�General�Assembly�resolution�
in�May�2011,�in�over�110�countries,�for�improving�the�safety�of�roads�and�vehicles;�changing�the�behaviour�and�
attitude�of�road�users;�and�improving�emergency�services.�
Further,�"Road�Safety�in�10�Countries�(RS10)�Project"�supports�the�governments�of�Brazil,�Cambodia,�China,�
Egypt,�India,�Kenya,�Mexico,�the�Russian�Federation,�Turkey�and�Viet�Nam�by�focusing�on�selected�key�risks�for�
road�traffic�crashes.�World�Health�Organization�(WHO)�works�across�the�spectrum�in�countries,�and�provide�
the�technical�guidance.�
1312
Kavach:�The�Magazine�of�Raksha�Shakti�University
st21 �century�shouts�that�security� is�the�responsibility�of�all.�Development�of�communication�technology�has�
played�great� role� in� this� century� in�making�people� closer�&� closer� in� all� aspects.�Revolution�of�high� speed�
technology�in�internet�has�opened�many�fields�such�as�On-line�shopping,�E-banking,�E-governance�etc.,�These�E-
applications�have�created�challenges�in�the�identification�of�individual�and�to�authentic�the�access�to�the�system.�
There�are�many�identification�processes�but�biometric�identification�process�is�more�accurate�and�secure.�
Biometric�means�life�measurement�but�the�term�is�usually�associated�with�the�use�of�unique�physiological�
characteristics� identify� an� individual.� The� application�which�most� people� associate�with� biometrics� is�
security.�Knowing�the�person�with�whom�you�are�conversing�is�an�important�part�of�human�interaction�and�
one�expects�computers�of�the�future�to�have�the�same�capabilities.�A�number�of�biometric�traits�have�been�
developed� and� are�used� to� authenticate� the�person's� identity.� The�method�of� identification�based�on�
biometric�characteristics�is�preferred�over�traditional�passwords�and�PIN�based�methods�because�of�the�
person� to�be� identified� is� required� to�be�physically�present�at� the� time-of-identification.� Identification�
based�on�biometric�techniques�prevents�the�need�to�remember�a�password�or�carry�a�token.�A�biometric�
system�is�essentially�a�pattern�recognition�system�which�makes�a�personal�identification�by�determining�
the�authenticity�of�a�specific�physiological�or�behavioral�characteristic�possessed�by�the�user.�Biometric�
technologies�are�thus�defined�as�the�"automated�methods�of�identifying�or�authenticating�the�identity�of�a�
living�person�based�on�a�physiological�or�behavioral�characteristic".�
There� are�many� issues� for� the� discussion� and� consideration� to� implement� accurate� &� secure� biometric�
identification�system.�Selection�of�unique�characteristic�of�living�person�should�be�universal�and�seldom�lost�to�
accident�or�disease,�constant�over�a�long�time,�suitable�for�easy�capturing,�unique�to�the�individual,�acceptable�
to� a� large� percentage� of� the� population,� capable� of� being� reduced� to� size,� impractical� to� manipulate,�
irreproducible�and�perfect�to�maintain�privacy�of�the�person.�Among�the�various�biometric�technologies�being�
considered,� the� attributes� which� satisfy� the� above� requirements� are� fingerprint,� facial� features,� hand�
geometry,�voice,�iris,�retina,�vein�patterns,�palm�print,�DNA,�keystroke�dynamics,�ear�shape,�odor�etc.
A�biometric�system�can�be�classified�into�two�modules:�(i)�Database�Preparation�Module�and�(ii)�Verification�
Module.�The�Database�Preparation�Module�consists�of�two�sub-modules,�and�they�are�(i)�Enroll�Module�and�
(ii)�Training�Module�while�Verification�module�can�be�divided�into�two�modules�(i)�Matching�Module�and�(ii)�
Biometric�System:�In�Crime�Prevention*Chandresh�D.�Parekh
*Asst.�Professor�(Telecommunication),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�University
Decision�Module.�Biometric�authentication�requires�comparing�a�registered�or�enrolled�biometric�sample�
against�a�newly�captured�biometric�sample,�the�one�captured�during�a�login.�
A�typical�biometric�system�is�comprised�of�five�integrated�components:�A�sensor�is�used�to�collect�the�data�
and� convert� the� information� to� a�digital� format.� Signal� processing� algorithms�perform�quality� control�
activities�and�develop�the�biometric� template.�A�data�storage�component�keeps� information�that�new�
biometric�templates�will�be�compared�to�biometric�template.�A�matching�algorithm�compares�the�new�
biometric�template�to�one�or�more�templates�kept�in�data�storage.�Finally,�a�decision�process�uses�the�result�
from�the�matching�component�to�make�a�system�level�decision.��
Objective� of� this� article� is� to� explore� the� information� about� biometric� system� and�new� application� of�
biometric�system�for�crime�prevention.�It�is�found�that�most�of�the�criminals�related�to�property�offenses�are�
repeated.�To�stop�such�repeated�crimes,�the�movement�of�criminals�to�be�monitored�first�for�further�action.�
Monitoring� of� criminals'� movement� is� important� but� not� feasible� to�move� behind� them� all� the� time.�
Biometric�system�is�used�to�monitor�their�movement�at� the�prominent�places�such�as�Shopping�Malls,�
Jewelers�shops,�Banks,�ATMs�etc.�which�are�normally�hot�spots�for�them�to�do�crimes.�Police�department�
should�create�the�database�of�biometric�samples�of�the�criminals�during�their�custody�and�make�available�to�
the�users�in�a�systematic�way.�There�are�many�security�provisions�have�been�forced�people�to�use�by�the�
government�such�as�CCTV�camera�system,� information�collection�of�servants,� information�collection�of�
renters.�Biometric�system�with�criminal�records�is�required�to�be�used�at�the�hot�spots.�Following�is�the�
pictorial�presentation�of�this�idea.�
This�idea�is�not�something�over�but�I�assure�that�
in�the�future,�no�one�will�need�pockets.�Things�
like�keys�or�cards,�however,�tend�to�get�stolen�
or� lost� and�passwords� are�often� forgotten�or�
disclosed.� Keys,� credit� cards,� checkbooks�will�
be�replaced�by�something�closer�to�the�body.�
When� you� need� to� open� a� door� or� make� a�
purchase,� chances� are� you� will� do� it� with� a�
fingerprint,�a�voice�command,�or�a�computer�
scan�of�your�eyeball.�
1514
Kavach:�The�Magazine�of�Raksha�Shakti�University
st21 �century�shouts�that�security� is�the�responsibility�of�all.�Development�of�communication�technology�has�
played�great� role� in� this� century� in�making�people� closer�&� closer� in� all� aspects.�Revolution�of�high� speed�
technology�in�internet�has�opened�many�fields�such�as�On-line�shopping,�E-banking,�E-governance�etc.,�These�E-
applications�have�created�challenges�in�the�identification�of�individual�and�to�authentic�the�access�to�the�system.�
There�are�many�identification�processes�but�biometric�identification�process�is�more�accurate�and�secure.�
Biometric�means�life�measurement�but�the�term�is�usually�associated�with�the�use�of�unique�physiological�
characteristics� identify� an� individual.� The� application�which�most� people� associate�with� biometrics� is�
security.�Knowing�the�person�with�whom�you�are�conversing�is�an�important�part�of�human�interaction�and�
one�expects�computers�of�the�future�to�have�the�same�capabilities.�A�number�of�biometric�traits�have�been�
developed� and� are�used� to� authenticate� the�person's� identity.� The�method�of� identification�based�on�
biometric�characteristics�is�preferred�over�traditional�passwords�and�PIN�based�methods�because�of�the�
person� to�be� identified� is� required� to�be�physically�present�at� the� time-of-identification.� Identification�
based�on�biometric�techniques�prevents�the�need�to�remember�a�password�or�carry�a�token.�A�biometric�
system�is�essentially�a�pattern�recognition�system�which�makes�a�personal�identification�by�determining�
the�authenticity�of�a�specific�physiological�or�behavioral�characteristic�possessed�by�the�user.�Biometric�
technologies�are�thus�defined�as�the�"automated�methods�of�identifying�or�authenticating�the�identity�of�a�
living�person�based�on�a�physiological�or�behavioral�characteristic".�
There� are�many� issues� for� the� discussion� and� consideration� to� implement� accurate� &� secure� biometric�
identification�system.�Selection�of�unique�characteristic�of�living�person�should�be�universal�and�seldom�lost�to�
accident�or�disease,�constant�over�a�long�time,�suitable�for�easy�capturing,�unique�to�the�individual,�acceptable�
to� a� large� percentage� of� the� population,� capable� of� being� reduced� to� size,� impractical� to� manipulate,�
irreproducible�and�perfect�to�maintain�privacy�of�the�person.�Among�the�various�biometric�technologies�being�
considered,� the� attributes� which� satisfy� the� above� requirements� are� fingerprint,� facial� features,� hand�
geometry,�voice,�iris,�retina,�vein�patterns,�palm�print,�DNA,�keystroke�dynamics,�ear�shape,�odor�etc.
A�biometric�system�can�be�classified�into�two�modules:�(i)�Database�Preparation�Module�and�(ii)�Verification�
Module.�The�Database�Preparation�Module�consists�of�two�sub-modules,�and�they�are�(i)�Enroll�Module�and�
(ii)�Training�Module�while�Verification�module�can�be�divided�into�two�modules�(i)�Matching�Module�and�(ii)�
Biometric�System:�In�Crime�Prevention*Chandresh�D.�Parekh
*Asst.�Professor�(Telecommunication),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�University
Decision�Module.�Biometric�authentication�requires�comparing�a�registered�or�enrolled�biometric�sample�
against�a�newly�captured�biometric�sample,�the�one�captured�during�a�login.�
A�typical�biometric�system�is�comprised�of�five�integrated�components:�A�sensor�is�used�to�collect�the�data�
and� convert� the� information� to� a�digital� format.� Signal� processing� algorithms�perform�quality� control�
activities�and�develop�the�biometric� template.�A�data�storage�component�keeps� information�that�new�
biometric�templates�will�be�compared�to�biometric�template.�A�matching�algorithm�compares�the�new�
biometric�template�to�one�or�more�templates�kept�in�data�storage.�Finally,�a�decision�process�uses�the�result�
from�the�matching�component�to�make�a�system�level�decision.��
Objective� of� this� article� is� to� explore� the� information� about� biometric� system� and�new� application� of�
biometric�system�for�crime�prevention.�It�is�found�that�most�of�the�criminals�related�to�property�offenses�are�
repeated.�To�stop�such�repeated�crimes,�the�movement�of�criminals�to�be�monitored�first�for�further�action.�
Monitoring� of� criminals'� movement� is� important� but� not� feasible� to�move� behind� them� all� the� time.�
Biometric�system�is�used�to�monitor�their�movement�at� the�prominent�places�such�as�Shopping�Malls,�
Jewelers�shops,�Banks,�ATMs�etc.�which�are�normally�hot�spots�for�them�to�do�crimes.�Police�department�
should�create�the�database�of�biometric�samples�of�the�criminals�during�their�custody�and�make�available�to�
the�users�in�a�systematic�way.�There�are�many�security�provisions�have�been�forced�people�to�use�by�the�
government�such�as�CCTV�camera�system,� information�collection�of�servants,� information�collection�of�
renters.�Biometric�system�with�criminal�records�is�required�to�be�used�at�the�hot�spots.�Following�is�the�
pictorial�presentation�of�this�idea.�
This�idea�is�not�something�over�but�I�assure�that�
in�the�future,�no�one�will�need�pockets.�Things�
like�keys�or�cards,�however,�tend�to�get�stolen�
or� lost� and�passwords� are�often� forgotten�or�
disclosed.� Keys,� credit� cards,� checkbooks�will�
be�replaced�by�something�closer�to�the�body.�
When� you� need� to� open� a� door� or� make� a�
purchase,� chances� are� you� will� do� it� with� a�
fingerprint,�a�voice�command,�or�a�computer�
scan�of�your�eyeball.�
1514
Kavach:�The�Magazine�of�Raksha�Shakti�University
Post-independence,� India� has� witnessed� many� secessionist� movements� and� has� long� suffered� from�
extremist�attacks.�The�very�notion�of�secessionism�disturbs�the�territorial�integrity�and�unity�of�a�country.�In�
order� to� curb� the� secessionist� activities� of� the�militants,� the� Indian� government� under�Nehru� in� 1958�
implemented�the�Armed�Forces�Special�Powers�Act�(AFSPA)¹�in�1958�in�North�east�area�to�maintain�the�
public�order�in�the�disturbed�area²�where�violence�became�the�way�of�life.�Subsequently,�the�Parliament�
also�enacted�the�Armed�Forces�(Jammu�and�Kashmir)�Special�Powers�Act-1990�for�the�state�of�Jammu�&�
Kashmir,�which�came�into�effect�on�July�05,�1990.�It's�a�bare�law�having�6�sections�only.
Section� 3� that� contemplates� powers� to� declare� areas� to� be� disturbed� areas� cannot� be� construed� as�
conferring�a�power�to�issue�a�declaration�without�any�time�limit.� �There�should�be�periodic�review�of�the�
declaration�before�the�expiry�of�six�months.³�
The� very� nature� and� dimensions� of� violence� that� prevails� during� peak� periods� of� insurgency� and� the�
methods� and� means� required� to� combat� these.� Insurgency� in� its� virulent� form� totally� paralyses� the�
administration�and� results� in� collapse�of� law-and-order�machinery� in� the�affected�areas.But� today�our�
country�is�in�such�a�phase�that�does�not�require�any�special�law�for�the�purpose�of�maintenance�of�public�
order.�General�laws�are�sufficient�enough�to�tackle�the�issue�as�the�provision�available�under�Cr.P.C.�and�
constitution�of�India.�
�It�poses�a�question�whether�as�of�now�problem�still�remains�unchanged�as�it�was�in�sixty�decades.�The�
researcher�laments�that�it's�not�like�that.�The�real�issue�is�not�whether�the�armed�forces�can�be�deployed�
against�civil�disturbances.�The�ordinary�law�too�permits�it,�in�section�130�of�the�Cr.P.C.⁴�The�real�question�is�
under�what�circumstances,�and�with�what�powers.�The�ordinary�law�permits�the�armed�forces�to�be�used�
only�against�an�unlawful�assembly,�which�cannot�otherwise�be�dispersed,�only�in�individual�instances,�and�
normally�at�the�order�of�an�executive�magistrate.�What�is�contemplated�by�AFSPA�is�the�continuous�use�of�
Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil
�¹Indian�defense�review;�Issue:�Net�Edition|�Date�26�Sep�,�2014;�AFSPA�:�A�Delusion�or�Dilemma�By�Anant�Mishra²�Sec-2(b)disturbed�area'�means�an�area�which�is�for�the�time�being�declared�by�notification�under�section�3�to�be�a�disturbed�area.It�is�must�to�mention�section-3�as�“If,�in�relation�to�any�state�or�Union�Territory�to�which�this�act�extends,�the�Governor�of�that�State�or�the�administrator�of�that�Union�Territory�or�the�Central�Government,�in�either�case,�if�of�the�opinion�that�the�whole�or�any�part�of�such�State�of�Union�territory,�as�the�case�may�be,�is�in�such�a�disturbed�or�dangerous�condition�that�the�use�of�armed�forces�in�aid�of�the�civil�power�is�necessary,�the�Governor�of��that�State�or�the�Administrator�of�that�Union�Territory�or�the�Central��Government,�as�the�case�may�be�,�may�by�notification�in�the�Official�Gazette,�declare�the�whole�or�such�part�of�such�State�or�Union�territory�to�be�a�disturbed�area].³Naga�People's�Movement�of�Human�Rights�v.�Union�of�India,�AIR�1998�SC�431.⁴Use�of�armed�forces�to�disperse�assembly.⁵�http://www.combatlaw.org/justice-jeevan-reddy-report-on-afspa-the-evil-is-intact/�accessed�on�24/02/15
Dr.�Anand�Kumar�TripathiAsst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�University
the�armed�forces�over�an�area�of�land,�with�the�power�to�open�fire�on�suspicion�on�individuals�and�not�just�
riotous�mobs,�and�under�its�own�authority.⁵
What�procedure�to�be�followed�in�arresting�a�person�under�AFSPA⁶?�The�provision�is�draconian�as�it�does�not�
meet�the�guidelines�laid�down�by�S�C�in�D.�K.�Basu�case.�Time�line�must�be�framed�in�the�existing�provision�
otherwise�there�might�be�every�possibility�of�misuse�of� the�power.�Provision�must�be�similar� to�Cr.P.C.�
Section�57⁷�in�this�regard.
To�a�layman,�AFSPA�indeed�sounds�like�awarding�the�'Right�to�Kill'�to�our�armed�forces.�But�it�is�the�contents�
of�the�act�that�are�flawed�and�misty.
Firstly,�it�makes�no�distinction�between�a�peaceful�gathering�of�five�or�more�people�and�a�berserk�mob.�So,�
even�innocents�‒�who�have�no�role�in�creating�a�situation�that�results�in�that�region�being�called�'disturbed',�
also�come�under�the�purview�of�the�law.
Secondly,�the�law�also�states�that,�“no�prosecution�can�be�initiated�against�an�officer�without�the�previous�
sanction�of�the�Central�government”.�Purportedly,�the�logic�behind�the�inclusion�of�this�section�is,�to�protect�
the�officers�from�frivolous�and�misguided�allegations.�The�government�is�usually�not�very�fluid�in�giving�this�
much-needed�sanction,�in�order�to�express�their�faith�in�the�armed�forces�and�protect�their�interests.
Counter-insurgency�operations�are�a�messy�affair�and�chances�of� the� innocent�coming� in� the�crossfire�
between�the�army�and�insurgents�are�always�high.
Thirdly,�the�decision�of�the�government�to�declare�a�particular�area�'disturbed'�cannot�be�challenged�in�a�
court�of�law.�This�has�been�the�heart�of�the�problem.�As�the�recent�situation�in�Kashmir�seems�to�go�out�of�
hand,�leaders�have�now�suggested�that�the�act�must�be�repealed�from�certain�provinces�‒�citing�the�reason�
that�the�imminent�threat,�due�to�which�AFSPA�was�enforced�in�that�province�in�the�first�place,�has�been�
neutralized�over� the� years.� The� reasoning� seems� rather� specious� ‒� it� is� nothing�more� than� a� tactic� to�
appease�the�population�and�pacify�their�agitated�sentiments.�Antagonists�of�the�Act�ask�if�the�threat�has�
indeed�been�neutralized,�then�why�not�declare�the�region�as�'not�disturbed',�which�will�by�itself�conclude�
the�role�of�the�army?⁸
Reddy�committee�was�constituted�for�overall�evaluation�of�AFSPA.�The�committee�not�only�recommended�
⁶�Any�person�arrested�and�taken�into�custody�under�this�Act�shall�be�made�over�to�the�officer�in�charge�of�the�nearest�police�station�with�the�least�possible�delay,�together�with�a�report�of�the�circumstances�occasioning�the�arrest�⁷Person�arrested�not�to�be�detained�more�than�twenty-�four�hours.�⁸�Ibid�note:1
1716
Kavach:�The�Magazine�of�Raksha�Shakti�University
Post-independence,� India� has� witnessed� many� secessionist� movements� and� has� long� suffered� from�
extremist�attacks.�The�very�notion�of�secessionism�disturbs�the�territorial�integrity�and�unity�of�a�country.�In�
order� to� curb� the� secessionist� activities� of� the�militants,� the� Indian� government� under�Nehru� in� 1958�
implemented�the�Armed�Forces�Special�Powers�Act�(AFSPA)¹�in�1958�in�North�east�area�to�maintain�the�
public�order�in�the�disturbed�area²�where�violence�became�the�way�of�life.�Subsequently,�the�Parliament�
also�enacted�the�Armed�Forces�(Jammu�and�Kashmir)�Special�Powers�Act-1990�for�the�state�of�Jammu�&�
Kashmir,�which�came�into�effect�on�July�05,�1990.�It's�a�bare�law�having�6�sections�only.
Section� 3� that� contemplates� powers� to� declare� areas� to� be� disturbed� areas� cannot� be� construed� as�
conferring�a�power�to�issue�a�declaration�without�any�time�limit.� �There�should�be�periodic�review�of�the�
declaration�before�the�expiry�of�six�months.³�
The� very� nature� and� dimensions� of� violence� that� prevails� during� peak� periods� of� insurgency� and� the�
methods� and� means� required� to� combat� these.� Insurgency� in� its� virulent� form� totally� paralyses� the�
administration�and� results� in� collapse�of� law-and-order�machinery� in� the�affected�areas.But� today�our�
country�is�in�such�a�phase�that�does�not�require�any�special�law�for�the�purpose�of�maintenance�of�public�
order.�General�laws�are�sufficient�enough�to�tackle�the�issue�as�the�provision�available�under�Cr.P.C.�and�
constitution�of�India.�
�It�poses�a�question�whether�as�of�now�problem�still�remains�unchanged�as�it�was�in�sixty�decades.�The�
researcher�laments�that�it's�not�like�that.�The�real�issue�is�not�whether�the�armed�forces�can�be�deployed�
against�civil�disturbances.�The�ordinary�law�too�permits�it,�in�section�130�of�the�Cr.P.C.⁴�The�real�question�is�
under�what�circumstances,�and�with�what�powers.�The�ordinary�law�permits�the�armed�forces�to�be�used�
only�against�an�unlawful�assembly,�which�cannot�otherwise�be�dispersed,�only�in�individual�instances,�and�
normally�at�the�order�of�an�executive�magistrate.�What�is�contemplated�by�AFSPA�is�the�continuous�use�of�
Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil
�¹Indian�defense�review;�Issue:�Net�Edition|�Date�26�Sep�,�2014;�AFSPA�:�A�Delusion�or�Dilemma�By�Anant�Mishra²�Sec-2(b)disturbed�area'�means�an�area�which�is�for�the�time�being�declared�by�notification�under�section�3�to�be�a�disturbed�area.It�is�must�to�mention�section-3�as�“If,�in�relation�to�any�state�or�Union�Territory�to�which�this�act�extends,�the�Governor�of�that�State�or�the�administrator�of�that�Union�Territory�or�the�Central�Government,�in�either�case,�if�of�the�opinion�that�the�whole�or�any�part�of�such�State�of�Union�territory,�as�the�case�may�be,�is�in�such�a�disturbed�or�dangerous�condition�that�the�use�of�armed�forces�in�aid�of�the�civil�power�is�necessary,�the�Governor�of��that�State�or�the�Administrator�of�that�Union�Territory�or�the�Central��Government,�as�the�case�may�be�,�may�by�notification�in�the�Official�Gazette,�declare�the�whole�or�such�part�of�such�State�or�Union�territory�to�be�a�disturbed�area].³Naga�People's�Movement�of�Human�Rights�v.�Union�of�India,�AIR�1998�SC�431.⁴Use�of�armed�forces�to�disperse�assembly.⁵�http://www.combatlaw.org/justice-jeevan-reddy-report-on-afspa-the-evil-is-intact/�accessed�on�24/02/15
Dr.�Anand�Kumar�TripathiAsst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�University
the�armed�forces�over�an�area�of�land,�with�the�power�to�open�fire�on�suspicion�on�individuals�and�not�just�
riotous�mobs,�and�under�its�own�authority.⁵
What�procedure�to�be�followed�in�arresting�a�person�under�AFSPA⁶?�The�provision�is�draconian�as�it�does�not�
meet�the�guidelines�laid�down�by�S�C�in�D.�K.�Basu�case.�Time�line�must�be�framed�in�the�existing�provision�
otherwise�there�might�be�every�possibility�of�misuse�of� the�power.�Provision�must�be�similar� to�Cr.P.C.�
Section�57⁷�in�this�regard.
To�a�layman,�AFSPA�indeed�sounds�like�awarding�the�'Right�to�Kill'�to�our�armed�forces.�But�it�is�the�contents�
of�the�act�that�are�flawed�and�misty.
Firstly,�it�makes�no�distinction�between�a�peaceful�gathering�of�five�or�more�people�and�a�berserk�mob.�So,�
even�innocents�‒�who�have�no�role�in�creating�a�situation�that�results�in�that�region�being�called�'disturbed',�
also�come�under�the�purview�of�the�law.
Secondly,�the�law�also�states�that,�“no�prosecution�can�be�initiated�against�an�officer�without�the�previous�
sanction�of�the�Central�government”.�Purportedly,�the�logic�behind�the�inclusion�of�this�section�is,�to�protect�
the�officers�from�frivolous�and�misguided�allegations.�The�government�is�usually�not�very�fluid�in�giving�this�
much-needed�sanction,�in�order�to�express�their�faith�in�the�armed�forces�and�protect�their�interests.
Counter-insurgency�operations�are�a�messy�affair�and�chances�of� the� innocent�coming� in� the�crossfire�
between�the�army�and�insurgents�are�always�high.
Thirdly,�the�decision�of�the�government�to�declare�a�particular�area�'disturbed'�cannot�be�challenged�in�a�
court�of�law.�This�has�been�the�heart�of�the�problem.�As�the�recent�situation�in�Kashmir�seems�to�go�out�of�
hand,�leaders�have�now�suggested�that�the�act�must�be�repealed�from�certain�provinces�‒�citing�the�reason�
that�the�imminent�threat,�due�to�which�AFSPA�was�enforced�in�that�province�in�the�first�place,�has�been�
neutralized�over� the� years.� The� reasoning� seems� rather� specious� ‒� it� is� nothing�more� than� a� tactic� to�
appease�the�population�and�pacify�their�agitated�sentiments.�Antagonists�of�the�Act�ask�if�the�threat�has�
indeed�been�neutralized,�then�why�not�declare�the�region�as�'not�disturbed',�which�will�by�itself�conclude�
the�role�of�the�army?⁸
Reddy�committee�was�constituted�for�overall�evaluation�of�AFSPA.�The�committee�not�only�recommended�
⁶�Any�person�arrested�and�taken�into�custody�under�this�Act�shall�be�made�over�to�the�officer�in�charge�of�the�nearest�police�station�with�the�least�possible�delay,�together�with�a�report�of�the�circumstances�occasioning�the�arrest�⁷Person�arrested�not�to�be�detained�more�than�twenty-�four�hours.�⁸�Ibid�note:1
1716
Kavach:�The�Magazine�of�Raksha�Shakti�University
AFSPA's�repeal�but�also�proposed�a�legal�mechanism�by�which�the�Army�could�be�used�in�extraordinary�
situations�involving�national�security?�Our�essential�recommendation�was�that�no�one�could�be�above�the�
law;�everyone�must�be�equal�before�and�under�it
Today,�the�situation�has�become�much�more�complex�because�the�window�of�opportunity�provided�by�the�
Reddy�Committee�has�virtually�closed.�Debate�is�still�on�the�relevance�of�AFSPA.�Irom�Sharmila�Chanu,�a�
human�rights�activist,�has�been�on�indefinite�hunger�strike�for�nearly�a�decade�in�Manipur,�demanding�the�
withdrawal�of�the�AFSPA�from�the�state�but�her�voice�is�being�unheard.�She�told�“I�will�continue�my�struggle�
until�the�tough�act�is�repealed.�My�struggle�proves�that�I�am�right,�justice�has�been�upheld�finally.”�She�
further�added,�“I�need�people's�support,”
The�AFSPA,�described�by�critics�as�a� “draconian� law”,�also�allows� the�army�and� the�paramilitary� forces�
operating�in�areas�declared�as�“disturbed”�by�the�home�ministry�to�take�whatever�action�they�deem�fit�
against�terrorists.⁹
In�the�opinion�of�researcher�AFSPA�should�be�repealed�because�prolonged�use�of�the�AFSPA�has�alienated�
the�civil�society.�There�is�no�need�of�separate�law�to�combat�the�raised�issue�under�AFSPA�as�it�provides�
unbridled�power�to�the�Government.�It�is�submitted�that�“all�power�tends�to�corrupt�and�absolute�power�
corrupts�absolutely¹⁰,�the�same�is�with�AFSPA�in�terms�of�providing�unbridled�power�to�the�authorities.�It�is�
shameful� for� all� of� us� as� it� remembers� the� very� draconian� Act� i.e.”Rowlatt� Act”.� This� Act� invested�
Government�with�powers�to�arrest�and�detain�anyone�without�assigning�reason.�All�rights,�enjoyed�so�far�
were�scrapped�and�there�was�“No�Vakil,�No�appeal,�No�dalil”�(No�pleader,�No�argument,�No�appeal).
⁹��http://indiatoday.intoday.in/story/irom-sharmila-rearrested-afspa-imphal-manipur/1/378365.html�accessed�on�25/02/15¹⁰�Lord�Acton,�the�British�historian.
Kavach:�The�Magazine�of�Raksha�Shakti�University
Introduction
In�India,�Electronic�Commerce�(�E-Commerce)�websites�and�shopping�online�are�increasing�day�by�day.� �The�
digits�of�online�shopping�are�breaking�records�since�last�2�years.�Flipkart,�Snapdeal,�Jabong,�Myntra�and�other�
more�than�300+�e-commerce�websites�are�getting�popularity�in�online�shopping�in�India.�In�E-Commerce,�
buying�and�selling�of�products�and�services�between�companies�and�consumers�are�through�electronic�means�
typically� through� Internet,� without� using� paper� documents.� These� exchanges� are� usually� transactions�
between�businesses�and�consumers,�where�consumers�buy�products�and�services�to�pay�by�credit�card�on�a�
secure�website.� These�paperless� E-commerce� transactions� are� divided� into� three� categories:� Business� to�
Business�or�B2B�(Cisco),�Business�to�Consumer�or�B2C�(Amazons)�and�Consumer�to�Consumer�or�C2C�(eBay).�
E-Commerce�can�be�very�beneficial�to�Universities,�Colleges�and�Academic�institutions.� �In�Raksha�Shakti�
University�purchasing�is�demarcated�into�following�sections:�Office�Administration�section,�Store�section�
and�Library�section�and�payment�transactions�are�done�in�Account�department.�Items�like�Transportation�
(Vehicles�namely�Buses,�Cars�and�Bikes),�Office�equipment�(Computer,�printer�and�others)�and�Furniture�
(Tables,�chairs,�cupboards,�Air�conditioners)�are�covered�in�Office�Section.�Store�section�specific�role�is�to�
purchase�day�to�day�utilization�items�like�stationary�items,�notice�boards�etc.�In�library�books�are�purchased�
and�journals�are�subscribed.�Also,�selling�of�old�and�obsolete�items�can�be�done�online.��
All�these�transactions�can�be�carried�out�online�with�cautious�approach�and�also�keeping�in�mind�limitations�
of��E-commerce.�This�is�significant�owing�to�the�fact�that�we�are�living�in�a�virtual�Cyber�-World�of�Computers�
and�Mobiles�that�has�hidden�threats�on�confidentiality,�integrity,�denial�of�service,�authentication,�etc.�This�
article�focuses�on�threats�of�E-commerce�and�suggests�some�salient�points�for�successful�and�smooth�E-
Commerce�process�execution.�The�basic�workflow�of�E-Commerce�is�as�indicated�below:
E-Commerce�Threats�*Dr.�Priyanka�Sharma
*Professor�(IT),�Raksha�Shakti�University,�Ahmedabad
1918
Kavach:�The�Magazine�of�Raksha�Shakti�University
AFSPA's�repeal�but�also�proposed�a�legal�mechanism�by�which�the�Army�could�be�used�in�extraordinary�
situations�involving�national�security?�Our�essential�recommendation�was�that�no�one�could�be�above�the�
law;�everyone�must�be�equal�before�and�under�it
Today,�the�situation�has�become�much�more�complex�because�the�window�of�opportunity�provided�by�the�
Reddy�Committee�has�virtually�closed.�Debate�is�still�on�the�relevance�of�AFSPA.�Irom�Sharmila�Chanu,�a�
human�rights�activist,�has�been�on�indefinite�hunger�strike�for�nearly�a�decade�in�Manipur,�demanding�the�
withdrawal�of�the�AFSPA�from�the�state�but�her�voice�is�being�unheard.�She�told�“I�will�continue�my�struggle�
until�the�tough�act�is�repealed.�My�struggle�proves�that�I�am�right,�justice�has�been�upheld�finally.”�She�
further�added,�“I�need�people's�support,”
The�AFSPA,�described�by�critics�as�a� “draconian� law”,�also�allows� the�army�and� the�paramilitary� forces�
operating�in�areas�declared�as�“disturbed”�by�the�home�ministry�to�take�whatever�action�they�deem�fit�
against�terrorists.⁹
In�the�opinion�of�researcher�AFSPA�should�be�repealed�because�prolonged�use�of�the�AFSPA�has�alienated�
the�civil�society.�There�is�no�need�of�separate�law�to�combat�the�raised�issue�under�AFSPA�as�it�provides�
unbridled�power�to�the�Government.�It�is�submitted�that�“all�power�tends�to�corrupt�and�absolute�power�
corrupts�absolutely¹⁰,�the�same�is�with�AFSPA�in�terms�of�providing�unbridled�power�to�the�authorities.�It�is�
shameful� for� all� of� us� as� it� remembers� the� very� draconian� Act� i.e.”Rowlatt� Act”.� This� Act� invested�
Government�with�powers�to�arrest�and�detain�anyone�without�assigning�reason.�All�rights,�enjoyed�so�far�
were�scrapped�and�there�was�“No�Vakil,�No�appeal,�No�dalil”�(No�pleader,�No�argument,�No�appeal).
⁹��http://indiatoday.intoday.in/story/irom-sharmila-rearrested-afspa-imphal-manipur/1/378365.html�accessed�on�25/02/15¹⁰�Lord�Acton,�the�British�historian.
Kavach:�The�Magazine�of�Raksha�Shakti�University
Introduction
In�India,�Electronic�Commerce�(�E-Commerce)�websites�and�shopping�online�are�increasing�day�by�day.� �The�
digits�of�online�shopping�are�breaking�records�since�last�2�years.�Flipkart,�Snapdeal,�Jabong,�Myntra�and�other�
more�than�300+�e-commerce�websites�are�getting�popularity�in�online�shopping�in�India.�In�E-Commerce,�
buying�and�selling�of�products�and�services�between�companies�and�consumers�are�through�electronic�means�
typically� through� Internet,� without� using� paper� documents.� These� exchanges� are� usually� transactions�
between�businesses�and�consumers,�where�consumers�buy�products�and�services�to�pay�by�credit�card�on�a�
secure�website.� These�paperless� E-commerce� transactions� are� divided� into� three� categories:� Business� to�
Business�or�B2B�(Cisco),�Business�to�Consumer�or�B2C�(Amazons)�and�Consumer�to�Consumer�or�C2C�(eBay).�
E-Commerce�can�be�very�beneficial�to�Universities,�Colleges�and�Academic�institutions.� �In�Raksha�Shakti�
University�purchasing�is�demarcated�into�following�sections:�Office�Administration�section,�Store�section�
and�Library�section�and�payment�transactions�are�done�in�Account�department.�Items�like�Transportation�
(Vehicles�namely�Buses,�Cars�and�Bikes),�Office�equipment�(Computer,�printer�and�others)�and�Furniture�
(Tables,�chairs,�cupboards,�Air�conditioners)�are�covered�in�Office�Section.�Store�section�specific�role�is�to�
purchase�day�to�day�utilization�items�like�stationary�items,�notice�boards�etc.�In�library�books�are�purchased�
and�journals�are�subscribed.�Also,�selling�of�old�and�obsolete�items�can�be�done�online.��
All�these�transactions�can�be�carried�out�online�with�cautious�approach�and�also�keeping�in�mind�limitations�
of��E-commerce.�This�is�significant�owing�to�the�fact�that�we�are�living�in�a�virtual�Cyber�-World�of�Computers�
and�Mobiles�that�has�hidden�threats�on�confidentiality,�integrity,�denial�of�service,�authentication,�etc.�This�
article�focuses�on�threats�of�E-commerce�and�suggests�some�salient�points�for�successful�and�smooth�E-
Commerce�process�execution.�The�basic�workflow�of�E-Commerce�is�as�indicated�below:
E-Commerce�Threats�*Dr.�Priyanka�Sharma
*Professor�(IT),�Raksha�Shakti�University,�Ahmedabad
1918
Kavach:�The�Magazine�of�Raksha�Shakti�University
E-Commerce�&�Online�Fraud
The�following�is�the�list�of�common�frauds�that�may�occur�at�the�time�of�online�shopping:
1.��Card�Fraud�
This�is�probably�the�most�common�of�online�scams.�Essentially�a�thief�gets�their�hands�on�someoneʼs�card�
details�and�uses�those�to�pay�for�goods�on�the�Internet.�With�schemes�such�as�3D�Secure�(“Verified�by�Visa”�
or�“MasterCard�SecureCode”)�most�consumers�will�have�set�up�a�special�password�to�protect�themselves�
from�such�occurrences.��If�we�feel�that�the�person�using�a�card�is�potentially�a�thief,�we�can�simply�refuse�to�
authorise�the�purchase.��
2.��The�Man-in-the-Middle�Attack�
This�is�where�a�cyber-criminal�eavesdrops�on�a�session�between�shop�and�the�customer�and�records�the�
Kavach:�The�Magazine�of�Raksha�Shakti�University
cardholder�data�being�exchanged.�The�best�way�to�stop�such�attempts�is�by�using�an�Third�Party�certificate.�
All�payment�service�providers�will�use�such�protection�on�their�payment�gateways�and�we�will�also�need�to�
obtain�one�our�your�website.�This�will�eradicate�most�attacks.
3.��Hacking
This�is�a�very�bad�scenario�where�a�fraudster�gains�access�to�the�control�tools�of�website.�This�gives�them�
unrestricted�access�to�all�of�the�pages,�including�the�payment�page.�We�can�minimise�the�damage�from�such�
an�attack�by�allowing�our�payments�provider�to�host� �payments�page�on�their�server.�From�our�end�we�
should�always�ensure�that�we�use�the�latest�version�of�the�Content�Management�System�(CMS)�on�which�
website�is�built�and�that�whether�hosting�is�secure.�Regularly�changing�passwords�to�website�and�making�
sure�that�any�third�party�software�and�plug-in�which�is�in�use�is�also�secure�and�trustworthy.
4.��Malicious�Code�
There�are�different�types�of�malware�used�by�criminals.�The�most�common�include�key�loggers�or�spyware�
(captures�data�as�the�user�enters�it),�backdoor�(gives�the�hacker�remote�access�to�your�computer),�command�
and�control�(looks�for�and�executes�commands).�The�best�way�to�protect�from�such�attacks�is�to�keep�any�
software�on�computer�up�to�date,�use�an�anti-virus�programme�and�perform�regular�scans�on�our�machine.
5.��Phishing
Phishing�is�usually�attempted�in�the�form�of�an�email�appearing�to�be�from�a�trusted�website.�The�email�
could�appear�to�be�from�bank,�a�popular�internet�site�such�as�Paypal�or�EBay,�or�sometimes�it�could�even�
appear�to�be�from�the�Internal�Revenue�Service.�Phishing�attempt�could�come�masquerading�as�any�of�
trusted�websites.�There�are�a�few�common�traits�throughout�all�email�Phishing�attempts�that�we�should�be�
2120
Kavach:�The�Magazine�of�Raksha�Shakti�University
E-Commerce�&�Online�Fraud
The�following�is�the�list�of�common�frauds�that�may�occur�at�the�time�of�online�shopping:
1.��Card�Fraud�
This�is�probably�the�most�common�of�online�scams.�Essentially�a�thief�gets�their�hands�on�someoneʼs�card�
details�and�uses�those�to�pay�for�goods�on�the�Internet.�With�schemes�such�as�3D�Secure�(“Verified�by�Visa”�
or�“MasterCard�SecureCode”)�most�consumers�will�have�set�up�a�special�password�to�protect�themselves�
from�such�occurrences.��If�we�feel�that�the�person�using�a�card�is�potentially�a�thief,�we�can�simply�refuse�to�
authorise�the�purchase.��
2.��The�Man-in-the-Middle�Attack�
This�is�where�a�cyber-criminal�eavesdrops�on�a�session�between�shop�and�the�customer�and�records�the�
Kavach:�The�Magazine�of�Raksha�Shakti�University
cardholder�data�being�exchanged.�The�best�way�to�stop�such�attempts�is�by�using�an�Third�Party�certificate.�
All�payment�service�providers�will�use�such�protection�on�their�payment�gateways�and�we�will�also�need�to�
obtain�one�our�your�website.�This�will�eradicate�most�attacks.
3.��Hacking
This�is�a�very�bad�scenario�where�a�fraudster�gains�access�to�the�control�tools�of�website.�This�gives�them�
unrestricted�access�to�all�of�the�pages,�including�the�payment�page.�We�can�minimise�the�damage�from�such�
an�attack�by�allowing�our�payments�provider�to�host� �payments�page�on�their�server.�From�our�end�we�
should�always�ensure�that�we�use�the�latest�version�of�the�Content�Management�System�(CMS)�on�which�
website�is�built�and�that�whether�hosting�is�secure.�Regularly�changing�passwords�to�website�and�making�
sure�that�any�third�party�software�and�plug-in�which�is�in�use�is�also�secure�and�trustworthy.
4.��Malicious�Code�
There�are�different�types�of�malware�used�by�criminals.�The�most�common�include�key�loggers�or�spyware�
(captures�data�as�the�user�enters�it),�backdoor�(gives�the�hacker�remote�access�to�your�computer),�command�
and�control�(looks�for�and�executes�commands).�The�best�way�to�protect�from�such�attacks�is�to�keep�any�
software�on�computer�up�to�date,�use�an�anti-virus�programme�and�perform�regular�scans�on�our�machine.
5.��Phishing
Phishing�is�usually�attempted�in�the�form�of�an�email�appearing�to�be�from�a�trusted�website.�The�email�
could�appear�to�be�from�bank,�a�popular�internet�site�such�as�Paypal�or�EBay,�or�sometimes�it�could�even�
appear�to�be�from�the�Internal�Revenue�Service.�Phishing�attempt�could�come�masquerading�as�any�of�
trusted�websites.�There�are�a�few�common�traits�throughout�all�email�Phishing�attempts�that�we�should�be�
2120
Kavach:�The�Magazine�of�Raksha�Shakti�University
especially�aware�of,�the�first�being�they�will�always�ask�for�personal�information.�Legitimate�companies�will�
never�ask�for� �confidential�information�via�email.�Phishing�scams�are�also�likely�to�play�on�emotions.�They�
might�express�a�sense�of�urgency.�"You�have�48�hours�to�reply�or�your�account�will�be�closed!"�They�might�
perhaps� offer� you� something� at� an� extremely� reduced� rate� if� you� "update� your� personal� information�
immediately!"�Or�my�personal�favourite,�they�tell�that�a�person�have�been�targeted�by�a�scam�and�need�to�
update�our�personal�information�to�keep�safe.�
The�best�way�to�prevent�Phishing�is�to�simply�ignore�any�email�asking�for�personal�information.�Instead,�pick�
up�the�phone�and�contact�bank�or�the�company�involved�to�talk�to�an�employee.�Log�into�the�site�directly�
from�bookmark�is�instead�of�through�the�emails�link,�and�check�to�see�if�there�really�is�an�issue�that�needs�our�
attention.�Common�sense�wins�every�time.�Having�some�form�of�online�protection�would�be�to�advantage,�
even�the�most�internet�savvy�user�can�get�fooled�by�these�ever�increasingly�sophisticated�attempts�to�steal�
our�personal�information.
Anti�Phishing�software�as�part�of�your�anti�virus�software�package�is�a�good�form�of�protection;�they�will�check�
emails�for�possible�attacks�and�call�attention�towards�any�suspicious�sites.�Norton,�AVG�and�MacAfee�anti�virus�
software�offer�good�Phishing�protection�along�with�some�of�the�best�anti�virus�capabilities�that�exist.
E-COMMERCE�SECURITY�TOOLS�•�Firewalls�‒�Software�and�Hardware�•�Public�Key�infrastructure�•�Encryption�
software� •� Digital� certificates� •� Digital� Signatures� •� Biometrics� ‒� retinal� scan,� fingerprints,� voice� etc� •�
Passwords�•�Locks�and�bars�‒�network�operations�centers
Kavach:�The�Magazine�of�Raksha�Shakti�University
Preventing�of��E-commerce�threats
ª Use�only�Familiar�Websites�instead�of�accessing�unknown�webs.
ª Never�use�website�which�is�not�having�SSL�(Secure�Socket�Layer)�encryption.
ª Don't�give�your�social�security�number�and�your�birth�date�as�it�is�not�required�for�online�shopping.
ª Check�Statements�and�don't�wait�for�bill�to�come�at�the�end�of�statement.
ª Inoculate�PC�by�regular�updating�your�antivirus.
ª Usage�of�Strong�Passwords�which�is�difficult�for�other�to�crack.
ª While�online�shopping�through�mobile,�not�to��use�anything�apart�form�application�provided�directly�by�
retailer.
ª Never�use�public�terminal�while�online�shopping.
ª Privatization�of�Wi-Fi�instead�of�make�it�accessible�publicly.
ª Count�the�Cards�of�gifts�and�our�applicability.�It�is�not�possible�that�we�are�getting�extra�gifts�by�this�year�
specially.�
ª Know�What's�Too�Good�to�Be�True�while�getting�from�social�media�or�directly�from�your�friend�overseas.
Conclusion
The� E-commerce� industry� is� slowly� addressing� security� issues�on� their� internal� networks�by�providing�
guidelines�for�securing�systems�and�networks.�Educating�the�consumer�on�security� issues� is�still� in�the�
infancy�stage�but�will�prove�to�be�the�most�critical�element�of�the�e-commerce�security�architecture.�
References
1.� �Greg�Megaw�&�Stephen�V.�Flowerday� (2010)� 'Phishing�within�E-Commerce:�A�Trust�and�Confidence�
Game',�IEEE�Journal�of�Computer�science.�
2.� �Nina�Godbole,�Sunit�Belapur,�“Cyber�Security�Understanding�Cyber�Crimes,�Computer�Forensics�and�
Legal�Perspectives”,�Wiley�India�Publications,�April�2011
3.� �Randy�C.�Marchany�&�Joseph�G.�Tront�(2002)� 'E-Commerce�Security� Issues� ',Proceedings�of�the�35th�
Hawaii�International�Conference�on�System�Sciences
4.���www.ecommerce-web-hosting-guide.com
5.���www.techcricklets.com
2322
Kavach:�The�Magazine�of�Raksha�Shakti�University
especially�aware�of,�the�first�being�they�will�always�ask�for�personal�information.�Legitimate�companies�will�
never�ask�for� �confidential�information�via�email.�Phishing�scams�are�also�likely�to�play�on�emotions.�They�
might�express�a�sense�of�urgency.�"You�have�48�hours�to�reply�or�your�account�will�be�closed!"�They�might�
perhaps� offer� you� something� at� an� extremely� reduced� rate� if� you� "update� your� personal� information�
immediately!"�Or�my�personal�favourite,�they�tell�that�a�person�have�been�targeted�by�a�scam�and�need�to�
update�our�personal�information�to�keep�safe.�
The�best�way�to�prevent�Phishing�is�to�simply�ignore�any�email�asking�for�personal�information.�Instead,�pick�
up�the�phone�and�contact�bank�or�the�company�involved�to�talk�to�an�employee.�Log�into�the�site�directly�
from�bookmark�is�instead�of�through�the�emails�link,�and�check�to�see�if�there�really�is�an�issue�that�needs�our�
attention.�Common�sense�wins�every�time.�Having�some�form�of�online�protection�would�be�to�advantage,�
even�the�most�internet�savvy�user�can�get�fooled�by�these�ever�increasingly�sophisticated�attempts�to�steal�
our�personal�information.
Anti�Phishing�software�as�part�of�your�anti�virus�software�package�is�a�good�form�of�protection;�they�will�check�
emails�for�possible�attacks�and�call�attention�towards�any�suspicious�sites.�Norton,�AVG�and�MacAfee�anti�virus�
software�offer�good�Phishing�protection�along�with�some�of�the�best�anti�virus�capabilities�that�exist.
E-COMMERCE�SECURITY�TOOLS�•�Firewalls�‒�Software�and�Hardware�•�Public�Key�infrastructure�•�Encryption�
software� •� Digital� certificates� •� Digital� Signatures� •� Biometrics� ‒� retinal� scan,� fingerprints,� voice� etc� •�
Passwords�•�Locks�and�bars�‒�network�operations�centers
Kavach:�The�Magazine�of�Raksha�Shakti�University
Preventing�of��E-commerce�threats
ª Use�only�Familiar�Websites�instead�of�accessing�unknown�webs.
ª Never�use�website�which�is�not�having�SSL�(Secure�Socket�Layer)�encryption.
ª Don't�give�your�social�security�number�and�your�birth�date�as�it�is�not�required�for�online�shopping.
ª Check�Statements�and�don't�wait�for�bill�to�come�at�the�end�of�statement.
ª Inoculate�PC�by�regular�updating�your�antivirus.
ª Usage�of�Strong�Passwords�which�is�difficult�for�other�to�crack.
ª While�online�shopping�through�mobile,�not�to��use�anything�apart�form�application�provided�directly�by�
retailer.
ª Never�use�public�terminal�while�online�shopping.
ª Privatization�of�Wi-Fi�instead�of�make�it�accessible�publicly.
ª Count�the�Cards�of�gifts�and�our�applicability.�It�is�not�possible�that�we�are�getting�extra�gifts�by�this�year�
specially.�
ª Know�What's�Too�Good�to�Be�True�while�getting�from�social�media�or�directly�from�your�friend�overseas.
Conclusion
The� E-commerce� industry� is� slowly� addressing� security� issues�on� their� internal� networks�by�providing�
guidelines�for�securing�systems�and�networks.�Educating�the�consumer�on�security� issues� is�still� in�the�
infancy�stage�but�will�prove�to�be�the�most�critical�element�of�the�e-commerce�security�architecture.�
References
1.� �Greg�Megaw�&�Stephen�V.�Flowerday� (2010)� 'Phishing�within�E-Commerce:�A�Trust�and�Confidence�
Game',�IEEE�Journal�of�Computer�science.�
2.� �Nina�Godbole,�Sunit�Belapur,�“Cyber�Security�Understanding�Cyber�Crimes,�Computer�Forensics�and�
Legal�Perspectives”,�Wiley�India�Publications,�April�2011
3.� �Randy�C.�Marchany�&�Joseph�G.�Tront�(2002)� 'E-Commerce�Security� Issues� ',Proceedings�of�the�35th�
Hawaii�International�Conference�on�System�Sciences
4.���www.ecommerce-web-hosting-guide.com
5.���www.techcricklets.com
2322
Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University
Credit�Card�that�may�be�used�repeatedly�to�borrow�money�or�buy�products�and�services�on�credit�that�
allows�its�user�to�borrow�pre-approved�funds�at�the�point�of�sale�in�order�to�complete�a�purchase.�It�is�Issue�
by�banks,� savings�and� loans,� retail� stores,� and�other�businesses.� It� is� commonly�being�used� for�online�
booking� of� airlines� and� railway� tickets� and� for� other� ecommerce� transactions.� Although� most� of� e-
commerce�websites�have�implemented�strong�security�measures�(such�as�SSL,�secure�web�servers�etc...),�
instance�of�credit�card�frauds�are�increasing.
When�you�have�been�issued�a�credit�card�you�are�given�a�line�of�credit.�You�can�make�purchases�or�receive�
cash�advances�up�to�that�amount�with�your�card.�When�you�make�a�purchase,�the�merchant�gives�proof�of�
your�purchase�to�the�credit�card�company�and�they�pay�the�merchant�on�your�behalf;�in�effect�granting�you�
a�loan.�The�credit�card�issuer�then�bills�you�for�reimbursement�of�the�purchase�or�cash�advance�amount.�You�
can�either�pay�the�balance�in�full�or�make�payments.�The�issuer�must�send�you�periodic�billing�statements�
giving�you�information�on�your�account�which�includes�the�minimum�payment�due,�date�it�is�due,�and�the�
periodic�interest�rate�on�unpaid�balances.
How�Fraudhappens�through�credit�card?
The�scenario
The�victim's�credit�card�information�is�stolen�and�misused�for�making�online�purchase�(e.g�airline�tickets,�
software,�subscription�to�pornographic�websites�etc).
Credit�Card�Frauds* *Pratap�K�Mishra ,�Jignesh�B.�Joshi
*M.Tech�(Cyber�Security)�Students,�Raksha�Shakti�University,�Ahmedabad
The�law�
Sections�43�and�66�of�Information�Technology�Act�and�section�420�of�Indian�penal�code.
Who�is�liable?
All�persons�who�have�stolen�the�credit�card�information�as�well�as�those�who�have�misused�it.
The�motive
Illegal�financial�gain.
Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�usage�of�another's�credit�card�
information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.�Credit�card�
fraud�schemes�generally�fall�into�one�of�two�categories�of�fraud:�application�fraud�and�account�takeover.
Application�fraud�refers�to�the�unauthorized�opening�of�credit�card�accounts�in�another�person's�name.�
This�may�occur�if�a�perpetrator�can�obtain�enough�personal�information�about�the�victim�to�completely�fill�
out�the�credit�card�application,�or�is�able�to�create�convincing�counterfeit�documents.�Application�fraud�
schemes�are�serious�because�a�victim�may�learn�about�the�fraud�too�late,�if�ever.�
Account�takeovers�typically�involve�the�criminal�hijacking�of�an�existing�credit�card�account,�a�practice�by�
which�a�perpetrator�obtains�enough�personal�information�about�a�victim�to�change�the�account's�billing�
address.��The�perpetrator�then�subsequently�reports�the�card�lost�or�stolen�in�order�to�obtain�a�new�card�and�
make�fraudulent�purchases�with�it.
In�Technological�advances�have�also�created�avenues�for�credit�card�fraud.�With�online�purchasing�now�
common,�perpetrators�need�no�physical�card�to�make�an�unauthorized�purchase.�Additionally,�electronic�
databases�containing�credit�card�data�may�be�hacked�or�crash�on�their�own,�releasing�customers'�credit�card�
information,�putting�the�security�of�many�accounts�at�risk�at�once.
1.� According�to�the�United�States�Federal�Trade�Commission,�while�identity�theft�had�been�holding�steady�
for�the�last�few�years,�it�saw�a�35�percent�increase�in�2013.�However,�credit�card�fraud,�that�crime�which�
most�people�associate�with�ID�theft
2.� Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�taking�of�another's�credit�card�
information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.
3.� The�Chip�and�PIN�implementation�was�criticised�as�designed�to�reduce�the�liability�of�banks�in�cases�of�
claimed�card�fraud�by�requiring�the�customer�to�prove�that�they�had�acted�``with�reasonable�care''�to�
protect�their�PIN�and�card,�rather�than�on�the�bank�having�to�prove�that�the�signature�matched.
2524
Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University
Credit�Card�that�may�be�used�repeatedly�to�borrow�money�or�buy�products�and�services�on�credit�that�
allows�its�user�to�borrow�pre-approved�funds�at�the�point�of�sale�in�order�to�complete�a�purchase.�It�is�Issue�
by�banks,� savings�and� loans,� retail� stores,� and�other�businesses.� It� is� commonly�being�used� for�online�
booking� of� airlines� and� railway� tickets� and� for� other� ecommerce� transactions.� Although� most� of� e-
commerce�websites�have�implemented�strong�security�measures�(such�as�SSL,�secure�web�servers�etc...),�
instance�of�credit�card�frauds�are�increasing.
When�you�have�been�issued�a�credit�card�you�are�given�a�line�of�credit.�You�can�make�purchases�or�receive�
cash�advances�up�to�that�amount�with�your�card.�When�you�make�a�purchase,�the�merchant�gives�proof�of�
your�purchase�to�the�credit�card�company�and�they�pay�the�merchant�on�your�behalf;�in�effect�granting�you�
a�loan.�The�credit�card�issuer�then�bills�you�for�reimbursement�of�the�purchase�or�cash�advance�amount.�You�
can�either�pay�the�balance�in�full�or�make�payments.�The�issuer�must�send�you�periodic�billing�statements�
giving�you�information�on�your�account�which�includes�the�minimum�payment�due,�date�it�is�due,�and�the�
periodic�interest�rate�on�unpaid�balances.
How�Fraudhappens�through�credit�card?
The�scenario
The�victim's�credit�card�information�is�stolen�and�misused�for�making�online�purchase�(e.g�airline�tickets,�
software,�subscription�to�pornographic�websites�etc).
Credit�Card�Frauds* *Pratap�K�Mishra ,�Jignesh�B.�Joshi
*M.Tech�(Cyber�Security)�Students,�Raksha�Shakti�University,�Ahmedabad
The�law�
Sections�43�and�66�of�Information�Technology�Act�and�section�420�of�Indian�penal�code.
Who�is�liable?
All�persons�who�have�stolen�the�credit�card�information�as�well�as�those�who�have�misused�it.
The�motive
Illegal�financial�gain.
Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�usage�of�another's�credit�card�
information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.�Credit�card�
fraud�schemes�generally�fall�into�one�of�two�categories�of�fraud:�application�fraud�and�account�takeover.
Application�fraud�refers�to�the�unauthorized�opening�of�credit�card�accounts�in�another�person's�name.�
This�may�occur�if�a�perpetrator�can�obtain�enough�personal�information�about�the�victim�to�completely�fill�
out�the�credit�card�application,�or�is�able�to�create�convincing�counterfeit�documents.�Application�fraud�
schemes�are�serious�because�a�victim�may�learn�about�the�fraud�too�late,�if�ever.�
Account�takeovers�typically�involve�the�criminal�hijacking�of�an�existing�credit�card�account,�a�practice�by�
which�a�perpetrator�obtains�enough�personal�information�about�a�victim�to�change�the�account's�billing�
address.��The�perpetrator�then�subsequently�reports�the�card�lost�or�stolen�in�order�to�obtain�a�new�card�and�
make�fraudulent�purchases�with�it.
In�Technological�advances�have�also�created�avenues�for�credit�card�fraud.�With�online�purchasing�now�
common,�perpetrators�need�no�physical�card�to�make�an�unauthorized�purchase.�Additionally,�electronic�
databases�containing�credit�card�data�may�be�hacked�or�crash�on�their�own,�releasing�customers'�credit�card�
information,�putting�the�security�of�many�accounts�at�risk�at�once.
1.� According�to�the�United�States�Federal�Trade�Commission,�while�identity�theft�had�been�holding�steady�
for�the�last�few�years,�it�saw�a�35�percent�increase�in�2013.�However,�credit�card�fraud,�that�crime�which�
most�people�associate�with�ID�theft
2.� Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�taking�of�another's�credit�card�
information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.
3.� The�Chip�and�PIN�implementation�was�criticised�as�designed�to�reduce�the�liability�of�banks�in�cases�of�
claimed�card�fraud�by�requiring�the�customer�to�prove�that�they�had�acted�``with�reasonable�care''�to�
protect�their�PIN�and�card,�rather�than�on�the�bank�having�to�prove�that�the�signature�matched.
2524
Kavach:�The�Magazine�of�Raksha�Shakti�University
� Scenario� 1:� The� suspect�would� installkey� loggers� in�public� computers� (such� as� cyber� cafes,� airport�
loungesetc.)�or�the�computers�of�the�victim.�Unsuspecting�victims�would�use�these�infected�computers�
to�make�online�transactions.�The�credit�card�information�of�the�victim�would�be�emailed�to�the�suspect.
� Scenario�2:�Petrol�pump�attendants,�workers�at�retail�outlets,�hotel�waiters�etc�note�down�information�
of�the�credit�cards�used�for�making�payment�at�these�establishments.�This�information�is�sold�to�criminal�
gangs�that�misuse�it�for�online�frauds.
How�to�prevent�credit�card�frauds?
The� importance� of� protecting� your� credit� card� information� is� even� more� essential� now,� with� the�
introduction�of�online�shopping.�As�such,�it's�wise�to�be�proactive�in�preventing�such�thing�from�happening�
to�you.�Furthermore,�the�responsibility�always�lies�with�credit�card�holders�to�safeguard�their�credit�cards.�
Here�is�a�list�of�important�"do's�and�don'ts"�to�safeguard�your�credit�card.
1.���Keep�your�card�number�confidential.
2.���Be�safe�with�your�credit�card�from�online
3.���Sign�up�your�new�cards�as�soon�as�they�arrive�and�cut�up�the�old�cards�when�they�expire.
4.���Sign�your�credit�card�in�permanent�ink�as�soon�as�you�receive�it.
5.���Ensure�that�your�transaction�is�processed�in�your�presence�every�time�you�make�a�purchase
6.� Total� your� charge� slip� before� signing� in,� as� blank� spaces� serve� as� an� invitation� for� unscrupulous�
individuals�to�add�additional�amounts.
7.���Retain�your�receipts�so�that�you�can�check�them�against�your�statement.
8.���Inform�your�card�issuer�immediately�if�unfamiliar�transactions�are�posted�on�your�statement.
9.���Keep�your�statements�in�a�safe�place�-�they�contain�sensitive�information.
10.���Shred�all�statements�before�disposing�of�them,�even�those�for�closed�accounts.
11.���Inform�the�card�issuer�when�you�are�travelling�overseas.
12.���Notify�the�card�issuer�of�any�change�of�address,�so�new�cards/statements�are�not�sent�to�the�old�mailing�
address.
13.���Inform�the�card�issuer�immediately�if�your�card�is�stolen�or�lost.
References
[1]���About�Credit�A�Card�Fraud�(2009).�www.consumer-action.org.Consumer�Action�Publication
[2]���http://en.wikipedia.org/wiki/Credit_card
[3]���http://www.wikihow.com/Prevent-Credit-Card-Fraud
Kavach:�The�Magazine�of�Raksha�Shakti�University
2726
1See�the�work�of�Dr.�Raine�article�on�http://www.wsj.com/articles/SB10001424127887323335404578444682892520530;�Accessed�on�22/03/2015.2See�Williams,�F.�P.,�&�McShane,�M.�D.�(1994).�Criminological�Theory.�Englewood�Cliffs,�NJ:�Prentice�Hall.
While� there� is�a� range�of� issues� that�are�connected�with Internal�Security�but�crime�by� individuals�and�
groups�are�the�most�prominent�among�them�which�needs�to�be�dealt�to�enhance�better�internal�security.�In�
previous�edition�of�Kavach,�we�mentioned�about�our�efforts� to�bring�Neurocriminology� in� India� in� the�
editorial�written�by�Dr.�Vaya.� � In�the�third� issue�of�Kavach,�the�author�has�proposed�priority�shifting� in�
mechanisms�of�law�enforcement�practices�suggesting�that�the�financial�crimes�must�be�dealt�seriously�over�
political�crimes�as�these�crimese�merge�as�a�result�of�bad�governance.�Noticeably,�these�crimes�gradually�
propagate�a�range�of�socio-political�crimes�including�naxalism�and�terrorism.�With�this�note,�this�time�the�
author�introduces�Neuruocriminology�as�a�tool�to�deter�crime�and�criminal�behaviour.�
Neurocriminology�is�a�professional�interventionist�approach�that�has�capacity�to�enhance�better�internal�
security� by� dealing� with� individuals� who� have� criminal� bent� of� mind� such� as� recidivists� or� first� time�
offenders�who�have�exhibited�early�symptoms�of�deviation.�For�many�obvious�reasons,�there�is�an�increase�
in�crime�due�to��socio-economic�factors�or�increase�in�reporting�due�to�increased�awareness�of�law,�increase�
in�trust�in�policeand/orincrease�in�malafide�practices.�Yet,�the�legal�processes�(including�sentencing)�have�
been� not� a� desirable� outcome� to� enhance� better� internal� security� as� there� is� an� absence� of� effective�
treatment� programs� to� change� individuals�who� persue� crime� as� a�way� of� life.� Here,� the� paradigm� of�1Neurocriminology�becomes�significant. �This�article�explores�the�foundational�factors�that�contribute�to�
knowledge�of�Neurocriminology.
When�a�Russian�Physiologist,�Ivan�Pavlov�(1903)�was�conducting�interesting�experiment�on�role�ofsaliva�
and�digestion�in�dogs,�he�did�not�know�that�he�was�actually�contributing�to�the�one�of�the�famous�classical�
learning�theories�for�humans.�His�theory�suggested�that�conditioning�produces�certain�behavior�in�animals�
which�can�also�be�observed�in�humans.�While�he�suggested�that�the�learning�of�all�behaviors�(including�2criminal�behavior �is�associated�with�specific�stimuli,�the�author�suggests�that�all�behaviors�are�a�product�of�
genetic� and� social� environmental� conditioning� which� gives� evidence� of� stimuli� being� present� within�
human�body�or�outside.� �While�behavior�is�learnt�is�also�suggested�by�the�American�Sociologist,�Edwin�
Sutherland�(1940)�through�his�theory�of�differential�association�but�this�knowledge�was�not�sufficient�to�
explain�human�behavior�arising�out�of�interaction�between�their�genes�and�social�environment.�However,��
Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security
Ms.�Surekha�TalariAsst.�Professor�(Criminology),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�University
� Scenario� 1:� The� suspect�would� installkey� loggers� in�public� computers� (such� as� cyber� cafes,� airport�
loungesetc.)�or�the�computers�of�the�victim.�Unsuspecting�victims�would�use�these�infected�computers�
to�make�online�transactions.�The�credit�card�information�of�the�victim�would�be�emailed�to�the�suspect.
� Scenario�2:�Petrol�pump�attendants,�workers�at�retail�outlets,�hotel�waiters�etc�note�down�information�
of�the�credit�cards�used�for�making�payment�at�these�establishments.�This�information�is�sold�to�criminal�
gangs�that�misuse�it�for�online�frauds.
How�to�prevent�credit�card�frauds?
The� importance� of� protecting� your� credit� card� information� is� even� more� essential� now,� with� the�
introduction�of�online�shopping.�As�such,�it's�wise�to�be�proactive�in�preventing�such�thing�from�happening�
to�you.�Furthermore,�the�responsibility�always�lies�with�credit�card�holders�to�safeguard�their�credit�cards.�
Here�is�a�list�of�important�"do's�and�don'ts"�to�safeguard�your�credit�card.
1.���Keep�your�card�number�confidential.
2.���Be�safe�with�your�credit�card�from�online
3.���Sign�up�your�new�cards�as�soon�as�they�arrive�and�cut�up�the�old�cards�when�they�expire.
4.���Sign�your�credit�card�in�permanent�ink�as�soon�as�you�receive�it.
5.���Ensure�that�your�transaction�is�processed�in�your�presence�every�time�you�make�a�purchase
6.� Total� your� charge� slip� before� signing� in,� as� blank� spaces� serve� as� an� invitation� for� unscrupulous�
individuals�to�add�additional�amounts.
7.���Retain�your�receipts�so�that�you�can�check�them�against�your�statement.
8.���Inform�your�card�issuer�immediately�if�unfamiliar�transactions�are�posted�on�your�statement.
9.���Keep�your�statements�in�a�safe�place�-�they�contain�sensitive�information.
10.���Shred�all�statements�before�disposing�of�them,�even�those�for�closed�accounts.
11.���Inform�the�card�issuer�when�you�are�travelling�overseas.
12.���Notify�the�card�issuer�of�any�change�of�address,�so�new�cards/statements�are�not�sent�to�the�old�mailing�
address.
13.���Inform�the�card�issuer�immediately�if�your�card�is�stolen�or�lost.
References
[1]���About�Credit�A�Card�Fraud�(2009).�www.consumer-action.org.Consumer�Action�Publication
[2]���http://en.wikipedia.org/wiki/Credit_card
[3]���http://www.wikihow.com/Prevent-Credit-Card-Fraud
Kavach:�The�Magazine�of�Raksha�Shakti�University
2726
1See�the�work�of�Dr.�Raine�article�on�http://www.wsj.com/articles/SB10001424127887323335404578444682892520530;�Accessed�on�22/03/2015.2See�Williams,�F.�P.,�&�McShane,�M.�D.�(1994).�Criminological�Theory.�Englewood�Cliffs,�NJ:�Prentice�Hall.
While� there� is�a� range�of� issues� that�are�connected�with Internal�Security�but�crime�by� individuals�and�
groups�are�the�most�prominent�among�them�which�needs�to�be�dealt�to�enhance�better�internal�security.�In�
previous�edition�of�Kavach,�we�mentioned�about�our�efforts� to�bring�Neurocriminology� in� India� in� the�
editorial�written�by�Dr.�Vaya.� � In�the�third� issue�of�Kavach,�the�author�has�proposed�priority�shifting� in�
mechanisms�of�law�enforcement�practices�suggesting�that�the�financial�crimes�must�be�dealt�seriously�over�
political�crimes�as�these�crimese�merge�as�a�result�of�bad�governance.�Noticeably,�these�crimes�gradually�
propagate�a�range�of�socio-political�crimes�including�naxalism�and�terrorism.�With�this�note,�this�time�the�
author�introduces�Neuruocriminology�as�a�tool�to�deter�crime�and�criminal�behaviour.�
Neurocriminology�is�a�professional�interventionist�approach�that�has�capacity�to�enhance�better�internal�
security� by� dealing� with� individuals� who� have� criminal� bent� of� mind� such� as� recidivists� or� first� time�
offenders�who�have�exhibited�early�symptoms�of�deviation.�For�many�obvious�reasons,�there�is�an�increase�
in�crime�due�to��socio-economic�factors�or�increase�in�reporting�due�to�increased�awareness�of�law,�increase�
in�trust�in�policeand/orincrease�in�malafide�practices.�Yet,�the�legal�processes�(including�sentencing)�have�
been� not� a� desirable� outcome� to� enhance� better� internal� security� as� there� is� an� absence� of� effective�
treatment� programs� to� change� individuals�who� persue� crime� as� a�way� of� life.� Here,� the� paradigm� of�1Neurocriminology�becomes�significant. �This�article�explores�the�foundational�factors�that�contribute�to�
knowledge�of�Neurocriminology.
When�a�Russian�Physiologist,�Ivan�Pavlov�(1903)�was�conducting�interesting�experiment�on�role�ofsaliva�
and�digestion�in�dogs,�he�did�not�know�that�he�was�actually�contributing�to�the�one�of�the�famous�classical�
learning�theories�for�humans.�His�theory�suggested�that�conditioning�produces�certain�behavior�in�animals�
which�can�also�be�observed�in�humans.�While�he�suggested�that�the�learning�of�all�behaviors�(including�2criminal�behavior �is�associated�with�specific�stimuli,�the�author�suggests�that�all�behaviors�are�a�product�of�
genetic� and� social� environmental� conditioning� which� gives� evidence� of� stimuli� being� present� within�
human�body�or�outside.� �While�behavior�is�learnt�is�also�suggested�by�the�American�Sociologist,�Edwin�
Sutherland�(1940)�through�his�theory�of�differential�association�but�this�knowledge�was�not�sufficient�to�
explain�human�behavior�arising�out�of�interaction�between�their�genes�and�social�environment.�However,��
Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security
Ms.�Surekha�TalariAsst.�Professor�(Criminology),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University
2928
the�Positive�School�of�Criminology�has�been�able�to�identify�that�human�beings�have�intrinsic�and�extrinsic�
factors�that�are�beyond�their�control�which�produces�criminal�behavior.�The�intrinsic�factors�includes�genes�
and�other�biological�factors�related�to�human�body�and�extrinsic�factors�are�related�the�structure�of�the�
society.
Does�Genetics�and�Environment�work�together�to�encourage�Violent�Behavior?
3 4A�further�knowledge�was�added�by�a�new�stream�of�criminologists�like�Adrian�Raine ,�Robert�Ross �and�Jim�5Hilborn �who�proclaimed�that�the�criminal�behavior�arises�out�interaction�of�mind�with�social�environment.�
But�this�interaction�is�prevailing�due�to�one's�own�tendency�of�genes�to�act�in�a�particular�way.�There�is�a�
little� doubt� that�we� carry� physical� features� from�our� ancestors� so� there� is� a� probability� that�we� carry�
behavior�characteristics�also�from�our�ancestors.�The�linage�here�becomes�important�to�understand�all�
behaviours�including�criminal�behaviors�have�origins�in�genes.�However,�the�social�environment�plays�a�
crucial�role�as�Dr.�Ross�and�Dr.�Raine�suggests�the�development�of�our�brains�is�just�not�dependent�only�on�6our�genes�but�also�on�the�environment�in�which�we�function. ��Here,�it�is�not�suggested�that�genetics�make�a�
criminal�man.�What�is�argued�here�is�that�genetics�play�a�significant�role�in�shaping�the�brain�of�a�man.�
However,�social�environment�brings�up�genetic�predisposition�in�a�given�social�situations�which�act�like�
stimuli.�For�example,�decent�people�who�never�offended�are�found�participating�in�stone�pelting�while�
being�in�a�mob.�In�other�words,�the�person�may�exhibit�odd/anti-social�behaviour�while�interacting�with�
social�environment�due�to�his�genetic�predisposition�but�also�because�his/her�social�situation�is�powerful�
enough�to�seek�a�anti-social�response�from�him/her.�Even�though�there�is�a�genetic�predisposition,�social�
environment�plays�a�significant�role�in�shaping�human�genetic�behavior�as�humans�have�capacity�to�modify�
their�responses�to�a�given�stimuli.�Another�sociologist�Robert�Merton�explained�that�criminal�behavior�is�a�
result�of�strain�in�human�relations�and�social�environment.�The�strain�per�say�produces�certain�behavior�but�
I�argue�that�strain�in�social�environment�evoke�genetic�responses�to�cope�with�the�situation�which�acts�like�a�
stimuli.�In�overall,�the�author�argues�that�genetic�predisposition�and�social�environment�together�play�a�
crucial�role�in�understanding�human�behavior�including�criminal�behavior.
“We�are�not�prisoners�of�our�genes.”�(Ross,�2008,�pg.�19)
The�author�proposed�that�criminal�behavior�in�humans�is�a�amalgamated�product�of�genetics�as�well�as�
from�social�environmental�factors.�But�the�genetically�obtained�(conditioned)�behavior�can�be�changed�
through�conscious�mind�training�as�human�mind�is�gifted�with�a�unique�feature�of�rational�and�logical�
thinking.�Though�crime�is�also�described�as�a�outcome�of�rational�thinking�but�Nerurocriminologist�go�
beyond�to�explain�that�the�rational�thinking�can�be�modulated�to�another�level�through�training�of�mind.�
For�example,�if�a�person�has�gentic�predisposition�of��diabetis,�the�repeated�assurance�and�instructions�of�
the�doctor�may�help�him�to��avoid�sugary�things.�Here,�the�gentically�predisposed�behaviour�is�moderated�
by�conscious�mind�training�which�enables�the�person�to�control�his�diabities�by�moderating�his�life�style.�
This� is�the�exact�proposition�of�Neurocriminology�which�argues�human�mind�has�power�to�create�new�
networks�for�new�actions�overcoming�the�genetical�disposition.�That�is�where�Neurocriminology�as�a�body�
of�knowledge�helps�us�to�understand�the�patterns�concerning�our�genes,�the�mind�and�social�environment.�
Neurocriminology� approaches� anti-social� and� criminal� behavior� 'as� a� function� of� interactions� among�
multiple�neurocognitive�and�neurobehavioral�systems�that�are�shaped�by�environmental,�situational�and�7experiential�events'.
8According�to�Ross(2008) ,�the�model�of�neurocriminology�is�based�on�knowledge�of�social�sciences�and�
neuroscience�which�applies�various�cognitive,�emotional�and�behavior�skill�training,�social�role�playing,�
stimulation�training�and�neurobic�brain�exercises�have�capacity�to�develop�neural�activities�in�the�brain�
which�promotes�mind�to�respond�to�social�environment�that�may�produce�crime.�Neurocriminology�as�a�
practice� based� knowledge�which� propagates� that� behavior� which� is� inherited� through� genes� and� its�
interaction�with�social�environment�can�be�changed�by�mind�training�modules.�The�mind�training�is�given�
for�evocating�conscious�responses�to�eradicate�the�malice�behavior�in�all�types�of�social�environment.�In�
nutshell,�for�diverting�and�controlling�criminal�tendencies�among�humans,�Neurocriminology�developed�
programs� such�as�Reasoning�and�Rehabilitation� (R&R)� training�module� can�be�applied� to�harbor� safer�
environment�that�eventually�works�for�better�internal�security.
The�article�is�written�in�the�memory�of�Jim�Hilborn,�a�Canadian�Criminologist�who�was�
among� the� pioneers� in� shaping� the� practicing� knowledge� of�Neurocriminology� in�
correctional� settings.� Raksha� Shakti� University� shall� ever� be� grateful� for� his�
introductory�lecture�as�an�attempt�to�bring�Neurocriminology�in�India�through�RSU.�
He�recently�demised�after�a�prolonged�tenure�in�correctional�services�in�Canada�and�
Estonia.�3See�Raine,�A.�(2013).�The�anatomy�of�violence:�The�biological�roots�of�crime.�Vintage.4See�Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive�Centre��of��Canada.5Hilborn,�J.�(2011).�A�Neurocriminology�Model�of�the�Re-Entry�and�Desistance�Process.Global�Perspectives�on�Re-Entry,�21.6Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive��Centre��of��Canada.
7Ibid,�pg.�18.8Ibid,�pg�11.
Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University
2928
the�Positive�School�of�Criminology�has�been�able�to�identify�that�human�beings�have�intrinsic�and�extrinsic�
factors�that�are�beyond�their�control�which�produces�criminal�behavior.�The�intrinsic�factors�includes�genes�
and�other�biological�factors�related�to�human�body�and�extrinsic�factors�are�related�the�structure�of�the�
society.
Does�Genetics�and�Environment�work�together�to�encourage�Violent�Behavior?
3 4A�further�knowledge�was�added�by�a�new�stream�of�criminologists�like�Adrian�Raine ,�Robert�Ross �and�Jim�5Hilborn �who�proclaimed�that�the�criminal�behavior�arises�out�interaction�of�mind�with�social�environment.�
But�this�interaction�is�prevailing�due�to�one's�own�tendency�of�genes�to�act�in�a�particular�way.�There�is�a�
little� doubt� that�we� carry� physical� features� from�our� ancestors� so� there� is� a� probability� that�we� carry�
behavior�characteristics�also�from�our�ancestors.�The�linage�here�becomes�important�to�understand�all�
behaviours�including�criminal�behaviors�have�origins�in�genes.�However,�the�social�environment�plays�a�
crucial�role�as�Dr.�Ross�and�Dr.�Raine�suggests�the�development�of�our�brains�is�just�not�dependent�only�on�6our�genes�but�also�on�the�environment�in�which�we�function. ��Here,�it�is�not�suggested�that�genetics�make�a�
criminal�man.�What�is�argued�here�is�that�genetics�play�a�significant�role�in�shaping�the�brain�of�a�man.�
However,�social�environment�brings�up�genetic�predisposition�in�a�given�social�situations�which�act�like�
stimuli.�For�example,�decent�people�who�never�offended�are�found�participating�in�stone�pelting�while�
being�in�a�mob.�In�other�words,�the�person�may�exhibit�odd/anti-social�behaviour�while�interacting�with�
social�environment�due�to�his�genetic�predisposition�but�also�because�his/her�social�situation�is�powerful�
enough�to�seek�a�anti-social�response�from�him/her.�Even�though�there�is�a�genetic�predisposition,�social�
environment�plays�a�significant�role�in�shaping�human�genetic�behavior�as�humans�have�capacity�to�modify�
their�responses�to�a�given�stimuli.�Another�sociologist�Robert�Merton�explained�that�criminal�behavior�is�a�
result�of�strain�in�human�relations�and�social�environment.�The�strain�per�say�produces�certain�behavior�but�
I�argue�that�strain�in�social�environment�evoke�genetic�responses�to�cope�with�the�situation�which�acts�like�a�
stimuli.�In�overall,�the�author�argues�that�genetic�predisposition�and�social�environment�together�play�a�
crucial�role�in�understanding�human�behavior�including�criminal�behavior.
“We�are�not�prisoners�of�our�genes.”�(Ross,�2008,�pg.�19)
The�author�proposed�that�criminal�behavior�in�humans�is�a�amalgamated�product�of�genetics�as�well�as�
from�social�environmental�factors.�But�the�genetically�obtained�(conditioned)�behavior�can�be�changed�
through�conscious�mind�training�as�human�mind�is�gifted�with�a�unique�feature�of�rational�and�logical�
thinking.�Though�crime�is�also�described�as�a�outcome�of�rational�thinking�but�Nerurocriminologist�go�
beyond�to�explain�that�the�rational�thinking�can�be�modulated�to�another�level�through�training�of�mind.�
For�example,�if�a�person�has�gentic�predisposition�of��diabetis,�the�repeated�assurance�and�instructions�of�
the�doctor�may�help�him�to��avoid�sugary�things.�Here,�the�gentically�predisposed�behaviour�is�moderated�
by�conscious�mind�training�which�enables�the�person�to�control�his�diabities�by�moderating�his�life�style.�
This� is�the�exact�proposition�of�Neurocriminology�which�argues�human�mind�has�power�to�create�new�
networks�for�new�actions�overcoming�the�genetical�disposition.�That�is�where�Neurocriminology�as�a�body�
of�knowledge�helps�us�to�understand�the�patterns�concerning�our�genes,�the�mind�and�social�environment.�
Neurocriminology� approaches� anti-social� and� criminal� behavior� 'as� a� function� of� interactions� among�
multiple�neurocognitive�and�neurobehavioral�systems�that�are�shaped�by�environmental,�situational�and�7experiential�events'.
8According�to�Ross(2008) ,�the�model�of�neurocriminology�is�based�on�knowledge�of�social�sciences�and�
neuroscience�which�applies�various�cognitive,�emotional�and�behavior�skill�training,�social�role�playing,�
stimulation�training�and�neurobic�brain�exercises�have�capacity�to�develop�neural�activities�in�the�brain�
which�promotes�mind�to�respond�to�social�environment�that�may�produce�crime.�Neurocriminology�as�a�
practice� based� knowledge�which� propagates� that� behavior� which� is� inherited� through� genes� and� its�
interaction�with�social�environment�can�be�changed�by�mind�training�modules.�The�mind�training�is�given�
for�evocating�conscious�responses�to�eradicate�the�malice�behavior�in�all�types�of�social�environment.�In�
nutshell,�for�diverting�and�controlling�criminal�tendencies�among�humans,�Neurocriminology�developed�
programs� such�as�Reasoning�and�Rehabilitation� (R&R)� training�module� can�be�applied� to�harbor� safer�
environment�that�eventually�works�for�better�internal�security.
The�article�is�written�in�the�memory�of�Jim�Hilborn,�a�Canadian�Criminologist�who�was�
among� the� pioneers� in� shaping� the� practicing� knowledge� of�Neurocriminology� in�
correctional� settings.� Raksha� Shakti� University� shall� ever� be� grateful� for� his�
introductory�lecture�as�an�attempt�to�bring�Neurocriminology�in�India�through�RSU.�
He�recently�demised�after�a�prolonged�tenure�in�correctional�services�in�Canada�and�
Estonia.�3See�Raine,�A.�(2013).�The�anatomy�of�violence:�The�biological�roots�of�crime.�Vintage.4See�Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive�Centre��of��Canada.5Hilborn,�J.�(2011).�A�Neurocriminology�Model�of�the�Re-Entry�and�Desistance�Process.Global�Perspectives�on�Re-Entry,�21.6Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive��Centre��of��Canada.
7Ibid,�pg.�18.8Ibid,�pg�11.
1.� In�the�year�2006,�while�APC�Karsanbhai�was�on�duty�in�the�control�room�at�the�Shahibaug�police�headquarters,�Ahmedabad,�UPC�Manharbhai�came�to�the�control� room�in�drunken�position�and�torn�off�paper�of� the�duty�register.� �Following�the�above�incident�there�was�a�quarrel�between�Karsanbhai�and�Manharbhai.�Karsanbhai�informed�the�control�incharge�Inspector,�and�offence�was�registered�against�Manharbhai.� �Reason�behind�this�incident�was�the�discrimination�in�allotting�duty.�
2.�� In�Amreli� district,� a�male�Police� Sub� Inspector� (PSI)� of� a�police� station�had�a�bad�eye�on� the�Woman�Police�Constable�(WPC)�who�was�working�as�a�Computer�Operator�in�the�year�2007.��The�PSI�always�tried�to�get�her�alone.��Once�he�got�an�opportunity�in�such�a�way�that�he�said�that�he�wanted�to�go�for�a�raid�and�she�should�accompany�him.��When�she�said�that�she�had�to�make�entry�in�Station�Diary�and�wear�uniform,�he�denied�to�both,�and�took�her�immediately�with�him�along�with�other�police�personnel.��After�reaching�the�destined�village,�she�felt�that�there�was�no�need�for�her�to�go�with�them.�So,�she�told�other�police�personnel,�caught�a�bus�and�returned.
Next�day�morning�the�PSI�reached�the�police�station,�went�near�her,�placed�his�hand�on�her�shoulder�and�asked�why�she�came�back�without�informing�him.� �She�opposed�his�touching�and�there�was�a�quarrel�between�them�over�the�issue�of�his�mal-intention�and�harassing�her.�The�PSI�physically�pushed�her�out�of�the�room�in�front�of�other�male�police�personnel.��Cross�police�complaint�was�registered.
Following� the�complaint,� the�WPC�was� transferred� to�a� remote�area�police� station.� �However,� there�was�no�punishment�to�the�PSI.��According�to�her,�she�was�harassed�a�lot�by�the�authorities�and�nobody�helped�her�when�she�was�in�trouble.� �Departmental�Proceeding�was�initiated�against�her,�and�she�was�put�at�the�lowest�scale�of�salary� for�one�year.� �The�case� is�pending� the�court.� �Though�she�had�made�a�written�complaint�against� the�harassment�to�the�CID�Crime,�no�action�was�taken.��
In�the�first�incident,�discrimination�in�duty�distribution�was�found�to�be�the�cause�of�fighting,��whereas��in�the��second��case� �sexual�harassment�at�workplace�was�the�reason�for�fighting.� �It�can�be�believed�that�the�severe�stress�and�its�outburst�have�caused�these�conflicts.��There�are�many-fold�factors�responsible�for�the�stress�and�conflict�in�police.
It�was�found�that�there�were�around�22�incidents�of�fighting/conflicts�in�Gujarat�Police�between�2004�and�2008.� � These�were� the� reported� cases,�whereas� the�unreported� incidents� could�be�more.� �What� these�incidents�indicate?��These�incidents�support�the�hypothesis�that�police�department�is�not�immune�with�the�conflicts/violent� incidents� that�we� see� in� the� society,� and� that� the� agency� responsible� for� controlling�conflicts/violence�in�the�society�is�themselves�entangled�in�this�menace.� �
Intra�Organizational�Conflicts�In�Gujarat�Police*Dr.�Pavithran�Nambiar
*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University
One�of�the�important�factors�is�that�there�has�been�no�significant�change�in�the�way�of�thinking�of�personnel�after�they�get�enrolled�in�police.��These�people�come�from�different�walks�of�society�and�they�still�carry�the�prejudice,�stigma,�practice,�belief�system,�etc.�they�followed�prior�to�entering�in�police.� �Such�a�situation�many�times�leads�to�non-confirmation�amongst�individuals�that�result�into�conflict.�
What�is�conflict?
Karl�Marx�is�considered�to�be�the�pioneer�of�conflict�theory.�He�holds�that�human�societies�progress�through�class�struggle:�a�conflict�between�an�ownership�class�that�controls�production�and�a�dispossessed�labouring�class�that�provides�the�labour�for�production.�States,�Marx�believed,�were�run�on�behalf�of�the�ruling�class�and�in�their�interest�while�representing�it�as�the�common�interest�of�all;�and�this�produced�internal�tensions�which�would� lead� to� its� self-destruction�and� replacement�by�a�new� system.�Marx� focused�on� the�way�individual� behavior� is� conditioned� by� social� structure.� In� the� context� of� police� organisation,� when�authorities�want�to�show�their�power�or�̒ satisfyʼ�certain�class�through�unfair�means,�it�leads�to�resentment,�frustration�and�stress�among�the�lower�levels�of�the�system.�This�can�result�into�individual�or�inter-rank�conflicts.
Emile�Durkheim�saw�society�as�a�functioning�organism.� �The�chief�form�of�social�conflict�that�Durkheim�addressed�was�crime.� �He�saw�crime�as�"a�factor�in�public�health,�an�integral�part�of�all�healthy�societies."���Crime�thus�plays�a�role�in�the�evolution�of�morality�and�law.
Max�Weber�emphasized�the�importance�of�"social�action,"�i.e.,�the�ability�of�individuals�to�affect�their�social�relationships.
According�to�C.�Wright�Mills,�social�structures�are�created�through�conflict�between�people�with�differing�interests�and�resources.�Individuals�and�resources,�in�turn,�are�influenced�by�these�structures�and�by�the�"unequal�distribution�of�power�and�resources�in�the�society"�(Conflict�Theories).
Many�times�when�conflict�becomes�grave�it�turns�into�violence.
What�is�violence?
According�to�Gupta�(1989),�Violence�includes�actual�use�of�force�or�coercive�methods�in�their�active�or�passive� form� resulting� in� personal� injury,� damage� to� property� or� deprivation� of� chances� of� life� of� an�individual�or�group.��
While� distinguishing� expressive� violence� and� instrumental� violence,� Blumenthal� (1975)�mentions� that�expressive�violence�arises�primarily�on�response�to�feelings�of�hate�or�rage.��Violence�used�to�some�end�is�
If I am not ready to accept my shortcomings, I cannot improve
3130
1.� In�the�year�2006,�while�APC�Karsanbhai�was�on�duty�in�the�control�room�at�the�Shahibaug�police�headquarters,�Ahmedabad,�UPC�Manharbhai�came�to�the�control� room�in�drunken�position�and�torn�off�paper�of� the�duty�register.� �Following�the�above�incident�there�was�a�quarrel�between�Karsanbhai�and�Manharbhai.�Karsanbhai�informed�the�control�incharge�Inspector,�and�offence�was�registered�against�Manharbhai.� �Reason�behind�this�incident�was�the�discrimination�in�allotting�duty.�
2.�� In�Amreli� district,� a�male�Police� Sub� Inspector� (PSI)� of� a�police� station�had�a�bad�eye�on� the�Woman�Police�Constable�(WPC)�who�was�working�as�a�Computer�Operator�in�the�year�2007.��The�PSI�always�tried�to�get�her�alone.��Once�he�got�an�opportunity�in�such�a�way�that�he�said�that�he�wanted�to�go�for�a�raid�and�she�should�accompany�him.��When�she�said�that�she�had�to�make�entry�in�Station�Diary�and�wear�uniform,�he�denied�to�both,�and�took�her�immediately�with�him�along�with�other�police�personnel.��After�reaching�the�destined�village,�she�felt�that�there�was�no�need�for�her�to�go�with�them.�So,�she�told�other�police�personnel,�caught�a�bus�and�returned.
Next�day�morning�the�PSI�reached�the�police�station,�went�near�her,�placed�his�hand�on�her�shoulder�and�asked�why�she�came�back�without�informing�him.� �She�opposed�his�touching�and�there�was�a�quarrel�between�them�over�the�issue�of�his�mal-intention�and�harassing�her.�The�PSI�physically�pushed�her�out�of�the�room�in�front�of�other�male�police�personnel.��Cross�police�complaint�was�registered.
Following� the�complaint,� the�WPC�was� transferred� to�a� remote�area�police� station.� �However,� there�was�no�punishment�to�the�PSI.��According�to�her,�she�was�harassed�a�lot�by�the�authorities�and�nobody�helped�her�when�she�was�in�trouble.� �Departmental�Proceeding�was�initiated�against�her,�and�she�was�put�at�the�lowest�scale�of�salary� for�one�year.� �The�case� is�pending� the�court.� �Though�she�had�made�a�written�complaint�against� the�harassment�to�the�CID�Crime,�no�action�was�taken.��
In�the�first�incident,�discrimination�in�duty�distribution�was�found�to�be�the�cause�of�fighting,��whereas��in�the��second��case� �sexual�harassment�at�workplace�was�the�reason�for�fighting.� �It�can�be�believed�that�the�severe�stress�and�its�outburst�have�caused�these�conflicts.��There�are�many-fold�factors�responsible�for�the�stress�and�conflict�in�police.
It�was�found�that�there�were�around�22�incidents�of�fighting/conflicts�in�Gujarat�Police�between�2004�and�2008.� � These�were� the� reported� cases,�whereas� the�unreported� incidents� could�be�more.� �What� these�incidents�indicate?��These�incidents�support�the�hypothesis�that�police�department�is�not�immune�with�the�conflicts/violent� incidents� that�we� see� in� the� society,� and� that� the� agency� responsible� for� controlling�conflicts/violence�in�the�society�is�themselves�entangled�in�this�menace.� �
Intra�Organizational�Conflicts�In�Gujarat�Police*Dr.�Pavithran�Nambiar
*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad
Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University
One�of�the�important�factors�is�that�there�has�been�no�significant�change�in�the�way�of�thinking�of�personnel�after�they�get�enrolled�in�police.��These�people�come�from�different�walks�of�society�and�they�still�carry�the�prejudice,�stigma,�practice,�belief�system,�etc.�they�followed�prior�to�entering�in�police.� �Such�a�situation�many�times�leads�to�non-confirmation�amongst�individuals�that�result�into�conflict.�
What�is�conflict?
Karl�Marx�is�considered�to�be�the�pioneer�of�conflict�theory.�He�holds�that�human�societies�progress�through�class�struggle:�a�conflict�between�an�ownership�class�that�controls�production�and�a�dispossessed�labouring�class�that�provides�the�labour�for�production.�States,�Marx�believed,�were�run�on�behalf�of�the�ruling�class�and�in�their�interest�while�representing�it�as�the�common�interest�of�all;�and�this�produced�internal�tensions�which�would� lead� to� its� self-destruction�and� replacement�by�a�new� system.�Marx� focused�on� the�way�individual� behavior� is� conditioned� by� social� structure.� In� the� context� of� police� organisation,� when�authorities�want�to�show�their�power�or�̒ satisfyʼ�certain�class�through�unfair�means,�it�leads�to�resentment,�frustration�and�stress�among�the�lower�levels�of�the�system.�This�can�result�into�individual�or�inter-rank�conflicts.
Emile�Durkheim�saw�society�as�a�functioning�organism.� �The�chief�form�of�social�conflict�that�Durkheim�addressed�was�crime.� �He�saw�crime�as�"a�factor�in�public�health,�an�integral�part�of�all�healthy�societies."���Crime�thus�plays�a�role�in�the�evolution�of�morality�and�law.
Max�Weber�emphasized�the�importance�of�"social�action,"�i.e.,�the�ability�of�individuals�to�affect�their�social�relationships.
According�to�C.�Wright�Mills,�social�structures�are�created�through�conflict�between�people�with�differing�interests�and�resources.�Individuals�and�resources,�in�turn,�are�influenced�by�these�structures�and�by�the�"unequal�distribution�of�power�and�resources�in�the�society"�(Conflict�Theories).
Many�times�when�conflict�becomes�grave�it�turns�into�violence.
What�is�violence?
According�to�Gupta�(1989),�Violence�includes�actual�use�of�force�or�coercive�methods�in�their�active�or�passive� form� resulting� in� personal� injury,� damage� to� property� or� deprivation� of� chances� of� life� of� an�individual�or�group.��
While� distinguishing� expressive� violence� and� instrumental� violence,� Blumenthal� (1975)�mentions� that�expressive�violence�arises�primarily�on�response�to�feelings�of�hate�or�rage.��Violence�used�to�some�end�is�
If I am not ready to accept my shortcomings, I cannot improve
3130
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
instrumental�violence.�Element�of�feeling�is�secondary�in�instrumental�violence.��Violence�used�in�terrorism�and�violence�perpetrated�by�state�authorized�agencies�and�institutions�is�political�violence.��Violence�used�by�gang,�anti-social�elements�and�insane�persons�may�be�called�violence�of�deviance.��Violence�perpetrated�on�women,�children,�communal�riots,�organized�attack�on�minority�community,�bride�burning,�rape,�sati,�infanticide,�dowry�death,�etc�are�social�violence.�In�reality,�the�dividing�line�between�them�is�extremely�thin.
With�regard�to�structural�violence,�quoting�Meaton,�Gupta�(1989)�pointed�out�that�when�institutionally�approved�and�available�means�prove�insufficient�or�beyond�approach�to�achieve�desired�goals,�violence�is�likely�to�result�in�human�or�group�behavior.� �Meaton�has�clearly�shown�that�certain�categories�of�persons�may� find� themselves� in� structural� positions� which� effectively� prevent� them� from� utilizing� not� only�legitimate�channels�of�opportunity,�but�criminal�and�illegitimate�as�well.��When�all�such�channels�are�barred�violence�may�offer�alternative�road�to�achievement.
Thus,�it�can�be�seen�that�violence�is�always�negative,�because�it�always�causes�destruction�to�both�sides�in�the� conflict,� it� always� leads� further�and� further�away� from�a�possible�agreement.� This�means�violence�destroys�not�only�the�present,�but�also�the�future.��On�the�other�hand,�the�term�̒ conflictʼ�can�be�understood�in�two�ways�(a)�either�negatively�when�it�is�coupled�with�violence�(armed�conflict),�or�(b)�positively�when�it�enables� the� two� parties� to� express� through� dialogue� their� opposition,� their� disagreement,� without�resorting�to�violence.� �In�this�case,�the�ability�for�each�side�to�express�the�disagreement�will�allow�them�to�understand�the�other's�position,�and�from�there,�to�try�and�transform�their�disagreement�into�an�agreement�(Difference�between�̒ violenceʼ�and�̒ conflictʼ).
What�makes�conflict�in�police�significant?
Police�are�for�the�protection�of�society�from�any�kind�of�conflict�and�violence.��And�to�achieve�this�goal�police�personnel�have�to�jointly�make�concerted�efforts,�which�is�possible�only�if�they�have�faith�and�cooperation�among�themselves.��Such�determined�teamwork�from�all�can�help�to�deter�evils�from�the�society.��Instead,�if�there�is�no�proper�understanding�and�cordial�relationship�among�them,�it�would�lead�to�conflicts.
Grievance�Redressal�System�‒�Provisions�in�Gujarat�Police�Manual
As�per�Gujarat�Police�Manual�(GPM)�the�Range�DIG�of�Police�will�carry�out�inspection�of�districts�in�their�range�once�a�year.�The�inspection�of�a�district�should�cover�that�of�the�Headquarters,�the�town�or�city�police�station.� �During�inspection�he�holds�Orderly�Room�wherein�concerned�personnel�can�present�their�case.��The�SP�should�inspect�offices�of�the�SDPOs�once�in�a�year�and�SP�and�SDPO�will�inspect�police�stations�and�Out-posts�in�their�respective�charges�at�least�once�a�year.��Orderly�Room�should�be�held�at�all�police�stations�
and�Out-posts,�and�all�applications,�reports�and�complaints�dealt�with�on�the�spot�(GPM).
In�addition�to�Orderly�Room,�there�are�systems�of�Durbar�and�Daad�Fariyad�Samiti�wherein�police�personnel�can�present�their�issues�to�the�higher�authorities.
Present�day�situation�
Orderly�Room:��Under�this�system,�anybody�who�has�grievance�can�give�report�to�the�police�authority�and�request�for�an�orderly�room.� �The�authority�gives�a�date�and�time�in�which�he�can�personally�meet�the�authority.��On�that�date�and�time,�the�applicant,�through�orderly�room�facilitator,�meets�the�authority�and�presents�his�case�in�detail.��After�hearing�the�applicant,�the�authority�takes�final�decision.
Generally,�the�authority�does�not�permit�everybody�to�have�orderly�room�because�the�number�of�persons�with�a�variety�of�problems�is�large.� �In�such�a�situation,�if�the�authority�allows�everybody�to�have�orderly�room,�he�will�have�to�hold�orderly�room�every�day,�which�will�hamper�his�other�works.��Another�issue�is�that�even�if�a�large�number�of�personnel�have�grievances,�many�of�them�do�not�come�forward�to�have�an�orderly�room�because�they�fear�that�there�are�possibilities�that�they�will�be�singled�out�and�harassed�in�many�ways�by�the�higher�authorities.��
Durbar:�This�is�a�meeting�of�all�police�personnel�with�the�higher�authority.��Generally,�while�carrying�out�the�inspection�(once�in�an�year),�the�SP�holds�the�durbar�in�which�police�personnel�are�allowed�to�raise�their�problems,�and�the�authority�(SP)�is�supposed�to�suggest�solution�to�it.��Similarly,�DySP�holds�one�durbar�in�a�year,�whereas�PI� is�to�hold�4�durbars�yearly.� �However,�a�general� issue�always�raised�by�the�lower�rank�personnel�is�that�when�anybody�raises�an�issue,�he�will�be�made�silent�with�counter�questions�by�the�SP,�or�that�particular� individual� is�noticed�and�singled�out�by�higher�authorities�and�harassed/intimidated� in�many�ways.
Daad�Fariyad�Samiti�(DFS):�After�the�police-strike�of�1988�in�Gujarat,�DFS�was�established�in�all�districts�and�cities�in�the�state.��This�comprised�representatives�of�all�ranks�as�members.��This�samiti�acted�as�a�platform�for� police� to� present� their� grievances.� � In� the� beginning,� the� samiti�met� regularly� and� discussed� the�problems�of�police.��Over�a�period�of�time�its�function�weakened,�the�representatives�who�were�found�to�be�ʻadamantʼ�on�their�stand�were�intimidated�under�the�pretext�of�discipline,�transferred�to�far�off�places,�etc.��Gradually,�favourites�of�the�higher�authorities�were�̒ selectedʼ�as�members�of�the�samiti,�who�acted�as�their�puppets.� �Slowly�but�surely,�the�samiti�is�seen�to�be�only�on�paper,�and�the�present�situation�is�such�that�majority�of�the�police�personnel�are�unaware�that�such�a�system�exists.
Analysis�of�these�situations�shows�that�there�is�a�feeling�of�fear�among�the�lower�cadre�personnel�towards�
3332
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
instrumental�violence.�Element�of�feeling�is�secondary�in�instrumental�violence.��Violence�used�in�terrorism�and�violence�perpetrated�by�state�authorized�agencies�and�institutions�is�political�violence.��Violence�used�by�gang,�anti-social�elements�and�insane�persons�may�be�called�violence�of�deviance.��Violence�perpetrated�on�women,�children,�communal�riots,�organized�attack�on�minority�community,�bride�burning,�rape,�sati,�infanticide,�dowry�death,�etc�are�social�violence.�In�reality,�the�dividing�line�between�them�is�extremely�thin.
With�regard�to�structural�violence,�quoting�Meaton,�Gupta�(1989)�pointed�out�that�when�institutionally�approved�and�available�means�prove�insufficient�or�beyond�approach�to�achieve�desired�goals,�violence�is�likely�to�result�in�human�or�group�behavior.� �Meaton�has�clearly�shown�that�certain�categories�of�persons�may� find� themselves� in� structural� positions� which� effectively� prevent� them� from� utilizing� not� only�legitimate�channels�of�opportunity,�but�criminal�and�illegitimate�as�well.��When�all�such�channels�are�barred�violence�may�offer�alternative�road�to�achievement.
Thus,�it�can�be�seen�that�violence�is�always�negative,�because�it�always�causes�destruction�to�both�sides�in�the� conflict,� it� always� leads� further�and� further�away� from�a�possible�agreement.� This�means�violence�destroys�not�only�the�present,�but�also�the�future.��On�the�other�hand,�the�term�̒ conflictʼ�can�be�understood�in�two�ways�(a)�either�negatively�when�it�is�coupled�with�violence�(armed�conflict),�or�(b)�positively�when�it�enables� the� two� parties� to� express� through� dialogue� their� opposition,� their� disagreement,� without�resorting�to�violence.� �In�this�case,�the�ability�for�each�side�to�express�the�disagreement�will�allow�them�to�understand�the�other's�position,�and�from�there,�to�try�and�transform�their�disagreement�into�an�agreement�(Difference�between�̒ violenceʼ�and�̒ conflictʼ).
What�makes�conflict�in�police�significant?
Police�are�for�the�protection�of�society�from�any�kind�of�conflict�and�violence.��And�to�achieve�this�goal�police�personnel�have�to�jointly�make�concerted�efforts,�which�is�possible�only�if�they�have�faith�and�cooperation�among�themselves.��Such�determined�teamwork�from�all�can�help�to�deter�evils�from�the�society.��Instead,�if�there�is�no�proper�understanding�and�cordial�relationship�among�them,�it�would�lead�to�conflicts.
Grievance�Redressal�System�‒�Provisions�in�Gujarat�Police�Manual
As�per�Gujarat�Police�Manual�(GPM)�the�Range�DIG�of�Police�will�carry�out�inspection�of�districts�in�their�range�once�a�year.�The�inspection�of�a�district�should�cover�that�of�the�Headquarters,�the�town�or�city�police�station.� �During�inspection�he�holds�Orderly�Room�wherein�concerned�personnel�can�present�their�case.��The�SP�should�inspect�offices�of�the�SDPOs�once�in�a�year�and�SP�and�SDPO�will�inspect�police�stations�and�Out-posts�in�their�respective�charges�at�least�once�a�year.��Orderly�Room�should�be�held�at�all�police�stations�
and�Out-posts,�and�all�applications,�reports�and�complaints�dealt�with�on�the�spot�(GPM).
In�addition�to�Orderly�Room,�there�are�systems�of�Durbar�and�Daad�Fariyad�Samiti�wherein�police�personnel�can�present�their�issues�to�the�higher�authorities.
Present�day�situation�
Orderly�Room:��Under�this�system,�anybody�who�has�grievance�can�give�report�to�the�police�authority�and�request�for�an�orderly�room.� �The�authority�gives�a�date�and�time�in�which�he�can�personally�meet�the�authority.��On�that�date�and�time,�the�applicant,�through�orderly�room�facilitator,�meets�the�authority�and�presents�his�case�in�detail.��After�hearing�the�applicant,�the�authority�takes�final�decision.
Generally,�the�authority�does�not�permit�everybody�to�have�orderly�room�because�the�number�of�persons�with�a�variety�of�problems�is�large.� �In�such�a�situation,�if�the�authority�allows�everybody�to�have�orderly�room,�he�will�have�to�hold�orderly�room�every�day,�which�will�hamper�his�other�works.��Another�issue�is�that�even�if�a�large�number�of�personnel�have�grievances,�many�of�them�do�not�come�forward�to�have�an�orderly�room�because�they�fear�that�there�are�possibilities�that�they�will�be�singled�out�and�harassed�in�many�ways�by�the�higher�authorities.��
Durbar:�This�is�a�meeting�of�all�police�personnel�with�the�higher�authority.��Generally,�while�carrying�out�the�inspection�(once�in�an�year),�the�SP�holds�the�durbar�in�which�police�personnel�are�allowed�to�raise�their�problems,�and�the�authority�(SP)�is�supposed�to�suggest�solution�to�it.��Similarly,�DySP�holds�one�durbar�in�a�year,�whereas�PI� is�to�hold�4�durbars�yearly.� �However,�a�general� issue�always�raised�by�the�lower�rank�personnel�is�that�when�anybody�raises�an�issue,�he�will�be�made�silent�with�counter�questions�by�the�SP,�or�that�particular� individual� is�noticed�and�singled�out�by�higher�authorities�and�harassed/intimidated� in�many�ways.
Daad�Fariyad�Samiti�(DFS):�After�the�police-strike�of�1988�in�Gujarat,�DFS�was�established�in�all�districts�and�cities�in�the�state.��This�comprised�representatives�of�all�ranks�as�members.��This�samiti�acted�as�a�platform�for� police� to� present� their� grievances.� � In� the� beginning,� the� samiti�met� regularly� and� discussed� the�problems�of�police.��Over�a�period�of�time�its�function�weakened,�the�representatives�who�were�found�to�be�ʻadamantʼ�on�their�stand�were�intimidated�under�the�pretext�of�discipline,�transferred�to�far�off�places,�etc.��Gradually,�favourites�of�the�higher�authorities�were�̒ selectedʼ�as�members�of�the�samiti,�who�acted�as�their�puppets.� �Slowly�but�surely,�the�samiti�is�seen�to�be�only�on�paper,�and�the�present�situation�is�such�that�majority�of�the�police�personnel�are�unaware�that�such�a�system�exists.
Analysis�of�these�situations�shows�that�there�is�a�feeling�of�fear�among�the�lower�cadre�personnel�towards�
3332
Kavach:�The�Magazine�of�Raksha�Shakti�University
their�higher�authorities.� �The�reason�‒�the�former�does�not�have�good�relationship�and�faith�on�the�latter.��Again,�the�reason�‒�there�is�absence�of�an�effective�mechanism�that�could�honestly�look�at�the�problems�of�lower�cadre�and�make�sincere�efforts�to�solve�it.��Yet�again,�the�reason�‒�the�authorities�who�are�responsible�to� take�care�of� the�welfare�of� the� lower�cadre�personnel�are� rarely�held�accountable� for� their� lethargy�towards�this�responsibility.
Thus,�it�can�be�observed�that�lot�many�things�depend�on�the�attitude�of�highest�authorities.� �Many�of�the�problems�of�police�personnel�can�be�resolved�and�their�work�efficiency�can�be�enhanced�by�changing�attitude�of�high�level�decision�making�authorities.��Present�researcher�recalls�a�study�conducted�by�him�in�2014,�in�which�majority�of�the�respondents�(police�personnel�across�Gujarat)�opined�that�the�high�level�authorities� find� difficulty� in� giving� proper� attention� to� the� problems/grievances� of� lower� level� police�personnel.��This�is�because�they�are�also�overburdened�with�work.��
Discussion
Police�is�the�principal�agency�engrossed�in�ensuring�internal�security�of�the�nation.��To�fulfill�this�task,�it�is�essential�that�they�are�highly�disciplined�and�coordinated.��Any�kind�of�cleavage�among�them�will�have�its�impact�on� their�work�performance.� �But,� it�has�been�observed� that� there�had�been�many� instances�of�physical�fights/quarrels�in�police�organization,�both�amongst�intra-rank�and�inter-rank�personnel.� �These�incidents�show�that�the�discipline�which�is�a�core�element�of�this�organization�is�rapidly�fading�away.
It�can�be�seen�that�during�recruitment�in�police�there�is�no�system�to�evaluate�the�behavioural�pattern�of�candidates�‒�to�ensure�whether�they�possess�good�moral�character,�dedication,�aptitude�towards�service,�whether�their�minds�would�become�vulnerable�to�crime,�violence�or�unethical�practices�and�so�on.� �In�the�absence�of�such�evaluation/assessing�system,�the�job�seekers�take�up�this�occupation�due�to�its�job�security.��Even�after�entrance,�there� is�no�proper�mechanism�to�measure�their�competency,�dedication�and�their�usefulness�to�the�society.��
Another�issue�is�the�lack�of�sufficient�strength�of�police.� �This�leads�to�overburdening�of�work,�more�than�8�hours�of�duty,�fatigue,�disease,�laxity�towards�work,�inability�to�give�proper�care�to�family,�dissatisfaction,�etc.��
Similar�is�the�ratio�of�ranks.� � Insufficient,�and�in�many�cases,�vacancy�of�ranks�create�the�same�pathetic�situation.
In�many�cases�it�was�found�that�the�higher�ups�do�not�give�proper�attention�to�the�grievances�of�junior�level�police�personnel.� �Thus,�the�latter�finds�no�proper�platform�to�present�their�cases,�which�also�leads�to�the�growth�of�frustration.
Another�important�problem�is�the�juniorsʼ�proximity�to�higher�authorities�and�attempts�to�gratify�them.� �This�enables�the�inefficient�to�enjoy�undue�benefits.� �The�result�‒�indiscipline,�moral�turpitude,�greed,�vices,�stress,�absence� of� genuine� platform� to� redress� grievances,� cracks� in� inter-rank� relationship,� demoralization,� and�ultimately,�inability�to�fulfill�the�expectations�of�the�society.��Thus,�the�chasm�between�police�and�public�enlarges.��
SUGGESTIONS
1.� There�is�need�for�setting�up�a�committee�consisting�of�police�personnel�and�officers�with�the�objective�of�looking�to�the�grievances/complaints�of�police�personnel�of�all�ranks�at�all�district/city�level.� �Persons�with�unquestionable�reputation�from�each�rank�(teeth�to�tail)�should�be�members�of�the�committee.
2.� Such�committee�needs�to�meet�periodically�to�discuss�the�problems�of�police�personnel�and�honest�attempts�should�be�made�to�solve�the�problems.��The�atmosphere�of�the�committee�meeting�has�to�be�conducive�so�that�the�members�could�raise�their�issues�without�any�fear�or�hesitation.
3.� Another�important�aspect�is�the�attitude�of�senior�police�authorities�towards�lower�rank�personnel.��Sympathetic�attitude�on�their�part�can�solve�majority�of�the�problems�of�police�personnel.��
4.� This� process� can� be� further� smoothened� by� the� DG&IGP� of� the� state� by� issuing� directions� to� all�district/city�heads�to�regularly�hold�meetings�to�resolve�issues�of�police�personnel.
5.� Sports,�welfare�programmes,�etc.�do�bring�people�together�and�enhance�their�cooperation.� �Hence,�these� kind� of� programs� need� to� be� organized� wherein� personnel� of� all� ranks� are� encouraged� to�participate,�which�will�help�to�narrow�down�the�barricades�between�ranks,�understand�each�others�problems�and�enhance�inter-rank�communication�and�cooperation.
References1.� Blumenthal�Morris�D,�1975;�Justifying�Violence;�The�University�of��Michigan,�Michigan2.� Conflict�Theories;�����3.� Difference�between�'violence'�and�'conflict';��4.� Gujarat�Police�Manual�Vol.�III,�577�B(v)��5.� Gupta�O.P.,�1989;�Social�Factors�of�Violence,�in�Violence:�Roots�and�Resolutions;�Professors�World�Peace�
Academy-India,�New�Delhi
Kavach:�The�Magazine�of�Raksha�Shakti�University
3534
Kavach:�The�Magazine�of�Raksha�Shakti�University
their�higher�authorities.� �The�reason�‒�the�former�does�not�have�good�relationship�and�faith�on�the�latter.��Again,�the�reason�‒�there�is�absence�of�an�effective�mechanism�that�could�honestly�look�at�the�problems�of�lower�cadre�and�make�sincere�efforts�to�solve�it.��Yet�again,�the�reason�‒�the�authorities�who�are�responsible�to� take�care�of� the�welfare�of� the� lower�cadre�personnel�are� rarely�held�accountable� for� their� lethargy�towards�this�responsibility.
Thus,�it�can�be�observed�that�lot�many�things�depend�on�the�attitude�of�highest�authorities.� �Many�of�the�problems�of�police�personnel�can�be�resolved�and�their�work�efficiency�can�be�enhanced�by�changing�attitude�of�high�level�decision�making�authorities.��Present�researcher�recalls�a�study�conducted�by�him�in�2014,�in�which�majority�of�the�respondents�(police�personnel�across�Gujarat)�opined�that�the�high�level�authorities� find� difficulty� in� giving� proper� attention� to� the� problems/grievances� of� lower� level� police�personnel.��This�is�because�they�are�also�overburdened�with�work.��
Discussion
Police�is�the�principal�agency�engrossed�in�ensuring�internal�security�of�the�nation.��To�fulfill�this�task,�it�is�essential�that�they�are�highly�disciplined�and�coordinated.��Any�kind�of�cleavage�among�them�will�have�its�impact�on� their�work�performance.� �But,� it�has�been�observed� that� there�had�been�many� instances�of�physical�fights/quarrels�in�police�organization,�both�amongst�intra-rank�and�inter-rank�personnel.� �These�incidents�show�that�the�discipline�which�is�a�core�element�of�this�organization�is�rapidly�fading�away.
It�can�be�seen�that�during�recruitment�in�police�there�is�no�system�to�evaluate�the�behavioural�pattern�of�candidates�‒�to�ensure�whether�they�possess�good�moral�character,�dedication,�aptitude�towards�service,�whether�their�minds�would�become�vulnerable�to�crime,�violence�or�unethical�practices�and�so�on.� �In�the�absence�of�such�evaluation/assessing�system,�the�job�seekers�take�up�this�occupation�due�to�its�job�security.��Even�after�entrance,�there� is�no�proper�mechanism�to�measure�their�competency,�dedication�and�their�usefulness�to�the�society.��
Another�issue�is�the�lack�of�sufficient�strength�of�police.� �This�leads�to�overburdening�of�work,�more�than�8�hours�of�duty,�fatigue,�disease,�laxity�towards�work,�inability�to�give�proper�care�to�family,�dissatisfaction,�etc.��
Similar�is�the�ratio�of�ranks.� � Insufficient,�and�in�many�cases,�vacancy�of�ranks�create�the�same�pathetic�situation.
In�many�cases�it�was�found�that�the�higher�ups�do�not�give�proper�attention�to�the�grievances�of�junior�level�police�personnel.� �Thus,�the�latter�finds�no�proper�platform�to�present�their�cases,�which�also�leads�to�the�growth�of�frustration.
Another�important�problem�is�the�juniorsʼ�proximity�to�higher�authorities�and�attempts�to�gratify�them.� �This�enables�the�inefficient�to�enjoy�undue�benefits.� �The�result�‒�indiscipline,�moral�turpitude,�greed,�vices,�stress,�absence� of� genuine� platform� to� redress� grievances,� cracks� in� inter-rank� relationship,� demoralization,� and�ultimately,�inability�to�fulfill�the�expectations�of�the�society.��Thus,�the�chasm�between�police�and�public�enlarges.��
SUGGESTIONS
1.� There�is�need�for�setting�up�a�committee�consisting�of�police�personnel�and�officers�with�the�objective�of�looking�to�the�grievances/complaints�of�police�personnel�of�all�ranks�at�all�district/city�level.� �Persons�with�unquestionable�reputation�from�each�rank�(teeth�to�tail)�should�be�members�of�the�committee.
2.� Such�committee�needs�to�meet�periodically�to�discuss�the�problems�of�police�personnel�and�honest�attempts�should�be�made�to�solve�the�problems.��The�atmosphere�of�the�committee�meeting�has�to�be�conducive�so�that�the�members�could�raise�their�issues�without�any�fear�or�hesitation.
3.� Another�important�aspect�is�the�attitude�of�senior�police�authorities�towards�lower�rank�personnel.��Sympathetic�attitude�on�their�part�can�solve�majority�of�the�problems�of�police�personnel.��
4.� This� process� can� be� further� smoothened� by� the� DG&IGP� of� the� state� by� issuing� directions� to� all�district/city�heads�to�regularly�hold�meetings�to�resolve�issues�of�police�personnel.
5.� Sports,�welfare�programmes,�etc.�do�bring�people�together�and�enhance�their�cooperation.� �Hence,�these� kind� of� programs� need� to� be� organized� wherein� personnel� of� all� ranks� are� encouraged� to�participate,�which�will�help�to�narrow�down�the�barricades�between�ranks,�understand�each�others�problems�and�enhance�inter-rank�communication�and�cooperation.
References1.� Blumenthal�Morris�D,�1975;�Justifying�Violence;�The�University�of��Michigan,�Michigan2.� Conflict�Theories;�����3.� Difference�between�'violence'�and�'conflict';��4.� Gujarat�Police�Manual�Vol.�III,�577�B(v)��5.� Gupta�O.P.,�1989;�Social�Factors�of�Violence,�in�Violence:�Roots�and�Resolutions;�Professors�World�Peace�
Academy-India,�New�Delhi
Kavach:�The�Magazine�of�Raksha�Shakti�University
3534
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
Introduction:
The�dynamics�and�face�of�crime�has�been�changing�at�a�rather�faster�rate�than�most�expected.�Nature�of�crimes�has�changed,�so�have�the�criminals�and�ways�of�crime�commission.�These�changes� in�turn�have�brought�compelling�and�comprehensive�changes�in�the�way�these�crimes�were�investigated�and�also�in�the�technology�involved.�Amongst�all�these�sweeping�changes�taking�place�in�the�crime�and�its�investigation,�the� only� thing� that� has� remained� unchanged� is� the� importance� of� crime� scene.� The� crime� scene� has�traditionally�remained�the�treasure�house�of�most�clue�materials�and�continues�to�be�so.�Nothing�has�been�able�to�compromise�its�enormous�value�in�crime�investigation.
The�pace�of�technological�advancement�and�adoption�has�tremendously�increased.�Most�evidence�analysis�has�come�out�of� laboratory�to�be�performed�at�crime�scene� itself�without�any�concession� in�reliability,�quality�and�integrity�of�the�tests.�The�DNA�tests�are�now�chip-based�while�fingerprint�and�ballistics�data�have�taken�the�shape�of�databases�well�accessible�from�the�crime�scene�for�easy�retrieval�and�identification.�With�an�opportunity�to�leverage�this�rapid�development�&�adoption�of�technology�to�alleviate�the�crime�scene�management�methods,�Teleforensic�technology�was�introduced.�Teleforensic�Technology�(TFT)�has�enormous�potential�to�advance�the�crime�scene�discipline.�
Imagine�a�situation�which�needs�the�expertise�and�advice�of�a�forensic�entomologist�at�a�crime�scene�when�dealing�with�a�decaying�body.�Not�having�an�entomologist�can�be�failing�while�having�an�expert�of�any�other�discipline�may�not�be�very�useful.�One�expert�cannot�possibly�cater�to�all�forensic�disciplines�and�needs�and�thus�the�situation�can�be�handled�better�by�a�specialist.�Here,�locating�an�entomologist�and�getting�him�on�crime�scene�in�person�can�be�costly�&�time-consuming.�Imagine�another�situation,�where�a�forensic�ballistic�expert� is�required�at�multiple�geographically�differentiated�locations�due�to�dispersed�shooting�incidences.�Such�high�pressure�situations�can�be�tricky�as�which�crime�scene�to�attend�and�which�one�to�skip.�Which�crime�scene�to�be�prioritized�and�which�to�be�deferred?��
TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance
* ** *** ****Surbhi�Mathur ,�Sumit�Kumar�Choudhary ,�Parvesh�Sharma ,�Preeti �
*�Assistant�professor�(Jr.),�Inst.�Of�Forensic�Science,�Gujarat�Forensic�Sciences�University**�Assistant�Professor,�Forensic�Science,�Raksha�Shakti�University***�JRF�(Forensic�Science),�Raksha�Shakti�University****�JRF�(Forensic�Science),�Raksha�Shakti�University
Forensic�Science�laboratories�and�their�experts�face�a�constant�challenge�in�balancing�the�needs�of�their�user� agencies� with� efficient� operation.� Their� demands� for� crime� scene� management� &� evidentiary�examinations�have�increased�greatly,�fueled�by�media�&�mass�awareness�about�its�vast�potential�in�solving�crimes.�The�two�situations�discussed�above�presents�one�such�balancing�dilemma.�In�the�first�situation,�we�understand�that�practically,�not�all�experts�can�be�sent�to�scrutinize�each�crime�scene�which�also�carries�the�risk�of�badly�contaminating�the�crime�scene.�The�second�situation�vastly�increases�the�manpower�demand�for�each�specific�discipline,�which�is�again�not�a�practical�solution.�For�a�proper�crime�scene�management,�establishing� the� physical� co-location� of� evidence� and� examiner̶or� rather,� more� than� one� or� two�examiners̶is�often�difficult,�expensive,�and�inefficient.�This�is�where�Teleforensics�can�be�helpful.
Teleforensic�Technology�is�defined�as�the�use�of�technology�to�transmit�crime-scene�images�and�data�in�real�time�to�forensic�personnel�at�a�distant�location.�Tele-forensic�technology�transmits�real�time,�high�quality�images�and�electronically�captured�data�from�a�crime�scene�to�forensic�science�laboratory�for�the�perusal�of�forensic�experts�at�lab�and/or�for�receiving�guidelines�on�processing�the�crime�scene.�This�is�significant�as�Forensic�science�involves�use�of�all�scientific�and�technological�disciplines�for�crime�investigation�to�aid�in�the�justice�delivery�system.�Teleforensics�capability�allows�examiners�to�perform�all�functions�necessary�to�conduct�crime�scene�inspection�&�evidentiary�analysis�saving�manpower,�time�and�money.�Cloud�and�other�communication�technologies�allow�data�from�the�multiple�crime�scene�locations�to�be�shared�with�the�different�experts�or�their�team.�The�experts�could�be�connected�virtually�and�could�almost�immediately�begin�to�help�make�time-sensitive�decisions�about�evidence�collection�and�preservation.�TFT�both�enables�and�can�drive�transformation�by�changing�the�“expertise�paradigm.”�No�longer�does�an�individual�or�crime�scene�team�have�to�be�solely�reliant�on�his�or�their�own�expertise�in�every�situation.�TFT�allows�limiting�the�number�of�personnel�who�must�be�physically�present�at�a�crime�scene�which�in�turn�helps�maintain�the�integrity�of�a�scene�and�reduces�the�risk�of�cross-contamination.�With�teleforensics,�fewer�people�will�be�on�scene,�but�more�people�will�actually�be�looking�at�the�scene�from�a�remote�location,�making�suggestions�about�what�to�collect�for�forensic�examination�and�how�to�collect�it.� In�turn,�evidence�will�be�analyzed�quicker�with�findings�sent�back�to�the�crime�scene.�
The�Technology:
Tele-forensics� is� a� video� conferencing� based� technology.� The� video� conferencing� terminal� should� be�equipped�with�certain�basic�components�like�a�camera�(for�capturing�local�video),�a�video�display�unit�(for�displaying�captured�video�at�a�remote�site),�a�micro�phone�(for�capturing�local�audio),�and�good�quality�speakers�(for�playing�captured�audio).�In�addition�to�this�more�obvious�components,�a�video�conferencing�
3736
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
Introduction:
The�dynamics�and�face�of�crime�has�been�changing�at�a�rather�faster�rate�than�most�expected.�Nature�of�crimes�has�changed,�so�have�the�criminals�and�ways�of�crime�commission.�These�changes� in�turn�have�brought�compelling�and�comprehensive�changes�in�the�way�these�crimes�were�investigated�and�also�in�the�technology�involved.�Amongst�all�these�sweeping�changes�taking�place�in�the�crime�and�its�investigation,�the� only� thing� that� has� remained� unchanged� is� the� importance� of� crime� scene.� The� crime� scene� has�traditionally�remained�the�treasure�house�of�most�clue�materials�and�continues�to�be�so.�Nothing�has�been�able�to�compromise�its�enormous�value�in�crime�investigation.
The�pace�of�technological�advancement�and�adoption�has�tremendously�increased.�Most�evidence�analysis�has�come�out�of� laboratory�to�be�performed�at�crime�scene� itself�without�any�concession� in�reliability,�quality�and�integrity�of�the�tests.�The�DNA�tests�are�now�chip-based�while�fingerprint�and�ballistics�data�have�taken�the�shape�of�databases�well�accessible�from�the�crime�scene�for�easy�retrieval�and�identification.�With�an�opportunity�to�leverage�this�rapid�development�&�adoption�of�technology�to�alleviate�the�crime�scene�management�methods,�Teleforensic�technology�was�introduced.�Teleforensic�Technology�(TFT)�has�enormous�potential�to�advance�the�crime�scene�discipline.�
Imagine�a�situation�which�needs�the�expertise�and�advice�of�a�forensic�entomologist�at�a�crime�scene�when�dealing�with�a�decaying�body.�Not�having�an�entomologist�can�be�failing�while�having�an�expert�of�any�other�discipline�may�not�be�very�useful.�One�expert�cannot�possibly�cater�to�all�forensic�disciplines�and�needs�and�thus�the�situation�can�be�handled�better�by�a�specialist.�Here,�locating�an�entomologist�and�getting�him�on�crime�scene�in�person�can�be�costly�&�time-consuming.�Imagine�another�situation,�where�a�forensic�ballistic�expert� is�required�at�multiple�geographically�differentiated�locations�due�to�dispersed�shooting�incidences.�Such�high�pressure�situations�can�be�tricky�as�which�crime�scene�to�attend�and�which�one�to�skip.�Which�crime�scene�to�be�prioritized�and�which�to�be�deferred?��
TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance
* ** *** ****Surbhi�Mathur ,�Sumit�Kumar�Choudhary ,�Parvesh�Sharma ,�Preeti �
*�Assistant�professor�(Jr.),�Inst.�Of�Forensic�Science,�Gujarat�Forensic�Sciences�University**�Assistant�Professor,�Forensic�Science,�Raksha�Shakti�University***�JRF�(Forensic�Science),�Raksha�Shakti�University****�JRF�(Forensic�Science),�Raksha�Shakti�University
Forensic�Science�laboratories�and�their�experts�face�a�constant�challenge�in�balancing�the�needs�of�their�user� agencies� with� efficient� operation.� Their� demands� for� crime� scene� management� &� evidentiary�examinations�have�increased�greatly,�fueled�by�media�&�mass�awareness�about�its�vast�potential�in�solving�crimes.�The�two�situations�discussed�above�presents�one�such�balancing�dilemma.�In�the�first�situation,�we�understand�that�practically,�not�all�experts�can�be�sent�to�scrutinize�each�crime�scene�which�also�carries�the�risk�of�badly�contaminating�the�crime�scene.�The�second�situation�vastly�increases�the�manpower�demand�for�each�specific�discipline,�which�is�again�not�a�practical�solution.�For�a�proper�crime�scene�management,�establishing� the� physical� co-location� of� evidence� and� examiner̶or� rather,� more� than� one� or� two�examiners̶is�often�difficult,�expensive,�and�inefficient.�This�is�where�Teleforensics�can�be�helpful.
Teleforensic�Technology�is�defined�as�the�use�of�technology�to�transmit�crime-scene�images�and�data�in�real�time�to�forensic�personnel�at�a�distant�location.�Tele-forensic�technology�transmits�real�time,�high�quality�images�and�electronically�captured�data�from�a�crime�scene�to�forensic�science�laboratory�for�the�perusal�of�forensic�experts�at�lab�and/or�for�receiving�guidelines�on�processing�the�crime�scene.�This�is�significant�as�Forensic�science�involves�use�of�all�scientific�and�technological�disciplines�for�crime�investigation�to�aid�in�the�justice�delivery�system.�Teleforensics�capability�allows�examiners�to�perform�all�functions�necessary�to�conduct�crime�scene�inspection�&�evidentiary�analysis�saving�manpower,�time�and�money.�Cloud�and�other�communication�technologies�allow�data�from�the�multiple�crime�scene�locations�to�be�shared�with�the�different�experts�or�their�team.�The�experts�could�be�connected�virtually�and�could�almost�immediately�begin�to�help�make�time-sensitive�decisions�about�evidence�collection�and�preservation.�TFT�both�enables�and�can�drive�transformation�by�changing�the�“expertise�paradigm.”�No�longer�does�an�individual�or�crime�scene�team�have�to�be�solely�reliant�on�his�or�their�own�expertise�in�every�situation.�TFT�allows�limiting�the�number�of�personnel�who�must�be�physically�present�at�a�crime�scene�which�in�turn�helps�maintain�the�integrity�of�a�scene�and�reduces�the�risk�of�cross-contamination.�With�teleforensics,�fewer�people�will�be�on�scene,�but�more�people�will�actually�be�looking�at�the�scene�from�a�remote�location,�making�suggestions�about�what�to�collect�for�forensic�examination�and�how�to�collect�it.� In�turn,�evidence�will�be�analyzed�quicker�with�findings�sent�back�to�the�crime�scene.�
The�Technology:
Tele-forensics� is� a� video� conferencing� based� technology.� The� video� conferencing� terminal� should� be�equipped�with�certain�basic�components�like�a�camera�(for�capturing�local�video),�a�video�display�unit�(for�displaying�captured�video�at�a�remote�site),�a�micro�phone�(for�capturing�local�audio),�and�good�quality�speakers�(for�playing�captured�audio).�In�addition�to�this�more�obvious�components,�a�video�conferencing�
3736
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
terminal�also�includes�a�codec�(compressor�or�/�decompressor),�a�user�interface,�a�computer�system�to�run�on,�and�a�network�connection.�
There�are�various�ways�of�employing�a�Teleforensic�Technology�for�forensic�purposes,�all�of�which�varies�in�terms�of�quality,�security�and�speed�of�transmission�and�cost�involved.�The�various�ways�can�be:
ª A�cell�phone�with�an�in-built�camera�in�it�provides�the�simplest�and�lowest�cost�option�as�a�TFT.�You�collect� the� picture� at� the� crime� scene� send� it� to� FSL� at� any� place� in� the� world� in� little� time.�Understandably,�this�system�might�have�issues�in�terms�of�security�and�fidelity�of�the�image.��
ª Using�a�digital�camera�for�capturing�photographs�or�videos�and�then�storing�it�in�a�laptop.�It�can�be�sent�to�FSL�using�a�wireless�cellular�modem�at�a�reasonable�speed�with�a�fairly�good�connectivity.�This�option�works�well�in�terms�of�image�quality.
ª A�satellite�videophone�system�is�a�step�up�from�the�previous�one�in�terms�of�quality.�The�image�quality�and�data�transmission�speed�are�notch�higher.�Mobility�of�this�system�is�excellent,�as�this�can�be�carried�anywhere�with�the�satellite�antenna�having�view�of�the�sky.�This�system�would�be�relatively�costlier.
ª Another�system�can�be�landline-based�video�conferencing�systems.�This�offers�excellent�image�quality,�superb�image�fidelity�but�fails�in�system�portability.�These�are�either�stationary�systems�or�huge�mobile�systems.�This�is�a�very�costly�option.
ª Beyond�all�these�technologies�is�Space�administration�based�technology�which�is�considered�as�the�future�of�Teleforensic�technology.�
The�Teleforensic�technology�should�be�equipped�with�additional�hardware�and�software�capabilities�when�it�is�expected�to�perform�additional�functions�such�as�evidence�analysis,�interaction�with�technicians,�text�chat,�exchange�files�and�other�information�throughout�a�session.�The�results�of�the�examiner's�work�can�be�saved�for�later�review�along�with�a�log�consisting�of�notes�and�performed�operations.
Merits:
The�Teleforensic�technology�brings�with�it�a�lot�of�positives.�The�forensic�experts�can�remain�stationed�at�Forensic�Science�laboratory�and�interact�with�police�officers�or�crime�scene�managers�from�laboratory�itself.�Issues�at�multiple�crime�scenes�can�be�addressed�simultaneously�without�reaching�to�either�of�the�spots.�Video�recording�of�evidence�processing�such�as�collection,�packaging,�sealing�and�labelling�of�items�can�be�
done�before�forwarding�it�to�the�forensic�science�laboratory.�This�facilitates�tamper-proof�collection�and�preservation�of�the�collected�items.�Such�video-recordings�can�be�used�for�cross�verifying�the�same�item�when�it�would�be�opened�in�the�relevant�unit�of�the�lab�for�further�analysis.�It�would�also�ease�establishing�of�chain�of�custody�dispelling�doubts�regarding�sanctity�&�integrity�of�the�evidence.
One�of�the�biggest�plus�with�TFT�is�that�it�enables�immediate�transferring�of�some�evidences�like�finger�prints�or�cartridge�case/�bullet�marks�to�FSL�for�prompt�database�search�and�rapid�identification.�This�leads�to�quick�finalization�of�certain�cases�thereby�reducing�the�burden�on�the�FSL.�TFT�can�also�help�in�creating�crime�scene�databases�incorporating�variety�of�cases,�important�clue�materials�encountered,�which�can�help�in�enhancing�the�skills�required�to�handle�crime�cases�by�imparting�training�to�the�law�enforcement�personnels.�
Future�Scope�of�the�TFT:
The�Teleforensic�Technology�needs�improvement�in�image�quality,�fidelity,�encryption,�signal�power�and�distance,�among�others.�Data�transmitted�between�the�forensic�expert�and�the�crime�scene�is�sensitive�by�nature.�Therefore,�it�is�crucial�to�ensure�that�the�data�is�protected�and�only�legitimate�recipients�should�receive�the�data.�The�cost�of�using�the�technology�should�also�be�brought�down�to�increase�user�base.�Sharing�and�collaboration�of�data�should�also�be�promoted�among�various�departments.�Future�research�should�focus�on�the�above�cited�areas�to�increase�the�use�of�technology�in�legal�set�up.
References:
[1]�� McGrath,�R.�“The�Pace�of�Technology�Adoption�is�Speeding�Up.”�HBR�Blog�Network.�(November�25,�2013)� Accessed� on� April� 14,� 2014.� Retrieved� from:� http://blogs.hbr.org/2013/11/the-pace-of-technology-adoption-is-speeding-up/
[2]�� Eisold,�K.�“Resistance�to�Change�in�Organizations.”�Psychology�Today�(online).�(May�26,�2010)�Accessed�on� Apri l � 14, � 2014. � Retrieved� from:� http://www.psychologytoday.com/blog/hidden-motives/201005/resistance-change-in-organizations
[3]�� Garrison,�D.�“Teleforensics.”�Evidence�Technology�Magazine.�7(1)�pp.�14-17�(2009).
[4]�� Rebecca�Kanable�“Nothing�to�Sneeze�at�Remote�information�sharing�technologies�promise�to�help�preserve�the�crime�scene�and�speed�up�investigations”
3938
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
terminal�also�includes�a�codec�(compressor�or�/�decompressor),�a�user�interface,�a�computer�system�to�run�on,�and�a�network�connection.�
There�are�various�ways�of�employing�a�Teleforensic�Technology�for�forensic�purposes,�all�of�which�varies�in�terms�of�quality,�security�and�speed�of�transmission�and�cost�involved.�The�various�ways�can�be:
ª A�cell�phone�with�an�in-built�camera�in�it�provides�the�simplest�and�lowest�cost�option�as�a�TFT.�You�collect� the� picture� at� the� crime� scene� send� it� to� FSL� at� any� place� in� the� world� in� little� time.�Understandably,�this�system�might�have�issues�in�terms�of�security�and�fidelity�of�the�image.��
ª Using�a�digital�camera�for�capturing�photographs�or�videos�and�then�storing�it�in�a�laptop.�It�can�be�sent�to�FSL�using�a�wireless�cellular�modem�at�a�reasonable�speed�with�a�fairly�good�connectivity.�This�option�works�well�in�terms�of�image�quality.
ª A�satellite�videophone�system�is�a�step�up�from�the�previous�one�in�terms�of�quality.�The�image�quality�and�data�transmission�speed�are�notch�higher.�Mobility�of�this�system�is�excellent,�as�this�can�be�carried�anywhere�with�the�satellite�antenna�having�view�of�the�sky.�This�system�would�be�relatively�costlier.
ª Another�system�can�be�landline-based�video�conferencing�systems.�This�offers�excellent�image�quality,�superb�image�fidelity�but�fails�in�system�portability.�These�are�either�stationary�systems�or�huge�mobile�systems.�This�is�a�very�costly�option.
ª Beyond�all�these�technologies�is�Space�administration�based�technology�which�is�considered�as�the�future�of�Teleforensic�technology.�
The�Teleforensic�technology�should�be�equipped�with�additional�hardware�and�software�capabilities�when�it�is�expected�to�perform�additional�functions�such�as�evidence�analysis,�interaction�with�technicians,�text�chat,�exchange�files�and�other�information�throughout�a�session.�The�results�of�the�examiner's�work�can�be�saved�for�later�review�along�with�a�log�consisting�of�notes�and�performed�operations.
Merits:
The�Teleforensic�technology�brings�with�it�a�lot�of�positives.�The�forensic�experts�can�remain�stationed�at�Forensic�Science�laboratory�and�interact�with�police�officers�or�crime�scene�managers�from�laboratory�itself.�Issues�at�multiple�crime�scenes�can�be�addressed�simultaneously�without�reaching�to�either�of�the�spots.�Video�recording�of�evidence�processing�such�as�collection,�packaging,�sealing�and�labelling�of�items�can�be�
done�before�forwarding�it�to�the�forensic�science�laboratory.�This�facilitates�tamper-proof�collection�and�preservation�of�the�collected�items.�Such�video-recordings�can�be�used�for�cross�verifying�the�same�item�when�it�would�be�opened�in�the�relevant�unit�of�the�lab�for�further�analysis.�It�would�also�ease�establishing�of�chain�of�custody�dispelling�doubts�regarding�sanctity�&�integrity�of�the�evidence.
One�of�the�biggest�plus�with�TFT�is�that�it�enables�immediate�transferring�of�some�evidences�like�finger�prints�or�cartridge�case/�bullet�marks�to�FSL�for�prompt�database�search�and�rapid�identification.�This�leads�to�quick�finalization�of�certain�cases�thereby�reducing�the�burden�on�the�FSL.�TFT�can�also�help�in�creating�crime�scene�databases�incorporating�variety�of�cases,�important�clue�materials�encountered,�which�can�help�in�enhancing�the�skills�required�to�handle�crime�cases�by�imparting�training�to�the�law�enforcement�personnels.�
Future�Scope�of�the�TFT:
The�Teleforensic�Technology�needs�improvement�in�image�quality,�fidelity,�encryption,�signal�power�and�distance,�among�others.�Data�transmitted�between�the�forensic�expert�and�the�crime�scene�is�sensitive�by�nature.�Therefore,�it�is�crucial�to�ensure�that�the�data�is�protected�and�only�legitimate�recipients�should�receive�the�data.�The�cost�of�using�the�technology�should�also�be�brought�down�to�increase�user�base.�Sharing�and�collaboration�of�data�should�also�be�promoted�among�various�departments.�Future�research�should�focus�on�the�above�cited�areas�to�increase�the�use�of�technology�in�legal�set�up.
References:
[1]�� McGrath,�R.�“The�Pace�of�Technology�Adoption�is�Speeding�Up.”�HBR�Blog�Network.�(November�25,�2013)� Accessed� on� April� 14,� 2014.� Retrieved� from:� http://blogs.hbr.org/2013/11/the-pace-of-technology-adoption-is-speeding-up/
[2]�� Eisold,�K.�“Resistance�to�Change�in�Organizations.”�Psychology�Today�(online).�(May�26,�2010)�Accessed�on� Apri l � 14, � 2014. � Retrieved� from:� http://www.psychologytoday.com/blog/hidden-motives/201005/resistance-change-in-organizations
[3]�� Garrison,�D.�“Teleforensics.”�Evidence�Technology�Magazine.�7(1)�pp.�14-17�(2009).
[4]�� Rebecca�Kanable�“Nothing�to�Sneeze�at�Remote�information�sharing�technologies�promise�to�help�preserve�the�crime�scene�and�speed�up�investigations”
3938
siiflyigiiWii; amiDiviiD Sih!r pii!li&si
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
5|FZ\E ov;]Z1FF ;[T] ;M;FI8L V\TU"T “SgIF :JvZMHUFZ” SFI"ÊD IMHJFG]+ GÉSL SZJFDF\ VFJ[, CT]\ H[GF äFZF VDNFJFN XC[ZGL 5M,L;
,F.GGL DlC,FVM DF8[ “SgIF :JvZMHUFZ” G]\ VFIMHG SZ[,P H[DF\ D[P ;\I]ÉT 5M,L; SlDÆZzL4 D]bI DYS4 VDNFJFN XC[Z äFZF
ZMHUFZ,1FL SFI"ÊD ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D S],vZ TF,LDG]\ VFIMHG SZ[,P
D]bI C[T] ov;]Z1FF ;[T] V\TU"T VDNFJFN XC[ZGL NZ[S 5M,L; ,F.GMDF\ ZC[TL DlC,FVM 5MTFGL ZLT[ :JvlGE"Z Y. 5MTFGF 5U 5Z éEF ZCL XS[
T[ C[T] “SgIF :JvZMHUFZ” ZMHUFZ TF,LDG]\ VFIMHG SZJFDF\ VFJ[, CT]P H[DF\ ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D A[ ZMHUFZ,1FL
SFI"ÊDM VD,DF\ D]S[, 5M,L; ,F.GDF\ ZC[TL DlC,FVM DF8[ ;ZSFZzLGF TZOYL VF SFI"ÊD VD,DF\ D]S[, K[ H[GF äFZF DlC,F 5MTFGM
ptSQF" SZLG[ VF jIlÉTUT T[DH SF{8]\ALS ;CSFZ VF5L XS[ VG[ ;1FD AG[ T[ VF SFI"ÊDG]\ D]bI CFN" K[P
lJRFZ ovSC[JFI K[ S[ V[S ;O/ 5]Z]QF 5FK/ V[S ;O/ :+LGM CFY CMI K[ T[ D]HA 5|tI[S 5M,L; D[GG[ T[GL SFI"N1FTF4 5;"GFl,8L4 jIlÉTUT
SF{X<IM T[DH AF/SMGF\ ElJQI DF8[ VG[ VFHGF\ I]UDF\ VFJTL VFlY"S D]xS[,LVMGM ;FDGM SZL XS[ T[ DF8[ VF SFI"ÊD YSL ;DFHDF\ V[S
VFUJ]\ :YFG ,. ;DFH T[DH 5MTFGF\ 5lZJFZG[ ;O/ AGFJJF 5MTFGL V[S VFUJL VM/B éEL SZL XS[ T[ DF8[GM V[S ;\S<5vl;wW
SZL XS[ T[ C[T] VF :JvZMHUFZ,1FL TF,LDG]\ VFIMHG ;]Z1FF ;[T] ;M;FI8L äFZF U]HZFT ;ZSFZGL VF 5C[, V[S VFUJ]\ pNFCZ6 K[P
5]Z]QF ;DMJ0L DlC,F ovVFHGF I]UDF\ OÉT 5]Z]QF5|WFG ;DFH GYL ZæM 5Z\T] VFHGF\ I]UGL DlC,F 56 T[DF\ AFSFT GYLP H[D S[ ;DFH4 ZDTUDT4 lX1F64
J{7FlGS T[DH jIJ;FlIS ãlQ8V[ 56 VFHGL DlC,FVMV[ VFUJ]\ :YFG CF\;, SZ[, K[P H[DF\ SgIF :JvZMHUFZ äFZF DlC,F jIJ;FlIS
ãlQ8V[ 5]Z]QF ;DMJ0L AGL 5MTFGF\ S]8]\A4 ;DFHDF\ V[S VFUJL VM/B éEL SZL 5]Z]QF ;DMJ0L AGL XS[P
:JvZMHUFZ TF,LDG]\ GFD os!f ;LJ6 S,F; ov
VDNFJFN XCZ[ 5M,L; ,F.GDF \ ZCT[ L DlC,FVMG [ “SgIF :JvZMHUFZ”
TF,LDDF \ Db] ItJ [ ;LJ6 É,F; VG [ aI8] L 5F,Z" VD[ A [ 5S| FZGL TF,LD
VF5JFDF \ VFJ,[ KP[ S6FJ" TL DlC,F ;J[ FzI ;J[ F ;3\ äFZF !Z ;LJ6 É,F;
56} " G [ (*) DlC,FVMG [SZL TF,LD VF5JFDF \ VFJ,[ KP[sZf aI]8L 5F,"ZVDNFJFN XC[Z 5M,L; ,F.GGL S],v!#5( DlC,FVMV[ ;LJ6 É,F;qaI]8L
5F,"ZGL TF,LD 5}6" SZ[, K[P T[DH ALHL 5M,L; ,F.GMDF\ 56 TF,LDM XZ]
SZJFG]\ SFI"ZT K[P
5M,L; V`JvN/ VDNFJFN XC[Z ;FO<I UFYFV`JvTF,LDXF/F VDNFJFN BFT[ RF,TL 5M,L; CM;" ZFI0L\U É,ADF\
GLR[ D]HAGL 5|J'l¿VMG]\ VFIMHG SZJFDF\ VFJ[ K[P 5M,L; VG[
DlC,FVMG[ 5|Mt;FCG D/[ VG[ DlC,F ;XlÉTSZ6 YFI VG[ 5M,L;
BFTFDF\ HM0FI T[DH 5M,L; VG[ 5|HF JrR[ ;DgJI H/JF. ZC[ T[ C[T]YL
VF 5|J'l¿ SZJFDF\ VFJ[, K[P
DlC,FVM DF8[ 5]J" EZTL TF,LDVDNFJFN XC[Z 5M,L; äFZF 5|YD !__ lNJ; ,ÓF\S CF;, SZJF VDNFJFN XC[Z TYF ZFßIGL DlC,FVM 5M,L; N/DF\ JW]DF\
JW] HM0FI VG[ 5MTFG]\ V[S VFUJ]\ ÒJG ÒJ[ T[ ,ÓF\SYL prR VlWSFZLzLGF ;O/ ;CSFZYL D]bI DYS BFT[ DlC,F 5]J" EZTL
TF,LDG]\ VFIMHG SZJFDF\ VFJ[, VG[ VFXZ[ #Z5 DlC,F q I]JTLVMV[ 5]J" EZTL TF,LDDF\ HM0FJJFGM lG6"I SZ[, K[P
:JZ1F6 sDZLG8F:Sv h]0M4 SZF8[f TF,LD;]Z1FF ;[T] V\TU"T :SLD ;[<O 0LO[g; VGFD" SMdA[É8GF VD,LSZ6 DF8[
VDNFJFN XC[ZGL VFXZ[ $Z&# lJnFYL"VMG[ 5MTFGF :JvARFJ DF8[ S[JL
S[JL 5|lÊIF SZ[ T[G]\ lJUTJFZ ;DH6 VF5L T{IFZ SZL ;ZSFZ[ VF5[, ,1IF\S
5]6" SZJFDF\ VFJ[,P T[DH UlTXL, U]HZFT SFI"ÊDvZ_!5 ;]WLDF\ VFXZ[
5___ I]JTLVM :JZ1F6 TF,LD D[/J[ T[J]\ VFIMHG SZJFDF\ VFJ[, K[P
_PZZ ZFIO, X]8L\U TF,LDGL ;FO<I UFYFVDNFJFN XC[Z 5M,L; D]bI DYS BFT[ ;]Z1FF ;[T] ;M;FI8LGF p5ÊD[ DlC,F
;XlÉTSZ6GF EFU~5[ _PZZ ZFIO, X]8L\U TF,LD DF8[G]\ VFIMHG SZJFDF\ H[DF $*&!
DlC,FVM qI]JTLVM qU'lC6LVMV[ EFU ,. ;DHNFZL 5]J"S VFtDlJ`JF;YL ZFIO, äFZF
OFIZL\U SZ[, H[DF\ _PZZGF VFXZ[ $*&!_ ZFpg0GM BR" 56 SZJFDF\ VFJ[,P p5ZMÉT
OFIZL\U TF,LDDF\ EFU ,LW[, TDFD DlC,FVM !( YL 5_ JQF" JrR[GL CTLP
SgIF :JvZMHUFZ TF,LD
4140
siiflyigiiWii; amiDiviiD Sih!r pii!li&si
Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University
5|FZ\E ov;]Z1FF ;[T] ;M;FI8L V\TU"T “SgIF :JvZMHUFZ” SFI"ÊD IMHJFG]+ GÉSL SZJFDF\ VFJ[, CT]\ H[GF äFZF VDNFJFN XC[ZGL 5M,L;
,F.GGL DlC,FVM DF8[ “SgIF :JvZMHUFZ” G]\ VFIMHG SZ[,P H[DF\ D[P ;\I]ÉT 5M,L; SlDÆZzL4 D]bI DYS4 VDNFJFN XC[Z äFZF
ZMHUFZ,1FL SFI"ÊD ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D S],vZ TF,LDG]\ VFIMHG SZ[,P
D]bI C[T] ov;]Z1FF ;[T] V\TU"T VDNFJFN XC[ZGL NZ[S 5M,L; ,F.GMDF\ ZC[TL DlC,FVM 5MTFGL ZLT[ :JvlGE"Z Y. 5MTFGF 5U 5Z éEF ZCL XS[
T[ C[T] “SgIF :JvZMHUFZ” ZMHUFZ TF,LDG]\ VFIMHG SZJFDF\ VFJ[, CT]P H[DF\ ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D A[ ZMHUFZ,1FL
SFI"ÊDM VD,DF\ D]S[, 5M,L; ,F.GDF\ ZC[TL DlC,FVM DF8[ ;ZSFZzLGF TZOYL VF SFI"ÊD VD,DF\ D]S[, K[ H[GF äFZF DlC,F 5MTFGM
ptSQF" SZLG[ VF jIlÉTUT T[DH SF{8]\ALS ;CSFZ VF5L XS[ VG[ ;1FD AG[ T[ VF SFI"ÊDG]\ D]bI CFN" K[P
lJRFZ ovSC[JFI K[ S[ V[S ;O/ 5]Z]QF 5FK/ V[S ;O/ :+LGM CFY CMI K[ T[ D]HA 5|tI[S 5M,L; D[GG[ T[GL SFI"N1FTF4 5;"GFl,8L4 jIlÉTUT
SF{X<IM T[DH AF/SMGF\ ElJQI DF8[ VG[ VFHGF\ I]UDF\ VFJTL VFlY"S D]xS[,LVMGM ;FDGM SZL XS[ T[ DF8[ VF SFI"ÊD YSL ;DFHDF\ V[S
VFUJ]\ :YFG ,. ;DFH T[DH 5MTFGF\ 5lZJFZG[ ;O/ AGFJJF 5MTFGL V[S VFUJL VM/B éEL SZL XS[ T[ DF8[GM V[S ;\S<5vl;wW
SZL XS[ T[ C[T] VF :JvZMHUFZ,1FL TF,LDG]\ VFIMHG ;]Z1FF ;[T] ;M;FI8L äFZF U]HZFT ;ZSFZGL VF 5C[, V[S VFUJ]\ pNFCZ6 K[P
5]Z]QF ;DMJ0L DlC,F ovVFHGF I]UDF\ OÉT 5]Z]QF5|WFG ;DFH GYL ZæM 5Z\T] VFHGF\ I]UGL DlC,F 56 T[DF\ AFSFT GYLP H[D S[ ;DFH4 ZDTUDT4 lX1F64
J{7FlGS T[DH jIJ;FlIS ãlQ8V[ 56 VFHGL DlC,FVMV[ VFUJ]\ :YFG CF\;, SZ[, K[P H[DF\ SgIF :JvZMHUFZ äFZF DlC,F jIJ;FlIS
ãlQ8V[ 5]Z]QF ;DMJ0L AGL 5MTFGF\ S]8]\A4 ;DFHDF\ V[S VFUJL VM/B éEL SZL 5]Z]QF ;DMJ0L AGL XS[P
:JvZMHUFZ TF,LDG]\ GFD os!f ;LJ6 S,F; ov
VDNFJFN XCZ[ 5M,L; ,F.GDF \ ZCT[ L DlC,FVMG [ “SgIF :JvZMHUFZ”
TF,LDDF \ Db] ItJ [ ;LJ6 É,F; VG [ aI8] L 5F,Z" VD[ A [ 5S| FZGL TF,LD
VF5JFDF \ VFJ,[ KP[ S6FJ" TL DlC,F ;J[ FzI ;J[ F ;3\ äFZF !Z ;LJ6 É,F;
56} " G [ (*) DlC,FVMG [SZL TF,LD VF5JFDF \ VFJ,[ KP[sZf aI]8L 5F,"ZVDNFJFN XC[Z 5M,L; ,F.GGL S],v!#5( DlC,FVMV[ ;LJ6 É,F;qaI]8L
5F,"ZGL TF,LD 5}6" SZ[, K[P T[DH ALHL 5M,L; ,F.GMDF\ 56 TF,LDM XZ]
SZJFG]\ SFI"ZT K[P
5M,L; V`JvN/ VDNFJFN XC[Z ;FO<I UFYFV`JvTF,LDXF/F VDNFJFN BFT[ RF,TL 5M,L; CM;" ZFI0L\U É,ADF\
GLR[ D]HAGL 5|J'l¿VMG]\ VFIMHG SZJFDF\ VFJ[ K[P 5M,L; VG[
DlC,FVMG[ 5|Mt;FCG D/[ VG[ DlC,F ;XlÉTSZ6 YFI VG[ 5M,L;
BFTFDF\ HM0FI T[DH 5M,L; VG[ 5|HF JrR[ ;DgJI H/JF. ZC[ T[ C[T]YL
VF 5|J'l¿ SZJFDF\ VFJ[, K[P
DlC,FVM DF8[ 5]J" EZTL TF,LDVDNFJFN XC[Z 5M,L; äFZF 5|YD !__ lNJ; ,ÓF\S CF;, SZJF VDNFJFN XC[Z TYF ZFßIGL DlC,FVM 5M,L; N/DF\ JW]DF\
JW] HM0FI VG[ 5MTFG]\ V[S VFUJ]\ ÒJG ÒJ[ T[ ,ÓF\SYL prR VlWSFZLzLGF ;O/ ;CSFZYL D]bI DYS BFT[ DlC,F 5]J" EZTL
TF,LDG]\ VFIMHG SZJFDF\ VFJ[, VG[ VFXZ[ #Z5 DlC,F q I]JTLVMV[ 5]J" EZTL TF,LDDF\ HM0FJJFGM lG6"I SZ[, K[P
:JZ1F6 sDZLG8F:Sv h]0M4 SZF8[f TF,LD;]Z1FF ;[T] V\TU"T :SLD ;[<O 0LO[g; VGFD" SMdA[É8GF VD,LSZ6 DF8[
VDNFJFN XC[ZGL VFXZ[ $Z&# lJnFYL"VMG[ 5MTFGF :JvARFJ DF8[ S[JL
S[JL 5|lÊIF SZ[ T[G]\ lJUTJFZ ;DH6 VF5L T{IFZ SZL ;ZSFZ[ VF5[, ,1IF\S
5]6" SZJFDF\ VFJ[,P T[DH UlTXL, U]HZFT SFI"ÊDvZ_!5 ;]WLDF\ VFXZ[
5___ I]JTLVM :JZ1F6 TF,LD D[/J[ T[J]\ VFIMHG SZJFDF\ VFJ[, K[P
_PZZ ZFIO, X]8L\U TF,LDGL ;FO<I UFYFVDNFJFN XC[Z 5M,L; D]bI DYS BFT[ ;]Z1FF ;[T] ;M;FI8LGF p5ÊD[ DlC,F
;XlÉTSZ6GF EFU~5[ _PZZ ZFIO, X]8L\U TF,LD DF8[G]\ VFIMHG SZJFDF\ H[DF $*&!
DlC,FVM qI]JTLVM qU'lC6LVMV[ EFU ,. ;DHNFZL 5]J"S VFtDlJ`JF;YL ZFIO, äFZF
OFIZL\U SZ[, H[DF\ _PZZGF VFXZ[ $*&!_ ZFpg0GM BR" 56 SZJFDF\ VFJ[,P p5ZMÉT
OFIZL\U TF,LDDF\ EFU ,LW[, TDFD DlC,FVM !( YL 5_ JQF" JrR[GL CTLP
SgIF :JvZMHUFZ TF,LD
4140
Kavach:�The�Magazine�of�Raksha�Shakti�University
Research�Fellowship�Project
Technology�Impact�on�Police�Department�(Computer�Technology)�:�This�Project�is�given�to�Mr.�Chaitanya�
Shah�who�has�competed�successfully.
Sponsored�Research�Project�1.���Dermatoglyphics� for� personality� Profiling� :-� This� Project� is� given� to�Mr.�Darpan�Vyas� of� Center� For�
Multiple�Intelligence�and�Dermatoglyphics
2.����Neurocriminology�for�Prison�convicts�trainees�training�module�for�rehabilitation.
3.����History�of�Forensic�Science�:�This�Project�is�given�to�Mr.�Sumi�Choudhary,�A.P.�F.S.�RSU.
4.�� History�of�Mounted�Police�in�India�:�This�Project�is�given�to�Dr.�Krishnamurthy,�IPS,�Rtd.�DGP,�Bengaluru.
5.�� Design� of� barricades� and� development� of� scaled� down� prototype� :� This� Project� is� given� to� IIT,�
Gandhinagar�for�development�of�Design�of�Police�barricades.
Activities�of�Institute�of�Research�&�Development
Sr.�No. Research�Topic1. Design�and�analysis�model�of�Open�space�Quantum�Cryptography�communication
2. Neuro-fuzzy�based�intelligent�first�responder�for�image�forgery�identification
3. Secured�Digital�Watermarking�and�Recognition�with�providing�high�perception�transparency�and�robustness
4. Poisoning�scenario�in�Gujarat�and�methods�to�detect�it
5. Fidelity�of�Forensic�Evidences�in�Criminal�trials�in�India
6. Digital�text�conversation�and�its�significance�in�detecting�malicious�intent
7. Dermatoglyphic�Markers�with�reference�to�impulsive�behaviour�and�executive�functions
8. Identification�&�Characterization�of�the�type�of�Tremors�in�Handwriting�and�Expert�Opinion
9. Environmental�issues�of�toxic�effluents�from�tanning�industry
10. Assessment�of�occupational�stress�and�burn�out�among�police�field�personnel
11. Perception�of�Police�Performance:�A�Community�Survey
12. Relationship�between�Psychological�Wellness�and�Attitude�towards�Work�and�Work�Performance�in�Police�Personnel
13. Police�as�a�responsible�stake�holder�in�Indian�criminal�justice�system-�a�critical�appraisal
Research�Topics�in�which�research�is�carried�out�in�Institute�of�R�&�D�:
42
Kavach:�The�Magazine�of�Raksha�Shakti�University
Important�News�related�to�Internal�Security
Sr.�No.
Newspaper�Headline Date Newspaper�Name
1. pii!li&si mii=i C j *mi*niTmiio miDD miiginiir piisi! pihi!oci& jSi!. 3/1/2015 Gujarat�Samachar
2. Ah!rmiio wi$miHpiininii! Dod Ri. 1000 krviini& *viciirNii 14/1/2015 Sandesh
3. State�nod�to�direct�enrolment�of�inspectors�in�police�force
21/1/2015 Indian�Express
4. gi#jriti pii!li&si bii!mbi *dfyi$z krvii 7 kri!dnii! ri!bii!T liiviSi!. 22/1/2015 Gujarat�Samachar
5. TVi*fknii *niyimii!ni#o ullioGini krniir viihniciiliknii Gir! e-mi!mii! aiviSi!. 26/1/2015 Divya�Bhaskar
6. aid!wid piik^^ kr!li& kir *lifT krvii miiT! enT!*lijnT Ti^ TVk 26/1/2015 Divya�Bhaskar
7. Crime�in�city�fell�by�30%�in�2014. 31/1/2015 Times�of�India
8. mi*hliiai!ni! svirxii miiT! dinsi *viWi *df!nsini& tiili&mi apiiSi!. 31/1/2015 Gujarat�Samachar
9. गुजरात पुिलस के इ-�ोजे� से �भािवत �ए युगांडा के �ितिनिध 2/2/2015 Rajasthan�Patrika
10. gi#jritimiio mi*hlii si#rxii miiT! “*df!nsi ai! dinsi aimi&^” UBi#o kriSi! 2/2/2015 Gujarat�Samachar
11. rijki!T piisi! biniSi! pii!li&si TV!*niogi si!nTr 3/2/2015 Fulchhab
12. gi#jriti FSL D!Sini& siiyibir *sikyii!*rT&nii! ri!dmi!pi GidSi! 3/2/2015 Sandesh
13. h*Wiyiir-wiirki!ni! yi#*nik niobir apiiSi! 3/2/2015 Sandesh
14. kcCWi& viiwii bii!d^r mi*hlii k!mili sifir&ni#o Bi#jWi& PsWiini 20/2/2015 Gujarat�Samachar
15. *si*niyir *si*Tznini! miici^miio fH& GPS mii!biieli miLSi! 21/2/2015 Divya�Bhaskar
16. ऐप देगा शराब के ताजा �ॉक की जानकारी 21/2/2015 Rajasthan�Patrika
17. TVi*fkni& Ti!eogi viini pir mi$*viogi CCTV�k!mi!ri ligiiviiSi!. 22/2/2015 Gujarat�Samachar
18. gi#jriti si! siiti ki! riMTVpi*ti piDk 26/2/2015 Rajasthan�Patrika
19. amiDiviiDmiio pih!li& viKiti 1200 hi!migiid^ni& Birti& kriSi!. 2/3/2015 Divya�Bhaskar
43
Kavach:�The�Magazine�of�Raksha�Shakti�University
Research�Fellowship�Project
Technology�Impact�on�Police�Department�(Computer�Technology)�:�This�Project�is�given�to�Mr.�Chaitanya�
Shah�who�has�competed�successfully.
Sponsored�Research�Project�1.���Dermatoglyphics� for� personality� Profiling� :-� This� Project� is� given� to�Mr.�Darpan�Vyas� of� Center� For�
Multiple�Intelligence�and�Dermatoglyphics
2.����Neurocriminology�for�Prison�convicts�trainees�training�module�for�rehabilitation.
3.����History�of�Forensic�Science�:�This�Project�is�given�to�Mr.�Sumi�Choudhary,�A.P.�F.S.�RSU.
4.�� History�of�Mounted�Police�in�India�:�This�Project�is�given�to�Dr.�Krishnamurthy,�IPS,�Rtd.�DGP,�Bengaluru.
5.�� Design� of� barricades� and� development� of� scaled� down� prototype� :� This� Project� is� given� to� IIT,�
Gandhinagar�for�development�of�Design�of�Police�barricades.
Activities�of�Institute�of�Research�&�Development
Sr.�No. Research�Topic1. Design�and�analysis�model�of�Open�space�Quantum�Cryptography�communication
2. Neuro-fuzzy�based�intelligent�first�responder�for�image�forgery�identification
3. Secured�Digital�Watermarking�and�Recognition�with�providing�high�perception�transparency�and�robustness
4. Poisoning�scenario�in�Gujarat�and�methods�to�detect�it
5. Fidelity�of�Forensic�Evidences�in�Criminal�trials�in�India
6. Digital�text�conversation�and�its�significance�in�detecting�malicious�intent
7. Dermatoglyphic�Markers�with�reference�to�impulsive�behaviour�and�executive�functions
8. Identification�&�Characterization�of�the�type�of�Tremors�in�Handwriting�and�Expert�Opinion
9. Environmental�issues�of�toxic�effluents�from�tanning�industry
10. Assessment�of�occupational�stress�and�burn�out�among�police�field�personnel
11. Perception�of�Police�Performance:�A�Community�Survey
12. Relationship�between�Psychological�Wellness�and�Attitude�towards�Work�and�Work�Performance�in�Police�Personnel
13. Police�as�a�responsible�stake�holder�in�Indian�criminal�justice�system-�a�critical�appraisal
Research�Topics�in�which�research�is�carried�out�in�Institute�of�R�&�D�:
42
Kavach:�The�Magazine�of�Raksha�Shakti�University
Important�News�related�to�Internal�Security
Sr.�No.
Newspaper�Headline Date Newspaper�Name
1. pii!li&si mii=i C j *mi*niTmiio miDD miiginiir piisi! pihi!oci& jSi!. 3/1/2015 Gujarat�Samachar
2. Ah!rmiio wi$miHpiininii! Dod Ri. 1000 krviini& *viciirNii 14/1/2015 Sandesh
3. State�nod�to�direct�enrolment�of�inspectors�in�police�force
21/1/2015 Indian�Express
4. gi#jriti pii!li&si bii!mbi *dfyi$z krvii 7 kri!dnii! ri!bii!T liiviSi!. 22/1/2015 Gujarat�Samachar
5. TVi*fknii *niyimii!ni#o ullioGini krniir viihniciiliknii Gir! e-mi!mii! aiviSi!. 26/1/2015 Divya�Bhaskar
6. aid!wid piik^^ kr!li& kir *lifT krvii miiT! enT!*lijnT Ti^ TVk 26/1/2015 Divya�Bhaskar
7. Crime�in�city�fell�by�30%�in�2014. 31/1/2015 Times�of�India
8. mi*hliiai!ni! svirxii miiT! dinsi *viWi *df!nsini& tiili&mi apiiSi!. 31/1/2015 Gujarat�Samachar
9. गुजरात पुिलस के इ-�ोजे� से �भािवत �ए युगांडा के �ितिनिध 2/2/2015 Rajasthan�Patrika
10. gi#jritimiio mi*hlii si#rxii miiT! “*df!nsi ai! dinsi aimi&^” UBi#o kriSi! 2/2/2015 Gujarat�Samachar
11. rijki!T piisi! biniSi! pii!li&si TV!*niogi si!nTr 3/2/2015 Fulchhab
12. gi#jriti FSL D!Sini& siiyibir *sikyii!*rT&nii! ri!dmi!pi GidSi! 3/2/2015 Sandesh
13. h*Wiyiir-wiirki!ni! yi#*nik niobir apiiSi! 3/2/2015 Sandesh
14. kcCWi& viiwii bii!d^r mi*hlii k!mili sifir&ni#o Bi#jWi& PsWiini 20/2/2015 Gujarat�Samachar
15. *si*niyir *si*Tznini! miici^miio fH& GPS mii!biieli miLSi! 21/2/2015 Divya�Bhaskar
16. ऐप देगा शराब के ताजा �ॉक की जानकारी 21/2/2015 Rajasthan�Patrika
17. TVi*fkni& Ti!eogi viini pir mi$*viogi CCTV�k!mi!ri ligiiviiSi!. 22/2/2015 Gujarat�Samachar
18. gi#jriti si! siiti ki! riMTVpi*ti piDk 26/2/2015 Rajasthan�Patrika
19. amiDiviiDmiio pih!li& viKiti 1200 hi!migiid^ni& Birti& kriSi!. 2/3/2015 Divya�Bhaskar
43
Kavach:�The�Magazine�of�Raksha�Shakti�University
A)�������For�Articles:
1.������ �Content�of�the�article�should�be�the�original�creation�of�the�author�and�should�not�have�been�published�anywhere�else�before.�
2.���Article/Content�can�be�written�in�English,�Hindi�or�Gujarati�language3.���Length�of�the�article�should�be�around�1000�words�(Appx.�two�A4�size�paper�and�not�more�than�
1500�words.4.���In�case�of�language�other�than�English,�article�should�be�submitted�with�fonts,�if�it�is�in�soft�copy.�5.���In�case�article�is�in�hard�copy,�writing�should�be�legible.�6.�� �Editor�shall�have�right�to�edit�articles�to�make�the�content�appropriate�as�per�the�standards�of�
the�magazine.
B)�����For�other�contents:
Those� who� want� to� contribute� some� contents� other� than� articles� may� also� send� the� same.�Generally�following�items�may�be�included�for�the�magazine.�
•��R� eviews�on�issues�related�to�Police�and�Internal�Security�•��B� ook�Reviews•��L� atest�Technology�in�Internal�Security•��E� ssays•��P� oems�•��Cartoons,�Paintings�etc.•��O� ther�Informative�Compilation
Final�decision�regarding�publication�will�be�taken�by�the�Editor.�All�correspondence�related�to�the�magazine��can�be�made�to:
The�EditorRaksha�Shakti�University�Magazine�ʻKavachʼ
Raksha�Shakti�University�New�Mental�Corner,�Meghaninagar,
Ahmedabad�‒�380016�(Gujarat�‒�INDIA)Phone:�079�‒�22683624,�22684222,�22684173��Fax:�079�‒�22683762
E-mail:�[email protected]
Guidelines�for�contribution�in�ʻKavachʼ
Kavach:�The�Magazine�of�Raksha�Shakti�University
RSU�in�News
44 45
Kavach:�The�Magazine�of�Raksha�Shakti�University
A)�������For�Articles:
1.������ �Content�of�the�article�should�be�the�original�creation�of�the�author�and�should�not�have�been�published�anywhere�else�before.�
2.���Article/Content�can�be�written�in�English,�Hindi�or�Gujarati�language3.���Length�of�the�article�should�be�around�1000�words�(Appx.�two�A4�size�paper�and�not�more�than�
1500�words.4.���In�case�of�language�other�than�English,�article�should�be�submitted�with�fonts,�if�it�is�in�soft�copy.�5.���In�case�article�is�in�hard�copy,�writing�should�be�legible.�6.�� �Editor�shall�have�right�to�edit�articles�to�make�the�content�appropriate�as�per�the�standards�of�
the�magazine.
B)�����For�other�contents:
Those� who� want� to� contribute� some� contents� other� than� articles� may� also� send� the� same.�Generally�following�items�may�be�included�for�the�magazine.�
•��R� eviews�on�issues�related�to�Police�and�Internal�Security�•��B� ook�Reviews•��L� atest�Technology�in�Internal�Security•��E� ssays•��P� oems�•��Cartoons,�Paintings�etc.•��O� ther�Informative�Compilation
Final�decision�regarding�publication�will�be�taken�by�the�Editor.�All�correspondence�related�to�the�magazine��can�be�made�to:
The�EditorRaksha�Shakti�University�Magazine�ʻKavachʼ
Raksha�Shakti�University�New�Mental�Corner,�Meghaninagar,
Ahmedabad�‒�380016�(Gujarat�‒�INDIA)Phone:�079�‒�22683624,�22684222,�22684173��Fax:�079�‒�22683762
E-mail:�[email protected]
Guidelines�for�contribution�in�ʻKavachʼ
Kavach:�The�Magazine�of�Raksha�Shakti�University
RSU�in�News
44 45
RAKSHA�SHAKTI�UNIVERSITYNew�Mental�Corner,�Meghaninagar,�Ahmedabad�-�380�016�(Gujarat)�INDIA.
Ph.:�079-22683624,�22684173�•�Fax�:�079�-�22683762E-mail�:�[email protected]
www.rakshashaktiuniversity.edu.in