52
TheMagazineofRakshaShaktiUniversity KAVACH FourthIssue India'sFirstInternalSecurityUniversity

RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

The�Magazine�of�Raksha�Shakti�UniversityKAVACH

Fourth�Issue

India's�First�Internal�Security�University

Page 2: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

KAVACHThe�Magazine�of�Raksha�Shakti�University

FOURTH ISSUE

New�Mental�Corner,�Meghaninagar,�Ahmedabad�-�380�016�(Gujarat)�INDIA.Ph.:�079-22683624,�22684173�•�Fax�:�079�-�22683762E-mail�:�[email protected]

www.rakshashaktiuniversity.edu.in

RAKSHA�SHAKTI�UNIVERSITY

Page 3: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

KAVACHThe�Magazine�of�Raksha�Shakti�University

FOURTH ISSUE

New�Mental�Corner,�Meghaninagar,�Ahmedabad�-�380�016�(Gujarat)�INDIA.Ph.:�079-22683624,�22684173�•�Fax�:�079�-�22683762E-mail�:�[email protected]

www.rakshashaktiuniversity.edu.in

RAKSHA�SHAKTI�UNIVERSITY

Page 4: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Chief�Patron Shri�O.P.�Mathur,�IPS�(Retd.)Director�General,�Raksha�Shakti�University

Patron Shri�Vikas�Sahay,�IPSDy.�Director�General,�Raksha�Shakti�University

Editor Dr.�(Smt.)�S.�L.�VayaDirector,�Research�and�Development,�Raksha�Shakti�University

Editorial�Board Dr.�Priyanka�Sharma�(Professor,�IT�-�Raksha�Shakti�University)Shri�Abhishek�Awadh�(Asst.�Professor,�Police�Administration�-�Raksha�Shakti�University)Shri�Pragneshkumar�Parekh�(Asst.�Librarian�-�Raksha�Shakti�University)Shri�Sumit�Choudhary�(Asst.�Professor,�Forensic�Science�-�Raksha�Shakti�University)Shri�Chandreh�Parekh�(Asst.�Professor,�Telecommunication�-�Raksha�Shakti�University)Dr.�Anand�Kumar�Tripathi�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Dr.�Dimpal�Raval,�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Shri�Ravi�Sheth�(Asst.�Professor,�IT�-�Raksha�Shakti�University)

Contribution The�aim�of�this�magazine�is�to�disseminate�information�related�to�Internal�Security�and�other�allied�areas.�The�magazine�will�contain�articles�and�papers�written�by�educators,�researchers,�professionals�and�students�and�other�individuals�associated�with�Internal�Security.�The�Magazine�will�also�have�information�related�to�the�progress�made�by�the�university�and�the�spheres�in�which�this�university�is�associated�in�terms�of�study�and�research.�Contribution�in�the�form�of�article�paper�or�easy�can�be�sent�to�the�editor�by�e-mail�on�[email protected]

Copyright The�contents�of�this�magazine�are�designed�for�creating�awareness,�providing�support�to�education�and�research�in�the�area�of�Internal�Security.�Use�of�any�part�of�contents�for�any�purpose�other�than�research�and�education�is�not�permitted�without�prior�consent�of�the�Editor.

The�Publisher,�Editor�and�Associate�Editors�are�not�responsible�for�any�opinion,�statements�of�facts�other�than�official�announcements,�news�and�information�related�to�Raksha�Shakti�University.

Language English,�Hindi�and�Gujarati

Name�and�Address�Publisher

Preeth�Padmanabhan,�I/C�Registrar,Raksha�Shakti�UniversityNew�Mental�Corner,�Meghaninagar,Ahmedabad�-�380�016�(Gujarat)�India.

Phone�No. 079-22683624,�22684222,�22684173

Fax�No. 079-22683762

E-mail [email protected]

Website The�electronic�version�of�this�magazine�can�be�accessed�at�www.rakshashaktiuniversity.edu.in

KavachThe�Magazine�of�Raksha�Shakti�University Index

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

1. Multimedia�Security�and�Authentication�for�Digital�Images 1

2. †eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk 7

3. Road�Rage�‒�An�Analysis 11

4. Biometric�System:�In�Crime�Prevention 14

5. Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil 16

6. E-Commerce�Threats� 19

7. Credit�Card�Frauds 24

8. Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security 27

9. Intra�Organizational�Conflicts�In�Gujarat�Police 30

10. TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance 36

11. siiflyigiiWii; amiDiviiD Sih!r pii!li&si 40

12. Activities�of�Institute�of�Research�&�Development 42

13. Important�News�related�to�Internal�Security 43

14. RSU�in�News 44

15. Guidelines�for�contribution�in�ʻKavachʼ 45

Page 5: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Chief�Patron Shri�O.P.�Mathur,�IPS�(Retd.)Director�General,�Raksha�Shakti�University

Patron Shri�Vikas�Sahay,�IPSDy.�Director�General,�Raksha�Shakti�University

Editor Dr.�(Smt.)�S.�L.�VayaDirector,�Research�and�Development,�Raksha�Shakti�University

Editorial�Board Dr.�Priyanka�Sharma�(Professor,�IT�-�Raksha�Shakti�University)Shri�Abhishek�Awadh�(Asst.�Professor,�Police�Administration�-�Raksha�Shakti�University)Shri�Pragneshkumar�Parekh�(Asst.�Librarian�-�Raksha�Shakti�University)Shri�Sumit�Choudhary�(Asst.�Professor,�Forensic�Science�-�Raksha�Shakti�University)Shri�Chandreh�Parekh�(Asst.�Professor,�Telecommunication�-�Raksha�Shakti�University)Dr.�Anand�Kumar�Tripathi�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Dr.�Dimpal�Raval,�(Asst.�Professor,�Law�-�Raksha�Shakti�University)Shri�Ravi�Sheth�(Asst.�Professor,�IT�-�Raksha�Shakti�University)

Contribution The�aim�of�this�magazine�is�to�disseminate�information�related�to�Internal�Security�and�other�allied�areas.�The�magazine�will�contain�articles�and�papers�written�by�educators,�researchers,�professionals�and�students�and�other�individuals�associated�with�Internal�Security.�The�Magazine�will�also�have�information�related�to�the�progress�made�by�the�university�and�the�spheres�in�which�this�university�is�associated�in�terms�of�study�and�research.�Contribution�in�the�form�of�article�paper�or�easy�can�be�sent�to�the�editor�by�e-mail�on�[email protected]

Copyright The�contents�of�this�magazine�are�designed�for�creating�awareness,�providing�support�to�education�and�research�in�the�area�of�Internal�Security.�Use�of�any�part�of�contents�for�any�purpose�other�than�research�and�education�is�not�permitted�without�prior�consent�of�the�Editor.

The�Publisher,�Editor�and�Associate�Editors�are�not�responsible�for�any�opinion,�statements�of�facts�other�than�official�announcements,�news�and�information�related�to�Raksha�Shakti�University.

Language English,�Hindi�and�Gujarati

Name�and�Address�Publisher

Preeth�Padmanabhan,�I/C�Registrar,Raksha�Shakti�UniversityNew�Mental�Corner,�Meghaninagar,Ahmedabad�-�380�016�(Gujarat)�India.

Phone�No. 079-22683624,�22684222,�22684173

Fax�No. 079-22683762

E-mail [email protected]

Website The�electronic�version�of�this�magazine�can�be�accessed�at�www.rakshashaktiuniversity.edu.in

KavachThe�Magazine�of�Raksha�Shakti�University Index

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

1. Multimedia�Security�and�Authentication�for�Digital�Images 1

2. †eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk 7

3. Road�Rage�‒�An�Analysis 11

4. Biometric�System:�In�Crime�Prevention 14

5. Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil 16

6. E-Commerce�Threats� 19

7. Credit�Card�Frauds 24

8. Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security 27

9. Intra�Organizational�Conflicts�In�Gujarat�Police 30

10. TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance 36

11. siiflyigiiWii; amiDiviiD Sih!r pii!li&si 40

12. Activities�of�Institute�of�Research�&�Development 42

13. Important�News�related�to�Internal�Security 43

14. RSU�in�News 44

15. Guidelines�for�contribution�in�ʻKavachʼ 45

Page 6: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

From�the�desk�of�

EditorIt�gives�me�immense�pleasure�to�share�with�you�the�publication�of�fourth�issue�of�Raksha�Shakti�University�Magazine�'Kavach'.�Based�on�reader's�feedback,�the�University�has�decided�to�publish�'Kavach'�on�regular�basis.�Hope�to�share�the�knowledge�and�circulate�among�our�reader�community�about�issues�related�to�Internal�Security�in�India.��

This�issue�contains�articles�by�the�internal�faculty�and�students�of�Raksha�Shakti�University�related�to�internal�security.�The�topics� �are�covered�are�Multimedia�Security,�Harassment�of�Women,� Road� Rage,� Biometric� Security� System,� Armed� Forces� Special� Power� Act,� E-Commerce�Threat,�Credit�Card�Frauds,�Neurocriminology,�Intra�Organizational�Conflicts�in�Gujarat� Police� and� Tele-Forensic� Technology.� A� special� article� on� Success� Story� of�Ahmedabad�City�Police� is�an�added�attraction�of�this� issue.� Important�news�published�in�various�newspapers�related�to�Internal�Security�is�also�compiled.�

I�feel�unfortunate�while�sharing�the�sad�demise�of�Jim�Hilborn,�a�Canadian�Criminologist,�who�introduced�Neurocriminology�to�Raksha�Shakti�University�by�his�Skype�lectures,�was�among�the� pioneers� in� shaping� the� practicing� knowledge� of� Neurocriminology� in� correctional�services.�On�behalf�of�the�Raksha�Shakti�University,�I�present�my�sincere�condolences�to�his�family,�friends�and�all�those�who�knew�him.

I� sincerely� hope� that� going� through� this� fourth� issue� of� "Kavach"� will� be� a� pleasurable�experience�for�you.�I�look�forward�to�your�comments�and�feedback.�I�also�welcome�you�all�to�contribute�by�sending�articles�(English,�Hindi�and�Gujarati)�which�can�be�printed�in�the�future�editions�of�"Kavach".

Dr.�S.�L.�VayaThe�Editor,�“Kavach”,

Director,�Research�&�Development,Raksha�Shakti�University

Kavach:�The�Magazine�of�Raksha�Shakti�University

Abstract:�Digital�Images�are�very�easy�to�manipulate�and�edit�due�to�availability�of�some�powerful�software�

like�Photoshop.� In� this�paper�a� reviewed�of,�different� tampering�or� forgery�applied�on� images�such�as�

enhancing,�composition�and�copy-move�and�some�of�the�techniques�which�are�useful�to�prevent�or��detect��

them�such�as�authentication� techniques�and�water�marking� is�presented.� In�authentication� technique�

copy-move�forgery�detection�technique�and�in�watermarking,�digital�watermarking,�fragile�watermarking,�

semi-fragile�watermarking�and�self-embedded�watermarking�is�presented

Keywords:�Multimedia�security,�Forensic�authentication,�Copy-move�forgery,�Digital�watermarking,�fragile�

watermarking,�Semi-fragile�watermarking,�self�embedded�watermarking.

I.� INTRODUCTION

Now� days� digital� images� are� easily� manipulate� and� edit���

using�some�powerful� tools�or�software� like�Photoshop[1].�

An�example�is�shown�in�figure�1.�In�first�part�of�figure,�two�

people� are� present� at� the� right� bottom� corner� shown� in�

yellow� region� and� it� has� been� removed�by� pasting� same�

region�from�the�image�shown�in�by�red�region.�In�this�paper�

we�have�discussed�how�this�kind�of�forgery�is�detected.

Another�example�of�tampering�was�given�by�Dr.�Tomaso�at�

Electronic�Imaging�in�Santa�Clara.�In�his�talk,�he�showed�how�

engineers�can�come�to�know�the�lip�movements�of�any�person�from�a�short�video�clip�and�then�digitally�

manipulate�the� lips� to�arbitrarily�alter� the�spoken�content.� In�example,�a�video�segment�showing�a�TV�

anchor�announcing�evening�news�was�altered�to�make�the�anchor�appear�singing�a�popular�song�instead,�

while�reserving�the�match�between�the�sound�and�lip�movement�[1].

We�have�discussed�three�major�parts�in�this�paper�is�kindly�listed�as�below

•�����Identify�image�tampering�methods.

•�����Assess�methods�available�for�protecting�images.

•�����Assess�image�authentication�techniques.�

Multimedia�Security�and�Authentication�for�Digital�Images

Figure1:�copy�move�forgery�in�image

Kavach:�The�Magazine�of�Raksha�Shakti�University

*Ravi�K.�Sheth

*Asst.�Professor�(IT),�Raksha�Shakti�University,�Ahmedabad

1

Page 7: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

From�the�desk�of�

EditorIt�gives�me�immense�pleasure�to�share�with�you�the�publication�of�fourth�issue�of�Raksha�Shakti�University�Magazine�'Kavach'.�Based�on�reader's�feedback,�the�University�has�decided�to�publish�'Kavach'�on�regular�basis.�Hope�to�share�the�knowledge�and�circulate�among�our�reader�community�about�issues�related�to�Internal�Security�in�India.��

This�issue�contains�articles�by�the�internal�faculty�and�students�of�Raksha�Shakti�University�related�to�internal�security.�The�topics� �are�covered�are�Multimedia�Security,�Harassment�of�Women,� Road� Rage,� Biometric� Security� System,� Armed� Forces� Special� Power� Act,� E-Commerce�Threat,�Credit�Card�Frauds,�Neurocriminology,�Intra�Organizational�Conflicts�in�Gujarat� Police� and� Tele-Forensic� Technology.� A� special� article� on� Success� Story� of�Ahmedabad�City�Police� is�an�added�attraction�of�this� issue.� Important�news�published�in�various�newspapers�related�to�Internal�Security�is�also�compiled.�

I�feel�unfortunate�while�sharing�the�sad�demise�of�Jim�Hilborn,�a�Canadian�Criminologist,�who�introduced�Neurocriminology�to�Raksha�Shakti�University�by�his�Skype�lectures,�was�among�the� pioneers� in� shaping� the� practicing� knowledge� of� Neurocriminology� in� correctional�services.�On�behalf�of�the�Raksha�Shakti�University,�I�present�my�sincere�condolences�to�his�family,�friends�and�all�those�who�knew�him.

I� sincerely� hope� that� going� through� this� fourth� issue� of� "Kavach"� will� be� a� pleasurable�experience�for�you.�I�look�forward�to�your�comments�and�feedback.�I�also�welcome�you�all�to�contribute�by�sending�articles�(English,�Hindi�and�Gujarati)�which�can�be�printed�in�the�future�editions�of�"Kavach".

Dr.�S.�L.�VayaThe�Editor,�“Kavach”,

Director,�Research�&�Development,Raksha�Shakti�University

Kavach:�The�Magazine�of�Raksha�Shakti�University

Abstract:�Digital�Images�are�very�easy�to�manipulate�and�edit�due�to�availability�of�some�powerful�software�

like�Photoshop.� In� this�paper�a� reviewed�of,�different� tampering�or� forgery�applied�on� images�such�as�

enhancing,�composition�and�copy-move�and�some�of�the�techniques�which�are�useful�to�prevent�or��detect��

them�such�as�authentication� techniques�and�water�marking� is�presented.� In�authentication� technique�

copy-move�forgery�detection�technique�and�in�watermarking,�digital�watermarking,�fragile�watermarking,�

semi-fragile�watermarking�and�self-embedded�watermarking�is�presented

Keywords:�Multimedia�security,�Forensic�authentication,�Copy-move�forgery,�Digital�watermarking,�fragile�

watermarking,�Semi-fragile�watermarking,�self�embedded�watermarking.

I.� INTRODUCTION

Now� days� digital� images� are� easily� manipulate� and� edit���

using�some�powerful� tools�or�software� like�Photoshop[1].�

An�example�is�shown�in�figure�1.�In�first�part�of�figure,�two�

people� are� present� at� the� right� bottom� corner� shown� in�

yellow� region� and� it� has� been� removed�by� pasting� same�

region�from�the�image�shown�in�by�red�region.�In�this�paper�

we�have�discussed�how�this�kind�of�forgery�is�detected.

Another�example�of�tampering�was�given�by�Dr.�Tomaso�at�

Electronic�Imaging�in�Santa�Clara.�In�his�talk,�he�showed�how�

engineers�can�come�to�know�the�lip�movements�of�any�person�from�a�short�video�clip�and�then�digitally�

manipulate�the� lips� to�arbitrarily�alter� the�spoken�content.� In�example,�a�video�segment�showing�a�TV�

anchor�announcing�evening�news�was�altered�to�make�the�anchor�appear�singing�a�popular�song�instead,�

while�reserving�the�match�between�the�sound�and�lip�movement�[1].

We�have�discussed�three�major�parts�in�this�paper�is�kindly�listed�as�below

•�����Identify�image�tampering�methods.

•�����Assess�methods�available�for�protecting�images.

•�����Assess�image�authentication�techniques.�

Multimedia�Security�and�Authentication�for�Digital�Images

Figure1:�copy�move�forgery�in�image

Kavach:�The�Magazine�of�Raksha�Shakti�University

*Ravi�K.�Sheth

*Asst.�Professor�(IT),�Raksha�Shakti�University,�Ahmedabad

1

Page 8: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

There�are�three�main�categories�of�image�tampering:

•�����Enhancing•�����Composition

•�����Copy/Move

Enhancing�has�been�done�by�changing�the�color�of�image,�means�original�color�of�image�is�replaced�by�

another�color�as�shown�in�figure2(a),�it�has�been�done�by�changing�weather�condition�and�blurring�out�

object�also�as�shown�in�figure�2(b,�c).�Composition�has�been�done�by�combining�two�different�images�in�to�

one�single�image�.And�copy�‒move�images�means�a�part�of�image�is�pasted�on�to�the�same�image�for�hiding�

some�information�as�shown�in�figure�1.

What�can�be�done�to�protect�digital�images?

We�have�reviewed�some�of�the�techniques�which�has�been�used�to�detect�tampering�or�forgery.�Some�of�the�

techniques�are�listed�below.

Watermarking

•�����Digital�watermarking

•�����Fragile�and�Semi-fragile�watermarks

•�����Self-embedding�watermarks�Authentication�technique

•�����Detecting�copy�move

In� second� section� we� have� described� different� watermarking�

techniques�which�are�used�for�detecting�tampered� images�and�also�

recovered� it.� In� third� section� we� have� described� authentication�

technique�which�is�used�for�detecting�copy�move�forgery�in�images.�

And�finally�we�have�listed�an�efficient�conclusion�of�this�study.

II.� WATERMARKING

An� idea� behind� watermarking� is� information� is� embedded� in� to�

images�which�cannot�be�removed�or�altered�without�making�entire�

object�unusable�[2].�Basically�watermarking�technique�is�divided�in�to�

four�parts�such�as�digital�watermarking,�fragile�watermarking,�semi�

fragile�watermarking�and�self�embedded�watermarking. Figure�2(a):�color�changed,�(b):�weather�condition�changed,�

(c):�blurring�out�object.�

Kavach:�The�Magazine�of�Raksha�Shakti�University

�A.��Digital�watermarking

A�basic�concept�of�digital�water�marking�is�embedding�information�into�a�digital�signal�in�a�way�that�is�

difficult�to�remove.�For�example�if�signal�is�copied�from�one�place�to�another�place�the�information�is�also�

carried�copy�[2].This�signal�is�referred�as�watermark.�The�system�also�contains�a�key�which�should�be�either�

public�or�secrete.�The�key�is�generally�used�for�security�purpose�through�which�unauthorized�user�has�been��

prevented.�The�process�of�encoding�water�mark�in�image�is�shown�in�figure�3(a),�(b)�[2].

The�watermark�can�be�used�as�audio,� text�or� images.�For�sending�process� input�data�are� input� image,�

secrete�or�public�key�and�watermark.�At�the�receiver�side�watermarked�data�is�decoded�and�actual�water�

mark�is�received�by�receiver.

One�of�the�application�of�digital�watermarking�is�copyright�protection�system,�which�is�used�for�prevent�

unauthorized�copying�of�digital�media.�In�this�receiver�retrieves�digital�water�mark�before�creating�a�copy�

and�he�makes�decision�to�make�copy�or�not�by�observing�content�of�watermark�[3].

B.��Fragile�and�Semi-fragile�watermarking

Basically� there� are� two� types� of� authentication� exist� such� as� exact� authentication� and� selective�

authentication�[4].�Exact�authentication�accomplished�by�fragile�watermarking�and�selective

A� fragile� watermark� is� a� watermark� that� is� really� altered� or� destroyed�when� any� linear� or� non� linear�

modification�made.�Fragile�watermarking�is�generally�used�for�authentication�purpose.�Receiver�parties�

check�whether�any�tampering�is�done�with�image�or�not�with�the�movement�of�watermark.

Fragile�watermarking�systems�are�categorized�into�two�categories� �according� �to� �the� �working� �domain.��

First,fragile�watermarking�that�works�directly� in�the�spatial�domain.�Second,� fragile�watermarking�that�

works�in�a�transform�domain�[4].

Most�fragile�watermarking�systems�embed�the�mark�directly�through�the�spatial�domain�of�a�Work.�These�

techniques�embed�the�mark�in�the�least�significant�bit�(LSB)�plane�for�perceptual�transparency�[5].Fragile�

watermarks�are�designed�to�detect�every�possible�change�in�pixel�values.�Variety�of�Techniques�but�in�most�

Watermark W

Cover image C

Secrete/public key K

Encoder Watermarked image

Watermarked image CW

Secrete/public key K

Decoder Watermark w

Figure�3(a):�digital�watermarking�encoding Figure�3(b):�digital�watermarking�decoding

32

Page 9: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

There�are�three�main�categories�of�image�tampering:

•�����Enhancing•�����Composition

•�����Copy/Move

Enhancing�has�been�done�by�changing�the�color�of�image,�means�original�color�of�image�is�replaced�by�

another�color�as�shown�in�figure2(a),�it�has�been�done�by�changing�weather�condition�and�blurring�out�

object�also�as�shown�in�figure�2(b,�c).�Composition�has�been�done�by�combining�two�different�images�in�to�

one�single�image�.And�copy�‒move�images�means�a�part�of�image�is�pasted�on�to�the�same�image�for�hiding�

some�information�as�shown�in�figure�1.

What�can�be�done�to�protect�digital�images?

We�have�reviewed�some�of�the�techniques�which�has�been�used�to�detect�tampering�or�forgery.�Some�of�the�

techniques�are�listed�below.

Watermarking

•�����Digital�watermarking

•�����Fragile�and�Semi-fragile�watermarks

•�����Self-embedding�watermarks�Authentication�technique

•�����Detecting�copy�move

In� second� section� we� have� described� different� watermarking�

techniques�which�are�used�for�detecting�tampered� images�and�also�

recovered� it.� In� third� section� we� have� described� authentication�

technique�which�is�used�for�detecting�copy�move�forgery�in�images.�

And�finally�we�have�listed�an�efficient�conclusion�of�this�study.

II.� WATERMARKING

An� idea� behind� watermarking� is� information� is� embedded� in� to�

images�which�cannot�be�removed�or�altered�without�making�entire�

object�unusable�[2].�Basically�watermarking�technique�is�divided�in�to�

four�parts�such�as�digital�watermarking,�fragile�watermarking,�semi�

fragile�watermarking�and�self�embedded�watermarking. Figure�2(a):�color�changed,�(b):�weather�condition�changed,�

(c):�blurring�out�object.�

Kavach:�The�Magazine�of�Raksha�Shakti�University

�A.��Digital�watermarking

A�basic�concept�of�digital�water�marking�is�embedding�information�into�a�digital�signal�in�a�way�that�is�

difficult�to�remove.�For�example�if�signal�is�copied�from�one�place�to�another�place�the�information�is�also�

carried�copy�[2].This�signal�is�referred�as�watermark.�The�system�also�contains�a�key�which�should�be�either�

public�or�secrete.�The�key�is�generally�used�for�security�purpose�through�which�unauthorized�user�has�been��

prevented.�The�process�of�encoding�water�mark�in�image�is�shown�in�figure�3(a),�(b)�[2].

The�watermark�can�be�used�as�audio,� text�or� images.�For�sending�process� input�data�are� input� image,�

secrete�or�public�key�and�watermark.�At�the�receiver�side�watermarked�data�is�decoded�and�actual�water�

mark�is�received�by�receiver.

One�of�the�application�of�digital�watermarking�is�copyright�protection�system,�which�is�used�for�prevent�

unauthorized�copying�of�digital�media.�In�this�receiver�retrieves�digital�water�mark�before�creating�a�copy�

and�he�makes�decision�to�make�copy�or�not�by�observing�content�of�watermark�[3].

B.��Fragile�and�Semi-fragile�watermarking

Basically� there� are� two� types� of� authentication� exist� such� as� exact� authentication� and� selective�

authentication�[4].�Exact�authentication�accomplished�by�fragile�watermarking�and�selective

A� fragile� watermark� is� a� watermark� that� is� really� altered� or� destroyed�when� any� linear� or� non� linear�

modification�made.�Fragile�watermarking�is�generally�used�for�authentication�purpose.�Receiver�parties�

check�whether�any�tampering�is�done�with�image�or�not�with�the�movement�of�watermark.

Fragile�watermarking�systems�are�categorized�into�two�categories� �according� �to� �the� �working� �domain.��

First,fragile�watermarking�that�works�directly� in�the�spatial�domain.�Second,� fragile�watermarking�that�

works�in�a�transform�domain�[4].

Most�fragile�watermarking�systems�embed�the�mark�directly�through�the�spatial�domain�of�a�Work.�These�

techniques�embed�the�mark�in�the�least�significant�bit�(LSB)�plane�for�perceptual�transparency�[5].Fragile�

watermarks�are�designed�to�detect�every�possible�change�in�pixel�values.�Variety�of�Techniques�but�in�most�

Watermark W

Cover image C

Secrete/public key K

Encoder Watermarked image

Watermarked image CW

Secrete/public key K

Decoder Watermark w

Figure�3(a):�digital�watermarking�encoding Figure�3(b):�digital�watermarking�decoding

32

Page 10: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

cases,�the�watermark�is�embedded�in�the�least�significant�bit�(LSB)�of�the�image.

Semi-fragile�watermarking� scheme� for� image� authentication� is� presented,� which� focuses� the� issue� of�

protecting�images�from�illegal�manipulations�and�modifications.�The�scheme�extracts�a�watermark�from�

the�original�image�and�inserts�this�signature�back�into�the�image,�avoiding�additional�watermark.�The�error�

correction�coding�(ECC)�is�used�to�encode�the�signatures�that�are�extracted�from�the�image.�To�increase�the�

security�of� this� scheme,�user�private�key� is�employed� for�encryption�and�decryption�of� the�watermark�

during�watermark�extraction�and�insertion�procedures�[5].

C.��Self�embedded�watermarking

In� self� embedded� technique� as�watermarks� image� itself� is� used.� Self� embedding�watermarking� is� the�

technique�for�embedding�an�image�into�itself�for�protecting�its�content�from�tampering.�The�whole�image�

or�portions�of�it�may�be�recovered�after�they�have�been�cropped,�replaced�or�generally�tampered�[6].�In�this�

technique�tampering�is�detected�as�well�as�it�has�been�recovered�from�the�stored�watermark.

We�reviewed�an�algorithm�[7]�for�this�technique�as�described�follows:

The�initial�image�is�divided�into�blocks�of�8X8�pixels�that�are�quantized.�Two�least�significant�bits�of�an�

arbitrarily�block�is�selected�and�placed�most�coefficient�block�are�placed�in�it.�The�quantization�matrix�is�

properly�selected�so�that�the�resulting�bit�stream�to�be�exactly�128�bits�long.�The�algorithm�can�trace�if�some�

block�is�tampered�and�can�retrieve�its�original�content�from�the�coefficients�of�the�corresponding�distant�

block.�Additionally,�an�alternative�anti-tampering�method�is�presented�that�embeds�the�JPEG�compressed�

image�on� four� equal� discrete� areas� of� the� same� image.� The� coefficients� of� the� compressed� image� are�

embedded�in�the�last�two�significant�bits�of�these�areas.�If�some�area�is�tampered,�the�recovered�images�will�

have�different�qualities�but�at�least�two�of�them�will�have�the�same�quality.�Thus,�the�initial�image�can�be�

recovered�by�an�inverse�procedure�selecting�the�coefficients�from�the�areas�that�left�intact.

Characteristics�of�self�embedded�technique�listed�below.

•�����A�tampered�image�contains�lost�information.�The�previous�techniques�will�only�detect�and�localize�areas�

of�interest�when�authentication�is�carried�out.�Self-embedding�has�been�allowed�tamper�detection�and�

recovery�of�missing�information.

•����General�concept�is�that�the�image�is�embedded�in�itself�in�an�original�or�encrypted�form.�From�encryption�

purpose�key�is�required.

Kavach:�The�Magazine�of�Raksha�Shakti�University

III.� AUTHENTICATION�TECHNIQUE

Copy-move�tampering�or�forgery�is�a�special�type�of�attack�where�a�part�of�the�image�is�copied�and�pasted�

on�another�part�of�same�image�to�hide�unwanted�portions�of�the�image.�Hence�it�is�necessary�to�detect�this�

kind�of�forgery�[8].�A�copy�move�detection�technique�illustrated�how�the�forgery�is�detected�while�this�kind�

of�attack�has�been�occurred.

A.��Copy�move�detection�technique

A�copy�move�attach�is�a�very�special�type�of�attack�in�which�one�part�of�image�is�copied�and�pasted�on�to�the�

part�of�same�image�for�hiding�some�data.�We�have�reviewed�one�of�the�copy�move�detection�technique�and�

described�it�[9].�Algorithm�includes�following�steps�Step1:�Divide�image�in�to�four�parts.Step�2:�Find�out�the�phase�correlation�between�all�the�images.Step�3:�Using�phase�correlation�find�out�the�offset.Step�4:�Modify�image�with�the�use�of�offset�coordinators.Step�5:�Take�the�difference�between�original�image�and�modified�image.Step�6:�Apply�morphological�operation�for�better�result.

We�have�implemented�this�algorithm�in�Matlab�and�applied�it�on�figure�4.�We�have�copied�some�portion�of�

image�and�pasted�on�to�the�same�image.�Copied�region�is�shown�in�figure�by�red�color�and�pasted�region�is�

shown�by�yellow�color.�After�that�according�to�step�1,�we�have�divided�this�image�in�to�four�parts�as�shown�in�

figure�5.�In�this�case�we�have�directly�found�phase�correlation�between�figure�5(b),�and�(c).�Next�we�have�

modified�image�based�on�offset�coordinator�as�shown�in�figure�5(e).�And�at�last�applied�step�5�and�copy�

move�region�isdetected�as�shown�in�figure�5(f).�Copy�move�region�is�shown�by�blue�region

Figure�4:�Copy�move�image

(a) (b) (c)

(d) (e) (f)

54

Page 11: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

cases,�the�watermark�is�embedded�in�the�least�significant�bit�(LSB)�of�the�image.

Semi-fragile�watermarking� scheme� for� image� authentication� is� presented,� which� focuses� the� issue� of�

protecting�images�from�illegal�manipulations�and�modifications.�The�scheme�extracts�a�watermark�from�

the�original�image�and�inserts�this�signature�back�into�the�image,�avoiding�additional�watermark.�The�error�

correction�coding�(ECC)�is�used�to�encode�the�signatures�that�are�extracted�from�the�image.�To�increase�the�

security�of� this� scheme,�user�private�key� is�employed� for�encryption�and�decryption�of� the�watermark�

during�watermark�extraction�and�insertion�procedures�[5].

C.��Self�embedded�watermarking

In� self� embedded� technique� as�watermarks� image� itself� is� used.� Self� embedding�watermarking� is� the�

technique�for�embedding�an�image�into�itself�for�protecting�its�content�from�tampering.�The�whole�image�

or�portions�of�it�may�be�recovered�after�they�have�been�cropped,�replaced�or�generally�tampered�[6].�In�this�

technique�tampering�is�detected�as�well�as�it�has�been�recovered�from�the�stored�watermark.

We�reviewed�an�algorithm�[7]�for�this�technique�as�described�follows:

The�initial�image�is�divided�into�blocks�of�8X8�pixels�that�are�quantized.�Two�least�significant�bits�of�an�

arbitrarily�block�is�selected�and�placed�most�coefficient�block�are�placed�in�it.�The�quantization�matrix�is�

properly�selected�so�that�the�resulting�bit�stream�to�be�exactly�128�bits�long.�The�algorithm�can�trace�if�some�

block�is�tampered�and�can�retrieve�its�original�content�from�the�coefficients�of�the�corresponding�distant�

block.�Additionally,�an�alternative�anti-tampering�method�is�presented�that�embeds�the�JPEG�compressed�

image�on� four� equal� discrete� areas� of� the� same� image.� The� coefficients� of� the� compressed� image� are�

embedded�in�the�last�two�significant�bits�of�these�areas.�If�some�area�is�tampered,�the�recovered�images�will�

have�different�qualities�but�at�least�two�of�them�will�have�the�same�quality.�Thus,�the�initial�image�can�be�

recovered�by�an�inverse�procedure�selecting�the�coefficients�from�the�areas�that�left�intact.

Characteristics�of�self�embedded�technique�listed�below.

•�����A�tampered�image�contains�lost�information.�The�previous�techniques�will�only�detect�and�localize�areas�

of�interest�when�authentication�is�carried�out.�Self-embedding�has�been�allowed�tamper�detection�and�

recovery�of�missing�information.

•����General�concept�is�that�the�image�is�embedded�in�itself�in�an�original�or�encrypted�form.�From�encryption�

purpose�key�is�required.

Kavach:�The�Magazine�of�Raksha�Shakti�University

III.� AUTHENTICATION�TECHNIQUE

Copy-move�tampering�or�forgery�is�a�special�type�of�attack�where�a�part�of�the�image�is�copied�and�pasted�

on�another�part�of�same�image�to�hide�unwanted�portions�of�the�image.�Hence�it�is�necessary�to�detect�this�

kind�of�forgery�[8].�A�copy�move�detection�technique�illustrated�how�the�forgery�is�detected�while�this�kind�

of�attack�has�been�occurred.

A.��Copy�move�detection�technique

A�copy�move�attach�is�a�very�special�type�of�attack�in�which�one�part�of�image�is�copied�and�pasted�on�to�the�

part�of�same�image�for�hiding�some�data.�We�have�reviewed�one�of�the�copy�move�detection�technique�and�

described�it�[9].�Algorithm�includes�following�steps�Step1:�Divide�image�in�to�four�parts.Step�2:�Find�out�the�phase�correlation�between�all�the�images.Step�3:�Using�phase�correlation�find�out�the�offset.Step�4:�Modify�image�with�the�use�of�offset�coordinators.Step�5:�Take�the�difference�between�original�image�and�modified�image.Step�6:�Apply�morphological�operation�for�better�result.

We�have�implemented�this�algorithm�in�Matlab�and�applied�it�on�figure�4.�We�have�copied�some�portion�of�

image�and�pasted�on�to�the�same�image.�Copied�region�is�shown�in�figure�by�red�color�and�pasted�region�is�

shown�by�yellow�color.�After�that�according�to�step�1,�we�have�divided�this�image�in�to�four�parts�as�shown�in�

figure�5.�In�this�case�we�have�directly�found�phase�correlation�between�figure�5(b),�and�(c).�Next�we�have�

modified�image�based�on�offset�coordinator�as�shown�in�figure�5(e).�And�at�last�applied�step�5�and�copy�

move�region�isdetected�as�shown�in�figure�5(f).�Copy�move�region�is�shown�by�blue�region

Figure�4:�Copy�move�image

(a) (b) (c)

(d) (e) (f)

54

Page 12: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

IV.� CONCLUSION

Watermarking�techniques�are�very�useful�for�secure�transmission�of�an�image�from�one�place�to�another�

place�we�can�add�secrete�or�public�key� for� increase�security.�Fragile�watermarking�detect� if�any�single�

modification�is�done�with�your�image�but�in�case

of�semi�fragile�it�is�focused�on�only�selected��pat��of�image�means�if�modification�is�done�in�selective�part�of�

image�then�and�then�only�it�will�detect.�Self�embedded�water�marking�detect�as�well�as�regenerate�original�

image�if�any�tampering�is�made.�In�copy�move�detection�technique�a�major�drawback�is�if�pasted�image�is�

rotated�compare�to�copied�image�then�we�cannot�directly�applied�this�algorithm;�we�have�to�apply�some�

image�processing�operation�on�it.

REFERENCES[1]�� Rotation,�Scale�and�Translation�Invariant�Digital�Image�Watermarking,�J.J.K.�O'Ruanaidh�and�T.�Pun,�Proceedings�

of�the�ICIP,�VOl.�1,�pp�536-539,�Santa�Barbara,�California,�Oct�1997.[2]�� Navneet�Kumar�Mandhani,�A�Thesis�”�WATERMARKING�USING�DECIMAL�SEQUENCES”,�Louisiana�State�University�

and�Agricultural�and�Mechanical�College.[3]�� R.�J.�Rummel,�“Understanding�Correlation”�Honolulu:�Department�of�Political�Science�University�of�Hawaii,�1976.� URL:�http://www.mega.nu/ampp/rummel/uc.htm[4]�� H.P.�Solomon,�“Integration�of�haemodynamic�and�electrocardiographic�waveform�data�with�DICOM�images,”�Int�J�

Card�Imaging,�vol.�14(5),�1998,�pp.�301-3066.[5]�� F.�Hartung�and�M.�Kutter,�“Multimedia�watermarking�techniques,”��IEEE��Proceeding,��vol.��87,��no.��7,��July��1999,� pp.1079�‒1107.[6]�� G.�Voyatzis,�I.�Pitas,�“Applications�of�Toral�Automorphism�in�Image�Watermarking,”�ICIP,�Vol�II,�1996,�pp.237-240,�

1996.�“Handwriting�Recognition�Systems”,[7]�� Alin� C.� Popescu� and� Hany� Farid,� Exposing� Digital� Forgeries� in� Color� Filter� Array� Interpolated� Images,� IEEE�

Transactions�on�Signal�Processing,�Vol.�53,�Issue�10,�Part�2,�October�2005,�pp�3948-3959[8]�� M.Wu�A.�Swaminathan�and�K.�J.�Ray�Liu,�“Image�tamperingidentification�using�blind�deconvolution,”�Proc.�IEEE�

ICIP,�2006.[9]�� T.�Ng,�S.F.Chang,�Q.�Sun,�“Blind�detection�of�Photomontage�Using�Higher�Order�Statistics,”�IEEE�International�

Symposium�on�Circuits�and�Systems,�Vancouver,�Canada,�May�2004.

«MíkkðLkk

fk{Lkkt MÚk¤u †eykuLke òíkeÞ Mkíkk{ýe Mk{økú rðïV÷f Ãkh ð»kkuoÚke Mk¤økíke Mk{MÞk çkLke økR Au. Mk{ks ykðk çkLkkðkuLku Zktfe hk¾ðk {kxu

Mkíkík «ÞíLkþe÷ hÌkku Au. ÷øk¼øk çkÄu s ykðe fLkzøkík ÃkwÁ»kkuÚke fhkÞ Au yLku {rn÷kyku ðzu íku ðuXe ÷uðkÞ Au. {uLkus{uLx íku «íÞu

ykt¾r{[k{ýk fhu Au yLku fkuR íkuLkku rðhkuÄ WXkððk ykøk¤ ykðíkw LkÚke. òu †eLkkufh, ðþ Lk ÚkkÞ íkku íkuLku Lkkufhe{ktÚke Ëqh fhðkLke Ä{fe Ãký

ykÃku Au. MkuõMkwy÷ nuhuMk{uLx Võík yuÂõÍõÞwxeð ykurVMkku{kt s Lknª, Ãkhtíkw Mkwfk ¾uíkhku{kt, rþûkýÄk{Úke ÷RLku {LkkuhtsLkLkkt MÚk¤ku MkwÄe yLku

çkÄk s ûkuºkku, ÄtÄk, Wãkuøkku, íkÚkk ðuÃkkh yLku WíÃkkËLkLkkt MÚk¤kuyu Ãký Ëu¾k Ëu Au. Wå[ rþûký Ãkk{u÷e, rLkhûkh, ykurVMk f{o[khe, {nuLkíkfþ,

ÔÞðMkkrÞf yLku ½hfk{ fhLkkhe yuðe Ëhuf {rn÷k òríkÞ Mkíkk{ýeLkku ¼kuøk çkLku Au. rðãkÚkeoLkeyku Ãký çkkfkík LkÚke. yk{ nkuðk AíkktÞ

{rn÷kyku íku [qÃk[kÃk ðuXe ÷u Au fu Lkkufhe yÇÞkMk Akuze Ëu Au. ð¤e, ßÞkhu íkuLke Mkk{u yðks WXkðkÞku Au íÞkhu íkuLkku øk÷r÷Þk fhkðu íkuðk

y¾çkkhe ðýoLkku {kxu WÃkÞkuøk fhkÞku Au fkhý fu y¾çkkh {kxu Ãký Ëw»f{oLkku rð»kÞ ©uc økýkÞ.

òíkeÞ Mkíkk{ýeLke Mk{MÞk Võík ¼khíkLke s LkÚke Mk{økú rðïLke yk Mk{MÞk Au. “Ä LÞqÞkufo rhÔÞw ykuV çkwõMk” Lkkt 05-02-2015Lkku {wsçk

íÞktLke fku÷tçkeÞk ÞwrLkðŠMkxeLke nkRMfw÷{kt ¼ýíke Ëefheykuyu Mkh½Mk fkZâwt yLku nkRMfw÷Lkkt rþûkfku yLku xeLkush-rðãkÚkeoyku Mfq÷Lke

AkufheykuLku huÃk fhu Au íkuLkku rðhkuÄ fÞkuo níkku.

økuxMxkuLk RÂLMxxTâqx Lkk{Lke LkkrhðkËe MktMÚkkyu ÷ÏÞw Au fu ÷tzLk{kt yuf hurzÞku MxuþLk{kt {uz{ «kuøkúk{ {kMíkh yu yuf rçkLk yurþÞLkLku rðLktíke

fhe níke fu íkuLke [kiË ð»koLke rËfheLku íkuLke ËkËe ËkËkLkkt ½hu {qfe ykðu yLku Mkq[Lkk fhe níke fu ÷tzLk{kt xuõMkeyku{kt [k÷eMk xfk {rn÷k zÙkRðhku

Au íku {rn÷k zÙkRðhðk¤e xuõMke ¼kzu hk¾u. ÷tzLkLkkt økkuhk xuõMkeðk¤k íkku Mfq÷Lke xeLkush 11-12-17 ð»koLke AkufheykuLku s Ãkfzu Au. ÷tzLk{kt

y{wf økUøkku ykrMkMxLx økwtzk hk¾u Au su LkkLke AkufheLku «Úk{ Ãkkuíku huÃk fhu ÃkAe íkuLku VkuMk÷kðeLku økwtzk ÃkkMku ÷R òÞ. ÷tzLk{kt Ëh ð»kuo 1125 huÃk

ÚkkÞ Au. Ãkhtíkw çkeçkeMke «{kýu ¾hu¾hku yktfzku 12000 WÃkh Au. yhu {kL[uMxhLkk økkuhk xuõMkeðk¤k íkku Mfq÷Lkk YÃkk¤k [kufhk fu YÃkk¤k

ðÞMf ÃkuMkuLshLku Ãký Akuzíkk LkÚke.

søkík¼h{kt Úkíkk huÃk rð»ku íkkswt Mkðuoûký {éÞw Au (1) LÞqÞkufo xkRBMk fnu Au fu, ÞwrLkðŠMkxe nuX¤Lke r{© Mfq÷kuLke xeLkush AkufheykuLku huÃk

fhkÞ Au... yhu xuõMkkMk hkßÞLkkt ÌkwMxLk þnuhLkk Ãkku÷eMk ykurVMkhkuyu 6600 sux÷k çk¤kífkhkuLku nuLz÷ fhíke VkR÷ íkiÞkh fhe Au. yu

çkÄkLkk zeyuLkyu ðøkuhu íkÃkkMkðk{kt ºký-ºký ËkÞfk ÷køÞk Au. huÃk ¼khíkLkku Lknª Ãkrù{Lkku ðÄw hkuøk[k¤ku Au. (2) LÞwÞkufo heÔÞw ykuV çkwõMkLkkt

(5-2-2015) fnuðk «{kýu, Yxøkh ÞwrLkðŠMkxeLke ykurVMk{kt ðkÞku÷tLMk r«ðuLþLk ykMkeMxLx Lkk{Lke ykurVMk hk¾ðe Ãkze Au. yux÷k {kxu

fu, yuB{k MkwÕfkuðeÍ Lkk{Lke MkeLkeÞh nkRMfq÷ - rðãkÚkeoLkeyu VrhÞkË fhe fu íkuLke MkkÚku ¼ýíkk íkuLkk fnuðkíkk r{ºku s íkuLku huÃk fhe níke. (3)

y{urhfkLke nkRMfq÷kuLke rðãkÚkeoLkeyu fku÷us{kt ykðu íÞkhu s fçkw÷ fhu Au fu, íku{ktLke 20 xfkLku íkku fku÷us{kt ykðe íÞkt MkwÄe{kt Mfq÷Lkkt

Akufhkyu huÃk fhu÷e Au. yk{ktÚke y{urhfLkku Aíkkt {kºk 5 xfk s Ãkku÷eMk{kt VrhÞkË fhu Au. yksu y{urhfkLkk rzÃkkxo{uLx ykuV yußÞwfuþLk

y{urhfkLke 84 nkRMfq÷ku{kt xeLkush rðãkŠÚkykuLku huÃk fhkR íkuLke VrhÞkËLke íkÃkkMk fhu Au. (4) LkkuðuoLkk ykuM÷ku ËuþLkk økkuhk {uÞhu ÃkkuíkkLkwt

LkkuðuoLkwt íkqík [÷kÔÞwt Au fu, LkkuðuoLkk ykuM÷ku þnuh{kt íkku 43 ð»koLke †eLku Ãký huÃk fhkR níke yLku yu çk¤kífkh yuf {wÂM÷{u fÞkuo níkku. LÞwÞkufou

†eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk

Kavach:�The�Magazine�of�Raksha�Shakti�University

*Dr.�Dimpal�T.�Raval

*Asst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad

76

Page 13: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

IV.� CONCLUSION

Watermarking�techniques�are�very�useful�for�secure�transmission�of�an�image�from�one�place�to�another�

place�we�can�add�secrete�or�public�key� for� increase�security.�Fragile�watermarking�detect� if�any�single�

modification�is�done�with�your�image�but�in�case

of�semi�fragile�it�is�focused�on�only�selected��pat��of�image�means�if�modification�is�done�in�selective�part�of�

image�then�and�then�only�it�will�detect.�Self�embedded�water�marking�detect�as�well�as�regenerate�original�

image�if�any�tampering�is�made.�In�copy�move�detection�technique�a�major�drawback�is�if�pasted�image�is�

rotated�compare�to�copied�image�then�we�cannot�directly�applied�this�algorithm;�we�have�to�apply�some�

image�processing�operation�on�it.

REFERENCES[1]�� Rotation,�Scale�and�Translation�Invariant�Digital�Image�Watermarking,�J.J.K.�O'Ruanaidh�and�T.�Pun,�Proceedings�

of�the�ICIP,�VOl.�1,�pp�536-539,�Santa�Barbara,�California,�Oct�1997.[2]�� Navneet�Kumar�Mandhani,�A�Thesis�”�WATERMARKING�USING�DECIMAL�SEQUENCES”,�Louisiana�State�University�

and�Agricultural�and�Mechanical�College.[3]�� R.�J.�Rummel,�“Understanding�Correlation”�Honolulu:�Department�of�Political�Science�University�of�Hawaii,�1976.� URL:�http://www.mega.nu/ampp/rummel/uc.htm[4]�� H.P.�Solomon,�“Integration�of�haemodynamic�and�electrocardiographic�waveform�data�with�DICOM�images,”�Int�J�

Card�Imaging,�vol.�14(5),�1998,�pp.�301-3066.[5]�� F.�Hartung�and�M.�Kutter,�“Multimedia�watermarking�techniques,”��IEEE��Proceeding,��vol.��87,��no.��7,��July��1999,� pp.1079�‒1107.[6]�� G.�Voyatzis,�I.�Pitas,�“Applications�of�Toral�Automorphism�in�Image�Watermarking,”�ICIP,�Vol�II,�1996,�pp.237-240,�

1996.�“Handwriting�Recognition�Systems”,[7]�� Alin� C.� Popescu� and� Hany� Farid,� Exposing� Digital� Forgeries� in� Color� Filter� Array� Interpolated� Images,� IEEE�

Transactions�on�Signal�Processing,�Vol.�53,�Issue�10,�Part�2,�October�2005,�pp�3948-3959[8]�� M.Wu�A.�Swaminathan�and�K.�J.�Ray�Liu,�“Image�tamperingidentification�using�blind�deconvolution,”�Proc.�IEEE�

ICIP,�2006.[9]�� T.�Ng,�S.F.Chang,�Q.�Sun,�“Blind�detection�of�Photomontage�Using�Higher�Order�Statistics,”�IEEE�International�

Symposium�on�Circuits�and�Systems,�Vancouver,�Canada,�May�2004.

«MíkkðLkk

fk{Lkkt MÚk¤u †eykuLke òíkeÞ Mkíkk{ýe Mk{økú rðïV÷f Ãkh ð»kkuoÚke Mk¤økíke Mk{MÞk çkLke økR Au. Mk{ks ykðk çkLkkðkuLku Zktfe hk¾ðk {kxu

Mkíkík «ÞíLkþe÷ hÌkku Au. ÷øk¼øk çkÄu s ykðe fLkzøkík ÃkwÁ»kkuÚke fhkÞ Au yLku {rn÷kyku ðzu íku ðuXe ÷uðkÞ Au. {uLkus{uLx íku «íÞu

ykt¾r{[k{ýk fhu Au yLku fkuR íkuLkku rðhkuÄ WXkððk ykøk¤ ykðíkw LkÚke. òu †eLkkufh, ðþ Lk ÚkkÞ íkku íkuLku Lkkufhe{ktÚke Ëqh fhðkLke Ä{fe Ãký

ykÃku Au. MkuõMkwy÷ nuhuMk{uLx Võík yuÂõÍõÞwxeð ykurVMkku{kt s Lknª, Ãkhtíkw Mkwfk ¾uíkhku{kt, rþûkýÄk{Úke ÷RLku {LkkuhtsLkLkkt MÚk¤ku MkwÄe yLku

çkÄk s ûkuºkku, ÄtÄk, Wãkuøkku, íkÚkk ðuÃkkh yLku WíÃkkËLkLkkt MÚk¤kuyu Ãký Ëu¾k Ëu Au. Wå[ rþûký Ãkk{u÷e, rLkhûkh, ykurVMk f{o[khe, {nuLkíkfþ,

ÔÞðMkkrÞf yLku ½hfk{ fhLkkhe yuðe Ëhuf {rn÷k òríkÞ Mkíkk{ýeLkku ¼kuøk çkLku Au. rðãkÚkeoLkeyku Ãký çkkfkík LkÚke. yk{ nkuðk AíkktÞ

{rn÷kyku íku [qÃk[kÃk ðuXe ÷u Au fu Lkkufhe yÇÞkMk Akuze Ëu Au. ð¤e, ßÞkhu íkuLke Mkk{u yðks WXkðkÞku Au íÞkhu íkuLkku øk÷r÷Þk fhkðu íkuðk

y¾çkkhe ðýoLkku {kxu WÃkÞkuøk fhkÞku Au fkhý fu y¾çkkh {kxu Ãký Ëw»f{oLkku rð»kÞ ©uc økýkÞ.

òíkeÞ Mkíkk{ýeLke Mk{MÞk Võík ¼khíkLke s LkÚke Mk{økú rðïLke yk Mk{MÞk Au. “Ä LÞqÞkufo rhÔÞw ykuV çkwõMk” Lkkt 05-02-2015Lkku {wsçk

íÞktLke fku÷tçkeÞk ÞwrLkðŠMkxeLke nkRMfw÷{kt ¼ýíke Ëefheykuyu Mkh½Mk fkZâwt yLku nkRMfw÷Lkkt rþûkfku yLku xeLkush-rðãkÚkeoyku Mfq÷Lke

AkufheykuLku huÃk fhu Au íkuLkku rðhkuÄ fÞkuo níkku.

økuxMxkuLk RÂLMxxTâqx Lkk{Lke LkkrhðkËe MktMÚkkyu ÷ÏÞw Au fu ÷tzLk{kt yuf hurzÞku MxuþLk{kt {uz{ «kuøkúk{ {kMíkh yu yuf rçkLk yurþÞLkLku rðLktíke

fhe níke fu íkuLke [kiË ð»koLke rËfheLku íkuLke ËkËe ËkËkLkkt ½hu {qfe ykðu yLku Mkq[Lkk fhe níke fu ÷tzLk{kt xuõMkeyku{kt [k÷eMk xfk {rn÷k zÙkRðhku

Au íku {rn÷k zÙkRðhðk¤e xuõMke ¼kzu hk¾u. ÷tzLkLkkt økkuhk xuõMkeðk¤k íkku Mfq÷Lke xeLkush 11-12-17 ð»koLke AkufheykuLku s Ãkfzu Au. ÷tzLk{kt

y{wf økUøkku ykrMkMxLx økwtzk hk¾u Au su LkkLke AkufheLku «Úk{ Ãkkuíku huÃk fhu ÃkAe íkuLku VkuMk÷kðeLku økwtzk ÃkkMku ÷R òÞ. ÷tzLk{kt Ëh ð»kuo 1125 huÃk

ÚkkÞ Au. Ãkhtíkw çkeçkeMke «{kýu ¾hu¾hku yktfzku 12000 WÃkh Au. yhu {kL[uMxhLkk økkuhk xuõMkeðk¤k íkku Mfq÷Lkk YÃkk¤k [kufhk fu YÃkk¤k

ðÞMf ÃkuMkuLshLku Ãký Akuzíkk LkÚke.

søkík¼h{kt Úkíkk huÃk rð»ku íkkswt Mkðuoûký {éÞw Au (1) LÞqÞkufo xkRBMk fnu Au fu, ÞwrLkðŠMkxe nuX¤Lke r{© Mfq÷kuLke xeLkush AkufheykuLku huÃk

fhkÞ Au... yhu xuõMkkMk hkßÞLkkt ÌkwMxLk þnuhLkk Ãkku÷eMk ykurVMkhkuyu 6600 sux÷k çk¤kífkhkuLku nuLz÷ fhíke VkR÷ íkiÞkh fhe Au. yu

çkÄkLkk zeyuLkyu ðøkuhu íkÃkkMkðk{kt ºký-ºký ËkÞfk ÷køÞk Au. huÃk ¼khíkLkku Lknª Ãkrù{Lkku ðÄw hkuøk[k¤ku Au. (2) LÞwÞkufo heÔÞw ykuV çkwõMkLkkt

(5-2-2015) fnuðk «{kýu, Yxøkh ÞwrLkðŠMkxeLke ykurVMk{kt ðkÞku÷tLMk r«ðuLþLk ykMkeMxLx Lkk{Lke ykurVMk hk¾ðe Ãkze Au. yux÷k {kxu

fu, yuB{k MkwÕfkuðeÍ Lkk{Lke MkeLkeÞh nkRMfq÷ - rðãkÚkeoLkeyu VrhÞkË fhe fu íkuLke MkkÚku ¼ýíkk íkuLkk fnuðkíkk r{ºku s íkuLku huÃk fhe níke. (3)

y{urhfkLke nkRMfq÷kuLke rðãkÚkeoLkeyu fku÷us{kt ykðu íÞkhu s fçkw÷ fhu Au fu, íku{ktLke 20 xfkLku íkku fku÷us{kt ykðe íÞkt MkwÄe{kt Mfq÷Lkkt

Akufhkyu huÃk fhu÷e Au. yk{ktÚke y{urhfLkku Aíkkt {kºk 5 xfk s Ãkku÷eMk{kt VrhÞkË fhu Au. yksu y{urhfkLkk rzÃkkxo{uLx ykuV yußÞwfuþLk

y{urhfkLke 84 nkRMfq÷ku{kt xeLkush rðãkŠÚkykuLku huÃk fhkR íkuLke VrhÞkËLke íkÃkkMk fhu Au. (4) LkkuðuoLkk ykuM÷ku ËuþLkk økkuhk {uÞhu ÃkkuíkkLkwt

LkkuðuoLkwt íkqík [÷kÔÞwt Au fu, LkkuðuoLkk ykuM÷ku þnuh{kt íkku 43 ð»koLke †eLku Ãký huÃk fhkR níke yLku yu çk¤kífkh yuf {wÂM÷{u fÞkuo níkku. LÞwÞkufou

†eykuLke òíkeÞ fLkzøkík: yuf ðirïf Mk{MÞk

Kavach:�The�Magazine�of�Raksha�Shakti�University

*Dr.�Dimpal�T.�Raval

*Asst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad

76

Page 14: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

xkRBMku 24-10-2011Lkk ytf{kt [kuϾw ÷ÏÞwt Au fu, Lkkuðuo{kt †e-ÃkwÁ»k Mk{kLkíkkLkk çkýøkk VqtfkÞ Au, Ãký Lkkuðuo{kt ÃkíLkeyku MkuõMk Lk RåAíke

nkuÞ íkku íkuLku huÃk fhkÞ Au. íkuLkwt fkhý Au 90 xfk LkkuðuoSÞLk ÃkwÁ»kku ½hu çkk¤fkuLku Mkk[ðu Au yLku hMkkuR Ãký fhu Au. Ãký íku{kt nuhkMk{uLx LkÚke.

yk{ MkuõMkwy÷ nuhMk{uLxLkku rð»kÞ yktíkhhkr»xÙÞ çkLÞku Au. “Ä LkuþLk” Lkk{Lkwt y{urhfLk {uøkurÍLk fnu Au fu, søkík{kt Ëhuf 1 r{rLkxu yuf huÃk

ÚkkÞ Au.

f{o[khe fu yuf ÔÞÂõík íkhefu †eLke ¼qr{fkLkwt yð{wÕÞLk ÚkkÞ Au. yuf çkksw fkÞËku †eykuLku yrÄfkhku ykÃku Au, ßÞkhu çkeS çkksw †e þku»kýLkkt

økwLkkyku yrðhík ðÄu s òÞ Au. Mkk{kLÞ heíku ßÞkhu †eykuLkkt þku»kýLke fu íku{Lke WÃkh ÚkR hnu÷k yíÞk[khkuLke ðkík fhðk{kt ykðu Au íÞkhu {kuxu

¼køku íku{kt þkrhhef fu {kLkrMkf ºkkMkLke ðkíkku s [[koÞ Au. ¾qçk ykuAk ÷kufku †eykuLku ðuXðk Ãkzíkk ºkeò «fkhLkkt ºkkMk rðþu [[ko fhíkkt nkuÞ Au.

yk ºkkMkLku òíkeÞ ºkkMk fu òíkeÞ Mkíkk{ýe fne þfkÞ. Mkíkk{ýe yuf Mðk¼krðf çkkçkík Au yu{ {kLkðk{kt ykðu Au. yksu †e ½hLke [kh

rËðk÷ku{kt ÃkwhkRLku hnuíke LkÚke, hnuðw þõÞ Ãký LkÚke. SðLkrLkðkon, fwxwtçkLkwt økwshkLk, rþûký {u¤ððk fu ÃkkuíkkLke fkhrfíkeo {kxu fu fkuR Ãký fkhýu

çknkh Lkef¤ðwt s yrLkðkÞo çkLÞw Au. òíkeÞ Mkíkk{ýe †eykuLke Mkk{krsf økrík þe÷íkk Ãkh MkeÄku «nkh fhu Au.

òríkÞ Mkíkk{ýeLkku ¼kuøk ÚkLkkh †e {kxu Lkkufhe Akuze ËuðkLkku rðfÕÃk çkkfe hnu Au. yuf MktþkuÄLk {wsçk ¼kuøk çkLku÷ 40 xfkÚke WÃkh †eykuyu

hkSLkk{ww ykÃku÷ Au. 30 xfk fhíkk ðÄw rðãkÚkeoLkeyku yÇÞkMk Akuze Ëu Au.

òíkeÞ Mkíkk{ýeLkkt rfMMkkyku ðÄðkLkwt fkhý:

ª yrLkðkÞo Mktòuøkku íkhefu Mðefkhu÷ {wÏÞ fkhý Au fu †e îkhk «ríkhkuÄ fhkíkku LkÚke, †e ½hhϾw, {eík¼k»ke, Lk{ú, yk¿kkfkhe yLku ykrÄLk

hnuðe òuRyu yLku {wtøkk {kuZu Mkne ÷uíke òuðk {¤u Au, suLkk ÷eÄu ÃkwÁ»k Lkezh çkLku Au yLku yk Mkíkk{ýe ðkhtðkh fhíkku òuðk {¤u Au.

ª çkesw fkhý yu Au fu ÃkÁ»kLkwt òríkÞ Mkíkk{ýe {kxu y÷øk {kÃkËtz. yuf s ÃkwÁ»k yuf s yk[hý ÃkkuíkkLke çkuLk fu ÃkíLke {kxu y¼ÿ, yr&÷÷

økýþu yLku yu s yk[hý ÃkkuíkkLke yrÄLkMÚk fu Mknf{o[khe †eykuLke çkkçkík{kt MkkÄkhý {ò fu rðLkkuË fu ÃkAe ykÄwrLkfíkk Lkkt YÃk{kt ÷R

÷u Au.

þwt òríkÞ Mkíkk{ýe yu {kºk Mkk{krsf Mk{MÞk Au fu çkeswt fktR Ãký ?

Mk{ksþkMkúe yuLku {kºk Mkk{krsf Mk{MÞk {kLku Au ßÞkhu {Lkkuði¿kkrLkf íkuLku ÔÞÂõíkLkkt {LkkurðfkhLkwt Ãkrhýk{ {kLku Au. xqtf{kt òríkÞ Mkíkk{ýe

Mkk{krsf Mk{MÞk Ãký Au. yLku MkkÚkuMkkÚku {Lkkuði¿kkrLkf Mk{MÞk Ãký Au. òu yk Mk{MÞkLku Ëirnf {LkkuMkk{krsf Mk{MÞk fneþwt íkku ÞkuøÞ økýkþu.

30 Ëuþku{kt òíkeÞ Mkíkk{ýe ytøkuLkk fkÞËk Au. ¼khík Ëuþ{kt MkuõMkwy÷ nuhuMk{uLx rçk÷, 2004{kt ÃkMkkh ÚkÞw suLke f÷{ 2(0) {kt òíkeÞ

Mkíkk{ýeLke ÔÞkÏÞk ykÃku÷e Au. yLku yk ytøku Mkwr«{fkuxoLkku Mke{kr[ö [wfkËku rðþk¾k rð Mxux ykuV hksMÚkkLkLkkt fuMk{kt Mkwr«{ fkuxou íkuLke

ÔÞkÏÞk fhe yLku yk yttøku fux÷kf {køkoËþof rMkæÄktíkku ykÃÞk yLku XhkÔÞw fu ßÞkt MkwÄe MkktMkË fkÞËku ½zu Lknª íÞkt MkwÄe yk rMkæÄktíkkuLku

yLkwMkhðk. íÞkh çkkË ð»ko 2013{kt †eykuLke fk{fksLkkt MÚk¤u òíkeÞ Mkíkk{ýe (rLkÞtºký, rLk»kuÄ yLku rLkðkhý) yrÄLkeÞ{ y{÷{kt

ykðu÷ Au, su {wsçk...

òíkeÞ Mkíkk{ýe yux÷u –

yuðwt ðýòuRíkwt fu yMðefkÞo òíkeÞíkk íkhV íkfkÞu÷w «íÞûk fu økŠ¼ík heíkLkwt ðíkoLk fu su{kt,

Kavach:�The�Magazine�of�Raksha�Shakti�University

ª þkrhhef MktÃkfo fu íkuLkku «ÞíLk, (òýe òuRLku nkÚk yzkzðku fu ¾U[ðku)

ª òíkeÞ MktçktÄ {kxu Ëçkký fhðw fu fnuðw – su{ fu, yrÄfkhe îkhk «{kuþLk {kxu ½hu ykððkLke ðkík fnuðe.

ª yr&÷÷ heíku ftR fnuðw, (fkuRLkkt fÃkzkt çkku÷ðk, [k÷ðkLke heík Ãkh ÔÞtøk fhðku)

ª yr&÷÷ r[ºkku Ëþkoððk (ÃkkuLkkuoøkúkVe)

ª yLÞ Lk þku¼u íkuðku þkrhhef, {kir¾f fu rçkLk{kir¾f ÔÞðnkh fhðku, su{ fu – yr&÷÷ Rþkhk ðøkuhu..

yk ÔÞkÏÞk LÞkrÞf Mkr¢ÞíkkLkkt ¼køkYÃku LÞkÞíktºk (Mkwr«{ fkuxou) yLku 2013{kt Lkðk ykðu÷ òíkeÞ Mkíkk{ýe «ríkçktÄf yrÄrLkÞ{ {wsçkLke

Au.íkËTWÃkhktík ykRÃkeMke f÷{ - 294 {wsçk... “su fkuR ÔÞÂõík çkeòLku ºkkMk ÚkkÞ íku heíku ònuh MÚk¤u yr&÷÷ f]íÞ fhu, ònuh MÚk¤u yr&÷÷

økeík økkÞ, fkÔÞku Mkt¼¤kðu fu þçËku Wå[khu íkuLku 3 {kMkLke fuË Ëtz Lke MkòLke òuøkðkR Au.

yk f÷{{kt yr&÷÷ þçËLke fkuR ÔÞkÏÞk fhu÷ LkÚke. Ãkhtíkw ðkMkLkkÃkqýo RåAkyku òøk]ík fhe ¼úü fhðkLkwt ð÷ý níkw fu Lknª íku yr&÷÷íkkLke

fMkkuxe Au. suLkkÚke Mkkt¼¤Lkkh fu VrhÞkËeLkwt {Lk rð[r÷ík fu ¼úü ÚkÞw nkuðwt òuRyu.

LÞkrÞf Mkr¢Þíkk

ª yuÃkhu÷ yuûÃkkuxo «{kuþLk fkWÂLMk÷ ðe yu. fu. [kuÃkhk (1999, Mkwr«{ fkuxo 759)

yu. fu [kuÃkhkLku fkWÂLMk÷Lke yuf †eLkkufhLku ÃksððkLkkt «ÞíLk {kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku níkku. [kuÃkhk fkWÂLMk÷Lkkt [uh{uLkLkku

«kRðux Mku¢uxhe níkku. íku íkuLkk nkÚk Lke[uLke {rn÷k xkRrÃkMxLku Ëçkký fhe íkks nkux÷{kt, ßÞkt íkuLkku [uh{uLk hnuíkku níkku, íÞkt ÷R økÞku yLku

nkux÷Lkkt ¼kUÞhk{kt íkuýe ÃkkMku xkRÃk fhðkLkkt çknkLku íkuýeLku yuLke ðktÄksLkf ðíkoýqtfÚke Mkíkk{ýe yLku Ãksðýe fhLkk {ktze. yufktíkLkku ÷k¼ ÷R

íkuýu xkRÃkeMxLke ÷økku÷øk çkuMkðkLkku ðkhtðkh «ÞíLk fÞkuo. xkRÃkeMxu r÷^xLkwt R{hsLMke çkxLk ËkçkeLku ÃkkuíkkLke òíkLku Mk÷k{ík hk¾e. çkkË{kt

íkuýeyu rzhuõxhLku ÷ur¾ík VrhÞkË fhe yLku [kuÃkhkLku Lkiríkf rLkÞ{kuLke rðÁØ sR xkRÃkeMx MktçktÄ{kt fhu÷ yrþü yLku MkÇÞíkk rðÁØLkkt fkÞkuo

{kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku. Íkuýu hex fhe yLku íkuLku Lkkufhe{kt ÃkkAku ÷uðkLkku ykËuþ nkRfkuxuo fÞkuo. yuBÃ÷kuÞhu íku Mkk{u ÷uxMko ÃkuxLx

yÃke÷ fhe, su hË ÚkR Ãkrhýk{u yuBÃ÷kuÞhu Mkwr«{{kt MÃkuÂ~Þ÷ ÷eð ÃkexeþLk fhíkkt Mkwr«{ fkuxuo íkuLku fhu÷e Mkò {tsqh hk¾e nkRfkuxo{kt

ykËuþLku hÆ fÞkuo. – rðþk¾k fuMkLku æÞkLk{kt ÷uðk{kt ykÔÞku.

ª Ãktòçk{kt ºkkMkðkË LkkÚkðk{kt MkV¤íkk {u¤ðLkkh yLku MkwÃkhfkuÃk íkhefu rçkYË Ãkk{u÷k fu.Ãke.yuMk. øke÷Lku Mkwr«{fkuxuo YÃkLk Ëuyku÷ çkòsLke

Auzíke çkË÷ Mkò fhkðe. yk fuMk 17 ð»ko MkwÄe [kÕÞku, su{kt çktLku Wå[ fûkkLkkt Mkhfkhe yrÄfkhe níkkt yLku çktLkuLku fwxwtçkLkku xufku {éÞku níkku.

Ãkhtíkw rLkíktçk Ãkh xÃk÷e {khðkLkku fuMk 17 ð»ko [k÷u íkuLke ÃkkA¤ Mk{Þ íku{s ÃkiMkkLkwt Ãkký ÚkkÞ íku Mkk{kLÞ f{o[khe MknLk fhu ¾hku. ( sw÷kR

1988 – yZe ÷k¾Lkwt ð¤íkh, Mkò fhe Ãký yÃke÷{kt ð¤íkh {tswh ÚkÞw)

ª hks©e ðk½nhu - «kuçkuþLk Ãkh níkk íÞkhu yuMk.ze. {khu yu íku{Lku fkh{kt ¾U[eLku çkeS ykurVMku ÷R sR A ðkøÞk MkwÄe çkuMkkze hkÏÞk. ½hu

sðkLke hswykík fhe íkku ¾¼ku Ãkfze çkuMkkzeLku f÷uõxh fnu yu fhðw – òu yLÞ {rn÷k yrÄfkhe nkuík íkku þhýu ykðe òík, íkwt fu{ hzâk fhu

Au – ËMk ð»ko ÷zâk çkkË {wtçkRLke nkRfkuxuo ¾huLku A ð»koLke fuË yLku 25000 Ëtz fÞkuo.

98

Page 15: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

xkRBMku 24-10-2011Lkk ytf{kt [kuϾw ÷ÏÞwt Au fu, Lkkuðuo{kt †e-ÃkwÁ»k Mk{kLkíkkLkk çkýøkk VqtfkÞ Au, Ãký Lkkuðuo{kt ÃkíLkeyku MkuõMk Lk RåAíke

nkuÞ íkku íkuLku huÃk fhkÞ Au. íkuLkwt fkhý Au 90 xfk LkkuðuoSÞLk ÃkwÁ»kku ½hu çkk¤fkuLku Mkk[ðu Au yLku hMkkuR Ãký fhu Au. Ãký íku{kt nuhkMk{uLx LkÚke.

yk{ MkuõMkwy÷ nuhMk{uLxLkku rð»kÞ yktíkhhkr»xÙÞ çkLÞku Au. “Ä LkuþLk” Lkk{Lkwt y{urhfLk {uøkurÍLk fnu Au fu, søkík{kt Ëhuf 1 r{rLkxu yuf huÃk

ÚkkÞ Au.

f{o[khe fu yuf ÔÞÂõík íkhefu †eLke ¼qr{fkLkwt yð{wÕÞLk ÚkkÞ Au. yuf çkksw fkÞËku †eykuLku yrÄfkhku ykÃku Au, ßÞkhu çkeS çkksw †e þku»kýLkkt

økwLkkyku yrðhík ðÄu s òÞ Au. Mkk{kLÞ heíku ßÞkhu †eykuLkkt þku»kýLke fu íku{Lke WÃkh ÚkR hnu÷k yíÞk[khkuLke ðkík fhðk{kt ykðu Au íÞkhu {kuxu

¼køku íku{kt þkrhhef fu {kLkrMkf ºkkMkLke ðkíkku s [[koÞ Au. ¾qçk ykuAk ÷kufku †eykuLku ðuXðk Ãkzíkk ºkeò «fkhLkkt ºkkMk rðþu [[ko fhíkkt nkuÞ Au.

yk ºkkMkLku òíkeÞ ºkkMk fu òíkeÞ Mkíkk{ýe fne þfkÞ. Mkíkk{ýe yuf Mðk¼krðf çkkçkík Au yu{ {kLkðk{kt ykðu Au. yksu †e ½hLke [kh

rËðk÷ku{kt ÃkwhkRLku hnuíke LkÚke, hnuðw þõÞ Ãký LkÚke. SðLkrLkðkon, fwxwtçkLkwt økwshkLk, rþûký {u¤ððk fu ÃkkuíkkLke fkhrfíkeo {kxu fu fkuR Ãký fkhýu

çknkh Lkef¤ðwt s yrLkðkÞo çkLÞw Au. òíkeÞ Mkíkk{ýe †eykuLke Mkk{krsf økrík þe÷íkk Ãkh MkeÄku «nkh fhu Au.

òríkÞ Mkíkk{ýeLkku ¼kuøk ÚkLkkh †e {kxu Lkkufhe Akuze ËuðkLkku rðfÕÃk çkkfe hnu Au. yuf MktþkuÄLk {wsçk ¼kuøk çkLku÷ 40 xfkÚke WÃkh †eykuyu

hkSLkk{ww ykÃku÷ Au. 30 xfk fhíkk ðÄw rðãkÚkeoLkeyku yÇÞkMk Akuze Ëu Au.

òíkeÞ Mkíkk{ýeLkkt rfMMkkyku ðÄðkLkwt fkhý:

ª yrLkðkÞo Mktòuøkku íkhefu Mðefkhu÷ {wÏÞ fkhý Au fu †e îkhk «ríkhkuÄ fhkíkku LkÚke, †e ½hhϾw, {eík¼k»ke, Lk{ú, yk¿kkfkhe yLku ykrÄLk

hnuðe òuRyu yLku {wtøkk {kuZu Mkne ÷uíke òuðk {¤u Au, suLkk ÷eÄu ÃkwÁ»k Lkezh çkLku Au yLku yk Mkíkk{ýe ðkhtðkh fhíkku òuðk {¤u Au.

ª çkesw fkhý yu Au fu ÃkÁ»kLkwt òríkÞ Mkíkk{ýe {kxu y÷øk {kÃkËtz. yuf s ÃkwÁ»k yuf s yk[hý ÃkkuíkkLke çkuLk fu ÃkíLke {kxu y¼ÿ, yr&÷÷

økýþu yLku yu s yk[hý ÃkkuíkkLke yrÄLkMÚk fu Mknf{o[khe †eykuLke çkkçkík{kt MkkÄkhý {ò fu rðLkkuË fu ÃkAe ykÄwrLkfíkk Lkkt YÃk{kt ÷R

÷u Au.

þwt òríkÞ Mkíkk{ýe yu {kºk Mkk{krsf Mk{MÞk Au fu çkeswt fktR Ãký ?

Mk{ksþkMkúe yuLku {kºk Mkk{krsf Mk{MÞk {kLku Au ßÞkhu {Lkkuði¿kkrLkf íkuLku ÔÞÂõíkLkkt {LkkurðfkhLkwt Ãkrhýk{ {kLku Au. xqtf{kt òríkÞ Mkíkk{ýe

Mkk{krsf Mk{MÞk Ãký Au. yLku MkkÚkuMkkÚku {Lkkuði¿kkrLkf Mk{MÞk Ãký Au. òu yk Mk{MÞkLku Ëirnf {LkkuMkk{krsf Mk{MÞk fneþwt íkku ÞkuøÞ økýkþu.

30 Ëuþku{kt òíkeÞ Mkíkk{ýe ytøkuLkk fkÞËk Au. ¼khík Ëuþ{kt MkuõMkwy÷ nuhuMk{uLx rçk÷, 2004{kt ÃkMkkh ÚkÞw suLke f÷{ 2(0) {kt òíkeÞ

Mkíkk{ýeLke ÔÞkÏÞk ykÃku÷e Au. yLku yk ytøku Mkwr«{fkuxoLkku Mke{kr[ö [wfkËku rðþk¾k rð Mxux ykuV hksMÚkkLkLkkt fuMk{kt Mkwr«{ fkuxou íkuLke

ÔÞkÏÞk fhe yLku yk yttøku fux÷kf {køkoËþof rMkæÄktíkku ykÃÞk yLku XhkÔÞw fu ßÞkt MkwÄe MkktMkË fkÞËku ½zu Lknª íÞkt MkwÄe yk rMkæÄktíkkuLku

yLkwMkhðk. íÞkh çkkË ð»ko 2013{kt †eykuLke fk{fksLkkt MÚk¤u òíkeÞ Mkíkk{ýe (rLkÞtºký, rLk»kuÄ yLku rLkðkhý) yrÄLkeÞ{ y{÷{kt

ykðu÷ Au, su {wsçk...

òíkeÞ Mkíkk{ýe yux÷u –

yuðwt ðýòuRíkwt fu yMðefkÞo òíkeÞíkk íkhV íkfkÞu÷w «íÞûk fu økŠ¼ík heíkLkwt ðíkoLk fu su{kt,

Kavach:�The�Magazine�of�Raksha�Shakti�University

ª þkrhhef MktÃkfo fu íkuLkku «ÞíLk, (òýe òuRLku nkÚk yzkzðku fu ¾U[ðku)

ª òíkeÞ MktçktÄ {kxu Ëçkký fhðw fu fnuðw – su{ fu, yrÄfkhe îkhk «{kuþLk {kxu ½hu ykððkLke ðkík fnuðe.

ª yr&÷÷ heíku ftR fnuðw, (fkuRLkkt fÃkzkt çkku÷ðk, [k÷ðkLke heík Ãkh ÔÞtøk fhðku)

ª yr&÷÷ r[ºkku Ëþkoððk (ÃkkuLkkuoøkúkVe)

ª yLÞ Lk þku¼u íkuðku þkrhhef, {kir¾f fu rçkLk{kir¾f ÔÞðnkh fhðku, su{ fu – yr&÷÷ Rþkhk ðøkuhu..

yk ÔÞkÏÞk LÞkrÞf Mkr¢ÞíkkLkkt ¼køkYÃku LÞkÞíktºk (Mkwr«{ fkuxou) yLku 2013{kt Lkðk ykðu÷ òíkeÞ Mkíkk{ýe «ríkçktÄf yrÄrLkÞ{ {wsçkLke

Au.íkËTWÃkhktík ykRÃkeMke f÷{ - 294 {wsçk... “su fkuR ÔÞÂõík çkeòLku ºkkMk ÚkkÞ íku heíku ònuh MÚk¤u yr&÷÷ f]íÞ fhu, ònuh MÚk¤u yr&÷÷

økeík økkÞ, fkÔÞku Mkt¼¤kðu fu þçËku Wå[khu íkuLku 3 {kMkLke fuË Ëtz Lke MkòLke òuøkðkR Au.

yk f÷{{kt yr&÷÷ þçËLke fkuR ÔÞkÏÞk fhu÷ LkÚke. Ãkhtíkw ðkMkLkkÃkqýo RåAkyku òøk]ík fhe ¼úü fhðkLkwt ð÷ý níkw fu Lknª íku yr&÷÷íkkLke

fMkkuxe Au. suLkkÚke Mkkt¼¤Lkkh fu VrhÞkËeLkwt {Lk rð[r÷ík fu ¼úü ÚkÞw nkuðwt òuRyu.

LÞkrÞf Mkr¢Þíkk

ª yuÃkhu÷ yuûÃkkuxo «{kuþLk fkWÂLMk÷ ðe yu. fu. [kuÃkhk (1999, Mkwr«{ fkuxo 759)

yu. fu [kuÃkhkLku fkWÂLMk÷Lke yuf †eLkkufhLku ÃksððkLkkt «ÞíLk {kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku níkku. [kuÃkhk fkWÂLMk÷Lkkt [uh{uLkLkku

«kRðux Mku¢uxhe níkku. íku íkuLkk nkÚk Lke[uLke {rn÷k xkRrÃkMxLku Ëçkký fhe íkks nkux÷{kt, ßÞkt íkuLkku [uh{uLk hnuíkku níkku, íÞkt ÷R økÞku yLku

nkux÷Lkkt ¼kUÞhk{kt íkuýe ÃkkMku xkRÃk fhðkLkkt çknkLku íkuýeLku yuLke ðktÄksLkf ðíkoýqtfÚke Mkíkk{ýe yLku Ãksðýe fhLkk {ktze. yufktíkLkku ÷k¼ ÷R

íkuýu xkRÃkeMxLke ÷økku÷øk çkuMkðkLkku ðkhtðkh «ÞíLk fÞkuo. xkRÃkeMxu r÷^xLkwt R{hsLMke çkxLk ËkçkeLku ÃkkuíkkLke òíkLku Mk÷k{ík hk¾e. çkkË{kt

íkuýeyu rzhuõxhLku ÷ur¾ík VrhÞkË fhe yLku [kuÃkhkLku Lkiríkf rLkÞ{kuLke rðÁØ sR xkRÃkeMx MktçktÄ{kt fhu÷ yrþü yLku MkÇÞíkk rðÁØLkkt fkÞkuo

{kxu Lkkufhe{ktÚke Ëqh fhðk{kt ykÔÞku. Íkuýu hex fhe yLku íkuLku Lkkufhe{kt ÃkkAku ÷uðkLkku ykËuþ nkRfkuxuo fÞkuo. yuBÃ÷kuÞhu íku Mkk{u ÷uxMko ÃkuxLx

yÃke÷ fhe, su hË ÚkR Ãkrhýk{u yuBÃ÷kuÞhu Mkwr«{{kt MÃkuÂ~Þ÷ ÷eð ÃkexeþLk fhíkkt Mkwr«{ fkuxuo íkuLku fhu÷e Mkò {tsqh hk¾e nkRfkuxo{kt

ykËuþLku hÆ fÞkuo. – rðþk¾k fuMkLku æÞkLk{kt ÷uðk{kt ykÔÞku.

ª Ãktòçk{kt ºkkMkðkË LkkÚkðk{kt MkV¤íkk {u¤ðLkkh yLku MkwÃkhfkuÃk íkhefu rçkYË Ãkk{u÷k fu.Ãke.yuMk. øke÷Lku Mkwr«{fkuxuo YÃkLk Ëuyku÷ çkòsLke

Auzíke çkË÷ Mkò fhkðe. yk fuMk 17 ð»ko MkwÄe [kÕÞku, su{kt çktLku Wå[ fûkkLkkt Mkhfkhe yrÄfkhe níkkt yLku çktLkuLku fwxwtçkLkku xufku {éÞku níkku.

Ãkhtíkw rLkíktçk Ãkh xÃk÷e {khðkLkku fuMk 17 ð»ko [k÷u íkuLke ÃkkA¤ Mk{Þ íku{s ÃkiMkkLkwt Ãkký ÚkkÞ íku Mkk{kLÞ f{o[khe MknLk fhu ¾hku. ( sw÷kR

1988 – yZe ÷k¾Lkwt ð¤íkh, Mkò fhe Ãký yÃke÷{kt ð¤íkh {tswh ÚkÞw)

ª hks©e ðk½nhu - «kuçkuþLk Ãkh níkk íÞkhu yuMk.ze. {khu yu íku{Lku fkh{kt ¾U[eLku çkeS ykurVMku ÷R sR A ðkøÞk MkwÄe çkuMkkze hkÏÞk. ½hu

sðkLke hswykík fhe íkku ¾¼ku Ãkfze çkuMkkzeLku f÷uõxh fnu yu fhðw – òu yLÞ {rn÷k yrÄfkhe nkuík íkku þhýu ykðe òík, íkwt fu{ hzâk fhu

Au – ËMk ð»ko ÷zâk çkkË {wtçkRLke nkRfkuxuo ¾huLku A ð»koLke fuË yLku 25000 Ëtz fÞkuo.

98

Page 16: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

ª y{urhfkLkkt ¼qíkÃkqðo hk»xÙÃkrík (rçk÷ ®õ÷xLk)Lke Mkk{u Ãký òíkeÞ Mkíkk{ýe ytøku yËk÷ík{kt fkÞoðkne ÚkR, su y{urhfkLkkt RríknkMk{kt

Ãknu÷e s ðkh çkLÞw. fu su{kt hk»xÙÃkríkLku yËk÷ík{kt nksh Úkðw Ãkzâw. yk rfMMkku íÞkhu çkLku÷ku fu ßÞkhu íkuyku yuõMkkMkLkkt økðLkoh níkk. íÞkhu

ÃkkW÷k fkuŠçkLk {uLMk ©e ®õ÷xLkLke Mkhfkhe f{o[khe níke. íku Mk{Þu rçk÷ ®õ÷xLku íkuLke òíkeÞ Mkíkk{ýe fhe níke. su{kt yuf nkux÷{kt

®õ÷xLku íkuLkkt fÃkzkt Wíkkhðk fÌkw níkw. 18-01-98 yu íkuLke MkwLkðýe ÚkR níke. {kurLkfk ÷u®ðøMkfeLke çkkçkík{kt Ãký íkuykuLku ònuh{kt {kVe

{ktøkðe Ãkze níke.

yk{ Aíkkt †eyku Ãkh yk heíkuLkkt yíÞk[kh ðÄe hÌkk Au. rËÕne{kt ÚkÞu÷ rLk¼oÞk økUøk huÃk yLku çkËkÞwLke Ëw½oxLkk yu íkku Ãkqhk Mk{ksLku òýu

n[{[kðe {qfu÷ Au. íkksuíkh{kt s ¼khík{kt f÷f¥kk ÃkkMkuLkkt hktLkøkx økk{Lke fkuLðuLx Mfq÷Lkkt 73 ð»koLke LkLk Ãkh økUøk huÃk ÚkÞu÷ su Mk{ks {kxu

Ãký yuf f÷tfYÃk ½xLkkt Au.

yk çkÄe ½xLkkykuÚke fkÞËkyku{kt Ãký MkwÄkhk fhðk{kt ykðu÷ Au. su{ fu...

Vuõxhe yuõx{kt ykÄwrLkf MkwÄkhk {wsçk - †eyku ºkeS Ãkk¤e{kt fk{ fhþu. yk MkwÄkhku fhíkk {krníke yLku «Mkkhý {tºke ©e sÞÃkk÷ huzeyu

sýkÔÞw fu †eyku nðu fkuR Ãký søÞkyu hkºke Ãkk¤e yux÷u fu hkíkLkt 12 Úke MkðkhLkkt 7 MkwÄe fkÞo fhe þfþu, þhík yu hnuþu fu yk Vhs çkòðíke

†e f{o[kheLke Mk÷k{íke, Mðkr¼{kLk yLku {kLk suðk rníkkuLkt hûký íku Vuõxhe, ftÃkLke fu MktMÚkk îkhk Úkðw sYhe Au.

yíÞkh MkwÄe zkìõxh, LkMko yLku ykÞkyku íku{s yuhnkuMxuMk suðe †e f{o[khe hkrºk Vhs çkòðíke Ãkhtíkw nk÷Lke ÃkrhÂMÚkíke çkË÷kR Au. †eLke

Ëhuf ÔÞðMkkrÞ ûkuºk{kt hkrºk Vhs{kt nkshe òuðk {¤u Au. {kfuo®xøk, þuhçkòh, ykRxe «kuVuþLkÕMk, {rn÷k ÃkkÞ÷kux, Vuõxhe{kt fk{ fhíke

yuÂLsrLkÞh, xe.ðe.,ykfkþðkýe yLku Ãkku÷eMk {rn÷kyku yk ík{k{Lku fkÞËkLkkt yk MkwÄkhkÚke fkhrfËeo çkLkkððkLkwt «kuíMkknLk {éÞw Au.

ÞwLkkRxuz LkuþLkLkkt [kxohLkkt yk{w¾{kt (24 ykuõxku, 1945) {uLþLk fhu÷w Au fu,

“�To�reaffirm�the�faith�In�fundamental�human�rights,�is�the�dignity�and�worth�of�the�human�person,�in�the�

equal�rights�of�men�and�women�and�to�employ�international�machinery�for�the�promotion�of�the�economic�

and�social�advancement�of�the�people.”

¼khíkLkkt çktÄkhý yLku çkeò fkÞËkyku{kt Mk{Þktíkhu MkwÄkhk Úkíkkt hÌkk Au. su{kt fkR Ãký LkkøkrhfLku Ä{o, òrík, ¿kkrík fu ®÷økLkkt ¼u˼kðrðLkk

Mk{kLk Ëhßòu yLku íkf ykÃkðk{kt ykðu Au. íku{s Mkwr«{ fkuxuo Ãký ð¾íkku ð¾ík Mke{kr[Ln YÃk [wfkËkyku ykÃku÷ Au. fkÞËkykuLke yAík LkÚke,

Ãkhtíkw «© Au Mkk{kSf MktðuËLkþe÷íkkLkku. Ëh ð¾íku Lkðk fkÞËkyku ½zðk yu R÷ks LkÚke Ãkhtíkw Mk{ksLke {kLkMkefíkk çkË÷kðe yu Ãký yux÷w s

sYhe Au. ßÞkt MkwÄe †eykuLke yuf ÔÞÂõík íkhefuLke økýíkhe fhðk{kt ykðþu íkku s yk heíkLkkt Ëw»kýku yxfþu.

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

Introduction

An�aggressive�or�angry�behavior�of�a�vehicle�driver�can�cause�road�rage.�It�starts�with�tailgating,�rude�gestures,�

verbal�insults,�deliberately�driving�in�an�unsafe�or�threatening�manner,�or�making�threats.�Driver�may�make�a�

momentary�error�of�judgment�but�the�perception�of�another�driver�is�that�he�or�she�is�driving�aggressively.�

There�are�many� factors�which� contribute� to� road� rage� i.e.� circumstances,� environments,�psychological�

factors�and�variety�of�events�etc.�

ª Environmental�conditions�plays�very�important�role�in�road�rage.�These�conditions�can�be�listed�as�heat,�

light,�humidity,�fogs,�dense�traffics,�road�conditions,�noise,�speed�and�shortage�of�time.

ª Nonspecific�psychological�factors�such�as�showing�anger,�habit�of�blaming�others,�stressful�working�

condition,�shortage�of�rest�period�may�contribute�to�road�rage.�

ª Some�of�research�finding�showed�that�personality�disorders�may�cause�to�road�rage,�particularly�those�

who�uses�more�alcohol�than�the�prescribed�levels�and�substance�misuse.�

ª Individuals�with�anxiety,�depression�and�somatic�symptoms�were�found�with�severe�forms�of�road�rage.

ª Borderline� personality� disorder� (BPD)� is� characterized� by� impulsivity� (e.g.,� reckless� driving),�

intermittent�intense�dysphoria,�inappropriate�intense�anger,�difficulty�controlling�anger,�and�transient�

paranoid�ideation.�

ª Several�studies�have�examined�the�relationship�between�reckless�and/or�aggressive�driving�and�found�

that�there�is�association�between�hazardous�driving�and�BPD.�

What�Instigate�Road�Rage?

ª An�argument�over�a�parking�space

ª Overtaking

ª Showing�finger�or�rude�gesture

ª Honking�and�honking�his�horn�continuously

ª Driving�too�slowly

ª Signaling�high�beams.

Road�Rage�‒�An�Analysis*Dr.�S.�R.�Tripathi

*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad

1110

Page 17: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

ª y{urhfkLkkt ¼qíkÃkqðo hk»xÙÃkrík (rçk÷ ®õ÷xLk)Lke Mkk{u Ãký òíkeÞ Mkíkk{ýe ytøku yËk÷ík{kt fkÞoðkne ÚkR, su y{urhfkLkkt RríknkMk{kt

Ãknu÷e s ðkh çkLÞw. fu su{kt hk»xÙÃkríkLku yËk÷ík{kt nksh Úkðw Ãkzâw. yk rfMMkku íÞkhu çkLku÷ku fu ßÞkhu íkuyku yuõMkkMkLkkt økðLkoh níkk. íÞkhu

ÃkkW÷k fkuŠçkLk {uLMk ©e ®õ÷xLkLke Mkhfkhe f{o[khe níke. íku Mk{Þu rçk÷ ®õ÷xLku íkuLke òíkeÞ Mkíkk{ýe fhe níke. su{kt yuf nkux÷{kt

®õ÷xLku íkuLkkt fÃkzkt Wíkkhðk fÌkw níkw. 18-01-98 yu íkuLke MkwLkðýe ÚkR níke. {kurLkfk ÷u®ðøMkfeLke çkkçkík{kt Ãký íkuykuLku ònuh{kt {kVe

{ktøkðe Ãkze níke.

yk{ Aíkkt †eyku Ãkh yk heíkuLkkt yíÞk[kh ðÄe hÌkk Au. rËÕne{kt ÚkÞu÷ rLk¼oÞk økUøk huÃk yLku çkËkÞwLke Ëw½oxLkk yu íkku Ãkqhk Mk{ksLku òýu

n[{[kðe {qfu÷ Au. íkksuíkh{kt s ¼khík{kt f÷f¥kk ÃkkMkuLkkt hktLkøkx økk{Lke fkuLðuLx Mfq÷Lkkt 73 ð»koLke LkLk Ãkh økUøk huÃk ÚkÞu÷ su Mk{ks {kxu

Ãký yuf f÷tfYÃk ½xLkkt Au.

yk çkÄe ½xLkkykuÚke fkÞËkyku{kt Ãký MkwÄkhk fhðk{kt ykðu÷ Au. su{ fu...

Vuõxhe yuõx{kt ykÄwrLkf MkwÄkhk {wsçk - †eyku ºkeS Ãkk¤e{kt fk{ fhþu. yk MkwÄkhku fhíkk {krníke yLku «Mkkhý {tºke ©e sÞÃkk÷ huzeyu

sýkÔÞw fu †eyku nðu fkuR Ãký søÞkyu hkºke Ãkk¤e yux÷u fu hkíkLkt 12 Úke MkðkhLkkt 7 MkwÄe fkÞo fhe þfþu, þhík yu hnuþu fu yk Vhs çkòðíke

†e f{o[kheLke Mk÷k{íke, Mðkr¼{kLk yLku {kLk suðk rníkkuLkt hûký íku Vuõxhe, ftÃkLke fu MktMÚkk îkhk Úkðw sYhe Au.

yíÞkh MkwÄe zkìõxh, LkMko yLku ykÞkyku íku{s yuhnkuMxuMk suðe †e f{o[khe hkrºk Vhs çkòðíke Ãkhtíkw nk÷Lke ÃkrhÂMÚkíke çkË÷kR Au. †eLke

Ëhuf ÔÞðMkkrÞ ûkuºk{kt hkrºk Vhs{kt nkshe òuðk {¤u Au. {kfuo®xøk, þuhçkòh, ykRxe «kuVuþLkÕMk, {rn÷k ÃkkÞ÷kux, Vuõxhe{kt fk{ fhíke

yuÂLsrLkÞh, xe.ðe.,ykfkþðkýe yLku Ãkku÷eMk {rn÷kyku yk ík{k{Lku fkÞËkLkkt yk MkwÄkhkÚke fkhrfËeo çkLkkððkLkwt «kuíMkknLk {éÞw Au.

ÞwLkkRxuz LkuþLkLkkt [kxohLkkt yk{w¾{kt (24 ykuõxku, 1945) {uLþLk fhu÷w Au fu,

“�To�reaffirm�the�faith�In�fundamental�human�rights,�is�the�dignity�and�worth�of�the�human�person,�in�the�

equal�rights�of�men�and�women�and�to�employ�international�machinery�for�the�promotion�of�the�economic�

and�social�advancement�of�the�people.”

¼khíkLkkt çktÄkhý yLku çkeò fkÞËkyku{kt Mk{Þktíkhu MkwÄkhk Úkíkkt hÌkk Au. su{kt fkR Ãký LkkøkrhfLku Ä{o, òrík, ¿kkrík fu ®÷økLkkt ¼u˼kðrðLkk

Mk{kLk Ëhßòu yLku íkf ykÃkðk{kt ykðu Au. íku{s Mkwr«{ fkuxuo Ãký ð¾íkku ð¾ík Mke{kr[Ln YÃk [wfkËkyku ykÃku÷ Au. fkÞËkykuLke yAík LkÚke,

Ãkhtíkw «© Au Mkk{kSf MktðuËLkþe÷íkkLkku. Ëh ð¾íku Lkðk fkÞËkyku ½zðk yu R÷ks LkÚke Ãkhtíkw Mk{ksLke {kLkMkefíkk çkË÷kðe yu Ãký yux÷w s

sYhe Au. ßÞkt MkwÄe †eykuLke yuf ÔÞÂõík íkhefuLke økýíkhe fhðk{kt ykðþu íkku s yk heíkLkkt Ëw»kýku yxfþu.

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

Introduction

An�aggressive�or�angry�behavior�of�a�vehicle�driver�can�cause�road�rage.�It�starts�with�tailgating,�rude�gestures,�

verbal�insults,�deliberately�driving�in�an�unsafe�or�threatening�manner,�or�making�threats.�Driver�may�make�a�

momentary�error�of�judgment�but�the�perception�of�another�driver�is�that�he�or�she�is�driving�aggressively.�

There�are�many� factors�which� contribute� to� road� rage� i.e.� circumstances,� environments,�psychological�

factors�and�variety�of�events�etc.�

ª Environmental�conditions�plays�very�important�role�in�road�rage.�These�conditions�can�be�listed�as�heat,�

light,�humidity,�fogs,�dense�traffics,�road�conditions,�noise,�speed�and�shortage�of�time.

ª Nonspecific�psychological�factors�such�as�showing�anger,�habit�of�blaming�others,�stressful�working�

condition,�shortage�of�rest�period�may�contribute�to�road�rage.�

ª Some�of�research�finding�showed�that�personality�disorders�may�cause�to�road�rage,�particularly�those�

who�uses�more�alcohol�than�the�prescribed�levels�and�substance�misuse.�

ª Individuals�with�anxiety,�depression�and�somatic�symptoms�were�found�with�severe�forms�of�road�rage.

ª Borderline� personality� disorder� (BPD)� is� characterized� by� impulsivity� (e.g.,� reckless� driving),�

intermittent�intense�dysphoria,�inappropriate�intense�anger,�difficulty�controlling�anger,�and�transient�

paranoid�ideation.�

ª Several�studies�have�examined�the�relationship�between�reckless�and/or�aggressive�driving�and�found�

that�there�is�association�between�hazardous�driving�and�BPD.�

What�Instigate�Road�Rage?

ª An�argument�over�a�parking�space

ª Overtaking

ª Showing�finger�or�rude�gesture

ª Honking�and�honking�his�horn�continuously

ª Driving�too�slowly

ª Signaling�high�beams.

Road�Rage�‒�An�Analysis*Dr.�S.�R.�Tripathi

*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad

1110

Page 18: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

ª Tailgating�

ª Hit-and-run�minor�collision.

ª Crossing�the�lanes�without�signaling

ª Abusing�and�Hitting

The�statistics�of�NHTSA�(National�Highway�Traffic�Security�Administration�and�the�Auto�Vantage�auto�club)�

show�that�-

ª 66%�of�traffic�fatalities�are�caused�by�aggressive�driving.

ª 37%�of�aggressive�driving�incidents�involve�a�firearm.

ª Males�under�the�age�of�19�are�the�most�likely�to�exhibit�road�rage.

ª Half�of�drivers�who�are�on�the�receiving�end�of�an�aggressive�behavior,�such�as�horn�honking,�a�rude�

gesture,�or�tailgating�admit�to�responding�with�aggressive�behavior�themselves.�

Road�accidents�Statistics�(India)*

ª In�India,�1,20,000�people�die�and�12,70,000�sustain�serious�injuries�every�year�in�Road�Traffic�Accidents.�

ª Every�six�minutes�there�is�one�death�due�to�road�accident;�it�may�rise�to�one�death�in�every�three�minutes�

by�2020.�

ª 1.4� million� Serious� road� accidents/� collisions� occurring� annually� in� India,� hardly� 0.4� million� are�

recorded.(Institute�of�Road�Traffic�Education�2006)

ª In�rural�areas�all� road�accidents�are�not�recorded�and�similarly� late�deaths�after� the�discharge�from�

hospital�also�are�not�recorded.�(Indian�Journal�Of�Neurotrauma�(�IJNI)�2008�vol.5�No.2,pp.63-67.)

ª India�accounts�for�about�10%�of�road�accident�fatalities�worldwide�

ª The�number�of�accidents�for�1000�vehicles�in�India�is�as�high�as�35�while�the�figure�ranges�from�4�to�10�in�

developed�countries.

ª More�people�die�in�road�accidents�in�India�than�anywhere�else�in�the�world�(World�Health�Organization,�

Global�status�report�on�Road�safety2009).

ª In� comparison� to� developed� countries� accidents� in� India� is� 3time� higher.(National� Transportation�

Planning�and�Reasearch�Centre(NTPRC).

Kavach:�The�Magazine�of�Raksha�Shakti�University

ª Although�India�accounts�for�only�1%�of�the�registered�motor�vehicles,�it�accounts�for�nearly�9�%�of�R� T A�

deaths.�

ª 85�%�of�the�victims�of�these�fatalities�are�men�in�the�age�group�20-50�years.

ª *Alarming�Facts�of�Road�Accidents�in�India,�Dr.Rajsekaran.President�Indian�Orthopedic�Association.��

Key�facts�(WHO)

ª About�1.24�million�people�die�each�year�as�a�result�of�road�traffic�crashes.

ª Road�traffic�injuries�are�the�leading�cause�of�death�among�young�people,�aged�15‒29�years.

ª 91%�of� the�world's� fatalities�on� the� roads�occur� in� low-income�and�middle-income�countries,�even�

though�these�countries�have�approximately�half�of�the�world's�vehicles.

ª Half� of� those� dying� on� the� world's� roads� are� “vulnerable� road� users”:� pedestrians,� cyclists� and�

motorcyclists.

ª Without�action,�road�traffic�crashes�are�predicted�to�result�in�the�deaths�of�around�1.9�million�people�

annually�by�2020.

ª Only�28�countries,�representing�416�million�people�(7%�of�the�world's�population),�have�adequate�laws�

that�address�all�five�risk�factors�(speed,�drink-driving,�helmets,�seat-belts�and�child�restraints).

A�Decade�of�Action�for�Road�Safety�(2011‒2020)�was�launched�by�United�Nations�General�Assembly�resolution�

in�May�2011,�in�over�110�countries,�for�improving�the�safety�of�roads�and�vehicles;�changing�the�behaviour�and�

attitude�of�road�users;�and�improving�emergency�services.�

Further,�"Road�Safety�in�10�Countries�(RS10)�Project"�supports�the�governments�of�Brazil,�Cambodia,�China,�

Egypt,�India,�Kenya,�Mexico,�the�Russian�Federation,�Turkey�and�Viet�Nam�by�focusing�on�selected�key�risks�for�

road�traffic�crashes.�World�Health�Organization�(WHO)�works�across�the�spectrum�in�countries,�and�provide�

the�technical�guidance.�

1312

Page 19: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

ª Tailgating�

ª Hit-and-run�minor�collision.

ª Crossing�the�lanes�without�signaling

ª Abusing�and�Hitting

The�statistics�of�NHTSA�(National�Highway�Traffic�Security�Administration�and�the�Auto�Vantage�auto�club)�

show�that�-

ª 66%�of�traffic�fatalities�are�caused�by�aggressive�driving.

ª 37%�of�aggressive�driving�incidents�involve�a�firearm.

ª Males�under�the�age�of�19�are�the�most�likely�to�exhibit�road�rage.

ª Half�of�drivers�who�are�on�the�receiving�end�of�an�aggressive�behavior,�such�as�horn�honking,�a�rude�

gesture,�or�tailgating�admit�to�responding�with�aggressive�behavior�themselves.�

Road�accidents�Statistics�(India)*

ª In�India,�1,20,000�people�die�and�12,70,000�sustain�serious�injuries�every�year�in�Road�Traffic�Accidents.�

ª Every�six�minutes�there�is�one�death�due�to�road�accident;�it�may�rise�to�one�death�in�every�three�minutes�

by�2020.�

ª 1.4� million� Serious� road� accidents/� collisions� occurring� annually� in� India,� hardly� 0.4� million� are�

recorded.(Institute�of�Road�Traffic�Education�2006)

ª In�rural�areas�all� road�accidents�are�not�recorded�and�similarly� late�deaths�after� the�discharge�from�

hospital�also�are�not�recorded.�(Indian�Journal�Of�Neurotrauma�(�IJNI)�2008�vol.5�No.2,pp.63-67.)

ª India�accounts�for�about�10%�of�road�accident�fatalities�worldwide�

ª The�number�of�accidents�for�1000�vehicles�in�India�is�as�high�as�35�while�the�figure�ranges�from�4�to�10�in�

developed�countries.

ª More�people�die�in�road�accidents�in�India�than�anywhere�else�in�the�world�(World�Health�Organization,�

Global�status�report�on�Road�safety2009).

ª In� comparison� to� developed� countries� accidents� in� India� is� 3time� higher.(National� Transportation�

Planning�and�Reasearch�Centre(NTPRC).

Kavach:�The�Magazine�of�Raksha�Shakti�University

ª Although�India�accounts�for�only�1%�of�the�registered�motor�vehicles,�it�accounts�for�nearly�9�%�of�R� T A�

deaths.�

ª 85�%�of�the�victims�of�these�fatalities�are�men�in�the�age�group�20-50�years.

ª *Alarming�Facts�of�Road�Accidents�in�India,�Dr.Rajsekaran.President�Indian�Orthopedic�Association.��

Key�facts�(WHO)

ª About�1.24�million�people�die�each�year�as�a�result�of�road�traffic�crashes.

ª Road�traffic�injuries�are�the�leading�cause�of�death�among�young�people,�aged�15‒29�years.

ª 91%�of� the�world's� fatalities�on� the� roads�occur� in� low-income�and�middle-income�countries,�even�

though�these�countries�have�approximately�half�of�the�world's�vehicles.

ª Half� of� those� dying� on� the� world's� roads� are� “vulnerable� road� users”:� pedestrians,� cyclists� and�

motorcyclists.

ª Without�action,�road�traffic�crashes�are�predicted�to�result�in�the�deaths�of�around�1.9�million�people�

annually�by�2020.

ª Only�28�countries,�representing�416�million�people�(7%�of�the�world's�population),�have�adequate�laws�

that�address�all�five�risk�factors�(speed,�drink-driving,�helmets,�seat-belts�and�child�restraints).

A�Decade�of�Action�for�Road�Safety�(2011‒2020)�was�launched�by�United�Nations�General�Assembly�resolution�

in�May�2011,�in�over�110�countries,�for�improving�the�safety�of�roads�and�vehicles;�changing�the�behaviour�and�

attitude�of�road�users;�and�improving�emergency�services.�

Further,�"Road�Safety�in�10�Countries�(RS10)�Project"�supports�the�governments�of�Brazil,�Cambodia,�China,�

Egypt,�India,�Kenya,�Mexico,�the�Russian�Federation,�Turkey�and�Viet�Nam�by�focusing�on�selected�key�risks�for�

road�traffic�crashes.�World�Health�Organization�(WHO)�works�across�the�spectrum�in�countries,�and�provide�

the�technical�guidance.�

1312

Page 20: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

st21 �century�shouts�that�security� is�the�responsibility�of�all.�Development�of�communication�technology�has�

played�great� role� in� this� century� in�making�people� closer�&� closer� in� all� aspects.�Revolution�of�high� speed�

technology�in�internet�has�opened�many�fields�such�as�On-line�shopping,�E-banking,�E-governance�etc.,�These�E-

applications�have�created�challenges�in�the�identification�of�individual�and�to�authentic�the�access�to�the�system.�

There�are�many�identification�processes�but�biometric�identification�process�is�more�accurate�and�secure.�

Biometric�means�life�measurement�but�the�term�is�usually�associated�with�the�use�of�unique�physiological�

characteristics� identify� an� individual.� The� application�which�most� people� associate�with� biometrics� is�

security.�Knowing�the�person�with�whom�you�are�conversing�is�an�important�part�of�human�interaction�and�

one�expects�computers�of�the�future�to�have�the�same�capabilities.�A�number�of�biometric�traits�have�been�

developed� and� are�used� to� authenticate� the�person's� identity.� The�method�of� identification�based�on�

biometric�characteristics�is�preferred�over�traditional�passwords�and�PIN�based�methods�because�of�the�

person� to�be� identified� is� required� to�be�physically�present�at� the� time-of-identification.� Identification�

based�on�biometric�techniques�prevents�the�need�to�remember�a�password�or�carry�a�token.�A�biometric�

system�is�essentially�a�pattern�recognition�system�which�makes�a�personal�identification�by�determining�

the�authenticity�of�a�specific�physiological�or�behavioral�characteristic�possessed�by�the�user.�Biometric�

technologies�are�thus�defined�as�the�"automated�methods�of�identifying�or�authenticating�the�identity�of�a�

living�person�based�on�a�physiological�or�behavioral�characteristic".�

There� are�many� issues� for� the� discussion� and� consideration� to� implement� accurate� &� secure� biometric�

identification�system.�Selection�of�unique�characteristic�of�living�person�should�be�universal�and�seldom�lost�to�

accident�or�disease,�constant�over�a�long�time,�suitable�for�easy�capturing,�unique�to�the�individual,�acceptable�

to� a� large� percentage� of� the� population,� capable� of� being� reduced� to� size,� impractical� to� manipulate,�

irreproducible�and�perfect�to�maintain�privacy�of�the�person.�Among�the�various�biometric�technologies�being�

considered,� the� attributes� which� satisfy� the� above� requirements� are� fingerprint,� facial� features,� hand�

geometry,�voice,�iris,�retina,�vein�patterns,�palm�print,�DNA,�keystroke�dynamics,�ear�shape,�odor�etc.

A�biometric�system�can�be�classified�into�two�modules:�(i)�Database�Preparation�Module�and�(ii)�Verification�

Module.�The�Database�Preparation�Module�consists�of�two�sub-modules,�and�they�are�(i)�Enroll�Module�and�

(ii)�Training�Module�while�Verification�module�can�be�divided�into�two�modules�(i)�Matching�Module�and�(ii)�

Biometric�System:�In�Crime�Prevention*Chandresh�D.�Parekh

*Asst.�Professor�(Telecommunication),�Raksha�Shakti�University,�Ahmedabad

Kavach:�The�Magazine�of�Raksha�Shakti�University

Decision�Module.�Biometric�authentication�requires�comparing�a�registered�or�enrolled�biometric�sample�

against�a�newly�captured�biometric�sample,�the�one�captured�during�a�login.�

A�typical�biometric�system�is�comprised�of�five�integrated�components:�A�sensor�is�used�to�collect�the�data�

and� convert� the� information� to� a�digital� format.� Signal� processing� algorithms�perform�quality� control�

activities�and�develop�the�biometric� template.�A�data�storage�component�keeps� information�that�new�

biometric�templates�will�be�compared�to�biometric�template.�A�matching�algorithm�compares�the�new�

biometric�template�to�one�or�more�templates�kept�in�data�storage.�Finally,�a�decision�process�uses�the�result�

from�the�matching�component�to�make�a�system�level�decision.��

Objective� of� this� article� is� to� explore� the� information� about� biometric� system� and�new� application� of�

biometric�system�for�crime�prevention.�It�is�found�that�most�of�the�criminals�related�to�property�offenses�are�

repeated.�To�stop�such�repeated�crimes,�the�movement�of�criminals�to�be�monitored�first�for�further�action.�

Monitoring� of� criminals'� movement� is� important� but� not� feasible� to�move� behind� them� all� the� time.�

Biometric�system�is�used�to�monitor�their�movement�at� the�prominent�places�such�as�Shopping�Malls,�

Jewelers�shops,�Banks,�ATMs�etc.�which�are�normally�hot�spots�for�them�to�do�crimes.�Police�department�

should�create�the�database�of�biometric�samples�of�the�criminals�during�their�custody�and�make�available�to�

the�users�in�a�systematic�way.�There�are�many�security�provisions�have�been�forced�people�to�use�by�the�

government�such�as�CCTV�camera�system,� information�collection�of�servants,� information�collection�of�

renters.�Biometric�system�with�criminal�records�is�required�to�be�used�at�the�hot�spots.�Following�is�the�

pictorial�presentation�of�this�idea.�

This�idea�is�not�something�over�but�I�assure�that�

in�the�future,�no�one�will�need�pockets.�Things�

like�keys�or�cards,�however,�tend�to�get�stolen�

or� lost� and�passwords� are�often� forgotten�or�

disclosed.� Keys,� credit� cards,� checkbooks�will�

be�replaced�by�something�closer�to�the�body.�

When� you� need� to� open� a� door� or� make� a�

purchase,� chances� are� you� will� do� it� with� a�

fingerprint,�a�voice�command,�or�a�computer�

scan�of�your�eyeball.�

1514

Page 21: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

st21 �century�shouts�that�security� is�the�responsibility�of�all.�Development�of�communication�technology�has�

played�great� role� in� this� century� in�making�people� closer�&� closer� in� all� aspects.�Revolution�of�high� speed�

technology�in�internet�has�opened�many�fields�such�as�On-line�shopping,�E-banking,�E-governance�etc.,�These�E-

applications�have�created�challenges�in�the�identification�of�individual�and�to�authentic�the�access�to�the�system.�

There�are�many�identification�processes�but�biometric�identification�process�is�more�accurate�and�secure.�

Biometric�means�life�measurement�but�the�term�is�usually�associated�with�the�use�of�unique�physiological�

characteristics� identify� an� individual.� The� application�which�most� people� associate�with� biometrics� is�

security.�Knowing�the�person�with�whom�you�are�conversing�is�an�important�part�of�human�interaction�and�

one�expects�computers�of�the�future�to�have�the�same�capabilities.�A�number�of�biometric�traits�have�been�

developed� and� are�used� to� authenticate� the�person's� identity.� The�method�of� identification�based�on�

biometric�characteristics�is�preferred�over�traditional�passwords�and�PIN�based�methods�because�of�the�

person� to�be� identified� is� required� to�be�physically�present�at� the� time-of-identification.� Identification�

based�on�biometric�techniques�prevents�the�need�to�remember�a�password�or�carry�a�token.�A�biometric�

system�is�essentially�a�pattern�recognition�system�which�makes�a�personal�identification�by�determining�

the�authenticity�of�a�specific�physiological�or�behavioral�characteristic�possessed�by�the�user.�Biometric�

technologies�are�thus�defined�as�the�"automated�methods�of�identifying�or�authenticating�the�identity�of�a�

living�person�based�on�a�physiological�or�behavioral�characteristic".�

There� are�many� issues� for� the� discussion� and� consideration� to� implement� accurate� &� secure� biometric�

identification�system.�Selection�of�unique�characteristic�of�living�person�should�be�universal�and�seldom�lost�to�

accident�or�disease,�constant�over�a�long�time,�suitable�for�easy�capturing,�unique�to�the�individual,�acceptable�

to� a� large� percentage� of� the� population,� capable� of� being� reduced� to� size,� impractical� to� manipulate,�

irreproducible�and�perfect�to�maintain�privacy�of�the�person.�Among�the�various�biometric�technologies�being�

considered,� the� attributes� which� satisfy� the� above� requirements� are� fingerprint,� facial� features,� hand�

geometry,�voice,�iris,�retina,�vein�patterns,�palm�print,�DNA,�keystroke�dynamics,�ear�shape,�odor�etc.

A�biometric�system�can�be�classified�into�two�modules:�(i)�Database�Preparation�Module�and�(ii)�Verification�

Module.�The�Database�Preparation�Module�consists�of�two�sub-modules,�and�they�are�(i)�Enroll�Module�and�

(ii)�Training�Module�while�Verification�module�can�be�divided�into�two�modules�(i)�Matching�Module�and�(ii)�

Biometric�System:�In�Crime�Prevention*Chandresh�D.�Parekh

*Asst.�Professor�(Telecommunication),�Raksha�Shakti�University,�Ahmedabad

Kavach:�The�Magazine�of�Raksha�Shakti�University

Decision�Module.�Biometric�authentication�requires�comparing�a�registered�or�enrolled�biometric�sample�

against�a�newly�captured�biometric�sample,�the�one�captured�during�a�login.�

A�typical�biometric�system�is�comprised�of�five�integrated�components:�A�sensor�is�used�to�collect�the�data�

and� convert� the� information� to� a�digital� format.� Signal� processing� algorithms�perform�quality� control�

activities�and�develop�the�biometric� template.�A�data�storage�component�keeps� information�that�new�

biometric�templates�will�be�compared�to�biometric�template.�A�matching�algorithm�compares�the�new�

biometric�template�to�one�or�more�templates�kept�in�data�storage.�Finally,�a�decision�process�uses�the�result�

from�the�matching�component�to�make�a�system�level�decision.��

Objective� of� this� article� is� to� explore� the� information� about� biometric� system� and�new� application� of�

biometric�system�for�crime�prevention.�It�is�found�that�most�of�the�criminals�related�to�property�offenses�are�

repeated.�To�stop�such�repeated�crimes,�the�movement�of�criminals�to�be�monitored�first�for�further�action.�

Monitoring� of� criminals'� movement� is� important� but� not� feasible� to�move� behind� them� all� the� time.�

Biometric�system�is�used�to�monitor�their�movement�at� the�prominent�places�such�as�Shopping�Malls,�

Jewelers�shops,�Banks,�ATMs�etc.�which�are�normally�hot�spots�for�them�to�do�crimes.�Police�department�

should�create�the�database�of�biometric�samples�of�the�criminals�during�their�custody�and�make�available�to�

the�users�in�a�systematic�way.�There�are�many�security�provisions�have�been�forced�people�to�use�by�the�

government�such�as�CCTV�camera�system,� information�collection�of�servants,� information�collection�of�

renters.�Biometric�system�with�criminal�records�is�required�to�be�used�at�the�hot�spots.�Following�is�the�

pictorial�presentation�of�this�idea.�

This�idea�is�not�something�over�but�I�assure�that�

in�the�future,�no�one�will�need�pockets.�Things�

like�keys�or�cards,�however,�tend�to�get�stolen�

or� lost� and�passwords� are�often� forgotten�or�

disclosed.� Keys,� credit� cards,� checkbooks�will�

be�replaced�by�something�closer�to�the�body.�

When� you� need� to� open� a� door� or� make� a�

purchase,� chances� are� you� will� do� it� with� a�

fingerprint,�a�voice�command,�or�a�computer�

scan�of�your�eyeball.�

1514

Page 22: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

Post-independence,� India� has� witnessed� many� secessionist� movements� and� has� long� suffered� from�

extremist�attacks.�The�very�notion�of�secessionism�disturbs�the�territorial�integrity�and�unity�of�a�country.�In�

order� to� curb� the� secessionist� activities� of� the�militants,� the� Indian� government� under�Nehru� in� 1958�

implemented�the�Armed�Forces�Special�Powers�Act�(AFSPA)¹�in�1958�in�North�east�area�to�maintain�the�

public�order�in�the�disturbed�area²�where�violence�became�the�way�of�life.�Subsequently,�the�Parliament�

also�enacted�the�Armed�Forces�(Jammu�and�Kashmir)�Special�Powers�Act-1990�for�the�state�of�Jammu�&�

Kashmir,�which�came�into�effect�on�July�05,�1990.�It's�a�bare�law�having�6�sections�only.

Section� 3� that� contemplates� powers� to� declare� areas� to� be� disturbed� areas� cannot� be� construed� as�

conferring�a�power�to�issue�a�declaration�without�any�time�limit.� �There�should�be�periodic�review�of�the�

declaration�before�the�expiry�of�six�months.³�

The� very� nature� and� dimensions� of� violence� that� prevails� during� peak� periods� of� insurgency� and� the�

methods� and� means� required� to� combat� these.� Insurgency� in� its� virulent� form� totally� paralyses� the�

administration�and� results� in� collapse�of� law-and-order�machinery� in� the�affected�areas.But� today�our�

country�is�in�such�a�phase�that�does�not�require�any�special�law�for�the�purpose�of�maintenance�of�public�

order.�General�laws�are�sufficient�enough�to�tackle�the�issue�as�the�provision�available�under�Cr.P.C.�and�

constitution�of�India.�

�It�poses�a�question�whether�as�of�now�problem�still�remains�unchanged�as�it�was�in�sixty�decades.�The�

researcher�laments�that�it's�not�like�that.�The�real�issue�is�not�whether�the�armed�forces�can�be�deployed�

against�civil�disturbances.�The�ordinary�law�too�permits�it,�in�section�130�of�the�Cr.P.C.⁴�The�real�question�is�

under�what�circumstances,�and�with�what�powers.�The�ordinary�law�permits�the�armed�forces�to�be�used�

only�against�an�unlawful�assembly,�which�cannot�otherwise�be�dispersed,�only�in�individual�instances,�and�

normally�at�the�order�of�an�executive�magistrate.�What�is�contemplated�by�AFSPA�is�the�continuous�use�of�

Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil

�¹Indian�defense�review;�Issue:�Net�Edition|�Date�26�Sep�,�2014;�AFSPA�:�A�Delusion�or�Dilemma�By�Anant�Mishra²�Sec-2(b)disturbed�area'�means�an�area�which�is�for�the�time�being�declared�by�notification�under�section�3�to�be�a�disturbed�area.It�is�must�to�mention�section-3�as�“If,�in�relation�to�any�state�or�Union�Territory�to�which�this�act�extends,�the�Governor�of�that�State�or�the�administrator�of�that�Union�Territory�or�the�Central�Government,�in�either�case,�if�of�the�opinion�that�the�whole�or�any�part�of�such�State�of�Union�territory,�as�the�case�may�be,�is�in�such�a�disturbed�or�dangerous�condition�that�the�use�of�armed�forces�in�aid�of�the�civil�power�is�necessary,�the�Governor�of��that�State�or�the�Administrator�of�that�Union�Territory�or�the�Central��Government,�as�the�case�may�be�,�may�by�notification�in�the�Official�Gazette,�declare�the�whole�or�such�part�of�such�State�or�Union�territory�to�be�a�disturbed�area].³Naga�People's�Movement�of�Human�Rights�v.�Union�of�India,�AIR�1998�SC�431.⁴Use�of�armed�forces�to�disperse�assembly.⁵�http://www.combatlaw.org/justice-jeevan-reddy-report-on-afspa-the-evil-is-intact/�accessed�on�24/02/15

Dr.�Anand�Kumar�TripathiAsst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad

Kavach:�The�Magazine�of�Raksha�Shakti�University

the�armed�forces�over�an�area�of�land,�with�the�power�to�open�fire�on�suspicion�on�individuals�and�not�just�

riotous�mobs,�and�under�its�own�authority.⁵

What�procedure�to�be�followed�in�arresting�a�person�under�AFSPA⁶?�The�provision�is�draconian�as�it�does�not�

meet�the�guidelines�laid�down�by�S�C�in�D.�K.�Basu�case.�Time�line�must�be�framed�in�the�existing�provision�

otherwise�there�might�be�every�possibility�of�misuse�of� the�power.�Provision�must�be�similar� to�Cr.P.C.�

Section�57⁷�in�this�regard.

To�a�layman,�AFSPA�indeed�sounds�like�awarding�the�'Right�to�Kill'�to�our�armed�forces.�But�it�is�the�contents�

of�the�act�that�are�flawed�and�misty.

Firstly,�it�makes�no�distinction�between�a�peaceful�gathering�of�five�or�more�people�and�a�berserk�mob.�So,�

even�innocents�‒�who�have�no�role�in�creating�a�situation�that�results�in�that�region�being�called�'disturbed',�

also�come�under�the�purview�of�the�law.

Secondly,�the�law�also�states�that,�“no�prosecution�can�be�initiated�against�an�officer�without�the�previous�

sanction�of�the�Central�government”.�Purportedly,�the�logic�behind�the�inclusion�of�this�section�is,�to�protect�

the�officers�from�frivolous�and�misguided�allegations.�The�government�is�usually�not�very�fluid�in�giving�this�

much-needed�sanction,�in�order�to�express�their�faith�in�the�armed�forces�and�protect�their�interests.

Counter-insurgency�operations�are�a�messy�affair�and�chances�of� the� innocent�coming� in� the�crossfire�

between�the�army�and�insurgents�are�always�high.

Thirdly,�the�decision�of�the�government�to�declare�a�particular�area�'disturbed'�cannot�be�challenged�in�a�

court�of�law.�This�has�been�the�heart�of�the�problem.�As�the�recent�situation�in�Kashmir�seems�to�go�out�of�

hand,�leaders�have�now�suggested�that�the�act�must�be�repealed�from�certain�provinces�‒�citing�the�reason�

that�the�imminent�threat,�due�to�which�AFSPA�was�enforced�in�that�province�in�the�first�place,�has�been�

neutralized�over� the� years.� The� reasoning� seems� rather� specious� ‒� it� is� nothing�more� than� a� tactic� to�

appease�the�population�and�pacify�their�agitated�sentiments.�Antagonists�of�the�Act�ask�if�the�threat�has�

indeed�been�neutralized,�then�why�not�declare�the�region�as�'not�disturbed',�which�will�by�itself�conclude�

the�role�of�the�army?⁸

Reddy�committee�was�constituted�for�overall�evaluation�of�AFSPA.�The�committee�not�only�recommended�

⁶�Any�person�arrested�and�taken�into�custody�under�this�Act�shall�be�made�over�to�the�officer�in�charge�of�the�nearest�police�station�with�the�least�possible�delay,�together�with�a�report�of�the�circumstances�occasioning�the�arrest�⁷Person�arrested�not�to�be�detained�more�than�twenty-�four�hours.�⁸�Ibid�note:1

1716

Page 23: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

Post-independence,� India� has� witnessed� many� secessionist� movements� and� has� long� suffered� from�

extremist�attacks.�The�very�notion�of�secessionism�disturbs�the�territorial�integrity�and�unity�of�a�country.�In�

order� to� curb� the� secessionist� activities� of� the�militants,� the� Indian� government� under�Nehru� in� 1958�

implemented�the�Armed�Forces�Special�Powers�Act�(AFSPA)¹�in�1958�in�North�east�area�to�maintain�the�

public�order�in�the�disturbed�area²�where�violence�became�the�way�of�life.�Subsequently,�the�Parliament�

also�enacted�the�Armed�Forces�(Jammu�and�Kashmir)�Special�Powers�Act-1990�for�the�state�of�Jammu�&�

Kashmir,�which�came�into�effect�on�July�05,�1990.�It's�a�bare�law�having�6�sections�only.

Section� 3� that� contemplates� powers� to� declare� areas� to� be� disturbed� areas� cannot� be� construed� as�

conferring�a�power�to�issue�a�declaration�without�any�time�limit.� �There�should�be�periodic�review�of�the�

declaration�before�the�expiry�of�six�months.³�

The� very� nature� and� dimensions� of� violence� that� prevails� during� peak� periods� of� insurgency� and� the�

methods� and� means� required� to� combat� these.� Insurgency� in� its� virulent� form� totally� paralyses� the�

administration�and� results� in� collapse�of� law-and-order�machinery� in� the�affected�areas.But� today�our�

country�is�in�such�a�phase�that�does�not�require�any�special�law�for�the�purpose�of�maintenance�of�public�

order.�General�laws�are�sufficient�enough�to�tackle�the�issue�as�the�provision�available�under�Cr.P.C.�and�

constitution�of�India.�

�It�poses�a�question�whether�as�of�now�problem�still�remains�unchanged�as�it�was�in�sixty�decades.�The�

researcher�laments�that�it's�not�like�that.�The�real�issue�is�not�whether�the�armed�forces�can�be�deployed�

against�civil�disturbances.�The�ordinary�law�too�permits�it,�in�section�130�of�the�Cr.P.C.⁴�The�real�question�is�

under�what�circumstances,�and�with�what�powers.�The�ordinary�law�permits�the�armed�forces�to�be�used�

only�against�an�unlawful�assembly,�which�cannot�otherwise�be�dispersed,�only�in�individual�instances,�and�

normally�at�the�order�of�an�executive�magistrate.�What�is�contemplated�by�AFSPA�is�the�continuous�use�of�

Armed�Forces�Special�Power�Act(AFSPA):�a�Necessary�evil

�¹Indian�defense�review;�Issue:�Net�Edition|�Date�26�Sep�,�2014;�AFSPA�:�A�Delusion�or�Dilemma�By�Anant�Mishra²�Sec-2(b)disturbed�area'�means�an�area�which�is�for�the�time�being�declared�by�notification�under�section�3�to�be�a�disturbed�area.It�is�must�to�mention�section-3�as�“If,�in�relation�to�any�state�or�Union�Territory�to�which�this�act�extends,�the�Governor�of�that�State�or�the�administrator�of�that�Union�Territory�or�the�Central�Government,�in�either�case,�if�of�the�opinion�that�the�whole�or�any�part�of�such�State�of�Union�territory,�as�the�case�may�be,�is�in�such�a�disturbed�or�dangerous�condition�that�the�use�of�armed�forces�in�aid�of�the�civil�power�is�necessary,�the�Governor�of��that�State�or�the�Administrator�of�that�Union�Territory�or�the�Central��Government,�as�the�case�may�be�,�may�by�notification�in�the�Official�Gazette,�declare�the�whole�or�such�part�of�such�State�or�Union�territory�to�be�a�disturbed�area].³Naga�People's�Movement�of�Human�Rights�v.�Union�of�India,�AIR�1998�SC�431.⁴Use�of�armed�forces�to�disperse�assembly.⁵�http://www.combatlaw.org/justice-jeevan-reddy-report-on-afspa-the-evil-is-intact/�accessed�on�24/02/15

Dr.�Anand�Kumar�TripathiAsst.�Professor�(Law),�Raksha�Shakti�University,�Ahmedabad

Kavach:�The�Magazine�of�Raksha�Shakti�University

the�armed�forces�over�an�area�of�land,�with�the�power�to�open�fire�on�suspicion�on�individuals�and�not�just�

riotous�mobs,�and�under�its�own�authority.⁵

What�procedure�to�be�followed�in�arresting�a�person�under�AFSPA⁶?�The�provision�is�draconian�as�it�does�not�

meet�the�guidelines�laid�down�by�S�C�in�D.�K.�Basu�case.�Time�line�must�be�framed�in�the�existing�provision�

otherwise�there�might�be�every�possibility�of�misuse�of� the�power.�Provision�must�be�similar� to�Cr.P.C.�

Section�57⁷�in�this�regard.

To�a�layman,�AFSPA�indeed�sounds�like�awarding�the�'Right�to�Kill'�to�our�armed�forces.�But�it�is�the�contents�

of�the�act�that�are�flawed�and�misty.

Firstly,�it�makes�no�distinction�between�a�peaceful�gathering�of�five�or�more�people�and�a�berserk�mob.�So,�

even�innocents�‒�who�have�no�role�in�creating�a�situation�that�results�in�that�region�being�called�'disturbed',�

also�come�under�the�purview�of�the�law.

Secondly,�the�law�also�states�that,�“no�prosecution�can�be�initiated�against�an�officer�without�the�previous�

sanction�of�the�Central�government”.�Purportedly,�the�logic�behind�the�inclusion�of�this�section�is,�to�protect�

the�officers�from�frivolous�and�misguided�allegations.�The�government�is�usually�not�very�fluid�in�giving�this�

much-needed�sanction,�in�order�to�express�their�faith�in�the�armed�forces�and�protect�their�interests.

Counter-insurgency�operations�are�a�messy�affair�and�chances�of� the� innocent�coming� in� the�crossfire�

between�the�army�and�insurgents�are�always�high.

Thirdly,�the�decision�of�the�government�to�declare�a�particular�area�'disturbed'�cannot�be�challenged�in�a�

court�of�law.�This�has�been�the�heart�of�the�problem.�As�the�recent�situation�in�Kashmir�seems�to�go�out�of�

hand,�leaders�have�now�suggested�that�the�act�must�be�repealed�from�certain�provinces�‒�citing�the�reason�

that�the�imminent�threat,�due�to�which�AFSPA�was�enforced�in�that�province�in�the�first�place,�has�been�

neutralized�over� the� years.� The� reasoning� seems� rather� specious� ‒� it� is� nothing�more� than� a� tactic� to�

appease�the�population�and�pacify�their�agitated�sentiments.�Antagonists�of�the�Act�ask�if�the�threat�has�

indeed�been�neutralized,�then�why�not�declare�the�region�as�'not�disturbed',�which�will�by�itself�conclude�

the�role�of�the�army?⁸

Reddy�committee�was�constituted�for�overall�evaluation�of�AFSPA.�The�committee�not�only�recommended�

⁶�Any�person�arrested�and�taken�into�custody�under�this�Act�shall�be�made�over�to�the�officer�in�charge�of�the�nearest�police�station�with�the�least�possible�delay,�together�with�a�report�of�the�circumstances�occasioning�the�arrest�⁷Person�arrested�not�to�be�detained�more�than�twenty-�four�hours.�⁸�Ibid�note:1

1716

Page 24: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

AFSPA's�repeal�but�also�proposed�a�legal�mechanism�by�which�the�Army�could�be�used�in�extraordinary�

situations�involving�national�security?�Our�essential�recommendation�was�that�no�one�could�be�above�the�

law;�everyone�must�be�equal�before�and�under�it

Today,�the�situation�has�become�much�more�complex�because�the�window�of�opportunity�provided�by�the�

Reddy�Committee�has�virtually�closed.�Debate�is�still�on�the�relevance�of�AFSPA.�Irom�Sharmila�Chanu,�a�

human�rights�activist,�has�been�on�indefinite�hunger�strike�for�nearly�a�decade�in�Manipur,�demanding�the�

withdrawal�of�the�AFSPA�from�the�state�but�her�voice�is�being�unheard.�She�told�“I�will�continue�my�struggle�

until�the�tough�act�is�repealed.�My�struggle�proves�that�I�am�right,�justice�has�been�upheld�finally.”�She�

further�added,�“I�need�people's�support,”

The�AFSPA,�described�by�critics�as�a� “draconian� law”,�also�allows� the�army�and� the�paramilitary� forces�

operating�in�areas�declared�as�“disturbed”�by�the�home�ministry�to�take�whatever�action�they�deem�fit�

against�terrorists.⁹

In�the�opinion�of�researcher�AFSPA�should�be�repealed�because�prolonged�use�of�the�AFSPA�has�alienated�

the�civil�society.�There�is�no�need�of�separate�law�to�combat�the�raised�issue�under�AFSPA�as�it�provides�

unbridled�power�to�the�Government.�It�is�submitted�that�“all�power�tends�to�corrupt�and�absolute�power�

corrupts�absolutely¹⁰,�the�same�is�with�AFSPA�in�terms�of�providing�unbridled�power�to�the�authorities.�It�is�

shameful� for� all� of� us� as� it� remembers� the� very� draconian� Act� i.e.”Rowlatt� Act”.� This� Act� invested�

Government�with�powers�to�arrest�and�detain�anyone�without�assigning�reason.�All�rights,�enjoyed�so�far�

were�scrapped�and�there�was�“No�Vakil,�No�appeal,�No�dalil”�(No�pleader,�No�argument,�No�appeal).

⁹��http://indiatoday.intoday.in/story/irom-sharmila-rearrested-afspa-imphal-manipur/1/378365.html�accessed�on�25/02/15¹⁰�Lord�Acton,�the�British�historian.

Kavach:�The�Magazine�of�Raksha�Shakti�University

Introduction

In�India,�Electronic�Commerce�(�E-Commerce)�websites�and�shopping�online�are�increasing�day�by�day.� �The�

digits�of�online�shopping�are�breaking�records�since�last�2�years.�Flipkart,�Snapdeal,�Jabong,�Myntra�and�other�

more�than�300+�e-commerce�websites�are�getting�popularity�in�online�shopping�in�India.�In�E-Commerce,�

buying�and�selling�of�products�and�services�between�companies�and�consumers�are�through�electronic�means�

typically� through� Internet,� without� using� paper� documents.� These� exchanges� are� usually� transactions�

between�businesses�and�consumers,�where�consumers�buy�products�and�services�to�pay�by�credit�card�on�a�

secure�website.� These�paperless� E-commerce� transactions� are� divided� into� three� categories:� Business� to�

Business�or�B2B�(Cisco),�Business�to�Consumer�or�B2C�(Amazons)�and�Consumer�to�Consumer�or�C2C�(eBay).�

E-Commerce�can�be�very�beneficial�to�Universities,�Colleges�and�Academic�institutions.� �In�Raksha�Shakti�

University�purchasing�is�demarcated�into�following�sections:�Office�Administration�section,�Store�section�

and�Library�section�and�payment�transactions�are�done�in�Account�department.�Items�like�Transportation�

(Vehicles�namely�Buses,�Cars�and�Bikes),�Office�equipment�(Computer,�printer�and�others)�and�Furniture�

(Tables,�chairs,�cupboards,�Air�conditioners)�are�covered�in�Office�Section.�Store�section�specific�role�is�to�

purchase�day�to�day�utilization�items�like�stationary�items,�notice�boards�etc.�In�library�books�are�purchased�

and�journals�are�subscribed.�Also,�selling�of�old�and�obsolete�items�can�be�done�online.��

All�these�transactions�can�be�carried�out�online�with�cautious�approach�and�also�keeping�in�mind�limitations�

of��E-commerce.�This�is�significant�owing�to�the�fact�that�we�are�living�in�a�virtual�Cyber�-World�of�Computers�

and�Mobiles�that�has�hidden�threats�on�confidentiality,�integrity,�denial�of�service,�authentication,�etc.�This�

article�focuses�on�threats�of�E-commerce�and�suggests�some�salient�points�for�successful�and�smooth�E-

Commerce�process�execution.�The�basic�workflow�of�E-Commerce�is�as�indicated�below:

E-Commerce�Threats�*Dr.�Priyanka�Sharma

*Professor�(IT),�Raksha�Shakti�University,�Ahmedabad

1918

Page 25: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

AFSPA's�repeal�but�also�proposed�a�legal�mechanism�by�which�the�Army�could�be�used�in�extraordinary�

situations�involving�national�security?�Our�essential�recommendation�was�that�no�one�could�be�above�the�

law;�everyone�must�be�equal�before�and�under�it

Today,�the�situation�has�become�much�more�complex�because�the�window�of�opportunity�provided�by�the�

Reddy�Committee�has�virtually�closed.�Debate�is�still�on�the�relevance�of�AFSPA.�Irom�Sharmila�Chanu,�a�

human�rights�activist,�has�been�on�indefinite�hunger�strike�for�nearly�a�decade�in�Manipur,�demanding�the�

withdrawal�of�the�AFSPA�from�the�state�but�her�voice�is�being�unheard.�She�told�“I�will�continue�my�struggle�

until�the�tough�act�is�repealed.�My�struggle�proves�that�I�am�right,�justice�has�been�upheld�finally.”�She�

further�added,�“I�need�people's�support,”

The�AFSPA,�described�by�critics�as�a� “draconian� law”,�also�allows� the�army�and� the�paramilitary� forces�

operating�in�areas�declared�as�“disturbed”�by�the�home�ministry�to�take�whatever�action�they�deem�fit�

against�terrorists.⁹

In�the�opinion�of�researcher�AFSPA�should�be�repealed�because�prolonged�use�of�the�AFSPA�has�alienated�

the�civil�society.�There�is�no�need�of�separate�law�to�combat�the�raised�issue�under�AFSPA�as�it�provides�

unbridled�power�to�the�Government.�It�is�submitted�that�“all�power�tends�to�corrupt�and�absolute�power�

corrupts�absolutely¹⁰,�the�same�is�with�AFSPA�in�terms�of�providing�unbridled�power�to�the�authorities.�It�is�

shameful� for� all� of� us� as� it� remembers� the� very� draconian� Act� i.e.”Rowlatt� Act”.� This� Act� invested�

Government�with�powers�to�arrest�and�detain�anyone�without�assigning�reason.�All�rights,�enjoyed�so�far�

were�scrapped�and�there�was�“No�Vakil,�No�appeal,�No�dalil”�(No�pleader,�No�argument,�No�appeal).

⁹��http://indiatoday.intoday.in/story/irom-sharmila-rearrested-afspa-imphal-manipur/1/378365.html�accessed�on�25/02/15¹⁰�Lord�Acton,�the�British�historian.

Kavach:�The�Magazine�of�Raksha�Shakti�University

Introduction

In�India,�Electronic�Commerce�(�E-Commerce)�websites�and�shopping�online�are�increasing�day�by�day.� �The�

digits�of�online�shopping�are�breaking�records�since�last�2�years.�Flipkart,�Snapdeal,�Jabong,�Myntra�and�other�

more�than�300+�e-commerce�websites�are�getting�popularity�in�online�shopping�in�India.�In�E-Commerce,�

buying�and�selling�of�products�and�services�between�companies�and�consumers�are�through�electronic�means�

typically� through� Internet,� without� using� paper� documents.� These� exchanges� are� usually� transactions�

between�businesses�and�consumers,�where�consumers�buy�products�and�services�to�pay�by�credit�card�on�a�

secure�website.� These�paperless� E-commerce� transactions� are� divided� into� three� categories:� Business� to�

Business�or�B2B�(Cisco),�Business�to�Consumer�or�B2C�(Amazons)�and�Consumer�to�Consumer�or�C2C�(eBay).�

E-Commerce�can�be�very�beneficial�to�Universities,�Colleges�and�Academic�institutions.� �In�Raksha�Shakti�

University�purchasing�is�demarcated�into�following�sections:�Office�Administration�section,�Store�section�

and�Library�section�and�payment�transactions�are�done�in�Account�department.�Items�like�Transportation�

(Vehicles�namely�Buses,�Cars�and�Bikes),�Office�equipment�(Computer,�printer�and�others)�and�Furniture�

(Tables,�chairs,�cupboards,�Air�conditioners)�are�covered�in�Office�Section.�Store�section�specific�role�is�to�

purchase�day�to�day�utilization�items�like�stationary�items,�notice�boards�etc.�In�library�books�are�purchased�

and�journals�are�subscribed.�Also,�selling�of�old�and�obsolete�items�can�be�done�online.��

All�these�transactions�can�be�carried�out�online�with�cautious�approach�and�also�keeping�in�mind�limitations�

of��E-commerce.�This�is�significant�owing�to�the�fact�that�we�are�living�in�a�virtual�Cyber�-World�of�Computers�

and�Mobiles�that�has�hidden�threats�on�confidentiality,�integrity,�denial�of�service,�authentication,�etc.�This�

article�focuses�on�threats�of�E-commerce�and�suggests�some�salient�points�for�successful�and�smooth�E-

Commerce�process�execution.�The�basic�workflow�of�E-Commerce�is�as�indicated�below:

E-Commerce�Threats�*Dr.�Priyanka�Sharma

*Professor�(IT),�Raksha�Shakti�University,�Ahmedabad

1918

Page 26: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

E-Commerce�&�Online�Fraud

The�following�is�the�list�of�common�frauds�that�may�occur�at�the�time�of�online�shopping:

1.��Card�Fraud�

This�is�probably�the�most�common�of�online�scams.�Essentially�a�thief�gets�their�hands�on�someoneʼs�card�

details�and�uses�those�to�pay�for�goods�on�the�Internet.�With�schemes�such�as�3D�Secure�(“Verified�by�Visa”�

or�“MasterCard�SecureCode”)�most�consumers�will�have�set�up�a�special�password�to�protect�themselves�

from�such�occurrences.��If�we�feel�that�the�person�using�a�card�is�potentially�a�thief,�we�can�simply�refuse�to�

authorise�the�purchase.��

2.��The�Man-in-the-Middle�Attack�

This�is�where�a�cyber-criminal�eavesdrops�on�a�session�between�shop�and�the�customer�and�records�the�

Kavach:�The�Magazine�of�Raksha�Shakti�University

cardholder�data�being�exchanged.�The�best�way�to�stop�such�attempts�is�by�using�an�Third�Party�certificate.�

All�payment�service�providers�will�use�such�protection�on�their�payment�gateways�and�we�will�also�need�to�

obtain�one�our�your�website.�This�will�eradicate�most�attacks.

3.��Hacking

This�is�a�very�bad�scenario�where�a�fraudster�gains�access�to�the�control�tools�of�website.�This�gives�them�

unrestricted�access�to�all�of�the�pages,�including�the�payment�page.�We�can�minimise�the�damage�from�such�

an�attack�by�allowing�our�payments�provider�to�host� �payments�page�on�their�server.�From�our�end�we�

should�always�ensure�that�we�use�the�latest�version�of�the�Content�Management�System�(CMS)�on�which�

website�is�built�and�that�whether�hosting�is�secure.�Regularly�changing�passwords�to�website�and�making�

sure�that�any�third�party�software�and�plug-in�which�is�in�use�is�also�secure�and�trustworthy.

4.��Malicious�Code�

There�are�different�types�of�malware�used�by�criminals.�The�most�common�include�key�loggers�or�spyware�

(captures�data�as�the�user�enters�it),�backdoor�(gives�the�hacker�remote�access�to�your�computer),�command�

and�control�(looks�for�and�executes�commands).�The�best�way�to�protect�from�such�attacks�is�to�keep�any�

software�on�computer�up�to�date,�use�an�anti-virus�programme�and�perform�regular�scans�on�our�machine.

5.��Phishing

Phishing�is�usually�attempted�in�the�form�of�an�email�appearing�to�be�from�a�trusted�website.�The�email�

could�appear�to�be�from�bank,�a�popular�internet�site�such�as�Paypal�or�EBay,�or�sometimes�it�could�even�

appear�to�be�from�the�Internal�Revenue�Service.�Phishing�attempt�could�come�masquerading�as�any�of�

trusted�websites.�There�are�a�few�common�traits�throughout�all�email�Phishing�attempts�that�we�should�be�

2120

Page 27: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

E-Commerce�&�Online�Fraud

The�following�is�the�list�of�common�frauds�that�may�occur�at�the�time�of�online�shopping:

1.��Card�Fraud�

This�is�probably�the�most�common�of�online�scams.�Essentially�a�thief�gets�their�hands�on�someoneʼs�card�

details�and�uses�those�to�pay�for�goods�on�the�Internet.�With�schemes�such�as�3D�Secure�(“Verified�by�Visa”�

or�“MasterCard�SecureCode”)�most�consumers�will�have�set�up�a�special�password�to�protect�themselves�

from�such�occurrences.��If�we�feel�that�the�person�using�a�card�is�potentially�a�thief,�we�can�simply�refuse�to�

authorise�the�purchase.��

2.��The�Man-in-the-Middle�Attack�

This�is�where�a�cyber-criminal�eavesdrops�on�a�session�between�shop�and�the�customer�and�records�the�

Kavach:�The�Magazine�of�Raksha�Shakti�University

cardholder�data�being�exchanged.�The�best�way�to�stop�such�attempts�is�by�using�an�Third�Party�certificate.�

All�payment�service�providers�will�use�such�protection�on�their�payment�gateways�and�we�will�also�need�to�

obtain�one�our�your�website.�This�will�eradicate�most�attacks.

3.��Hacking

This�is�a�very�bad�scenario�where�a�fraudster�gains�access�to�the�control�tools�of�website.�This�gives�them�

unrestricted�access�to�all�of�the�pages,�including�the�payment�page.�We�can�minimise�the�damage�from�such�

an�attack�by�allowing�our�payments�provider�to�host� �payments�page�on�their�server.�From�our�end�we�

should�always�ensure�that�we�use�the�latest�version�of�the�Content�Management�System�(CMS)�on�which�

website�is�built�and�that�whether�hosting�is�secure.�Regularly�changing�passwords�to�website�and�making�

sure�that�any�third�party�software�and�plug-in�which�is�in�use�is�also�secure�and�trustworthy.

4.��Malicious�Code�

There�are�different�types�of�malware�used�by�criminals.�The�most�common�include�key�loggers�or�spyware�

(captures�data�as�the�user�enters�it),�backdoor�(gives�the�hacker�remote�access�to�your�computer),�command�

and�control�(looks�for�and�executes�commands).�The�best�way�to�protect�from�such�attacks�is�to�keep�any�

software�on�computer�up�to�date,�use�an�anti-virus�programme�and�perform�regular�scans�on�our�machine.

5.��Phishing

Phishing�is�usually�attempted�in�the�form�of�an�email�appearing�to�be�from�a�trusted�website.�The�email�

could�appear�to�be�from�bank,�a�popular�internet�site�such�as�Paypal�or�EBay,�or�sometimes�it�could�even�

appear�to�be�from�the�Internal�Revenue�Service.�Phishing�attempt�could�come�masquerading�as�any�of�

trusted�websites.�There�are�a�few�common�traits�throughout�all�email�Phishing�attempts�that�we�should�be�

2120

Page 28: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

especially�aware�of,�the�first�being�they�will�always�ask�for�personal�information.�Legitimate�companies�will�

never�ask�for� �confidential�information�via�email.�Phishing�scams�are�also�likely�to�play�on�emotions.�They�

might�express�a�sense�of�urgency.�"You�have�48�hours�to�reply�or�your�account�will�be�closed!"�They�might�

perhaps� offer� you� something� at� an� extremely� reduced� rate� if� you� "update� your� personal� information�

immediately!"�Or�my�personal�favourite,�they�tell�that�a�person�have�been�targeted�by�a�scam�and�need�to�

update�our�personal�information�to�keep�safe.�

The�best�way�to�prevent�Phishing�is�to�simply�ignore�any�email�asking�for�personal�information.�Instead,�pick�

up�the�phone�and�contact�bank�or�the�company�involved�to�talk�to�an�employee.�Log�into�the�site�directly�

from�bookmark�is�instead�of�through�the�emails�link,�and�check�to�see�if�there�really�is�an�issue�that�needs�our�

attention.�Common�sense�wins�every�time.�Having�some�form�of�online�protection�would�be�to�advantage,�

even�the�most�internet�savvy�user�can�get�fooled�by�these�ever�increasingly�sophisticated�attempts�to�steal�

our�personal�information.

Anti�Phishing�software�as�part�of�your�anti�virus�software�package�is�a�good�form�of�protection;�they�will�check�

emails�for�possible�attacks�and�call�attention�towards�any�suspicious�sites.�Norton,�AVG�and�MacAfee�anti�virus�

software�offer�good�Phishing�protection�along�with�some�of�the�best�anti�virus�capabilities�that�exist.

E-COMMERCE�SECURITY�TOOLS�•�Firewalls�‒�Software�and�Hardware�•�Public�Key�infrastructure�•�Encryption�

software� •� Digital� certificates� •� Digital� Signatures� •� Biometrics� ‒� retinal� scan,� fingerprints,� voice� etc� •�

Passwords�•�Locks�and�bars�‒�network�operations�centers

Kavach:�The�Magazine�of�Raksha�Shakti�University

Preventing�of��E-commerce�threats

ª Use�only�Familiar�Websites�instead�of�accessing�unknown�webs.

ª Never�use�website�which�is�not�having�SSL�(Secure�Socket�Layer)�encryption.

ª Don't�give�your�social�security�number�and�your�birth�date�as�it�is�not�required�for�online�shopping.

ª Check�Statements�and�don't�wait�for�bill�to�come�at�the�end�of�statement.

ª Inoculate�PC�by�regular�updating�your�antivirus.

ª Usage�of�Strong�Passwords�which�is�difficult�for�other�to�crack.

ª While�online�shopping�through�mobile,�not�to��use�anything�apart�form�application�provided�directly�by�

retailer.

ª Never�use�public�terminal�while�online�shopping.

ª Privatization�of�Wi-Fi�instead�of�make�it�accessible�publicly.

ª Count�the�Cards�of�gifts�and�our�applicability.�It�is�not�possible�that�we�are�getting�extra�gifts�by�this�year�

specially.�

ª Know�What's�Too�Good�to�Be�True�while�getting�from�social�media�or�directly�from�your�friend�overseas.

Conclusion

The� E-commerce� industry� is� slowly� addressing� security� issues�on� their� internal� networks�by�providing�

guidelines�for�securing�systems�and�networks.�Educating�the�consumer�on�security� issues� is�still� in�the�

infancy�stage�but�will�prove�to�be�the�most�critical�element�of�the�e-commerce�security�architecture.�

References

1.� �Greg�Megaw�&�Stephen�V.�Flowerday� (2010)� 'Phishing�within�E-Commerce:�A�Trust�and�Confidence�

Game',�IEEE�Journal�of�Computer�science.�

2.� �Nina�Godbole,�Sunit�Belapur,�“Cyber�Security�Understanding�Cyber�Crimes,�Computer�Forensics�and�

Legal�Perspectives”,�Wiley�India�Publications,�April�2011

3.� �Randy�C.�Marchany�&�Joseph�G.�Tront�(2002)� 'E-Commerce�Security� Issues� ',Proceedings�of�the�35th�

Hawaii�International�Conference�on�System�Sciences

4.���www.ecommerce-web-hosting-guide.com

5.���www.techcricklets.com

2322

Page 29: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

especially�aware�of,�the�first�being�they�will�always�ask�for�personal�information.�Legitimate�companies�will�

never�ask�for� �confidential�information�via�email.�Phishing�scams�are�also�likely�to�play�on�emotions.�They�

might�express�a�sense�of�urgency.�"You�have�48�hours�to�reply�or�your�account�will�be�closed!"�They�might�

perhaps� offer� you� something� at� an� extremely� reduced� rate� if� you� "update� your� personal� information�

immediately!"�Or�my�personal�favourite,�they�tell�that�a�person�have�been�targeted�by�a�scam�and�need�to�

update�our�personal�information�to�keep�safe.�

The�best�way�to�prevent�Phishing�is�to�simply�ignore�any�email�asking�for�personal�information.�Instead,�pick�

up�the�phone�and�contact�bank�or�the�company�involved�to�talk�to�an�employee.�Log�into�the�site�directly�

from�bookmark�is�instead�of�through�the�emails�link,�and�check�to�see�if�there�really�is�an�issue�that�needs�our�

attention.�Common�sense�wins�every�time.�Having�some�form�of�online�protection�would�be�to�advantage,�

even�the�most�internet�savvy�user�can�get�fooled�by�these�ever�increasingly�sophisticated�attempts�to�steal�

our�personal�information.

Anti�Phishing�software�as�part�of�your�anti�virus�software�package�is�a�good�form�of�protection;�they�will�check�

emails�for�possible�attacks�and�call�attention�towards�any�suspicious�sites.�Norton,�AVG�and�MacAfee�anti�virus�

software�offer�good�Phishing�protection�along�with�some�of�the�best�anti�virus�capabilities�that�exist.

E-COMMERCE�SECURITY�TOOLS�•�Firewalls�‒�Software�and�Hardware�•�Public�Key�infrastructure�•�Encryption�

software� •� Digital� certificates� •� Digital� Signatures� •� Biometrics� ‒� retinal� scan,� fingerprints,� voice� etc� •�

Passwords�•�Locks�and�bars�‒�network�operations�centers

Kavach:�The�Magazine�of�Raksha�Shakti�University

Preventing�of��E-commerce�threats

ª Use�only�Familiar�Websites�instead�of�accessing�unknown�webs.

ª Never�use�website�which�is�not�having�SSL�(Secure�Socket�Layer)�encryption.

ª Don't�give�your�social�security�number�and�your�birth�date�as�it�is�not�required�for�online�shopping.

ª Check�Statements�and�don't�wait�for�bill�to�come�at�the�end�of�statement.

ª Inoculate�PC�by�regular�updating�your�antivirus.

ª Usage�of�Strong�Passwords�which�is�difficult�for�other�to�crack.

ª While�online�shopping�through�mobile,�not�to��use�anything�apart�form�application�provided�directly�by�

retailer.

ª Never�use�public�terminal�while�online�shopping.

ª Privatization�of�Wi-Fi�instead�of�make�it�accessible�publicly.

ª Count�the�Cards�of�gifts�and�our�applicability.�It�is�not�possible�that�we�are�getting�extra�gifts�by�this�year�

specially.�

ª Know�What's�Too�Good�to�Be�True�while�getting�from�social�media�or�directly�from�your�friend�overseas.

Conclusion

The� E-commerce� industry� is� slowly� addressing� security� issues�on� their� internal� networks�by�providing�

guidelines�for�securing�systems�and�networks.�Educating�the�consumer�on�security� issues� is�still� in�the�

infancy�stage�but�will�prove�to�be�the�most�critical�element�of�the�e-commerce�security�architecture.�

References

1.� �Greg�Megaw�&�Stephen�V.�Flowerday� (2010)� 'Phishing�within�E-Commerce:�A�Trust�and�Confidence�

Game',�IEEE�Journal�of�Computer�science.�

2.� �Nina�Godbole,�Sunit�Belapur,�“Cyber�Security�Understanding�Cyber�Crimes,�Computer�Forensics�and�

Legal�Perspectives”,�Wiley�India�Publications,�April�2011

3.� �Randy�C.�Marchany�&�Joseph�G.�Tront�(2002)� 'E-Commerce�Security� Issues� ',Proceedings�of�the�35th�

Hawaii�International�Conference�on�System�Sciences

4.���www.ecommerce-web-hosting-guide.com

5.���www.techcricklets.com

2322

Page 30: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University

Credit�Card�that�may�be�used�repeatedly�to�borrow�money�or�buy�products�and�services�on�credit�that�

allows�its�user�to�borrow�pre-approved�funds�at�the�point�of�sale�in�order�to�complete�a�purchase.�It�is�Issue�

by�banks,� savings�and� loans,� retail� stores,� and�other�businesses.� It� is� commonly�being�used� for�online�

booking� of� airlines� and� railway� tickets� and� for� other� ecommerce� transactions.� Although� most� of� e-

commerce�websites�have�implemented�strong�security�measures�(such�as�SSL,�secure�web�servers�etc...),�

instance�of�credit�card�frauds�are�increasing.

When�you�have�been�issued�a�credit�card�you�are�given�a�line�of�credit.�You�can�make�purchases�or�receive�

cash�advances�up�to�that�amount�with�your�card.�When�you�make�a�purchase,�the�merchant�gives�proof�of�

your�purchase�to�the�credit�card�company�and�they�pay�the�merchant�on�your�behalf;�in�effect�granting�you�

a�loan.�The�credit�card�issuer�then�bills�you�for�reimbursement�of�the�purchase�or�cash�advance�amount.�You�

can�either�pay�the�balance�in�full�or�make�payments.�The�issuer�must�send�you�periodic�billing�statements�

giving�you�information�on�your�account�which�includes�the�minimum�payment�due,�date�it�is�due,�and�the�

periodic�interest�rate�on�unpaid�balances.

How�Fraudhappens�through�credit�card?

The�scenario

The�victim's�credit�card�information�is�stolen�and�misused�for�making�online�purchase�(e.g�airline�tickets,�

software,�subscription�to�pornographic�websites�etc).

Credit�Card�Frauds* *Pratap�K�Mishra ,�Jignesh�B.�Joshi

*M.Tech�(Cyber�Security)�Students,�Raksha�Shakti�University,�Ahmedabad

The�law�

Sections�43�and�66�of�Information�Technology�Act�and�section�420�of�Indian�penal�code.

Who�is�liable?

All�persons�who�have�stolen�the�credit�card�information�as�well�as�those�who�have�misused�it.

The�motive

Illegal�financial�gain.

Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�usage�of�another's�credit�card�

information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.�Credit�card�

fraud�schemes�generally�fall�into�one�of�two�categories�of�fraud:�application�fraud�and�account�takeover.

Application�fraud�refers�to�the�unauthorized�opening�of�credit�card�accounts�in�another�person's�name.�

This�may�occur�if�a�perpetrator�can�obtain�enough�personal�information�about�the�victim�to�completely�fill�

out�the�credit�card�application,�or�is�able�to�create�convincing�counterfeit�documents.�Application�fraud�

schemes�are�serious�because�a�victim�may�learn�about�the�fraud�too�late,�if�ever.�

Account�takeovers�typically�involve�the�criminal�hijacking�of�an�existing�credit�card�account,�a�practice�by�

which�a�perpetrator�obtains�enough�personal�information�about�a�victim�to�change�the�account's�billing�

address.��The�perpetrator�then�subsequently�reports�the�card�lost�or�stolen�in�order�to�obtain�a�new�card�and�

make�fraudulent�purchases�with�it.

In�Technological�advances�have�also�created�avenues�for�credit�card�fraud.�With�online�purchasing�now�

common,�perpetrators�need�no�physical�card�to�make�an�unauthorized�purchase.�Additionally,�electronic�

databases�containing�credit�card�data�may�be�hacked�or�crash�on�their�own,�releasing�customers'�credit�card�

information,�putting�the�security�of�many�accounts�at�risk�at�once.

1.� According�to�the�United�States�Federal�Trade�Commission,�while�identity�theft�had�been�holding�steady�

for�the�last�few�years,�it�saw�a�35�percent�increase�in�2013.�However,�credit�card�fraud,�that�crime�which�

most�people�associate�with�ID�theft

2.� Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�taking�of�another's�credit�card�

information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.

3.� The�Chip�and�PIN�implementation�was�criticised�as�designed�to�reduce�the�liability�of�banks�in�cases�of�

claimed�card�fraud�by�requiring�the�customer�to�prove�that�they�had�acted�``with�reasonable�care''�to�

protect�their�PIN�and�card,�rather�than�on�the�bank�having�to�prove�that�the�signature�matched.

2524

Page 31: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University

Credit�Card�that�may�be�used�repeatedly�to�borrow�money�or�buy�products�and�services�on�credit�that�

allows�its�user�to�borrow�pre-approved�funds�at�the�point�of�sale�in�order�to�complete�a�purchase.�It�is�Issue�

by�banks,� savings�and� loans,� retail� stores,� and�other�businesses.� It� is� commonly�being�used� for�online�

booking� of� airlines� and� railway� tickets� and� for� other� ecommerce� transactions.� Although� most� of� e-

commerce�websites�have�implemented�strong�security�measures�(such�as�SSL,�secure�web�servers�etc...),�

instance�of�credit�card�frauds�are�increasing.

When�you�have�been�issued�a�credit�card�you�are�given�a�line�of�credit.�You�can�make�purchases�or�receive�

cash�advances�up�to�that�amount�with�your�card.�When�you�make�a�purchase,�the�merchant�gives�proof�of�

your�purchase�to�the�credit�card�company�and�they�pay�the�merchant�on�your�behalf;�in�effect�granting�you�

a�loan.�The�credit�card�issuer�then�bills�you�for�reimbursement�of�the�purchase�or�cash�advance�amount.�You�

can�either�pay�the�balance�in�full�or�make�payments.�The�issuer�must�send�you�periodic�billing�statements�

giving�you�information�on�your�account�which�includes�the�minimum�payment�due,�date�it�is�due,�and�the�

periodic�interest�rate�on�unpaid�balances.

How�Fraudhappens�through�credit�card?

The�scenario

The�victim's�credit�card�information�is�stolen�and�misused�for�making�online�purchase�(e.g�airline�tickets,�

software,�subscription�to�pornographic�websites�etc).

Credit�Card�Frauds* *Pratap�K�Mishra ,�Jignesh�B.�Joshi

*M.Tech�(Cyber�Security)�Students,�Raksha�Shakti�University,�Ahmedabad

The�law�

Sections�43�and�66�of�Information�Technology�Act�and�section�420�of�Indian�penal�code.

Who�is�liable?

All�persons�who�have�stolen�the�credit�card�information�as�well�as�those�who�have�misused�it.

The�motive

Illegal�financial�gain.

Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�usage�of�another's�credit�card�

information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.�Credit�card�

fraud�schemes�generally�fall�into�one�of�two�categories�of�fraud:�application�fraud�and�account�takeover.

Application�fraud�refers�to�the�unauthorized�opening�of�credit�card�accounts�in�another�person's�name.�

This�may�occur�if�a�perpetrator�can�obtain�enough�personal�information�about�the�victim�to�completely�fill�

out�the�credit�card�application,�or�is�able�to�create�convincing�counterfeit�documents.�Application�fraud�

schemes�are�serious�because�a�victim�may�learn�about�the�fraud�too�late,�if�ever.�

Account�takeovers�typically�involve�the�criminal�hijacking�of�an�existing�credit�card�account,�a�practice�by�

which�a�perpetrator�obtains�enough�personal�information�about�a�victim�to�change�the�account's�billing�

address.��The�perpetrator�then�subsequently�reports�the�card�lost�or�stolen�in�order�to�obtain�a�new�card�and�

make�fraudulent�purchases�with�it.

In�Technological�advances�have�also�created�avenues�for�credit�card�fraud.�With�online�purchasing�now�

common,�perpetrators�need�no�physical�card�to�make�an�unauthorized�purchase.�Additionally,�electronic�

databases�containing�credit�card�data�may�be�hacked�or�crash�on�their�own,�releasing�customers'�credit�card�

information,�putting�the�security�of�many�accounts�at�risk�at�once.

1.� According�to�the�United�States�Federal�Trade�Commission,�while�identity�theft�had�been�holding�steady�

for�the�last�few�years,�it�saw�a�35�percent�increase�in�2013.�However,�credit�card�fraud,�that�crime�which�

most�people�associate�with�ID�theft

2.� Credit�card�fraud�is�a�form�of�identity�theft�that�involves�an�unauthorized�taking�of�another's�credit�card�

information�for�the�purpose�of�charging�purchases�to�the�account�or�removing�funds�from�it.

3.� The�Chip�and�PIN�implementation�was�criticised�as�designed�to�reduce�the�liability�of�banks�in�cases�of�

claimed�card�fraud�by�requiring�the�customer�to�prove�that�they�had�acted�``with�reasonable�care''�to�

protect�their�PIN�and�card,�rather�than�on�the�bank�having�to�prove�that�the�signature�matched.

2524

Page 32: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

� Scenario� 1:� The� suspect�would� installkey� loggers� in�public� computers� (such� as� cyber� cafes,� airport�

loungesetc.)�or�the�computers�of�the�victim.�Unsuspecting�victims�would�use�these�infected�computers�

to�make�online�transactions.�The�credit�card�information�of�the�victim�would�be�emailed�to�the�suspect.

� Scenario�2:�Petrol�pump�attendants,�workers�at�retail�outlets,�hotel�waiters�etc�note�down�information�

of�the�credit�cards�used�for�making�payment�at�these�establishments.�This�information�is�sold�to�criminal�

gangs�that�misuse�it�for�online�frauds.

How�to�prevent�credit�card�frauds?

The� importance� of� protecting� your� credit� card� information� is� even� more� essential� now,� with� the�

introduction�of�online�shopping.�As�such,�it's�wise�to�be�proactive�in�preventing�such�thing�from�happening�

to�you.�Furthermore,�the�responsibility�always�lies�with�credit�card�holders�to�safeguard�their�credit�cards.�

Here�is�a�list�of�important�"do's�and�don'ts"�to�safeguard�your�credit�card.

1.���Keep�your�card�number�confidential.

2.���Be�safe�with�your�credit�card�from�online

3.���Sign�up�your�new�cards�as�soon�as�they�arrive�and�cut�up�the�old�cards�when�they�expire.

4.���Sign�your�credit�card�in�permanent�ink�as�soon�as�you�receive�it.

5.���Ensure�that�your�transaction�is�processed�in�your�presence�every�time�you�make�a�purchase

6.� Total� your� charge� slip� before� signing� in,� as� blank� spaces� serve� as� an� invitation� for� unscrupulous�

individuals�to�add�additional�amounts.

7.���Retain�your�receipts�so�that�you�can�check�them�against�your�statement.

8.���Inform�your�card�issuer�immediately�if�unfamiliar�transactions�are�posted�on�your�statement.

9.���Keep�your�statements�in�a�safe�place�-�they�contain�sensitive�information.

10.���Shred�all�statements�before�disposing�of�them,�even�those�for�closed�accounts.

11.���Inform�the�card�issuer�when�you�are�travelling�overseas.

12.���Notify�the�card�issuer�of�any�change�of�address,�so�new�cards/statements�are�not�sent�to�the�old�mailing�

address.

13.���Inform�the�card�issuer�immediately�if�your�card�is�stolen�or�lost.

References

[1]���About�Credit�A�Card�Fraud�(2009).�www.consumer-action.org.Consumer�Action�Publication

[2]���http://en.wikipedia.org/wiki/Credit_card

[3]���http://www.wikihow.com/Prevent-Credit-Card-Fraud

Kavach:�The�Magazine�of�Raksha�Shakti�University

2726

1See�the�work�of�Dr.�Raine�article�on�http://www.wsj.com/articles/SB10001424127887323335404578444682892520530;�Accessed�on�22/03/2015.2See�Williams,�F.�P.,�&�McShane,�M.�D.�(1994).�Criminological�Theory.�Englewood�Cliffs,�NJ:�Prentice�Hall.

While� there� is�a� range�of� issues� that�are�connected�with Internal�Security�but�crime�by� individuals�and�

groups�are�the�most�prominent�among�them�which�needs�to�be�dealt�to�enhance�better�internal�security.�In�

previous�edition�of�Kavach,�we�mentioned�about�our�efforts� to�bring�Neurocriminology� in� India� in� the�

editorial�written�by�Dr.�Vaya.� � In�the�third� issue�of�Kavach,�the�author�has�proposed�priority�shifting� in�

mechanisms�of�law�enforcement�practices�suggesting�that�the�financial�crimes�must�be�dealt�seriously�over�

political�crimes�as�these�crimese�merge�as�a�result�of�bad�governance.�Noticeably,�these�crimes�gradually�

propagate�a�range�of�socio-political�crimes�including�naxalism�and�terrorism.�With�this�note,�this�time�the�

author�introduces�Neuruocriminology�as�a�tool�to�deter�crime�and�criminal�behaviour.�

Neurocriminology�is�a�professional�interventionist�approach�that�has�capacity�to�enhance�better�internal�

security� by� dealing� with� individuals� who� have� criminal� bent� of� mind� such� as� recidivists� or� first� time�

offenders�who�have�exhibited�early�symptoms�of�deviation.�For�many�obvious�reasons,�there�is�an�increase�

in�crime�due�to��socio-economic�factors�or�increase�in�reporting�due�to�increased�awareness�of�law,�increase�

in�trust�in�policeand/orincrease�in�malafide�practices.�Yet,�the�legal�processes�(including�sentencing)�have�

been� not� a� desirable� outcome� to� enhance� better� internal� security� as� there� is� an� absence� of� effective�

treatment� programs� to� change� individuals�who� persue� crime� as� a�way� of� life.� Here,� the� paradigm� of�1Neurocriminology�becomes�significant. �This�article�explores�the�foundational�factors�that�contribute�to�

knowledge�of�Neurocriminology.

When�a�Russian�Physiologist,�Ivan�Pavlov�(1903)�was�conducting�interesting�experiment�on�role�ofsaliva�

and�digestion�in�dogs,�he�did�not�know�that�he�was�actually�contributing�to�the�one�of�the�famous�classical�

learning�theories�for�humans.�His�theory�suggested�that�conditioning�produces�certain�behavior�in�animals�

which�can�also�be�observed�in�humans.�While�he�suggested�that�the�learning�of�all�behaviors�(including�2criminal�behavior �is�associated�with�specific�stimuli,�the�author�suggests�that�all�behaviors�are�a�product�of�

genetic� and� social� environmental� conditioning� which� gives� evidence� of� stimuli� being� present� within�

human�body�or�outside.� �While�behavior�is�learnt�is�also�suggested�by�the�American�Sociologist,�Edwin�

Sutherland�(1940)�through�his�theory�of�differential�association�but�this�knowledge�was�not�sufficient�to�

explain�human�behavior�arising�out�of�interaction�between�their�genes�and�social�environment.�However,��

Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security

Ms.�Surekha�TalariAsst.�Professor�(Criminology),�Raksha�Shakti�University,�Ahmedabad

Page 33: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

� Scenario� 1:� The� suspect�would� installkey� loggers� in�public� computers� (such� as� cyber� cafes,� airport�

loungesetc.)�or�the�computers�of�the�victim.�Unsuspecting�victims�would�use�these�infected�computers�

to�make�online�transactions.�The�credit�card�information�of�the�victim�would�be�emailed�to�the�suspect.

� Scenario�2:�Petrol�pump�attendants,�workers�at�retail�outlets,�hotel�waiters�etc�note�down�information�

of�the�credit�cards�used�for�making�payment�at�these�establishments.�This�information�is�sold�to�criminal�

gangs�that�misuse�it�for�online�frauds.

How�to�prevent�credit�card�frauds?

The� importance� of� protecting� your� credit� card� information� is� even� more� essential� now,� with� the�

introduction�of�online�shopping.�As�such,�it's�wise�to�be�proactive�in�preventing�such�thing�from�happening�

to�you.�Furthermore,�the�responsibility�always�lies�with�credit�card�holders�to�safeguard�their�credit�cards.�

Here�is�a�list�of�important�"do's�and�don'ts"�to�safeguard�your�credit�card.

1.���Keep�your�card�number�confidential.

2.���Be�safe�with�your�credit�card�from�online

3.���Sign�up�your�new�cards�as�soon�as�they�arrive�and�cut�up�the�old�cards�when�they�expire.

4.���Sign�your�credit�card�in�permanent�ink�as�soon�as�you�receive�it.

5.���Ensure�that�your�transaction�is�processed�in�your�presence�every�time�you�make�a�purchase

6.� Total� your� charge� slip� before� signing� in,� as� blank� spaces� serve� as� an� invitation� for� unscrupulous�

individuals�to�add�additional�amounts.

7.���Retain�your�receipts�so�that�you�can�check�them�against�your�statement.

8.���Inform�your�card�issuer�immediately�if�unfamiliar�transactions�are�posted�on�your�statement.

9.���Keep�your�statements�in�a�safe�place�-�they�contain�sensitive�information.

10.���Shred�all�statements�before�disposing�of�them,�even�those�for�closed�accounts.

11.���Inform�the�card�issuer�when�you�are�travelling�overseas.

12.���Notify�the�card�issuer�of�any�change�of�address,�so�new�cards/statements�are�not�sent�to�the�old�mailing�

address.

13.���Inform�the�card�issuer�immediately�if�your�card�is�stolen�or�lost.

References

[1]���About�Credit�A�Card�Fraud�(2009).�www.consumer-action.org.Consumer�Action�Publication

[2]���http://en.wikipedia.org/wiki/Credit_card

[3]���http://www.wikihow.com/Prevent-Credit-Card-Fraud

Kavach:�The�Magazine�of�Raksha�Shakti�University

2726

1See�the�work�of�Dr.�Raine�article�on�http://www.wsj.com/articles/SB10001424127887323335404578444682892520530;�Accessed�on�22/03/2015.2See�Williams,�F.�P.,�&�McShane,�M.�D.�(1994).�Criminological�Theory.�Englewood�Cliffs,�NJ:�Prentice�Hall.

While� there� is�a� range�of� issues� that�are�connected�with Internal�Security�but�crime�by� individuals�and�

groups�are�the�most�prominent�among�them�which�needs�to�be�dealt�to�enhance�better�internal�security.�In�

previous�edition�of�Kavach,�we�mentioned�about�our�efforts� to�bring�Neurocriminology� in� India� in� the�

editorial�written�by�Dr.�Vaya.� � In�the�third� issue�of�Kavach,�the�author�has�proposed�priority�shifting� in�

mechanisms�of�law�enforcement�practices�suggesting�that�the�financial�crimes�must�be�dealt�seriously�over�

political�crimes�as�these�crimese�merge�as�a�result�of�bad�governance.�Noticeably,�these�crimes�gradually�

propagate�a�range�of�socio-political�crimes�including�naxalism�and�terrorism.�With�this�note,�this�time�the�

author�introduces�Neuruocriminology�as�a�tool�to�deter�crime�and�criminal�behaviour.�

Neurocriminology�is�a�professional�interventionist�approach�that�has�capacity�to�enhance�better�internal�

security� by� dealing� with� individuals� who� have� criminal� bent� of� mind� such� as� recidivists� or� first� time�

offenders�who�have�exhibited�early�symptoms�of�deviation.�For�many�obvious�reasons,�there�is�an�increase�

in�crime�due�to��socio-economic�factors�or�increase�in�reporting�due�to�increased�awareness�of�law,�increase�

in�trust�in�policeand/orincrease�in�malafide�practices.�Yet,�the�legal�processes�(including�sentencing)�have�

been� not� a� desirable� outcome� to� enhance� better� internal� security� as� there� is� an� absence� of� effective�

treatment� programs� to� change� individuals�who� persue� crime� as� a�way� of� life.� Here,� the� paradigm� of�1Neurocriminology�becomes�significant. �This�article�explores�the�foundational�factors�that�contribute�to�

knowledge�of�Neurocriminology.

When�a�Russian�Physiologist,�Ivan�Pavlov�(1903)�was�conducting�interesting�experiment�on�role�ofsaliva�

and�digestion�in�dogs,�he�did�not�know�that�he�was�actually�contributing�to�the�one�of�the�famous�classical�

learning�theories�for�humans.�His�theory�suggested�that�conditioning�produces�certain�behavior�in�animals�

which�can�also�be�observed�in�humans.�While�he�suggested�that�the�learning�of�all�behaviors�(including�2criminal�behavior �is�associated�with�specific�stimuli,�the�author�suggests�that�all�behaviors�are�a�product�of�

genetic� and� social� environmental� conditioning� which� gives� evidence� of� stimuli� being� present� within�

human�body�or�outside.� �While�behavior�is�learnt�is�also�suggested�by�the�American�Sociologist,�Edwin�

Sutherland�(1940)�through�his�theory�of�differential�association�but�this�knowledge�was�not�sufficient�to�

explain�human�behavior�arising�out�of�interaction�between�their�genes�and�social�environment.�However,��

Neurocriminology-�A�Crime�Prevention�Approach�for�Better�Internal�Security

Ms.�Surekha�TalariAsst.�Professor�(Criminology),�Raksha�Shakti�University,�Ahmedabad

Page 34: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University

2928

the�Positive�School�of�Criminology�has�been�able�to�identify�that�human�beings�have�intrinsic�and�extrinsic�

factors�that�are�beyond�their�control�which�produces�criminal�behavior.�The�intrinsic�factors�includes�genes�

and�other�biological�factors�related�to�human�body�and�extrinsic�factors�are�related�the�structure�of�the�

society.

Does�Genetics�and�Environment�work�together�to�encourage�Violent�Behavior?

3 4A�further�knowledge�was�added�by�a�new�stream�of�criminologists�like�Adrian�Raine ,�Robert�Ross �and�Jim�5Hilborn �who�proclaimed�that�the�criminal�behavior�arises�out�interaction�of�mind�with�social�environment.�

But�this�interaction�is�prevailing�due�to�one's�own�tendency�of�genes�to�act�in�a�particular�way.�There�is�a�

little� doubt� that�we� carry� physical� features� from�our� ancestors� so� there� is� a� probability� that�we� carry�

behavior�characteristics�also�from�our�ancestors.�The�linage�here�becomes�important�to�understand�all�

behaviours�including�criminal�behaviors�have�origins�in�genes.�However,�the�social�environment�plays�a�

crucial�role�as�Dr.�Ross�and�Dr.�Raine�suggests�the�development�of�our�brains�is�just�not�dependent�only�on�6our�genes�but�also�on�the�environment�in�which�we�function. ��Here,�it�is�not�suggested�that�genetics�make�a�

criminal�man.�What�is�argued�here�is�that�genetics�play�a�significant�role�in�shaping�the�brain�of�a�man.�

However,�social�environment�brings�up�genetic�predisposition�in�a�given�social�situations�which�act�like�

stimuli.�For�example,�decent�people�who�never�offended�are�found�participating�in�stone�pelting�while�

being�in�a�mob.�In�other�words,�the�person�may�exhibit�odd/anti-social�behaviour�while�interacting�with�

social�environment�due�to�his�genetic�predisposition�but�also�because�his/her�social�situation�is�powerful�

enough�to�seek�a�anti-social�response�from�him/her.�Even�though�there�is�a�genetic�predisposition,�social�

environment�plays�a�significant�role�in�shaping�human�genetic�behavior�as�humans�have�capacity�to�modify�

their�responses�to�a�given�stimuli.�Another�sociologist�Robert�Merton�explained�that�criminal�behavior�is�a�

result�of�strain�in�human�relations�and�social�environment.�The�strain�per�say�produces�certain�behavior�but�

I�argue�that�strain�in�social�environment�evoke�genetic�responses�to�cope�with�the�situation�which�acts�like�a�

stimuli.�In�overall,�the�author�argues�that�genetic�predisposition�and�social�environment�together�play�a�

crucial�role�in�understanding�human�behavior�including�criminal�behavior.

“We�are�not�prisoners�of�our�genes.”�(Ross,�2008,�pg.�19)

The�author�proposed�that�criminal�behavior�in�humans�is�a�amalgamated�product�of�genetics�as�well�as�

from�social�environmental�factors.�But�the�genetically�obtained�(conditioned)�behavior�can�be�changed�

through�conscious�mind�training�as�human�mind�is�gifted�with�a�unique�feature�of�rational�and�logical�

thinking.�Though�crime�is�also�described�as�a�outcome�of�rational�thinking�but�Nerurocriminologist�go�

beyond�to�explain�that�the�rational�thinking�can�be�modulated�to�another�level�through�training�of�mind.�

For�example,�if�a�person�has�gentic�predisposition�of��diabetis,�the�repeated�assurance�and�instructions�of�

the�doctor�may�help�him�to��avoid�sugary�things.�Here,�the�gentically�predisposed�behaviour�is�moderated�

by�conscious�mind�training�which�enables�the�person�to�control�his�diabities�by�moderating�his�life�style.�

This� is�the�exact�proposition�of�Neurocriminology�which�argues�human�mind�has�power�to�create�new�

networks�for�new�actions�overcoming�the�genetical�disposition.�That�is�where�Neurocriminology�as�a�body�

of�knowledge�helps�us�to�understand�the�patterns�concerning�our�genes,�the�mind�and�social�environment.�

Neurocriminology� approaches� anti-social� and� criminal� behavior� 'as� a� function� of� interactions� among�

multiple�neurocognitive�and�neurobehavioral�systems�that�are�shaped�by�environmental,�situational�and�7experiential�events'.

8According�to�Ross(2008) ,�the�model�of�neurocriminology�is�based�on�knowledge�of�social�sciences�and�

neuroscience�which�applies�various�cognitive,�emotional�and�behavior�skill�training,�social�role�playing,�

stimulation�training�and�neurobic�brain�exercises�have�capacity�to�develop�neural�activities�in�the�brain�

which�promotes�mind�to�respond�to�social�environment�that�may�produce�crime.�Neurocriminology�as�a�

practice� based� knowledge�which� propagates� that� behavior� which� is� inherited� through� genes� and� its�

interaction�with�social�environment�can�be�changed�by�mind�training�modules.�The�mind�training�is�given�

for�evocating�conscious�responses�to�eradicate�the�malice�behavior�in�all�types�of�social�environment.�In�

nutshell,�for�diverting�and�controlling�criminal�tendencies�among�humans,�Neurocriminology�developed�

programs� such�as�Reasoning�and�Rehabilitation� (R&R)� training�module� can�be�applied� to�harbor� safer�

environment�that�eventually�works�for�better�internal�security.

The�article�is�written�in�the�memory�of�Jim�Hilborn,�a�Canadian�Criminologist�who�was�

among� the� pioneers� in� shaping� the� practicing� knowledge� of�Neurocriminology� in�

correctional� settings.� Raksha� Shakti� University� shall� ever� be� grateful� for� his�

introductory�lecture�as�an�attempt�to�bring�Neurocriminology�in�India�through�RSU.�

He�recently�demised�after�a�prolonged�tenure�in�correctional�services�in�Canada�and�

Estonia.�3See�Raine,�A.�(2013).�The�anatomy�of�violence:�The�biological�roots�of�crime.�Vintage.4See�Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive�Centre��of��Canada.5Hilborn,�J.�(2011).�A�Neurocriminology�Model�of�the�Re-Entry�and�Desistance�Process.Global�Perspectives�on�Re-Entry,�21.6Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive��Centre��of��Canada.

7Ibid,�pg.�18.8Ibid,�pg�11.

Page 35: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University

2928

the�Positive�School�of�Criminology�has�been�able�to�identify�that�human�beings�have�intrinsic�and�extrinsic�

factors�that�are�beyond�their�control�which�produces�criminal�behavior.�The�intrinsic�factors�includes�genes�

and�other�biological�factors�related�to�human�body�and�extrinsic�factors�are�related�the�structure�of�the�

society.

Does�Genetics�and�Environment�work�together�to�encourage�Violent�Behavior?

3 4A�further�knowledge�was�added�by�a�new�stream�of�criminologists�like�Adrian�Raine ,�Robert�Ross �and�Jim�5Hilborn �who�proclaimed�that�the�criminal�behavior�arises�out�interaction�of�mind�with�social�environment.�

But�this�interaction�is�prevailing�due�to�one's�own�tendency�of�genes�to�act�in�a�particular�way.�There�is�a�

little� doubt� that�we� carry� physical� features� from�our� ancestors� so� there� is� a� probability� that�we� carry�

behavior�characteristics�also�from�our�ancestors.�The�linage�here�becomes�important�to�understand�all�

behaviours�including�criminal�behaviors�have�origins�in�genes.�However,�the�social�environment�plays�a�

crucial�role�as�Dr.�Ross�and�Dr.�Raine�suggests�the�development�of�our�brains�is�just�not�dependent�only�on�6our�genes�but�also�on�the�environment�in�which�we�function. ��Here,�it�is�not�suggested�that�genetics�make�a�

criminal�man.�What�is�argued�here�is�that�genetics�play�a�significant�role�in�shaping�the�brain�of�a�man.�

However,�social�environment�brings�up�genetic�predisposition�in�a�given�social�situations�which�act�like�

stimuli.�For�example,�decent�people�who�never�offended�are�found�participating�in�stone�pelting�while�

being�in�a�mob.�In�other�words,�the�person�may�exhibit�odd/anti-social�behaviour�while�interacting�with�

social�environment�due�to�his�genetic�predisposition�but�also�because�his/her�social�situation�is�powerful�

enough�to�seek�a�anti-social�response�from�him/her.�Even�though�there�is�a�genetic�predisposition,�social�

environment�plays�a�significant�role�in�shaping�human�genetic�behavior�as�humans�have�capacity�to�modify�

their�responses�to�a�given�stimuli.�Another�sociologist�Robert�Merton�explained�that�criminal�behavior�is�a�

result�of�strain�in�human�relations�and�social�environment.�The�strain�per�say�produces�certain�behavior�but�

I�argue�that�strain�in�social�environment�evoke�genetic�responses�to�cope�with�the�situation�which�acts�like�a�

stimuli.�In�overall,�the�author�argues�that�genetic�predisposition�and�social�environment�together�play�a�

crucial�role�in�understanding�human�behavior�including�criminal�behavior.

“We�are�not�prisoners�of�our�genes.”�(Ross,�2008,�pg.�19)

The�author�proposed�that�criminal�behavior�in�humans�is�a�amalgamated�product�of�genetics�as�well�as�

from�social�environmental�factors.�But�the�genetically�obtained�(conditioned)�behavior�can�be�changed�

through�conscious�mind�training�as�human�mind�is�gifted�with�a�unique�feature�of�rational�and�logical�

thinking.�Though�crime�is�also�described�as�a�outcome�of�rational�thinking�but�Nerurocriminologist�go�

beyond�to�explain�that�the�rational�thinking�can�be�modulated�to�another�level�through�training�of�mind.�

For�example,�if�a�person�has�gentic�predisposition�of��diabetis,�the�repeated�assurance�and�instructions�of�

the�doctor�may�help�him�to��avoid�sugary�things.�Here,�the�gentically�predisposed�behaviour�is�moderated�

by�conscious�mind�training�which�enables�the�person�to�control�his�diabities�by�moderating�his�life�style.�

This� is�the�exact�proposition�of�Neurocriminology�which�argues�human�mind�has�power�to�create�new�

networks�for�new�actions�overcoming�the�genetical�disposition.�That�is�where�Neurocriminology�as�a�body�

of�knowledge�helps�us�to�understand�the�patterns�concerning�our�genes,�the�mind�and�social�environment.�

Neurocriminology� approaches� anti-social� and� criminal� behavior� 'as� a� function� of� interactions� among�

multiple�neurocognitive�and�neurobehavioral�systems�that�are�shaped�by�environmental,�situational�and�7experiential�events'.

8According�to�Ross(2008) ,�the�model�of�neurocriminology�is�based�on�knowledge�of�social�sciences�and�

neuroscience�which�applies�various�cognitive,�emotional�and�behavior�skill�training,�social�role�playing,�

stimulation�training�and�neurobic�brain�exercises�have�capacity�to�develop�neural�activities�in�the�brain�

which�promotes�mind�to�respond�to�social�environment�that�may�produce�crime.�Neurocriminology�as�a�

practice� based� knowledge�which� propagates� that� behavior� which� is� inherited� through� genes� and� its�

interaction�with�social�environment�can�be�changed�by�mind�training�modules.�The�mind�training�is�given�

for�evocating�conscious�responses�to�eradicate�the�malice�behavior�in�all�types�of�social�environment.�In�

nutshell,�for�diverting�and�controlling�criminal�tendencies�among�humans,�Neurocriminology�developed�

programs� such�as�Reasoning�and�Rehabilitation� (R&R)� training�module� can�be�applied� to�harbor� safer�

environment�that�eventually�works�for�better�internal�security.

The�article�is�written�in�the�memory�of�Jim�Hilborn,�a�Canadian�Criminologist�who�was�

among� the� pioneers� in� shaping� the� practicing� knowledge� of�Neurocriminology� in�

correctional� settings.� Raksha� Shakti� University� shall� ever� be� grateful� for� his�

introductory�lecture�as�an�attempt�to�bring�Neurocriminology�in�India�through�RSU.�

He�recently�demised�after�a�prolonged�tenure�in�correctional�services�in�Canada�and�

Estonia.�3See�Raine,�A.�(2013).�The�anatomy�of�violence:�The�biological�roots�of�crime.�Vintage.4See�Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive�Centre��of��Canada.5Hilborn,�J.�(2011).�A�Neurocriminology�Model�of�the�Re-Entry�and�Desistance�Process.Global�Perspectives�on�Re-Entry,�21.6Ross,�R.�R.�(2008).�Rehabilitating�Rehabilitation:�Neurocriminology�for�Treatment�of�Antisocial�Behaviour.�Cognitive��Centre��of��Canada.

7Ibid,�pg.�18.8Ibid,�pg�11.

Page 36: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

1.� In�the�year�2006,�while�APC�Karsanbhai�was�on�duty�in�the�control�room�at�the�Shahibaug�police�headquarters,�Ahmedabad,�UPC�Manharbhai�came�to�the�control� room�in�drunken�position�and�torn�off�paper�of� the�duty�register.� �Following�the�above�incident�there�was�a�quarrel�between�Karsanbhai�and�Manharbhai.�Karsanbhai�informed�the�control�incharge�Inspector,�and�offence�was�registered�against�Manharbhai.� �Reason�behind�this�incident�was�the�discrimination�in�allotting�duty.�

2.�� In�Amreli� district,� a�male�Police� Sub� Inspector� (PSI)� of� a�police� station�had�a�bad�eye�on� the�Woman�Police�Constable�(WPC)�who�was�working�as�a�Computer�Operator�in�the�year�2007.��The�PSI�always�tried�to�get�her�alone.��Once�he�got�an�opportunity�in�such�a�way�that�he�said�that�he�wanted�to�go�for�a�raid�and�she�should�accompany�him.��When�she�said�that�she�had�to�make�entry�in�Station�Diary�and�wear�uniform,�he�denied�to�both,�and�took�her�immediately�with�him�along�with�other�police�personnel.��After�reaching�the�destined�village,�she�felt�that�there�was�no�need�for�her�to�go�with�them.�So,�she�told�other�police�personnel,�caught�a�bus�and�returned.

Next�day�morning�the�PSI�reached�the�police�station,�went�near�her,�placed�his�hand�on�her�shoulder�and�asked�why�she�came�back�without�informing�him.� �She�opposed�his�touching�and�there�was�a�quarrel�between�them�over�the�issue�of�his�mal-intention�and�harassing�her.�The�PSI�physically�pushed�her�out�of�the�room�in�front�of�other�male�police�personnel.��Cross�police�complaint�was�registered.

Following� the�complaint,� the�WPC�was� transferred� to�a� remote�area�police� station.� �However,� there�was�no�punishment�to�the�PSI.��According�to�her,�she�was�harassed�a�lot�by�the�authorities�and�nobody�helped�her�when�she�was�in�trouble.� �Departmental�Proceeding�was�initiated�against�her,�and�she�was�put�at�the�lowest�scale�of�salary� for�one�year.� �The�case� is�pending� the�court.� �Though�she�had�made�a�written�complaint�against� the�harassment�to�the�CID�Crime,�no�action�was�taken.��

In�the�first�incident,�discrimination�in�duty�distribution�was�found�to�be�the�cause�of�fighting,��whereas��in�the��second��case� �sexual�harassment�at�workplace�was�the�reason�for�fighting.� �It�can�be�believed�that�the�severe�stress�and�its�outburst�have�caused�these�conflicts.��There�are�many-fold�factors�responsible�for�the�stress�and�conflict�in�police.

It�was�found�that�there�were�around�22�incidents�of�fighting/conflicts�in�Gujarat�Police�between�2004�and�2008.� � These�were� the� reported� cases,�whereas� the�unreported� incidents� could�be�more.� �What� these�incidents�indicate?��These�incidents�support�the�hypothesis�that�police�department�is�not�immune�with�the�conflicts/violent� incidents� that�we� see� in� the� society,� and� that� the� agency� responsible� for� controlling�conflicts/violence�in�the�society�is�themselves�entangled�in�this�menace.� �

Intra�Organizational�Conflicts�In�Gujarat�Police*Dr.�Pavithran�Nambiar

*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad

Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University

One�of�the�important�factors�is�that�there�has�been�no�significant�change�in�the�way�of�thinking�of�personnel�after�they�get�enrolled�in�police.��These�people�come�from�different�walks�of�society�and�they�still�carry�the�prejudice,�stigma,�practice,�belief�system,�etc.�they�followed�prior�to�entering�in�police.� �Such�a�situation�many�times�leads�to�non-confirmation�amongst�individuals�that�result�into�conflict.�

What�is�conflict?

Karl�Marx�is�considered�to�be�the�pioneer�of�conflict�theory.�He�holds�that�human�societies�progress�through�class�struggle:�a�conflict�between�an�ownership�class�that�controls�production�and�a�dispossessed�labouring�class�that�provides�the�labour�for�production.�States,�Marx�believed,�were�run�on�behalf�of�the�ruling�class�and�in�their�interest�while�representing�it�as�the�common�interest�of�all;�and�this�produced�internal�tensions�which�would� lead� to� its� self-destruction�and� replacement�by�a�new� system.�Marx� focused�on� the�way�individual� behavior� is� conditioned� by� social� structure.� In� the� context� of� police� organisation,� when�authorities�want�to�show�their�power�or�̒ satisfyʼ�certain�class�through�unfair�means,�it�leads�to�resentment,�frustration�and�stress�among�the�lower�levels�of�the�system.�This�can�result�into�individual�or�inter-rank�conflicts.

Emile�Durkheim�saw�society�as�a�functioning�organism.� �The�chief�form�of�social�conflict�that�Durkheim�addressed�was�crime.� �He�saw�crime�as�"a�factor�in�public�health,�an�integral�part�of�all�healthy�societies."���Crime�thus�plays�a�role�in�the�evolution�of�morality�and�law.

Max�Weber�emphasized�the�importance�of�"social�action,"�i.e.,�the�ability�of�individuals�to�affect�their�social�relationships.

According�to�C.�Wright�Mills,�social�structures�are�created�through�conflict�between�people�with�differing�interests�and�resources.�Individuals�and�resources,�in�turn,�are�influenced�by�these�structures�and�by�the�"unequal�distribution�of�power�and�resources�in�the�society"�(Conflict�Theories).

Many�times�when�conflict�becomes�grave�it�turns�into�violence.

What�is�violence?

According�to�Gupta�(1989),�Violence�includes�actual�use�of�force�or�coercive�methods�in�their�active�or�passive� form� resulting� in� personal� injury,� damage� to� property� or� deprivation� of� chances� of� life� of� an�individual�or�group.��

While� distinguishing� expressive� violence� and� instrumental� violence,� Blumenthal� (1975)�mentions� that�expressive�violence�arises�primarily�on�response�to�feelings�of�hate�or�rage.��Violence�used�to�some�end�is�

If I am not ready to accept my shortcomings, I cannot improve

3130

Page 37: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

1.� In�the�year�2006,�while�APC�Karsanbhai�was�on�duty�in�the�control�room�at�the�Shahibaug�police�headquarters,�Ahmedabad,�UPC�Manharbhai�came�to�the�control� room�in�drunken�position�and�torn�off�paper�of� the�duty�register.� �Following�the�above�incident�there�was�a�quarrel�between�Karsanbhai�and�Manharbhai.�Karsanbhai�informed�the�control�incharge�Inspector,�and�offence�was�registered�against�Manharbhai.� �Reason�behind�this�incident�was�the�discrimination�in�allotting�duty.�

2.�� In�Amreli� district,� a�male�Police� Sub� Inspector� (PSI)� of� a�police� station�had�a�bad�eye�on� the�Woman�Police�Constable�(WPC)�who�was�working�as�a�Computer�Operator�in�the�year�2007.��The�PSI�always�tried�to�get�her�alone.��Once�he�got�an�opportunity�in�such�a�way�that�he�said�that�he�wanted�to�go�for�a�raid�and�she�should�accompany�him.��When�she�said�that�she�had�to�make�entry�in�Station�Diary�and�wear�uniform,�he�denied�to�both,�and�took�her�immediately�with�him�along�with�other�police�personnel.��After�reaching�the�destined�village,�she�felt�that�there�was�no�need�for�her�to�go�with�them.�So,�she�told�other�police�personnel,�caught�a�bus�and�returned.

Next�day�morning�the�PSI�reached�the�police�station,�went�near�her,�placed�his�hand�on�her�shoulder�and�asked�why�she�came�back�without�informing�him.� �She�opposed�his�touching�and�there�was�a�quarrel�between�them�over�the�issue�of�his�mal-intention�and�harassing�her.�The�PSI�physically�pushed�her�out�of�the�room�in�front�of�other�male�police�personnel.��Cross�police�complaint�was�registered.

Following� the�complaint,� the�WPC�was� transferred� to�a� remote�area�police� station.� �However,� there�was�no�punishment�to�the�PSI.��According�to�her,�she�was�harassed�a�lot�by�the�authorities�and�nobody�helped�her�when�she�was�in�trouble.� �Departmental�Proceeding�was�initiated�against�her,�and�she�was�put�at�the�lowest�scale�of�salary� for�one�year.� �The�case� is�pending� the�court.� �Though�she�had�made�a�written�complaint�against� the�harassment�to�the�CID�Crime,�no�action�was�taken.��

In�the�first�incident,�discrimination�in�duty�distribution�was�found�to�be�the�cause�of�fighting,��whereas��in�the��second��case� �sexual�harassment�at�workplace�was�the�reason�for�fighting.� �It�can�be�believed�that�the�severe�stress�and�its�outburst�have�caused�these�conflicts.��There�are�many-fold�factors�responsible�for�the�stress�and�conflict�in�police.

It�was�found�that�there�were�around�22�incidents�of�fighting/conflicts�in�Gujarat�Police�between�2004�and�2008.� � These�were� the� reported� cases,�whereas� the�unreported� incidents� could�be�more.� �What� these�incidents�indicate?��These�incidents�support�the�hypothesis�that�police�department�is�not�immune�with�the�conflicts/violent� incidents� that�we� see� in� the� society,� and� that� the� agency� responsible� for� controlling�conflicts/violence�in�the�society�is�themselves�entangled�in�this�menace.� �

Intra�Organizational�Conflicts�In�Gujarat�Police*Dr.�Pavithran�Nambiar

*Asst.�Professor�(R&D),�Raksha�Shakti�University,�Ahmedabad

Kavach:�The�Magazine�of�Raksha�Shakti�UniversityKavach:�The�Magazine�of�Raksha�Shakti�University

One�of�the�important�factors�is�that�there�has�been�no�significant�change�in�the�way�of�thinking�of�personnel�after�they�get�enrolled�in�police.��These�people�come�from�different�walks�of�society�and�they�still�carry�the�prejudice,�stigma,�practice,�belief�system,�etc.�they�followed�prior�to�entering�in�police.� �Such�a�situation�many�times�leads�to�non-confirmation�amongst�individuals�that�result�into�conflict.�

What�is�conflict?

Karl�Marx�is�considered�to�be�the�pioneer�of�conflict�theory.�He�holds�that�human�societies�progress�through�class�struggle:�a�conflict�between�an�ownership�class�that�controls�production�and�a�dispossessed�labouring�class�that�provides�the�labour�for�production.�States,�Marx�believed,�were�run�on�behalf�of�the�ruling�class�and�in�their�interest�while�representing�it�as�the�common�interest�of�all;�and�this�produced�internal�tensions�which�would� lead� to� its� self-destruction�and� replacement�by�a�new� system.�Marx� focused�on� the�way�individual� behavior� is� conditioned� by� social� structure.� In� the� context� of� police� organisation,� when�authorities�want�to�show�their�power�or�̒ satisfyʼ�certain�class�through�unfair�means,�it�leads�to�resentment,�frustration�and�stress�among�the�lower�levels�of�the�system.�This�can�result�into�individual�or�inter-rank�conflicts.

Emile�Durkheim�saw�society�as�a�functioning�organism.� �The�chief�form�of�social�conflict�that�Durkheim�addressed�was�crime.� �He�saw�crime�as�"a�factor�in�public�health,�an�integral�part�of�all�healthy�societies."���Crime�thus�plays�a�role�in�the�evolution�of�morality�and�law.

Max�Weber�emphasized�the�importance�of�"social�action,"�i.e.,�the�ability�of�individuals�to�affect�their�social�relationships.

According�to�C.�Wright�Mills,�social�structures�are�created�through�conflict�between�people�with�differing�interests�and�resources.�Individuals�and�resources,�in�turn,�are�influenced�by�these�structures�and�by�the�"unequal�distribution�of�power�and�resources�in�the�society"�(Conflict�Theories).

Many�times�when�conflict�becomes�grave�it�turns�into�violence.

What�is�violence?

According�to�Gupta�(1989),�Violence�includes�actual�use�of�force�or�coercive�methods�in�their�active�or�passive� form� resulting� in� personal� injury,� damage� to� property� or� deprivation� of� chances� of� life� of� an�individual�or�group.��

While� distinguishing� expressive� violence� and� instrumental� violence,� Blumenthal� (1975)�mentions� that�expressive�violence�arises�primarily�on�response�to�feelings�of�hate�or�rage.��Violence�used�to�some�end�is�

If I am not ready to accept my shortcomings, I cannot improve

3130

Page 38: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

instrumental�violence.�Element�of�feeling�is�secondary�in�instrumental�violence.��Violence�used�in�terrorism�and�violence�perpetrated�by�state�authorized�agencies�and�institutions�is�political�violence.��Violence�used�by�gang,�anti-social�elements�and�insane�persons�may�be�called�violence�of�deviance.��Violence�perpetrated�on�women,�children,�communal�riots,�organized�attack�on�minority�community,�bride�burning,�rape,�sati,�infanticide,�dowry�death,�etc�are�social�violence.�In�reality,�the�dividing�line�between�them�is�extremely�thin.

With�regard�to�structural�violence,�quoting�Meaton,�Gupta�(1989)�pointed�out�that�when�institutionally�approved�and�available�means�prove�insufficient�or�beyond�approach�to�achieve�desired�goals,�violence�is�likely�to�result�in�human�or�group�behavior.� �Meaton�has�clearly�shown�that�certain�categories�of�persons�may� find� themselves� in� structural� positions� which� effectively� prevent� them� from� utilizing� not� only�legitimate�channels�of�opportunity,�but�criminal�and�illegitimate�as�well.��When�all�such�channels�are�barred�violence�may�offer�alternative�road�to�achievement.

Thus,�it�can�be�seen�that�violence�is�always�negative,�because�it�always�causes�destruction�to�both�sides�in�the� conflict,� it� always� leads� further�and� further�away� from�a�possible�agreement.� This�means�violence�destroys�not�only�the�present,�but�also�the�future.��On�the�other�hand,�the�term�̒ conflictʼ�can�be�understood�in�two�ways�(a)�either�negatively�when�it�is�coupled�with�violence�(armed�conflict),�or�(b)�positively�when�it�enables� the� two� parties� to� express� through� dialogue� their� opposition,� their� disagreement,� without�resorting�to�violence.� �In�this�case,�the�ability�for�each�side�to�express�the�disagreement�will�allow�them�to�understand�the�other's�position,�and�from�there,�to�try�and�transform�their�disagreement�into�an�agreement�(Difference�between�̒ violenceʼ�and�̒ conflictʼ).

What�makes�conflict�in�police�significant?

Police�are�for�the�protection�of�society�from�any�kind�of�conflict�and�violence.��And�to�achieve�this�goal�police�personnel�have�to�jointly�make�concerted�efforts,�which�is�possible�only�if�they�have�faith�and�cooperation�among�themselves.��Such�determined�teamwork�from�all�can�help�to�deter�evils�from�the�society.��Instead,�if�there�is�no�proper�understanding�and�cordial�relationship�among�them,�it�would�lead�to�conflicts.

Grievance�Redressal�System�‒�Provisions�in�Gujarat�Police�Manual

As�per�Gujarat�Police�Manual�(GPM)�the�Range�DIG�of�Police�will�carry�out�inspection�of�districts�in�their�range�once�a�year.�The�inspection�of�a�district�should�cover�that�of�the�Headquarters,�the�town�or�city�police�station.� �During�inspection�he�holds�Orderly�Room�wherein�concerned�personnel�can�present�their�case.��The�SP�should�inspect�offices�of�the�SDPOs�once�in�a�year�and�SP�and�SDPO�will�inspect�police�stations�and�Out-posts�in�their�respective�charges�at�least�once�a�year.��Orderly�Room�should�be�held�at�all�police�stations�

and�Out-posts,�and�all�applications,�reports�and�complaints�dealt�with�on�the�spot�(GPM).

In�addition�to�Orderly�Room,�there�are�systems�of�Durbar�and�Daad�Fariyad�Samiti�wherein�police�personnel�can�present�their�issues�to�the�higher�authorities.

Present�day�situation�

Orderly�Room:��Under�this�system,�anybody�who�has�grievance�can�give�report�to�the�police�authority�and�request�for�an�orderly�room.� �The�authority�gives�a�date�and�time�in�which�he�can�personally�meet�the�authority.��On�that�date�and�time,�the�applicant,�through�orderly�room�facilitator,�meets�the�authority�and�presents�his�case�in�detail.��After�hearing�the�applicant,�the�authority�takes�final�decision.

Generally,�the�authority�does�not�permit�everybody�to�have�orderly�room�because�the�number�of�persons�with�a�variety�of�problems�is�large.� �In�such�a�situation,�if�the�authority�allows�everybody�to�have�orderly�room,�he�will�have�to�hold�orderly�room�every�day,�which�will�hamper�his�other�works.��Another�issue�is�that�even�if�a�large�number�of�personnel�have�grievances,�many�of�them�do�not�come�forward�to�have�an�orderly�room�because�they�fear�that�there�are�possibilities�that�they�will�be�singled�out�and�harassed�in�many�ways�by�the�higher�authorities.��

Durbar:�This�is�a�meeting�of�all�police�personnel�with�the�higher�authority.��Generally,�while�carrying�out�the�inspection�(once�in�an�year),�the�SP�holds�the�durbar�in�which�police�personnel�are�allowed�to�raise�their�problems,�and�the�authority�(SP)�is�supposed�to�suggest�solution�to�it.��Similarly,�DySP�holds�one�durbar�in�a�year,�whereas�PI� is�to�hold�4�durbars�yearly.� �However,�a�general� issue�always�raised�by�the�lower�rank�personnel�is�that�when�anybody�raises�an�issue,�he�will�be�made�silent�with�counter�questions�by�the�SP,�or�that�particular� individual� is�noticed�and�singled�out�by�higher�authorities�and�harassed/intimidated� in�many�ways.

Daad�Fariyad�Samiti�(DFS):�After�the�police-strike�of�1988�in�Gujarat,�DFS�was�established�in�all�districts�and�cities�in�the�state.��This�comprised�representatives�of�all�ranks�as�members.��This�samiti�acted�as�a�platform�for� police� to� present� their� grievances.� � In� the� beginning,� the� samiti�met� regularly� and� discussed� the�problems�of�police.��Over�a�period�of�time�its�function�weakened,�the�representatives�who�were�found�to�be�ʻadamantʼ�on�their�stand�were�intimidated�under�the�pretext�of�discipline,�transferred�to�far�off�places,�etc.��Gradually,�favourites�of�the�higher�authorities�were�̒ selectedʼ�as�members�of�the�samiti,�who�acted�as�their�puppets.� �Slowly�but�surely,�the�samiti�is�seen�to�be�only�on�paper,�and�the�present�situation�is�such�that�majority�of�the�police�personnel�are�unaware�that�such�a�system�exists.

Analysis�of�these�situations�shows�that�there�is�a�feeling�of�fear�among�the�lower�cadre�personnel�towards�

3332

Page 39: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

instrumental�violence.�Element�of�feeling�is�secondary�in�instrumental�violence.��Violence�used�in�terrorism�and�violence�perpetrated�by�state�authorized�agencies�and�institutions�is�political�violence.��Violence�used�by�gang,�anti-social�elements�and�insane�persons�may�be�called�violence�of�deviance.��Violence�perpetrated�on�women,�children,�communal�riots,�organized�attack�on�minority�community,�bride�burning,�rape,�sati,�infanticide,�dowry�death,�etc�are�social�violence.�In�reality,�the�dividing�line�between�them�is�extremely�thin.

With�regard�to�structural�violence,�quoting�Meaton,�Gupta�(1989)�pointed�out�that�when�institutionally�approved�and�available�means�prove�insufficient�or�beyond�approach�to�achieve�desired�goals,�violence�is�likely�to�result�in�human�or�group�behavior.� �Meaton�has�clearly�shown�that�certain�categories�of�persons�may� find� themselves� in� structural� positions� which� effectively� prevent� them� from� utilizing� not� only�legitimate�channels�of�opportunity,�but�criminal�and�illegitimate�as�well.��When�all�such�channels�are�barred�violence�may�offer�alternative�road�to�achievement.

Thus,�it�can�be�seen�that�violence�is�always�negative,�because�it�always�causes�destruction�to�both�sides�in�the� conflict,� it� always� leads� further�and� further�away� from�a�possible�agreement.� This�means�violence�destroys�not�only�the�present,�but�also�the�future.��On�the�other�hand,�the�term�̒ conflictʼ�can�be�understood�in�two�ways�(a)�either�negatively�when�it�is�coupled�with�violence�(armed�conflict),�or�(b)�positively�when�it�enables� the� two� parties� to� express� through� dialogue� their� opposition,� their� disagreement,� without�resorting�to�violence.� �In�this�case,�the�ability�for�each�side�to�express�the�disagreement�will�allow�them�to�understand�the�other's�position,�and�from�there,�to�try�and�transform�their�disagreement�into�an�agreement�(Difference�between�̒ violenceʼ�and�̒ conflictʼ).

What�makes�conflict�in�police�significant?

Police�are�for�the�protection�of�society�from�any�kind�of�conflict�and�violence.��And�to�achieve�this�goal�police�personnel�have�to�jointly�make�concerted�efforts,�which�is�possible�only�if�they�have�faith�and�cooperation�among�themselves.��Such�determined�teamwork�from�all�can�help�to�deter�evils�from�the�society.��Instead,�if�there�is�no�proper�understanding�and�cordial�relationship�among�them,�it�would�lead�to�conflicts.

Grievance�Redressal�System�‒�Provisions�in�Gujarat�Police�Manual

As�per�Gujarat�Police�Manual�(GPM)�the�Range�DIG�of�Police�will�carry�out�inspection�of�districts�in�their�range�once�a�year.�The�inspection�of�a�district�should�cover�that�of�the�Headquarters,�the�town�or�city�police�station.� �During�inspection�he�holds�Orderly�Room�wherein�concerned�personnel�can�present�their�case.��The�SP�should�inspect�offices�of�the�SDPOs�once�in�a�year�and�SP�and�SDPO�will�inspect�police�stations�and�Out-posts�in�their�respective�charges�at�least�once�a�year.��Orderly�Room�should�be�held�at�all�police�stations�

and�Out-posts,�and�all�applications,�reports�and�complaints�dealt�with�on�the�spot�(GPM).

In�addition�to�Orderly�Room,�there�are�systems�of�Durbar�and�Daad�Fariyad�Samiti�wherein�police�personnel�can�present�their�issues�to�the�higher�authorities.

Present�day�situation�

Orderly�Room:��Under�this�system,�anybody�who�has�grievance�can�give�report�to�the�police�authority�and�request�for�an�orderly�room.� �The�authority�gives�a�date�and�time�in�which�he�can�personally�meet�the�authority.��On�that�date�and�time,�the�applicant,�through�orderly�room�facilitator,�meets�the�authority�and�presents�his�case�in�detail.��After�hearing�the�applicant,�the�authority�takes�final�decision.

Generally,�the�authority�does�not�permit�everybody�to�have�orderly�room�because�the�number�of�persons�with�a�variety�of�problems�is�large.� �In�such�a�situation,�if�the�authority�allows�everybody�to�have�orderly�room,�he�will�have�to�hold�orderly�room�every�day,�which�will�hamper�his�other�works.��Another�issue�is�that�even�if�a�large�number�of�personnel�have�grievances,�many�of�them�do�not�come�forward�to�have�an�orderly�room�because�they�fear�that�there�are�possibilities�that�they�will�be�singled�out�and�harassed�in�many�ways�by�the�higher�authorities.��

Durbar:�This�is�a�meeting�of�all�police�personnel�with�the�higher�authority.��Generally,�while�carrying�out�the�inspection�(once�in�an�year),�the�SP�holds�the�durbar�in�which�police�personnel�are�allowed�to�raise�their�problems,�and�the�authority�(SP)�is�supposed�to�suggest�solution�to�it.��Similarly,�DySP�holds�one�durbar�in�a�year,�whereas�PI� is�to�hold�4�durbars�yearly.� �However,�a�general� issue�always�raised�by�the�lower�rank�personnel�is�that�when�anybody�raises�an�issue,�he�will�be�made�silent�with�counter�questions�by�the�SP,�or�that�particular� individual� is�noticed�and�singled�out�by�higher�authorities�and�harassed/intimidated� in�many�ways.

Daad�Fariyad�Samiti�(DFS):�After�the�police-strike�of�1988�in�Gujarat,�DFS�was�established�in�all�districts�and�cities�in�the�state.��This�comprised�representatives�of�all�ranks�as�members.��This�samiti�acted�as�a�platform�for� police� to� present� their� grievances.� � In� the� beginning,� the� samiti�met� regularly� and� discussed� the�problems�of�police.��Over�a�period�of�time�its�function�weakened,�the�representatives�who�were�found�to�be�ʻadamantʼ�on�their�stand�were�intimidated�under�the�pretext�of�discipline,�transferred�to�far�off�places,�etc.��Gradually,�favourites�of�the�higher�authorities�were�̒ selectedʼ�as�members�of�the�samiti,�who�acted�as�their�puppets.� �Slowly�but�surely,�the�samiti�is�seen�to�be�only�on�paper,�and�the�present�situation�is�such�that�majority�of�the�police�personnel�are�unaware�that�such�a�system�exists.

Analysis�of�these�situations�shows�that�there�is�a�feeling�of�fear�among�the�lower�cadre�personnel�towards�

3332

Page 40: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

their�higher�authorities.� �The�reason�‒�the�former�does�not�have�good�relationship�and�faith�on�the�latter.��Again,�the�reason�‒�there�is�absence�of�an�effective�mechanism�that�could�honestly�look�at�the�problems�of�lower�cadre�and�make�sincere�efforts�to�solve�it.��Yet�again,�the�reason�‒�the�authorities�who�are�responsible�to� take�care�of� the�welfare�of� the� lower�cadre�personnel�are� rarely�held�accountable� for� their� lethargy�towards�this�responsibility.

Thus,�it�can�be�observed�that�lot�many�things�depend�on�the�attitude�of�highest�authorities.� �Many�of�the�problems�of�police�personnel�can�be�resolved�and�their�work�efficiency�can�be�enhanced�by�changing�attitude�of�high�level�decision�making�authorities.��Present�researcher�recalls�a�study�conducted�by�him�in�2014,�in�which�majority�of�the�respondents�(police�personnel�across�Gujarat)�opined�that�the�high�level�authorities� find� difficulty� in� giving� proper� attention� to� the� problems/grievances� of� lower� level� police�personnel.��This�is�because�they�are�also�overburdened�with�work.��

Discussion

Police�is�the�principal�agency�engrossed�in�ensuring�internal�security�of�the�nation.��To�fulfill�this�task,�it�is�essential�that�they�are�highly�disciplined�and�coordinated.��Any�kind�of�cleavage�among�them�will�have�its�impact�on� their�work�performance.� �But,� it�has�been�observed� that� there�had�been�many� instances�of�physical�fights/quarrels�in�police�organization,�both�amongst�intra-rank�and�inter-rank�personnel.� �These�incidents�show�that�the�discipline�which�is�a�core�element�of�this�organization�is�rapidly�fading�away.

It�can�be�seen�that�during�recruitment�in�police�there�is�no�system�to�evaluate�the�behavioural�pattern�of�candidates�‒�to�ensure�whether�they�possess�good�moral�character,�dedication,�aptitude�towards�service,�whether�their�minds�would�become�vulnerable�to�crime,�violence�or�unethical�practices�and�so�on.� �In�the�absence�of�such�evaluation/assessing�system,�the�job�seekers�take�up�this�occupation�due�to�its�job�security.��Even�after�entrance,�there� is�no�proper�mechanism�to�measure�their�competency,�dedication�and�their�usefulness�to�the�society.��

Another�issue�is�the�lack�of�sufficient�strength�of�police.� �This�leads�to�overburdening�of�work,�more�than�8�hours�of�duty,�fatigue,�disease,�laxity�towards�work,�inability�to�give�proper�care�to�family,�dissatisfaction,�etc.��

Similar�is�the�ratio�of�ranks.� � Insufficient,�and�in�many�cases,�vacancy�of�ranks�create�the�same�pathetic�situation.

In�many�cases�it�was�found�that�the�higher�ups�do�not�give�proper�attention�to�the�grievances�of�junior�level�police�personnel.� �Thus,�the�latter�finds�no�proper�platform�to�present�their�cases,�which�also�leads�to�the�growth�of�frustration.

Another�important�problem�is�the�juniorsʼ�proximity�to�higher�authorities�and�attempts�to�gratify�them.� �This�enables�the�inefficient�to�enjoy�undue�benefits.� �The�result�‒�indiscipline,�moral�turpitude,�greed,�vices,�stress,�absence� of� genuine� platform� to� redress� grievances,� cracks� in� inter-rank� relationship,� demoralization,� and�ultimately,�inability�to�fulfill�the�expectations�of�the�society.��Thus,�the�chasm�between�police�and�public�enlarges.��

SUGGESTIONS

1.� There�is�need�for�setting�up�a�committee�consisting�of�police�personnel�and�officers�with�the�objective�of�looking�to�the�grievances/complaints�of�police�personnel�of�all�ranks�at�all�district/city�level.� �Persons�with�unquestionable�reputation�from�each�rank�(teeth�to�tail)�should�be�members�of�the�committee.

2.� Such�committee�needs�to�meet�periodically�to�discuss�the�problems�of�police�personnel�and�honest�attempts�should�be�made�to�solve�the�problems.��The�atmosphere�of�the�committee�meeting�has�to�be�conducive�so�that�the�members�could�raise�their�issues�without�any�fear�or�hesitation.

3.� Another�important�aspect�is�the�attitude�of�senior�police�authorities�towards�lower�rank�personnel.��Sympathetic�attitude�on�their�part�can�solve�majority�of�the�problems�of�police�personnel.��

4.� This� process� can� be� further� smoothened� by� the� DG&IGP� of� the� state� by� issuing� directions� to� all�district/city�heads�to�regularly�hold�meetings�to�resolve�issues�of�police�personnel.

5.� Sports,�welfare�programmes,�etc.�do�bring�people�together�and�enhance�their�cooperation.� �Hence,�these� kind� of� programs� need� to� be� organized� wherein� personnel� of� all� ranks� are� encouraged� to�participate,�which�will�help�to�narrow�down�the�barricades�between�ranks,�understand�each�others�problems�and�enhance�inter-rank�communication�and�cooperation.

References1.� Blumenthal�Morris�D,�1975;�Justifying�Violence;�The�University�of��Michigan,�Michigan2.� Conflict�Theories;�����3.� Difference�between�'violence'�and�'conflict';��4.� Gujarat�Police�Manual�Vol.�III,�577�B(v)��5.� Gupta�O.P.,�1989;�Social�Factors�of�Violence,�in�Violence:�Roots�and�Resolutions;�Professors�World�Peace�

Academy-India,�New�Delhi

Kavach:�The�Magazine�of�Raksha�Shakti�University

3534

Page 41: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

their�higher�authorities.� �The�reason�‒�the�former�does�not�have�good�relationship�and�faith�on�the�latter.��Again,�the�reason�‒�there�is�absence�of�an�effective�mechanism�that�could�honestly�look�at�the�problems�of�lower�cadre�and�make�sincere�efforts�to�solve�it.��Yet�again,�the�reason�‒�the�authorities�who�are�responsible�to� take�care�of� the�welfare�of� the� lower�cadre�personnel�are� rarely�held�accountable� for� their� lethargy�towards�this�responsibility.

Thus,�it�can�be�observed�that�lot�many�things�depend�on�the�attitude�of�highest�authorities.� �Many�of�the�problems�of�police�personnel�can�be�resolved�and�their�work�efficiency�can�be�enhanced�by�changing�attitude�of�high�level�decision�making�authorities.��Present�researcher�recalls�a�study�conducted�by�him�in�2014,�in�which�majority�of�the�respondents�(police�personnel�across�Gujarat)�opined�that�the�high�level�authorities� find� difficulty� in� giving� proper� attention� to� the� problems/grievances� of� lower� level� police�personnel.��This�is�because�they�are�also�overburdened�with�work.��

Discussion

Police�is�the�principal�agency�engrossed�in�ensuring�internal�security�of�the�nation.��To�fulfill�this�task,�it�is�essential�that�they�are�highly�disciplined�and�coordinated.��Any�kind�of�cleavage�among�them�will�have�its�impact�on� their�work�performance.� �But,� it�has�been�observed� that� there�had�been�many� instances�of�physical�fights/quarrels�in�police�organization,�both�amongst�intra-rank�and�inter-rank�personnel.� �These�incidents�show�that�the�discipline�which�is�a�core�element�of�this�organization�is�rapidly�fading�away.

It�can�be�seen�that�during�recruitment�in�police�there�is�no�system�to�evaluate�the�behavioural�pattern�of�candidates�‒�to�ensure�whether�they�possess�good�moral�character,�dedication,�aptitude�towards�service,�whether�their�minds�would�become�vulnerable�to�crime,�violence�or�unethical�practices�and�so�on.� �In�the�absence�of�such�evaluation/assessing�system,�the�job�seekers�take�up�this�occupation�due�to�its�job�security.��Even�after�entrance,�there� is�no�proper�mechanism�to�measure�their�competency,�dedication�and�their�usefulness�to�the�society.��

Another�issue�is�the�lack�of�sufficient�strength�of�police.� �This�leads�to�overburdening�of�work,�more�than�8�hours�of�duty,�fatigue,�disease,�laxity�towards�work,�inability�to�give�proper�care�to�family,�dissatisfaction,�etc.��

Similar�is�the�ratio�of�ranks.� � Insufficient,�and�in�many�cases,�vacancy�of�ranks�create�the�same�pathetic�situation.

In�many�cases�it�was�found�that�the�higher�ups�do�not�give�proper�attention�to�the�grievances�of�junior�level�police�personnel.� �Thus,�the�latter�finds�no�proper�platform�to�present�their�cases,�which�also�leads�to�the�growth�of�frustration.

Another�important�problem�is�the�juniorsʼ�proximity�to�higher�authorities�and�attempts�to�gratify�them.� �This�enables�the�inefficient�to�enjoy�undue�benefits.� �The�result�‒�indiscipline,�moral�turpitude,�greed,�vices,�stress,�absence� of� genuine� platform� to� redress� grievances,� cracks� in� inter-rank� relationship,� demoralization,� and�ultimately,�inability�to�fulfill�the�expectations�of�the�society.��Thus,�the�chasm�between�police�and�public�enlarges.��

SUGGESTIONS

1.� There�is�need�for�setting�up�a�committee�consisting�of�police�personnel�and�officers�with�the�objective�of�looking�to�the�grievances/complaints�of�police�personnel�of�all�ranks�at�all�district/city�level.� �Persons�with�unquestionable�reputation�from�each�rank�(teeth�to�tail)�should�be�members�of�the�committee.

2.� Such�committee�needs�to�meet�periodically�to�discuss�the�problems�of�police�personnel�and�honest�attempts�should�be�made�to�solve�the�problems.��The�atmosphere�of�the�committee�meeting�has�to�be�conducive�so�that�the�members�could�raise�their�issues�without�any�fear�or�hesitation.

3.� Another�important�aspect�is�the�attitude�of�senior�police�authorities�towards�lower�rank�personnel.��Sympathetic�attitude�on�their�part�can�solve�majority�of�the�problems�of�police�personnel.��

4.� This� process� can� be� further� smoothened� by� the� DG&IGP� of� the� state� by� issuing� directions� to� all�district/city�heads�to�regularly�hold�meetings�to�resolve�issues�of�police�personnel.

5.� Sports,�welfare�programmes,�etc.�do�bring�people�together�and�enhance�their�cooperation.� �Hence,�these� kind� of� programs� need� to� be� organized� wherein� personnel� of� all� ranks� are� encouraged� to�participate,�which�will�help�to�narrow�down�the�barricades�between�ranks,�understand�each�others�problems�and�enhance�inter-rank�communication�and�cooperation.

References1.� Blumenthal�Morris�D,�1975;�Justifying�Violence;�The�University�of��Michigan,�Michigan2.� Conflict�Theories;�����3.� Difference�between�'violence'�and�'conflict';��4.� Gujarat�Police�Manual�Vol.�III,�577�B(v)��5.� Gupta�O.P.,�1989;�Social�Factors�of�Violence,�in�Violence:�Roots�and�Resolutions;�Professors�World�Peace�

Academy-India,�New�Delhi

Kavach:�The�Magazine�of�Raksha�Shakti�University

3534

Page 42: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

Introduction:

The�dynamics�and�face�of�crime�has�been�changing�at�a�rather�faster�rate�than�most�expected.�Nature�of�crimes�has�changed,�so�have�the�criminals�and�ways�of�crime�commission.�These�changes� in�turn�have�brought�compelling�and�comprehensive�changes�in�the�way�these�crimes�were�investigated�and�also�in�the�technology�involved.�Amongst�all�these�sweeping�changes�taking�place�in�the�crime�and�its�investigation,�the� only� thing� that� has� remained� unchanged� is� the� importance� of� crime� scene.� The� crime� scene� has�traditionally�remained�the�treasure�house�of�most�clue�materials�and�continues�to�be�so.�Nothing�has�been�able�to�compromise�its�enormous�value�in�crime�investigation.

The�pace�of�technological�advancement�and�adoption�has�tremendously�increased.�Most�evidence�analysis�has�come�out�of� laboratory�to�be�performed�at�crime�scene� itself�without�any�concession� in�reliability,�quality�and�integrity�of�the�tests.�The�DNA�tests�are�now�chip-based�while�fingerprint�and�ballistics�data�have�taken�the�shape�of�databases�well�accessible�from�the�crime�scene�for�easy�retrieval�and�identification.�With�an�opportunity�to�leverage�this�rapid�development�&�adoption�of�technology�to�alleviate�the�crime�scene�management�methods,�Teleforensic�technology�was�introduced.�Teleforensic�Technology�(TFT)�has�enormous�potential�to�advance�the�crime�scene�discipline.�

Imagine�a�situation�which�needs�the�expertise�and�advice�of�a�forensic�entomologist�at�a�crime�scene�when�dealing�with�a�decaying�body.�Not�having�an�entomologist�can�be�failing�while�having�an�expert�of�any�other�discipline�may�not�be�very�useful.�One�expert�cannot�possibly�cater�to�all�forensic�disciplines�and�needs�and�thus�the�situation�can�be�handled�better�by�a�specialist.�Here,�locating�an�entomologist�and�getting�him�on�crime�scene�in�person�can�be�costly�&�time-consuming.�Imagine�another�situation,�where�a�forensic�ballistic�expert� is�required�at�multiple�geographically�differentiated�locations�due�to�dispersed�shooting�incidences.�Such�high�pressure�situations�can�be�tricky�as�which�crime�scene�to�attend�and�which�one�to�skip.�Which�crime�scene�to�be�prioritized�and�which�to�be�deferred?��

TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance

* ** *** ****Surbhi�Mathur ,�Sumit�Kumar�Choudhary ,�Parvesh�Sharma ,�Preeti �

*�Assistant�professor�(Jr.),�Inst.�Of�Forensic�Science,�Gujarat�Forensic�Sciences�University**�Assistant�Professor,�Forensic�Science,�Raksha�Shakti�University***�JRF�(Forensic�Science),�Raksha�Shakti�University****�JRF�(Forensic�Science),�Raksha�Shakti�University

Forensic�Science�laboratories�and�their�experts�face�a�constant�challenge�in�balancing�the�needs�of�their�user� agencies� with� efficient� operation.� Their� demands� for� crime� scene� management� &� evidentiary�examinations�have�increased�greatly,�fueled�by�media�&�mass�awareness�about�its�vast�potential�in�solving�crimes.�The�two�situations�discussed�above�presents�one�such�balancing�dilemma.�In�the�first�situation,�we�understand�that�practically,�not�all�experts�can�be�sent�to�scrutinize�each�crime�scene�which�also�carries�the�risk�of�badly�contaminating�the�crime�scene.�The�second�situation�vastly�increases�the�manpower�demand�for�each�specific�discipline,�which�is�again�not�a�practical�solution.�For�a�proper�crime�scene�management,�establishing� the� physical� co-location� of� evidence� and� examiner̶or� rather,� more� than� one� or� two�examiners̶is�often�difficult,�expensive,�and�inefficient.�This�is�where�Teleforensics�can�be�helpful.

Teleforensic�Technology�is�defined�as�the�use�of�technology�to�transmit�crime-scene�images�and�data�in�real�time�to�forensic�personnel�at�a�distant�location.�Tele-forensic�technology�transmits�real�time,�high�quality�images�and�electronically�captured�data�from�a�crime�scene�to�forensic�science�laboratory�for�the�perusal�of�forensic�experts�at�lab�and/or�for�receiving�guidelines�on�processing�the�crime�scene.�This�is�significant�as�Forensic�science�involves�use�of�all�scientific�and�technological�disciplines�for�crime�investigation�to�aid�in�the�justice�delivery�system.�Teleforensics�capability�allows�examiners�to�perform�all�functions�necessary�to�conduct�crime�scene�inspection�&�evidentiary�analysis�saving�manpower,�time�and�money.�Cloud�and�other�communication�technologies�allow�data�from�the�multiple�crime�scene�locations�to�be�shared�with�the�different�experts�or�their�team.�The�experts�could�be�connected�virtually�and�could�almost�immediately�begin�to�help�make�time-sensitive�decisions�about�evidence�collection�and�preservation.�TFT�both�enables�and�can�drive�transformation�by�changing�the�“expertise�paradigm.”�No�longer�does�an�individual�or�crime�scene�team�have�to�be�solely�reliant�on�his�or�their�own�expertise�in�every�situation.�TFT�allows�limiting�the�number�of�personnel�who�must�be�physically�present�at�a�crime�scene�which�in�turn�helps�maintain�the�integrity�of�a�scene�and�reduces�the�risk�of�cross-contamination.�With�teleforensics,�fewer�people�will�be�on�scene,�but�more�people�will�actually�be�looking�at�the�scene�from�a�remote�location,�making�suggestions�about�what�to�collect�for�forensic�examination�and�how�to�collect�it.� In�turn,�evidence�will�be�analyzed�quicker�with�findings�sent�back�to�the�crime�scene.�

The�Technology:

Tele-forensics� is� a� video� conferencing� based� technology.� The� video� conferencing� terminal� should� be�equipped�with�certain�basic�components�like�a�camera�(for�capturing�local�video),�a�video�display�unit�(for�displaying�captured�video�at�a�remote�site),�a�micro�phone�(for�capturing�local�audio),�and�good�quality�speakers�(for�playing�captured�audio).�In�addition�to�this�more�obvious�components,�a�video�conferencing�

3736

Page 43: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

Introduction:

The�dynamics�and�face�of�crime�has�been�changing�at�a�rather�faster�rate�than�most�expected.�Nature�of�crimes�has�changed,�so�have�the�criminals�and�ways�of�crime�commission.�These�changes� in�turn�have�brought�compelling�and�comprehensive�changes�in�the�way�these�crimes�were�investigated�and�also�in�the�technology�involved.�Amongst�all�these�sweeping�changes�taking�place�in�the�crime�and�its�investigation,�the� only� thing� that� has� remained� unchanged� is� the� importance� of� crime� scene.� The� crime� scene� has�traditionally�remained�the�treasure�house�of�most�clue�materials�and�continues�to�be�so.�Nothing�has�been�able�to�compromise�its�enormous�value�in�crime�investigation.

The�pace�of�technological�advancement�and�adoption�has�tremendously�increased.�Most�evidence�analysis�has�come�out�of� laboratory�to�be�performed�at�crime�scene� itself�without�any�concession� in�reliability,�quality�and�integrity�of�the�tests.�The�DNA�tests�are�now�chip-based�while�fingerprint�and�ballistics�data�have�taken�the�shape�of�databases�well�accessible�from�the�crime�scene�for�easy�retrieval�and�identification.�With�an�opportunity�to�leverage�this�rapid�development�&�adoption�of�technology�to�alleviate�the�crime�scene�management�methods,�Teleforensic�technology�was�introduced.�Teleforensic�Technology�(TFT)�has�enormous�potential�to�advance�the�crime�scene�discipline.�

Imagine�a�situation�which�needs�the�expertise�and�advice�of�a�forensic�entomologist�at�a�crime�scene�when�dealing�with�a�decaying�body.�Not�having�an�entomologist�can�be�failing�while�having�an�expert�of�any�other�discipline�may�not�be�very�useful.�One�expert�cannot�possibly�cater�to�all�forensic�disciplines�and�needs�and�thus�the�situation�can�be�handled�better�by�a�specialist.�Here,�locating�an�entomologist�and�getting�him�on�crime�scene�in�person�can�be�costly�&�time-consuming.�Imagine�another�situation,�where�a�forensic�ballistic�expert� is�required�at�multiple�geographically�differentiated�locations�due�to�dispersed�shooting�incidences.�Such�high�pressure�situations�can�be�tricky�as�which�crime�scene�to�attend�and�which�one�to�skip.�Which�crime�scene�to�be�prioritized�and�which�to�be�deferred?��

TELE-FORENSIC�TECHNOLOGY:�Investigating�Crime�Scene�from�a�distance

* ** *** ****Surbhi�Mathur ,�Sumit�Kumar�Choudhary ,�Parvesh�Sharma ,�Preeti �

*�Assistant�professor�(Jr.),�Inst.�Of�Forensic�Science,�Gujarat�Forensic�Sciences�University**�Assistant�Professor,�Forensic�Science,�Raksha�Shakti�University***�JRF�(Forensic�Science),�Raksha�Shakti�University****�JRF�(Forensic�Science),�Raksha�Shakti�University

Forensic�Science�laboratories�and�their�experts�face�a�constant�challenge�in�balancing�the�needs�of�their�user� agencies� with� efficient� operation.� Their� demands� for� crime� scene� management� &� evidentiary�examinations�have�increased�greatly,�fueled�by�media�&�mass�awareness�about�its�vast�potential�in�solving�crimes.�The�two�situations�discussed�above�presents�one�such�balancing�dilemma.�In�the�first�situation,�we�understand�that�practically,�not�all�experts�can�be�sent�to�scrutinize�each�crime�scene�which�also�carries�the�risk�of�badly�contaminating�the�crime�scene.�The�second�situation�vastly�increases�the�manpower�demand�for�each�specific�discipline,�which�is�again�not�a�practical�solution.�For�a�proper�crime�scene�management,�establishing� the� physical� co-location� of� evidence� and� examiner̶or� rather,� more� than� one� or� two�examiners̶is�often�difficult,�expensive,�and�inefficient.�This�is�where�Teleforensics�can�be�helpful.

Teleforensic�Technology�is�defined�as�the�use�of�technology�to�transmit�crime-scene�images�and�data�in�real�time�to�forensic�personnel�at�a�distant�location.�Tele-forensic�technology�transmits�real�time,�high�quality�images�and�electronically�captured�data�from�a�crime�scene�to�forensic�science�laboratory�for�the�perusal�of�forensic�experts�at�lab�and/or�for�receiving�guidelines�on�processing�the�crime�scene.�This�is�significant�as�Forensic�science�involves�use�of�all�scientific�and�technological�disciplines�for�crime�investigation�to�aid�in�the�justice�delivery�system.�Teleforensics�capability�allows�examiners�to�perform�all�functions�necessary�to�conduct�crime�scene�inspection�&�evidentiary�analysis�saving�manpower,�time�and�money.�Cloud�and�other�communication�technologies�allow�data�from�the�multiple�crime�scene�locations�to�be�shared�with�the�different�experts�or�their�team.�The�experts�could�be�connected�virtually�and�could�almost�immediately�begin�to�help�make�time-sensitive�decisions�about�evidence�collection�and�preservation.�TFT�both�enables�and�can�drive�transformation�by�changing�the�“expertise�paradigm.”�No�longer�does�an�individual�or�crime�scene�team�have�to�be�solely�reliant�on�his�or�their�own�expertise�in�every�situation.�TFT�allows�limiting�the�number�of�personnel�who�must�be�physically�present�at�a�crime�scene�which�in�turn�helps�maintain�the�integrity�of�a�scene�and�reduces�the�risk�of�cross-contamination.�With�teleforensics,�fewer�people�will�be�on�scene,�but�more�people�will�actually�be�looking�at�the�scene�from�a�remote�location,�making�suggestions�about�what�to�collect�for�forensic�examination�and�how�to�collect�it.� In�turn,�evidence�will�be�analyzed�quicker�with�findings�sent�back�to�the�crime�scene.�

The�Technology:

Tele-forensics� is� a� video� conferencing� based� technology.� The� video� conferencing� terminal� should� be�equipped�with�certain�basic�components�like�a�camera�(for�capturing�local�video),�a�video�display�unit�(for�displaying�captured�video�at�a�remote�site),�a�micro�phone�(for�capturing�local�audio),�and�good�quality�speakers�(for�playing�captured�audio).�In�addition�to�this�more�obvious�components,�a�video�conferencing�

3736

Page 44: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

terminal�also�includes�a�codec�(compressor�or�/�decompressor),�a�user�interface,�a�computer�system�to�run�on,�and�a�network�connection.�

There�are�various�ways�of�employing�a�Teleforensic�Technology�for�forensic�purposes,�all�of�which�varies�in�terms�of�quality,�security�and�speed�of�transmission�and�cost�involved.�The�various�ways�can�be:

ª A�cell�phone�with�an�in-built�camera�in�it�provides�the�simplest�and�lowest�cost�option�as�a�TFT.�You�collect� the� picture� at� the� crime� scene� send� it� to� FSL� at� any� place� in� the� world� in� little� time.�Understandably,�this�system�might�have�issues�in�terms�of�security�and�fidelity�of�the�image.��

ª Using�a�digital�camera�for�capturing�photographs�or�videos�and�then�storing�it�in�a�laptop.�It�can�be�sent�to�FSL�using�a�wireless�cellular�modem�at�a�reasonable�speed�with�a�fairly�good�connectivity.�This�option�works�well�in�terms�of�image�quality.

ª A�satellite�videophone�system�is�a�step�up�from�the�previous�one�in�terms�of�quality.�The�image�quality�and�data�transmission�speed�are�notch�higher.�Mobility�of�this�system�is�excellent,�as�this�can�be�carried�anywhere�with�the�satellite�antenna�having�view�of�the�sky.�This�system�would�be�relatively�costlier.

ª Another�system�can�be�landline-based�video�conferencing�systems.�This�offers�excellent�image�quality,�superb�image�fidelity�but�fails�in�system�portability.�These�are�either�stationary�systems�or�huge�mobile�systems.�This�is�a�very�costly�option.

ª Beyond�all�these�technologies�is�Space�administration�based�technology�which�is�considered�as�the�future�of�Teleforensic�technology.�

The�Teleforensic�technology�should�be�equipped�with�additional�hardware�and�software�capabilities�when�it�is�expected�to�perform�additional�functions�such�as�evidence�analysis,�interaction�with�technicians,�text�chat,�exchange�files�and�other�information�throughout�a�session.�The�results�of�the�examiner's�work�can�be�saved�for�later�review�along�with�a�log�consisting�of�notes�and�performed�operations.

Merits:

The�Teleforensic�technology�brings�with�it�a�lot�of�positives.�The�forensic�experts�can�remain�stationed�at�Forensic�Science�laboratory�and�interact�with�police�officers�or�crime�scene�managers�from�laboratory�itself.�Issues�at�multiple�crime�scenes�can�be�addressed�simultaneously�without�reaching�to�either�of�the�spots.�Video�recording�of�evidence�processing�such�as�collection,�packaging,�sealing�and�labelling�of�items�can�be�

done�before�forwarding�it�to�the�forensic�science�laboratory.�This�facilitates�tamper-proof�collection�and�preservation�of�the�collected�items.�Such�video-recordings�can�be�used�for�cross�verifying�the�same�item�when�it�would�be�opened�in�the�relevant�unit�of�the�lab�for�further�analysis.�It�would�also�ease�establishing�of�chain�of�custody�dispelling�doubts�regarding�sanctity�&�integrity�of�the�evidence.

One�of�the�biggest�plus�with�TFT�is�that�it�enables�immediate�transferring�of�some�evidences�like�finger�prints�or�cartridge�case/�bullet�marks�to�FSL�for�prompt�database�search�and�rapid�identification.�This�leads�to�quick�finalization�of�certain�cases�thereby�reducing�the�burden�on�the�FSL.�TFT�can�also�help�in�creating�crime�scene�databases�incorporating�variety�of�cases,�important�clue�materials�encountered,�which�can�help�in�enhancing�the�skills�required�to�handle�crime�cases�by�imparting�training�to�the�law�enforcement�personnels.�

Future�Scope�of�the�TFT:

The�Teleforensic�Technology�needs�improvement�in�image�quality,�fidelity,�encryption,�signal�power�and�distance,�among�others.�Data�transmitted�between�the�forensic�expert�and�the�crime�scene�is�sensitive�by�nature.�Therefore,�it�is�crucial�to�ensure�that�the�data�is�protected�and�only�legitimate�recipients�should�receive�the�data.�The�cost�of�using�the�technology�should�also�be�brought�down�to�increase�user�base.�Sharing�and�collaboration�of�data�should�also�be�promoted�among�various�departments.�Future�research�should�focus�on�the�above�cited�areas�to�increase�the�use�of�technology�in�legal�set�up.

References:

[1]�� McGrath,�R.�“The�Pace�of�Technology�Adoption�is�Speeding�Up.”�HBR�Blog�Network.�(November�25,�2013)� Accessed� on� April� 14,� 2014.� Retrieved� from:� http://blogs.hbr.org/2013/11/the-pace-of-technology-adoption-is-speeding-up/

[2]�� Eisold,�K.�“Resistance�to�Change�in�Organizations.”�Psychology�Today�(online).�(May�26,�2010)�Accessed�on� Apri l � 14, � 2014. � Retrieved� from:� http://www.psychologytoday.com/blog/hidden-motives/201005/resistance-change-in-organizations

[3]�� Garrison,�D.�“Teleforensics.”�Evidence�Technology�Magazine.�7(1)�pp.�14-17�(2009).

[4]�� Rebecca�Kanable�“Nothing�to�Sneeze�at�Remote�information�sharing�technologies�promise�to�help�preserve�the�crime�scene�and�speed�up�investigations”

3938

Page 45: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

terminal�also�includes�a�codec�(compressor�or�/�decompressor),�a�user�interface,�a�computer�system�to�run�on,�and�a�network�connection.�

There�are�various�ways�of�employing�a�Teleforensic�Technology�for�forensic�purposes,�all�of�which�varies�in�terms�of�quality,�security�and�speed�of�transmission�and�cost�involved.�The�various�ways�can�be:

ª A�cell�phone�with�an�in-built�camera�in�it�provides�the�simplest�and�lowest�cost�option�as�a�TFT.�You�collect� the� picture� at� the� crime� scene� send� it� to� FSL� at� any� place� in� the� world� in� little� time.�Understandably,�this�system�might�have�issues�in�terms�of�security�and�fidelity�of�the�image.��

ª Using�a�digital�camera�for�capturing�photographs�or�videos�and�then�storing�it�in�a�laptop.�It�can�be�sent�to�FSL�using�a�wireless�cellular�modem�at�a�reasonable�speed�with�a�fairly�good�connectivity.�This�option�works�well�in�terms�of�image�quality.

ª A�satellite�videophone�system�is�a�step�up�from�the�previous�one�in�terms�of�quality.�The�image�quality�and�data�transmission�speed�are�notch�higher.�Mobility�of�this�system�is�excellent,�as�this�can�be�carried�anywhere�with�the�satellite�antenna�having�view�of�the�sky.�This�system�would�be�relatively�costlier.

ª Another�system�can�be�landline-based�video�conferencing�systems.�This�offers�excellent�image�quality,�superb�image�fidelity�but�fails�in�system�portability.�These�are�either�stationary�systems�or�huge�mobile�systems.�This�is�a�very�costly�option.

ª Beyond�all�these�technologies�is�Space�administration�based�technology�which�is�considered�as�the�future�of�Teleforensic�technology.�

The�Teleforensic�technology�should�be�equipped�with�additional�hardware�and�software�capabilities�when�it�is�expected�to�perform�additional�functions�such�as�evidence�analysis,�interaction�with�technicians,�text�chat,�exchange�files�and�other�information�throughout�a�session.�The�results�of�the�examiner's�work�can�be�saved�for�later�review�along�with�a�log�consisting�of�notes�and�performed�operations.

Merits:

The�Teleforensic�technology�brings�with�it�a�lot�of�positives.�The�forensic�experts�can�remain�stationed�at�Forensic�Science�laboratory�and�interact�with�police�officers�or�crime�scene�managers�from�laboratory�itself.�Issues�at�multiple�crime�scenes�can�be�addressed�simultaneously�without�reaching�to�either�of�the�spots.�Video�recording�of�evidence�processing�such�as�collection,�packaging,�sealing�and�labelling�of�items�can�be�

done�before�forwarding�it�to�the�forensic�science�laboratory.�This�facilitates�tamper-proof�collection�and�preservation�of�the�collected�items.�Such�video-recordings�can�be�used�for�cross�verifying�the�same�item�when�it�would�be�opened�in�the�relevant�unit�of�the�lab�for�further�analysis.�It�would�also�ease�establishing�of�chain�of�custody�dispelling�doubts�regarding�sanctity�&�integrity�of�the�evidence.

One�of�the�biggest�plus�with�TFT�is�that�it�enables�immediate�transferring�of�some�evidences�like�finger�prints�or�cartridge�case/�bullet�marks�to�FSL�for�prompt�database�search�and�rapid�identification.�This�leads�to�quick�finalization�of�certain�cases�thereby�reducing�the�burden�on�the�FSL.�TFT�can�also�help�in�creating�crime�scene�databases�incorporating�variety�of�cases,�important�clue�materials�encountered,�which�can�help�in�enhancing�the�skills�required�to�handle�crime�cases�by�imparting�training�to�the�law�enforcement�personnels.�

Future�Scope�of�the�TFT:

The�Teleforensic�Technology�needs�improvement�in�image�quality,�fidelity,�encryption,�signal�power�and�distance,�among�others.�Data�transmitted�between�the�forensic�expert�and�the�crime�scene�is�sensitive�by�nature.�Therefore,�it�is�crucial�to�ensure�that�the�data�is�protected�and�only�legitimate�recipients�should�receive�the�data.�The�cost�of�using�the�technology�should�also�be�brought�down�to�increase�user�base.�Sharing�and�collaboration�of�data�should�also�be�promoted�among�various�departments.�Future�research�should�focus�on�the�above�cited�areas�to�increase�the�use�of�technology�in�legal�set�up.

References:

[1]�� McGrath,�R.�“The�Pace�of�Technology�Adoption�is�Speeding�Up.”�HBR�Blog�Network.�(November�25,�2013)� Accessed� on� April� 14,� 2014.� Retrieved� from:� http://blogs.hbr.org/2013/11/the-pace-of-technology-adoption-is-speeding-up/

[2]�� Eisold,�K.�“Resistance�to�Change�in�Organizations.”�Psychology�Today�(online).�(May�26,�2010)�Accessed�on� Apri l � 14, � 2014. � Retrieved� from:� http://www.psychologytoday.com/blog/hidden-motives/201005/resistance-change-in-organizations

[3]�� Garrison,�D.�“Teleforensics.”�Evidence�Technology�Magazine.�7(1)�pp.�14-17�(2009).

[4]�� Rebecca�Kanable�“Nothing�to�Sneeze�at�Remote�information�sharing�technologies�promise�to�help�preserve�the�crime�scene�and�speed�up�investigations”

3938

Page 46: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

siiflyigiiWii; amiDiviiD Sih!r pii!li&si

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

5|FZ\E ov;]Z1FF ;[T] ;M;FI8L V\TU"T “SgIF :JvZMHUFZ” SFI"ÊD IMHJFG]+ GÉSL SZJFDF\ VFJ[, CT]\ H[GF äFZF VDNFJFN XC[ZGL 5M,L;

,F.GGL DlC,FVM DF8[ “SgIF :JvZMHUFZ” G]\ VFIMHG SZ[,P H[DF\ D[P ;\I]ÉT 5M,L; SlDÆZzL4 D]bI DYS4 VDNFJFN XC[Z äFZF

ZMHUFZ,1FL SFI"ÊD ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D S],vZ TF,LDG]\ VFIMHG SZ[,P

D]bI C[T] ov;]Z1FF ;[T] V\TU"T VDNFJFN XC[ZGL NZ[S 5M,L; ,F.GMDF\ ZC[TL DlC,FVM 5MTFGL ZLT[ :JvlGE"Z Y. 5MTFGF 5U 5Z éEF ZCL XS[

T[ C[T] “SgIF :JvZMHUFZ” ZMHUFZ TF,LDG]\ VFIMHG SZJFDF\ VFJ[, CT]P H[DF\ ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D A[ ZMHUFZ,1FL

SFI"ÊDM VD,DF\ D]S[, 5M,L; ,F.GDF\ ZC[TL DlC,FVM DF8[ ;ZSFZzLGF TZOYL VF SFI"ÊD VD,DF\ D]S[, K[ H[GF äFZF DlC,F 5MTFGM

ptSQF" SZLG[ VF jIlÉTUT T[DH SF{8]\ALS ;CSFZ VF5L XS[ VG[ ;1FD AG[ T[ VF SFI"ÊDG]\ D]bI CFN" K[P

lJRFZ ovSC[JFI K[ S[ V[S ;O/ 5]Z]QF 5FK/ V[S ;O/ :+LGM CFY CMI K[ T[ D]HA 5|tI[S 5M,L; D[GG[ T[GL SFI"N1FTF4 5;"GFl,8L4 jIlÉTUT

SF{X<IM T[DH AF/SMGF\ ElJQI DF8[ VG[ VFHGF\ I]UDF\ VFJTL VFlY"S D]xS[,LVMGM ;FDGM SZL XS[ T[ DF8[ VF SFI"ÊD YSL ;DFHDF\ V[S

VFUJ]\ :YFG ,. ;DFH T[DH 5MTFGF\ 5lZJFZG[ ;O/ AGFJJF 5MTFGL V[S VFUJL VM/B éEL SZL XS[ T[ DF8[GM V[S ;\S<5vl;wW

SZL XS[ T[ C[T] VF :JvZMHUFZ,1FL TF,LDG]\ VFIMHG ;]Z1FF ;[T] ;M;FI8L äFZF U]HZFT ;ZSFZGL VF 5C[, V[S VFUJ]\ pNFCZ6 K[P

5]Z]QF ;DMJ0L DlC,F ovVFHGF I]UDF\ OÉT 5]Z]QF5|WFG ;DFH GYL ZæM 5Z\T] VFHGF\ I]UGL DlC,F 56 T[DF\ AFSFT GYLP H[D S[ ;DFH4 ZDTUDT4 lX1F64

J{7FlGS T[DH jIJ;FlIS ãlQ8V[ 56 VFHGL DlC,FVMV[ VFUJ]\ :YFG CF\;, SZ[, K[P H[DF\ SgIF :JvZMHUFZ äFZF DlC,F jIJ;FlIS

ãlQ8V[ 5]Z]QF ;DMJ0L AGL 5MTFGF\ S]8]\A4 ;DFHDF\ V[S VFUJL VM/B éEL SZL 5]Z]QF ;DMJ0L AGL XS[P

:JvZMHUFZ TF,LDG]\ GFD os!f ;LJ6 S,F; ov

VDNFJFN XCZ[ 5M,L; ,F.GDF \ ZCT[ L DlC,FVMG [ “SgIF :JvZMHUFZ”

TF,LDDF \ Db] ItJ [ ;LJ6 É,F; VG [ aI8] L 5F,Z" VD[ A [ 5S| FZGL TF,LD

VF5JFDF \ VFJ,[ KP[ S6FJ" TL DlC,F ;J[ FzI ;J[ F ;3\ äFZF !Z ;LJ6 É,F;

56} " G [ (*) DlC,FVMG [SZL TF,LD VF5JFDF \ VFJ,[ KP[sZf aI]8L 5F,"ZVDNFJFN XC[Z 5M,L; ,F.GGL S],v!#5( DlC,FVMV[ ;LJ6 É,F;qaI]8L

5F,"ZGL TF,LD 5}6" SZ[, K[P T[DH ALHL 5M,L; ,F.GMDF\ 56 TF,LDM XZ]

SZJFG]\ SFI"ZT K[P

5M,L; V`JvN/ VDNFJFN XC[Z ;FO<I UFYFV`JvTF,LDXF/F VDNFJFN BFT[ RF,TL 5M,L; CM;" ZFI0L\U É,ADF\

GLR[ D]HAGL 5|J'l¿VMG]\ VFIMHG SZJFDF\ VFJ[ K[P 5M,L; VG[

DlC,FVMG[ 5|Mt;FCG D/[ VG[ DlC,F ;XlÉTSZ6 YFI VG[ 5M,L;

BFTFDF\ HM0FI T[DH 5M,L; VG[ 5|HF JrR[ ;DgJI H/JF. ZC[ T[ C[T]YL

VF 5|J'l¿ SZJFDF\ VFJ[, K[P

DlC,FVM DF8[ 5]J" EZTL TF,LDVDNFJFN XC[Z 5M,L; äFZF 5|YD !__ lNJ; ,ÓF\S CF;, SZJF VDNFJFN XC[Z TYF ZFßIGL DlC,FVM 5M,L; N/DF\ JW]DF\

JW] HM0FI VG[ 5MTFG]\ V[S VFUJ]\ ÒJG ÒJ[ T[ ,ÓF\SYL prR VlWSFZLzLGF ;O/ ;CSFZYL D]bI DYS BFT[ DlC,F 5]J" EZTL

TF,LDG]\ VFIMHG SZJFDF\ VFJ[, VG[ VFXZ[ #Z5 DlC,F q I]JTLVMV[ 5]J" EZTL TF,LDDF\ HM0FJJFGM lG6"I SZ[, K[P

:JZ1F6 sDZLG8F:Sv h]0M4 SZF8[f TF,LD;]Z1FF ;[T] V\TU"T :SLD ;[<O 0LO[g; VGFD" SMdA[É8GF VD,LSZ6 DF8[

VDNFJFN XC[ZGL VFXZ[ $Z&# lJnFYL"VMG[ 5MTFGF :JvARFJ DF8[ S[JL

S[JL 5|lÊIF SZ[ T[G]\ lJUTJFZ ;DH6 VF5L T{IFZ SZL ;ZSFZ[ VF5[, ,1IF\S

5]6" SZJFDF\ VFJ[,P T[DH UlTXL, U]HZFT SFI"ÊDvZ_!5 ;]WLDF\ VFXZ[

5___ I]JTLVM :JZ1F6 TF,LD D[/J[ T[J]\ VFIMHG SZJFDF\ VFJ[, K[P

_PZZ ZFIO, X]8L\U TF,LDGL ;FO<I UFYFVDNFJFN XC[Z 5M,L; D]bI DYS BFT[ ;]Z1FF ;[T] ;M;FI8LGF p5ÊD[ DlC,F

;XlÉTSZ6GF EFU~5[ _PZZ ZFIO, X]8L\U TF,LD DF8[G]\ VFIMHG SZJFDF\ H[DF $*&!

DlC,FVM qI]JTLVM qU'lC6LVMV[ EFU ,. ;DHNFZL 5]J"S VFtDlJ`JF;YL ZFIO, äFZF

OFIZL\U SZ[, H[DF\ _PZZGF VFXZ[ $*&!_ ZFpg0GM BR" 56 SZJFDF\ VFJ[,P p5ZMÉT

OFIZL\U TF,LDDF\ EFU ,LW[, TDFD DlC,FVM !( YL 5_ JQF" JrR[GL CTLP

SgIF :JvZMHUFZ TF,LD

4140

Page 47: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

siiflyigiiWii; amiDiviiD Sih!r pii!li&si

Kavach:�The�Magazine�of�Raksha�Shakti�University Kavach:�The�Magazine�of�Raksha�Shakti�University

5|FZ\E ov;]Z1FF ;[T] ;M;FI8L V\TU"T “SgIF :JvZMHUFZ” SFI"ÊD IMHJFG]+ GÉSL SZJFDF\ VFJ[, CT]\ H[GF äFZF VDNFJFN XC[ZGL 5M,L;

,F.GGL DlC,FVM DF8[ “SgIF :JvZMHUFZ” G]\ VFIMHG SZ[,P H[DF\ D[P ;\I]ÉT 5M,L; SlDÆZzL4 D]bI DYS4 VDNFJFN XC[Z äFZF

ZMHUFZ,1FL SFI"ÊD ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D S],vZ TF,LDG]\ VFIMHG SZ[,P

D]bI C[T] ov;]Z1FF ;[T] V\TU"T VDNFJFN XC[ZGL NZ[S 5M,L; ,F.GMDF\ ZC[TL DlC,FVM 5MTFGL ZLT[ :JvlGE"Z Y. 5MTFGF 5U 5Z éEF ZCL XS[

T[ C[T] “SgIF :JvZMHUFZ” ZMHUFZ TF,LDG]\ VFIMHG SZJFDF\ VFJ[, CT]P H[DF\ ;LJ6 É,F; VG[ aI]8L 5F,"Z V[D A[ ZMHUFZ,1FL

SFI"ÊDM VD,DF\ D]S[, 5M,L; ,F.GDF\ ZC[TL DlC,FVM DF8[ ;ZSFZzLGF TZOYL VF SFI"ÊD VD,DF\ D]S[, K[ H[GF äFZF DlC,F 5MTFGM

ptSQF" SZLG[ VF jIlÉTUT T[DH SF{8]\ALS ;CSFZ VF5L XS[ VG[ ;1FD AG[ T[ VF SFI"ÊDG]\ D]bI CFN" K[P

lJRFZ ovSC[JFI K[ S[ V[S ;O/ 5]Z]QF 5FK/ V[S ;O/ :+LGM CFY CMI K[ T[ D]HA 5|tI[S 5M,L; D[GG[ T[GL SFI"N1FTF4 5;"GFl,8L4 jIlÉTUT

SF{X<IM T[DH AF/SMGF\ ElJQI DF8[ VG[ VFHGF\ I]UDF\ VFJTL VFlY"S D]xS[,LVMGM ;FDGM SZL XS[ T[ DF8[ VF SFI"ÊD YSL ;DFHDF\ V[S

VFUJ]\ :YFG ,. ;DFH T[DH 5MTFGF\ 5lZJFZG[ ;O/ AGFJJF 5MTFGL V[S VFUJL VM/B éEL SZL XS[ T[ DF8[GM V[S ;\S<5vl;wW

SZL XS[ T[ C[T] VF :JvZMHUFZ,1FL TF,LDG]\ VFIMHG ;]Z1FF ;[T] ;M;FI8L äFZF U]HZFT ;ZSFZGL VF 5C[, V[S VFUJ]\ pNFCZ6 K[P

5]Z]QF ;DMJ0L DlC,F ovVFHGF I]UDF\ OÉT 5]Z]QF5|WFG ;DFH GYL ZæM 5Z\T] VFHGF\ I]UGL DlC,F 56 T[DF\ AFSFT GYLP H[D S[ ;DFH4 ZDTUDT4 lX1F64

J{7FlGS T[DH jIJ;FlIS ãlQ8V[ 56 VFHGL DlC,FVMV[ VFUJ]\ :YFG CF\;, SZ[, K[P H[DF\ SgIF :JvZMHUFZ äFZF DlC,F jIJ;FlIS

ãlQ8V[ 5]Z]QF ;DMJ0L AGL 5MTFGF\ S]8]\A4 ;DFHDF\ V[S VFUJL VM/B éEL SZL 5]Z]QF ;DMJ0L AGL XS[P

:JvZMHUFZ TF,LDG]\ GFD os!f ;LJ6 S,F; ov

VDNFJFN XCZ[ 5M,L; ,F.GDF \ ZCT[ L DlC,FVMG [ “SgIF :JvZMHUFZ”

TF,LDDF \ Db] ItJ [ ;LJ6 É,F; VG [ aI8] L 5F,Z" VD[ A [ 5S| FZGL TF,LD

VF5JFDF \ VFJ,[ KP[ S6FJ" TL DlC,F ;J[ FzI ;J[ F ;3\ äFZF !Z ;LJ6 É,F;

56} " G [ (*) DlC,FVMG [SZL TF,LD VF5JFDF \ VFJ,[ KP[sZf aI]8L 5F,"ZVDNFJFN XC[Z 5M,L; ,F.GGL S],v!#5( DlC,FVMV[ ;LJ6 É,F;qaI]8L

5F,"ZGL TF,LD 5}6" SZ[, K[P T[DH ALHL 5M,L; ,F.GMDF\ 56 TF,LDM XZ]

SZJFG]\ SFI"ZT K[P

5M,L; V`JvN/ VDNFJFN XC[Z ;FO<I UFYFV`JvTF,LDXF/F VDNFJFN BFT[ RF,TL 5M,L; CM;" ZFI0L\U É,ADF\

GLR[ D]HAGL 5|J'l¿VMG]\ VFIMHG SZJFDF\ VFJ[ K[P 5M,L; VG[

DlC,FVMG[ 5|Mt;FCG D/[ VG[ DlC,F ;XlÉTSZ6 YFI VG[ 5M,L;

BFTFDF\ HM0FI T[DH 5M,L; VG[ 5|HF JrR[ ;DgJI H/JF. ZC[ T[ C[T]YL

VF 5|J'l¿ SZJFDF\ VFJ[, K[P

DlC,FVM DF8[ 5]J" EZTL TF,LDVDNFJFN XC[Z 5M,L; äFZF 5|YD !__ lNJ; ,ÓF\S CF;, SZJF VDNFJFN XC[Z TYF ZFßIGL DlC,FVM 5M,L; N/DF\ JW]DF\

JW] HM0FI VG[ 5MTFG]\ V[S VFUJ]\ ÒJG ÒJ[ T[ ,ÓF\SYL prR VlWSFZLzLGF ;O/ ;CSFZYL D]bI DYS BFT[ DlC,F 5]J" EZTL

TF,LDG]\ VFIMHG SZJFDF\ VFJ[, VG[ VFXZ[ #Z5 DlC,F q I]JTLVMV[ 5]J" EZTL TF,LDDF\ HM0FJJFGM lG6"I SZ[, K[P

:JZ1F6 sDZLG8F:Sv h]0M4 SZF8[f TF,LD;]Z1FF ;[T] V\TU"T :SLD ;[<O 0LO[g; VGFD" SMdA[É8GF VD,LSZ6 DF8[

VDNFJFN XC[ZGL VFXZ[ $Z&# lJnFYL"VMG[ 5MTFGF :JvARFJ DF8[ S[JL

S[JL 5|lÊIF SZ[ T[G]\ lJUTJFZ ;DH6 VF5L T{IFZ SZL ;ZSFZ[ VF5[, ,1IF\S

5]6" SZJFDF\ VFJ[,P T[DH UlTXL, U]HZFT SFI"ÊDvZ_!5 ;]WLDF\ VFXZ[

5___ I]JTLVM :JZ1F6 TF,LD D[/J[ T[J]\ VFIMHG SZJFDF\ VFJ[, K[P

_PZZ ZFIO, X]8L\U TF,LDGL ;FO<I UFYFVDNFJFN XC[Z 5M,L; D]bI DYS BFT[ ;]Z1FF ;[T] ;M;FI8LGF p5ÊD[ DlC,F

;XlÉTSZ6GF EFU~5[ _PZZ ZFIO, X]8L\U TF,LD DF8[G]\ VFIMHG SZJFDF\ H[DF $*&!

DlC,FVM qI]JTLVM qU'lC6LVMV[ EFU ,. ;DHNFZL 5]J"S VFtDlJ`JF;YL ZFIO, äFZF

OFIZL\U SZ[, H[DF\ _PZZGF VFXZ[ $*&!_ ZFpg0GM BR" 56 SZJFDF\ VFJ[,P p5ZMÉT

OFIZL\U TF,LDDF\ EFU ,LW[, TDFD DlC,FVM !( YL 5_ JQF" JrR[GL CTLP

SgIF :JvZMHUFZ TF,LD

4140

Page 48: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

Research�Fellowship�Project

Technology�Impact�on�Police�Department�(Computer�Technology)�:�This�Project�is�given�to�Mr.�Chaitanya�

Shah�who�has�competed�successfully.

Sponsored�Research�Project�1.���Dermatoglyphics� for� personality� Profiling� :-� This� Project� is� given� to�Mr.�Darpan�Vyas� of� Center� For�

Multiple�Intelligence�and�Dermatoglyphics

2.����Neurocriminology�for�Prison�convicts�trainees�training�module�for�rehabilitation.

3.����History�of�Forensic�Science�:�This�Project�is�given�to�Mr.�Sumi�Choudhary,�A.P.�F.S.�RSU.

4.�� History�of�Mounted�Police�in�India�:�This�Project�is�given�to�Dr.�Krishnamurthy,�IPS,�Rtd.�DGP,�Bengaluru.

5.�� Design� of� barricades� and� development� of� scaled� down� prototype� :� This� Project� is� given� to� IIT,�

Gandhinagar�for�development�of�Design�of�Police�barricades.

Activities�of�Institute�of�Research�&�Development

Sr.�No. Research�Topic1. Design�and�analysis�model�of�Open�space�Quantum�Cryptography�communication

2. Neuro-fuzzy�based�intelligent�first�responder�for�image�forgery�identification

3. Secured�Digital�Watermarking�and�Recognition�with�providing�high�perception�transparency�and�robustness

4. Poisoning�scenario�in�Gujarat�and�methods�to�detect�it

5. Fidelity�of�Forensic�Evidences�in�Criminal�trials�in�India

6. Digital�text�conversation�and�its�significance�in�detecting�malicious�intent

7. Dermatoglyphic�Markers�with�reference�to�impulsive�behaviour�and�executive�functions

8. Identification�&�Characterization�of�the�type�of�Tremors�in�Handwriting�and�Expert�Opinion

9. Environmental�issues�of�toxic�effluents�from�tanning�industry

10. Assessment�of�occupational�stress�and�burn�out�among�police�field�personnel

11. Perception�of�Police�Performance:�A�Community�Survey

12. Relationship�between�Psychological�Wellness�and�Attitude�towards�Work�and�Work�Performance�in�Police�Personnel

13. Police�as�a�responsible�stake�holder�in�Indian�criminal�justice�system-�a�critical�appraisal

Research�Topics�in�which�research�is�carried�out�in�Institute�of�R�&�D�:

42

Kavach:�The�Magazine�of�Raksha�Shakti�University

Important�News�related�to�Internal�Security

Sr.�No.

Newspaper�Headline Date Newspaper�Name

1. pii!li&si mii=i C j *mi*niTmiio miDD miiginiir piisi! pihi!oci& jSi!. 3/1/2015 Gujarat�Samachar

2. Ah!rmiio wi$miHpiininii! Dod Ri. 1000 krviini& *viciirNii 14/1/2015 Sandesh

3. State�nod�to�direct�enrolment�of�inspectors�in�police�force

21/1/2015 Indian�Express

4. gi#jriti pii!li&si bii!mbi *dfyi$z krvii 7 kri!dnii! ri!bii!T liiviSi!. 22/1/2015 Gujarat�Samachar

5. TVi*fknii *niyimii!ni#o ullioGini krniir viihniciiliknii Gir! e-mi!mii! aiviSi!. 26/1/2015 Divya�Bhaskar

6. aid!wid piik^^ kr!li& kir *lifT krvii miiT! enT!*lijnT Ti^ TVk 26/1/2015 Divya�Bhaskar

7. Crime�in�city�fell�by�30%�in�2014. 31/1/2015 Times�of�India

8. mi*hliiai!ni! svirxii miiT! dinsi *viWi *df!nsini& tiili&mi apiiSi!. 31/1/2015 Gujarat�Samachar

9. गुजरात पुिलस के इ-�ोजे� से �भािवत �ए युगांडा के �ितिनिध 2/2/2015 Rajasthan�Patrika

10. gi#jritimiio mi*hlii si#rxii miiT! “*df!nsi ai! dinsi aimi&^” UBi#o kriSi! 2/2/2015 Gujarat�Samachar

11. rijki!T piisi! biniSi! pii!li&si TV!*niogi si!nTr 3/2/2015 Fulchhab

12. gi#jriti FSL D!Sini& siiyibir *sikyii!*rT&nii! ri!dmi!pi GidSi! 3/2/2015 Sandesh

13. h*Wiyiir-wiirki!ni! yi#*nik niobir apiiSi! 3/2/2015 Sandesh

14. kcCWi& viiwii bii!d^r mi*hlii k!mili sifir&ni#o Bi#jWi& PsWiini 20/2/2015 Gujarat�Samachar

15. *si*niyir *si*Tznini! miici^miio fH& GPS mii!biieli miLSi! 21/2/2015 Divya�Bhaskar

16. ऐप देगा शराब के ताजा �ॉक की जानकारी 21/2/2015 Rajasthan�Patrika

17. TVi*fkni& Ti!eogi viini pir mi$*viogi CCTV�k!mi!ri ligiiviiSi!. 22/2/2015 Gujarat�Samachar

18. gi#jriti si! siiti ki! riMTVpi*ti piDk 26/2/2015 Rajasthan�Patrika

19. amiDiviiDmiio pih!li& viKiti 1200 hi!migiid^ni& Birti& kriSi!. 2/3/2015 Divya�Bhaskar

43

Page 49: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

Research�Fellowship�Project

Technology�Impact�on�Police�Department�(Computer�Technology)�:�This�Project�is�given�to�Mr.�Chaitanya�

Shah�who�has�competed�successfully.

Sponsored�Research�Project�1.���Dermatoglyphics� for� personality� Profiling� :-� This� Project� is� given� to�Mr.�Darpan�Vyas� of� Center� For�

Multiple�Intelligence�and�Dermatoglyphics

2.����Neurocriminology�for�Prison�convicts�trainees�training�module�for�rehabilitation.

3.����History�of�Forensic�Science�:�This�Project�is�given�to�Mr.�Sumi�Choudhary,�A.P.�F.S.�RSU.

4.�� History�of�Mounted�Police�in�India�:�This�Project�is�given�to�Dr.�Krishnamurthy,�IPS,�Rtd.�DGP,�Bengaluru.

5.�� Design� of� barricades� and� development� of� scaled� down� prototype� :� This� Project� is� given� to� IIT,�

Gandhinagar�for�development�of�Design�of�Police�barricades.

Activities�of�Institute�of�Research�&�Development

Sr.�No. Research�Topic1. Design�and�analysis�model�of�Open�space�Quantum�Cryptography�communication

2. Neuro-fuzzy�based�intelligent�first�responder�for�image�forgery�identification

3. Secured�Digital�Watermarking�and�Recognition�with�providing�high�perception�transparency�and�robustness

4. Poisoning�scenario�in�Gujarat�and�methods�to�detect�it

5. Fidelity�of�Forensic�Evidences�in�Criminal�trials�in�India

6. Digital�text�conversation�and�its�significance�in�detecting�malicious�intent

7. Dermatoglyphic�Markers�with�reference�to�impulsive�behaviour�and�executive�functions

8. Identification�&�Characterization�of�the�type�of�Tremors�in�Handwriting�and�Expert�Opinion

9. Environmental�issues�of�toxic�effluents�from�tanning�industry

10. Assessment�of�occupational�stress�and�burn�out�among�police�field�personnel

11. Perception�of�Police�Performance:�A�Community�Survey

12. Relationship�between�Psychological�Wellness�and�Attitude�towards�Work�and�Work�Performance�in�Police�Personnel

13. Police�as�a�responsible�stake�holder�in�Indian�criminal�justice�system-�a�critical�appraisal

Research�Topics�in�which�research�is�carried�out�in�Institute�of�R�&�D�:

42

Kavach:�The�Magazine�of�Raksha�Shakti�University

Important�News�related�to�Internal�Security

Sr.�No.

Newspaper�Headline Date Newspaper�Name

1. pii!li&si mii=i C j *mi*niTmiio miDD miiginiir piisi! pihi!oci& jSi!. 3/1/2015 Gujarat�Samachar

2. Ah!rmiio wi$miHpiininii! Dod Ri. 1000 krviini& *viciirNii 14/1/2015 Sandesh

3. State�nod�to�direct�enrolment�of�inspectors�in�police�force

21/1/2015 Indian�Express

4. gi#jriti pii!li&si bii!mbi *dfyi$z krvii 7 kri!dnii! ri!bii!T liiviSi!. 22/1/2015 Gujarat�Samachar

5. TVi*fknii *niyimii!ni#o ullioGini krniir viihniciiliknii Gir! e-mi!mii! aiviSi!. 26/1/2015 Divya�Bhaskar

6. aid!wid piik^^ kr!li& kir *lifT krvii miiT! enT!*lijnT Ti^ TVk 26/1/2015 Divya�Bhaskar

7. Crime�in�city�fell�by�30%�in�2014. 31/1/2015 Times�of�India

8. mi*hliiai!ni! svirxii miiT! dinsi *viWi *df!nsini& tiili&mi apiiSi!. 31/1/2015 Gujarat�Samachar

9. गुजरात पुिलस के इ-�ोजे� से �भािवत �ए युगांडा के �ितिनिध 2/2/2015 Rajasthan�Patrika

10. gi#jritimiio mi*hlii si#rxii miiT! “*df!nsi ai! dinsi aimi&^” UBi#o kriSi! 2/2/2015 Gujarat�Samachar

11. rijki!T piisi! biniSi! pii!li&si TV!*niogi si!nTr 3/2/2015 Fulchhab

12. gi#jriti FSL D!Sini& siiyibir *sikyii!*rT&nii! ri!dmi!pi GidSi! 3/2/2015 Sandesh

13. h*Wiyiir-wiirki!ni! yi#*nik niobir apiiSi! 3/2/2015 Sandesh

14. kcCWi& viiwii bii!d^r mi*hlii k!mili sifir&ni#o Bi#jWi& PsWiini 20/2/2015 Gujarat�Samachar

15. *si*niyir *si*Tznini! miici^miio fH& GPS mii!biieli miLSi! 21/2/2015 Divya�Bhaskar

16. ऐप देगा शराब के ताजा �ॉक की जानकारी 21/2/2015 Rajasthan�Patrika

17. TVi*fkni& Ti!eogi viini pir mi$*viogi CCTV�k!mi!ri ligiiviiSi!. 22/2/2015 Gujarat�Samachar

18. gi#jriti si! siiti ki! riMTVpi*ti piDk 26/2/2015 Rajasthan�Patrika

19. amiDiviiDmiio pih!li& viKiti 1200 hi!migiid^ni& Birti& kriSi!. 2/3/2015 Divya�Bhaskar

43

Page 50: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

A)�������For�Articles:

1.������ �Content�of�the�article�should�be�the�original�creation�of�the�author�and�should�not�have�been�published�anywhere�else�before.�

2.���Article/Content�can�be�written�in�English,�Hindi�or�Gujarati�language3.���Length�of�the�article�should�be�around�1000�words�(Appx.�two�A4�size�paper�and�not�more�than�

1500�words.4.���In�case�of�language�other�than�English,�article�should�be�submitted�with�fonts,�if�it�is�in�soft�copy.�5.���In�case�article�is�in�hard�copy,�writing�should�be�legible.�6.�� �Editor�shall�have�right�to�edit�articles�to�make�the�content�appropriate�as�per�the�standards�of�

the�magazine.

B)�����For�other�contents:

Those� who� want� to� contribute� some� contents� other� than� articles� may� also� send� the� same.�Generally�following�items�may�be�included�for�the�magazine.�

•��R� eviews�on�issues�related�to�Police�and�Internal�Security�•��B� ook�Reviews•��L� atest�Technology�in�Internal�Security•��E� ssays•��P� oems�•��Cartoons,�Paintings�etc.•��O� ther�Informative�Compilation

Final�decision�regarding�publication�will�be�taken�by�the�Editor.�All�correspondence�related�to�the�magazine��can�be�made�to:

The�EditorRaksha�Shakti�University�Magazine�ʻKavachʼ

Raksha�Shakti�University�New�Mental�Corner,�Meghaninagar,

Ahmedabad�‒�380016�(Gujarat�‒�INDIA)Phone:�079�‒�22683624,�22684222,�22684173��Fax:�079�‒�22683762

E-mail:�[email protected]

Guidelines�for�contribution�in�ʻKavachʼ

Kavach:�The�Magazine�of�Raksha�Shakti�University

RSU�in�News

44 45

Page 51: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

Kavach:�The�Magazine�of�Raksha�Shakti�University

A)�������For�Articles:

1.������ �Content�of�the�article�should�be�the�original�creation�of�the�author�and�should�not�have�been�published�anywhere�else�before.�

2.���Article/Content�can�be�written�in�English,�Hindi�or�Gujarati�language3.���Length�of�the�article�should�be�around�1000�words�(Appx.�two�A4�size�paper�and�not�more�than�

1500�words.4.���In�case�of�language�other�than�English,�article�should�be�submitted�with�fonts,�if�it�is�in�soft�copy.�5.���In�case�article�is�in�hard�copy,�writing�should�be�legible.�6.�� �Editor�shall�have�right�to�edit�articles�to�make�the�content�appropriate�as�per�the�standards�of�

the�magazine.

B)�����For�other�contents:

Those� who� want� to� contribute� some� contents� other� than� articles� may� also� send� the� same.�Generally�following�items�may�be�included�for�the�magazine.�

•��R� eviews�on�issues�related�to�Police�and�Internal�Security�•��B� ook�Reviews•��L� atest�Technology�in�Internal�Security•��E� ssays•��P� oems�•��Cartoons,�Paintings�etc.•��O� ther�Informative�Compilation

Final�decision�regarding�publication�will�be�taken�by�the�Editor.�All�correspondence�related�to�the�magazine��can�be�made�to:

The�EditorRaksha�Shakti�University�Magazine�ʻKavachʼ

Raksha�Shakti�University�New�Mental�Corner,�Meghaninagar,

Ahmedabad�‒�380016�(Gujarat�‒�INDIA)Phone:�079�‒�22683624,�22684222,�22684173��Fax:�079�‒�22683762

E-mail:�[email protected]

Guidelines�for�contribution�in�ʻKavachʼ

Kavach:�The�Magazine�of�Raksha�Shakti�University

RSU�in�News

44 45

Page 52: RSU MAGAZINE KAVACH Issue 4€¦ · Analysis of these situations shows that there is a feeling of fear among the lower cadre personnel towards 32 33. Kavach: The Magazine of Raksha

RAKSHA�SHAKTI�UNIVERSITYNew�Mental�Corner,�Meghaninagar,�Ahmedabad�-�380�016�(Gujarat)�INDIA.

Ph.:�079-22683624,�22684173�•�Fax�:�079�-�22683762E-mail�:�[email protected]

www.rakshashaktiuniversity.edu.in