SlideShare une entreprise Scribd logo
1  sur  54
[object Object],[object Object],[object Object],Ashish Sonal CEO,  Orkash Services Pvt Ltd
About Orkash ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Agenda Part -1   Indian Security  Scenario Overview Part -2 Automating Intelligence creation   -  Intelligence creation - Correlating the 'concept of operations'  Part-3  Tackling unconventional conflicts in India -  UCIMS
The previous wave .. Date of attack Location (Scope of the attack) LEGEND KEY 21 October  2008 Imphal, Manipur (One device) 13 May 2008 Jaipur, Rajasthan (Eight devices) 25 July  2008 Bengaluru, Karnataka (Eight Devices) 26 July  2008 Ahmedabad, Gujarat (21 devices) 29-30 July  2008 Surat, Gujarat (18 devices) 13 September  2008 New Delhi (Six devices) 29 September  2008 Modasa, Gujarat (One device) 29 September  2008 Malegaon, Maharashtra (Two devices) 01 October  2008 Tripura, Agartala (Five devices) 30 October  2008 Guwahati, Assam (18 devices) 26-29 November  2008 Mumbai, Maharashtra (Multiple Attacks & Blasts) 27 September 2008 New Delhi (One device) 01January 2008 Rampur, U.P (Two devices)
Major Naxalites Areas
Circa 2010: Transition Patterns - Naxalism Discontent among the 'strategic' arm of Naxals differences between groups supporting armed struggle and other, ready for negotiations Military arm of Naxals becoming aggressive Religion and caste becoming an issues Leveraging the political forces Ambiguous leadership Discontent among members Clash in recruitment and funding sources Naxalism in  Transition Naxal Organization Indian government actions and 'reactions' Absence of constructive and 'crowd pulling' ideology
Transition of terrorism in India (post 26/11) Transition of terrorism in India (post 26/11) Organised Crime Linkages (local & international) Meticulous operational and strategic  planning Recruitment is becoming local  focusing on  those working in factories and computer literates from big cities Emergence of India as a target of  transnational terrorism Expanding logistical homebase Still 'waiting' to carry out mass large scale  attacks Impacted by neighborhood Geo-strategic forces
Information Asymmetry - Mining for real time intelligence ,[object Object],[object Object],[object Object],Historical data analysis would train expert engines to raise triggers and red flags. Real time data mining will generate trends and patterns in the usage Multiple Sims Multiple Handsets Internet account Account: Hazi Al Password: Hazi_123 Location [email_address] [email_address] [email_address] IP address MAC address Metadata Email tracing Telephone Banking and Card Usage
Challenges for the security forces  Terrain & Demographic Information Intelligence collation from diverse sources Network  centric operations & comd & control Technology Platforms Evolution of  Organized crime Development of the Concept of Operations Strategic Challenges
Challenges for the security forces (Intelligence & Ops) Information availability in multi agency envt Leveraging on predictive patterns Managing short term and long term op activities Planning and  monitoring Information asymmetry Command and Control The single largest challenge is the creation of actionable intelligence for actual op execution
The Intelligence Stack Strategic Intelligence Operational Intelligence Tactical Intelligence Tactical  Intelligence Operational  Intelligence Strategic Intelligence Intelligence Consumption Intelligence Creation
Technical Intelligence  + Human Intelligence Predictive and Investigative Intelligence Intelligence Needs Granularity - Data Cubes WHY WHAT WHERE WHO WHEN
Convergence – Human Int and Tech Int Intelligence Agencies - Databases Administrative - Databases Tech Intelligence Datamining Processing  Raw Data  into  Usable  form Better Information  Collection Internet based information collection  and investigation (Track Back) Enhanced  Prevent-Prepare-Respond-Recover Structure  Identifying Triggers & Patterns Automated analysis of structured & unstructured data Human Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
The FOUR Pillars of Automated Intelligence Creation  Information  Extraction and Monitoring Semantic  Analysis Geospatial  Analysis Data Mining & Forensics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Use of semantics to decipher the  content Unstructured to structured data  Using domain  specific ontologies Network analysis Tools  and analytics Analysis of the geospatial context and  better data visualization Geospatial  intelligence for  effective decision making Location intelligence for  better interpretation of networks & activities  Data Mining on real time basis Analysis of trends and patterns of activities Internet & Cyber Forensics  Target Centric Social Network Analysis Pattern Tracing and  Tracking
Automating Intelligence Creation  - The Process Layers  © 2010 - Orkash Services Pvt. Ltd . Information  generation/extraction Semantic  analysis Geospatial  analysis Leverage ‘ collective int’ ,[object Object],[object Object],[object Object],[object Object],[object Object],Data mining
Target Centric Intelligence Model
Unconventional Conflict & Intelligence Management System (UCIMS)
Intelligence collaboration process Intelligence sources Socio political  events Demographics Sat images, maps Technical inputs Data repository - Raw data - Analysis of data - Intelligence creation - Intelligence distribution Actionable intelligence Tactical decision making Intelligence collaboration process
Semantic Enrichment ,[object Object],[object Object],[object Object],[object Object],(XML) D1 D2 D3 . . Dn Document  Classification Classification  Results Commonsense Engine Concepts Engine Concepts Tagged  Documents + Entities Semantic Enrichment Semantically Enriched Documents Documents
 
 
Combining Data Mining and  Link Analysis
Inferenced Information Representation
Deeper relations between entities
Association between events
Network Analysis and Data visualization  (1) Manually creation of association matrix by identifying the relations through raw data (2) Helpful in investigation, becomes ineffective where datasets are very large (1) Graphically representation of insurgent networks using tools such as Link Analysis  (2) Helpful in visualization of large amount of relationship data but without analytical functionality. (1)Advanced analytical capabilities to assist investigation (2) It can help in identifying networks to mining of large volumes of data to discover useful knowledge and create intelligence about the structure and organization of criminal networks - Data Mining - Social Network Analysis - Pattern Tracing and interactions © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Manual Graphics-based Manual Structured
Past historical factual information
Visualizing Semantic Data Analysis in GIS Context ,[object Object],[object Object],[object Object],[object Object]
OLAP analysis
Naxal Emerging Fault lines Castes and tribes Within tribes Inter-state  leadership CPI (Maoist)   and  frontal organizations Splinter groups The direction these splits take as the government action on all fronts intensifies will have a major bearing on the future of Naxal movement and strategy in India Naxal Movement
Interaction with socio-political environment ,[object Object]
‘ GO’ Areas—Risk Profiles  (Case Study) Durg Kanker  East Baster  East ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],8% 8% 5% 5% 15% 16% 13% 11% 6% 13% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 9% 6% 6% 7% 17% 16% 11% 9% 4% 15% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 11% 8% 4% 6% 13% 11% 15% 8% 7% 17% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments
‘ Borderline Go’ Areas—Risk Profiles  (Case Study) Dantewada  Central Kanker  West Baster  West ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],16% 10% 18% 10% 8% 11% 8% 2% 5% 12% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 15% 11% 17% 6% 13% 10% 9% 4% 2% 13% Extremism Crime Geography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments 14% 10% 15% 9% 11% 10% 11% 5% 3% 12% Extremism Crime Geoography Political Socio-Econ Population Land Politics Business Natural Hazard Local Sentiments
‘ NO GO’ Areas—Risk Profiles  (Case Study) Dantewada  West Dantewada  East ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Basis for Risk Mitigation  -  (Case Study) Low Risks  They do not require the formulation of a risk mitigation strategy at this stage of exploration work Moderate Risks  Awareness about factors and influences that drive these parameters, and regular monitoring are required. The threats from these risks however will not have a direct impact at this stage Extreme & High Risks  Those areas that register a 15+ total on freq * severity require active risk mitigations strategies to be in place
Sample KRI Parameters & Triggers for Risk Intelligence Framework  (a large mining project in India)  -  (Case Study)   Common Borders   Topography   Forest Cover that  indicates Naxalite  hideout zones   Rivers — that could  potentially lead to  crime and water  politics in the  future. Seasonal  floods, as well as  shortage of  irrigation water in  certain seasons  lead to incidents  of violence, crime  and clashes  amongst villagers    Location of a  particular  district   Population   Incidents in the  district   Nature of  criminal groups   State of police  and governance   Presence of  Naxalism (The  number,  strength and  method indicate  the pos sibility  of Naxalite  Attacks)   Ammunition  recovery and  Arrests within a  district (Reflects  the strength of  the network) Crime/Extremism Geography Local Political Situation   Constituency  representative   Opposition parties   Influence of  Naxalite political  groups   Local support for  Naxalites/ political  party A constituency with high profile candidates  and major political  parties attract Naxalite  attacks and the crime  - politics connection Socio - Economic   Economic  Profile   Literacy   Occupation   Youth — education and  employment   Percentage of  SC/ST * in total  population -- A high risk socio - economic profile can  provide flashpoints  for the future -- The youth form a  substant ial part of  the “new criminals” * SC/ST  – Scheduled Cast e s  / Scheduled Tribes Land Politics   Type of Land    Yield   Size of holdings   Land Clashes Caste - based attacks  and crimes result in  human loss and  psyc hological fear in  an area Road + Rail   Presence of  NH/SH in the  district   Condition of  roads and rail  network   I ncidents on  both   Accidents   Closest railway  stations and  alternative  ways of access Infrastructure   Hospitals   Banks   Electricity/Power  sup ply   Telecom Circle   Water Local Sentiment   Attitude  towards  foreigners   Attitude  towards Mining   Protests   Mobilizers — NGOs, Pradhans   L ocal media Businesses   No .  of  Businesses in  the area   Year of start  and closure   Nature of  Business   Ratio of  Businesses  closed to open Natural Hazard   Earthquakes   Floods   Monsoon    Drought
Risk Visualization / Risk Map – Mining Project -  (Case Study) Disruptions Methods of Stalling High Risk Medium Risk Low Risk R I S K I N T E L L I G E N C E Vulnerabilities Associated with  Legal,   Regulatory,  &  Policy  Issues Demonstrations, Strikes Security/Loss/ Sabotage Instruments which can make this happen Extremism/ Crime Political Dynamics People’s Right Activists Local Social & Community Issues  Local Contracts Resettlements Pollution Environment Local Employment Socio - Economic Reasons
ORKASH-UCIMS on a geospatial platform
 
Intelligence & Operations Management
Connecting the Dots..
Location Intelligence
Tracking events news with location based search
Advanced Search Techniques for Location Intelligence
 
Monitoring Movement of Tactical Assets
Air Surveillance
UCIMS Features ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Network Centric Command and Control System ,[object Object],Network diverse entities Allow information Sharing Enhance Situational Awareness Enable - C4I Increase mission effectiveness
THANK YOU Orkash Services Pvt Ltd 75 C, Sector 18 Gurgaon 122 015 Haryana, India Phone: +91 124 4033773 +91 98102 36020 [email_address] .com www.orkash.com
Impetus on intelligence creation - why? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Changing security landscape of India  India has experienced  a continued  and an  almost  consistent  security problem  pertaining to: -Naxalism  - Insurgency -Extremism -Organized  crime Drivers of  Transition: -Operational  Sophistication -Ideological  Evolution India's internal  security  scenario  is in a very  'delicate'  and a  'vulnerable'  stage Unconventional conflicts and deteriorating security mechanisms have forced us to think beyond the routine 'guard and police' protection Essentially non existent, it is high time that India focuses on homeland security protection Long history  of terrorism Terrorism Transition Internal Security Security Evolution Homeland Security
Homeland security in India  Increased focus on HLS post 26/11 Fragmented structure of HLS sector  Technology  Modernization New Technology  Introduction Information Synthesis
Intelligence Challenges  and  Connecting the Dots.. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],© 2010 - Orkash Services Pvt.  Ltd. … ensuring Assurance in complexity and uncertainty

Contenu connexe

Tendances

Information Technology Data Mining
Information Technology Data MiningInformation Technology Data Mining
Information Technology Data Mining
samiksha sharma
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
Venkat Projects
 
Open data for smart cities
Open data for smart citiesOpen data for smart cities
Open data for smart cities
Sören Auer
 
Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)
Sonu Gupta
 

Tendances (19)

A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
A COMPREHENSIVE STUDY ON POTENTIAL RESEARCH OPPORTUNITIES OF BIG DATA ANALYTI...
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and Graphs
 
Data mining
Data mining Data mining
Data mining
 
Data Mining
Data MiningData Mining
Data Mining
 
Data Mining
Data MiningData Mining
Data Mining
 
Information Technology Data Mining
Information Technology Data MiningInformation Technology Data Mining
Information Technology Data Mining
 
Crime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data miningCrime analysis mapping, intrusion detection using data mining
Crime analysis mapping, intrusion detection using data mining
 
Dwdm
DwdmDwdm
Dwdm
 
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.Engines of Order. Social Media and the Rise of Algorithmic Knowing.
Engines of Order. Social Media and the Rise of Algorithmic Knowing.
 
MCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence PlatformMCAP Big Data Security Intelligence Platform
MCAP Big Data Security Intelligence Platform
 
Open data for smart cities
Open data for smart citiesOpen data for smart cities
Open data for smart cities
 
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
Bigger and Better: Employing a Holistic Strategy for Big Data toward a Strong...
 
Your organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & securityYour organization and big data: Managing access, privacy, & security
Your organization and big data: Managing access, privacy, & security
 
1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics1511401708 redefining militaryintelligenceusingbigdataanalytics
1511401708 redefining militaryintelligenceusingbigdataanalytics
 
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
Secured Scheduling Technique of Network Resource Management in Vehicular Comm...
 
Big data Paper
Big data PaperBig data Paper
Big data Paper
 
DEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AIDEALING CRISIS MANAGEMENT USING AI
DEALING CRISIS MANAGEMENT USING AI
 
Big data - a review (2013 4)
Big data - a review (2013 4)Big data - a review (2013 4)
Big data - a review (2013 4)
 
Use of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysisUse of monitoring data for evidence-based decision making: A factor analysis
Use of monitoring data for evidence-based decision making: A factor analysis
 

En vedette

Mats almqwist
Mats almqwistMats almqwist
Mats almqwist
IPPAI
 
Адміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянинуАдміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянину
Centre of Policy and Legal Reform
 
New Microsoft PowerPoint Presentation
New Microsoft PowerPoint PresentationNew Microsoft PowerPoint Presentation
New Microsoft PowerPoint Presentation
Varun D R
 

En vedette (10)

Periodismo Deportivo
Periodismo Deportivo Periodismo Deportivo
Periodismo Deportivo
 
Planning A Group Outing
Planning A Group OutingPlanning A Group Outing
Planning A Group Outing
 
Design Process
Design ProcessDesign Process
Design Process
 
Conozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackersConozca cómo evadir el ataque de los hackers
Conozca cómo evadir el ataque de los hackers
 
Renewable Open Access; Perceived Concerns & Way Out
Renewable Open Access; Perceived Concerns & Way Out Renewable Open Access; Perceived Concerns & Way Out
Renewable Open Access; Perceived Concerns & Way Out
 
Mats almqwist
Mats almqwistMats almqwist
Mats almqwist
 
Адміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянинуАдміністративні послуги для тебе. Посібник громадянину
Адміністративні послуги для тебе. Посібник громадянину
 
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссеЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
ЖК Фрайдей Вилладж Юрлово, Новостройки Пятницкое шоссе
 
New Microsoft PowerPoint Presentation
New Microsoft PowerPoint PresentationNew Microsoft PowerPoint Presentation
New Microsoft PowerPoint Presentation
 
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
CLIW 2015-2016 (13/13) Perspective Web la nivel de client. Limbajul ES6
 

Similaire à Ashish sonal_banglore

Ashish sonal_mumbai
Ashish sonal_mumbaiAshish sonal_mumbai
Ashish sonal_mumbai
IPPAI
 
Ashish sonal
Ashish sonalAshish sonal
Ashish sonal
IPPAI
 
Mandeep mann
Mandeep mannMandeep mann
Mandeep mann
IPPAI
 
5. data mining tools and techniques a review--31-39
5. data mining tools and techniques  a review--31-395. data mining tools and techniques  a review--31-39
5. data mining tools and techniques a review--31-39
Alexander Decker
 
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
Alexander Decker
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
IAEME Publication
 
Data Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat YazıcıData Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat Yazıcı
Murat YAZICI, M.Sc.
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
Yehuda Korotkin
 
Workshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data DisseminationWorkshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data Dissemination
Zoltan Nagy
 

Similaire à Ashish sonal_banglore (20)

Ashish sonal_mumbai
Ashish sonal_mumbaiAshish sonal_mumbai
Ashish sonal_mumbai
 
Ashish sonal
Ashish sonalAshish sonal
Ashish sonal
 
Mandeep mann
Mandeep mannMandeep mann
Mandeep mann
 
5. data mining tools and techniques a review--31-39
5. data mining tools and techniques  a review--31-395. data mining tools and techniques  a review--31-39
5. data mining tools and techniques a review--31-39
 
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
11.0005www.iiste.org call for paper. data mining tools and techniques- a revi...
 
KIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdfKIT-601 Lecture Notes-UNIT-1.pdf
KIT-601 Lecture Notes-UNIT-1.pdf
 
A comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan dataA comparative analysis of data mining tools for performance mapping of wlan data
A comparative analysis of data mining tools for performance mapping of wlan data
 
Introduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycleIntroduction to Data Analytics and data analytics life cycle
Introduction to Data Analytics and data analytics life cycle
 
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdfKIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
KIT-601-L-UNIT-1 (Revised) Introduction to Data Analytcs.pdf
 
Data Science
Data ScienceData Science
Data Science
 
Applications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World TodayApplications of Semantic Technology in the Real World Today
Applications of Semantic Technology in the Real World Today
 
Data Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat YazıcıData Mining for Big Data-Murat Yazıcı
Data Mining for Big Data-Murat Yazıcı
 
SAIP-Intelligence-Brochure
SAIP-Intelligence-BrochureSAIP-Intelligence-Brochure
SAIP-Intelligence-Brochure
 
IAASB & Disruptive Technologies
IAASB & Disruptive TechnologiesIAASB & Disruptive Technologies
IAASB & Disruptive Technologies
 
Introduction of Data Science and Data Analytics
Introduction of Data Science and Data AnalyticsIntroduction of Data Science and Data Analytics
Introduction of Data Science and Data Analytics
 
A COMPREHENSIVE SURVEY ON DATA MINING
A COMPREHENSIVE SURVEY ON DATA MININGA COMPREHENSIVE SURVEY ON DATA MINING
A COMPREHENSIVE SURVEY ON DATA MINING
 
Correlation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data EnvironmentCorrelation Method for Public Security Information in Big Data Environment
Correlation Method for Public Security Information in Big Data Environment
 
Workshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data DisseminationWorkshop Rio de Janeiro Strategies for Web Based Data Dissemination
Workshop Rio de Janeiro Strategies for Web Based Data Dissemination
 
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
Warp10, a horizontal framework for Time Series data, OW2con'18, June 7-8, 201...
 
How new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-finalHow new ai based analytics ignite a productivity revolution in e discovery-final
How new ai based analytics ignite a productivity revolution in e discovery-final
 

Plus de IPPAI

Plus de IPPAI (20)

The Move Towards Sustainable Transport in London - Mr. Steve Kearns
The Move Towards Sustainable Transport in London - Mr. Steve KearnsThe Move Towards Sustainable Transport in London - Mr. Steve Kearns
The Move Towards Sustainable Transport in London - Mr. Steve Kearns
 
Standards – building blocks of the Smart City - Michael Mulquin
Standards – building blocks of the Smart City - Michael MulquinStandards – building blocks of the Smart City - Michael Mulquin
Standards – building blocks of the Smart City - Michael Mulquin
 
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
21st Century Grids and India’s journey towards smarter grids - Reji Kumar Pillai
 
Smart City Principles - Rogier van den Berg
Smart City Principles - Rogier van den BergSmart City Principles - Rogier van den Berg
Smart City Principles - Rogier van den Berg
 
TImportance of certification and standardization for Smart Cities - Mr. Raymo...
TImportance of certification and standardization for Smart Cities - Mr. Raymo...TImportance of certification and standardization for Smart Cities - Mr. Raymo...
TImportance of certification and standardization for Smart Cities - Mr. Raymo...
 
Smart, Secure and Sustainable Cities India – Mr. Trevor Gibson
Smart, Secure and Sustainable Cities India – Mr. Trevor GibsonSmart, Secure and Sustainable Cities India – Mr. Trevor Gibson
Smart, Secure and Sustainable Cities India – Mr. Trevor Gibson
 
Industry Qualifications India - Cdr(Retd.) Kartik Vig
Industry Qualifications India - Cdr(Retd.) Kartik VigIndustry Qualifications India - Cdr(Retd.) Kartik Vig
Industry Qualifications India - Cdr(Retd.) Kartik Vig
 
Future cities catapult - Dr. Cathy Mulligan
Future cities catapult - Dr. Cathy MulliganFuture cities catapult - Dr. Cathy Mulligan
Future cities catapult - Dr. Cathy Mulligan
 
Can the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
Can the dream of 100% renewable energy be a reality? - Mr. Ken DragoonCan the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
Can the dream of 100% renewable energy be a reality? - Mr. Ken Dragoon
 
Smart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
Smart Cities, Smart Consequences? - Mr. Devdutt PattanaikSmart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
Smart Cities, Smart Consequences? - Mr. Devdutt Pattanaik
 
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
From Islands to Cities – Applications for Smart Energy Storage - Dr. Wolfram ...
 
The Road to Smart Cities - Jeet Mistry
The Road to Smart Cities - Jeet MistryThe Road to Smart Cities - Jeet Mistry
The Road to Smart Cities - Jeet Mistry
 
From Smart Grid to Smart Cities - Richard Schomberg
From Smart Grid to Smart Cities - Richard SchombergFrom Smart Grid to Smart Cities - Richard Schomberg
From Smart Grid to Smart Cities - Richard Schomberg
 
INAUGURAL ADDRESS - Mr. Harry Dhaul
INAUGURAL ADDRESS - Mr. Harry DhaulINAUGURAL ADDRESS - Mr. Harry Dhaul
INAUGURAL ADDRESS - Mr. Harry Dhaul
 
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...
Future Cities:  Innovation, Investment and Transformation - Professor Sir Dav...Future Cities:  Innovation, Investment and Transformation - Professor Sir Dav...
Future Cities: Innovation, Investment and Transformation - Professor Sir Dav...
 
Smart Water and Waste Management for Smart Cities - Mr. James Dunning
Smart Water and Waste Management for Smart Cities - Mr. James DunningSmart Water and Waste Management for Smart Cities - Mr. James Dunning
Smart Water and Waste Management for Smart Cities - Mr. James Dunning
 
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
SMART SEWAGE TREATMENT PLANTS FOR SMART CITIES IN INDIA, NY USA - Mr. Asim C ...
 
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
Eyewatch a versatile mobile platform for security and M-governance - Cdr (Ret...
 
Importance of Innovation for Water and Water Management for Smart Cities - As...
Importance of Innovation for Water and Water Management for Smart Cities - As...Importance of Innovation for Water and Water Management for Smart Cities - As...
Importance of Innovation for Water and Water Management for Smart Cities - As...
 
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum ParwezSmart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
Smart Water and Wastewater Management For Smart Cities - Mr. Anjum Parwez
 

Dernier

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Dernier (20)

Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...Hyatt driving innovation and exceptional customer experiences with FIDO passw...
Hyatt driving innovation and exceptional customer experiences with FIDO passw...
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 

Ashish sonal_banglore

  • 1.
  • 2.
  • 3. Agenda Part -1 Indian Security Scenario Overview Part -2 Automating Intelligence creation - Intelligence creation - Correlating the 'concept of operations' Part-3 Tackling unconventional conflicts in India - UCIMS
  • 4. The previous wave .. Date of attack Location (Scope of the attack) LEGEND KEY 21 October 2008 Imphal, Manipur (One device) 13 May 2008 Jaipur, Rajasthan (Eight devices) 25 July 2008 Bengaluru, Karnataka (Eight Devices) 26 July 2008 Ahmedabad, Gujarat (21 devices) 29-30 July 2008 Surat, Gujarat (18 devices) 13 September 2008 New Delhi (Six devices) 29 September 2008 Modasa, Gujarat (One device) 29 September 2008 Malegaon, Maharashtra (Two devices) 01 October 2008 Tripura, Agartala (Five devices) 30 October 2008 Guwahati, Assam (18 devices) 26-29 November 2008 Mumbai, Maharashtra (Multiple Attacks & Blasts) 27 September 2008 New Delhi (One device) 01January 2008 Rampur, U.P (Two devices)
  • 6. Circa 2010: Transition Patterns - Naxalism Discontent among the 'strategic' arm of Naxals differences between groups supporting armed struggle and other, ready for negotiations Military arm of Naxals becoming aggressive Religion and caste becoming an issues Leveraging the political forces Ambiguous leadership Discontent among members Clash in recruitment and funding sources Naxalism in Transition Naxal Organization Indian government actions and 'reactions' Absence of constructive and 'crowd pulling' ideology
  • 7. Transition of terrorism in India (post 26/11) Transition of terrorism in India (post 26/11) Organised Crime Linkages (local & international) Meticulous operational and strategic planning Recruitment is becoming local focusing on those working in factories and computer literates from big cities Emergence of India as a target of transnational terrorism Expanding logistical homebase Still 'waiting' to carry out mass large scale attacks Impacted by neighborhood Geo-strategic forces
  • 8.
  • 9. Challenges for the security forces Terrain & Demographic Information Intelligence collation from diverse sources Network centric operations & comd & control Technology Platforms Evolution of Organized crime Development of the Concept of Operations Strategic Challenges
  • 10. Challenges for the security forces (Intelligence & Ops) Information availability in multi agency envt Leveraging on predictive patterns Managing short term and long term op activities Planning and monitoring Information asymmetry Command and Control The single largest challenge is the creation of actionable intelligence for actual op execution
  • 11. The Intelligence Stack Strategic Intelligence Operational Intelligence Tactical Intelligence Tactical Intelligence Operational Intelligence Strategic Intelligence Intelligence Consumption Intelligence Creation
  • 12. Technical Intelligence + Human Intelligence Predictive and Investigative Intelligence Intelligence Needs Granularity - Data Cubes WHY WHAT WHERE WHO WHEN
  • 13. Convergence – Human Int and Tech Int Intelligence Agencies - Databases Administrative - Databases Tech Intelligence Datamining Processing Raw Data into Usable form Better Information Collection Internet based information collection and investigation (Track Back) Enhanced Prevent-Prepare-Respond-Recover Structure Identifying Triggers & Patterns Automated analysis of structured & unstructured data Human Intelligence © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty
  • 14.
  • 15.
  • 17. Unconventional Conflict & Intelligence Management System (UCIMS)
  • 18. Intelligence collaboration process Intelligence sources Socio political events Demographics Sat images, maps Technical inputs Data repository - Raw data - Analysis of data - Intelligence creation - Intelligence distribution Actionable intelligence Tactical decision making Intelligence collaboration process
  • 19.
  • 20.  
  • 21.  
  • 22. Combining Data Mining and Link Analysis
  • 26. Network Analysis and Data visualization (1) Manually creation of association matrix by identifying the relations through raw data (2) Helpful in investigation, becomes ineffective where datasets are very large (1) Graphically representation of insurgent networks using tools such as Link Analysis (2) Helpful in visualization of large amount of relationship data but without analytical functionality. (1)Advanced analytical capabilities to assist investigation (2) It can help in identifying networks to mining of large volumes of data to discover useful knowledge and create intelligence about the structure and organization of criminal networks - Data Mining - Social Network Analysis - Pattern Tracing and interactions © 2010 - Orkash Services Pvt. Ltd. … ensuring Assurance in complexity and uncertainty Manual Graphics-based Manual Structured
  • 27. Past historical factual information
  • 28.
  • 30. Naxal Emerging Fault lines Castes and tribes Within tribes Inter-state leadership CPI (Maoist) and frontal organizations Splinter groups The direction these splits take as the government action on all fronts intensifies will have a major bearing on the future of Naxal movement and strategy in India Naxal Movement
  • 31.
  • 32.
  • 33.
  • 34.
  • 35. Basis for Risk Mitigation - (Case Study) Low Risks They do not require the formulation of a risk mitigation strategy at this stage of exploration work Moderate Risks Awareness about factors and influences that drive these parameters, and regular monitoring are required. The threats from these risks however will not have a direct impact at this stage Extreme & High Risks Those areas that register a 15+ total on freq * severity require active risk mitigations strategies to be in place
  • 36. Sample KRI Parameters & Triggers for Risk Intelligence Framework (a large mining project in India) - (Case Study)   Common Borders   Topography   Forest Cover that indicates Naxalite hideout zones   Rivers — that could potentially lead to crime and water politics in the future. Seasonal floods, as well as shortage of irrigation water in certain seasons lead to incidents of violence, crime and clashes amongst villagers   Location of a particular district   Population   Incidents in the district   Nature of criminal groups   State of police and governance   Presence of Naxalism (The number, strength and method indicate the pos sibility of Naxalite Attacks)   Ammunition recovery and Arrests within a district (Reflects the strength of the network) Crime/Extremism Geography Local Political Situation   Constituency representative   Opposition parties   Influence of Naxalite political groups   Local support for Naxalites/ political party A constituency with high profile candidates and major political parties attract Naxalite attacks and the crime - politics connection Socio - Economic   Economic Profile   Literacy   Occupation   Youth — education and employment   Percentage of SC/ST * in total population -- A high risk socio - economic profile can provide flashpoints for the future -- The youth form a substant ial part of the “new criminals” * SC/ST – Scheduled Cast e s / Scheduled Tribes Land Politics   Type of Land   Yield   Size of holdings   Land Clashes Caste - based attacks and crimes result in human loss and psyc hological fear in an area Road + Rail   Presence of NH/SH in the district   Condition of roads and rail network   I ncidents on both   Accidents   Closest railway stations and alternative ways of access Infrastructure   Hospitals   Banks   Electricity/Power sup ply   Telecom Circle   Water Local Sentiment   Attitude towards foreigners   Attitude towards Mining   Protests   Mobilizers — NGOs, Pradhans   L ocal media Businesses   No . of Businesses in the area   Year of start and closure   Nature of Business   Ratio of Businesses closed to open Natural Hazard   Earthquakes   Floods   Monsoon   Drought
  • 37. Risk Visualization / Risk Map – Mining Project - (Case Study) Disruptions Methods of Stalling High Risk Medium Risk Low Risk R I S K I N T E L L I G E N C E Vulnerabilities Associated with Legal, Regulatory, & Policy Issues Demonstrations, Strikes Security/Loss/ Sabotage Instruments which can make this happen Extremism/ Crime Political Dynamics People’s Right Activists Local Social & Community Issues Local Contracts Resettlements Pollution Environment Local Employment Socio - Economic Reasons
  • 38. ORKASH-UCIMS on a geospatial platform
  • 39.  
  • 43. Tracking events news with location based search
  • 44. Advanced Search Techniques for Location Intelligence
  • 45.  
  • 46. Monitoring Movement of Tactical Assets
  • 48.
  • 49.
  • 50. THANK YOU Orkash Services Pvt Ltd 75 C, Sector 18 Gurgaon 122 015 Haryana, India Phone: +91 124 4033773 +91 98102 36020 [email_address] .com www.orkash.com
  • 51.
  • 52. Changing security landscape of India India has experienced a continued and an almost consistent security problem pertaining to: -Naxalism - Insurgency -Extremism -Organized crime Drivers of Transition: -Operational Sophistication -Ideological Evolution India's internal security scenario is in a very 'delicate' and a 'vulnerable' stage Unconventional conflicts and deteriorating security mechanisms have forced us to think beyond the routine 'guard and police' protection Essentially non existent, it is high time that India focuses on homeland security protection Long history of terrorism Terrorism Transition Internal Security Security Evolution Homeland Security
  • 53. Homeland security in India Increased focus on HLS post 26/11 Fragmented structure of HLS sector Technology Modernization New Technology Introduction Information Synthesis
  • 54.

Notes de l'éditeur

  1. ghghghghgh
  2. Need of the hour is to converge the existing resources of HUMINT as well as technology to enhance real time intelligence and be able to predict the unforessen by understanding patterns - which is humanly not possible and not achiavable
  3. Warfare and intelligence is becoming very complexed and just having HUMINT is not enough and therefore needs more network based approach which collates as well as demistifies the intelligence from unstructured data bases to structured analyses to derive the intelligence – Helpful in 9/11 and 26/11 kind of investigations