securitylinkindia

India has been the Victim of Cyberterrorism

By Colonel B. S. Nagial (Retd.) Cyberterrorism is a global phenomenon but not much recognised in India. However, India ranks second highest user of the Internet after China. It is estimated that about 20% of the Indian population uses Internet facilities. In contrast, in the US and UK, 90% of people use the Internet. And people who use the Internet facilities are also called ‘Netizens.’ The over-dependence on the Internet increases susceptibilities & weaknesses. Sometimes the feelings of aggression are transformed into anger and revenge, which turns them into criminals. Most people in India aren’t sensitive to cyber threats posed by the virtual world. Information Technology (IT) has opened a plethora of opportunities for the world to develop its financial infrastructures and other e-commerce facilities. Cyber crimes are increasing daily. The ‘netizens’ are ignorant and in denial that their activities are safe and secure. We usually share our important & sensitive data & information inadvertently on social media. The momentous growth of the cyber world has further posed the threat of cyberterrorism. Cyber attacks depict lethal and non-lethal psychological problems faced by people. Cyberterrorism is typically considered a tool that only affects the national security system. But in fact, it also affects the psyche of the people. Cyber terrorists have increased the employment of cyber attacks dramatically in the past few years. It has caused mass destruction & damage to various facilities such as health, energy, nuclear, and critical command & control facilities. Cyber professionals are at work to reinforce capacity-building measures to restrain cyber attacks on critical systems in India. What is Cyberterrorism? As per the dictionary, cyber-terrorism is ‘the motivated use of computers and information technology to cause extreme interruption or extensive fear in society.’ Dorothy Denning, a professor of computer science, has given the most notable definition of cyberterrorism. He has put forward an admirably unambiguous definition in numerous articles and in her testimony before the US House Armed Services Committee in May 2000 – Cyberterrorism is the conjunction of cyberspace and terrorism. It denotes illicit attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people. Also, to qualify as cyberterrorism, an attack must cause violence against persons or property or inflict sufficient harm to cause fear. Attacks which cause death or bodily injury, explosions, or severe economic loss are a few examples. Grave attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Cyberterrorism is a deliberate attempt, which is a politically, socially or religiously inspired attack against information systems, programs and data. The definition is occasionally expanded to include any cyber attack that intimidates or generates fear in the target population. Attackers often do this by inflicting damage or disruption to critical infrastructure. Cyberterrorism is also known by terms such as electronic terrorism, electronic jihad, information warfare or cyber warfare. The fact is that cyberterrorism threats can come from so many different sources, and sometimes it would seem impossible actually to defend ourselves from them. Objectives of Cyberterrorism The fundamental objective of a cyber-attack is hacking, generally to satisfy the ego of hackers by creating terror. Sometimes it seems too similar or overlapping, like cyber attacks and cyberterrorism. The objective of cyberterrorism is to instil feelings of terror in the mind of cyber victims. Cyberterrorism also threatens the most vulnerable points covering physical and virtual worlds. It includes the commission of acts of destruction, alteration, acquisition and acts of transmission against the following: Defence forces. Internal security system. Health care system. Financial infrastructure. Other important civilians networks. Destructions of supervisory control and data acquisition system of smart cities. Information and Communication Technology (ICT) may be used to help the commission of terrorist-related offences. It can be promoted to use, promote, support, facilitate, and engage in acts of terrorism such as spreading propaganda, recruitment, radicalisation, incitement to terrorism, terror financing, training planning and execution of terrorist attacks. Modus Operandi of Cyberterrorism Cyberterrorism is gaining far-fetched attention due to extensive reporting by the media and numerous other institutions, both from the public as well as private sectors. They accept that cyberterrorism is capable of rendering catastrophic impacts. Thus, it is imperative to share awareness among the general public to alleviate cyberterrorism threats effectively. Most cyberterrorism cases have numerous common traits. It is essential to clearly define what a cyberterrorism attack looks like to avoid misunderstandings leading to confusion later on. Usually, the victims of cyberterrorism attacks are specifically targeted by the attacker(s) for predetermined reasons. There have been random cases of cyberattacks carried out in the past, such as releasing harmful viruses and worms through the Internet. However, in reality, the targets were arranged by cyber terrorists. This is because if the attacks are more focused and intended towards an explicit target, there are better chances of inflicting severe damage on the target chosen. The most common objective of cyberterrorism is to inflict damage or destroy completely a particular target which may be an organisation, industry, sector, or economy, or to impact particular targets. These types of attacks are becoming popular. Thus, specific countermeasures will be required to prevent the targeted entities from falling victim to such attacks. One more common feature of cyber terrorism is the resolve which is to further the terrorist or terrorist groups’ own goals, such as to inflict heavy damages on the former employer due to unsettled disputes or to create chaos among the general public. Cyber terrorists deploy various types of cyberterrorism attacks. As per the Center for the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School in Monterey, California, USA, cyber terrorism capabilities can be grouped into three main categories; simple unstructured, advanced-structured and complex-coordinated. Simple-unstructured This is the fundamental capability to conduct hacks against individual systems employing tools created by others. This type of organisation possesses little target analysis, command and control skills, and limited learning capability. Advanced-structured This is the advanced competence to conduct more experienced attacks…

Read More

Augmented Computer Vision: Technology, Application and Benefits in Visual Inspection & Content Monitoring

Prakash Prabhu – Chief Business Officer & Co-Founder, VisionBot In this feature, we will together discover the basic concept of Augmented Computer Vision, it’s use in the real world to automation of tasks, turn images and video in to strategic information, and build exception based alert reporting. We will also consider industry use cases and what we should consider when implementing AI/ ML driven visual content monitoring applications in any organization. Augmented Computer Vision To augment means to improve, enhance something and get more specific and detailed information. The goal is to use artificial intelligence and machine learning to derive enriched cognitive information from computer vision video data also known as cognitive augmentation or Augmented Computer Vision. Purpose Augmented Computer Vision focuses on using artificial intelligence (AI/ ML) tools in an assistive role to enhance the partnership between human and artificial intelligence to enhance cognitive performance for better visual content monitoring and inspection application. Technology System delivering augmentation use artificial intelligence technologies to complement human output. Augmented AI uses technologies such as: Machine learning: Systems learn from data to identify patterns and create a feedback loop to learn and improve. Logical reasoning: This uses logical techniques to rationalize and assist in conclusions and deductions based on available data to solve problems and make predictions. Spatial navigation: They are designed to work with temporal and spatial information. Machine vision: This enables a computer to see for automatic analysis and inspection. Pattern recognition: This is automated recognition of patterns within data by spotting regularities or irregularities. Functions Augmented Computer Vision employs five main functions: Detect: Video data is fed to the system; detection & classification is then derived from. Identify: As new data is input, the old data is analysed, and new data sets are identified. Classify: The new data set then defines results. Assess: Humans then provide feedback on the results or output, and the system is adjusted. Respond: Defined processes are used to ensure compliance and security for risk management. Augmented Computer Vision can Enhance operational decision-making. Save time by sorting through high volumes of Video data. Drive profits and reduce risks by successfully predicting patterns. Remove human error and bias in data interpretation. Allow operators to make more accurate data-driven decisions in real time. Augmented Computer Vision is meant to in crease the intelligence of both, the computer and the human user. When used properly in tandem, man and machine can be smarter together. AI and augmented data from Visual Content Monitoring can open the door for more creativity and new innovations by assisting and enhancing human capabilities. Application of Augmented Computer Vision The spectacular development of Deep Learning approaches, has revolutionized video analysis and its applications. Computer Vision techniques have moved from classic use cases (e.g., Triggering an alert if the camera image gets too dark or changes drastically) and has since moved to systems capable of identifying specific objects in an image and tracking their path. Augmented Computer vision is proving to be a game-changer, with a plethora of applications in Visual Content Monitoring and Visual Inspection Monitoring applications in virtually every industry, allowing it to leverage the power of deep learning and, as a result, provide faster, cheaper, and superior automation. Primary use case would be for Automated Visual Inspection (AVI). Areas of Requirement It is that is required in both continuous and discrete operational scenarios. In non-production contexts, a visual inspection can be used to evaluate whether the traits indicative of an ‘object or behaviour’ are present and prevent possible negative consequences, similar to how it is used in manufacturing for quality or defect evaluation. There are numerous other industries where visual inspection is used and till now is done manually as it was considered a high-risk area. How Automated Visual Inspection using Augmented Computer Vision is better than Manual Inspection Automatic image correction. Higher processing speed. Remote operations. Wider spectrum coverage. Higher accuracy. Zero fatigue. Scalable. Self-learning ability. Use past data for automated learning. Accurate model predictions. Real World Industry Applications Construction Manufacturing Warehousing & logistics. Warehousing & logistics. Healthcare Retail Food & hospitality. Smart & safe cities. Sports analysis. We will endeavour to cover each Industry application use case in details in subsequent features. Today we will focus on how VisionBot™ driven automated reporting and exceptional alerting helps construction companies become more safe, efficient and profitable. Ai Driven Automated Visual Inspection Monitoring for Construction Industry VisionBot™ is a platform that leverages the scalability and availability of cloud services to offer its Augmented Computer Vision based solutions. VisionBot™ helps businesses get the most out of their visual content, thereby deriving powerful insights and driving decision making. Designed as a cloud based Software-as-Service (SaaS) model, it lets any customer start using the system with minimal investment. VisionBot™ is offered as an on-premise service in Hybrid/ Private Cloud/ Data Centre for enterprise requirements. It is an adaptive platform and learns on its own, to deliver required outcomes depending on enterprise use cases. There are several use cases of Visual Monitoring for the Construction sector. With its wide stretch of land and real estate variety of vehicles and equipment and large number of workers and supervisors, visual monitoring of assets and human resources helps address both occupational safety and operational efficiency. Therefore construction sector has several use cases where Automated Visual Monitoring is a compelling need. Visionbot™ helps automating several functions in construction that are tedious/ dangerous for humans or erroneous under human monitoring. We use advanced AI and machine learning tools to train an algorithm to distinguish different things in an image and automatically report on anomalies. Turn images into information to provide real-time detection of events, things of importance and anomalies on the site. This information can be used to better assess productivity, security, risks and hazards. It is also a cost-efficient option where there is a need for large manpower: Workplace safety and compliance. Inventory management. Routine and special inspections. Attendance and access control. Theft protection & vandalism. EHS & EPC safety monitoring….

Read More

CAPSI MEETS YOGI

A delegation of Central Association of Private Security Industry (CAPSI) led by Chairman Kunwar Vikram Singh has recently met the Hon’ble Chief Minister of the state of Uttar Pradesh (UP) Yogi Adityanath Ji Maharaj, at his residence in Lucknow. They discussed the matter of security training institutes in the state and explored the opportunities. The delegation briefed the Chief Minister about the activities of the Association. Mr. Yogi informed the delegation that his government is starting extension campus of Rashtriya Raksha University (RRU)  in the State. The Chief Minister said that his government is setting an extension campus of RRU for security studies especially in forensic sciences. He also assured them that more training centres for private security shall be approved soon so that training as per Private Security Agencies (Regulation) Act, 2005 (PSARA) can be imparted to all the security guards and supervisors working in the state of UP. Kunwar Vikram Singh congratulated Mr. Yogi for bringing law & order situation in the state under complete control so that businesses can invest in the state. CAPSI members also assured the Chief Minister that soon majority of security guards will be trained as per the  BIS standards (Bureau of Indian Standards) which will further motivate investors about the security of their assets and people. Om Kumar, MLA & CAPSI State Chapter President, N P Singh Working President, Ravinder Singh, Vice President and Ashish Sisodia Convenor of Western UP Chapter of CAPSI attended the meeting along with Mahesh Sharma, Secretary general, Anil Puri,  VP, and Sudhir Bhasin VP, CAPSI. As the spokesperson of CAPSI informed, a delegation of CAPSI shall be meeting the Chief Ministers of most of the States to establish better understanding between the government and CAPSI. They also proposed to set up four Centres of Excellence (CoE) for security courses for middle level operations & management. Central Association of Private Security Industry (CAPSI) is the preeminent organization for security professionals which has emerged as an elite association. CAPSI’s governing processes are being guided by an eminent Board of Governors having former Army Generals, Veteran Police and Para-Military officers, high ranking Intelligence Professionals from Central Bureau of Investigation and premier governmental intelligence agencies and renowned Risk Managers. CAPSI is functioning as a federal body which represents the interest of entire Private Security Industry (PSI) of India. It operates through its State Chapters constituted in every State of the Republic of India. Each State Chapter is being governed by an executive council.  

Read More