Government Technology

    Digital Communities
    Industry Members

  • Click sponsor logos for whitepapers, case studies, and best practices.
  • McAfee

Tech-Savvy Terrorists Force India to Adopt Hi-Technology

Bangalore Terror Bomb Search
Bangalore Terror Search

July 30, 2008 By

Bangalore Police using hi-tech sensors to search for unexploded bombs. Photo

As the Indian government struggles to pinpoint the culprits behind two back-to-back terror strikes that hit India over the weekend, it appears that the government has finally realized it has few options but to bank on technology to curb sharp escalation of terrorism within its borders.

Last weekend was perhaps the most macabre weekend in a long time for India. The country was rocked by 24 bomb blasts within a span of just twenty four hours. The quick succession of terror attacks was. unprecedented in India. Bangalore, the global IT hub was the first city to be hit on Friday when chain blasts of 8 bombs went off over four hours in congested market places, killing two and injuring eight. Just 24 hours later, while Bangalore was still recovering from the shock, 16 similarly orchestrated blasts, deadlier and more brutal, rocked the northwestern city of Ahmedabad, the capital of Gujarat, killing another 48 and injuring more than 100. Even now, unexploded bombs are still being discoverer from another major town in Gujarat, while all major cities like Chennai, Hyderabad and Kolkata are getting inundated with bomb threats to mock the nation's vulnerability to terrorism.

Like the dozen -odd similar terror attacks since 2004 that took over 3800 lives, the authorities this time round too had no clues that the attacks were coming, or who did it, and why. The reasons for this failure are many: lack of intelligence, lack of adequate security cover, and lack of alacrity are some of the significant ones. But an equally significant reason is the inability of all authorities, local and federal, to apply and use technology for monitoring and nabbing terrorists. In fact, the terrorists usually have manage to remain a step ahead with innovative use of technology.

"Terror groups are outsmarting the intelligence set-up in both tactics and technology," says Shashi Kant, additional director general of Punjab Police.

For instance, after each of the four blasts in the last year, the terrorist have sent emails to the media claiming responsibility for the blasts. And although the servers from which these emails originate were tracked, authorities failed to nab the culprits. Terrorists were tech-savvy enough to either hacked into those servers or cloned the IP addresses to erase their trails.

Similarly, the terrorists use cell phones freely to communicate between themselves but such calls are rarely traced since the terrorists use a combination of foreign SIM cards and computer hacking to trespass into Indian communication networks making detection of the origin of the calls almost impossible. Besides encrypted emails and SMS services, the encryption keys of which are not available to the government, are also used extensively.

The weekend blasts too used high-technology. For the first time, instead of using timers, the terrorist used ICs to trigger the blasts at equal intervals and to even leave some of the bombs unexploded to convey the message that they can "strike anywhere and at will."

One reason why the government has been slow to harness technology for anti-terrorism efforts is lack of expertise and manpower. "Effective intelligence gathering network is lacking in the country," says an advisor to National Technical Research Organization (NTRO), an undercover agency under one of the country's intelligence outfit Research and Analysis Wing (RAW), requesting anonymity. "India not only lacks adequate technology infrastructure but lacks manpower and most importantly funding."

Nevertheless, it seems that the government has woken up to the urgent need to get more focusing on the use of technology. "The latest terror attacks have forced the government to go high on hi-tech," said the source from NTRO. This is evident from the slew of high-technology security measures that various authorities in India have adopted in the past few days.

| More


Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Digital Cities & Counties Survey: Best Practices Quick Reference Guide
This Best Practices Quick Reference Guide is a compilation of examples from the 2013 Digital Cities and Counties Surveys showcasing the innovative ways local governments are using technological tools to respond to the needs of their communities. It is our hope that by calling attention to just a few examples from cities and counties of all sizes, we will encourage further collaboration and spark additional creativity in local government service delivery.
Wireless Reporting Takes Pain (& Wait) out of Voting
In Michigan and Minnesota counties, wireless voting via the AT&T network has brought speed, efficiency and accuracy to elections - another illustration of how mobility and machine-to-machine (M2M) technology help governments to bring superior services and communication to constituents.
Why Would a City Proclaim Their Data “Open by Default?”
The City of Palo Alto, California, a 2013 Center for Digital Government Digital City Survey winner, has officially proclaimed “open” to be the default setting for all city data. Are they courageous or crazy?
View All