Sunday, July 24, 2022

Technology Trends - Challenges for Policing

 Technology Trends - Challenges for Policing


Article

Technology today is changing very fast. We have gone from landline to mobile phones, from self-driving cars to autonomous cars, from 2G to 5G technology and Internet and Social media portals have brought the world closer than we could have ever imagined. All these changes in technology have brought in different issues for citizens as well as law enforcement agencies. Whereas on the one hand privacy is very important for the dignity and liberty of any individual, on the other hand the tracing of evidence in this electronic age, its credible collection, production in the court of law and being able to convince the judiciary are things that the law enforcement is constantly being confronted with, looking at all the new technologies that are emerging so rapidly and impacting our lives like never before.

The law enforcement agencies today have to chase criminals who commit crime sitting anywhere on this planet, for whom geographical boundaries have become history and who commit crime in times less than nano- seconds. There are a number of technologies today, some looming on the horizon, which will pose tough questions for the law enforcement in times to come. The high standards of encryption being adopted by the industry today, the concept of machines talking to each other, the storage of data in cloud, 3D printing, artificial intelligence, block-chain, nanotechnology and dark net promise to pose serious questions for the law enforcement - starting from investigation to being able to convince the courts as per the law of the land. For successful prosecution the law enforcement will have to put all the pieces of electronic evidence together, collected from different sources and possibly different countries governed by different laws, produce it logically before the courts in a manner so that the law of the land is upheld and the guilty brought to the book – not an easy task by any standards.

This article is an attempt to understand the emerging technologies, its related trends and how they are impacting our lives every day. Some of these technologies as Artificial intelligence and Encryption have already made a big impact in our lives and the effects of these are being experienced by us each day. Artificial intelligence of Google scans our digital activities and sends us customer- specific advertisements. End-to-end encryption offered by WhatsApp has made this platform popular among people who want to talk privately and be away from the eyes and ears of law enforcement agencies. A huge impact of these new technologies has also been felt by the law enforcement agencies who are trying to understand the nuances of latest trends in the digital world. They are trying to understand the sequence of digital footprints left in cyberspace by these cutting edge technologies and how these can be collected by the investigating agencies and the wrong doer brought to the book. The battle does not end here. Many a times it becomes a tough job to make the judicial authorities understand the impact of these technologies and how these are being used by the criminals to compromise systems, steal data, extract ransom, stalk victims and sell illegal products on Net – to name a few of the digital crimes being committed these days. Through this article an attempt has been made to discuss some of these new technologies and trends today and how are they posing issues before the law enforcement agencies today – some tractable and some intractable. The current crop of investigators is also a mix of the old and the new generation. The new generation is able to understand technology, its nuances and the digital footprints and so is better placed to solve digital crimes. This article also highlights the lack of appropriate legislation today and how it has not kept pace with the challenges that technology is posing today. Since the Internet is an international playfield, it becomes difficult to have legislations having the same effect across all the countries of the globe. In times to come the law enforcement agencies will have to learn to cooperate and help out each other - formally and informally - if we are to lay our hands on the trans- global criminals and mafias who have spread their tentacles across a number of countries.  

I have hereinafter discussed some of the emerging trends and technologies and how they are impacting our lives and posing serious challenges to the law enforcement people in collecting evidence from different sources in different countries, putting them in the right sequence and finally try to convince the judiciary in a simple way that the criminal needs to be prosecuted as per the law of the land.  

 

Big data 

This term was coined in early 1990’s by John Mashey, working in Silicon Graphics, while referring to large sets of data which could not be managed or processed using traditional tools. Big data is what we are all confronted with after the proliferation of the Internet and the hugely popular Social media portals. 100 billion WhatsApp messages, 500 million Tweets, 350 million photos posted on Facebook, 95 million Instagram posts, 23 billion text messages and over 305 billion emails – this is the humongous data that we are all confronted with in ONE day. 

Big data is bound to reshape the way we live, work and think. Today almost all aspects of life are being turned into data. A complete datafication seems to be taking over all possible activities that we indulge in. Today companies and organisations are using all available data to make meaning out of it and help humanity understand and quantify the different aspects of our world. A large amount of information available is helping us today learn things that we could not comprehend or imagine earlier. All the emails, social media posts, tweets, phone numbers, age, sex, profession, place of work, number of friends etc can be studied to find patterns, correlations and causations for events and occurrences. The huge volumes of data spread across different platforms are being mined effectively by the corporates to send customer-specific advertisements. This data is also sold to desirous clients for a price, thereby compromising privacy of customers, as became well known in Cambridge Analytica case.  

The law enforcement authorities, have to virtually sweat it out to get the required juice from this huge data pile using keywords, strings, hash tags, geo-locations and user profiles to be able to shortlist on identity, occupation, modus- operandi etc of wanted persons. This kind of analysis does help the law enforcement agencies to deploy resources on crime/ areas for an effective utilisation of scarce resources. All this exercise is nowhere like trying to find a needle in a haystack but it is almost like trying to find a needle in an ocean. The amount of data that the law enforcement agencies collect in a routine manner are not collected by many other agencies. All this data if not analysed is of no value. With computing power increasing each day and storage becoming cheaper the law enforcement authorities are using advanced analytics and algorithms to search, aggregate and cross reference data so that meaningful information emerges. There are many email and social media platforms available for all to see which can be requested by law enforcement authorities through a court order for more information as metadata, which remains hidden from regular users. The law also authorises interception of communications over different platforms through a valid executive or a court order. With rise of technologies as IoT, Dark web, Blockchain, Virtual reality etc the challenges as well as opportunities available with law enforcement authorities have increased exponentially. The huge amounts of data produced by each technology, the near absence of tools and techniques available with the current day enforcement agencies to sort, sift and pinpoint the plausible alternative are challenges that exist. However data analytics as mapping, profiling or even predicting events are helping us appreciate the gravity of the dangers looming ahead and thereafter help us to prepare accordingly. The big data can be used meaningfully for predictive crime mapping and creating hotspots which would be based on type of crime, date/ month of occurrence, time of event, GPS locations, name of gang members etc. Data available publicly or obtained by court orders can also be analysed, churned and mined for patterns. All these help the law enforcement to utilise their scarce resources in a more efficient way by concentrating and supplementing their efforts in times/ locations/ seasons when the spike in crime is likely to take place rather than spread their resources evenly across all locations all the time. Machine learning algorithms used in conjunction with network analysis and data mining can help artificial intelligence throws up red flags and facilitate law enforcement agencies to come up with intelligent guesses to successfully shortlist and focus on crime and criminals.

 In this entire exercise privacy is a major area of concern as all kinds of data collection involves access to information of private individuals. To circumvent the reach of the authorities and to promote privacy a number of platforms have devised high grade end-to-end encryption and have even refused to accede to the demands of the government, as was exhibited in the San Bernardino incident relating to FBI and Apple. However most governments today insist on access to privately held information of individuals in the name of national security and sovereignty and wanting to detect crimes that affect society at large as can be seen in the number of suits filed by various governments against Google, Facebook, Microsoft etc relating to privacy and antitrust issues.

 

Dark web 

The origin of the word Dark Net can be traced to early 1970’s when such networks were planned in US for security purposes, as distinct from the ARPANET which later evolved into today’s Internet. This is that part of the Internet that is not accessible by normal search engines - is encrypted, anonymized and not indexed. It is because of these properties that the dark web has attracted a lot of illegal content and businesses too. However this platform has also proved to be a safe forum for whistle-blowers and political dissidents whose ideology and thinking is against the existing dispensation in a country. Access to dark web can be made by special browsers as Tor network or onion links. It operates on peer-to-peer principle and there is a network of sophisticated encryption and anonymization methods. The dark net is also a place where most of the illegal activities take place and stolen/ hacked / illegal data is sold for a price. The dark web gained notoriety in 2013 after the said perpetrator of Silk Road, who provided a platform for selling illegal drugs, was arrested in US after a long time. The dark web started using Bitcoins for its transactions as it was encrypted, made transactions pseudonymous and perfectly suited the beneficiaries who did not want to be identified and preferred systems which made things difficult to trace. The creators of dark net and bitcoin were certainly privacy minded but not ill intentioned. However their creations did not stop some from using this platform for illegal activities and also to get away from the prying eyes of law enforcement agencies. And it was all this anonymity and untracebility that made more companies like Silk road make forays in the dark web marketplace and take advantage of anonymity by providing a platform to deal in all things illegal – drugs, stolen credit cards, arms, ammunition, child pornography etc.

However the anonymity offered by Dark web works very well to the advantage of whistle- blowers and hacktivists also who use this platform to share information relating to inefficiencies of a government system, corruption in departments, scams and other acts which can possibly expose the wrong doings of a government. The dark web has been used by whistle- blowers like Julian Assange, Edward Snowden etc to expose the ill deeds of the government by sharing such information in the public domain. 

The law enforcement agencies find it very challenging to find vital information that is being exchanged in the dark web. All sites are encrypted, transmission and reception is through proxy servers, information is not indexed and each computer adds a layer of encryption to the message that only it can decrypt. However it is not uncommon for officers of different law enforcement agencies to be monitoring and investigating the dark web for not only keeping abreast of the latest trends in crime but also look for people peddling in stolen goods and selling illegal stuff. For the new generation of officers it is not too difficult a task to use this huge repository of information on crime and criminals for detecting scams, crimes which have higher gravity and which are difficult for the normal agencies to unearth. Since internet is inherently a trans-border issue, making legislation and regulations will always be challenging. There are some issues where all nations agree as pornography, child abuse etc but on a number of others as drugs, stolen credit cards, arms and ammunition etc there is not much agreement between different countries. The law enforcement agencies across different countries must therefore find ways to cooperate and evolve some basic agreeable tenets if they want to make effective use of the dark web because it is essentially a double edged weapon. It provides challenges and it also provides clues for all law enforcement to not only trace the wrong-doers but also to hold them accountable as per the law of the land.

 

Artificial Intelligence 

This term was coined by John McCarthy in 1956 to show that machines could exhibit intelligent behaviour. The world took notice of AI when in 1997 IBM’s Deep Blue defeated world chess champion Garry Kasparov and then again in 2011 when Apple introduced virtual digital assistant Siri. AI basically implies intelligence that is demonstrated by machines. The machines are made to learn to reason, plan, perceive and process natural language by means of computer algorithms which organize vast amounts of data into meaningful results based on certain instructions and rules. Our knowledge and understanding of AI today is seen in machines that understand human speech, do filtering based on our directions, raise red flags in banks and financial institutions depending on past records and patterns, compete at the highest level in games as Chess and Go, cars that navigate autonomously and in everyday events as Alexa (Amazon), Siri (Apple) and e-commerce portals which personalise our choices and offer products, learning from our shopping experiences etc. This field of science is based on the premise that human intelligence can be so accurately described that a machine can be made to simulate it. The accuracy and correct interpretation by any machine is dependent on the quantity and quality of data, the computing power available and evolving newer ways to solve and understand problems. However AI presents umpteen number of challenges too. The transparency in evolving algorithms without any corporate, social, ethnic or technical bias is a must. Any algorithm will be only as good as the data being fed. There have been reports about algorithms operating with racially biased data which totally subverts the end results, as has been brought out in Coded Bias - a 2020 Hollywood film. Accountability for flawed and biased algorithms is also an issue – whether the programmers or the users are to be held liable. The French have however set an example by declaring that all the algorithms used by the government agencies will be publicly available. 

 The law enforcement agencies have been using AI for predictive policing for some time now. Detection of online threats, identifying indecent images on Net, detecting unhealthy trends on Social media, identifying stolen vehicles by cameras, recognising known criminals by facial recognition are only some of the examples. With the huge amount of data being generated through cameras, video, social media, internet etc it is only AI that can detect crimes that would otherwise go undetected in the ocean of data and this will ensure greater public safety and increased public confidence in the criminal justice system. A number of cities in India are using facial recognition in the huge network of CCTV cameras to identify and track down known criminals. The same technology is also being used in the body- worn cameras by connecting them to the database of criminals and suspects. Suspicious behaviour of persons in public places are also picked up by AI for a detailed scrutiny before a conclusion is drawn. Huge amounts of crime data available with police for many years is being used to identify hot spots of crime or study its fluctuations in time and place. Similarly traffic related accidents and death data, studied over a period of time, have clearly revealed patterns that are predictable over time, place and month of the year. All these patterns are red-flagged by the AI embedded in the systems so as to forewarn the agencies that resources as manpower and equipment can be utilised more productively if these trends are noticed and action taken well in time.   

However law enforcement departments will be confronted with investigation relating to AI and it is then that they will have to look at the transparency aspect of the algorithms, whether at all there is any bias embedded into it – by oversight or by design, whether the data forming the basis of the algorithms is reliable and credible, ethical aspects associated with algorithms and whether any safety or security aspects are involved. All this will mean that the investigation team must have computer experts, software programmers, psychologists, legal eagles and many more. 

 

Blockchain

This ingenious invention was first introduced in 2009 by a person or a group of persons by the pseudonym Satoshi Nakamoto. He introduced the first peer-to-peer cryptocurrency – Bitcoin – with no intermediaries or any central authority. Blockchain implies an electronic ledger that is shared across many users. Each of its transactions creates a record that is time stamped and cannot be altered and all these records are linked to their previous one. The validation of these transactions is free and there is no central authority. The three sterling properties of any blockchain are decentralisation, transparency and immutability. 

 There is total decentralisation in the system as there is no central authority and the information available is open for all to see. All information held on a blockchain is shared across all persons and this gets continuously updated on the entire database. This implies that everyone in the network owns all the information. There are no intermediaries and so the transaction costs are zero. Thus this technology threatens all well-known intermediaries today as Amazon, Uber, AirBnB, Banks and financial institutions – all of whom charge a certain processing fee for all transactions made on these platforms. Blockchain gives a user transparency as well as complete privacy. Although a person is identified by his public address yet his real identity is concealed by a complex cryptography architecture. Thus his real identity is secure yet everyone can identify the transactions done by him by his public address. The third good quality about this concept is immutability or the inability to tamper with records once they have been entered. This is seen as a great asset for banks and financial institutions to check on frauds and embezzlements. Each transaction generates a hash value which is a string of numbers and letters. The cryptographic hash algorithm gives a fixed length to an input string of any length and this makes the output standardised and secure. Even a small change made in the input is reflected in a big way in the hash function. This is called the Avalanche effect, as this small change affects each block and gets known to all users in the blockchain. All records in a blockchain are permanent, placed chronologically and these are available to all other nodes. Since the database in not stored in any single location, hence it becomes difficult for a hacker to corrupt or hack the entire database. Since the nodes are spread throughout the world so capturing the entire network by hacking becomes virtually impossible as this would require a computer with enormous computing power. 

Banks and financial houses are experimenting with blockchains for ensuring secure tamper proof transactions. Critical infrastructure management is also venturing in this domain to ensure that data comes from authentic sources only. Academic credentials and other kind of property related documents can be authenticated using blockchain and made tamper proof and credible. Stock trading can also become more reliable if the chain of ownership becomes authentic. Since government working involves a lot of paper- based processes they can incorporate blockchain to minimize fraud and increase accountability and credibility in the system. All human resource based agencies can use blockchain to ensure correct background checks, past postings and date of birth issues – all of which are amenable to frauds. Publishing, Music industry, Pension programmes, Medical industry, Transportation, Accounting, e-Commerce etc are other areas which have started using blockchain to usher in more transparency, accountability and credibility in their systems.

 The law enforcement will be confronted with each of the above mentioned sectors to detect cases of fraud and embezzlement. In the investigation process blockchain can provide that extra layer of security and integrity to preserve the chain of evidence which becomes so very critical for prosecution to prove its case in the courts. The law enforcement departments will also have to come up with solutions which will red-flag any violations noticed in public records that are using blockchain. The requirement will therefore be of systems and software experts who understand blockchain and its intricacies. 

 

Cloud computing 

This term was introduced by Eric Schmidt in 2006 at a search engine conference at San Jose, California. This concept makes available ubiquitous 24x7 access to a shared pool of resources with minimal interference from any intermediary. The cloud model comprises of on-demand service, network access, resources available and a measurable service. The services provided can also be of varied types – software as a service, platform as a service or the infrastructure as a service. Today most of the people are beginning to store their personal data in the cloud as different from storing it on their PC’s till some years back. This architecture offers a number of benefits as economies of scale, reliability, scalability and all time accessibility. Files in the cloud are constantly updated, moved to different locations and their back up kept at different locations. Cloud computing’s distributed architecture permits data to be stored, processed and distributed over several data centres and numerous machines – all of which could be spread across different geographical locations and jurisdictions across the globe. There is complete decentralization of data centres, data logs and the physical location. The cloud service provider usually never informs the client about the location of his data storage and so the person who owns data has no clue about the actual location of this data. The cloud customer is also not able to collect network logs because the cloud architecture works under the control of the service provider. The service providers try and host their servers in countries which offer cheap data storage and have strict regulations regarding security, disclosure and privacy. 

When the law enforcement is faced with investigation of data stored in the cloud, the different locations/ countries make it difficult for them to obtain data about crime/ criminal activities because of different laws in different countries. The physical access to the servers, where the data is stored, is also at times technically not possible due to the remote locations of the servers in different countries. All this is in addition to the different operating systems, varied file formats, ever growing data size and the humungous storage devices that each investigating agency is confronted with during such digital investigations. Criminals these days are storing all kinds of incriminating data in such cloud servers which are spread in different countries and have strict laws regarding privacy and disclosure. A search warrant issued by one country may not have the same validity in another country. Trying to get a valid legal authorisation from the courts for search or seizure in another country may give the suspects or criminals ample time to modify, corrupt or even destroy the incriminating data which takes a few seconds only.  The main issue before the law enforcement is to collect data from different locations, governed by different legislations, connect them in a credible chain of evidence, ensure their proper custody and then try to convince prosecution and judiciary about the case. The lax response of the service provider and at times his ability to change/ corrupt the data in connivance with the criminals, when both are under investigation, are also issues that the investigator will be confronted with. Thus timely data acquisition is the biggest issue. The soundness of evidence, chain of custody and the admissibility of available evidence in the court of law will always be important factors in any investigation. Though tedious, time taking and difficult, yet the data retrieved from cloud sources could virtually be a goldmine of possible evidence for modern day forensic investigators. Therefore some kind of a common understanding needs to emerge between the law enforcement agencies all over the world to make timely information available to the law enforcement agency on lines of Budapest Convention 2004, also known as the Convention on Cybercrime of the Council of Europe, which serves as a guideline for international cooperation between countries which are signatories to this treaty. Only such measures can ensure that neither certain service providers nor some geographical locations become safe havens for unscrupulous elements. 

 

3D printing 

This concept came into being when Charles Hull invented Stereolithography in 1984. Patent related issues, however came in the way and not many people were able to use or explore this technology for a long time. Once the patents expired, this technology became available to people and with the rapid expansion of Internet this technology has reached places, it was never imagined. This technology basically implies manufacturing identical products using digital designs using product- specific printers. 3D printing has simplified manufacturing and it has democratised production by letting anyone produce goods in a do-it-yourself manner. The entry barrier in any field seems to have been broken. It has cut short the supply and the distribution chain because people are now manufacturing products with the help of computer-aideddesigns which are openly available on the Internet- either for free or for a price. These products are also customised to suit the specific needs of the user. The rapid spread of internet and the availability of all kinds of sophisticated designs available in open source has given a boost to 3D printing which has found good use in design industry, healthcare, prosthetics, construction, weapons, automobiles etc. 

The law enforcement was forced to sit up and take notice when Cody Wilson of US made a functional plastic gun in 2013 using 3D printing and thereafter posted the blueprint on the internet which was downloaded over 1,00,000 times. People have now produced accessories to different firearms sitting in the cosy comfort of their homes. It should not be surprising if people start making guns and other firearms resembling everyday items using 3D technique to escape the eyes of the enforcement agencies and the law. Criminals have CT scanned different kinds of locks and thereafter produced master keys using this to gain access to secure and protected areas. In Europe some have produced fake ATM facades to clone the data from the card users and thereafter used it to defraud card owners. Availability of digital designs on the open internet or the Dark net has created the possibility of huge amounts of fake branded products in the market. Although counterfeit goods are available even today but the easy availability of 3D printers would mean the production of such counterfeit goods on a large scale is possible in a decentralised manner by regularly shifting the place pf production. In not too distant a future, we may even be confronted with 3D printed illegal drugs, human organs or even weapons of destruction. 

The law enforcement agencies are also using this technology to their advantage by reconstructing the scene of crime, producing robotic arms for bomb disposal etc. This technology can be used to re-construct the scene of crime and to logically and pictorially explain the sequence of events to the courts for better appreciation and understanding. 3D scans of mutilated and disfigured bodies can lead to a better understanding of how the crime could have been committed and to explain the bullet marks, bodily injuries and better understand the sequence of events. How the law enforcement can prevent crooked minds from making illegal weapons, counterfeit goods, illegal drugs etc is something only time will tell. IP infringement will be a major issue that will need to be tackled. Legislation as Undetectable Firearms Act of the US will have to be thought of. But even when such illegal acts are found out, the tough job will be to trace the origin of the crime, the creator of the design and how he made it available to other perpetrators - who may have either committed the crime or were into preparation or making an attempt at it. Tough questions will arise regarding accountability as who is to be held liable – owner of the 3D printer, manufacturer of the printer, person who supplied the raw material to make the product or the person who committed the crime. Accountability for crime will take a completely new dimension. Rather than supplying illegal weapons, narcotic drugs etc to fellow criminals the smart criminal will now merely supply the digital designs to fellow criminals who in the privacy of their homes will be able to produce illegal weapons/ drugs. The evidence will have to collected from the original and other related digital printers, relate it to the products developed, tag it to the crime planned/ attempted/ committed and thereafter by applying appropriate legislation produce them before the court as per the law of the land. However criminal minds will always challenge the enforcement agencies by coming up with softwares as Disarming Corruptor which can use algorithms to conceal blueprints and bypass filters when they are posted on the internet.

 

Internet of things 

This term was coined by Kevin Ashton in 1999 when he was working on a project and wanted his management to look into this exciting technology. This idea had existed since 1970s when it was referred to as embedded internet. However today IoT is referred to as a network of devices that are connected to each other, talk to each other and share data based on algorithms over Wi-Fi/ Internet. It is estimated that today over 26 billion devices are connected to each other all over the world. The main sectors where this technology can be seen are smart cities, industrial devices, health related wearables, security gadgets, home appliances etc. Today we are seeing an implosion of IoT devices like Fitbits, smart cars, smart watches, mobile phones, virtual assistants, smart home appliances, CCTV cameras etc. This technology is spreading very rapidly and is expected to see exponential growth once the Internet moves from 4G to 5G. With hundreds of devices connected to each other, the crime scene of tomorrow will virtually be the Internet of things. 

The challenge before the law enforcing departments will be to quickly gather all related digital data and find out the digital presence/ absence of suspects and their accomplices and thereafter link the crime to the criminal. As the digital footprints at any crime scene increases so does the ability to collect, interpret and filter information using sensors, cloud infrastructure, advanced analytics and different algorithms. However as the race to connect more and more devices goes up, the manufacturers could possibly become lax towards ensuring strict security protocols and this is when these devices will become targets for hackers who can gain access to different networks and then either corrupt, compromise, disable them or seek ransom amounts for making them normal once again. Privacy of data and the requirement of law enforcement authorities of the same set of data for investigation will be ticklish issues that will have to be sorted out by appropriate legislations.

The enforcement agencies in India are already familiar with this technology. The tracking of errant drivers on the road using smart cameras which after recognising the registration number of the car, compares it with the Vaahan database and thereafter sends the traffic challan to the centralised database as well as on the mobile number of the car owner using the Sarathi database. Body cameras transmit data to the central server to look for known criminals as well record transactional events for record. Drones and other surveillance devices also transmit data to a remote location where this data is collated, filtered and meaningful data retained for use. The challenge for law enforcement agency at any crime scene will now be to understand the number of devices that are connected to each other, the evidence present in each device, collect all such digital evidence, ensure correctness in the chain of evidence and finally produce it in the court of law. Thereafter the prosecution and the judiciary also needs to be convinced about the credibility of evidence collected and the veracity of the digital evidence collected from different devices before a criminal can be prosecuted. Remote access in this technology also enables devices from across the borders to talk to each other which might involve collecting evidence from a different country which will imply different laws, mutual treaties and international relations – an extremely time taking task. Tackling encrypted data across IoT devices can also pose issues during investigation. However using more and more digital footprints to track down the criminals can only help in understanding the trends in crime, save time and money for organisations, increase the confidence of public in enforcement agencies and finally assist the courts by producing incontrovertible digital evidence before the courts. Faster analytical and scientific responses from the investigative agencies will improve the reaction time and give quality output which can act as a deterrent for the wrong doers and tackle problems before they assume epidemic proportions. IoT is therefore a double edged sword – though it opens up many windows for the wrong doer to compromise systems, the opportunities available to the law enforcement departments also increase manifold and this clearly outweighs the downside that exists in this game.

 

Encryption 

This word has its origin in the Greek word kryptos meaning hidden and graphein means to write. This technology scrambles data in a manner so that it becomes unreadable to intermediaries and to all those for whom it is not intended. The objective of this technique is to jumble up data that is being sent so that it appears like garbage to one who is not authorised to see it. There are many technologies to encrypt data and these come in many forms with the key size and strength being the basic differences. Encryption is essentially of two types – Asymmetric and Symmetric. The Asymmetric encryption uses two different keys – public and private – to encrypt and decrypt data or message. RSA (Rivest- Shamir- Aldeman, names of scientists)  is the most popular example of this category. Symmetric encryption involves only one key called the secret key which is used to encrypt and decrypt data. Examples of this technique are Triple DES (Data Encryption Standard), Blowfish, Twofish, AES (Advanced Encryption Standard) – each of which differs from the other in terms of individual keys and bit length. These are known for their speed and overall effectiveness and are used by e-commerce and secure payment platforms. In fact AES is the algorithm most trusted by the US government. It is a very secure platform because it uses 128, 192 or 256 bit key for encryption and decryption. With even a 128 bit key the possible values come to 2128 which makes it virtually impossible for even the fastest supercomputer to crack the code in a foreseeable time domain. Since the computational requirements of this algorithm are low, AES is popularly used on all laptops and smartphones which support Android, iOS, Windows etc. This encryption can be seen on popular applications as WhatsApp, Signal, Telegram, WinZip etc. 

 With cyber-attacks becoming an everyday affair, security specialists are ever busy trying to evolve newer techniques to keep data safe. Whether it is email, stored data or chat, some kind of encryption is required to safeguard the integrity of data. Data of 533 million users of Facebook from over 100 countries was hacked and was available for sale in early April 2021. Similarly data of over 500 million users of LinkedIn was also up for sale in second week of April 2021. India does not have a very robust data-protection regime and the Personal Data Protection Bill 2019, presently under scrutiny of the Joint Parliamentary Committee is a step in the right direction. This Bill seeks to apply Data protection regime to both the government and private entities and emphasises data security and data privacy. Meanwhile the government of India has introduced Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 which has come into force on 26th May 2021. These rules mandate that the platforms and publishers will have to inform I&B Ministry about what they publish, nature of content and size of subscriber base within 30 days of notification of these Rules. Social media platforms will also have to reveal the first originator of a post in response to a court order or a request of law enforcement within 72 hours in the interests of sovereignty and integrity of country or other specified grave crimes apart from appointing a resident Compliance officer, Grievance officer and a nodal contact person.

 With the fast pace at which IoT is expanding the cybercriminals will get that many more ways to gain access to systems and data. Each not-too-secure device will provide a window for the unscrupulous elements to get into unsecured systems and compromise data. But, as can be seen from above examples, even the strategy to encrypt everything is not working. The idea should be to have maximum Integrity in the system. How to safeguard the encryption keys and the digital certificates is the key. Snowden compromised the credentials of his administrators at NSA who had access to encrypted data and he used this to gain access to highly classified data which he later revealed to the world. Similarly data of Lockheed Martin was also compromised, not because the encryption was cracked, but because the RSA SecurID tokens were stolen.   

Though privacy is a good thing for the common man, this technology is also being actively used by criminals, anti-national elements and nefarious people who want to secretly talk about their plans, conclude deals and set rendezvous points for delivery of illegal goods - all away from the prying eyes and ears of law enforcement agencies. The most common example today is the extensive use of WhatsApp with its end-to-end encryption which is almost impossible to crack. There are also a number of email services as Lavabit, Hushmail, Protonmail etc which are end-to-end encrypted which espouse the cause of civil liberty activists and promise complete digital privacy and zero access to email/ data of clients. Even those empowered under the law, are unable to decode them. These are causing serious problems for the law enforcement authorities today. Even ex President of US Barack Obama said “you can’t have 100% security, 100% privacy and zero inconvenience”.

 

Conclusion

With the pace at which India is galloping in the Digital age, it is imperative that the law enforcement agencies all over the country understand and appreciate the technology trends today, train their manpower to face the challenges, associate experts from various fields to understand the nuances of each technology and also educate the prosecution and the judicial system if some tangible results are to be seen, else it will be a case of the left hand not knowing what the right hand is doing. It is only when a synergy develops between the different systems that the people will develop confidence in the law enforcement agencies and they will be a step ahead of the criminals and bring them to the book diligently and professionally.  ( 5982 words )

***************



(Published in The Indian Police Journal - July- September 2021 issue)

Sunday, October 17, 2021

Drone Swarm has arrived

 

Drone Swarm has arrived

 

The first attack by a Drone swarm probably took place in Syria on 19th January 2018. A Russian air base, with a naval facility nearby, detected 13 flying objects on its radar, speeding toward them. They did not look like aeroplanes and were flying very low. The Russian air defences were able to shoot down seven of these and jammed the remaining six. These drones, it was later learnt, were all loaded with explosives. This multi- pronged attack on a military facility, though neutralised, raised eyebrows about this new kind of attack and a new paradigm in aerial warfare. A similar incident happened in Sep 2019 when non- state actors sent a swarm of 18 drones and 7 Cruise missiles to attack the Abqaiq and Khurais oil facilities in Saudi Arabia. These drones allegedly fired by Houthi rebels, were low flying, not too sophisticated but were able to slip through the high- tech air defences installed by US and France. They caused a lot of damage to the Saudi refineries and the world crude output fell by almost 5% i.e. 5.7 million barrels in one day. The US ambassador to Israel Daniel Shapiro commented on this major slip-up by saying - the US supplied air defences were not oriented to defend against an attack from Iran, that's incomprehensible. If they were, but they were not engaged that’s incompetent. If they simply weren't up to the task of preventing such precision attacks that's concerning. 

It was later learnt that the drone swarms launched on the Russian air base and the Saudi Arabian oil refineries were not too sophisticated and did not carry high explosives. However continuous improvement in artificial Intelligence and machine learning can definitely pose greater risks for vital installations and high value targets by such drone swarm attacks in times to come. This probably is a new form of asymmetric warfare and it seems that future aerial warfare will be based on electronics, software and sensors in the form of combat swarm of drones.


Capabilities of Drone swarms

This new breed of unmanned aerial vehicles are a step ahead of the individual drones of yester years. These have been developed in the aerospace industry by harnessing the power of artificial intelligence and machine learning in a way that a large number of drones can either operate independently or their actions can be coordinated so that all work towards the same objective. There is no minimum number prescribed for a group of drones to be called a drone swarm. These can be launched from the land or even from an aircraft in air and they can engage a number of targets at the same time with pinpointed accuracy. They can also be launched from the sea or any water body provided the launch craft has enough space for fifty or hundred drones and it has the technology to be in link with the drone swarm. Such a link may not be required in case the swarm has been programmed to function in an autonomous manner. The size of the drones in a swarm can vary from a few inches to a few feet across. These can be manually controlled from a central authority or they can also be programmed to fly autonomously. Artificial Intelligence and machine learning are the basic building blocks for this new form of warfare.

A drone swarm implies interconnected drones which are capable of working together to counter the enemy. These are low cost intelligent machines which have been inspired by the amazing coordination and collaborative behaviour shown by swarms of insects and birds – working efficiently without any central authority. The drone swarms of the future will probably also have the capability to choose separate targets, think independently, divide up the tasks between them and thereafter execute each task with high precision. Technically these swarms can operate on multiple frequencies which will resist the jamming introduced to counter the drones of today. On the defensive side such swarms can also be programmed to block or defend vital installations by engaging multiple incoming threats. A swarm can also be tasked to create a cluster before the enemy radar systems so as to distract and confuse the enemy regarding the extent of incoming danger and the number of threats involved.


         The idea behind a drone swarm is that machines will be able to talk to each other seamlessly, will take decisions amongst themselves and finally achieve the objective for which they were despatched. These swarms may comprise of a large number of low-cost drones that can be programmed, using algorithms, to overwhelm the adversary by making them work together and at times even making them act independently once the target(s) has been sighted.

 

           Limitations of current air- defence systems

 The traditional air defence systems are not able to detect this new threat because the small sized drone swarms fly very close to the ground and are able to change their directions frequently. Radars are generally geared to detect high flying, large objects, flying at fast speeds and therefore they are not able to detect these small sized drone swarms. In order to counter this threat an effective air- defence system is required which should be a mix of anti-aircraft guns, missiles and electronic warfare systems. It is because of lack of such multiple layered security systems that the drone swarms are able to exploit this gap and are becoming more successful as potent attack weapons. The challenge today appears not only to shoot down these threats of single drones or neutralise the drone swarms, but also to be able to successfully detect these small-sized multiple objects, moving at high speeds and flying very close to the ground.


 How big is a Drone swarm

A large number of countries have exhibited their capability of simultaneously controlling a large number of drones in the sky and performing amazing synchronised aerial displays. Intel Corporation displayed a total of 2066 drones in a swarm formation in California in 2018. This record was broken by Geoscan of Russia on 3rd September 2020 when 2198 drones took to the skies in a scintillating ten minute display over St Petersburg which was visible from over 3 kms away. However the current record is held by Shenzhen Damoda Intelligent Control Technology of China which put up a dazzling aerial show performed by 3051 drones simultaneously on the 20th Sep 2020. This show was done as a tribute to the achievements of China in the space frontier. In India also aerial displays of synchronised drones have begun to taken place, though not at a scale mentioned above. The first time it was done during Kumbh Mela at Allahabad in Mar 2019 when 150 drones took to the skies. In Mar 2020 the night sky of Mumbai was lit up by 256 quadcopter drones which put up a colourful aerial spectacle for ten minutes for the public to see.


          Countering a Drone swarm

         It has been the experience that the strategy of trying to find out one ideal system to counter a drone swarm has not proved to be very successful. The prevalent logic seems to be that only a good swarm can neutralise an enemy or a hostile swarm. These defensive small sized swarms may be low cost, expendable and probably the only way known today to counter a multi- pronged attack by a drone swarm. In a defensive role a drone swarm can be placed near vital security installations and these can work together to create a defensive wall to thwart the evil designs of an enemy drone/ drone swarm which are sent to damage vital installations or to target an important dignitary. Though the drones are normally programmed to avoid any obstacle, the defensive drone swarm can be programmed to make contact with any incoming drone(s) or threat and blow themselves up in a kamikaze-like-kill thereby neutralising the threat effectively.

         The measures required to counter a single drone attack or that of a swarm requires a mix of active and passive measures. These could further be categorised into Kinetic or non- Kinetic measures. The kinetic or the hard kill approach involves the use of high intensity or high power lasers to destroy or disable an incoming threat. The incoming threat is completely destroyed as a result of which they come crashing to the ground. The flip side here is that because of the threat being completely destroyed all electronic evidence in the form of digital footprints available are also lost which could have been of vital help in trying to pinpoint the intent and source of the perpetrator.

The non-kinetic or the soft kill measures consist of trying to take control of GPS or the radio frequency of the incoming drone(s) or jamming their communication systems and thereby disorienting them. This process is called spoofing, where the controls of the drone are taken over by cloning its original signals. This process has the advantage of having the custody of the enemy drone which can then be analysed in detail for all the digital evidence to trace it to its owner.


         The use of one drone against another or a swarm of drones against another swarm can also be an option. This way there is a high probability of neutralising a large number of incoming threats or at least minimizing the threat posed by a drone swarm. The drones could be programmed to act in a coordinated manner and approach the incoming swarm. Once the threat is sighted each drone could lock itself to a target, while informing all else in the swarm and thereafter destroy the target and reduce the threat.


           Concept of Swarm

         The inspiration behind the concept of building up a drone swarm came by studying the ant and termite colonies – it was amazing how they were able to build such large colonies with elaborate structures and carry out their task with amazing precision without any centralised control. This concept, known as stigmergy, implies how animals leave signals on the ground which are picked up by others in the flock and thereafter each job is followed up and repetition avoided. Ants do this by leaving some kind of a chemical trail on the ground and termites do a similar thing inside their mounds. Remarkable coordination and control can also be seen in a flock of birds when they are in a flight - how they respond to subtle changes in speed and direction within split seconds and how they move from one place to another at such a fast pace without even one bird crashing into the other. It seems as if the ants, termites and flock of birds are all coordinated in their actions by a superior centralised command which they obey in a perfect synchronous manner.

 

           Foreign context

The maximum number of drones that can be used in a military or combat strike is not exactly known because of its secret nature. However what started in 2018 with 13 drones attacking the Russian air and naval base in Syria has grown manifold now. US has already demonstrated a swarm drone concept Gremlins which air launches micro-drones to perform reconnaissance over strategic enemy areas. China has also exhibited its capability to launch a swarm of helicopter drones last year which can carry all kinds of arms and ammunition to the target and then return to base in an autonomous manner. Russian also has this capability in Flock93 which envisages launching of more than 100 drones in a VTOL manner, each carrying a 5.5 pound warhead. Israeli company IAI is now offering drone swarm packages for commercial users which allows the swarm to be controlled by a smartphone app. The actual number of combat drones that can be launched in a swarm by the frontline countries is anybody’s guess and something that only time will tell.

 

          Indian Context

The Drone scenario in India has seen the import of Israeli Harop and Heron drones which fly at a very high altitude and are able to do surveillance of a designated area. DRDO has also come up with its Rustom series of surveillance drones and the Aeronautical Development Agency (ADA) is working on Ghatak - a combat drone with stealth technology. India and US have recently signed an agreement to jointly develop drone swarms and anti-drone systems which will help mitigate the threat that is being posed by enemy drones today. US has already demonstrated very significant drone swarm capabilities and with the COMCASA (Communications Compatibility and Security Arrangement) agreement, the transfer of technology and data sharing between the two countries can be a logical step ahead.

HAL is presently working to develop a drone swarm system called ALFA-S (Air Launched Flexible Asset- Swarm). Each drone in this swarm will be about 1- 2 metres in length, carry 1.5 tons of explosives each and fly at speeds of approximately 100 km per hour to engage and destroy targets in a kamikaze-like action. One Su- 30 or Jaguar fighter can deliver at least 30- 40 such drones in one go. This swarm will act in a coordinated manner and by using infrared, optical and other sensors it will be able to detect and destroy targets on the ground such as surface-to-air missiles, enemy radars, aircrafts etc.

         Wingman is another munition loaded semi-autonomous drone system being developed by HAL on the manned and unmanned platform. The Wingman drones will be half the size of a regular fighter aircraft, will be armed with stealth features and will fly about a hundred kilometres ahead of the conventional aircraft, providing sensitive battlefield information to the mother aircraft. These will operate in large numbers to provide surveillance, cover and protection to fighter pilots when they go on missions in an enemy territory and will engage the enemy threats and try to confuse the enemy radars about the real target.

On the 15th Jan 2021 India also announced its entry in the combat drone swarm club by displaying an attack by 75 drones simultaneously on simulated targets. This swarm mainly comprised of quadcopters- had scout drones which looked for targets, mothership drones which released explosive laden units and finally expendable drones which went for kamikaze like kill. Such swarms are also be capable of carrying out supply missions, with a 75 drone swarm capable of delivering over 1200 pounds of supplies and medicines to troops in remote and inaccessible frontline areas.

         The commitment of the government towards developing drone swarm capabilities can be seen in futuristic defence projects as the Meher Baba Swarm Drone competition. This is an Indian Air Force funded project, wherein people have been invited to give suggestions and create effective swarm capabilities in drones. The winner of this competition will bag a contract worth Rs 100 crores and will build a fleet of 50 drones for IAF to deliver humanitarian assistance and disaster relief in very remote areas of India as Siachen, Line of control etc.  

          

         Conclusion

The threat posed by drone swarms is very real as has been exhibited by the attacks on defense forces and vital installations in the recent past. This new paradigm in asymmetrical warfare does pose serious threats to the defense of the country, installations of national importance, big crowd gatherings and very important dignitaries. The Ministry of Home Affairs, Government of India has issued detailed Standard Operating Procedures for Handling the threats from Drones and other Sub- Conventional Aerial platforms in May 2019. The Ministry of Civil Aviation has also issued National Counter Rogue Drone Guidelines in Oct 2019 which intends to put in place measures and guidelines to handle the threat posed by rogue drones. It talks of a Steering Committee at the national level to evolve a Counter- drone framework and an Implementation Committee for the regular monitoring of sub- conventional threat environment and the implementation of the counter- drone measures at the national and the state level. Because of their low cost, easy to assemble configuration and rapid development of artificial intelligence and machine learning, drone swarms will be used in a variety of ways by nations and non-state actors. The threat can only increase in the times to come and so countries today have no option but to develop systems to counter these threats in an effective manner if they want to protect their high value targets of national importance.

                                                                                ( 2726 words )

 

Abstract

Taking inspiration from the flock of birds and the elaborately built ant and termite colonies, scientists have advanced the idea of drones much further by bringing in the concept of Drone swarms. In such a swarm, tens or hundreds of small drones are launched together and these can either be centrally controlled or each can operate autonomously using the power of machine language and artificial intelligence. This new concept indicates a paradigm shift in aerial warfare today. The advantages of introducing a drone swarm are many – small in size, low cost, flying close to ground, evading existing surveillance systems and the unique ability to select targets based on embedded software and sensors. Used for the first time in January 2018, the versatility of drone swarms has undergone a sea change and today they are more lethal than ever before. There are no foolproof measures to totally counter this threat today and such a system will probably take some time to evolve. India is well aware of this threat and the government is working in the direction on how to counter these threats. This new concept of asymmetric aerial warfare is very real and does pose a genuine threat to important dignitaries and vital installations. The only option available is to develop ways to effectively and efficiently counter this threat in the best possible manner.

 

Key Words

Drone swarm – Abqaiq – Houthi – Asymmetric warfare – Artificial intelligence – Machine learning - Autonomously – Jamming – Air defense – Size of drone swarm – Kamikaze - Kinetic – Non Kinetic – Concept of swarm – Ant colony - Stigmergy – HAL – Alfa S – Wingman – Meher Baba – MHA – MoCA.

 

Author

Pankaj Kumar Singh IPS

Addl DG BSF

Eastern Command, Kolkata


Bibliography

 

 

  • Raising a Swarm, Sandeep Unnithan, India Today, 02 Nov 2020.
  • DRDO’s cutting edge Anti-drone system to be deployed in Delhi for PM’s security, Manjeet Singh Negi, 14 Aug 2020.
  • India in the age of Swarm drones, Surya Kanegaonkar, 30 Jun 2020.
  • Swarm Drones : Attacker’s delight, Defender’s nightmare – A Status report, Lt Gen (Dr) VK Saxena (Retd).
  • Drone swarms as Air Defence systems, Col Mandeep Singh, Indian Defence Review, 01 April 2020.
  • Top 5 Most Effective Anti- drone Technologies which India can look at, Abhay Roy, 17 Jan 2020.
  • Are Drone swarms the future of Aerial warfare?, Michael Safi, 04 Dec 2019.
  • Are air defence systems ready to confront drone swarms ?, Seth J Frantzman, 26 Sep 2019.
  • How Swarming drones will change warfare, Thomas McMullan, BBC News, 16 Mar 2019.
  • Requirements for Operation of Civil Remotely Piloted Aircraft Systems    (RPAS), “Office of Director General of Civil Aviation”, 27 August 2018.
  • Constitution of Task Force, “Order, Ministry of Civil Aviation”, 11 April, 2018.
  • Draft Regulation of CAR on Civil use of Drones, “Ministry of Civil Aviation”, 02 Nov 2017.
  • With Radars and nets, Pentagon tests tech to destroy Islamic State drones: “Terror outfit’s drones have mostly targeted Iraqi troops and Syrian Militias”, Indian Express, 25 September 2017.


( This article has been published in The Indian Police Journal
Vol- 68, April - June 2021, Page 21- 28 )

*****************************************************************