For example the terrorist who did recent kidnapping and murder of security personal in J& K can we caught using their cell phone data and future kidnapping can be prevented by using predictive analysis of this data. You might think that your cell phone is safe so long as you keep it tucked away in your pocket and do not use applications, but companies have been developing technologies to “force” our phones into giving away information without physically accessing our device. These technologies are called "Cell Site Simulators"or IMSI catchers. One of such popular products is called “Stingray.” The names may change, but all of these devices are regularly being used by USA & UK for law enforcement surveillance, These devices are designed to interfere with cell phone signals by pretending to be cell phone towers. By mimicking towers, the devices intercept signals to gather data, such as metadata and content of phone-calls, personally identifying information, and data usage, and have been especially popular as a tool for tracking the location of particular cell phones.
Technology Architecture for Mobile Surveillance |
Let's assume a criminal 'A' has been involved in 10 terror incidents and another criminal 'B' was involved in 2 terror incidents they may be carrying 1 or 2 mobile phone. Predictive analysis can scan through huge bulk of location data and highlight the phone numbers that were present in the locality at the given time. We can also trace their activity for a duration of time and create a
profile of the person and predict
1) What is his residential area
2) What are the addresses he frequents
3) What are the number of his associates and by correlation who are his associates?
4) What is a persons daily routine?
5) Does he own a personal vehicle or not
6) By further correlation with data from financial institutions we can predict the persons credit-card or banking details
7) We can tell about his family members or the people who stay with him
As you can see this data analysis tells a lot about people that can help safely identify a persons link with crime incidents. Security agencies can monitor their activities of shortlisted candidates and trap them to prevent crime. Apart from using the data and tools that I have mentioned Mobile Data activity surveillance requires coordination between telecom companies and government security agencies and USA/UK have been successfully able to build such mechanism and prevent crime.
Drawback - Misuse of telecom data & prevention
1) What is his residential area
2) What are the addresses he frequents
3) What are the number of his associates and by correlation who are his associates?
4) What is a persons daily routine?
5) Does he own a personal vehicle or not
6) By further correlation with data from financial institutions we can predict the persons credit-card or banking details
7) We can tell about his family members or the people who stay with him
As you can see this data analysis tells a lot about people that can help safely identify a persons link with crime incidents. Security agencies can monitor their activities of shortlisted candidates and trap them to prevent crime. Apart from using the data and tools that I have mentioned Mobile Data activity surveillance requires coordination between telecom companies and government security agencies and USA/UK have been successfully able to build such mechanism and prevent crime.
Drawback - Misuse of telecom data & prevention
Increasingly broad use of cell site simulators by law enforcement is also controversial for many reasons. Apart from the fact that the devices themselves indiscriminately invade the privacy of everyone because they connect to and can capture data from, all cell phones within their range, the fact is these devices can also been used in controversial ways for example by deploying them disproportionately in areas made up predominantly of people of color. But this is not a serious threat and a democratic government can define protocol and monitor the use of these devices and captured data by its officials. What is important is that such monitoring devices along with "Smart Software" can monitor cell phones and at the same time secure the captured data thus protecting the privacy of non-criminal elements by way of negating cell profiles that do not have any suspicious activities over a time. Right now the priority of government is to minimize causality in areas affected by terrorism and it is critical to use Cellular Data & Data Intelligence tools to aid our security agencies.