Skip to main content

Currently Skimming:

1 The Realities of Terrorism in India
Pages 9-22

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 9...
... Sandhu therefore dedicated some of his remarks to what he perceived as the current gaps in countering terrorism and what he believes the scientific community can do to assist. Sandhu underscored Ramamurthy's remarks regarding international terrorism as a compelling challenge and the possibility that its burgeoning profile is going to affect larger sections of the world community.
From page 10...
... The forces or groups that carry out terrorism in India, or in Jammu and Kashmir specifically, are not exclusively focused on India. There is a need for the world community to take note of the fact that the same forces pose terrorists threat in many other parts of the world.
From page 11...
... Sandhu noted that the westward mobility established by Lashkar indicates that it has designs much larger than one might have expected. Although there are many other terrorist groups, he does not think that any other group represents the kind of threat that Lashkar does.
From page 12...
... The second part of the program consists of intelligence-driven operations. Whether that intelligence is acquired by technical means or by human sources, there is an ability to act quickly on intelligence.
From page 13...
... There have been reports in the press about this group causing terrorist acts. The leader of this group, Yasin Bhatkal, was arrested, and prior to that, Saudi Arabia repatriated Zabiuddin Ansari.6 It is important to note that while these people are clearly Indian nationals and they have no foreign background, each one of them has been taken to Pakistan, usually through a third country in the Middle East and sometimes even through Iran to Pakistan, trained in camps there and then sent back to carry out terrorist acts inside India.
From page 14...
... In the radio frequency spectrum where GSM networks of a neighboring country are being spread into India through high-powered external transmission and reception networks, much of the traffic is not in the voice domain, but in the data domain. Discussion is necessary for defining an approach to address the challenge posed.
From page 15...
... They require controlled materials such as an electric detonator or a detonator at the end of a fuse wire. That said, Sandhu noted that they have had difficulties in tracking detonators.
From page 16...
... on detection of improvised explosive devices (IEDs) , below ground and elsewhere.
From page 17...
... Sandhu then concluded his prepared remarks and stated his willingness to answer questions from workshop participants. DISCUSSION Norman Augustine, co-chair of the workshop planning committee, began by thanking Sandhu and noting that his remarks were sobering due to the magnitude of the challenges faced in India.
From page 18...
... Police try to keep changing their tactics such as setting up checkpoints for detecting the material that comes into civilian areas, but terrorists continue to innovate such that they can get around whatever devices are erected to prevent terrorist acts.
From page 19...
... Sandhu noted that there are a number of very, very good labs. For example, most of the computer devices and other computer media or mobile phones seized from terrorists receive the best imaginable examination at the Forensic Science Laboratory in Hyderabad.
From page 20...
... Sandu said that they have something called the National Committee for Strengthening Maritime and Coastal Security, and under that committee, a Maritime Domain Awareness Project is being pursued. The lead in that effort is provided by the navy, with the coast guard and marine police included.
From page 21...
... There was a project for the U.S. government on future combat systems that aimed to determine if it is possible to disable a future war fighter using radio frequency identification (RFID)
From page 22...
... That is why the power sector has been one of the first to establish Computer Emergency Response Teams and Information Sharing and Analysis Centers. They are the ones that are networked with the national center; this is an ongoing effort.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.