72
BY: MANISH SINGH SAMANT NETWORK SECURITY ANALYST Proposal For Safe, Secure & Smart Country INDIA

Safe, Secure & Smart Country ( India )

Embed Size (px)

Citation preview

B Y : M A N I S H S I N G H S A M A N T

N E T W O R K S E C U R I T Y A N A L Y S T

Proposal For Safe, Secure & Smart Country INDIA

Index

Introduction Difference between IP Camera and CCTV Camera Functions of primary video surveillance Camera Design Considerations Myths of IP Surveillance

1. Network Cameras Cost More than Analog Cameras, Making IP Surveillance Too Expensive

2. IP Surveillance is Unproven3. IP Transmission is Insecure for Video

Scalability - Exactly how does IP surveillance technology accommodate so many cameras?

Reasons for IP surveillance systems to scale muchmore easily than their analog counterparts

Advantages of IP surveillance systems than their analog counterparts

Network Design

Proposal Explanation

Real time crimes and the reason to implement the proposal (REAL FACTS)

SUMMARY

INTRODUCTION

Every video surveillance deployment is made up ofcameras, video management software, servers, andstorage.

The IP network is then the fifth element that ties allthese components into a converged networkinfrastructure.

In very small deployments, the video managementsoftware, server, and storage components can be assimple as a single PC, an IP camera, and a simpleEthernet hub.

Very large deployments may encompass thousandsof IP cameras, hundreds of servers, and a storagesubsystem capable of hundreds of terabytes to a 1-petabyte (1024 TB).

FUNCTIONS

Video surveillance has two main baseline functions:

1. Live viewing and real-time monitoring of video feeds, andretrieval and viewing of video as a post-event investigation.

2. Forensic video analysis is used to examine and analyze video foruse in legal proceedings. Some video may require one type or theother, or both.

Traffic cameras may have the sole purpose of identifyingcongestion and have no need for archive or retention of the video data.

One application to video surveillance may be to analyze video feeds to detect certaincolors or articles of clothing to identify groups of gang members among patrons at ashopping mall.

Video analytics uses data mining techniques to detect patterns in data, Data-mining is the process of detecting some pattern in data.

Difference

IP CAMERAS ANALOG CAMERAS (CCTV CAMERA)

Better quality video Low quality video*

Scalable expansion Limited to number of channels on DVR

Easy off-sit storage capabilities Limited off-site storage

https://www.youtube.com/watch?v=QsvLMeTXkhY

Property dealer shot dead in Delhi, CCTV captures murder

" A property dealer was shot dead in South-West Delhi and the entire incident was caught on CCTV. The shootout happened around midnight on Wednesday (7th October 2015) in Dwarka.” CHECK THE LOW QUALITY CCTV VIDEO FOOTAGE BY CLICKING THE FOLLOWING LINK.

" https://www.youtube.com/watch?v=nnkZgO6RPu8 ”

My point is CCTV camera's are already in place, but the footage quality* is poor and the car number plate & criminals faces are also unrecognizable, so what is the use of again installing CCTV camera’s.

If we have proper LIVE monitoring facility. People WHO commit such crimes boldly in NATIONAL CAPITAL, will think twice before attempting murder.

Functions of primary video surveillance are:

Capture—Encoding video feeds for network transport

Move—Camera feeds are moved from camera to one or more servers for processing

Manage—Administration of cameras, setting up archives, configuring operator views, etc

Archive—Storing real-time camera feeds to disk for later retrieval

View—Viewing either live or archived feeds

Camera Design Considerations. Megapixel

Resolution

.

Wiring .Recording Type

. Bandwidth . Night Applications

Wiring

Wireless (requires power at camera)

CAT5 for IP camera ( distance 300m)

Optical Fiber Cable ( Since DC power cannot be conducted over fiber, PoE media converters are solution to extend network distances via fiber to remote IP cameras )

PoE (Power Over Ethernet) switch

Night Applications

What’s the available Light

Total darkness = 0 Lux required by IR illuminators

Distance

Reflected Light

Network Bandwidth

The amount of bandwidth used by a network camera is determined by a several factor:

1. Resolution ( in IP cameras higher the pixels higher is the resolution )

2. Compression

3. Frame Rate: As image quality and frame rate increase, so does bandwidth requirements (here frame primarily refers to one image within a video stream. rame primarily refers to one image within a video stream.)

Megapixel Resolution

High quality resolutions means greater image detail

Video Compression

To reduce the required transmission bandwidth the video stream must be compressed. The corresponding video encoder is therefore executed on the smart camera

Motion JPEG:

H.264

Police can view video remotely on laptops in their cars before responding to an incident.

Remote monitoring: logging into the browser and accessing camera.

Video Management Software ( scheduling the cameras, viewing and searching live and archived images, and exporting evidence for court proceedings ), which allows us to load a software in server or PC.

Monitoring

Video Storage

How many surveillance cameras are operating?

Will the cameras will be recording continuously or only at certain hours of day?

Will the IP cameras be set to record only when motion is detected?

How long will the video footage be stored on the hard disk?

What level of image quality is required?

Network Cameras Cost More than Analog Cameras, Making IP Surveillance Too Expensive

Analog video is typically transmitted by expensive coax. Distance also influences image quality. Adding power inputs/outputs and audio further complicates this situation.

Standard IP-based networks surmount these obstacles at much lower cost and with many more options. Like viewing website images from anywhere in the world, the network camera produces digital images, so there’s no quality reduction due to distance.

Cost Efficiencies of IPSurveillance

The initial price for a network camera can indeed be higher if one compares only the camera.

But compare the cost-per-channel, and the network camera with its superior flexibility and performance quickly becomes comparable with an analog system anchored by a DVR.

IP Surveillance is Unproven

Police Department

The City of Joliet is the fourth largest city in the state of Illinois, spanning approximately 50 square miles. Approximately 152,000 people live in the city, which is located 45 miles southwest of Chicago’s Loop. One border of the downtown area is 12 miles of riverfront along the Des Plaines River.

The Joliet Police Department has 260 employees, most of them police officers.

Reasons for Joliet Police Department to implement IP Surveillance :

1. The old video surveillance system required too much time to manage.

2. Video was stored on VHS tapes, and each day someone had to remove the previous day’s tapes, label and store them, and insert new tapes.

3. Exporting archived video was a complex process.

4. A very-low-frame-rate-per-second for archived video meant that someone could walk past a camera without being detected.

Results after Implementing IP Surveillance System

Enhanced Public Safety

Just a few days after the outdoor cameras were deployed, a watch commander back at the station happened to be monitoring a live video feed when he noticed suspicious persons.

Using IP Video Surveillance Manager, he zoomed in the camera and witnessed a drug transfer. He called an officer, who arrived quickly enough to charge the suspect with criminal trespassing.

“ Video surveillance cameras act as a force multiplier, because we can monitor more areas with the same number of officers ”

- Said by police official.

Simplified Video Retrieval and Sharing

Authorized personnel can now access real-time or archived video from any location, using a web browser.

The police chief has connected remotely to view video of significant incidents.

The department can also easily share video with other organizations, when appropriate.

Ease of Expansion

The Police Department can easily expand the system as it adds new cameras.

IP Surveillance is Unproven

Education

Canton High School, located in Jackson, MS, installed an IP surveillance system to monitor school grounds. All areas of the school, including hallways, entrances and classrooms, can be monitored at one time from on campus or from a remote monitoring location.

Benefit after using IP surveillance

The system prevents crime on campus because students know their behavior is being monitored. If a problem does occur, the system allows security officials to e-mail pictures directly to the police.

IP Surveillance is Unproven

Health Care

Health First, a not-for-profit health care organization in Melbourne, FL, uses an IP surveillance system to monitor more than 100 wiring closets in its hospitals and health care facilities.

Benefit after using IP surveillance

The system helps ensure that all personnel and contractors follow documented policies and procedures for maintenance and repairs in the data distribution facilities and allows offsite technicians to assist in troubleshooting.

IP Surveillance is Unproven

Transportation: The Minnesota

Department of Transportation uses an IP surveillance system to give traffic updates to drivers in the Twin Cities metropolitan area.

Benefit after using IP surveillance

Real-time images of freeways and traffic conditions from 238 cameras are fed to the MnDOT’sWeb site, allowing commuters to avoid delays and dangerous conditions.

IP Surveillance is Unproven

Casinos:

Turning Stone Casino, located outside of Utica in upstate New York, is owned by the Oneida Nation and is one of the fastest-growing communities in the country. With more than 40 network cameras in the Tower.

Benefit after using IP surveillance

New IP surveillance technology provides motion detection capabilities that notify hotel security officers of unusual movements.

IP Transmission is Insecure for

Video

The IP-based networks used for video are the same as the networks used by corporations, banks, governments and hospitals for transferring data, e-mail and voice over IP.

These networks are safe conduits for sensitive information if the correct security measures, such as firewalls, virtual private networks and password protection, are implemented.

The same security precautions need to be taken when transferring video.

Securing a Security System

There are three important ways to ensure secure transmissions via the Internet:

1. Authentication,

2. Authorization and

3. Privacy protection.

Authentication and Authorization:

1. A device or user must identify itself to the network before gaining access, so it provides identity and access information to the network or system, like a username and password.

2. The device or user is authenticated and authorized when the system compares them to the submitted information in a database of approved identities.

3. Once the authorization is complete, the device is fully connected and operational in the system, or the user is free to use all authorized network features.

Password protecting network cameras and video servers is just as important as protecting your PC or servers.

If a video application needs to be highly secure, IP filtering should be used, meaning that the network camera will only send video if the request comes from a certain IP address, preventing unauthorized computers access even if they have the right username and password.

Privacy protection:

Encryption prevents unauthorized users from accessing data. Two of the more commonly used encryption protocols are :

VPNs and

Hypertext transfer protocol over secure socket layer (HTTPS)

A VPN is a way to use public infrastructure, like the Internet, to provide remote users with secure access to a network.

The VPN essentially creates a secure “tunnel” between the end points; only authorized devices or users can operate within the VPN.

The data itself is not secured, but the pathway it travels on is protected.

If the data itself must be protected, HTTPS can be used.

HTTPS is a Web protocol that encrypts and decrypts user page requests as well as the pages that are returned by the Web server.

When a connection between the two devices is requested, the user or a third-party body such as Verisign verifies certificates that have been issued to the two devices. If the user or third party determines that the devices can be trusted, an encrypted communication is opened.

HTTPS is commonly used when creating a connection to secure Web sites such as online banking pages.

Firewalls can serve as gatekeepers, blocking or restricting traffic to and from the Internet.

They can prevent outsiders from accessing private data and control what information remote users can access.

IP Transmission is Insecure for Video

The New York State Unified Court System (UCS) is a prime example of how these security techniques can be used effectively.

The UCS, which has more than 30 court buildings in New York State, uses rigid firewalls and security settings to protect its video system from hackers and other security risks.

The technology team developed its own Linux-based video management software and created an advanced permissions system to allow different users access to only certain cameras.

This means that images can be viewed from any courthouse PC, but only by the people who have permission to view it.

For added security, the USC even opted to transmit the video over its own high-speed fiber network, rather than over the Internet.

IP Transmission is Insecure for Video

Viruses and Worms

Viruses are programming codes commonly transmitted in e-mail attachments or file downloads. While some viruses are harmless, others can erase data and can require that an entire hard disk be reformatted.

A worm is a virus that automatically resends itself as an e-mail attachment or as part of a network message. A worm does not alter files but resides in active memory and duplicates itself. Often, worms go unnoticed until they slow down a system and cause errors.

Solutions to Viruses and Worms

Most network cameras do not have an open operating system or hard disks, so worms and viruses cannot infect them.

The servers that are used for video management in a network video system, called network video recorders, are standard Microsoft, Unix or Linux servers for which a virus scanner with up-to-date filters can be used.

This should be installed on all computers, and operating systems should be regularly updated with service packs and fixes from the manufacturer.

Disadvantage of Analog Systems Over Security

In contrast, analog systems offer no way to authenticate or encrypt information, making it easier for anyone to tap into the cables and illicitly view “secure” video transmissions.

Scalability

One of the many advantages of IP surveillance is the scalability of the systems.

There are also several installs with thousands of cameras deployed in educational, governmental and retail environments. Such a large system would not be practical in the analog world.

Exactly how does IP surveillancetechnology accommodate so manycameras?

Answer:

IP surveillance’s basis in IT networking.

Just as e-mail systems can accommodate one user or thousands of users.

So too can IP surveillance systems scale to handle thousands of cameras.

Internet Protocol is the most common computer communication protocol today and is the basis for almost every newly installed network.

One of the reasons it is so popular is scalability – it works just as well in small installations as it does in very large ones.

Reasons for IP surveillance systems to scale muchmore easily than their analogcounterparts:

• In network video systems, cameras can be added one at a time.

• DVR systems typically require cameras to be added in multiples of 16 or more, because of the number of inputs on a DVR.

For example, if a site has a need for 17 cameras, then a second DVR box will need to be added, even though 15 of the ports will go unused.

Incremental increases:

Reasons for IP surveillance systems to scale muchmore easily than their analogcounterparts:

As more cameras are added to a system, additional processing power and storage can easily be added with standard IT equipment.

Servers, network attached storage (NAS) systems and storage area networks (SANs) are all reasonably priced and readily available off-the-shelf.

Because network video systems are standardized with Internet Protocol, they will work with any other IP-based equipment, regardless of the vendor. This means that users will not be locked into a system from a single company, which is unlike most analog-based and DVR-based systems today.

Storage and server technology also makes it easy to back up network video systems. In fact, the servers used in IP surveillance systems are often the same as those entrusted to back up banking transactions.

Storage and server technology:

Camera intelligence:

In Analog systems, most of the “action” takes place within the DVR, including compression, recording and video management. This creates a shortage of computing power and makes it difficult to run intelligent video applications.

Built-in event handling, sensor input, relay output, video motion detection, time and date, and other capabilities allow network cameras to make decisions on when to send alarms and to whom, when to send video, and even at what frame rate or resolution to send the video.

With intelligence pushed out to the camera level, individual cameras can decide when to send video, at what frame rate and resolution, and when to send alarms.

Advantages of IP surveillance systems than their analogcounterparts:

This means that users can set the camera to alert system administrators of unusual activity, for example, if movement is detected in border area’s of India after 10 pm .

Camera intelligence also allows users to obtain more “actionable” information from their video.

Intelligent video algorithms can be run at the camera level, instead of at the system level, creating an opportunity to run more advanced functions across a larger number of cameras.

This makes it possible to manage and analyze video from hundreds of cameras.

Advantages of IP surveillance systems than their analogcounterparts:

Video analysis

Video analytics software is now achieving a high level of accuracy. A number of systems are available for different types of automated video monitoring and analysis. Different video analytics software can be chosen for different purposes.

Want to know what a car was doing prior to hitting a pedestrian? Tracking a vehicle when it enters a scene, coupled with identifying a jaywalking pedestrian could prove the pedestrian is at fault and not the vehicle.

With older systems, law enforcement had to follow each object or person individually, but new security cameras with smarter chips are assisting law enforcement agencies in the analysis of vehicle and pedestrian traffic with real-time results.

Gone are the days of reviewing hours upon hours of back-to-back video surveillance footage from a traffic camera or waiting for a back-end server to complete analysis to discover critical instances, anomalies or activities such as traffic accidents, parking violations or robberies.

Using the hardware and software built into a smart IP camera, law enforcement are able to track multiple objects simultaneously within the scene, avoiding having to review longer segments of captured video.

Advantages of IP surveillance systems than their analogcounterparts:

Cost-efficient infrastructure:

Most facilities are already wired with networking cables, so no additional wiring is required with IP surveillance.

The computer network is also used for applications such as data and voice, so IP surveillance can be easily integrated and managed along with other systems.

As an additional bonus, some network cameras offer a Power over Ethernet (PoE) option, which allows users to power cameras through the network and eliminate the wiring needed for electrical outlets.

CCTV systems require separate wiring, which can be a major expense.

Advantages of IP surveillance systems than their analogcounterparts:

Image quality:

Image quality is one of the most important features of any camera.

This is especially true in security, surveillance and remote monitoring applications, where lives and property may be at stake.

Using progressive scan and megapixel resolution, network camera technology has recently surpassed the image quality of analog cameras, allowing users to more closely follow details and changes in images.

This is particularly important with rapidly moving objects, where interlacing problems with analog cameras cause objects to blur.

Contd…

A good image sensor and optics are the most important factors in providing high quality images.

Network cameras now can make use of progressive scan and megapixel sensors that are not available to analog technology.

The image sensor of the camera is responsible for transforming light into electrical signals.

Contd….

In an analog environment, a rapidly moving object will appear blurry. This is because an analog video signal, even when connected to a DVR, interlaces to create the images.

Interlaced images use techniques developed for analog TV monitor displays, made up of visible horizontal lines across a standard TV screen.

Interlacing divides these into odd and even lines and then alternately refreshes them. The slight delay between odd and even line refreshes creates some distortion - only half the lines keep up with the moving image while the other half waits to be refreshed.

This causes moving objects to blur

Contd…

A network camera, on the other hand, uses progressive scan technology to capture moving objects.

Progressive scan captures the whole image at one time, and scans the entire picture line by line every 1/16th of a second.

This eliminates the delay between odd and even line refreshes and prevents the picture from being split into separate fields.

Images from network cameras are also displayed on computer monitors.

Superior Zoom

For superior digital zoom capabilities, IP network cameras with pan/tilt/zoom controls (PTZ network cameras).

These cameras enable staff to remotely take control of individual cameras and zoom in on an activity. Some cameras’ zoom capabilities enable reading a book title from as far as 1,000 feet away.

Advantages of IP surveillance systems than their analogcounterparts:

Two-way audio:

Besides being able to observe events from any computer via the Internet or monitoring stations, there are also products that enable two-way audio communication over networks.

This allows users to integrate audio with their IP surveillance systems so that they can hear and speak through the network.

With both visual and audio communication, users can observe, hear and question intruders.

Advantages of IP surveillance systems than their analogcounterparts:

Equipment upgrades and replacements:

IP surveillance is based on open networking standards, not proprietary equipment like DVRs.

This means that standard IT server and storage architecture from any vendor can be used, which reduces wait times and simplifies upgrades and replacements.

By comparison, DVRs are difficult to upgrade because it requires replacing proprietary digitizer boards.

Advantages of IP surveillance systems than their analogcounterparts:

Ease of management and maintenance:

Because video servers use standard PC servers for video recording and management, they are easy to integrate with existing IT systems and managed as part of that infrastructure.

Video servers allow the video to be stored on computer hard drives which are easily expandable and can be easily repaired or replaced in case of failure.

By contrast, DVR systems require proprietary hardware, which is more costly and difficult to replace or upgrade.

Also, DVRs can rarely be used with standard virus protection packages, which is another major consideration in most IT environments today.

Network Design

CONFIDENTIAL

Proposal for Safe and Secure India

Layout the network of IP camera's across each and every public streets and places

All the IP- camera’s ,IP-Phones, PC’s etc. will be connected to Branches represented by B (in the above network design). Eg South Delhi Police station have branches like VasantKunj B1, Kotla Mubarakpur B2 Police stations etc.

All the Branches say B1, B2 and so on, will be connected to Site police Stations represented by Site-1,2..

Site 1, 2 … represents South Delhi (Site-1), West Delhi (Site-2), East Delhi (Site-3) Police Stations and so on.

With the help of police and network design team , we can have various 24X7 monitoring stations in Site-1, Site-2 … or we can have single monitoring station in headquarter (H)depending on design layout. And relevant footage can be stored in Data center (headquarter) for post-event investigation.

In turn all the Sites i.e. Site-1,2 … will be connected to Police headquarter (H), where LIVE monitoring will take place. And all the relevant data or footage will be stored in Data Center for post-event investigation.

Right now Uttar Pradesh and many other states have proposed CCTV camera installation in public areas and roads . Using the proposed infrastructure, we can connect all States Headquarters so that police authorities can view each and every activities happening all across India.

H1, H2 … represents Police headquarters of different States in India eg. Delhi (H1), U.P. (H2), Karnataka (H3) etc.

In future we can implement this design in all the states of India which will in turn connect all police headquarters (H) of different states which will help the police department in many ways.

In future, in all the border area we can have same infrastructure, this will help the Indian forces to tackle terrorist activities in border area's and secure the lives of people.

• We can have online FIR registration facility in every police station using this proposal

• We can have camera and mike to record live interrogation sessions, in the police stations.

• Same Monitoring stations will help traffic police disperse traffic in case of any traffic jam.

• Traffic Police using the Monitoring stations can help Police PCR vans, fire brigade and ambulance to get out of traffic and reach the accidental place as soon as possible.Specially most of the time ambulances carrying patients are unable to reach hospitals on time risking the life of patient.

Solution:Attach a tracking device on all the above mentioned vehicles, so that traffic police using the same monitoring stations can guide the way to all these emergency vehicles out of traffic to reach at their destination.

At the place of accident or crime scene police and ambulance if required reaches on time without person contacting or calling 100.

Solution:In monitoring stations the concerned team can alert the police vans or ambulances.

REAL FACTS

The 2012 Delhi gang rape case involved a rape and fatal assault that occurred on 16 December 2012 in Munirka, a neighborhood in South Delhi. The incident happened when a 23-year-old female physiotherapy intern, Jyoti Singh Pandey was beaten and gang raped in a private bus in which she was travelling with a male friend, Awindra Pratap Pandey.

https://www.youtube.com/watch?v=DS8lMr4tNpUhttps://en.wikipedia.org/wiki/2012_Delhi_gang_rape

1. " The police studied CCTV footage from highway cameras to identify the bus. Footage released by the police shows the bus drive past a camera at about 9 pm. The police was able to catch the culprits with the help of CCTV camera's installed in highways. "

2. By monitoring the video footage, if the Delhi Police had reached on time at the crime scene and admitted Jyoti Singh immediately in the hospital, the victim could have been alive today.

" WHO IS TO BE BLAMED, THE POLICE ?" POLICE IS NOT TO BE BLAMED , IF WITH THE HELP OF CCTV CAMERA FOOTAGE ,POLICE WHERE ABLE TO NAB THE CULPRITS, THEN BY MONITORING THE LIVE VIDEO FOOTAGE, POLICE COULD HAVE PREVENTED THIS FROM HAPPENING. "

Property dealer shot dead in Delhi, CCTV captures murder

" A property dealer was shot dead in South-West Delhi and the entire incident was caught on CCTV. The shootout happened around midnight on Wednesday (7th October 2015) in Dwarka.”

CHECK THE LOW QUALITY CCTV VIDEO FOOTAGE BY CLICKING THE FOLLOWING LINK.

" https://www.youtube.com/watch?v=nnkZgO6RPu8 ”

1. My point is CCTV camera's are already in place, but the footage quality* is poor and the car number plate & criminals faces are also unrecognizable, so what is the use of again installing CCTV camera’s.

2. If we have proper LIVE monitoring facility. People WHO commit such crimes boldly in NATIONAL CAPITAL, will think twice before attempting murder.

On Friday, a two-and-a-half-year-old girl was raped, allegedly by two men who abducted her on a motorbike from outside her house in west Delhi's Nangloi area.

http://www.ndtv.com/delhi-news/capital-shame-two-minor-girls-gang-raped-severely-injured-1233224

SUMMARY

Well planned and designed IP infrastructure is required to be developed, that will help to integrate voice, video and data transmit capabilities over IP & will also help to integrate with other IP infrastructures. Layout the network of IP camera's across each and every public streets and places.

I would recommend to transmit the video over the high-speed fiber network laid by Government itself, rather than over the Internet, this will protect against cyber attacks.

The proposal emphasizes to have 24X7 LIVE MONITORING STATIONS, so that any crime taking place can be intervened in between and prevent the loss of life and property. And simultaneously relevant footage can be stored in Data center (headquarter) for post-event investigation.

By implementing the proposed infrastructure we can equip PCR vans with laptops and internet connectivity, so that Police can view video remotely on laptops in their cars before responding to any incidence.

We can implement the proposal " Safe, Secure & Smart India " not only in Delhi, but all across India. Right now Uttar Pradesh and many other states like Karnataka have proposed CCTV camera installation in public areas and roads . Using the proposed infrastructure, we can connect all States so that police authorities can view each and every activities happening all across India & keep track of each and every criminal, without physically following it.

In all the border area we can have same infrastructure and use wireless IP camera's in remote locations, this will help the Indian forces to tackle terrorist activities in border areas and secure the lives of people as well as secure their own lives while protecting us.

Users can set camera to alert system administrators of unusual activity, for example, if movement is detected in border area’s of India after 10 pm .

By using Video analytics software, proposed in proposal, law enforcement can track multiple objects simultaneously within the scene.

eg: The 2012 Delhi gang rape case involved a rape and fatal assault that occurred on 16 December 2012 in Munirka. JyotiSingh Pandey was beaten and gang raped in a private bus in which she was travelling with a male friend, Awindra PratapPandey.

The Juvenile involved in the gang rape, police cannot disclose the identity but by using the Video analytic software, proposed in the proposal " Safe, Secure & Smart India ", the police can track the culprits all across India.

Online FIR registration facility in every police station across India and centralized storage of FIR files, that will help police department to keep track of all the crimes taking place all across India, using this proposal.

Camera and mike (Two-way audio, system) to record live interrogation sessions, in the police stations. This system can also be implemented in restricted area's to observe, hear and question intruders.

Same Monitoring stations will help traffic police disperse traffic in case of any traffic jam and help emergency vehicles like Ambulances, Fire Brigades and PCR vans to reach o their destination.

On 19th November 2015, in Hindustan Times newspaper an article " Crime Tracking System To be revamped " was printed.“ It talks about connecting all police stations in India online.”

My proposal is better than Crime and Criminal Tracking Network & Systems (CCTNS) in many ways.

THANK YOU