Monday, May 31, 2010

NSCS spying case: RTI reply shows cracks in police theory

NSCS spying case: RTI reply shows cracks in police theory
Daily News & Analysis
The sensational case came to light in June 2006 where Delhi police claimed that it has arrested three persons -- RAW official Brigadier Ujjal Dasgupta, ...



Analyze the case against the officers from the Criminal requirement ( highlighted in red) of Mens Rea and Causal relationship:

Mens Rea
A. Overview
There must be a mental element to a crime
Justifiable reasons are not used when considering mens rea
No valid criminal conviction can be obtained without proving the mental element for each charge
B. General Requirements of Culpability (italics = mine)
(1) Minimum requirements of Culpability - except as provided in Section 2.05, a person is not guilty of an offense unless he acted purposefully ,knowingly, recklessly, or negligently, as the law may require, with respect to each material element of the offense
(2) Kinds of culpability defined
(a) Purposefully - Conscious objective to achieve a harmful result; similar to intentional
Result crimes: Murder, Theft, Battery (defendant must intent the result)
Conduct crimes: DWI, perjury (defendant is engaging in conduct that is likely to have a bad result)
Attendant circumstance crimes: burglary, bigamy, statutory rape (some condition must be present in addition to the conduct / result)

(b) Knowingly - Actor is aware the result will occur; aware his conduct is of this nature and the result is practically certain
(c) Recklessly - Consciously creates or disregards a substantial and unjust risk; involves a gross deviation from the standard of conduct of a reasonable law abiding person
(d) Negligently - Inadvertent creation of the risk; failure to recognize a substantial and unjustifiable risk
(3) recklessly is the lowest element required when none are prescribed in the statute
(4) apply mens rea to all elements unless otherwise divided
(5) higher levels of culpability can substitute for lower levels
knowingly, recklessly, or negligently, as the law may require, with respect to each material element of the offense

Causal Relationships

(1) Conduct is the cause of a result when:
(a) it is an antecedent but for which the result in question would not have occurred; and
(b) the relationship between the conduct and result satisfies any additional causal requirements imposed by the code or by the law defining the offense
(2) When purposely or knowingly causing a particular result is an element of an offense, the element is not established if the actual result is not within the purpose or the contemplation of the actor unless:
(a) the actual result differs from that designed or contemplated, as the case may be only in the respect that a different person or different property is injured or affected or that the injury or harm designed or contemplated would have been more serious or more extensive than that caused; or
(b) the actual result involves the same kind of injury or harm as that designed or contemplated and is not too remote or accidental in its occurrence to have a [just] bearing on the actor's liability or on the gravity of his offense
(3) " " substitute "risk" for "purpose or contemplation"
(4) When causing a particular result is a material element of an offense for which absolute liability is imposed by law, the element is not established unless the actual result is a probable consequence of the actor's conduct





The interpretation  of some official in NSCS does or does  not  make a crime from the Mens Rea and also Causal Relationships perspective.

The whole case falls on its own face!
How tenuous the case is and the officers spent 5 years in Tihar jail on the words of some character in NSCS! That official can not classify the document retrospectively on the basis of his "opinion". What a tragedy.

The minutes of the meeting is very well known to the "foreign agent" to whom the officers were accused of passing the information because she also attended the very same meeting!

How ridiculous the charge could get!

Nath


Monday, May 3, 2010

Foensic Science:a major conference, a blockbuster report and reasons to be pessimistic

 
This article appears in the following Law, Probability and Risk issue: SPECIAL ISSUE Forensic Science For The 21st Century: The ASU Conference. Arizona State University, Tempe, AZ, USA, April 2009 [View the issue table of contents]

Forensic science reform in the 21st century: a major conference, a blockbuster report and reasons to be pessimistic

Jonathan J. Koehler{dagger} Northwestern University School of Law, Chicago, IL 60611, USA
{dagger} Email: jay.koehler@northwestern.edu

   Abstract
A 2009 conference at Arizona State University brought together leading scholars to discuss the future of forensic science in light of the blockbuster National Academy of Sciences report entitled ‘Strengthening Forensic Science in the United States: A Path Forward’. This paper introduces the special issue on forensic science that this conference spawned, considers the significance of the report and then offer reasons to be pessimistic about whether major reforms are forthcoming.

Keywords: evidence; forensic science; individualization; National Academy of Sciences; National Research Council

[Reprint (PDF) Version of Koehler]


Abstract 2 of 5 back © The Author [2009]. Published by Oxford University Press. All rights reserved.
This article appears in the following Law, Probability and Risk issue: SPECIAL ISSUE Forensic Science For The 21st Century: The ASU Conference. Arizona State University, Tempe, AZ, USA, April 2009 [View the issue table of contents]

What ‘Strengthening Forensic Science’ today means for tomorrow: DNA exceptionalism and the 2009 NAS Report

Erin Murphy{dagger} Assistant Professor, University of California Berkeley School of Law, Boalt Hall, Berkeley, CA 94720-7200
{dagger} Email: eemurphy@law.berkeley.edu
Received on 23 August 2009. Revised on 18 October 2009.
   Abstract
Congress explicitly ordered the National Academy of Science to investigate ‘non-DNA’ forensic techniques. But DNA typing nonetheless exerted great influence over every aspect of the process, from the story of how the committee came into existence to the final contents of the report's pages. This article unearths the pivotal role played by DNA typing in the formation and execution of the committee's mission. It then uses that history to caution against ‘DNA exceptionalism’—the inclination to view DNA as uniquely impermeable to error or as requiring less oversight and scrutiny than traditional methods. Instead, this article argues that the committee's recommendations should be interpreted as safeguards essential for all forensic methods, not just the ones expressly covered by the report.

Keywords: NAS Report; DNA; forensic science; evidence

[Reprint (PDF) Version of Murphy]


Abstract 3 of 5 back © The Author [2009]. Published by Oxford University Press. All rights reserved.
This article appears in the following Law, Probability and Risk issue: SPECIAL ISSUE Forensic Science For The 21st Century: The ASU Conference. Arizona State University, Tempe, AZ, USA, April 2009 [View the issue table of contents]

Who speaks for science? A response to the National Academy of Sciences Report on forensic science

Simon A. Cole{dagger} Associate Professor of Criminology, Law & Society, University of California, Irvine, CA 92697-7080, USA
{dagger} Email: scole@uci.edu
Received on 15 May 2009. Revised on 15 September 2009. Accepted on 16 September 2009.

   Abstract
This response focuses on the treatment of latent print identification by the recent National Academy of Science (NAS) Report on forensic science. It begins by situating the Report in the historical context of a decade of controversy over the validity of latent print identification. Stark disagreement between the academic and judicial communities over this issue created a situation in which the question of which of these two communities would ‘speak for science’ became contested. The Report's support of the academic position demonstrated the lack of support among non-practitioners for the claims of extreme discrimination and accuracy advanced on behalf of latent prints. The Report in some sense constitutes the response of institutionalized science to this issue. Nonetheless, it is still unclear whether the Report will function, as some may have hoped, as a ‘court of last resort’ on this issue or whether the courts themselves will again arbitrate it. The response then turns to the issue of how latent print conclusions can be reported in the wake of the NAS Report. The Report expresses clear disapproval of the reporting framework currently mandated by latent print professional organizations, creating a tension around the reporting of analyses. The response concludes that semantic resolutions to this tension are undesirable compared to resolutions based on empirical data.

Keywords: National Academy of Science; forensic science; fingerprint; expert witnesses; general acceptance

[Reprint (PDF) Version of Cole]


Abstract 4 of 5 back © The Author [2010]. Published by Oxford University Press. All rights reserved.
This article appears in the following Law, Probability and Risk issue: SPECIAL ISSUE Forensic Science For The 21st Century: The ASU Conference. Arizona State University, Tempe, AZ, USA, April 2009 [View the issue table of contents]

The use of technology in human expert domains: challenges and risks arising from the use of automated fingerprint identification systems in forensic science

Itiel E. Dror{dagger} Institute of Cognitive Neuroscience, University College London (UCL) and Cognitive Consultants International (CCI) Ltd, 17 Queen Square, London, WC1N 3AR, UK
Jennifer L. Mnookin{ddagger}
Professor of Law, UCLA School of Law, 405 Hilgard Ave, Los Angeles, CA 90095, USA
{dagger} Email: i.dror@ucl.ac.uk. More information is available at www.CognitiveConsultantsInternational.com
{ddagger} Email: mnookin@law.ucla.edu
Received on 14 May 2009. Revised on 19 October 2009. Accepted on 3 November 2009.

   Abstract
Cognitive technologies have increased in sophistication and use, to the point of interactively collaborating and distributing cognition between technology and humans. The use of Automated Fingerprint Identification Systems (AFIS), computerized databases of fingerprints, by latent fingerprint experts, is a par-excellence illustration of such a partnership in forensic investigations. However, the deployment and use of cognitive technology is not a simple matter. If a technology is going to be used to its maximum potential, we must first understand the implications and consequences of using it and make whatever adaptations are necessary both to the technology and to the way humans work with it. As we demonstrate with AFIS, latent fingerprint identification has been transformed by technology, but the strategies used by humans who work with this technology have not adequately been modified and adjusted in response to these transformations. For example, the chances that an AFIS search will produce prints with incidental similarities—i.e. that highly similar, look-alike, prints from different sources will result from an AFIS search—has not been sufficiently investigated or explored. This risk, as well as others, may mean that the use of AFIS introduces new concerns into the process of latent fingerprint identification, some of which may even increase the chances of making erroneous identifications. Only by appropriate and explicit adaptation to the new potential and the new challenges posed by the new technology will AFIS and other cognitive technologies produce efficient and effective partnerships.

Keywords: cognitive technology; bias; AFIS; database searches; fingerprint identification; forensic science; evidence experts; judgment and decision making

[Reprint (PDF) Version of Dror and Mnookin]


Abstract 5 of 5 back © The Author [2010]. Published by Oxford University Press. All rights reserved.
This article appears in the following Law, Probability and Risk issue: SPECIAL ISSUE Forensic Science For The 21st Century: The ASU Conference. Arizona State University, Tempe, AZ, USA, April 2009 [View the issue table of contents]

Rational bias in forensic science

Glen Whitman{dagger} Associate Professor of Economics, Department of Economics, California State University, Northridge, 18111 Nordhoff Street, Northridge, CA 91330-8374, USA
Roger Koppl{ddagger}
Professor of Economics and Finance, Department of Economics and Finance and Institute for Forensic Science Administration, Silberman School of Business, Fairleigh Dickinson University, Madison, NJ 07940, USA
{dagger} Email: glen.whitman@gmail.com
{ddagger} Email: koppl@fdu.edu
Received on 26 May 2009. Revised on 1 October 2009.
   Abstract
The current organization of forensic science induces biases in the conduct of forensic science even if forensic scientists are perfectly rational. Assuming forensic examiners are flawless Bayesian statisticians helps us to identify structural sources of error that we might otherwise have undervalued or missed altogether. Specifically, forensic examiners’ conclusions are affected not just by objective test results but also by two subjective factors: their prior beliefs about a suspect's likely guilt or innocence and the relative importance they attach to convicting the guilty rather than the innocent. The authorities—police and prosecutors—implicitly convey information to forensic examiners by their very decision to submit samples for testing. This information induces the examiners to update their prior beliefs in a manner that results in a greater tendency to provide testimony that incriminates the defendant. Forensic results are in a sense ‘contaminated’ by the prosecution and thus do not provide jurors with an independent source of information. Structural reforms to address such problems of rational bias include independence from law enforcement, blind proficiency testing and separation of test from interpretation.

Keywords: forensic science; bias; Bayesian; NAS report; organization

[Reprint (PDF) Version of Whitman and Koppl]
Online ISSN 1470-840X - Print ISSN 1470-8396

Saturday, May 1, 2010

Anachronism of OSA 1923 and myopic delusion of law makers/enforcers of India

I had shared this earlier with some.

Planning on an adventure hike in your area of interest and wished you had the military maps of your area ?

http://www.lib.utexas.edu/maps/ams/india/nc-43-07a.jpg
This is 1:25000 map of my home area Palghat


You can get the map of your area of interest  here:
http://www.lib.utexas.edu/maps/ams/india/



=========================================================

India Maps



The following maps were produced by the U.S. Central Intelligence Agency, unless otherwise indicated.
Country Maps Detailed Maps Historical Maps
  • Bhuj-Anjar Area, Gujarat (Topographic Map) original scale 1:250,000. Portion of Sheet NF 42-3, Series U502, U.S. Army Map Service 1959 (618K)
  • Bombay 1909 from The Gazetteer of Bombay City and Island. Volume 1. Bombay, India 1909 (386K)
  • Bombay 1954 (City Plan) original scale 1:50,000 U.S. Army Map Service 1954 (233K)
  • Bombay - North 1954 (Topographic Map) original scale 1:250,000. Portion of Kalyan, Sheet NE 43-1, Series U502, U.S. Army Map Service compiled in 1954 and printed in 1963 (548K)
  • Bombay - South 1954 (Topographic Map) original scale 1:250,000. Portion of Bombay, Sheet NE 43-5, Series U502, U.S. Army Map Service, compiled in 1954, no publication date given (314K)
  • Calcutta 1945 (City Plan) from The Calcutta Key: Welcome United States Army. United States Army Forces in India-Burma, Information and Education Branch. Calcutta, 1945 (356K)
  • Damao [Daman] 1954 (Topographic Map) original scale 1:250,000. Portion of Navsari, Sheet NF 43-13, Series U502, U.S. Army Map Service compiled in 1954 and printed in 1956 (549K)
  • Delhi and Vicinity 1962 (City Plan) original scale 1:50,000 U.S. Army Map Service 1962 (264K)
  • India 1700-1792 from The Historical Atlas by William R. Shepherd, 1923 (645K)
  • India 1760 from The Public Schools Historical Atlas edited by C. Colbeck. Longmans, Green, and Co. 1905 (222K)
  • India 1882 from A Dictionary Practical, Theoretical, and Historical of Commerce and Commercial Navigation by J.R. M'Culloch. Longmans, Green and Co. London, 1882 (555K)
  • India and Pakistan Topographic Maps, Series U502, 1:250,000, U.S. Army Map Service, 1955-
  • Jaisalmer, Rajasthan (Topographic Map) original scale 1:250,000. Portion of Sheet NG 42-8, Series U502, U.S. Army Map Service 1959 (464K)
  • Kerala State (Topographic Map) original scale 1:1,000,000. Portion of Coimbatore sheet. NC 43, Series 1301. U.S. Army Map Service, Corps of Engineers, 1965 (464K)
Thematic Maps
Maps on Other Web Sites _________________________________________________________________________________

If you are tech savvy, you can install a Google earth  software in your nexus one phone


Warning: Don't go any where near any intelligence or Defense  establishment lest some over  enthusiastic sleuth should book you under  OSA 1923 crime!
Punishment:
  1. Defense establishment: 14 years
  2. Intelligence est: 3 years

British lawmakers of 1923 did not know that you can get all this from  from public domain !

Indian lawmakers and law enforcers  of 2010 are still under myopic delusion!
Anachronism of OSA 1923 is self delusional.

The Intelligence and Security Committee is a committee of parliamentarians appointed by the Prime Minister of UK to oversee the work of the Intelligence machinery of the United Kingdom. It was established by the Intelligence Services Act 1994.[1] It is unique inasmuch as it is not a committee of Parliament, but consists of nine parliamentarians appointed by, and reporting directly to, the Prime Minister. In this capacity it has greater powers than a select committee of Parliament, being able to demand papers from former governments and official advice to ministers, both of which are forbidden to select committees.


In India, the local police SHO (thanedar) oversee application of OSA 1923 on the citizens of India!


One consolation is: In Pakistan and Bangladesh, things are no different

See for yourself:
  1. India: 
    1. http://www.helplinelaw.com/docs/THE%20OFFICIAL%20SECRETS%20ACT,%201923
  2. Pakistan
    1. http://www.intermedia.org.pk/mrc/medialawdocs/OfficialSecretAct.pdf
  3. Bangladesh:
    1. http://www.drishtipat.org/HRLaw/secrets.htm
    2. http://bdlaws.gov.bd/pdf_part.php?id=132
Why Official Secrets Act needs a review: B Raman October 01, 2007


Our laws are  lagging technology and society as that of Pakistan & Bangladesh!
Pakistan & Bangladesh has the excuse that their technology and society is also lagging far behind.
Do we have that excuse?

Breaking a steganography software: Camouflage

I blog for human rights  
 

Caveat: Most of the home grown steganography software written by amateurs (including MCTE, Mhow) are easily breakable! (Thank GOD, Army did NOT say that the MCTE software is Classified! Had they said that, you can only call them stupid and nieve!) Any thing that is NOT open source and  NOT reviewed by Cryptographic community is total hog wash and  what is called "snake oil" in America.

For more on "snake oil" cryptography: read here:

http://www.schneier.com/crypto-gram-9902.html#snakeoil

http://www.interhack.net/people/cmcurtin/snake-oil-faq.html

 

Breaking a (very weak) steganography software: Camouflage

1. Background


Steganography is the technique for hiding data inside other data, for example, to hide a secret message inside a picture, or a secret picture inside a music file. There are several techniques to do that, and several softwares available. Some use complex algorithms and are pretty good at doing their job (it's difficult to affirm that there is actually hidden data, and even more difficult to retrieve it), some other use very simple algorithms and are easy to detect and break. You can find reliable and scientific information about steganography, digital watermarking (which is basically the same thing) and how to detect them on several web pages on the web, like the Neil Johnson site, the Fabien Petitcolas site, the Outguess page (here you can find a tool to detect steganography in images), and several others.
A few days ago, actually September 11th of 2002, first anniversary of the attack in the United States, there was a short subject talking about steganography use by terrorists. It was aired on the french private TV network "Canal Plus" on the show "Le Journal des Bonnes Nouvelles". Not only the tabloïd-like subject by itself raised my bullshit detector alarm to the red level (it's an old rumour, never proven, but the journalists transformed this rumour in facts: they said several times that terrorists actually used steganography), but also there was a lot of technical errors in the commentary. Sloppy and cheap journalism at its best, using the last hype or rumours to scare the audience.
They did a "demonstration" of a "famous" and "unbreakable, even by the NSA" steganography sofware, which hides data in a "totally indetectable way", and is "illegal". Here are some screenshots of the show:

 ................

For more:  http://www.guillermito2.net/stegano/camouflage/index.html

The original JPG picture, without anything hidden in it, is 5,139 bytes.
The original picture with the secret message added, without password, size is 6,021 bytes.
The original picture, with the secret message added, password is "aaaa", size is 6,021 bytes.
The original picture, with the secret message added, password is "a" repeated 255 times, size is 6,021 bytes. 255 bytes is the maximum size for the password, you will understand why later; if it's longer it will produce an error (we could probably use this for a classical buffer overflow exploit to force Camouflage to execute some arbitrary cod

   5. Conclusions


Don't trust what is said on TV, journalists don't know what they are talking about, and instead of doing a little bit of research asking  competent people (there are plenty in the academia and the corporate worlds), they fall for the hype, and listen to people who are incompetent or just want to have their faces on a TV screen.
Most of the steganography software around are easy to detect and to break.
If the algorithm used in some encryption or steganography software is not documented precisely, its strength is probably very weak. Never use them for serious security purposes.
Don't trust what you see on the internet, and that includes this page. Be especially aware of people with a big mouth who use big words ("unbreakable", "undetectable", etc...). Test everything yourself, or ask different people who may know more. There are plenty of forums on Usenet with specialists about almost any subject you can imagine.
[Note written much later: I've since discovered some other tools to unprotect Camouflage files:
- CKFP (Camouflage / Kamaleon File Patcher) by Vikt0ry.
- CamouflageCrack by Kasky.
- CamoDetect Perl script by Andrew Christensen, found on PacketStorm]

Have a nice day!


Source: http://www.guillermito2.net/stegano/camouflage/index.html


Take home: 
  1. Most amateur cryptography and steganography software are  breakable. The fact that you can not see the "secret message" with your naked eyes means nothing. Most media people talk non-sense when they say a software that is unbreakable.
  2. Relevance for UD case: You can not convict  an honourable soldier based on such nieve pseudo-scientific criteria. If proscution can, they should  break the code and prove that there was a "secret message" and what the "secret message was" and how that message involved   a "national secret" and how the "spy had really  betrayed the nation"!  If not, eat the dust and face consequences for "betraying the nation" by torturing and destroying an honourable soldier  who served the nation honourably for 40 years!

20 days after SC order, ex-Brigadier gets medical aid

http://www.dailypioneer.com/252933/20-days-after-SC-order-ex-Brigadier-gets-medical-aid.html



FRONT PAGE
|
Saturday, May 1, 2010



20 days after SC order, ex-Brigadier gets medical aid




Staff Reporter | New Delhi




The cry of a decorated officer, put behind bars four years ago on charges of espionage with no trial, has somewhat been heard. Following the report in The Pioneer on Friday, Brigadier (Retd) Ujjal Dasgupta, imprisoned in Tihar Jail, was on Friday afternoon admitted to AIIMS for a complete medical investigation. Dasgupta and his friends have been campaigning for proper medical help in the face of the former’s deteriorating health condition.

The Supreme Court had granted permission to Dasgupta for a medical review at AIIMS. While the order was made almost 20 days ago, it was executed only on Friday after The Pioneer carried the news report on the denial of medical facilities to him.

Sources said that Dasgupta will be put on several rounds of medical tests by a committee of doctors at AIIMS during the next few days and then a decision about the heart surgery, if needed, will be taken shortly. Dasgupta had been seeking medical attention to his deteriorating health condition for the past several months. As per his health conditions, Dasgupta will have to undergo a second bypass surgery which, according to medical experts, involves too much risk to the life of the patient.

Sources said that Dasgupta needs to undergo coronary angiography at an ECHS-empanelled hospital which can manage cardiac emergency in case it arises during the procedure. “His stamina would need to be built up for the redo CABG, if indicated, through a good diet, rest and absence of stress. For the redo CABG, it is the patient’s fundamental right to go to an ECHS-empanelled hospital of his choice. Such a choice would be based on an evaluation of the facilities and surgeons available at various hospitals,” said a doctor who conducted a few tests on Dasgupta during the routine medical examination at the RR Hospital.

In his last medical review at the RR Hospital in January 2010, Dasgupta was advised repeat angiography. “Patient has a walking through and rest angina. CT angiography shows significant LCx/RCA/OM disease and all occluded grafts. It is felt in the interest of the patient that he should undergo angiography followed by a redo CABG at an ECHS-empanelled hospital of his choice where a high volume of redo CABGs are being done,” said a remark of the RR Hospital dated January 27, 2010.

As per his medical history, Dasgupta, now 64, had a massive heart attack in November 1988 and had a coronary artery bypass graft surgery at AIIMS. He again developed complications in October 2003 for which his coronary angiography was done in Escorts. The following year, the brigadier was put on drugs lifelong and the Delhi High Court allowed his treatment at Army’s Research and Referral Hospital. His condition deteriorated in November 2009 and the findings of ARRH was that the “patient has worsening chest pain on exertion and even at rest. Advised to undergo CT angiography”.

Dasgupta along with three other accused was arrested in 2006. The co-accused Shiv Shankar Paul (38), a systems analyst at the National Security Council Secretariat, his superior officer Commander Mukesh Saini (58) who had retired on March 31, 2006, and Brigadier Ujjal Dasgupta (64), head of the computer section of Research & Analysis Wing, were also accused of espionage and booked under the Official Secrets Act for allegedly passing on information to Rosanna Minchew (31), an American diplomat. Dasgupta, while deputed in the R&AW, was arrested on July 19, while Paul was arrested on June 11 in 2006. Saini was also picked up by the investigators on July 6. Dasgupta was involved in project - Anveshak, a software developed for R&AW by the Centre for Development of Advanced Computing (C-DAC) as well as the Army. Army has since clarified that the software developed was not classified. The trial is yet to begin in the case.