Tuesday, January 28, 2020

Counter Terrorism Strategies in India

Counter Terrorism Strategies in India Freedom at the Helm: Strategic Framework for a Secure India Rebecca Sayres Abstract The three-day attack on Mumbai sought to undermine the liberty of India. Indians now stand more united than ever in protecting our way of life. In an effort to strengthen methods currently used to combat terrorists, a counterterrorism strategy has been implemented. The Strategy calls for additional anti-terrorism methods, organizational changes, as well as partnerships between the central and state governments. Citizens need to be vigilant and willing to work with their local government. India however cannot go this alone. The international community must act as partners to hinder recurring acts of violence by Pakistan-based extremists. Cumulatively, measures outlined in this Strategy make for a stronger India. Implementing a Strategy The objective of implementing a national counterterrorism strategy is to protect India, Indian citizens and Indian interests abroad as well as at home. The Strategy will serve as a blueprint of guiding principles, priorities, and direction for law enforcement, as well as government agencies. Those who were avidly against The Prevention of Terrorism Act (POTA) should be reassured that measures outlined in the Strategy will not encroach on the fundamental rights of Indian citizens. The government seeks to work with its citizens in promoting awareness of the evolving challenges of modern day terrorism. Together we can work to abolish those radical individuals who seek to harm our way of life. Pakistan-Based Islamic Extremist Groups Pakistan-based extremist groups pose the greatest threat to India’s national security. Specifically, groups Lashkar-e-Taiba (LeT) and Jaish-e-Mohammad (JeM) can be linked to numerous recurring acts of violence against India. In a coordinated effort in 2001, the groups launched an attack on the Indian Parliament House in New Delhi. The well-orchestrated Mumbai attacks in 2008 were also LeT linked (Rath, p.63-69). Violent jihadi terrorism strategically aims to damage India economically and stir up religious hatred between Hindus and Muslims. Due to this overwhelming threat, India will base its Strategy around countering the threat of Pakistan-based extremist groups through improved organizational structures within government agencies, and partnerships throughout the international community. Countering Threats Thwarting terroristic activities is complex; it requires diligent information gathering on individuals, objectives, capabilities, and planning. Domestically, counterterrorism encompasses many state and federal agencies. In regards to intelligence gathering, the Indian military, Central Bureau of Investigation (CBI), Research and Analysis Wing (RAW), as well as the Intelligence Bureau (IB) lead operations and analysis for detecting terrorist related activities under the central government (Gordon, p. 117-118). Police forces operate under the jurisdiction of state and Union territories to enforce laws, conduct criminal investigations, and respond to local threats (Gordon, p. 117-118). As counterterrorism measures enhance, interagency collaboration will be amplified in a sustainable fashion across all jurisdictions. Intelligence agencies have been successful in identifying potential terrorist attacks (Mahadevan, p.98). What we learned from the attack on Mumbai is agencies need to be able to act swiftly in a jointly coordinated effort to deny terrorists the means of carrying out their activities (Staniland, p.1). For that reason, an independent fusion center has been established to analyze and integrate intelligence relevant to national security collected by the military, CBI, RAW, and IB. Pertinent information will then be disseminated to those who need it at local levels. Agencies also have to be operationally sound. Police forces need capabilities to follow up on intelligence warnings. This requires proper manpower, weaponry, training, communications, and transportation facilities. These tools permit police forces to take preemptive measures while shortening response times (Staniland, p.1). In order to accommodate these needs, agencies will be appropriated additional funding to acquire the necessary assets for safeguarding national security. Inclusive of this funding is the Border Security Force (BSF), responsible for guarding India’s land borders (Matthews, 2011). Volatile areas like Jammu and Kashmir require additional security protocols to prevent terrorists from slipping through Indian entry points. Battlefield surveillance radars, long-range reconnaissance and observations systems will be added to the agencies arsenal (Matthews, 2011). Terrorists, smugglers, and pirates regularly threatened Indian coastline and regional waters (Matthews, 2011); therefore more emphasis will be placed on securing this area and reducing vulnerabilities. Protection of our seas is a priority; BSF will be provided additional vessels and surveillance mechanisms required for the coastline. Domestic Policy In the past, Indian officials have faced challenges reaching political consensus in countering terror. For the greater good of India, political leadership will place partisan matters aside in a joint effort to formulate timely policies to counter terrorism. In 2004, the Prevention of Terrorism Act (POTA) was repealed (Prevention of Terrorism Repeal Act, 2004). To indemnify, the Unlawful Activities Prevention Act (UAPA) was amended to further include crimes associated with terrorism (The Unlawful Activities (Prevention) Amendment Ordinance, 2004). In an effort to improve on legislation that was perceived as infringing on Indian liberties, national security was exposed to vulnerabilities. India now operates under new legislation that is aggressive on susceptibilities while safeguarding against misuse. Under UAPA confessions made before a police officer were not admissible as evidence (Toughing the Law, 2009). Now, committees have been put into place to asses each case individually and the admissibility of the confession in court. This ensures confessions are made within the parameters of Indian law, while allowing the government to utilize key evidence in cases relevant to terrorism. Additionally and similar to POTA (Toughing the Law, 2009), new law has established special courts for terror related cases. Cases involving terrorist activities, including fund raising and recruitment will be fast-tracked. Failing to expedite these cases constitutes a threat to the security and stability of the state. Extraordinary circumstances require extraordinary measures. There is a distinct difference between ordinary crime and terrorism. UAPA does not differentiate standards for bail between the common criminal and terrorists (Singh, p. 402). Therefore, bail provisions specific to activities related to terrorism have been passed into law. Bail is now set in a way which is proportional to the charges. The onus lies with the judge not to grant this privilege unless there is confidence that the accused is not guilty of terrorist related offenses. Toughening these laws ensure terrorists do not walk away free after being caught in the act. They will not however, deter an individual from committing atrocities. Terrorism has to be dealt with in the context of its growing threat to India. This starts with better governance. Elected officials at all levels must share the same objectives on terrorism. Partnerships between the central government, states, as well as Union territories are essential (Athana, p.15-16). Likewise, a partnership between the government and its people is imperative. This requires mutual trust and respect. Citizens cannot hesitate on reporting suspected terrorist activities to appropriate officials or law enforcement. Through these partnerships, we stand united in fighting violent extremist. International Cooperation India has one of the world’s highest levels of terrorist violence. In 2012, the Global Terrorism Index ranked India 4th among countries most affected by terrorism (Global Terror Index, 2012). Numerous attacks can be directly attributed to Pakistan-based extremists. The international community is well aware of the forces surrounding the tumultuous relationship between Pakistan and India. UN resolution 39 established the United Nations Commission for India and Pakistan (UNCIP) attempting to mediate on-going conflicts (General Assembly, 1948). As the UN has condoned Pakistan to continue to blatantly support and harbor terrorist activities, the resolution has lost relevance. Terrorism is not isolated to India, it is a global quandary. The international community is more interdependent than ever in countering these types of threats. The UN, along with allied nations must place additional pressure on Pakistan to further oblige its commitment on fighting terrorism. Rapprochement is unfeasible without the support of the international community. Pakistan must send the message that it will not export transnational terrorism by refusing to act aggressively against those who seek to commit heinous crimes against India. Furthermore, Pakistan must cooperate with the Indian government in extraditing those associated with crimes carried out on Indian soil. Bilateral peace discussions cannot resume until this occurs. The United States and India have held an amiable relationship. Following the 9/11 attack, India offered the U.S. unlimited support including the use of specific air bases (Fair, p. 76-77). Further, we have collaborated on counterterrorism endeavors. The Federal Bureau of Investigation worked diligently with Indian security services after Mumbai (Staniland, p. 3). India recognizes that the United States is deeply engaged with Pakistan in regards to aid and operations surrounding Afghanistan (Asthana, p.17). This empowers the U.S. to impose unrelenting pressure on Pakistan regarding transnational terrorism (Asthana, p.17). Additionally, the U.S. should continue assistance to Indian security forces. India could greatly benefit from increased anti-terrorism courses for police and domestic intelligence forces. Conclusion The 11/26 attack on Mumbai reaffirmed that transnational violence carried out by Pakistani extremist groups remains a leading threat to India’s national security. In addition, numerous terrorist attacks in recent years have been linked to the on-going conflicts in Jammu and Kashmir (Gordon, p.111). India is not immune from the dangers that both domestic and foreign terrorists pose. It is foreseeable that terrorists will continue to target Indian interests globally. The Strategy outlined will serve as a guide to counter those threats. As a society, we must continue to live our lives without forfeiting the liberties radical extremists seek to demolish. Terrorism cannot intimidate or bend the will of the people. Citations Asthana, Vandana. (2010, June 1). Cross-border terrorism in India: Counterterrorism strategies and challenges. Department of Government and International Affairs East Washington University, 1 June 2010. Retrieved from https://ideals.illinois.edu/bitstream/handle/2142/27703/CrossBorderTerrorisminIndiaCounterterrorismStrategiesandChallenges.pdf?sequence=2 Fair,C.C. (2004). The counterterror coalitions: Cooperation with Pakistan and India. Retrieved from Rand website: http://www.rand.org/content/dam/rand/pubs/monographs/2004/RAND_MG141.pdf General Assembly resolution 39, The rule of law at the national and international levels, S/654 (20 January 1948), Retrived from http://www.un.org/en/ga/search/view_doc.asp?symbol=s/res/39(1948) Global Terrorism Index: Capturing the Impact of Terrorism for the Past decade. (2012). Retrieved from Institute For Economics and Peace website: http://www.visionofhumanity.org/sites/default/files/2012_Global_Terrorism_Index_Report.pdf Gordon, S. (2008). Policing terrorism in India. Crime, Law Social Change, 50(1/2), 111-124. Mahadevan, P. (2012). The politics of counterterrorism in India: Strategic intelligence and national security in South Asia. London: I.B. Tauris. Mathews, N. (2011). Guarding Access. Defense Technology International, 5(1), 32. Parliament of India. (2004). PREVENTION OF TERRORISM (REPEAL) ACT 2004 (14). Retrieved from https://www.unodc.org/tldb/showDocument.do?documentUid=6920node=docscmd=addcountry=IND Parliament of India. (2004). The Unlawful Activities (Prevention) Amendment Ordinance, 2004. Retrieved from http://www.satp.org/satporgtp/countries/india/document/actandordinances/the_unlawful_activities__amendord2004.htm Rath, S. (2013). South Asia’s future security: The danger of terrorism from Pakistan. Social Research Reports, 2563-89. Singh,U.K. (2007). The state, democracy and anti-terror laws in India. New Delhi: Sage Publications. Toughing the Law. (2009, January 9). India Today Bureau. Retrieved from http://indiatoday.intoday.in/story/Toughening+the+law/1/24801.html

Monday, January 20, 2020

Examination of Puritan Philosophy in Bradfords On Plymouth Plantation :: essays research papers

Examination of Puritan Philosophy in Bradford's "On Plymouth Plantation"   Ã‚  Ã‚  Ã‚  Ã‚  The Puritan people first came to the New World to escape the religious persecution that hounded Non-Anglicans in England. They established the Plymouth Colony in 1620, in what is now Massachusetts. The colony was a reflection of the Puritans' beliefs. These beliefs, along with the experience of establishing a colony in "the middle of nowhere", affected the writings of all who were involved with the colony. In this writing, the Puritan philosophy behind William Bradford's "Of Plymouth Plantation" will be revealed. Some factors that will be considered include: how Puritan beliefs affect William Bradford's interpretation of events, the representation of Puritan theology in the above mentioned text, and how Puritanism forms the basis for Bradford's motivation in writing.   Ã‚  Ã‚  Ã‚  Ã‚  In Bradford's text, there are numerous instances in which his beliefs affect his interpretation of what happens. In Chapter IX (nine) of "Of Plymouth Plantation", entitled "Of Their Voyage†¦" , he tells of a sailor "..of a lusty, able body.." who "would always be condemning the poor people in their sickness and cursing them daily†¦.he didn't let to tell them that he hoped to help cast half of them overboard before they came to their journey's end". But, "it pleased God before they came half-seas over, to smite this young man with a grievous disease, of which he died in a desperate manner, and so was himself the first that was thrown overboard". Bradford believes that the sailor died because God was punishing him. According to Bradford, the sailor's cursing, and mistreatment of the other passengers displeased God, so God punished him accordingly. In the same chapter, Bradford tells of another ship passenger named John Howland. At one point in the trip, the Mayflower came upon a violent storm. The winds of the storm were so fierce, and the seas were so high, that all the sailors and passengers had to "hull for divers days together". During this storm, a young man named John Howland was thrown into the sea, and as Bradford tells us, "it pleased God that he caught hold of the topsail halyards which hung overboard and ran out at length". Howland caught hold of a rope, and "though he was sundry fathoms under water", he held on until he was hauled up. Bradford reasons that the man was saved because he was blessed by God. He goes on to say that he "became a profitable member in both church and state, implying that John Howland was one of the so called "Puritan Saints". To the Puritans, Saints were people whom God was to save, so these people received God's blessings, and

Sunday, January 12, 2020

Literature Review of Finite Impulse Response Filters

Literature studychapter 3 LiteratureSurveyPaper 1:Filter Structures For FIR Filters[ 1 ] In this paper Florian Achleitner et Al. had discuss FIR digital i ¬?lters, which can be designed in several different ways and construct with different basic constructions. This papers considers some constructions and their calculation complexness, every bit good as the quantisation effects. Furthermore some designing methods are introduced and the advantages and disadvantages are analyzed. FIR-i ¬?lters can be designed and implemented in many different ways and constructions. Each has it’s advantages and disadvantages refering several points of position. In pattern it will be suited to take the construction and planing method oblique by the country of application and the i ¬?lter specii ¬?cations. If computational cost is the chief standards, we recommend the Direct Form, as it is simple, has low computational cost and no existent disadvantages.Paper 2:Design And Implementation Of An Optimized FIR Filter For If Gps Signal Simulator[ 2 ] This paper presents the design and execution of a forty-order FIR filter for IF GPS signal simulator with three algorithms: multiply and accumulate ( MAC ) , add-and-shift strategy with CSD encoding ( CSD ) , new common sub-expression riddance ( CSE ) . Each strategy is analyzed in item including design and optimisation procedure to happen the best 1 with the least hardware resource and power ingestion. The FIR filter is coded in Verilog HDL, and so implemented utilizing Xilinx Virtex5 FPGA and Design Complier based on SMIC 0.18um engineering. FPGA execution consequence shows that CSE consumes the least entire occupied piece, with 63 % and 20 % decrease compared with MAC and CSD. The execution of CSE in ASIC besides proves 66 % and 13 % decrease in entire bit country, every bit good as 36 % and 6 % dynamic power decrease compared with MAC and CSD severally. Figure 3.1 Converse signifier of FIR filter[ 2 ] Figure 3.2 Implementation construction of FIR filter[ 2 ] This paper design FIR filter utilizing converse signifier as shown in figure below which is more suited for long length coefficients and besides saves figure of registries. Besides this paper designs FIR filter utilizing symmetrical signifier construction of FIR filter by taking advantage of symmetrical coefficients and saves figure of multipliers in the design. 3.3 PAPER 3: Fixed-Point FIR Filter Design And Implementation In The Expand In Sub-Expression Space[ 3 ] In This paper Chia-Yu Yao and Chung-Lin Sha had presented a method of uniting the design and the execution of fixed-point FIR filter coefficients into one design flow. The proposed method designs the fixed-point coefficients in an spread outing sub-expression infinite. During the design procedure, the execution cost is estimated as good and it is fed back to the design modus operandi such that the algorithm can redesign the fixed-point coefficients iteratively. Design examples show that, in many instances, we can obtain better hardware-cost- effectual FIR filters than the consequences reported by other research workers. Figure 3.3 Example of common sub look riddance[ 3 ] In this paper, they suggest an improved fixed-point coefficient design procedure that considers the execution complexness at the first phase of the design stage. The architecture they assume in this paper is the converse signifier symmetrical FIR filter. Compared with the other FIR filter construction, the proposed method can bring forth FIR filters with decreased figure of adders in many instances. On the other manus, since the manner of recognizing the converse signifier FIR filters is determined by the proposed method, in order to salvage brainpower and clip for composing the RTL codification of an FIR filter, we develop a C plan to bring forth a Verilog or a VHDL codification of the FIR filter automatically based on the coefficients produced by the proposed algorithm. A comparing of the codification public presentation between the proposed design flow and MATLAB’s fdatool is besides given in this paper.Paper 4:16-Orders FIR Filter Design Based On MATLAB And Its Quartus Ii Simulation[ 4 ] In this paper SongYu et Al. had presented the rules and construction of the FIR filter to plan the FIR filter. Used the tools of filter design and the signal spectrum analysis in MATLAB to plan and analyze 16-order FIR filter, and determined the filter coefficients, eventually, used Verilog HDL linguistic communication to code, and used its package of Quartus II to imitate. The consequence of the simulation shows that the consequences of the pulsation matching run into the design of demands. With FIR filter direct-type construction as shown in Figure 3.4, the end product can be expressed as: Y ( N ) =†¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ †¦ ..3.1 Figure 3.4 Conventional diagram of a direct-type FIR filter[ 4 ] Where, Y ( n ) is the end product of the FIR filter, x ( n ) is the input sequence and H ( I ) represents filter coefficients with filter length ( N+1 ) . This paper uses FDATOOL from MATLAB for coefficients computation. FDATOOL is a really powerful tool chest from MATLAB for speedy system planing and analysis. GUI based tool takes all FIR filter parametric quantities from user and based on selective filtering method, calculate filter coefficients with minimal filter order. After that, paper allows HDL modeling of such filter and takes advantage of coefficients symmetricalness to cut down arithmetic complexness. Simulation is done utilizing Quartus-II for subsequently FPGA usage.Paper 5:An Integrated Cad Tool For ASIC Implementation Of Multiplier-less FIR Filters With Common Sub-Expression Elimination Optimization[ 5 ] In this paper Qiu-zhong Wu had presented an integrated computing machine aided design ( CAD ) tool for the ASIC execution of multiplier-less FIR digital filters with common sub-expression riddance ( CSE ) optimisation. The chief maps in the design flow of FIR filters for specified applications, including coefficient computation and quantisation, common sub-expression optimisation and hardware description linguistic communication ( HDL ) codification auto-generation, are combined in this tool. They proposed an applied intermedial representation ( IR ) , which is the key for the integrating of CSE optimisation and HDL codification auto-generation, to denote the circuit construction resulted from the application of CSE technique. The application of this tool in the ASIC execution of multiplierless FIR filters can recognize the design mechanization and shorten the clip for design significantly ; what is more, experiment consequences show that the coveted FIR filters will be optimized expeditiously in several facets such as country, power dissipation and velocity. Figure 3.5 design flow of FIR filter[ 5 ] In this paper, an efficient integrated CAD tool for the ASIC execution of multiplier less FIR filters with common sub-expressions riddance optimisation is presented. The chief maps in FIR_DK, including the common sub-expressions riddance optimisation and the auto-generation of Verilog-HDL codification are illuminated in this paper. The application of this tool in the ASIC execution of multiplierless FIR filters can recognize the design mechanization and shorten the clip for design significantly ; what is more, experiment consequences show that desired FIR filters will be optimized expeditiously in several facets such as country, power dissipation and velocity.

Saturday, January 4, 2020

Compare and contrast Christianity, Judaism, and Zoroastranism Free Essay Example, 1000 words

As a result, it would not be a mistake to note that ultimately all three religions want their followers to form one unified group where every member of it helps others and refrains from bringing any destructive elements into social environment. Points of difference Despite the fact that the three religions in question have numerous aspects that they share, there are also many other points which show that they are quite different. To begin with, one might mention that Zoroastrianism has a definite founder, namely the prophet Zarathustra (Fisher, 2014). In other words, if it had not been for him, the religion would never come into being. On the other hand, Judaism was not founded by a single person. Of course, it is possible to mention several key figures, such as prophets or kings, but they did not start this religion, they merely played an important role in its development. One might suggest that Jesus was the founder of Christianity. In a narrow sense, it may be true to a certain extent; however, Christians claim a connection to Judaism and emphasize the succession. We will write a custom essay sample on Compare and contrast Christianity, Judaism, and Zoroastranism or any topic specifically for you Only $17.96 $11.86/pageorder now That is why Jesus is the Son of God Who was sacrificed and showed people the new way, but He did not found a new completely new religion. The next point of difference is the connection to culture. As it can be easily understood from the very name, Judaism is the religion of the Jews. That is why conversion to it is a rather debatable subject. As a result, the major aspects of Judaism are closely connected to the Jewish culture and do not make sense outside it, like the significance of Exodus, for example. Similarly to that, Zoroastrianism was also extremely popular among the nations that inhabited the Ancient Persia. In spite of the fact that it did not make a particular emphasis on culture, the practices as well as experiences could be better understood by the people who come from that part of the world. Contrary to that, Christianity has always been a religion to denied significance of local customs and promoted universal love of God that can be s hared by the people regardless of their cultural background. Finally, if one analyzes some elements of practice, one will be able to see that the spiritual traditions in question feature a different state of development of spiritual worldview. Thus, Zoroastrianism puts emphasis on several fundamental physical agents, such as fire and water. There are many rituals that focus on contemplation or interaction with them. Judaism and Christianity often engage water into their rituals, acknowledging the connection of fire and God; however, they often operate with abstract concepts, making these religions systems more mystic.