Use of technology in combating militancy
Prof. Dr. M. Mesbahuddin Sarker :
Recently, the incident of snatching two militants from the lower court of Dhaka has created a new panic in the public mind. It is believed that militant activities have been almost completely eradicated due to the strict intervention of the law enforcement forces for the past few years. But it appears that the militants are constantly using new methods and technologies. Such a big activity of militants openly in the court premises and their capacity is nothing but a thumb in the eyes of the country’s law and order forces. Therefore, red alert is going on all over the country and at the border. However, only 150 policemen are inadequate to handle an average of 500-600 convicts per day because the technology of militants is so advanced that they can easily track when, where, how and where the target is moving, which even our law enforcement agencies do not have.
According to a former DIG of Police, there is an intelligence failure in the robbery of the accused even the responsible policemen may have a connection in this matter. Because the two arrested militants admitted during preliminary interrogation that the incident was pre-planned. Hence the question of whether the police or anyone inside the prison had a hand in the execution of this plan. According to a recent intelligence report, 13 prison guards were found to be working for militant outfits. According to the police headquarters, between January 2016 and August 2021, around 1,963 suspected militants were arrested. Among them was 20-year-old Abdullah Al-Noman, who was out on bail and learned to make improvised explosive devices (IEDs) under the instruction of another JMB chief, Abu Mohammad, and planted an IED in a police box in Paltan on July 24, 2020. An IED is an explosive device, commonly used as a roadside bomb. It is seen in terrorist activities, insurgent guerillas and commando force operations.
This is not the first time that terrorists have attacked the police.
In 2014, terrorists attacked a police van and robbed it. However, the cases of escape of the accused from the police custody are also often happening recently. Several police officers have already been sent to compulsory retirement on suspicion of dereliction of duty, smuggling of state secrets and movement. Various punitive measures are also being taken from the police department. The main objective of the militants is to spread fear and destroy the democratic environment, disrupting the security of life and property. It is very unfortunate if the militants know the secret information in advance, be it with the help of technology or with the connivance of law enforcement agencies. At one time, militants used common apps like Facebook Messenger to communicate among themselves. Recently Facebook authorities have also been told to prevent fake Facebook accounts mainly used by the militant groups. BTRC authorities have also been told not to sell additional SIMs anonymously.
But militants are using updated applications of technology day by day. Currently they are using different apps and dark web. Basically, the Darkweb is very effective in communicating privately, creating special groups, and protecting privacy. The part of the Internet that has no direct access and data that search engines cannot index, and can only be accessed through special web browsers, is called the Darkweb. Similarly, terrorists are using Jammers to carry out their criminal activities unhindered. A Jammer is a mobile phone that, when placed in an area, disables the phone network in that area. Jammers are commonly used in government security jobs, for silence in hospitals or to prevent students from cheating in exam centers. But because the network is down, even the person in danger cannot call the police or relatives for help. And by exploiting this opportunity of the Jammer, militants and terrorists can end their terrorist activities and get stuck safely. Generally, these technologies are imported and used for government security work. But they are illegally importing and selling them in various markets including Dhaka and online marketplaces in violation of the law, which should be banned under strict government supervision.
One of the technologies that law enforcement agencies are using to combat terrorism is the Onsite Identification and Verification System (OIVS), a mobile digital device that can be used to retrieve all information about a person with a single click. RAB is currently using this state-of-the-art device. There are 40 categories in this technology including weapons, drugs, terrorists, murderers, frauds. According to RAB’s large database, after the arrest of an unknown person or accused, any of his information such as fingerprint, national identity card number, date of birth, name or even taking a picture with the camera of the device can be known if he is an arms dealer, drug dealer, terrorist, murderer or fraudster. Three Sixty technology is another cutting-edge technology that is being used in developed countries for cyber security, homeland security, etc. by Internet. Using this technology, crime has come down to almost zero in countries like Singapore.
According to DMP’s Counter Terrorism and Transnational Crime (CTTC) unit, the banned militant outfit Ansarullah Bangla Team (ABT) has more destructive plans ahead of the upcoming elections. That’s why they are keeping in touch with new members by using various types of “encrypted apps”. In order to track such crimes, our law enforcement forces must also be active in using modern apps and technology. Through technology, criminals can be identified easily, as well as warnings can be given to criminals in the commission of crimes. Information technology is very helpful not only in combating militancy, but also in bringing people involved in corruption, murder, rape etc. under the law. Apart from this, counseling of detained militants in prisons, distribution of leaflets-festoons in schools and colleges, filler-ads in radio, television, newspapers, awareness campaigns etc. can also be very helpful in eradicating militancy. Everyone is expected to be safe this pre-election year.
(The writer is Professor, IIT, Jahangirnagar University).
