Beruflich Dokumente
Kultur Dokumente
by practitioners,
for practitioners
HOME TEAM JOURNAL
EDITORIAL BOARD
CHAIRMAN
Derek Pereira
DEPUTY CHAIRMAN
Audrey Ang
EDITORIAL CONSULTANTS
ISSUE NO. 21 Jackson Lim
Susan Sim
The Home
Home TeamTeam Journal
Journalis isa a Melvin Wong
professional journal
professional journal published
published
by the
theHome
HomeTeamTeam
AcademyAcademy
to CHIEF EDITOR
highlight
to highlight
the work
theofwork
the Home
of the
Omer Ali Saifudeen
Team and
Home Team
its knowledge
and its knowledge
partners ASSISTANT EDITOR
in Homefront
partners in Security
Homefrontand Safety.
Secu- Eunice Tan
The Journal
rity and Safety.
also functions
The Journal
as a DEPARTMENTAL EDITORS
platform
also functions
for engagement,
as a forumallow-for Bridget Robert
ing a broad pluralistic
engagement, exchange
range of and Cherielyn Leong
viewpoints and
discussion overinterests
the broad
to be and Lu Yeow Lim
represented,
diverse range
contrasted
of issues
and syn- and Wilson Lim
thesised. that come under the
interests Jace Goh
subject of Homefront security Loh Eng Choon
and safety. Suguna Ramasamy
Chow Chee Kin
Jaswant Singh
Alex Chin
Arlenny Ahmad
Cheryl Foo
Joyce Ho
EDITORIAL PRODUCTION
Tay Lu Ling
JOURNAL ADMINISTRATION
Nurul Farhana
Esther Chang
Yvonne Chan
Goh Guan Long
The opinions expressed in this Journal are the authors’ own and do not necessarily reflect the
opinion of the Ministry of Home Affairs.
FOREWORD
Foreword by Chairman
T
HE SECOND ISSUE of the Home Team Journal is in many ways continuing
the journey we have embarked on; to create a repository of knowledge
IURP WKH ¿HOG RI +RPHIURQW 6HFXULW\ DQG 6DIHW\ ,Q NHHSLQJ ZLWK
our tagline, ‘for practitioners by practitioners’, the second issue contains
SHUVSHFWLYHV DQG LQLWLDWLYHV E\ +RPH 7HDP RI¿FHUV DQG RXU ORFDO DQG
RYHUVHDVSDUWQHUVRQWKHWRSLF,QQRYDWLRQVLQ+RPHIURQW6HFXULW\+)6
, KDYH WR PDNH DQ LPSRUWDQW FDYHDW KHUH 7KH DUWLFOHV IURP WKH +RPH
Team that embody this theme don’t simply talk about the latest gadget in the
+)6¿HOG,QVWHDGWKH\ZLOODOVRHODERUDWHRQKRZWKHLGHDRILQQRYDWLRQKDV
been reconstructed and manifested in the policies, programmes, and most
LPSRUWDQWO\ LV WKH SHRSOH ZKR PXVW VSHDUKHDG WKHVH LQLWLDWLYHV )RU PDQ\
an innovative idea has met an early demise due to poor cultural buy-in and
LPSOHPHQWDWLRQ 7KXV LQ PDQ\ ZD\V WKH LGHD LV RQO\ WKH EHJLQQLQJ ,W VWDUWV
with daring to think the impossible and challenging the conventional paradigm,
LIQHFHVVDU\DQGZKHQIDFHGZLWKDXQLTXHSUREOHP7KLVLVQRWVLPSO\µDJRRG
to have’ but something that in our present Homefront Security climate becomes
an absolute necessity given the dynamic nature of our potential security threats
DQG WKH SDFH LQ ZKLFK WKH\ KDYH HYROYHG :H VKRXOG QRW IDLO WR PHHW WKH
FKDOOHQJHVRIWKHIXWXUHEHFDXVHRIDIDLOXUHRILPDJLQDWLRQ
We are honoured to feature an interview for the Home Team Journal on
this theme with the former Head of the Singapore Civil Service, Permanent
6HFUHWDU\IRUWKH1DWLRQDO6HFXULW\DQG,QWHOOLJHQFH&RRUGLQDWLRQ16,&DQG
IRU )RUHLJQ $IIDLUV 0U 3HWHU +R 7KLV LQWHUYLHZ SURYLGHV DQ RYHUDUFKLQJ
view on the changing landscape of Homefront Security in Singapore and his
insights on how the Home Team can leverage on innovations and foster a
FXOWXUHRIFUHDWLYLW\
We are once again grateful to have a very interesting mix of articles from
RXU +RPH 7HDP SDUWQHUV 1DPHO\ IURP RXU ORFDO +RUL]RQ 6FDQQLQJ &HQWUH
which is part of the National Security Co-ordination Secretariat, the US Postal
,QVSHFWLRQ 6HUYLFH WKH 86 &HQWHUV IRU 'LVHDVH &RQWURO DQG 3UHYHQWLRQ DQG
¿QDOO\ WKH 'LUHFWRUDWH RI )RUHQVLF 6FLHQFHV DQG *XMDUDW )RUHQVLF 6FLHQFHV
8QLYHUVLW\LQ,QGLD
,ZRXOGDOVROLNHWRWKDQNWKHHQFRXUDJLQJFRPPHQWVVXSSRUWDQGVXJJHVWLRQV
UHFHLYHG IURP WKRVH ZKR UHDG RXU ¿UVW LVVXH 3OHDVH GR NHHS WKH IHHGEDFN DQG
FRPPHQWVFRPLQJ:HDOVRZHOFRPHFRQWULEXWLRQVIURPRXU+RPH7HDPRI¿FHUV
DQGRXUORFDODQGLQWHUQDWLRQDOSDUWQHUVLQ+RPHIURQW6HFXULW\
)LQDOO\,ZRXOGOLNHWRWKDQNWKH(GLWRULDO7HDPRQFHDJDLQIRUNHHSLQJWKH
LGHDEHKLQGWKH+RPH7HDP-RXUQDODOLYH7KLVLVRXULQQRYDWLRQ
MR. BENNY LIM, MR. JACKSON LIM, MR. TEONG HOW HWA
T
HE HOME TEAM departments RI¿FHUV KDYH RYHU PDQ\ \HDUV EHHQ
have a long history of able to effectively adapt to and even
consistently enjoying a exploit the opportunities of change
VLJQL¿FDQWO\ KLJK OHYHO RI SXEOLF to their operating realities, to stay
FRQ¿GHQFH DQG WUXVW ,Q WKH ODWHVW RQWRSRIWKHLUJDPH7KLVLQYDULDEO\
HDB Household Survey in 2008, the entails innovation at work in these
Police scored the highest amongst all RUJDQLVDWLRQV
other institutions for public trust and Innovation therefore is not new to
FRQ¿GHQFH1 ,Q RWKHU VXUYH\V SXEOLF the Home Team in it’s long history
FRQ¿GHQFHLQWKH+RPH7HDPWRNHHS and experience even if the term
6LQJDSRUHVDIHLVFRQVLVWHQWO\KLJK “innovation” as a self-conscious
No amount of creative public label and buzz word in our public
relations can account for this high sector discourse, is of a younger
OHYHORISXEOLFFRQ¿GHQFH8OWLPDWHO\ vintage, dating to the early 80s. ,W LV
it is anchored to the Home Team’s important to recognise this because it
objective record of performance provides a critical historical context
which has made Singapore one of to any policy or plan to promote
WKHVDIHVWFLWLHVLQWKHZRUOG2 This is innovation as a purposive and
a quality of life Singaporeans value, centrally managed programme in
and one which expatriates living here WKH +RPH 7HDP 7KLV XQGHUVWDQGLQJ
YDOXHHYHQPRUH of the organisation’s history and its
:KDW LV VLJQL¿FDQW DERXW WKLV people is key to crafting the approach
consistently good performance is the and engagement of any innovation
fact that it has been achieved in the programme in a manner best suited
IDFH RI VLJQL¿FDQW DQG UDSLG FKDQJHV for it to connect, gain traction
in Singapore society and economy as DQGVXFFHHG
H
UMAN BEINGS ARE all capable of made time to listen to presentations by
creativity and they innovate WKH WHDPV$V ZLWK DOO QHZ HQWHUSULVHV
DOO WKH WLPH :KHWKHU WKLV LV there were of course the skeptics but
expressed in our work or in our social E\ DQG ODUJH WKHUH ZDV D VLJQL¿FDQW
relations or in other arenas, this innate degree of buy-in and positive spin-
potential, even if not of equal quality offs like team-bonding, acquiring new
DPRQJ XV UHVLGHV LQ HYHU\RQH knowledge of analytical tools through
The aim of any organisation-wide :,7V WUDLQLQJ DQG JDLQLQJ H[SRVXUH
LQQRYDWLRQ VWUDWHJ\ VKRXOG EH WR ¿QG to new empowering experiences like
effective ways to harvest the positive presentations of ideas by the rank
value that this creative potential in DQG ¿OH WR WKHLU ELJ ERVVHV RQ KRZ WR
the individuals of its work-force LPSURYHDSDUWRIWKHEXVLQHVV
have towards the achievement of its
REMHFWLYHVRUPLVVLRQ INNOVATION IN THE
:KDWZDVVLJQL¿FDQWZKHQWKH:,7V HOME TEAM –
:RUN ,PSURYHPHQW 7HDP PRYHPHQW MORE THAN JUST WITS
began in the early 80s, was the bold
I
recognition by the top leadership of the N THE HOME Team, our bottom-
public service that the average worker line is to keep Singapore safe and
has a useful perspective to offer to help VHFXUH $Q\ XVHIXO LGHD WKDW FDQ
¿QG LQQRYDWLYH VROXWLRQV SUHFLVHO\ help us better achieve our mission is
because he is in touch with the practical ZHOFRPHG+RZHYHUDQLQQRYDWLRQLV
realities of the business often at the QRWMXVWDSURPLVLQJLGHD
ground level – he has knowledge to ,QQRYDWLRQ LQ WKH RUJDQLVDWLRQDO
offer from his direct experience; he context is an idea that is operationalised
knows of gaps, of persisting problems to bring about a practical change to
and contradictions and he has an DFKLHYH HLWKHU JUHDWHU HI¿FLHQF\ RU
appreciation of which solutions are HIIHFWLYHQHVVRUERWK7KLVLVWKHOLWPXV
PRUHOLNHO\WRZRUNDQGZKLFKFDQQRW WHVWIRULQQRYDWLRQ,GHDVZKLFKUHPDLQ
Hitherto, the tendency was to think of only as ideas are not innovations
problem-solving in the organisation as regardless how attractively imaginative
the elevated province of managers and RUFUHDWLYHWKH\DUHLQWKHLUFRQFHSWLRQV
that the worker-bee’s job was to just do By this measure, the innovations
DQGQRWDVNZK\ in the Home Team – whether in terms
,Q WKH +RPH 7HDP WKH :,7V of new products or change to process
PRYHPHQWLQWKH¿UVWGHFDGHRUVRVDZ or business model – have been
I
Singapore’s built-up urban terrain, NNOVATION IN AN organisation
ZDWHUVXSSO\VHOIVXI¿FLHQF\ZDVQRW can be broadly described as
critical since access to water was not purposively pursued at least at two
a problem given the availability of OHYHOV$WRQHOHYHOZHKDYHZKDWKDV
risers which is a building requirement been called “incremental innovation”
and a network of hydrants at road which involves mass participation
OHYHO $OO WKLV LQ WXUQ PHDQW WKDW typically via structured activities
D VPDOOHU FUHZ PHQ DQG PRUH WKURXJKRXW WKH RUJDQLVDWLRQ 7KLV LV
OLPLWHG HTXLSDJH ZHUH VXI¿FLHQW WR ZKDW RXU :,7V PRYHPHQW LV DERXW
PDQDJH PRVW RI WKH ¿UH LQFLGHQWV and the innovation focus is usually
HQFRXQWHUHG 7KH VSHHG RI UHVSRQVH DERXW WKH HI¿FLHQF\ RI WU\LQJ WR GR
– a dune buggy compared to a bus/ ZKDWZHGREHWWHU
truck - also meant that the chances The second level is an older
RI SXWWLQJ RXW WKH ¿UH HDUO\ EHIRUH LW and more familiar form of top-
JURZVELJJHUDUHJUHDWHU down organisational structure for
The story of the Red Rhino LQQRYDWLRQ7KLVOHYHODGGUHVVHVZKDW
UHÀHFWHG QRW MXVW LQQRYDWLRQ RI has been called “radical innovation”
product, but also of process and even – typically requiring specialists
WKH EXVLQHVV PRGHO 7KH 5HG 5KLQR whether housed in a permanent entity
ZDV DOVR QRW D SURGXFW RI :,7V ,W HJ VWUDWHJLF SODQQLQJ VFLHQFH DQG
was the result of the work of a project technology development, strategic
team, the members of which the IXWXUHV VFHQDULR SODQQLQJ KRUL]RQ
SCDF leadership carefully selected, VFDQQLQJ RXW¿WV RU FRPSRVHG LQ WKH
and tasked in a very targeted and IRUPRIGHGLFDWHGWDVNIRUFHRUWHDPV
IRFXVHG PDQQHU ,W ZDV WKH UHVXOW RI 6XFKRXW¿WVXVXDOO\ORRNDWSUREOHPV
D WRSGRZQ RU GLUHFWHG LQQRYDWLRQ which are more complex and look for
,QGHHG WKH UHVROYH DQG FRPPLWPHQW solutions which are strategic or for
of the SCDF leadership to persist new knowledge or technology which
and drive the innovation to gain DUHSRWHQWLDOO\JDPHFKDQJLQJ
acceptance was crucial as there was 6XFKVSHFLDOLVWRXW¿WVDOVRDQDO\VH
initially strong resistance from the trends and signals to anticipate the
men, schooled as they had been, in a possible futures we may face – in the
WUDGLWLRQDO¿UH¿JKWLQJUHJLPHQZKLFK Home Team’s case, these are changes
T
HE QUALITY OF leadership at The value of the innovation
all levels in an organisation programme in the Home Team is
is the single most important QRW MXVW WR GLVFRYHU WKH VSHFL¿F
factor determining the depth and innovation itself that would promote
extent of success of the innovation JUHDWHU HI¿FLHQF\ RU VROYH D SUREOHP
strategy in any organisation. Above at work. It is even more important to
all, it sets the tone and values in the promote the broader development of
relationship between supervisor an innovation culture. This is more
and the supervised which can either valuable than any single innovation.
inhibit or facilitate innovation. Is This is because invariably, such a
staff feedback welcomed? Are staff culture means having developed
PHPEHUV FRQ¿GHQW DERXW VXUIDFLQJ DGDSWLYH DQG WKLQNLQJ RI¿FHUV ZKR
LGHDV RU UHÀHFWLQJ SUREOHPV DQG are engaged.
challenges that they see or face This is more critical today
without risk of being misunderstood then ever before. An organisation
or embarrassed by being put down RI VXFK RI¿FHUV ZLOO EH EHWWHU
or rejected dismissively? Do placed to possess and exercise the
we value the experience of our DGDSWLYH UHÀH[HV DQG FDSDFLWLHV WR
RI¿FHUV" 'R ZH SURPRWH WKH KDELW survive disruptive operating and
O
Creating and rooting practices to NE SIZE DOES QRW ¿W DOO DQG
develop such a culture of innovation, FHUWDLQO\ QRW RYHU WLPH
adaptability and receptiveness to Progress in the innovation
change in the public service was a journey among different people in
NH\YDOXHLQ:,7V7KLVZDVSHUKDSV different organisations is inevitably
the reason why mass participation XQHYHQ +HQFH PRUH DQG PRUH
EHFDPH VXFK D ¿[DWLRQ LQ WKH FHQWUDO departments and their staff outgrew
PDQDJHPHQW RI WKH:,7V PRYHPHQW WKH :,7V DQDO\WLFDO WRRONLW DQG LWV
:KLOH WKH ¿UVW \HDUV RI WKH :,7V ULJLG IRUPV RI SUHVHQWDWLRQ ,QGHHG
movement probably held more gains DIWHU WKH ¿UVW KDUYHVW RI ORZ KDQJLQJ
than losses, the decades that followed fruits, the next order of meaningful
XQWLO LQWHUYHQWLRQV LQ UHFHQW \HDUV problems tackled are usually more
SURYRNHG ZLGHVSUHDG F\QLFLVP GHPDQGLQJ 7KH\ DOVR UHTXLUH PRUH
Participation became a chore and for extended time-lines than adherence
many managers including those in WR WKH DQQXDO FDOHQGDU WKDW WKH :,7V
WKH+RPH7HDPWKH:,7VPRYHPHQW F\FOHDOORZHG
EHFDPHDQXPEHUVJDPH Fortunately, these excesses
7KHVWRU\RIWKH:,7VPRYHPHQWLV and rigidities are recognised and
a subject that merits deeper research EHLQJ DGGUHVVHG 7KH IRFXV LV PRUH
DQG D IXOO FDVH KLVWRU\ +RZHYHU LQ RXWFRPHEDVHG :H KDYH OLEHUDOLVHG
the Home Team, what was clear was the forms of innovation activity
WKDWPHHWLQJ.3,V.H\3HUIRUPDQQFH and hopefully lower the barriers to
,QGLFDWRUVLPSRVHGFHQWUDOO\EHFDPH SDUWLFLSDWLRQ ,Q WKH +RPH 7HDP
an end in themselves and led to a departments are today free to adopt
GLVWRUWLRQ RI LQWHQGHG EHKDYLRXU and implement initiatives as well
Form displaced substance; quantity as to seek out, create and exploit
UHSODFHG TXDOLW\5 The innovation RSSRUWXQLWLHV EDVHG RQ WKH VSHFL¿F
movement in the Home Team, as realities of their organisation and
elsewhere, became undermined by RSHUDWLQJWHUUDLQ
bureaucractic excesses and rigidities 7KH+RPH7HDP+7'HSDUWPHQWV
in the management of the programme have in recent years created their own
itself, ironically the very thing – IRUPV RI HQJDJHPHQW 7KH 6&')
VWLÀLQJ EDUULHUV WR LQQRYDWLRQ ± WKDW ODXQFKHG LWV ,QQRYHQWXUH &OXE LQ -XO\
the movement and its programme IRULWVRI¿FHUVIURPYDULRXVXQLWV
ZHUHFRQFHLYHGWRUHPRYH with a keen interest in innovation-
I
NNOVATION IN ANY organisation, of necessity being the mother of
the Home Team included, cannot LQYHQWLRQ KDV SURYHQ WUXH 7KH
be a free-for-all pursuit backed many successful e-services which
EDITOR’S NOTES
Our cover story shares insights and lessons about managing innovation in the Home Team
ZKLFK LV OHDUQW IURP LWV H[SHULHQFH LQ WKH SXEOLF VHFWRU¶V LQQRYDWLRQ MRXUQH\ 7KLV FRYHU
story is jointly written by Mr Benny Lim, Permanent Secretary, Ministry of Home Affairs
0+$ 0U -DFNVRQ /LP 6HQLRU 'LUHFWRU 6WUDWHJLF 3ODQQLQJ DQG 'HYHORSPHQW 'LYLVLRQ
63'0+$DQG0U7HRQJ+RZ+ZD'HSXW\'LUHFWRU63'0+$
T
ECHNOLOGY IS STRONGLY tools, rules and discipline to
associated with the idea generate, evaluate and experiment
RI LQQRYDWLRQ 7KLV LV QRW ZLWK QHZ LGHDV *HQHUDWLQJ IUHVK
VXUSULVLQJ JLYHQ WKH GL]]\LQJ VSHHG ideas, identifying new opportunities,
of technological advancement in the exploiting new technologies are not
last few decades and the pervasive solely managerial tasks, but are also
impact of technology on our lives, RUJDQLVDWLRQZLGHWDVNV
IRUJRRGDQGIRUEDG To leverage on technological
Terrorists today have access to innovation, the Technology and
many of the latest technologies and ,QIUDVWUXFWXUH 7 , 'LYLVLRQ
KDYH H[SORLWHG WKHP WR LQÀLFW WKH has developed and implemented
PD[LPXP GDPDJH SRVVLEOH 7R VWD\ a Strategic Technology Planning
ahead of our adversaries, especially 673 IUDPHZRUN ,W LV D IRUPDO
when faced with tight resource process that brings together relevant
constraints such as manpower, Operational and Technology
the Home Team must leverage on 2I¿FHUVIURP0LQLVWU\+HDGTXDUWHUV
technological innovation as a key +4 DQG WKH +RPH 7HDP
strategy to raise productivity and 'HSDUWPHQWV +7'V WR DGGUHVV
HQKDQFH6LQJDSRUH¶VVHFXULW\SRVWXUH the entire technology value chain
We must constantly adapt to IURP LGHQWL¿FDWLRQ WR WUDFNLQJ WR
the fast-changing technological HYDOXDWLRQ DQG DGRSWLRQ 7KURXJK
landscape and ensure close close ops-tech collaboration,
µEXVLQHVVWRWHFKQRORJ\¶DOLJQPHQWV Strategic Technology Planning
This requires a strong leadership helps to ensure that the Home
to build an adaptive and innovative Team adopts new technologies that
culture that can respond rapidly can meet its challenges effectively
WR FKDQJLQJ H[WHUQDO FRQGLWLRQV DQGHI¿FLHQWO\
,W DOVR UHTXLUHV D ZHOOPDQDJHG 7KHVSHFL¿FREMHFWLYHVRI6WUDWHJLF
RUJDQLVDWLRQDO SURFHVV ZLWK VSHFL¿F Technology Planning are as follows:
T
of technology by the HE STRATEGIC TECHNOLOGY
Home Team Planning process consists
LLL%XLOG XS WHFKQRORJLFDO RI ¿YH VWDJHV QDPHO\
expertise within the Home Scope, Track, Prioritise, Evaluate
Team, and and Encourage Adoption1 7KH
LY+HOS RI¿FHUV LQ WKH +RPH ¿YHVWDJH IRUPDOLVHG SURFHVV LV
Team harness technologies XVHG WR ¿QG SURPLVLQJ FDQGLGDWHV
applicable to their operational from the vast and ever-changing
HQYLURQPHQWV array of technologies available for
consideration for deployment by the
The Ministry’s Enterprise +RPH 7HDP 7KH GLDJUDP )LJ
Architecture Governance Council is below depicts the iterative nature of
the Steering Committee that drives WKHSURFHVV
and provides direction to MHA
6WUDWHJLF 7HFKQRORJ\ 3ODQQLQJ ,W
is chaired by Deputy Secretary/
Security and comprises the Deputy
Heads of Departments and the
Senior Directors of the Technology
,QIUDVWUXFWXUH 6WUDWHJLF 3ODQQLQJ
Fig 1: Five-Stage Process of the Strategic
DQG+RPHIURQW6HFXULW\'LYLVLRQV Technology Planning
The Strategic Technology Core
7HDP 67&7 ZDV IRUPHG WR Stage 1: Scope
VXSSRUW WKH 6WHHULQJ &RPPLWWHH
T
,W FRPSULVHV RI¿FHUV IURP WKH HE MAIN PURPOSE of this stage is
,QIRUPDWLRQ 7HFKQRORJ\ %UDQFK to provide focus for Strategic
,7% DQG 7HFKQRORJ\ 'HYHORSPHQW Technology Planning by
%UDQFK 7'% LQ 7 , 'LYLVLRQ DQG identifying technologies which are
,7 UHSUHVHQWDWLYHV IURP +7'V ,WV DOLJQHG WR EXVLQHVV REMHFWLYHV ,Q
primary focus is on technologies this stage, the STCT also helps the
with potential impact across the HTDs understand how emerging
Home Team while at the same time technologies can and will shape
maintaining oversight of technology their business models, operations
trials that are undertaken by the DQG SURFHVVHV 7R HQVXUH DOLJQPHQW
respective HTDs to serve their to the Home Team’s broad strategic
VSHFL¿FQHHGV directions, and to meet the respective
TECHNOLOGY CLUSTERS
IN STRATEGIC
TECHNOLOGY PLANNING
T
ECHNOLOGY CLUSTERS ARE
)LJ,QSXWVWR6WDJHRIWKH6WUDWHJLF
Technology Planning Process
formed to carry out the
remaining stages of the
The outcome from Stage 1 is Strategic Technology Planning
D OLVW RI WHFKQRORJLHV LGHQWL¿HG WR SURFHVV (YHU\ 7HFKQRORJ\ &OXVWHU
be of operational importance to plays a crucial role in ensuring the
+7'V 7KHVH WHFKQRORJLHV ZLOO successful execution of Strategic
be further categorised for the Technology Planning in the Home
respective Technology Clusters to 7HDP 2YHU WKH ODVW WZR \HDUV ¿YH
conduct a more focused evaluation Technology Clusters have been
IRU SRVVLEOH +RPH 7HDP DGRSWLRQ IRUPHG7KH\DUH
T
and make decisions ECHNOLOGY TRACKING INVOLVES
through statistical and scanning and watching for
TXDQWLWDWLYHDQDO\VLV new technology developments
within each Technology Cluster,
iv. Communications – covers and capturing information about the
wireless communications associated emerging technologies in
technologies needed to facilitate a format that facilitates subsequent
effective voice and data SULRULWLVDWLRQDQGHYDOXDWLRQ)RUHDFK
FRPPXQLFDWLRQVIRU+7'V WHFKQRORJ\LGHQWL¿HGWKH7HFKQRORJ\
1DPHDQGGH¿QLWLRQRI a. High
technology The established business case
Business applications in using the technology is
%HQH¿WWR0+$ clear and there are numerous
Potential business champion, examples of mass adoption of
and WKHWHFKQRORJ\
Home Team Departments
interested/investigating this b. Moderate
technology There are some clearly
Leading vendors GH¿QHG DSSOLFDWLRQV IRU
Costs the technology where the
EHQH¿WV IDU RXWZHLJK WKH
problems encountered with
7KH WHFKQRORJ\ SUR¿OHV VHUYH DV
WKHWHFKQRORJ\
inputs for the subsequent stages of
Strategic Technology Planning as well
c. Low
as a source of valuable information
The technology is most likely
DERXW D VSHFL¿F WHFKQRORJ\ IRU WKH
applied in demonstrations,
+RPH7HDP
prototypes and pilots with few
GHSOR\HGDSSOLFDWLRQV
Stage 3: Prioritise
T
Technologies that score high on the
HE OBJECTIVE OF prioritisation level of maturity will be of immediate
is to select a subset of the interest to the Technology Clusters for
emerging technologies within them to evaluate the potential areas of
the Technology Cluster that look the DSSOLFDWLRQLQWKH+RPH7HDP
PRVW SURPLVLQJ WR WKH +RPH 7HDP ,I
WKH7HFKQRORJ\&OXVWHUZHUHWR¿QGWKH 2. Level of Disruption
QXPEHURIWHFKQRORJLHVLGHQWL¿HGXQGHU (High, Moderate, Low)
Stage 2 manageable, they can decide to
skip this stage and proceed to the next a. High
VWDJH7KHIROORZLQJDUHSRVVLEOHFULWHULD As an example, this could mean
WRUDQNWKHOLVWRIWHFKQRORJLHVLGHQWL¿HG that a complete replacement
of network, hardware,
Level of Maturity and software or business
Level of Disruption infrastructure is needed in order
%HQH¿WWRWKH+RPH7HDP WRLQWURGXFHWKHWHFKQRORJ\
T
new ways of performing HE PURPOSE OF this stage is to
VSHFL¿F RSHUDWLRQDO DUHDV investigate the list of prioritised
in Home Team resulting in emerging technologies in order
improvement in the Home WRDWWDLQVXI¿FLHQWNQRZOHGJHDERXWWKH
7HDP¶V.3,V technology and to determine whether
WKHWHFKQRORJ\LVVXLWDEOHIRUDGRSWLRQ
c. Moderate Depending on the availability of
The technology provides resources, the Technology Cluster
incremental improvements to can decide on whether to kick-
established processes in the start evaluation on all prioritised
Home Team resulting in some technologies or start with only the
improvements in the Home KLJKHU SULRULW\ WHFKQRORJLHV $Q
7HDP¶V.3,V evaluation project team under the
T
paper investigations, trials,
HE ACTIVITIES ASSOCIATED
prototyping and pilots.
with encouraging the use of
technologies can include:
The key deliverable from an
evaluation activity is a decision as
a. Education and Promotion
to whether or not to proceed with a
This involves creating
VSHFLILFDGRSWLRQRIWKHWHFKQRORJ\
awareness of the technology in
At the end of the evaluation, the
the Home Team, what value it
team may recommend one of the
brings to the Home Team and
following outcomes:
WKHDSSOLFDWLRQRSSRUWXQLWLHV
H
evaluated and the kind of
AVING A STRATEGIC Technology evaluation which have been
Planning process in the Home or will be conducted in the
Team has smoothened the way +RPH 7HDP 7KH IHDWXUHV
IRUWKHLGHQWL¿FDWLRQDQGLPSOHPHQWDWLRQ of the website include tools
of emerging technologies that are useful to manage the technology
IRU WKH +RPH 7HDP 6SHFL¿FDOO\ exploration of HTDs and
Strategic Technology Planning has Technology Clusters, as
brought about the following for the well as to share technology
Home Team: watchlists and evaluation
UHSRUWV 7KH IHDWXUHV DUH
a. Closer collaboration
GHSLFWHGLQWKHGLDJUDP)LJ
Co-ordinating technology
RQWKHQH[WSDJH
scanning activities across
the HTDs has minimised the c. Cost Savings
duplication of efforts and With a common front to
enabled HTDs to leverage engage the technology
and build on the successes vendors, the Home Team is
RI HDFK RWKHU 7KLV SURFHVV also able to avoid duplication
also allows decisions about of efforts in evaluating a new
the technologies to be made WHFKQRORJ\7KLVZLOOUHVXOWLQ
based on an alignment with FRVWVDYLQJV
TECHNOLOGY CLUSTER
TRIALS
M
ANY TECHNOLOGY TRIALS
have been carried out by the
7HFKQRORJ\ &OXVWHUV +HUH
are some highlights:
)LJ6DPSOH%XVLQHVV
Analytics dashboard
a. Business Analytics
Technology Cluster can be readily available at the
DQDO\VWV¶ ¿QJHUWLSV ZLWKRXW WKH
i. Central Narcotics Bureau need for time-consuming report
(CNB) Trial on Drug Offences. JHQHUDWLRQ ,Q DGGLWLRQ WKH
This trial looked at combining tools can enable the portability
various CNB data sources, of information as the dashboard
namely databases, excel FDQ EH YLHZHG RIÀLQH RQ D
¿OHV DQG DFFHVV GDWDEDVHV VWDQGDORQHQRWHERRN
to get a holistic view of drug The trial also showcased the
RIIHQFHV¶ WUHQGV DQG VWDWLVWLFV ability for analysts to uncover
The trial has proven that the possible reasons behind the
deployment of the business drug offence trends in the
analytics tool can result in cost VKRUWHVW SRVVLEOH WLPH )RU
savings as data/information example, analysts are able to
T
SPF is currently evaluating the HE TECHNOLOGY CLUSTER
approach to implementing the is working closely with
WHFKQRORJ\ the Singapore Civil
)LJ([WHUQDOSDQWLOW]RRPFDPHUD )LJ,QWHUQDOO\PRXQWHG¿[HGFDPHUD
T
HROUGH THESTRATEGIC Technology and marries these with emerging
Planning process, the Home technological capabilities to help
Team can operationalise MHA achieve its mission of a safe
its key strategy for leveraging on DQGVHFXUHKRPH
technological innovation to meet the
daunting challenges of Homeland REFERENCES
6HFXULW\ ,Q DGGLWLRQ 6WUDWHJLF
)LYH 6WDJH 6WUDWHJLF 7HFKQRORJ\ 3ODQQLQJ
Technology Planning provides Process is adapted from Gartner Research
a systematic way of identifying article - ‘STREET Framework Applies to
'LVWULEXWHG ,QQRYDWLRQ¶ E\ -DFNLH )HQQ
technologies that can act as force 0D\
EDITOR’S NOTES
0U&KHQ7]H3HQQLVWKH6HQLRU'LUHFWRURIWKH7HFKQRORJ\ ,QIUDVWUXFWXUH'LYLVLRQRI0+4
0+$0V7HR0XQ(QJLVWKH'LUHFWRURIWKH,QIRUPDWLRQ7HFKQRORJ\%UDQFK7 ,'LYLVLRQ
7KH 7HFKQRORJ\ DQG ,QIUDVWUXFWXUH 7 , 'LYLVLRQ ZRUNV LQ FORVH FRQVXOWDWLRQ DQG
coordination with all the departments in MHA to ensure that their operations are well
VXSSRUWHGE\XSWRGDWHDQGFRVWHIIHFWLYHWHFKQRORJLHV,WSOD\VDFULWLFDOUROHLQVXSSRUWLQJ
LQQRYDWLRQWKURXJKWHFKQRORJ\
T
HE CONVENTIONAL FIRE engine ¿UH VDIHW\ EXLOGLQJ UHTXLUHPHQWV DQG
is indispensable for handling standards were comprehensively and
major incidents such as larger- FOHDUO\DUWLFXODWHGDQGFRPSOLHGZLWK
VFDOHLQGXVWULDODQGFRPPHUFLDO¿UHV A robust inspection regime by SCDF
However, the development of modern JDYH LW FRQ¿GHQFH DV ZHOO WKDW WKLV
high-rise residential and industrial VWDWH RI DIIDLUV ZRXOG EH VXVWDLQHG
buildings and estates in Singapore $V VXFK PDMRU ¿UHV LQ LQGXVWU\
gave rise to entry and access and commercial establishments in
OLPLWDWLRQV ([DPSOHV LQFOXGH PXOWL Singapore were exceptional and not a
storey car parks, sheltered pedestrian IUHTXHQWRFFXUUHQFH
walkways and narrow vehicular $QDO\VLV RI ¿UH VWDWLVWLFV RI
DFFHVVURXWHV incidents showed instead that
This in turn placed severe PRVW ¿UHV ZHUH LQ VPDOO KLJKULVH
limitations on the conventional residential apartments in the public
SXPSHUV 7KHLU ODUJH FKDVVLV DQG KRXVLQJ KHDUWODQG ,QGHHG WKHUH
IUDPH PDNH LW UHODWLYHO\ GLI¿FXOW IRU was a trend of consistent increase in
them to gain entry using narrow, low WKH RFFXUUHQFH RI VXFK ¿UHV :LWK
RU UHVWULFWHG DFFHVV URXWHV 7KH ¿UH FRPSUHKHQVLYH ¿UH VDIHW\ SURYLVLRQV
SXPSHUVDOVRHQFRXQWHUHGGLI¿FXOWLHV LQ KLJKULVH EXLOGLQJV LH ZDWHU
going off the road in order to attack ULVHUVLQSODFHDQGDUHOLDEOHK\GUDQW
¿UHVDWFORVHUDQJH network available in Singapore, the
QHHG IRU D ¿UH HQJLQH WR FDUU\ VHOI
INNOVATION – VXI¿FLHQW ZDWHU VXSSO\ ZDV OHVV
FROM IDEA TO PRODUCT FULWLFDOLQVXFKLQFLGHQWV7KLVLQWXUQ
raised the practical possibility of a
S
CDF MANAGEMENT DIRECTED smaller operational vehicle with a
a study of the problem and OHDQHU¿UH¿JKWLQJFUHZ
VLJQL¿FDQFH 2YHU WKH \HDUV This was not a new direction
there was a generally well developed in the development of operational
¿UH VDIHW\ FXOWXUH LQ LQGXVWU\ DQG FDSDELOLWLHV )LUH ELNHV KDG EHHQ
T
HQKDQFHRXU¿UH¿JKWLQJFDSDELOLWLHVLQ HE RED RHINO is much smaller
FRPEDWLQJ ¿UHV ZLWKLQ KRXVLQJ HVWDWHV LQ VL]H LQ FRPSDULVRQ ZLWK
LQXUEDQVHWWLQJV WKH WUDGLWLRQDO ¿UH HQJLQH ,Q
The project team worked with terms of operational performance, the
industry players and developed the Red Rhino’s water pumping capacity
concept and operational and technical DQGÀRZUDWHLVDOVRORZHUWKDQZKDW
UHTXLUHPHQWV RI D SURWRW\SH YHKLFOH LV SHUIRUPHG E\ WKH ¿UH HQJLQH
The SCDF team also worked out the However, the capabilities provided
VSHFL¿F OLVW RI LWHPV WKDW WKH YHKLFOH LV E\WKH5HG5KLQRDUHVXI¿FHWRWDFNOH
required to carry based on the kind of PRVW RI WKH VPDOO ¿UHV DQG VLPSOHU
VFHQDULRVLWZDVOLNHO\WREHGHSOR\HGLQ UHVFXHLQFLGHQWV
,Q WKH DYDLODEOH RSWLRQV RI
the chassis of what was essentially a IMPACT OF THE
vehicle heavier than standard vehicles RED RHINO
RI WKH VDPH VL]H LQ WKH PDUNHW ZHUH
W
analysed for the prototype and the ITH THE RED Rhinos, a
GHVLJQ DQG OD\RXW ZDV GHWHUPLQHG valuable operational option
Field testing was conducted and all was made available to
IXUWKHUPRGL¿FDWLRQVZHUHFRPSOHWHG SCDF to match response with
LQ0DU WKH WKUHDW )LUH SXPSHUV FRXOG EH
DFWLYDWHG IRU ODUJHU VFDOH ¿UHV ZKLOH Based on the statistics over the
WKH ¿UH ELNHV DQG 5HG 5KLQRV FRXOG last few years, the Red Rhinos has
EHVHQWIRUVPDOOHU¿UHV$OWHUQDWLYHO\ proven to be highly effective in
a combination of resources could also WDFNOLQJ VPDOO WR PHGLXP VL]H ¿UHV
EH GLVSDWFKHG WR GHDO ZLWK LQFLGHQWV DQG VLPSOH UHVFXH LQFLGHQWV $ERXW
7R GDWH DOO WKH ¿UH VWDWLRQV ZLWK WKH RI WKH DQQXDO ¿UH FDOOV DQG
H[FHSWLRQRI-XURQJ,VODQGDQG%DQ\DQ rescue incidents are handled by the
)6DUHHTXLSSHGZLWK5HG5KLQRV 5HG5KLQRV
Fire
Total No Incident Total No Rescue Incident
of Fire attended by of Rescue attended by Red
Year Incidents Red Rhino Incidents Rhino
2007
2008 2371
A
parking lot without inconveniencing the T THAT TIME,
the idea of
RWKHU+'%YHKLFOHRZQHUUHVLGHQWV developing a new vehicle
totally different from the
FURTHER ENHANCEMENTS existing appliances in service
– RED RHINO 2.0 ZDV FRQVLGHUHG UDGLFDO DQG EROG
The notion of omitting the water
I
N 2009, THE Red Rhino underwent tank totally was also felt to be
GHVLJQDQGFRQVWUXFWLRQHQKDQFHPHQW XQLPDJLQDEOH E\ VRPH RI¿FHUV
The newly designed Red Rhino, The then Commissioner of SCDF,
is aimed to enhance the vehicle’s 0U -DPHV 7DQ HQFRXUDJHG WKH
EDITOR’S NOTES
7HRQJ +RZ +ZD LV D /W &RORQHO LQ WKH 6LQJDSRUH &LYLO 'HIHQFH )RUFH 6&') +H LV
SUHVHQWO\VHFRQGHGWR0+40+$DV'HSXW\'LUHFWRUIRU6WUDWHJLF'HYHORSPHQW
4HE
F
OREIGNERS CALL ON the WHAT IS THE eVISTOR
,PPLJUDWLRQ DQG &KHFNSRLQWV PROGRAMME?
$XWKRULW\ ,&$ WR DSSO\ IRU D
T
range of services from the extension HE eVISITOR PROGRAMME is a
of stay to the application of long- unique, integrated suite of
WHUP RU VWXGHQW¶V SDVVHV ,Q UHFHQW online services to cater to the
years, the visitor base has grown varied needs of increasing demand
FRQVLGHUDEO\ 7KLV FDQ EH DWWULEXWHG for visitor immigration services in
to the Singapore government’s efforts 6LQJDSRUH 7KH H9LVLWRU 3URJUDPPH
to promote the country as a tourism, is interfaced with validation portals
education and medical hub and and border control systems to provide
Singapore’s naturalisation efforts to visitors with a totally seamless
DXJPHQWWKHFRXQWU\¶VSRSXODWLRQ VHUYLFH ZKHQ YLVLWLQJ 6LQJDSRUH
The increase in demand for visitor ,W DLPV WR IDFLOLWDWH D IRUHLJQHU¶V
services is amply evident in the rise stay in Singapore by providing
RI DSSOLFDWLRQV IRU 9LVLW 3DVVHV DQG online immigration services ranging
6WXGHQW¶V 3DVVHV ,Q IDFW WKHUH ZDV from their application of entry
an increase of 186 % from 220,000 visa and application of additional
applications in 2003 to 630,000 facilities whilst in Singapore to their
DSSOLFDWLRQV LQ )LJXUH 7KH GHSDUWXUH IURP 6LQJDSRUH )LJXUH
increase in demand for visitor services 2 shows the slew of the key online
resulted in a perpetual crowd at the services available in the programme
9LVLWRU6HUYLFHV&HQWHU96&DQGSXW and how they are interfaced and
µSUHVVXUH¶ RQ ,&$¶V VWDII DQG VHUYLFH integrated to achieve the ease
GHOLYHU\ 6WDII KDG WR GR RYHUWLPH IRU DQG FRQYHQLHQFH WKDW ERQD ¿GH
PXFK RI WKH ZHHN 7R DGGUHVV WKHVH YLVLWRUV¶H[SHULHQFH
P
REVIOUSLY, MOST the OF both be achieved together? Does a
VHUYLFHV DW 9 6 & Z H U H YLVLWRU QHHG WR FRPH WR ,&$ LQ WKH
accessed by customers first place? Do we need to have
WKURXJK WKH SK\VLFDO FKDQQHOV sight of his passport? Do we need
These physical channels required to make physical endorsements on
comparatively more resources than the passports? Can we work with
that of the self-service and virtual partners to extend our presence
FKDQQHOV +HQFH WKH LPSHWXV WR EH\RQGWKH,&$SUHPLVHV"
minimise the physical channels
DQG FRQWDFW WLPH ZLWK FXVWRPHUV OUR VALUE PROPOSITION
7R GR WKLV ,&$ UHFRJQLVHG WKH
need to leverage on technology Innovative and Novel
to bring service into the ‘virtual Approach – Manual versus
world’ and to engage and empower Online Process
partners to provide alternative
I
“service windows” in order to bring N THE PAST, visitors who applied
convenience and added value to for a short extension of stay in
LWVFXVWRPHUV Singapore would need to visit
,W ZDV QRW HDV\ WR LPSOHPHQW ,W ,&$ DORQJ ZLWK KLVKHU ORFDO VSRQVRU
was not merely replicating the ‘old DQG¿OORXWDSDJHGHFODUDWLRQIRUP
or physical procedures’ into the before submitting the application
YLUWXDO RU RQOLQH ZRUOG ,W UHTXLUHG RYHU WKH FRXQWHU 7KH DSSOLFDQW DQG
radical thinking, challenging sponsor could expect to spend almost
entrenched ways and paving new D ZKROH GD\ WUDYHOOLQJ WR ,&$ DQG
ZD\V RI GRLQJ WKLQJV )XQGDPHQWDO waiting for an outcome which comes
questions were asked before in the form of a physical endorsement
embarking on the Programme RQWKHSDVVSRUW
)LJXUH±&RPSDULVRQEHWZHHQ0DQXDODQGH9LVLWRUSURFHVVIRU([WHQVLRQRIVKRUW6WD\
T
HE SYSTEM WAS designed to be an innovative and novel approach,
XVHUIULHQGO\ DQG FRQYHQLHQW challenging conventional wisdom
The customer only needs to that a visa must only be issued in the
key in 5 data points for the online IRUPRISK\VLFDOODEHOYLVDODEHORQ
DSSOLFDWLRQ 7KLV LV D IDU FU\ IURP WKH SDVVSRUW 8QGHU eVisa, the local
the past where they were expected to contact and applicants no longer need
)LJXUH±&RPSDULVRQEHWZHHQ0DQXDODQGH9LVLWRU3URFHVVIRU$SSOLFDWLRQRI9LVD
L
IKE THE SLEW of online services SDVW FKHFNSRLQW RI¿FHUV UHOLHG RQ
XQGHU WKH H9LVLWRU 3URJUDPPH endorsements on passports during
the eXtend and eVisa are departure to verify whether a visitor
equipped with a customisable, KDV QRW RYHUVWD\HG 9DOLGDWLRQ RI
complex rules engine so that it can WKHVH H[WHQVLRQV VWDPSV ZDV GLI¿FXOW
automate the decision-making for ZLWKRXW LQWLPDWHNQRZOHGJH RI ,&$¶V
legitimate cases using the retrieved VWDPSV DQG WKHLU VHFXULW\ IHDWXUHV
GDWD DQG JHQHUDWH DQ DSSURYDO RU D )RU LOOXVWUDWLRQ WZR YLVLWSDVV
GHQLDO RQOLQH ZLWKRXW DQ\ RU RQO\ endorsements are reproduced in
PLQLPDO KXPDQ LQWHUYHQWLRQ eXtend Figure 5 to illustrate the challenge of
will return a result that the applicant telling the well-forged endorsement
can receive the approval online within DQGWKHJHQXLQHRQH
DQKRXU An important feature of eXtend
over the traditional process was doing
Targeted Approach and away with the physical endorsements
Enhanced Security YLVLW SDVV H[WHQVLRQ VWDPSV HQWLUHO\
When the visit pass extension is given
D
ESPITE ITS FRONT-FACING, service- RQOLQHWRWKHYLVLWRU,&$¶VFKHFNSRLQW
RULHQWHG QDWXUH WKH H9LVLWRU systems would also be updated of
Programme was designed with KLV H[WHQVLRQ UHFRUGV 7KH YLVLWRU
VHFXULW\LQPLQGDVZHOO only needs to produce his passport
The introduction of online services and disembarkation-embarkation
XQGHU WKH 3URJUDPPH JDYH ,&$ WKH
opportunity to introduce ‘auto-rules
HQJLQH¶ LQWR LWV ZRUN SURFHVVHV 7KH
V\VWHP ZLOO ÀDJ RXW VXVSLFLRXV KLJK
risk applications for closer scrutiny,
while allowing the ‘remaining’ –
)LJXUH±%HIRUHH;WHQGRI¿FHUVZRXOG
aboveboard cases – to be approved physically check extension stamps to verify
VZLIWO\ ZLWK PLQLPDO LQWHUYHQWLRQ ZKHWKHUWKH\DUHIRUJHGOHIWRUUHDOULJKW
T
Programme’s implementation revealed HE eVISITOR PROGRAMME
the advantage of verifying the meets the increase in
immigration status of a foreigner demand of visitor services
RQOLQH )RU H[DPSOH D +RPH not only through automation, but
7HDP RI¿FHU FRQGXFWLQJ FKHFNV RQ YLUWXDOLVDWLRQRIVHUYLFHV%\SODFLQJ
foreigners in Singapore on the streets application portals online, visitors
can convey the person’s passport ZLOO ¿QG LW PRUH FRQYHQLHQW WR
GHWDLOVEDFNWRKLVFRXQWHUSDUWLQRI¿FH access immigration services without
ZLWKDFFHVVWR,&$¶VYDOLGDWLRQSRUWDO the need to increase manpower and
7KLV YHUL¿FDWLRQ LV PRUH UHOLDEOH DV LW ÀRRUVSDFHWRKDQGOHWKHVXEVWDQWLDO
is far less likely to be compromised ULVHLQWUDI¿F
FRPSDUHGWRDSK\VLFDOHQGRUVHPHQW For long-term stay visitors
Hence, by doing away with the LGHQWL¿HG DV ORQJWHUP SDVV
physical endorsement on the passport KROGHUV DQG VWXGHQW SDVV KROGHUV
DQG SURYLGLQJ RQOLQH YHUL¿FDWLRQ YLVLWVWR,&$%DUHVWLOOQHFHVVDU\WR
instead, the Programme has reduced complete their biometric enrollment
the opportunity for syndicates to use DQG YHUL¿FDWLRQ RI GRFXPHQWV DQG
forged or tampered endorsements FHUWL¿FDWHV,QWKHSDVW/RQJ7HUP
to facilitate the entry or departure of 3DVV /73 KROGHUV XVHG WR FRPH
undesirables and prolonging their stay WR ,&$ WR DSSO\ IRU WKH SDVV WKHQ
LQ6LQJDSRUH again make a return trip to complete
8QGHU WKH H9LVLWRU 3URJUDPPH formalities, and collect the LTP
the integrity of the system ensures FDUG :KHQ DQ DSSOLFDQW ZDQWV
data shown in the system is tamper- to apply for automated clearance
)LJXUH±&RPSDULVRQEHWZHHQ0DQXDODQGH9LVLWRU3URFHVVIRUDSSOLFDWLRQRI
/RQJ7HUP3DVV/73DQGDXWRPDWHGFOHDUDQFHIDFLOLW\H,$&6
T
HE EVISITOR PROGRAMME DSSO\ IRU YLVD E\ WKHPVHOYHV $IWHU
provides an opportunity for receiving treatment they would
,&$ WR ZRUN ZLWK VWUDWHJLF have to apply for extension of stay
partners to create alternative service personally should their treatment
ZLQGRZV IRU LPPLJUDWLRQ VHUYLFHV UHTXLUHLW$Q\FDUHJLYHUYLVLWRUZRXOG
The review of existing services also have to do the visa applications
showed that not only can services be DQGH[WHQVLRQVE\WKHPVHOYHV
virtualised – they can also be handled Previously, the local contact
E\WUXVWHGSDUWQHUV or visitor is required to produce
As a direct effect of this documents/medical memo from the
UHDOLVDWLRQ ,&$ ZDV DEOH WR ZRUN local doctor or healthcare player
with Singpost to provide online to support the visa application or
assistance for visitors who need to H[WHQVLRQ RI VWD\ LQ 6LQJDSRUH $V
access the slew of online services SDUWRIGXHGLOLJHQFH,&$KDVLQVRPH
XQGHUWKHH9LVLWRU3URJUDPPH7KLV cases contacted the doctor/healthcare
is especially beneficial for visitors provider to ascertain if the documents
who are not tech-savvy to apply SURGXFHGDUHYDOLGDQGJHQXLQH1RZ
for online immigration services XQGHU WKH H9LVLWRU¶V 7UXVWHG 3DUWQHU
E\ WKHPVHOYHV HJ IRU D IHH Programme, local hospitals and
)LJXUH±H9LVLWRU3URJUDPPHHQDEOHVSDUWQHUVWRSURYLGHYDOXHDGGHGVHUYLFHVIRUWKHLUFXVWRPHUVZKLOH
VHUYLQJDVDOWHUQDWLYHVHUYLFHZLQGRZFUHDWLQJDQDOOZLQFRPELQDWLRQIRU,&$WKHSDUWQHUDQGWKHYLVLWRU
T
RUSHU\HDU7KLVWUDQVODWHV
HE INTRODUCTION OF H9LVLWRU to a reduction of 1.5 million trips
Programme has shown an SHU\HDUWR,&$E\FXVWRPHUV
improvement in the speed of
services and public perception of Cost Savings/Avoidance
,&$)LJXUHLOOXVWUDWHVWKHLPSURYHG
T
customer satisfaction results arising HE IMPLEMENTATION OF the
from a survey by Forbes over 3 Programme has helped achieve
VHSDUDWH SHULRGV RU ZDYHV IURP cost savings and cost avoidance
WR IRUERWK,&$DQGWKHSXEOLF
,&$ LV DEOH WR DFKLHYH
Reduction of Crowds at million savings per year by
ICA Building doing away with physical visas,
T
HE IMPROVEMENT ISeven postage costs etc when the
more apparent by the easing H9LVLWRU 3URJUDPPH ZDV UROOHG
RI FURZGV LQ ,&$¶V 9LVLWRU RXW ,&$ ZDV DOVR DEOH DFKLHYH D
6HUYLFHV &HQWUH 96& LQ WKH SDVW cost avoidance of up to $2 million
WR \HDUV 7KH 3URJUDPPH KDV SHU \HDU DV ,&$ ± FRVWV WKDW ZRXOG
drastically reduced the crowd otherwise be incurred to beef
DW 96& DV PRUH WKDQ RI DOO up manpower resources, expand
DSSOLFDWLRQV WR 96& DUH QRZ PDGH 96&¶V RSHUDWLRQV DUHD DQG UHODWHG
)LJXUH&XVWRPHU6DWLVIDFWLRQ6XUYH\E\)RUEHV
Enhanced Security
B
AWARDS & ACCOLADES
technology
Y LEVERAGING ON
T
to process cases with
HE eVISITOR PROGRAMME
minimal human intervention
has won numerous awards,
and a faster turn around time,
including the prestigious
we were able to redeploy about
FutureGov/ Government Technology
15% of the total staff strength
$ZDUGV DQ LQWHUQDWLRQDO
competition featuring the best from
$VLD 3DFLILF DQG WKH 0LGGOH (DVW
WKH&,2$ZDUGVDQGWKH6L7)
$ZDUGV ,W DOVR SDUWLFLSDWHG
in other international and national
competitions:
96&RQDW\SLFDODIWHUQRRQ • :LQQHU0+$L,QQRYDWLRQ
%HIRUHH9LVLWRU3URJUDPPH
Awards Winner 2008
• Recipient, Minister National
'D\$ZDUGV
• )LQDOLVW0,6$VLD,7
([FHOOHQFH$ZDUGV0D\
• Finalist UN Public Service
$ZDUGV$SULO
96&RQDW\SLFDODIWHUQRRQ
• )LQDOLVW$3,&7$$ZDUGV
$IWHUH9LVLWRU3URJUDPPH 'HFHPEHU
INSPIRING CONFIDENCE
IN ALL
I
N C ONCLUSION , T H E
H9LVLWRU 3URJUDPPH
has significantly
enhanced service delivery
DQG EURXJKW ,&$¶V VHUYLFHV FORVHU
to their doorsteps by working
with partners to provide numerous
‘alternative service windows’ to enhanced security while supporting
DFFHVV WKH LPPLJUDWLRQ IDFLOLWLHV QDWLRQDO LQLWLDWLYHV DW WKH VDPH WLPH
,&$ FUHDWLYHQHVV DQG FROODERUDWLYH This journey has also boosted staff
DSSURDFK KDV EURXJKW VLJQL¿FDQW morale by encouraging better work-
EHQH¿W DQG YDOXH WR WKH FXVWRPHU LQ life balance with less need to work
WHUPVRIFRVWVDQGWLPH<HWLWKDVDOVR overtime since work processes have
EHHQ UHGXFHG DQG VWUHDPOLQHG 7KH
“This journey has also DZDUGV FRQIHUUHG WR WKH H9LVLWRU
boosted staff morale by Programme is recognition of the
encouraging better work- excellent service consciousness and
life balance with less need VHFXULW\IRFXVRI,&$±VWDPSLQJRXU
to work overtime since role as a world-class border security
work processes have been DQG LGHQWL¿FDWLRQ RUJDQLVDWLRQ WKDW
reduced and streamlined.” renders services delighting the public
DQGLQVSLULQJFRQ¿GHQFHLQDOO
EDITOR’S NOTES
$VVLVWDQW 6XSHULQWHQGHQW RI 3ROLFH $63 'DYLG /HH LV D 7HFKQRORJ\ ([HFXWLYH LQ WKH
7HFKQRORJ\ 'LYLVLRQ RI WKH ,PPLJUDWLRQ DQG &KHFNSRLQWV $XWKRULW\ ,&$ 7KH ,&$¶V
H9LVLWRU 3URJUDPPH UHFHQWO\ ZRQ WKH 6LQJDSRUH ,QIRFRPP 7HFKQRORJ\ )HGHUDWLRQ 6L7)
$ZDUGVLQ
C
YBER-ESPIONAGE IS THE theft the attacker’s malware delivery as
of information, in particular OHJLWLPDWHHLWKHUE\VSRR¿QJWKHHPDLO
classified government as coming from a trusted source or
LQIRUPDWLRQYLDF\EHUPHDQV7KHKLJK enticing the recipient with interesting
SUR¿OHGLVFORVXUHRIGhostNet in March FRQWHQW HLWKHU DV D ¿OH DWWDFKPHQW RU
1 underscores the seriousness of the ZHEOLQN2QFHKRRGZLQNHGWRRSHQWKH
cyber-espionage threat in today’s wired PDOLFLRXV ¿OH DWWDFKPHQW RU FOLFN WKH
VRFLHWLHV ,QYHVWLJDWLRQV LQWR GhostNet web-link to be directed to a malicious
found that over 1,000 computers website, the malware is activated and
belonging to various government WKH FRPSXWHU V\VWHP LV FRPSURPLVHG
RI¿FHV VXFK DV IRUHLJQ PLQLVWULHV DQG The attacker can then gain remote
HPEDVVLHV RI ,QGLD 6RXWK .RUHD access to the system and will be able
,QGRQHVLD 5RPDQLD HWF ZHUH WR YLHZ RU GRZQORDG ¿OHV RQ WKH
VXFFHVVIXOO\ LQ¿OWUDWHG WKURXJK HPDLOV victim’s computer, monitor the victim’s
that contained malicious software, or activities so as to gather passwords
PDOZDUH 7R GDWH WKH SHUSHWUDWRUV RI and other sensitive information, or to
GhostNetUHPDLQXQNQRZQ spread malware to others by posing
This form of cyber-espionage is DV WKH YLFWLP ,W LV QRWHZRUWK\ WR DGG
FRPPRQO\NQRZQDVD7URMDQDWWDFN,W that when protecting systems against
refers to a malware that appears to be 7URMDQDWWDFNVQRDPRXQWRI,7VHFXULW\
legitimate but facilitates unauthorised software and hardware can substitute
remote access to compromised for user vigilance when confronted with
FRPSXWHU V\VWHPV LQVWHDG $OWKRXJK VXVSLFLRXVHPDLOVDQGDWWDFKPHQWV
Trojan attacks depend primarily on Trojan email attacks are not new
WKH HI¿FDF\ RI D ZHOOSURJUDPPHG WR 6LQJDSRUH %HWZHHQ DQG
malware to circumvent computer 2005, the Singapore Government saw
security detection and to execute the several waves of Trojan email attacks
orders of its controller, a successful which were commonly referred to
attack usually also involves crafty as the Trojan Riler2 DWWDFNV ,Q IRXU
VRFLDO HQJLQHHULQJ WHFKQLTXHV 7KHVH waves of attack over a span of 2 years,
techniques are aimed at masquerading civil servants in several ministries
I
N THE LEAD-UP to the recently to try to trick APEC delegates into
FRQFOXGHG $VLD3DFL¿F (FRQRPLF opening an email and executing an
&RRSHUDWLRQ APEC PHHWLQJV LQIHFWHG DWWDFKPHQW $QDO\VLV RI
held in Singapore, purposely crafted this attack surfaced that legitimate
emails from attackers impersonating as LQIRUPDWLRQUHOHYDQWWRWKH$3(&
6LQJDSRUH JRYHUQPHQW RI¿FLDOV RI WKH meetings was exploited to craft the
$3(&2UJDQLVLQJ&RPPLWWHHZHUH DWWDFN HPDLO 8VLQJ WKH LQIRUPDWLRQ
VHQW WR $3(& RI¿FLDOV DQG GHOHJDWHV as a cloak of legitimacy, in this case,
of various APEC economies, with the details of an actual APEC symposium,
DLP RI LQ¿OWUDWLQJ WKHLU FRPSXWHUV DQG the perpetrators masqueraded as a
H[WUDFWLQJSULYLOHJHGLQIRUPDWLRQ7KHUH 6LQJDSRUH RI¿FLDO WR LQYLWH VHYHUDO
T
HE MALWARE USED in 0LFURVRIW 2I¿FH LQVWDOOHG FRPSXWHU
these attacks were highly services running and programmes
sophisticated and stealthy installed, so as to understand
enough to evade the detection of WKH FRPSXWHU¶V YXOQHUDELOLWLHV
PRVW DQWLYLUXV SURJUDPPHV 7HVWLQJ Understanding such vulnerabilities
of the malware surfaced that the would facilitate the perpetrators in
Trojan would call back to the attack- executing attacks on other computers
control server on a regular basis UHVLGLQJLQWKHVDPHQHWZRUN
WR UHFHLYH LQVWUXFWLRQV 2QFH WKH The perpetrators were technically
instructions were received, more savvy and demonstrated security
malware would be executed on the FRQVFLRXVQHVV 2WKHU WKDQ GHOHWLQJ
LQIHFWHG V\VWHP 7KH 7URMDQ DOORZHG their traces in the infected computers
WKH DWWDFNHUV DFFHVV WR DOO WKH ¿OHV LQ DIWHUWKH\KDG¿QLVKHGWKHLURSHUDWLRQV
the compromised computer, monitor they also established anti-tracking
its activities and communications, operational set-ups, for example, their
obtain usernames and passwords, and control servers were registered with
essentially take full control of the fake names just prior to the attacks,
YLFWLP¶VFRPSXWHU and likely to be used purely for
controlling the Trojans and discarded
PROFILE OF PERPETRATORS: DIWHU WKH DWWDFNV ZHUH FRPSOHWHG
INTERESTS AND TECHNICAL Analysis of the communication
CAPABILITIES between the malware and the control
servers led to dubious domain names
T
HE PERPETRATORS WERE interested DQGUHJLVWUDQWV
in contact information such
as emails, Microsoft Word, SITSA’S ROLE IN MITIGATING
PowerPoint, Excel and Adobe PDF THE APEC TROJAN ATTACKS
GRFXPHQWV%HVLGHVEHLQJSRWHQWLDOO\
S
useful intelligence, these documents INGAPORE INFOCOMM TECHNOLOGY
were also likely useful for the social 6HFXULW\ $XWKRULW\ 6,76$
engineering required for subsequent as t h e d e d i c a t e d a n d
I
,7 VHFXULW\ DW WKH QDWLRQDO OHYHO N THIS INCIDENT , the Singapore
ZRUNHGZLWK,QIRFRPP'HYHORSPHQW government suffered minimal
$XWKRULW\,'$ZKLFKLVUHVSRQVLEOH damage, and this was due in part
for cyber security within the to lessons learnt from previous cyber
government sector, to identify the incidents and also the close cooperation
relevant malware characteristics EHWZHHQ 6,76$ DQG NH\ VWDNHKROGHUV
QHHGHG WR SXW XS FRXQWHUPHDVXUHV VXFKDV,'$
,'$ IRFXVHG RQ WKH LPPHGLDWH The cyber-threat landscape is ever-
incident response activities while evolving and we will not be seeing
6,76$ SXW LWV UHVRXUFHV WR ZRUN WKH ODVW RI VXFK F\EHU DWWDFNV /DSVHV
on investigating the attacks and and complacency may bring about a
addressing other potential threats µ'LJLWDO 3HDUO +DUERXU¶ WR WKH QDWLRQ
DULVLQJ IURP WKHVH DWWDFNV )RU While it is not possible to prevent
example, some of the malicious 100% of all attacks from succeeding,
emails contained details of actual the key to minimising and mitigating
$3(& HYHQWV GDWH WLPH YHQXH QRW this increasing number of sophisticated
NQRZQ WR WKH JHQHUDO SXEOLF 7KDW attacks and its consequences is a
attackers’ access to such information holistic strategy that involves the
could potentially threaten the smooth cooperation of all stakeholders, in
UXQQLQJ RI WKRVH HYHQWV 7KLV SLHFH particular system owners, who must
of information was promptly shared QRW IRUVDNH ,7 VHFXULW\ PHDVXUHV DQG
with other security agencies to ensure best practices because of reasons such
that any potential threat was properly as user-convenience and the ease and
DVVHVVHGDQGPLWLJDWHG FRVWRILPSOHPHQWDWLRQ
EDITOR’S NOTES
0U/RK3KLQ-XD\KHDGVWKH6LQJDSRUH,QIRFRPP7HFKQRORJ\6HFXULW\$XWKRULW\6,76$
VHFWLRQ WKDW UHVSRQGV WR DQG PDQDJHV F\EHU LQFLGHQWV 6,76$ ZDV VHW XS LQ 2FW WR
VDIHJXDUG 6LQJDSRUH DJDLQVW ,QIRFRPP 7HFKQRORJ\ ,7 VHFXULW\ WKUHDWV ,W LV WKH QDWLRQDO
VSHFLDOLVW DXWKRULW\ RYHUVHHLQJ RSHUDWLRQDO ,7 VHFXULW\ 6,76$¶V PLVVLRQ LV WR VHFXUH
6LQJDSRUH¶V,7HQYLURQPHQWHVSHFLDOO\YLVjYLVH[WHUQDOWKUHDWVWRQDWLRQDOVHFXULW\VXFKDV
F\EHUWHUURULVPDQGF\EHUHVSLRQDJH
I
N 1997, THE Computer Crime the Computer Misuse Act while
%UDQFK &&% ZDV HVWDEOLVKHG TCFB serves as a technology
as part of the Commercial Crime forensics processing entity to aid
'LYLVLRQ &&' RI WKH &ULPLQDO SPF and other local law enforcement
,QYHVWLJDWLRQ 'HSDUWPHQW &,' agencies in the criminal investigation
DW WKH ROG &,' %XLOGLQJ DW (X SURFHVV7KHEUDQFKDOVRVHUYHVDVWKH
Tong Sen Street with only four staff authority on technology forensic
LQYHVWLJDWLRQRI¿FHUV PDWWHUV/DVWEXWQRWOHDVW7&5%ZDV
With rapid development of formed with the objective to tackle
FRPSXWHU WHFKQRORJ\ LQ WKH V WHFKQRORJ\FULPHSURDFWLYHO\
CCB evolved to become the
&RPSXWHU )RUHQVLF %UDQFK &)% LQ TCFB’S VISION
2000 before it expanded to become
T
the Technology Crime Division CFB ENDEAVOURS TO be the
7&' RQ 2FWREHU WR VHUYH cutting edge in technology
as an investigation, response and FULPH ¿JKWLQJ DQG WR EH WKH
computer forensic processing entity premier unit in technology forensic
IRUWKH6LQJDSRUH3ROLFH)RUFH63) LQYHVWLJDWLRQ
Today, the TCD consists of the
7HFKQRORJ\ &ULPH ,QYHVWLJDWLRQ
%UDQFK 7&,% 7HFKQRORJ\
&ULPH )RUHQVLF %UDQFK 7&)%
and Technology Crime Research
%UDQFK 7&5% ZLWK D WRWDO RI
DERXW WKLUW\ RIILFHUV 7KLV LV D IDU
cry from when we started as CCB
Technology Crime Forensic Branch at
LQ Police Cantonment Complex
T
CFB IS A very small branch agencies over the years such as
that is made up of only two the Association of Chief Police
teams of technology forensic 2IILFHUV $&32 JXLGHOLQHV LQ WKH
examiners and Technical Support handling of electronic evidence in
2I¿FHUV (DFK WHDP LV VXSHUYLVHG E\ maintaining a proper chain of the
an OC Team who also assists Head exhibit custody, and to ensure the
TCFB to plan, oversee, provide LQWHJULW\RIWKHHOHFWURQLFHYLGHQFH
leadership, and devise strategies and
counter-measures for the overall What Is Computer Forensics?
operational effectiveness of the
C
7&)%7KHEUDQFKUHSRUWVGLUHFWO\WR OMPUTER FORENSIC WAS
'HSXW\'LUHFWRU&,' RIILFLDOO\UROOHGRXWLQ
,W UHIHUV WR WKH FROOHFWLRQ
CORE CAPABILITIES preservation and analysis of
OF TCFB electronic data found in computers
and digital storage mediums in a
T
CFB HAS FOUR capabilities systematic and scientific manner to
EURDGO\FODVVL¿HGDV&RPSXWHU XQFRYHUGLJLWDOHYLGHQFH
Forensic, Mobile Phone ,Q WKH DUHD RI FRPSXWHU IRUHQVLF
)RUHQVLF 9LGHR )RUHQVLF DQG 0DVV 7&)% RI¿FHUV DUH WUDLQHG WR KDQGOH
&&793URFHVVLQJ and extract evidences from storage
B
VWRUDJHFDUGV ETWEEN 2003 AND 7&)%
TCFB uses a variety of operationalised its mobile
commercially available computer SKRQH IRUHQVLF FDSDELOLW\
forensic softwares to conduct Mobile phone forensic refers to the
DQDO\VHV RQ WKH H[KLELWV 6RPH RI collection, preservation and analysis
the common computer forensic of electronic data found in the mobile
requests that TCFB received SKRQH LQ D V\VWHPDWLF DQG VFLHQWL¿F
includes: PDQQHU WR XQFRYHU GLJLWDO HYLGHQFH
,W XVXDOO\ LQYROYHV WKH H[DPLQDWLRQ
Retrieval of ‘live’ and of the mobile phone handset, the
‘deleted’ documents/pictures/ 6XEVFULEHU ,GHQWLW\ 0RGXOH 6,0
videos of various formats; FDUGDQGWKHDWWDFKHGVWRUDJHPHGLD
Retrieval of internet activity There are a wide variety of
ORJV HJ ,QWHUQHW KLVWRU\ operating systems used by different
,QWHUQHW FRRNLHV HPDLOV
exchanges, chat logs etc;
R e t r i e v a l o f s y s t e m
LQIRUPDWLRQORJVHJ2SHUDWLQJ
6,0&DUG
System, hardware and software ,QWHUURJDWLRQ
information, network settings,
logged-in user history etc;
Data carving from hard disk
‘unallocated space’; and
6LPSOHSDVVZRUGFUDFNLQJ Handset Memory Card
,QWHUURJDWLRQ ,QWHUURJDWLRQ
V
IDEO the other
FORENSIC IS $YHUDJLQJ DQG ,PDJH
forensic capability in TCFB Enhancement;
that was rolled out together Highlighting subject of
with the mobile phone forensic LQWHUHVWLQWKHYLGHRHJFULPH
sequence recreation; and
Analogue video with sixteen
camera views
Enlarging or capturing screen
QRQYLHZDEOHZLWKRXWRULJLQDO shot of portions of the video
PXOWLSOH[HU
DVDUHDVRILQWHUHVW
What Is Mass
CCTV Processing?
M
De-multiplexed to
one camera view on ASS CCTV PROCESSING is
screen
a contingency capability
Digital video with sixteen
camera views on screen rolled out by TCFB in 2006
7HFKQLTXHRIVHSDUDWLQJPXOWLSOH[HG&&79IRRWDJH following the success of the UK
T
digital formats, to a ‘viewable’ format CFB’S FORENSIC WORK is
IRU WKH IDFLOLWDWLRQ RI PDVV &&79 compounded by the unique
YLHZLQJE\WKH,QYHVWLJDWLRQ2I¿FHUV complexities of each stage
at the TCFB Simulation Laboratory RI LWV IRUHQVLF SURFHVVHV 7KH
in the immediate aftermath of a bomb IDVW HYROXWLRQ RI WHFKQRORJ\ HJ
EODVWLQFLGHQW development of bigger capacity
The ability of TCFB to process for hard drives, prevalent usage of
VHL]HG &&79 IRRWDJHV LQWR D encryption software, and enlargement
‘viewable’ format helps to provide of different types of exhibits which
timely investigation leads for QHHG WR EH VHL]HG E\ ,2 DOVR
,QYHVWLJDWLRQ2I¿FHUVZKLFKLVFULWLFDO added complexities to the forensic
WRWKHVXFFHVVRIWKHLGHQWL¿FDWLRQDQG SURFHVVHV
apprehension of the perpetrators after All exhibits received by TCFB
D ERPE EODVW LQFLGHQW 6LQFH need to go through a forensically
7&)%KDVZRUNHGFORVHO\ZLWK&,'¶V sound process of acquisition so
2SHUDWLRQV ,QYHVWLJDWLRQ 3ROLF\ that an image copy of the original
Branch and the Public Transport electronic data is acquired to allow
2SHUDWRUV 372V LQ 6LQJDSRUH WR the forensic examiner to examine the
build up the capability to process any imaged electronic data as if it were
&&79 LPDJH VHL]HG IURP WKH 372V WKH RULJLQDO GDWD +RZHYHU QRW DOO
in the event of a bomb blast incident exhibits come to TCFB physically
that occurred at a public transport VRXQG6RPHH[KLELWVDUHGHOLEHUDWHO\
&&79IRRWDJHVRISHUSHWUDWRUVREWDLQHGE\/RQGRQ0HWURSROLWDQ3ROLFH¶V&&79
trawling operation for the London Bomb Blast on 7 July 2005
I
IRUHQVLF H[DPLQHU ,W KDV EHFRPH N THE ELECTRONIC world, data is
increasingly common to receive never simply erased at the click of
an exhibit computer system that WKH µGHOHWH¶ EXWWRQ 7KLV KDV EHHQ
contains more than one hard drive or extremely helpful in uncovering the
A
a ‘silent’ conversation between him LTHOUGH ELECTRONIC EVIDENCE
and his accomplice, three days after played a key part in convicting
WKH GHDWK RI KLV ZLIH 8VLQJ WKHVH Anthony Ler for plotting the
GHOHWHG¿OHVSROLFHZDVDEOHWRSURYH murder of his wife, it was not the
that Anthony Ler used his computer only piece of evidence that police had
to communicate ‘silently’ with the DJDLQVWKLP9HU\RIWHQWKHJRRGROG
WHHQDJHUDWKLVÀDW6RPHOLQHVLQWKH detective skills still have to be applied
GHOHWHG ¿OH LQFOXGHG ³7KH\ FDQ KHDU together with electronic evidence to
what you are saying”, “Act shock that VROYHDFDVH
the woman is my wife”, “Payment On 11 April 2003, Suresh Nair
might have to wait” and “Yu threw 9HOOD\XWKDPD\HDUROG0DOD\VLDQ
WKHNQLIH´ working in Singapore, was arrested
Anthony Ler was found guilty for for aggravated sexual offences
the abetment of the murder of his FRPPLWWHG DJDLQVW WZR ,QGRQHVLDQ
wife and sentenced with the death air stewardesses at the Grand Hyatt
SHQDOW\ 7KH \HDUROG WHHQDJHU 6LQJDSRUH KRWHO RQ $SULO
Photograph of a lady in an airline uniform was recovered by TCFB from a memory card left at the crime
scene – It led the police to establish the identity of the rape accused through subsequent detective works
S
INCE 2006, UNPRECEDENTED WKH &&79 WHFKQLFDO VSHFL¿FDWLRQV
demands were placed on including the software players, CCTV
TCFB to support SPF in the layout plans from the CCTV owners
area of investigation into crimes, and vendors through ground visits.
major incidents and public order The information collated from the
situations related to the conduct of mapping exercise is critical for CCTV
the S2006 International Monetary Mass Processing due to the large
Fund/World Bank Group Meetings, number of proprietary digital video
ASEAN Summit 2007, Formula 1 formats used.
SingTel Singapore Grand Prix and the
$VLD3DFL¿F (FRQRPLF &RRSHUDWLRQ FLYING TCFB’S FLAG HIGH
(APEC) Singapore 2009 Meetings.
Set against the backdrop of a
heightened security and public order
threat climate, TCFB was driven by
the need to ensure that its capability
of Mass CCTV processing can
support a post-incident follow-up.
This is especially so when some
incidents took place during these high
SUR¿OHHYHQWVZHUHFDSWXUHGE\&&79
systems. To ramp up the Mass CCTV
S
capability in preparation for these INCE THE of TCFB
INCEPTION
events, TCFB would devote much of in 2001, we worked tirelessly
its resources to conduct CCTV terrain to make a name for ourselves
mapping in the event localities before as the premier unit in technology
the start of each event. forensic investigation in the region.
The CCTV terrain mapping is a :H ¿QDOO\ KDG DQ RSSRUWXQLW\ WR
tedious and time-consuming process participate in an INTERPOL mission
that requires TCFB to visit each in 2008.
estate owner in the event localities On 7 March 2008, a TCFB
and their respective CCTV vendors forensic examiner, Senior Staff
to understand the CCTV systems. Sergeant (SSSgt) Joe Ng, was
For example, TCFB spent an average deployed as part of the INTERPOL
of one month to conduct CCTV Computer Incident Response Team
terrain mapping before the start of to Bogota, capital city of Colombia.
S
on a terrorist camp belonging to INGAPORE WAS APPOINTED the
the Revolutionary Armed Forces of lead shepherd for the ASEAN
&ROXPELD)$5&RQWKH(FXDGRULDQ ¿JKW DJDLQVW F\EHU FULPH LQ
side of its border with Columbia on DW WKH $6($1 0LQLVWHULDO
0DUFK Meeting on Transnational Crimes
The raid resulted in the death of $007& LQ %DQJNRN 7KDLODQG
5DXO 5H\HV ZKR ZDV WKH 1R PDQ As the lead shepherd, Singapore’s
RI WKH )$5& &RORPELD FODLPHG responsibility is to create awareness
that there were documents in the and enhance general cyber crime
computers that indicated that Ecuador ¿JKWLQJFDSDELOLW\DPRQJWKH$6($1
LV VXSSRUWLQJ WKH DFWLYLWLHV RI )$5& PHPEHUV 7&' LV WKH PDLQ GULYLQJ
Ecuador, on the hand, claimed that the unit behind the lead shepherd’s role
document could have been inserted IRUF\EHUFULPH7RJHWKHUZLWK7&,%
E\ &RORPELD¶V DXWKRULW\ 7KLV UDLG TCFB introduced some initiatives
created a border tension between such as the organisation of the bi-
&RORPELD(FXDGRUDQG9HQH]XHOD DQQXDO &\EHU &ULPH ,QYHVWLJDWLRQ
The task assigned to SSSgt Joe Ng &RXUVH &&,& DQG &\EHU &ULPH
and another Australian technology ,QYHVWLJDWLRQ :RUNVKRS &&,: 7R
forensic expert was to examine date, TCFB has conducted two runs
the laptops and storage devices to of 2-week working attachment for the
determine whether any data had 5R\DO%UXQHL3ROLFH)RUFH5%3)LQ
been edited after the raid carried out $XJXVWDQG-XQH
E\ WKH &RORPELD¶V DXWKRULW\ 666JW ,Q DGGLWLRQ WR WKH UROOLQJ RXW RI
Joe Ng and his teammate spent various training programmes for
more than 1,000-man hours going the ASEAN countries, TCFB has
WKURXJK PRUH WKDQ *% RI GDWD also put up a project paper to assist
7KHIRUHQVLF¿QGLQJVZHUHVXEPLWWHG some ASEAN countries to set up
to a panel of Computer Forensic basic technology forensic capability
Experts for evaluation and the panel to help enhance their cyber crime
DJUHHG ZLWK WKH IRUHQVLF ¿QGLQJV RI ¿JKWLQJ FDSDELOLW\ 7KLV SURMHFW LV
the technology forensic examiners currently pending funding from
that there was ‘no evidence of dialogue partners through the
PRGL¿FDWLRQ DOWHUDWLRQ DGGLWLRQ $6($16HFUHWDULDW
RU GHOHWLRQ¶ LQ WKH XVHU ¿OHV RQ WKH )RU LQ OLQH ZLWK RXU UROH DV
FRPSXWHUVVHL]HG the lead shepherd for ASEAN cyber
T
Attorney-General’s Chambers, CFB HAS COME a long way since
Ministry of Home Affairs, Singapore LWV LQFHSWLRQ :LWK WKH OLPLWHG
$UPHG )RUFHV +RQJ .RQJ 6RXWK VWDI¿QJZHKDYHDFKLHYHGPXFK
Korea, Japan and eight other ASEAN in the eight years since commencing
FRXQWULHV0DOD\VLD%UXQHL7KDLODQG RSHUDWLRQ WR IXO¿OO RXU PDQGDWH LQ
3KLOLSSLQHV/DRV9LHWQDP&DPERGLD ensuring that SPF has the competency
DQG ,QGRQHVLD DWWHQGHG WKH VHPLQDU to deal with technology-related
The speakers included French Justice LQFLGHQWVHIIHFWLYHO\DQGHI¿FLHQWO\
and Police representatives and With the increasing demand for
:RUOG %DQN FRQVXOWDQWV 7KH ¿UVW digital forensics, TCFB will continue to
Regional Cyber Crime Seminar was harness innovative technologies to meet
VXFFHVVIXOO\FDUULHGRXWIURPWR the challenges of bringing about stronger
$SULO HYLGHQFHIRUSURVHFXWLRQLQIXWXUH
EDITOR’S NOTES
$VVLVWDQW 6XSHULQWHQGHQW RI 3ROLFH $63 &RQQLH 6HHN LV 2I¿FHULQ&KDUJH RI D 7HDP
ZLWKLQ WKH 7HFKQRORJ\ &ULPH )RUHQVLF %UDQFK 7&)% RI WKH &ULPLQDO ,QYHVWLJDWLRQ
'HSDUWPHQW &,' 6KH RYHUVHHV D WHDP RI VL[ 7HFKQRORJ\ )RUHQVLFV ([DPLQHUV DQG RQH
7HFKQLFDO6XSSRUW2I¿FHUWRFDUU\RXWWHFKQRORJ\IRUHQVLFVH[DPLQDWLRQWRVXSSRUWIURQWOLQH
LQYHVWLJDWLRQRI¿FHUVLQWKH+RPH7HDP
I
T IS FAIR to say that Singapore warning signals of imminent
recognises the need for crises? Why, despite support
decision-makers to prepare for from the public sector leadership,
WKH IXWXUH 2XU HIIRUWV WR XQGHUVWDQG and years of scenario planning
and plan for the future have evolved workshops, and with new tools like
DQG LPSURYHG RYHU WKH \HDUV RAHS, are we still not fully adept
Scenario planning is now a key in anticipating the future? How
part of the Government’s strategic can government agencies better
planning process, and has proven organise their strategic thinking
useful in surfacing otherwise hidden about the future?
assumptions and mental models
We miss out on signals
DERXW WKH ZRUOG 0RUH LPSRUWDQWO\
not only because of the
the scenario planning process has
limitations of our tools
helped to inculcate an “anticipatory”
and methods, but also
mindset in many of our civil servants
because of the nature
by getting them to raise “what if”
of human cognition.
questions on the issues that they
GHDO ZLWK 7KH 5LVN $VVHVVPHQW
DQG +RUL]RQ 6FDQQLQJ SURJUDPPH OBSTACLES
RU 5$+6 ODXQFKHG LQ DV D IN ANTICIPATING
complementary capability to scenario STRATEGIC SURPRISES
planning, is being used to examine
T
complex issues in which cause and
HE HUMAN MIND can play tricks
effect are not easily discerned; it
RQXV:HVHHZKDWZHZDQWWR
also serves as a shared platform for
analysts from different agencies to see, and sometimes miss out
collaborate on perspective-sharing, WKH JODULQJO\ REYLRXV 6R LW LV ZLWK
PRGHOOLQJDQGUHVHDUFK1 WKLQNLQJ DERXW WKH IXWXUH :H PLVV
Yet why do decision-makers, out on signals not only because of the
who have ready access to ample limitations of our tools and methods,
information, fail to respond to but also because of the nature of
WHY WE FAIL TO
ANTICIPATE THE FUTURE
COGNITIVE FAILURES
Decision makers tend to discount future risks and contingencies, and
place too much weight on present FRVWVDQGEHQHILWV*RYHUQPHQWVDUH
also prone to confirmation bias, which is the tendency to pay attention
RQO\ WR GDWD ZKLFK LV FRQVLVWHQW ZLWK H[LVWLQJ PHQWDO PRGHOV )RU
example, during the boom years before the current financial crisis, most
H[SHUWV GLVPLVVHG WKH ULVNV RI D PDMRU ILQDQFLDO RU HFRQRPLF FULVLV
The few who foresaw an impending crisis – like Nouriel Roubini and
1DVVLP7DOHE±ZHUHURXQGO\LJQRUHG
Social networks and groupthink are also a source of confirmation
ELDV0DYHULFNV±ZKRVHYLHZVGRQRWFRQIRUPWRJURXSRSLQLRQV±WHQG
to be rejected; they will disappear over time unless a mechanism is set
XS WR SURWHFW WKHP &ULVHV FDQ DOVR EUHDN RXWGDWHG PHQWDO PRGHOV EXW
WKH\DUHDQH[SHQVLYHZD\WRIRUFHUHFRJQLWLRQRIFRQILUPDWLRQELDVHV
What can be done: Be aware that the lessons of history are not
HQRXJK WR JXLGH XV GRZQ WKH ULJKW SDWK LQWR WKH IXWXUH )XUWKHUPRUH
approaches and policies that have worked well in the past may actually
SURYHG\VIXQFWLRQDOZKHQDSSOLHGWRWKHIXWXUH
LW +HGJLQJ LV FRVWO\ DQG ULVNV ± DV WKH JOREDO ILQDQFLDO FULVLV VKRZV
– spill across boundaries in ways that make it impossible for a single
FRXQWU\WRKHGJHDJDLQVWIXOO\,QWKHILQDQFLDOFULVLVVRPHSDUWLFLSDQWV
were even incentivised, on a local basis, towards risky behaviour that
FRQWULEXWHGWRWKHFUDVK6RLWZDVPXFKHDVLHUIRUREVHUYHUVZKRZHUH
not beneficiaries of bank bonuses, such as economist Nouriel Roubini,
WRFRQWHPSODWHDQGDQWLFLSDWHDFULVLV
The strategic planner often has a hard time challenging the official
future, especially when that future is consistent with an organisation’s
ELDVHV DQG SUHFRQFHSWLRQV 7KH SODQQHU ZKR EULQJV XS UDGLFDO
alternatives risks being branded as lacking a sense of reality; he has a
UHDOLQFHQWLYHWRPDNHVFHQDULRVPRUHSDODWDEOH%XWLQVRGRLQJKH also
reduces the impetus for the organisation to confront its uncomfortable
IXWXUHVDQGSUHSDUHIRUWKHP
FRAGMENTATION OF RISK
Hierarchies tend to optimise at the agency level, sometimes at the
expense of global optimisation, because information flows most
HIILFLHQWO\ ZLWKLQ YHUWLFDO VLORV UDWKHU WKDQ KRUL]RQWDOO\ DFURVV
RUJDQLVDWLRQDO ERXQGDULHV 0LQLVWULHV ZLOO WHQG WR KDYH WXQQHO YLVLRQ LQ
WKHZD\WKH\ORRNDWULVN%XWRQHDUPRIJRYHUQPHQWGRLQJVRPHWKLQJ
that perfectly matches its “local” performance goals can create a big
GRZQVLGHIRUWKHUHVWRIWKHODUJHUV\VWHP
O
VER THE YEARS , , KDYH two decades ago, we were not as
become increasingly sensitised to cognitive biases as we
convinced that thinking DUH WRGD\ .QRZLQJ ZKDW ZH NQRZ
about the future and strategic today, we can take a number of
surprises will remain a messy deliberate steps to compensate for
EXVLQHVV ,I ZH WU\ WR JHW SUHFLVH RXUFRQVLVWHQF\ELDVHV
predictions, we are pursuing the We should take steps to inject
ZURQJ DLP :H FDQQRW SUHGLFW WKH much more real diversity into
IXWXUH $V IXWXULVW 3HWHU 6FKZDUW] RXU VWUDWHJLF FRQYHUVDWLRQV ,Q
noted, “the objective is not to get the United States, the Defense
a more accurate picture of the Science Board is commissioned
ZRUOG DURXQG XV´2 Rather, we by the Department of Defense to
should seek to provide input for FRQVLGHU VWUDWHJLF LVVXHV %HVLGHV
decision makers to make informed bringing experts, academics and
DVVHVVPHQWV +LV FROOHDJXH IURP professionals to the table, the
Royal Dutch/Shell, Pierre Wack, Board sometimes includes in
added that scenarios should “help its discussions people with no
change assumptions about how the defence background at all – artists,
world works” and “compel people DFWRUV PXVLFLDQV %XW WKHUH LV
to reorganise their mental models PHWKRG LQ WKLV VHHPLQJ PDGQHVV
RIUHDOLW\´3 Good scenarios should By gathering a diverse group
facilitate better decisions, not of people, the Board hopes to
EHWWHUSUHGLFWLRQV garner insights that would not be
The challenge for us is how achievable from a team comprising
we can find a better approach to only professionals and experts with
DQWLFLSDWLQJVWUDWHJLFVXUSULVHV/HW VLPLODUEDFNJURXQGV
me outline five key ideas for our ,Q 6LQJDSRUH ZH SUREDEO\
3XEOLF6HUYLFH have more think-tanks per capita
First , we need to acknowledge WKDQ DQ\ZKHUH HOVH LQ WKH ZRUOG
that we will always face limitations They ought to be tapped more
LQ DQWLFLSDWLQJ VWUDWHJLF VXUSULVHV systematically, because they can be
Even in the most forward-looking a rich source of fresh insights that
government, leaders and officials can better inform policymaking
will have their own mental models DQG SODQQLQJ &RQYHUVLQJ ZLWK
and cognitive biases, and seek think-tanks, like engaging in public
FRQILUPDWLRQ IRU WKHP %HLQJ consultation, should be seen as
ROLES OF THE
CENTRE FOR STRATEGIC FUTURES
CHALLENGE CONFORMIST THINKING IDENTIFY EMERGENT RISKS
• build networks with diverse perspectives within • communicate emerging issues, wildcards
and outside Singapore and strategies to decision makers
• engage local think-tanks and universities, • in parallel with an integrated WOG Risk
international counterparts and global thought leaders Map and Risk Register
• conferences on futures-related issues
I
N ORDER TO put these principles up of Deputy Secretaries from
into operation and strengthen HDFK 0LQLVWU\ :H H[SHFW WKDW WKH
our capacity to think about the Network will play a catalytic role
future, we have set up a “Centre for in promoting futures work within
6WUDWHJLF)XWXUHV´&6)LQ36'VHH the civil service, by expanding the
ER[ VWRU\ RQ SDJH 2YHU WLPH reach of the CSF into the ministries
together with the Strategic Policy DQG DJHQFLHV 7KH 1HWZRUN ZLOO
2I¿FH DQG VXSSRUWHG E\ 5$+6 WKH have a key role in establishing a
CSF will become the focal point of common vocabulary for strategic
futures-related work in the Singapore planning, and nurturing the
*RYHUQPHQW ,W ZLOO ZRUN WRZDUGV instincts and habits of strategic
promoting whole-of-government whole-of-government thinking
thinking on the key strategic DERXWWKHIXWXUH
O
VERALL, THE CSF will IRUQHWZRUNHGJRYHUQPHQW7KH&6)
seek to build on the work will play a key part in keeping us
of scenario planning in at the leading edge of governance,
facilitating a common, whole-of- enhancing our decision-making
government vocabulary for strategic capability and the service that we
SODQQLQJ 7KLV LV LPSRUWDQW QRW MXVW SURYLGHWR6LQJDSRUHDQV
to analyse the future, but also to
XQGHUVWDQGWKHSUHVHQW ENDNOTES
To deal with consistency bias and 1
RAHS incorporates into a computer-based
cognitive dissonance is to nurture in platform a suite of methods and software
our people the instincts and skills to designed to help analysts detect and investigate
HPHUJLQJVWUDWHJLFWKUHDWVDQGRSSRUWXQLWLHV)RU
EHVHQVLWLYHWRGLVFRQWLQXLWLHV,QDQ PRUHLQIRUPDWLRQVHHKWWSZZZUDKVRUJVJ
increasingly uncertain and complex 2
'HDUORYH ' ³7KH 7KRXJKW /HDGHUVKLS
environment, it is imperative that 6HULHV 3HWHU 6FKZDUW] 7KLQNLQJ WKH
8QWKLQNDEOHDQLQWHUYLHZZLWK3HWHU6FKZDUW]
we have the courage to open our scenario planning futurist,” The Business,
minds and take bold but pragmatic 6HSWHPEHU
VWHSV IRUZDUG 7KH &6) LV DQ 3
:DFN 3 ³6FHQDULRV 8QFKDUWHG :DWHUV
important step in building capability Ahead,” HarvardBusiness Review
EDITOR’S NOTES
7KLVDUWLFOHE\0U3HWHU+RWKHIRUPHU+HDGRIWKH6LQJDSRUH&LYLO6HUYLFHZDVRULJLQDOO\
SXEOLVKHGLQ(7+26,VVXH-DQXDU\SJ7KHDUWLFOHLVEDVHGRQKLVVSHHFKDW
WKH6WUDWHJLF3HUVSHFWLYHV&RQIHUHQFH63&RQ1RYHPEHU+LVPRVWUHFHQWVSHHFK
at the 2010 SPC provided updates, in particular, on the activities of the Centre of Strategic
)XWXUHV)RUPRUHLQIRUPDWLRQSOHDVHYLVLWZZZFVFROOOHJHJRYVJHWKRV
Programmes:
The RAHS System
MS. MAGDALENE CHOO A
OPERATIONAL IMPETUS Given the complex and multi-
FOR EARLY WARNING domain nature of the issues faced,
it is no longer feasible to forecast
T
HE COMPLEXITY OF issues and a future based only on past trends,
tempo of activities handled by or to adopt a single-domain
the Singapore Public Service strategy when addressing emerging
has increased substantially over LVVXHV 7KH GLI¿FXOWLHV IDFHG ZKHQ
the past years, due to an increase in adopting a singular future approach
overall scale of activities and inter- are exacerbated by Singapore’s
connectivity, as well as the interplay unique physical and demographic
of different components exhibiting endowments which are highly
HPHUJHQW EHKDYLRXU 7ZR H[DPSOHV YXOQHUDEOH WR SRWHQWLDO WHUURU DWWDFNV
VWDQGRXWFOHDUO\2QHLVWKHGHFOLQLQJ These include a small country-state
ELUWK UDWH LQ 6LQJDSRUH 7R DGGUHVV WKDW LV KRPH WR VHYHUDO RLO UH¿QHULHV
this, a Government review panel had world-class air and sea transport hub
to look at issues handled by multiple infrastructure, and a heterogeneous
departments, such as employer population of four main races and
GHPDQGV ZRUNSODFH EHQH¿WV DQG VHYHUDO NH\ UHOLJLRQV 7KH 5LVN
employee wages, family cohesion $VVHVVPHQW DQG +RUL]RQ 6FDQQLQJ
and values, manpower for national 5$+6 ,QLWLDWLYH ZDV WKXV ODXQFKHG
defence, and the rising educational to enable the Public Service to
VWDWXV RI ZRPHQ $QRWKHU H[DPSOH leverage on the vast amounts of data
is addressing the threat of Avian and expertise residing in various
Flu spreading to Singapore, which DJHQFLHV 7KLV DPDOJDPDWLRQ RI
involved the foreign affairs, human agencies would result in a better
health, veterinary health, housing, and understanding of alternative futures,
WUDQVSRUWGHSDUWPHQWV early warning of arising strategic
I
and N A STUDY of various overseas
E (QDEOHV FROODERUDWLRQ DQG organisations that carry out risk
information exchange across DVVHVVPHQW DQG KRUL]RQVFDQQLQJ
various Public Service functions, it was found that data
departments to meet the analytics and scenario planning were
challenges of understanding the two main methods used in most of
and reacting to cross-domain WKHRUJDQLVDWLRQV
LVVXHV The Global Public Health
Intelligence Network (GPHIN)
Through this, the initiative will was developed for World Health
also ensure optimal allocation of 2UJDQLVDWLRQ :+2 WKURXJK
limited Public Service resources, by collaboration with Health Canada
allowing departments to focus efforts LQ DQG IXQFWLRQV DV D VHFXUH
RQLGHQWL¿HGORZSUREDELOLW\EXWKLJK ,QWHUQHWEDVHG HDUO\ ZDUQLQJ V\VWHP
impact issues, otherwise termed as that gathers information about potential
ZLOGFDUGV SXEOLFKHDOWKWKUHDWVRQDEDVLV,W
The 2 entities which will be serves as a web crawler, conducting
VXSSRUWLQJWKLVZRUNDUHWKH+RUL]RQ data mining from various sources,
6FDQQLQJ &HQWUH +6& DQG WKH with a focus on infectious diseases
RAHS Experimentation Centre DQG KXPDQ VDIHW\ LVVXHV $FWLQJ RQ
5(& 7KH +6& ZLOO ³LQYHVWLJDWH keywords assigned by Health Canada’s
DQG UHFRPPHQG WKURXJK KRUL]RQ Laboratory Centre for Disease control
scanning, case studies or other /&'& DQG NH\ZRUGV DVVRFLDWHG
initiatives, key emerging issues as well with public, environmental and animal
as risks or uncertainties across various health, it monitors over 10,000 online
GRPDLQVWKDWZRXOGKDYHDVLJQL¿FDQW sources, such as newspapers and
impact on Singapore” while REC will ELRPHGLFDOVRXUFHV1
“spearhead technological exploration, The Australia and New Zealand
experimentation and capability Horizon Scanning Network
development in support of the Centre (ANZHSN) is an initiative under the
for Strategic Futures and the Risk Australian Government Department
$VVHVVPHQW DQG +RUL]RQ 6FDQQLQJ RI +HDOWK DQG $JHLQJ 'R+$
SURJUDPPH´ 7RJHWKHU WKH +6& that utilises internet scanning and
and REC will develop the necessary stakeholder consultation to provide
T
SURFHVV ,WV DLP LQ VXFK ZRUN LV WR HE AIM OF the RAHS team
feed into cross-government priority is to develop a system that
VHWWLQJ DQG VWUDWHJ\ IRUPDWLRQ ,WV comprises a comprehensive
work has been used by the Health suite of methodologies and
and Safety Executive to inform technologies based on existing work
scenarios on the future of workplace DQGFRQFHSWVZLWKÀH[LELOLW\WRFDWHU
KHDOWKDQGVDIHW\3 WR IXWXUH PHWKRGV DQG WHFKQRORJLHV
The traditional Scenario Planning This system allows the RAHS team to
method has also been employed leverage on the advantages of existing
by Shell International Petroleum methodologies and technologies while
Company to allow the company to DFNQRZOHGJLQJLWVFRQVWUDLQWV
anticipate the rise and subsequent fall The two key principles and
RIRLOSULFHV,QWKHPLGV6KHOO implementations for the development
also created scenarios that focused on of the RAHS system are:
the future of the Soviet Union, as that
country was a major competitor in the D 7R OHYHUDJH RQ WKH PXOWLSOH
(XURSHDQJDVPDUNHW H[SHUWLVH RI LQGLYLGXDOV 7KH
Siemens AG has utilised a form RAHS system will facilitate
of scenario planning as part of its collaboration across agencies
technological forecasting technique, via linking up various
QDPHG ³3LFWXUHV RI WKH )XWXUH´ agencies through a common
This technique involves selecting a platform, to offer people
suitable time frame in the future, and from different agencies
generating comprehensive scenarios opportunities to communicate
taking into account various aspects, DQGFROODERUDWH
such as socio-political environments The inclusion of
DQGQHZFXVWRPHUQHHGV5 perspective-sharing facilities
The Millennium Project, a global enables further knowledge
participatory futures research think VKDULQJ7KHDQDO\VWLVDEOHWR
T
analysing the search results HERE ARE 3 major capability
DQGFUHDWLQJPRGHOV EORFNV LQ WKH 5$+6 6RIWZDUH
Firstly, the RAHS software The research and analysis tools
will reduce the amount of time allow analysts to closely examine
VSHQW RQ VHDUFKHV ,W FRQVLVWV signals collected from environmental
of a range of analytical VFDQQLQJ 7KH SHUVSHFWLYHVKDULQJ
tools, which aid the analyst tools allow analysts to offer insights
in reducing the amount of on pieces of information they
reading time required, as well receive, and for these perspectives
as software to automate the to be analysed for convergence and
running of pre-determined divergence, and for possible outliers
ZRUNÀRZV RU HYHQ ZLOG FDUGV 7KH VFHQDULR
Secondly, the analyst building tools allow analysts to build
can use the RAHS software system maps and ranking models,
to create models for sense- and to examine various scenario and
PDNLQJ DQG PRQLWRULQJ VWUDWHJ\RSWLRQV
According to the Naturalistic
Decision Making framework RESEARCH AND ANALYSIS
GHYHORSHGE\'U*DU\.OHLQ8,
T
experts rely on mental models HE RAHS SOFTWARE empowers
and pattern matching against analysts with a suite of tools,
these models to discern subtle to help them process large
clues and choose the correct amount of data, which can either be
path of actions when dealing unstructured text obtained from the
,QWHUQHW RU UHSRUWV XSORDGHG E\ WKH of articles, after which realising
DQDO\VWV 7KH V\VWHP JLYHV DQDO\VWV that only a handful are relevant to
WKHÀH[LELOLW\WRDSSO\WKHVHDQDO\WLFDO WKH WRSLF RI UHVHDUFK 7KH 5$+6
tools in any order, in support of the multiple document summariser
DQDO\WLFSURFHVV7KHIROORZLQJVHFWLRQ will thus be useful in reducing
describes various analytical tools: the amount of reading required,
by picking up key sentences that
Advanced Search Tool best summarise a single article or
a collection of articles (refer to
T
HE RAHS SOFTWARE allows Figure 2)
analysts to search for articles
within its repository (refer to Entity Analysis Tool
Figure 1)7KH$GYDQFHG6HDUFKWRRO
A
SURYLGHV SRZHUIXO IHDWXUHV IRU ¿QH an object that
N ENTITY IS
WXQLQJ WH[W VHDUFKHV $QDO\VWV FDQ can be a human, a location,
VHOHFWGLIIHUHQWVHDUFKPRGHVVSHFL¿F an organisation, dates
OLEUDULHV DQG ¿OWHU VHDUFK WKURXJK
and times, monetary amount or
¿HOGHGTXHULHV
percentage; Entity Analysis thus
Summary Tool is the process of extracting such
REMHFWVIURPUDZGDWD7KLVLVEDVHG
A
COMMON PROBLEM FACED by on automatic word alignment of
analysts today, is having to speech recognition output, through
read through a collection natural language processing of the
T
entity analysis tool, as well as other IMELINE ANALYSIS IS the
variants (also see Figures 3 and 4) H[WUDFWLRQRIHYHQWVZLWKDEHVW
The variations are: estimate of when these events
KDG RFFXUUHG IURP D VHW RI DUWLFOHV
D 7KH Temporal Analysis Tool using a set of analyst-supplied query
shows references to entities WHUPV 7KH 7LPHOLQH $QDO\VLV WRRO
extracted from the entity in the RAHS system performs this
DQDO\VLVWRRORYHUWLPH function, and also assigns ranking
E 7KH Cross-sectional Analysis scores to these events, based on how
Tool shows the other entities VLJQL¿FDQW WKHVH HYHQWV DUH WR WKH
that are mentioned in the query terms (refer to Figure 5)
same article as a particular
HQWLW\RILQWHUHVW Clustering Tool
F 7KH Keyword Analysis Tool
C
extracts ‘terms’ or ‘phrases’ LUSTERING IS ANanalytic
pre-determined by analysts process, where a collection of
and counts the occurrences articles are arranged such that
of these ‘keywords’ in a set similar articles are grouped together
RIGRFXPHQWV (refer to Figure 6) 7KLV SURFHVV
)LJXUH6FUHHQ6KRWRIWKH.H\ZRUG$QDO\VLV7RRODQG:DWFK/LVW
T
O SPEED UP routine tasks, the
T
RAHS software has the ability HE RAHS SYSTEM provides an
to automate the analyst’s work indexing software to allow
process of performing searches on the analysts to meta-tag articles
various data sources, moving the articles (Figure 8) )RXU W\SHV RI PHWDWDJV
into project folders, and performing of DUH SURYLGHG )LOWHUV 4XHVWLRQV
entity, timeline and network analysis &RPPHQWVDQG.H\ZRUGV)LOWHUVDUH
on the consolidated articles, resulting abstract, stylised and broad concepts
in various visualisations (Figure 7) WKDW UHSUHVHQW D VSHFL¿F UHVHDUFK
Should the user analyst discover SUREOHP7KHUHDUHWZRPDLQW\SHVRI
interesting information from the ¿OWHUVHPHUJHQW¿OWHUVDQGDQDO\WLFDO
analytical visualisations, he/she can ¿OWHUV (PHUJHQW ¿OWHUV FRQVLVW RI
then choose to perform further analysis $UFKHW\SHV 9DOXHV DQG 7KHPHV
RQWKHV\VWHP $97 DQG DQDO\WLFDO ¿OWHUV FRQVLVW
of opposing negatives or opposing
PERSPECTIVE SHARING SRVLWLYHV 7KH DQDO\VW FDQ VHOHFW
from a range of Filters, and specify
T
HE RAHS SOFTWARE the extent to which each Filter best
incorporates the ability to describe a piece of data, by selecting
elicit and analyse perspectives IURPDUDQJHRIYDOXHVLQHDFK)LOWHU
IURP YDULRXV DJHQFLHVVWDNHKROGHUV 4XHVWLRQV DUH FRQFUHWH IDFWXDO DQG
The analyst can provide his/her GHWDLOHG (DFK 4XHVWLRQ KDV D VHW RI
T
HE META-TAGS ENTERED come from the analyst who have a
are representations of the JHQHUDOVHQVHRIWKH¿HOG
analyst perspective, and the
RAHS software provides a set of MODEL CREATION
visualisation tools specially designed AND MONITORING
to help analysis of such perspectives
D
DQG DFFRPSDQ\LQJ GDWD 7KH VHYHQ ATA ORGANISING CAPABILITIES
types of visualisation tools (Figure to enable the analyst to
9-15) – Glance, Browse, Compare, build models and enable
Range, Distribute, Cluster and Graph collaborative modelling efforts
– provide different ways of looking at are incorporated into the RAHS
WKHGDWD software, thus allowing analysts to
Patterns and models are meant to connect across silos and challenge
be the primary form of analysis with SUHYLRXV WKLQNLQJ DVVXPSWLRQV
the statistics and data as supporting Capabilities for model monitoring
HYLGHQFHV 7KH YLVXDOLVDWLRQ RI will also be provided, to enable
patterns aims to enable the user to matching of models with incoming
interact with the data and adopt an data streams, and to allow the human
outsider’s viewpoint in analysing team to explore the interpretations
WKH PHDQLQJ RI WKH GDWD 6LQFH WKH DQGLPSOLFDWLRQVRIWKHVHGDWD
¿OWHUV DQG TXHVWLRQV UHSUHVHQW WKH The RAHS system currently
hypotheses in the research, the focuses on organising information
researcher/person analysing the into two model classes: expert-based
data should have an idea of the modelling techniques and ground
)LJXUH([DPSOHRIDXWRPDWHGZRUNÀRZ
)LJXUH6FUHHQ6KRWRIWKH,QGH[HU7RRO
T
HE SECOND GROUP of models
Scenario Builder tools that can be built is that of the
33' PRGHOV 7KHVH FRQVLVW RI
T
HE SCENARIO BUILDER tool in WKH&\QH¿QIUDPHZRUNDQGWKHIXWXUH
the RAHS software enables the EDFNZDUGVPRGHO7KH\DUHGHYHORSHG
analyst to create a system model by building on concepts from the
UHIHUUHG WR DV D 6\VWHP 0DS EDVHG H[HPSODUV RI DQ LQFLGHQW RU HYHQW
RQ 6\VWHPV 7KLQNLQJ 7KLV GHSLFWV 7KLVLVVLPLODUWRGH¿QLQJDFDWHJRU\
the analyst’s understanding of the of people, for example, exemplars of
factors/components of the system or terrorists could be Osama bin Laden
situation being studied, as well as the DQG$]DKDUL+XVVHLQ
UHODWLRQVKLSVEHWZHHQWKHVHIDFWRUV 7KH &\QH¿Q IUDPHZRUN LV D
The System Map helps the sense-making model developed
analysts clarify their understanding E\ &RJQLWLYH HGJH ,W FRQVLVWV RI
of the eco-system of events and ¿YH GRPDLQV NQRZQ NQRZDEOH
people, and serves as a basis for FRPSOH[ FKDRV DQG GLVRUGHU 7KH
in-depth discussion and sense- ¿UVW GRPDLQ UHSUHVHQWV FDXVH DQG
PDNLQJ $ VHW RI VXSSRUWLYH WRROV effect relationships that are not open
VXFK DV WKDW WR KHOS ¿QG RXW WKH to dispute, and actions can follow
PRVWLQÀXHQFHGDQGPRVWLQÀXHQWLDO VWDQGDUG RSHUDWLQJ SURFHGXUHV
factors, are also provided to help 7KH VHFRQG GRPDLQ LV NQRZDEOH
derive more insights from the ,W FRQVLVWV RI LQIRUPDWLRQ WKDW LV
6\VWHP0DS$VDPSOH6\VWHP0DS not fully known but can be known
DQGLWV,QÀXHQFHG,QÀXHQWLDO0DSLV JLYHQ HQRXJK WLPH DQG UHVRXUFHV
LOOXVWUDWHGDW)LJXUH The actions associated with this
Having built the System Map, GRPDLQ DUH UHVHDUFK DQG SODQQLQJ
the analyst can further input the The third domain represents
states for each factor, along with complex information space where
the pair-wise consistency between information either does not follow a
each pair of states of two different stable trend, or that the factors that
IDFWRUV $IWHU WKH RSWLRQV IRU WKH make up the trend are not obvious to
factors and the consistencies LQVSHFWLRQ5HODWLRQVKLSVDQGWUHQGV
)LJXUH6FUHHQ6KRWRIWKH*ODQFH9LVXDOLVDWLRQ
)LJXUH6FUHHQ6KRWRIWKH%URZVH9LVXDOLVDWLRQ
)LJXUH6FUHHQ6KRWRIWKH&RPSDUH9LVXDOLVDWLRQ
)LJXUH6FUHHQ6KRWRIWKH5DQJH9LVXDOLVDWLRQ
)LJXUH6FUHHQ6KRWRIWKH'LVWULEXWH9LVXDOLVDWLRQ
)LJXUH6FUHHQ6KRWRIWKH&OXVWHU9LVXDOLVDWLRQ
)LJXUH6FUHHQ6KRWRIWKH*UDSK9LVXDOLVDWLRQ
cannot be perceived in the chaos good future and the impossibly bad
domain, and innovative actions need IXWXUH7KHHOHFWURQLFYHUVLRQRIWKH
WR EH WDNHQ WR UHFWLI\ WKH LVVXHV Future-Backwards model in RAHS
,Q WKH FHQWUDO GRPDLQ RI GLVRUGHU enables an electronic copy of the
the issues and information do not steps to be listed and the evidence
¿W ZHOO LQWR DQ\ RI WKH SUHYLRXVO\ to support the steps to be stated and
described domains, instead, they stored (Figure 19)
have a combination of the elements
RIWKHGRPDLQV Monitoring Tool
,Q WKH 5$+6 VRIWZDUH WKH
T
&\QH¿Q IUDPHZRUN IDFLOLW\ HQDEOHV O MONITOR THE situation, the
the user to attach evidence in the DQDO\VW FDQ FUHDWH ¿OWHUV
form of articles on the framework for each of the factors, so
(Figure 18) that incoming data streams can
Development of the Future- be extracted and matched to each
Backwards model encourages the IDFWRU 7KH DQDO\VW FDQ WKHQ WDNH
analyst to consider the steps that note if the incoming data implies
were taken to arrive at the current a situation different from the
state of affairs, steps that can be model currently depicted by the
taken to arrive at the impossibly System Map and its associated
)LJXUH$6\VWHP0DSRQWKHOHIWZLWKLWV,QÀXHQFHG,QÀXHQWLDO0DSLQWKHORZHUULJKW
B
UILDING ON THE strength of of analysts and improve their
scenario planning, HSC has HIIHFWLYHQHVV 6RPH DUHDV RI
partnered the Strategic Policy exploration include trend analysis,
2IILFH632WRGHYHORSD6FHQDULR sentiment analysis, information fusion
3ODQQLQJ 63 PHWKRGRORJ\ DQGLQWHUGHSHQGHQF\PRGHOOLQJ5(&
which integrates systems thinking also manages the development of
DQG PRUSKRORJLFDO DQDO\VLV 7KH 5$+6WKHQH[WJHQHUDWLRQRIWKH
RAHS tools allow for component system, which will have a broader
processes in scenario planning to range of sophisticated capabilities to
be carried out on a more complex HQDEOHIXWXUHZRUNV
VFDOH 7KH 63 WRRO NLW WKHUHIRUH
offers analysts a range of concepts CONCLUSION
PHWKRGV WR FKRRVH IURP
T
Specific combinations of concepts HE RAHS SYSTEM is a network
PHWKRGV ZLOO EH UHFRPPHQGHG of people, data and tools with
once a problem has been identified a wide range of methodologies
and the problem space has that can cater to different problems
EHHQGHILQHG DQG VLWXDWLRQV ,WV RSHQ DUFKLWHFWXUH
The HSC will also be enables it to evolve continuously,
developing a primer to help to connect with new agencies and
transmit the necessary processes incorporate new concepts and
DQG VNLOOV 7KHUH LV TXLWH D IDLU ELW WHFKQRORJLHV 7KLV LV GRQH ZLWK
of conceptual work that needs to the aim of leveraging on a wider
EH GRQH (PHUJLQJ ,VVXHV QHHG WR source of people, expertise and data,
be understood in relation to the ERWK ORFDOO\ DQG LQWHUQDWLRQDOO\
Risk Management cycle, and in Thus working towards enhancing
association with Discontinuities Singapore’s early warning capabilities
DQG *OREDO 6KLIWV :H QHHG WR with regards to threats/opportunities
better understand how devil’s DIIHFWLQJRXUQDWLRQDOLQWHUHVW
)LJXUH7KH&\QH¿QIUDPHZRUN
)LJXUH)XWXUH%DFNZDUGVPRGHO
EDITOR’S NOTES
0V 0DJGDOHQH &KRR LV DQ$VVLVWDQW 'LUHFWRU DW WKH +RUL]RQ 6FDQQLQJ &HQWUH +6& 7KH
+6&LVORFDWHGZLWKLQWKH1DWLRQDO6HFXULW\&RRUGLQDWLRQ6HFUHWDULDW16&6+6&H[SORUHV
DQG LQYHVWLJDWHV WKURXJK KRUL]RQ VFDQQLQJ FDVH VWXGLHV RU RWKHU LQLWLDWLYHV NH\ HPHUJLQJ
LVVXHV DV ZHOO DV ULVNV RU XQFHUWDLQWLHV DFURVV YDULRXV GRPDLQV WKDW ZRXOG KDYH VLJQL¿FDQW
LPSDFW RQ 6LQJDSRUH 6FHQDULR 3ODQQLQJ KDV EHHQ FHQWUDO WR WKH 6LQJDSRUH *RYHUQPHQW¶V
DELOLW\ WR SODQ DQG SUHSDUH IRU D UDQJH RI SRVVLEOH IXWXUHV 7KH 5LVN $VVHVVPHQW DQG
+RUL]RQ6FDQQLQJ5$+6SURJUDPPHZDVODXQFKHGLQWRH[SORUHPHWKRGVWRROVDQG
WHFKQLTXHVWKDWFRXOGFRPSOHPHQWVFHQDULRSODQQLQJ
A
S THE LAW enforcement and incidents are rare and the reasons
security arm of the United varied, often resulting from business
6WDWHV 3RVWDO 6HUYLFH 8636 disagreements, revenge, or a lover’s
and one of the oldest federal law quarrel, the end result is the same
enforcement agencies in the country, ± VHYHUH LQMXU\ RU GHDWK 7KH
WKH 8QLWHG 6WDWHV 3RVWDO ,QVSHFWLRQ sophistication of these injurious
6HUYLFH 863,6 KDV WKH MXULVGLFWLRQ items has evolved over the years
to investigate any illegal use of not to mention, also improving
WKH PDLO ZLWKLQ WKH 8QLWHG 6WDWHV on their effectiveness of causing
8QLWHG6WDWHV3RVWDO,QVSHFWRUVWUDFH KDUP DQG LQMXU\ WR WKH UHFLSLHQW
their lineage to the 1700s when a ,Q WKH 8QLWHG 6WDWHV 86 WKLV
similar position was created under evolution has required an ongoing
the British postal system which was corresponding development of new
RSHUDWLQJ LQ WKH $PHULFDQ FRORQLHV training and methods used by US
During these colonial times, 3RVWDO ,QVSHFWRUV WR HIIHFWLYHO\ DQG
3RVWDO ,QVSHFWRUV EHJDQ D ORQJ DQG GHFLVLYHO\DGGUHVVWKLVWKUHDW
successful history of investigating
postal crimes to include the mailing ANTHRAX IN THE MAIL
of injurious articles containing
A
chemical, biological, radiological, NEW AGE OF terrorism came
and explosive threats, and bringing upon us following the
WKHUHVSRQVLEOHFULPLQDOVWRMXVWLFH September 11 attack of the
Package bombs, poisons, and :RUOG 7UDGH &HQWHU LQ 1HZ <RUN
other weapons are occasionally This significant terrorist incident
and illegally sent through the mails brought with it a new challenge
in an attempt to injure or kill the and a renewed sense of urgency to
UHFLSLHQW :KLOH WKHVH ZRUOGZLGH the law enforcement and security
F
OR MANY YEARS, WKH 863,6 exacerbated by existing municipal
has responded to reports of ¿UH GHSDUWPHQW SURWRFROV LQ WKH
VXVSLFLRXV PDLO DUWLFOHV ,Q 8QLWHG 6WDWHV 7KHVH ¿UVW UHVSRQGHUV
IDFW 3RVWDO ,QVSHFWRUV ZHUH LQWHJUDO FRPPRQO\SURYLGHKD]DUGRXVPDWHULDOV
WRWKHLQLWLDOGHYHORSPHQWRIWKH¿UVW UHVSRQVH XVLQJ ¿HOG WHVWLQJ SURFHVVHV
portable x-ray units now considered and equipment without proven records
a basic tool of bomb technicians of accuracy, and with an unacceptable
ZRUOGZLGH$VWKH8636DQG863,6 QXPEHUVRIIDOVHSRVLWLYHV7KHODFNRI
began to develop plans to address XQLIRUPLW\ FRPSURPLVHG WKH 863,6¶V
the growing threat of chemical, ability to ensure that all areas of the
biological and radiological weapons USPS were handled with comparable
beyond the implementation of the levels of protection and that
BDS system, they were able to draw unnecessary operational disruptions
on the hundreds of already trained ZHUHPLQLPLVHG
3RVWDO ,QVSHFWRUV DQG WKHLU SRUWDEOH ,QWKHPDLOSDUDQRLDIROORZLQJWKH
x-ray units strategically located Anthrax mailings, responses to mail
DFURVV WKH 8QLWHG 6WDWHV $GGLWLRQDO SURFHVVLQJ FHQWHUV E\ PXQLFLSDO ¿UH
training and equipment was required departments across the country were
to effectively address this new resulting in unnecessarily shutting
WKUHDW 7KLV UHTXLUHG DQ H[SDQGHG down operations due to unreliable
use of existing processes and the IDOVHSRVLWLYH ¿HOG WHVW UHVXOWV ZLWK
establishment of protocols necessary many substances tested eventually
WRGHSOR\QHZWRROVDQGWUDLQLQJ7KH EHLQJ FRQ¿UPHG DV VXJDU FKDON DQG
technology part of this deployment RWKHU VLPLODUO\ KDUPOHVV VXEVWDQFHV
was no small task as interested Worse yet, employees and the public
ELRKD]DUG HTXLSPHQW YHQGRUV DQG VRPHWLPHV KDG WR ZDLW KRXUV
manufacturers were making many or longer periods of time before
questionable and unsubstantiated UHFHLYLQJ FRQ¿UPDWLRQ WKDW WKH\
T
adopted that uses a combination of HE MOST COMMON form of
WUDLQLQJ ¿HOG VFUHHQLQJ HTXLSPHQW $QWKUD[ LV D ZKLWH SRZGHU
and clear criteria for testing on site, This fact has resulted in
while seeking accurate and timely numerous other harmless white
ODERUDWRU\ FRQ¿UPDWLRQ RI ¿HOG powders found in a variety of settings
¿QGLQJV ,Q RUGHU WR LPSOHPHQW WKLV EHLQJLQFRUUHFWO\LGHQWL¿HGDVSRVVLEOH
new response system and deploy it $QWKUD[7KLVSDUDQRLDZKLOHJUHDWO\
WKURXJKRXW WKH FRXQWU\ WKH 863,6 diminished from the early days of
provided highly technical training, this crisis, continues to this day,
including HAZWOPER, to over 300 RIWHQ UHVXOWLQJ LQ 3RVWDO ,QVSHFWRU
3RVWDO,QVSHFWRUVDQGHQJDJHGLQWKH response to harmless substances
SURFXUHPHQW RI D ÀHHW RI VSHFLDOO\ such as powdered coffee creamer,
designed response vehicles containing cornstarch, and other common and
the latest in chemical, biological, KDUPOHVV PDWHULDOV *HQHUDOO\ WKHVH
UDGLRDFWLYH DQG QXFOHDU KD]DUG matters can be resolved quickly by
LGHQWL¿FDWLRQ WRROV 7KLV LQYHVWPHQW UHVSRQGLQJ 3RVWDO ,QVSHFWRUV E\
in training and equipment places developing information including
WKH 863,6 IDU DKHDG RI PDQ\ RWKHU the location of the substance and
law enforcement and public service any items which may be associated
agency in the United States in its ZLWKWKHVXEVWDQFH$Q\TXHVWLRQDEOH
DELOLW\WRHI¿FLHQWO\UHVSRQGWRWKUHDWV substance is promptly tested with
RIWKLVW\SH specialised equipment including air
While the equipment and training monitors, radiation detection meters,
was and continues to be very costly, portable x-ray units, infrared-based
the return on this investment has KD]DUGRXV PDWHULDOV LGHQWL¿FDWLRQ
EHHQ VLJQL¿FDQW GUDPDWLFDOO\ systems, as well as other sensitive
T
VXFFHVVIXO 6LQFH WKH DGRSWLRQ DQG HE A NTHRAX MAILINGS came
installation of the BDS, hundreds during the immediate
of billions of letters have been aftermath of the September 11
processed by the USPS and screened WHUURULVWDWWDFNV$VWKH8636PRYHG
WKURXJK WKLV V\VWHP 7R GDWH WKHUH to improve its state of readiness
has not been a single alert or even regarding threats being introduced
false alarm in mail processing plant to the ’mailstream’, the threat of
LQWKH8QLWHG6WDWHV terrorism not directly involving the
Similarly, suspicious mail item PDLOZDVDOVRFRQVLGHUHG,QDGGLWLRQ
responses by Dangerous Mail to the deployment of BDS and
Specialist since 2001 total more than improvement to response to chemical,
$OO RI WKHVH LQFLGHQWV ZHUH biological, radiological or explosive
P
effort included the deployment of a OSTAL I NSPECTORS RESPOND to
VSHFLDOO\ HTXLSSHG ÀHHW RI PRELOH reports of suspicious substances
command centers to ensure we could LQ WKH PDLO HYHU\ GD\ :KLOH
manage operations anywhere in the vast majority of these response are
the United States regardless of the false alarms resulting from accidental
FLUFXPVWDQFHV 7KH LPSOHPHQWDWLRQ spills or leaks of chemicals that
of these additional strategic assets should never have been introduced
ZHUH LQVWUXPHQWDO LQ WKH 863,6 into the mailstream, the response must
successful response to the aftermath be treated as a potential threat until it
of Hurricane Katrina, which hit the FDQ EH UXOHG RWKHUZLVH:KLOH 3RVWDO
Louisiana and Mississippi coast in the ,QVSHFWRUV NQRZ WKDW HYHQ LQ WKRVH
southern United States and destroyed UDUHFDVHVZKHUHDWKUHDWLVFRQ¿UPHG
PXFKRIWKHFLW\RI1HZ2UOHDQV it is unlikely to be an actual terrorist
The continuous use of the training HYHQW 0RVW RI WKH DFWXDO WKUHDWV
and equipment developed as a result 3RVWDO ,QVSHFWRUV HQFRXQWHU DUH
of the Anthrax attacks has also individual attacks that are personally
LPSURYHG 863,6 KDQGOLQJ RI PDLO motivated, often prompted by revenge
screening at large public events, an or business disputes, however another
DFWLYLW\WKH863,6KDVHQJDJHGLQIRU terrorist attack on the postal system or
DV ORQJ DV LW KDV EHHQ LQ H[LVWHQFH XVLQJWKHPDLOFDQQRWEHGLVPLVVHG
A mobile mail screening station For over 250 years Postal
for use at special events has been ,QVSHFWRUV KDYH VWRRG UHDG\ WR
FRQVWUXFWHG DQG GHSOR\HG 7KLV XQLW protect the USPS, its employees
is completely self-contained in a large and assets, and the mail from
tractor-trailer and can be use to screen criminal attack, and the public from
PDLO WR 9,3V DQG RWKHUV LQ ODUJH crimes committed using the postal
DPRXQWV DQG RQ D FRQWLQXRXV EDVLV V\VWHP :KLOH WKLV SURXG OHJDF\
EDITOR’S NOTES
0U2VFDU9LOODQXHYDLVWKH'HSXW\&KLHI,QVSHFWRU863RVWDO,QVSHFWLRQ6HUYLFH863,6
DQG$VVLVWDQW &KDLUPDQ RI 3RVWDO 6HFXULW\ *URXS 8QLYHUVDO 3RVWDO 8QLRQ 7KH 863,6 LV
D FORVH SDUWQHU RI WKH +RPH 7HDP$FDGHP\ ± 0LQLVWU\ RI +RPH$IIDLUV 6LQFH VLJQLQJ D
7UDLQLQJ 0HPRUDQGXP RI 8QGHUVWDQGLQJ 028 EDFN LQ 'HFHPEHU ERWK DJHQFLHV
KDYHVWULYHGWRIXUWKHUGHYHORSWKHLUZRUNLQJSDUWQHUVKLS
T
HE WORLD HEALTH2UJDQL]DWLRQ the prohibition of chemical agents
refers to bioterrorism as WR ELRORJLFDO DJHQWV 6XEVHTXHQWO\
“The use of biological the Convention on the Prohibition
DJHQWV LQ WHUURULVP 7KLV LQFOXGHV of the Development, Production,
the malevolent use of bacteria, and Stockpiling of Bacteriological
viruses, or toxins against people, %LRORJLFDO DQG 7R[LQ :HDSRQV
animals, or plants”1 0LFURELRORJLF DQG RQ WKHLU 'HVWUXFWLRQ FRPPRQO\
agents have characteristics that known as the Biological and Toxin
render them desirable for illicit :HDSRQV &RQYHQWLRQ EDQQHG WKH
use when compared to chemical development, production, stockpiling,
RU QXFOHDU PDWHULDOV 7KH\ DUH acquisition and retention of microbial
easily concealed making them or other biological agents or toxins,
easily transportable and virtually in types and in quantities that have
XQGHWHFWDEOH GXULQJ WUDQVSRUW $QG QR MXVWL¿FDWLRQ IRU SURSK\ODFWLF
under the right conditions, they can SURWHFWLYHRURWKHUSHDFHIXOSXUSRVHV
be propagated to large quantities, ,W DOVR EDQQHG ZHDSRQV HTXLSPHQW
sometimes necessitating only basic or the means of delivery designed to
PLFURELRORJ\VNLOOV2 use such agents or toxins for hostile
Recognising the potential risk SXUSRVHVRULQDUPHGFRQÀLFW
that microbiologic agents could pose Numerous microbiologic agents
when used illicitly, “The Protocol and toxins could be utilised to
for the Prohibition of the Use in SRWHQWLDOO\ FDXVH KDUP 3HUSHWUDWRUV
War of Asphyxiating, Poisonous or may choose one particular agent
Other Gases and of Bacteriological over another for a variety of reasons
Methods of Warfare”, known as the that could include their technical
*HQHYD 3URWRFRO RI GHWDLOHG knowledge, availability of the agent
efforts to prohibit the use of biologic and reagents, the ability to propagate
ZHDSRQV37KLV3URWRFROZDVWKH¿UVW and disseminate the agent, monetary
multilateral agreement that extended resources or for other logistical
T
HE U.S. DEPARTMENT of Human that has been caused maliciously may
Services, Centers for Disease solely lie in the fact that one is an act
Control and Prevention RIQDWXUHDQGWKHRWKHULVDFULPH
collaborates to create the expertise, Biological events, whether
information, and tools that people naturally occurring or perpetrated,
and communities need to protect their UDUHO\ KDYH D GH¿QDEOH VFHQH
health – through health promotion, ORFDWLRQ RI WKH HYHQW OLNH PRUH
prevention of disease, injury and overt events such as explosive or
disability, and preparedness for new FKHPLFDO LQFLGHQWV %LRORJLFDO
KHDOWK WKUHDWV 2WKHU SXEOLF KHDOWK events are generally more insidious
entities around the world, such as or covert, unless a perpetrated
the Singapore Ministry of Health HYHQW LV DQQRXQFHG HJ HQYHORSH
promote similar goals championing with a threat letter and an unknown
healthy nations through innovation SRZGHU RU D GLVSHUVDO GHYLFH
and excellence to promote health LV IRXQG 0RUH OLNHO\ WKH ¿UVW
DQG UHGXFH LOOQHVV 3XEOLF KHDOWK indication of the event will be sick
entities such as these have roles in the individuals presenting for medical
response to events that threaten the FDUH :KHQ DQ DWWDFN RFFXUV
health of the public regardless of the the time from exposure until the
VRXUFHRIWKRVHHYHQWV onset of illness in those affected
The role of public health may be several hours to days or
entities in outbreaks of disease ZHHNV GHSHQGLQJ RQ WKH DJHQW
include detection of the outbreak This incubation period provides a
P
QDWXUDOO\ RFFXUULQJ RXWEUHDN 7KH UBLIC HEALTH ENTITIES utilise
¿UVW UHVSRQGHUV LQ WKLV LQVWDQFH ZLOO sound epidemiologic,
be emergency department physicians laboratory and forensic
and nurses, outpatient clinicians, approaches to the investigation of
laboratory experts and specialists in RXWEUHDNV 7KH\ GHVLJQ DQG FRQGXFW
infectious diseases, infection control epidemiologic investigations
DQG SXEOLF KHDOWK ,OO LQGLYLGXDOV of outbreaks in order to answer
will likely seek medical attention in questions regarding transmissibility
multiple institutions depending on FRPPXQLFDELOLW\ VHYHULW\ H[WHQW
where they are when they become DQG VSUHDG RI WKH RXWEUHDN$QVZHUV
ill, some potentially very far from the to these questions enable determining
H[SRVXUHVLWH and promptly instituting public health
Healthcare providers are the crux measures and recommendations that
for reporting potential cases and/or are aimed at controlling the outbreak
HYHQWVWRSXEOLFKHDOWKHQWLWLHV,QWKH DQG SUHYHQWLQJ IXUWKHU LOOQHVV 7KH
2001 anthrax letter mailings in the success of these investigations hinges
United States, it was a clinician that upon the close coordination and
ZDV WKH ¿UVW WR DOHUW SXEOLF KHDOWK RI cooperation that exists between public
WKH ¿UVW FDVH RI LQKDODWLRQ DQWKUD[ WR KHDOWKDQGPHGLFDOVHFWRUV
EHGLDJQRVHGLQWKH86VLQFH5 Naturally occurring outbreaks can
And, in 2003, a global outbreak of have a certain amount of predictability
Severe Acute Respiratory Syndrome in terms of consistency with previous
6$56 RFFXUUHG UHVXOWLQJ LQ PRUH RFFXUUHQFHV DQG ELRORJLF SODXVLELOLW\
WKDQ SUREDEOH FDVHV DQG A number of epidemiologic clues to
deaths in 25 countries as of July 2003 identify events that could potentially
EHIRUH LW ZDV FRQWDLQHG6 Control of be the result of bioterrorism have
the outbreak required the efforts of been previously described8 6RPH
public health and healthcare providers of these clues include a single case
RQ DQ LQWHUQDWLRQDO OHYHO %HFDXVH of disease caused by an uncommon
of their characteristics and the role agent, large numbers of cases of
A
BIOTERRORIST ATTACK by
IS naturally occurring outbreaks will
GH¿QLWLRQ D FULPH DQG ZLOO rarely require the involvement of
necessitate and include a law law enforcement entities. However,
enforcement investigation. Law investigation of bioterrorism
enforcement investigations have events will necessitate public
W
work to prevent disease outbreaks, HEN INVESTIGATIONS ARE
investigate outbreaks and stop conducted independently,
further cases of disease from both public health and law
occurring through recommendations enforcement entities may acquire
DQGLPSOHPHQWLQJFRQWUROPHDVXUHV information that is relevant to the
RWKHU¶V LQYHVWLJDWLRQ %HFDXVH RI WKLV
PREVENTION potential, information sharing between
public health and law enforcement
O
NE KEY ELEMENT to achieving has the potential to improve the
WKHVH PXWXDOO\ EHQH¿FLDO WLPHOLQHVV RI LQYHVWLJDWLYH ¿QGLQJV
prevention goals involves DQG VDYH OLYHV 7R EH PRVW HIIHFWLYH
VHFXULQJ GDQJHURXV SDWKRJHQV strategies for information sharing
Securing dangerous pathogens as VKRXOGEHSUHGHWHUPLQHG
a prevention measure generally Public health and law enforcement
equates with assuring safe and investigators have access to unique
VHFXUH ODERUDWRULHV 6DIH DQG information that may be important
secure laboratories help ensure the WR VKDUH GXULQJ DQ LQYHVWLJDWLRQ
FRQWDLQPHQW RI KD]DUGRXV LQIHFWLRXV Law enforcement typically handles
substances, protecting valuable intelligence regarding terror groups
research and commercial assets, and organisations, processes threats,
PLQLPL]LQJ WKH ULVN RI DFFLGHQWDO intelligence and collects victim
exposure or release and reducing the LQIRUPDWLRQ IRU FDVH PDQDJHPHQW
ULVNRIFULPHDQGELRWHUURULVP Public health conducts surveillance
B
ECAUSE OF THEnature of a that might result in further exposures
perpetrated biological event WRWKHDJHQW
and the need for multiple
sources of information and expertise, JOINT INTERVIEWS
conducting a joint investigation
G
should be considered when indicators ENERALLY, WHEN INTERVIEWS
are such that further investigation of sick individuals are needed
LV ZDUUDQWHG :KHQ DJUHHLQJ WR as part of an investigation,
conduct joint investigations and certain information such as whether
the sharing of information between the illness or event is consistent with
agencies, both must take into account a particular agent, when an exposure
national and local laws including might have occurred, where an
those that address privacy rules and exposure could have occurred, and
FULPLQDOSURVHFXWLRQV%HFDXVHPDQ\ how an exposure might have occurred
countries have laws that protect is generally best collected and assessed
SDWLHQW FRQ¿GHQWLDOLW\ VHQVLWLYH E\DSXEOLFKHDOWKH[SHUW:KHWKHUWKH
PHGLFDO KHDOWK LQIRUPDWLRQ ZKHQ ill person may be the victim of the
developing protocols, legal counsel crime or the perpetrator of the crime
should play a role in ensuring that is generally an assessment that law
DQ\ SURWRFROV GHYHORSHG ¿W ZLWKLQ HQIRUFHPHQW SHUIRUPV +HDULQJ WKH
the legal system where they will be same information at the same time
implemented and may need to be from the ill person and leveraging the
consulted during an investigation skill sets from both public health and
IRUVSHFL¿FVLWXDWLRQVQRWSUHYLRXVO\ law enforcement simultaneously to
GHVFULEHGRUDJUHHGXSRQ acquire and synthesise the information
Joint investigations can provide FDQ OHDG WR ¿QGLQJV DQG FRQFOXVLRQV
PDQ\ EHQH¿WV WR ERWK SXEOLF KHDOWK that neither one would discern
DQG ODZ HQIRUFHPHQW HQWLWLHV /DZ LQGHSHQGHQWO\ $QRWKHU FRQVLGHUDWLRQ
HQIRUFHPHQW FDQ EHQH¿W E\ KDYLQJ for conducting a joint investigation is
access to infectious disease subject that, depending on the given situation,
matter experts and relevant health there may be a narrow window of time
LQIRUPDWLRQ3XEOLFKHDOWKFDQEHQH¿W that an interview can be conducted
E\KDYLQJDFFHVVWRSRWHQWLDOVSHFL¿F before the individual becomes too ill
law-enforcement case information WRUHVSRQGDQGRUGLHV
I
perspective to the interview that N SUMMARY, BOTH law enforcement
may enable them to observe and and public heath entities share
garner clues differently resulting PDQ\PXWXDOJRDOVDQGREMHFWLYHV
LQ PXWXDO EHQH¿WV ,Q DGGLWLRQ Both entities have roles that are
obtaining the information jointly critical to the successful outcome and
can minimise the potential for PDQDJHPHQW RI D ELRWHUURULVW DWWDFN
REWDLQLQJ FRQÀLFWLQJ LQIRUPDWLRQ Developing pre-planned protocols and
while maximising the opportunity procedures for sharing of information
to leverage the public health and have the potential to improve
law enforcement knowledge, skills WKH RXWFRPH RI WKH LQYHVWLJDWLRQ
DQGLQWHUSUHWDWLRQ Providing joint opportunities for
When conducting joint interview, training and conducting exercises can
predetermination of who leads the lead to further enhancements to these
interview, how the patient will be plans and lead to improvements in
approached and other key logistical UHVSRQVHGXULQJDUHDOHYHQW
elements should be worked out ahead
RIWLPH REFERENCES
Regardless of whether :RUOG +HDOWK 2UJDQL]DWLRQ ,QWHUQHW
information is obtained jointly *HQHYD 6ZLW]HUODQG $YDLODEOH IURP KWWS
ZZZZKRLQWWRSLFVELRWHUURULVPHQ
or not, it is critical to have 0RUDQ *- 7DODQ '$ $EUDKDPLDQ )0
protocols and procedures in %LRORJLFDO7HUURULVP ,QIHFW 'LV &OLQ 1$P
place to enable the sharing *HLVVOHU ( %LRORJLFDO DQG WR[LQ ZHDSRQV
of information. research, development and use from the
0LGGOH$JHVWR,QVLSUH&KHPLFDODQG
%LROJRLFDO :DUIDUH 6WXGLHV 1R 2[IRUG
8QLYHUVLW\3UHVV1HZ<RUN
TRAINING AND EXERCISES +HQGHUVRQ '$ 7KH ORRPLQJ WKUHDW RI
ELRWHUURULVP6FLHQFH
O
%XVK /0 $EUDPV %+ %HDOO $ -RKQVRQ
NCE JOINT STRATEGIES, && ,QGH[ FDVH RI IDWDO LQKDODWLRQDO DQWKUD[
protocols and procedures are GXH WR ELRWHUURULVP LQ WKH 8QLWHG 6WDWHV 1
(QJO-0HG
developed, joint training and 5RWKPDQ 5( +VLHK <+ <DQJ 6
exercises will provide the opportunity Communicable respiratory threats in the
EDITOR’S NOTES
'U 3DPHOD 'LD] LV WKH 'LUHFWRU RI %LRVXUYHLOODQFH &RRUGLQDWLRQ LQ WKH 3XEOLF +HDOWK
6XUYHLOODQFH 3URJUDP 2I¿FH DW WKH &HQWHUV IRU 'LVHDVH &RQWURO DQG 3UHYHQWLRQ &'& LQ
WKH866KHUHSUHVHQWV&'&DWLQWHUQDWLRQDO%LRWHUURULVPWUDLQLQJZRUNVKRSVVSRQVRUHGE\
,QWHUSRO DQG WKH 86 'HSDUWPHQW RI 6WDWH SURYLGLQJ H[SHUWLVH DQG WUDLQLQJ LQ MRLQW SXEOLF
KHDOWKDQGODZHQIRUFHPHQWLQYHVWLJDWLRQ
'U 3DPHOD 'LD] SUHVHQWHG DQ H[FHOOHQW DQG KLJKO\ WKRXJKWSURYRNLQJ VHVVLRQ GXULQJ WKH
86DQG6LQJDSRUH%LRWHUURULVP:RUNVKRSLQ6LQJDSRUHEDFNLQ
She has been a front-line public health responder and was deployed to New York City for
the 2006 inhalation anthrax case in an African drum maker and to Mexico City for the H1N1
LQYHVWLJDWLRQV6KHKDVSURYLGHGFRQVXOWDWLRQWRWKH86'HSDUWPHQWVRI+HDOWKDQG+XPDQ
6HUYLFHVDQG+RPHODQG6HFXULW\RQPDWWHUVUHODWHGWRLQIHFWLRXVGLVHDVHVDQGSUHSDUHGQHVV
'U 'LD] UHFHLYHG KHU PHGLFDO GHJUHH IURP WKH 8QLYHUVLW\ RI7ROHGR &ROOHJH RI 0HGLFLQH
DQG FRPSOHWHG D IHOORZVKLS LQ 3HGLDWULF ,QIHFWLRXV 'LVHDVHV DW 6WDQIRUG 8QLYHUVLW\ 3ULRU
SRVLWLRQV LQFOXGH $VVLVWDQW &RPPLVVLRQHU RI ,QIHFWLRXV 'LVHDVH DQG 3XEOLF +HDOWK
Preparedness for the Chicago Department of Public Health, and Assistant Professor in the
'LYLVLRQRI3HGLDWULF,QIHFWLRXV'LVHDVHVDWWKH8QLYHUVLW\RI&KLFDJR+HUPDMRULQWHUHVWV
include public health, emerging infections, methods of disease surveillance, public health
SUHSDUHGQHVVDQGUHVSRQVH
I
N THE LAST two decades, rapid attacks may be intended mainly to
DGYDQFHPHQW LQ WKH ¿HOG RI seek the attention of masses, thus the
information technology and WDUJHWPD\QRWEHVSHFL¿F7KHUHIRUH
overall growth in the economy has led it is essential that security agencies
WR VLJQL¿FDQW FKDQJHV LQ WKH TXDOLW\ are well-equipped with advanced
RI OLIH $W WKH VDPH WLPH FKDQJHV technologies to nab these people with
in the nature of crime including ill-intentions, and it is the need of the
KHLQRXV WHUURULVW DWWDFNV UHÀHFW WKH KRXUWRPDVWHUWKLVDUW
change in the attitude and mindset Forensic psychologists play a key
RI WKH SHUSHWUDWRUV *URZLQJ WHUURULVW UROH LQ DLGLQJ FULPH LQYHVWLJDWLRQV
attacks have become both a national Past experience has shown that
and international concern as the in order to prevent or tackle an
cause is of either an ‘ideological’ or organised crime, ways and means
µRUJDQLVDWLRQDO¶QDWXUH7KDWLVWRVD\ adopted by the perpetrator as well
perpetrators carrying out these attacks as the strategies designed for the
may not have any criminal history execution of criminal activity must
which can render them as suspects to EH XQGHUVWRRG 7KH ZRUN H[SHULHQFH
the law-enforcement agencies on the of [forensic psychology division at
EDVLVRIWKHLUKLVWRU\7KH\PD\HQWHU the Directorate of Forensic Sciences
a country with just an intention to ')6 *DQGKLQDJDU ,QGLD@ KDQGOLQJ
FDUU\ RXW DQ DWWDFN ZLWKRXW FDUU\LQJ nearly 5000 suspects referred for
DQ\ DUPV RU DPPXQLWLRQV RQ WKHP various psychological techniques
and execute the group’s intention of investigations in the last three
with their local network once they decades has helped in understanding
DUH LQVLGH WKH FRXQWU\ 6HFRQGO\ WKH how the mind of a perpetrator works,
T
HIS WARRANTS A technology crystal clear ill intention entailed
capable of identifying the with negative emotions supported by
motivation, intentions, and the social milieu provides a sense of
behaviour of a person by focusing belonging and helps in strategically
on the thought structure, process and GHVLJQLQJWKHSODQRIDFWLRQ
SDWWHUQ IRUPDWLRQ DQG SUHFHGLQJ
ideas before they crystallise to clear Prevention:
WKLQNLQJ This process is like a blueprint
I
RI LQWHQWLRQV ,Q WKH LQLWLDO VWDJHV LI F TECHNOLOGY HELPS in detecting at
“thought blueprint” can be tracked and this stage, the impending outburst
LGHQWL¿HGE\WKHWHFKQRORJ\DKDOWFDQ can be prevented, aborted or
be put to the thought process before it thwarted by not allowing the ill-intent
is coloured with emotions and ready WREHFRPHULSHIRUDQDFWLRQ This can
for ignition by the belief system of the help in preventing the person from
SHUVRQ,IDGHTXDWHSUHYHQWLYHIRUHQVLF EHFRPLQJ D SHUSHWUDWRU ,W FDQ DOVR
care is given by way of counselling help in unearthing the future course of
during this state, it can save a person DFWLRQ LH LGHQWL¿FDWLRQ RI SODQQHG
from becoming a probable perpetrator VWUDWHJLHVDQGRULQYROYHGSHUVRQV
RIFULPH
Detection:
Prediction:
I
N CASE OF failure to identify these
I
N CASE OF failure to identify them thoughts at the aforementioned
at the initial stage, crystal clear stages, and there is a catastrophic
thoughts coloured with emotions attack, investigation starts and a
I
F IN SPITE of all preventive $PRQJ WKHVH WKH *65 DQG
measures, when an attack takes %93 PHDVXUHV DUH XVHG E\ 6XVSHFW
place, it is essential to detect 'HWHFWLRQ 6\VWHP 6'6 7KH 6'6
individuals harbouring hostile intent in is based on the assumption that
real time to change the probability in an individual can be stimulated to
IDYRXU RI ODZ HQIRUFHPHQW DJHQFLHV generate psychophysical reactions to
From the suspects harbouring hostile FULPHUHODWHGWULJJHUVHJZRUGVRU
intentions, detailed investigation VHQWHQFHV )XUWKHUPRUH WKRVH ZLWK
should help in unearthing strategies a desire to hide a criminal intent will
and plans of likely targets which can have different Stimulated Psycho
EH YHUL¿HG DQG KHOSV LQ DFKLHYLQJ 3K\VLFDO 5HDFWLRQV 6335 IURP
FULPHUHODWHGLQWHOOLJHQFH the SPPR of people not having such
Different types of polygraph LQWHQW7KH 6'6 FDQ EH XVHG IRU WKH
instruments, Electroencephalograph purposes of identifying a perpetrator
((*(YHQW 5HODWHG 3RWHQWLDOV of a criminal act from the group of
(53 LQVWUXPHQWV DGMXQFW WR VXVSHFWV )RU WKLV LW XVHV WKH *XLOW\
forensic psychological assessments .QRZOHGJH 7HVW *.7 SDUDGLJP
are used for eliciting physical /\NNHQ ZKLFK LV
correlates for comprehensive based on the assumption that if an
IRUHQVLF HYDOXDWLRQ RI WKH VXVSHFWV individual has committed a crime,
S
DS IS A compact, user friendly seven minutes and after the completion
WRRO ,W LQFOXGHV D EULHIFDVH of the test, the decision will be made
consisting of a laptop, to classify the individual as suspect
headphones, and skin-conductance RU QRQVXVSHFW ,Q FDVHV ZKHUH WKH
VHQVRU 7KLV IHDWXUH JLYHV PRELOLW\ examinee is found to be a suspect,
to the user so that it can be used further information for directions of
LQ YDULRXV VHWWLQJV ,W LQFOXGHV WKH investigation is provided by the system
software which analyses a galvanic and the system will automatically
skin response of the individual and present an additional two sets of
also provides results on the basis of questions in order to reduce false
DQDO\VLV,WGRHVQRWUHTXLUHDQ\RWKHU SRVLWLYH FDVHV ,Q WKH LQYHVWLJDWLRQ
H[WHUQDOGHYLFHRUWRROIRUDQDO\VLV PRGHWKHUHDUHIRXUVHWVRITXHVWLRQV
The examinee is requested to The system records both audio and
sit comfortably, place his or her YLGHR LQSXWV GXULQJ WKH WHVW 7KH
palm in a sensors cradle, put on procedure of using this questionnaire
headphones and answer several sets LV DNLQ WR WKDW RI WKH VFUHHQLQJ PRGH
RITXHVWLRQV4XHVWLRQVDUHSUHVHQWHG The basic input which is required
both in text and audio mode by the to analyse the guilty knowledge is
system, while the sensors measure WKH LQGLYLGXDO¶V VNLQ FRQGXFWDQFH
SV\FKRSK\VLRORJLFDOUHVSRQVHV Through Galvanic Skin resistance
Two types of questionnaires are sensor, the individual’s responses are
prepared, one for screening and SLFNHGXSE\WKHV\VWHP
WKH RWKHU IRU LQYHVWLJDWLRQ 7KHVH Responses collected by the
questions are prepared and fed to system are analysed by the software,
WKH LQVWUXPHQW LQ DGYDQFH 7KHUH RQ GLIIHUHQW SDUDPHWHUV 7KHVH
are six sets of questionnaire in each parameters pick up signals of tension,
screening test and each set comprises response delay, latency and amplitude
VL[ TXHVWLRQV ,QLWLDOO\ RQO\ IRXU VHWV of the response, and the individual’s
FRPSULVLQJ TXHVWLRQV DUH XVHG WR ELRIHHGEDFN PHFKDQLVP 7KHVH DUH
stimulate examinee’s unconscious unique sophisticated parameters
UHDFWLRQV 4XHVWLRQV DUH GLIIHUHQW LQ of the system which make it more
W
which are effective in measuring HEN AN INVESTIGATOR is not
ELRIHHGEDFN DQG SV\FKRSK\VLRORJ\ clear about the role of the
This algorithm combines the results examinee in the crime,
of all these parameters and offers the the screening which takes less
following results: time and helps in minimising the
LQYHVWLJDWLRQ FDQ EH GRQH LQVWHDG
• The strongest reaction and ,QYHVWLJDWLRQLVPRUHVSHFL¿FWRWKH
the second strongest reaction FULPHRULQFLGHQFH
generated by stimulus
• The strength and validity of each To identify the role of a
reaction
suspect, investigation is done.
It helps in understanding the
• Tampering attempt by the
information about the crime
subject
which is known not to others
but the perpetrator only.
The result of the system is given on
WKHEDVLVRIWKHDQDO\VLVRIGLIIHUHQW Technical evaluation of the SDS was
SDUDPHWHUV $GGLWLRQDOO\ VRIWZDUH GRQHDWWKH')6*DQGKLQDJDU,QGLD
also validates the responses and focusing upon the feasibility of its use
LQIRUPVRQWKHYDOLGLW\RIWKDWVSHFL¿F IRU VHFXULW\ SXUSRVHV 6LPXOD WH G
UHVSRQVH WR WKH VSHFL¿F TXHVWLRQ e x p e r i m e n t s w e r e conducted
The validity helps in understanding XVLQJ WKH 6'6 WR VHH LWV HI¿FDF\ LQ
the physiological as well as external detecting suspects and non-suspects
IDFWRUVDIIHFWLQJWKHUHVXOWV :DJK 9D\D Twenty college
The tool also helps in understanding students aged between 20 to 25 years,
the results when a person is under who volunteered for the study, were
LQÀXHQFH RI DQ\ VXEVWDQFH RU WU\LQJ included and randomly distributed
WR WDPSHU WKH UHVXOW $V LW LV EDVHG in two groups – experimental and
on neural network mechanism and control groups with both having
biofeedback, the instrument measures DQ HTXDO QXPEHU RI VXEMHFWV 7KH
T
ZHUH VXSSRVHG WR SHUIRUP 7KH WDVN HE SDS IS an effective
FRPSULVHG RI ¿UVW ZDWFKLQJ D YLGHR screening tool for the
clip about the procedure to prepare an identification/detection of
H[SORVLYH $IWHU ZDWFKLQJ WKH YLGHR a person with ill-intentions which
they had to go out of the lab premises, can be further investigated on the
SUHSDUH D IDNH H[SORVLYH ZLWK basis on the results and the gathered
GXPP\PDWHULDOVDQGSODFHLWLQWKH information can be used for the
SUHPLVHV ZLWKRXW RWKHUV¶ NQRZOHGJH purpose of prevention of further
The control group was not exposed to crime as well as the perpetrators
any video and were not instructed for RIFULPH
the task that the experimental group
KDGWRGR SUGGESTIONS
F
After the completion of the task
by the experimental group, subjects UTURE STUDIES ARE required to
of both the groups were assessed on YDOLGDWHLWVHI¿FDF\LQFRXQWHULQJ
WKH 6'6 7KH UHVXOWV LQGLFDWHG WKDW the measures to suppress the
the instrument was successful in ANS reactions to deceptions, often
GHWHFWLRQZLWKDOPRVWDFFXUDF\ used by people undergoing these types
)XUWKHUPRUH ZKHQ ¿YH WR RIH[DPLQDWLRQV
six suspects were subjected for
REFERENCES
screening in blast cases, the system
suggested probable belongingness of %DUWRO &5 %DUWRO $0
,QWURGXFWLRQ WR )RUHQVLF 3V\FKRORJ\
WKH LGHQWL¿HG VXVSHFWV WR D VSHFL¿F &DOLIRUQLD6DJHSXEOLFDWLRQV
organisation, probable source of /\NNHQ '7 7KH *65 LQ WKH
GHWHFWLRQ RI JXLOW -RXUQDO RI $SSOLHG
funding, future course of action,
3V\FKRORJ\
probable time and places of future /\NNHQ '7 7KH YDOLGLW\ RI WKH
WHUURULVW DWWDFNV 7KH UHVXOWV RI WKHVH guilty knowledge technique: The effects of
IDNLQJ -RXUQDO RI $SSOLHG 3V\FKRORJ\
suspects suggested that it is a useful
and time-saving method to gathering 5DVNLQ '& 3RO\JUDSK WHFKQLTXHV
IRU WKH GHWHFWLRQ RI GHFHSWLRQ ,Q '&
LQWHOOLJHQFH 7LPHO\ VFUHHQLQJ FDQ 5DVNLQ (G 3V\FKRORJLFDO PHWKRGV LQ
help in preventing the catastrophes, FULPLQDO LQYHVWLJDWLRQ DQG HYLGHQFH 1HZ
EDITOR’S NOTES
'U9D\D 6KLYDUDWKQD /:DJK 1LOHVK % DQG 'HYYDUWD .XPDU DUH SDUW RI WKH WHDP DW WKH
,QVWLWXWHRI%HKDYLRUDO6FLHQFH,%6RIWKH*XMDUDW)RUHQVLF6FLHQFHV8QLYHUVLW\*)68
,%6¶V PLVVLRQ LQ ,QGLD LV WR LPSDUW HGXFDWLRQ DQG WR XQGHUWDNH UHVHDUFK LQ FOLQLFDO DQG
forensic areas, while at the same time, provide the highest calibre in diagnostics, psycho-
OHJDO FRQVXOWDWLRQ WR UHIHUUDO VRXUFHV FOLQLFLDQV DWWRUQH\V WKH &RXUWV VRFLDO VHUYLFH DQG
FULPLQDOMXVWLFHDJHQFLHVHWFDQGWUHDWPHQWDQGUHKDELOLWDWLRQWRFOLHQWV
0U1LOHVKLVD-XQLRU$VVLVWDQW3URIHVVRULQ&OLQLFDO3V\FKRORJ\DW,%60DMRUUHVHDUFKDUHDV
he is working on presently also include the BEOS and CST system as well as the Suspect
'HWHFWLRQ6\VWHP6'6+HKDVGHOLYHUHGOHFWXUHVRQIRUHQVLFSV\FKRORJ\IRU,QGLDQMXGLFLDU\
DQG SROLFH RI¿FHUV +H LV D UHFRJQLVHG RSHUDWRU RI WKH 6'6 DV ZHOO DV WKH &RJLWR 2SHUDWRU
$GYDQFHG &2$ 6\VWHP +H KDV UHFHLYHG KLV %DFKHORUV DQG 0DVWHUV 'HJUHH LQ &OLQLFDO
3V\FKRORJ\DQGD0DVWHUVRI3KLORVRSK\03KLOLQ0HGLFDODQG6RFLDO3V\FKRORJ\
0U .XPDU LV DOVR DQ $VVRFLDWH 3URIHVVRU RI &OLQLFDO 3V\FKRORJ\ DW ,%6 +LV SULPDU\
UHVHDUFK LQWHUHVWV DUH PHPRU\ DQG RWKHU FRJQLWLYH LPSDLUPHQWV LQ VFKL]RSKUHQLD QRQ
pharmacological intervention in psychosis, norm development of psychological tests and
OLHGHWHFWLRQ+HLVWKHDXWKRURIDERXWWZHQW\DUWLFOHVLQMRXUQDOVDQGERRNV+LVHGXFDWLRQ
LQFOXGHVD3K'LQ&OLQLFDO3V\FKRORJ\DQGD03KLOLQ0HGLFDODQG6RFLDO3V\FKRORJ\
EDITOR’S NOTES
7KH+RPH7HDP-RXUQDOLVYHU\SULYLOHJHGWRKDYHLQWHUYLHZHG0U3HWHU+RIRUPHU+HDG
of the Singapore Civil Service who retired from the Administrative Service in September
DIWHUPRUHWKDQ\HDUVRIGLVWLQJXLVKHGVHUYLFH
:KLOH KHDGLQJ WKH 6LQJDSRUH &LYLO 6HUYLFH 0U 3HWHU +R ZDV DOVR KROGLQJ WKH FRQFXUUHQW
SRVWV RI 3HUPDQHQW 6HFUHWDU\ 6SHFLDO 'XWLHV LQ WKH 3ULPH 0LQLVWHU¶V 2I¿FH 3HUPDQHQW
Secretary in the Ministry of Foreign Affairs, and Permanent Secretary for National Security
DQG,QWHOOLJHQFH&RRUGLQDWLRQ
0U3HWHU+RZLOOFRQWLQXHWRFRQWULEXWHWRWKHSXEOLFVHFWRULQYDULRXVFDSDFLWLHVDIWHUKLV
UHWLUHPHQW +H ZLOO VHUYH DV D 6HQLRU )HOORZ DW WKH &LYLO 6HUYLFH &ROOHJH DQG DOVR DV D
Senior Advisor to the Centre for Strategic Futures, in which he was instrumental in setting
XSWRVWUHQJWKHQWKHFDSDFLW\RIWKH6LQJDSRUH3XEOLF6HUYLFHWRSUHSDUHIRUWKHIXWXUH
T
HE QUESTION CAN be stated topping their online activities2
simply: Why is new media Synovate¶V<RXQJ$VLDQV6WXG\0DU
relevant for the Home Team? IRXQG RI 6LQJDSRUHDQ
The answer, however, may require a youth into blogging, with 35%
lot more space, both to state and to updating their blogs regularly; while
HOXFLGDWH 7KLV DUWLFOH LV DQ DWWHPSW 51% updated their social network
to do so, by looking at where new SUR¿OHV DV ZHOO DV UHDG SUR¿OHV RI
media is heading and the manifold others37KHNielsen Media Index2FW
RSSRUWXQLWLHVLWRIIHUV IRXQG RI 6LQJDSRUHDQ
adults going online daily, with
SOCIAL MEDIA: *HQHUDWLRQ<DJHGIDYRXULQJ
WHAT’S HAPPENING online communications, entertainment
AND WHAT NEXT and social networking
The top social media platforms
Growing Popularity of Social here are Facebook, YouTube,
Media in Singapore Wikipedia, Twitter, and Flickr,
each leading its own category5 ,Q
T
HERE IS NO doubt that social particular, Facebook has grown
media is big, and getting even tremendously popular and is today
bigger, not just worldwide Singapore’s most visited online
A
EXW LQ ZHOOFRQQHFWHG 6LQJDSRUH $ destination, even overtaking search
recent study by Nielsen 1RY HQJLQH *RRJOH VLQFH $XJ
found that 52% of Singaporeans 7RGD\ RI ORFDO ,QWHUQHW XVHUV
were already using social media1 or about 27% of Singaporeans, are
According to ComScore, more than )DFHERRNXVHUV7KHUHDUHQRZPRUH
PLOOLRQ SHRSOH KHUH HDFK VSHQW than 2 million Singapore-based
an average of 21 hours online in Facebook accounts6 7ZLWWHU ZKLOH
)HE ZLWK LQVWDQW PHVVDJLQJ new, is growing fast with an estimated
entertainment, and social networking ORFDO7ZLWWHUXVHUV7
T
HE NEW MEDIA landscape has 7KHUHZHUHPRUHWKDQPLOOLRQ
continued to develop rapidly, mobile Internet users worldwide
with new technologies and rich LQ D QXPEHU WKDW LV H[SHFWHG
applications emerging, underscoring to more than double by the end of
the need to constantly anticipate 201311 ,Q 6LQJDSRUH WKH PRELOH
trends and their impact, so that even penetration rate increased to 136%
if we cannot manage to ‘stay ahead of LQ 'HFHPEHU IURP LQ
the curve’, we can at least stay abreast -DQXDU\ 12 :RUOGZLGH WKH
RILW iPhone alone accounts for about 33%
*OREDOO\ D VLJQL¿FDQW WUHQG LQ RIPRELOHZHEWUDI¿F13*OREDOO\VDOHV
ZDV WKH VKLIW WRZDUGV D µReal- of the iPhone have reached 57 million
time Web’, including ‘real-time’ units, and Singapore is number six on
news, comments, interaction, search, WKHOLVWRIFRXQWULHVXVLQJWKHL3KRQH
collaboration, etc :KLOH LQVWDQW Today, more than three million
PHVVDJLQJ YRLFHRYHU,QWHUQHW DQG people in Singapore have mobile 3G
video-conferencing have long catered subscriptions, allowing them to ‘plug
to smaller groups, the rise of Twitter into’ countless online sites and data
and Facebook have enabled ‘instant’ ZKLOHRQWKHPRYH
social updates to be sent, shared At the same time, geo-spatial
and forwarded among much larger JHRORFDWLRQ DSSOLFDWLRQV KDYH
JURXSV 7KLUGSDUW\ VLWHV FDQ DOVR grown more sophisticated and
integrate such discussions with other powerful, allowing the integration
live content such as video streams10 of richer data, including social and
Search engines and social news sites multimedia, with interactive map
have also upgraded themselves to LQWHUIDFHV GoThere.sg, a popular
offer more ‘real-time’ search results, local start-up, provides dynamic
DOORZLQJRQHWRVHDUFKDQG¿QGQHZV maps with instructions on how to get
blog posts, tweets or other content IURP $ WR % XVLQJ SXEOLF WUDQVSRUW
SXEOLVKHG MXVW PLQXWHV DJR $ QHZ Google Street View allows one to
EUHHG RI ZHEVLWHV VXFK DV almost.at virtually move through any street in
lets you observe and discuss events Singapore and have a 3600KRUL]RQWDO
happening remotely, in real-time, via YLHZ RI HDFK ORFDWLRQ 0HDQZKLOH
a combination of text-based and visual the Singapore Land Authority has
N
PHGLDODQGVFDSH8WLOLVLQJDUDQJHRI EW MEDIA, WITH enriched
technologies such as GPS and built- multimedia, interactivity and
in compasses, it brings location- the potential to form online
based data to mobile phone screens, communities and galvanise positive
enabling layers of web data or action, is an ideal platform for image-
virtual images to be super-imposed building, community outreach and
on top of ‘live’ camera views on recruitment, especially if young
PRELOH SKRQH VFUHHQV $XJPHQWHG 6LQJDSRUHDQVDUHDNH\WDUJHWDXGLHQFH
reality applications such as Layar The use of multimedia RQOLQH
and Wikitude are already available YLGHRV DQG SKRWRV WR VKRZFDVH
locally on iPhones and Android- the actions of uniform groups and
EDVHG SKRQHV ,QFUHDVLQJO\ DV PRUH VHFXULW\ DJHQFLHV LV QRW QHZ 7KH
online data such as videos or tweets challenge is how to make such
become geo-tagged, we will see even multimedia content more interesting,
richer data and social interaction via appealing and even interactive,
PRELOHGHYLFHV in order to capture attention and
connect to youths, and have a chance
NEW MEDIA OPPORTUNITIES RI VSUHDGLQJ YLUDOO\ 7KLV UHTXLUHV
FOR THE HOME TEAM innovation, and perhaps a degree of
humour, originality and spontaneity
T
HIS SECTION WILL include a LQOLQHZLWKWKHRQOLQHFXOWXUH
number of examples of new ,QWHUQDOO\ WKLV PD\ UHTXLUH PRUH
media usage from overseas dedicated resources and roles,
agencies, presented as possible such as setting up a dedicated role or
opportunities with some observations portfolio for digital communication
IURP WKH ZULWHU ,QGLYLGXDO +RPH DQG HQJDJHPHQW )RU H[DPSOH WKH
Team agencies are in the best position UK’s West Midlands Police recently
to evaluate whether to explore them DQQRXQFHG WKDW D VHQLRU RI¿FHU$VVW
conceptually, experiment on a small Chief Constable Gordon Scobbie,
VFDOH HJ D SLORWWULDO RU SHUKDSV JR had taken on a new portfolio for
further, while complying with existing digital engagement ,W ZRXOG DOVR
policies and addressing concerns such require more extensive use of online
N
EW MEDIA ISalso a useful EXW DOVR GHWHUV SRWHQWLDO FULPLQDOV
channel to educate the public, ,Q DQRWKHU H[DPSOH RYHU WKH
HJRQSHUVRQDOVDIHW\VHFXULW\ year-end festive period, police
DQG FULPH SUHYHQWLRQ )RU H[DPSOH in the Housten-area county of
A
KEY COMPONENT OF :HE not just report a crime in progress
is the rise in user-generated but also seek immediate assistance,
FRQWHQWDQGµFLWL]HQMRXUQDOLVP¶ including practical tips on what to do
The example of SPH’s STOMP WR SURWHFW WKHPVHOYHV )RU LQVWDQFH
website shows there is no shortage the Jtrek app allows one to quickly
RI 6LQJDSRUHDQV NHHQ WR FRQWULEXWH alert friends, families and security
STOMP’s most popular section is the personnel of an emergency or a crime
“Singapore Seen” section where users in progress31
submit photos or videos highlighting Facebook can also be a good
PDLQO\PXQLFLSDOLVVXHV SODWIRUP IRU FLWL]HQ UHSRUWLQJ DQG
,Q WKH VDPH PDQQHU QHZ PHGLD SPF has already been doing so to
can be used to encourage active VRPH H[WHQW ,W KDV HYHQ FDXJKW
FLWL]HQU\ WKURXJK SRVLWLYH UHSRUWLQJ the notice of a law enforcement
and alerting of crimes or safety blogger who praised the SPF’s
WKUHDWVLQFLGHQWV &DPHUDHTXLSSHG Facebook fan page as an example
mobile phones make it easy for the of progressive use of social media
public to not just report an incident or for law enforcement32 %H\RQG MXVW
threat immediately, but to also record using a Facebook fan page, one
photos or videos and send them to can even create a Facebook app to
the relevant authorities YLD 006 IDFLOLWDWHUHSRUWLQJ)RUH[DPSOHWKH
ZHEVLWHV RU DSSV WR SURYLGH PRUH Greater Manchester Police created a
W
including departments in Greenland HILE NEW MEDIA is useful
,QGLDQD 6DOLQDV &DOLIRUQLD for both sudden crises
6KHOE\ 2KLR *DLQVYLOOH )ORULGD HJ FLYLO GLVDVWHUV
Chicago, Dallas, etc33 WHUURULVW DWWDFNV DQG creeping crises
Finally, dedicated neighbourhood HJ SDQGHPLFV LW LV HVSHFLDOO\
portals can also enable residents to important for the former because
interact with Home Team agencies demand for information is likely to
and to exchange information with spike tremendously in the immediate
WKHP 3RUWDOV WKDW FRYHU VSHFL¿F DIWHUPDWK People will be searching
neighbourhoods are useful because, online IRU GHWDLOV ZKRZKDWZKHUH
again using the example of Police, ZKHQKRZ DQG H[SHFW WR ¿QG
relevant Police Divisions or police updates, advisories and assurances
RI¿FHUV PDQQLQJ SRVWV RU SDWUROOLQJ IURP WKH DXWKRULWLHV %XW LQVWHDG RI
in a neighbourhood can interact visiting government websites, many
directly with the residents in that may simply do an online search and
QHLJKERXUKRRG 7KLV ZLOO HQDEOH trust the search engine to lead them to
more direct and focussed sharing of UHOHYDQW VRXUFHV 2WKHUV ZLOO WXUQ WR
LQIRUPDWLRQ DQG DOHUWV $Q RYHUVHDV VSHFL¿F SODWIRUPV WR VDWLVI\ VSHFL¿F
example is Nixle, which provides information needs; such as Wikipedia
a one-stop portal for sharing and for factual details; YouTube and
¿QGLQJ LQIRUPDWLRQ UHODWLQJ WR D Flickr for multimedia; Twitter for
VSHFL¿F FRPPXQLW\ $Q DGYDQWDJH blow-by-blow updates; and Facebook
over social media is that information and discussion forums for online
on such a portal can be more secure YLHZV+HQFHDNH\FKDOOHQJHIRUWKH
DQG LGHQWLW\FHUWL¿HGDXWKHQWLFDWHG authorities is how to leverage on these
thus providing a trusted online SODWIRUPVRQWRSRIRI¿FLDOZHEVLWHV
channel for “local, county and state With the move towards real-time
law enforcement and government media LH IURP QHZ PHGLD WR µQRZ
agencies to connect with local PHGLD¶ SHRSOH ZLOO H[SHFW WR ¿QG
residents over cell phone, email and XSWRGDWH LQIRUPDWLRQ YHU\ TXLFNO\
web and to deliver information”35 So another key challenge is for
,Q DGGLWLRQ 1L[OH LV LQWHJUDWHG the authorities to speed up internal
ZLWK 7ZLWWHU DOORZLQJ FLWL]HQV WR processes and reduce response time
W
HILE NEW MEDIA has brought ,W LV DOVR LPSRUWDQW WR align new
many opportunities, media strategies with one’s overall
it has also brought communications strategy for any
new challenges 7KHVH LQFOXGH LVVXHRUVXEMHFWPDWWHU1HZPHGLDLV
the battle for eye-balls as online MXVWDYHVVHO7KHUHLVQRVXEVWLWXWHIRU
sources continue to proliferate; JRRGFRQWHQW2QOLQHFRPPXQLFDWLRQV
the ever-rising challenge of online must also be balanced and integrated
PRQLWRULQJ DQG KRUL]RQ VFDQQLQJ ZLWKRIÀLQHFRPPXQLFDWLRQV
the need to deal with online rumours $ ¿QDO SRLQW ± don’t do it
and misinformation; the need to alone 1HZ PHGLD ZRUNV EHVW DV
authenticate one’s own information; D FRPPXQLW\ HIIRUW 7LH XS ZLWK
and the need to adapt internal IHOORZ DJHQFLHV %HWWHU VWLOO WLH XS
SURFHVVHVWRWKHUHDOWLPHQDWXUH ZLWK WKH SXEOLF )RUP SDUWQHUVKLSV
RI QHZ PHGLD )RU ODZ HQIRUFHPHQW with the private and people sectors
agencies in particular, two additional and, where appropriate, leverage on
challenges are: balancing the need the online community for crowd-
IRU ,7 VHFXULW\ DJDLQVW WKH QHHG IRU VRXUFLQJ DQG WKLUG SDUW\ DGYRFDF\
access to new media technologies and ,QYLWH WKH SXEOLF WR FRQWULEXWH
platforms; and the use of new media feedback to user-generated-content,
by criminalsDQGWHUURULVWV but also be prepared to engage them
To deal with these challenges, and RQOLQHZKHQQHFHVVDU\
to leverage on the many opportunities,
there is no easy short-cut 3XEOLF REFERENCES
sector agencies must build up their &KDQQHO1HZV$VLD )HE ³6RFLDO PHGLD
internal new media capabilities and part of life in S’pore, especially among the young:
Nielsen” KWWSZZZFKDQQHOQHZVDVLDFRPVWRULHV
experience; allocate more resources; VLQJDSRUHORFDOQHZVYLHZKWPO
)URP ,'$ “Statistics on Telecom Services .MHWLO 6DQGZLN DQG $QQH 0DULW :DDGH
for 2009 (Jul – Dec)” KWWSZZZLGDJRY “Crime Scene as Augmented Reality
VJ3XEOLFDWLRQVDVS[ 2Q 6FUHHQ 2QOLQH DQG 2IÀLQH´
KWWSZZZNULPLIRUVNDDXGNDZSDSHU
5HDG :ULWH :HE 'HF “10 Ways .6$:FULPHVFHQHDVZSGf
Social Media Will Change in 2010” http://
ZZZUHDGZULWHZHEFRPDUFKLYHVBZD\VB &11FRP 6HS “iPhone apps
VRFLDOBPHGLDBZLOOBFKDQJHBLQBSKp help track sex offenders, spot crime”
EDITOR’S NOTES
0U.RK.HZ6RRQLVWKH'HSXW\'LUHFWRUOHDGLQJWKH1HZ0HGLD8QLWDWWKH0LQLVWU\RI
,QIRUPDWLRQ &RPPXQLFDWLRQV DQG WKH $UWV 0,&$ +H ZDV DQ ,QIRUPDWLRQ 2I¿FHU ZLWK
0,&$ IRU DERXW \HDUV GXULQJ ZKLFK KH ZDV LQYROYHG LQ YDULRXV JRYHUQPHQW ZHEVLWHV
DQGRQOLQHLQLWLDWLYHV+HKDVDOVRGHOLYHUHGDZHOOUHFHLYHGOHFWXUHDWWKH0LQLVWU\RI+RPH
$IIDLUV +HDGTXDUWHUV LQ 6HSWHPEHU DW D VHPLQDU RQ 1HZ 6RFLDO 0HGLD RUJDQLVHG E\
WKH 0HGLD 6WXGLHV 8QLW RI 0+40+$ +LV FXUUHQW ZRUN LQFOXGHV QHZ PHGLD UHVHDUFK
FDSDELOLW\EXLOGLQJDQGSURYLGLQJVXSSRUWWRJRYHUQPHQWDJHQFLHV
Book Review:
Start-up Nation
the Story of Israel’s Economic Miracle
Start-Up Nation:
The Story of Israel’s Economic Miracle
%\'DQ6HQRUDQG6DXO6LQJHU
1HZ<RUN7ZHOYHSS
SUSAN SIM
Adjunct Lecturer, Home Team Academy
& Consulting Editor, Home Team Journal
S
OON AFTER THE 2006 Lebanon Buffett, the apostle of risk
War, with damage from 2,000 aversion, was not indifferent to
missile strikes still visible, ,VUDHO¶V YXOQHUDELOLWLHV ZKHQ KH
¿UVW %LOO *DWHV WKHQ :DUUHQ %XIIHWW decided to buy machine tool company
VKRZHGXSLQ,VUDHO7KHULFKHVWPDQ ,VFDU IRU 86 ELOOLRQ LQ
LQ WKH ZRUOG ZDV RQ KLV ¿UVW YLVLW WR authors Dan Senor and Paul Singer
,VUDHO WR VHH ZK\ KLV FRPSHWLWRU WHOOXV,VFDU¶VPDLQIDFWRU\DQG5 '
Google had just opened its second IDFLOLWLHVLQWKHQRUWKHUQSDUWRI,VUDHOL
UHVHDUFK IDFLOLW\ LQ ,VUDHO LQ D \HDU eight miles from the Lebanese border,
The second-richest man in the world were then, and remain, a prime
ZDVYLVLWLQJWKH¿UVWFRPSDQ\KHKDG WDUJHW IRU URFNHW ¿UH %XW PLVVLOHV
HYHUERXJKWRXWVLGHWKH8QLWHG6WDWHV do not represent catastrophic risk for
www.hta.gov.sg
ISSN: 2010-0167