Reset Password

New user? Register here

Law enforcement Technology,Law enforcement Agency,Policing Technology,Smart Policing India,Homeland Security India,Border Security India,Border Management India,Cyber Crime news,Cyber Security news,Safety App,Public Safety App,Security App,Women Safety App,Police Initiative,Surveillance news,National Security news,isc event 2016,isc event 2017,scada event 2016,scada event 2017,Critical infrastructure security event 2016,Critical infrastructure security event 2017,iot summit 2016,iot summit 2017,Internet of things seminar 2016,Internet of things seminar 2017,iot seminar delhi 2016,iot seminar delhi 2017,iot conference delhi 2016,iot conference delhi 2017,top security event,security event,security event 2016,security event 2017,security conference 2016,security conference 2017,cso summit 2016,cso summit 2017,Corporate security event,Corporate security conference,security research india,homeland security research india,security think tank india

Law enforcement Technology,Law enforcement Agency,Policing Technology,Smart Policing India,Homeland Security India,Border Security India,Border Management India,Cyber Crime news,Cyber Security news,Safety App,Public Safety App,Security App,Women Safety App,Police Initiative,Surveillance news,National Security news,isc event 2016,isc event 2017,scada event 2016,scada event 2017,Critical infrastructure security event 2016,Critical infrastructure security event 2017,iot summit 2016,iot summit 2017,Internet of things seminar 2016,Internet of things seminar 2017,iot seminar delhi 2016,iot seminar delhi 2017,iot conference delhi 2016,iot conference delhi 2017,top security event,security event,security event 2016,security event 2017,security conference 2016,security conference 2017,cso summit 2016,cso summit 2017,Corporate security event,Corporate security conference,security research india,homeland security research india,security think tank india


50 per cent victims of cybercrime struggle to recover their money: Kaspersky Labs

PUNE: New research from cyber security firm Kaspersky Labs reveals that over half the victims of financial cyber crime struggle to recover the lost money.

The study showed that 52 per cent of internet users who have lost their money to cyber criminals have got only some, or none, of their stolen funds back.

On average, Internet users lose $476 per attack and one-in-ten people surveyed said they lost more than $5,000.

With the variety and sophistication of online financial threats against consumers growing, losses from online fraud, identity theft and hacking are now running at billions a year.

Further, with many cases going unreported, the actual economic cost is likely to be significantly higher.

“Cyber criminals are continually looking for new ways to exploit and defraud consumers and that’s why it’s important for Internet users to be on their guard at all times,” said Vyacheslav Zakorzhevsky, Head of the Anti-Malware Research Team at Kaspersky Lab.

“Cybercriminals can conduct financial crimes via malware, phishing and more. Don’t assume you will always get all your money back if you become a target and funds are stolen from you. The best way to safeguard your finances online is to make sure you don’t become a victim, and for that we recommend specialist software that protects your identity and keeps sensitive data out of the hands of the cybercriminals.”

A large majority (81 per cent) of Internet users say they conduct financial operations online and just under half (44 per cent) store financial data on their connected devices.

As more users go online to manage their finances, more cyber criminals are looking for opportunities to cash in, making it important for users to have robust Internet security in place to protect themselves and their money. However, only 60 per cent of Internet users protect all their devices.

Attitudes to online safety could be influenced by users mistakenly thinking lost money will be automatically refunded to them.

Almost half (45 per cent) say that they assume they will be reimbursed by banks for financial cybercrime without any problems, but as the survey shows, over half (52 per cent) of people affected haven’t had all their stolen money returned.

Are we prepared for likely cyber attacks?

The Government has been focused on economic growth, as reflected in the various initiatives it has announced. The demonetisation move led to a massive reduction in the availability of physical currency. This shortage of cash forced people to migrate to online transactions even for their smallest needs or purchases.

However, this sudden uptake of online transactions has exposed the existing security gaps in the system which make organisations as well as customers vulnerable to cyber attacks at this critical time.

Highly exploitable
The existing security gaps are ready ground for cyber-criminals to exploit. There are various ways of doing this — by introducing a malicious bug into the system that can skim through privileged information, by introducing rogue applications to lure customers into downloading them, by intensifying hacking attempts and phishing attacks, and so on.

Given the masses who are innocent of the world of technology, it is a field day for cyber criminals. In short, an attack seems imminent. In the absence of a proper understanding of the security infrastructure and the right policies and assets to protect businesses, organisations are at a risk. India’s premier security agency, CERT, has already cautioned bankers and customers to adopt high-end security encryption.

Consider this: According to research on strategic national measures to combat cybercrime, mobile frauds are expected to grow by to about 65 per cent in India by 2017; about 46 per cent complaints of online banking are related to credit or debit card fraud. It should be a matter of grave concern not just for the Government but also for banks and end consumers.

Often, security is seen as just another layer to transact hassle-free but it is imperative that security becomes embedded by design rather than as a bolted add-on for payment gateways. The data security infrastructure along with customer-redress mechanisms will have to be well thought of and the purview of IT laws for cybercrimes will have to be expanded to include mobile-wallet payment systems. E-wallet firms will need to invest in the latest technologies to safeguard their gateways against cyber attacks which are quite sophisticated and advanced.

While we gear up to tackle the upcoming security issues in the country, it is imperative that organisations develop a comprehensive “business-driven” security model that fully integrates with the security requirements keeping in mind the overall business goals and objectives of the company. Such a model will help organisations chose their security investments to create the best possible balance between customers’ ease of use and cyber security

Policies and laws
Another area of concern for the Government should be to implement the right policies and cyber laws that make online transactions a safer choice for customers. We already have strong cyber security guidelines in place but they are not followed stringently, leading to a ‘gap of grief’. The Government is mulling over the almost 15-year-old Information Technology (IT) Act to further strengthen cyber security infrastructure, following demonetisation. The Reserve Bank of India has also recently sent out a cyber security framework to be followed by banks, covering best practices. To help the Government achieve its goal of Digital India, the RBI has ordered all prepaid payment instrument (PPI) issuers, which includes all RBI-authorised banks and NBFCs, to get a special audit done of their systems by auditors of CERT-In on priority and comply with the audit report recommendations immediately.

CISOs (chief information security officers) along with the board of directors now need to take tough decisions to address the business impact of a cyber-attack. Cyber security is no more an IT problem, it is a business problem and needs to be tackled accordingly. The uptake in devices, various operating systems and the constant need for the devices to communicate with one another without the need for a gateway introduces unique challenges in the cyber security space making it complex to log every aspect of communication/transaction.

It is evident that the threat landscape is evolving continuously and the complex layers make cyber security a challenge. The Government’s push for stronger cyber security infrastructure is a welcome move, although we still have a long way to go. The illusion of protection from cyber attacks is a thing of past, no one is secure. How we minimise the impact with continuous monitoring, early detection and quick response is the key in the world of digital economy. An attack is imminent. It is now up to the organisations to prioritise their cyber security needs and act on it.

The writer is Managing Director — India and Saarc, RSA

Bengaluru Police to get stronger cyber crime unit

For a city bearing the lofty monikers of IT capital and startup hub, Bengaluru's cybercrime-fighting abilities are rudimentary.

The police is finally stepping up its act, beginning with a larger, dedicated unit fully equipped to investigate all kinds of cybercrimes.

About 40 policemen deployed to this new cell will be trained to deal with complex technology-related crimes. Functioning under the city police's Central Crime Branch (CCB), it will start registering cases next month.

“We will provide them all facilities, including special equipment and specialists to deal with IT related cases," city police commissioner Praveen Sood said. “If the staff wants more help, they can approach the CID police but we want the city police to be expert in handling all types of IT-related frauds."

That would be a significant stepup from the present capabilities.

The existing cybercrime cell was established within the city police commissioner's office on October 2015 but is monitored by the Criminal Investigation Department. It is staffed by two inspectors deployed from the CID and one sub-inspector and three constables from the city police wing.

Its remit is restricted to registering complaints of credit and debit card misuse if the fraud amount exceeds Rs. 5 lakh and cases of fraudulent money transfers if the amount exceeds Rs. 50 lakh.

“IT crime is very specialised. Most of the police officers do not have knowledge about it. They require analytical prowess, training and equipment to solve cybercrime cases," Sood said.

So “we requested the state government to set up a separate cybercrime police station under the Central Crime Branch to deal with all types of IT-related crimes."

In the 15 months since it was estab lished, the present cybercrime police station has registered 65 cases--20 in 2015 and the balance 45 last year--most of these related to debit and credit card fraud and derogatory statements on social media.

The CID headquarters, on the other hand, registered 80 cybercrime cases last year. “Since the manpower is very less in the existing police station, we could not handle all kinds of cases," said Krishnappa, an inspector in the present cybercrime police station.

Technology part of New Orleans anti-crime, anti-terror plan

NEW ORLEANS (AP) - Authorities have unveiled an extensive, $40 million program to fight crime and terrorism in New Orleans, including high-tech gadgetry and a new closed-door nightclub policy aimed at dialing down the intensity of wee-hours partying in the famously boozy city.
Announcing the plan Monday, Mayor Mitch Landrieu, Gov. John Bel Edwards and others stressed that it is intended to benefit not just tourists but everyone in the city that saw a spike in its murder rate last year.
The program includes plans for round-the-clock monitoring of cameras in 20 high crime hot spots around New Orleans and marked take-home cars for police officers, giving them a new visibility in various neighborhoods.
But it’s the changes along the popular stretch of bars, restaurants and strip joints on Bourbon Street in the city’s historic French Quarter that will be most noticeable, and, perhaps, most complicated.
Plans include an effort to turn Bourbon into a pedestrian-only thoroughfare, once traffic patterns, arrangements for delivery trucks and other details can be worked out. Bars - in the Quarter and elsewhere - will be told to shut their doors after 3 a.m., Landrieu said.
It’s not a shutdown of business, nor is it a curfew, he stressed. Patrons will be allowed to go in and out but it’s hoped that by shutting doors, on-street activity in the pre-dawn hours will diminish.

In addition to new city cameras, 20 of which will be monitored in real time at a planned central command center, feeds from private cameras will be used. Bars will be required to have security cameras.
“When you go on Bourbon Street now, everything you do will be seen,” Landrieu said, smiling. “Do I need to let that sink in?”
Months in the making, the plan follows a mass Thanksgiving weekend shooting that left one dead and nine injured on Bourbon. New high-tech equipment to be used in the anti-crime effort will include devices that can help detect concealed weapons and license plate readers.
The plans were announced as the city prepares for Mardi Gras and this year’s NBA All-Star game.
State police Superintendent Mike Edmonson said 173 extra uniformed troopers will be on hand for the game; more than 160 for Mardi Gras. Jeffrey Sallet, the agent in charge of the New Orleans FBI office, said no specific threats have been detected for either event while stressing the readiness of state and federal authorities.
Officials said much of the money for the program will come from the state’s Morial Convention Center, a major driver of tourist business in the city.

Houston Police Choose Surveillance Over Presence at Super Bowl

Officials at the 2017 Super Bowl in Houston plan to avoid making the same mistake that 2016 Super Bowl officials did by minimizing police presence and increasing surveillance.

In 2016, San Francisco police at Levi’s Stadium donned military and tactical gear with advanced weapons. This backfired when many attendees took selfies with the heavily armed law enforcement officers, which ultimately distracted them from watching over the crowds. The police had to tell tourists to stop taking photos with the officers.

The Department of Homeland Security (DHS) classifies the Super Bowl as a Special Event Assignment Rating (SEAR) 1 because of the number of attendees and media coverage, which makes it vulnerable to a terrorist attack. Local law enforcement is working with the FBI and DHS to secure the stadium this year.

About 1 million people are expected to flock to Houston for 10 days of Super Bowl-related activities and more than 100 million people are expected to watch the Feb. 5 game on television. Officials have been working for more than a year to perfect a surveillance-based approach, more sophisticated than in past years, that includes surveillance cameras, overhead helicopters, and Houston police, who will mostly be in their standard blue uniforms.

In the past, law enforcement and data analysis companies have surveyed large crowds at events by using cameras to pan the crowd, identify faces of individuals, find them on social media, and scan for code words like “help” or “bomb” in order to find possible threats to the venue.

A Houston-based network infrastructure company, Pexx, announced recently that it provided multiple video surveillance packages to the Houston Police Department in order to secure the Super Bowl. The package was specifically designed for the event and installed by Pexx employees.

“These custom packages are mounted in special weathertight boxes to facilitate rapid relocation and installation at special events such as the Super Bowl and can be easily broken down and moved to other locations as required,” said Jennifer Greene, president of Pexx.

The surveillance equipment is capable of capturing high-quality, remotely controlled video and allows the user to upgrade the system to include additional alarms and sensors. The cameras can be viewed from any location on a worldwide network, according to Greene.

Similar technology was used in 2013: After the Boston Marathon bombing, the city of Boston partnered with IBM to test an event monitoring program, similar to what Houston officials could use during the Super Bowl.

IBM used its Smart Surveillance System and Intelligent Video Analytics software at the Boston Calling music festival to provide a live video stream of the crowd during the event. The surveillance application could identify specific people in the crowd based on skin color, clothing texture, baldness, or glasses. The Boston Police said it was not involved in this surveillance program. IBM said that facial recognition software was not used at the music festival although “disclosures suggested [its] application.”

Margaret Hu is an associate professor of law at the Washington and Lee University School of Law who has studied the surveillance techniques used by IBM at Boston Calling.

“Situational awareness programs like the one used at the Boston Calling concerts demonstrate that the technological capabilities for using biometric capture and recognition software in real time are expanding significantly. These programs are highly experimental and the efficacy and accuracy of such systems is still unknown,” wrote Hu, in a chapter titled “Biometric Surveillance and Big Data,” in The Cambridge Handbook on Surveillance Law, which is due to be published this year by the Cambridge University Press.

This type of data collection that uses an identity anchor, such as a person’s face, can go even further in finding data on individuals by linking them to Internet activities, consumer habits, phone records, and DMV records. This type of biometric identity measure is only as reliable as the people conducting the searches and making decisions based on the data they find.

“Biometric data is evolving into a data surveillance axis by tethering a person’s physical identity to algorithmic-driven biographical and behavioral data analysis that can be deployed to assess future risk and to isolate data deemed suspicious,” wrote Hu.

CoA flags inadequate rules on disaster risk assessment

MANILA — The Commission on Audit has flagged the lack of adequate guidelines in government agencies’ coordination, monitoring and updating of the country’s disaster risk assessment systems.
The CoA recently issued its 33-page performance audit report on the Geo-Hazard Mapping and Assessment Program, which stressed the need to “adopt clear-cut policy guidelines or procedure” in updating the geo-hazard maps that provide information on areas at risk during disasters.
Although it noted the Mines and Geosciences Bureau had undertaken the updating of hazard maps in 2015, the audit report still cautioned that the lack of guidelines would result in a lack of consistency.

Even as the maps of three mapping agencies—MGB, as well as National Mapping and Resource Information Authority and the Department of Science and Technology—have been serving different purposes, the CoA said guidelines should be laid out to ensure accuracy.
No guidelines on coordination
The CoA also reported that the National Disaster Risk Reduction Management Council (NDRRMC) and the Department of Science and Technology (DoST) have not issued adequate guidelines on inter-agency coordination.
This meant that the implementation of the National Disaster Risk Reduction and Management Plan (NDRRMP) has not been well-coordinated and the accountability of the agencies has not been well-defined.
“Hence, the country’s DRRM is wanting of clear policy guidelines for a well-coordinated disaster prevention and mitigation efforts,” the report read.
The report said that despite their vital roles, the DoST and the Office of Civil Defense have not reviewed and monitored the Mines and Geosciences Bureau’s planning of the updates on the Geo-Hazard Mapping and Assessment Project (GhMAP).
DoST and OCD serve vital functions as vice-chairperson for disaster prevention and mitigation and lead agency for enhanced community-based monitoring, respectively.
But, the CoA said they have only supervised the projects they implement, and have not coordinated and reviewed the updating of the GhMAP.
No budget for monitoring
The CoA also observed that the OCD had inadequately monitored the program, which meant there was no assurance that the effectiveness of the program had been consistently evaluated.
The OCD is responsible for ensuring the implementation of the NDRRMP, and the integration of local governments’ DRRM plans in their development and land use plans.
But, the CoA found that the OCD was unable to validate the agencies’ accomplishment reports because, from 2013 to 2015, Congress did not at all provide it with the capital outlay to purchase the necessary equipment. OCD also turned out to be understaffed, as only 59 percent of its 644 positions were filled up.
Still, the CoA found that generally, local government units were able to utilize the geo-hazard maps in formulating their local disaster preparedness and comprehensive land use plans.
It cited a survey of 79 local government units in Central Luzon, Calabarzon, and Western Visayas. Seventy-six of them (96 percent) have taken the maps into account for their planning activities, although only 45 of the LGUs (60 percent) used the latest maps provided by MGB.
Even then, the disaster risk assessment helped “contribute to the reduction of vulnerabilities and exposure of communities in case of disasters,” the report noted.
It highlighted Antipolo City, site of the deadly Cherry Hills Subdivision landslide in 1999, as well as Pasig City as examples of cities that have integrated the disaster preparedness plans into their zoning ordinances. Marikina City, meanwhile, was cited for initiating a “systemic evacuation program or camp management system.”
At the time of the audit of the geo-hazard program, no government-wide or sectoral audit of disaster management had been conducted.
The CoA only recently released its first-ever audit on government agencies and units’ use of disaster risk reduction and management funds, finding that local governments and the Department of National Defense have failed to comply with pertinent rules. SFM/rga

IoT in Logistics is crucial to Digital India

Leading tech firm Novire Technologies, a company of Indian origin had initiated the Make-in-India vision in the year 2007 and was rejuvenated & excited with the PM Modi's vision of 'Make in India' initiative. The company has adopted the PM’s vision as an integral part of its policies and is all set to give a boost to the logistic sector in India, with its intelligent end-to-end solutions. The company has embarked upon the journey and is catering to 200 + customers, which are accruing significant benefits like reduction in cost by 5 -10 %, increase in on-time deliveries by 20%, increase in asset utilization, improvement in customer satisfaction level by deploying smart IT solutions in the logistic sector.

Few leading Indian companies, including Hindustan Coca-Cola Beverages Pvt. Ltd., Ultratech Cement, Jindal Steel & Power, Varuna, Essel Mining (Aditya Birla Group), Flipkart, HDFC Ergo, Jindal Saw, JSW Steel Ltd, Lupin, Reliance Industries Ltd., Philip India, Vadilal Industries Ltd, VRL Logistics, Parag Milk Foods, Box 8, Bharathi Cement, Asian Paints, Writer Corporation, Akzo Nobel, have adopted smart IT solutions in the logistic sector.

Stressing on how emerging technologies like mobile, cloud computing, Big Data and IoT are transforming logistics and supply chain services worldwide and how a strong logistics sector is a pre-requisite for the success of the Indian Government’s Make-in-India initiative and technology adoption in the sector is at the core for bringing transformation in logistics, Hiten Varia, Chairman, Novire Technologies said “Manufacturing companies are moving into “Smart factory” models (industry 4.0), which leads to manufacturing and warehouse units that rely more and more on the work done by machines. These machines plug into IoT networks to communicate with each other, and in the process allow us to access all aspects of the manufacturing/logistics chains.”

Logistics 4.0 is the new paradigm of human-machine interaction in logistics that is being implemented by manufacturers to support their industry 4.0 trends. He further added that logistics services will need to be able to communicate with the increasing number of automated processes at factories and warehouses to provide an ever increasing seamlessness in the transition of the product/service from the manufactures silos to the customers’ doorstep.

Technology fuelling business innovation
Some of the early adopters of Logistics 4.0, have relooked at their end to end processes and also adopted Novire-Auto plant’s end to end to plug the gaps in logistics and supply chain. V.V. Benugopal - CEO Panther Transfreight Limited (part of JSPL Group) and Ittaya Sirivasukarn – CEO OF INSEE Digital Company Ltd (Part of Siam City Cement Group, Thailand) had partnered with Novire-Autoplant to implement their E2E Solution. Companies like Akzo Nobel have eliminated bottlenecks and optimized processes by implementing mobile technology in supply chain.
NewsletterA A

Cyber criminals team up to attack their targets efficiently

NEW DELHI: From being individual attackers, cybercriminals are now running their operations as an organised business, pointing to the rise in efficiency of the criminal activities they carry out, CEO of Finnish cybersecurity company F-Secure, Samu Konttinen, said.

“Ransomware is by far one of the biggest problems. It is in a league of its own – nothing comes close – and unfortunately, these haunt consumers and businesses both,” Konttinen said in an exclusive chat withET.

He said ransomware operators work by encrypting or scrambling data of a business or an individual user to make it unintelligible to even its owner.

Imagine having all your files on your computer, but not being able to see any of their contents until you pay a sum to the cyber attacker, he explained. For paying the ransom, say via bitcoins, the cyber attackers guide the target through the process. “It’s almost like an honest criminal. It is important to them that people (targets) have faith. The attackers must deliver the decryption key to their targets after payment and are very careful about their reputation… because the fact is, if the word gets out, if the targets pay and still don’t get their files back, nobody will pay,” he added.

F-Secure has been focusing on the small and medium enterprise (SME) market in India – it’s fastest growing market in the Apac region. The company sees a big opportunity in the digitalisation of government and businesses in the country.

India is also trying to push biometric authentication — primarily fingerprints and iris scans — for Aadhaar-based transactions. Talking about the use of biometrics and associated devices, Konttinen said fingerprints are not fool-proof.

“The problem is for any of the fingerprint readers, they don’t understand if the holder of the fingerprint is alive. I can cut off your thumb and it most probably will open your phone,” he said.

Also, using a single fingerprint scanner for multiple scans – such as at a door or for office attendance – can it wear out. The issue of the scanner not being able to read fingerprints because of dirt or grease on fingers is another problem. A recent technology, which uses infra-red to read blood veins in the palm, is a better technology, Konttinen said. “They are as unique as a fingerprint. You only need to hold your hand above the reader.

A chopped off hand will not work,” he said. He also spoke about the lack of disclosure norms and adequate punishment for cyber breaches in India. A new regulation that will come into force from 2018 in the EU mandates tough penalties.

According to the regulation, if a company fails to notify the EU government of a data breach within 72 hours of learning about it, the non-compliant company can face fines of up to 4% of annual global turnover or 20 million euros, whichever is greater. “What has also happened very, very often is that at the end, the CEO gets fired (in case of big cyber breaches). So they are gradually beginning to understand that if you don’t take care of the cybersecurity of your company, it is your job that is on the line,” Konttinen added.
NewsletterA A

Sindh Police gets latest 4G Phone Locator technology to trace calls

The Sindh Police’s Counter Terrorism Department (CTD) has obtained a latest 4G phone locator system.

The multi-million rupee 4G phone tracking technology is exclusive to use by intelligence agencies. Sindh Police has finally acquired it and handed it over to CTD to put it at disposal of the police department.

The caller locator will allow police investigators to pinpoint the exact location from where a mobile phone call is being made. This will be particularly helpful in cases of terrorism, kidnapping, extortion, ransom etc. A police source said,

“In fact, the Sindh police have acquired two 4G mobile phone call locators, which have been handed over to the CTD for use in the entire province….The CTD SSP has been appointed the focal person for the entire department who could be approached by any unit of the Karachi police with a request for the use of the system.

CTD officials have undergone training in the use of the equipment. Whenever they receive a request from any unit or section of the law-enforcement agency, they move with the equipment to the required location to offer the service.

The sets acquired by the police have been locally designed and developed. They have been effectively used for tracing criminals and kidnappers in the interior of Sindh where several groups were busted using the technology,”

The police have been using the technology for more than two years but this is more up-to-date to trace smartphone communications. The previous phone locators used by Sindh Police Department were capable of meeting requirements of 2G and 3G only. The modern equipment will enhance investigation capabilities.

Powerful storms kill 16 in southeast US

WASHINGTON: At least 16 people have been killed after powerful weekend storms tore through the southeastern United States, authorities said.
A rural part of south-central Georgia was hardest hit, leaving at least twelve people dead, according to the state's Emergency Management and Homeland Security Agency (GEMA/HS).
Four others died and 20 were injured on Saturday morning by a tornado that swept through southern Mississippi, according to that state's emergency services agency.
In Georgia, eight of those killed died in southern Cook County, seven of them at a trailer park, Cook County coroner Tim Purvis told the Atlanta Journal-Constitution.
Elsewhere in the state four people died, with three confirmed injuries, according to GEMA/HS.

The National Oceanic and Atmospheric Administration reported extensive damage in some parts of Georgia, with numerous felled trees and downed power lines in several counties.
Although storms have passed, authorities warned that a second line of severe weather is advancing, with the threat of more heavy rain and powerful winds.

The National Weather Service warned of an "increased threat of strong, long-track tornadoes," that could hit northern and central Georgia yesterday evening.
Some areas have already received four inches (10 centimeters) of rain and could get up to three additional inches, the NWS said.

Prev Next


Sign Up for Monthly Newsletter

Recent Tweets


Crux Center for Security
Research and Events (CCSRE)
316-317, Bestech Chambers,
Sushant Lok – 1, Gurgaon,
Haryana, 122002

0124- 4207903, 05, 06