Marshal The Train: Reflections from Artifact-Based Research and Systemic Insights
Moments of growth and exploration: From refining systematic approaches with Rail Euro in NYC (2013) to driving telecom efficiency with STC in Dammam (

Marshal The Train: Reflections from Artifact-Based Research and Systemic Insights

Reflections on Systemic Gaps: Insights from Ground-Level Research

What began as an investigation into the misuse of SIMs during an internet shutdown in Murshidabad unfolded into a much larger narrative of systemic vulnerabilities. The 90 days I spent conducting immersive fieldwork revealed unexpected connections between financial hotspots, IoT vulnerabilities, and governance inefficiencies connections that digital analysis alone could never uncover.

In these remote areas, financial hotspots served as lifelines for communities, enabling basic transactions like recharges and money transfers. Yet, they also became gateways to data misuse, unverified SIM operations, and unauthorized financial activities. During this journey, a seemingly routine task like examining license issuance at an RTO unearthed lapses in governance overcharging, mismatched data, and missed notifications. Every artifact I collected told a story of systemic gaps, echoing the need for introspection and reform.

The story of Marshal The Train began in 2016 during my time with Telenor, Bangladesh. It was here that I first observed how governance, infrastructure, and technology intersect and how overlooked processes can create vulnerabilities. These experiences laid the foundation for my artifact-backed methodology and telescopic approach to analyzing inefficiencies.

This post isn’t just a recount of findings; it’s a reflection on the power of fieldwork and the lessons that emerge when you step outside digital confines. It’s about the value of validating systemic gaps through lived realities and bringing those observations into a narrative that invites broader reflection.


Foundations of Informed Governance and Technical Precision

Before venturing into this fieldwork-driven journey, it was imperative to establish a dual foundation anchored in ethical governance and strengthened by technical expertise. The certifications undertaken were not merely academic pursuits but strategic steps to ensure that every observation, analysis, and insight was grounded in accountability and rigor.

Government of India Certifications:

These certifications provided a framework for governance integrity, ensuring a principled approach to identifying systemic gaps and vulnerabilities:

  1. Integrity Pledge
  2. Cyber Security Awareness Month Pledge
  3. Data Privacy Pledge

Technical Expertise from CISCO Certifications:

Advanced certifications from the CISCO Networking Academy complemented this ethical foundation, equipping me with actionable insights to address modern challenges. Key areas of focus included:

  • Cybersecurity Essentials: Practical strategies to mitigate cyber threats and ensure systemic resilience.
  • Networking Basics: A deep dive into building and maintaining secure and efficient digital infrastructures.
  • IoT Fundamentals: Understanding the vulnerabilities and potential of interconnected devices in governance and public services.

This combination of governance integrity and technical expertise not only guided the research but also ensured that every insight was validated, every gap identified, and every reflection presented with the utmost accountability.


  1. Certification and Process Timeline

Timeline Overview

  1. 2023 (April): Integrity Pledge (Government of India, Central Vigilance Commission) Ref. No.: 6427597686 Reinforced ethical commitment to governance accountability.
  2. 2023 (April): Cyber Security Awareness Month Pledge (Ministry of Home Affairs) Ref. No.: 3276466953 Focused on resilience in critical infrastructure cybersecurity.
  3. 2023 (April): Data Privacy Pledge (Data Security Council of India - DSCI) Ref. No.: 9245363587 Advocated for robust data protection mechanisms to safeguard user privacy.
  4. 2023 (Mid-Year): Advanced IoT and Networking (CISCO Networking Academy) Courses: Cybersecurity Essentials, Networking Basics, IoT Fundamentals. Strengthened the technical foundation for analyzing IoT vulnerabilities and systemic gaps.
  5. 2024: Artifact-Based Research Completion Culminated fieldwork insights with systemic observations and validations.


2. Hotspot Dependency vs. Vulnerabilities Chart

This bar chart compares hotspot dependency with vulnerabilities faced during the internet shutdown

This bar chart compares hotspot dependency with vulnerabilities faced during the internet shutdown, supported by hotspot usage records and associated financial transactions collected on-site


3. IoT Vulnerabilities Heatmap

IoT Vulnerabilities Heatmap

This heatmap visualizes IoT disruptions during the internet shutdown, focusing on their impact across critical sectors such as healthcare, financial services, telecom operations, and public services. Each phase (Before, During, After) highlights the severity of vulnerabilities, ranging from minimal (light yellow) to severe (dark red).


4. Overall Gaps Summary Chart

Overall Gaps Summary

This summary chart consolidates the severity of gaps across three critical categories:

  • Governance: Rated 3/5, highlighting moderate systemic inefficiencies.
  • IoT Vulnerabilities: Rated 4/5, indicating significant risks in interconnected systems.
  • Hotspot Dependencies: Rated 4/5, emphasizing substantial exposure to data misuse and systemic risks.

The chart provides a clear visual representation of critical areas needing immediate attention, with severity rated on a scale of 1 to 5.


5. RTO Revenue Gaps Chart

This section focuses on the financial gaps observed in RTO operations, highlighting discrepancies between expected and actual revenues. The artifact-backed findings reveal governance inefficiencies such as overcharging by intermediaries and missed challans due to incorrect phone number registrations.

RTO Revenue Gaps

This chart visualizes the discrepancies between expected and actual revenues in Murshidabad and Kolkata RTO operations, validated through artifact-backed evidence such as license fee receipts and challan records collected during fieldwork


6. Gap Analysis Venn Diagram

Gap Analysis Venn Diagram

The Venn diagram highlights systemic inefficiencies observed across governance, IoT vulnerabilities, and hotspot dependencies. Governance gaps include issues like overcharging, mismatched records, and missed challans, while IoT vulnerabilities reflect disruptions in critical infrastructure during shutdowns. Hotspot dependencies expose risks of data misuse and unauthorized SIM usage. At their intersections, the diagram reveals compounding issues such as unregulated processes impacting device security (Governance + IoT), financial losses and systemic inefficiencies (Governance + Hotspot), and increased vulnerabilities to exploitation (IoT + Hotspot). The convergence of all three categories represents the most critical systemic inefficiencies, underscoring the need for holistic solutions. This visual emphasizes how addressing one area can significantly alleviate pressures in others.


7. Gap Analysis Table

The following table summarizes the observed gaps, their impacts, and the artifact-backed evidence that validates these findings

The Gap Analysis Table provides a structured overview of systemic inefficiencies, categorizing observed gaps across governance, IoT vulnerabilities, and hotspot dependencies. It highlights their respective impacts, such as revenue loss, critical service disruptions, and data security risks, supported by artifact-backed evidence like license fee receipts, IoT service logs, and hotspot usage records. This comprehensive summary serves as a foundation for understanding the interconnected nature of these gaps and the systemic vulnerabilities they expose.


8. Combined Gaps Visual

Combined Gaps Visual

This multi-panel visual provides a holistic view of systemic inefficiencies identified through artifact-backed research. The IoT Vulnerabilities Heatmap highlights sector-specific disruptions spanning healthcare, financial services, telecom operations, and public services across three phases: before, during, and after the internet shutdown. The RTO Revenue Gaps Chart compares expected versus actual revenues in Murshidabad and Kolkata, revealing discrepancies caused by overcharging and missed notifications due to incorrect phone registrations. Lastly, the Overall Gaps Summary Chart rates the severity of governance gaps, IoT vulnerabilities, and hotspot dependencies on a scale of 1 to 5, emphasizing their interconnected nature and the urgency for systemic reform.


Illuminating the Path to Resilience

This journey represents a commitment to understanding and addressing systemic inefficiencies through artifact-backed research and immersive fieldwork. Each insight, whether uncovering governance gaps, IoT vulnerabilities, or hotspot dependencies, underscores the pressing need for resilience in the systems that underpin our daily lives.

The experience of October 2023 data loss served as a reminder of the unpredictable nature of digital dependencies. It shaped a more resilient approach to artifact collection and systemic validation, ensuring that critical insights remain intact despite disruptions. This pivotal moment emphasized the importance of foresight, robust data protection strategies, and the adaptability needed to navigate systemic challenges.

As this chapter concludes, it lays the foundation for deeper exploration and collaboration. The insights shared are an invitation for stakeholders to reflect on these gaps and engage in actionable discussions to bridge them. The journey continues with a focus on safeguarding data through meta verification, GPS-enabled analysis, and innovative backup strategies—aiming to ensure a more secure and adaptive future.

This reflection stands as a testament to the power of observation, the strength of ethical foundations, and the importance of informed governance. By embracing resilience, we can illuminate a path toward systems that are not only secure but also capable of adapting to the complexities of our ever-evolving world.


Resilient Data Management: A Defining Moment

The events of October 14, 2023, were a litmus test for the years of effort invested in disciplined data management. Leveraging a carefully constructed backup strategy spanning nearly a decade, I successfully recovered 97% of critical data. This achievement underscores the significance of multi-layered storage, cloud integration, and proactive planning. It stands as a reminder that thoughtful preparation can transform challenges into milestones, ensuring vital insights remain actionable.

Resilient Backup Plan Workflow: 2015 - 2024

Forging Ahead: Innovating Resilience

Looking to the future, my focus remains on enhancing data security and resilience through:

  • Meta Verification and GPS-Enhanced Analysis: Employing advanced tools to validate artifacts with precision, ensuring systemic insights are grounded in verifiable data.
  • AI-Powered Backup Systems: Harnessing artificial intelligence to predict potential disruptions, automate recovery, and move closer to achieving 100% resilience.
  • Advocacy for Data Integrity: Inspiring individuals and organizations to prioritize disciplined data practices and embrace strategies that safeguard valuable information.


Joy Bhattacharjee Former Microsoft | Research Analyst | Cybersecurity Advocate ?? Certified in Cybersecurity, Digital Forensics, Ethical Hacking, Data Analytics, IoT, and AI

?? Govt. of India Integrity Pledge Holder (Ref. No.: 6427597686) | Ministry of Tourism Honoree (2024) ?? Cybersecurity Advocate (2024) | Data Privacy Ambassador (2024)

?? Vision: Safer India, Smarter Intelligence, Stronger Governance


要查看或添加评论,请登录

J Bhattacharjee (Joy)的更多文章

社区洞察

其他会员也浏览了