Close
Social profiles

Unlike conventional warfare of last centuries, the future lies in exploitation of digital devices to colonise as many possible! We need global reform for global problems, and it must start with the network spies, says whistle-blower Snowden. Recently European ruling striking down the transatlantic Safe Harbor deal is a stark reminder that no one’s data is safe until governments around the world reform digital surveillance practices for mere benefit of a bunch of cronies in command to colonize. Any real movement will require meaningful political reform to curb the digital eavesdropping practices at NSA in US as well as at spy agencies across Europe and so-called developing BRICS abusing innocent citizens data to fund its re-elections, 24/7/365.

What the Hack, some governments and its #ChorBhaktAgents also get it in return! In February 2014, a bunch of young cyber security researchers, slouched at their work stations in a decrepit highrise in central Delhi, were tapping away in the dead of the winter night. Their computer screens were aglow, the digits were dancing and the smell of warm pizza was in the air. Suddenly, one of the young men let out a loud war whoop, says an eyewitness. The hacker had cracked open the WiFi router at B-28, South Block, the office of the chief of naval staff on Raisina Hill, near Parliament and Rashtrapati Bhavan. And, worse, also found that somebody a continent or two away was also looking at what he was.

In the Dilton Doiley world of computer geeks, it was a breakthrough moment, no question. For over three weeks, the researchers had slogged 15 hours a day to break into the internet protocol (IP) addresses of the bold-faced names of Lutyens Delhi, to show how vulnerable their WiFi routers were and every computer connected to them. At the end of Operation Sarkar as they informally called it, the hackers had managed to test-scan penetrate over three lakh routers in the heart of the capital and expose India’s best-kept secret: that 95% of them, in such critical departments as defence, finance, space and communications, were leaking and being exploited by rogue entities based in China, Ukraine, Malaysia and elsewhere.

The router of the Defence Research and Development Organisation (DRDO) in Timarpur: unsafe. The router of the commanding officer at Coast Guard in Purana Qila: unsafe. The router of the National Thermal Power Corporation in scope complex on Lodhi Road: unsafe. And so it went on, as the researchers did high-five after high-five as router after router of banks, income-tax authorities, election officers, police, the narcotics bureau, phone service providers, public works departments succumbed to the overtures of their keystrokes. Why, even the router of the air force station on Race Course Road, bang opposite the PM residence: unsafe.

The message was simple: nobody and nothing was safe in the new, wall-less cyber age. The most vital institutions in the national capital were unknowingly sending information to rogue servers on foreign soil. And this was being done not by the old-fashioned way of hacking into individual computers through malware and spyware but by plugging into the WiFi routers to which other computers are plugged in, and then redirecting users to malicious websites or stealing data. So, that February night when the young man broke into the naval chief router bearing the internet protocol (IP) address, he was not only getting into the chief computer but those of others who were simultaneously connected to the internet through it.

In other words, pretty much the cream of the Indian establishment was being hacked wholesale, not retail. For the record, Union home ministry officials downplay the data leak. Most of these computers have no secret content. Sensitive information is stored in standalone or air-gapped computers, and most ministries do not have more than one or two such machines. Intelligence agencies at the level of joint director and above are the other ones who have these standalone machines, says one official. But he admits that even standalone computers are not safe, which is why pen drives were banned a year ago at the home ministry. Even that is no consolation. In July, experts at the University of Negev in Israel wirelessly extracted data through electromagnetic waves using a simple smartphone with an FM radio receiver.

B.J. Srinath, director-general of India cyber security watchdog, CERT-In, says that the leakage of data due to the vulnerability of the routers in Delhi is speculation. If a router is compromised, it starts generating abnormally more traffic. That happens because the command and control is with someone else outside. They turn the computer into a slave computer and use it at will for data leakage if the computer has sensitive information. We are not seeing any Denial of Service attacks from non-sensitive computers.

Maybe, but industry experts say the danger is clear and present. Says Pavan Duggal, cyber expert and advisor to the Indian Infosec Consortium, Cyber security breaches are becoming routine in our country and the appropriate sensitivity is strongly missing. In fact, it is not even given the importance it merits. And this when both state and non-state actors are interested in data from India. Are you sure each of your digital act is not spied by Windows, iPhone, Android, Nokia, Google, Facebook, Twitter, NSA, RAW, ISI, CBI, Apps …..? This is NOT cost of access to best and easy technology, just signs of our gradual surrender to crooks panning smarter ways to loot using personal info, at best. Source: Outlook

Digital devices as colonizing tools smartly used to rebuild right wing empires!

2 thoughts on “Pervasive government surveillance – digital devices as colonising tools!”

  1. Zombie surveillance systems like #SyRI #CIBIL #UiPath are not exactly for welfare, in fact they’re anti-welfare profiting few big corporations, AI for Governance violates justice, human rights, privacy, a Dutch court rules ⚖️ https://t.co/xHEDksp4yt

  2. This pandemic also giving a golden lockdown for Profiteering “App ka Jaap” Governments + Privacy Trading Criminal’s Zombie Corporatism! Data abusing Mobile Apps are becoming the Vedic 2.0 “चमत्कारिक मंत्र” to hypnotize masses about absence or presence of anything and everything!

Leave a Reply

Your email address will not be published. Required fields are marked *

Close