Somewhere there’s an Indian IIT graduate watching a Bollywood movie, and he’s leaning into the next seat to whisper into the fiancee’s shell-like ear, and he’s like: “Baby: I’ve gone to work for the ‘National Technical Research Organization.’ And, from now on, I can’t tell you any more than that.” And she’s, like, squeezing his hand, all proud of him.
The act of creating such an “army” is not the subject of the ridicule, or at least should not be. Calling it such should be, but what bears the brunt of Sterling’s jokes is the sensation-styled reporting of the journalist involved. It is a pity that there is still a lack of good quality reporting that goes beyond parroting of (un)official statements and fifth-standard level reconstruction of simple sentences into compound ones, without an iota of analysis in them.
(I realise this is an old article but in my defense, I had disappeared in that month from Vyūha. Slowly getting back into the groove, you know!)]]>
A meeting was taken here today by the Union Home Secretary Shri G.K.Pillai with representatives of Central Security Agencies and Telecom Department. The meeting asked the Telecom Department to convey to service providers that two Blackberry services namely, Blackberry Enterprise Service(BES) and Blackberry Messenger Service(BMS) be made accessible to Law Enforcement Agencies by 31st August, 2010. If a technical solution is not provided by 31st August, 2010, the Government will review the position and take steps to block these two services from the network. The meeting also took note of the fact that the Blackberry services like Voice, SMS and BIS have been made available to Law Enforcement Agencies.
That is a pretty short deadline and unless RIM has been receiving behind the scene, but official, detailed information about this impending move, it would leave them stranded for a solution. Note that most previous developments on this issue has been via “leaked” notes and memos from the ministry and never really an official announcement.]]>
The government formed a high-level taskforce in February to devise a plan for building indigenous software, said a senior intelligence official who is a member. The panel will also suggest ways to conduct third-party audits on existing software in government offices to prevent online sabotage attempts until the software’s launch, he said.
While the details are sketchy and confusing, starting from the fact that there is more reference to “software” than operating system, it looks like the plan is to build an indigenous OS that can be used by government officials, starting from an open source OS out there. No further details are available on whether it will be BSD or Linux based.
This is a very encouraging step in the right direction though not without potential pitfalls.
For an OS to be secure and useful it has to get to a maturity level that is hard to reach. It remains to be seen how many of the government offices would find their way around a Linux distribution, even if it is as intuitive as Ubuntu or others out there.
Starting from an existing OS, while a practical thing to do, is risky in that either the current state of the OS has to be assumed to be secure or a careful meticulous audit has to be carried out to ascertain the security of the code. Given that so many vulnerabilities are being found in Open Source kernels and software, it would be prudent not to assume that they are secure just because they are open source. Of course being open source means that one has at least the option of performing the necessary code analysis.
Another downside of using an open source distribution is that of maintenance and support. Unless a government agency takes it upon itself to maintain the distribution and provide end user support, the move is going to hit a brick wall soon. This point should not be underestimated. A secure OS or a distribution that is not well maintained is just as insecure as any other out there. In addition, given that this OS is meant to be used by a wider non-technical user base that is the government offices, support service will turn out to be very important in the long run. Try explaining SELinux or how to configure it to a layman!
Operating system, though critical, is still only one of the pieces that makes the distribution. The software used within the OS is also critical. Is it not clear if this initiative is aimed at securing general purpose software too.
As the article mentions, regular audits have to be conducted in order to ascertain the security of the infrastructure. Though the content of the article casts a shadow at the anti-virus vendors, it is more likely that the users did not keep the virus signatures up to date than that the vendors had any malicious intent. Of course regular audits will only highlight the problem. The actual task of solving the problem (patching the OS, updating the signatures etc.) still needs to be carried out without delay.
At the end of the day the weakest link is almost always between the keyboard and the chair. Any initiative to secure the software infrastructure has to be accompanied with educating the users of best security practices and do-nots of computer security.]]>