Warning: A non-numeric value encountered in /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/twitter-mentions-as-comments/includes/boilerplate/class.plugin-boilerplate.php on line 50

Warning: Cannot modify header information - headers already sent by (output started at /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/twitter-mentions-as-comments/includes/boilerplate/class.plugin-boilerplate.php:50) in /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/wp-super-cache/wp-cache-phase2.php on line 1152

Warning: Cannot modify header information - headers already sent by (output started at /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-content/plugins/twitter-mentions-as-comments/includes/boilerplate/class.plugin-boilerplate.php:50) in /nfs/c03/h01/mnt/56080/domains/vyuha.nationalinterest.in/html/wp-includes/feed-rss2.php on line 8
Vyūha https://vyuha.nationalinterest.in Mapping the digital battlelines Thu, 30 May 2013 08:20:11 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.17 The “mirror” effecthttps://vyuha.nationalinterest.in/the-mirror-effect/ https://vyuha.nationalinterest.in/the-mirror-effect/#comments Thu, 30 May 2013 08:20:11 +0000 http://vyuha.nationalinterest.in/?p=618 Similar posts:
  1. Official Indian word on Stuxnet’s effect
  2. Takshashila responds to GoI’s discussion draft on National Cyber Security Policy
  3. NSCS’ cyber security policy
  4. Book review – “Cyberpower and National Security”
  5. “The case for an India-US partnership in cyber security” – Takshashila Institution discussion document
The National Security Council Secretariat of GoI seems to be claiming that the Executive Order issued by the US President on February 12 titled “Improving Critical Infrastructure Cybersecurity

in many respects mirrors the initiatives taken by India in it’s document on framework of cyber security.

A document issued by security brass of the country, which was reviewed by ET, cites at least 12 instances where the US order mirrors India’s cyber security framework that was drafted in 2011. These include setting out a cyber security policy, defining critical infrastructure, information sharing between departments and protection of civil liberties.

Reading this, two things jump out – the insecurity that this claim projects and the fact that frameworks and plans like these are not even worth the cost of paper it is written on [1] if it is not put to practise.  Given that the GoI’s National Cyber Security Policy (Draft PDF) wants the CERT-IN to

act as a nodal agency and co-ordinate all matters related to information security in the country

we shouldn’t expect getting out of this self-dug pit any time soon.


[1] Yup, I said “paper” because, you know what, a lot of GoI reports and documents are scans of printed documents!

https://vyuha.nationalinterest.in/the-mirror-effect/feed/ 1
Moving feed away from Google Feedburnerhttps://vyuha.nationalinterest.in/moving-feed-away-from-google-feedburner/ https://vyuha.nationalinterest.in/moving-feed-away-from-google-feedburner/#respond Sat, 23 Mar 2013 22:03:10 +0000 http://vyuha.nationalinterest.in/?p=575 Similar posts:
  1. RIM, Skype, Google and DoT
  2. Cost of cybercrime
  3. Donate to Takshashila Institution
  4. In the Beginning
  5. eVoting expert arrested on charge of stealing the EVM he studied
It is high time to move away from Google Feedburner. If you have already subscribed to feeds of Vyuha, please edit the subscription to point to locally hosted http://vyuha.nationalinterest.in/feed/  By the end of next week, the feed hosted by Feedburner will be deleted and redirected to the earlier mentioned feed.

Sorry for the inconvenience but we think that, overall this is in the best interest of everyone, especially the subscribers.

https://vyuha.nationalinterest.in/moving-feed-away-from-google-feedburner/feed/ 0
Links for 14-03-2013https://vyuha.nationalinterest.in/links-for-14-03-2013/ Fri, 15 Mar 2013 22:45:00 +0000 http://vyuha.nationalinterest.in/links-for-14-03-2013/ Similar posts:
  1. Links for 12-03-2013
  2. Links for 27-02-2013
  3. Links for 6-03-2013
  4. Links for 8-07-2012
  5. Links for 28-10-2011
These are my links for 14-03-2013:

  • Govt orders probe into cyber attack on DRDO – Fluttered by reports that computers of the Defence Research and Development Organisation (DRDO) having highly sensitive information were hacked by Chinese hackers, the Centre has initiated a probe into the issue on Wednesday.
Links for 12-03-2013https://vyuha.nationalinterest.in/links-for-12-03-2013/ Tue, 12 Mar 2013 22:45:00 +0000 http://vyuha.nationalinterest.in/links-for-12-03-2013/ Similar posts:
  1. Links for 27-02-2013
  2. Links for 6-03-2013
  3. Links for 2-12-2012
  4. Links for 11-04-2012
  5. Links for 8-07-2012
These are my links for 12-03-2013:

  • A new infosec era? Or a new infosec error? – On March 4, 2013, a contest was held at the Nullcon conference in Goa, India, to see who could take over a botnet. The Times of India reported that the prize money was provided by an Indian government official and was awarded to the Garage4Hackers team.
    A contest is the least controlled, riskiest, noisiest, and most irresponsible way to deal with a criminal botnet I can imagine.
Links for 6-03-2013https://vyuha.nationalinterest.in/links-for-6-03-2013/ Wed, 06 Mar 2013 22:45:00 +0000 http://vyuha.nationalinterest.in/links-for-6-03-2013/ Similar posts:
  1. Links for 27-07-2012
  2. Links for 27-02-2013
  3. Links for 25-11-2011
  4. Links for 2-11-2011
  5. Links for 8-07-2012
These are my links for 6-03-2013:

  • On the web front – This unfolding US-China duel in cyberspace is a stark reminder that not only is the strategic rivalry between the world's two most powerful countries becoming full-fledged, but it could also spread into dangerous territories if neither side sets the minimum rules of engagement.
Links for 27-02-2013https://vyuha.nationalinterest.in/links-for-27-02-2013/ Wed, 27 Feb 2013 22:45:00 +0000 http://vyuha.nationalinterest.in/links-for-27-02-2013/ Similar posts:
  1. Links for 16-12-2011
  2. Links for 1-11-2011
  3. Week 30 Links
  4. Links for 25-11-2011
  5. Links for 26-11-2011
These are my links for 27-02-2013:

  • Experts Say It’s Time to Prepare for a ‘Post-Crypto’ World | threatpost – In the current climate of continuous attacks and intrusions by APT crews, government-sponsored groups and others organizations, cryptography is becoming less and less important and defenders need to start thinking about new ways to protect data on systems that they assume are compromised, one of the fathers of public-key cryptography said Tuesday. Adi Shamir, who helped design the original RSA algorithm, said that security experts should be preparing for a "post-cryptography" world
GoI bars international vendors from National Optical Fiber Network projecthttps://vyuha.nationalinterest.in/goi-bars-international-vendors-from-national-optical-fiber-network-project/ https://vyuha.nationalinterest.in/goi-bars-international-vendors-from-national-optical-fiber-network-project/#comments Tue, 22 Jan 2013 12:18:43 +0000 http://vyuha.nationalinterest.in/?p=554 Similar posts:
  1. Book review – “Cyberpower and National Security”
  2. Takshashila responds to GoI’s discussion draft on National Cyber Security Policy
  3. Hardware security and the Chinese
  4. Links for 16-12-2011
  5. General Keith Alexander speaks cyber security at CSIS
Afte the Centre for Development of Telematics (C-DoT) submitted a memo to the Government of India to to bar Chinese network vendors  Huawei and ZTE from bidding in the Rs 20,000-crore  roll out of a national optical fiber network (NOFN) project, the Government has decided to heed the advice and bar all international vendors from the project.

The DoT has decided that it will be going ahead with a 100 per cent domestic sourcing and has released a list of certified GPON suppliers. (…) Local companies that made it to the certified list include Tejas Networks, Prithvi Infosystems, Center for Development of Telematics (C-DoT), VMC Systems, Sai Systems, United Telecoms, and SM Creative.

This follows the decision by US House Intelligence Committee which branded ZTE and Huawei as national threat:

The House Intelligence Committee said that after a yearlong investigation it had come to the conclusion that the Chinese businesses, Huawei Technologies and ZTE Inc., were a national security threat because of their attempts to extract sensitive information from American companies and their loyalties to the Chinese government.

While is is good that the GoI decided to look beyond the Chinese companies when considering possible threats, the question it raises is, isn’t it turtles all the way down? Is it certified that the local companies will use 100% indigenously developed  components and if not, why is it better to prefer a “Assembled in India” sticker?

The FOFN project is a high investment and long term project that will power the infrastructure of Indian network for some time to come. So it is prudent for the GoI to tighten the security but it cannot be an isolated event. Nor is it viable to blanket-ban all foreign companies and technologies from such infrastructure and other sensitive projects. I hope someone higher up is thinking and acting seriously on an Information Assurance program within the scope of Critical Infrastructure Protection.

https://vyuha.nationalinterest.in/goi-bars-international-vendors-from-national-optical-fiber-network-project/feed/ 1
Stuxnet – chickens come home to roost?https://vyuha.nationalinterest.in/stuxnet-chickens-come-home-to-roost/ https://vyuha.nationalinterest.in/stuxnet-chickens-come-home-to-roost/#respond Mon, 21 Jan 2013 05:24:50 +0000 http://vyuha.nationalinterest.in/?p=551 Similar posts:
  1. Home Ministry sets deadline for RIM
  2. Links for 11-04-2012
  3. Links for 2-11-2011
  4. Use of private companies in cyber operations
  5. General Keith Alexander speaks cyber security at CSIS
General William Shelton, who heads Air Force Space Command and oversees the Air Force’s cyber operations, comments that Iran will be a “force to be reckoned with” in the future after it has perceivably strengthened its cyber defence and offense capabilities after the Stuxnet attacks.

“The Iranian situation is difficult to talk about,” Shelton told reporters. “It’s clear that the Natanz situation generated reaction by them. They are going to be a force to be reckoned with, with the potential capabilities that they will develop over the years and the potential threat that will represent to the United States.”

Has the chickens come home to roost or is this just more war mongering to get yet more defense buget share?

https://vyuha.nationalinterest.in/stuxnet-chickens-come-home-to-roost/feed/ 0
Links for 2-12-2012https://vyuha.nationalinterest.in/links-for-2-12-2012/ Sun, 02 Dec 2012 22:45:00 +0000 http://vyuha.nationalinterest.in/links-for-2-12-2012/ Similar posts:
  1. Links for 11-04-2012
  2. Links for 2-05-2012
  3. Links for 24-05-2012
  4. Links for 22-04-2012
  5. Links for 23-01-2012
These are my links for 2-12-2012:

Links for 27-07-2012https://vyuha.nationalinterest.in/links-for-27-07-2012/ Fri, 27 Jul 2012 22:45:00 +0000 http://vyuha.nationalinterest.in/links-for-27-07-2012/ Similar posts:
  1. Links for 24-04-2012
  2. Links for 8-07-2012
  3. Links for 16-07-2012
  4. Links for 23-01-2012
  5. Links for 30-04-2012
These are my links for 27-07-2012: