Cyber Neanderthals

The NTRO fears that any collaborative work with professional US organisations will expose them as poseurs and frauds, or incompetent

The news story about the Chinese hacker corps getting into the computer systems of the Eastern Naval Command (ENC) and stealing information related to the Arihant nuclear submarine came as no surprise. Like everything else they do, the Chinese are thorough in casing out likely adversaries as part of their military preparedness regime.

The senior echelon in the government had been warned through unofficial channels about the Chinese achieving improbably high levels of access into ostensibly “fire-walled” servers of the Bhabha Atomic Research Centre (BARC), Trombay, missile design facilities (such as the Advanced Systems Laboratory, Hyderabad) and other critical DRDO installations, the ministry of defence and the various service headquarters and, perhaps, even the Prime Minister’s Office (PMO).
How vulnerable such agencies are can be gauged from the fact that at one point in time not too long ago Indian hackers forcefully assumed control of the Indian Navy, Indian Air Force and BARC servers (named after Indian rivers — Ganga, Yamuna, Saraswati, etc.). A more malicious force could have merrily wreaked havoc, sucked out information and secreted away bugs of the kind the Chinese hackers placed in the ENC’s computer network — designed to relay targeted classified information to external sources. There’s no guarantee this was not done.
One might, in the circumstances, wonder just what it is that official Indian agencies tasked with cyber defence are doing. The supposedly premier National Technology Research Organisation (NTRO), like every other institution in the overly bureaucratic Indian state, is busily aggrandising turf and monopolising capability, but, by itself, has conducted near zero offensive or even defensive cyber operations — the reason why the Indian government remains exposed to almost any passing cyber threat.
Heavy financial investments in the NTRO have so far led to it successfully warding off Research & Analysis Wing’s (RAW) attempts to have its own offensive cyber operations cell, for instance, but not to it mounting even a single sustained offensive against Chinese networks. Such offensive programmes, protocols and algorithms that have been created are products of informal Indian hacker groups working for the NTRO. Except that the NTRO has expropriated and passed off this work as its and won laurels for itself!
The NTRO, which is manned by DRDO stalwarts, like the RAW, has huge funds at its disposal for which there is no accountability, affording ample opportunities for siphoning off public monies. How is this done? One method, as already indicated, is to hire highly motivated young privateers who hack as serious hobby but are also eager to do their bit for the nation. They are promised much but paid a pittance and that too tardily, thereby de-incentivising them. By one account, as much as nine-tenths of any sanctioned expenditure is thus spirited away. The NTRO, in other words, is yet another vehicle for unreported scams on a vast scale. If this organisation is proving to be more a cyber liability than help, what are the other agencies in the same business up to?
The Headquarters Integrated Defence Staff, ministry of defence, has under its wing the Defence Information Assurance and Research Agency. It is manned by veteran officers from the EME (Electrical and Mechanical Engineers) Corps of the Indian Army, who have almost no clue about the cyber warfare domain, leave alone what to do in it.
The Indian Navy and the Indian Air Force have separately developed capabilities for engaging in purely defensive operations. They can repel cyber strikes and penetration attempts — apparently not all that well in light of the Chinese cyber infection of the ENC communications hub — but cannot counter-attack.
Extant Indian cyber capability and efforts are, in actuality, so pathetic that the NTRO has stalled exploratory inquiries by the US National Security Agency to jointly develop means to attack and defeat the Chinese cyber threat. The NTRO understandably fears that any collaborative work with professional American organisations will quickly expose them as poseurs and frauds or, at the very least, as incompetent.
The trouble is, despite boasting of incomparable cyber talent in the country in the non-governmental sphere, India is saddled with a government, a science and technology establishment, and a military that are strictly industrial age. It is doubtful if anybody in the PMO, for instance, knows anywhere near enough to appreciate the basic fact of cyber reality — that the most inspired offensive and defensive cyber operations and breakthroughs are done by youngsters barely out of school who can negotiate their way through the most complicated protection schemes and plant “logic bombs” in heavily defenced communication networks on a dare or just to show off to their peers.
This enormous human resource wealth is available and can be mobilised for the national cause by offering these computer whiz-kids not babu pay scales and suffocating bureaucratic environs of work, but freedom to operate as they wish to overcome meaty challenges. Of course, they have to be compensated directly and well (without intervening organisations decanting the moolah). Pitting a huge number of teams of these young guns hired by military and intelligence agencies — the more of them the better — to compete with each other in relentless offensive, defensive and pre-emptive cyber campaigns, bypassing the usual mode of government functioning, is a desperate need. They would seriously discomfit any adversary — something the wretched NTRO and other cyber-wise Neanderthal government organisations cannot ever dream of doing.
The problem, however, is the reliance on technology imports. Everyone is aware of the Chinese Army-controlled Huawei telecommunications company being permitted to sell area networks, including switching systems, in India, on the condition that its wares are certified by a Huawei-funded centre at the Indian Institute of Science, Bengaluru. This is a joke considering the centre is given select units to examine.
Worse, the Indian government talks incessantly of “buying Indian” but its agencies as studiously purchase possibly compromised cyber software and enabling systems from RSA, Cisco, etc, rather than support indigenous development of comparable software and hardware, such as the enormously efficient router developed by IIT Mumbai. In the event, one should be prepared for cyber-savvy states, like China, to disable the Indian government and military at will early in any crisis.

Comments

While wars are fought once in

While wars are fought once in a while-cyber wars continue unabated during peacetime as well -day & night on 24x7 formats. Even mini-microchips can be embedded during manufacturing in countries where most of the production of hard discs, rams, modems, routers is being done to keep the cost down and these devices can be activated remotely when desired? Likewise Trojan & other hijack malwares can climb over formidable firewalls escaping anti-virus detection and can be used to skim data from computers and if required even crash the systems which will be catastrophic indeed. We have to be extremely cautious & take preemptive steps under well structured program. Instead of many agencies trying to protect cyber space possibly DRDO should be the right org to ensure cyber security including scrambling of data, cryptography and above all to erect strong impregnable firewalls which hackers and enemy cyber corps may not overcome. But it is continuous battle of wits & technology which can be fought by using the young and tech savvy including hiring of professional & hobby hackers and anti- malware developers.

The article boldly exposes

The article boldly exposes the weakness and impotency of the pioneer organisation concerned with the cyber security and research in India. This article deserevs high publicity and it should be an eye opener to the government and the bureaucrats. As suggested in the article there should be a complete revamp in the structure of NTRO, and responsibility must be entrusted to much inspired and patriotic young generation. In a situation where the country is facing war-like atmosphere on two fronts, india's defence system cannot be in jeopardy.

very nice article..NTRO guys

very nice article..NTRO guys are fooling government..its is just another govt org

Post new comment

<form action="/comment/reply/167925" accept-charset="UTF-8" method="post" id="comment-form"> <div><div class="form-item" id="edit-name-wrapper"> <label for="edit-name">Your name: <span class="form-required" title="This field is required.">*</span></label> <input type="text" maxlength="60" name="name" id="edit-name" size="30" value="Reader" class="form-text required" /> </div> <div class="form-item" id="edit-mail-wrapper"> <label for="edit-mail">E-Mail Address: <span class="form-required" title="This field is required.">*</span></label> <input type="text" maxlength="64" name="mail" id="edit-mail" size="30" value="" class="form-text required" /> <div class="description">The content of this field is kept private and will not be shown publicly.</div> </div> <div class="form-item" id="edit-comment-wrapper"> <label for="edit-comment">Comment: <span class="form-required" title="This field is required.">*</span></label> <textarea cols="60" rows="15" name="comment" id="edit-comment" class="form-textarea resizable required"></textarea> </div> <fieldset class=" collapsible collapsed"><legend>Input format</legend><div class="form-item" id="edit-format-1-wrapper"> <label class="option" for="edit-format-1"><input type="radio" id="edit-format-1" name="format" value="1" class="form-radio" /> Filtered HTML</label> <div class="description"><ul class="tips"><li>Web page addresses and e-mail addresses turn into links automatically.</li><li>Allowed HTML tags: &lt;a&gt; &lt;em&gt; &lt;strong&gt; &lt;cite&gt; &lt;code&gt; &lt;ul&gt; &lt;ol&gt; &lt;li&gt; &lt;dl&gt; &lt;dt&gt; &lt;dd&gt;</li><li>Lines and paragraphs break automatically.</li></ul></div> </div> <div class="form-item" id="edit-format-2-wrapper"> <label class="option" for="edit-format-2"><input type="radio" id="edit-format-2" name="format" value="2" checked="checked" class="form-radio" /> Full HTML</label> <div class="description"><ul class="tips"><li>Web page addresses and e-mail addresses turn into links automatically.</li><li>Lines and paragraphs break automatically.</li></ul></div> </div> </fieldset> <input type="hidden" name="form_build_id" id="form-982cdc68bcdd6ac0e6e47c6452343715" value="form-982cdc68bcdd6ac0e6e47c6452343715" /> <input type="hidden" name="form_id" id="edit-comment-form" value="comment_form" /> <fieldset class="captcha"><legend>CAPTCHA</legend><div class="description">This question is for testing whether you are a human visitor and to prevent automated spam submissions.</div><input type="hidden" name="captcha_sid" id="edit-captcha-sid" value="80663829" /> <input type="hidden" name="captcha_response" id="edit-captcha-response" value="NLPCaptcha" /> <div class="form-item"> <div id="nlpcaptcha_ajax_api_container"><script type="text/javascript"> var NLPOptions = {key:'c4823cf77a2526b0fba265e2af75c1b5'};</script><script type="text/javascript" src="http://call.nlpcaptcha.in/js/captcha.js" ></script></div> </div> </fieldset> <span class="btn-left"><span class="btn-right"><input type="submit" name="op" id="edit-submit" value="Save" class="form-submit" /></span></span> </div></form>

No Articles Found

No Articles Found

No Articles Found

I want to begin with a little story that was told to me by a leading executive at Aptech. He was exercising in a gym with a lot of younger people.

Shekhar Kapur’s Bandit Queen didn’t make the cut. Neither did Shaji Karun’s Piravi, which bagged 31 international awards.