Centre will trace hackers’ country

Caught in the middle of major cyber-espionage strikes emanating both from China and the US, the government has decided to put in place a new system where it is not only possible to block hacking and data stealing attempts, but also ensure that the hackers are traced to their country of origin so that the Indian government can take up the issue directly with those governments.

According to the National Security Council Secretariat reports in 2012, various super sensitive government departments and ministries faced at least 1,000 serious hacking and data stealing attempts.
Despite instructions to the National Information Centre to strengthen its counter-hacking capabilities, the hackers have been successfully targeting sensitive information, a top government official said.
What is also becoming a matter of fresh worry for the government, is that sensitive private sector companies are also increasingly becoming targets of cyber-attacks.
Taking serious note of cyber attacks originating from foreign countries, Union home secretary R.K. Singh has recently issued orders to constitute a special high-level committee to chalk out a comprehensive response to all the cyber-espionage attempts on the government data and cyber-infrastructure.
The committee, sources said, will not only work out an all encompassing response from the government on the attempts but will also work in close tandem with other government agencies involved in the anti-cyber threat capacity building and ensure that hackers are traced to their country of origin.
The committee will also draw up a plan to enhance the cyber-security capabilities of the key government agencies.
“The idea is to trace the hackers and identify them. That will play a major role in strengthening our response system,” the official said.
Meanwhile, the home ministry has also mooted setting up of Cyber Crime Police Stations (CCPS) in each state and UTs to spearhead specialised investigations on cyber-crimes at the ground level which will be linked to Cyber Crime Investigations and Forensic Training Facilities (CCIFTF) in each state to act as training hubs for police personnel and public prosecutors. It will also provide technical assistance to investigators locally to trace the offenders.

Post new comment

<form action="/comment/reply/239671" accept-charset="UTF-8" method="post" id="comment-form"> <div><div class="form-item" id="edit-name-wrapper"> <label for="edit-name">Your name: <span class="form-required" title="This field is required.">*</span></label> <input type="text" maxlength="60" name="name" id="edit-name" size="30" value="Reader" class="form-text required" /> </div> <div class="form-item" id="edit-mail-wrapper"> <label for="edit-mail">E-Mail Address: <span class="form-required" title="This field is required.">*</span></label> <input type="text" maxlength="64" name="mail" id="edit-mail" size="30" value="" class="form-text required" /> <div class="description">The content of this field is kept private and will not be shown publicly.</div> </div> <div class="form-item" id="edit-comment-wrapper"> <label for="edit-comment">Comment: <span class="form-required" title="This field is required.">*</span></label> <textarea cols="60" rows="15" name="comment" id="edit-comment" class="form-textarea resizable required"></textarea> </div> <fieldset class=" collapsible collapsed"><legend>Input format</legend><div class="form-item" id="edit-format-1-wrapper"> <label class="option" for="edit-format-1"><input type="radio" id="edit-format-1" name="format" value="1" class="form-radio" /> Filtered HTML</label> <div class="description"><ul class="tips"><li>Web page addresses and e-mail addresses turn into links automatically.</li><li>Allowed HTML tags: &lt;a&gt; &lt;em&gt; &lt;strong&gt; &lt;cite&gt; &lt;code&gt; &lt;ul&gt; &lt;ol&gt; &lt;li&gt; &lt;dl&gt; &lt;dt&gt; &lt;dd&gt;</li><li>Lines and paragraphs break automatically.</li></ul></div> </div> <div class="form-item" id="edit-format-2-wrapper"> <label class="option" for="edit-format-2"><input type="radio" id="edit-format-2" name="format" value="2" checked="checked" class="form-radio" /> Full HTML</label> <div class="description"><ul class="tips"><li>Web page addresses and e-mail addresses turn into links automatically.</li><li>Lines and paragraphs break automatically.</li></ul></div> </div> </fieldset> <input type="hidden" name="form_build_id" id="form-0753319ff9a2d5faf38477fc3c111954" value="form-0753319ff9a2d5faf38477fc3c111954" /> <input type="hidden" name="form_id" id="edit-comment-form" value="comment_form" /> <fieldset class="captcha"><legend>CAPTCHA</legend><div class="description">This question is for testing whether you are a human visitor and to prevent automated spam submissions.</div><input type="hidden" name="captcha_sid" id="edit-captcha-sid" value="80667683" /> <input type="hidden" name="captcha_response" id="edit-captcha-response" value="NLPCaptcha" /> <div class="form-item"> <div id="nlpcaptcha_ajax_api_container"><script type="text/javascript"> var NLPOptions = {key:'c4823cf77a2526b0fba265e2af75c1b5'};</script><script type="text/javascript" src="http://call.nlpcaptcha.in/js/captcha.js" ></script></div> </div> </fieldset> <span class="btn-left"><span class="btn-right"><input type="submit" name="op" id="edit-submit" value="Save" class="form-submit" /></span></span> </div></form>

No Articles Found

No Articles Found

No Articles Found

I want to begin with a little story that was told to me by a leading executive at Aptech. He was exercising in a gym with a lot of younger people.

Shekhar Kapur’s Bandit Queen didn’t make the cut. Neither did Shaji Karun’s Piravi, which bagged 31 international awards.