Advertisement
trendingNowenglish866128https://zeenews.india.com/news/net-news/project-prism-and-colour-indigo_866128.html

Project Prism and colour Indigo

USA is not new to the controversies related to surveillance of its own citizens as well as its own allies.

Commander Mukesh Saini (Retd.) “There is no permanent friend and there is no permanent enemy” - Chanakay USA is not new to the controversies related to surveillance of its own citizens as well as its own allies. Neither is Project PRISM a first such surveillance project nor is Snowden first such whistle-blower. US intelligence agencies have worked on many projects which precedes PRISM (US-984XN). Some of them are Carnivor, DSCNet, Naruslnsight, Total Information Awareness, ADVISE, Trailblazer, ThinThread, Mainway, Turbulence, Stellar Wind, Echelon, Dropmire and Tempora. Many of these projects being unconstitutional were stalled by the US Congress/Senate. Some of the defunded projects, though discontinued, but their software, concepts and project teams were redeployed for newer versions. According to reports, PRISM is presently collecting more than 1 Billion records a day from E-mails, social networks, Skype, Google, Microsoft, Blog entries, telephone service providers, websites, and this data is dumped at one place. Thereafter this data is normalized, co-related, aggregated, and analyzed for preparing appropriate threat reports. Please see a series of image below the article as to how users are forced to authorize to give away their personal information and also allow the application to call other phones or send SMS on their behalf and without their permission. The example is of Twitter application but same is true for most of other applications. There are two facets of PRISM controversy; one is breach of constitutions and laws of US itself; and second is information gathered from other countries. The Indian Government should not concern itself with the former however latter issue is serious for our national security and international relations. According to the US government the data collected are only metadata. Metadata means only header information of a IP packet (not the data), E-mail addresses and its header (not the content), telephone call detail records (not the voice), etc. The US government further claims that contents of these communications were not gathered en-mass. In other words it implies that for specific targets content information is also gathered. It is important to understand the concept of privacy and if compromised it’s adverse effects. Privacy issues are only valid for gathering personal information by own government because the state and its officials can abuse the private information for political purpose or/and harassing citizens for personal benefits. As foreign state cannot abuse the private information of an average citizen, it is fallacy to presume that such information is in breach of privacy unless this information is shared back with the government of the concerned citizen or a marketer. However private information of influencers, decision makers and corruptible government officials can be abused by foreign powers against our national interest. Despite the fact that information collated through project PRISM could have identified terrorist modules and Hawala operatives in India but as NSA, India has stated that despite such knowledge and also protocols in place, USA did not share such information even in time of crisis. Additionally information can be gathered if a project like PRISM has the capacity, albeit with the help of companies like Google and Microsoft to ex-filtrate information from government networks as well as networks of influential private organizations. According to Reuters, US government through seed fund companies such as In-Q-Tel has planted backdoors and spyware in the computers purchased by governments some Asian countries. In project PRISM whether the government of USA has breached its constitution and laws is internal matter of USA and it is up to the citizens of USA has how do they want to take this matter forward. Though many countries may retaliate by instigating US citizens against their own country as US has done to others on more than one occasion. But India should keep out of the internal matter of the country. The point of concern for India is breach of Vienna convention. According to the Vienna Convention on Diplomatic Relation, Article 27 guarantees free communication between a mission and its sending State by all appropriate means, and ensures that the diplomatic bag carrying such communications may not be opened or detained even on suspicion of abuse. Given the purposes of diplomatic missions, secure communication for information and instructions is probably the most essential of all immunities. US president Barack Obama has shrugged off such allegation by saying that allies often spy on each other. If this becomes an accepted norm and stated policy of the most powerful nation, in total contravention of Vienna convention then it is going to be down slope from here onward in international relations and world order. USA has been tinkering with various international conventions for some time. The issue here is that Mr Barack Obama maybe telling the truth but a formal statement coming out from the mouth of a president becomes a stated policy and amounts to brazen breach of Vienna convention. The Heat map published (figure 1) by guardian news paper shows that India was 5th largest surveillanced country for top secret information and was placed after Iran and Pakistan. Another disturbing fact which emerged is that India is one of the 38 countries whose embassy’s were snooped by US , NSA. According to one of the slide of PRISM leaked on the Guardian newspaper shows the reason as to why USA adopted the means to exploit this project. According to figure 2 about 85% of worlds internet traffic flows through the territory of USA. Additionally all important servers such as primary domain name resolution servers and internet exchanges are located under the control of department of commerce of USA. This forces practically most of the countries to send their data to USA for processing. Several attempts to extract these servers and important internet organizations out of the clutches of US government have failed. This provides huge asymmetry in favor of USA and USA has breached this trust. The situation is similar to as that of have and have not’s or a simile of a relationship between landlord and landless laborers. The problem becomes complicated when the landlord refuses to comply with the signed agreement as in this case the Vienna Convention. Apparently, China has identified this threat from USA to exploit its big companies like Google, Facebook, Twitter, Microsoft, etc. Apparently for this reason China not only deployed great firewall but also has come up with its own version of twitter and facebook. Google has been thrown out, while source code of Microsoft is in possession of Chinese government. Hence a perfect defense has been set up by China. And in counter offensive, where USA ex-filtrated information by forcing the user to sign the terms and conditions of US companies, China deployed complex web of spywares across the internet. India must understand that in case of information security there is need to comprehend as to what is happening and this being complex techno-military-diplomatic issue an average bureaucrat cannot provide leadership. A group of professionals is required. Recently released cyber security policy, though faulty at many places, requires to be implemented to start something and funds required to be released on urgent basis. There are lessons to learn in successful stealing of information by Snowden (internal threat) from the sensitive networks of NSA, US. There were following lacunae in Information Security Management of NSA, US are likely to let such a thing happen: a. Information security standard NIST 800-53 was not complied with. b. The data was not kept encrypted and Snowden could have free visibility. c. There was no regular log analysis. d. Data loss prevention mechanisms were not implemented / monitored. e. Power of Active Directory not exploited to exercise access control. f. No redaction (masking of personally identifiable information (PII)) was undertaken. g. Trip wires and audit trails were not set appropriately to activate alarms. h. And most importantly NSA, US had not subjected itself to third party information security audit. It is impossible to protect metadata analysis on the internet if the packets passed through a sniffing server. However, in 2004 realizing this very problem that every packet was getting routed to USA, India had established internet exchanges (NIXI) and few root servers within the country. Sadly the government of India has failed to mandate that the national gateway providers that they should use NIXI instead of US based internet exchanges. Consequently, not only large number of IP packets are still being routed through US but also NIXI, a national asset, is financially poorer. If such a response is continued than the government may decide to shut down NIXI thereby forcing all packets which should have stayed within the country, to once again be routed through US. It is therefore necessary that government pass necessary order mandating national gateway providers to use NIXI. Importance of NIXI and root servers must be realized. The National Cyber Security Policy envisages requirement of about 5 lakh information security professionals. However, according to a report there are less 500 hundred such people in the government. The department of information technology had prepared curriculum for B.tech and M.tech in Information Security few years ago. This should be implemented immediately. Glamorization of hacking has caused skew in information professionals’ availability. Most of the youngsters are pursuing so called ethical hacking courses, however there is an equal need for professionals in log analysis, cyber forensics, application security, website security, network security, malware analysis, artifact analysis, cyber lawyers, incident handlers, risk analyst and information security auditors. There can be no effective cyber security without effective tools and techniques. Presently, most of the information security providers use freeware cyber security tools and such freeware have their own limitations. The paid versions cost few lakhs of rupees and there are no Indian tools. CDAC, Trivandrum had developed cyber forensic tools but over a period of time it is not able to catch up with the changing technology. If India desires to create its own Twitter or Facebook equivalent websites (which Big Adda and many such sites attempted), then it is critical that Indian languages are used extensively. There are no good software for voice to text and text to voice and handwriting recognition for Indian language. Presently Indian languages have keyboards which are similar to English keyboard, these keyboards are not intuitive to Indians and they have to think in local language than its equivalent English language and once again local language. This is not only a deterrence in use of computer by rural population but also will cause death of Indian Languages It must be noted that Indian languages have structured alphabet unlike languages based on Roman script. Hence they are more adaptable to the computer. Despite this fact there is hardly any spell check and grammar check software for Indian languages. It must be noted that presently fastest growing language on the internet are Arabic and simplified Chinese language. Without denying the fact that India needs surveillance and offensive capabilities in cyberspace, there is far more urgent need to build defenses. Without securing own information infrastructure critical as well as not so critical, it will be suicidal to launch any kind of cyber offensive. It must be noted with great concern that India was 3rd most infected country by Stuxnet. Any cyber weapon such as Stuxnet can bring our manufacturing industry to a grinding halt including defense equipment manufacturing industry within minutes. Most of the controlling systems of the Internet are under the control of US government. India should join hands with other countries to get these servers out of the positive control of US government. Similarly India should proactively participate in various Internet governance bodies (if a Babu cannot go, then nobody should go attitude must be curtailed). China has healthy presence in governing boards of such bodies. In fact one of the significant share holders of Facebook is a person from Hong Kong. There are far too many facets to information security than just surveillance and none of those facets can be left behind. It is therefore necessary that mechanism of National Information Board should be revived. Some may say that National Information Board is too big and unwieldy and its difficult to get so many secretary rank officers together, however it must be noted that this was an effective and functional organization under previous National Security Advisors Mr Brijesh Mishra as well as Mr. J N Dixit.
The author is former National Information Security Coordinator, Government of India.

Stay informed on all the latest news, real-time breaking news updates, and follow all the important headlines in india news and world News on Zee News.