Sunday, June 15, 2025
India Watch - A Digital Media
  • Home
  • IndiaWatching
    • India Unplugged
    • Maps of India
    • Strategy & Policy
  • Makers for India
    • Gallery & Expo
  • More
    • About Us
    • Contact Us
No Result
View All Result
India Watch - A Digital Media
  • Home
  • IndiaWatching
    • India Unplugged
    • Maps of India
    • Strategy & Policy
  • Makers for India
    • Gallery & Expo
  • More
    • About Us
    • Contact Us
No Result
View All Result
India Watch - A Digital Media
No Result
View All Result
Home Strategy & Policy

When Sauce For The Goose Is Not Sauce For The Gander

Pavithran Rajan by Pavithran Rajan
04/06/2016
in Strategy & Policy
2

Goose and Gander

Goose and Gander
Goose and the Gander

‘When sauce for the goose is not sauce for the gander’, the average man takes umbrage at this injustice. The ethic of reciprocity is a universal law in all cultures. We have seen that the Americans do not permit any hardware or software not from firms of American origin to be part of their classified networks. The Russians and the Chinese have also learned the route to cyber security the hard way and seems to have realised that critical networks have to be wholly indigenous. Now I wonder why these countries would put in all this effort and additional costs involved to ensure trusted supply chains.

Why are they not relying on air gapped networks like we in India believe is sufficient. Are the Americans, Russians and Chinese technologically less aware than the boffins who deal with cyber security in the GoI ? Why is their sauce different ? Are they not signatories to the same WTO rules which seemingly prevent our departments who control critical infrastructure from adopting the same norms.

The Americans have not permitted Huawei to even operate in US. We have invited all and sundry companies to be part of our classified and critical networks. Our govt funded Universities routinely carry out research on improving the security of foreign software and hardware. By spending taxpayers money into research promoting cybersecurity of foreign software and hardware are we boosting our national security efforts or of someone else ? Whose interest are we serving ?

One such cyber security expert from a four letter organisation while interacting with the author sometime back told that he planned to put both Chinese and American routers in tandem to ensure that both don’t control the whole network in our power stations, refineries etc. Asked about indigenous routers, he told that for indigenous manufacturers of routers they will have to first submit the source code which will be evaluated. Asked about whether the Chinese and the American manufacturers also had their code evaluated, he told without batting an eyelid that the MNC’s companies won’t agree to it ! Asked if this practice smacked of raising barriers on indigenous products by Indian citizens and wouldn’t such products manufactured by own citizens be more trustworthy, the expert opined that he made no differentiation between indigenous or foreign manufactured devices.

So much for ‘ Make Made in India‘. All other nations look after their own citizens and nurture their entrepreneurs. Here we have an institutional culture wherein the competitive advantage is given to MNC manufacturers in a field of national security. Macaulay’s children !!! they have been groomed well. Sun Tzu would applaud ‘The supreme art of war is to subdue the enemy without fighting.’ We have made a nation that taxes its citizens and hands over the money to potential adversaries for untrustworthy products. (Notice the cyber security expert talked of placing the American and Chinese routers in tandem. He knew the dangers.)


https://rbth.com/defence/2016/02/02/russias-defense-industry-to-get-its-own-internet_564229

Russian defense industry to get its own ‘internet’

February 2, 2016 Alexander Korolkov, special to RBTH
The companies of Russia’s military-industrial complex will soon be able to transfer secret information via an ultra-secure communication network. A notable requirement for the “secret internet” is that all its hardware and software must be made in Russia. Russia’s defense companies are to be linked by a secure line of communications to transfer top secret information, which will unite more than 1,000 firms belonging to Russia’s military-industrial complex.

“We are bringing the technical capabilities to a new level and creating a single secure information space for Russia’s entire defense industry. The system being created will enable companies to use all the possibilities of modern telecom technologies, and guarantees a high level of information security,” said Alexander Kalinin, director of the Department of Innovative Development for the United Instrument Manufacturing Corporation.

The creation of such systems typically involves dozens or even hundreds of companies whose personnel are not permitted to share documents by email, or, for example, to discuss certain work issues by Skype. All this slows down the work, because the defense personnel have to use older methods, such as sending correspondence in hard copy via a special courier service, speaking over a secure telephone line, or meeting in person.

However, according to its terms of reference, the new system will allow personnel at secret facilities to use everyday tools such as email, audio and videoconferencing and cloud storage for work purposes. Furthermore, once the defense industry has its own “internet,” engineers will be able to take advantage of powerful information and computer resources, such as the Computer Modelling Center (a supercomputer) being created at the Vega Radio Engineering Corporation in Moscow.

According to the publicly available procurement documents of the Russian Ministry of Industry and Trade, the customer for the new system, it is to be implemented at 255 Russian defense industry companies in 2016. The defense industry press release, however, mentions a figure of more than 1,000 companies. This difference most likely indicates that the program is designed to run for a number of years.

The development of the system will be funded entirely from the federal government budget, but the amount to be spent has not been disclosed. A notable requirement for the “secret internet” is that all its hardware and software must be made in Russia. This will prevent “backdoors” – vulnerabilities deliberately created by foreign manufacturers that may subsequently be used by intelligence services from those countries to gain access to secret information.

Tags: critical infrastructure protectionCyber SecurityICT Manufacturemake in IndiaNational Security
Previous Post

Can National Security Be Outsourced ?

Next Post

Banning Smart Phones In Government

Pavithran Rajan

Pavithran Rajan

Pavithran Rajan is an alumni of the National Defence Academy and was commissioned in the Indian Army in 1992 and served till 2013. He is on the Board of Advisors at the E Raksha Research Center; Gujarat Technological University, Ahmedabad and regularly consults for numerous organisations in various State and Central Government.

Next Post

Banning Smart Phones In Government

Comments 2

  1. Poovizhi says:
    9 years ago

    Information security in India was compromised more than decade ago. Iran had air gapped networks, but still was penetrated by Stuxnet . fligjt Mh 370 was taken over electronically by a Boeing Honeywell installed software bugs . Neither Boeing nor Honeywell nor the US establishment have clear on those events. How come Indian establisments have failed to learn from those instances. is it wilful compromise or sheer stupidity ?

    Reply
    • Shambhu Singh says:
      9 years ago

      We deliberately compromise and pretend. To look stupid.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

two × five =

  • Trending
  • Comments
  • Latest

Skeletons in my banks and national system

17/04/2018

Corporate Governance & Cyber Security Responsibility

18/11/2016

Chai pe Charcha – Delhi 11 June 2017

14/06/2017

Govt & Cops twiddle fingers waiting for the nation to burn…

26/08/2017
National Cyber Security Policy 2020 .. in anticipation

National Cyber Security Policy 2020 .. in anticipation

7

Cyber Swatchhta Kendra – A Good Start

6

Demonetisation – Cashless Economy – Urgent Need For Data Localisation

5

Why Are We A Strategically Deficient Nation ?

5
Time to relook at Critical Information Infrastructure

Time to relook at Critical Information Infrastructure

20/09/2020
What the Government does… secure messaging

What the Government does… secure messaging

23/01/2020
They ran, we shot… and u better believe us!

They ran, we shot… and u better believe us!

06/12/2019
National Cyber Security Policy 2020 .. in anticipation

National Cyber Security Policy 2020 .. in anticipation

31/10/2019

Recent News

Time to relook at Critical Information Infrastructure

Time to relook at Critical Information Infrastructure

20/09/2020
What the Government does… secure messaging

What the Government does… secure messaging

23/01/2020
They ran, we shot… and u better believe us!

They ran, we shot… and u better believe us!

06/12/2019
National Cyber Security Policy 2020 .. in anticipation

National Cyber Security Policy 2020 .. in anticipation

31/10/2019
  • Home
  • About
  • Contact
  • Maps of India

© 2018 IndiaWatch - All Rights Reserved. Website Design: Jemistry Info Solutions

  • Home
  • IndiaWatching
    • India Unplugged
    • Maps of India
    • Strategy & Policy
  • Makers for India
    • Gallery & Expo
  • More
    • About Us
    • Contact Us

© 2018 IndiaWatch - All Rights Reserved. Website Design: Jemistry Info Solutions

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.