Sunday, June 15, 2025
India Watch - A Digital Media
  • Home
  • IndiaWatching
    • India Unplugged
    • Maps of India
    • Strategy & Policy
  • Makers for India
    • Gallery & Expo
  • More
    • About Us
    • Contact Us
No Result
View All Result
India Watch - A Digital Media
  • Home
  • IndiaWatching
    • India Unplugged
    • Maps of India
    • Strategy & Policy
  • Makers for India
    • Gallery & Expo
  • More
    • About Us
    • Contact Us
No Result
View All Result
India Watch - A Digital Media
No Result
View All Result
Home Strategy & Policy

Hum honge kaamyaab ek din………

Pavithran Rajan by Pavithran Rajan
23/08/2016
in Strategy & Policy
3

 

NSA Tampering
NSA Tampering
 Honge kaamyaab, honge kaamyaab, ham honge kaamyaab ek din
 Ho ho mann mai hai vishwaas, pura hai vishwaas
 Hum honge kaamyaab ek din.........

 

Now the big take away for me from the article down below was ‘All of this happens with the support of Intelligence Community partners and the technical wizards in TAO.’ Who are these Intelligence community partners ? Are these private sector companies of the parent nation ?

Does purchase of equipment from such companies jeopardise our national security ? Have we instituted course corrections ? Who will initiate such measures in India ? When will these happen ? Can such measures happen in secrecy ? Can govt purchase procedures be secret ?

These are questions that should not take an inordinately long time for a logical answer, but in ‘Incredible India’ all these are lost in a maze of mirrors. Inspite of the Government announcing schemes like ‘Make in India’ the solutions seem to escape our National Security experts.

In fact it takes me back to school where we used to sing ‘ Hum honge kamyab ek din..’

 

http://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
Photos of an NSA “upgrade” factory show Cisco router getting implant
Servers, routers get “beacons” implanted at secret locations by NSA’s TAO team.

SEAN GALLAGHER – 5/15/2014, 1:00 AM

NSA techs perform an unauthorized field upgrade to Cisco hardware in these 2010 photos from an NSA document.

A document included in the trove of National Security Agency files released with Glenn Greenwald’s book No Place to Hide details how the agency’s Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers, and other network gear being shipped to organizations targeted for surveillance and install covert implant firmware onto them before they’re delivered.

These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

The document, a June 2010 internal newsletter article by the chief of the NSA’s Access and Target Development department (S3261) includes photos (above) of NSA employees opening the shipping box for a Cisco router and installing beacon firmware with a “load station” designed specifically for the task.

The NSA manager described the process:

Here’s how it works: shipments of computer network devices (servers, routers, etc,) being delivered to our targets throughout the world are intercepted. Next, they are redirected to a secret location where Tailored Access Operations/Access Operations (AO-S326) employees, with the support of the Remote Operations Center (S321), enable the installation of beacon implants directly into our targets’ electronic devices. These devices are then re-packaged and placed back into transit to the original destination. All of this happens with the support of Intelligence Community partners and the technical wizards in TAO.

Tags: Cyber SecurityICT ManufactureInfowarNational SecurityPavithran Rajan
Previous Post

Independence Day Cyber Security Wishes for the Nation

Next Post

Scorpene ... a submarine leaks

Pavithran Rajan

Pavithran Rajan

Pavithran Rajan is an alumni of the National Defence Academy and was commissioned in the Indian Army in 1992 and served till 2013. He is on the Board of Advisors at the E Raksha Research Center; Gujarat Technological University, Ahmedabad and regularly consults for numerous organisations in various State and Central Government.

Next Post

Scorpene ... a submarine leaks

Comments 3

  1. poovizhi.arasan says:
    9 years ago

    Wasn’t it Marx who said, “History repeats itself, first as a tragedy and then as a farce. ” After ejection of Brits, India succumbed to dollar colonisation and now to information colonisation ? Like predecessors, even the Modi government clearly have a weak sense of history.

    Reply
  2. Binu Stephen says:
    9 years ago

    I liked the article for presenting the facts of the matter and allowing the reader to make their own opinions or make them think without trying to push the writer’s opinion down the reader’s throat

    Reply
  3. Sarah Jose says:
    9 years ago

    In light of the Scorpene leak this article takes on so much significance

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

eighteen + ten =

  • Trending
  • Comments
  • Latest

Skeletons in my banks and national system

17/04/2018

Corporate Governance & Cyber Security Responsibility

18/11/2016

Chai pe Charcha – Delhi 11 June 2017

14/06/2017

Govt & Cops twiddle fingers waiting for the nation to burn…

26/08/2017
National Cyber Security Policy 2020 .. in anticipation

National Cyber Security Policy 2020 .. in anticipation

7

Cyber Swatchhta Kendra – A Good Start

6

Demonetisation – Cashless Economy – Urgent Need For Data Localisation

5

Why Are We A Strategically Deficient Nation ?

5
Time to relook at Critical Information Infrastructure

Time to relook at Critical Information Infrastructure

20/09/2020
What the Government does… secure messaging

What the Government does… secure messaging

23/01/2020
They ran, we shot… and u better believe us!

They ran, we shot… and u better believe us!

06/12/2019
National Cyber Security Policy 2020 .. in anticipation

National Cyber Security Policy 2020 .. in anticipation

31/10/2019

Recent News

Time to relook at Critical Information Infrastructure

Time to relook at Critical Information Infrastructure

20/09/2020
What the Government does… secure messaging

What the Government does… secure messaging

23/01/2020
They ran, we shot… and u better believe us!

They ran, we shot… and u better believe us!

06/12/2019
National Cyber Security Policy 2020 .. in anticipation

National Cyber Security Policy 2020 .. in anticipation

31/10/2019
  • Home
  • About
  • Contact
  • Maps of India

© 2018 IndiaWatch - All Rights Reserved. Website Design: Jemistry Info Solutions

  • Home
  • IndiaWatching
    • India Unplugged
    • Maps of India
    • Strategy & Policy
  • Makers for India
    • Gallery & Expo
  • More
    • About Us
    • Contact Us

© 2018 IndiaWatch - All Rights Reserved. Website Design: Jemistry Info Solutions

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.