Social Icons

Friday, May 31, 2013

GeoIntelligence 2013 : 13-14 June 2013,Taj Palace,New Delhi

Geo Intelligence 2013

1.   GeoIntelligence is a premier India based annual conference and exhibition dedicated to the highest level of information exchange and networking within the Defense and Security sector. The conference will be hosting its seventh edition this year with its primary focus on the perspectives and requirements of the key decision makers who directly influence national security policies and procedures. The conference aims to tap the most influential speakers and delegates not only from India, but also from various international defense and security establishments, as well as key international players from the industry. With the presence of such key players in the conference, the forum is uniquely positioned to offer adequate opportunities for knowledge sharing related to defense and security personnel, as well as, for business development and networking.

Theme

Geospatial – Force Multipier for Modern Warfare

2.   With nations today faced with a multitude of challenges for national Defence and Security,both from state and non state actors, the need for higher content and cohesive geospatial intelligence data is more critical. In parallel with the rapid development of geospatial intelligence technology, the role played in modern warfare by the operational geospatial information changes as well. With rapid advancement in LiDAR, multispectral and radar imagery technologies as well as surface and airborne sensor platforms, the geospatial technology is developing dynamically and will have wider applications in combat operations, crime mitigation, internal security, border control, arms treaty monitoring, etc. With the theme “Geospatial – Force Multiplier for Modern Warfare”, the speakers will deliberate on the modern outlook for the development of military geo-informatics and for modern warfare. 

3.  More special for me since I am there as one of the speakers.Will be speaking on security challenges in Big Spatial Data.

4.  For more details please visit : http://geointelligenceindia.org/

How to be Anonymous on Internet ?

1.   Every one of us who is aware and conscious of the repercussions of cookies,trackers,malware's, ad-wares, extensions in browsers,privacy issues on the internet would always dream of if he/she could be anonymous on the internet whilst surfing....and in my few posts in past here , here and here, I have discussed few ways and tools that could make you anonymous on the web.But in recent times after having surfed for a while I have compiled a list of LIVE DVDs and few OS that can help you maintain anonymity.These along with the website and the name are mentioned below :
Mandragora Linux: Gnome desktop built on Ubuntu, to be used for digital forensics during incident response and vulnerability assessments. It comes with hacking tools like nmap (port scanner), Wireshark (packet sniffer), Kismet (Wi-Fi monitoring) and enhancing privacy tools like the tor proxy, torchat and i2P.Website at : 

 Jondo Live-CD / DVD : Jondo Live-CD/DVD offers a secure, pre-configured environment for anonymous surfing and more. It is based on Debian GNU/Linux. The live system contains proxy clients for JonDonym, Tor Onion Router, I2P and Mixmaster remailer. JonDoBrowser is pre-configured for anonymous web surfing, Thunderbird for e-mails, Pidgin for anonymous instant messaging and chats, Parole media player, MAT for cleaning documents and more application are part of the live-cd.Website at : https://anonymous-proxy-servers.net/en/jondo-live-cd.html

Privatix Live System: This is a live distro based on Debian. It is an easy to operate, safe and portable system that can be booted from a cd-rom, an usb flash drive or an external hard drive and ensures your privacy and confidentiality while using the internet and communicating or editing and encrypting sensitive data. Private data and settings, documents, e-mails, or pgp-keys are not saved on the computer that you use but instead those are saved on the encrypted usb flash drive or on the encrypted external hard drive. In case of loss or theft of the data medium your personal data is going to stay protected by a password. Privatix Live System allows for anonymous web surfing using Tor, Firefox and Torbutton.Website at http://www.mandalka.name/privatix/index.html.en

The Amnesic Incognito Live System (TAILS): Based on Debian this is a live distro aimed at preserving your privacy and anonymity. All outgoing connections are forced through the Tor network. Also no trace is left on local storage devices. TAILS comes with bundled software with software like OpenOffice, Claws Mail with OpenPGP and Pidgin.Website at https://tails.boum.org/

Polippix: Polippix is based on  Kubuntu and was made by the IT-Political Association of Denmark as a protest against the anti-terror laws being passed in Denmark. It uses Tor for anonymous Internet surfing, MAC address changer, GnuPG for encryption and driftnet for traffic sniffing.Website at : http://www.polippix.org/

Ubuntu Privacy Remix (UPR): Ubuntu Privacy Remix runs from a modified Live-CD based on Ubuntu.The goal of Ubuntu Privacy Remix is to provide an isolated working environment where sensitive data can be dealt with safely. This is achieved by storing all user data in encrypted form in the removable storage media. Warning: UPR is to be used for encrypting sensitive data and not for anonymous web surfing. It doesn’t allow network connections.Website at : https://www.privacy-cd.org/

Liberte Linux: This is live linux distribution based on Gentoo  that is secure, lightweight and easy to use. It uses Tor for anonymous network communication and has features such as persistent storage on a virtual partition, Netfilter IP firewall and more.Website at : http://dee.su/liberte

Whonix: Whonix is an anonymous general purpose operating system based on Virtual Box, Debian GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible.Website at : http://sourceforge.net/p/whonix/wiki/Home/

Ipredia: IprediaOS is a fast, powerful and stable operating system based on Linux that provides an anonymous environment. All network traffic is automatically and transparently encrypted and anonymized. Many applications are available in IprediaOS, including mail, peer-peer, bittorrent, IRC chat and others. Contrary to other anonymity enhancing Linux distributions, Ipredia does not use Tor but prefers the I2P anonymizing network.Website at : http://www.ipredia.org/

Qubes OS: Qubes is an open source operating system designed to provide strong security for desktop computing. Qubes is based on Xen, X Window System, and Linux, and can run most Linux applications and utilize most of the Linux drivers. Qubes implements Security by Isolation approach by providing a user with ability to easily create many security domains.Website at : http://qubes-os.org/trac

2.    Thanks : http://www.kimpl.com




Sunday, May 12, 2013

What's BUILD-ESSENTIAL equivalent in FEDORA ?

1.    Needing to install the equivalent of build-essential we require in Ubuntu for Fedora is given by this command line in root mode :

yum groupinstall "Development Tools" "Development Libraries"

Difference between Open Source & Free Software ?

1.   More often then not I find most of us swapping these words between each other in general usage...Opensource and free software's are considered  to be one and the same but there is distinct and certain difference between the two....Software available free of charge is not necessarily free from restriction.In the open source community, "free software's  generally means software considered "open source " and without restrictions,in addition to usually being available at no cost.This is in contrast to various "free ware" applications generally found on windows system available solely in a binary executable format,mostly .exe but at no cost. 



2.  Apart from this another term FOSS is available in this lingo...FOSS is an inclusive term that covers both free software and open source software, which despite describing similar development models, have differing cultures and philosophies.Free software focuses on the fundamental freedoms it gives to users, whereas open source software focuses on the perceived strengths of its peer-to-peer development model.

Source : Digital Forensics with open source tools by Cory Altheide and Harlan Carvey and Image Source : http://fullmetallinux.wordpress.com

DATA CENTER's : THE INDIAN SCENE

1.   The phenomenal growth of data in India is rapidly evolving but where is all that data being stored?.....not a big deal to find out that all your FB profiles,your friends list, Google hangout circle of friends and all the enumerable social networking sites on the web stores your data across the globe but not in India....yes that's the truth...every bit of data that your profile holds is actually residing off shores ...what India might be holding is just logs of transaction via various monitoring eyes like CMS as discussed in last post!!!


2.   But actually what debar's any big company with a global presence to set up a data center in apna India...recently there have a explosion of many posts across the web o sphere citing the query of why is it so?...the reasons cited culminate on one reason and that's known as SECURITY....the non existence of "DATA PRIVACY LAWs" in India.....more over the fact that there is presently no existence of GIS routing of laid OFCs and cables maps though there are always plans and proposals for the future. The problem of underground OFC in and around NCR is such that companies are afraid to commit 100% availability of up time because your OFC can get damaged any time owing to so many under construction sites in NCR with dozers digging out OFC like Hollywood monsters.And these diggings are ever to continue coz still there are no laid down GIS mappings that can accurately predict the route and depth of laid out OFCs....and the most important I feel is the promise of state ELECTRIC POWER supply which is surely unreliable during any season....it is indeed surprising that power is still an issue in NCR towns!!!

3.   The future will always remains bright because we always have plans to remove all these problem areas but how and when remains a futuristic answer.GIS routing of cables is an imminent need and so are the data protection laws.By default as on date most of the data centres are coming up in Singapore.

"Singapore offers an ideal combination of reliable infrastructure, a skilled workforce and a commitment to transparent and business-friendly regulations" is how Google explains its choice of the city. Oracle cites "excellent telecommunications infrastructure and efficient, well-qualified manpower".

Much like India set up software technology parks to nurture its IT services and BPO industry, Singapore is setting up a 13-hectare Data Center Park and inviting companies from across the world. It already has some 20 data centre hubs and offers tax and other incentives.

Source here

Wednesday, May 08, 2013

Central Monitoring System : Another step in the Wrong Direction ?


1.    The month of "May" has become started with a "Will" from Indian Government.Now after so many still unresolved issues on Facebook posts and similar things in respect of issues of privacy,it has come up now with Central Monitoring System(CMS).The concept was placed in parliament  some time in December 2012 by the then information technology minister Milind Deora on which the government plans to spend Rs 400 crore and this would "lawfully intercept internet and telephone services"

2.  Now this means that everything we say or text over the phone, write, post or browse over the Internet will be centrally monitored by Indian authorities.Every byte of what is being exchanged by you over the net would be monitored.....but is it actually required?I have doubts per-se owing to the amount of further investment it would require.At a time when Big Data analytics is still maturing,investing so much on monitoring and storing some portion of it pan India would be a herculean task.The key points that I found interesting are dotted below :

- With the lack of privacy laws to protect Indian citizens against potential abuse,this would set another example of wrong feather in the cap.

- CMS has been prepared by the Telecom Enforcement, Resource and Monitoring (TREM) and the Centre for Development of Telematics (C-DoT) and is being manned by the Intelligence Bureau. 

- Without any manual intervention from telecom service providers, CMS will equip government agencies with Direct Electronic Provisioning, filter and provide Call Data Records (CDR) analysis and data mining to identify the personal information and provide alerts of the target numbers.

- The estimated cost of CMS is Rs. 4 billion. It will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. Is their any thing on Mother India Earth left to monitor?

3. Now I fail to understand that how Government expects to monitor cyber criminals by this CMS? Does government actually intend to find out the actual potent and dangerous Cyber Criminals or are they only interested in finding love affairs of local boys and girls!!!coz if the intention is former,would the cyber gang do it without tricks?...without encryption?...without spoofing?...when things like stegnography,TOR,Anonymous etc are still to be deciphered....the cyber crime would go on as it is.The focus should have been on analyzing of what is floating around rather then monitoring open text and messages.

4.  For example if a person with malicious intent,uses Whonix or anonymous kind of OS from a local cyber cafe and then places his message vide a steganographed image that is encrypted,is their any way that this can be deciphered?....technology does not exist today to decipher all this quickly ..still time is there when we reach such a stage....few months back in Dec 2012 when torrent was apparently blocked on directives from Govt Of India,anonymous group had given a open letter shared at http://www.geektech.in/archives/9924.

5. Well it is very clear that the decision makers in such moves are unclear on technological reality but also provisions for a scenario like WAR within....each step in such a direction has to be taken carefully because these are really critical.Additionally,outsourcing such moves to unreliable or may be foreign firms may become a serious threat.....

6.  Well at the end of the day,it is just my view per-sewhich no body is bothered...but the repercussions are serious to be avoided and ignored