Indian Security & Intelligence

Share your thoughts about Indian Security and Intelligence

Tuesday, September 30, 2008

No tangible proof of Muslims' involvement in terrorism

Dr Zafarul-Islam Khan, head of the All India Muslim Majlis-e-Mushawarat, who is a member of this five-member committee, tells Special Correspondent Vicky Nanjappa that anger among the Muslim, especially among the youth, is building up over the continuing demonisation of the community.

All the organisations with you seem to completely disagree with the Delhi police on the Jamia Nagar encounter.

Note : Security forces have to work by Indian rules not by any organization or community. If you can look reports from Pakistan then you will find that each and every Hindu is treated as RAW agent ?. Can you justify ?.
Mr. Khan apply your common sense if China wants to execute an operation in India then Tibetan or People from North East or From Nepal will be more suitable; for ISI or Pakistan Muslims.

I want to clear one point If you really want to fight terrorism then be prepare for some innocent casualties. Security forces are not GOD they have to trace not only the terrorist but also minimize causalities. On other hand terrorist have only one target to maximize causalities.

Role of Digital Forensics

Digital Forensics means the analysis of electronic media to detect forgery or manipulation. It is used to identify possible culprits and also to gather legal evidence to be used for prosecution.

Digital Forensics is a highly-specialised area and if not done using the right skills and tools could lead to evidence being deleted or not usable in the court of law. It is similar to that of criminal forensics and hence needs special skills and tools. Hence, it would be advisable for companies to understand their responsibility and the do's and don'ts during a breach.

Public e-mails systems have limited information about its users and normally provide it to law enforcement agencies on special request. This information is picked up during e-mail ID creation, usage etc.

Most usual information picked up is the source of the Internet Protocol, which can be masked using techniques like using others' WiFi networks. Hence, unless e-mail providers enable higher security mechanisms like special authentication while creating users not much can be done. It is not easy for e-mail providers to do this as, by definition, these e-mail systems are free and open for people to use.

Tips to protect your WiFi from hackers

The wireless fidelity (WiFi) Internet service of telecom companies has come under scanner and security agencies are likely to harden their stance on having a fool-proof mechanism in place at the earliest.

1. Disabling the SSID broadcast. To some extent this makes it difficult for the hacker to detect the presence of a WiFi access point.
2. Enable MAC address filter. Each network interface has a unique MAC address, by filtering it, one can to an extent control which machines can use the access point.
3. Turn on WPA/WEP encryption. This ensures that traffic between a legitimate machine and an access point is not readable.
4. Change default admin passwords for access points.
5. Ensure access points are placed securely. In the centre of a room/office etc to minimise its signal strength outside the office.

Even after following the above precautions, your WiFI account could be compromised and hence, the things to look at are:

* Monitor usage of the access point. Have a clear inventory and knowledge about the position of each access point.
* Monitor the usage of the Internet link, to know what traffic is going out. For example, some corporate block e-mail providers like yahoo or hotmail. Hence, even if the access point is compromised, the hacker may not be able to use public e-mail systems.
* Consider a specific security policy for wireless networks. For example, most companies primarily use wired networks in the office as the primary media. Access points are used in common areas like conferences rooms etc. Hence, strict policies can be deployed on wireless networks as compared to wired networks.

150 killed in Chamunda Devi stampede



We expresses our deep condolences to the victims and families of the dead and wishes speedy recovery to the injured.

Rajasthan Chief Minister Vasundhara Raje, who is praying at Tripura Sundari in Banswara district for her family, party and coming elections failed to manage Navaratri Mela in Jodhpur.

In a virtual repeat of the Naina Devi temple stampede in Himachal Pradesh on August 3, where 162 people were killed, as many as 140 devotees, mostly men, died when they were trampled upon by other pilgrims as doors of the temple opened for worship.

Chamunda Mata, a form of goddess Durga, was the favorite deity of Rao Jodha, the founder of Jodhpur. He brought her idol from the old capital of Mandore near here in 1460 and installed it in the Mehrangarh Fort.

Expressing deep shock and grief over the Chamunda Devi Temple stampede, BJP president Rajnath Singh on Tuesday assured that all steps would be taken to help the victims.

Note :
It was very very shameful not only for BJP but for entire India that Police was reaching there after 45-50 minutes. Every one knows importance of Navaratris and the number of people who can visit sch Temples even though there was no arrangement to control the mob.

Reason :
According to an eyewitness, “The stampede occurred at the temple as the authorities tried to stop pilgrims from entering the temple to make way for a VIP.”

History proves that mostly VIP are responsible for such incidents. In Allahabad, during Kumbh such type of incident took placed and then PM Mr. Jawahar Lal Nehru and Mr. Lal Bahadur Shastri were banned movement of VIPs during Kumbh.

In a situation where Terrorist are searching soft targets such negligence should not be tolerated and strict action should be taken.