karan.1970
BANNED
- Joined
- Jan 3, 2010
- Messages
- 14,781
- Reaction score
- -20
- Country
- Location
are they indian citizens or Pakistani?
Follow along with the video below to see how to install our site as a web app on your home screen.
Note: This feature may not be available in some browsers.
are they indian citizens or Pakistani?
calm down dear...innocent .... My foot . BCH jab khud pakray to millitant jan ham pakrien to masoom.
maa sadqay.
Sada Kuttta , Kuttta, te tawada Kuttta Tommy.
tawadi te
According to the report only one of them is Indian.
some civilians who forget to salute ISI man
Did Pakistans ISI penetrate BSNLs systems?
Govt fears Pakistani intelligence officers tricked a BSNL staffer and installed malware on the telcos networks ------- Published: Wed, Aug 07 2013. 08 15 AM IST
The home ministry also fears that the alleged spyware will enable Pakistan to remotely monitor BSNLs networks and operations, providing the ISI with the capability of disabling critical networks.
Pakistans Inter-Services Intelligence (ISI) may have successfully penetrated the database of state-owned Bharat Sanchar Nigam Ltd (BSNL) and also installed spyware in the telcos systems, Indias interior ministry fears, according to documents reviewed by Mint.
Posing as Major Vijay from Indian Army headquarters, Pakistani intelligence officers had called up a BSNL employee in February this year, and followed it up by email communication with the staffer to obtain critical information. The home ministry is of the view that this email communication led to the ISI successfully installing malware on BSNLs networks, and this may have contaminated the telcos computer systems and compromised the integrity and security of the system.
The home ministry is worried that the spyware may enable Pakistans ISI to identify and access communication links of sensitive organizations, making the latter vulnerable to cyber attacks.
The documents show that the home ministry also fears that the alleged spyware will enable Pakistan to remotely monitor BSNLs networks and operations, providing the ISI with the capability of disabling critical networks.
Indias Intelligence Bureau (IB) referred to this incident in a 22 July note. The incident itself took place on 19 February and IB briefed the Prime Ministers Office, the cabinet secretary, the ministries of home, telecom and IT and external affairs as well as the countrys elite external intelligence agency, the Research and Analysis Wing (RAW), of this development on 25 February.
The mode of operation was as follows. ISI spoofed a landline number (011-23016782) so that the call would appear to originate from Indian Army HQ in Delhi, and called up a BSNL executive on his mobile phone.
Posing as Major Vijay, the ISI officer claimed that the Indian Army was unable to access BSNLs subscriber base from its website, and also sent the BSNL employee a test mail on his Gmail address. The BSNL employee replied to this email by sending three online links, believing that he was helping the Army. The ISI officers then got back claiming they were unable to open the links. Besides, they (ISI) sent some links to the BSNL employee who opened the same on his computer thus enabling the Pakistani agency to allegedly install the malware in the state-owned telcos systems. The BSNL employee also offered to forward the telephone numbers of technical staff handling its call data records project in Chandigarh, Hyderabad, Pune and Kolkata.
IB briefed BSNLs chairman and managing director Rakesh Upadhyay on this incident and asked the telco to identify and remove the alleged spyware from its systems, in addition to asking the company to initiate action against the employee.
The BSNL CMD didnt respond to calls.
To be sure, this is IBs version of events. Mint couldnt independently confirm any of the details, including the claim that the call came from ISI.
BSNLs networks are of strategic importance to India. The state-owned entity is building an alternative communication network for the armed forces, the completion of which will result in the Army, Air Force and Navy vacating additional spectrum for commercial mobile telephony, and routing their communications through this wireline system.
BSNL and Mahanagar Telephone Nigam Ltd (MTNL) are also operating and maintaining the secure network that they are currently building to link all government departments in the country. This network, which will connect about 5,000 government departments when completed, is aimed at ensuring confidentiality of all official communication. Besides, BSNLs networks also link the servers of private mobile phone companies to the upcoming Centralized Monitoring System (CMS), a surveillance platform that will enable the government to monitor all forms of communication from emails to online activity to phone calls, text messages and faxes among others.
Experts see the breach as yet another incident of social engineering posing a threat to corporations and sensitive data.
Social engineering techniques allow a lot of access if an employee is not made aware and trained to screen calls and handle sensitive data properly. Hackers have been able to get blueprints and sensitive data successfully through social engineering, which is made easier nowadays with people not caring about their privacy and personal data available in the public domain in social media sites, said Shree Parthasarathy, executive director, enterprise risk services, Deloitte.
Another challenge is the classification of data. If there was a standard process then Im sure the breach would have been caught. Its relatively easy to solve but poses a major threat at the present time.
Shauvik Ghosh in New Delhi contributed to this story.
on topic, that's the miracle of electronic interceptions. You identify and nab them ASAP
where is proof ? nothing but empty propaganda
5 innocent civilians doomed
Indian asking proofs.. Oh the irony.. India ever cared about providing proofs when they accuse Pakistan for every incident withing 30 minutes..
This post deserves a separate thread for bunch of happy script kiddies....
This post deserves a separate thread for bunch of happy script kiddies....