In 2009, I became extremely concerned with the concept of Unique Identity for various reasons. Connected with many like minded highly educated people who were all concerned.
On 18th May 2010, I started this Blog to capture anything and everything I came across on the topic. This blog with its million hits is a testament to my concerns about loss of privacy and fear of the ID being misused and possible Criminal activities it could lead to.
In 2017 the Supreme Court of India gave its verdict after one of the longest hearings on any issue. I did my bit and appealed to the Supreme Court Judges too through an On Line Petition.
In 2019 the Aadhaar Legislation has been revised and passed by the two houses of the Parliament of India making it Legal. I am no Legal Eagle so my Opinion carries no weight except with people opposed to the very concept.
In 2019, this Blog now just captures on a Daily Basis list of Articles Published on anything to do with Aadhaar as obtained from Daily Google Searches and nothing more. Cannot burn the midnight candle any longer.
"In Matters of Conscience, the Law of Majority has no place"- Mahatma Gandhi
Ram Krishnaswamy
Sydney, Australia.

Aadhaar

The UIDAI has taken two successive governments in India and the entire world for a ride. It identifies nothing. It is not unique. The entire UID data has never been verified and audited. The UID cannot be used for governance, financial databases or anything. It’s use is the biggest threat to national security since independence. – Anupam Saraph 2018

When I opposed Aadhaar in 2010 , I was called a BJP stooge. In 2016 I am still opposing Aadhaar for the same reasons and I am told I am a Congress die hard. No one wants to see why I oppose Aadhaar as it is too difficult. Plus Aadhaar is FREE so why not get one ? Ram Krishnaswamy

First they ignore you, then they laugh at you, then they fight you, then you win.-Mahatma Gandhi

In matters of conscience, the law of the majority has no place.Mahatma Gandhi

“The invasion of privacy is of no consequence because privacy is not a fundamental right and has no meaning under Article 21. The right to privacy is not a guaranteed under the constitution, because privacy is not a fundamental right.” Article 21 of the Indian constitution refers to the right to life and liberty -Attorney General Mukul Rohatgi

“There is merit in the complaints. You are unwittingly allowing snooping, harassment and commercial exploitation. The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except as may be directed by a court for the purpose of criminal investigation.”-A three judge bench headed by Justice J Chelameswar said in an interim order.

Legal scholar Usha Ramanathan describes UID as an inverse of sunshine laws like the Right to Information. While the RTI makes the state transparent to the citizen, the UID does the inverse: it makes the citizen transparent to the state, she says.

Good idea gone bad
I have written earlier that UID/Aadhaar was a poorly designed, unreliable and expensive solution to the really good idea of providing national identification for over a billion Indians. My petition contends that UID in its current form violates the right to privacy of a citizen, guaranteed under Article 21 of the Constitution. This is because sensitive biometric and demographic information of citizens are with enrolment agencies, registrars and sub-registrars who have no legal liability for any misuse of this data. This petition has opened up the larger discussion on privacy rights for Indians. The current Article 21 interpretation by the Supreme Court was done decades ago, before the advent of internet and today’s technology and all the new privacy challenges that have arisen as a consequence.

Rajeev Chandrasekhar, MP Rajya Sabha

“What is Aadhaar? There is enormous confusion. That Aadhaar will identify people who are entitled for subsidy. No. Aadhaar doesn’t determine who is eligible and who isn’t,” Jairam Ramesh

But Aadhaar has been mythologised during the previous government by its creators into some technology super force that will transform governance in a miraculous manner. I even read an article recently that compared Aadhaar to some revolution and quoted a 1930s historian, Will Durant.Rajeev Chandrasekhar, Rajya Sabha MP

“I know you will say that it is not mandatory. But, it is compulsorily mandatorily voluntary,” Jairam Ramesh, Rajya Saba April 2017.

August 24, 2017: The nine-judge Constitution Bench rules that right to privacy is “intrinsic to life and liberty”and is inherently protected under the various fundamental freedoms enshrined under Part III of the Indian Constitution

"Never doubt that a small group of thoughtful, committed citizens can change the World; indeed it's the only thing that ever has"

“Arguing that you don’t care about the right to privacy because you have nothing to hide is no different than saying you don’t care about free speech because you have nothing to say.” -Edward Snowden

In the Supreme Court, Meenakshi Arora, one of the senior counsel in the case, compared it to living under a general, perpetual, nation-wide criminal warrant.

Had never thought of it that way, but living in the Aadhaar universe is like living in a prison. All of us are treated like criminals with barely any rights or recourse and gatekeepers have absolute power on you and your life.

Announcing the launch of the # BreakAadhaarChainscampaign, culminating with events in multiple cities on 12th Jan. This is the last opportunity to make your voice heard before the Supreme Court hearings start on 17th Jan 2018. In collaboration with @no2uidand@rozi_roti.

UIDAI's security seems to be founded on four time tested pillars of security idiocy

1) Denial

2) Issue fiats and point finger

3) Shoot messenger

4) Bury head in sand.

God Save India

Showing posts with label Cyber Security. Show all posts
Showing posts with label Cyber Security. Show all posts

Thursday, May 3, 2018

13430 - Aadhaar biometric data is 100% secure, asserts India’s cybersecurity chief Gulshan Rai - The Hindu


MAY 01, 2018 22:20 IST


Chief Information Security Officer in the Prime Minister's Office Gulshan Rai.   | Photo Credit: K. Murali Kumar

MORE-IN

Increasing cyberthreats are due to too much outsourcing by the banking industry, notes Gulshan Rai

Despite a series of government website failures, and the Supreme Court hearings over Aadhaar data security and privacy, India’s cybersecurity chief, Chief Information Security Officer in the Prime Minister's Office Gulshan Rai tells The Hindu he is confident of India’s cybersecurity systems, and says the government, consumers and civil society must work closer to ensure a balance between national security and privacy is maintained.

There have been a spate of incidents involving government run websites, including the Defence Ministry website, NICNET failures, and the Supreme court website being hacked. What is the reason for this?

There are several trends when it comes to cybersecurity that are leading to these attacks or incidents. The proliferation of IT is increasing in all sectors, including government, industry, everywhere. CERT has seen about one lakh reported cyber incidents in the past year, and the number is rising definitely. The financial sector has emerged as the place the most cyber incidents occur, then the government sector, then others. One startling trend is the spike in cases of cyber incidents in the medical sector.

Indians are facing increasing cyberthreats with bank accounts and identity details being hacked. How are you helping them?

I agree that cases are rising, but it must be remembered that the weakness in the banking industry is due to too much outsourcing for services. These are the weak links that criminals exploit to identify customers who can be taken advantage of. The fact is that technological hacks are less than human fraud in these cases, and consumers need to be better educated about the risks of fraud if they want to protect themselves.
The people who are most vulnerable are those lacking such education. Is the government then pushing too far and fast with its digitalisation goals?

No, there is no contradiction. The government is creating a massive awareness programme, pushing banks to advertise to educate consumers not to give away private information. 

Particularly after demonetisation, we have more than 2.8 billion e-transactions per day. Obviously, people have faith in these transactions. So transactions are increasing, and we need to do more to protect people, but consumers must do their bit too.
One of the big concerns on privacy and security comes from the Aadhaar database. In court, the government said there is “ten foot wall” to protect Aadhaar data, which raised many laughs, but on a serious note, how secure is the Aadhaar data of every Indian?

Yes, it is secure, one hundred per cent. Ultimately, what do you mean by the Aadhar database? There are two parts to it: the demographic data (name, age, address etc) and the biometric database. When people speak of security, they are referring to the biometric database. So far there have been no cases of biometric leaks. The central part has the maximum security, and is kept behind several rings of protection. Even with the worst cases of leaks that have appeared publicly, none have touched this central part. When Jio was attacked, it was their database that leaked, not the Aadhaar database.

But Jio has access to the Aadhaar database, as do others that need Aadhar authentication or “bridging” services?

Yes, but it is their databases that need to be secured better. We do 180 crore (18 million) of Aadhaar authentications everyday, how many breaches have been reported in comparison. I would say that accusations are far more than the reality. It is important for civil society groups to point out places where the government needs to improve, but it is necessary that they do it in a constructive manner.

Shouldn’t these input and authentication services also be taken care of by government agencies then? Does the Aadhaar act, which includes the provision of outsourcing to these companies (Section 8(4)) need to be amended?

These are places where we need to learn from experience, and Aadhaar has already moved to tighten its systems, and weed out such companies where there may be any problem. Let us remember that many countries want us to help them build their database. Why would they, if our system was not secure? We are the only country that has a 10-finger (biometric) database.
You have expressed such confidence, yet you have been quoted as saying you don’t use netbanking and I see you carry a small phone, not a smartphone. How confident are you personally about cybersecurity systems, and what precautions would you suggest to all?


My personal philosophy is that we must reduce our surface of risk. I do use netbanking, but I reduce my risk by using it for a separate account where I keep a small amount, not connected to my main account where I conduct internet transactions. What I said was that I don’t do any international internet banking, because I don’t believe we can control those transactions. I use a smartphone, but only when necessary.

Tuesday, February 13, 2018

12947 - Bad Aadhaar cybersecurity tramples on the Right to Privacy -- Business Today



Sean O' Brien   New Delhi     Last Updated: February 11, 2018  | 18:01 IST

In a landmark ruling last August, the Right to Privacy became the seventh Fundamental Right guaranteed by the Constitution of India. Before the ink was dry on the decision, observers such as myself wondered how the new Aadhaar biometric identification system could possibly be recalibrated to align with it.

In fact, Aadhaar had been central to the discussion about privacy that led to the ruling, as had the Facebook-owned WhatsApp messenger. As Additional Solicitor-General P.S. Narasimha told the Supreme Court in July, "My individual personal data is intimate to me. It is an integral part of my right to lead a life with dignity."  By then, over a billion Indian residents had given their most individually-identifying information to government agency UIDAI.

Those who worried about WhatsApp and Aadhaar at the time were on the right track, but they could not have known the full depths of the problem. Who would have guessed that anyone's Aadhaar data would soon be bought and sold cheaply over WhatsApp? Last year, there were signs that Aadhaar data was being mishandled, and not necessarily by UIDAI. Parallel databases that stored Aadhaar data and used it for identification were recklessly publishing information.

It's well-known that UIDAI doesn't own up to its mistakes, instead threatening reporters who reveal vulnerabilities. UIDAI's web-based portal still has major problems, and it was just revealed this week that any administrator can give anyone else in the world full access to the database backend, often for a price. Not only are a variety of questionable third-party apps available through Google Play that request Aadhaar data, but UIDAI's official mAadhaar app has serious problems.

In an effort to understand these issues more thoroughly, I contacted Baptiste Robert, a French security researcher who goes by the Mr. Robot-inspired pseudonym - Elliot Alderson.  Though Baptiste's work exposing scary flaws in the mAadhaar app has prompted no official response, it has caught the attention of cyber- security superstars like Edward Snowden and Troy Hunt.

As Baptiste said in an e-mail, "UIDAI didn't contact me. The app is still not updated. Regarding how they used the Play store, I'm pretty sure they lost the release keys and so are unable to update the app."

Such incompetency by UIDAI is plausible, given the basic mistakes made in the mAadhaar app's design. Mobile apps are notoriously difficult to secure, and my own digging into app privacy continues to remind me that even 'anonymised' or 'masked' information may identify individuals when databases are correlated. mAadhaar sidesteps this issue with a bizarre twist: the local database on each phone is completely open to attack. This database, which contains a user ID, Aadhaar ID, name, date of birth, gender, address, and photo, supposedly uses a 'random' password. That database password is the exact same for everyone who installs the app, allowing anyone who has physical access (and, potentially, remote access) to your
phone to access the data within seconds. It doesn't stop there. The password to log into the mAadhaar app is also easily bypassed in a few seconds and there's more than one method to do it.

Once the app is running, the password prompt can even be bypassed by force quitting. The problems continue to mount the deeper you look. Baptiste warns users,"The best move is to not install this app. This app is pretty insecure and has not been designed to keep sensitive information."
Notably, there's a debug feature that was left turned on when mAadhaar was published in Google Play, allowing an attacker to repackage imposter versions of the app that keep unencrypted log files on the phone. Such logs could then be grabbed by an attacker with physical access to the device or even remotely through the Internet.
Scam versions of well-known apps propagate quickly, as we saw when Google Play was flooded with fakes of Snowden's Haven app. There doesn't seem to be any initiative on UIDAI's part to crack down on impersonators, and there's also a thriving market of advertising trackers inside third-party Aadhaar apps. Any massive database system will have security holes, and UIDAI's bold attempt to store the personal information and biometrics of 1.3 billion people is no different. On the surface, it might seem that strong centralized control of Aadhaar's systems might have avoided any data breaches or mishandling of information. Aadhaar's problems can't be blamed on government outsiders, however, while UIDAI cosies up so closely with private firms and has even formed a cottage industry of Aadhaar-linked start-ups.
Whenever a security researcher looks at an official government Aadhaar app, there are blatant privacy problems and sloppy cyber-security, such as sending data over the Internet unencrypted.
To compound this, web portals linked to Aadhaar are left open for exploitation. "I managed to have a total access to the website of aadhaarapi.com," says Baptiste, "due to a basic issue in their WordPress installation."
The official response to these problems is, consistently, misdirection or outright denial. Indians are supposed to take comfort that CEO of UIDAI Ajay Bhushan Pandey has 'sleepless nights' over hacking threats while Aadhaar data is 'fully safe and secure with highest encryption'.
Pandey was in full damage-control mode during a special question and answer session on Data Privacy Day, adding his voice to the government agency's long denials of any data breach.
Social media is increasingly a battleground for governments attempting to suppress the voice of their people. If the Indian government is engaged in automated campaigns to quiet criticism of Aadhaar, it is doing a clumsy job. A small army of automated bot accounts sends the exact same tweets under the hashtag #AadhaarMythBuster, though that tag may soon be hijacked by
Aadhaar's critics.
Legal debates about Aadhaar continue to hinge on national defence and public safety questions, and the Supreme Court has just stated that in the face of 'terrorism and money-laundering... a balance between state interest and citizens' privacy right has to be maintained.' Talk of such a 'balance' is a distraction from the legitimate grievances of Indians who have had their Right to Privacy violated by the invasive biometric identification program.
The first step toward justice is admitting UIDAI's cyber-security mistakes. Given the severity of Aadhaar's privacy problems, it's quite likely that mountains of Aadhaar data are circulating on black markets - whether that means thousands, millions, or billions of profiles is impossible to say. As experts have warned, "Thanks to Aadhaar, for the first time in the history of India, there is now a readily available single target for cyber criminals...attacking UIDAI data can potentially cripple Indian businesses and administration in ways that were inconceivable a few years ago. The loss to the economy and citizens in case of such an attack is bound to be incalculable."
Perhaps it's time to stop the bleeding, put an end to the massive identification project, and take the Constitution of India seriously.

Sean O'Brien is a cyber-security researcher and Visiting Fellow at YalePrivacyLab, an initiative of the Information Society Project at Yale Law School.

Saturday, August 12, 2017

11741 - Tata Communications to hire 400 people to combat cyber crime and data theft - Economic Times


BY MEGHA MANDAVIA, ET BUREAU | UPDATED: AUG 07, 2017, 01.01 PM IST


MUMBAI: Tata Communications, the provider of telecommunications solutions and services, will hire 400 people and invest $50 million in its cyber security services business in the next three years, as companies look to combat the rise in cybercrime and data theft in India. 

Tata Communications puts software, appliances, hardware together to make a solution for enterprises to protect their information from cyber security risks. 

“Lot of companies generate a lot more data. All of them are on social media, run marketing, digital campaigns. There is a lot more thrust for companies to be online. They have the same cyber security challenges than individuals have,” Srinivasan CR, Senior Vice President of Global Data Center Services & CDN business, Tata Communications. 

Its managed security division currently accounts for less than 10 percent of revenue but is growing at more than 50 percent a year. The company expects revenue contribution from the division will be in the double digits by 2020. 

“Indian market is fairly nascent because cyber security awareness is growing. It is beginning to be seen an important thing in India. Earlier it used to be after thought or was ignored. It is now being taken seriously with all the discussions happening around Aadhaar, privacy and right to data, ownership of data” said Srinivasan. 

The Indian market is about $200 million comprising of hardware and software applications versus the global market of $130 billion, according to Srinivasan. Addressable market in India would be about $40-$50 million at present but is growing fast. 

“Banking, financial and insurance companies are a big spender on security because banking data is the most critical data we ought to protect. Their budget allocation for security is very high. It is a big focus are for us,” he added. 

Tata Communications will invest in building capability in risk and compliance, cloud security, identity and access management, analytics to predict cyber-attacks and network and infrastructure security. 

It will hire cyber security talent with expertise and experience in application, software development, analytics, big data and cyber security consultants. 80 percent of the 400 new hires will be based in India while the rest will help the company expand geographic footprint in Middle East, Singapore, the United States and the United Kingdom. At present the company has about a workforce of 100 cyber security experts in the division. 

India was one of the many countries severely hit by global cyber-attacks like WannaCry and Petya ransomware recently. The cost of cyber-attacks in India currently stands in excess of $4billion. The losses are a result of leakage of sensitive information, operational disruption, impact on brand image and possible legal proceedings. 

More than 50,300 cyber security incidents like phishing, website intrusions and defacements, virus and denial of service attacks were observed in India last year, according to Indian Computer Emergency Response Team. 

More than 60 per cent of the software used by companies in India is unregulated which poses a threat of cyber attacks, according to business practices firm EY. 

Read more at:

Tuesday, April 18, 2017

11063 - Sex sites racket: Gang used IDs uploaded online to buy SIMs, dupe 2,000 people in Mumbai - Hindustan Times

MUMBAI Updated: Apr 15, 2017 23:57 Ist


HT Correspondent 
Hindustan Times

The cyber police have appealed to people to not upload identity documents such as Aadhaar cards, PAN cards, and election IDs to the internet.(Picture for representation)

Officials from the cyber police station investigating the online fraud case, in which 310 SIM cards were used to dupe people by luring them to websites offering sex, have found that documents used to obtain SIM cards were stolen from the internet.

The SIM cards were used by the five accused to open Paytm accounts (e-wallet accounts), where their ‘clients’ were made to pay Rs999 as a one-time registration fee. After collecting the money, they would close the account and open a new one. They opened several such accounts, duping 2,000 people in just a few months.

The cyber police have appealed to people to not upload identity documents such as Aadhaar cards, PAN cards, and election IDs to the internet.

The accused simply typed words such as ‘Election ID’ on Google, and got their hands on samples as well as genuine documents, which were later used to obtain the SIM cards used in the crime.

Deputy commissioner of police, cyber, Akhileshkumar Singh told HT, “We found out that the accused lifted documents from the internet and used them to obtain SIM cards. We are analysing how many documents they managed to obtain in this manner. The five accused were running this racket under the guise of a private firm. The documents of the people who worked for this firm were also used to obtain SIM cards.”

The SIM cards were from various mobile network service providers, and all of them were issued from Mumbai.
The cyber police refused to divulge further details, saying that the probe is at a nascent stage.

The accused also convinced people to give their documents on the pretext of finding them jobs. These documents were also misused to obtain the SIM cards, said Singh.

Friday, December 9, 2016

10569 - Cyber strikes expose weaknesses in India’s Banking system - Sunday Guardian

By Siddharth Tiwari | NEW DELHI | 30 October, 2016

Experts believe incidents of ATM fraud should be a wake-up call to upgrade the security of our systems.



Attacks on ATMs have emerged as a significant roadblock to the “Digital India” dream of Prime Minister Narendra Modi, with 30 lakh debit cards being reportedly compromised in recent cases of ATM frauds, a development that also points at the pregnable security measures being adopted by banks.
The “ATM attack” episode that came to light after State Bank of India (SBI) announced reissuing of as many as 600,00 lakh ATM cards is considered to be the financial sector’s biggest data breach so far. Apart from SBI, 19 other banks including, Axis, HDFC, ICCI and Yes were made a part of the entire episode in which customers were duped of over Rs 1.3 crore. 
Consequently, the banks took evasive measures like directing debit card users to change their PIN, blocking payments at international locations, reducing the withdrawal limit and issuing cards with magnetic chips instead of magnetic strips on RBI’s directions.
“State Bank Group (SBG) is very sensitive to customers’ interests and accordingly, has proactively taken measures to ensure full security of all Cards which had even the remotest possibility of being at risk. We have already issued about 4 crore EMV Debit Chip Cards,” said an official response from the SBI in reply to this newspaper’s query.
Banking experts believe that frequent exposure of the banking sector to such cyber threats indicate a negligence of the banks in safekeeping the consumers’ money, such as weak cyber security framework, lack of legal framework to cover the victims and outdated standards of communication.

WEAK CYBER SECURITY FRAMEWORK

INTRUSION DETECTION: Thanks to the lapses in the banks’ security measures, these days it is very easy for a hacker to breach the data through simple tricks like spearphishing email with malicious attachment, vishing, smishing, etc.
The current security framework used by banks in India lacks the ability to detect intrusive activity until very late (not until the consumer resisters the complaint).
“You try to open your Gmail account from different locations and immediately you get a mail informing you about the suspected activity. However, in case of banks even if your card is used from a foreign location, the bank fails to detect and subsequently communicate the same to the consumer. This is negligence on the banks’ parts,” Rakshit Tandon, cyber expert and consultant, told The Sunday Guardian.
THIRD PARTY REGULATION: Outsourcing of key ATM operations to third party vendors is very common these days. These third party vendors such as Hitachi payment services use SWITCH software to route data to respective banks and post confirmation from the bank, processes the dispensing of money. While an investigation is on to ascertain the modus operandi, it is reported that this system was bugged, which, in turn, compromised the data. According to the investigation, a malware was detected in certain ATMs that were operated by the third party—Hitachi. This raises a question on the banks’ mechanisms to ensure whether the software used by these third party vendors was bugged or not.
“RBI has also come across instances of fraudulent messages confirming documentary credits being transmitted using SWIFT infrastructure. In another incident involving the shared mobile wallet of a bank, vulnerabilities were observed in the application itself, which led to exploitation by the attackers,” RBI’s Deputy Governor, S.S. Mundra pointed out in his recent lecture.
“The bank was not performing any real time reconciliation and noticed it only when there was a spike in transactions which led to detection during reconciliation,” he added.
PAYMENT SYSTEMS: A few industry experts hold the opinion that the reported compromise of data was possibly due to data breach from the online payment systems.
“The common thing among the 19 banks, whose data were compromised, is the payment system. The report of ATM breach is misdirecting and leading everyone up the wrong tree,” Anupam Saraph, advisor in governance, informatics and strategic planning, told The Sunday Guardian.
Saraph added that all the 19 affected banks were part of the NPCI’s RuPay payment system and Unified Payment Interface (UPI).
“UPI converts your phone into virtual ATM or the Point of Sale and if somebody hacks into this system then the transactions can be made from anywhere in the world. So, in absence of that data from the banks and the circumstantial evidences it was the hacking of the payment system that led to such large scale of data breach,” Saraph added. 
Saraph also highlighted the vulnerabilities involved in using Aadhaar based payment and called for abolishing Aadhaar as the KYC. 
“Several cases of multiple Aadhaar cards created for the same individual are floating around. Therefore, the linking of the Aadhaar card with the banking and financial system exposes customer data hacking. The use of Aadhaar as KYC should be totally scrapped, as else, it can bring down the entire digital financial system of the country” Saraph suggested.
QUESTIONABLE SECURITY AT ATM KIOSKS: Most ATM kiosks are either unattended or poorly attended by security guards. This gives fraudsters a free hand to install cameras, enable key-jammers and planting skimming devices in the ATMs. Even the security cameras installed are easily tricked and more often than never such incidences go unnoticed by the banks. 
“Security at the ATM kiosks is very weak. In majority of the cases, these kiosks are vacant and unattended. Banks must upgrade their security measures by including biometrics and ensuring better surveillance,” said Tandon.
Additionally, a recent research by Kaspersky Lab has highlighted that ATM machines in India use outdated communication standards that expose them to cyber attacks. The international software security group further revealed that widespread use of outdated and insecure software, mistakes in network configuration and a lack of physical security for critical parts of the ATM, make the ATM machine vulnerable to illegal access and jackpotting.
“Many ATMs studied by Kaspersky were running Windows XP, which is no longer supported by Microsoft. This means their security isn’t up to date and malicious malware can be installed without too much effort,” Altaf Halde, Managing Director (South Asia) Kaspersky Lab India, told this correspondent over e-mail.
LACK OF PROPER LEGAL AND SECURITY FRAMEWORK
Unlike in the United States, the victims of cyber breach in India often remain in the dark. In such cases of cyber fraud, the banks make very few details available to the consumers and mostly look for cover ups to avoid any negative sentiments in the market. While this propensity to hide details is understandable, experts assert that keeping the consumer in the dark narrows the scope of improvement.
While banks in countries like the US go through annual forensic auditing, which audits the mechanisms adopted by the banks in mitigating cyber attacks, no such mechanisms are followed in India.
As per industry reports, 80% of organisations including banks, invest all or majority of their investments in mitigating attacks by buying the best of solutions and making their perimetre secure. However, these measures come as a risk management level, which according to industry experts is not enough to ensure strong cyber protection of the consumers.
Talking to The Sunday Guardian about how banks can upgrade their security mechanisms, Altaf Halde pointed out the need of a 360 degree approach to address all security requirements. A four-point approach highlighted by Halde includes, (i) preventing the penetration of malware inside the perimeter, identify and remediate it at an early stage; (ii) detecting the breach incident when penetration attempt is successful; (iii) reacting properly post-breach with a minimal impact on resources and mitigate the aftermath effects; and (iv) empowering customers to predict forthcoming incidents by analysing the evolution of threats and breach tactics.
Halde further called for increasing the scope for covering multiple industry verticals to address the ever increasing cyber crimes/ATM frauds/ data breach.
“The need of the hour is a strong public private partnership to fight the increasing cyber crime situation. As per media sources, RBI has strong compliance modalities for banks, but the scope needs to be increased by other regulatory bodies for covering other industry verticals as well. All the affected parties need to understand that this does not have to be only a ‘tick mark’ activity, but it has to done keeping in mind the need to protect all stakeholders,” said Halde.
WAKE-UP CALL
After several media reports and cyber experts brought attention towards the existing lapses in our digital financial ecosystem, India’s central banking institution, Reserve Bank of India, issued strict directives such as asking banks to resolve all complaints within 90 days. It also ordered a forensic probe into the matter, reports of which are expected to be out by next month.
The Ministry of Finance too has intervened and has asked for detailed reports from the banks and the regulatory bodies. 
While the National Payments Corporation of India (NPCI) and RBI have stated in their respective official statements that there is no need to panic and remedial actions have already taken, cyber experts believe that this incident should be seen as wake-up call to upgrade the security framework of our financial systems.
“Effective public-private partnerships are absolutely essential in the fight against cybercrime to maintain global security. As we are seeing more and more sophisticated attacks—many of which have a global impact—partnerships and information exchange between cyber security companies and the private sector are becoming increasingly valuable,” said Altaf.
Meanwhile, the NPCI has urged debit card users to exercise caution such as changing ATM PINs periodically, keeping bank details confidential and in case of any suspected activity informing the bank immediately, among others.

There is 1 Comment

Submitted by Chinmoy Das (not verified) on Mon, 2016-10-31 10:36
@Anupam Saraph: UPI allows debit based on a secured credential that can be authenticated only by the account holder from his mobile at present. So, a debit cannot happen through UPI without the online intervention of the account holder. Also, the PIN that is used the transaction is encrypted using multiple layer of encryption using multiple algorithms. Even if a PIN is intercepted it cannot be replayed as some unique device validation is done before the debit is processed.

Wednesday, June 15, 2016

10137 - A beating heart for faster money access - Live Mint


Banks are working on biometric verification, such as fingerprint and voice recognition, to make banking safer

Vivina Viswanathan


Let’s say you need to log in to your bank account, withdraw cash from an ATM or transfer money to someone. How do you complete the transaction? 

Mostly by entering your personal identification number (PIN) or password, depending on the type of transaction. What if you don’t have to enter a PIN or password? 

What if you can access your online banking using a wearable device that reads your heart beat? 

Everyone’s heartbeat is unique. And taking advantage of this unique identity feature, Toronto-based biometric and authentication technology company, Nymi, is experimenting with wearables. Here you can wear a wristband that transmits signals and identifies you as a user allowing you to bank online account. “In the coming year, biometric and authentication solutions are going to be the big changes in the financial services space. For me, the most interesting one is heart beat monitoring. You can simply measure it by wearing a device. Right now (being) experimented in Canada, this (technology) will become prevalent as it is secure and frictionless,” said 

Warren Mead, partner, global co-lead-fintech, KPMG Llp.
It may be too early to experience heart beat monitoring as a way to access your banking account in India, but Indian banks are slowly gearing up to use biometric technology in banking activities. Mint Money takes a look at the evolving cyber security space in banking.

The regulatory push
Globally, financial institutions are considered as one of the most vulnerable to cyber-attacks. In India, the use of technology for financial services has grown rapidly. The Reserve Bank of India (RBI), on 2 June, directed banks to immediately frame cybersecurity policies approved by their respective boards where the policies should discuss strategy, acceptable levels of risks and appropriate approaches to combat cybersecurity threats. “The policy should focus on aspects such as setting up security operations centres for continuous surveillance and management of cyber threats and protection of customer information,” the central bank noted in its statement. Banks have been asked to send a confirmation to RBI regarding setting up such a policy, by 30 September. Banks are also required to conduct an immediate study of any major gaps in preparedness against cyberattacks, propose measures to tackle them, check effectiveness of the proposed measures and set milestones with timelines for implementing them.


Moving to biometric
According to a KPMG report, FinTech in India-A global growth story, leading private sector banks are introducing innovative technologies to make banking more secure. Since securing an account with a powerful authentication tool is one of the important steps, globally, banks are working on technologies capable of using a customer’s unique characteristics for identity authentication. “The pressing need for financial institutions to deploy biometric technologies and adopt cybersecurity solutions is evident by the fact that the global cybersecurity market invested about $75 billion in 2015, which is expected to reach $175 billion by 2020,” notes Neha Punater, partner, management consulting, KPMG, in the report.

But why are banks looking at biometric? “Digitisation in banking is leading to a significant amount of data being generated. Banks need to speedily develop a strategic framework and policy mechanism to help ensure data security as well as promote the use of biometric technologies to prepare for future cyber-attacks,” Punater notes in the report.

Currently, some Indian banks are using fingerprint recognition and voice recognition.

Fingerprint recognition: In India, the use of fingerprint identification is linked to Aadhaar. In April, DCB Bank Ltd had launched a service using which you can withdraw cash from ATMs without your card and PIN. Your Aadhaar should be linked to your bank account. To use this facility, you have to enter your Aadhaar number and authenticate it with your fingerprint to withdraw cash. DBS Bank recently also launched a mobile banking app using which you can open a bank account by authenticating your fingerprint at a biometric device. Meanwhile, HDFC Bank Ltd is working on a similar product with FingPay of Tapits Technologies Pvt. Ltd, on biometric authentication at point-of-sale terminals. With this service, you can enter your Aadhaar number and scan your finger at the merchant’s outlet to make a payment.

Voice recognition: Bigger private sector banks such as ICICI Bank Ltd and HDFC Bank are also working on using voice recognition technology to authenticate customers based on their speech patterns. Last year, ICICI Bank had launched a voice recognition service. A person’s voice is identified based on parameters such as modulation, accent, diction and intonation. At the back end, the bank takes your voice print and authenticates it. The next time you have to ‘login’, your voice sample is compared with the one in the bank’s database. The customer needs to call from her registered mobile phone so that the voice recognition system can identify her. Industry experts say that HDFC Bank is also planning to launch a similar feature in the next 4-6 months.

What fintech companies can offer to banks
Besides working with information technology companies, banks are also closely working with financial technology (fintech) companies to help curb cyber fraud. For example, CustomerXPs, a company that provides fraud management solution for banks, works with banks to protect them and their customers from fraud by giving real-time analysis. “As a customer, you can interact with a bank through multiple channels, which means that fraud can happen through multiple channels,” said Rivi Varghese, chief executive officer, CustomerXPs Software Pvt. Ltd. Say, if a transaction happens on your credit card from Greece, and just minutes before it you withdraw cash in Mumbai through an ATM, the bank should be able to link with other channels to stop or trace this transaction. “If the bank works in isolation, it will not be able to link the two (transactions). However, if the bank has a view of all your transactions, it can prevent the fraud based on your transaction behaviour,” he added.

What should you do?
Banks are using various tools to tackle cyber fraud. However, as a customer, you too need to be careful. Currently, biometric technology for identification and authentication is not as widely used as PIN and password. So, never share your password or PIN with anyone. Change your passwords frequently and never use the same password for all websites. If you use banking apps, install them only from the authorised app store. If you use Internet banking, enable anti-virus and malware protection softwares. Use virtual cards for online transactions.
“Biometric is still at a nascent stage because initially the investment on technology was huge and the error rate was high. However, technology has evolved now and banks have started using biometric,” said Amit Jaju, executive director, cyber forensics, data analytics, software licence forensics, EY.
It may be a while before banks deploy biometric technology in a big way in India. But when it happens, your transactions will become more secure. Till then, you are your own security. Follow the simple steps mentioned earlier to keep your money safe.

Tuesday, May 10, 2016

9927 - Cyber Security - Everybody's problem, but who's responsible? - Linkedin

CEO, Enterprise Architect, Strategist, Adjunct Prof.

  • Apr 30, 201638 views
Cyber security or the lack thereof has topped the agenda, in many surveys, from Government leaders to CEOs to CIOs to a humble consumer. It is often treated as a technology issue or an IT problem but its recognition as a corporate threat and associated risks and responsibility goes all the way to the top. Often, it is everybody’s problem, but nobody seems responsible.
Here are 9 steps the business and IT leaders, at all levels, need to follow to fulfil cyber security related obligations, duties and responsibilities.

1. Clearly understand how to protect an organization’s assets from cyber-attacks.
Given the damaging nature of cyber-security, it is foremost critical to understand it fully and implement appropriate protections for organisations assets. Learn from mistakes, us and others have committed and harden the assets within and outside the enterprise from that experience. Cyber Intelligence takes this awareness and action a step further to predict and manage cyber threats. Invest in it.

2. Understand reputation, legal and regulatory risks associated with cyber security breaches.
As we have seen from notorious attacks on many well known corporations, business reputation damage is the major fall-out from cyber attacks. Rightly so. Who can trust the business where your private data as customers and partners are open to criminal manipulations?

Increasingly, immediate reputational damage, even if well managed, fall further foul of legal and regulatory risks, attracting major enquiries and penalties from governmental agencies, industry watch-dogs and stakeholder groups.

3. Identify cyber security as an important requirement of enterprise risk management and governance framework.
Often, cyber-security is an afterthought, a result of an attack or panic caused by a regulatory compulsion. Leaders need to identify cyber-security as a critical business requirement, an integral part of Governance, Risk and Compliance management process. Business Architects need to include cyber-security as integral requirement of building business/operating models and capabilities. Given the rapid push in digital transformations and associated business process changes, cyber security needs to be part of its design and not a bolt-on fix.

4. Include cyber security in the CEO’s risk management objectives and performance goals. Do not just delegate responsibility to the CIOs.
Cyber security needs to be part of the corporate strategy and the structure, to be an effective protection. The culture needs to reflect this change. The best way to make this possible is to include cyber-security as part of CEO’s risk management objective and performance goals. If not, it gets pushed down to technology, to CIO and eventually to some IT security analyst. KPIs do get percolated down, but the Board and CEOs need to own this as part of their performance goals.

5. Gain a good understanding of the organization’s action plans in the event of major cyber-attacks and disruption of business services. Put these plans to the test at least twice a year.
Once top-down KPIs are clear, the Action Plans for attack prediction and recovery falls into place. Plans need to be tested at least twice a year as part of business continuity.

6. Ensure all cyber security breaches (no matter how small) are reported to the board of directors with a full explanation of actions taken.
In spite of preparedness, attacks do occur as cyber criminals become more sophisticated and more unpredictable. Thus an ongoing breach escalation and management is critical to ensure senior leaders right up to board of directors and Chair persons are aware of the problem and solutions. This helps ongoing corporate wide learning and evolution.

7. Leverage internal audit and external audit functions to review cyber security.
Just as audit and control functions are regular and common for various processes, they must be applied to cyber-security as well. This cyber auditors, both internal and external need to bring the latest assessments to strengthen corporate assets.

8. Use independent, external expertise to provide advice and guidance to CXOs about cyber security and technology governance matters.
CXOs and the Board of Directors need twice a year update on cyber-security, from threats levels, intelligence to protection and plans. These are critical governance matters that CXOs need to keep up-to-date, so they can invest in right strategies and capabilities. This sends a strong message to all the stakeholders and threat-actors that the corporation is serious about cyber-security and its assets and people are well protected.

9. Educate all stakeholders on cyber security awareness and action
Prime all the stakeholders, internal and external, connecting to the enterprise on the cyber security preparedness, precautions, plans, procedures and alerts. Given the agility and scale of these attacks, a system of quick alertness and action is vital to seal any cracks. Learn and keep strengthening the defences.

I wish to acknowledge seminars and articles by The Australian Institute of Company Directors (AICD) on Cyber Security. I’m a member of AICD.

Monday, April 4, 2016

9728 - How to Hack an Election - bloomberg


Andrés Sepúlveda rigged elections throughout Latin America for almost a decade. He tells his story for the first time.

By Jordan Robertson, Michael Riley, and Andrew Willis | March 31, 2016

Photographs by Juan Arredondo
From 

It was just before midnight when Enrique Peña Nieto declared victory as the newly elected president of Mexico. Peña Nieto was a lawyer and a millionaire, from a family of mayors and governors. His wife was a telenovela star. He beamed as he was showered with red, green, and white confetti at the Mexico City headquarters of the Institutional Revolutionary Party, or PRI, which had ruled for more than 70 years before being forced out in 2000. Returning the party to power on that night in July 2012, Peña Nieto vowed to tame drug violence, fight corruption, and open a more transparent era in Mexican politics.

Two thousand miles away, in an apartment in Bogotá’s upscale Chicó Navarra neighborhood, Andrés Sepúlveda sat before six computer screens. Sepúlveda is Colombian, bricklike, with a shaved head, goatee, and a tattoo of a QR code containing an encryption key on the back of his head. On his nape are the words “
” and “” stacked atop each other, dark riffs on coding. He was watching a live feed of Peña Nieto’s victory party, waiting for an official declaration of the results.

Featured in Bloomberg Businessweek, April 4, 2016. Subscribe now.

When Peña Nieto won, Sepúlveda began destroying evidence. He drilled holes in flash drives, hard drives, and cell phones, fried their circuits in a microwave, then broke them to shards with a hammer. He shredded documents and flushed them down the toilet and erased servers in Russia and Ukraine rented anonymously with Bitcoins. He was dismantling what he says was a secret history of one of the dirtiest Latin American campaigns in recent memory.


For eight years, Sepúlveda, now 31, says he traveled the continent rigging major political campaigns. With a budget of $600,000, the Peña Nieto job was by far his most complex. He led a team of hackers that stole campaign strategies, manipulated social media to create false waves of enthusiasm and derision, and installed spyware in opposition offices, all to help Peña Nieto, a right-of-center candidate, eke out a victory. 

On that July night, he cracked bottle after bottle of Colón Negra beer in celebration. As usual on election night, he was alone.

Sepúlveda’s career began in 2005, and his first jobs were small—mostly defacing campaign websites and breaking into opponents’ donor databases. Within a few years he was assembling teams that spied, stole, and smeared on behalf of presidential campaigns across Latin America. He wasn’t cheap, but his services were extensive. 

For $12,000 a month, a customer hired a crew that could hack smartphones, spoof and clone Web pages, and send mass e-mails and texts. The premium package, at $20,000 a month, also included a full range of digital interception, attack, decryption, and defense. The jobs were carefully laundered through layers of middlemen and consultants. Sepúlveda says many of the candidates he helped might not even have known about his role; he says he met only a few.

His teams worked on presidential elections in Nicaragua, Panama, Honduras, El Salvador, Colombia, Mexico, Costa Rica, Guatemala, and Venezuela. Campaigns mentioned in this story were contacted through former and current spokespeople; none but Mexico’s PRI and the campaign of Guatemala’s National Advancement Party would comment.

As a child, he witnessed the violence of Colombia’s Marxist guerrillas. As an adult, he allied with a right wing emerging across Latin America. He believed his hacking was no more diabolical than the tactics of those he opposed, such as Hugo Chávez and Daniel Ortega.

Many of Sepúlveda’s efforts were unsuccessful, but he has enough wins that he might be able to claim as much influence over the political direction of modern Latin America as anyone in the 21st century. “My job was to do actions of dirty war and psychological operations, black propaganda, rumors—the whole dark side of politics that nobody knows exists but everyone can see,” he says in Spanish, while sitting at a small plastic table in an outdoor courtyard deep within the heavily fortified offices of Colombia’s attorney general’s office. He’s serving 10 years in prison for charges including use of malicious software, conspiracy to commit crime, violation of personal data, and espionage, related to hacking during Colombia’s 2014 presidential election. He has agreed to tell his full story for the first time, hoping to convince the public that he’s rehabilitated—and gather support for a reduced sentence.

Usually, he says, he was on the payroll of Juan José Rendón, a Miami-based political consultant who’s been called the Karl Rove of Latin America. Rendón denies using Sepúlveda for anything illegal, and categorically disputes the account Sepúlveda gave Bloomberg Businessweek of their relationship, but admits knowing him and using him to do website design. “If I talked to him maybe once or twice, it was in a group session about that, about the Web,” he says. “I don’t do illegal stuff at all. There is negative campaigning. They don’t like it—OK. But if it’s legal, I’m gonna do it. I’m not a saint, but I’m not a criminal.” While Sepúlveda’s policy was to destroy all data at the completion of a job, he left some documents with members of his hacking teams and other trusted third parties as a secret “insurance policy.”

Sepúlveda provided Bloomberg Businessweek with what he says are e-mails showing conversations between him, Rendón, and Rendón’s consulting firm concerning hacking and the progress of campaign-related cyber attacks. Rendón says the e-mails are fake. An analysis by an independent computer security firm said a sample of the e-mails they examined appeared authentic. Some of Sepúlveda’s descriptions of his actions match published accounts of events during various election campaigns, but other details couldn’t be independently verified. One person working on the campaign in Mexico, who asked not to be identified out of fear for his safety, substantially confirmed Sepúlveda’s accounts of his and Rendón’s roles in that election.

Sepúlveda says he was offered several political jobs in Spain, which he says he turned down because he was too busy. On the question of whether the U.S. presidential campaign is being tampered with, he is unequivocal. “I’m 100 percent sure it is,” he says.

Sepúlveda grew up poor in Bucaramanga, eight hours north of Bogotá by car. His mother was a secretary. His father was an activist, helping farmers find better crops to grow than coca plants, and the family moved constantly because of death threats from drug traffickers. His parents divorced, and by the age of 15, after failing school, he went to live with his father in Bogotá and used a computer for the first time. He later enrolled in a local technology school and, through a friend there, learned to code.

In 2005, Sepúlveda’s older brother, a publicist, was helping with the congressional campaigns of a party aligned with then-Colombian President Alvaro Uribe. Uribe was a hero of the brothers, a U.S. ally who strengthened the military to fight the Revolutionary Armed Forces of Colombia (FARC). During a visit to party headquarters, Sepúlveda took out his laptop and began scanning the office’s wireless network. He easily tapped into the computer of Rendón, the party’s strategist, and downloaded Uribe’s work schedule and upcoming speeches. Sepúlveda says Rendón was furious—then hired him on the spot. Rendón says this never happened.

For decades, Latin American elections were rigged, not won, and the methods were pretty straightforward. Local fixers would hand out everything from small appliances to cash in exchange for votes. But in the 1990s, electoral reforms swept the region. Voters were issued tamper-proof ID cards, and nonpartisan institutes ran the elections in several countries. The modern campaign, at least a version North Americans might recognize, had arrived in Latin America.

Rendón had already begun a successful career based partly, according to his critics—and more than one lawsuit—on a mastery of dirty tricks and rumormongering. (In 2014, El Salvador’s then-President Carlos Mauricio Funes accused Rendón of orchestrating dirty war campaigns throughout Latin America. Rendón sued in Florida for defamation, but the court dismissed the case on the grounds that Funes couldn’t be sued for his official acts.) The son of democracy activists, he studied psychology and worked in advertising before advising presidential candidates in his native Venezuela. After accusing then-President Chávez of vote rigging in 2004, he left and never went back.

Sepúlveda’s first hacking job, he says, was breaking into an Uribe rival’s website, stealing a database of e-mail addresses, and spamming the accounts with disinformation. He was paid $15,000 in cash for a month’s work, five times as much as he made in his previous job designing websites.

Sepúlveda was dazzled by Rendón, who owned a fleet of luxury cars, wore big flashy watches, and spent thousands on tailored coats. Like Sepúlveda, he was a perfectionist. His staff was expected to arrive early and work late. “I was very young,” Sepúlveda says. “I did what I liked, I was paid well and traveled. It was the perfect job.” But more than anything, their right-wing politics aligned. Sepúlveda says he saw Rendón as a genius and a mentor. A devout Buddhist and practitioner of martial arts, according to his own website, Rendón cultivated an image of mystery and menace, wearing only all-black in public, including the occasional samurai robe. On his website he calls himself the political consultant who is the “best paid, feared the most, attacked the most, and also the most demanded and most efficient.” Sepúlveda would have a hand in that.

Rendón, says Sepúlveda, saw that hackers could be completely integrated into a modern political operation, running attack ads, researching the opposition, and finding ways to suppress a foe’s turnout. As for Sepúlveda, his insight was to understand that voters trusted what they thought were spontaneous expressions of real people on social media more than they did experts on television and in newspapers. He knew that accounts could be faked and social media trends fabricated, all relatively cheaply. He wrote a software program, now called Social Media Predator, to manage and direct a virtual army of fake Twitter accounts. The software let him quickly change names, profile pictures, and biographies to fit any need. Eventually, he discovered, he could manipulate the public debate as easily as moving pieces on a chessboard—or, as he puts it, “When I realized that people believe what the Internet says more than reality, I discovered that I had the power to make people believe almost anything.”


Sepúlveda’s head. The upper tattoo is a QR code containing an encryption key.


According to Sepúlveda, his payments were made in cash, half upfront. When he traveled, he used a fake passport and stayed alone in a hotel, far from campaign staff. No one could bring a smartphone or camera into his room.

Most jobs were initiated in person. Sepúlveda says Rendón would give him a piece of paper with target names, e-mail addresses, and phone numbers. Sepúlveda would take the note to his hotel, enter the data into an encrypted file, then burn the page or flush it down the toilet. If Rendón needed to send an e-mail, he used coded language. To “caress” meant to attack; to “listen to music” meant to intercept a target’s phone calls.
Rendón and Sepúlveda took pains not to be seen together. They communicated over encrypted phones, which they replaced every two months. Sepúlveda says he sent daily progress reports and intelligence briefings from throwaway e-mail accounts to a go-between in Rendón’s consulting firm.
Each job ended with a specific, color-coded destruct sequence. On election day, Sepúlveda would purge all data classified as “red.” Those were files that could send him and his handlers to prison: intercepted phone calls and e-mails, lists of hacking victims, and confidential briefings he prepared for the campaigns. All phones, hard drives, flash drives, and computer servers were physically destroyed. Less-sensitive “yellow” data—travel schedules, salary spreadsheets, fundraising plans—were saved to an encrypted thumb drive and given to the campaigns for one final review. A week later it, too, would be destroyed.
For most jobs, Sepúlveda assembled a crew and operated out of rental homes and apartments in Bogotá. He had a rotating group of 7 to 15 hackers brought in from across Latin America, drawing on the various regions’ specialties. Brazilians, in his view, develop the best malware. Venezuelans and Ecuadoreans are superb at scanning systems and software for vulnerabilities. Argentines are mobile intercept artists. Mexicans are masterly hackers in general but talk too much. Sepúlveda used them only in emergencies.

The assignments lasted anywhere from a few days to several months. In Honduras, Sepúlveda defended the communications and computer systems of presidential candidate Porfirio Lobo Sosa from hackers employed by his competitors. In Guatemala, he digitally eavesdropped on six political and business figures, and says he delivered the data to Rendón on encrypted flash drives at dead drops. (Sepúlveda says it was a small job for a client of Rendón’s who has ties to the right-wing National Advancement Party, or PAN. The PAN says it never hired Rendón and has no knowledge of any of his claimed activities.) In Nicaragua in 2011, Sepúlveda attacked Ortega, who was running for his third presidential term. In one of the rare jobs in which he was working for a client other than Rendón, he broke into the e-mail account of Rosario Murillo, Ortega’s wife and the government’s chief spokeswoman, and stole a trove of personal and government secrets.

In Venezuela in 2012, the team abandoned its usual caution, animated by disgust with Chávez. With Chávez running for his fourth term, Sepúlveda posted an anonymized YouTube clip of himself rifling through the e-mail of one of the most powerful people in Venezuela, Diosdado Cabello, then president of the National Assembly. He also went outside his tight circle of trusted hackers and rallied Anonymous, the hacktivist group, to attack Chávez’s website.

Dirty Work
Colombia
Supported reelection of Alvaro Uribe for president, 2006; congressional elections, 2006; failed campaign of Oscar Iván Zuluaga for president, 2014

Honduras
Supported Porfirio Lobo Sosa, elected president 2009
Nicaragua
Against Daniel Ortega, 2011
Mexico
Supported Enrique Peña Nieto, over a three-year period
Venezuela
Against Chávez and Maduro in 2012 and 2013
Costa Rica
Supported Johnny Araya, failed presidential candidate for center-left National Liberation Party, 2014 election
Panama
Supported Juan Carlos Navarro, presidental candidate for the center-left Democratic Revolutionary Party, 2014 election

After Sepúlveda hacked Cabello’s Twitter account, Rendón seemed to congratulate him. “Eres noticia :)”—you’re news—he wrote in a Sept. 9, 2012, e-mail, linking to a story about the breach. (Rendón says he never sent such an e-mail.) Sepúlveda provided screen shots of a dozen e-mails, and many of the original e-mails, showing that from November 2011 to September 2012 Sepúlveda sent long lists of government websites he hacked for various campaigns to a senior member of Rendón’s consulting firm, lacing them with hacker slang (“Owned!” read one). Two weeks before Venezuela’s presidential election, Sepúlveda sent screen shots showing how he’d hacked Chávez’s website and could turn it on and off at will.

Chávez won but died five months later of cancer, triggering an emergency election, won by Nicolás Maduro. The day before Maduro claimed victory, Sepúlveda hacked his Twitter account and posted allegations of election fraud. Blaming “conspiracy hackings from abroad,” the government of Venezuela disabled the Internet across the entire country for 20 minutes.

In Mexico, Sepúlveda’s technical mastery and Rendón’s grand vision for a ruthless political machine fully came together, fueled by the huge resources of the PRI. The years under President Felipe Calderón and the National Action Party (also, as in Partido Acción Nacional, PAN) were plagued by a grinding war against the drug cartels, which made kidnappings, street assassinations, and beheadings ordinary. As 2012 approached, the PRI offered the youthful energy of Peña Nieto, who’d just finished a successful term as governor.

Sepúlveda didn’t like the idea of working in Mexico, a dangerous country for involvement in public life. But Rendón persuaded him to travel there for short trips, starting in 2008, often flying him in on his private jet. Working at one point in Tabasco, on the sweltering Gulf of Mexico, Sepúlveda hacked a political boss who turned out to have connections to a drug cartel. After Rendón’s security team learned of a plan to kill Sepúlveda, he spent a night in an armored Chevy Suburban before returning to Mexico City.

Mexico is effectively a three-party system, and Peña Nieto faced opponents from both right and left. On the right, the ruling PAN nominated Josefina Vázquez Mota, its first female presidential candidate. On the left, the Democratic Revolution Party, or PRD, chose Andrés Manuel López Obrador, a former Mexico City mayor.

Early polls showed Peña Nieto 20 points ahead, but his supporters weren’t taking chances. Sepúlveda’s team installed malware in routers in the headquarters of the PRD candidate, which let him tap the phones and computers of anyone using the network, including the candidate. He took similar steps against PAN’s Vázquez Mota. When the candidates’ teams prepared policy speeches, Sepúlveda had the details as soon as a speechwriter’s fingers hit the keyboard. Sepúlveda saw the opponents’ upcoming meetings and campaign schedules before their own teams did.

Money was no problem. At one point, Sepúlveda spent $50,000 on high-end Russian software that made quick work of tapping Apple, BlackBerry, and Android phones. He also splurged on the very best fake Twitter profiles; they’d been maintained for at least a year, giving them a patina of believability.

Sepúlveda managed thousands of such fake profiles and used the accounts to shape discussion around topics such as Peña Nieto’s plan to end drug violence, priming the social media pump with views that real users would mimic. For less nuanced work, he had a larger army of 30,000 Twitter bots, automatic posters that could create trends. One conversation he started stoked fear that the more López Obrador rose in the polls, the lower the peso would sink. 

Sepúlveda knew the currency issue was a major vulnerability; he’d read it in the candidate’s own internal staff memos.
Just about anything the digital dark arts could offer to Peña Nieto’s campaign or important local allies, Sepúlveda and his team provided. On election night, he had computers call tens of thousands of voters with prerecorded phone messages at 3 a.m. in the critical swing state of Jalisco. The calls appeared to come from the campaign of popular left-wing gubernatorial candidate Enrique Alfaro Ramírez. That angered voters—that was the point—and Alfaro lost by a slim margin. In another governor’s race, in Tabasco, Sepúlveda set up fake Facebook accounts of gay men claiming to back a conservative Catholic candidate representing the PAN, a stunt designed to alienate his base. “I always suspected something was off,” the candidate, Gerardo Priego, said recently when told how Sepúlveda’s team manipulated social media in the campaign.

In May, Peña Nieto visited Mexico City’s Ibero-American University and was bombarded by angry chants and boos from students. The rattled candidate retreated with his bodyguards into an adjacent building, hiding, according to some social media posts, in a bathroom. The images were a disaster. López Obrador soared.

The PRI was able to recover after one of López Obrador’s consultants was caught on tape asking businessmen for $6 million to fund his candidate’s broke campaign, in possible violation of Mexican laws. Although the hacker says he doesn’t know the origin of that particular recording, Sepúlveda and his team had been intercepting the communications of the consultant, Luis Costa Bonino, for months. (On Feb. 2, 2012, Rendón appears to have sent him three e-mail addresses and a cell phone number belonging to Costa Bonino in an e-mail called “Job.”) Sepúlveda’s team disabled the consultant’s personal website and directed journalists to a clone site. There they posted what looked like a long defense written by Costa Bonino, which casually raised questions about whether his Uruguayan roots violated Mexican restrictions on foreigners in elections. Costa Bonino left the campaign a few days later. He indicated recently that he knew he was being spied on, he just didn’t know how. It goes with the trade in Latin America: “Having a phone hacked by the opposition is not a novelty. When I work on a campaign, the assumption is that everything I talk about on the phone will be heard by the opponents.”

The press office for Peña Nieto declined to comment. A spokesman for the PRI said the party has no knowledge of Rendón working for Peña Nieto’s or any other PRI campaign. Rendón says he has worked on behalf of PRI candidates in Mexico for 16 years, from August 2000 until today.


Juan José Rendón, political consultant.
Photographer: El Comercio/GDA/ZUMA PRESS

In 2012, Colombian President Juan Manuel Santos, Uribe’s successor, unexpectedly restarted peace talks with the FARC, hoping to end a 50-year war. Furious, Uribe, whose father was killed by FARC guerrillas, created a party and backed an alternative candidate, Oscar Iván Zuluaga, who opposed the talks.

Rendón, who was working for Santos, wanted Sepúlveda to join his team, but Sepúlveda turned him down. He considered Rendón’s willingness to work for a candidate supporting peace with the FARC a betrayal and suspected the consultant was going soft, choosing money over principles. Sepúlveda says he was motivated by ideology first and money second, and that if he wanted to get rich he could have made a lot more hacking financial systems than elections. For the first time, he decided to oppose his mentor.

Sepúlveda went to work for the opposition, reporting directly to Zuluaga’s campaign manager, Luis Alfonso Hoyos. (Zuluaga denies any knowledge of hacking; Hoyos couldn’t be reached for comment.) Together, Sepúlveda says, they came up with a plan to discredit the president by showing that the guerrillas continued to traffic in drugs and violence even as they talked about peace. Within months, Sepúlveda hacked the phones and e-mail accounts of more than 100 militants, including the FARC’s leader, Rodrigo Londoño, also known as Timochenko. After assembling a thick file on the FARC, including evidence of the group’s suppression of peasant votes in the countryside, Sepúlveda agreed to accompany Hoyos to the offices of a Bogotá TV news program and present the evidence.
It may not have been wise to work so doggedly and publicly against a party in power. A month later, Sepúlveda was smoking on the terrace of his Bogotá office when he saw a caravan of police vehicles pull up. Forty black-clad commandos raided the office to arrest him. Sepúlveda blamed his carelessness at the TV station for the arrest. He believes someone there turned him in. In court, he wore a bulletproof vest and sat surrounded by guards with bomb shields. In the back of the courtroom, men held up pictures of his family, making a slashing gesture across their throats or holding a hand over their mouths—stay silent or else. Abandoned by former allies, he eventually pleaded guilty to espionage, hacking, and other crimes in exchange for a 10-year sentence.

Three days after arriving at Bogotá’s La Picota prison, he went to the dentist and was ambushed by men with knives and razors, but was saved by guards. A week later, guards woke him and rushed him from his cell, saying they had heard about a plot to shoot him with a silenced pistol as he slept. After national police intercepted phone calls revealing yet another plot, he’s now in solitary confinement at a maximum-security facility in a rundown area of central Bogotá. He sleeps with a bulletproof blanket and vest at his bedside, behind bombproof doors. Guards check on him every hour. As part of his plea deal, he says, he’s turned government witness, helping investigators assess possible cases against the former candidate, Zuluaga, and his strategist, Hoyos. Authorities issued an indictment for the arrest of Hoyos, but according to Colombian press reports he’s fled to Miami.

When Sepúlveda leaves for meetings with prosecutors at the Bunker, the attorney general’s Bogotá headquarters, he travels in an armed caravan including six motorcycles speeding through the capital at 60 mph, jamming cell phone signals as they go to block tracking of his movements or detonation of roadside bombs.

In July 2015, Sepúlveda sat in the small courtyard of the Bunker, poured himself a cup of coffee from a thermos, and took out a pack of Marlboro cigarettes. He says he wants to tell his story because the public doesn’t grasp the power hackers exert over modern elections or the specialized skills needed to stop them. “I worked with presidents, public figures with great power, and did many things with absolutely no regrets because I did it with full conviction and under a clear objective, to end dictatorship and socialist governments in Latin America,” he says. “I have always said that there are two types of politics—what people see and what really makes things happen. I worked in politics that are not seen.”

Sepúlveda says he’s allowed a computer and a monitored Internet connection as part of an agreement to help the attorney general’s office track and disrupt drug cartels using a version of his Social Media Predator software. The government will not confirm or deny that he has access to a computer, or what he’s using it for. He says he has modified Social Media Predator to counteract the kind of sabotage he used to specialize in, including jamming candidates’ Facebook walls and Twitter feeds. He’s used it to scan 700,000 tweets from pro-Islamic State accounts to learn what makes a good terror recruiter. Sepúlveda says the program has been able to identify ISIS recruiters minutes after they create Twitter accounts and start posting, and he hopes to share the information with the U.S. or other countries fighting the Islamist group. Samples of Sepúlveda’s code evaluated by an independent company found it authentic and substantially original.

Sepúlveda’s contention that operations like his happen on every continent is plausible, says David Maynor, who runs a security testing company in Atlanta called Errata Security. Maynor says he occasionally gets inquiries for campaign-related jobs. His company has been asked to obtain e-mails and other documents from candidates’ computers and phones, though the ultimate client is never disclosed. “Those activities do happen in the U.S., and they happen all the time,” he says.

In one case, Maynor was asked to steal data as a security test, but the individual couldn’t show an actual connection to the campaign whose security he wanted to test. In another, a potential client asked for a detailed briefing on how a candidate’s movements could be tracked by switching out the user’s iPhone for a bugged clone. “For obvious reasons, we always turned them down,” says Maynor, who declines to name the candidates involved.

Three weeks before Sepúlveda’s arrest, Rendón was forced to resign from Santos’s campaign amid allegations in the press that he took $12 million from drug traffickers and passed part of it on to the candidate, something he denies.

According to Rendón, Colombian officials interviewed him shortly afterward in Miami, where he keeps a home. Rendón says that Colombian investigators asked him about Sepúlveda and that he told them Sepúlveda’s role was limited to Web development.

Rendón denies working with Sepúlveda in any meaningful capacity. “He says he worked with me in 20 places, and the truth is he didn’t,” Rendón says. “I never paid Andrés Sepúlveda a peso.”

Last year, based on anonymous sources, the Colombian media reported that Rendón was working for Donald Trump’s presidential campaign. Rendón calls the reports untrue. The campaign did approach him, he says, but he turned them down because he dislikes Trump. “To my knowledge we are not familiar with this individual,” says Trump’s spokeswoman, Hope Hicks. “I have never heard of him, and the same goes for other senior staff members.” But Rendón says he’s in talks with another leading U.S. presidential campaign—he wouldn’t say which—to begin working for it once the primaries wrap up and the general election begins.


—With Carlos Manuel Rodríguez and Matthew Bristow

Wednesday, March 23, 2016

9619 - On 'Security' - EPW



In a short article, “On Security and Terror,” Giorgio Agamben reminded us that “security” as the basic principle of state politics dates back to the birth of the modern state. He further argued that in the course of a gradual neutralisation of politics and the progressive surrender of traditional tasks of the state, security “now becomes the sole criterion of political legitimation.”

In a short article, “On Security and Terror,” Giorgio Agamben reminded us that “security” as the basic principle of state politics dates back to the birth of the modern state. He further argued that in the course of a gradual neutralisation of politics and the progressive surrender of traditional tasks of the state, security “now becomes the sole criterion of political legitimation.”

The “legal civil war” declared by the Indian state against the Jawaharlal Nehru University bears out Agamben’s observation. 

The recent presentation of Aadhaar Bill in Parliament as a money bill is another prominent instance of the state’s concern with security. In his critique of the Aadhaar Bill, Jean Dreze has warned us that Aadhaar opens the door to mass surveillance, and “mass surveillance per se is an infringement of democracy and civil liberties, even if the government does not act upon it.” According to Agamben, the danger lies in the fact that measures of security work towards depoliticisation of society. The state’s politics in India poses this danger against which we should raise our voices.
Arup Kumar Sen
KOLKATA


- See more at: http://www.epw.in/journal/2016/12/letters/security.html#sthash.StDIFY6W.dpuf

9613 - The cyberthreat is very real - The Hindu

March 19, 2016



M.K.Narayanan

The debate in Parliament on the Aadhaar Bill, 2016, is quite revealing, says M.K. Narayanan.

Despite having a national cybersecurity policy, risks to our critical infrastructure remain. The Aadhaar concerns are valid, but India needs both offensive cyber operations and strengthened cybersecurity to deal with new onslaughts.
The debate in Parliament on the Aadhaar Bill, 2016, is quite revealing. Concerns expressed that the Bill contained certain provisions [Section 29(iv) and Section 33] that provide avenues for ‘surveillance’ of citizens require a discussion to remove any lingering suspicion about the government’s intentions.
The parliamentary debate reminds us of concerns expressed in the United States following whistle-blower Edward Snowden’s revelations of the National Security Agency’s (NSA) retention of American metadata. Mere assurances that the Aadhaar Bill contains provisions to bar sharing of biometric information and that the Unique Identification Number is limited to establishing identity will not suffice. In the U.S., concerns expressed were less about misuse and more about the NSA collecting and having in its possession large amounts of metadata which could be misused. A debate could remove latent suspicions.
The issue of privacy vs. security is a ‘hot’ subject around the world. The controversy in the U.S. surrounding Apple Inc.’s refusal to break the encryption on an iPhone that belonged to a terrorist — following a demand by the Federal Bureau of Investigation (FBI) — is a variant of this debate, which in this case involves cryptography. While the FBI is insistent that Apple provide ‘backdoors’ that would let the FBI circumvent encryption, the information security community stands firmly behind Apple.
Cyberspace under relentless attack

Cyberspace is today a shorthand for the myriad computing devices that constitute the Internet. The proliferation of autonomous systems, however, posits not merely new advances but also new threats. By 2020, online devices are projected to outnumber human users by a ratio of 6:1. The next impending wave — the Internet of Things — is expected to ring in even more fundamental, technical and societal changes.
Cyberspace was primarily intended as a civilian space. It has, however, become a new domain of warfare. Well before the Stuxnet cyberattack (2010) on an Iranian nuclear facility at Natanz — that was seen as a kind of ‘shot across the bow’ in the opening rounds of the cyber conflict, and demonstrated that the Internet had become a ‘free fire zone’ (and that a cyberattack could be almost as lethal as a nuclear one) — there were other instances of cyberattacks on critical infrastructure. In 2007, Estonia was almost brought to its knees through a cyberattack, presumed to be by Russian hackers.
The past few years have seen successful attacks against the best-guarded installations of advanced nations. In the past two years alone, reports have been doing the rounds of cyberattacks on the Pentagon computer network in the U.S., including by the Islamic State, to gain access to the personal data of several hundreds of U.S. military personnel. The past year also witnessed a devastating attack on Ukraine’s critical infrastructure. It is evident that no rule of law exists in cyberspace. The domain has already become a dangerous place.
Threats in cyberspace have waxed and waned over the years. Among the more common types of cyberattacks perpetrated by state-sponsored agencies are ‘Distributed Denial of Service’ attacks targeting critical networks. In the 1990s, ‘malware’ and ‘viruses’ were the big threats. ‘Worms’ took over in the early 2000s (Stuxnet was among the best known). A few years later, ‘spyware’ became a big thing (BadBIOS, Bitter Bugs, Heartbleed and Bash were among the most notorious). Today ‘cloud security’ is the issue. By 2020, security teams would need to determine what additional security mechanisms like encryption and authentication will be needed to check penetration and hacking.
Securing cyberspace not easy

Securing cyberspace will, however, be hard. The architecture of the Internet was designed to promote connectivity, not security. Cyber experts warn that nations that are unprepared to face the threat of a cyber 9/11. The more technologically advanced and wired a nation is, the more vulnerable it is to a cyberattack.
Cybersecurity has an interesting parallel to terrorism. Both are asymmetric. Ensuring security of data, information, and communication is considerably harder than hacking into a system. The attacker has an inherent advantage in both conventional terrorism and cyberattacks. In the case of state-sponsored attacks, the challenges are of a much higher magnitude.
Defence against cyberattacks is becoming increasingly difficult. This was highlighted at the recent RSA Conference 2016 in the U.S. — the RSA is the gold standard of cybersecurity. The meet acknowledged that “adversaries” (or hackers) were becoming more creative and more sophisticated. At the same time, the industry faced a real shortage of cybersecurity talent. RSA president Amit Yoran said there are no “silver bullets” in cybersecurity. Other experts observed that the answer lay in ‘bleeding edge technology’ and ‘big data analytics’, a customised approach to specific challenges and a radically new system and data protection architecture that could turn asymmetry on its head.
The aphorism that one needs to be ahead of the curve is relevant to the technology world as a whole. Cybersecurity is somewhat unique, and rests on the fundamental pillars of mathematics and computer science. The need is to accelerate the pace at which cybersecurity specialists are produced, to meet the growing threat — one estimate puts the approaching cybersecurity talent shortage at “almost two million people worldwide”.
Fortifying our cybersecurity

The cyberthreat to India must not be minimised. The number of attacks on security, military and economic targets is going up. India remains vulnerable to digital intrusions such as cyberespionage, cybercrime, digital disruption and Distributed Denial of Service.

Given the many existing cyberwarfare scenarios, not excluding a coordinated cyberattack that could sabotage multiple infrastructure assets, erecting proper defences is vital. 

Anonymity and low cost have meant that even small disaffected groups — apart from hostile states and official agencies — could resort to cyber techniques. It is even possible to conjecture that terrorists could explode improvised explosive devices (IEDs) using a remote connection in cyberspace.

Advances in software are beginning to allow users to browse the Internet anonymously, bouncing actions through ‘encrypted relays’. This prevents eavesdropping, determining what sites a particular user is visiting or who the users of a particular site actually are. This could pose security problems.

The spectre of growing cyberthreat demands changes in the attitude of users of systems, a proactive approach to investment in hardening systems, better training in computer security practices, and careful engineering of things to be connected to networks. Almost certainly it would mean that certain critical computers and controls are unhooked from the network, a practice known as ‘air gapping’. Policy formulation will need to be supported by a legal framework, leading to greater cyber resilience and crisis responsiveness.

Despite having a National Cyber Security Policy (2013), risks to our critical infrastructure remain. The Policy Framework details a series of policy, legal, technical and administrative steps, with a clear delineation of functional responsibilities among the stakeholders. In spite of instituting a National Cyber Security Coordinator (2014), internecine rivalries between the National Technical Research Organisation (the nodal agency for cybersecurity) and the Ministry of Communications and Information Technology impede cooperation. Unwillingness on the part of defence and intelligence agencies to integrate their own cyber defence and cybersecurity strategies with the national strategy acts as a roadblock.

The earlier the weaknesses in our cybersecurity defences are rectified, the better prepared would we be to face ongoing challenges. China has already announced plans for comprehensive digital surveillance. China’s emphasis on ‘cloud computing techniques’, and the involvement of its Ministry of State Security in this endeavour, suggests that it is preparing for all-out offensive cyber operations. India would be a prime target.

Nations are generally chary about acknowledging their role in offensive cyber operations. The Central Intelligence Agency and the NSA of the U.S. do admit to having engaged in full spectrum offensive cyber operations. The U.S. even acknowledges having brought down ‘jihadi sites’.

The battle between attackers and the attacked is becoming still more asymmetric. Faced with potentially new cyber onslaughts, the danger to India’s economic and national security is going up in geometrical progression. To be forearmed, with both offensive cyber operations and strengthened cybersecurity, is essential.

(M.K. Narayanan is a former National Security Adviser and former Governor of West Bengal.)