Documente Academic
Documente Profesional
Documente Cultură
Technology
CMYK
CMYK
Technology
the entire planet. While we cannot stop the but GPS & networks
progress, we still should think carefully about
Recent Past Incidents where technology was misused:
the consequences of the technologies that we
invent.1 • 26/11: Global Positioning Satellite systems, Blackberry, CDs
with high resolution satellite images, Multiple cell phones with
“A computer keyboard can be a very useful
switchable SIM cards, Satellite phones
tool for the progress of humanity, but it can
also become a dangerous weapon capable • September 13, 2008: Indian Mujahideen militants used
of producing enormous economic damages unsecured WiFi system of a company in Chembur.
to the infrastructure of a state or company, • August 2008: A stray terror e-mail was traced to the Khalsa
and even against the integrity and the life of College, Matunga, Mumbai.
human beings” - Secretary General Cesar
Gaviria, OAS, Us2 • July 2008: E-mails were sent before and after the Ahmedabad
blasts. One was traced to Navi Mumbai and the other to an IP
Technology Platforms that have been address in Vadodara.
misused:
• May 2008: A terror e-mail was sent before the Jaipur blasts
• Social Networking Sites • Blogs • Email from a cyber cafe in Ghaziabad.
Services • SMS Services • VoIP • GPS and
GIS based Applications and Equipments • November 2007: Serial blasts in Lucknow, Varanasi, and
Faizabad courts in UP. The terror e-mail was sent by Indian
Growing Challenges faced by India: Mujahideen (IM) from a cyber café in Laxmi Nagar, Delhi.
• Exponential growth of Internet and Mobile (Source: Internet and Newspapers)
Phone use
• 3G technology to be started very soon The Wi-Fi misuse could have easily prevented had the
• Interconnected business and government users/or their network administrators would have been
• E-governance growth has implications for alert and careful in securing the connections. It only takes
Information Security, Privacy and Cyber following steps to secure a Wi-Fi Connection:
Security • Change Default User names & Passwords
• Income Tax, Excise, Customs, Sales tax • Use Strong Passwords
networks connected • Enable Wireless Security (WPA2)
• Smart cards, UID being issued • Change your SSID
• Land records computerized • Do not show Broadcast SSID
• Police networks • Use MAC filtration
• Defense is no longer arms & ammunition • Use Static IP Address
• Use firewalls
• Use Latest Antivirus Pack
An interesting article has been written by Bruce Schiner about
“Terrorists May Use Google Earth, But Fear Is No Reason to Ban
It” he talks about how surprising it is to the people that their own
infrastructure can be used against them. And in the wake of
terrorist attacks or plots, there are fear-induced calls to ban,
disrupt or control that infrastructure. This isn't the only way our
information technology helps terrorists. We already know they
use websites to spread their message and possibly even to
recruit.3
Let's all stop and take a deep breath. By its very nature,
communications infrastructure is general. It can be used to plan
both legal and illegal activities, and it's generally impossible to
tell which is which. When we send and receive email, it looks
exactly the same as a terrorist doing the same thing. To the
mobile phone network, a call from one terrorist to another looks
exactly the same as a mobile phone call from one victim to
another. Any attempt to ban or limit infrastructure affects
CMYK
CMYK
Technology
CMYK