Ramnarayan.K | 4 Apr 06:46 2014
Picon

Wireless Mesh Technology - FireChat ignites new way to communicate on phones



http://news.yahoo.com/firechat-ignites-way-communicate-phones-160939070--finance.html 

SAN FRANCISCO (AP) — A new mobile messaging application called FireChat is empowering nearby smartphone users to stay in touch even when there's no cellular service or Internet connection.

In just two weeks since its release on the iPhone, FireChat already has provided a flicker of hope for people pining for more effective, secure and affordable ways to communicate. That's because the free messaging app harnesses a technology called wireless mesh networking, which might someday allow a myriad of devices to connect like links in a chain.

The technique might someday be used to tie together thousands of devices with built-in radios and make it possible to be online without having to pay for the access. It could also enable online communications in remote areas or disaster zones without Wi-Fi or cellular signals. Furthermore, the conversations in these so-called "off-the-grid" networks can't be easily hacked into by spies and mischief makers or shut down by governments trying to stifle free speech.

"We trying to create networks built by the people for the people," said Micha Benoliel, CEO of Open Garden, maker of the FireChat app.

Open Garden, a San Francisco startup with just 10 employees, is taking another step toward its ambitious goal with Thursday's release of a FireChat app for Android phones.

FireChat could be an even hotter commodity on Android given the demographic differences between that platform's user base and the typical iPhone owner. The app already has been installed on more than 1 million iOS devices.

Many smartphones running on Google Inc.'s free Android software are cheaper than Apple Inc.'s iPhone. That has made Android phones the top-selling mobile devices in less affluent countries, including in regions where Internet access is inadequate or expensive.

Google is among the big Internet companies intrigued with mesh networking's potential to bring more of the world online.

Sundar Pichai, Google's executive in charge of Android, has touted mesh networks as a way to connect wearable computers, such as the company's Glass eyewear. Mesh networks also could be used to bring a wide variety of everyday appliances online, helping to build an Internet of things instead of just websites.

FireChat's reach so far is limited. When connecting off the grid, iPhone app users have only been able to send text and photos to other FireChat users within a range of 30 to 100 feet.

Later this year, Open Garden plans to upgrade FireChat's iPhone app so off-the-grid users will be able to hopscotch through a daisy chain of devices to extend the reach of a local network. If this works, a FireChat user sitting in the right-field bleachers of a baseball game would be able to text with a friend on the other side of the stadium if enough other iPhone users in the ballpark also are on FireChat.

This extended range will be available immediately on FireChat's Android app because Open Garden released a mesh networking app for that operating system nearly two years ago.

FireChat's iPhone app piggybacks on an often overlooked feature called the Multipeer Connectivity Framework that Apple Inc. included in its latest mobile operating system, iOS 7, released last September. Apple says more than 80 percent of people using its mobile devices rely on iOS 7.

For now, Android phones and iPhones with the FireChat app won't be able to engage in off-the-grid conversation. Open Garden, though, believes it will eventually be able to make mesh networking work on phones running on different operating systems.

As the mesh networking software improved, Benoliel realized Open Garden needed to come up with application to demonstrate what the technology could do. In that practical sense, FireChat is similar to the word processing and spreadsheet programs that Microsoft released decades ago to help broaden the appeal of its Windows operating system for personal computers, said Christophe Daligault, Open Garden's marketing chief.

FireChat's development was driven by the popularity of other mobile messaging apps such as Snapchat and WhatsApp that enabled smartphone users to text and send pictures to their friends and family without having to pay smartphone carriers.

Like texts and photos sent on Snapchat, nothing transmitted through FireChat is saved. All content evaporates once the app is closed. FireChat also allows all its users to remain anonymous, another feature that is becoming popular on a variety of mobile messaging apps, such as Wickr and Rumr.

There still aren't enough people using FireChat to ensure users will find someone nearby to message. To pique people's interest in the app, FireChat offers an "everyone" option that allows users to enter a digital chat room with up to 80 other random users located in the same country. This option requires a Wi-Fi or cellular connection.

Dailigault concedes FireChat's chat room isn't as high-minded as mesh networking.

"We are finding a lot of people are using it when they are just looking for something to do for a few minutes," Dailigault said. "Some of the discussions there are turning out to be more interesting than anything they can find on Facebook."

_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
Ramnarayan.K | 3 Apr 12:47 2014
Picon

EVM Fraud Detected

Am not sure what exactly to think about this. But If its true then the oncoming elections lose any sense of credibility and any sense that people do actually have a choice. 

 

An EVM that 'votes' only for BJP stuns poll staff in Assam

GUWAHATI: An electronic voting machine raised many eyebrows across the state during a mandatory mock poll in Jorhat on Tuesday. Every time a button was pressed, the vote went in favour of BJP. 

The Jorhat parliamentary constituency returning officer and deputy commissioner Vishal Vasant Solanki told TOI that all EVMs in his custody are being put through a second level of test by engineers of the Electronics Corporation of India Ltd (ECIL), one of the two companies from Hyderabad, which manufactures EVMs. 

This Jorhat Lok Sabha seat has Congress stalwart and former Union minister Bijoy Krishna Handique locking horns with BJP youth and tea tribal leader Kamakhya Tasa. This will be Handique's record seventh successive attempt for the Lok Sabha election. Jorhat goes to the polls on April 7. 

State chief electoral officer Vijyandra on Wednesday said, "An EVM in Jorhat was found malfunctioning yesterday. It is a defective machine and it was noticed when EVMs were readied in front of representatives of all political parties. We will not send the faulty unit to any polling station." 

An EVM consists of two units, a control unit and a balloting unit. Both unites are connected with cable. The balloting unit is a small box-like device, on top of which each candidate and his or her election symbol appears. The voter selects his candidate by pressing the blue button. 

The returning officer said, "These EVMs were here for long. Usually, EVMs are kept in the custody of the deputy commissioner and during elections they are taken to strong rooms." 

Congress lodged a complaint with the Election Commission of India on Wednesday and demanded thorough inspection of all EVMs in just not Jorhat, but the entire state. Pradesh Congress Committee general secretary Ranjan Bora, who lodged the complaint with EC, said, "The mock poll was done at random and the EVM for Teok assembly constituency took everyone by surprise. When the hand symbol button was pressed for Congress, the vote was found to be recorded in favour of BJP." 

He said the incident has fuelled suspicion in their minds that EVMs may have been tampered with to favour a particular political party. 

Interestingly, after Congress got an overwhelming mandate in the 2011 assembly polls, Asom Gana Parishad had lodged a complaint against Congress accusing it of tinkering with EVMs. The Congress leadership had rejected this charge and pointed out that EVM results could not be manipulated. 

"EVM tampering could be possible in the Jorhat case," a senior Congress leader said.


_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
Vickram Crishna | 30 Mar 07:58 2014
Picon

Re: Fwd: Aadhaar & NPR: a corrupt surveillance tool, Rebuttal of Nilekani's blog

Sent this reply the other day, accidentally direct to Sarbajit instead of the list.

Actually, no. The petition was filed in the High Court here in Mumbai, and transferred to the Supreme Court on the request of UIDAI. And I didn't join it, I initiated it, together with four others from different walks of life, once the PSCoF report was ignored.

As experience has shown, the petitions were necessary, in order to bring about this interim stoppage. Perhaps interministerial dialogue might have brought a better result, it is hard to say. Certainly an NPR card, perhaps a smart card, perhaps a smart card option rather than a necessity, but one based on responsible identity verification rather than paternalistic identity generation, might be that better choice, perhaps it may not.

If it is a question of delivering cash subsidies to those who deserve them, based on leveraging digital networks, the premise itself is debatable, though not a subject for this list. Also questions of citizenship etc, relevant to the subject of cards and numbers, but again not for debate here. If the purpose is to enable the government to identify its citizens, whether we call it NPR or UID, it is critical to ask why this deserves the spending of public money.

None of these questions and doubts are adequately being addressed today, at any level.

---
Vickram
communicall.wordpress.com

Sent from Yahoo Mail on Android


From: Sarbajit Roy <sroy.mb-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>;
To: Vickram Crishna <v1clist-/E1597aS9LT10XsdtD+oqA@public.gmane.org>; india-gii <india-gii-v1sgj04l83nsrOwW+9ziJQ@public.gmane.org>;
Subject: Re: [india-gii] Fwd: Aadhaar & NPR: a corrupt surveillance tool, Rebuttal of Nilekani's blog
Sent: Thu, Mar 27, 2014 10:35:29 AM

I presume that sitting in Mumbai, you loaned your name to a
broad-based PIL filed by like-minded persons in Delhi. Once your docs
are filed in the court the matter is essentially out of your control.
The legal scene has changed dramatically in the last 10 years and
today 90% of case are not disposed of on merits but on other
considerations.

I would suggest that you speak to the RGI/NPR guys (like I do), They
are bitterly opposed to UIDAI but unable to stop it because of lack of
public support and the huge clourt NN enjoys.

Had concerned people used their ADMINISTRATIVE remedies (instead of
rushing to courts) the NPR could have saved the day and the citizens
would have been a part of the process at every stage. There is
unfortunately a section of NGO-dom which encourages divisiveness in
Civil society - especially by encouraging people to go to court, and
dropping out after 3 or 4 hearings.

Sarbajit

On 3/27/14, Vickram Crishna <v1clist-/E1597aS9LQ@public.gmane.org.uk> wrote:
> Having acknowledged which, this mango person does not intended to either
> stop at the first sign of victory, nor remain complacent about the outcome
> of a Court order.
>
> Sarbajit has been responsible for many of the discoveries about the
> mismanagement of the UIDAI project. Rightly or wrongly, he has not favoured
> using the judiciary to act in this matter, but the alternative is, IMHO,
> only parliament, and that body has failed to assert itself in the past four
> years. Even the flagrant disregard of the scathing Standing Committee report
> on the enabling Bill sought to be legislated to justify UIDAI had no
> reaction at all. For the information of list members, executive decisions
> (UIDAI was created via the Cabinet, not Parliament) must be legislated
> within a reasonable period. Since 2011, no Bill to enable the activities of
> UIDAI has been in parliament.
>
> The NPR displays every sign of being as ignorant of the Indian reality. It
> is the successor to the border identity card that Advani wanted,
> inexplicably assuming that the presence of a card is all that is necessary
> to overturn secessionist movements. Actually, when he made the suggestion, I
> remember hearing a joke after Kargil that the brave villagers would rush out
> and defeat any marauders, using their trusty cards, presumably the edges, to
> slash attackers.
>
> Anyway, the issues with NPR are not directly the concern of list members
> here, and I don't think we should spend time discussing it.
>
> ---
> Vickram
> communicall.wordpress.com
>
>
_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
Ramnarayan.K | 30 Mar 07:42 2014
Picon

Re: Connection issues through BSNL Broadband (DSL)

 SOLVED
Dear Tarun

Thank you , reducing the MTU has done the trick. Issue is resolved and broadband is back on track.
 
On 29/03/2014, Tarun Dua <lists-w/I/dHsHQyvk1uMJSBkQmQ@public.gmane.org> wrote:
> Did you also try reducing the MTU
>

kind regards 
ram
_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
Arun Mehta | 26 Mar 12:10 2014
Picon

Fwd: Aadhaar & NPR: a corrupt surveillance tool, Rebuttal of Nilekani's blog

Is any political party making an issue of
Aadhaar? Do we like the Supreme Court order on this?
warmly,
Arun

---------- Forwarded message ----------
From: "krishna" <gopalkrishna1715-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
Date: 26 Mar 2014 16:18
Subject: Aadhaar & NPR: a corrupt surveillance tool, Rebuttal of Nilekani's blog
To: <sroy.mb-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
Cc:

Aadhaar & NPR: a corrupt surveillance tool


Rebuttal of Nilekani’s blog of March 24, 2014

 

Reacting to the order of the Supreme Court against biometric aadhaar number and National Population Register (NPR), Nandan Nilekani, former unelected head of aadhaar related projects and committees attempted to mislead Indian voters in general and Bangalore South voters in particular in a write-up dated March 24, 2014.

 

Nilekani, a Congress candidate wrongly claimed, “the Supreme Court has upheld the UIDAI’s view. We have always stated that the data collected from residents would remain private, and not be shared with other agencies.”

 

The documents accessed through RTI reply dated October 25, 2013 reveal that this is an impudent misrepresentation of facts. In the contract agreement between the President of India for UIDAI, as purchaser and L-1 Identity Solutions Operating Company, and Accenture Services Pvt Ltd accessed through RTI at clause 15.1 it is stated, "By virtue of this Contract, M/s Accenture Services Pvt Ltd/Team of M/s Accenture Services Pvt Ltd may have access to personal information of the Purchaser and/or a third party or any resident of India, any other person covered within the ambit of any legislation as may be applicable."  The purchaser is President of India through UIDAI. The clause 15.3 of the agreements reads, "The Data shall be retained by Accenture Services Pvt Ltd not more than a period of 7 years as per Retention Policy of Government of India or any other policy that UIDAI may adopt in future." This clearly implies that all the biometric data of Indians which has been collected so far is now available to US Government and French Government because of Patriot Act and French government’s stake in the company in question.Copies of the contract agreement are available with Citizens Forum for Civil Liberties (CFCL).

 

This Congress candidate states, “In its very first strategy document and in subsequent conversations, the UIDAI had clarified that while other government agencies have the option to make the number mandatory, the UIDAI itself will not make the Aadhaar number mandatory. Over the past year, some government agencies made the Aadhaar number mandatory for specific services and benefits.”


Sophistry manifests itself in myriad ways. The fact is all these government agencies made biometric aadhaar number mandatory based on the recommendations of Committees headed by Nilekani.

 

This was/is an act of breach of trust and betrayal by Nilekani. UIDAI itself was/is maintaining that Aadhaar is 'voluntary' while its chairman, the Congressman made sure that it was made mandatory to avail a number of services or benefits from the government.

 

The Strategy Overview document of the UIDAI says that "enrolment will not be mandated" adding, "This will not, however, preclude governments or registrars from mandating enrolment" but the stark fact is Nilekani himself headed several committees whose recommendations made Aadhaar mandatory."

 

Given below is the list of Committees and groups that decided to make aadhaar mandatory with which Nilekani was associated: -

 

1) Nilekani headed Technology Advisory Group on Unique Projects (TAGUP) that proposes "private company with public purpose" and with "profit making as the motive but not profit maximising" called National Information Utilities (NIUs). GST Network is a NIU which is unfolding to take over the sovereign function of tax collection from the government.  Nilekani was chairman, Empowered Group, IT Infrastructure for Goods and Services Tax (GST)

2) Nilekani headed Unique Identification Authority of India (UIDAI), which is functioning without legislative approval either at the centre or in the states and has signed contracts with companies that work with foreign Intelligence agencies

3) Nilekani headed Committee on Electronic Toll Collection (ETC) technology for use on National Highways that proposes Radio Frequency Identification (RFID).

4) Nilekani headed Inter-ministerial task force to streamline the subsidy distribution mechanism

5) Nilekani headed Government of India's IT Task Force for Power Sector

6) He was member of National Knowledge Commission

7) He was member of Review Committee of the Jawaharlal Nehru National Urban RenewalMission

8) He was member of National Advisory Group on e-Governance

9) He was member of Subcommittee of the Securities and Exchange Board of India (SEBI) that dealt with issues related to insider trading

10) He was member of Reserve Bank of India's Advisory Group on corporate governance

11) He was member of Prime Minister's National Council on Skill Development

12) He was member of Prime Minister headed National Committee on Direct Cash Transfers

13) He was an invitee to the Cabinet Committee on UID related matters

14) He was an invitee to Group of Ministers (GoM) regarding Issue of Resident Identity Cards under NPR Scheme

15) He is a member of the board of governors of the Indian Council for Research on International Economic Relations (ICRIER)

16) He is the president of NCAER

This list is not exhaustive. Nilekani has many more identities as a shareholder and as a former head of a corporation. Notably, Nilekani met the then deputy chief minister of Bihar, Sushil Kumar Modi at Bihar Bhawan in New Delhi in August 2011 to ensure a centralized IT infrastructure for GST across the states through GST Network to take away the sovereign function of tax collection from the state.

 

In his statement dated March 24, 2014, the Congressman claimed, “The argument was that making Aadhaar mandatory enables agencies to weed out fakes and duplicates in their systems, thus reducing corruption.” This was the argument of the Government in which he was a cabinet minister ranked official and he was himself recommending it. Nilekani is indulging in verbal gymnastics and is trying to hide behind a veil of language.  

This Congressman will have us believe that “The fundamental goals of the Aadhaar number are inclusion and anti-corruption. The goals of reducing corruption should not be met at the expense of valid beneficiaries being refused their benefits.”

The fact is the fundamental goal of biometric Aadhaar number is tracking, profiling and targeting of minorities of all shades using the most sensitive personal biometric information.   

Nilekani claims: “The power of Aadhaar as an anti-corruption tool stems from its uniqueness. A unique number linked to an individual’s biometrics means that no one else can pretend to be the person receiving benefits, and therefore cannot defraud him or her.” 

The fact is that he has himself revealed in USA that biometric Aadhaar is a tool for surveillance. Not surprisingly, lower court of Goa and Central Bureau of Investigation sensed it.

Delivering a lecture at Center for Global Development, Washington on April 22, 2013 Nilekani admitted, “Now, biometrics has a big history in the world. Biometrics was first used in India in the 1870s when the British used it for land titling, and they also used people's fingerprints to record the registration of documents. Historically, and up until a few years ago, the use of biometrics was essentially in forensics. It was about using biometrics for crime investigation and crime protection. You had all these Perry Mason novels where you took the fingerprint off the glass and identified the killer and all that. So, fundamentally, biometrics was used for forensic purposes. But, after 9/11, biometrics has increasingly been used for the purpose of surveillance, or security, or for immigration control.”

Has Nilekani or Congress party ever informed fellow congressmen or compatriots that its biometric Aadhaar is going to be used for surveillance and security etc.    

Is Congress Party ignorant of the fact that on August 16, 1908, a public meeting was protest under the leadership of Mahatma Gandhi certificates based on biometric data like fingerprints were burnt.? On August 22, 1906 the Transvaal Government had published a new ordinance that Indians, Arabs and Turks aged eight years or above in held on the grounds of Hamidia Mosque in Johannesburg and in that landmark Transvaal Republic (later province) of South Africa must register their names with the Registrar of Asiatics. The registration involved finger and thumb impressions. Any Indian failing to comply would be fined with £ 100 or imprisoned for three months and even deported.

Given the fact that Congress party has betrayed the freedom struggle and the cause espoused by Gandhi, opposition parties should give a call for the burning of biometric Aadhaar paper and destruction of its database lying with the Planning Commission’s UIDAI and Home Ministry’s Registrar General of India for National Population Register (NPR).  

Nilekani states, “We have often heard about the truly deserving being defrauded of benefits such as pensions, or food rations when these were stolen or diverted by someone else pretending to be them.” How can world’s biggest database of Indian’s biometric data be launched without legal mandate based on hear say. Congress Party should disclose studies and reports if any, which found that deserving were being defrauded.  

Nilekani claims, “With Aadhaar, such diversion is difficult to do, since the beneficiary can be verified using their biometric data, such as a fingerprint. The incentive for a legitimate beneficiary to use Aadhaar to withdraw their benefits – and stop theft of their own benefits is high. In such a scenario, it is increasingly the people most interested in diversion and continuing corruption, who will be most resistant to using Aadhaar for services.”

This is factually incorrect and the inaccuracy of this claim is revealed by the contract agreement which UIDAI itself has signed. In a RTI reply dated October 25, 2013, UIDAI shared its contract agreement with Ernst & Young states in a most startling disclosure from the contract agreement is its admission that “biometric systems are not 100 % accurate”. It admits that “uniqueness of the biometrics is still a postulate.” In an admission that pulverizes the very edifice on which UID/Aadhaar and the NPR rests, it writes, “The loss in information due to limitations of the capture setup or physical conditions of the body, and due (to) the feature representation, there is a non-zero probability that two finger prints or IRIS prints coming from different individuals can be called a match.” This is underlined in bold letters in the contract agreement. In simple words, “non-zero probability that two finger prints or IRIS prints” turning out to be a match means that there is a probability that biometric data of two different individuals can be identical.

 

Thus, it has been admitted that biometric data is unreliable and is not unique.   

 

A report “Biometrics: The Difference Engine: Dubious security” published by The Economist in its 1 October 2010 issue observed “Biometric identification can even invite violence. A motorist in Germany had a finger chopped off by thieves seeking to steal his exotic car, which used a fingerprint reader instead of a conventional door lock.” This reveals the frightening ramifications of using biometrics as a basis for identification.

Another report “Biometric Recognition: Challenges and Opportunities” concluded that the current state of biometrics is ‘inherently fallible’. That is one of the findings of a five-year study was jointly commissioned by the CIA, the US Department of Homeland Security and the Defence Advanced Research Projects Agency.

 

As to Nilekani’s contention that “it is increasingly the people most interested in diversion and continuing corruption, who will be most resistant to using Aadhaar for services.” Citizens Forum for Civil Liberties (CFCL) challenges the claim of this Congressman by asking it to release the names of Congress MPs, MLAs and ministers who are promoters of Adhaar to reveal in writing as to who all among them have enrolled for Aadhaar and subjected themselves to biometric profiling. It is the Congress party’s MP’s, MLAs and ministers “who are the people most interested in diversion and continuing corruption.”   

The claim that “Aadhaar is the first identity for a lot of Indians across the country” is factually incorrect. Indians have 16 pre-existing identity proofs endorsed by the Election Commission of India including voter ID cards.   

Echoing his patron Rahul Gandhi, Nilekani’s claims, “For the first time, people have an identity that is not dependent on a card they are holding – they have an identity they can confirm by just providing their fingerprint or iris. And for the first time, their right to identity is implicit and easily established, wherever they are in the country.” This is untrue.

Congress as a party which got 89.11% of its money from unaccounted sources and unnamed sources will have us believe unlike Election Commission of India that all the parliamentary elections and those who were elected were voted without Indians having any identity.   

In his speech at the conference of All India Congress Committee, Rahul Gandhi boasted that he has given right to identity through Aadhaar.

Aarthi Ramachandran, in her book Decoding Rahul Gandhi underlines, "Rahul's approach to change through his backing of for measures such as the UIDAI scheme reveals an unwillingness to engage with the existing system. It is an attempt to superimpose new systems over existing structures. This approach is bound to meet the fate of his experiments in the IYC and the NSUI…" She observes, "Also in the name of better targeting of the poor for state sponsored schemes, the UID programme pays little attention to privacy issues" and notes that Parliamentary Standing Committee on Finance "was scathing in its rejection of the scheme…"

Nilekani’s claims and Rahul’s pretensions have already been exposed. Wherever direct cash transfer scheme based on Aadhaar was launched in the states that went for elections, Congress lost. Promises based on biometric Aadhaar are rooted in a make believe world to which Indian voters are allergic to, is shown by the recent assembly elections.


It is noteworthy that in the four states where assembly elections took place, the biometric Aadhaar based direct benefits transfer (DBT) was being implemented. In 154 assembly seats of Delhi, Chhattisgarh, Madhya Pradesh and Rajasthan, Indian National Congress, the champion of DBT could win only 17 seats. In Delhi where DBT scheme was taken up in 63 assembly constituencies with Rs. 103 crore in cash transfers, the party won only eight seats. The Bharatiya Janata Party (BJP) won 31 seats and the Aam Admi Party (AAP) got 28 seats. The verdict is starkly against Aadhaar-based DBT. A report from DNA dated 16 December 2013 has underlined this. Instead of biometric Aadhaar-based DBT being a game changer for the Congress it has emerged as a regime changer.

 

The electoral verdict is evidence against the diagnosis and remedy of World Bank Group and its Indian votaries. The verdict indicates that political parties that support Aadhaar are bound to pay heavy electoral cost for their involvement and complicity in putting citizens to inconvenience through tried, tested and failed identification technologies of transnational companies.

 

For Details: Gopal Krishna, Member, Citizens Forum for Civil Liberties (CFCL), Mb: 9818089660, E-mail:gopalkrishna1715-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org

_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
Arun Mehta | 24 Mar 08:26 2014
Picon

hello 3G, goodbye 3G?

http://www.telecomlead.com/news/3g-mobile-internet-speed-doesnt-bother-aircel-airtel-idea-mts-reliance-ttsl-vodafone-95107/ talks about how every telco in India provides poor speed, is silent about it, and even the TRAI does not seem concerned. But clearly the 3G providers are very worried about the 4G that Reliance is coming with, http://www.financialexpress.com/news/telcos-slash-mobile-data-rates-to-win-customers/1235224/0

what do people think -- is it worth upgrading to 3G, and if so, which, and is number portability an issue? I just want to continue to use my phone number unchanged, and get faster/cheaper data if possible.

I just can't help this feeling of deja vu -- we wasted decades before offering ISDN in this country, just when it became outdated. We auction 2G spectrum alongside 4G, causing alarm among the 3G people who try desperately to get the 2G guys to upgrade now, before the 4G advertising hits. Anybody else amused?

My options, therefore are to upgrade to 3G on my Vodafone, or to disable 2G data on my smart phone, and carry one of those dongles that can connect to my smart phone using WiFi. Anyone with a better idea?

Arun Mehta

_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
sarbajit roy | 23 Mar 07:57 2014
Picon

Re: Nodal agency for Cyber Security u/s 70-A or 70-B IT Act

Dear Dr. Arun Mehta and Ors. on India-GII

Please find the link :-) !!!!!  Our years of silent work (out of media
spotlight) for the nation are achieved

http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf

This shows that Ministry / DeITy still works fast despite Ministers
and the bloody foreign financed lobbyist NGOs.

It's God's will that this 16.01.2014 notification came 7 days after I
filed my first counter- pleadings in the NUCLEAR INSTITUTIONS SPYING
case on 09.01.2014.

Thanks
In solidarity,

Sarbajit Roy
National Convenor
India Against Corruption

On 4/28/12, sarbajit roy <mail.sarbajitroy@...> wrote:
> To:
> The Department of Information Technology
> Government of India
>
> BY EMAIL
>
> 28-April-2012
>
> Kind Attn:
> (1) Mr. B.J.Srinath (Scientist-G),
> (2) Mr.A.Kaushik (designated Central Public Information Officer/DoIT)
>
> Dear Sirs,
>
> I have yesterday received by email a Press Release issued by BAPSI.ORG
> concerning certain alleged cyber security incidents attacking India's
> defence and security cyber infrastructure. The said document, if true,
> is certainly worrying as it is made out as if the Union Government is
> incompetent and sleeping while our enemies like China attacked India's
> cyber assets  with impunity.
>
> In view of the detailed efforts by that organization to identify,
> using the RTI, the affected computers referred to by Hon'ble Raksha
> Mantri-ji in Parliament,  it seems that there is an ex-facie case to
> suggest that the NTRO (National Technical Research Organisation) is
> functioning as the nodal agency responsible for protecting India's
> critical cyber resources - and possibly without any formal
> notification u/s 70-A of the Information Technology (IT) Act 2000/2008
> s mandated.
>
> I am reliably given to understand that you are in possession of a copy
> of the updated declared list of protected  computer resources which is
> duly notified, qv. 70-A IT Act,  in the Official Gazette from time to
> time. As this is a public document of vital public interest, I request
> you to kindly immediately publish the same suo-moto on your website
> under the RTI Act, specifically under section 4 of that Act so that
> affected citizens like myself are not inconvenienced to formally apply
> in RTI or Citizens Charter for the same (or its underlying
> notifications) .
>
> Alternatively, you may kindly send me the contact details (preferably
> with official email ID) of the head of whichever agency has been
> notified to maintain this list so that I can pursue it with them under
> the Citizens Charter.
>
> I would appreciate my instant email communication being electronically
> acknowledged and initially processed within 5 working days as
> mentioned in the Manual of Office Procedure.
>
> With best wishes and regards
>
> Er. Sarbajit Roy
>
> B-59 Defence Colony
> New Delhi 110024.
>
> Tel ; 09311448069
>
> On 4/27/12, Manasi Kumari Dash (Google Docs)
<manasidash4@...> wrote:
>> I've shared an item with you:
>>
>> Press Release-China hacking-draft.odt
>> https://docs.google.com/document/d/1t2ffU7tw0iFsoRiRCxGrlhmLmDhimG9EBMF3JcQLZ64/edit
>>
>> It's not an attachment -- it's stored online at Google Docs. To open this
>> document, just click the link above.
>>
>>
>
sarbajit roy | 23 Mar 04:54 2014
Picon

Fwd: Fwd: [IP] N.S.A. Breached Chinese Servers Seen as Security Threat

http://www.iana.org/reports/2009/in-report-27nov2009.html

Its dated 27-Nov-2009, (and)

NIXI did not confirm during my proceedings about .IN reg, (and)

NIXI;'s audited accounts are still very unclear about INNIC (the .IN
registry), (and)

On August 2013 the NIXI published draft comments for setting up the
INNIC to handle the
.IN registry.

Sarbajit

On 3/23/14, Suresh Ramasubramanian <suresh@...> wrote:
> not sure what you mean by "inregistry is operating illegally without icann's
> approval". Where do you get the data for that claim?
>
> --srs (iPad)
>
>> On 23-Mar-2014, at 8:55, sarbajit roy
<mail.sarbajitroy@...> wrote:
>>
>> Obviously the Yanks don't want the Chinese to do on a "home" scale what
>> they were doing on a large industrial scale using compromised CISCO
>> routers.
>>
>> I, ie. India Against Corruption, am in the middle of a major legal dispute
>> with NIXI and the .IN registry where the .IN Registry (which is yet to be
>> set up and is functioning illegally and without ICANN;s approval) operated
>> a "ghost" registry so that that the Yanks could secretly install
>> compromised CISCO routers on a GoI secure internal terrestrial network
>> linking India's premier research organisations - mainly the nuclear
>> research installation, and that they did this starting from 8 months
>> before Pokhran-2 . The research institution where this long running ELINT
>> penetration occurred still continues to be on that network and is
>> presently headed by a US citizen specially appointed by the PMO after
>> taking special Cabinet clearance. (SRS: this is corroborated by a NIXI
>> order, "RTI" and disclosures of IANA's website) and a hasty and secret
>> modification to that public Institution's memorandum of association.
>>
>> Sarbajit
>>
>>
>>> On Sun, Mar 23, 2014 at 7:17 AM, Suresh Ramasubramanian
>>> <suresh@...> wrote:
>>> So any huawei gear installed on customer premises is potentially
>>> backdoored?
>>>
>>> --srs (iPad)
>>>
>>> Begin forwarded message:
>>>
>>>> From: Dave Farber <dave@...>
>>>> Date: 23 March 2014 0:16:06 IST
>>>> To: "ip" <ip@...>
>>>> Subject: [IP] N.S.A. Breached Chinese Servers Seen as Security Threat
>>>> Reply-To: dave@...
>>>>
>>>>
>>>>
>>>> ---------- Forwarded message ----------
>>>> From: Dewayne Hendricks <dewayne@...>
>>>> Date: Sat, Mar 22, 2014 at 2:09 PM
>>>> Subject: [Dewayne-Net] N.S.A. Breached Chinese Servers Seen as Security
>>>> Threat
>>>> To: Multiple recipients of Dewayne-Net <dewayne-net@...>
>>>>
>>>>
>>>> N.S.A. Breached Chinese Servers Seen as Security Threat
>>>> By DAVID E. SANGER and NICOLE PERLROTH
>>>> Mar 22 2014
>>>> <http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html>
>>>>
>>>> WASHINGTON -- American officials have long considered Huawei, the Chinese
>>>> telecommunications giant, a security threat, blocking it from business
>>>> deals in the United States for fear that the company would create "back
>>>> doors" in its equipment that could allow the Chinese military or
>>>> Beijing-backed hackers to steal corporate and government secrets.
>>>>
>>>> But even as the United States made a public case about the dangers of
>>>> buying from Huawei, classified documents show that the National Security
>>>> Agencywas creating its own back doors -- directly into Huawei's
>>>> networks.
>>>>
>>>> The agency pried its way into the servers in Huawei's sealed
>>>> headquarters in Shenzhen, China's industrial heart, according to N.S.A.
>>>> documents provided by the former contractor Edward J. Snowden. It
>>>> obtained information about the workings of the giant routers and complex
>>>> digital switches that Huawei boasts connect a third of the world's
>>>> population, and monitored communications of the company's top
>>>> executives.
>>>>
>>>> One of the goals of the operation, code-named "Shotgiant," was to find
>>>> any links between Huawai and the People's Liberation Army, one 2010
>>>> document made clear. But the plans went further: to exploit Huawai's
>>>> technology so that when the company sold equipment to other countries --
>>>> including both allies and nations that avoid buying American products --
>>>> the N.S.A. could roam through their computer and telephone networks to
>>>> conduct surveillance and, if ordered by the president, offensive
>>>> cyberoperations.
>>>>
>>>> "Many of our targets communicate over Huawei-produced products," the
>>>> N.S.A. document said. "We want to make sure that we know how to exploit
>>>> these products," it added, to "gain access to networks of interest"
>>>> around the world.
>>>>
>>>> The documents were disclosed by The New York Times and Der Spiegel, and
>>>> are also part of a book by Der Spiegel, "The N.S.A. Complex." The
>>>> documents, as well as interviews with intelligence officials, offer new
>>>> insights into the United States' escalating digital cold war with
>>>> Beijing. While President Obama and China's president, Xi Jinping, have
>>>> begun talks about limiting the cyber conflict, it appears to be
>>>> intensifying.
>>>>
>>>> The N.S.A., for example, is tracking more than 20 Chinese hacking groups
>>>> -- more than half of them Chinese Army and Navy units -- as they break
>>>> into the networks of the United States government, companies including
>>>> Google, and drone and nuclear-weapon part makers, according to a
>>>> half-dozen current and former American officials.
>>>>
>>>> If anything, they said, the pace has increased since the revelation last
>>>> year that some of the most aggressive Chinese hacking originated at a
>>>> People's Liberation Army facility, Unit 61398, in Shanghai.
>>>>
>>>> The Obama administration distinguishes between the hacking and corporate
>>>> theft that the Chinese conduct against American companies to buttress
>>>> their own state-run businesses, and the intelligence operations that the
>>>> United States conducts against Chinese and other targets.
>>>>
>>>> American officials have repeatedly said that the N.S.A. breaks into
>>>> foreign networks only for legitimate national security purposes.
>>>>
>>>> A White House spokeswoman, Caitlin M. Hayden, said: "We do not give
>>>> intelligence we collect to U.S. companies to enhance their international
>>>> competitiveness or increase their bottom line. Many countries cannot say
>>>> the same."
>>>>
>>>> But that does not mean the American government does not conduct its own
>>>> form of corporate espionage with a different set of goals. Those
>>>> concerning Huawei were described in the 2010 document.
>>>>
>>>> "If we can determine the company's plans and intentions," an analyst
>>>> wrote, "we hope that this will lead us back to the plans and intentions
>>>> of the PRC," referring to the People's Republic of China. The N.S.A. saw
>>>> an additional opportunity: As Huawei invested in new technology and laid
>>>> undersea cables to connect its $40 billion-a-year networking empire, the
>>>> agency was interested in tunneling into key Chinese customers, including
>>>> "high priority targets -- Iran, Afghanistan, Pakistan, Kenya, Cuba."
>>>>
>>>> [snip]
>>>>
>>>> Dewayne-Net RSS Feed: <http://dewaynenet.wordpress.com/feed/>
>>>>
>>>
>>> _______________________________________________
>>> India-gii mailing list
>>> India-gii@...
>>> https://lists.india-gii.org/mailman/listinfo/india-gii
>>>
>>
>
Suresh Ramasubramanian | 23 Mar 02:47 2014
Picon

Fwd: [IP] N.S.A. Breached Chinese Servers Seen as Security Threat

So any huawei gear installed on customer premises is potentially backdoored?

--srs (iPad)

Begin forwarded message:

From: Dave Farber <dave-skGKvZKd2/+sTnJN9+BGXg@public.gmane.org>
Date: 23 March 2014 0:16:06 IST
To: "ip" <ip-zcouMaTNO2pBDgjK7y7TUQ@public.gmane.org>
Subject: [IP] N.S.A. Breached Chinese Servers Seen as Security Threat
Reply-To: dave-skGKvZKd2/+sTnJN9+BGXg@public.gmane.org



---------- Forwarded message ----------
From: Dewayne Hendricks <dewayne-Pi7Cr0HDNED2eFz/2MeuCQ@public.gmane.org>
Date: Sat, Mar 22, 2014 at 2:09 PM
Subject: [Dewayne-Net] N.S.A. Breached Chinese Servers Seen as Security Threat
To: Multiple recipients of Dewayne-Net <dewayne-net <at> warpspeed.com>


N.S.A. Breached Chinese Servers Seen as Security Threat
By DAVID E. SANGER and NICOLE PERLROTH
Mar 22 2014
<http://www.nytimes.com/2014/03/23/world/asia/nsa-breached-chinese-servers-seen-as-spy-peril.html>

WASHINGTON — American officials have long considered Huawei, the Chinese telecommunications giant, a security threat, blocking it from business deals in the United States for fear that the company would create “back doors” in its equipment that could allow the Chinese military or Beijing-backed hackers to steal corporate and government secrets.

But even as the United States made a public case about the dangers of buying from Huawei, classified documents show that the National Security Agencywas creating its own back doors — directly into Huawei’s networks.

The agency pried its way into the servers in Huawei’s sealed headquarters in Shenzhen, China’s industrial heart, according to N.S.A. documents provided by the former contractor Edward J. Snowden. It obtained information about the workings of the giant routers and complex digital switches that Huawei boasts connect a third of the world’s population, and monitored communications of the company’s top executives.

One of the goals of the operation, code-named “Shotgiant,” was to find any links between Huawai and the People’s Liberation Army, one 2010 document made clear. But the plans went further: to exploit Huawai’s technology so that when the company sold equipment to other countries — including both allies and nations that avoid buying American products — the N.S.A. could roam through their computer and telephone networks to conduct surveillance and, if ordered by the president, offensive cyberoperations.

“Many of our targets communicate over Huawei-produced products,” the N.S.A. document said. “We want to make sure that we know how to exploit these products,” it added, to “gain access to networks of interest” around the world.

The documents were disclosed by The New York Times and Der Spiegel, and are also part of a book by Der Spiegel, “The N.S.A. Complex.” The documents, as well as interviews with intelligence officials, offer new insights into the United States’ escalating digital cold war with Beijing. While President Obama and China’s president, Xi Jinping, have begun talks about limiting the cyber conflict, it appears to be intensifying.

The N.S.A., for example, is tracking more than 20 Chinese hacking groups — more than half of them Chinese Army and Navy units — as they break into the networks of the United States government, companies including Google, and drone and nuclear-weapon part makers, according to a half-dozen current and former American officials.

If anything, they said, the pace has increased since the revelation last year that some of the most aggressive Chinese hacking originated at a People’s Liberation Army facility, Unit 61398, in Shanghai.

The Obama administration distinguishes between the hacking and corporate theft that the Chinese conduct against American companies to buttress their own state-run businesses, and the intelligence operations that the United States conducts against Chinese and other targets.

American officials have repeatedly said that the N.S.A. breaks into foreign networks only for legitimate national security purposes.

A White House spokeswoman, Caitlin M. Hayden, said: “We do not give intelligence we collect to U.S. companies to enhance their international competitiveness or increase their bottom line. Many countries cannot say the same.”

But that does not mean the American government does not conduct its own form of corporate espionage with a different set of goals. Those concerning Huawei were described in the 2010 document.

“If we can determine the company’s plans and intentions,” an analyst wrote, “we hope that this will lead us back to the plans and intentions of the PRC,” referring to the People’s Republic of China. The N.S.A. saw an additional opportunity: As Huawei invested in new technology and laid undersea cables to connect its $40 billion-a-year networking empire, the agency was interested in tunneling into key Chinese customers, including “high priority targets — Iran, Afghanistan, Pakistan, Kenya, Cuba.”

[snip]

Dewayne-Net RSS Feed: <http://dewaynenet.wordpress.com/feed/>

_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
Ramnarayan.K | 22 Mar 10:06 2014
Picon

Connection issues through BSNL Broadband (DSL)

Hi

Over the past week or our BSNL broadband DSL has been acting very strange. 

It "allows" only some sites to appear - most banking sites, most government sites , gmail, google news (and any google related domain)

a few other sites seems to work - and am not able to establish an pattern

sites that don't work

Sites that work (surely)
eci.nic.in (election commission)
Google.com

while http://election.uk.gov.in/ seems to work the main domain http://uk.gov.in does not seem to work (and the broadband is being used in Uttarakhand)

non government sites that work ( that i checked)
amazon.com (while flipkart does not)


Google search gets back results but trying to access any of the linked results again results in a blank forever loading page, similarly whilenews.google.co.in works clicking on any news link again results in a page that never loads.

In the sites that don't work the browser shows activity and the site logo pops up in the browser (usually an indication that the site is loaded.

I also tried to access sites that check broadband speeds and every single site i tried to access (from google search results) did not load. 

**
While using a usb mobile (plug and play device) all the sites work.

**
Some folks , who are also on a bsnk broadband connection in Chennai told me that they were having similar issues and in some case the connection would stop any work entirely after partially working for a bit.

So am wondering if this is a BSNL issue and if others are facing it as well and would any one know if there are any know causes and also any know work around.

thanks
_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii
Suresh Ramasubramanian | 19 Mar 14:00 2014
Picon

Fwd: [governance] NETMundial remote hubs - request for hosts

Can we find one or more local hosts for netmundial remote participation hubs in India?  A university campus in each metro and one or two other cities, say?

--srs (iPad)

Begin forwarded message:

The NETMundial logistics committee has just issued a call for groups interested in operating a remote access hub for the meeting, April 23-24.  Details on the conference website:

<http://netmundial.br/blog/2014/03/18/netmundial-opens-opportunity-for-interested-to-host-official-hubs-of-participation/>

The meeting will be webcast in seven languages: Arabic, Chinese, English, French, Portuguese, Russian and Spanish.

A hub can be located in any city around the world to allow anyone interested to join local discussions and to participate in NETmundial.  Organizations wishing to host a hub should have necessary infrastructure (broadband access, projects), the hub meeting should be open to anyone.  The organizer should be able to facilitate interactions both locally and with NETmundial.  NETMundial logistics committee will provide help.

Detail at the URL above.

Adam  



____________________________________________________________
You received this message as a subscriber on the list:
    governance <at> lists.igcaucus.org
To be removed from the list, visit:
    http://www.igcaucus.org/unsubscribing

For all other list information and functions, see:
    http://lists.igcaucus.org/info/governance
To edit your profile and to find the IGC's charter, see:
    http://www.igcaucus.org/

Translate this email: http://translate.google.com/translate_t
_______________________________________________
India-gii mailing list
India-gii@...
https://lists.india-gii.org/mailman/listinfo/india-gii

Gmane