Arnab Goswami accused of a Cyber Crime

In his enthusiasm to break a sensational story, Arnab Goswami appears to have landed himself in one of the biggest problems of his life by declaring possession of e-mails of an UK Member of Parliament which the MP has challenged as a Criminal act.

The defense for Mr Arnab is only that he is a “Journalist” and doing this “Apparent Criminal Act”  in “Public Interest”. Unfortunately this may have to be defended in an UK Court and not in the Indian Court.

The incident relates to a revelation that Mr Lalit Modi living in UK wanted to travel to Portugal ostensibly to sign some hospital papers for his wife to undergo surgery for Cancer and was having difficulty in obtaining travel clearances. Since UK Government had been earlier informed of the pending Enforcement Directorate investigations going on on Lalit Modi in India, there was a perception that allowing Mr Modi to travel would make India unpleasant. In this context it is alleged that Ms Sushma Swaraj, the External Affairs Minister was approached by Mr Modi and she had spoken to the UK MP which ultimately resulted in Mr Modi getting the travel permissions. Ms Sushma Swaraj has stated that she only requested the UK Government to deal with it under UK laws and it would not hurt the relations with India.

Mr Goswami is tying to present this as if Ms Swaraj should be considered as a part of Lalit Modi investigation and naturally the other political parties will be happy to debate this issue all through the day.

However, Mr Goswami has been challenged by the UK MP Mr Keith Vaz that Mr Arnab Goswami is guilty of hacking into the email account of Mr Vaz. The fact that Mr Arnab Goswami is in possession of the emails is prima facie evidence that Mr Keith Vaz’s emails have reached unauthorised hands. It is also prima facie clear that these emails have been used for commercial benefit by Times Now. Hence the charge of “Unauthorized Access” to an electronic document which is also an offence under ITA 2008 cannot be denied.

Mr Goswami has been alleging that Ms Sushma Swaraj was trying to help Mr Modi to get travel clearances. However the accusation is not for any other financial fraud or illegal activity. Ms Sushma on the other hand claims that this was a “Humanitarian” act. It will be therefore essential for Mr Goswami to defend that there was “Public interest” and claim the immunity which journalists normally claim in sting operations. However given the limited benefit if at all that Mr Modi could get from the intervention of Ms Sushma Swaraj, it is unlikely that a Court will be convinced of the “Public Interest” in this e-mail hacking case.

It would be interesting if this issue is taken to a Court.

(PS: It would be interesting to see if Times Now continues to carry Mr Keith Vaz’s interview in which he accuses Mr Arnab of a criminal activity during the rest of the day.)

Naavi

Posted in Cyber Law | 1 Comment

Is it Goodbye to Privacy !… as Smart City concept gains ground?

One of the main concerns of the community as it exists today when the concept of Smart City is unveiled is on what happens to the concept of Privacy?

The very concept of a “Smart City” is one where information exchange happens between the residents and the command center in such a manner that every aspect of the individual’s life gets reported to the command center and triggers actions in different parts of the city. The concept of “Internet of Things” and “Smart Transport” etc can work only if individuals give up the concept of “Privacy”. Unfortunately the residents of a smart city cannot have the option of “opting in or out” since “Opting out” of a Smart City information network would essentially mean that the individual not only is denied of the benefits of the smart city but also be a “rogue” element as to the rest of the community. The community norms would therefore force every one who comes within the “network boundaries” of the Smart City to “Opt in” or otherwise be identified as an “Untouchable” within the city.

We will therefore be in a situation where either we accept the Smart City concept and forgo the “Privacy Right” or opt to remain outside the boundaries of the smart city. It would perhaps be a “Visa” condition for entry into a smart city that one has to forego his Privacy Rights.

We all know that in India we are still struggling to form a “Privacy Law”. Repeated attempts have not been taken to the logical end and have died at the stage of drafts.

Now, we are discussing the concept of  smart cities 100 in number to start with and perhaps  more to follow as India turns Digital. We already hear that one city in Gujarat, a part of Mumbai and perhaps a part of Bangalore may either come up as a complete Smart City or become significantly more smart than the rest of the environment.

In many areas of technology, we some times observe that some “developing” countries jump the developmental steps that other earlier developed countries take and join the que in the front.

I see the possibility that the development of “Privacy laws” in India may be confronted with this choice of whether we first pass the Privacy Law and then fight against it in Smart Cities or all together work for a “Smart Privacy Law” that works both within the smart city and outside.

The solution that can solve the Smart city-Privacy Conflict is “Regulated Anonymity” which the undersigned has presented a few years back. (Refer : The Theory of Regulated Anonymity published on  2nd March 2012).

The essence of this theory of “Regulated Anonymity” is the creation of an “Authority” to “Anonymize” a participant in such a manner that no state actor will have an unfettered right to “identify” an individual. The system will however provide the identity as required for the information exchange except that the data will travel in the name of an “Avatar” rather than the real physical identity of the individual. It is the ideal situation for exploiting the best of both worlds, the benefits of identifying to the “Smart City Control Center” and maintaining the anonymity of who the individual is in the physical world.(..though the Big Data Analysts would say that we can still find out who you are..).

The undersigned had also discussed

It is therefore interesting days ahead of those who watch the development of Privacy laws in the county as also the Smart City administrators.

Naavi

Related Articles:

Privacy Protected Zones Required.

“International City Zone” scheme suggested to address US investor’s concerns

Is India’s 100 smart cities project a recipe for social apartheid?

Smart Cities: are you willing to trade privacy for efficiency?

 

Posted in Cyber Law | Leave a comment

Horoscope of a Smart City is written well before the fancy buildings come up

When we visualize a “Smart City”, we normally see a futuristic city  laced with the clean, wide roads with sky scrapper buildings with fancy architecture all around. But the “Smartness” of a city does not lie with the civil architecture alone. In fact, a good looking civil architecture can make any city look like a “Futuristic City”. But it need not necessarily be a “Smart City”.

A “Smart City” by definition has to be characterized by an information exchange system that flows all across the city like the nerves or blood go across a human body making each organ give and take information that eventually make it function better.

The key therefore to “Smartness” is the way how this information network is built and how the functional units interact with individual organs of city administration. Hence most of the critical work that determines how the smart city shapes up has to be complete before the first roads are built or first civil structure comes up.

While each organ of administration such as the Transport, Health, Electricity Supply, Water supply, Sewerage systems, Supply of  Clean air, Education, etc can be considered as sub systems and can be developed with the best available ICT resources, the key is the information infrastructure.

The information infrastructure has the technical component which consists of the Optical Fiber network which should run side by side with the water and power lines and should be a supported by a network of WiFi  that is as ubiquitous as the air around us.  While the WiFi network can also be brought in later during the development of a city, the Optical Fiber network is one which needs to be built as a fundamental component of infrastructure before the city layout is completed. The quality of this physical network would be what would determine the future of the city. It is therefore writing the horoscope of the city.

In the future, this network of Optical fiber would also be the biggest target for attack by all types of Cyber criminals including the terrorists. Hence even while laying down these cables, the security of these cables in future both from unauthorized physical and logical access becomes critical. This security starts from the people employed today to lay the cables and the knowledge and information shared with these people would determine how secure the network would be in future.

Knowing the smartness of terrorists around the world and their motivation, it is possible that these terrorist organizations may be already planning to infiltrate the work force who would be involved in the construction of smart cities in India. Hence we need to identify the possibility of moles being introduced to the work force as a “Risk”.

Extensive back ground checks and also security motivation of the workers would therefore be an essential part of the management of the smart city infrastructure. People need to be continuously monitored and their behaviour analysed to identify existence of people with deviant mindsets  who can be exploited by the criminals and anti national elements.

Additionally, measures to obfuscate some critical information that can be misused, randomizing the network paths, testing the misuse of the network in future as well as checks and balances to prevent any deviant behavior of the network need to be planned and built into the systems today itself.

It is in this context that we are highlighting that “Cyber Security” should be among the first building blocks of a smart city infrastructure and needs to be focused. In fact the Cyber Police Station of the Smart City should be in place now before the network cables are laid.

Presently the way the planners are moving ahead does not indicate the appreciation of this security requirements.

As always, we hope that the planners will turn their attention on this issue before it is too late.

Naavi


New Mobile App launched for Cyber Law Awareness for Everyone


Posted in Cyber Law | Leave a comment

Smart City Transport..Security Challenges

One of the major investments in a Smart City would be on an integrated intermodal  transport network which connects the personal transport vehicles to the public systems of different kinds.

To understand the issues involved, a really smart city transport service means that the city bus service, the private taxi or auto services  are needed to be connected to the railways, metro and air network so that a person leaving his residence in his vehicle knows exactly how is the transport network which will reach him to the airport in time. This network of transport vehicles need to be connected to the traffic light system, (including the VIP movement system..or privileged access system) to enable smooth vehicular movements. The GPS records of the movement need to be picked up say with visuals from different CCTV cameras en-route, processed in real time and decisions to be transmitted back to the grid. If an ambulance is on the way, it should be recognized and provided privileged access. If an accident happens, there needs to be an intelligent rerouting, alerts to the hospital etc.

The technologists will look at different components that will address these systems. However the biggest challenge would be in working out the interoperability of different systems. Application level security may be guaranteed to some extent by the vendors of the systems but the security challenges that may arise from the interconnection of one system to the other would be the responsibility of the network integrator. The decisions of such an integrator would conflict with the decisions of other functionaries as regards to vendor choice, application choice etc and are likely to introduce political and commercial hurdles.

The Smart City management team need to be suitably empowered to take decisions on purchase of products and services by the City. In a way this is similar to what we say in a corporate scenario where the CISO should have a say in hardware and software purchase but it does not happen as often as necessary. In the Corporate scenario we try to over come this hurdle with the formation of a high level Information Security Committee. Perhaps the Smart City project should also create a CISO and Information Security community even at the time of initial planning so that security inputs go into every decision right at the architecture level.

If these challenges are properly addressed, then the cost of the smart city projects will be controllable. Otherwise the project will be delayed and there will be cost escalations along with inefficient implementation of the project.

The Smart City projects should therefore be on the look out for IS professionals of all hue and colour and it would be a great time for such professionals in terms of job opportunities.

Naavi

Posted in Cyber Law | Leave a comment

Airtel does a Maggi!

Just as Maggi has got into a controversy on its taste enhancing additives to its noodles, Airtel appears to be encountering a controversy by introducing a “Computer contaminant” into its customer’s browsers which is an offence under Section 66 of ITA 2008.

According to this report in ehacking news.com , a programmer has published his findings that when customers using Airtel broadband internet account and browse internet, Airtel introduces a java script and an iframe into the browser. This script and iframe points to a specific URL.

On its part, Airtel has released a statement trying to explain its position. The explanation does not appear convincing but appears to suggest that it is trying to develop a tool to provide users information about the data usage during their browsing sessions.

In a way therefore there is an admission that Airtel has introduced what is considered as a “Computer Contaminant” under Section 43 of ITA 2008 which is defined as follows:

“Computer Contaminant” means any set of computer instructions that are designed –
(a)to modify, destroy, record, transmit data or programme residing within a computer, computer system or computer network; or
(b)by any means to usurp the normal operation of the computer, computer system, or computer network

Introduction of a Computer contaminant without the permission of the owner of a computer is a contravention under Section 43 of ITA 2008 and an offence under Section 66. The company would be liable for financial compensation and probably for at least being tried for a cognizable offence.

While the Company may have a reason to experiment with a tool not meant to harm the users, it has ignored the ITA 2008 compliance requirement which could have been met by providing a proper notice to the users.

Hope it would take the necessary corrective action by sending a proper notice to its customers clarifying its position.

(P.S: Thanks to a published erroneous judgement of the Adjudicator of Karnataka in December 2011, and the continued neglect of the Karnataka High Court and the apathy of the Central Government in not appointing a Chair person for the Cyber Appellate Tribunal,  neither Section 43 nor Section 66 is applicable to Bharti Airtel in the state of Karnataka.)

Naavi

New Mobile App launched for Cyber Law Awareness for Everyone

Posted in Cyber Law | Leave a comment

Using the Smart Grid in the Smart City and the Security issues

One of the first innovations that the proposed Smart Cities in India need to build up is an efficient way of distributing electricity so that the net cost of consumption of Electricity is reduced. The solution for this without doubt is to build a Smart Grid. A Smart Grid is a mechanism where there is an intelligent sharing of information from the  end of the consumer of electricity and using it to modify the electricity supply and usage pattern so that a balance is achieved between production and consumption.

This requirement of matching demand with supply on a real time basis arises since electricity production and consumption varies throughout the day and there are peak requirements and slack period requirements. Since power cannot be easily and economically  stored and used at different times, if we need to satisfy consumer demand, we always need to keep production matching the peak requirement and let it go waste at other times. Otherwise outages would occur when peak load is demanded and the grid cannot supply the same.

If  smart management of demand and supply is possible,  the consumers can stagger the use of electricity to match the production and suply. Also different production sources such as solar production, wind production, etc can be connected to a common grid to which the conventional production sources dump their production. Since the natural source production of electricity may depend on say the availability of Wind or Sun, there will be variation in production of such energy which needs to be balanced by the consumers being incentivised to  stagger their consumption by offering discounts on consumption when surplus power in the grid is available as against premium charged when there is a shortage.

Also if the consumers are able to produce electricity on their own by say owning solar panels on their rooftops or a single wind turbine in the farm etc., they can supply electricity to the grid during peak hours and earn premium income while consuming electricity for their own use in the off-peak hours when the prices can be at a discount. In a way the consumers will consume electricity when it is cheap on the grid and produce electricity and push it to the grid when it is expensive on the grid.  This makes a consumer become a new category of user who may be called a “Prosumer” who both produces and consumes.

These fancy ideas of a smart grid are very much within the realms of possibility even now if the electric grid architecture can be planned properly ab-initio. The architecture will require supply of electricity and exchange of data over the same power line. In other words, every electric line will carry both electricity and data which will be resolved at each end through appropriate modems. Even broadband on power lines will also be possible under the same system.

The above smart grid applications can be built and are expected to be built in the smart cities. In cities like Amaravati where the electricity lines are to be drawn from scratch, perhaps it would be easier to use the appropriate hardware to build the dual purpose electricity distribution system which can carry power and data over the same lines.

While Electrical Engineers will work on the technology required for the purpose of carrying data over power lines and software professionals build applications to process the data and use them to modify distribution etc., the cyber security professionals will be concerned about the risk of data being unauthorizedly accessed and modified. In fact, the experience of Stuxnet is too recent to be forgotten. All Smart grids will fall into the category of  critical infrastucture and will be juicy targets for Cyber terrorists and as targets during a Cyber War.

Security will therefore be a major concern for Smart Grid developers and hence this is one of the first challenges to be tackled by the Smart City Cyber Security managers.

Note that use of smart grids will immediately require a modification of electricity laws as well as redefining of many cyber crime related laws and there could be obstructions from short sighted politicians who donot understand security issues. Modification of Cyber Laws is therefore a part of the cyber security plan for smart grids or smart cities.

In designing a Cyber Security system for a smart grid, all the five aspects of data security such as Availability, Integrity, Confidentiality, Authentication and Non Repudiation will be applicable. There will be threats and vulnerabilities to be recognized and risks estimated. Controls need to be built to mitigate the risks with a very very low tolerance levels and with redundancy built in some form to tackle the inevitable security breaches.

Building security to a smart grid system after it is established would be complicated, inefficient and some times impossible. Hence planners of the Smart cities need to integrate cyber security plans when building the smart grid network itself.

It is difficult to conceive of the cyber security system for a smart grid without knowing exactly the architecture. But NIST has worked on the requirements and come up with a suggested architecture for interoperability as well as guideline for information security applicable for smart grids and perhaps it needs to be adopted to our requirement with whatever minor changes need to be made.

If these requirements are not studied now and addressed, the specifications for the hardware would be imperfect leading to delay in projects, escalation of project costs and also compromise of security for which we may have to pay a huge price some time in future.

I therefore request the CM of AP in charge of Amaravati project,  Mr Chandrababu Naidu and also the Union Power minister Mr Piyush Goyal  not to neglect the cyber security requirements of smart grids when they plan for the smart cities, and more particularly for Amaravati where work has to commence from a zero base.

Naavi

 

Posted in Cyber Law | Leave a comment