Charter of Demand on behalf of Netizens of Bangalore

Naavi has developed a charter of demand on behalf of the Netizens of Bangalore in the context of the forthcoming polls.

Details are available at http://www.aifon.org.in/wp/?p=87

The essential part of the demand are:

1. Recognize the existence of Netizens as part of the voting Citizens by providing a “Digital ID” to every Netizen of India with which he can participate in e-Governance in a manner that the law of the land will recognize. For this purpose every Citizen who opts for Digital ID should be given a free Digital Signature Certificate as per the provisions of ITA 2008 of the class that enables him to digitally sign e-mails. Higher class of digital certificates if opted for should be subsidized by the Government.

This move will build the basic infrastructure for the Netizens to participate in activities through which they can assert their democratic rights.

Details

2. Recognize and the fact that Netizens have their own Infrastructural needs and develop a “Netizen Welfare Policy” for the State which incorporates projects that move towards providing “High Bandwidth Internet Connection” at an affordable cost just like water and electricity.

Details

3. Recognize the fact that Netizens have their own security needs and develop an effective Cyber Security policy for the State and implementation program towards making Karnataka a “Safe Cyber State”.

During the regime of Mr Yeddyurappa as Chief Minister of the State a statement was made that measures will be taken to make the “Cyber Security Capital” of the world. Towards this cyber security projects of various kinds including education, research, software and hardware development etc were envisaged to be taken. The measures include making Cyber Crime Police more effective, reducing the adverse impact of cyber crimes on the society with better security, better prosecution and provision of Cyber crime insurance.

This promise remains unfulfilled and needs to be revived.

Details

4. Recognize the fact that during the last two years, Cyber Judicial System in Karnataka has been closed with the IT Secretary who is also the Adjudicator of Karnataka and an exclusive judicial authority equivalent to a “Civil Judge”, effectively refusing to discharge his duties as an “Adjudicator”. This has made Karnataka the “Most Backward Cyber State of India”.

This needs to be corrected on a priority.

Details

5. Recognize the fact that Netizens have a right similar to “Human Rights”. Protection of Netizen’s right to “Freedom of Expression” and “Privacy” are matters that require urgent attention. Measures are required to be taken at the local level to develop such policies that protect the rights of Netizens without adversely affecting the requirements of the security of the state or the possible misuse of the freedom of expression.

Towards this requirement, a “Netizen Rights Commission” has to be set up at the State level and policies of “Regulated Anonymity” and “Responsible Cyber Expression” to be implemented.

: Details of Regulated Anonimity  Details of Privacy Protected Zone

6. Recognize that Netizens are also “Consumers in Cyber Space”. In order to adequately recognize the “Consumer Rights of Netizens”, there is a need to expand and introduce effective implementation mechanism for protection of “E Consumer Protection” through a state legislation that covers consumers of mobile services, internet services, cyber cafes etc.

A large number of E Consumers are customers of E Banking, E Stock trading, E Commodity trading etc where the incidence of frauds is very high and the relative protection is low.

A separate institution should be set up for “E-Financial Consumer Protection” to provide assistance to victims of Cyber Frauds in the financial sector. This will be particularly useful to the Cooperative banking sector which functions under the State regulations more than under the RBI.

7. Recognize the power of “Cyber Education” and extend “Virtual Education” facility to all students upto X standard across the State by setting up “Centralized Cyber School” with a pool of state’s best teachers to contribute content which can be distributed through the internet to remote areas where there is acute shortage of qualified teachers.

In order to ensure implementation of the above suggestions, monitor and review the developments as also to suggest corrections and new activities, the State should set up a “Standing Committee” under the leadership and participation of voluntary organziations such as BPAC.

Most of the above issues have been discussed in naavi,org over a period of time. However some clarifications as may be required will be placed in future posts.

Naavi

Posted in Uncategorized | Leave a comment

Let there be the rule of law

It is unfortunate that persons like Justice Katju, Digvijay Singh, Jayaprada and others are speaking of some kind of pardon for Mr Sanjay Dutt, who is convicted by the Supreme Court of India to undergo imprisonment for possession of illegal arms.

It is necessary for common citizens of India to raise their voice against this open revolt of some celebrities against the rule of law for the sake of one person who has been convicted under law.

If an exception is made for Mr Sanjay Dutt then there is no meaning for the rule of law in the country.

I urge the Supreme Court to issue contempt of court notice on all the persons who are coming in support of Mr Sanjay Dutt since they are indirectly asking for negation of the Court’s judgment through an illegal extra constitutional process. If this action is not taken then the issue will get policized and corrupt the integrity of our judicial systems.

Additionally it is also necessary to investigate all supporters of Mr Sanjay Dutt if there are any possibilities of involvement in terrorist activities.

Naavi

Posted in Cyber Crime | 1 Comment

Who is causing denial of access?

When some spamming is detected by web hosting companies or spam filters, the concerned IP addresses are blocked automatically. At present I have observed that BSNL ip addresses are frequently found in the blocked lists.

When a particular IP address is blocked by a web host, the users of the dynamic IP addresses of the subject ISP experience a “Denial of Service”.

Web server administrators should exercise some due diligence before they block a given IP address since blindly blocking the IP address tantamounts to a “Denial of Access offence” under ITA 2008.

It is possible that some competitors of BSNL in the ISP business may be targetting BSNL by getting the BSNL addresses blocked by undertaking an organized spam attack from BSNL IP addresses.

BSNL should do a study of how many of their IP addreses are now in the blocked list of major spam filters.

I have been experiencing such blocking of addresses in the range 117.192.128.0/20 during my site maintenance activities. In such cases I need to use an alternate ISP to log in and request the web host manager to unblock my IP address.

Though on my specific request my web host manager removes it from the IP block list since I am maintaining my site with them, the visitors have no such choice to get their IP addresses unblocked and the site therefore remains blocked for them.

A solution needs to be found to this problem. Comments are welcome.

Naavi

Posted in Uncategorized | 2 Comments

Botnet steals US$6 million from advertisers

Simulating visitors to a website who click on advertisements, a botnet named “Chameleon” is reported to have stolen around US$ 6 million in the form of false clicks on advertisements. The botnet used about 120000 hosts simulating the ad-clicking.

Report: 

About 5000 IP addresses participating in the botnet have now been disabled.

Posted in Uncategorized | Leave a comment

Cyber attack on South Korea

South Korean networks were down in what is believed to be a Cyber Attack from North Korea.

The attack has crippled Bank transactions including the ATM networks.

Report here:

Posted in Uncategorized | Leave a comment

MD5 to SHA256..but password cracking becomes easier

In an interesting evelations, it is stated that CISCO has recently started using a different method for storing user’s passwords which involves shifting from MD5 to SHA 256 which makes passwords more vulnerable to cracking.

We are aware that MD5 is reportedly compromised and in fact Indian CCA has dis-accredited MD5 algorithm for DigitalSignature purpose and shifted to SHA256/512.

According to security experts the new password storing system converts passwords into SHA256 hash code using a single iteration and without any cryptographic salt(Randaom data input).

The earlier methodis reported to have used 1000 iterations of MD5 hash with a cryptographic salt to each password. This is said to make cracking slower and requiring more tries.

Security specialists have also pointed out that at present relatively inexpensive systems outfitted with 2 AMD Radeop 6990 graphic cards and working with “Hashcat password cracking program can make 2.8 billion cracking tries per second.

CISCO is reported to have acknowledged the issue and stated that adoption of the low security method was forced by certain implementation problems.

Hopefully CISCO is working on setting right the weakness.

Refer details here:

Posted in Cyber Crime, ITA 2008 | Leave a comment