March 28, 2009

The Financial Crisis Explained: Funny Video

Family legacy and the Varun effect

http://news. rediff.com/ column/2009/ mar/27/guest- column-tarun- vijay-on- dynasty-and- the-varun- effect.htm


Tarun Vijay

March 27, 2009

Those who opposed the Ayodhya temple movement, wore silence over the plight of Kashmiri Hindus, damaged the Ram Sethu and denied Lord Rama ever existed, denied the violence at the Godhra railway station, and embraced the butchers of 1984, are collectively gunning at Varun Gandhi's political life.

Column after column by Padma Shris in the media have created an atmosphere where supporting Varun has become a sin. Why? The simple reason is that the farmhouse of Gandhi-Nehru politics has been broken and a scion of the family chose to speak out as his conscience directed.

More than what Varun said or didn't say, it is the hurt and bewilderment over the loss of a Gandhi to the saffron brigade that has made the media and anti-Hindutva politicos react with such venom and acid. He was not heard, not given a chance to present his case, nor did forensic experts examine the so-called proof in the form of a CD containing his speech.

Varun has suddenly dwarfed the media-supported Rahul.

Nobody has ever heard a dynasty member to say with understandable assertion that he or she is a Hindu. Rather, they have always tried to look differently at things. They banned Hindu organisations, imposed the Emergency, removed basic human rights, never willingly facilitated the Sikh massacre probe, rewarded hardened criminals, made alliance with those who were convicted for murder or were facing scandalous charges, had the Muslim League join the government after Partition. Yet, they are nice, decent, peace-loving, patriotic democrats who love to tell others: 'Go read the Gita.'

When Indian soldiers were fighting Pakistani marauders in 1947, we didn't have enough jeeps. So orders were placed with the British company and supply demanded immediately. Our high commissioner in London V K Krishna Menon, Pandit Nehru's blue-eyed boy, messed it up. The jeeps reached a year late.
That was the first scandal in independent India.

We lost Gilgit, Baltistan and Skardu. We lost Aksai Chin because the government in New Delhi didn't know the exact boundaries and so no patrolling was being done there.
In all we have lost 125,000 square km to the Pakistanis and Chinese during Congress rule.
Plus we had a bad dream called 1962.

At that time our ordnance factories were making coffee machines as Pandit Nehru openly argued against having a well-equipped large army for defence. 'Who is going to attack us?' he would ask.

And people still remember the mysterious death of Dr Syama Prasad Mookerjee, who simply wanted Kashmir to be a part of India like Bihar or Bengal and the permit system to enter the valley be abolished. Kashmir had two rulers then, its ruler was called Sadr e Riyasat or 'head of state', and it had a prime minister. Mookerjee's martyrdom compelled the Nehru government to remove the permit system and the two heads of state.

Then we had the Mundhra scandal, the Nagarwala case, the L N Mishra murder. The Jana Sangh's fast-emerging leader Deendayal Upadhyaya was murdered. A Congress leader canvassed openly against the official Presidential candidate and supported her own choice as independent nominee. The original Congress symbol was a pair of oxen. After the official Congress broke up, they got the hand as a temporary symbol till the case is finally settled. It would never be.

Opposing Sonia Gandhi's sudden rise in politics only on the grounds of her foreign origin were leaders like Sharad Pawar and P A Sangma. Old Congressmen still feel sad that they lost dynamic and promising leaders of substance like Rajesh Pilot, Madhavrao Scindia and Jitendra Prasada, who could have steered the Congress on an entirely different and strong nationalist course. And a veteran like Sitaram Kesri was humiliated no end.

The only non-dynasty prime minister to run a Congress government for full five years successfully was insulted even in his death and his body-in-state was not allowed to enter the Congress headquarters in New Delhi. An airport in his home state to be named after him was opposed to by Congressmen although the proposal was put forth by an Opposition leader.

This is how they treat their party leaders not belonging to the family. They amended, abused and twisted the Constitution, put the entire Opposition behind bars for an undisclosed period and were harsh on the unyielding masses.
Yet, they are the democrats and secular lighthouse of freedom of expression and liberty.

They kept India backward in such a planned manner that even after 62 years of independence we are yet to have a spacious functional airport in the national capital, 70,000 farmers committed suicide in one year, decorated soldiers returned their medals in protest and a movie on our poverty-stricken 'slum dogs' fetches the Oscar. And they loved illegal infiltrators for the sake of their votes -- and still they say they are the inheritors of a freedom struggle that demanded the ouster of aliens.

No electoral reforms, no police reforms or strengthening their morale and weapons, the administration is still run the way it functioned during the Sahebs; and despite having won a well-fought war in 1971 we couldn't settle the Kashmir issue or control the jihadi tail-wagger in the neighbourhood.

Minorities were so well supported in Congress regimes that in the sixth decade after independence they felt a need to provide special crutches for them. Show the 'M' card and get the privilege, became the new secular psalm, further shrinking the space and opportunities for the condemned majority.
More than anything else they tried to wreck the morale of the assertive Hindus who faced the onslaught of invaders for 12 centuries with unparalleled bravery and with invincible spirit to protect their culture and the fragrance of the land. They deserved to be comforted most after a fractured independence and a massacre that was thrust upon them by a weak Congress leadership. Yet, a large section of Hindus today feel cheated and anguished.
They form governments in 12 states, prove they can run the country beautifully with a coalition of 25 parties with diametrically opposed ideologies. And one of their Swayamsewaks unfurled the tricolour six times from the ramparts of the Red Fort as the prime minister, impressed world leaders and the international media with a record of infrastructure- building, communication revolution and women's empowerment, chose a Muslim to be the President and conducted Pokhran II by fooling the CIA's 'eyes', and resisted extraordinary world pressure and sanctions.
Yet, they are called anti-development, anti-women, even anti-social. In not a single so-called mainstream media outlet are their views published, but every news item is scanned to hurl stones on them through editorialising on the front-page.
Still, they are the very objective face of our independent media.
The choicest abuses used by 'decent guarantors of the freedom of expression' columnists and editorial-writers can be collected as a bouquet of India's uncivilised lexicon, yet their films against the very spirit of Hindu nature get widely supported by a regime that survives on Hindu money and votes.
Their love for development and secularism is so deep that they can send dredgers to destroy a million years of faith and marine life because that was Ram Sethu, but won't dare to touch a six feet by six feet dargah in the middle of the road blocking the highway and causing accidents, for fear of annoying a vote-bank.
And then they say, they are the future of India.


Tarun Vijay is Director, Dr Syama Prasad Mookerjee Research Foundation, New Delhi

Cityboy: Beer and Loathing in the Square Mile



Cityboy: Beer and Loathing in the Square Mile

by Geraint Anderson (Author)
READ HIS BLOG

The Interview

Source: The London Paper

Our most popular columnist is hanging up his bowler and coming out of the closet, having written a book based on his experiences. He speaks to Dominic Midgley
City Boy was sitting on a beach in Goa with a margarita in one hand and a joint in the other when he made the decision to change his life.

He had just discovered the size of his annual bonus after a call to the office.

I didn't know whether I was going to be given half a million or be sacked," he says. "If they had found out about the column I probably would have been sacked. I was told it was the former. In fact it was my biggest bonus ever.

"I breathed a sigh of relief and planned my escape. I'd always been ambivalent about my career due to being brought up in a left-wing, religious household and the fact I was a former hippy. I'd gone into the City in 1996 with the intention of doing only five years but, like the bank robber in the film, I kept doing one last job.

"I didn't want to end up like so many people in the City, alcoholic, red-faced, fat and on my second divorce. The City is full of people like that.

"Thanks to thelondonpaper I now had a potential alternative career as a writer."

The break he refers to was the chance to write a weekly column about the City. He didn't pull any punches. City Boy broke the Square Mile's strict code of silence to produce a searingly honest column that covered everything from the toll his punishing schedule put on his love life to battles with his conscience over the size of his whopping annual bonuses. As he once wrote: "Last Thursday night turned into a bit of a big one. If I had five grand for every time I've said that, over the past ten years, I'd be almost as rich as I actually am."

His notoriety meant a number of rival newspapers made attempts to discover his identity with a view to poaching him, but City Boy's identity has remained a secret known only to a handful of intimates – until now.

The man who amused the Square Mile every week for 22 months is, we can reveal, a 35-year-old Cambridge history graduate called Geraint Anderson, who rose to become a joint team leader at Dresdner Kleinwort.

But from there his story begins to depart from the script.

Far from being an obnoxious right-winger, Anderson is the son of a working-class Labour MP who sits in the Lords and remains left of centre. Despite an "exceedingly religious" upbringing, his rebellious streak was evident early on.

"I was expelled from my Montessori nursery aged four after an hour," he admits. "The teachers told my parents, 'He's not the kind of child we like here. He's too manic and he's hassling all the girls'.

"At 11, I was in hospital for three days for alcohol abuse. I was with two girls I was trying to impress. I stole a bottle of brandy and fell off a church hall roof and had my stomach pumped. I was close to death."

Spurred by the academic success of two brothers, he knuckled down and after supplementing his first degree with a masters from Sussex, he got a City job. The rest is history. Despite owning a four-bedroom house in Shepherd's Bush outright, and admitting to a "net asset value" of £2.5-£3m, Anderson is not your typical stockbroker.

"I drive a Cavalier my mother gave me that's 15-20 years old," he tells me. "Friends call it my fanny repellent and say, 'If you can still pull in that car you must be doing something right'."

And pull he can. "I split with someone I was going to marry two years ago and went into a tail-spin emotionally, making up for six years of faithfulness quickly," he says. "I did a Clegg or two in two years but I hope those days of madness are over. I'm not that wealthy but I do have a sort of financial equivalent of gaydar, gold-digger-dar. If I think a woman is interested in my money, I run a mile."

Anderson has written a book based on his experiences and aims to make his living as a writer and broadcaster. He finished it at the rate of 6,000 words a day while laid up after a scooter accident. It's presented as a novel rather than an autobiography and he stresses its characters and employers are not based on real people or banks. That said, like his column, you can't put it down.




City Boy - Beer And Loathing In The Square Mile
Who is City Boy? "He's every brash, suited FT-carrying idiot who ever pushed past you on the Tube. He's the egotistical buffoon who loudly brags about how much cash he's made on the market at otherwise pleasant dinner parties. He's the greedy, ruthless wanker whose actions are helping turn this world into the shit-hole it's rapidly becoming. For one period in my life, he was me."

Drawing on his experiences in the Square Mile, thelondonpaper's brilliant columnist City Boy is ready to lift the lid and reveal the truth about life in the City.

He is leaving the City, has written about his experiences in 'Cityboy – Beer And Loathing in the Square Mile', and has finally revealed his identity - burning all his bridges as he reveals explosive secrets about the dark underbelly of City life.

The book is on sale from 26 June, and The Times will publish extracts on June 19th and 20th.

tlp reader offer: 'Cityboy – Beer And Loathing in the Square Mile' - RRP £17.99. Pre-order it now for £16 (free P&P) - call 08700 703003

Read his full CV here, his personal profile here and leave your comments here.

CYBER WARFARE : Project Grey Goose Phase II Report On INDIA

Source: Sources and Methods
___________________
NOTE on INDIA Eastern Railways Website hacked by Pakistanis December 24 2008

India

The Eastern Railway Web Site Defacement

Action
On December 24, 2008, the Whackerz Pakistan Cr3w defaced India's Eastern Railway Website with the following announcement1: “Cyber war has been declared on Indian cyberspace by Whackerz-Pakistan” When clicked, a new window opened saying that “Mianwalian of Whackerz” has hacked the site in response to an Indian violation of Pakistani airspace; that Whackerz-Pakistan would continue to attack more Indian military and government Web sites as well as Indian financial institutions where they will destroy the records of their Indian customers.

India

The Eastern Railway Web Site Defacement

Action
On December 24, 2008, the Whackerz Pakistan Cr3w defaced India's Eastern Railway Website with the following announcement1: “Cyber war has been declared on Indian cyberspace by Whackerz-Pakistan” When clicked, a new window opened saying that “Mianwalian of Whackerz” has hacked the site in response to an Indian violation of Pakistani airspace; that Whackerz-Pakistan would continue to attack more Indian military and government Web sites as well as Indian financial institutions where they will destroy the records of their Indian customers.

Actors
Hacker Crew Members Also Known As Country affiliation Religious affiliation Attack history Whackerz Pakistan PakBrain, MianWalian, Fady911x, Saudia_Hacker, Ch33ta, and Iced_rose Jubni team Pakistan Muslim 8/2005: as Jubni, attacked India Institute of Technology Web sites at Mumbai, Guwahati, Kharagpur, and Chennai campuses. 12/2008: as Whackerz, attacked Eastern Railway Web site. Methods Defacements

1 http://www.financialexpress.com/news/Pak-hacker-attacks-E-Rlys-site-threatenscyber-war-on-India/402609/

This crew has been operating for at least 3 years, probably longer. This article1 refers to them as the Jubni team who attacked four India Institute of Technology Web sites in 2005. In the month of August, the websites of four IITs - Mumbai, Guwahati, Kharagpur and Chennai - were hacked and defaced by a group of Pakistani hackers who call themselves the Jubni team. The hackers claimed that some of the members of the group are Majeed, Jubni, Zohaib, Pak Brain, Mian Walian and Ch33ta. The ire of the group was directed towards India, USA and Israel. While the name of the group and some of its members have changed, the theme of being anti-India, USA, and Israel remains consistent.

[HAKR profiles for Whackerz members have been redacted from the public report]

Analysis
Whackerz-Pakistan is motivated by both nationalistic and religious allegiances, unlike their Russian or Chinese counterparts who are purely nationalistic. At least one of the members is Egyptian and two live in Canada so their geographical identity may be less important than their religious affiliation. Their stated preferred targets are India, Israel, and the United States, so besides their involvement in the Pak-India cyber conflict they may also be involved in the Israel-Palestine cyber attacks. At least half of its current membership are educated professionals in their 20s or older so this is a mature crew with financial resources and professional contacts in the international technology community. The employment by one of its members at a well-known global wireless communications company means that they are potentially both an external and internal threat.

1 http://archives.neohapsis.com/archives/isn/2005-q4/0323.html

___________________

Jeff Carr (who blogs at IntelFusion and runs GreyLogic) released his most recent report on the evolving state of cyberwar late last week and it is a good one. Focused primarily on three recent attacks, the report contains well-written, clear, evidence-based findings. Jeff's report goes beyond just the technical findings, however, and pulls the strings together in a way that will be of high interest to the non-technical reader as well.This is part 2 of the Grey Goose Project which uses an "open innovation intelligence model focusing on identifing and tracking Non-state hackers and the companies and governments that support them."Non-governmental versions of both Part 1 and 2 of the Grey Goose Report are available online. The non-gvernmental versions focus on the findings and conclusions derived therefrom. The governmental versions contain much more of the concrete evidence on which those findings/conclusions are based. The Government version can be requested via e-mail from a government e-mail account. Jeff indicated that it will also be available on A-Space and Intellipedia.(Full Disclosure: Jeff was kind enough to send an early copy of both reports for me to review prior to publication. I received no pay or compensation of any kind for providing feedback. I have no formal relationship with GreyLogic or Intelfusion other than Jeff's a friend and we both blog about the same kind of stuff.Bottomline: The reports were good when I got them and Jeff has only made them better since.)



Project Grey Goose Phase II Report:
The evolving state of cyber warfare

March 20, 2009

greylogic

About Project Grey Goose
Project Grey Goose is an Open Source Intelligence (OSINT) initiative launched on August 22, 2008 whose original remit was to examine how the Russian cyber war was conducted against Georgian Web sites and if the Russian government was involved or if it was entirely a grass roots movement by patriotic Russian hackers. Starting in 2009, Project Grey Goose has evolved into a formal business entity – GreyLogic; a consultancy and information services provider to governments. This report features GreyLogic's information and analysis services for Computer Network Exploitation and Cyber Intelligence. Western government agencies for Intelligence, Law Enforcement, and Defense are invited to contact GreyLogic for more information on our services.

Copyright 2009 GreyLogic All Rights Reserved

Executive Summary

Introduction
There has been a marked increase in cyber attacks by State and Non-State hackers since the Russia Georgia War of 2008. In addition to the cyber clashes resulting from Israel's Operation Cast Lead and the Web site defacement of India's Eastern Railway, the British government has reported thousands of cyber attacks occurring each day on its critical infrastructure.1 The French Embassies in Britain, the U.S., China, and Canada came under Chinese cyber attacks in December 2008.2 The government of Zimbabwe has been waging a cyber war against its opposition party for the past five years.3 As this report is being written, a 60 day U.S. cyber security review on how the U.S. government may best proceed to protect its cyberspace from a wide variety of attacks against U.S. financial infrastructure and national security threats on a daily basis.4 This report aims to answer the following questions by examining three different cyber events impacting almost a dozen nations: How effective is Social Network Analysis in Computer Network Exploitation? How critical is the ability to access black (classified) data in a cyber intelligence effort? Is there evidence that points to Russian government involvement in the Georgia cyber attacks of July and August 2008?

1 2 3 4

http://www.timesonline.co.uk/tol/news/uk/crime/article4592677.ece http://intelfusion.net/wordpress/?cat=413 http://concernedafricascholars.org/the-glass-fortress/ http://news.cnet.com/8301-13578_3-10159975-38.html

Our Key Findings
Eastern Railway Web Site
On December 24, 2008, a group that self identified as the Whackerz Pakistan defaced the Indian Eastern Railway Web site with a variety of financial threats against Indian citizens. Our findings indicate that: • • • At least three of the six members of Whackerz Pakistan are well-educated professionals, and at least two are employed in the technology industry. Their members' religious affiliation (Muslim) is at least as important as their Geopolitical allegiances (Pakistan). At least one Whackerz member represents an Insider Threat for his employer, a global wireless communications company based in North America.

Operation Cast Lead
Israel began a military assault on Hamas’s infrastructure in Gaza on December 27, 2008, called “Operation Cast Lead.” A cyber backlash by Arabic hackers targeted thousands of Israeli government and civilian Web sites. Our findings indicate that: • Unlike other instances of cyber conflicts (Chechnya, Estonia, Lithuania, Georgia, India), this conflict involved both State (Israel and possibly Iran) and Non-State hackers. Most of the Non-State Arabic hackers involved do not have the technical skill to carry out sophisticated network attacks, opting instead for small to midscale denial of service attacks and mass website defacements. We have not observed any zero day vulnerabilities exploited in these attacks. Instead, most attackers focused on old Web site vulnerabilities that had not been patched. This is the first instance of a voluntary botnet (“Help Israel Win”) used in a Cyber conflict where individuals voluntarily passed control of their own computers to the botnet host server.







The Russia Georgia Cyber War
This section follows up our Phase I investigation of the cyber component of the Russia/Georgia war of August 2008 by looking at question of attribution in two distinct parts: a) What can we tell by examining the network supporting the StopGerogia.ru forum b) Is there a link between the Kremlin and those involved in the cyber attacks against Georgian Web sites Our findings indicate that: • Russian military policy acknowledges the strategic value achieved by utilizing methods of cyber attacks which can appear to be acts of cyber crime or terrorism. The StopGeorgia.ru forum was part of a bulletproofed network that relied on shell companies and false WHOIS data to (a) prevent its closure through Terms of Service violations, and (b) to mask the involvement of the Russian FSB/GRU. By mimicking the structure of the Russian Business Network, a cyber criminal enterprise, it creates plausible deniability that it is a Kremlinfunded Information Operation (IO).





Nashi members have been involved in Cyber attacks against internal and external opponents of the Kremlin, up to and including the Estonia Cyber war. Since the Nashi receives some of its funding from the Kremlin, receives direction on focus areas from government officials, and has the favor of highly placed politicians, Nashi involvement is equivalent to Kremlin involvement.

Summary of Findings
Having examined three disparate cyber events in different regions of the world at a much deeper level than has heretofore been performed, we present the following conclusions: Non-State hackers rely on publicizing their exploits to build their online reputations. Thanks to this need for recognition among their peers, data mining foreign language forums and social media sites can produce meaningful results. It is not, however, sufficient in and of itself and should be combined with server-level data, as well as an examination of geopolitical events occurring around the time of the cyber attacks. Furthermore, when State interests are involved, a review of the Nation State's military doctrine related to Information Warfare is also important. If all of this information is available, then there is little need for accessing classified (black) data. In fact, the incorporation of black data can be counterproductive as it precludes the sharing of information between non-cleared international researchers which often adds speed and veracity to an otherwise challenging pursuit. The identification and prosecution of Non-State hackers who engage in these attacks can be an effective deterrent as shown by the Eastern Railway investigation. Although some of the members of Whackerz Pakistan were in the position to make good on their threats of causing financial harm to Indian citizens, nothing further has been done by this group. We believe that's at least partly due to the sharing of GreyLogic's investigative results with the FBI, RCMP, and CBI shortly after the initial incident occurred. In the case of possible Russian government involvement with the cyber attacks on Georgian government websites in July and August, 2008, the available evidence supports a strong likelihood of GRU/FSB planning and direction at a high level while relying on Nashi intermediaries and the phenomenon of crowdsourcing to obfuscate their involvement and implement their strategy.

1
India

The Eastern Railway Web Site Defacement
Action
On December 24, 2008, the Whackerz Pakistan Cr3w defaced India's Eastern Railway Website with the following announcement1: “Cyber war has been declared on Indian cyberspace by Whackerz-Pakistan” When clicked, a new window opened saying that “Mianwalian of Whackerz” has hacked the site in response to an Indian violation of Pakistani airspace; that Whackerz-Pakistan would continue to attack more Indian military and government Web sites as well as Indian financial institutions where they will destroy the records of their Indian customers.

Actors
Hacker Crew Members Also Known As Country affiliation Religious affiliation Attack history Whackerz Pakistan PakBrain, MianWalian, Fady911x, Saudia_Hacker, Ch33ta, and Iced_rose Jubni team Pakistan Muslim 8/2005: as Jubni, attacked India Institute of Technology Web sites at Mumbai, Guwahati, Kharagpur, and Chennai campuses. 12/2008: as Whackerz, attacked Eastern Railway Web site. Methods Defacements

1 http://www.financialexpress.com/news/Pak-hacker-attacks-E-Rlys-site-threatenscyber-war-on-India/402609/

This crew has been operating for at least 3 years, probably longer. This article1 refers to them as the Jubni team who attacked four India Institute of Technology Web sites in 2005. In the month of August, the websites of four IITs - Mumbai, Guwahati, Kharagpur and Chennai - were hacked and defaced by a group of Pakistani hackers who call themselves the Jubni team. The hackers claimed that some of the members of the group are Majeed, Jubni, Zohaib, Pak Brain, Mian Walian and Ch33ta. The ire of the group was directed towards India, USA and Israel. While the name of the group and some of its members have changed, the theme of being anti-India, USA, and Israel remains consistent.

[HAKR profiles for Whackerz members have been redacted from the public report]

Analysis
Whackerz-Pakistan is motivated by both nationalistic and religious allegiances, unlike their Russian or Chinese counterparts who are purely nationalistic. At least one of the members is Egyptian and two live in Canada so their geographical identity may be less important than their religious affiliation. Their stated preferred targets are India, Israel, and the United States, so besides their involvement in the Pak-India cyber conflict they may also be involved in the Israel-Palestine cyber attacks. At least half of its current membership are educated professionals in their 20s or older so this is a mature crew with financial resources and professional contacts in the international technology community. The employment by one of its members at a well-known global wireless communications company means that they are potentially both an external and internal threat.

1 http://archives.neohapsis.com/archives/isn/2005-q4/0323.html

2
Israel

Operation Cast Lead / Gaza Cyberwar
Action
Israel began a military assault on Hamas’s infrastructure in Gaza on December 27, 2008, called “Operation Cast Lead.” After almost a month into the operation, Palestinian officials declared the death toll had topped 1,000, and media reports carried images of massive property destruction and civilian casualties1. The exact number of Israeli or other websites that have been disrupted by hackers is unknown, but the number is well into the thousands. According to one estimate, the number reached 10,000 by the first week of January alone. While media coverage focuses on the most high profile hacks or defacements, this current cyber campaign is a “war of a thousand cuts,” with the cumulative impact on thousands of small businesses, vanity websites, and individual websites likely outweighing the impact of more publicized, larger exploits. However, successfully compromising higher profile websites not only brings more public attention, it compels businesses all over Israel to preventatively tighten security, costing money. For that reason the financial impact of infiltrating a few larger corporate websites may be as important as disrupting thousands of smaller sites.

1Overall death tolls, as well as the proportion of dead who are civilians rather than
militants, is currently disputed by the Israel Defense Forces (IDF), but they admit to at least 900 people killed as of January 22, 2009. Lazaroff, Tovah and Yaakov Katz. “Israel Disputes Gaza Death Toll,” Jerusalem Post, January 22, 2009. http://www.jpost.com/servlet/Satellite?cid=1232292939271&pagename=JPost %2FJPArticle%2FShowFull

Actors
Cold Zero: Cold Zero is a member of Team Hell. Unlike the majority of Team Hell members who are Egyptian, Cold Zero is Palestinian and is proficient in Hebrew. The Arabic Mirror credits him with 2485 Web site defacements, of which 779 occurred during Operation Cast Lead. His website is www.hackteach.net. According to a French language news source Zataz News, January 3, 2009, Cold Zero was arrested by Israeli authorities. The news source identified him as a 17 year old Israeli Arab. It reported that he appeared on January 6 before the Federal Court of Haifa, where the Israeli Justice Department alleged that he attacked commercial and political sites, mentioning the Likud Party website hack as well as an attack on the website of the Tel Aviv Maccabis basketball team. According to the same source, he worked with accomplices in Turkey, Lebanon, Saudi Arabia, and elsewhere. He was caught in a “honey pot” set up by authorities. Authorities also uncovered his identity from a database stolen from Turkish hackers. Team Hell:

Team Hell self-identifies as a Saudi-based hackers group, usually consisting of Kaspersky, Jeddawi, Dr. Killer, BlackShell, RedHat, Ambt, and Cold Zero. Team Hell’s politically oriented-hacks include more than just Israeli sites. In April 2007, Team Hell hacked Al-Nusra, a Palestinian-focused Jihadist website. They left a message indicating they associated al-Nusra with religious deviancy. On websites they have defaced, Cold Zero and Team Hell have expressed support for the secular, nationalist Fatah party. This would explain why Team Hell would hack Al-Nusra, a Salafist-Jihadist website, even though it is also anti-Israel. The group has also defaced the website of the Syrian parliament2.

2 http://www.zone-h.org/component/option,com_mirrorwrp/Itemid,160/id,5573205/

Agd_Scorp/Peace Crew:

Agd_Scorp/Peace Crew are Turkish hackers who defaced NATO and US military Web sites in response to Operation Cast Lead. On three subdomains of mdw.army.mil, belonging to the US Army Military District of Washington, and on the NATO parliament site www.nato-pa.int, the group posted a message reading “Stop attacks u israel and usa! You cursed nations! One day muslims will clean the world from you.”3 The group also used a SQL Injection attack to deface the Web site of the Joint Force Headquarters of the National Capital Region.4 Jurm Team: Jurm Team is a Moroccan group that has partnered with both Agd_Scorp and Team Evil in defacements. They have recently defaced the Israeli portals for major companies or products, including Kia, Sprite, Fanta, and Daihatsu. Their members call themselves: Jurm, Sql_Master, CyberTerrorist, Dr. Noursoft, Dr. Win, J3ibi9a, Scriptpx //Fatna and Bant Hmida. C-H Team: C-H Team consists of two hackers or hacker teams: Cmos_Clr and hard_hackerz. C H Team targets Dutch and Israeli websites, leaving threatening messages in Hebrew on the latter. 5 The two are Algerian. Besides defacing sites, Cmos_Clr claims to have used a variant of the Bifrost Trojan horse in order to break into Israeli computers, infiltrating 18 individual machines.6 Hackers Pal: Hackers Pal is the administrator of the Hackers Hawks website, and has claimed 285 defacements of Israeli websites. He is a supporter of the secular Fatah party. Gaza Hacker Team: Gaza Hacker Team runs the website of the same name. They were responsible for defacing the Kadima party website on February 13. The team consists of six members: Lito, Le0n, Claw, Virus, Zero code, and Zero Killer.

3 McMillan, Robert. “Hackers Deface NATO, US Army Web Sites,” Computer World,
January 9, 2009. http://www.zone-h.org/content/view/15003/30/ 4 Ibid 5A mirror of one of C-H Team’s defacements can be seen here: http://www.arabicm.com/index.php?page=mirror&id=23550 6http://www.hackteach.org/cc/showthread.php?t=137613&page=2.

DNS Team:

DNS team is an active Arab hackers team focused primarily on apolitical hacking, however they occasionally exhibit politically motivated attacks such as targeting Web sites in Denmark and the Netherlands during the Fall of 2008 in retaliation for the cartoon controversy. They've also participated in recent anti-Israel hacks. DNS team maintains a hacking and security forum at http://www.v4-team.com/cc/. DZ Team:

DZ Team consists of Algerian and Egyptian hackers who use the aliases AoxideA, Maxi32, Skins, The Legend, Cyb3r-Devil, and the Moorish. They have defaced several Israeli Web sites including Vokswagon, Burger King, and Pepsi's Israeli portals, the Web site of israeli defense contractor BVR systems, the Kadima party Web site, and the Hillel Yaffe hospital Web site. Videos of the groups' successful defacements were posted to YouTube.7

7 http://www.youtube.com/watch?v=OuRhHjYb8SQ

Ashianeh Security Group:

The Iranian Fars News Agency reported that the Ashianeh Security Group hacked 400 Israeli Web sites, including those of the Mossad and Israeli Defense Minister Ehud Barak.8 Since this group doesn't participate in online hacker forums, it may be Statesupported (Iran). Nimr al-Iraq: Nimr al-Iraq is credited with updating the al-Durrah Distributed Denial of Service (DDoS) tool for use during Operation Cast Lead. He has also provided links to a Remote Administration Tool (RAT) program called hackattack9, which enables a hacker to gain remote control over another person's computer. According to his profile on soqor.net, Nimr al-Iraq is a 22 year old Iraqi named Mohammed Sattar al-Shamari and is listed as a former moderator on the site.

Analysis
Analysis of discussions on Arabic hacker forums and general pro-Jihad forums indicate that anti-Israeli hackers would like to carry out serious cyber attacks against Israeli targets, however, they do not have a demonstrated capability to carry out such attacks. Instead, their actions have been limited to small to mid-scale denial of service attacks and mass website defacements. They may also have attempted to compromise individual computers via Trojans, particularly the Bifroze Trojan, a variant of which was developed by members of the 3asfh hacker forum. They also discuss the desire to use viruses against Israeli computers, although the kind of viruses under discussion are relatively old and many computers would already have been updated with protections against them.

DDoS Attacks
Muslim hackers are using both indigenously developed and borrowed DDOS tools, and making them available for download on hacker forums. One tool, named after Mohammed al-Durra, a Palestinian child allegedly shot and killed by Israeli soldiers in 2000, was first developed in 2006. An updated version has been provided by Nimr al-Iraq for use in the current conflict. With the al-Durra program, a user voluntarily downloads the program and then 8 Fars News Agency, January 7, 2009 and January 10, 2009. Via World News Connection. 9 http://www.soqor.net/forums/hackattack-play-10000000000000000Percentt9646.html

checks to see what the target websites are on Arabic hacker forums. He then plugs in the target and the program will repeatedly send requests to it. When a sufficient number of people utilize the al-Durra program against a site, they can overwhelm it and bring it down. Other DDOS tools developed by hackers outside this community, such as hack tek, are also being used. Such tools do not require sophisticated technical skills or training, which make them useful in a political dispute such as the Gaza crisis, when there is a very large community globally willing to assist in cyber attacks against Israel, but not necessarily skilled enough for more sophisticated attacks.

Web Site Defacements
The hackers download vulnerability scanners from hacker forums to find websites with exploitable vulnerabilities. On the Arabic language forums, they have discussed using a few different methods, including SQL injection, xss, and other web server software vulnerabilities. In most cases, they are reusing previously released exploit code to attack known vulnerabilities picked up by vulnerability scanners. This is somewhat more difficult than the denial of service attacks, but is still not considered sophisticated on the larger spectrum of hacking activities. The vulnerabilities being exploited by these hackers have already been identified and patches and updates have been released to fix them. The only websites that are still vulnerable are those whose administrators have been lax in updating their software and downloading patches. There is no evidence that this community is locating “zero day” vulnerabilities at this time – those that have not yet been discovered.

Viruses and Trojans
Hacker forums reveal a desire to use viruses against Israeli targets but no evidence of success thus far. A couple of hackers have boasted of successfully using Trojans and RAT (Remote Administrations Tools) to gain wide access to individual Israeli computers. This could give them the ability to capture passwords and other important data, facilitating financial crime and harassment. However, there is not yet much evidence that they have been successful with these tools.

Israeli Retaliation
Israel and its supporters have also participated in this cyber conflict in a couple of ways. The Israeli government is behind an effort to recruit supporters who speak languages other than Hebrew – mostly new immigrants – to flood blogs with proIsrael opinions. The Israel Defense Forces has hacked a television station belonging to Hamas. Supporters of Israel have also been hacking pro-Palestinian Facebook groups, using fake login pages and phishing emails to collect the login details of group members. According to the administrators of one of the anti-Israeli hacker websites, Gaza Hacker Team, pro-Israel activists are also pressuring hosting companies to cut off service to hacker websites. After the Gaza Hacker Team defaced the Kadima party website, they reported that their US hosting company denied them service after being subjected to “Jewish” pressure. Voluntary Botnet: Perhaps the most creative tactic employed by Israel’s supporters is the development of a voluntary botnet. Developed by a group of Israeli hacktivists known as “Help Israel Win,” the distributed denial of service tool, called “Patriot,” is designed to attack anti-Israel websites. Once installed and executed, Patriot opens a connection to a server hosted by

Defenderhosting.com. It runs in the background of a PC and does not have a configurable user interface that allows the user to control which sites to attack. Rather, the server at defenderhosting.com likely updates the client with the IP addresses to target. “Help Israel Win” describe themselves as “a group of students who are tired of sitting around doing nothing while the citizens of Sderot and the cities around the Gaza Strip are suffering…” Their stated goal is to create “a project that unites the computer capabilities of many people around the world. Our goal is to use this power in order to disrupt our enemy’s efforts to destroy the state of Israel.” The Help Israel Win website is registered to Ron Shalit of Haifa, Israel.

3
Russia

Attribution and Bulletproof Networks
This section follows up our Phase I investigation of the cyber component of the Russia/Georgia war of August 2008 by looking at question of attribution in two distinct parts: c) What can we tell by examining the network supporting the StopGerogia.ru forum d) Is there a link between the Kremlin and those involved in the cyber attacks against Georgian Web sites

Creating a bulletproof network
A bulletproof network allows its customers a great degree of latitude in conducting operations that would otherwise constitute terms of service (TOS) violations.

StopGeorgia.ru
StopGeorgia.ru was a password-protected forum built with phpBB software and launched within 24 hours after the commencement of Russia's ground, sea, and air assault on the nation of Georgia on August 8, 2008. While cyber attacks occurred against Georgian government Web sites as early as July 21, 2008, this particular forum was not active until the day after the invasion. It provided hackers of all levels with vetted target lists, links to malware to be used to attack Georgian government Web sites, and expert advice for novice hackers (of which there were many). A WHOIS search on the StopGeorgia.ru domain revealed the following information: Domain Type Nserver Nserver State Person STOPGEORGIA.RU CORPORATE ns1.gost.in ns2.gost.in Registered, Delegated Private Person

Phone E-mail Registrar

+7 908 3400066 anac109@mail.ru NAUNET-REG-RIPN

NAUNET.RU
NAUNET is a Russian registrar that is blacklisted by the Spamhaus Project for providing cybercrime/spam/phish domains (Spamhaus SBL advisory #SBL67369 01 Dec 2008). The domain name StopGeorgia.ru was acquired at Naunet.ru. Part of the complaint against Naunet on file at Spamhaus is that it has knowingly accepted false information in violation of RPIN rules. In the Whois info for StopGeorgia.ru, the phone number of 7 908 3400066 and e-mail address anac1099mail.ru are both listed in the registrar information for a variety of Web sites selling things like fake passports, adult porn, and ATM skimmers. While the domain information for StopGeorgia.ru doesn't list a person's name, opting instead for the ubiquitous “private person”, other domains with the same telephone number and e-mail address have been registered under the name Andrej V Uglovatyi. Andrej V Uglovatyi, however, is most likely a fictitious person. A search on Yandex.com returns only two unique hits for the name. Considering the amount of data being collected online for individuals today, as well as the fact that Andrej V. Uglovatyi is purportedly conducting a number of businesses online, receiving so few hits can only be due to this name being a pseudonym used in shady domain registrations such as this one at www.dokim.ru (Creation of passports aned driver licenses for Russia and EU countries)l.

SteadyHost.ru
Performing a WHOIS on the IP address is an important step in the money trail process. Someone need to purchase time on a server to host the PHP forum. The Stopgeorgia.ru IP address is 75.126.142.110 which resolves to a small Russian company called SteadyHost (www.steadyhost.ru). The domain registration for Steadyhost.ru provides the following information: Domain Type Nserver Nserver State Person Phone E-mail Registrar Created STEADYHOST.RU CORPORATE ns1.steadyhoster.com ns2.steadyhoster.com Registered, Delegated Sergey A Deduhin +7 905 4754005 ****@steadyhost.ru RUCENTER-REG-RIPN 09/30/06

Paid till Source

09/30/09 TC-RIPN

Sergey A. Deduhin, the person who registered the domain name Steadyhost.ru, doesn't seem to have any more of an Internet footprint than Andrej V Uglovatyj of StopGeorgia.ru. According to contact information at SteadyHost's Web site, it has its offices in an apartment building at 88 Khoroshevskoe Shosse, Moskva (Moscow). A search on Yandex reveals another tenant at that same address – Uniastrom Bank, which is a private bank catering to individuals and small to medium-sized companies throughout the Russian Federation. Neighboring Uniastrom Bank, at 86 Khoroshevskoe Shosse, is a Ministry of Defense Research Institute called the Center for Research of Military Strength of Foreign Countries. And just down the block, at 76 Khoroshevskoe Shosse is GRU headquarters, also known as The Aquarium. Based upon the proximity of the GRU to the apartment building, it's reasonable to assume that some GRU personnel live there. It does provide convenient access on a number of levels, not the least of which is the ability to provide cover accommodations (i.e., someone to provide minimum business support activities for SteadyHost.

Figure 7.5: Google Earth view of GRU headquarters The GRU is the Main Intelligence Directorate of the Russian Armed Forces. its primary business is deploying several thousand spies in foreign countries for political and military information gathering. According to the Federation of American Scientists (FAS) Web site, the GRU may be thought of as the Russian equivalent of the U.S. Defense Intelligence Agency (DIA). It is involved in the collection of Human Intelligence (HUMINT) via foreign agents, Signals Intelligence (SIGINT) via various electronic mediums, and Image Intelligence (IMINT) via satellite imagery. In 1996, in an interview with Pravda, the leader of the GRU at that time, General

Fedor Ladygin, included technical espionage among the missions of his organization (Komsomolskaya Pravda, 05 November 1996). This includes the hacking of computer networks to gain access to sensitive data. The current leader, General Valentin Korabelnikov, added Open Source Intelligence (OSINT) to the GRU's mission according to an interview with CDI Russia Weekly on July 17, 2003.

Innovation IT Solutions Corp
Most legitimate registrars will confirm at least some of the registration information provided by a customer as part of the process of registering a domain name. Those that don't have become favorites of spammers and cyber criminals. If you look deeper at the information provided on the StopGeorgia.ru IP address, you'll see that it is part of an IP block leased to Innovation IT Solutions Corp in England by SoftLayer Technologies in Dallas. Innovation IT Solutions Corp has a Web site URL: http://init-sol.com/ but no Web site. Instead visitors see a place holder page providing basic contact information: According to WHOIS data, the Init-sol.com domain name was registered by an employee of Innovation IT Solutions Corp named Andrey Nesterenko. Mr. Nesterenko purchased the domain name through another company – Mirhosting.com. If you examine the WHOIS records below, you'll see that Mr. Nesterenko is apparently employed by both companies, and that both companies share the same business address: 95 Wilton Road, Suite 3, London. A Google search for that address brings up a variety of businesses including a porn site (Cheeky-Touch), a teen site (Teencharts.com), Goldstein Equitas Inc., and Global Securities Consulting; in other words, 95 Wilton Road, Suite 3, London, is a mail drop. Domain name Registrant INIT-SOL.COM Innovation IT Solutions Corp Andrey Nesterenko 95 Wilton Road, Suite 3 London London,SW1V 1BZ GB Tel. +44.8458692184 Fax. +44.8450205104 Creation date Expiration date Domain servers Administrative contact Status 10/10/04 10/10/09 ns5.dnska.com ns6.dnska.com Innovation IT Solutions Corp Active

Innovation IT Solutions Corp is not a registered business in the UK or anywhere else and doesn't seem to exist outside of its London mail drop address.

Mirhosting.com
MirHosting provides some substantive information on its Web site regarding its services, albeit in the Russian language. According to Dun and Bradstreet, its principal and sole stockholder, Andrey Nesterenko, is a Russian national living in the Netherlands, yet its business address is a mail drop in London; the same one used by Innovation IT Solutions Corp. Domain name Registrant MIRHOSTING.COM Innovation IT Solutions Corp Andrey Nesterenko 95 Wilton Road, Suite 3 London London,SW1V 1BZ GB Tel. +44.8458692184 Fax. +44.8450205104 Creation date Expiration date Domain servers Administrative contact Status 10/10/04 10/10/09 ns2.dnska.com ns1.dnska.com Innovation IT Solutions Corp Active

MirHosting provides some substantive information on its Web site regarding its services, albeit in the Russian language. According to Dun and Bradstreet, its principal and sole stockholder is a Russian national living in the Netherlands, yet its business address is a mail drop in London; the same one used by Innovation IT Solutions Corp.

SoftLayer Technologies
The IP address for the StopGeorgia.ru forum (75,126.142.110) can be traced backwards from SteadyHost to Innovation IT Solutions Corp to SoftLayer Technologies, a U.S. Company based in Dallas, TX with server locations in Seattle, WA and Washington D.C. Figure 7.7: WHOIS data for 75.126.142.110

SoftLayer Technologies and The Planet (also in Dallas, TX) share the unique distinction of being on StopBadware.org's Top 10 worst badware network blocks. To add some perspective to this, StopBadware.org's May 2008 report reveals China to be the world leader hosting 52% of all badware sites, while the U.S. hosts 21%. None of the other countries involved, including Russia, individually host more than 4%.

The Kremlin and the Russian Internet (RUNET)
One of the most difficult questions that the Project Grey Goose team faced in investigating the cyber war between Russian and Georgia was if there was evidence that the Russian government was involved. Our key finding in October, 2008 was: We assess with high confidence that the Russian government will likely continue its practice of distancing itself from the Russian nationalistic hacker community thus gaining deniability while passively supporting and enjoying the strategic benefits of their actions. While forum members are quite open about their targets and methods, we were unable in this round of collection/analysis to find any references to state organizations guiding or directing attacks. There are several possible explanations as to why this is the case. • • • There was no external involvement or direction from State organizations Our collection efforts were not far-reaching or deep enough to identify these connections Involvement by State organizations was done in an entirely nonattributable way

The situation has since changed. In February, 2009, the Russian media reported a story that has provided new evidence pointing to how the Russian government sponsors and pays leaders of Russian youth organizations to engage in Information Operations up to and including hacking to silence or suppress opposition groups.

The Nashi

Figure 3.9: The Nashi Logo Nashi (http://nashi.su) is short for Molodezhnoye demokraticheskoye antifashistskoye dvizhenye "Nashi" (translation, “Youth Democratic Anti-Fascist Movement "Ours!"). It was formed in 2005 to either counter the possibility of another youth revolt like the 2004 Orange Revolution in Ukraine or to counter a growing interest in Nazism in Russia. Funding for the group purportedly comes from Russian business owners however there has been widespread speculation that it receives government funding as well. That speculation has been strengthened in recent days by the Anna Bukovskaya story related below. One of the most important supporters of Nashi is Vladislav Surkov, the First Deputy Chief of the Presidential Staff and, more importantly, a man who has the ear of Russian Prime Minister Vladmir Putin. Surkov intends to use Nashi to enforce the Kremlin's will regarding Russian Internet (RUNET) communications; i.e., “Ensure the domination of pro-Kremlin views on the Internet” (The New Times Online in Russian 16 Feb 09). That's easier said then done, particularly since that effort was tried and abandoned about 10 years ago by RUNET co-founder Anton Nosek. Surkov has a new plan which involves the enlistment of Russian youth organizations including Nashi and United Russia. He has organized a March 2009 conference with about 20 key people in the Russian blogging community as well as leaders of the aforementioned youth organizations to discuss an information strategy for the Internet: “To every strategy there should be a response, or better still, two responses simultaneously.” Anna Bukovskaya is a Nashi member and St. Petersburg activist who was paid by the Kremlin to spy on opposition political youth movements. In March, 2008, Nashi hackers were accused of orchestrating a series of Distributed Denial of Service (DdoS) attacks against the Russian newspaper Kommersant. A Nashi spokesperson denied that the group was involved. In October, 2007, another Russian youth movement known as The Eurasian Movement of the Youth (ESM) launched a DDoS Web attack against the President of Ukraine's Web site, shutting it down for three days, and both Nashi and the ESM participated in protests against the Estonian embassy in Moscow in May, 2007. Membership in Nashi has served the political aspirations of its leaders well. “Vasily Yakemenko, the group’s founder, is now the head of the government’s youth committee. Sergei Belokonev, the head of the “Nashi elections” division, accepted a post in Russia’s Parliament.” 10

Sergei Markov, Estonia, and the Nashi
10 http://www.theotherrussia.org/2008/01/30/kremlin-slims-down-nashi-youthmovement/

On March 3, 2009, Sergei Markov, a State Duma Deputy and member of the Unified Russia party, participated in a panel discussion with Russian and U.S. experts including James Lewis of the Center for Strategic and International Studies, about Information Warfare in the 21st century. During that discussion, Markov stunned everyone present by announcing that it was his assistant who started the Estonia cyber attacks in 2007. The following quote comes from Radio Free Europe which broke the story on March 6, 2009 at its Web site: “Markov, a political analyst who has long been one of Vladimir Putin’s glibbest defenders, went on to explain that this assistant happened to be in “one of the unrecognized republics” during the dispute with Estonia and had decided on his own that “something bad had to be done to these fascists.” So he went ahead and launched a cyberwar. “Turns out it was purely a reaction from civil society,” Markov reportedly said, adding ominously, “and, incidentally, such things will happen more and more.” This is most likely Konstantin Goloskov11, a Commissar in Nashi, who acknowledged his involvement and those of his associates in the Estonia Cyber attacks. Markov, a supporter of the Nashi youth movement, attended its second annual Innovation Forum on July 21, 2008; one day after the President of Georgia's web site came under a Distributed Denial of Service (DDoS) attack and 19 days before Russia's invasion of Georgia.

Russian Military Policy for Information Warfare
In a speech before the National Forum of Information Security "InfoForum-10" in

Moscow on February 2008, Russian Deputy Chief of the General Staff Aleksandr Burutin spoke on the topic “Wars of the Future will be Information Wars”12 wherein he discussed how the rise of technological development brings with it military applications:
"The uniqueness of information weapons lies in the fact that while developing their national information infrastructure, states create a material base for using information technologies for military purposes. The higher the scientific and technical potential, the wider the set of potential targets: telecommunication and communication systems, space vehicles, automated troop and weapons control systems, financial, bank and commercial activity, power supply systems and so on." ----------"For this purpose specialized subdivisions are being created in the armed forces and special services, conceptual documents regulating questions of preparation and conducting information operations are being developed, and appropriate training is being conducted." Another piece of Russia's cyber strategy is spelled out in a multi-authored article in Moscow Military Thought13 which addresses the strategic tactic of disguising acts of information warfare as criminal activities: "In our view, isolating cyberterrorism and cybercrime from the general context of 11 http://www.ft.com/cms/s/0/57536d5a-0ddc-11de-8ea3-0000779fd2ac.html? nclick_check=1 12 Speech by Aleksandr Burutin, Info-Forum 10, February, 2008

13Moscow Military Thought (English), “Russian Federation Military Policy in the Area of International Information Security: Regional Aspect” 31 Mar 07

international information security is, in a sense, artificial and unsupported by any real objective necessity. This is because the effect of a "cybernetic" weapon does not depend on the motivation of a source of destructive impact, whereas it is primarily motivation that distinguishes acts of cyberterrorism, cybercrime, and military cyberattacks. The rest of their attributes may be absolutely similar. The practical part of the problem is that the target of a cyberattack, while in the process of repelling it, will not be informed about the motives guiding its source, and, accordingly, will be unable to qualify what is going on as a criminal, terrorist or military-political act. The more so that sources of cyberattacks can be easily given a legend as criminal or terrorist actions (emphasis added)."

Who Controls the Data Flow
Even with a bulletproofed network, it's important to remember that while the Kremlin provides open and global Internet access to its citizens, it also collects and controls all of the data originating within its borders. A recent interview with the Editor-in-Chief of the Russian news Web site BFM.ru, Anton Nosik, was published in the Russian online newspaper The New Times. In it, Nosik spoke of SORM-2 (System of Operation Research Measures) which copies every byte of Internet traffic coming from Russian households and businesses and sends it to the Federal Security Service (FSB) via a Redundant Array of Inexpensive Disks (RAID). Nosik also pointed out that the Kremlin either owns the pipes (Rostelekom, Transtelekom, and Elektrotelekom) or controls the licenses of every communications channel in Russia.

Credits and Acknowledgments
Project Grey Goose
Principal Investigator Jeff Carr Researchers Billy Rios, Derek Plansky, Greg Walton, Matt Devost, Ned Moran, Rebecca GivnerForbes, Shannon Silverstein Reviewers Derek Plansky, Kristan Wheaton Acknowledgments This project could not have occurred without the help of the highly talented and passionate Palantir Technologies crew and their CEO Dr. Alexander Karp. In addition, I’d like to thank the few researchers and reviewers who have opted to keep their participation confidential.

Russia ready to help with U.S.-Iran meeting at Moscow conference

18:09 | 26/ 03/ 2009



MOSCOW, March 26 (RIA Novosti) - Russia is not aware of any plans for U.S. and Iranian diplomats to meet in Moscow on the sidelines of a conference on Afghanistan on Friday, but it is ready to help arrange such a meeting, the Foreign Ministry said.

"We have no such information, but if such an intention is announced, Russia as the host country is ready to provide any assistance that may be necessary," official ministry spokesman Andrei Nesterenko said on Thursday.

The international conference on Afghanistan is to focus on efforts to counter terrorism and drug trafficking in the war-ravaged Central Asian state.

The conference will be held under the aegis of the Shanghai Cooperation Organization (SCO), a security group that comprises Russia, China, Kazakhstan, Tajikistan, Kyrgyzstan and Uzbekistan.

Nesterenko said the U.S. delegation at the conference would be led by Patrick Moon, the principal deputy assistant secretary of state for South and Central Asian affairs, and the Iranian delegation would be led by Deputy Foreign Minister Mehdi Akhondzadeh.

He said talks between U.S. and Iranian officials would "help ease tension around Iran as well as the situation in the region as a whole."

The U.S. Embassy in Moscow said it had no information about a possible meeting between Iranian and American diplomats in Moscow.

Russia has welcomed Washington's moves toward engagement with Tehran under President Barack Obama, including a video message of congratulations on the Iranian New Year.

Deputy Foreign Minister Sergei Ryabkov said last Friday that it was "important for us that the new [U.S.] administration is making advances to Tehran."

The first direct talks between senior U.S. and Iranian officials in almost 30 years were held in Baghdad last May, when the two countries' ambassadors to Iraq held talks strictly limited to the situation in the country.

March 27, 2009

Indian Intelligence: Awaiting Still Its Tryst with Destiny

By A.K.Verma.

This paper written by former Intelligence Chief of Cabinet Secretariat is another piece that needs wider dissemination and discussion. We would welcome comments and suggestions from our readers on the issues raised.-Director

Indian Intelligence is frequently in the news, often for the wrong reasons. It is a favourite kicking target for a large number of those who compulsively articulate, like the media, political leaders, academics etc. Why should it be so when its stellar contributions to national security have quite often been praised by different Prime Ministers at different times in India’s history? A public acknowledgement of the services rendered is also indicated by the Padma awards, bestowed on Intelligence personnel from time to time.

But there is no denying that the system suffers from many fault lines, some systemic, some a legacy of the past but most due to reluctance, express or implicit at various levels in the power structure of the country, to bring about a change. It is the cumulative mindset, operating at the cutting level in the country which is mostly responsible for this dismal state of affairs. Also, the mindset does not or perhaps cannot change in a few short decades. National security has never been a hot issue with the people at large as evident from several public polls conducted in the country. Removal of the fault lines, therefore, remains a low priority. The episodic prominence the subject receives now and then has proved incapable of influencing the frozen channels in the subconscious.

For any State, Intelligence is a prime necessity, not only to know about adversaries but also about friends, so as to remain fore warned about their intentions and capabilities and to prevent surprises. It is a multidimensional complex activity but its basics remain the same, collection, analysis, counter intelligence and covert actions. A fair idea about the functioning of Indian Intelligence can be made by examining how well it is equipped for handling these four sectors.

Collection is a three pronged exercise, each arm performing a distinct role. Published information provides the bulk of intelligence, close to 80%. Well researched articles and books and field journalists not only prove invaluable source of key facts, they also provide reliable insights into any situation a country maybe interested in. Advent of computers now makes recording, indexing and retrieval of such information a lot easier but if the organization is not computer savvy, a good part of such information would fail to get stored. One suspects that such skills are still to be universally acquired and mastered in the world of Indian Intelligence. If this is correct, it bespeaks of a handicap at the starting level itself.

Technological and scientific means invariably produce intelligence of high accuracy. The gadgetry required for technical collections is very expensive and the state of art equipment is not available in the market. Investigations into Mumbai 26/11 events reveal that intercepts of Voice over Internet Protocol conversations between the terrorists in Mumbai and their handlers in Pakistan had to come from foreign agencies. States share intelligence in absolute self interest and not for considerations of ethics, morality or law. Imagine, if foreigners had not been the victims of 26/11 carnage, the requisite information in all probability have remained hidden from Indian authorities. Selective concealment is an acceptable reality of the Intelligence world. At no stage in the past India’s collaborating partners had disclosed to India anything about Pakistan’s ongoing nuclear weapon development programme and China’s stellar role in it when it was widely known that this programme directly targetted India.

The solution lies in having an in-house research and development capability with an extremely high powered technical staff, second to none, that can work on dedicated technical requirements of the Intelligence. It calls for a very high level of funding; something which is not very kindly looked upon by the fund managers of the country. The alternative is to tie up with governmental and non governmental hi-tech institutions to look for answers.

The key to the highest grade of Intelligence is held by human sources to raise whom a great deal of focussed attention, ingenuity, daredevilry and deep pockets are necessary. It is not a job of a run of the mill kind which can be performed by anyone. A successful operator, capable of recruiting high net worth human agents, has to belong to a rare breed. Identifying such potentially gifted operators and enrolling these into Intelligence then becomes a matter of incentives and competitive remunerations.

This area has been a long standing weakness of Indian Intelligence. The problem dates back to the dawn of Indian Independence when many of the legacies of the British colonial rule were uncritically accepted and passed on down the line. The British had created a steel framework to rule the country and a police system which, among other things, kept watch on nascent political trends. The steel frame attracted gifted individuals, scholars and thinkers because of the extraordinarily high compensation package. The prime tool made available to the police was repression. There was no comparable incentive for a bright Indian to join its ranks, except that of getting employed. The steel frame had lorded over British India. The legacies continued after the British left. Even today the rule exists that ensures that no member of any other service can overtake his IAS colleague of the same seniority in emoluments or rank even if he is a genius. Then why should the Indian Intelligence attract the best when it is required to exist at an inferior level? In point of fact it does not. The results that get produced, therefore, are matching the caliber that is to be found in such establishments today.

This problem can be fixed only by the political managers of the country. India now finds itself in a very complex national security environment, requiring intelligence to become the first line of defence. Men who work in it must have the capacity to develop the highest levels of professional values and solid leadership qualities.

Centuries ago a Chinese sage, Sun Tzu, admonished: “Nothing should be as favourably regarded as Intelligence; nothing should be as generously regarded as Intelligence; nothing should be as confidential as the work of Intelligence”. To produce Intelligence of this order, service in Intelligence must be made as attractive as the British had made their premier colonial service in India. Intelligence organizations of other countries run their establishments on this paradigm. They often are the best paid organizations in their own country. The CIA is reputed to attract the highest number of PhDs from the best schools into its ranks, as compared to other US organizations. The terms and conditions of service, apart from the opportunities of work, serve as a magnet to pull the talent of supreme quality among whom will be engineers, management specialists, scholars, bankers, scientists, economists, sociologists and academics. In India, unfortunately, it is only the second grade that thinks of gravitating towards Intelligence. In recent times, even this category is not offering to look at Intelligence as a career. A revolving door policy as in the US should also not be ruled out to draw in expertise and eminence.

Another negative factor is that Intelligence in India has no locus in law, especially for those who work in foreign Intelligence. India’s Intelligence agencies have not been created by Acts of the Parliament. The entire range of foreign operations is covered by just executive instructions. An instruction to operate in a foreign country ipso facto implies a requirement to break the local laws but no legal authority exists for issuing such instructions or indemnifying the would be violator under the laws of the home country. This is a very serious lacuna which does not seem to have caught the attention of anyone in authority. As the law stands today all those who issue such executive instructions and those who carry out these instructions in a foreign country to spy and steal secrets can be held accountable under the Indian laws. Foreign Intelligence is the only organization directed by the Govt. to violate the local laws of the country of operation but the Govt. does so without enjoying any legal authority to do so. This state of affairs is reflective of the apathy in which Intelligence is held in India.

Analysis comes in the picture to make a sense from collected raw intelligence in juxta position with publicly available data. It interprets the pooled information and comes up with likely scenarios of what may happen. This exercise has to be meaningful because Government’s policy decisions could be based on them. In fast moving contexts like an ongoing terrorist engagement, speed of the analysis becomes a key determinant to catch the action. However, the process as it takes place has serious flaws.

These arise from a mistaken apprehension that intelligence will seek to overtake the role of policy making or even replace it. In fact intelligence has no commanding part in the making of policy. On the other hand the policy maker has to set the agenda for intelligence to work on so that intelligence becomes custom produced. However, intelligence support to policy makers becomes more meaningful if it is allowed participation in policy debates, told about gaps in knowledge and encouraged to disclose constraints on intelligence capabilities to close these gaps, and focus its analysis on policy issues and options under scrutiny. If such opportunities are missing, intelligence works in the dark, benefiting no one.

Years ago in an article by me the role of the analyst was described in the following words: “A good intelligence analyst is an asset to the national security apparatus. In the intelligence organizations in India, analysts work for several years at the same desk and are therefore able to develop a much better insight and expertise in their fields than those serving other wings of the Government. Although not infallible, sound analysis can often point to the likely course of events. It takes into account all the information available, secret or published, mentions what remains unknown if it is relevant to the issue under study, describes the reality of the facts stated, indicating guardedly of how they were obtained, and transparently and cogently explains the logic of the conclusions and estimates it projects. The analyst’s expertise serves as the backdrop to the inferences drawn; the deeper his experience, the more value he can get out of the data assembled to make his submissions of likely scenarios of the future. When the analyst is tasked in the context of national security by the policy maker, his study is lifted out of the academic realm and becomes a basis for choosing a course of policy”.

Indian Intelligence can boast of having in its ranks many excellent analysts with deep expertise and insights but it is not certain if full use has been made of them. There is hardly any culture in the country requiring policy papers to be prepared on national security issues, with participation from intelligence, diplomats, military specialists, scientists etc., detailing likely scenarios and examining the pro and con of each. Kargil and Mumbai 26/11 demonstrated the pitfalls of absence of coordinated analysis. Where coordination is called for between the centre and the states to deal with an internal security problem in a cohesive manner, the Indian Constitution can become sometimes the stumbling block as powers stand delegated to the states some of whom may disagree with the Centre’s approach. In the face of such differences the tasks of Intelligence become even more difficult. Dealing with Naxalism is an issue which proves this assumption.

The quality of Indian Intelligence analysis has been applauded by foreign intelligence partners. Senator Claiborne Pell, former Chairman of the US Senate Foreign Relations Committee, is on record, stating that Indian analysis of developments in Afghanistan in the late 1980s was the only accurate indication available to the West, of what was happening there.

In the Indian system the operations officer and the analyst often double up for each other. In small outfits this may not be a serious handicap but as organizations grow larger, the two streams of intelligence should have their own dedicated cadres for best results.

Counter intelligence prime functions are identifying operations and agents of foreign intelligence organizations, and protecting the secrets of the State from penetration through use of human agents and technical means like bugs, monitoring, surveillance from space, interception of communication channels etc. Lack of national awareness generally for the needs of security makes the task of counter intelligence more difficult. Dangers arise equally from hostile and friendly agencies, driven by the operational necessity of discovering protected information.

Results from counter intelligence have been a mixed bag of successes and shame. Over the years counter intelligence has been able to unmask several of the Indian agents of all the major intelligence organization of the world. The shame lies in the fact that it could not prevent foreign penetration even into their senior ranks. Actual truth may be more hurting. There is a general belief in the country that the influence of foreign intelligence organizations has reached deep into the civil society. Suspicion was cast once even on a Prime Minister. Due to various reasons exposures of highly placed Indian moles has always proved to be a daunting task.

The field of counter intelligence has exponentially grown with the advent of international terrorism. This phenomenon poses a multidimensional threat of mass destruction through acquisition of a nuclear device, mass disruption of communication systems through cyber attacks, ideological brain washing through selective interpretations of religious doctrines, and jehadi military style attacks at random on people and key sites. Countering such terrorism has to be a composite exercise requiring participation, apart from intelligence, of other organs of the state such as armed forces, state police, crisis management groups, paramilitary directorates and science and technical communities among others. Countering ideological indoctrination in a sustained manner is perhaps yet to kick start in the country. It is not that the dangers are not realized but extraneous factors like vote bank politics relegate the issue to the lowest priority.

Since terrorist organizations which work on the cell system are extremely difficult to penetrate, good preventive intelligence may not be easily forth coming, despite the best efforts of the intelligence agencies. Because of large numbers of what can constitute a target it may not also be possible to provide effective perimeter security to every single target. If terror attacks like Mumbai 26/11 continue, sooner or later the authorities will have to decide and declare the policy steps which should compel their sponsors to weigh the costs involved. A new counter terrorism architecture in the country, aiming at better analysis, coordination and prevention, can at best remain a good defensive exercise but the need of the hour may turn out to be offensive rather than defensive tactics.

In offensive counter terrorism, the intelligence and armed forces will have distinctive and definitive roles. They may have to work together on the lines of the CIA and US military command that have been jointly handling Iraq and Afghanistan.

Nations are no longer squeamish about employment of covert techniques though specific operations may continue to be shrouded by the mystique of deniability. Nations seem willing to use any tool of statecraft to strengthen national security though the arm chair liberal or the abstract human rights activist may raise objection on grounds of ethics and morality. The Indian State in the past was not hesitant in using such instruments. This is widely known. But one cannot switch to covert actions overnight. Long preparations are necessary. If “all options” are being kept open to deal with the vicious terrorist threat from across the borders, it will be proper to give a green signal to the intelligence now to make its covert plans. Pakistan is proving to be an enduring threat. A redefinition of national interests will bring out that India needs to move out of its self created soft image and to entrust the Intelligence with a new range of responsibilities to become more secure.

Even otherwise Intelligence needs to develop new perspectives as globalization advances, defining a new permissiveness in political environment, creating opportunities for newer forms of economic penetration and triggering fast technological changes which render borders meaningless. After the demise of the Soviet Union the World has been left unipolar but the equation of balance of power remains far from settled. In Asia, the rivalry between three rising entities, China, Japan and India, each of whom will be competitively looking for new markets and new sources of resources, can become acute. The national security architecture worldwide remains shifting in a kaleidoscopic pattern, recreating all the time, newer axes of conflict and conciliation. Add to them the hunger for land and water, symbolized by refugee flows and mass migrations, and differing international concerns for climatic changes and ecology. Correct analysis and assessment of trends over a vast spectrum has become a national necessity to keep the country’s interests safe and secure. Knowledge now is the new coefficient of power and Indian Intelligence must keep step with such knowledge.

The current systems are unlikely to match the challenges that have emerged. Drastic reforms are necessary to unshackle Intelligence from its rigid bureaucratic mould and to invest it with a dynamism and innovative spirit which should be the hallmark of an unconventional organization. The very first step of reform should begin by giving Indian Intelligence the backing of legislative enactments. The laws should provide a degree of autonomy which frees intelligence from all bureaucratic restraints and controls relating to financial management, administrative functions, pay scales, recruitment, posting and promotions, hire and fire policies and enforcement of discipline. The laws should spell out the charter and authorize the Central Government to fix broad targets within the charter. This will prevent misuse of the institutions by those in authority. The laws should hold intelligence accountable to the Cabinet or its committee for security but also create a parliamentary committee for oversight. Detailed rules can be worked out to determine the parameters of oversight and areas of intelligence work over which it will be exercised, in consultation with the parliament. The laws should give the right to the Govt. to authorize any kind of covert action and keep all such activities outside the ambit of oversight. The process of oversight and accountability can be expected to keep intelligence on its toes. However, even after such reforms, errors due to human frailties and intellectual stubbornness will not all disappear but their numbers can be expected to be far less.

There is a new area of activity which Intelligence must consider if it has not already done so. Outsourcing which globalization has promoted has a good potential for intelligence work. The Japanese corporate world and intelligence have cooperated with each other over the past several years with both reaping good dividends out of such collaboration. The US is believed to have taken major steps in this direction. According to one estimate the US Intelligence community invests 70% of its budget on its joint ventures with American Industrial Complex. The Indian corporations are also traversing the multinational route. One may expect overtures to them will be rewarding to intelligence.

One last word. Is there any way that can measure the depth of devotion and commitment of Intelligence to the national cause? The following anecdote can be a revealing guide. At the height of Afghan resistance to Soviet Union in 1989, the situation in Kabul became so dangerous that the US, British and other Western countries withdrew their Ambassadors and staff from the country. Our foreign office and Ambassador wanted to follow suit, Intelligence included. Intelligence refused. While others came back to Delhi, Intelligence remained at Kabul to continue to fly the Indian flag over the Embassy in Kabul.

The Communists of India

http://cpmindia. blogspot. com/2009/ 03/communists- of-india. html


March 10th, 2009

Communism historically has a very unique twin track approach. On paper the ideals of communism are just wonderful and almost utopist in nature. When one walks through the utopian stage and dons the role of a full fledged communist the finer details emerge. The “The communist Manifesto� written by the demigod of communism Mr. Karl Marx makes quite an impact. His objectives did leave an impression on many and inspired a lot many after his time. He was a profound thinker and like most thinkers he was successful in drawing many to his thoughts. His writings appealed to the rebel in each Individual, by questioning everything. It questions civil and human rights, capitalism, and amongst others religion. It talks about class struggle. It promised a solution, an almost perfect solution that aims to rid the world of poverty, & class struggle and by bringing in an equal society. Almost like the speeches of today's politicians before elections in a democratic set up. It has an appeal that was and is hard to resist.
For a young heart, any kind of rebellion is adventurous, daring and fun because it promises action against today's evils and offers the solution that can change the world. That fatal attraction has drawn many a youth across various parts of the world to the ideology called communism. These youth fought with a song of revolution on their lips in the many of their battles against regimes across the world.
Since communist thinking was to change the existing set up, any one who prefers the continuation of the present set up is its enemy, and enemies are not ordinary enemies but enemies of the state, so they have to be eliminated. And that was done with great fervor. Consider these statistics
61 million killed in the Soviet UnionÂ
35 million killed in the People's Republic of ChinaÂ
2 million killed in North KoreaÂ
2 million killed in CambodiaÂ
1 million killed in VietnamÂ
1 million killed in the Communist states of Eastern EuropeÂ
1.7 million killed In AfricaÂ
1.5 million killed In Afghanistan
150,000 in killed Latin AmericaÂ

Indian communists have haven't been able to beat those numbers but the Nandi-gramam episode recently in West Bengal / India, demonstrated that given a chance they are capable of catching up to the numbers above and may compete quite passionately to propel themselves into the top 5. The communist chief minister of west Bengal said this statement after police firing on farmers who were protesting the take over the land, “They have been paid in their own coin�. Basically what he was saying was that we do thuggery in the form of governance. Indian Media would react in a principled way against any errors in governance but it’s natural to expect them to play safe when writing about all forms of thuggery in the form of governance.
Coming back to communism, unfortunately for Mr. Karl Marx his theory of communism though had a strong run seems to be on the ebb today, with the break of Soviet Union and a systemic break down approach by the west, both by psychological intimidation and capitalistic development platform. The other big communist country China is still going strong as a communist because it has shown remarkable pragmatism in blending communism with capitalism, in a way that doesn't upset the communist grip over the nation but at the same time moving in the direction of progress and prosperity. Cuba is set up in the communist mould because people may be tired of another revolution and more over its leaders have mastered the lust and privileges of being in power. Talking about lust, yahoo online reported that the Cuban leader Mr. Fidel Castro had had sex with a different woman each day all through his regime. Unlike Indian communists who show a tendency to stop socialism at their doorsteps, he welcomed it even to his bedroom. That was his passion for socialism.
Communism & Religion: There is famous statement in communism, "Religion is the opium of the masses�. Communism has had this fundamentally strong dislike towards religion. It appears that religion comes in the way of the communists exercising their control over the masses. They prefer to be the sole authority when it comes to having a control over the masses. That is the reason the communist rulers of the former Soviet Union banned religious practices and most of the orthodox Soviet church went underground and there were hardly any services. However with the break up of the communist regime, true feelings are coming out openly and the Russian Orthodox church is active once again, with even the supremo of Russia Mr.Putin, an ex KGB agent proclaiming his religion without fear or prejudice. Closer to home, in China the only path to God was taking a membership of the communist party of China. Indian communists however seem to quite confused. While publicly they are forced by their chosen ideology to be atheists, we all know that quite a few times their mask has come out. They participate in religious activities while their families visit religious places as any devout religious person would do. However in India communism does not seem to have a uniform policy against religion. They show surprising agility when it comes to influencing Hindu behavior and Hindu religious practices with communist ideology while simultaneously displaying an almost servile respect when it comes to minority religions in India. This seems be a primary bone of contention between communists and Hindus.
Dr Babu Suseelan writes, “For several years, Marxists in Kerala and West Bengal have been tinkering with our education, revising temple festivals, rituals, and spiritual practices. Their goal is to obliterate our culture and our customs by systematic deconstruction. Marxists have introduced Devasom Bill in Kerala for the takeover of Hindu temples including Guruvayoorappan Temple, Sabarimala Temple and various high income producing Hindu temples. Marxist government has introduced several restrictive ordinances to permanently ban traditional percussion, fireworks and timeline to permanently ban temple festivals and traditional cultural programs. For Hindus, the temple is the abode of God, the focus for all aspects in life of Hindus-religious, spiritual, cultural and social. It is a center where God can be approached and where divine knowledge can be discovered. Marxists are keen on destroying our temples founded on a platform with a devilish mixture of deception, coercion, and propaganda and government power. It represents one of the most deceptive and dangerous cultural destruction plan in India- a fact which most pseudo secularists and political leaders either do not know or choose to ignore. There is something sick in these destructive plans to loot temple wealth and permanently destroy and exterminate or vanquish our cultural values. These morally aberrant policies have the infinite capacity to inflict harm to Hindu society�.
This philosophy of communists manifests itself into a multitude of anti- Hindu activities at the street level which are being absorbed by the ever tolerant Hindu, albeit in quite disbelief. Hindu anger is building up as tiny rivulets from across the streets, towns and cities of communist ruled India. These tiny rivulets are then further attacked by a combination of anti Hindu forces. The attacks are in the form of a smear campaign. The attackers are emboldened by the passive non-confrontationis t approach lifestyle of the average Hindu. Any practicing Christian or Muslim would erupt in anger when the control of their religious places of worship is taken away by the communist or other government's, but the passivity of Hindus seems like a deep spring from which the fountain of patience, kindness, endurance and in-difference flows incessantly. This fountain can have the inherent power to work against its adherents even before the rivulet of anger takes shape into a flood of meaningful thinking.
The eruption of Christian and Muslim anger and its backlash has been demonstrated time and again in India and most Indian politicians, the communist included respect the gene of servility in them and hence stay clear. The "Anger of Indian Christian's" is backed by support of Christian western governments and "Anger of Indian Muslim's" is backed by support of Muslim countries of the Gulf. A classic example of Christian international support is the “advice� by US against the toothless anti conversion bill introduced by some states in India and the example of International Muslim support is the routine IOC resolutions against India on various matters relating to the internal affairs of India. The combination of home-grown protests and the international backing for such protests could be the reason for the absolutely zero interference by Communist governments of India in the religious affairs of Christians and Muslims. While there are a multitude of organizations and groups operating freely in India who have their "valid" reasons to molest Hinduism, for communists of India its communist ideology. This anti-religious fervor of communists seems to waft to and fro from the northern border. The recent attempt to take over the Hindu temple of Nepal by the new born communists of Nepal, is a page from the leaf of what China has been doing to religious Tibet for the past 50 + years. The levels of in-sensivity to the aspirations, sentiment and self-dignity of the common man by communist governments, may make Mr Karl Marx re-think his thoughts on communism.

Primary Objective of Communism in India: Indian Prime Minister Mr.Man Mohan Singh has said that Marxist violence in parts of the country is the biggest threat sweeping the nation. An entire patch from central India to southern India is under the grip of Marxist violent movements known in India as naxalism. There is no government administration in such areas as no government official dares to go there. This is a complex issue where the mis governance of successive governments has given place to deep resentment against the government. This resentment has been hijacked by the communist movement under the guise of socialism. They wage war against the government with real arms and ammunition.Its interesting to note that there is little or no naxalism in states which are governed by Communist parties like West Bengal or Kerala, because the goal has been achieved, that is to gain power. It’s equally interesting that they use their mantra of revolution only in states they are not in power. They indulge in Marxist propaganda with positive sounding slogans such as "inclusion", "human rights", "feminist empowerment", "classless society", "women's rights", “ equality�, “ fight against oppression� to mobilize the poor people. For the poor and oppressed this seems like the divine opening they have been praying all their lives and are moulded into believing that take cudgels against the government of India on behalf of the communist parties will bring in a solution to their problems. They have invited the security forces of India to their door step thus pushing them into being enemies of the democratic state.The poor who have endured the worst of corruption in governance are now forced to bear the baton and bullet of the security forces. There is an extension of their inherited suffering. All this in the name of socialism.

While on one had the communists enjoy power both at states and in the centre by some clever political maneuvering, they at the same time engineer unrest in states they don't rule with the sole aim of coming to power. So is communist ideology in India just a rue to come to power. This unfortunately seems to be the reality as is with any other political party of India. If we assume that what we are writing cannot be true, then quality of life and governance in communist ruled states of India must be on par with developed countries.. right? To challenge us please take a walk through the communist ruled states of India and advice us that we are wrong. We will concede if proven wrong. Rich and powerful Marxist leaders live in luxury houses, drive deluxe limousines, send their children at expensive boarding schools and lead an elite life. The Marxist political leaders are at a huge, incalculable distance from the average citizen deeply ensconced in the twin towers of power and communist ideology.Â

It is said that winning elections is done in true communist traditions. Elections are under the tight grip of the communist party member’s right down to the street level. People are gently advised to vote for the communist party and offered "pleasant" experiences if they do not. Every movement of the ordinary people is tracked to make sure that votes are cast only for the communist party. Its authoritarian rule under the mask of democracy. That may explain the reason why the communist parties have managed to remain in power for as long as memory can know in West Bengal. The communist parties of India are on the same platform as other political parties of India. They indulge in corruption, work towards gaining personal wealth, demonstrate bad governance, display lack of vision on issues of welfare, infrastructure development and prosperity. They also give selective holidays to their communist ideology and engage in multiple forms of political alignments in order to capture / retain political power.
Nationalism vs. Ideology: Two things come to mind, The Nuclear deal with USA episode and the silent support of Indian communists to China on the 1962 war and subsequent non resolved border dispute between India and china. The vehement opposition of the Indian communist parties to the nuclear deal was based on the cold war ideology of the communist movement to oppose any dealings with the progressive west. So when they opposed it, the primary objective was its adherence to its ideology over what can be a perceived benefit to the Nation. It’s said at least on paper that the nuclear deal with US would open the door to overcome the power shortage that India is currently facing and also address the future power needs of the power hungry India. We don't know if that objective would really be achieved or if that stated objective is the real objective. But the communists of India opposed it. They had a chance to poke a thumb at the west, their eternal enemy. It did not matter to them that opposition would mean depriving the nation of that extra wattage of power. That adherence to ideology even it means working against national interest is a shocking reality that seems to have got immersed unquestioned and un challenged into the torrid waters of great churning lake called “the Kurushetra of modern Indian politics�. The communists of India seem to have given ideology a preference over common sense thinking of neighboring china. If china were to follow the same communist ideology of opposing any dealing with the west, would it have registered a trade surplus? Consider this report from the China daily,According to China customs statistics, China's exports to the United States were US$52.1 billion in 2000 and reached US$162.9 billion in 2005, an increase of 212 per cent. According to US customs statistics, the US exports to China were US$16.2 billion in 2000 and reached US$41.8 billion in 2005, an increase of 157 per cent. Had Indian communists raised issues like nuclear safety, it would amount to showing interest in the safety and welfare of Indians, but they did not do that. This approach of not blending national priorities as part of their Ideology can be a hindering factor in the development of India. Wish the commonsense nationalistic approach of communist china rubs onto to Indian communists.
As for the support of Indian communists to China, It was reported that during the Liberation War of Bangladesh in 1971, China more or less asked the Indian naxalites to support the side of Pakistan. An interesting paper by Mr.D.S.Rajan (He was earlier Director, Cabinet Secretariat, Government of India, and New Delhi ) in the online portal http://www.saag. org/common/ uploaded_ files/paper1565. html presents the collusion between communists of India and China. That makes quite an insightful reading. As a starter it would be nice if at least on public platforms Indian communists blend nationalism with communist ideologies. They should step out of their cocoon of ambiguity and come out strongly in support of India on the border dispute with China.


The passive and non-mainstream communists of India scattered across the nation in various "avatars" are effectively complementing the "work" of main stream communists by an gusto that combines ignorance and misinterpreted affinity to ideology. This includes the "The Hindu" God "Shri Ram" who resides on the Mount road of Chennai, south India. Surprisingly there also seems to be a preference for " communist anonymity" and also a tendency to present a "secular" face to the public.Â


Indian communists haven't been air-dropped onto India.Its the blood of India that runs in them.They are Indians at heart, body and soul..Look at this picture of Ms. Brinda Karat, one of the leaders of one of the communist parties in India.
In spite of being both an atheist and an communist this picture of the Indian communist leader identifies itself with Hindu culture, much to the dismay of the pink chaddi spirit of modern India. The question is why don't Indian communists come out in open and acknowledge their Hinduistic true form which is their inherent foundation. If all or some choose to come out in the open and acknowledge both, their communist avatar and the inherent Hindutvam then we would extend a warm welcome with open hands to The communists of India!.
References:Â
http://www.unitedhu manrights. org/Genocide/ pol_pot.htm
http://en.wikipedia .org/wiki/ Gulag
The Communist Chinese Ant Hill Suzanne Labin, Edward Fitzgerald
http://www.hawaii. edu/powerkills/ NOTE1.HTM
http://sneakpeaks. blogspot. com/2008/ 03/worlds- most-beautiful- politicians. html
The Marxist invasion of India : Dr Babu Suseelan
http://theundercurr ent.ca/ind_ pol_10.htm? id=8522