Foreign intelligence's activities in India discussion thread


Invoking for the first time the recently notified intermediary guidelines and digital media ethics code under the Information and Technology (IT) Act, 20 YouTube channels and two websites were banned by the Indian government for allegedly running ‘anti-India’ propaganda from Pakistan, according to reports.


According to Economic Times (ET) newspaper, which cited sources, Information and Broadcasting (I&B) secretary Apurva Chandra wrote to YouTube and the Department of Telecom, directing them to immediately block the content which impinges the sovereignty and integrity of India.

According to the reports, the contents were “blasphemous” in nature and were being funded by Pakistan’s spy agency Inter-Services Intelligence (ISI).


It was first flagged by the Indian security agencies, following which the I&B ministry conducted an inquiry.

Among the sites that were taken down include ‘Naya Pakistan’, which had over two million subscribers on YouTube. It was reportedly running “false news” on issues such as Kashmir, farmers’ protests against the farm laws and Ayodhya.


Another portal that was banned is ‘Naya Pakistan Group’, which ran over 15 channels on YouTube and had a following of more than a million subscribers.


According to the reports, the channel ran contents like ‘PM Modi concedes defeat in Kashmir; Article 370 restored’, ‘Taliban Army leaves Kabul for India’, ‘Taiyyap Erdogan sends 35,000 mercenaries for Kashmir’, and the ‘Turk Army enters Ayodhya Ram Mandir to Take revenge’— all of which were seen by the ministry as a “concerted effort to sow unrest in India”.



Under section 16 of the IT Rules, the I&B ministry can block content that is considered “necessary or expedient and justifiable to block”.


Officials said the decision to ban and block these channels and websites will be presented before the Inter-Departmental Committee (IDC) within 48 hours, following which it will be ratified by a committee under the IT Rules, 2021, ET reported.


(With inputs from agencies)


Also
 
  • Like
Reactions: RISING SUN

New Delhi: A National Investigation Agency (NIA) team will soon leave for Germany to investigate a case against Sikhs For Justice (SFJ) member Jaswinder Singh Multani, who is allegedly planning attacks in Mumbai and other parts of India with the support of operatives from Pakistan’s Inter-Services Intelligence (ISI) and his Punjab-based associates, sources in the agency told ThePrint.


The NIA had last month registered a case under criminal conspiracy charges and the Unlawful Activities (Prevention) Act, 1967, against Multani and other operatives of the SFJ — a US-based pro-Khalistan group banned in India for its secessionist activities — for “conspiring to carry out terror attacks in India and revive militancy in Punjab”

This case has no connection with the blast at Ludhiana’s district and sessions court complex that took place on 23 December 2021, agency sources said.


Multani was detained in Germany on 28 December, 2021 after Indian agencies got in touch with investigators in the European nation regarding some inputs about his alleged involvement in a terror conspiracy, but was let off after questioning.


“A team will head to Germany to question Multani in the case that we registered against him and other operatives after we received reliable inputs. Once we have enough evidence, the process of arrest and extradition will also be initiated. We are in constant touch with the German authorities,” a source in the agency said.

Multani, the source added, is in contact with “ISI operative Jibran as well as a Pakistan-based smuggling network involving history-sheeters Rana Taseem, Imran and others, and is actively pursuing a conspiracy to carry out attacks in Mumbai and other parts of India, with support of his Punjab-based associates”.


Multani’s associates, the source said, include Jagdish Singh Bhura of the Khalistan Zindabad Force (KZF), deputy chief of KZF Gurmeet Singh, who is also associated with SFJ, Ranjeet Singh Pakhoke of the Khalistan Tiger Force (KTF), Sukhdev Singh Heran and Hardeep Singh Nijjar of Babbar Khalsa International, and KTF members Paramjit Singh Pamma and Ranjeet Singh Neeta.


Multani, however, has denied his involvement in terrorism conspiracies. According to a video issued by the SFJ’s general counsel Gurpatwant Singh Pannun last month, Multani said his fight was one of the “pen”, not “weapons”. He also said the Indian authorities were trying to defame him and the SFJ.
 

New Delhi: Mere days into 2022, it is learnt that Pakistan has sought to infiltrate India through the Kartarpur Corridor route. According to intelligence sources, Pakistan's Inter-Services Intelligence (ISI) had given the responsibility for the same to the Lashkar-e-Taiba (LeT).


It has also been learnt that the terror organisation is preparing to carry out the operation with five individuals who will be dressed in Sikh attire. As per sources, this infiltration attempt is likely to be made in the near future. The ISI - Pakistan's premier intelligence agency - is expected to provide all documents and facilities to enable the same.


The group has been given two weeks of commando training under ISI supervision in a terror camp in Sakargarh and are associated with the LeT Tanzeem outfit. The source also named two people from the group as Mohd Gulzar Maghre and Mohd Sahjada Bande. They have been instructed to go to Gurdaspur and Pathankot in Punjab.

Inaugurated by Prime Minister Imran Khan in 2019, the visa-free 4.7-kilometre stretch connects India to Pakistan. The Kartarur Corridor links the Gurdwara Darbar Sahib (the final resting place of Sikhism founder Guru Nanak Dev) to the Dera Baba Nanak shrine in Gurdaspur district of Punjab. The corridor had been reopened on November 17 last year after remaining shut amid the COVID-19 pandemic.

.......................................................


This will get dirty, because after a long time ISI has hit the civilians again in India, it started from the civilian killings in Kashmir last year.
 
Delhi Police identifies 26 Pak-operated Twitter handles for spreading misinformation, case registered
Read more At:
 

This fiction was passed on to Russia and China to prove India’s ‘anti-Russia and anti-China policies’.



ISI’s fiction: Calls Indian space observatory an espionage establishment - The Sunday Guardian Live




New Delhi:As part of a carefully orchestrated disinformation campaign, Pakistan’s intelligence agency, the Directorate of Inter-Services Intelligence (ISI) has passed off a 20-year-old Indian space observatory as an establishment that is being used to spy on Russian and Chinese defence assets inside their borders.
This fiction, officials said, was passed on as “credible” input by the ISI to the relevant people in Russia and China “sometime” ago as an example of India’s “anti-Russia and anti-China policies”, while attributing the same to the increased coordination between India and the United States.
The establishment in question is more than a 20-year-old Indian Astronomical Observatory at Mount Saraswathi, Hanle, Ladakh, which is situated at an altitude of 15,000 feet above sea level, north of the Western Himalayas.
The satellite communication link to this observatory was inaugurated by the then Chief Minister of Jammu and Kashmir, Dr Farooq Abdullah in June 2001.
This observatory, among other things, operates a 2m-Himalayan Chandra Telescope (2m-HCT), which is remotely controlled from the Centre for Research & Education in Science & Technology (CREST), Indian Institute of Astrophysics, Hosakote, Bangalore. The observatory is regarded among the backbone facilities for research in astronomy in India and it also operates multiple weather monitoring instruments including an all-sky camera and an automated weather station.
In recent times, the observatory has seen the installation of infrastructure like a High Energy Gamma Ray Telescope (HAGAR), a Major Atmospheric Cerenkov Experiment Telescope (MACE) and an Imaging Atmospheric Cerenkov Telescope (IACT).
These recent additions, as per photographs seen by this newspaper, have been passed off as assets that India is using to spy on Russian and Chinese defence preparations.
Apart from being shared with Russia and China through official dossiers, the same fiction was shared by the ISI with a select group of Twitter handles for larger dissemination in the public domain and to create an anti-India narrative among the general public in these two countries.
Contrary to the claim by the ISI, this observatory is open to tourists in general. However, since it is in close proximity to the International Border, an inner line permit is required to visit Hanle, the nearest village to the observatory, which has a population of 1,000 people and is located at a distance of about 255 km from Leh.
 

Islamabad [Pakistan], June 5 (ANI): Pakistan is out with propaganda to portray India in a bad light while running fake social media campaigns over the recent killing of Punjabi Singer Sidhu Moose Wala.
Shubhdeep Singh Sidhu, popularly known as Sidhu Moose Wala, was shot dead by unidentified assailants who opened fire at the singer on May 29, near his native village in Punjab, India.
Pakistan is frequently lambasted by the global community due to its violation of human rights. The country also has unstable politics which is gripped by constant protests and demonstrations. And yet, Pakistan finds the killing of Sidhu Moose Wala as an opportunity to play its agenda card. Pakistan found it an apt opportunity to sail their ship of propaganda, reported Digital Forensics, Research, and Analytics Center (DFRAC).
Fake Pakistani accounts are running hashtags like RawKilledMoosewala and trying to blatantly diminish the reputation of India's intelligence agency Research and Analysis Wing (RAW).
Following the news of Moose Wala's death at around 6:15 pm on May 29, the first tweet which came up on Twitter was from a Pakistani account.
This was just the start and after this first post, many Pakistani accounts divulged the social media similar accusations against the prestigious institution of India. The investigation into the accounts reveals that all of these accounts were Pakistani accounts.
All these users have blamed and spread disinformation about RAW killing Sidhu Moosewala. All of these accounts belong to Pakistan. @masheengunmulla has tweeted a maximum number of times followed by @haiderzarrar1 whose account no longer exists. @awaisikram788 and @truthse68829926 also tweeted on the same topic.
The crucial thing to note here is that some of these accounts were created for the sole purpose of defaming India. After pushing the agenda they changed their username.
The propaganda took off very quickly. Soon after renowned personalities from Pakistan picked the agenda, some Sikh organizations jumped in to fuel the facade. They even attempted to draw parallels between the incident of 1984 and the killing of Moosewala.
All behind the screen who were fuelling this agenda campaign seemed to be copying each others' content to escalate the fake narrative. A total of 26 accounts contributed, all being Pakistani and among them, most of them were of former Prime Minister Imran Khan-led Pakistan Tehreek-e-Insaf. (ANI)
 


Hyderabad: DRDL contractual employee booked for sharing confidential information with ISI​

A contractual employee of the Defence Research and Development Laboratory (DRDL) in Hyderabad, was arrested for allegedly sharing highly secured and confidential information about the DRDL-RCI Complex through social media to a suspected ISI female handler, said Rachakonda Police on Friday (June 17).

The accused identified as Dukka Mallikarjuna Reddy (29) alias Arjun Bittu was arrested on Friday at Triveni Nagar, Meerpet, Balapur, Hyderabad during a joint operation by the sleuths of the Special Operations Team, LB Nagar Zone, Rachakonda, Hyderabad and Balapur police.


"On June 17, 2022, on credible information, the Sleuths of Special Operations Team, LB Nagar Zone, Rachakonda in a joint operation with Balapur police, arrested the contractual employee of Defence Research & Development Laboratory (DRDL) who has shared the highly secured and confidential information of DRDL-RCI Complex through social media to a suspected ISI female handler which is prone to create harm to National Integrity and Security," the police statement reads.


The suspect had posted on his Facebook account about his work with DRDL, and in March 2020, he was contacted by a woman claiming to be Natasha Rao.

She introduced herself as an employee of the UK Defence Journal and that her father worked in the Indian Air Force before shifting to the UK.During the conversations with Natasha Rao alias Simran Chopra alias Omisha Addii, Mallikarjuna Reddy shared confidential information and also shared his bank account details. He was in contact with her till December last year.

he police have registered a case has been registered under sections 409 of the Indian Penal Code (IPC) and sections 3 (1) (C), 5 (3), 5 (1) (A) of Official Secret Act-1923 at Balapur Police Station of Rachakonda Police Commissionerate.


The police have also seized two mobile phones, a SIM card and a laptop.Reddy, according to the police, was born and brought up at Naval Armament Depot (NAD) Quarters, Visakhapatnam, and his father worked as a Chargemen Civilian in NAD and retired in 2014.

He completed his B.Tech (Mechanical) from Visakhapatnam and later did his MBA (Marketing) from Hyderabad in 2020.He joined the Patancheru branch of a Bengaluru-headquartered company and worked on a project from DRDL till January 2020. After the project, he directly approached DRDL authorities and got enrolled as a contract employee for a project with RCI Balapur.


The arrests were made under the supervision of Rachakonda Police Commissioner Mahesh M Bhagwat, Additional Commissioner of Police G Sudheer Babu, LB Nagar DCP Sunpreeth Singh, DCP (SOT) K Muralidhar and Deputy Commissioner of Police, Special Operations Team, Rachakonda.
 

Chinese Espionage Links Uncovered In India While Probing Money Laundering​

by Ujjawal Mishra - Jul 6, 2022 07:00 AM +05:30 IST

Recent evidence suggests that Chinese corporations are being used as arms of the Chinese state for espionage.
Money laundering allegations: The Chinese mobile manufacturer Vivo is being investigated by the ED in a money laundering case.
  • A total of 44 locations have been raided by the ED under the provisions of the Prevention of Money Laundering Act.
  • The ED has already passed an order freezing Xiaomi India's bank assets worth over Rs 5,500 crore.
The espionage angle: The Union government has been busting spy rings, studying incoming Chinese investments into India, carrying out tax raids on major Chinese telecom companies, and cracking down on Chinese mobile apps since 2020.
  • Raids have been carried out on firms like ZTE and Huawei, apart from Vivo and Xiaomi.
  • The availability of cheap and even underpriced products from these firms has given them significant market share in India.
  • Several Chinese companies are being probed for profiling 'high value' individuals, exfiltrating bulk data, and engaging in large-scale tax evasion.
  • Their goal seems to be to gain a strategic advantage over India's economic and security systems.
  • There are hundreds of small Chinese companies, a web controlled by Chinese nationals with dummy Indian directors and managers, to provide a veil of legitimacy, an Economic Times (ET) report says.
  • A probe by the Registrar of Companies revealed that these companies did not physically exist at their registered offices, although the bank accounts were active. They were being operated from abroad.
  • According to the ET report, "The web of these companies is believed to have laundered over Rs 1,000 crore, with some of the proceeds used to gather intelligence in India."
Influencing Tibetans: One such company was used to influence Tibetan monks living in India.
  • Luo Sang, a Chinese national, was arrested in 2020. He was sending money in packets to Tibetan monks.
  • The Government of India suspects that the money was provided to Tibetan monks to gather information about the Dalai Lama and the Tibetan government-in-exile.
Findings: It was found that senior employees of some of these companies are members of the Chinese Communist Party.
  • In one case, it was discovered that the CEO of a major telecom firm possessed sensitive documents.
  • In another, a deep profile of an Indian business leader of interest to China was discovered.
  • Chinese-origin mobile phones were found to have a seamless data link with China.
  • Indians' data collected via these devices, such as fingerprints and selfies, has helped China acquire biometric details of millions of Indians.
The US a target too: The FBI describes China’s intelligence activities as “the greatest long-term threat.”
  • An assessment by the Carnegie Endowment for International Peace said: "China’s intelligence agencies have stolen a significant volume of U.S. military secrets in recent years, including aircraft designs. They have penetrated U.S. political campaigns to gain insight into future American policymaking. And they have compromised America’s own espionage networks, reportedly helping to expose and disrupt U.S. intelligence activities in China — a top American collection priority — and elsewhere."
  • Reports by FT suggest that China has been relying on research students in American universities to gain access to research in critical areas such as biotechnology, soil science, quantum computing, and artificial intelligence.
  • It was found that China has been using graduate school students to target the Physics Department of Johns Hopkins University.
What the FBI says: The FBI's assessment is that the Chinese are targeting companies producing proprietary rice and corn seeds to software for wind turbines to high-end medical devices, and not just targeting innovation and R&D.
  • The Chinese are going after cost and pricing information, internal strategy documents, bulk PII — anything that can give them a competitive advantage.
  • Large Chinese businesses are state-owned enterprises. Even where not formally owned, they are legally and practically beholden to the government in a tangible way.
  • China has national security laws that compel Chinese companies to provide the government with information and access at their government’s request.
  • And virtually all Chinese companies of any size are required to have Communist Party “cells” inside them to make sure that the companies stay in line with the party’s principles and policies.
New-age warfare has shifted from the physical battlefields to the virtual world. Countries would do well to guard themselves against espionage and establish sufficient protection against cyber attacks. More scrutiny on Chinese activities will help.


Tags:

-----------------------------------

This happens when leaders in a country don't allow their own people to develop their companies and rather promote foreign firms in India because they get paid for this as well.
 

Chinese Espionage Links Uncovered In India While Probing Money Laundering​

by Ujjawal Mishra - Jul 6, 2022 07:00 AM +05:30 IST

Recent evidence suggests that Chinese corporations are being used as arms of the Chinese state for espionage.
Money laundering allegations: The Chinese mobile manufacturer Vivo is being investigated by the ED in a money laundering case.
  • A total of 44 locations have been raided by the ED under the provisions of the Prevention of Money Laundering Act.
  • The ED has already passed an order freezing Xiaomi India's bank assets worth over Rs 5,500 crore.
The espionage angle: The Union government has been busting spy rings, studying incoming Chinese investments into India, carrying out tax raids on major Chinese telecom companies, and cracking down on Chinese mobile apps since 2020.
  • Raids have been carried out on firms like ZTE and Huawei, apart from Vivo and Xiaomi.
  • The availability of cheap and even underpriced products from these firms has given them significant market share in India.
  • Several Chinese companies are being probed for profiling 'high value' individuals, exfiltrating bulk data, and engaging in large-scale tax evasion.
  • Their goal seems to be to gain a strategic advantage over India's economic and security systems.
  • There are hundreds of small Chinese companies, a web controlled by Chinese nationals with dummy Indian directors and managers, to provide a veil of legitimacy, an Economic Times (ET) report says.
  • A probe by the Registrar of Companies revealed that these companies did not physically exist at their registered offices, although the bank accounts were active. They were being operated from abroad.
  • According to the ET report, "The web of these companies is believed to have laundered over Rs 1,000 crore, with some of the proceeds used to gather intelligence in India."
Influencing Tibetans: One such company was used to influence Tibetan monks living in India.
  • Luo Sang, a Chinese national, was arrested in 2020. He was sending money in packets to Tibetan monks.
  • The Government of India suspects that the money was provided to Tibetan monks to gather information about the Dalai Lama and the Tibetan government-in-exile.
Findings: It was found that senior employees of some of these companies are members of the Chinese Communist Party.
  • In one case, it was discovered that the CEO of a major telecom firm possessed sensitive documents.
  • In another, a deep profile of an Indian business leader of interest to China was discovered.
  • Chinese-origin mobile phones were found to have a seamless data link with China.
  • Indians' data collected via these devices, such as fingerprints and selfies, has helped China acquire biometric details of millions of Indians.
The US a target too: The FBI describes China’s intelligence activities as “the greatest long-term threat.”
  • An assessment by the Carnegie Endowment for International Peace said: "China’s intelligence agencies have stolen a significant volume of U.S. military secrets in recent years, including aircraft designs. They have penetrated U.S. political campaigns to gain insight into future American policymaking. And they have compromised America’s own espionage networks, reportedly helping to expose and disrupt U.S. intelligence activities in China — a top American collection priority — and elsewhere."
  • Reports by FT suggest that China has been relying on research students in American universities to gain access to research in critical areas such as biotechnology, soil science, quantum computing, and artificial intelligence.
  • It was found that China has been using graduate school students to target the Physics Department of Johns Hopkins University.
What the FBI says: The FBI's assessment is that the Chinese are targeting companies producing proprietary rice and corn seeds to software for wind turbines to high-end medical devices, and not just targeting innovation and R&D.
  • The Chinese are going after cost and pricing information, internal strategy documents, bulk PII — anything that can give them a competitive advantage.
  • Large Chinese businesses are state-owned enterprises. Even where not formally owned, they are legally and practically beholden to the government in a tangible way.
  • China has national security laws that compel Chinese companies to provide the government with information and access at their government’s request.
  • And virtually all Chinese companies of any size are required to have Communist Party “cells” inside them to make sure that the companies stay in line with the party’s principles and policies.
New-age warfare has shifted from the physical battlefields to the virtual world. Countries would do well to guard themselves against espionage and establish sufficient protection against cyber attacks. More scrutiny on Chinese activities will help.


Tags:

-----------------------------------

This happens when leaders in a country don't allow their own people to develop their companies and rather promote foreign firms in India because they get paid for this as well.
Oh thats fine, ED was busy in other important things like harassing opposition politicians who is supposed to have scammed 5-10 crores.
No wonder chinese mock at us , while they have penetrated every part of the system the govt keeps playing cheap politics on how to grab one more addition seat in assembly.
 
  • Like
Reactions: screambowl
No wonder chinese mock at us , while they have penetrated every part of the system the govt keeps playing cheap politics on how to grab one more addition seat in assembly.

Indians are baatuni and jealous people hollow from inside. Too much talkative, and less work. Only show off. And this is why our condition is like this.
 
Abhishek Tiwari | New Delhi | October 20, 2022 9:25 pm


Chinese spy: A Chinese woman has been arrested in Delhi on the allegations of spying on senior officials of Indian government departments and Ministries. A team of Special Cell of the Delhi Police has arrested the accused on the suspicion of passing secret information to China.
According to a police official, the accused has been identified as Chai Rau, 44, who is said to have been living in Delhi for the past two years by hiding her name and nationality. A passport of Nepal and a citizenship certificate issued by the Government of Nepal have been recovered from the woman. A certificate, issued in the name of Dolma Lama, has the photo of the arrested woman affixed on it.
After the arrest, the woman was produced in the court and has been sent to 14-day judicial custody. An investigation is being conducted in the matter.
Initial investigation revealed that Chai Rau reached India from Nepal through Bihar in the year 2020. Initially, she stayed in Delhi along with many other states. Many documents related to her stay in different parts of India have been recovered which are under scrutiny.
It is said that the woman learnt Nepali and Hindi languages during her stay in India so that no one could suspect about her antecedents.
Not the first visit
Police investigation has revealed that the Chinese woman had earlier visited India on a Chinese passport on November 16, 2019. After staying in the country for about three months, she went to Nepal on 25 January 2020 through Raniganj border, Bihar.
During her stay in Nepal, she got her fake documents of Nepal prepared with the help of some of local agents. After getting her birth certificate and Nepali passport in the name of Dolma Lama, she returned to India as a Nepali citizen.
Links with Chinese party
It has also come to fore that the woman is associated with a political party in China and she was having direct access to several government offices in New Delhi. With this revelation the police are trying to ascertain the purpose of the woman to stay in Delhi for the last two years.
Also efforts are being made to ascertain the information about the people she was in contact with in India.
Mobile phone under scrutiny
A long list of Indian phone numbers has been found in the mobile of the woman. Through these numbers, the police are trying to collect information about who was in contact with the accused woman and in which department they are posted. The police are even trying to get answers as to how they came in contact with the woman.
.....................................................................................................................

babu phir lipat gaya ji 😔
 
I recommend profiling these babus silently, their family background their habits outside office etc. Home ministry should appoint a team for this max 10 people ( from outside the government) and begin this baby project in a state first or any central ministry. They will directly report to MOS Home.
 

Between 24 August 1978 and 23 January 1979, 50-odd persons who had worked in the 168 Infantry Brigade and its subordinate units at Samba, 40 km from Jammu on the international border, were arrested on charges of spying for Pakistan at the instance of the Directorate of Military Intelligence (MI). Its investigations involved practically the whole officer cadre of the Brigade. Those arrested included a Brigadier, three Lieutenant Colonels, and a number of Majors, Captains, Junior Commissioned Officers (JCOs), Non-Commissioned Officers (NCOs), and personnel of other ranks, plus 11 civilians who had worked in the Samba sector. They were all taken into custody at the instance of two self-confessed Pakistani spies who worked as gunners in the Indian Army - Sarwan Dass and Aya Singh.


..........................

who knows how many Samba are going on these days.
 
The local police in Noida and Greater Noida in Uttar Pradesh is already worthless, and money speaks more than law when you talk about police in India.

If no action is taken now, there will be a huge menace of narco terrorism coming up close to Delhi. The same which has ruined Punjab will now ruin Delhi and Noida. The reason is clear, create a corridor between Punjab and UP to exit to Nepal. And Greater Noida is posh area so suspicion will be low. And where there is drug money it will be easy for the terrorists and spies to operate close to Delhi. This will be an upcoming national security threat. Don't know how many young minds will lose their battle against drugs in NCR.

The stricter house renting norms and more vigilance is required in whole greater noida in Uttar Pradesh. Police should be kept away from this as they could be equally involved with the culprits.





 
Worth reading

What we claim:​


Aside from the fact that the CIR/BBC report was shallow and full of loopholes, we strive to establish that:


  • The Report conveniently ignores the available evidence and the larger narrative at play.
  • The Report, surreptitiously, tries to push the agenda of Khalistan and Sikh separatism.
  • That the Report is an attempt to defend SFJ and Pannun, by equating a campaign against Pannun as a campaign against farmers’ protests.
  • That the Report also attempts to negate the fact of Pakistan’s involvement in fake campaigns against India.
  • That BBC deliberately misled the readers about the organization behind the report. &
  • That all the entities involved – BBC to CIR – are linked with the UK Govt.

We will prove each of these points!
 
DRDO, ISRO, and government owned science and research institutes were always on the list of ISI and MSS and others. But now time has come to regulate the private companies as well and monitor private companies involved in defence projects. Industrial espionage is going to be a headache if steps not taken now. They have already tried to tap Indian data network past 10 years.


No to such trade deals by any case! Chinese are already a headache.
 
Several Chinese firms are hacking data from other countries and supplying it to the country's government. This includes Indian data too.

Documents leaked online by I-Soon, a Chinese hacking firm, showed that at least 95.2 gigabytes of immigration data from India had been stolen by them, according to a report by The Washington Post (WaPo). This includes national and foreign passengers' flight and visa details, another by the New York Times (NYT) added.




Researchers have uncovered a new espionage campaign targeting Indian government agencies and the country’s energy industry with a modified version of an open-source information stealer called HackBrowserData that can collect browser login credentials, cookies and history.
Researchers at Dutch cybersecurity company EclecticIQ discovered the campaign in early March but didn’t attribute it to a specific threat actor. According to their research, published Wednesday, the hackers exfiltrated 8.81 GB of data from victims. This data could aid further intrusions into the Indian government's infrastructure, the analysts said.
The information stealer was delivered to its victims via a phishing PDF document disguised as an invitation letter from the Indian Air Force. Researchers suggest that the original PDF file was very likely stolen during a previous intrusion and was repurposed by the attackers.
 
  • Informative
Reactions: Rajput Lion
Did the CIA mastermind Purulia arms drop?

By IANS English
Updated: Monday, March 9, 2015, 12:32 [IST]

On December 17, 1995, an ageing Russian AN 26 transport plane took off from Karachi ostensibly for Dhaka. After refuelling at Varanasi, it made a course diversion over Gaya, Bihar. When it was over Purulia in West Bengal, the plane flew dangerously low and dropped, amid darkness, four tonnes of deadly arms and ammunition, for the Ananda Marg, a semi-secret cult. It was, as author Chandan Nandy rightly points out, "one of the most bizarre and, admittedly, a spectacular operation to breach India's security".

On board were eight men: Niels Christian Nielsen alias Kim Davy from Denmark and the operational mastermind, Peter Bleach, a British arms dealer and part-time source for British intelligence, Deepak Manikan, a Singaporean of Indian descent, and five Russian-speaking Latvian crew.

Mission over, the plane returned to its original flight corridor, coolly landed at Kolkata's Dum Dum airport, re-fuelled and took off for Phuket in Thailand.

Early the next morning, villagers over a wide area were startled to find in their fields and open ground all sorts of strange weapons. What rained from the skies was lethality: 10 RPG-7 rocket launchers, 300 AK-47s, 25 9-mm pistols, two 7.62 sniper rifles, two night vision binoculors, 100 grenades, 23,800 rounds of 7.62 ammunition, 6,000 rounds of 9-mm ammunition, 100 anti-tank grenades as well as 10 telescopic sights for rocket launchers. Purulia, which housed the Ananda Marg headquarters, had seen nothing like this. The cargo weighed 4,375 kg!

Unfortunately for the audacious conspirators, things went wrong when they decided to fly back to Karachi via India even after knowing that the operation had blundered and that Indian security forces - not Ananda Marg -- were picking up the weapons. Nandy exposes in the book, most comprehensively for the first time, the "Neolithic incompetence" of the Indian security setup, before and after Purulia.

The irony is that RAW, India's external intelligence agency, had been tipped off about the Purulia arms drop by Britain's MI5. On November 25, 1995, RAW had officially alerted the Intelligence Bureau, the Cabinet Secretary, the Home Secretary and the Defence Secretary, mentioning, near accurately, where the arms delivery would be made. Yet, a full three weeks later, not only did the plane enter India, refuel in Varanasi, drop the cargo in Purulia, refuel (!) in Kolkata and then, from Phuket, flew to Chennai, for more fuel! That's when the plane's luck ran out.

After it took off from Chennai, Indian authorities ordered it to land in Mumbai. But even as it landed, more of plain stupidity on the part of Indian officialdom was in full display. There were no security personnel to apprehend them! Those Indian officials who approached the plane initially were more curious to know why the plane had landed! Amid the confusion, Kim Davy escaped!

Nandy, who reported the story for The Telegraph and later the Hindustan Times, has come out with what is undoubtedly the most gripping and authoritative account of a story whose many aspects are still shrouded in mystery. He rips through the "collective paralysis" that gripped the Indian security establishment after the RAW tip off. And this in a country that had battled Pakistan-sponsored terror in Punjab and Kashmir for years, and four years after losing a former prime minister to a foreign suicide bomber.

Nandy is certain - as are most of his sources - that Kim Davy must have been a front for a Western intelligence agency, in all probability the CIA. This is why the Danish authorities went out of their way to shield him even after the man, wanted by Interpol, surfaced in Denmark in late 1999 or early 2000. In 2009, almost mocking India, Kim Davy opened a Facebook page! By then, the Danes had stonewalled not just the pace of likely criminal proceedings but created a maze of bureaucratic red tape to prevent the man's extradition to India.

Nandy is convinced that Denmark's refusal to act against Kim Davy "was the result of pressure from a powerful Western state" (read the US). Even British intelligence became sullen after the Purulia airdrop. Kim Davy, Nandy says, was surprisingly able to visit the US four times before the arms drop despite being wanted in that country for two federal crimes. One RAW officer tells the author that only Kim Davy's links with the CIA could have led to the unabashed protection the Danish authorities provided him. And a Pakistani company that serviced the AN-26 in Karachi airport was said to have links with a CIA front aviation company. As they shared with Nandy all that they had uncovered, officers from the Indian intelligence wondered if Kim Davy was a CIA 'dirty asset'.

At the end of the "immensely vexing, extraordinarily complex and tangled" story, Nandy feels that the Narendra Modi government must revive the case, pursue every available means to bring Kim Davy to justice in India, and hunt down the Ananda Marg monks wanted in the case but who are still on the run. The UPA government had taken some unusually strong steps against Denmark; clearly more is needed.

Book title: The Night it Rained Guns: Unravelling the Purulia Arms Drop Conspiracy; Author: Chandan Nandy; Publisher: Rupa; Pages: 272; Price: Rs.295

IANS

 
  • Like
Reactions: screambowl