Cyber Law, Cyber Security, Privacy, Data Protection Blog - FREE TO SHARE
Sunday, June 27, 2021
बॅंकेतून ऑनलाइन पैसे गेलयास १५५२६० हा हेल्पलाइन क्रमांक करा डायल
Saturday, June 12, 2021
इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्तीसाठीची पोलिसानसाठी मार्गदर्शक तत्त्वे
पोलिस : इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्तीसाठीची मार्गदर्शक तत्त्वे कर्नाटक उच्च न्यायालय निकाला प्रमाणे - अॅड. (डॉ.) प्रशांत माळी, सायबर तज्ज्ञ वकील
महाराष्ट्र सायबरच्या पोलीस अधिकारींच्या माज्या व्याख्यान कार्यक्रमा निमित्त, माझा हा ब्लॉग प्रदर्शित करत आहे.
Virendra Khanna Vs State of Karnataka and Ors (2021) वीरेंद्र खन्ना विरुद्ध स्टेट ऑफ कर्नाटक आणि इतर (२०२१) निकालामध्ये स्मार्टफोन, इलेक्ट्रॉनिक उपकरणे किंवा ईमेल खाती यासंबंधात तपासणी दरम्यान जमलेल्या पुराव्यांना जतन करण्यासाठी शोध घेण्याच्या पद्धती संबंधित अनुसरण करण्याचे निर्देश उच्च न्यायालयाने अधोरेखित केले आहेत.
कोर्ट एका खटल्याची सुनावणी करीत होते, जेथे आरोपीच्या मोबाईल फोन च्या शोध आणि जप्ती संदर्भात चौकशीचा सहभाग होता, या संदर्भात हा निकाल हायलाइट्स केला गेला कि, ज्या तपासामध्ये इलेक्ट्रॉनिक उपकरणांचा तपासणी दरम्यान समावेश असतो त्या संदर्भात कोणताही विशिष्ट असा कायदा नाही.
हा निकाल असा निष्कर्ष काढतो कि, इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्ती संदर्भात पोलिस विभागाने तपशीलवार मार्गदर्शक तत्त्वे बनवावीत. अश्या कोणत्याही परिस्थितीत अनुसरण करण्याकरिता सूचना/मार्गदर्शक तत्त्वे तयार होईपर्यंत कोर्टाने नियमांचा किमान सेट जारी केला आहे.
अनुसरण केलेली मार्गदर्शक तत्त्वेः वैयक्तिक संगणक किंवा लॅपटॉप जप्तीच्या वेळेस:
१. ज्यावेळेस इलेक्ट्रॉनिक उपकरणे, स्मार्टफोन किंवा ई-मेल खाते ह्यांचा संबंधित जागेत शोध घेतला जात असेल तेव्हा शोध तपास यंत्रणेने त्यांच्या सोबत पात्रता असलेले फॉरेन्सिक परीक्षक ह्यांना घेऊन गेले पाहिजे.
२. गुन्ह्याचा तपास करताना ज्या जागेवर संगणक ठेवले असतील त्याचे संपूर्ण फोटो असे काढले पाहिजे की, ज्या मध्ये सगळ्या वायरच्या कनेकशन्स जसे पॉवर, नेटवर्क इत्यादी फोटोमध्ये टिपले गेले पाहिजेत.
३. एक डायग्रॅम (आलेख) काढला पाहिजे ज्यामध्ये सगळे संगणक किंवा लॅपटॉप कसे जोडले गेले आहेत हे दिसून येतील.
४. जर संगणकाची पॉवर चालू असेल आणि स्क्रीन ही ब्लँक असेल तर संगणकाचा माउस हलवा व जस जसे स्क्रीन वर इमेज येत जाईल तस-तसे स्क्रीन चे फोटो काढून घ्या.
५. मॅक पत्ता (MAC Address) देखील ओळखला जाणे आणि सुरक्षित करणे गरजेचे आहे. जर कोणत्याही कारणाने फॉरेन्सिक परीक्षक उपलब्ध नसतील तर, संगणक अनप्लग करा, संगणक व तारा स्वतंत्र फॅराडे कव्हरमध्ये त्यांना लेबलिंगनंतर पॅक करा.
संगणक, लॅपटॉप इत्यादींच्या जप्तीसंदर्भात वरील प्रक्रियेव्यतिरिक्त, जर उपरोक्त उपकरणे एखाद्या नेटवर्कशी जोडलेली असतील तर, पुढील गोष्टींची शिफारस केली गेली आहेः
१. सांगितलेली उपकरणे कोणत्याही रिमोट स्टोरेज उपकरणांशी किंवा शेअर नेटवर्क डिवाइस सोबत जोडलेली आहेत की नाही हे तपासा आणि जर तसे असेल तर रिमोट स्टोरेज उपकरणाला जप्त करण्यासाठी शेअर नेटवर्क डिवाइस (servers) देखील जप्त करा.
२. वायरलेस ऍक्सेस पॉईंट्स, राऊटर्स, मोडेम्स किंवा इतर कोणतेही उपकरण जे ह्या ऍक्सेस पॉईंट, राऊटर्स, मोडेम्स ला जोडलेला असतो जे कधी कधी लपलेले असतात त्यांना देखील जप्त करा.
३. घटनास्थळावरून कोणतेही असुरक्षित वायरलेस नेटवर्क ऍक्सेस होत नाही ना ह्याची खात्री करून घ्या, आणि जर तसे होत असेल तर त्याला ओळखा व असुरक्षित वायरलेस डिव्हाइस ह्यांना सुरक्षित करा कारण आरोपीने असुरक्षित वायरलेस डिव्हाइस चा वापर केला असू शकतो.
४. खात्री करून घ्या की कोण नेटवर्क सांभाळत आहे किंवा कोण नेटवर्क चालवत आहे हे ओळखा - नेटवर्क चालवणाऱ्या संदर्भातील व त्या सोबतच नेटवर्क मॅनेजर कडून जप्त केलेल्या उपकरणाचा गुन्ह्यांमधील समावेश ची सगळी माहिती गोळा करा.
मोबाइल डिव्हाइसच्या जप्तीच्या वेळेस, पुढील गोष्टींची शिफारस केली गेली आहे:
मोबाइल डिव्हाइस म्हणजे स्मार्टफोन आणि मोबाईल फोन, टॅब्लेट जीपीएस युनिट इ. समाविष्ट करेल.
१. नेटवर्कला संप्रेषण करण्यापासून आणि / किंवा Wi-Fi किंवा मोबाईल डेटा द्वारे फॅराडे बॅगमध्ये समान पॅक करून कोणतेही वायरलेस संप्रेषण साधण्यापासून डिव्हाइसला प्रतिबंधित करा.
२. डिव्हाइसला सर्वत्र चार्ज ठेवा, जर बॅटरी संपली असेल तर अस्थिर मेमरीमध्ये उपलब्ध डेटा गमावला जाऊ शकतो.
३. स्लिम-स्लॉट्स शोधा, सिम कार्ड काढून टाका जेणेकरून मोबाईल नेटवर्कमध्ये कोणालाही प्रवेश टाळता येईल, फॅराडे बॅगमध्ये सिम कार्ड स्वतंत्रपणे पॅक करा.
४. शोध घेताना, तपास अधिकाऱ्याने आवारात असलेली सीडी, डीव्हीडी, ब्लू-रे, पेन ड्राईव्ह, बाह्य हार्ड ड्राइव्ह, यूएसबी थंब ड्राईव्ह, सॉलिड-स्टेट ड्राइव्ह्स इ. सारख्या इलेक्ट्रॉनिक स्टोरेज उपकरणे ताब्यात घेतल्यास त्यांना स्वतंत्रपणे फॅराडे बॅगमध्ये ठेवावे.
५. संगणक, स्टोरेज मीडिया, लॅपटॉप इ. मॅग्नेट, रेडिओ ट्रान्समीटर, पोलिस रेडिओ इत्यादीपासून दूर ठेवावे लागतील कारण त्यांचा वरील उपकरणांवरील डेटावर विपरीत परिणाम होऊ शकेल.
६. सूचना पुस्तिका, कागदपत्रे इ. मिळविण्यासाठी परिसराचा शोध घ्यावा, तसेच एखादी संकेतशब्द कुठेतरी लिहिले गेले आहे का हे शोधावे, बहुतेक वेळेस त्या ठिकाणी उपकरणे असणाऱ्याच एखाद्या व्यक्तीने एखाद्या पुस्तकात, लेखन पॅडवर किंवा इतर संकेतशब्दावर संकेतशब्द लिहिले असतात.
७. तपासणी व शोध कार्यसंघाच्या प्रवेशाच्या वेळेपासून परीक्षेच्या बाहेर येईपर्यंत संपूर्ण प्रक्रिया व प्रक्रिया यांचे लेखी दस्तऐवजीकरण केले गेले पाहिजे.
PASSWORD संकेतशब्द (पासवर्ड) जप्तीच्या वेळेस:
तपास अधिकारी आरोपीला संकेतशब्द / पासकोड्स / बायोमेट्रिक्स सादर करण्यासाठी स्वतःच अशा दिशानिर्देश जारी करु शकतात.
जर आरोपींनी अधिकाऱ्याच्या निर्देशांचे पालन केले नाही तर, ते अधिकारी शोध आदेश (search warrant) जारी करण्यासाठी कोर्टाकडे अर्ज करू शकतात.
मोबाइल फोन किंवा लॅपटॉप शोधण्याची आवश्यकता दोन परिस्थितींमध्ये उद्भवू शकते - एखाद्या आपत्कालीन परिस्थितीत जेव्हा एखाद्या डिव्हाइसवर असलेले संभाव्य पुरावे नष्ट होऊ शकतात अशी भीती उद्भवली असेल, अशा परिस्थितीत शोध वॉरंटचा आग्रह धरणे व्यर्थ आहे, आणि त्याऐवजी तपास अधिकाऱ्याने वॉरंटशिवाय स्स्तःच पासवर्ड ची विचारणा आरोपी कडून करू शेकतात व अशी पासवर्ड ची विचारणा का केली गेली आहे व असा शोध का घेण्यात आला आहे, तपास अधिकाऱ्याचे उद्दीष्ट समाधानासाठी पुरेसे तपशील लेखी नोंदवला जावा लागेल. जर तपास अधिकाऱ्याने तसे केले नसेल तर मात्र वॉरंटशिवाय शोध घेणे हे तपास अधिकाऱ्याचे कार्यकक्षाशिवाय शोध घेणे असेल.
तपासणीच्या नियमित सामान्य प्रकरणात दुसर्या बाबतीत आवश्यक संकेतशब्द मिळविण्यासाठी सर्च वॉरंट मिळवणे आवश्यक असते.
सीआरपीसीचा सातवा अध्याय जो शोध आणि जप्त करण्याची शक्ती प्रदान करतो आणि स्मार्टफोन तसेच शोधले जाऊ शकतात असे ठामपणे सांगते. एखाद्या आरोपी व्यक्तीने सर्च वॉरंटला आणि / किंवा संकेतशब्द प्रदान करण्याच्या दिशेला प्रतिकार केला तर त्याच्या विरुद्ध प्रतिकूल अनुमान लावला जाऊ शकतो आणि तपास अधिकारी माहिती मिळविण्यासाठी डिव्हाइस हॅक करण्यासाठी पुढे जाऊ शकतात.
संकेतशब्द देणे हे भारतीय संवेदाना च्या अनुच्छेद २०(३) याचे उल्लंघन नाही (Right to self incrimination)
कर्नाटक हायकोर्टाने असेही म्हटले आहे की फक्त स्मार्टफोनकडूनच मिळालेले पुरावे आरोपींचे अपराध सिद्ध करण्यासाठी पूरक नसतात, पुरावे इतर पुरावांच्या बरोबरीने आहेत ज्यावर आरोपीचा दोष ठरवण्यासाठी एकत्रितपणे अवलंबून रहावे लागेल. फ़क्त मोबाइल फोन डिव्हाइसवरून प्राप्त केलेले पुरावे आरोपी व्यक्तीस दोषी ठरवू शकत नाहीत, म्हणून हायकोर्टाने असा तर्क केला की संकेतशब्द देण्याची कृतीने आरोपि स्वत:ची हानी करु शकत नाही व तसे करने भारतीय संवेदाना च्या अनुच्छेद २०(३) याचे उल्लंघन सुधा नाही . (Article 20(3))
संकेतशब्द देणे गोपनीयतेच्या अधिकाराचे (Right to Privacy) उल्लंघन करत नाही
कर्नाटक हायकोर्टाने असेही म्हटले आहे की संकेतशब्द पुरवणे गोपनीयतेच्या अधिकाराचे उल्लंघन करीत नाही आणि संबंधित यंत्रणेकडून मिळालेल्या माहितीचा उपयोग चौकशीच्या वेळी केला जाऊ शकतो कारण ती पुत्तस्वामीच्या केस मधील एक अपवादातच (exception) आहे. Justice K.S.Puttaswamy (Retired). vs Union of India And Ors(2017) 10 SCC 1, AIR 2017 SC 4161.
तथापि, हे स्वीकारले आहे की, तपास अधिकाऱ्याला आरोपीच्या वैयक्तिक अशा अधिक माहितीसाठी अकॅसेस (प्रवेश) मिळेल; ज्याचे प्रत्यक्ष स्वरूपात पुरावे ज्या प्रकारे हाताळले जातात त्याचप्रकारे हाताळायचे आहेत; आणि तपास अधिकारी कोणत्याही वैयक्तिक माहितीचा दुरुपयोग करण्यासाठी किंवा तृतीय पक्षासह माहिती सामायिक करण्यासाठी जबाबदार असतील.
इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्तीसाठीची सामान्य मार्गदर्शक तत्त्वेः
a. सर्व प्रकरणांमध्ये, जप्त केलेली उपकरणे धूळ मुक्त आणि तपमान-नियंत्रित वातावरणात ठेवली पाहिजेत;
b. तपास अधिकारीने आवारात स्थित, शोध घेऊन जप्त करताना, सीडी, डीव्हीडी, ब्लू-रे, पेन ड्राईव्ह, बाह्य हार्ड ड्राइव्ह, यूएसबी थंब ड्राईव्ह, सॉलिड-स्टेट ड्राइव्ह इत्यादी इलेक्ट्रॉनिक स्टोरेज उपकरणे हि लेबल करावी आणि फॅराडे बॅगमध्ये त्यांना स्वतंत्रपणे पॅक करून ठेवावी;
c.संगणक, स्टोरेज मिडिया, लॅपटॉप इत्यादी मॅग्नेट, रेडिओ ट्रान्समीटर, पोलिस रेडिओ इत्यादींपासून दूर ठेवणे आवश्यक आहे कारण त्यांचा वरील उपकरणांवरील डेटावर विपरीत परिणाम होऊ शकतो;
d. सूचना पुस्तिका, कागदपत्रे इ. मिळविण्यासाठी परिसराचा शोध घ्यावा, तसेच एखादी संकेतशब्द कुठेतरी लिहिले गेले आहे का हे शोधावे, बहुतेक वेळेस त्या ठिकाणी उपकरणे असणाऱ्याच एखाद्या व्यक्तीने एखाद्या पुस्तकात, लेखन पॅडवर किंवा इतर संकेतशब्दावर संकेतशब्द लिहिले असतात.
e. तपास प्रक्रिया / शोध कार्यसंघाच्या प्रवेशाच्या वेळेपासून आवारात बाहेर येईपर्यंत संपूर्ण प्रक्रिया आणि प्रक्रियेचे लेखी दस्तऐवजीकरण केले गेले पाहिजे.
निष्कर्ष (Conclusion ):
माननीय कर्नाटक उच्च न्यायालया च्या निर्णयामुळे आरोपींना, विशेषत: व्हाईट कॉलरच्या (EOW, Cyber Crime ) प्रकरणात अडकलेल्यांना, तपासात तांत्रिक बिघाड दर्शविण्याकरिता आणि या तांत्रिक बाबींवर दिलासा मिळण्याचा पर्यायी मार्ग उघडण्याची शक्यता आहे. दुसरीकडे, न्यायालयीन समितीनेही तपास पध्दतीचे अनुसरण करणे सोपे केले आहे, जर ती योग्यरीत्या अंमलात आणली गेली तर चौकशी करण्यास कमी वाव आहे. इलेक्ट्रॉनिक उपकरणांच्या शोध आणि जप्तीसंदर्भातील नियम या विषयावर मौन बाळगलेल्या इतर राज्यांमध्ये या मार्गदर्शक तत्त्वांचे किती द्रुतपणे आणि कोणत्या प्रमाणात पालन केले गेले हे पाहणे बाकी आहे. महाराष्ट्र पोलीस याची अंमलबजावणी करून इतर व सायबर गुन्ह्या मद्ये जास्तात जास्त CONVICTION आणेल अशी अपेक्षा .
अॅड. (डॉ.) प्रशांत माळी, सायबर तज्ज्ञ वकील Bombay High Court
Thursday, June 10, 2021
Guidelines for search & seizure of Electronic Devices by Police : Karnataka HC Case Law
Releasing this Blog on the event on my session for Maharashtra Cyber (MahCyber) police officers :
In the case Virendra Khanna vs. State of Karnataka and others (2021), the high court underlined guidelines to be followed by investigating officers regarding the manner of carrying a search and/or for the preservation of evidence gathered during an investigation that concerns smartphones, electronic equipment, or email accounts.
The court was hearing a case where the investigation involved the search and seizure of an accused mobile phone. In this context, the judgment highlights that there is no specific law regarding the procedure to be followed during an investigation that involves electronic devices.
The judgment concludes that detailed guidelines must be prepared by the police department in relation to the search and seizure of electronic devices. Meanwhile, until such instructions are formulated, the court issued a minimum set of rules to be followed in any such scenario.
The followed guidelines: In the case of a personal computer or a laptop;
1. When carrying out a search of the premises, as regards any electronic equipment, Smartphone, or an e-mail account, the search team is to be accompanied by a qualified Forensic Examiner.
2. At the time of the search, the place where the computer is stored or kept is to be photographed in such a manner that all the connections of wires including power, network, etc. are captured in such photographs.
3. A diagram should be prepared to show the manner in which the computer and/or the laptop is connected.
4. If the computer is powered on and the screen is blank, the mouse could be moved, and as and when the image appears on the screen, the photograph of the screen to be taken.
5. The MAC address also to be identified and secured. In the unlikely event of the Forensic examiner not being available, then unplug the computer, pack the computer and the wires in separate faraday covers after labeling them.
Apart from the above steps regarding the seizure of the computer, laptop, etc., if the said equipment is connected to a network, the following was recommended:
1. To ascertain as to whether the said equipment is connected to any remote storage devices or shared network drives, if so to seize the remote storage devices as also the shared network devices.
2. To seize the wireless access points, routers, modems, and any equipment connected to such access points, routers, modems which may sometimes be hidden.
3. To ascertain if any unsecured wireless network can be accessed from the location. If so, identify the same and secure the unsecured wireless devices since the accused might have used the unsecured wireless devices.
4. To ascertain who is maintaining the network and to identify who is running the network – get all the details relating to the operations of the network and the role of the equipment to be seized from such network manager.
In the case of mobile devices, the following was recommended:
Mobile devices would mean and include smartphones, mobile phones, tablets GPS units, etc.
1. Prevent the device from communicating to the network and/or receiving any wireless communication either through Wi-Fi or mobile data by packing the same in a faraday bag.
2. Keep the device charged throughout, since if the battery drains out, the data available in the volatile memory could be lost.
3. Look for slim slots, remove the sim card so as to prevent any access to the mobile network, pack the sim card separately in a faraday bag.
4. While conducting the search, if the investigating officer seized any electronic storage devices like CD, DVD, Blu-Ray, pen drive, external hard drive, USB thumb drives, solid-state drives, etc., located on the premises, label and pack them separately in a faraday bag.
5. The computers, storage media, laptops, etc. to be kept away from magnets, radio transmitters, police radios, etc. since they could have an adverse impact on the data in the said devices.
6. To carry out a search of the premises to obtain instructions manuals, documentation, etc., as also to ascertain if a password is written down somewhere since many a time person owning equipment would have written the password in a book, writing pad or the like at the said location.
7. The entire process and procedure followed to be documented in writing from the time of the entry of the investigation/search team into the premises until they exit.
Password confiscating procedure :
An investigating officer can issue such directions in the course of an investigation accused to furnish passwords/ passcodes/ biometrics.
If the accused were to not comply with the officer’s directions, the officer could then apply to the Court seeking issuance of search order.
The necessity to search a mobile phone or laptop would arise in two circumstances – in an emergency when there is an apprehension that the potential evidence contained on a device may be destroyed, in this scenario, it would be futile to insist on a search warrant, and it would instead be appropriate if the investigating officer recorded his reasons in writing as to why such search was being conducted without a warrant, i.e., objective satisfaction by such officer regarding the emergent nature of the search would have to be recorded in sufficient detail, failing which the search without a warrant would be without jurisdiction.
In the second case in the regular ordinary course of an investigation, it would be essential to procure a search warrant to obtain the requisite passwords.
Chapter VII of the CrPC which provides for powers to search and seize was relied upon to assert that smartphones can be searched as well. Should an accused person resist a search warrant and/ or a direction to provide a password, an adverse inference can be drawn against him/ her and the investigating officer can proceed to get the device hacked to obtain the information.
Giving Passwords Doesn't amount to self-incrimination:
Karnataka HC also held that evidence that is obtained from a smartphone cannot ipso facto prove the guilt of the accused. Such evidence is on par with other evidence that has to be cumulatively relied on to decide the guilt of an accused. Since evidence obtained from a mobile device cannot ipso facto render an accused person guilty, the HC reasoned that the act of giving passwords cannot amount to self-incrimination.
Giving passwords does not violate the right to privacy
The Karnataka HC also held that furnishing passwords does not violate the right to privacy, and information that is obtained from the concerned device can be used in the course of the investigation as it falls within the exceptions carved out in Puttaswamy. However, it acknowledged that the investigating officer would have access to a plethora of personal information of the accused, which is to be handled in the same way that evidence in physical forms is handled; and that the investigating officer would be liable for misuse of any personal information or sharing of information with third parties.
General Guidelines :
In all cases, seized equipment to be placed in a dust-free and temperature-controlled environment;
While conducting the search, the investigating officer to seize any electronic storage devices like CD, DVD, Blu-Ray, pen drive, external hard drive, USB thumb drives, solid-state drives, etc, located on the premises, label and pack them separately in a faraday bag;
Computers, storage media, laptops, etc to be kept away from magnets, radio transmitters, police radios, etc since they could have an adverse impact on the data in the said devices;
Carry out a search of the premises to obtain instruction manuals, documentation, etc, as also to ascertain if a password is written down somewhere since many a time the person owning the equipment would have written the password in a book, writing pad or the like at the said location;
The entire process and procedure followed to be documented in writing from the time of the entry of the investigation/ search team into the premises until they exit.
Conclusion :
This decision is likely to open a treasure trove of options for accused persons, especially those implicated in white-collar matters, to point out technical lapses in investigations and seek reliefs on these technical counts. On the other hand, the HC has also made the job easier for investigators to follow a set pattern, which if implemented correctly, can lead to less scope for assailing an investigation. It remains to be seen as to how quickly and to what extent these guidelines are followed in other States where Rules regarding search and seizure of electronic equipment are silent on the subject.
Friday, June 4, 2021
APT Groups of India involved in Cyber Warfare
An advanced persistent threat (APT) is a stealthy threat actor, typically a nation-state or state-sponsored group, which gains unauthorized access to a computer network and remains undetected for an extended period. In recent times, the term may also refer to non-state-sponsored groups conducting large-scale targeted intrusions for specific goals. Such threat actors' motivations are typically political or economic.
Following are some of the Indian APT Groups :
- SideWinder: The highly active cyber-espionage entity known as SideWinder has been plaguing governments and enterprises since 2012. SideWinder’s most of the activity is heavily focused on South Asia and East Asia, with the group likely supporting Indian political interests.
- Dropping Elephant: This is allegedly an Indian state-sponsored group Dropping Elephant has been known to target the Chinese government via spear-phishing and watering hole attacks.
- Viceroy Tiger: This APT group has been known to use weaponized Microsoft Office documents in spear-phishing campaigns. Security researchers at Lookout recently went public with research on mobile malware attributed to the threat actors and rated as medium sophistication.
Sunday, April 25, 2021
WhatsApp group admin Liability Case Law
R. Rajendran v. The Inspector of Police & Kathirvel
Case No: Crl.O.P.(MD)No.8010 of 2021 & CRL.M.P.(MD)No.4123 of 2021
Saturday, March 13, 2021
Police needs warrant to ask PASSWORD from accused
EMP Warfare as a part of Cyber Warfare : China's war on India
EMP Warfare as a part of Cyber Warfare
EMPs, or electromagnetic pulses, are intense bursts of electromagnetic energy that can be utilized to damage electronics. Man-made nuclear EMPS are impressive weapons of war that are sparingly used due to their highly destructive nature.China’s has ability to conduct an Electromagnetic Pulse attack on the India. China now has super-EMP weapons, knows how to protect itself against an EMP attack, and has developed protocols to conduct a first-strike attack, even as they deny they would ever do so.
China has the most active ballistic missile development program in the world, so this is doubly troubling. Allegedly China used stolen U.S. technology to develop at least three types of high-tech weapons to attack the electric grid and key technologies that could cause a surprise “Pearl Harbor” attack that could produce a deadly blackout to the entire India.
EMPs are one of those things that many people think is fake, or over-blown, or a conspiracy theorist’s dream. But they are real. EMPs can be either natural, from things like extreme solar geomagnetic disturbances, or man-made like a large thermonuclear detonation or a cyberattack. If they are coordinated with physical attacks then things can get real dicey real fast.
As the U.S. Commission to Assess the Threat to the United States from EMP Attack points out, “the physical and social fabric of the United States is sustained by a system of systems – a complex and dynamic network of interlocking and interdependent infrastructures whose harmonious functioning enables the myriad actions, transactions, and information flow that undergird the orderly conduct of civil society.”
According to the Commission, EMP effects represent arguably the largest-scale common-cause failure events that could affect our electric power grid and undermine our society, leaving it vulnerable on many fronts. About the only safe systems are nuclear reactors, both new and old.
High-voltage control cables and large transformers that control the grid are particularly vulnerable. Transformers weigh 400 tons, take two years to build, and cost around Rs. Five Crore million per piece. We are already way behind in having backup transformers ready, so if many go out at once, we have a big problem just powering our country.
The phenomenon of a large electromagnetic pulse is not new. The first human-caused EMP occurred in 1962 when the 1.4 megaton Starfish Prime thermonuclear weapon detonated 400 km above the Pacific Ocean.
One hundred times bigger than what USA dropped on Hiroshima, Starfish Prime resulted in an EMP which caused electrical damage nearly 900 miles away in Hawaii. It knocked out about 300 streetlights, set off numerous burglar alarms, and damaged a telephone company microwave link that shut down telephone calls from Kauai to the other Hawaiian islands.
And that was from many miles away.
On the natural side, in 1989, an unexpected geomagnetic storm triggered an event on the Hydro-Québec power system that resulted in its complete collapse within 92 seconds, leaving six million customers without power. The storm resulted from the Sun ejecting a trillion-cubic-mile plume of superheated plasma, or ionized gas.
Such storms occur every 60 years or so, and in 1989, we weren’t anywhere near as electrified and electronically interconnected as we are today, or as we will be in 30 years.
Solar events were considered the most likely EMP to occur. Until now.
Even more troubling, China is eager to shoot first with “high-altitude electromagnetic pulse,” or HEMP, weapons launched from satellites, ships, and land.
China’s can be of using HEMP attack to win on the battlefield, defeat U.S. aircraft carriers, and achieve against the U.S. homeland a surprise ‘Pearl Harbor’ writ large
Needless to say, we are not prepared for this.
A report done while Dr. Pry was a key member of a US congressional EMP commission found that an EMP attack on the US East Coast electric grid could lead to a huge number of deaths, Imagine India
You might think that EMP is too far-fetched to worry about. But you would be wrong. We have been learning in the information age that if it can be done, someone will do it. The speed with which our information age is changing is paralleled by the speed with which our national digital organism can test and block the ever-changing gaps and vulnerabilities in our electronic shield.
Like a host adapting to new parasites, this is just a normal incident for an evolving society in a rapidly-changing digital environment that selects for a digital organism that viscerally understands the whole system and can use it to its advantage.
Societies with older systems will be at a dangerous disadvantage. The Universe does this all the time. Sociologically, China seems to be moving into a more aggressive position globally, evidenced by their recent conflict with us and their aggression in the South China Sea with their east Pacific neighbours.
This may have been aggravated by China’s 1-child policy. Although the policy did rein in population growth (fertility rates dropped below two by 1990 and the present population is 1.3 billion), it gave rise to another problem – too few women.
Almost all cultures prefer a male as the first child and in China, the eldest male is expected to take care of his elderly parents. Therefore, the magnitude of female infanticide in China became astonishing in the decades between 1990 and 2010, when well over ten million female infants were killed. Only a relatively few found adopted homes in other countries.
China then changed to a 2-child policy, but the damage to an entire generation will not be so easily erased. The result was a skewed sex ratio in the generation born since 1980. Today, there are about 50 million more males than females. Just think of the states of Texas, New York and Ohio filled with just men.
The consequences of having too many uncoupled males in a society are worse than just making it difficult to find a mate. Soon there will be a substantial deficit of younger workers to provide support to an aging population. By 2030, China will have over 400 million people over the age of 60. Maintaining sufficient economic growth under these conditions will be difficult.
Some research indicates that excess males to this degree tends to make a society more aggressive and nationalistic, both of which have risen dramatically in China.
Not coincidentally, China has rolled out a number of other new military capabilities, designed to protect their new expansionist future. Included in their burgeoning array is a new generation of nuclear submarines, a carrier-killing missile named DF-21D, intended specifically to destroy aircraft carriers, and new rocket launch vehicles, like the Long March 6 rocket capable of carrying 20 warheads, that just went into space last month to deploy 20 satellites in orbit.
While everyone points out that the United States spends more on its military than the next ten countries combined, it turns out that China is far and away number 2, spending a third of what we spend in dollars, but almost the same percentage of its GDP as USA.
FIR : All you want to know about in a criminal case
FIR - What is? The first information report is a report giving information of the commission of a cognizable crime, which may be made by t...

-
The Telecommunications Act of 2023 has strengthened the dispute resolution framework by introducing an online grievance redressal system. T...
-
Types of Cyber Attacks There are several effective methods for disrupting computer systems. We are talking of a method known as cyber ...
-
Indian Narcotics Control Bureau (NCB) on 9th February has arrested the country's first 'darknet' narcotics operative who alleg...