Pages Menu
TwitterRssFacebook
Categories Menu

Posted by on Mar 2, 2012 in Defence, Intelligence | 0 comments

Breaking : Bug in Defense minister- Ak Antony’s office, probe ordered

Breaking : Bug in Defense minister- Ak Antony’s office, probe ordered

Defense minister of India- AK Antony Hand held detectors of Military Intelligence officials detected a presence of monitoring devices in defense minister Ak Antony’s office in Feb 16. Defense Secretary Shashikant Sharma took up the matter with Intelligence Bureau(IB). After the detection of the bug the MI personnel were immediately asked to leave by Defence Ministry security. The Home Ministry was alerted while the IB was called in. High level probe has been ordered. There are many suspects in this regard, considering alleged mistrust between Army and the Ministry. Though Army cannot tap phones it is said to have passive cellular surveillance . It is worth to note here that, In June 2011 Finance Minister Pranab Mukherjee’s office was also bugged. Mukherjee had spoken about discovery of at least 16 identical adhesive like gum sticks from key rooms of the Finance Ministry . There were imprints of bug like devices on these gum sticks as well. source : IBN...

Read More

Posted by on Feb 29, 2012 in Defence, Intelligence | 0 comments

China may put up a major military offensive to grab lands, says report

China may put up a major military offensive to grab lands, says report

India vs China is the biggest test of the century. Pic courtesy:The Economist According to the latest report by an independent group of Indian analysts, China may resort to territorial grabs through a “major military offensive“ especially in Arunachal Pradesh or Ladakh in Jammu and Kashmir and India should respond with “a strategy of quid pro quo“. “Our frontiers with China have been mostly stable for some years now. However, China could assert its territorial claims (especially in the Arunachal sector or Ladakh) by the use of force,” says the report that seeks to outline a foreign and strategic policy for India in the 21st century. “There is the possibility that China might resort to territorial grabs. The most likely areas for such bite-sized operations are those parts of the Line of Actual Control where both sides have different notions of where the LAC actually runs. These places are known”,says the report. The report titled ‘Non-Alignment 2.0: A Foreign and Strategic Policy for the 21st century‘, was unvieled on Tuesday...

Read More

Posted by on Jan 17, 2012 in Drones, Intelligence, Linux, Technology | 0 comments

Why US killer spy drone switched to Linux ?

Why US killer spy drone switched to Linux ?

The MQ-9 Reaper (image source-wikipedia) After the malware infection on the US control bases of the killer drones, it seems US military have switched the controls from windows machines to linux based machines. Ground control systems at Creech Air Force Base in Nevada, which commands the Reaper drones became infected with virus last september. The Air Force in a statement dismissed the malware as just a nuisance and did not pose any threat to the operation of the Reaper drones. It said,  “The ground system is separate from the flight control system Air Force pilots use to fly the aircraft remotely; the ability of the pilots to safely fly these aircraft remained secure throughout the incident,”  The credential stealing malware was first posted on Wired. Defense news  said,Portable disks that are used to load map updates and transfer mission videos from one computer to another were responsible for malware getting into the control systems. US Airforce said in  statement that, “The malware was detected on a standalone mission support network...

Read More

Posted by on Jan 8, 2012 in Hacking, Intelligence | 0 comments

Did Mobile manufacturers give Indian spy agencies back door to access communication ?

Yesterday I posted a news on “The Lords of Dharmaraja” Hacker group which released a document on Symantec‘s Norton Antivirus Technology and claims to have source code for the same. Further digging into their pastebin link of the image uploading site imgur provided few images of documents, which the group claims belongs to Indian Military/Spy servers. The document mentions of the International mobile handset manufacturers like RIM, Nokia, Apple and even domestic manufacturers like Micromax given backdoors to spy on the communication in return for the market presence in India. The document further says the RINOA(RIM,NOkia and Apple) SUR platform was used to spy on the USCC (US-China Economic and Security Review Commission) . Below are the set of images uploaded to imgur by that hacker group, check it out yourself and you are free to post your opinion on the comments. Source : Imgur Disclaimer : The above images are uploaded by some person to imgur and it has just been embedded here. Indiandragon websites does not take any responsibility with these images or with the credibility of...

Read More

Posted by on Dec 31, 2011 in Defence, Intelligence | 0 comments

China launches the rival for the GPS-Beidou

China launches the rival for the GPS-Beidou

China has launched the Beidou Global Positioning Satellite system and has started providing location services for mainland china and nearby territories. China has 10 satellites for this purpose which it started launching in 2003. This system will rival US GPS and reduce china’s dependency on it. This is similar to individual global positioning systems like Galileo by Europe, GLONASS by Russia and IRNSS (Indian Regional Navigational Satellite System) by India. China plans to have 35 total satellites in 2020 which will provide total coverage of the whole world. The chinese system is meant to offer better precision with accuracy of 33feet (10meters) while GPS  offers around 66 feet (20 meters). It will also be able to record speed with 0.2-meter a second accuracy and sync clocks to 0.02 millionths of a second a necessity for guiding missiles and other weapons. So the main purpose of countries rushing for independent satellite systems are not to provide its citizens with a car navigation systems but to have a fool proof system for their defense navigation systems. ...

Read More

Posted by on Dec 13, 2011 in Defence, Intelligence | 0 comments

Why Iran’s capture of US drone is very significant

Why Iran’s capture of US drone is very significant

Iranian TV showed the unmanned “stealth” aircraft apparently undamaged Last week Iranian television showed the captured intact US drone – RQ -170 Sentinel , which it claimed was brought down using electronic warfare where as US insisted that the drone malfunctioned. Iran said it brought down the UAV using electronic ambush ,as the drone violated Iranian airspace by intruding 250Km into its airspace. It also launched a formal complaint to the UN security counsel on US intrusion. America had earlier asked for the return of the drone, to which the Iran has subsequently refused. If Iran had in fact brought  down the drone only using electronic warfare methodologies, then it is something the US has to be worried about. From the footage released by the Iranian television it is clear that the aircraft has sustained only minimal damage adding support to the Iran’s claim of electronic ambush methodology to bring down the drone. If the drone had really malfunctioned like the US claims, the drone would have suffered some significant damage....

Read More
Page 2 of 212