Feeds

India plans its own net snoop system

Indian IMP pilot for mid-2010

Beginner's guide to SSL certificates

On the anniversary of the Mumbai terror attacks, the Indian government has announced its own version of the UK's Interception Modernisation Programme (IMP) - a massive expansion of communications surveillance for the internet age.

A pilot of the Centralised Monitoring System (CMS) will begin by June next year, communications minister Gurudas Kamat said on Thursday.

Like IMP, CMS will see a network of monitoring probes inserted throughout the country's fixed line and wireless communications networks.

Again like the British project, which is scheduled for completion in 2016, CMS probes will be configured centrally and allow intelligence and law enforcement agencies to easily intercept calls, texts and internet sessions.

"In the existing system secrecy can be easily compromised due to manual intervention at many stages while in CMS these functions will be performed on secured electronic link and there will be minimum manual intervention," Kamat told the upper house of India's legislature.

The system will also create huge silos of communications data (who contacts whom, when, where and how) to be analysed and mined. But while UK ministers plan to outsource storage and initial processing to ISPs and phone companies, the Indian government plans its own series of regional and central databases.

Planning for CMS was begun in 2007, but has gained momentum in the wake of the Mumbai attacks, when the terrorists received orders via VoIP.

The laws needed to legitimise such a system here are not expected to be introduced until the next Parliament. A Home Office consultation on its plans over summer attracted a very negative response from the communications industry. ®

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
How to simplify SSL certificate management
Simple steps to take control of SSL certificates across the enterprise, and recommendations centralizing certificate management throughout their lifecycle.