Feeds

India plans its own net snoop system

Indian IMP pilot for mid-2010

The Essential Guide to IT Transformation

On the anniversary of the Mumbai terror attacks, the Indian government has announced its own version of the UK's Interception Modernisation Programme (IMP) - a massive expansion of communications surveillance for the internet age.

A pilot of the Centralised Monitoring System (CMS) will begin by June next year, communications minister Gurudas Kamat said on Thursday.

Like IMP, CMS will see a network of monitoring probes inserted throughout the country's fixed line and wireless communications networks.

Again like the British project, which is scheduled for completion in 2016, CMS probes will be configured centrally and allow intelligence and law enforcement agencies to easily intercept calls, texts and internet sessions.

"In the existing system secrecy can be easily compromised due to manual intervention at many stages while in CMS these functions will be performed on secured electronic link and there will be minimum manual intervention," Kamat told the upper house of India's legislature.

The system will also create huge silos of communications data (who contacts whom, when, where and how) to be analysed and mined. But while UK ministers plan to outsource storage and initial processing to ISPs and phone companies, the Indian government plans its own series of regional and central databases.

Planning for CMS was begun in 2007, but has gained momentum in the wake of the Mumbai attacks, when the terrorists received orders via VoIP.

The laws needed to legitimise such a system here are not expected to be introduced until the next Parliament. A Home Office consultation on its plans over summer attracted a very negative response from the communications industry. ®

Boost IT visibility and business value

More from The Register

next story
UK gov rushes through emergency law on data retention
Cameron: 'The consequences of not acting are grave'
NSA dragnet mostly slurped innocents' traffic
Latest Snowden leak suggests indiscriminate retention
Judge says there's no such thing as a 'Patent Troll'
Apple banned from calling litigant a 'Bounty hunter', 'corporate shell' or 'Troll'
ISPs haul GCHQ into COURT over dragnet interwebs snooping
'Exploitation of network infrastructure is unlawful,' says co-claimant
Siri, did we just take a hit in that voice-recog patent fight?
Yes, Apple, you did, says this Beijing court
Report: UK.gov wants to legislate on comms data BEFORE next election
Ministerial alarm sets in over EU court's data retention ruling
Russian law will force citizens' personal data to be stored locally
Won't someone think of the software-as-a-service startups?
Russian MP fears US Secret Service cuffed his son for Snowden swap
Seleznev Jnr is 'prolific trafficker in stolen credit card data', it is alleged
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Eight steps to building an HP BladeSystem
Building your ideal BladeSystem infrastructure solution begins with eight simple steps, outlined in this whitepaper.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.
Build a Business Case: Developing Custom Apps
In this whitepaper learn how to maximize the value of custom applications by accelerating and simplifying their development.