Feeds

India's spooks prepare to peer through their own PRISM

'NETRA' will monitor internet traffic and VoIP

Intelligent flash storage arrays

The Indian government is gearing up to switch on "NETRA", a large scale internet surveillance system that will allow its spy agencies to monitor suspicious online communications in order to detect certain keywords.

The Network Traffic Analysis system, to give NETRA its full name, will scan tweets, status updates, emails, IMs, blogs and forums, for words like “attack”, “bomb” and “kill”, according to a telecom department note seen by Indian newspaper Economic Times.

The paper claimed NETRA can also capture voice traffic containing suspicious keywords on services like Skype and Google Talk, although there was no detail on exactly how.

The system was apparently developed for the defence ministry by the Centre for Artificial Intelligence & Robotics (CAIR), a lab under India’s Defence Research & Development Organisation (DRDO).

Presumably in a bid to limit the kind of wide-ranging information grab that has harmed the NSA’s global reputation, the Indian government has apparently set a 300GB limit on storage for intercepted comms for three of its security agencies, rising to 400GB for the rest.

It’s unclear from the report where Netra fits with New Delhi’s much-criticised Rs.4 billion (£47.8m) Central Monitoring System (CMS), which has been hit by several operational delays.

However, it’s unlikely to help the country climb back up the charts in the online freedom stakes.

Back in October, India recorded the biggest drop in online freedom of any country according to Freedom House’s latest annual Freedom on the Net report.

Reports emerged in September that in addition to the CMS, the Centre for Development of Telematics (C-DoT) had deployed a secret intercept system located at the international gateways of several large ISPs, in a move which violated the government’s own privacy laws.

According to ET, NETRA, and presumably these other intercept systems, will eventually feed into a national internet scanning and co-ordination centre. ®

Internet Security Threat Report 2014

More from The Register

next story
The 'fun-nification' of computer education – good idea?
Compulsory code schools, luvvies love it, but what about Maths and Physics?
Facebook, Apple: LADIES! Why not FREEZE your EGGS? It's on the company!
No biological clockwatching when you work in Silicon Valley
Happiness economics is bollocks. Oh, UK.gov just adopted it? Er ...
Opportunity doesn't knock; it costs us instead
Ex-US Navy fighter pilot MIT prof: Drones beat humans - I should know
'Missy' Cummings on UAVs, smartcars and dying from boredom
Yes, yes, Steve Jobs. Look what I'VE done for you lately – Tim Cook
New iPhone biz baron points to Apple's (his) greatest successes
Lords take revenge on REVENGE PORN publishers
Jilted Johns and Jennies with busy fingers face two years inside
Sysadmin with EBOLA? Gartner's issued advice to debug your biz
Start hoarding cleaning supplies, analyst firm says, and assume your team will scatter
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Doctor Who's Flatline: Cool monsters, yes, but utterly limp subplots
We know what the Doctor does, stop going on about it already
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.