Saturday, January 08, 2011

Even though the investigations are belated...?!

On Aseemananda Case : RSS Hand

Date:
8 January 2011

The reported statements by Aseemananda, co-accused in a series of bomb blasts by Hindutva terrorist groups shows that it is not just a few extremist individuals involved but a wide network which includes the involvement of top pracharaks of the RSS. Even though the investigations are belated, it is imperative that there should now be no let up in nailing those responsible for the heinous terrorist crimes in Malegaon, Ajmer Sharif, Mecca Masjid and the Samjhauta train blasts. The Hindutva terror groups have been spawned by the hate politics of the RSS and as is now revealed by Aseemananda have received direct support. No effort should be spared to bring the guilty to book. They constitute a grave danger to the integrity and unity of our country.

http://cpim.org/content/aseemananda-case-rss-hand

Urdu-Hindi Transliteration/Translation System :: Default Page

Will RSS be banned for a fourth time? - India - DNA

Will RSS be banned for a fourth time?
DNA / Anil Anand / Saturday, January 8, 2011 1:20 IST

After Rashtriya Swayamsevak Sangh (RSS) leader Swami Aseemanand allegedly confessed before a magistrate that he and other Hindu leaders - Indresh Kumar, Pragya Singh and Sunil Joshi - were involved in the Samjhauta Express and other bombings at Muslim religious places, Congress demanded “strict action” against the outfit on Friday.

Stating that the confession exposed the “terror face” of RSS, party spokesman Shakeel Ahmed said the “government must act and take firm action against such organisations”.

He, however, skirted a direct reply when asked if RSS should be banned. The outfit has been banned thrice in the past for various reasons.

“Reports about Aseemanand’s confession have appeared in the media. This Sanghi terrorism poses a big threat to the country,” Ahmed said.

Aseemanand, who worked for Vanvasi Kalyan Ashram in Dangs, Gujarat, reportedly confessed to involvement in the Samjhauta Express blast that killed 68 people, mostly Pakistanis. The swami has been quoted as saying, “I told everyone that bomb must be responded with a bomb.”

The statement made under section 164 before a magistrate will be considered key evidence.

Interestingly, the Samjhauta blast is being probed by National Investigating Agency, while Aseemanand made the confession to CBI which is interrogating him for involvement in some other cases.

URL of the article: http://www.dnaindia.com/india/report_will-rss-be-banned-for-a-fourth-time_1491744-all


Friday, January 07, 2011

"SMS of Death" Could Crash Many Mobile Phones - Technology Review

"SMS of Death" Could Crash Many Mobile Phones - Technology Review

Tuesday, January 4, 2011
"SMS of Death" Could Crash Many Mobile Phones

Phones don't have to be smart to be vulnerable.

By Erica Naone

The phones in many people's pockets today are miniature personal computers, and they are just as vulnerable as PCs to viruses, malware, and other security problems. But research presented at a conference in Germany last week shows that phones don't even have to be smart to be vulnerable to hackers.

Using only Short Message Service (SMS) communications—messages that can be sent between mobile phones—a pair of security researchers were able to force low-end phones to shut down abruptly and knock them off a cellular network. As well as text messages, the SMS protocol can be used to transmit small programs, called "binaries," that run on a phone. Network operators use these files to, for example, change the settings on a device remotely. The researchers used the same approach to attack phones. They performed their tricks on handsets made by Nokia, LG, Samsung, Motorola, Sony Ericsson, and Micromax, a popular Indian cell-phone manufacturer.

A number of largely theoretical attacks aimed at iPhones and Android devices have made headlines over the past few years. But smart phones make up only 16 percent of the devices in use. So-called feature phones—which can do more than make calls but run only software with limited functionality, enabling their users to do such things as send text messages and play games—account for the majority of around 5 billion mobile phones in use worldwide.

Feature phones are harder to attack than smart phones because of their limitations. Their processors are less powerful, and they have less memory capacity, so they must run simpler software, which often cannot be loaded unless the carrier gives permission. Feature phones also have more varied hardware and software idiosyncrasies than smart phones do.

The security researchers who presented their work at last week's conference, Collin Mulliner, a PhD student in the Security in Telecommunications department at the Technische Universitaet Berlin, and Nico Golde, an undergraduate student at the same institution, decided to attack feature phones over the air. They set up a miniature cellular network, using open-source software to create a base station with which to communicate with the phones. In order to broadcast malicious messages to them without putting other devices at risk, they shielded their communications by enclosing their network in a Faraday cage, which blocks radio signals.

Having a private cell network also helped Mulliner and Golde study the software running on low-end phones. By monitoring the way the phones communicated with their base station, they could discern important information about how the phones worked and how SMS messages could affect them.

The researchers were able to create malicious SMS messages for each type of phone they studied. The messages affect the phones without any response from the user. Because feature phones are so common, Mulliner says, such an attack "could take out a large percentage of mobile communications."

To target a specific user, an attacker would need to know what kind of phone he or she uses, since each platform requires a different message. But Mulliner says that attackers could easily knock out large numbers of phones by sending a set of five SMS messages—targeted to the five most popular models—to every device on a specific network. Mulliner notes that there are Internet-based services that send SMS messages en masse either cheaply or free, making it possible for an antagonist with limited resources to carry out such an attack from anywhere in the world.

"The only people who can defend against this attack are the network operators," Mulliner says. To prevent problems, operators would have to update the firmware on existing phones or else filter out potentially disruptive SMS messages traveling across their networks. The latter approach would be difficult, he says, because filtering software, generally used to catch spam, is not optimized to catch binaries.

Mulliner and Golde say they contacted network operators and manufacturers months before their talk but were told it wasn't possible to get fixes ready in time.

"Smart phones are sexier targets, but the masses still by and large use feature phones," says Charlie Miller, principal analyst for software security for the research firm Independent Security Evaluators. Miller is well known for his research on security flaws in the iPhone and other mobile devices, and has worked with Mulliner in the past.

Because feature phones are so widespread, the problems found by Mulliner and Golde could affect a lot of people, Miller says. Still, attackers would find it difficult to steal personal information or take control of the phones. In contrast, SMS vulnerabilities in iPhones and Windows Mobile-based HTC devices enable an attacker to take over phones, Miller says, citing research that he and Mulliner conducted a couple of years ago.

Defending against mass attacks on feature phones may in practice prove enormously difficult. Aurélien Francillon, a researcher in the system security group at ETH Zurich in Switzerland, says, "Most of those phones don't have automated updates, and when they do, patches are not made available quickly."

High-end smart phones are more likely to be configured to automatically install updates to protect against attacks, he says. Francillon believes that the vulnerabilities that Mulliner found on feature phones "may remain open for a very long time before they are corrected on end users' phones—if ever."

http://tinyurl.com/2urk5xb