National

ETV Bharat / bharat

The Unseen Enemy in the Battlefield

Peddinti Phanikiran, in this article, elaborates about the Kudankulam Nuclear Power Board (KNPB) that has been attacked by 'hackers' and has created a nationwide sensation. As the news spread like wildfire across the news channels, on October 29, initially, KNPB Authorities denied the news and within the next 24 hours, the same organization agreed that there was, of course, an attack.

The Unseen Enemy in the Battlefield
The Unseen Enemy in the Battlefield

By

Published : Nov 29, 2019, 11:15 PM IST

‘Internet’ – a Warzone by itself!!

Pukhraj Singh, a cyber-expert of India has tweeted that the communications system of the Kudankulam Nuclear Power Board (KNPB) has been attacked by 'hackers' and that has created a nationwide sensation.

Lieutenant General Rajesh Pant, National Cyber ​​Security Coordinator, said that the cyber-attack had taken place in September. As the news spread like wildfire across the news channels, on October 29, initially, KNPB Authorities denied the news and within the next 24 hours, the same organization agreed that there was, of course, an attack.

Nuclear Power Corporation of India Limited (NPCIL) announced on October 30 that the malware “Dtrack” had been found on the administrative network of the Kudankulam Nuclear Power Plant (KKNPP) in early September 2019. Dtrack is a kind of cyber weapon which is used to hack high-end computers. However, the technology department at the centre said they were safe from any kind of cyber threat since all their systems are “air-gapped and impossible to hack.” Systems are said to be “air-gapped” in the context of cybersecurity to describe isolated control processing technologies or systems that are not connected to the internet or external networks and are therefore considered safe. On the other hand, The Indian Space Research Organization (ISRO) has also received warnings of a Dtrack attack during the launch of Chandrayaan-2.

The attack highlights the cybersecurity flaws in India's most important security systems. Usually, it is the North Korean hacking gangs that use Dtrack malware. These gangs steal information and plan more cyber-attacks. This "malware" is used by hackers to steal key information from South Korea's financial services, banking and defence sectors. SA Bhardwaj, former chairman of India's Baba Nuclear Research Centre (BARC), said he received such ‘malware’ e-mails from the hackers. He is also the technical director of the Indian Atomic Power Company and a Thorium-based 'AHWR reactor' scientist! North Korea has for some time been interested in 'thorium-based nuclear technology' shifting its focus from 'uranium-based nuclear technology'. It is now concentrating on India, which is strong in thorium-based nuclear technology. Scientists from other countries who are doing research on thorium technology are also being observed by China. Likewise, it was reported that another key scientist from India, Anil Kakodkar, also received similar e-mails.

Scary North Korea

In modern times the range of battlefields has expanded even more. The war in the land, water, air and space has now reached the level of cyber-security. Cyber-attacks are a key component of security lapse, to disrupt the systems and create disruptions. India is one of the top three countries most vulnerable to attacks, according to a survey by cybersecurity firm Symantec. The US and China, which are among the top two in the list of affected countries, are ahead of India in taking cybersecurity measures. These countries have made arrangements to weaken their opponents. The US Cyber ​​Command has discontinued Internet services to the 'Internet Research Agency' in St. Petersburg, Russia, as a precautionary measure in the 2018 governorship election for 36 states in the US. The event revealed America's undisputed dominance over the Internet. On May 2, 2019, Russia passed the Sovereign Internet Law. As a result, the country had the opportunity to operate the Internet with the help of its own 'DNS servers', separated from the existing internet system. Russia will soon test its own internet systems under the name of 'RUNET'!

India doesn’t seem to have learned from the efforts of countries like Russia to protect its security systems from the threat posed. Officials say a cyber-attack is unlikely as our key systems are in an "air gap" position. History says that this is no longer true when it comes to practice.

The US disrupted Iran's nuclear program. America targeted the four organizations that provide equipment to Iran’s ‘Nantej’ Uranium Refinery, through a digital weapon called Stuxnet. An employee of one of those companies connected his Pen Drive to a computer at the Nantes Nuclear Centre. Because of his action, around ‘984 gas central fuses' have been rendered useless. As a result, Iran is still unable to progress in the nuclear program. According to Kaspersky, a leading antivirus manufacturer, 90 per cent of corporate enterprises are vulnerable to cyber-attacks, only because of a human error; China is also stealing technology while targeting the US military subcontractors. This is because they do not have the capacity to make expensive cyber defences. China has previously carried out cyber-attacks on Indian 'National Security Council' systems. Hardware manufactured in China is also dangerous. Further, China has used the services of American based ‘Super Micro’s Networking Servers to attack America’s Elemental Organization – CIA. Because of this, the surveillance Drones quality of the pictures taken by the drones got affected. The main components of computers that use SuperMicro are made in China. Installing a bug of the size of rice grain in the main components prepared for the US Intelligence, by the SuperMicro computers, helped China do the cyber-theft, as per the info proclaimed by leading News Agency, Bloomberg. However, American sources denied that any such thing has ever happened. However, since then, the US had incorporated stringent laws on importing hardware products from China. The use of Chinese equipment in the Indian telecommunications industry has grown to an unavoidable rate. There are regulations that require companies in China to share matters of national security with their government.

Chinese companies are readying themselves to bid for 5G network contracts in India. It should not be ignored in this context that 5G plays a key role in the use of unmanned warfare equipment. There is no doubt that the dismantling of vital weapons during the war and the restraining of emergency commands from the command control will have a greater effect on the war proceeds.

Preparedness is Key

We need to educate the public on cybersecurity and train the security forces, key personnel and scientists on the same. At present, we are taking the right steps towards supporting national IT and cybersecurity policies with the help of IT Laws. It is important that national-level systems are built to the extent that any attacker would be let known that a counter-attack would be retaliated, in case of a cyber-attack on India. This requires proper policies, strategies and comprehensive systems to implement them. We need to develop domestic cyber expertise to suit international standards. Countries such as China have deployed more than ten cyber forces with thousands of personnel. The recently established Indian Defence Cyber ​​Agency needs more resources and needs to be sharpened.

Cybersecurity is only possible with reliable hardware and software. If this is to happen, India should become a powerhouse in the electronics industry. This will require some more time and investment. In the meantime, any cybersecurity vulnerabilities need to be accurately assessed in any device that India buys. No matter how many steps the government takes, people and employees have no proper understanding and responsibility. The use of piracy software is very high in India. It is advisable for the government to educate Defence Department employees not to use such software not just in the office but even for their personal use. The rest of the key departments must also carry out internal inspections, as reported by the military earlier this year, and take action against cyber breaches.

Cybersecurity needs to be ideally adapted from the Baltic country, 'Estonia', which tops in maintaining high-end cyber-security measures. In 2007 Russian cyber-attacks on 58 key websites in Estonia ended up in non-functioning of the country’s ATMs and news outlets. The government has learnt a lesson from this activity and spread high awareness amongst the citizens. Public and private sector organizations worked together on cybersecurity. The government has built strong monitoring systems. The system detects and acts on cyber-attacks well in advance. The government set up a volunteer Cyber Defence Division has been set up with cyber-experts. As a result, Estonia has now become the venue for the ‘NATO Cooperative Cyber Defence Centre of Excellence’. Estonia, a country with thirteen lakhs of population, with all its cyber-security measures, stands as a guide to modern India!!

Strategized Attacks

Security and defence personnel are identified on social media based on the data collected from common computers connected to the Internet in military systems. They are subdued by hook or crook thereby using their services to insert 'cyber weapons' into key systems of the country’s defence systems. If this activity doesn’t dole out the expected results, the computer is attacked by wireless systems tools.

In a similar way, the Indian Submarine – ‘Scorpion’ lost all its information to the enemy, because of a French sub-contractor. Likewise, an Air Force officer used a 'Pen drive' to sneak out nearly 7,000 pages of key information.

These cases prove time and again, that adding 'malware' to our security systems doesn’t seem impossible anymore unless we are prepared to fight it back!!

ABOUT THE AUTHOR

...view details