tag:blogger.com,1999:blog-5848640164815342479.post1734478977921872571..comments2024-03-18T16:01:13.871-07:00Comments on Haq's Musings: Cyber Wars Across China, India and PakistanRiaz Haqhttp://www.blogger.com/profile/00522781692886598586noreply@blogger.comBlogger40125tag:blogger.com,1999:blog-5848640164815342479.post-5478713772691832902022-12-03T20:06:37.577-08:002022-12-03T20:06:37.577-08:00Ignite Conducts Karachi Qualifier Round of Digital...Ignite Conducts Karachi Qualifier Round of Digital Pakistan Cybersecurity Hackathon 2022<br /><br />https://propakistani.pk/2022/12/02/ignite-conducts-karachi-qualifier-round-of-digital-pakistan-cybersecurity-hackathon-2022/<br /><br /><br />Ignite National Technology Fund, a public sector company with the Ministry of IT & Telecom, conducted the qualifier round of Digital Pakistan Cybersecurity Hackathon 2022 in Karachi on 1st December 2022 after conducting qualifier rounds at Quetta and Lahore.<br /><br />The Cybersecurity Hackathon aims to improve the cybersecurity readiness, protection, and incident response capabilities of the country by conducting cyber drills at a national level and identifying cybersecurity talent for public and private sector organizations.<br /><br />Dr. Zain ul Abdin, General Manager Ignite, stated that Ignite was excited about organizing Pakistan’s 2nd nationwide cybersecurity hackathon in five cities this year. The purpose of the Cyber Security Hackathon 2022 is to train and prepare cyber security experts in Pakistan, he said.<br /><br />Speaking on the occasion, Asim Shahryar Husain, CEO Ignite, said, “The goal of the cybersecurity hackathon is to create awareness about the rising importance of cybersecurity for Pakistan and also to identify and motivate cybersecurity talent which can be hired by public and private sector organizations to secure their networks from cyberattacks.”<br /><br />“There is a shortage of 3-4 million cybersecurity professionals globally. So this is a good opportunity for Pakistan to build capacity of its IT graduates in cybersecurity so that they can boost our IT exports in future,” he added.<br /><br />Chief guest, Mohsin Mushtaq, Additional Secretary (Incharge) IT & Telecommunication, said, “Digital Pakistan Cybersecurity Hackathon is a step towards harnessing the national talent to form a national cybersecurity response team.”<br /><br />“Ignite will continue to hold such competitions every year to identify new talent. I would like to congratulate CEO Ignite and his team for holding such a marathon competition across Pakistan to motivate cybersecurity students and professionals all over the country,” he added.<br /><br />Top cybersecurity experts were invited for keynote talks during the occasion including Moataz Salah, CEO Cyber Talents, Egypt, and Mehzad Sahar, Group Head InfoSec Engro Corp, who delivered the keynote address on Smart InfoSec Strategy.<br /><br />Panelists from industry, academia, and MoITT officials participated in two panel discussions on “Cyber Threats and Protection Approaches” and “Indigenous Capability & Emerging Technologies” during the event.<br /><br />The event also included a cybersecurity quiz competition in which 17 teams participated from different universities. The top three teams in the competition were awarded certificates.<br /><br />41 teams competed from Karachi in the Digital Pakistan Cybersecurity Hackathon 2022.<br /><br />The top three teams shortlisted after the eight-hour hackathon were: “Team Control” (Winner); “Revolt” (1st Runner-up); and “ASD” (2nd Runner-up).<br /><br />These top teams will now compete in the final round of the hackathon in Islamabad later this month.<br /><br />Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-29982341851769269682021-08-08T11:37:19.724-07:002021-08-08T11:37:19.724-07:00Dear Sir
Thank you for sharing this great informa...<br />Dear Sir<br /><br />Thank you for sharing this great information.Sir I think Pakistani cyber attackers have attacked the sensitive websites of India in the past so much that later Indian authorities have focused on improving their cyber security.<br /><br />Pls check this latest news, now the Indian cyber security ranked at No.10 in the "GLOBAL CYBER SECURITY" index where as Pakistan is ranked at no.79 in this same index.<br /><br />Can you pls throw some light on this? How is it that Pakistan is lagging behind India in this index?<br /><br />Ref:<br />https://www.thenews.com.pk/print/857169-global-cyber-security-index-un-study-ranks-pakistan-at-79Ahmednoreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-57669934805303627542021-02-28T07:07:56.902-08:002021-02-28T07:07:56.902-08:00Experts are unanimous in saying that the most impo...Experts are unanimous in saying that the most important target of #Indian #cyber-#espionage & #cyberattacks by far is #Pakistan. Limited employment prospects of Indian techies have created a swarm of underground threat actors in #India| The Daily Swig<br />https://portswigger.net/daily-swig/indian-cyber-espionage-activity-rising-amid-growing-rivalry-with-china-pakistan<br /><br /><br />Morgan Wright, chief security advisor at SentinelOne and former US State Department special advisor, told The Daily Swig: “India’s growing offensive capability is still immature compared to China, North Korea, Russia, Israel, the UK and US. However, there is no shortage of people with advanced technical skills in India.”<br /><br />With Covid-19 causing significant unemployment in India, it can be “safely assumed a portion of people with these skills will engage in cybercrime”, according to Wright.<br /><br />“Ironically, tactics learned in committing cybercrime will be of value to the intelligence and military establishment in India as they develop and grow units to engage in cyber warfare and espionage,” he said.<br /><br /><br />India security<br /><br />Assaf Dahan, senior director and head of threat research at Cybereason, told The Daily Swig: “The level of sophistication of the activity groups affiliated with India can vary; some groups have shown a high level of sophistication and use of advanced custom-built tools or advanced exploits, while others exhibited significantly less sophisticated capabilities.<br /><br />“Sometimes a group might exhibit different levels of sophistication on different operations, based on the group’s needs and reasoning,” he added.<br /><br />Dahan concluded: “Another point to remember: the level of sophistication isn’t always correlated with the success rate of the group’s operation or goals. Sometimes, simple social engineering attacks delivering a known commodity malware can be enough to get the threat actors what they want.”<br /><br />What examples are there of Indian APT groups?<br />Recent attacks by Indian hacker groups:<br /><br />The highly active cyber-espionage entity known as SideWinder has been plaguing governments and enterprises since 2012. A recently released report by AT&T Alien Labs shows most of SideWinder’s activity is heavily focused on South Asia and East Asia, with the group likely supporting Indian political interests.<br />The allegedly Indian state-sponsored group Dropping Elephant has been known to target the Chinese government via spear-phishing and watering hole attacks.<br />Viceroy Tiger has been known to use weaponised Microsoft Office documents in spear-phishing campaigns. Security researchers at Lookout recently went public with research on mobile malware attributed to the threat actors and rated as medium sophistication.<br /> The level of direct Indian government involvement in some of these operations is contested.<br />Cybereason’s Dahan cautioned: “The line between ‘state operated’ or ‘state ordered’ can be rather fine, so it’s not always easy to link certain operations directly to an official government or military institution, especially due to the growing popularity of cyber mercenaries (hackers-for-hire).”<br /><br />How might India expand its cyber warfare capabilities and defences?<br />Through an emerging initiative to provide technology education to 400,000 low-income students, India will significantly increase its cyber “bench strength”, according to Mike Hamilton, former CISO for the City of Seattle and co-founder and CISO of cybersecurity firm CI Security.<br /><br />Hamilton predicted that a “cybercrime population will emerge [in India] and differentiate itself from nationalist motivations”.<br /><br />Other experts reckon the flow of talent will run the other way and allow Indian to expand its cyber-espionage capabilities from the cohorts of cybercriminals.<br /><br />Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-33678336423915536652021-02-28T06:54:52.573-08:002021-02-28T06:54:52.573-08:00Experts are unanimous in saying that the most impo...Experts are unanimous in saying that the most important target of #Indian #cyber-#espionage & #cyberattacks by far is #Pakistan. Limited employment prospects of Indian techies have created a swarm of underground threat actors in #India| The Daily Swig<br />https://portswigger.net/daily-swig/indian-cyber-espionage-activity-rising-amid-growing-rivalry-with-china-pakistan<br /><br /><br />ANALYSIS India is sometimes overlooked by some in the threat intelligence community, even though the South Asian nation has advanced cyber capabilities – not least a huge pool of talent.<br /><br />The country boasts a large number of engineers, programmers, and information security specialists, but not all of this tech talent was put to good use, even before the Covid-19 pandemic cast a shadow over the global economy.<br /><br />Their somewhat limited employment prospects are said to have created a swarm of underground Indian threat actors eager to show off their hacking talents and make money – a resource that the Indian government might be able to tap into in order to bolster its own burgeoning cyber-espionage resources.<br /><br />India is in catch-up mode for now, but has the technical resources to make rapid progress.<br /><br />Who is being targeted by Indian hacking groups?<br />Geopolitical factors have fueled an increase in cyber threat activity both originating from and targeting India.<br /><br />Experts quizzed by The Daily Swig were unanimous in saying that the most important target of Indian cyber-espionage by far is Pakistan – a reflection of the decades-long struggle over the disputed region of Kashmir.<br /><br />China, India’s neighbour and an ally of Pakistan, is also a top target of state-sponsored Indian cyber-espionage.<br /><br />Paul Prudhomme, head of threat intelligence advisory at IntSights, told The Daily Swig: “Indian cyber-espionage differs from that of other top state-sponsored threats, such as those of Russia and China, in the less ambitious geographic scope of their attacks.”<br /><br /><br />Other common targets of Indian hacking activity include other nations of the South Asian subcontinent, such as Bangladesh, Sri Lanka, and Nepal. Indian espionage groups may sometimes expand their horizons further to occasional targets in Southeast Asia or the Middle East.<br /><br />Indian cyber-espionage groups typically seek information on Pakistan’s government, military, and other organizations to inform and improve its own national security posture.<br /><br />But this is far from the only game in town.<br /><br />For example, one Indian threat group called ‘Dark Basin’ has allegedly targeted advocacy groups, senior politicians, government officials, CEOs, journalists, and human rights activists across six continents over the last seven years.<br /><br />India is currently considered to have a less mature cyber warfare armoury and capability than the ‘Big Six’ – China, North Korea, Russia, Israel, the UK, and US – but this may change over time since its capability is growing.<br /><br />Chris Sedgwick, director of security operations at Talion, the managed security service spinoff of what used to be BAE System’s intelligence division, commented:<br /><br />The sophistication of the various Indian cyber threat actors do not appear to be in the same league as China or Russia, and rather than having the ability to call on a cache of 0-day exploits to utilise, they have been known to use less sophisticated – but still fairly effective – techniques such as decoy documents containing weaponised macros.<br /><br />Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-63538376709016075432017-04-09T16:57:00.572-07:002017-04-09T16:57:00.572-07:00Wikileaks reveal #American #Spy Agency #NSA #Cyber...Wikileaks reveal #American #Spy Agency #NSA #Cyber Weapons Used to Hack #Pakistan mobile system http://bit.ly/2nQ1VHn via @techjuicepk<br /><br />New information about the involvement of US in hacking Pakistan mobile system has been found in a release by Wikileaks. This leak points to NSA’s cyber weapons which include code related to hacking of Pakistan mobile system.<br /><br />NSA’s interest in Pakistan<br />NSA, National Security Agency responsible for global monitoring, collection, and processing of information and data for foreign intelligence and counterintelligence purposes in the USA, has allegedly spied on Pakistani civilian and military leadership in the past. Edward Snowden, a former NSA employee, has also suggested in the past that NSA used wiretapping and cyber weapons to spy on many international leaders.<br /><br />Scope of new information<br />On Saturday, Wikileaks revealed hundreds of cyber weapons variants which include code pointing towards NSA hacking Pakistan mobile system.<br /><br />The link shared in the tweet by Wikileaks’ official account points to a Github repository containing the decrypted files pertaining to NSA cyber weapons. A complete analysis of these files by a cyber security expert is needed to further highlight the severity of the situation. Initial impressions, however, seem to indicate that these leaks will certainly provide more substance to previous allegations against NSA.Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-54170764628642934832013-04-06T10:19:42.101-07:002013-04-06T10:19:42.101-07:00Here's a PakistanToday on Indian and Pakistani...Here's a <a href="http://www.pakistantoday.com.pk/2013/04/06/news/national/hackers-hit-back-1059-indian-websites-defaced-by-pakistani-hackers/" rel="nofollow">PakistanToday</a> on Indian and Pakistani hackers' war:<br /><br /><i>Pakistani hackers on Friday hacked over a thousand Indian websites in response to an Indian attack on the website of the Election Commission of Pakistan (ECP).<br /><br />Pakistani hackers calling themselves True Cyber Army defaced 1,059 websites of Indian election bodies which then showed the ECP’s web page.<br /><br />The hacked websites included http://www.nmcelection.org/, http://www.mcgmelection.org/. The hackers warned to launch more attacks on Indian websites if their rivals continued their campaign against Pakistani websites.<br /><br />“If Indian hackers did not stop attacking Pakistani websites, we have a right to fight for the integrity of our homeland,” True Cyber Army said in an email message to a local newspaper. Last Friday the website of ECP was shut down after an attack by an Indian hacker who identified himself as NIGh7 F0x. The hacker defaced the homepage of ECP website and later compromised its availability.<br /><br />The attack on ECP website came at a time when the P he commission shifted its website on another server to avert the crisis but still some ECP website users are complaining about difficulty in accessing some of the contents.<br /><br />However, according to a spokesman of ECP all important election related data was secure and the website had started functioning normally. The Commission had already started uploading the nomination papers of candidates contesting in May 11 polls. Pakistani election body is busy in preparing for the general elections to be held on 11th May 2013. </i><br /><br />http://www.pakistantoday.com.pk/2013/04/06/news/national/hackers-hit-back-1059-indian-websites-defaced-by-pakistani-hackers/Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-82448286159373364922012-08-02T22:29:31.078-07:002012-08-02T22:29:31.078-07:00Here's Wall Street Journal story on cyberweapo...Here's <a href="http://online.wsj.com/article/SB10001424052748703386704576186061676412704.html" rel="nofollow">Wall Street Journal</a> story on cyberweapons:<br /><br /><i>"Cyberattacks are easy, can be carried out at a low cost and have potentially high benefits," said Peter Sommer, a computer-security expert who teaches at the London School of Economics. "You don't have to keep agents in location for a long time. You can be sitting at a computer in your home country."<br /><br />Many countries—including the U.S., Russia, China, Israel, the U.K., Pakistan, India and North and South Korea—have developed sophisticated cyberweapons that can penetrate and destroy computer networks, experts say. Increasingly, governments are going public about break-ins to their networks to raise public awareness.<br /><br />"We are seeing an important shift in the way people understand computer security," said Ilias Chantzos, the director of government affairs outside the U.S., at technology-security firm Symantec Corp. "It used to be exotic. Now we are seeing it elevated to a national level."<br /><br />Recently, the North Atlantic Treaty Organization said it would develop a new policy to deal with computer threats after a string of attacks on member countries.<br /><br />In 2009, the European Commission published a paper calling for greater cooperation among member states to fend off cyberattacks.<br /><br />However, keeping up with the development of new cyberthreats is proving challenging for governments, which have to spend heavily upgrading their defense systems and focusing their efforts on their most vulnerable points, experts say. France, for instance, created ANSSI in 2009. In 2012, the agency will hire 70 new staff and have an annual budget of €90 million ($125.8 million).<br /><br />"No single infrastructure system is safe enough," said Mr. Pailloux. </i><br /><br />http://online.wsj.com/article/SB10001424052748703386704576186061676412704.htmlRiaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-56228529861131005142012-03-04T20:49:16.867-08:002012-03-04T20:49:16.867-08:00Here are some excerpts of CBS 60 Minutes segment o...Here are some excerpts of <a href="http://www.cbsnews.com/8301-18560_162-57390124/stuxnet-computer-worm-opens-new-era-of-warfare/?pageNum=4&tag=contentMain;contentBody" rel="nofollow">CBS 60 Minutes</a> segment on Stuxnet aired on Mar 4, 2012:<br /><br /><i>The first attack, using a computer virus called Stuxnet was launched several years ago against an Iranian nuclear facility, almost certainly with some U.S. involvement. But the implications and the possible consequences are only now coming to light.<br /><br />FBI Director Robert Mueller: I do believe that the cyberthreat will equal or surpass the threat from counterterrorism in the foreseeable future.<br /><br />Defense Secretary Leon Panetta: There's a strong likelihood that the next Pearl Harbor that we confront could very well be a cyberattack.<br /><br />House Intelligence Committee Chairman Mike Rogers: We will suffer a catastrophic cyberattack. The clock is ticking.<br /><br />And there is reason for concern. For more than a decade, the U.S. military establishment has treated cyberspace as a domain of conflict, where it would need the capability to fend off attack, or launch its own. That time is here. Because someone sabotaged a top secret nuclear installation in Iran with nothing more than a long string of computer code.<br /><br />Ret. Gen. Mike Hayden: We have entered into a new phase of conflict in which we use a cyberweapon to create physical destruction, and in this case, physical destruction in someone else's critical infrastructure.<br />----------<br />We know from reverse engineering the attack codes that the attackers have full, and I mean this literally, full tactical knowledge of every damn detail of this plant. So you could say in a way they know the plant better than the Iranian operator.<br /><br />We wanted to know what Retired General Michael Hayden had to say about all this since he was the CIA director at the time Stuxnet would have been developed.<br />------------<br />You can download the actual source code of Stuxnet now and you can repurpose it and repackage it and then, you know, point it back towards wherever it came from.<br /><br />Kroft: Sounds a little bit like Pandora's box.<br /><br />McGurk: Yes.<br /><br />Kroft: Whoever launched this attack--</i><br /><br />http://www.cbsnews.com/8301-18560_162-57390124/stuxnet-computer-worm-opens-new-era-of-warfare/?pageNum=4&tag=contentMain;contentBodyRiaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-40253184296511050352011-12-02T09:37:37.198-08:002011-12-02T09:37:37.198-08:00"A cyber warfare expert claims he has linked ..."A cyber warfare expert claims he has linked the Stuxnetcomputer virus that attacked Iran's nuclear program in 2010 toConficker, a mysterious "worm" that surfaced in late 2008 and infected millions of PCs."<br />http://news.yahoo.com/insight-did-conficker-worm-help-sabotage-irans-nuke-061355305.html<br />Insight: Did Conficker help sabotage Iran's nuke program?Mayrajnoreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-42410486252711925652011-10-07T19:39:28.365-07:002011-10-07T19:39:28.365-07:00A computer virus has infected the cockpits of Amer...A computer virus has infected the cockpits of America’s Predator and Reaper drones, logging pilots’ every keystroke as they remotely fly missions over Afghanistan and other warzones, according to <a href="http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/" rel="nofollow">Wired magazine</a>:<br /><br /><i>The virus, first detected nearly two weeks ago by the military’s Host-Based Security System, has not prevented pilots at Creech Air Force Base in Nevada from flying their missions overseas. Nor have there been any confirmed incidents of classified information being lost or sent to an outside source. But the virus has resisted multiple efforts to remove it from Creech’s computers, network security specialists say. And the infection underscores the ongoing security risks in what has become the U.S. military’s most important weapons system.<br /><br />“We keep wiping it off, and it keeps coming back,” says a source familiar with the network infection, one of three that told Danger Room about the virus. “We think it’s benign. But we just don’t know.”<br /><br />Military network security specialists aren’t sure whether the virus and its so-called “keylogger” payload were introduced intentionally or by accident; it may be a common piece of malware that just happened to make its way into these sensitive networks. The specialists don’t know exactly how far the virus has spread. But they’re sure that the infection has hit both classified and unclassified machines at Creech. That raises the possibility, at least, that secret data may have been captured by the keylogger, and then transmitted over the public internet to someone outside the military chain of command.<br /><br />Drones have become America’s tool of choice in both its conventional and shadow wars, allowing U.S. forces to attack targets and spy on its foes without risking American lives. Since President Obama assumed office, a fleet of approximately 30 CIA-directed drones have hit targets in Pakistan more than 230 times; all told, these drones have killed more than 2,000 suspected militants and civilians, according to the Washington Post. More than 150 additional Predator and Reaper drones, under U.S. Air Force control, watch over the fighting in Afghanistan and Iraq. American military drones struck 92 times in Libya between mid-April and late August. And late last month, an American drone killed top terrorist Anwar al-Awlaki — part of an escalating unmanned air assault in the Horn of Africa and southern Arabian peninsula.<br /><br />But despite their widespread use, the drone systems are known to have security flaws. Many Reapers and Predators don’t encrypt the video they transmit to American troops on the ground. In the summer of 2009, U.S. forces discovered “days and days and hours and hours” of the drone footage on the laptops of Iraqi insurgents. A $26 piece of software allowed the militants to capture the video.<br /><br />The lion’s share of U.S. drone missions are flown by Air Force pilots stationed at Creech, a tiny outpost in the barren Nevada desert, 20 miles north of a state prison and adjacent to a one-story casino. In a nondescript building, down a largely unmarked hallway, is a series of rooms, each with a rack of servers and a “ground control station,” or GCS. There, a drone pilot and a sensor operator sit in their flight suits in front of a series of screens. In the pilot’s hand is the joystick, guiding the drone as it soars above Afghanistan, Iraq, or some other battlefield.</i><br /><br />http://www.wired.com/dangerroom/2011/10/virus-hits-drone-fleet/Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-65142490064909428892011-02-03T19:58:48.096-08:002011-02-03T19:58:48.096-08:00Here's a Reuters' story on OECD raising al...Here's a <a href="http://in.reuters.com/article/2011/01/17/idINIndia-54193520110117" rel="nofollow">Reuters' story</a> on OECD raising alarm about cyber attacks:<br /><br /><i>Attacks on computer systems now have the potential to cause global catastrophe, but only in combination with another disaster, the Organisation for Economic Cooperation and Development (OECD) said in a report on Monday.<br /><br />The study, part of a wider OECD project examining possible "Future Global Shocks" such as a failure of the world's financial system or a large-scale pandemic, said there were very few single "cyber events" that could cause a global shock.<br /><br />Examples were a successful attack on one of the technical protocols on which the Internet depends, or a large solar flare that wiped out key communications components such as satellites.<br /><br />But it said a combination of events such as coordinated cyber attacks, or a cyber incident occurring during another form of disaster, should be a serious concern for policy makers.<br /><br />"In that eventuality, 'perfect storm' conditions could exist," said the report, written by Professor Peter Sommer of the London School of Economics and Dr Ian Brown of Britain's Oxford University.<br /><br />Governments are increasingly emphasising the importance of cyber security.<br /><br />The United States is preparing for cyber conflict and has launched its own military cyber command. Britain last October rated cyber attacks as one of the top external threats, promising to spend an extra 650 million pounds ($1 billion) on the issue.<br /><br />Meanwhile, emerging nations such as China and Russia are believed to see it as an arena in which they can challenge the United States' conventional military dominance.<br /><br />The Stuxnet computer worm -- which targets industrial systems and was widely believed to be a state attack on Iran's nuclear programme -- is seen as a sign of the increasing militarisation of cyberspace.<br /><br />The New York Times reported on Saturday that the worm was a joint U.S.-Israeli effort and had been tested at Israel's Dimona nuclear plant.<br /><br />The OECD study concluded that cyber attacks would be ubiquitous in future wars, and that cyber weaponry would be "increasingly deployed and with increasing effect by ideological activists of all persuasions and interests".<br /><br />"There are significant and growing risks of localised misery and loss as a result of compromise of computer and telecommunications services," the report said.<br /><br />But it concluded that a true "cyberwar", fought almost entirely through computer systems, was unlikely as many critical systems were well protected and the effects of attacks were difficult to predict, and so could backfire on the assailants.<br /><br />Brown said adopting a largely military approach to cyber security was a mistake, as most targets in the critical national infrastructure, such as communications, energy, finance and transport, were in the private sector.</i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-42152162341812275042011-02-01T10:40:52.921-08:002011-02-01T10:40:52.921-08:00Here's a NY Times story raising the usual alar...Here's a <a href="http://www.nytimes.com/2011/02/01/world/asia/01policy.html" rel="nofollow">NY Times story</a> raising the usual alarm about Pakistan's nuclear weapons:<br /><br /><i> -----------<br />But the most recent estimates, according to officials and outsiders familiar with the American assessments, suggest that the number of deployed weapons now ranges from the mid-90s to more than 110. When Mr. Obama came to office, his aides were told that the arsenal “was in the mid-to-high 70s,” according to one official who had been briefed at the time, though estimates ranged from 60 to 90. <br />--------<br /><br />White House officials share the assessment that the increase in actual weapons has been what one termed “slow and steady.” <br /><br />But the bigger worry is the production of nuclear materials. Based on the latest estimates of the International Panel on Fissile Materials, an outside group that estimates worldwide nuclear production, experts say Pakistan has now produced enough material for 40 to 100 additional weapons, including a new class of plutonium bombs. If those estimates are correct — and some government officials regard them as high — it would put Pakistan on a par with long-established nuclear powers. <br /><br />“If not now, Pakistan will soon have the fifth largest nuclear arsenal in the world, surpassing the United Kingdom,” said Bruce Riedel, a former C.I.A. officer and the author of “Deadly Embrace: Pakistan, America, and the Future of Global Jihad.” <br /><br />“And judging by the new nuclear reactors that are coming online and the pace of production, Pakistan is on a course to be the fourth largest nuclear weapons state in the world, ahead of France,” he said. The United States, Russia and China are the three largest nuclear weapons states. <br />--------<br />----------<br />“People are getting unduly concerned about the size of our stockpile,” said the officer, who was not authorized to speak publicly. “What we have is a credible, minimum nuclear deterrent. It’s a bare minimum.” </i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-48257476554950869362011-01-21T22:31:17.103-08:002011-01-21T22:31:17.103-08:00Here's Wikileaks cable reported by Haaretz tha...Here's Wikileaks cable reported by <a href="http://www.haaretz.com/news/diplomacy-defense/u-s-told-to-sabotage-iran-s-nuclear-program-says-wikileaks-1.337912" rel="nofollow">Haaretz</a> that hints at US-Israeli link to Stuxnet worm used against Iranian centrifuges last year:<br /><br /><i>A leading expert on Iran advised the United States to use "covert sabotage" rather than military action to destroy the Islamic Republic's nuclear facilities, according to a U.S. embassy cable released by WikiLeaks.<br /><br />Citing a January 2010 cable dispatched by U.S. Ambassador Philip Murphy, The Guardian reported Wednesday that Germany's state-funded Institute for Security and International Affairs had told U.S. officials that a policy of sabotage would be "more effective" than a military strike in stopping Iran from developing a nuclear bomb.<br /><br />Volker Perthes, director of the think tank, was referring to actions such as "unexplained explosions, accidents, computer hacking. etc" that would be more "effective than a military strike, whose effects in the region could be devastating", according to the cable.<br /><br />Earlier cables disclosed by The Guardian show that U.S. officials - including former Secretary of State Condoleezza Rice - had "distinctly deferred" to Perthes for guidance on Iran-related matters.<br /><br />In an interview with The Guardian, Perthes confirmed the details of the cable, saying that indeed "'unexplained accidents' or 'computer failures' etc are certainly better than military strikes," adding that "a military escalation with Iran – must be avoided."<br /><br />"Compared to military action, such acts have the advantage that the leadership of a country that is affected wouldn't need to respond – everybody can agree that there was a technical failure, no one needs to shoot or bomb," he told The Guardian. "And at the same time, everybody has understood the message – about what developments are unacceptable to the other side."<br /><br />The WikiLeaks cable emerged just days after The New York Times reported that Israel had tested a computer worm believed to have sabotaged Iran's nuclear centrifuges last year and slowed its ability to develop an atomic weapon.<br /><br />In what the Times described as a joint Israeli-U.S. effort to undermine Iran's nuclear ambitions, it said the tests of the destructive Stuxnet worm had occurred over the past two years at the heavily guarded Dimona complex in the Negev desert.<br /><br />The newspaper cited unidentified intelligence and military experts familiar with Dimona who said Israel had spun centrifuges virtually identical to those at Iran's Natanz facility, where Iranian scientists are struggling to enrich uranium.<br />"To check out the worm, you have to know the machines," an American expert on nuclear intelligence told the newspaper". The reason the worm has been effective is that the Israelis tried it out."<br /><br />Western leaders suspect Iran's nuclear program is a cover to build atomic weapons, but Tehran says it is aimed only at producing electricity.<br /><br />Iran's centrifuges have been plagued by breakdowns since a rapid expansion of enrichment in 2007 and 2008, and security experts have speculated its nuclear program may have been targeted in a state-backed attack using Stuxnet</i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-92149237763551125092010-11-30T10:31:28.609-08:002010-11-30T10:31:28.609-08:00Wikileaks website under attack, according to a rep...Wikileaks website under attack, according to a <a href="http://www.voanews.com/english/news/WikiLeaks-Site-Under-Attack-Again-Promises-Major-Release-on-US-Bank--111049494.html" rel="nofollow">report</a>:<br /><br /><i>The WikiLeaks website claims it is the target of another powerful cyber attack. Officials with the website made the claim Tuesday in a Twitter message.<br /><br />This is the second time in three days that the WikiLeaks site has come under attack. Hackers also attacked the site Sunday, before WikiLeaks released more than a quarter-million sensitive U.S. diplomatic cables.<br /><br />In both attacks, hackers flooded the website with requests for information in order to essentially make the site inaccessible to other users. <br /><br />Also Tuesday, Forbes magazine reported WikiLeaks plans to release documents from a major U.S. financial firm early next year. <br /><br />WikiLeaks founder Julian Assange told the magazine the tens of thousands of documents will expose what he called "the ecosystem of corruption." <br /><br />Assange is an Australian citizen and former computer hacker. <br /><br />The United States has condemned the release of the documents, which reveal details of candid U.S. diplomatic assessments of world leaders and events. They also quote top-level discussions with officials around the world. </i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-33231188692581797362010-11-07T18:20:47.800-08:002010-11-07T18:20:47.800-08:00I am sure many Indians looking for Obama to bash P...I am sure many Indians looking for Obama to bash Pakistan (as that British novice PM Cameron did) would be sorely disappointed by the following statements Obama made to Indian students at St. Xavier's College in Mumbai:<br /><br />"We want nothing more than a stable, prosperous and peaceful Pakistan". <br /><br />"It may be surprising to some of you to hear me say this, but I am absolutely convinced that the country that has the biggest stake in Pakistan's success is India."<br /><br />Here's more from the <a href="http://www.washingtonpost.com/wp-dyn/content/article/2010/11/07/AR2010110701202.html?hpid=topnews" rel="nofollow">Washington Post</a> today:<br /><br /><i>Obama commemorated the Nov. 26, 2008, massacre (in Mumbai) on his arrival Saturday when he laid a white rose at a memorial to the victims and spoke at the Taj Mahal Palace Hotel and Tower, a main target of the attack. But he infuriated many Indians by not mentioning Pakistan in his tribute, reinforcing the impression here that Obama cares less about India's grievances than he does about defending a key partner in the Afghanistan war. <br /><br />The issue will probably come up again Monday, Obama's final day in India, when he appears with Prime Minister Manmohan Singh before the U.S. and Indian media and later addresses the Indian Parliament. Obama could well face questions over his position on Kashmir, a religiously mixed region in the subcontinent's northwest that both India and Pakistan claim. <br /><br />How he portrays the U.S. interest in Pakistan, whose weak government is defending itself against its own Taliban insurgency, will probably determine whether his visit here succeeds in convincing Indians that he is serious when he says, as he did Sunday, that "the U.S.-India relationship will be indispensable in shaping the 21st century." </i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-39565792680315999322010-10-02T21:54:00.514-07:002010-10-02T21:54:00.514-07:00It appears that Stuxnet worm was designed, develop...It appears that Stuxnet worm was designed, developed and released by western and-or Israeli intelligence agencies to sabotage industrial systems at Iranian nuclear facilities. Here's a <a href="http://news.cnet.com/8301-1009_3-20017651-83.html" rel="nofollow">CNET report</a>:<br /><br /><i>Iran's official news agency said today that a sophisticated computer worm purportedly designed to disrupt power grids and other such industrial facilities had infected computers at the country's first nuclear-power plant but had not caused any serious damage.<br /><br />The Stuxnet worm, which some see as heralding a new era of cyberwarfare, appeared in July and was already known to be widespread in Iran. In fact, its high concentration there, along with a delay in the opening of the Bushehr plant, led one security researcher to hypothesize that Stuxnet was created to sabotage Iran's nuclear industry.<br /><br />In addition to emphasizing the threat posed by the worm, which could be used to remotely seize control of industrial systems, today's news could well add to speculation about Stuxnet, the sophistication of which has caused some to suspect that a nation state, such as Israel or the U.S., might be behind its creation.<br /><br />The worm exploits three holes in Windows, one of which has been patched, and targets computers running Siemens software used in industrial control systems.<br /><br />Mahmoud Jafari, the project manager at the Bushehr plant, said the worm "has not caused any damage to major systems of the plant" and that a team was working to remove it from several computers, according to Iran's IRNA news agency, which was cited in a report by the Associated Press.<br /><br />Jafari said the infection involved the personal computers of several staff members working at Bushehr and would not affect plans to open the nuclear plant in October, the AP reported.</i><br /><br /><br />Read more: http://news.cnet.com/8301-1009_3-20017651-83.html#ixzz11GhExJ8oRiaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-36103971616907198982010-06-01T14:09:42.862-07:002010-06-01T14:09:42.862-07:00Here's an interesting excerpt from a piece abo...Here's an interesting excerpt from a <a href="http://news.cnet.com/From-Pakistan-to-S.F.,-its-a-whole-new-tech-world/2100-1041_3-6171019.html" rel="nofollow">piece</a> about the use of technology in Pakistan written for CNET by a visiting Pakistani tech journalist Zamir Haider at Stanford University: <br /><br /><i>According to the Ministry of Finance's Economic Survey of Pakistan for fiscal 2005-2006, computer use in urban households is high. In comparison with the literacy rate--53 percent--at least 40 percent of Pakistanis are computer literate or have access to computers.<br /><br />Mostly, these are Pentium II or Pentium III PCs, since laptops are expensive. PCs are now widely available at good prices, thanks to Chinese computers flooding the markets. Most of these machines are not big brands, but they do say "Intel Inside." As for laptops, they come from various brands like Dell, Toshiba, Compaq, Sony and Apple. Wireless Internet connections, on the other hand, are still rare.<br /><br />Dialing up through the phone lines<br />In Pakistan, 99 percent of Internet connections are still over phone lines. Wi-Fi is generally seen only at five-star hotels and now at a few restaurants. People at home usually use Internet cards of various denominations starting from 10 rupees per hour (16 cents) to 100 rupees per 10 hours ($1.60). Connection speeds through Internet cards are generally poor.<br /><br />Getting permanent Internet connections from an Internet service provider is expensive, but most businesses do get connections from these companies.<br /><br />Mobile phones are the most common form of personal technology seen in Pakistan. Connecting to the Internet through mobile phones is getting popular now, but it probably will still take another a year or more to be as popular as it is here in California.<br /><br />People here are excited about the coming of the Apple iPhone. That's what I hear people talking about when I go to any of the mobile phone outlets in San Francisco.<br /><br />In Pakistan, people aren't that much different when it comes to mobile phones. They're fond of buying expensive cell phones not for technology purposes alone, but also largely to show off. </i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-45528032873848228182010-04-22T21:31:57.539-07:002010-04-22T21:31:57.539-07:00On page 24 of the Non Proliferation Review Fall 19...On page 24 of the Non Proliferation Review Fall 1997, author <a href="http://cns.miis.edu/npr/pdfs/bowen51.pdf" rel="nofollow">Wyn Bowen</a> writes as follows abut the Indian acquisition of Russian cryogenic engines as follows:<br /><br />"The (George H.W. Bush)administration's most notable achievement was gaining the Soviet Union's adherence to MTCR in June 1990. Five months later, however,<br />the Russian Space Agency signed an<br />agreement to supply cryogenic<br />rocket engines and the associated<br />production technology to the Indian<br />Space Research Organisation<br />(ISRO). Although Moscow publicly<br />viewed the deal as consistent with<br />its pledge to adhere to the MTCR,<br />the administration perceived it as a<br />clear violation. This difference of<br />opinion resulted in the deterioration<br />of the administration’s missile nonproliferation<br />dialogue with Moscow.<br />56<br />Although Russia pledged its adherence<br />to the MTCR following the dissolution<br />of the Soviet Union,<br />Glavkosmos and Russia’s KB Salyut<br />design bureau continued with the deal<br />to supply the Salyut-designed cryogenic<br />technology to the Indian SLV<br />program. As a result, the U.S. administration<br />imposed sanctions on<br />the Russian and Indian entities and<br />subsequently linked Russia’s entry<br />into the satellite launch market, and<br />its participation in the international<br />space station, to the termination of<br />the ISRO deal.57 However, this approach<br />did not produce any concrete<br />results during the final months of the<br />Bush presidency, primarily because<br />of the strength of Russia’s military industrial<br />complex, which did not<br />want to jeopardize its freedom to<br />export space launch technology and<br />tactical missiles.58<br /><br /><br />Finally, it has emerged that<br />Russia continued transferring rocket<br />engine technology to India in 1993<br />after its agreements with the United<br />States to refrain from doing so. This<br />reportedly resulted in the completion<br />of 60 to 80 percent of the transfers<br />to India."Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-11826075829481684622010-04-21T10:52:14.054-07:002010-04-21T10:52:14.054-07:00anon: "By your definition we won't have a...anon: "By your definition we won't have a clean sheet design in ballistic missiles after the V-2 because the laws of physics don't change.."<br /><br />The basic law of Physics is just Newton's third law that guides all rocket designs. But that's not what I am talking about.<br /><br />To give you an example, AMD did finally develop a "clean room" version of Intel X86 processors on its own which was accepted by courts. The reason the courts found it acceptable is because AMD assembled a new team that did the design and had no exposure to the original Intel X86 microcode, RTL, logic design, schematics, etc.<br /><br />In Kalam's and his successor's cases, however, they have actually had direct access to the original US and German detailed designs and blueprints as disclosed and documented by Wisconsin Project.Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-83468799028501214792010-04-21T10:38:28.356-07:002010-04-21T10:38:28.356-07:00umm all technology to more or less degree build on...umm all technology to more or less degree build on previous tech.<br /><br />In that case there are very few russian or american clean sheet designs because most advances in aerodynamics area ruling,swept wing,FSW,flying wing etc etc can be traced to Nazi Germany.<br /><br />Similarly in missiles most balistic missiles and space launch vehicles are descendants of the German V-2.<br /><br />By your definition we won't have a clean sheet design in ballistic missiles after the V-2 because the laws of physics don't change..Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-88702252127239869742010-04-21T10:03:17.210-07:002010-04-21T10:03:17.210-07:00anon: "China.India,Brazil etc progress in tec...anon: "China.India,Brazil etc progress in tech like this:<br />1.Copy western tech<br />2.Modify it extensively<br />3.Make your own clean sheet design."<br /><br />Having lived through the Intel-AMD court battle about the definition of "clean room design", I do not agree that the steps you laid out would lead to what you call "clean sheet design". Any such design in the third step would be heavily contaminated because of the knowledge and learning of the design team gained in the first two steps. <br /><br />"clean sheet design" should mean zero contamination.Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-57329662119059967262010-04-21T09:57:39.758-07:002010-04-21T09:57:39.758-07:00Here's a Newsweek piece in which Richard Clark...Here's a <a href="http://www.newsweek.com/id/236717/output/print" rel="nofollow">Newsweek</a> piece in which Richard Clark, former US cyber czar, is fretting about American being unprepared for cyber warfare:<br /><br /><i>The United States economy depends on the Internet more than any other developed country in the world. On most days that's a good thing. But according to Cyber War a new book by Richard A. Clarke, the very connectivity that gives the U.S. an edge in most markets is likely its greatest vulnerability. While this nation and others have suffered attacks against some of their largest government and private infrastructures (DOD and Google’s password system), most Americans probably don't spend much time worrying about attacks on our technology systems. NEWSWEEK's Jessica Ramirez spoke with Clarke about the possibility of such an event and why we are not prepared for it. Excerpts:<br /><br />NEWSWEEK: Do you think cyberwar is imminent?<br />Richard Clarke: The question isn't what are the chances of a cyberwar. The question is what are the chances of a war. The next time there's a war between sophisticated countries, cyber will be part of it. Unless we do something about the defensive side of that equation before it happens, we are going to hurt a lot the day after the attack.<br /><br /> So this country isn't prepared?<br />No.<br /><br />There is a broad sense that the U.S. government is late to the cyberwarfare game. Is that really true?<br />I think on the offensive side, the U.S. government invented it. They are probably the best in the world. But on the defensive side, there has always been this ideological issue about who should defend things that are not owned by the government like the power grids, railroads, airlines, and the banks. There's a subsection in the book that's called, "No, I thought you were doing it." That's kind of the problem. The government thinks the private sector is going to defend all of that, and the private sector's attitude is, "We can do that against run-of-the-mill threats, but please don't expect us to be able to handle a nation-state attack. That's why we pay taxes. So the U.S. government will do it."<br /><br />Is this what was missing from President George W. Bush's Comprehensive National Cyber Security Initiative, which is in place now?<br />Yes. It has all these great programs to defend the Pentagon and defend .gov and .mil. But there's nothing about defending our banks or power grids. There's nothing about defending the critical infrastructure that would logically be attacked.<br /><br />If the government has created a plan to protect key government sectors, then they understand a problem exists. So why not do the same for the private sector?<br />There are a couple of reasons. There hasn't been a singular big event. There are little events every day where intellectual property is being lost, but there's no one big driver. There's also the issue of the role of the federal government in regulating something like the Internet. It's not what most people want.<br /><br />I don't know if the average American understands why it's so important to protect private infrastructure like our power grids. Can you explain?<br />I think the average American would understand it if they suddenly had no electricity. The U.S. government, [National Security Administration], and military have tried to access the power grid's control systems from the public Internet. They've been able to do it every time they have tried. They have even tried to issue commands to see if they could get generators to explode. That's the famous Aurora experiment in Idaho. Well, it worked. And we know there are other real cases, like the power grid taken out in Brazil as part of a blackmail scheme. So the government knows it can be done, the government admits it can be done, the government intends to do it to other countries. Even the Chinese military has talked publicly about how they would attack the U.S. power grid in a war and cause cascading failures.<br /></i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-74416633632653978462010-04-21T08:41:32.383-07:002010-04-21T08:41:32.383-07:00ok maybe my English isn't clear enough:
All co...ok maybe my English isn't clear enough:<br />All competent 3rd world countries China.India,Brazil etc progress in tech like this:<br />1.Copy western tech<br />2.Modify it extensively<br />3.Make your own clean sheet design.<br /><br />In the case of ballistic missiles we are currently at stage 3.<br /><br />The Agni TD which confusingly was called Agni 1 by the MTCR brigade was stage 2(1989<br />).Agni TD has been retired.<br /><br />SLV a straight copy of Scout was stage 1.1980<br /><br />In heavy rocket tech we are currently in stage 2.Getting the blueprints is one thing painstakingly getting the tech base to the level where it can fabricate complex titanium alloys without much handholding is a feat.<br /><br />Stage 3 of rocket tech will be GSLV mk3(2011-2012) this has a completely new Cryo engine as well as other stages.<br /><br />In nuke reactor tech we are at stage 3 to the extent that post nuke deal AECL,Canada came looking for collaboration on newer reactor designs but we have progressed in PHWR tech enough to politely refuse them.<br /><br />PWR tech though is different plus you can resuse the PWR tech for nuke subs so we went to Russia for a package deal nuke sub help(my understanding is they have agreed to give us Akula 2 designs :) :) ) plus VVER AES 92 reactor tech in exchange for an order of 16 nuclear reactors.Putin was in town last month. <br />Based on this we'll negotiate with the French/Americans..basically 'give us something more or we'll get it from the Russians anyway...'<br />Its called diplomacy.<br /><br />Basically 10 more years and we'll be able to design build our own nuclear submarines and advanced PWR reactors.<br /><br />Point being S&T capability takes decades to build and I don't see any serious strategy being implemented in Pakistan.Is there?Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-78632356851389875542010-04-21T08:21:44.423-07:002010-04-21T08:21:44.423-07:00Anon: "the current Agni 1,2,3 deployed by the...Anon: "the current Agni 1,2,3 deployed by the Indian military are clean sheet indigenous designs which look nothing like any other country's missiles."<br /><br /><i>India's cryogenic stage in recent launch was a copy of the Russian designs India bough earlier. That's why the ISRO seemed so confident prior to the launch. But, apparently, it was a botched effort. <br /><br />According to Gary Milhollin of Wisconsin Project, the first stage of the Scout became the first stage of India's first large ballistic missile, the Agni-I. The Agni-I's second stage was liquid-fueled, and was based on a surface-to-air missile called the SA-2 that India bought from Russia.<br />France also helped India master liquid-fuel technology by selling India the technology used to build the "Viking" engine used on the Ariane space launcher. India calls its version the "Vikas." The Agni also needed a guidance system. The German Space Agency obliged with a long tutorial in rocket guidance, which allowed India to develop a guidance system and learn how to produce its components (gyroscopes, accelerometers and so forth). The German Space Agency also tested a model of the first stage of the SLV-3 in one of its wind tunnels in Cologne and helped India build its own rocket test facilities. Germany also trained Indians in how to make composite materials.</i>Riaz Haqhttps://www.blogger.com/profile/00522781692886598586noreply@blogger.comtag:blogger.com,1999:blog-5848640164815342479.post-43420528752085987002010-04-21T07:50:01.098-07:002010-04-21T07:50:01.098-07:00A few points:
1. Every single country's cryog...A few points:<br /><br />1. Every single country's cryogenic engine blew up the first time around including US,Russia,ESA,Japan,China...<br /><br />2.As discussed before everyone starts off copying others US/USSR copied Nazi Germany's V-2 tech,they both copied Nazi Germany's gas centrifuge technology,the this is in this current era.<br /><br />So therefore claims of idigenous tech aren't false as you claim them to be..<br /><br />Btw Scout was copied into the SLV in 1980 which was a space launch vehicle.The Agni TD (Tech Demonstrator) circa 1989 used the first stage of SLV along with a indeginously designed second stage.<br /><br />HOWEVER ,and please pay attention,the current Agni 1,2,3 deployed by the Indian military are clean sheet indigenous designs which look nothing like any other country's missiles.Anonymousnoreply@blogger.com