Wednesday, 18 September 2013

cyber_ethics.....





  •          Need of Security  
  •          Hacking – Introduction  
  •          Hacker Communities  
  •          Types of Hackers. 
  •          Black Hat Hacker Strategies 
  •          Conclusion

  Need of Security :

  •    Increasing awareness of technology but not Security.
  •    Continuous Development & Competition in IT.
  •    Increasing use of Complex computer infrastructure.
  •    Increasing use of Network elements & applications.
  •    Decreasing level of skill set.
  •    Any Security breach in the website of any person increases the risk of the public image.
  •   Any Security breach in the website of any company increases the risk of the company reputation.
  •   Any Security breach in the any government website may increase the risk on project management and government operations.

 What is Hacking :

  •      Hacking is an art, it’s an Art of exploring various security breaches is termed as Hacking.
  •     But people believe : It’s an anti-society activity. : All the hackers are bad people.
        The terms Hacker and Hacking are being misinterpreted and misunderstood with negative  sidelines.

Communities of Hackers :

  •  Hackers
  •  Crackers
  •  Phreaks
  •  Script Kiddies

Hackers :

Hackers are the Intelligent Computer Professionals.

Motive/Intentions

  •    To gain in-depth knowledge of a system, what’s happening at the backend, behind the screen.
  •    To find possible security vulnerabilities in a system.
  •    They create security awareness by sharing knowledge. It’s a team work.

Type of Hackers

  •  White Hat Hackers - They use their knowledge and skill set for good, constructive intents. They find out new security loopholes and their solutions.

  •  Black Hat Hacker - They use their knowledge and skill set for illegal activities, destructive intents. 

  •  Grey Hat Hackers - They use their knowledge and skill set for the legal and illegal purpose. They are white hats in public but internally they do some black hat work.

     

 Crackers:

Crackers are those who break into the applications with some malicious intentions.

Motive/Intentions

  •  To seek unauthorized access into a system and cause damage or destroy or reveal confidential information. 
  •  To compromise the system to deny services to legitimate users for troubling, harassing them or for taking revenge.
  •  Effects : It can cause financial losses & image/reputation damages, defamation in the society for individuals or organizations.

Phreaks :

Phreaks are those people who use computer devices and software to break into phone networks.

Motive/Intention


  • • To find loopholes in security in phone network and to make phone calls at free of cost!!!
     
  • • Effects : You may get a spoofed call or a big amount of bill.

 

Script Kiddies :

Script Kiddies are those people who lack technical knowledge to perform the various types of attacks but somehow they manage to get it done with the help of search engines.

Motive/Intention
 

  • • They use the available information about known vulnerabilities to break into the remote systems. • It’s an act performed for a fun or out of curiosity.

Black Hat Hacker Strategy :

Phases chart here ***
Include these lines in the chart, >>>>
So if you know how black hat hackers move, you know the answers of,
What to Protect & How to Protect

 

 


Sunday, 25 August 2013

How To Hack Facebook (Facebook Phishing) EASY !!

How To Hack Facebook (Facebook Phishing) EASY !!


Introduction

Hey guys you are about to learn how to do easy facebook phishng
now what it does is that that you will have a phishing link (after you do the hack below in the blog)
and when you send the link to your freinds and they open the link , they will find a facebook page (fake) and when they enter their email and password it will come to you directly
so have fun!!



Facebook Phishing

Hey guys today im going to show you how to hack facebook using Facebook Phishing , Phishing is very easy to do , you just have to send the phishing link to anyone and when hey press the link a fake facebook page comes he then logs in to his account and the Email Id and Password will be sent to you Now
First. Sign up in bplaced.net
the problem in bplaced is that you have to sign up at certain times because the site has too much preasure
Second. There are two types of folders you need to download
A. http://www.mediafire.com/?2t2s7fulkmb42zx 
B. http://www.mediafire.com/?5854ndystj5p2ja 

Third. when you sign up to your account in bplaced got to Ftp Management
and copy your Ftp Server link
and then download http://filezilla-project.org/download.php/ (filezilla)



Next Step The Hack

First. open filezilla , type in
Host : your ftp server from bplaced (without http://)
Username : your bplaced username
Password : your bplaced password
Port : 21
Then press quickconnect 




       







After that download your two files as shown in this video 






then after that open your  ftp server link and press on index.htm then copy the link to send it to your freinds





Now you can send the fake facebook page link to your friends
And when you test it and type anything you want in the email and password (on the fake facebook page) it will come directly in a file called log.txt in the ftp server and filezilla And That’s it don’t forget to like this blog and share it etc.



Saturday, 24 August 2013

All Types Of Hacking Techniques.. 17 ways to bring accounts to your Mercy.

All Types Of Hacking Techniques.. 17 ways to bring accounts to your Mercy.



So, Its time now that we should know what are various categories hacking fall into. I will try to focus on the ones based on password hacking. I've also written a small post on email hacking techniques already but this one will cover it elaborately. There is no distinct classification of hacking.. but i will list all i could remember..

So, as you all would have guessed this will not be a practical application.. I will give tutorials on all of them in coming posts.. but its the most important thing to have basic knowledge about all the techniques available.. So, consider going through the post once..


Common Methods for Hacking Computer Terminals(Servers):
This comprises of either taking control over terminal(or Server) or render it useless or to crash it.. following methods are used from a long time and are still used..

1. Denial of Service - 
DoS attacks give hackers a way to bring down a network without gaining internal access. DoS attacks work by flooding the access routers with bogus traffic(which can be e-mail or Transmission Control Protocol, TCP, packets).

2. Distributed DoSs -
Distributed DoSs (DDoSs) are coordinated DoS attacks from multiple sources. A DDoS is more difficult to block because it uses multiple, changing, source IP addresses.

3. Sniffing - 
Sniffing refers to the act of intercepting TCP packets. This interception can happen through simple eavesdropping or something more sinister.

4. Spoofing - 
Spoofing is the act of sending an illegitimate packet with an expected acknowledgment (ACK), which a hacker can guess, predict, or obtain by snooping

5. SQL injection -
SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It uses normal SQL commands to get into database with elivated privellages..

6. Viruses and Worms - 
Viruses and worms are self-replicating programs or code fragments that attach themselves to other programs (viruses) or machines (worms). Both viruses and worms attempt to shut down networks by flooding them with massive amounts of bogus traffic, usually through e-mail.

7. Back Doors - 
Hackers can gain access to a network by exploiting back doors administrative shortcuts, configuration errors, easily deciphered passwords, and unsecured dial-ups. With the aid of computerized searchers (bots), hackers can probably find any weakness in the network.


So, not interested in these stuffs.. huh??? wait there is more for you.. So, how about the one related to hacking the passwords of email and doing some more exciting stuffs.. The various methods employed for this are:

Trojan horses, which are attached to other programs, are the leading cause of all break-ins. When a user downloads and activates a Trojan horse, the software can take the full control over the system and you can remotely control the whole system.. great..!!! They are also reffered as RATs(Remote Administration tools). I've written about them here.

Consider the situation, everything you type in the system is mailed to the hacker..!! Wouldn't it be easy to track your password from that.. Keyloggers perform similar functionallities.. So next time you type anything.. Beware..!! Have already posted about keyloggers and ways to protect yourself from them.. 


10. BruteForcing - 
The longest and most tiring job.. don't even consider this if you don't know the SET of password for your victim..

11. Secret Question - 
According to a survey done by security companies, it is found that rather than helping the legitimate users the security questions are more useful to the hackers.. So if you know the victim well try this..

12. Social Engineering - 
Ya this was one of the oldest trick to hack.. Try to convince your user that you are a legitimate person from the system and needs your password for the continuation of the service or some maintainence.. This won't work now since most of the users are now aware about the Scam.. But this Social Engginering concept is must for you to have to convince victim for many reasons..!!!

13. Phishing 
This is another type of keylogging, here you have to bring the user to a webpage created by you resembling the legitimate one and get him to enter his password, to get the same in your mail box..!! Use social engginering.. A detailed guide for the phishing can be found here or an introductory and setup explanation here

14. Fake Messengers - 
So its a form of phishing in the application format.. getting user, to enter the login info in the software and check your maill..!!!

15. Cookie Stealer - 
Here the cookie saved by the sites are taken and decoded and if you get lucky.. You have the password..!!!

Hmmm.. not satisfied with single account at a time..?? so there are ways to hack lots of accounts together.. I know few but there exists many..!! listed are the ones i know and will teach you in coming posts...

16. DNS Poisoning or PHARMING - 
So, phisihing is a tough job.. isn't it..?? convincing someone to enter their password at your page..?? what if you don't have to convince..?? what if they are directed automatically to your site without having a clue..?? Nice huh..?? Pharming does the same for you.. More about it in my next post..

17. Whaling 
This method gets you the password of the accounts which are used by the hackers to recive the passwords.. So you just have to hack one ID, which is simplest method( Easy then hacking any other account, will tell you how in coming posts..) and you will have loads of passwords and so loads of accounts at your mercy..!!!

I would like to add one thing the methods metioned under exiting ways are easy but are for newbiees and script kiddies so if you really want to learn hacking then do some real work, then relaying on the softwares or tools.. will give info of that in my later posts.. or comment if you want any more info.. 


some basic info about hacking................

SOME BASIC INFO ABOUT HACKING.......... :


What are hackers?


  • Hackers are people who try to gain unauthorised access to your computer. This is normally done through the use of a 'backdoor' program installed on your machine. You can protect yourself from these by using a firewalland a good up-to-date anti-virus program. You would normally get such a backdoor program by opening an E-mail attachment containing the backdoor program. It is normal for such a backdoor program to send out more copies of itself to everyone in your address book, so it is possible for someone you know to unintentionally send you a malicious program. A few backdoor programs can work with any e-mail program by sitting in memory and watching for a connection to a mail server, rather than actually running from within a specific mail program. These programs automatically attach themselves to any e-mail you send, causing you to unintentionally send out malicious programs to your friends and associates.


Why do hackers hack?

  • To a hacker, breaking into someone’s computer is simply a challenge. They may not specifically intend to do damage to the computer. The thrill of simply gaining access is often enough. Hackers often try to show off their skills to the world by hacking into government computers, or as revenge against another user or agency. Hackers are indeed as the stereotype depicts them as; young males with a thirst for knowledge. Despite rumours, all hackers do not wear nerdy glasses.

What damage can a hacker do?

  • This depends upon what backdoor program(s) are hiding on your PC. Different programs can do different amounts of damage. However, most allow a hacker to smuggle another program onto your PC. This means that if a hacker can't do something using the backdoor program, he can easily put something else onto your computer that can. Hackers can see everything you are doing, and can access any file on your disk. Hackers can write new files, delete files, edit files, and do practically anything to a file that could be done to a file. A hacker could install several programs on to your system without your knowledge. Such programs could also be used to steal personal information such as passwords and credit card information. Some backdoor programs even allow a hacker to listen in on your conversations using your computer's microphone if one is attached!

Types of hackers

Hackers often can be characterized by their motives. The following are the more common types of hackers and the motives they cite:
  • Pranksters: These hackers are the mischief-makers of the bunch whose intention is merely to be a nuisance. They are the equivalent of individuals who pull fire alarms or make phony bomb threats. Copycat hackers would also fall into this category.
  • Fame seekers: This group hacks seeking attention or notoriety. Using a code name, these individuals target high-profile sites such as Yahoo!, eBay, or NASA to achieve bragging rights among their peers.
  • Educational: Students justify hacking into systems by saying that they are honing their programming skills.
  • Criminals: When bank robber Willie Sutton was asked why he robbed banks, he replied: "That’s where the money is." Stored data or "data at rest" is more profitable to steal than data moving over the Internet. Why steal one credit card number at a time when you can steal tens of thousands to millions with one break-in? This happened to CDUniverse and RealNames. Pacific Bell had to have more than 60,000 customers change their passwords after hackers stole them.

What constitutes hacking?

  • Computer fraud is the legal term for a large part ofwhat most consider hacking. Another form of hacking is the illegal seizure and unathorized use of credit card numbers. 

Cases that have helped to shape the law

  • Kevin Mitnick was arrested for stealing credit card numbers and for gaining illegal entry into numerous systems via the internet. 
    • Arrested at 1:30 a.m., February 15, 1995, in Raleigh, N.C. 
    • Eluded the F.B.I. for three years. 
    • He was charged with everything from the theft of more than 20,000 credit card numbers to the illegal entry into numerous computer networks. Oddly enough, the court could not prove that Mitnick ever actually used any of the stolen credit card numbers. 
    • He was caught by Tsutomu Shimomura, a computer security expert and senior research fellow at the San Diego Supercomputer Center. 
    • Lots of ethical questions are raised by the financial fallout of Mitnick's demise. 
      • Mitnick undoubtedly violated the law by illegally acquiring those credit card numbers. 
      • Was the method of his capture legal, though? They captured Mitnick using wiretaps, and by "hunting" him down on the internet. Tsutomu even admits to "baiting" Mitnick with tempting software in a few instances to draw h im out into the open. 
      • Could this be considered entrapment? Mistrials have been called for less. 

      •  
  • Ed Cummings was the first person in the United States to be imprisoned for possession of a red box. 
    • The charges 
      • The grand jury charged that he "knowingly and with intent to defraud did possess and have custody and control of a telecommunications instrument, that had been modified and altered to obtain unauthorized use of telecommunicatio n services through the use of public telephones" on or about March 13 and 15 of 1995. 
      • He was also charged with "being in possession of hardware and software used for altering and modifying telecommunications instruments to obtain unauthorized access to telecommunications service." 
    • Is it ethical to sell the components, if someone can be jailed for amassing them into one single object? Welcome to Radio Shack. 
    • Where in the world could he have obtained information regarding a tone dialer
    • He was sentenced to seven months in federal prison, but was released three days later so that he could attend a hearing on whether or not he violated his probation. 
    • The violation in question was his supposed removal of batteriesfrom the tone-dialer when the police arrived. 
    • The hearing was postponed many times, but finally took place on a day when the weather was so bad his lawyer could not show up. 
      • Was the judge ethically justified in discarding Cummings' right to a fair trial? 
    • The judge refused to let Cummings speak and said that he had definitely violated probation, ordering him to be held on $250,000 bail, to be sentenced within 60 days. 
    • He was sentenced 6 to 24 months in prison plus a $3,000 fine. 

    •  
  • Craig Neidorf, an employee of Bellsouth, was arrested for distributing information that was thought to have been illegally obtained from the comp any. 
    • A pre-law student at the University of Missouri and the editor of Phrack Magazine, was questioned first at home, then had his house searched, a nd then was called in for questioning by the U.S. Attorney's Office in Chicago in 1990 in which he complied willingly. 
    • On February 1, 1990 Neidorf was indicted by a grand jury on six counts including wire fraud, computer fraud, and transportation of stolen property greater than $5,000. 
    • The trial began on July 23, 1990 in Chicago's District Court for the Northern District of Illinois, in which the prosecution withheld witnesses, one Secret Service agent, a friend of Neidorf's and alleged co-conspirator, and many of Ne idorf's fellow employees at Bellsouth. 
    • He was found in possession of a file detailing an enhanced 911system belonging to Bellsouth (regarded as hacking instructions), a T rojan Horse program, and an announcement in his magazine regarding "The Phoenix Project" (an elite bulletin board), which included a statement regarding the freedom of knowledge. 
    • The articles were proven harmless. The Trojan Horse Login program belonged to him and was never used. Finally, the Phoenix Projectwas observed and regarded to be insignificant. 
    • A mistrial was declared, but Neidorf was left with a $100,000 court bill. 
    • Should the court be ethically obligated to compensate Neidorf for his trouble? 

    •  
  • Steve Jackson Games 
    • On the morning of March 1, armed Secret Service agents and Austin police occupied the offices of Steve Jackson Games and began a search for computer equipment. The house of Loyd Blankenship, the writer of GURPS Cyberpunk, was also rai ded. 
    • Four computes, two laser printers, some loose hard disks, and a great deal of assorted hardware were seized
    • The only computers taken were those with GURPS Cyberpunk files. The agents cut locks, forced footlockers, and tore up boxes in their frantic search. 
    • It was supposed that GURPS (a soon-to-become famous role-playing game) was to be "a handbook for computer crime." The seized materials were ful l of references to futuristic equipment that didn't exist. 
    • The Secret Service kept one company hard disk, all Loyd's personal equipment and files, and the printouts of GURPS Cyberpunk. 
    • SJ Games survived the loss only by laying off half its employees. 
    • SJ Games received a copy of the Secret Service warrant affidavit on October 21, 1990. The cause for the search was Games' remote association with Neidorf and a few other main-stream computer elitists. 
    • The case finally came to trial in early 1993. 
    • The Secret Service lost, and S. J. Games was awarded $50,000 in damages, plus over $250,000 in attorney's fees. 
    • Be sure to read the article closely. The law states that the Secret Service did not violate any laws by reading any of the mail on the computers, as opposed to anything sent through the United States Postal Service. 
    • Should email be given the same status as actual mail? Should the medium make a difference?

In Favor of Hacking

Keep in mind that the ethical debate for hacking stems entirely in the definition of what it is to hack. Everyone realizes it is illegal to take money from a bank via a computer without authorization, but it might not be illegal to "hack" into a system if you do so because you are aware of a security flaw and wish to bring it to the attention of the proper authorities (without malicious intent).The following are sorted by their definitions of hacker:

Advice on Protecting your PC

A skilled hacker will do whatever it takes to break into your computer. Just ask Microsoft. Even a giant software company is not completely safe. The company was hacked by a Trojan-horse program hidden inside an innocent-looking email attachment. The Trojan horse replicated itself throughout Microsoft's internal network and eventually emailed proprietary secrets back to the originator of the Trojan horse. Follow these six steps to protect your computer from being hacked:
  • Don't let other people onto your computer unless you really trust them. A great way to do this is to password-protect your computer.
  • Don't ever open attachments. Avoid Trojan horses and viruses by following this rule. For more information, go here.
  • Turn off file sharing if you don't need it. If a port scan is done on your computer, a hacker may find a back door to your machine and access your files.
  • Use an antivirus program and keep it up to date. For more information, gohere.
  • If you have a constant Internet connection, use a firewall. For more information, go here.
  • Routinely update Windows software. This is extremely important. Updates fix many bugs and known security holes within the Windows operating system.

Plastic products could easily become electronic with first moldable all-carbon circuits

Plastic products could easily become electronic with first moldable all-carbon circuits :



Plastic products could easily become electronic with first moldable all-carbon circuits
(Left) All-carbon device fabricated on a flexible polymer substrate. (Right) The ON and OFF currents of the all-carbon transistor for different bending levels. Credit: Sun, et al. ©2013 Macmillan Publishers Limited


There has been a great deal of research lately on flexible electronics, but so far these devices (which are mostly made of carbon) still use metal electrodes and oxide insulators, and these rigid materials limit device flexibility. Some polymers and ionic liquids have been introduced as flexible alternatives, but have poor performance in terms of high operating voltages and low operating speeds, respectively.

In a new study, researchers have for the first time developed integrated circuits that are composed entirely of flexible carbon-based materials, and can be molded into various shapes using the same molding techniques used for shaping plastic products. The development could allow  to be easily integrated into a variety of plastic products, including everything from medical devices to plastic products around the home.
"The plastic cases of smart phones and tablets, which are just protecting the electronic devices inside, will have electronic functions such as displays, touch sensors, and so on, making smart phones more functional and fashionable," Yutaka Ohno of Nagoya University in Japan and Aalto University in Finland told Phys.org. "By integrating other functions such as displays and sensors into plastic devices, we are thinking of developing 3D interactive information , which can be used in medical settings, for example."
Ohno, along with Dong-Ming Sun of Nagoya University and their coauthors, have published a paper on the moldable all-carbon integrated circuits in a recent issue of Nature Communications.


"The key point in our design is that the all-carbon devices are made of carbon nanotubes and polymers, and they exhibit better flexibility and stretchability compared with devices fabricated from rigid metals and oxide , making the devices much more flexible and elastic," Sun said. "The results of this study make it possible to achieve a fusion of electronic devices with plastic products, which can lead to the creation of plastic electronic devices that feature both designability and functionality."
Plastic products could easily become electronic with first moldable all-carbon circuits
(Left) A dome-shaped all-carbon device (scale bar, 10 mm). Inset: magnified photograph (scale bar, 1 mm). (Right) Illustration of the cross-section of the air-assisted thermopressure-forming apparatus used to mold the all-carbon device. …


The new circuits are composed of different types of carbon materials, with the active channels and passive elements consisting of carbon nanotubes, and the dielectric layers and substrates consisting of the plastic polymers polymethyl methacrylate (PMMA) and polyethylene naphthalate (PEN), respectively.

Unlike the polymers and  that have been previously tried as materials for flexible dielectrics, the PMMA that the researchers used here can enable transistors and integrated circuits to operate at low voltages and high speeds. The low operating voltage can be explained in part by the sparse, network-like  thin film used as the channels, which enhances coupling between the channel and gate electrode compared with using thick polymers as the channels.
Previously, the researchers successfully fabricated a thin-film transistor with a mobility greater than 600 cm2V-1s-1 by developing a technology for forming a long, yet pure, carbon nanotube film on plastic. In the new study, the researchers made further progress on the optimization of the film-forming technology, achieving a mobility of 1,027 cm2V-1s-1. This mobility is higher than that of a MOSFET, which uses monocrystalline silicon, and the researchers describe it as an astonishing value for a thin-film transistor fabricated on a plastic substrate.
Because these all-carbon devices are made of carbon nanotubes and polymers, they exhibit better flexibility and stretchability compared with devices fabricated from rigid metals and oxide insulators. Perhaps the most useful feature of the all-carbon circuits is their moldability, which the researchers demonstrated by heating and blowing a planar substrate to form a dome-shaped structure. The 3D dome is stretched during this molding process without cracking, in sharp contrast to rigid materials such as metals. The extreme stretchability of both the passive and active elements of the devices can allow them to be formed using the same molding techniques used today to shape plastic products.
In order to scale up the devices, the researchers note that it will be important to grow carbon nanotubes with a uniform length and diameter to minimize current variation. Eliminating metallic nanotubes can also offer further performance improvements. They also hope to use fabrication methods other than the lithographic methods they used here.
"It is desirable to form carbon nanotube channels and wirings at atmospheric pressure and low temperature by high-throughput printing techniques rather than current lithographic techniques," Sun said.


Nokia's map data reveals flow of highway life

Nokia's map data reveals flow of highway life



Nokia's map data reveals flow of highway life


Nokia's HERE business is casting bright light on Nokia as a company making use of technologies capable of what it calls "mapping for life," enabling better safety for drivers and better use of information for highway planners. Mapping that is most useful for urban planning takes more than capturing an index of streets and buildings, according to Nokia's experts. Location based tracking and realtime mapping are providing richer models to depend on for safe driving. The HERE team has been showing off its visual analyses of driver behavior. Nokia team members watch how people drive using GPS data from portable devices, smartphone apps, and automobile navigation systems. Nokia's Jane Macfarlane, Head of Research for HERE, recently showed Engadget how Nokia creates mapping data with use of information gathered from opt-in smartphone apps, portable navigation devices, and car navigation systems.

She first showed a video of the San Francisco area and then of Eindhoven in The Netherlands. The Bay Area traffic flow was taken over a 24-hour period. Different vehicle speeds were color-coded—the various colors were used to show fast, medium and slow speeds. The video by doing so makes it easy to visualize traffic changes and hotspots.
In another example, CAN bus data collected from taxis in Eindhoven provided a view of  around a sharp bend. (CAN bus stands for controller area network which is a vehicle bus standard), monitoring vehicle position, velocity, acceleration, heading and windshield-washer settings. This kind of view could help establish recommended speeds and brake points for the curve, based on the time of day and .



Beyond California, Nokia has in the past discussed its work at HERE, saying their aim in studying road traffic data is to help drivers everywhere make sense of the world around them. "HERE offers traffic information in 33 countries for cars, personal , smartphones, tablets and websites and we provide maps for four out of five cars with in-dash navigation."

According to HERE, the group aggregates and analyzes  from numerous sources, including a large compilation of both commercial and consumer probe data, a large fixed proprietary sensor network, event-based data collected from government sources, and historical traffic records. "We process billions of GPS probe points per month for our traffic services."
Nokia points out that the data is collected anonymously, using the wisdom of the crowd for enabling real-time updates.


Friday, 16 August 2013

India as a great power Know your own strength

India as a great power

Know your own strength

India is poised to become one of the four largest military powers in the world by the end of the decade. It needs to think about what that means


UNLIKE many other Asian countries—and in stark contrast to neighbouring Pakistan—India has never been run by its generals. The upper ranks of the powerful civil service of the colonial Raj were largely Hindu, while Muslims were disproportionately represented in the army. On gaining independence the Indian political elite, which had a strong pacifist bent, was determined to keep the generals in their place. In this it has happily succeeded.
But there have been costs. One is that India exhibits a striking lack of what might be called a strategic culture. It has fought a number of limited wars—one with China, which it lost, and several with Pakistan, which it mostly won, if not always convincingly—and it faces a range of threats, including jihadist terrorism and a persistent Maoist insurgency. Yet its political class shows little sign of knowing or caring how the country’s military clout should be deployed.
That clout is growing fast. For the past five years India has been the world’s largest importer of weapons (see chart). A deal for $12 billion or more to buy 126 Rafale fighters from France is slowly drawing towards completion. India has more active military personnel than any Asian country other than China, and its defence budget has risen to $46.8 billion. Today it is the world’s seventh-largest military spender; IHS Jane’s, a consultancy, reckons that by 2020 it will have overtaken Japan, France and Britain to come in fourth. It has a nuclear stockpile of 80 or more warheads to which it could easily add more, and ballistic missiles that can deliver some of them to any point in Pakistan. It has recently tested a missile with a range of 5,000km (3,100 miles), which would reach most of China.
Which way to face?
Apart from the always-vocal press and New Delhi’s lively think-tanks, India and its leaders show little interest in military or strategic issues. Strategic defence reviews like those that take place in America, Britain and France, informed by serving officers and civil servants but led by politicians, are unknown in India. The armed forces regard the Ministry of Defence as woefully ignorant on military matters, with few of the skills needed to provide support in areas such as logistics and procurement (they also resent its control over senior promotions). Civil servants pass through the ministry rather than making careers there. The Ministry of External Affairs, which should be crucial to informing the country’s strategic vision, is puny. Singapore, with a population of 5m, has a foreign service about the same size as India’s. China’s is eight times larger.
The main threats facing India are clear: an unstable, fading but dangerous Pakistan; a swaggering and intimidating China. One invokes feelings of superiority close to contempt, the other inferiority and envy. In terms of India’s regional status and future prospects as a “great power”, China matters most; but the vexatious relationship with Pakistan still dominates military thinking.
A recent attempt to thaw relations between the two countries is having some success. But tension along the “line of control” that separates the two sides in the absence of an agreed border in Kashmir can flare up at any time. To complicate things, China and Pakistan are close, and China is not above encouraging its grateful ally to be a thorn in India’s side. Pakistan also uses jihadist terrorists to conduct a proxy war against India “under its nuclear umbrella”, as exasperated Indians put it. The attack on India’s parliament in 2001 by Jaish-e-Mohammed, a terrorist group with close links to Pakistan’s intelligence service, brought the two countries to the brink of war. The memory of the 2008 commando raid on Mumbai by Lashkar-e-Taiba, another terrorist organisation, is still raw.
Pakistan’s nuclear capabilities are a constant concern. Its arsenal of warheads, developed with Chinese assistance, is at least as large as India’s and probably larger. It has missiles of mainly Chinese design that can reach most Indian cities and, unlike India, it does not have a “no first use” policy. Indeed, to offset the growing superiority of India’s conventional forces, it is developing nuclear weapons for the battlefield that may be placed under the control of commanders in the field.
Much bigger and richer, India has tended to win its wars with Pakistan. Its plans for doing so again, if it feels provoked, are worrying. For much of the past decade the army has been working on a doctrine known as “Cold Start” that would see rapid armoured thrusts into Pakistan with close air support. The idea is to inflict damage on Pakistan’s forces at a mere 72 hours’ notice, seizing territory quickly enough not to incur a nuclear response. At a tactical level, this assumes a capacity for high-tech combined-arms warfare that India may not possess. At the strategic level it supposes that Pakistan will hesitate before unleashing nukes, and it sits ill with the Indian tradition of strategic restraint. Civilian officials and politicians unconvincingly deny that Cold Start even exists.
Bharat Karnad of the Centre for Policy Research, a think-tank, believes Pakistan’s main danger to India is as a failed state, not a military adversary. He sees Cold Start as a “blind alley” which wastes military and financial resources that should be used to deter the “proto-hegemon”, China. Others agree. In 2009 A.K. Antony, the defence minister, told the armed forces that they should consider China rather than Pakistan the main threat to India’s security and deploy themselves accordingly. But not much happened. Mr Karnad sees feeble civilian strategic direction combining with the army’s innate conservatism to stop India doing what it needs to.
The “line of actual control” between China and India in Arunachal Pradesh, which the Chinese refer to as South Tibet, is not as tense as the one in Kashmir. Talks between the two countries aimed at resolving the border issue have been going on for ten years and 15 rounds. In official statements both sides stress that the dispute does not preclude partnership in pursuit of other goals.
But it is hard to ignore the pace of military investment on the Chinese side of the line. Brigadier Gurmeet Kanwal of the Centre for Land Warfare Studies points to the construction of new railways, 58,000km of all-weather roads, five air bases, supply hubs and communication posts. China would be able to strike with power and speed if it decided to seize the Indian-controlled territory which it claims as its own, says Mr Karnad. He thinks the Indian army, habituated to “passive-reactive” planning when it comes to the Chinese, has deprived itself of the means to mount a counter-offensive.
Unable to match Chinese might on land, an alternative could be to respond at sea. Such a riposte was floated in a semi-official strategy document called “Nonalignment 2.0”, promoted last year by some former national security advisers and blessed by the current one, Shivshankar Menon. India’s naval advantage might allow it, for example, to impede oil traffic heading for China through the Malacca Strait.
China and India are both rapidly developing their navies from coastal defence forces into instruments that can project power further afield; within this decade, they expect to have three operational carrier groups each. Some Indian strategists believe that, as China extends its reach into the Indian Ocean to safeguard its access to natural resources, the countries’ navies are as likely to clash as their armies.
Two if by sea
An ocean needs a navy
China’s navy is expanding at a clip that India cannot match—by 2020 it is expected to have 73 major warships and 78 submarines, 12 of them nuclear—but India’s sailors are highly competent. They have been operating an aircraft-carrier since the 1960s, whereas China is only now getting into the game. India fears China’s development of facilities at ports in Pakistan, Sri Lanka, Bangladesh and Myanmar—a so-called “string of pearls” around the ocean that bears India’s name; Mr Antony called the announcement in February that a Chinese company would run the Pakistani port of Gwadar a “matter of concern”. China sees a threat in India’s developing naval relationships with Vietnam, South Korea, Japan and, most of all, America. India now conducts more naval exercises with America than with any other country.
India’s navy has experience, geography and some powerful friends on its side. However, it is still the poor relation to India’s other armed services, with only 19% of the defence budget compared with 25% for the air force and 50% for the army.
The air force also receives the lion’s share of the capital-equipment budget—double the amount given to the navy. It is buying the Rafales from France and upgrading its older, mainly Russian, fighters with new weapons and radars. A joint venture between Hindustan Aeronautics Limited (HAL) and Russia’s Sukhoi is developing a “fifth generation” strike fighter to rival America’s F-35. As well as indulging its pilots’ need for speed, though, the air force is placing a new emphasis on “enablers”. It is negotiating the purchase of six Airbus A330 military tankers and five new airborne early-warning and control aircraft. It has also addressed weaknesses in heavy lift by buying ten giant Boeing C-17 transports, with the prospect of more to come. Less clear is the priority the air force gives to the army’s requirements for close air support over its more traditional role of air defence, particularly after losing a squabble over who operates combat helicopters.
With the army training for a blitzkrieg against Pakistan and the navy preparing to confront Chinese blue-water adventurism, it is easy to get the impression that each service is planning for its own war without much thought to the requirements of the other two. Lip-service is paid to co-operation in planning, doctrine and operations, but this “jointness” is mostly aspirational. India lacks a chief of the defence staff of the kind most countries have. The government, ever-suspicious of the armed forces, appears not to want a single point of military advice. Nor do the service chiefs, jealous of their own autonomy.
The absence of a strategic culture and the distrust between civilian-run ministries and the armed forces has undermined military effectiveness in another way—by contributing to a procurement system even more dysfunctional than those of other countries. The defence industrial sector, dominated by the sprawling Defence Research and Development Organisation (DRDO), remains stuck in state control and the country’s protectionist past. According to a recent defence-ministry audit, only 29% of the products developed by the DRDO in the past 17 years have entered service with the armed forces. The organisation is a byword for late-arriving and expensive flops.
The cost of developing a heavy tank, the Arjun, exceeded the original estimates by 20 times. But according to Ajai Shukla, a former officer who now writes on defence for the Business Standard, the army wants to stick with its elderly Russian T-72s and newer T-90s, fearing that the Arjun, as well as being overweight, may be unreliable. A programme to build a light combat aircraft to replace the Mirages and MiG-21s of an earlier generation started more than quarter of a century ago. But the Tejas aircraft that resulted has still not entered service.
There are signs of slow change. These include interest in allowing partnerships between India’s small but growing private-sector defence firms and foreign companies, which should stimulate technology transfer. But the deal to buy the Rafale has hit difficulties because, though Dassault would prefer to team up with private-sector firms such as Tata and Reliance, the government wants it to work with stodgy HAL. Even if Dassault had a free choice of partners, though, it is not clear that Indian industry could handle the amount of work the contract seeks to set aside for it.
Richard Bitzinger, a former RAND Corporation analyst now at the S. Rajaratnam School of International Studies in Singapore, sums up the problem in a recent study for the Zurich-based International Relations and Security Network. If India does not stop coddling its existing state-run military-industrial complex, he says, it will never be capable of supplying its armed forces with the modern equipment they require. Without a concerted reform effort, a good part of the $200 billion India is due to spend on weaponry over the next 15 years looks likely to be wasted.
 Our interactive map demonstrates how the territorial claims of India, Pakistan and China would change the shape of South Asia
The tiger and the eagle
The money it will spend abroad also carries risks. Big foreign deals lend themselves to corruption. Investigations into accusations of bribery can delay delivery of urgently needed kit for years. The latest “scandal” of this sort surrounds a $750m order for helicopters from Italy’s Finmeccanica. The firm denies any wrongdoing, but the deal has been put on hold.
Britain, France, Israel and, above all, Russia (which still accounts for more than half of India’s military imports), look poised to be beneficiaries of the coming binge. America will get big contracts, too. But despite a ground-breaking civil nuclear deal in 2005 and the subsequent warming of relations, America is still regarded as a less politically reliable partner in Delhi. The distrust stems partly from previous arms embargoes, partly from America’s former closeness to Pakistan, partly from India’s concerns about being the junior partner in a relationship with the world’s pre-eminent superpower.
The dilemma over how close to get to America is particularly acute when it comes to China. America and India appear to share similar objectives. Neither wants the Indian Ocean to become a Chinese “lake”. But India does not want to provoke China into thinking that it is ganging up with America. And it worries that the complex relationship between America and China, while often scratchy, is of such vital importance that, in a crisis, America would dump India rather than face down China. An Indian navy ordered to close down China’s oil supplies would not be able to do so if its American friends were set against it.
India’s search for the status appropriate to its ever-increasing economic muscle remains faltering and uncertain. Its problems with Pakistan are not of the sort that can be solved militarily. Mr Karnad argues that India, from a position of strength, should build better relations with Pakistan through some unilateral gestures, for example cutting back the size of the armoured forces massed in the deserts of Rajasthan and withdrawing its short-range missiles. General Ashfaq Parvez Kayani, head of Pakistan’s army, has declared internal terrorism to be a greater danger to his country than India. That may also offer an opportunity.
China’s confidence in its new military power is unnerving to India. But if a condescending China in its pomp is galling, one in economic trouble or political turmoil and pandering to xenophobic popular opinion would be worse. Japan and South Korea have the reassurance of formal alliances with America. India does not. It is building new relationships with its neighbours to the east through military co-operation and trade deals. But it is reluctant to form or join more robust institutional security frameworks.
Instead of clear strategic thinking, India shuffles along, impeded by its caution and bureaucratic inertia. The symbol of these failings is India’s reluctance to reform a defence-industrial base that wastes huge amounts of money, supplies the armed forces with substandard kit and leaves the country dependent on foreigners for military modernisation.
Since independence India has got away with having a weak strategic culture. Its undersized military ambitions have kept it out of most scrapes and allowed it to concentrate on other things instead. But as China bulks up, India’s strategic shortcomings are becoming a liability. And they are an obstacle to India’s dreams of becoming a true 21st-century power.


Related Posts Plugin for WordPress, Blogger...