Hi Friends,

Even as I launch this today ( my 80th Birthday ), I realize that there is yet so much to say and do. There is just no time to look back, no time to wonder,"Will anyone read these pages?"

With regards,
Hemen Parekh
27 June 2013

Now as I approach my 90th birthday ( 27 June 2023 ) , I invite you to visit my Digital Avatar ( www.hemenparekh.ai ) – and continue chatting with me , even when I am no more here physically

Tuesday, 20 July 2021

Pegasus : Give it to a Surgeon

 


 

A knife can kill but in the hands of a surgeon, it can also save a life

A knife has no intentions – good or bad – only a “ capability “ .

Humans using the knife have those “ intentions “

Apparently, certain “ capability “ of Pegasus seems to have been used by humans having bad intentions

Can we find a way to use that “ capability “ to save mankind from militancy–hatred-violence–killings–murders – wars ?

YES

First, let us understand what Pegasus can do

Context :

Pegasus updated guide: How it infects phones, what it does, how to detect and get rid of it  /  India Today  /  19 July 2021


Extract :

Ø  The highly sophisticated spyware is meant to be a way to investigate terrorism and crime. At least that is what its maker, Israel-based cyber-security firm NSO Group, claims

Ø  The question, however, many readers may have is this: If you are using an iPhone or an Android, can Pegasus be used to monitor all your data?

Ø  It now adopts a different and more sophisticated approach for reaching new targets. Shockingly, the new method does not require any input from the target user. It can infect a device by what is called a "zero-click" attack.

Ø  The analysis by Amnesty International shows the links for downloading the bits of Pegasus are hidden in the contents of a message, or an image or the background data that apps often download on phones without requiring any inputs from users.

Ø  Once a smartphone is infected by it, Pegasus can effectively monitor any activity you perform on it. This includes,

     #   reading or copying your messages,

     #   extracting your media files,

     #   accessing your browser history,

     #   recording your calls and much more

 

Ø  It can even turn the device into a surveillance tool by turning on its microphone to,

     #   listen and record an on going conversation. Similarly, it can

     #   trigger the phone's camera to record a video at any point in time.

Ø  The spyware can even be used to,

     #   extract the exact location of a device, or the history of its

          whereabouts.

This means an infected smartphone will effectively give out the locations that its user has visited in the past or is currently at.

Ø  In 2017 researchers at anti-virus company Kaspersky wrote, "We're talking total surveillance. Pegasus is modular malware. After scanning the target's device, it installs the necessary modules to,

      #  read the user's messages and mail,

      #  listen to calls,

      #  capture screenshots,

      #  log pressed keys,

      #  ex-filtrate browser history, contacts, and so on and so forth.

      #  It can spy on every aspect of the target's life.

     #   even listen to encrypted audio streams

     #  read encrypted messages — thanks to its key-logging and audio

         recording capabilities, it was stealing messages before they were

         encrypted (and, for incoming messages, after decryption)."

       

Ø  The crux is that a regular smartphone user will never be able to detect these, while the spyware will continue to operate, leaking the user's data to the spyware user.


Ø  Cybersecurity experts have indicated that a device infected by Pegasus might never be able to recover from it completely…. So the best option for victims of the spyware attack is to get rid of the infected device altogether


Now, let us see HOW we can use this “ capability “  for SAVING MANKIND

Here is what I envisaged some 5 YEARS ago  :

 

Ø  Fast Forward to Future ( 3 F )                                 [  20  Oct  2016  ]

 

Extract :

 

 #  Every smart phone to be embedded with this technology ( and every human

     to carry one, all the time ), in the form a mobile app to be called ARIHANT 

    

    ( ARIHANT = Conqueror of Kaam-Sex / Krodh-Anger / Lobh-Greed / Moh-

      Desire / Mud-Ego / Matsar-Envy )

 

  

#  24*356, this technology will pick up ( record ), every single word spoken by

    the owner, throughout his life

 

  

#  All these spoken words ( conversations ), will be transmitted to a CENTRAL

    DATABASE called ,

    “ MIND READER  Of  HUMAN  INTENTIONS

 

  

#  There, the BIG DATA ANALYTICS / AI , will interpret those " Intentions " and

    alert authorities for any EVIL INTENTIONS ( those that break the 3 LAWS Of

    ROBOTICS, formulated by Isaac Asimov )

   

  

#  Authorities will be alerted to arrest the owners of EVIL INTENTIONS ( captured

    by ARIHANT )

 

  

If Google could become a " Database of written Intentions " ( through more than a billion typed Search Queries per day ), then there is no reason to disbelieve that ARIHANT could become a " Database of Spoken Intentions " of the entire mankind ( may be a billion conversations, EVERY SECOND ! )

 

  

And since Google is a member of a consortium formed a few weeks back for the advancement of AI , it will be too happy to integrate its own, very powerful " Language Translation Software " into the ARIHANT

 

 This will enable catching of  EVIL INTENTIONS  expressed in any language !



Fast forward to 2026

 

 If implemented, ARIHANT ( the Omnipotent / Omnipresent / Omniscient AI ) will eavesdrop on every spoken word of every human being , decipher the problem faced and deliver personalized / customized solutions through IoE ( Internet of Everything ) network

 

  

And what can stop ARIHANT  from picking up all exchanges of data communication, between those " powerful autonomous weapons " if they are embedded with IoE enabled sensors and each assigned its own IP V 6 address ? 

  

It is not enough to raise questions about the potential evil usage of AI

  

We must find methods to prevent such evil use of AI

  

Mankind must be saved !

 

RELATED READINGS :

 

Racing towards ARIHANT ?                                      [ 04  Aug  2017 ]

to : Alphabet / from : ARIHANT                               [ 12  Oct  2017  ]

ARIHANT  :  on the  horizon ?                                  [ 17  May  2018 ]

ARIHANT : Beyond “ Thought Experiment “               [ 21  May  2018 ]

Will ARIHANT humble the hackers ?                          [ 11  Feb  2019 ]

Faith Renewed in ARIHANT                                       [ 23 Dec 2019 ]

Balancing : National Security vs Personal Privacy        [ 19 July 2021 ]

 

===========================================


Dear Shri Ashwini Vaishnawji ( IT Minister / av.odisha@sansad.nic.in ) :


If a tiny Israeli company can come up with Pegasus, I have no doubt that if challenged, ( Software Super-power ) India’s own tech giants ( TCS – INFOSYS – WIPRO etc ), can come up with ARIHANT


Of course, if ARIHANT has to apply to citizen of the entire world ( and not just Indian citizen ), then the following issues will need a Global Debate among, not only the national governments of the World but by all stake-holders :


Ø  Who ( which WORLD-AGENCY ) will own / operate / control ARIHANT ?  UNSC ?

Ø  Where will the CENTRAL DATABASE SERVER get located ? Duplicated ?

Ø  Will controlling agency share its database with National Governments – even if restricted to data of its own citizen ? Will that be aggregated and anonymized ?

Ø  Can any country’s Govt request data about any of its specific citizen ?

Ø  How are such “ requests “ to be treated when government of country  I “ , suspects that certain citizen of country “ P “ , are scheming / plotting to harm its National Security ?

Ø  For such suspected “ Cross-border “  conspiracies, can country “ I “ ask INTERPOL to collect data ( from Central Server ) and – if satisfied – file a case in the International Court of Justice ?



Dear Minister,


Getting all countries to reach a common agreement ( like PARIS ACCORD on Climate Change / Global Warming ) to take steps to prevent MISUSE of Pegasus, may not face much opposition


Getting some Indian Tech company to develop ARIHANT can certainly not be a big deal


But getting all countries of the World to reach an agreement on the questions raised by me above, is likely to take many years unless the World faces IMMINENT collapse of CIVIL ORDER all around ( - whose beginning we are already witnessing in several middle-east countries ) – leading to affluent countries getting over-run with millions of  economically / politically persecuted MIGRANTS from countries torn asunder with CIVIL WARS ( albeit financed and supported by those affluent countries ! )


But since, this is not a minor matter of surveillance of a few hundred citizen ( in few countries ) but a question of SAVING MANKIND, I believe it is India’s MORAL OBLIGATION to initiate a dialogue ( as done in case of International Solar Alliance )


And, as the Minister in charge of IT , the knife is in your court !



With regards,

Hemen Parekh  /  hcp@RecruitGuru.com  /  21 July 2021

 

 

Monday, 19 July 2021

Balancing : National Security vs Personal Privacy

 


 

CONTEXT :

IT Minister should answer if govt acquired Pegasus spyware: Chidambaram / MoneyControl

Extract :

“ The Minister should answer a simple question: Did the government acquire the Pegasus software/spyware?" he added.

Rahul Gandhi Selected as Potential Spyware Target in Run Up to 2019 Polls and After  /  The Wire

Extract :

Ø  In a sign that intrusive surveillance technologies are perhaps being deployed to gather information about the principal opposition party, The Wire and its media partners in the Pegasus Project can confirm that at least two mobile phone accounts used by Congress leader Rahul Gandhi were among 300 verified Indian numbers listed as potential targets by an official Indian client of the Israeli surveillance technology vendor, NSO Group.

 

Extract :

 

Ø  In fact, the Pegasus list reportedly has also names of two ministers in the Union Government including Information Technology Minister Ashwini  Vaishnaw, who had earlier said today in Lok Sabha that there was no substance in Pegasus Project report


Ø  In the absence of forensics, it is not possible to conclusively establish whether Pegasus was deployed against Rahul Gandhi


 

Dear

Shri Ashwini Vaishnawji ……..( av.odisha@sansad.nic.in )

Shri Shri Kiren Rijiju ……  …..( kiren.rijiju@sansad.nic.in )

Shri Anurag Singh Thakur …( anuragthakur.mp@sansad.nic.in )

Dr. Jitendra Singh ……………..( drjitendras@gmail.com )

Ø  

Governments around the World, have been using ( mostly highly secret ) SURVEILLANCE technologies , for past many decades

 

Ø  Most governments claim that they are deploying these technologies to safeguard NATIONAL INTEREST

 

 

Ø  In all countries, even opposition parties concede use of such technologies for national interest

 

Ø  In all countries, opposition parties allege that the ruling government MISUSES these technologies

 

 

Ø  They ( opposition parties ) want some amount of TRANSPARENCY with respect to :

#  WHO is being surveyed / HOW surveyed / WHEN surveyed / HOW LONG / WHY ( reason )

Ø  If they were in power, even these Opposition Parties would find it very difficult ( if not impossible ), to balance the interest of protecting personal PRIVACY with protecting National Security

 

Dear Ministers :

I urge you to consider my following SOLUTION, which assures transparency, without compromising national security. I believe, even the Opposition Parties would subscribe to my formula  :

Ø  Who watches the Watchmen ? ………………………………( 12 Jan 2019 )

 

Extract :

Ø    SURVEILLANCE   REQUEST   SECTION

 

         Any agency wanting to conduct surveillance of online / offline activities of an Indian

         Citizen, shall submit its’ requirement in this section

 

 

        This shall contain details such as :

 

 

·         Name of the agency

 

 

·         What activity of the citizen is proposed to be surveyed and for how long

 

 

[  Multiple selection from the following  ] :


 

#   Visits and postings on Social Media web sites

 

#   Visits and searches on E Commerce web sites

 

#   Searches on Search Engines  /  All digital traffic ( including thru Alexa /

     Google  Home type devices )

     

 

#   Messages sent / received on Messaging Apps /  E Mail services

 

#   Records of Digital Payment Transactions on Banking / FinTech Network

 

#   Audio logs from Landline and Mobile Service Providers for telephonic talks

 

 

Agency will also need to specify the PURPOSE of the proposed surveillance, by selecting one or more of the following suspected reasons ( list is not comprehensive ) :

 

 

·         Tax Evasion  /  Money Laundering

 

 

·         Criminal Activity  /   Militancy

 

 

·         Fraud  /  Breach of Trust

 

 

·         Anti-National Activity  /  Sedition  /  Treason

 

 

·         Fake News / Pornographic content posting

 

 ·        Speeches / Articles likely to create enmity among people

 

 

 

 

Such a request shall need Online Authorization of, all of the following officers :

 

 

#   Chief of Agency concerned

 

#   Secretary ( Cyber Security ) – Ministry of Information Technology

 

#   Data Protection Regulator

 

 

 

As soon as such a request is “ Approved / Authorised “, an email ALERT will go out automatically ( without any human intervention ) to the citizen concerned that she is “ under surveillance “ .

 

 

 

This will ensure that there is NO SECRET surveillance !

 

 

 

Copies of this E Mail ALERT will also get sent to all other Intelligence Agencies for a coordinated effort and for avoiding duplication

 

  

 

 

  #     SURVEILLANCE  HISTORY  SECTION


 

       At any time of his choice , concerned citizen can login at this section

       and see WHICH Agency surveyed her and for how long

 

          

      But the citizen concerned will NOT be able to see following entries by the

      Agency :

 

 

   #   What was the PURPOSE / REASON for the surveillance

 

 

   #  WHAT DATA  got collected

 

 

   #  FINDINGS  and proposed  COURSE of ACTION , if any

 

 

This part will be visible to all other Intelligence Agencies , who will have facility to add their own information / data about the concerned citizen which is in their possession, in order to compile a COMPREHENSIVE  DOSSIER about that citizen .

 

 

 

However, these other Agencies will NOT be able to EDIT any ENTRIES / FINDINGS of any other agencies

 

 

 

Although these ENTRIES are NOT accessible to the concerned citizen in a normal course , the same shall be made available to her in case any government agency relies upon these during a Court Case against that citizen , arising from such surveillance

 

 

  

 

My proposal,

 

 

#  Gives a free hand to the Agencies to proceed with their investigations,

    without needing PRIOR PERMISSION,

    

 

And

 

 

#  Ensure total TRANSPARENCY of their surveillance activities to the persons

    being investigated

 

    

 

 

This will assure the ordinary citizens (– and also “ vulnerable “ citizens such as politicians belonging to opposition parties ? )– that they are not being snooped upon secretly !

 

 

With regards,

 

Hemen Parekh  /  hcp@RecruitGuru.com  /  20 July 2021

 

Dear Readers :

After adding your own VIEWS, you may want to forward this suggestion through :

Send E Mail to any Central Govt Minister