Connect with us
china india pakistan china india pakistan

Intelligence

Is China’s String of Pearls a fact or fiction? What about India’s necklace of diamonds?

Published

on

A host of Indian generals, politicians and China-centered media gurus claimed that China was out to alter status quo ante. Planet-Lab-imagery `corroborated’ exhibited pre-incursion and post-incursion positions. India’s Maj Gen (Dr) G G Dwivedi, who commanded a Jat battalion in this sector in 1992, said, “It is part of China’s ‘nibble and negotiates policy’. Their grand aim is to ensure that India does not build infrastructure along the LAC, change the status of Ladakh, cozy up to the US and join the anti-China chorus caused by Covid-19. It is their way of attaining a political goal with military might while gaining more territory in the process.’’ He added. “We used to patrol up till Hot Springs and so did they. The Ladakh Scouts controlled the Galwan valley and did not encounter any problems either’. His troops learned of Chinese patrols from graffiti on the rocks that read ‘Chung ko (This is China)’. Indian troops retaliated by scribbling ‘This is India’ on the rocks.

He interpreted China’s current belligerence as a reaction to ` India’s recent actions of reorganising [disputed] Jammu and Kashmir and Ladakh and improving infrastructure in the region, Dwivedi clarified, “It [China] has high stakes in PoK [Azad Kashmir] as the $60-billion China Pakistan Economic Corridor (CPEC) traverses through it, and it is also the site of the proposed $9 billion Diamer Bhasha Dam, a joint project of China and Pakistan.’’ China’s aim is to ` dominate Durbuk-DBO road, strengthen its position in the Fingers area, halt the construction of link roads in Galwan-Pangong Tso [salt lake] and negotiate de-escalation on its terms (Maj Gen (Dr) G G Dwivedi: ‘Right now, Chinese have an edge, we must neutralise it’. (Indian Express, June 18, 2020).

China’s view:  Chinese media insisted that it is India, not China, who overstepped Line of Actual Control. The Chinese Foreign Ministry spokesman, Zhao Lijian, however, reiterated China’s allegation, squarely blaming the Indian troops for the incident. “The right and wrong of this case are very clear and responsibility doesn’t lie with the Chinese side” (Indian Express June 19, 2020).

False allegations corroborated by satellite imagery: India alleged, “An analysis of high-resolution satellite images of the Pangong Tso area in Ladakh shows that not only have the Chinese changed the status quo at the Fingers, the mountain spurs along the lake, but also built `substantial’ structures in the contested region of the Line of Actual Control’. The hills protrude into the lake like fingers and are numbered 1 to 8 from west to east. According to India, the LAC lies at Finger 8, but China points to Finger 4. The May 27 images by Planet Labs show dozens of new structures, most likely tents, that have come up between Finger 8 and Finger 4 on the north bank of Pangong Tso, one of the main points of contention in the current standoff (Satellite imagery shows how Chinese changed status quo on Pangong bankIndian Express, June 6, 2020).

Allegations rebutted by Indian army, ex foreign minister and prime minister himself: However, the Chinese view was confirmed by prime minister Narender Modi. While addressing the all-party conference, Modi said, “Neither have they [Chinese] intruded into our border nor has any post been taken over by them [China]. He added, “Neither have they intruded into our border nor has any post been taken over by them (China)”. He added, “no one can take even an ‘inch of the land’ (China did not enter our territory, no posts taken’: PM at all-party meet on Ladakh clash, Hindustan Times, Jun 19, 2020).

The media had alleged that former foreign secretary Shyam Saran in his 2013 report had stated that China had taken over 640 kilometers of Ladakh territory. But, this allegation was rebutted not only by Saran himself but also by former defence minister AK Antony. (Antony to clarify whether China occupied 640 sq km in Ladakh in April, NDTV, September 06, 2013; also, see NSAB chief denies reporting Chinese intrusions to PMO, Business StandardChina did not enter our territory, no posts taken’: PM at all-party meet on Ladakh clashHindustan Times, Jun 19, 2020). Even `The Indian army denied that Ladakh had shrunk. Change in the river course was cited as a reason for the loss of 500-1,500 meters of land annually (Standoff between India, China troops end in Ladakh after talks: Report, Indian Express, May 26, 2020).

Real casus belli: India is unhappy at China’s unflinching support to Pakistan and Belt-Road Initiative assistance and construction of Diamer Bhasha Dam. At US behest, India is flexing muscle over China. Since 1962, India has been building bridges and constructed roads in the disputed border areas. India wanted faster access to feeder roads to LAC. `Under the phase 2 of the India-China Border Roads (ICBR) project, 32 roads will be built along the India-China border. As per sources, now the government has asked concerned officials to accelerate the construction of these roads’ (India to accelerate the construction of roads along Chinese border: Sources. India Today June 17, 2020).

Coupled with improved road links, India constructed many air bases and airfields in forward locations. Following Galwan melee, India alerted its forward airfields and moved its fighters/bombers there. Even Indian air force chief undertook whirlwind tours of forward fields, including Leh (IAF chief visits Leh, IAF on high operational alert, India today June 19, 2020). Russia is upgrading the existing fleet of the Su-30 MKI to match Chinese aircrafts Su-35 and J-31 fighter jets.

The existing fleet of Su-30 will be upgraded to the level of `Super Sukhoi’ with long-range stand-off missiles with a range of 300 km; adding more powerful EW and jamming systems, high-performance engines, multiple ejector Rack, and AESA radar. Five fly-away Rafale aircraft, with India-specific enhancements, have landed at Ambala, and 31 more are on their way. The Rafale jets will be based at Ambala Air Base in Punjab and Hasimara Air Base in West Bengal.

India is developing Andaman and Nicobar as a strategic outpost to monitor rival Chinese naval activity in the Eastern Indian Ocean. It has set up an integrated surveillance network there. The Indian Navy has been developing the Strengthening anti-access capabilities in the Andamans.

The myth of China’s ‘string of pearls’:  String of pearls, in geostrategic nomenclature, refers to the Strait of Malacca, Sri Lanka, Pakistan, the Maldives, the Strait of Hormuz and Somalia and includes Bangladesh and Myanmar in Chinese strategy. The emergence of the String of Pearls is believed to be China’s growing geopolitical influence through concerted efforts to increase access to ports and airfields, expand and modernise military forces.

But, the USA has over 800 naval bases while China has only two that is Mombasa and Djibouti, aside from controversial Hambantota (Sri Lanka). Yet, the US propaganda is that China is setting up bases along the sea lanes from Middle East to South China Sea. The bases have dual objectives to protect energy and strategic interests.

USA’s ring: Doubtless the USA is the dominant super-power in the Indo-Pacific region. Majority of the littoral states,  including India. Australia, Taiwan, Vietnam, the Philippines, South Korea are under American influence.

The USA has powerful naval bases at Diego Garcia, Busen, Guyan Island, Yongson base (South Korea) and Okinawa (Japan).The USA has stationed its littoral combat ships at Singapore besides accessing facilities of Vietnamese port Cam Rank Bay.

The US has terminated special treatment agreements with Hong Kong in response to China’s `actions to deny freedom to the people of Hong Kong’. Houston consulate was closed ` because it was a den of spies’.  

China’s disputes:  The USA is flaring up China’s dormant maritime disputes over some islands in the region (Japan, Vietnam, Brunei, Taiwan, Indonesia, Malaysia and the Philippines). In East China Sea, there is dispute between China and Japan over islands of Diaoyu and Senkakus islands.

The USA assures China’s rivals that USA would be their `security provider’ in moment of need. The major stakeholders in the region are the USA, China, Australia, ASEAN countries, Japan and South Korea.

To block China’s ascendancy, all littoral states including Japan, Australia, Taiwan, South Korea and other middle ranking regional powers are modernizing their navies.

India’s necklace of diamonds:  As a US proxy, India is building a ‘Necklace of Diamonds’. This is a China r encirclement strategy. India is expanding its naval bases and is also improving relations with strategically placed countries to suffocate China.

India’s Strategic Bases include: (a) Changi Naval Base, Singapore: In 2018, Prime Minister Modi signed an agreement with Singapore. The agreement has provided direct access to this base to the Indian Navy. While sailing through the South China Sea, the Indian Navy can refuel and rearm its ship through this base. (b) Sabang Port, Indonesia: In 2018, India got military access to Sabang Port which is located right at the entrance of Malacca Strait. This strait is one of the world’s famous choke points. A large chunk of trade and crude oil passes on to China through this region. (c) Duqm Port, Oman: In 2018, India got another military access after Sabang Port in Indonesia. The Duqm Port is located on the south-eastern seaboard of Oman. The port facilitates India’s crude imports from the Persian Gulf. Indian facility is located right between the two important Chinese pearls, Djibouti in Africa and Gwadar in Pakistan. (d) Assumption Island, Seychelles: In 2015, India and Seychelles agreed upon the development of the naval base in this region. This gives the military access to India. This base is of strategic importance to India as China desperately wants to increase its presence in the African continent through the maritime silk route. (e) Chabahar Port, Iran: In 2016, Prime Minister Modi signed an agreement to build this port. India reneged on a promise to complete it under US pressure. Iran had to replace her with China.  (f)  New naval bases are being developed in the Mongolia Asia-Africa Growth Corridor (AAGC) with Japan.

India is maintaining good relations with Vietnam and has so far sold Brahmos Missile and four patrol boats to the country. Bangladesh and Nepal are slipping out of India’s influence, but Bhutan is in India’s grip. India scuttled China’s  claim over the Sakteng Wildlife Sanctuary in Bhutan.

Inference: India’s provocations may inadvertently lead to a war against China. India’s frenzied war preparations are a source of serious concern to China. The USA is unlikely to contribute foot-soldiers to such an eventuality. Some of China’s diamonds are weary of India’s pugnacity. For instance, Bangladesh is getting closer to China.  Bangladesh is unhappy at India’s non-compliance of Teesta River Accord, and anti-Muslim (Bangladeshi) Citizenship Amendment Act.

Mr. Amjed Jaaved has been contributing free-lance for over five decades. His contributions stand published in the leading dailies at home and abroad (Nepal. Bangladesh, et. al.). He is author of seven e-books including Terrorism, Jihad, Nukes and other Issues in Focus (ISBN: 9781301505944). He holds degrees in economics, business administration, and law.

Continue Reading
Comments

Intelligence

Somalia: Security Council adopts resolution to keep pirates at bay

Published

on

Suspected pirates wait for members of the counter-piracy operation to board their boat. US Navy/Jason R Zalasky

The UN Security Council on Friday adopted a resolution to combat the continuing threat of piracy off the coast of Somalia, as shipping and protection measures to keep vessels safe, have returned to levels not seen since before the COVID-19 pandemic.

The Secretary-General’s latest report on the situation in the country illustrates that joint counter-piracy efforts have resulted in a steady decline in attacks and hijackings since 2011.

However, although piracy off the coast of Somalia has been “repressed”, the ongoing threat of resurgence remains.

As such – under Chapter VII of the Charter, which provides for enforcement action – the Security Council adopted Resolution 2608, which, among other things, condemns piracy and armed robbery at sea off the Somali coast, underscoring that it exacerbates instability by introducing “illicit cash that fuels crime, corruption and terrorism”.

Making amends

Through its resolution, ambassadors said that investigations and prosecutions must continue for all who “plan, organize, illicitly finance or profit from pirate attacks off the coast of Somalia”.

The Somali authorities were called upon to put in place mechanisms to safely return effects seized by pirates and to patrol the coastal waters to prevent and suppress future acts of armed robbery at sea.

At the same time, they were requested to bring to justice those using Somali territory to “plan, facilitate, or undertake criminal acts of piracy and armed robbery at sea”.

Member States were asked – at the request of the Somali authorities and with notification to the Secretary-General – to strengthen maritime capacity in the country and to appropriately cooperate on prosecuting suspected pirates for taking hostages.

The resolution also encourages the Somali Government to accede to the UN Convention against Transnational Organized Crime, and develop a corresponding legal architecture as part of its efforts to target money laundering and financial support structures on which piracy networks survive.

Authorization to fight piracy

The Security Council renewed its call to States and regional organizations to deploy naval vessels, arms, and military aircraft to combat piracy, and stressed that the importance of international coordination.

At the same time, the resolution authorized – for a further three-month period – States and regional organizations cooperating with Somali authorities, to fight against piracy and armed robbery at sea off Somalia, “for which advance notification has been provided by Somali authorities to the Secretary-General”.

Calls to action

Through its resolution, the Council called upon all States to “take appropriate actions…to prevent the illicit financing of acts of piracy and the laundering of its proceeds…[and] to criminalize piracy under their domestic law”.

Countries were also petitioned to cooperate in the investigation and prosecution of anyone responsible for or associated with acts of piracy and armed robbery off the coast of Somalia, including international criminal networks.

Resolution 2608 welcomed the continued work of the UN Office on Drugs and Crime’s (UNODC) Global Maritime Crime Programme to ensure that those suspected of piracy are prosecuted, and those convicted, imprisoned in accordance with international legal standards.

Finally, the resolution recognized the International Maritime Organization’s (IMO) role concerning privately contracted security personnel on board ships in high-risk areas and welcomed its continued anti-piracy role – particularly in coordination with UNODC, the World Food Programme (WFP), the shipping industry and all other parties concerned.

Continue Reading

Intelligence

ISIS-K, Talc, Lithium and the narrative of ongoing jihadi terrorism in Afghanistan

Published

on

Terrorism

Chinese and Russian efforts are underway to strengthen the Taliban government economically and militarily, along with legitimacy and international recognition. In return, Pakistan is trying to disrupt the Taliban government’s relations with Iran and Tajikistan, as well as with China and Russia. Subsequent to the fall of the previous republican government, following Russia and China, Iran is a major supporter of the Taliban.

Iran plays a significant role in a new intelligence surge launched by major regional players in Afghanistan, which includes ISIS-K campaign against the Taliban government in country. Although Taliban have been able to crush, ISIS-K in several provinces of Afghanistan, but the group was able to mobilize a bunch of other terrorist organizations such as Turkistan Islamic Party, Khetabat Iman Ul Bekhari, Khetabat ultauhied Waljihad, Islamic Jihad Union, Jamaat Ansarullah and East Turkistan Islamic Movement, and The Army of Justice. According to sources on the ground, the group has also established contacts with the resistance front led by Ahmad Massoud to fight Taliban.

Seemingly, the group joined forces with the Resistance Front in northern part of the country to downfall the Taliban particularly in northern Afghanistan.  In addition to defeating the Taliban in the central and southern provinces of Afghanistan, the group has started a sectarian war between the Sunnis and Shiites, which has partly soured relations between the Afghan Taliban and Iran. The group had the support of Pakistan as well as other regional countries and beyond.  Furthermore, Lashkar-e-Taiba fighters entered Afghanistan with the help of the Pakistani army, joining the fight between Sunni and Shia in Afghanistan.  Efforts are underway to start a civil war in the country.  According to the information, ISIS militants have been mostly funded and financed by the Saudi government, as well as other Salafi Gulf States to minimize and even eradicate Shiites in the region.

In accordance with some sources, additional costs are being borne by the United States and Great Britain.  Beside all such financial support, Islamic State (ISIS-K) militants also obtain some funding and thrive through mining and establishing business firms throughout the region.

Let us say, Islamic State militants relatively control the oil reserves in Iraq and they illegally extract it, meantime they have hands on talc and other precious stones in Afghanistan to cover their propaganda campaign expenses. ISIS-K uses the same tactics applied by Taliban during the US occupation; Taliban began illegal mining in Afghanistan to finance their activities in order to wage the war against the US aggression.   During the Taliban’s resistance, Taliban fighters had also a strong financial support from Pakistan, and the Pakistani government accordingly received that financial sustenance from other countries namely western and the Arab world.  However, the Taliban forcibly mined Afghanistan’s lapis lazuli and smuggled it to Pakistan. Under the auspices of the Pakistani government, the gems were shipped to the United States and the European countries.  In return, the Taliban were paid in cash.  Likewise, the Taliban, ISIS chose the same path, and made the most of money via mining in Afghanistan.

Subsequently, the ISIS group has chosen Nangarhar province as its stronghold in Afghanistan, since it has mineral deposits of talc, chromite, marble and other precious and rare earth minerals in addition, the group is also trying to control smuggling routes, to launch cross border terrorism.

 Consequently, ISIS-K endeavors to bring Ghazni province under its control, since a huge Lithium, mine exists in the province. The group is well aware of its preciousness in the world market because the element is mainly used by automotive industries to produce batteries for electric cars.

The anti-corruption network of the former Afghan government reported that the Taliban and the Islamic State together received about 46 million in 2016 thru illegal mining from a single district of Nangarhar province. That is why ISIS has spent millions of dollars in Afghanistan because of holding its campaign and propaganda, allegedly, most of which came from mining.

Furthermore, district governors have been appointed by ISIS for Afghanistan’s 387 major districts, with a monthly salary of up to 80,000 Afghanis.  This is a huge financial burden for the Islamic State, but the Islamic State group’s representatives say that they stick to their words, so that everyone will be paid on time. The ISIS group needs a large amount of financial support to achieve its major goals, but the group is not overstrained financially, because it receives a chockfull financial support.

Conversely, Iran is trying to increase the number of Shiite orientated proxies in the world and especially in Afghanistan to eliminate ISIS-K in return; the Saudi and other Gulf Sates want to prevent it. Therefore, they use ISIS and other associates of the group to counter Iran’s ambitious trans-national agenda; ISIS-K takes advantage of having been provided with huge financial support by anti-Iran camp.

Iran has repeatedly tried to spread Shia religion around the world, most notably at Mustafa International School in Bamko, the capital of Mali in Africa.  There have been several attempts by the Iranian government to convert the students to Shi’ism, an issue that has become the topic of international debate supported by Saudi Arabia.  Finally, all of these events are currently having a direct and indirect impact on Afghanistan and the country’s ongoing security crisis, which will affect the entire region at the end.

Continue Reading

Intelligence

The means to manage cyberspace and the duty of security

Published

on

Over and above the ethical concepts regarding the near future, it is also good to focus on the present. Governments are required to protect their national resources and infrastructure against foreign and domestic threats, to safeguard the stability and centrality of human beings and political systems and to ensure modern services for civilians. Suffice it to recall the chaos that arose some time ago in the Lazio region for the well-known health issues.

Governments must play a key role in developing and leading the local ecosystems, but this national effort must involve many other stakeholders: local businesses, entrepreneurs, multinational companies, local and foreign investors, State agencies, Ministries and academics, people in education, professional institutions and the public at large.

Furthermore, cybersecurity is a national opportunity for developing the local economy and for positioning any country in the international arena as a safe place to establish and develop economic relations between States and companies. It is also important as a regional cyber hub.

Cyber strategy therefore consists in prioritising operational cyber activities with a view to optimising and monitoring the overdevelopment of cyber intelligence that could one day take such turns as to be ungovernable.

This is the reason why investment in technology, local capacity building and resource allocation and concentration are required. This means providing strategic advisory services to government agencies that are seeking to advance cyber security at a strategic and operational level.

It is therefore necessary to work with governments to develop their strategic and operational capabilities in cybersecurity, either at the national or sectoral level, as well as providing comprehensive cyber projects that combine cyber defence and the development of a local cyber ecosystem, based on the models tried and tested by various countries around the world, such as the People’s Republic of China, Israel, the United States of America, etc.

There is a need to specialise in setting up Cyber Units and Cyber Centres (SOC & Fusion Centres) and in developing Cyber Eco-Systems and Cyber Strategies. This means providing various cyber solutions, services and know-how to companies in various sectors, such as financial, industrial, energy, health, technology and many other sectors.

Stable OT (operational technology) security services and strategic advice to companies in the fields of energy, manufacturing, security, medicine, transport, critical infrastructure and many others create the prerequisites for defending cyberspace. As well as helping OT-based organisations integrate cybersecurity into their processes and products. Design, develop and deliver advanced technologies and solutions to protect critical assets in OT environments, such as ICS, SCADA, IIoT, PLC, etc.

In this regard there is a basic need for creating professional IT schools around the world that teach the meaning of cyberspace, and not just how to use Word and other simple Office programs.

The expansion and creation of universities and institutes of cyber knowledge is a starting point from which partnerships are launched with organisations seeking to create their own cyber schools or with academic or educational organisations offering cyber training to their students.

Providing comprehensive solutions for IT schools, enables the training of IT professionals and new recruits in all IT roles, so that hackers do not remain the sole repository of digital truth. Advanced training is a solid starting point for organisations seeking to train their IT professionals. Professionals who can manage and master schemes such as Cyber Defender, Cyber Warrior, Cyber Manager, SOC Analyst, Digital Forensics, Basic Training and many others, including through the use of simulation.

Leading the creation and development of the high-level cybersecurity ecosystem is a duty of States towards the citizens who elect their leaders. The same holds true for seeking and employing highly experienced experts in the various security subject matters, including strategic cyber defence, cyber warfare, cyber intelligence, cyber research and development and cyber strategy, as well as defining training policies for these branches of operation.

Having examined the prerequisites for protecting cyberspace, it is worth addressing the structure of some of the risks faced by institutional network systems.

One of the most typical operations made by hackers relates to the use of client/server technology to combine several computers as a platform to launch DDoS (Distributed Denial of Service) attacks against one or more targets, thus exponentially increasing damage.

A malicious user normally uses a stolen account to install the DDoS master programme on a computer. The master programme will communicate with a large number of agents at any given time and the agent programmes have been installed on many computers in the network. The agent launches an attack when it receives an instruction. Using client/server technology, the master control programme can activate hundreds of agent programmes in a matter of seconds.

A DDoS uses a group of controlled machines to launch an attack on a computer, be it server or client. It is so fast and hard to prevent that is therefore more destructive. If we consider that in the past network administrators could adopt the method of filtering IP addresses against DDoS, it becomes more difficult to prevent such actions today. How can measures be taken to respond effectively?

If the user is under attack, defence will be very limited. If there is a catastrophic attack with a large amount of traffic pouring onto the unprepared user, it will very likely that the network will be paralysed before the user can recover. Users, however, can still take the opportunity to seek defence.

Hackers usually launch attacks through many fake IP addresses. At that juncture, if users can distinguish which IPs are real and which are fake – and hence understand from which network segments these IPs come – they can ask the network administrator to change them. Firstly, the PCs should be turned off to try to eliminate the attack. If it is found that these IP addresses are coming from outside rather than from the company’s internal IP, a temporary investigation method can be used to filter these IP addresses on the server or router.

The solution would be to discover the route through which the attackers pass and block them. If hackers launch attacks from certain ports, users can block these ports to prevent intrusion. After the exit port is closed, all computers cannot access the Internet.

A more complex method consists in filtering the Internet Control Message Protocol (ICMP), a service protocol for packet networks transmitting information regarding malfunctioning, monitoring and control information or messages between the various components of a computer network. Although it cannot completely eliminate the intrusion during the attack, filtering the ICMP can effectively prevent the escalation of the aggression and can also reduce the level of constant damage to a certain extent.

The DDoS attack is the most common attack method used by hackers. Some conventional methods of dealing with it are listed below.

1. Filter all RFC1918 IP addresses. The RFC1918 IP address is the address of the internal network, such as 10.0.0.0, 192.168.0.0, 172.16.0.0, etc. These are not fixed IP addresses of a particular network segment, but confidential local IP addresses within the Internet, which should be filtered out. This method serves to filter out a large number of fake internal IPs during an attack, and can also mitigate DDoS attacks.

2. Use many PCs to resist hacker attacks. This is an ideal response phase, if the user has sufficient ability and resources to enable a defence against hackers who attack and continue to access and take over resources. Before the user is fatally attacked, the hacker has little means to control many PCs. This method requires considerable investment and most of the equipment is usually idle, which does not correspond to the actual functioning of the current network of small and medium-sized enterprises.

3. Make full use of network equipment to protect resources. The so-called network equipment refers to load balancing hardware and software such as routers and firewalls, which can effectively protect the network. When the network is attacked, the router is the first to fail, but the other devices have not yet collapsed. The failed router will return to normalcy after being restarted and will restart quickly without any loss. If other servers collapse, their data will be lost and restarting them is a lengthy process. In particular, a company uses load balancing equipment so that when a router is attacked and crashes, the other will work immediately. This minimizes DDoS attacks.  

4. Configure the firewall. The firewall itself can resist DDoS and other attacks. When an attack is discovered, it may be directed to certain sacrificial hosts, which are able to protect the actual host from the attack. The sacrificial hosts may obviously choose to redirect to unimportant hosts or to those having systems with fewer vulnerabilities than some operating systems and with excellent protection against attacks.

5. Filter unnecessary services and ports. Many tools can be used to filter out unnecessary services and ports, i.e. filter out fake IPs on the router. For example, Cisco’s CEF (Cisco Express Forwarding) can compare and filter out Source IP and Routing Table packets. Opening only service ports has become a common practice for many servers. For example, WWW servers open only 80 ports and close all the others or use a blocking strategy on the firewall.

6. Limit SYN/ICMP traffic. The user must configure the maximum SYN/ICMP traffic on the router to limit the maximum bandwidth that SYN/ICMP packets can occupy. Therefore, when there is a large amount of SYN/ICMP traffic exceeding the limit, this means it is not normal network access, but hacking. In the beginning, limiting SYN/ICMP traffic was the best way to prevent DDoS. Although the effect of this method on DDoS is currently not widely used, it can still play a certain role.

7. Scan regularly. Existing network master nodes should be scanned regularly, checked for security vulnerabilities and new vulnerabilities cleaned up promptly. Computers on backbone nodes are the best locations for hackers to use because they have higher bandwidth. It is therefore very important to strengthen the security of these hosts. Furthermore, all computers connected to the major nodes of the network are server-level computers. Hence regular scanning for vulnerabilities becomes even more important.

8. Check the source of the visitor. Use suitable software to check whether the visitor’s IP address is true. This should be done by reverse-searching the router: if it is fake, it will be blocked. As said above, many hacker attacks often use fake IP addresses to confuse users and it is hard to find out from where they come. Therefore, for example, the use of Unicast Reverse Path Forwarding can reduce the occurrence of fake IP addresses and help improve network security.

As seen above, we need experts who know more than hackers, and this is the duty that States and governments have towards their institutions, but primarily towards their citizens.

Continue Reading

Publications

Latest

Development1 hour ago

Strong Producer Organizations Key to a Vibrant Farming Sector

Scaling up agricultural production among small farmers through clustering and organizing them into cooperatives and various types of producers’ organizations,...

Energy News3 hours ago

Renewable electricity growth is accelerating faster than ever worldwide

The growth of the world’s capacity to generate electricity from solar panels, wind turbines and other renewable technologies is on...

Intelligence5 hours ago

Somalia: Security Council adopts resolution to keep pirates at bay

The UN Security Council on Friday adopted a resolution to combat the continuing threat of piracy off the coast of...

Africa Today7 hours ago

Rights experts call for end to violence against women in Tigray conflict

Experts appointed by the UN Human Rights Council have called for urgent action to end violence against women and girls...

Human Rights9 hours ago

‘Bodyright’ campaign launched, to end rise in gender-based violence online

Corporate logos and Intellectual Property (IP) receive “greater protection online than we do as human beings”, the UN’s women’s health agency that works to end gender-based violence, UNFPA, said on Thursday, launching a new...

Africa11 hours ago

Gender Equality at the Expense of Democracy in Africa

At a first glance, the Transitional Charter released by the Comité national du rassemblement et du développement (CNRD), the junta...

Defense13 hours ago

Will India go Nuclear in the Future? – A regional overview

South Asia has not seen stability in long while. Ever since the colonial takeover by the British, it has been...

Trending