Declassified, 2008; National Security Agency, Nepal (Technology, 1'st draft)

57 views
Skip to first unread message

Bipin Gautam

unread,
May 24, 2011, 3:38:00 AM5/24/11
to itpolicy-np, Nepali computer security and hacking community
Science and Research may has the power to peacefully transfer the
society at pure speed of light but there are these traitors in
inbetween who screw!

With great power comes great responsibility. But without proper check
and balances and an honest moral-compass it is like one way anarchy,
which our politicians are really good at it. But are we sheep's ?

From common prospective of peace-building – today, it is the
politicians (hidden agendas) who come out as odd man out!

There is nothing we cannot do, but leaders who should be leading us
know exactly how to create just the right amount of chaos and tie
everyone else hand for their own advantage to share-their new found
thrown.

CA term is expiring, again. Politicians may still have a small window
of opportunity to make it right at the end or no matter what......
this generation will remember to trial these politicians as
war/criminals in the future, like Nazis to write it in history for
they are no different form past anarchic rulers who will continue to
protect each-others core survival interests for common political hold.
Afterall, End justifies their means... and maybe 5 years is not a long
political “time-lapse” for anyone who are in suspended animation of
“maya” ? (Sanskrit : illusion)

So, there is an old folk warning about stupidity... and a marvelously
civilized way to boil a frog to death.

Don't start with a hot boil. We are not savages. Afterall, we want the
frog to cooperate. So, let us share an opportunity with the frog.

You place the happy little frog into a pot of slightly warm water.
Then, degree by degree, you gradually turn up the heat. The frog won't
ever turn frantic or try to clamber out. He'll be seemingly content
right up to the moment of his death.

And we are all frogs, happy little frogs........

_______________________________________________________________________________

Declassified, 2008; National Security Agency, Nepal (Technology, 1'st draft)

Abstract:

Most modern governments can intercept every piece of electronics
communications, be it telephone,
cellphone, Voice over IP (VoIP), pagers, instant messaging services,
emails and virtually any
information of their choice. They use these capabilities for law
enforcements and national security
concerns. But, as technology and communication has globalized, it has
also largely increased the
likelihood of foreign governments to easily turn such intelligence
capability against any country or its
individuals. With a carefully targeted attack any information can be
extracted out of anyone with a
guarantee. So, understanding such threats and detecting and then
migrating from them is even bigger challenge we face as a sovereign
nation today.

Abstract:

Most modern governments can intercept every piece of electronics
communications, be it telephone,
cellphone, Voice over IP (VoIP), pagers, instant messaging services,
emails and virtually any
information of their choice. They use these capabilities for law
enforcements and national security
concerns. But, as technology and communication has globalized, it has
also largely increased the
likelihood of foreign governments to easily turn such intelligence
capability against any country or its
individuals. With a carefully targeted attack any information can be
extracted out of anyone with a
guarantee. So, understanding such threats and detecting and then
migrating from them is even bigger challenge we face as a sovereign
nation today.

Background:

Technology is a wonderful magic which is often surprising. Something
that was supposed to be
unimaginable in the last century are present day realities and
accessible to all. But the magic as seen has a entirely different face
too. This is something thats least talked about, but its something
that will work like “black magic” and these capabilities are developed
in the deepest secrecy in every modern nation.
...

Objectives:

1. Define National Security standards on technology.
2. Develop and deploy technologies and policies as information
gathering and analysis
requirements for National Security needs.
3. Collect information, publish security guidelines, recommendations
and do security audits
mostly focused (but not limited to) on technology for institutions as
on pt. no. '4' to assure and
protect the infrastructures from any electronic attacks.
4. Assist government institutions and the security agencies like army,
police and the intelligence
department on their information needs with use of cutting-edge
technological capabilities to do
so.
5. Defend loss of information and intelligence.
6.Defend National Infrastructures and defend National Interests
through use of technology.
7.Research and Development (R&D).
….

(Read more, file attached herein...)

NSA-NP.pdf
Reply all
Reply to author
Forward
0 new messages