US Govt proposal to classify Security Tools as Weapons of War w/ Export Regulations.

This would be devastating to US business and security products.

In 2013, WA agreed to add the following to their list of dual-use goods: systems, equipment or components specially designed for the generation, operation or delivery of, or communication with, intrusion software; software specially designed or modified for the development or production of such systems, equipment or components; software specially designed for the generation, operation or delivery of, or communication with, intrusion software; technology required for the development of intrusion software; Internet Protocol (IP) network communications surveillance systems or equipment and test, inspection, production equipment, specially designed components therefor, and development and production software and technology therefor. BIS, the Departments of Defense and State, as well as other agencies have been discussing the best way to add these items, which we have named “cybersecurity items,” to the Commerce Control List (CCL) (Supplement No. 1 to part 774 of the Export Administration Regulations) without reducing encryption controls and while balancing the national security and foreign policy. For resource planning purposes, as well as license requirements, license exceptions, license submission requirements, and internal license reviews and processing planning purposes, this rule is published as a proposed rule.


Aadhaar-linked accounts to be basis for mobile payments

200 px

I do find it interesting that everyone in the development community is focused on mobile payments and yet the attachment of a higher level of verification using biometrics and a randomly generated 12 digit number and it is a target at every turn.

Over 30 million linked accounts to start DBT payments in most countries would be considered a resounding success. M-Pesa still only has 17 million accounts and a very very low level of security but is considered the gold standard for mobile payments. Praveen Chakravarty, chief executive, Anand Rathi Financial Services, says, the application sounds great conceptually and is in line with the government’s current thrust on financial inclusion. “Of the 600,000 villages in the country, banks are present in only 40,000.”

Now, Aadhaar-linked accounts to be basis for mobile payments | Business Standard.

Enhanced by Zemanta

Deadline for Aadhaar Cards on February 28, 2014 in West Bengal

200 px

The West Bengal government set February 28 as the deadline for distributing Aadhaar cards among all Bengal residents, prompting many to wonder about the feasibility of covering over six crore people in little over five-and-a-half months.

Providing Aadhaar numbers to all citizens above the age of five is the precursor to Prime Minister Manmohan Singh’s dream project of rolling out a direct benefit-transfer scheme, replacing the leak-prone subsidy system. The success of the project will depend on coverage as subsidies will be directly transferred to the 12-digit Aadhaar-linked bank accounts. “We have set a target to complete the process by February 28,” home secretary Basudeb Banerjee said after a review meeting at Writers’ with district magistrates and representatives of the census directorate this afternoon.

Deadline for Aadhaar Cards on February 28, 2014 in West Bengal – Economic Times.

Enhanced by Zemanta

Cybersecurity is attracting lots of capital

English: Seal of the United States Department ...

The tremendous and rapid growth of big-time Internet based corporations, such as Google, Yahoo, Microsoft, Intel, Apple, Facebook and many others, highlights the immense potential this particular industry is enjoying and will continue to enjoy in the years to come.

However, this tremendous growth is associated with a significant increase in cybercrime and security threats. Companies are spending huge amounts to implement strategies and solutions that would keep cyberspies, hackers and data thieves away from their sensitive and confidential information. In a recent USA Today report, it was noted that global spending on information security is expected to total $64.4 billion this year and will continue to grow at an average annual rate of 8.7 percent throughout the next four years until 2017.

“The cybersecurity market is in a renaissance period that should enable the good guys to leapfrog the bad guys in prevention and detection capabilities,” stated Greg Fitzgerald, chief marketing officer security start-up Cylance, in an interview with the national news outlet.

Although venture capitalists are in the late stages of getting behind these types of firms, a lot of them are hoping to garner massive billion-dollar paydays, at least according to James Foster, CEO of security start-up Riskive. “”The VC’s want to know, ‘Can you get me to an IPO and show me a billion dollar return?’”

Investment capital floods cybersecurity market.

Enhanced by Zemanta

Aadhaar recognizes 1,600 more transgender persons

200 px

This is an ongoing update of Aadhaar and UID. In that in October of 2011 there had already been over 12,500 issued as transgender to various communities around the India. Life is a daily struggle for transgender and Hijras through out the world but especially in India which makes the foresight of the UID team to include such a classification as even more important. The social stigma associated with their identity is takes a toll on their physical and mental health. For the first time they were being acknowledged along with receiving a statutory identity proof that will help in securing basic needs of life. The delivery of Aadhaar numbers started to be a realization for this community in Guntur city.

Location map of Andhra Pradesh

They are often spurned by the officials concerned/staff who simply say that Aadhaar cards cannot be issued to them on technical grounds in spite of their fulfilling eligibility criteria. Then the usual insults are heaped on them. Sometimes their applications are taken but to no avail, all because of the familiar societal mindset of looking down upon them. Not willing to bear this disdainful treatment anymore, some 30 members of the transgender community in living in Guntur city (KVP Colony, Gujjanagundla and other localities) approached the District Legal Services Authority (DLSA) Secretary M.V. Ramana Kumari and Superintendent of Police (urban) A. Ravi Krishna, who got them successfully enrolled into the UIDAI database. Ms. Ramana Kumari made the transgender people to submit a petition to Collector S. Suresh Kumar, which set the ball rolling. Mr. Ravi Krishna spoke to the officials concerned of Revenue Department and got the address of a single house in KVP Colony in which the nearly 30 transgenders are staying, submitted as proof of their residence.

In a first, Aadhar recognises 1,600 transgender persons – Hindustan Times.

Enhanced by Zemanta

Iris scans gets a thumbs up from US Gov NIST; Welcome to the party 10 years late.

logo of National Institute of Standards and Te...

A new report by biometric researchers at the National Institute of Standards and Technology (NIST) uses data from thousands of frequent travelers enrolled in an iris recognition program to determine that no consistent change occurs in the distinguishing texture of their irises for at least a decade. These findings inform identity program administrators on how often iris images need to be recaptured to maintain accuracy. For decades, researchers seeking biometric identifiers other than fingerprints believed that irises were a strong biometric because their one-of-a-kind texture meets the stability and uniqueness requirements for biometrics. However, recent research has questioned that belief. A study of 217 subjects over a three-year period found that the recognition of the subjects’ irises became increasingly difficult, consistent with an aging effect.

I would like to point out to NIST all they would have to do is look at the data collected by India‘s UID program to see the stability of iris over a longer period. The pilot projects that we did looked at the stability of various biometrics in many different groups to see which were the most stable and reliable. What we determined is that while iris is good it really needs to be fuzed with another biometric to be used in a multi-use application. Multimodal biometrics are required for a lifetime of identity management.

Enhanced by Zemanta