logo
After Operation Sindoor, Indian Army and BSF officers discuss western theatre, joint border management

After Operation Sindoor, Indian Army and BSF officers discuss western theatre, joint border management

Time of India20 hours ago

1
2
Chandigarh: The annual synergy conference of Army and
BSF
was held at the Western Command HQ Thursday, bringing together senior BSF leadership of the Punjab and Jammu Frontier and the Western Command.
The conference aimed to further enhance operational synergy, reinforce jointmanship, and address critical issues pertinent to border management in the Western theatre. The meeting was co-chaired by Lt Gen Manoj Kumar Katiyar, Army Commander (Western Command), and Satish S Khandare, ADG, HQ Spl DG BSF (Western Command).
The conference featured detailed analyses of the challenges encountered in border management, with a particular focus on the recent operational experience of
Operation Sindoor
.
Senior commanders from both forces shared tactical and strategic insights gained during the operation, highlighting areas such as coordination under dynamic conditions, terrain exploitation, and rapid decision-making. The lessons drawn from this operation are being actively institutionalised to enhance preparedness, adaptability, and response mechanisms for future border contingencies.
Building upon these insights, the conference deliberated on a range of joint initiatives aimed at fostering greater operational synergy.
These included the harmonisation of training protocols and equipment profiles between BSF and Army units to ensure compatibility and seamless coordination during integrated missions. Discussions also focused on measures to enhance resource sharing and supply chain efficiency in forward areas.
Building on previous exercises to enhance synergy, a communication architecture was deliberated upon to enable secure, real-time information exchange across operational formations.
In view of rising aerial threats, particularly from small unmanned aerial systems, both forces also explored the integration of surveillance platforms and counter-drone capabilities, with an aim to enhance the layered airspace defence mechanism.
Satisfaction with various initiatives taken post the last conference in April 2024 was realised as joint training and the establishment of communication protocols leading to increased joint operability were tested during Operation Sindoor.
Newer areas for synergy were identified, such as drones, C-UAV, surveillance, and communication for enhanced jointness to fight a coordinated defensive battle.
In his concluding address, Lt Gen Manoj Kumar Katiyar, GOC-in-C, HQ (Western Command), emphasised the long-term vision of developing a joint security force culture, reiterating the significance of sustained cooperation and the spirit of jointmanship. He lauded the efforts of both the BSF and the Army in maintaining border integrity and called for continued collaboration to effectively counter modern and emerging threats.

Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Significant leap with development of indigenous post-quantum cryptography applications, says Army
Significant leap with development of indigenous post-quantum cryptography applications, says Army

Time of India

time3 hours ago

  • Time of India

Significant leap with development of indigenous post-quantum cryptography applications, says Army

The Indian Army on Friday said it has taken a "significant leap" in harnessing quantum technologies with the development of indigenous post-quantum cryptography applications, a move that aims to bolster its capabilities across domains and to ensure the force remains future ready in "ever-evolving technological landscape". In a post on X, ADG PI - Indian Army also shared some photos along with a caption titled - "Enabling the Battlefield of Tomorrow with Quantum Tech". The Indian Army had declared 2024 as the ' Year of Technology Absorption ' and is undertaking various initiatives to induct niche technology and systems into its inventory. Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Elegant New Scooters For Seniors In 2024: The Prices May Surprise You Mobility Scooter | Search Ads Learn More by Taboola by Taboola "The Indian Army takes a significant leap in harnessing Quantum Technologies with the development of indigenous Post-Quantum Cryptography (PQC) applications," it posted. These applications have been developed by the Military College of Telecommunication Engineering (MCTE), Mhow, under the aegis of the Corps of Signals and in alignment with the technology research vision of the Chief of the Army Staff, the post read. Live Events "Post-Quantum Cryptography based solutions are being progressively integrated across Army networks - strengthening capabilities across domains and ensuring Indian Army remains future ready in ever evolving technological landscape. #Atmanirbharta #YearofTechAbsorption #DecadeofTransformation @DefenceMinIndia @SpokespersonMoD @HQ_IDS_India," it posted.

Why China is fighting internet war with it 'friend' Russia
Why China is fighting internet war with it 'friend' Russia

Time of India

time4 hours ago

  • Time of India

Why China is fighting internet war with it 'friend' Russia

Despite public displays of strategic partnerships and mutual non-aggression in cyberspace, China has reportedly been engaged in hacking campaigns against Russia. As reported by the New York Times, some Beijing-backed hacking groups are targeting Russian government agencies and defense firms in order to extract military and defense secrets. This intelligence collecting drive aims to gather information about Russian military operations, particularly its ongoing war in Ukraine, as well as advancements in defense technology and broader geopolitical strategies. One noticeable breach involved a Chinese group posing as a Russian engineering firm to gather data on nuclear submarines. Another attack by Chinese hackers was on Russia's powerful state-owned defense conglomerate, seeking information on radar and electronic warfare systems. The revelations underscore a pragmatic and often ruthless approach to national interests, even among ostensible allies. While both nations have consistently presented a united front against Western influence and have pledged not to engage in cyber espionage against each other, China appears to view Russia as a vulnerable yet valuable target for intelligence acquisition . As per the report cyberanalysts suggest that China's aim is to collect information about Russia's capabilities and intentions, particularly in light of its military engagement in Ukraine. This kind of information will offer strategic advantages to Beijing and help it in enhancing its own defense planning, technological development and international relations. Along with this, the hacking activities also indicate clear prioritisation of national intelligence over the stated principles of their partnership. by Taboola by Taboola Sponsored Links Sponsored Links Promoted Links Promoted Links You May Like Esse novo alarme com câmera é quase gratuito em São Paulo (consulte o preço) Alarmes Undo This covert digital intrusion stands in contrast to the public narrative of a "no-limits" friendship between Beijing and Moscow, casting a shadow of distrust over their proclaimed solidarity. While there is no indication of a full-blown "internet war" between the two, the continuous efforts by China to penetrate Russian systems for espionage purposes reveal a hidden layer of competition and suspicion beneath the surface of their cooperative alliance.

Iranian hackers hijacking home security cameras to spy within Israel
Iranian hackers hijacking home security cameras to spy within Israel

Hindustan Times

time13 hours ago

  • Hindustan Times

Iranian hackers hijacking home security cameras to spy within Israel

Iran is tapping into private security cameras in Israel to gather real-time intelligence about its adversary, exposing a recurrent problem with the devices that has emerged in other global conflicts. Earlier this week, after Iranian ballistic missiles tore through high-rise buildings in Tel Aviv, a former Israeli cybersecurity official went on public radio to issue a stark warning: Turn off your home surveillance cameras or change the password. 'We know that in the past two or three days, the Iranians have been trying to connect to cameras to understand what happened and where their missiles hit to improve their precision,' Refael Franco, the former deputy director general of the Israel National Cyber Directorate, said on Monday. He now runs the cybersecurity crisis firm Code Blue. A spike in cyberattacks has accompanied the war between Israel and Iran, with a pro-Israel hacking group known as Predatory Sparrow claiming responsibility for disrupting a major Iranian bank and a breach that struck an Iranian crypto exchange. Iran's state-run IRIB News reported that Israel had launched a full-scale cyberattack on the country's critical infrastructure. A spokesperson for the Israel National Cyber Directorate, a government agency, confirmed that internet-connected cameras were increasingly targeted for Iran's war planning. 'We've seen attempts throughout the war, and those attempts are being renewed now,' the spokesperson said on Monday. Photos of impact sites in Israel, though circulating on social media, are under an official blackout. It isn't the first time Israel's foes have used the devices to spy. For instance, Hamas hacked into private security cameras ahead of its invasion on Oct. 7, 2023, said Gaby Portnoy, who recently completed a three-year term as director of the Israel National Cyber Directorate. 'The intelligence gathering that Hamas did from private cameras in the Gaza periphery was a disaster,' Portnoy said in an interview. 'Thousands of cameras were hacked over the years, both public and private, and were used to collect intelligence.' Similar tactics have been used by Russia after its full-scale invasion of Ukraine. Russia 'likely used access to private cameras at key locations, such as near border crossings, military installations, and rail stations, to track the movement of materials,' according to a joint cybersecurity advisory in May by the US National Security Agency and other Western intelligence agencies. 'The actors also used legitimate municipal services, such as traffic cams.' Ukraine banned surveillance cameras in 2022 amid a warning that Russia was using them to plan airstrikes. The next year, Ukraine's government called on the owners of street webcams to stop broadcasting online. 'Russia is exploiting vulnerability of modern webcams to launch missile attack at Ukraine and adjust them in real time,' according to a government statement at the time. In the US, the Federal Communications Commission in 2022 banned Chinese-made surveillance equipment over national security concerns. The private surveillance market is fast growing around the world: it's projected to reach $89 billion in 2030, up from $54 billion in 2024, according to a study by MarketsandMarkets Research. Relatively cheap and ubiquitous, private security cameras are often easy to access and hack, and they can provide foreign intelligence services with information on where troops are located, or help adversaries figure out where to drop bombs. While researchers have been warning about the vulnerabilities in security cameras for over a decade, some in the industry say they can be contained by investing in higher-end systems that offer regular firmware and software updates and by following proper installation procedures. 'Higher-grade security camera systems from vendors that take cybersecurity seriously will offer extensive configuration settings allowing for more device and communications customization,' Geoff Kohl, the Security Industry Association's senior director of marketing, said in an email. At the same time, users should 'presume your security video systems could be targeted,' he added. Most consumers prioritize price over the security of a surveillance system, even though a weakly protected camera can be a 'stepping stone' into overtaking the broader network, said Peleg Wasserman, a security architect at a global energy firm. 'They don't look at the security features of the device they're buying. So for the vendor there is no incentive to beef up security of such systems.' 'Consumers need to remember that they're not the only ones who may have access to this camera,' Wasserman said. 'I've seen people that put a camera outside the home without knowing that they're also filming their neighbors, for example, or a sensitive object or even giving a panoramic view of a city which may be useful for targeting.' In addition, private surveillance cameras often come with a default password — sometimes as simple as 1-2-3-4 — which is rarely changed by the user, according to experts. Some systems automatically stream the footage on the internet. While Chinese-made cameras have taken over a large part of the private surveillance market, other systems have weak protections. A study by BitSight Technologies Inc. this month found live footage from 40,000 security cameras is accessible on the internet, including 14,000 in the US. For countries at war, this data leakage can be an Achilles' heel. In 2022, the Israeli cyber agency warned that 66,000 personal cameras in Israel were using a default password and could easily be overtaken by hackers. That warning was largely unheeded, including in the southern towns that were invaded by Hamas in the attack that killed over 1,200 and saw 250 abducted. After the Hamas attack, the Israeli government issued nonbinding directives urging citizens to strengthen the information security on their personal security cameras, many of them Chinese-made, including adding two-factor authentication. It also obtained legal approval to remotely shut off traffic cameras and personal devices reflecting out on sensitive areas, such as borders or critical infrastructure, according to Portnoy, the former director of the Israel National Cyber Directorate. That came after it detected increased attempts by Israel's adversaries to breach highway cameras to monitor troop movements. Portnoy said Hamas had hacked private cameras for years to collect intelligence and monitor civilian and military movements while planning the attacks. Hamas is considered a terrorist organization by the US and many other governments. An analysis of the military's secure border cameras after the war began found they not breached by Hamas, according to Portnoy. But private security systems from the kibbutzim nearby that were later invaded were compromised, he said, citing footage found in Gaza by the Israeli military. Franco, in an interview before the outbreak of the latest Israel-Iran conflict, said cameras that farmers installed in agricultural fields along the border to prevent theft inadvertently showed soldiers' positions along the Gaza security fence. Most people are unaware of the potential dual use of CCTV when they try to bolster their personal security without proper safeguards, whether in towns, kindergartens, offices or private homes, according to Franco. 'You try to protect yourself and meanwhile you are exposing yourself,' he said. Since Israel launched its attack on Iran's nuclear program on Friday, Iran has retaliated by firing hundreds of ballistic missiles and drones. More than 200 people have been killed in Iran by Israel's strikes, according to the Iranian government. In Israel, the government says 24 people have been killed and over 800 injured. More stories like this are available on ©2025 Bloomberg L.P.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store