The Lords of Dharmaraja Faked Indian Gov't Memo

Thursday, January 12, 2012

Jeffrey Carr


The Lords of Dharmaraja Faked Indian Gov't Memo on Phone Surveillance

On January 6, 2012, ZDNet reported that a hacker named Yama Tough, a member of the Lords of Dharmaraja hacker group, claimed to have access to documents that described an Indian military intelligence operation which gathered intelligence via backdoor access to Nokia, Apple, and Research In Motion smart phones.

The document was made to look official, complete with redacted portions. It named authentic Indian government agencies and individuals to frame a fictional account of an "Advanced Cellular Intercept Programme" targeting the U.S. China Economic and Security Review Commission (

The document included portions of intercepted emails allegedly obtained through a mobile phone surveillance program using the acronym RINOA SUR (RIm, NOkia, Apple SURveillance).

The emails were stolen from the Indian embassy in Paris and posted to Pastebin in December by Yama Tough and consist of the .BAT archive for one person - William Reinsch, National Foreign Trade Council member and Commissioner of the USCC.

I compared the emails contained in the .bat archive of Mr. Reinsch with the emails allegedly collected through RINOA SUR against multiple USCC commissioners and they were identical, which is either a tremendous coincidence or evidence that Yama Tough has invented this entire scandal in order to get more mileage out of the original hack.

Other problematic issues with the alleged Indian military intelligence operation are that Indian Military Intelligence is not mandated to conduct electronic surveillance, with or without the President's authority under the Indian constitution. Also, memos are not internally redacted within the Indian Civil Service.

The Lords of Dharmaraja are mixing authentic stolen data with invented scenarios in order to get more publicity for themselves. Besides their fictional RINOA SUR operation, they've apparently released some new information via InfoSecIsland. Based upon what we've seen so far, it should be treated with a high degree of suspicion.

Cross-posted from Digital Dao.

Possibly Related Articles:
Information Security
USCC Surveillance Intelligence India The Lords of Dharmaraja YamaTough RINOA SUR William Reinsch Jeffrey Carr
Post Rating I Like this!
Laura Walker Nice catch. Prepare for spin =)
Yama Tougher this loser talks about our leak of Paris documents - it was us who did it and the bat archive is just to look good for you dumbass know nothing professor. Indian Paris embassy hack was our job and all the followups too. So get that tick out of ya ass oldfag
Yama Tougher Pigs like Carr are provoking everyone responsible for somethng like that to do more harm just to prove they are wrong. Jeffrey Carr ! you are the one who caused the follow up... stay tuned pops
Krypt3ia Interesting how the semantics of the language changed to a more colloquial English huh?
Jeffrey Carr Yes, and why add the 'er' to his name? Did Yama Tough feel like he needed to boost his confidence a bit (not just "tough" but "tougher")?
Jeffrey Carr Laura, thanks for the kind words!
David Noergaard Great story. This is a good example of solid research and investigation. Well done. I hope this serves as a good example why this group should not be believed or trusted.
David Noergaard Jeffrey, looks like you hit a nerve with mr. tougher. now this so-called hacker has been show to be a fraud. These groups think they are so smart, but in the end they are exposed and gain nothing. must be frustrating for anonymous to go to all the effort, but in the end be shown up. or is the term p0wned? ;-)
The views expressed in this post are the opinions of the Infosec Island member that posted this content. Infosec Island is not responsible for the content or messaging of this post.

Unauthorized reproduction of this article (in part or in whole) is prohibited without the express written permission of Infosec Island and the Infosec Island member that posted this content--this includes using our RSS feed for any purpose other than personal use.

Most Liked