top of page

By:

Quaid Najmi

4 January 2025 at 3:26:24 pm

Rs 1,136-cr digitisation contract under scanner

Disclosures on pricing and volumes in a five-year modernisation project have raised questions about costs and oversight. Mumbai: A project described as a routine “digital transformation” of Maharashtra’s registration machinery has raised eyebrows after regulatory disclosures indicated that its billing could reach a staggering Rs 1,136 crores over five years. The Inspector General of Registration & Controller of Stamps (IGR), which comes under the state’s revenue department, has issued a...

Rs 1,136-cr digitisation contract under scanner

Disclosures on pricing and volumes in a five-year modernisation project have raised questions about costs and oversight. Mumbai: A project described as a routine “digital transformation” of Maharashtra’s registration machinery has raised eyebrows after regulatory disclosures indicated that its billing could reach a staggering Rs 1,136 crores over five years. The Inspector General of Registration & Controller of Stamps (IGR), which comes under the state’s revenue department, has issued a Letter of Intent to a consortium led by the Navratna public-sector firm RailTel Corporation of India Ltd., alongside the Nashik-based infrastructure company Ashoka Buildcon Ltd. The consortium has been appointed as managed service provider for a comprehensive modernisation of IGR offices across the state. The five-year turnkey contract covers end-to-end operation and maintenance of IT systems, networks, cloud services and application infrastructure, as well as the scanning of official documents. Execution is scheduled to run until March 19, 2032. It is the financial structure, rather than the scope, that has prompted unease. The approved rate for scanning registered documents is Rs 24.75 per page. Industry sources say prevailing market prices for bulk document scanning typically range between Rs 3 and Rs 6 per page - roughly a quarter of the contracted rate. Costly Contract In identical filings with the NSE and BSE last week, the consortium partners referred to historical data in the request for proposals showing that an average of 9.18 crores pages were scanned annually over the past five years. At the agreed rate, this would translate into payments of around Rs 227 crores a year, taking the projected total to about Rs 1,136 crores over five years. The contract does not specify a ceiling, and payouts are expected to vary with actual volumes. Critics and watchdogs argue that the absence of a fixed cap, combined with a per-page charge well above market levels, leaves room for inflated bills or padded volumes. Prafful Sarda, a Pune-based social worker, questioned the rationale for outsourcing the task. Even if Rs 10 per page were taken as a generous benchmark using advanced machines, Sarda asked, “what is the need to award the scanning contract at a massive cost to outsiders when the state government can itself do it at a much lower cost.” He also raised doubts about the composition of the consortium. “What is the expertise in IT-related work of Ashoka Buildcon Ltd., which is a road infra developer. Moreover, scanning is an easy process – a 100-page file can be scanned and uploaded in barely five minutes. Massive discounts are offered for bulk works. Are the IGR staffers so over-burdened that scanning work has to be outsourced at exorbitant public cost?” Sarda said. According to him, contractors would gain access to sensitive land and property records, as well as information on real-estate preferences and market trends, potentially giving them an early advantage in identifying future development opportunities. He compared the case to what he described as the IRCTC spending Rs 2,619 crores on website upkeep and maintenance over three years, along with Rs 1,950 crores in UPI fees, figures cited in an RTI reply and reported earlier by this newspaper. When contacted, a spokesperson for Ashoka Buildcon said the company was a minority partner in the RailTel-led consortium and that “hence, we are not allowed to speak in the matter.” The spokesperson also declined to comment on when the five-year contract would commence, noting only that the stipulated completion date is March 2032.

Growing Risks Of Cyber Warfare

Updated: Oct 21, 2024

In a shocking series of events, multiple coordinated explosions have rocked Lebanon and parts of Syria, killing dozens of people and injuring thousands. The blasts occurred after explosive devices, hidden inside pagers and other radio communication devices, were detonated. The targeted individuals were primarily members of Hezbollah, with the explosions taking place in densely populated areas, resulting in widespread injuries to civilians, including children.

The devices, mainly pagers, walkie-talkies, and radios, had been in the possession of Hezbollah operatives, who had acquired them months prior, under the assumption they were secure. However, Hezbollah has accused Israel’s intelligence agency, Shin Bet, of tampering with the devices during transit.

According to security experts, Israel’s elite secret cyber warfare unit was behind the attack. This unit, known for its global cyber operations, is also linked to the creation of the STUXnet malware, which was responsible for the failure of Iran’s nuclear power plant. The pagers were rigged with explosive materials in place of a battery, and a relay switch was installed, allowing the explosions to be triggered remotely in a synchronized manner. The result was devastating injuries to the eyes, face, hands, and legs of those carrying the devices.

The incident occurred in Hezbollah-stronghold areas, including the Dahieh suburb of Beirut, southern Lebanon, and parts of the Beqaa Valley, with some explosions also reported across the border in Syria. The blasts overwhelmed hospitals, as hundreds of victims sought medical help for injuries ranging from severe burns to shattered limbs. The intensity of the explosions, far beyond that of ordinary battery malfunctions, indicates a highly sophisticated sabotage operation.

These explosions have not only deepened the crisis in Lebanon but have also raised critical questions about supply chain security, intelligence tactics, and the legality of using booby-trapped electronics in conflict zones.


What Are Pagers, and Why Are They Still Preferred?

Despite being old-school tele communication technology, pagers or beepers are still used in many countries, particularly in critical sectors and organizations. Pagers primarily facilitate one-way communication, pager uses higher frequencies than car radios i.e. 400 MHz band frequency. It also used a very basic type of VHF spectrum. These devices operate in restricted areas to transfer messages, alerts, and information. These devices are considered more secure and harder to trace or track compared to mobile phones, as they only receive messages, similar to a car radio that receives signals without revealing the listener’s identity or location. Additionally, pagers lack features like Bluetooth or GPS, making them more difficult to hack or compromise.

Among their many advantages, pagers are known for their long battery life and durability, making them ideal for continuous use in specific industries. There are an estimated two million active pager users worldwide. Hezbollah began using pagers after Israel successfully assassinated a high-ranking Hezbollah target by hacking his cellphone and precisely targeting him with a missile. Since then, many Hezbollah members have switched to more primitive communication devices, like pagers, to avoid being tracked via the internet.


Are Mobile Phones and Smartphones Similarly Vulnerable?

American and European security agencies suggest that, theoretically, it is possible to alter mobile phones and other smart devices to turn them into explosive devices. However, practically, it is more difficult due to the advanced security systems in modern smartphones. A hacked smartphone may exhibit various signs, such as abnormal temperature changes, slower system performance, unexpected reboots, odd sounds during calls, hung applications, or irrelevant messages and pop-ups, all of which could indicate tampering. These security systems make it more challenging to modify smartphones in the same manner as simpler devices like pagers.


New Security Challenges

The Hezbollah pager explosion serves as a wake-up call for sectors involving critical infrastructure and aviation. In an era where smartphones are network-connected and can be charged wirelessly, the possibility of tampering with batteries or embedding explosives, like HMX, PETN and other type of plastic explosives pose significant risks. During flights, even a minor explosion could result in catastrophic consequences. On the ground, the threat extends to damaging nearby aircraft, equipment, and infrastructure. Airport security may soon impose stricter regulations, potentially banning pagers, walkie-talkies, and radios, much like power banks, which are now restricted on flights. In the future, mobile phones may only be allowed in switched-off modes, placed in lithium-safe bags during flights. Suspicious devices could be handled separately in Faraday-sheet bags to block any network or signal connections.

This incident highlights the growing risks of cyber warfare and the dangers posed by everyday communication devices being exploited for sabotage. It is an alarming call for a nation’s security as the treat of such critical infrastructure being handled by terrorist organisations can compromise the use of day-to-day electronics for malicious activities. As technology advances, so must the protocols for ensuring public safety, particularly in high-risk environments where even the smallest vulnerability could lead to devastating consequences.

(The writer is an eminent cyber and explosives forensic expert. Views personal.)

Comments


bottom of page