• Like
  • Save
RULES OF THE GAME IN CYBERWAR
Upcoming SlideShare
Loading in...5
×
 

RULES OF THE GAME IN CYBERWAR

on

  • 1,552 views

CYBERWAR IS NOT A CONVENTIONAL WAR. NATIONS ARE YET TO ENTER INTO ANY INTERNATIONAL TREATY IN THE FIELD OF CYBERWAR. RULES ARE REQUIRED TO BE FRAMED IN THIS FIELD KEEPING IN VIEW THE POTENTIAL OF ...

CYBERWAR IS NOT A CONVENTIONAL WAR. NATIONS ARE YET TO ENTER INTO ANY INTERNATIONAL TREATY IN THE FIELD OF CYBERWAR. RULES ARE REQUIRED TO BE FRAMED IN THIS FIELD KEEPING IN VIEW THE POTENTIAL OF DAMAGE WHICH CAN BE CAUSED IN THE EVENT OF CYBERWAR.

Statistics

Views

Total Views
1,552
Views on SlideShare
1,541
Embed Views
11

Actions

Likes
0
Downloads
81
Comments
0

2 Embeds 11

http://www.eradar.eu 10
http://www.linkedin.com 1

Accessibility

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    RULES OF THE GAME IN CYBERWAR RULES OF THE GAME IN CYBERWAR Presentation Transcript

    • RULES OF THE GAME IN CYBERWAR BY TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE: DELHI
    • RULES OF THE GAME IN CYBERWAR• There is no precise definition of ‘Cyberwar’.• The Shanghai Cooperation Organization (members include China and Russia) defines cyberwar to include dissemination of information harmful to the spiritual, moral and cultural spheres of other states.• In contrast, the United States’ approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech.• This difference of opinion has led to reluctance among Nations to pursue global cyber arms control agreements.
    • RULES OF THE GAME IN CYBERWAR• A Ukrainian Professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet.• According to this project, cyberwar is defined as the use of internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state.
    • RULES OF THE GAME IN CYBERWAR• The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons.• In the intermingled world of cyberspace, we may need to protect zones that run facilities such as hospitals or schools.• Discriminating between military and civilian targets is more difficult in cyberspace, and may require protected, marked, domain names.
    • RULES OF THE GAME IN CYBERWAR• Ambiguity about what constitutes cyber conflict is delaying international policy to deal with it, and that perhaps the idea of "peace" or "war" is too simple in the internet age when the world could find itself in a third, "other than war", mode.• Ensuring security in cyberspace is vital to our national security, our well being and our prosperity.• Without it we cant have the economy we aspire to have.
    • RULES OF THE GAME IN CYBERWAR• Cyber weapons have attributes not previously seen with traditional weapons, nor considered during the development of the current Laws of War.• Cyber weapons can deliver, in the blink of an eye, wild viral behaviors that are easily reproduced and transferred, while lacking target discrimination.
    • RULES OF THE GAME IN CYBERWAR• The nature of cyber space, with its ease of anonymity and use of proxies, makes the attribution of any attack very difficult. This raises the question of proportionality.• How strongly should a state respond to an attack when you do not know who did it, where they did it from or what the intention was? In conventional military terms these questions are easier to answer - not so in the cyber world.
    • RULES OF THE GAME IN CYBERWAR• Capabilities which currently exist include turning off power grids, disrupting water supplies and manufacturing systems.• Countries should exchange strategies and information to build confidence over the long term, so one never gets to the point of a cyber conflict or even a larger conflict.• Any such agreement remains a distant prospect because nations lack common legal standards in cyberspace and information security is closely connected with national interests.
    • RULES OF THE GAME IN CYBERWAR• The infamous Stuxnet worm was blamed for infecting industrial control systems and sabotaging centrifuges at controversial Iranian nuclear facilities.• Some have described this malware as the worlds first cyber-weapon though cyber- espionage in many guises has undoubtedly been practiced by intelligence agencies across the world for many years.
    • RULES OF THE GAME IN CYBERWAR• Computer systems underpin the delivery of essential services, including utilities and telecoms and well as banking and government services.• Although attacks against various critical systems are commonplace they tend to be low level information- stealing or denial of service exploits.• Cyberwar risks are all too real and illustrated by the denial of services attacks that blitzed Estonia off the web and the Operation Aurora assaults against Google and other high-tech firms.
    • RULES OF THE GAME IN CYBERWAR• The cyberwar lexicon is especially confusing because it remains immature.• For example, there is no agreed definition of what constitutes a cyber attack on a nation or a breach of sovereignty.• Often theft, espionage, reconnaissance or even simple hacking is described as a cyber attack.
    • RULES OF THE GAME IN CYBERWAR• National and international laws, regulations, and enforcement are still struggling to catch up to cyber activities worldwide.• Rules, protocols, and standards are few and disconnected, often conflicting with each other.• In most cases, laws have not kept pace with the technical ability of an adversary to move rapidly through national, academic, commercial, and private internet service providers.
    • RULES OF THE GAME IN CYBERWAR• Protection of strategic-crucial infrastructure and vital information for national security is of utmost importance.• The rules of cyberwar, once adopted, will help to define conditions in which the armed forces can go on the offensive against cyber threats and decide what specific actions it can take.• The laws of land warfare and law of armed conflict apply to cyberspace.
    • RULES OF THE GAME IN CYBERWAR• Nation states, non-nation state actors and hacker groups are creating tools that are increasingly more persistent & threatening, and armed forces have to be ready for that.• Rules of Cyberwar must determine what represents a reasonable & proportional response to a cyber attack as the law of armed conflict authorizes a reasonable, proportional defense against a physical attack from another country.
    • RULES OF THE GAME IN CYBERWAR• It remains unclear if the response to cyber attack includes authority to shut down a computer network, even if it’s been taken over by a malicious cyber attacker with intention to destroy it.• If it does, also left unanswered so far is who would have that authority: the Ministry of IT, the CBI, the military, the Cert-In, the internet service provider or any other entity.
    • RULES OF THE GAME IN CYBERWAR• American “kill switch bill": on June 19, 2010, US Senator Joe Lieberman introduced a bill called “Protecting Cyberspace as a National Asset Act of 2010“, which he co-wrote with senator Susan Collins and senator Thomas Carper.• If signed into law, this controversial bill, which the American media dubbed the “kill switch bill”, would grant the President emergency powers over parts of the internet.
    • RULES OF THE GAME IN CYBERWAR THANKS TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE NEW DELHI (INDIA) talwant@yahoo.com