SlideShare a Scribd company logo
CYBER WARFARE IS THE ULTIMATE 
THREAT TO 
CYBER SECURITY. 
WHAT DOES LAW SAY ABOUT IT ? 
ADV. PRASHANT MALI 
CYBER LAW & CYBER SECURITY EXPERT
WHAT IS CYBER WARFARE? AS PEOPLE SAY 
• U.S. government security expert Richard A. Clarke, in his 
book Cyber War (May 2010), defines "cyberwarfare" as 
"actions by a nation-state to penetrate another nation's 
computers or networks for the purposes of causing damage or 
disruption." 
• The use of computing resources to intimidate, harm people, places or 
system we depend upon.
WHAT IS CYBER WARFARE ? 
• Cyberwarfare is politically motivated hacking to 
conduct sabotage and espionage. It is a form 
of information warfare sometimes seen as 
analogous to conventional warfare.[1] 
..Wikipidia
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about Penetration of Networks
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about defacing web sites
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about DDoS attacks
WHAT IS CYBER WARFARE ? 
• Cyber warfare is NOT about Malicious Software 
IT IS NOT 
EVEN CYBER TERRORISM 
OR 
CYBER ESPIONAGE
WHY NOT MALICIOUS CODE OR TROJAN ? 
• It has an Expiry date.. Before a Vulnerability is 
patched or “Snowdens are Awakened “ 
• It has associated pressure to “use it” before you 
“lose it.” 
• If no cyber conflict Where to use so becomes Stale 
• Cannot distinguish Friends or allies, can boomerang
WHY IT IS NOT CYBER TERRORISM ? 
• Cyberterrorism is the use of Internet based attacks 
in terrorist activities, including acts of deliberate, large-scale 
disruption of computer networks, especially of personal 
computers attached to the Internet, by the means of tools such 
as computer viruses. 
• Cyber Warfare is NOT About "Cyber-Enabling" Regular Terrorism
WHAT IS CYBER WARFARE THEN ? 
Low-intensity persistent asymmetric economic 
cyber attacks, such as spam Let’s start by looking 
at spam.
WHAT IS CYBER WARFARE THEN ? 
Cyber attacks on fundamental Internet protocols such 
as DNS (the domain name system) or BGP (the 
Internet’s wide area routing protocols)
WHAT IS CYBER WARFARE THEN ? 
Kinetic ("physical") attacks on high value Internet 
“choke points” such as cable landing sites or 
Internet exchange points
WHAT IS CYBER WARFARE THEN ? 
Operations conducted against critical civilian 
infrastructure such as industrial control systems 
(so-called “SCADA” systems)
WHAT IS CYBER WARFARE THEN ? 
• Strategic high altitude strikes aimed at destroying or 
disrupting national infrastructure on a wide-scale 
through electromagnetic pulse (EMP) effects
INTERNATIONAL LAW 
• Since the provisions of international agreements supersede the provisions for international cooperation, not 
only bilateral agreements but also multilateral agreements among nations must be signed. 
• UN Security Council should also focus on cyber terrorism threat. Most of the permanent members of the 
Council are also the most vulnerable and targeted countries in the world. 
• These countries also host most of the international cyber attacks. 
• A robust, international legal framework under UN that addresses cyber aggression is the most critical 
component of a comprehensive approach to deter cyber attack, much more critical than national offensive 
and defensive cyber capabilities. 
• International law and norms are fundamental to deterrence because states “share an interest in adopting or 
codifying common standards for the conduct of international transactions...or in promoting or banning 
specific kinds of behavior by” states. 
• In this way, international law builds the framework that guides how and when states employ offensive and 
defensive cyber capabilities and forms the foundation of cyber deterrence. International law adds certainty to 
punitive actions and amplifies the costs of cyber attack by engendering a negative response from the 
international community, not just from the attacked state
INCIDENTS 
• On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at 
the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information 
was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence 
Center. 
• On 6 October 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data 
stream has been key logged, resisting all attempts to reverse the exploit, for the past two weeks.The Air Force 
issued a statement that the virus had "posed no threat to our operational mission". 
• In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal 
details (including names, phone numbers, home and email addresses and resident registration numbers) of up 
to 35 million people. A trojaned software update was used to gain access to the SK Communications network. 
Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted 
hacking effort. 
• Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security 
company McAfee in August 2011. The attacks have hit at least 72 organizations including governments and 
defense contractors.
INCIDENTS 
• On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, 
the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry. 
• On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and 
the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, 
Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist 
attacks. 
• In October 2010, Iain Lobban, the director of the Government Communications Headquarters (GCHQ), said Britain faces a 
"real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 
times each month, such attacks threatened Britain's economic future, and some countries were already using cyber assaults 
to put pressure on other nations. 
• In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment 
facility. The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of 
cyberwarfare. 
• In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and 
financial websites in South Korea and the United States. While many thought the attack was directed by North Korea, one 
researcher traced the attacks to the United Kingdom.
INCIDENTS 
• Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South 
Ossetia War. 
• In 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The 
message left on the website read "This site has been hacked by Dream of Estonian organization". During 
the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks 
against the Kyrgyz ISPs. 
• In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and 
military sources speculated that the Israelis may have used cyber warfare to allow their planes to pass 
undetected by radar into Syria. 
• In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn. 
The largest part of the attacks were coming from Russia and from official servers of the authorities of 
Russia. In the attack, ministries, banks, and media were targeted.
EFFORTS AT PROHIBITION 
• The Shanghai Cooperation Organization (members of which include China and Russia) defines cyberwar 
to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other 
states". 
• In September 2011, these countries proposed to the UN Secretary General a document called 
"International code of conduct for information security". 
• The approach was not endorsed by western countries as it entailed too many hints on political 
censorship of the internet. 
• In contrast, the United States' approach focuses on physical and economic damage and injury, putting 
political concerns under freedom of speech. 
• In June 2013, Barack Obama and Vladimir Putin agreed to install a secure Cyberwar-Hotline providing "a 
direct secure voice communications line between the US cybersecurity coordinator and the Russian 
deputy secretary of the security council, should there be a need to directly manage a crisis situation 
arising from an ICT security incident."
THANK YOU 
Mobile:+919821763157 
cyberlawconsulting@gmail.com 
www.prashantmali.com

More Related Content

What's hot

Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
Clifford Stone
 

What's hot (20)

CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITYCYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
zero day exploits
zero day exploitszero day exploits
zero day exploits
 
Cyber security from military point of view
Cyber security from military point of viewCyber security from military point of view
Cyber security from military point of view
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
A military perspective on cyber security
A military perspective on cyber securityA military perspective on cyber security
A military perspective on cyber security
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11
 
Global Terrorism Challenges & Response
Global Terrorism Challenges & ResponseGlobal Terrorism Challenges & Response
Global Terrorism Challenges & Response
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Module 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptxModule 1- Introduction to Cybercrime.pptx
Module 1- Introduction to Cybercrime.pptx
 
Information warfare and information operations
Information warfare and information operationsInformation warfare and information operations
Information warfare and information operations
 
Week 1: What is terrorism?
Week 1: What is terrorism?Week 1: What is terrorism?
Week 1: What is terrorism?
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyber crime social media &; family
Cyber crime social media &; familyCyber crime social media &; family
Cyber crime social media &; family
 
Riot
RiotRiot
Riot
 
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGYNATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
NATIONALINTEREST AND NATIONAL SECURITY IN NATIONAL SECURITY STRATEGY
 
Cyberterrorismv1
Cyberterrorismv1Cyberterrorismv1
Cyberterrorismv1
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 

Similar to Cyber warfare Threat to Cyber Security by Prashant Mali

Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh20
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
Andrea Rossetti
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
Paul Joyal
 

Similar to Cyber warfare Threat to Cyber Security by Prashant Mali (20)

Cyber war
Cyber warCyber war
Cyber war
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
114-116
114-116114-116
114-116
 
Trend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptxTrend of cyber terrorism in the present world.pptx
Trend of cyber terrorism in the present world.pptx
 
Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Instructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question conInstructions please write a 5 page paper answering the question con
Instructions please write a 5 page paper answering the question con
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
A View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years LaterA View Of Cyberterrorism Five Years Later
A View Of Cyberterrorism Five Years Later
 
Cyber Crimes.pptx
Cyber Crimes.pptxCyber Crimes.pptx
Cyber Crimes.pptx
 
"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!"Cyber crime", or computer-oriented crime..!!
"Cyber crime", or computer-oriented crime..!!
 
RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Francesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber securityFrancesca Bosco, Le nuove sfide della cyber security
Francesca Bosco, Le nuove sfide della cyber security
 
Cyberware
CyberwareCyberware
Cyberware
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Internet Security Threat
Internet Security ThreatInternet Security Threat
Internet Security Threat
 

More from Adv Prashant Mali

Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
Adv Prashant Mali
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
Adv Prashant Mali
 

More from Adv Prashant Mali (15)

Electronic evidence for delhi judicial academy prashant mali
Electronic evidence  for delhi judicial academy prashant maliElectronic evidence  for delhi judicial academy prashant mali
Electronic evidence for delhi judicial academy prashant mali
 
9 things about indian cyber law prashant mali
9 things about indian cyber law   prashant mali9 things about indian cyber law   prashant mali
9 things about indian cyber law prashant mali
 
Social Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant MaliSocial Media and Cyber Law in India By Prashant Mali
Social Media and Cyber Law in India By Prashant Mali
 
Electronic evidence digital evidence in india
Electronic evidence  digital evidence in indiaElectronic evidence  digital evidence in india
Electronic evidence digital evidence in india
 
Electronic Evidence fraud conference
Electronic Evidence   fraud conferenceElectronic Evidence   fraud conference
Electronic Evidence fraud conference
 
Cloud computing legal issues
Cloud computing legal issuesCloud computing legal issues
Cloud computing legal issues
 
What is business continuity planning-bcp
What is business continuity planning-bcpWhat is business continuity planning-bcp
What is business continuity planning-bcp
 
What is digital signature or DSC
What is digital signature or DSCWhat is digital signature or DSC
What is digital signature or DSC
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010Email crimes and IT Law-Nasscom cyber safe 2010
Email crimes and IT Law-Nasscom cyber safe 2010
 
Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010Email crimes and Cyber Law-Nasscom Cyber safe 2010
Email crimes and Cyber Law-Nasscom Cyber safe 2010
 
Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011Legal aspects of IT Security-at ISACA conference 2011
Legal aspects of IT Security-at ISACA conference 2011
 
Cloud computing and Law-India legal summit
Cloud computing and Law-India legal summitCloud computing and Law-India legal summit
Cloud computing and Law-India legal summit
 
Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011Cloud computing and law-India legal summit 2011
Cloud computing and law-India legal summit 2011
 
Legal aspects of IT security
Legal aspects of IT securityLegal aspects of IT security
Legal aspects of IT security
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Optimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through ObservabilityOptimizing NoSQL Performance Through Observability
Optimizing NoSQL Performance Through Observability
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

Cyber warfare Threat to Cyber Security by Prashant Mali

  • 1. CYBER WARFARE IS THE ULTIMATE THREAT TO CYBER SECURITY. WHAT DOES LAW SAY ABOUT IT ? ADV. PRASHANT MALI CYBER LAW & CYBER SECURITY EXPERT
  • 2. WHAT IS CYBER WARFARE? AS PEOPLE SAY • U.S. government security expert Richard A. Clarke, in his book Cyber War (May 2010), defines "cyberwarfare" as "actions by a nation-state to penetrate another nation's computers or networks for the purposes of causing damage or disruption." • The use of computing resources to intimidate, harm people, places or system we depend upon.
  • 3. WHAT IS CYBER WARFARE ? • Cyberwarfare is politically motivated hacking to conduct sabotage and espionage. It is a form of information warfare sometimes seen as analogous to conventional warfare.[1] ..Wikipidia
  • 4. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about Penetration of Networks
  • 5. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about defacing web sites
  • 6. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about DDoS attacks
  • 7. WHAT IS CYBER WARFARE ? • Cyber warfare is NOT about Malicious Software IT IS NOT EVEN CYBER TERRORISM OR CYBER ESPIONAGE
  • 8.
  • 9. WHY NOT MALICIOUS CODE OR TROJAN ? • It has an Expiry date.. Before a Vulnerability is patched or “Snowdens are Awakened “ • It has associated pressure to “use it” before you “lose it.” • If no cyber conflict Where to use so becomes Stale • Cannot distinguish Friends or allies, can boomerang
  • 10. WHY IT IS NOT CYBER TERRORISM ? • Cyberterrorism is the use of Internet based attacks in terrorist activities, including acts of deliberate, large-scale disruption of computer networks, especially of personal computers attached to the Internet, by the means of tools such as computer viruses. • Cyber Warfare is NOT About "Cyber-Enabling" Regular Terrorism
  • 11. WHAT IS CYBER WARFARE THEN ? Low-intensity persistent asymmetric economic cyber attacks, such as spam Let’s start by looking at spam.
  • 12. WHAT IS CYBER WARFARE THEN ? Cyber attacks on fundamental Internet protocols such as DNS (the domain name system) or BGP (the Internet’s wide area routing protocols)
  • 13. WHAT IS CYBER WARFARE THEN ? Kinetic ("physical") attacks on high value Internet “choke points” such as cable landing sites or Internet exchange points
  • 14. WHAT IS CYBER WARFARE THEN ? Operations conducted against critical civilian infrastructure such as industrial control systems (so-called “SCADA” systems)
  • 15. WHAT IS CYBER WARFARE THEN ? • Strategic high altitude strikes aimed at destroying or disrupting national infrastructure on a wide-scale through electromagnetic pulse (EMP) effects
  • 16. INTERNATIONAL LAW • Since the provisions of international agreements supersede the provisions for international cooperation, not only bilateral agreements but also multilateral agreements among nations must be signed. • UN Security Council should also focus on cyber terrorism threat. Most of the permanent members of the Council are also the most vulnerable and targeted countries in the world. • These countries also host most of the international cyber attacks. • A robust, international legal framework under UN that addresses cyber aggression is the most critical component of a comprehensive approach to deter cyber attack, much more critical than national offensive and defensive cyber capabilities. • International law and norms are fundamental to deterrence because states “share an interest in adopting or codifying common standards for the conduct of international transactions...or in promoting or banning specific kinds of behavior by” states. • In this way, international law builds the framework that guides how and when states employ offensive and defensive cyber capabilities and forms the foundation of cyber deterrence. International law adds certainty to punitive actions and amplifies the costs of cyber attack by engendering a negative response from the international community, not just from the attacked state
  • 17. INCIDENTS • On 21 November 2011, it was widely reported in the U.S. media that a hacker had destroyed a water pump at the Curran-Gardner Township Public Water District in Illinois. However, it later turned out that this information was not only false, but had been inappropriately leaked from the Illinois Statewide Terrorism and Intelligence Center. • On 6 October 2011, it was announced that Creech AFB's drone and Predator fleet's command and control data stream has been key logged, resisting all attempts to reverse the exploit, for the past two weeks.The Air Force issued a statement that the virus had "posed no threat to our operational mission". • In July 2011, the South Korean company SK Communications was hacked, resulting in the theft of the personal details (including names, phone numbers, home and email addresses and resident registration numbers) of up to 35 million people. A trojaned software update was used to gain access to the SK Communications network. Links exist between this hack and other malicious activity and it is believed to be part of a broader, concerted hacking effort. • Operation Shady RAT is an ongoing series of cyber attacks starting mid-2006, reported by Internet security company McAfee in August 2011. The attacks have hit at least 72 organizations including governments and defense contractors.
  • 18. INCIDENTS • On 4 December 2010, a group calling itself the Pakistan Cyber Army hacked the website of India's top investigating agency, the Central Bureau of Investigation (CBI). The National Informatics Center (NIC) has begun an inquiry. • On 26 November 2010, a group calling itself the Indian Cyber Army hacked the websites belonging to the Pakistan Army and the others belong to different ministries, including the Ministry of Foreign Affairs, Ministry of Education, Ministry of Finance, Pakistan Computer Bureau, Council of Islamic Ideology, etc. The attack was done as a revenge for the Mumbai terrorist attacks. • In October 2010, Iain Lobban, the director of the Government Communications Headquarters (GCHQ), said Britain faces a "real and credible" threat from cyber attacks by hostile states and criminals and government systems are targeted 1,000 times each month, such attacks threatened Britain's economic future, and some countries were already using cyber assaults to put pressure on other nations. • In September 2010, Iran was attacked by the Stuxnet worm, thought to specifically target its Natanz nuclear enrichment facility. The worm is said to be the most advanced piece of malware ever discovered and significantly increases the profile of cyberwarfare. • In July 2009, there were a series of coordinated denial of service attacks against major government, news media, and financial websites in South Korea and the United States. While many thought the attack was directed by North Korea, one researcher traced the attacks to the United Kingdom.
  • 19. INCIDENTS • Russian, South Ossetian, Georgian and Azerbaijani sites were attacked by hackers during the 2008 South Ossetia War. • In 2007 the website of the Kyrgyz Central Election Commission was defaced during its election. The message left on the website read "This site has been hacked by Dream of Estonian organization". During the election campaigns and riots preceding the election, there were cases of Denial-of-service attacks against the Kyrgyz ISPs. • In September 2007, Israel carried out an airstrike on Syria dubbed Operation Orchard. U.S. industry and military sources speculated that the Israelis may have used cyber warfare to allow their planes to pass undetected by radar into Syria. • In April 2007, Estonia came under cyber attack in the wake of relocation of the Bronze Soldier of Tallinn. The largest part of the attacks were coming from Russia and from official servers of the authorities of Russia. In the attack, ministries, banks, and media were targeted.
  • 20. EFFORTS AT PROHIBITION • The Shanghai Cooperation Organization (members of which include China and Russia) defines cyberwar to include dissemination of information "harmful to the spiritual, moral and cultural spheres of other states". • In September 2011, these countries proposed to the UN Secretary General a document called "International code of conduct for information security". • The approach was not endorsed by western countries as it entailed too many hints on political censorship of the internet. • In contrast, the United States' approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. • In June 2013, Barack Obama and Vladimir Putin agreed to install a secure Cyberwar-Hotline providing "a direct secure voice communications line between the US cybersecurity coordinator and the Russian deputy secretary of the security council, should there be a need to directly manage a crisis situation arising from an ICT security incident."
  • 21. THANK YOU Mobile:+919821763157 cyberlawconsulting@gmail.com www.prashantmali.com