SlideShare a Scribd company logo
RULES OF THE GAME
  IN CYBERWAR
        BY
   TALWANT SINGH
   ADDL. DISTT. & SESSIONS JUDGE: DELHI
RULES OF THE GAME IN CYBERWAR

• There is no precise definition of ‘Cyberwar’.
• The Shanghai Cooperation Organization (members
  include China and Russia) defines cyberwar to include
  dissemination of information harmful to the spiritual,
  moral and cultural spheres of other states.
• In contrast, the United States’ approach focuses on
  physical and economic damage and injury, putting
  political concerns under freedom of speech.
• This difference of opinion has led to reluctance among
  Nations to pursue global cyber arms control
  agreements.
RULES OF THE GAME IN CYBERWAR

• A Ukrainian Professor of International Law,
  Alexander Merezhko, has developed a project
  called the International Convention on
  Prohibition of Cyberwar in Internet.
• According to this project, cyberwar is defined as
  the use of internet and related technological
  means by one state against political, economic,
  technological and information sovereignty and
  independence of any other state.
RULES OF THE GAME IN CYBERWAR

• The world needs cyber war "Rules of
  Engagement" to cope with potentially
  devastating cyber weapons.
• In the intermingled world of cyberspace, we
  may need to protect zones that run facilities
  such as hospitals or schools.
• Discriminating between military and civilian
  targets is more difficult in cyberspace, and may
  require protected, marked, domain names.
RULES OF THE GAME IN CYBERWAR

• Ambiguity about what constitutes cyber conflict
  is delaying international policy to deal with it,
  and that perhaps the idea of "peace" or "war" is
  too simple in the internet age when the world
  could find itself in a third, "other than war",
  mode.
• Ensuring security in cyberspace is vital to our
  national security, our well being and our
  prosperity.
• Without it we can't have the economy we aspire
  to have.
RULES OF THE GAME IN CYBERWAR

• Cyber weapons have attributes not previously
  seen with traditional weapons, nor considered
  during the development of the current Laws of
  War.
• Cyber weapons can deliver, in the blink of an
  eye, wild viral behaviors that are easily
  reproduced and transferred, while lacking target
  discrimination.
RULES OF THE GAME IN CYBERWAR

• The nature of cyber space, with its ease of
  anonymity and use of proxies, makes the
  attribution of any attack very difficult. This
  raises the question of proportionality.
• How strongly should a state respond to an
  attack when you do not know who did it, where
  they did it from or what the intention was? In
  conventional military terms these questions are
  easier to answer - not so in the cyber world.
RULES OF THE GAME IN CYBERWAR

• Capabilities which currently exist include turning
  off power grids, disrupting water supplies and
  manufacturing systems.
• Countries should exchange strategies and
  information to build confidence over the long
  term, so one never gets to the point of a cyber
  conflict or even a larger conflict.
• Any such agreement remains a distant prospect
  because nations lack common legal standards
  in cyberspace and information security is
  closely connected with national interests.
RULES OF THE GAME IN CYBERWAR

• The infamous Stuxnet worm was blamed for
  infecting industrial control systems and
  sabotaging centrifuges at controversial Iranian
  nuclear facilities.
• Some have described this malware as the
  world's first cyber-weapon though cyber-
  espionage in many guises has undoubtedly
  been practiced by intelligence agencies across
  the world for many years.
RULES OF THE GAME IN CYBERWAR

• Computer systems underpin the delivery of essential
  services, including utilities and telecoms and well as
  banking and government services.
• Although attacks against various critical systems are
  commonplace they tend to be low level information-
  stealing or denial of service exploits.
• Cyberwar risks are all too real and illustrated by the
  denial of services attacks that blitzed Estonia off the
  web and the Operation Aurora assaults against
  Google and other high-tech firms.
RULES OF THE GAME IN CYBERWAR

• The cyberwar lexicon is especially confusing
  because it remains immature.
• For example, there is no agreed definition of
  what constitutes a cyber attack on a nation or a
  breach of sovereignty.
• Often theft, espionage, reconnaissance or even
  simple hacking is described as a cyber attack.
RULES OF THE GAME IN CYBERWAR

• National and international laws, regulations,
  and enforcement are still struggling to catch up
  to cyber activities worldwide.
• Rules, protocols, and standards are few and
  disconnected, often conflicting with each other.
• In most cases, laws have not kept pace with the
  technical ability of an adversary to move rapidly
  through national, academic, commercial, and
  private internet service providers.
RULES OF THE GAME IN CYBERWAR

• Protection of strategic-crucial infrastructure and
  vital information for national security is of
  utmost importance.
• The rules of cyberwar, once adopted, will help
  to define conditions in which the armed forces
  can go on the offensive against cyber threats
  and decide what specific actions it can take.
• The laws of land warfare and law of armed
  conflict apply to cyberspace.
RULES OF THE GAME IN CYBERWAR

• Nation states, non-nation state actors and
  hacker groups are creating tools that are
  increasingly more persistent & threatening, and
  armed forces have to be ready for that.
• Rules of Cyberwar must determine what
  represents a reasonable & proportional
  response to a cyber attack as the law of armed
  conflict authorizes a reasonable, proportional
  defense against a physical attack from another
  country.
RULES OF THE GAME IN CYBERWAR

• It remains unclear if the response to cyber
  attack includes authority to shut down a
  computer network, even if it’s been taken over
  by a malicious cyber attacker with intention to
  destroy it.
• If it does, also left unanswered so far is who
  would have that authority: the Ministry of IT, the
  CBI, the military, the Cert-In, the internet
  service provider or any other entity.
RULES OF THE GAME IN CYBERWAR

• American “kill switch bill": on June 19, 2010, US
  Senator Joe Lieberman introduced a bill called
  “Protecting Cyberspace as a National Asset Act
  of 2010“, which he co-wrote with senator Susan
  Collins and senator Thomas Carper.
• If signed into law, this controversial bill, which
  the American media dubbed the “kill switch bill”,
  would grant the President emergency powers
  over parts of the internet.
RULES OF THE GAME IN CYBERWAR



            THANKS

     TALWANT SINGH
       ADDL. DISTT. & SESSIONS JUDGE
              NEW DELHI (INDIA)
             talwant@yahoo.com

More Related Content

What's hot

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
Sai praveen Seva
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
zapp0
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
tnwac
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Esam Abulkhirat
 
Cyberware
CyberwareCyberware
Cyberware
Ensar Seker
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
EnclaveSecurity
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi
 
English presentation
English presentationEnglish presentation
English presentationGinaSoler10
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
sherrysher82
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
shaympariyar
 
About cyber war
About cyber warAbout cyber war
About cyber war
eugenvaleriu
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
Digicomp Academy AG
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
Shojan Jacob
 

What's hot (20)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
English presentation
English presentationEnglish presentation
English presentation
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 

Viewers also liked

All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
shiva rajan
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
shiva rajan
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005chithra venkatesan
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 
Justice of peace
Justice of peaceJustice of peace
At&t v saudi cable case
At&t v saudi cable caseAt&t v saudi cable case
At&t v saudi cable case
Judicial Intellects Academy
 

Viewers also liked (6)

All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
Justice of peace
Justice of peaceJustice of peace
Justice of peace
 
At&t v saudi cable case
At&t v saudi cable caseAt&t v saudi cable case
At&t v saudi cable case
 

Similar to RULES OF THE GAME IN CYBERWAR

Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
David Opderbeck
 
C3 Cyber
C3 CyberC3 Cyber
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
Boston Global Forum
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
dondiw
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
Amit Anand
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
ArjunKumar684595
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
Gaurav Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
Pukhraj Singh
 
Cybercrime
CybercrimeCybercrime
Cybercrime
SERCOD
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Dr.S.Jagadeesh Kumar
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
utkarshjani
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
Udaysharma3
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
AFCEA International
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpower
Noelle Cowling
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
Charles Mok
 
Cyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern eraCyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern era
Bhadra Thakuri
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
Chuck Brooks
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Pukhraj Singh
 

Similar to RULES OF THE GAME IN CYBERWAR (20)

Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpower
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern eraCyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern era
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 

More from Talwant Singh

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
Talwant Singh
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
Talwant Singh
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
Talwant Singh
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
Talwant Singh
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
Talwant Singh
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
Talwant Singh
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
Talwant Singh
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
Talwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
Talwant Singh
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
Talwant Singh
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
Talwant Singh
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
Talwant Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
Talwant Singh
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
Talwant Singh
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
Talwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
Talwant Singh
 

More from Talwant Singh (18)

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 

Recently uploaded

MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
Israel Genealogy Research Association
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
Bisnar Chase Personal Injury Attorneys
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
ArianaBusciglio
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 

Recently uploaded (20)

MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collectionThe Diamonds of 2023-2024 in the IGRA collection
The Diamonds of 2023-2024 in the IGRA collection
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Top five deadliest dog breeds in America
Top five deadliest dog breeds in AmericaTop five deadliest dog breeds in America
Top five deadliest dog breeds in America
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Group Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana BuscigliopptxGroup Presentation 2 Economics.Ariana Buscigliopptx
Group Presentation 2 Economics.Ariana Buscigliopptx
 
Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 

RULES OF THE GAME IN CYBERWAR

  • 1. RULES OF THE GAME IN CYBERWAR BY TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE: DELHI
  • 2. RULES OF THE GAME IN CYBERWAR • There is no precise definition of ‘Cyberwar’. • The Shanghai Cooperation Organization (members include China and Russia) defines cyberwar to include dissemination of information harmful to the spiritual, moral and cultural spheres of other states. • In contrast, the United States’ approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. • This difference of opinion has led to reluctance among Nations to pursue global cyber arms control agreements.
  • 3. RULES OF THE GAME IN CYBERWAR • A Ukrainian Professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. • According to this project, cyberwar is defined as the use of internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state.
  • 4. RULES OF THE GAME IN CYBERWAR • The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons. • In the intermingled world of cyberspace, we may need to protect zones that run facilities such as hospitals or schools. • Discriminating between military and civilian targets is more difficult in cyberspace, and may require protected, marked, domain names.
  • 5. RULES OF THE GAME IN CYBERWAR • Ambiguity about what constitutes cyber conflict is delaying international policy to deal with it, and that perhaps the idea of "peace" or "war" is too simple in the internet age when the world could find itself in a third, "other than war", mode. • Ensuring security in cyberspace is vital to our national security, our well being and our prosperity. • Without it we can't have the economy we aspire to have.
  • 6. RULES OF THE GAME IN CYBERWAR • Cyber weapons have attributes not previously seen with traditional weapons, nor considered during the development of the current Laws of War. • Cyber weapons can deliver, in the blink of an eye, wild viral behaviors that are easily reproduced and transferred, while lacking target discrimination.
  • 7. RULES OF THE GAME IN CYBERWAR • The nature of cyber space, with its ease of anonymity and use of proxies, makes the attribution of any attack very difficult. This raises the question of proportionality. • How strongly should a state respond to an attack when you do not know who did it, where they did it from or what the intention was? In conventional military terms these questions are easier to answer - not so in the cyber world.
  • 8. RULES OF THE GAME IN CYBERWAR • Capabilities which currently exist include turning off power grids, disrupting water supplies and manufacturing systems. • Countries should exchange strategies and information to build confidence over the long term, so one never gets to the point of a cyber conflict or even a larger conflict. • Any such agreement remains a distant prospect because nations lack common legal standards in cyberspace and information security is closely connected with national interests.
  • 9. RULES OF THE GAME IN CYBERWAR • The infamous Stuxnet worm was blamed for infecting industrial control systems and sabotaging centrifuges at controversial Iranian nuclear facilities. • Some have described this malware as the world's first cyber-weapon though cyber- espionage in many guises has undoubtedly been practiced by intelligence agencies across the world for many years.
  • 10. RULES OF THE GAME IN CYBERWAR • Computer systems underpin the delivery of essential services, including utilities and telecoms and well as banking and government services. • Although attacks against various critical systems are commonplace they tend to be low level information- stealing or denial of service exploits. • Cyberwar risks are all too real and illustrated by the denial of services attacks that blitzed Estonia off the web and the Operation Aurora assaults against Google and other high-tech firms.
  • 11. RULES OF THE GAME IN CYBERWAR • The cyberwar lexicon is especially confusing because it remains immature. • For example, there is no agreed definition of what constitutes a cyber attack on a nation or a breach of sovereignty. • Often theft, espionage, reconnaissance or even simple hacking is described as a cyber attack.
  • 12. RULES OF THE GAME IN CYBERWAR • National and international laws, regulations, and enforcement are still struggling to catch up to cyber activities worldwide. • Rules, protocols, and standards are few and disconnected, often conflicting with each other. • In most cases, laws have not kept pace with the technical ability of an adversary to move rapidly through national, academic, commercial, and private internet service providers.
  • 13. RULES OF THE GAME IN CYBERWAR • Protection of strategic-crucial infrastructure and vital information for national security is of utmost importance. • The rules of cyberwar, once adopted, will help to define conditions in which the armed forces can go on the offensive against cyber threats and decide what specific actions it can take. • The laws of land warfare and law of armed conflict apply to cyberspace.
  • 14. RULES OF THE GAME IN CYBERWAR • Nation states, non-nation state actors and hacker groups are creating tools that are increasingly more persistent & threatening, and armed forces have to be ready for that. • Rules of Cyberwar must determine what represents a reasonable & proportional response to a cyber attack as the law of armed conflict authorizes a reasonable, proportional defense against a physical attack from another country.
  • 15. RULES OF THE GAME IN CYBERWAR • It remains unclear if the response to cyber attack includes authority to shut down a computer network, even if it’s been taken over by a malicious cyber attacker with intention to destroy it. • If it does, also left unanswered so far is who would have that authority: the Ministry of IT, the CBI, the military, the Cert-In, the internet service provider or any other entity.
  • 16. RULES OF THE GAME IN CYBERWAR • American “kill switch bill": on June 19, 2010, US Senator Joe Lieberman introduced a bill called “Protecting Cyberspace as a National Asset Act of 2010“, which he co-wrote with senator Susan Collins and senator Thomas Carper. • If signed into law, this controversial bill, which the American media dubbed the “kill switch bill”, would grant the President emergency powers over parts of the internet.
  • 17. RULES OF THE GAME IN CYBERWAR THANKS TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE NEW DELHI (INDIA) talwant@yahoo.com