SlideShare a Scribd company logo
1 of 16
BY
TALWANT SINGH
SPECIAL JUDGE-CBI
 NEW DELHI (INDIA)
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 There is no precise definition of „Cyberwar‟.
 The Shanghai Co-operation Organization (members
  include China and Russia) defines cyberwar to
  include dissemination of information harmful to the
  spiritual, moral and cultural spheres of other states.
 In contrast, the United States‟ approach focuses on
  physical and economic damage and injury, putting
  political concerns under freedom of speech.
 This difference of opinion has led to reluctance
  among Nations to pursue global cyber arms control
  agreements.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 A Ukrainian Professor of International Law,
  Alexander Merezhko, has developed a project
  called “The International Convention on
  Prohibition of Cyberwar in Internet”.
 According to this project, cyberwar is defined as
  the use of internet and related technological
  means by one state against political, economic,
  technological and information sovereignty and
  independence of any other state.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 The world needs cyber war "Rules of
  Engagement" to cope with potentially devastating
  cyber weapons.
 In the intermingled world of cyberspace, we may
  need to protect zones that run facilities such as
  hospitals or schools.
 Discriminating between military and civilian targets
  is more difficult in cyberspace, and may require
  protected, marked, domain names.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 Ambiguity about what constitutes cyber conflict is
  delaying international policy to deal with it, and
  that perhaps the idea of "peace" or "war" is too
  simple in the internet age when the world could
  find itself in a third, "other than war", mode.
 Ensuring security in cyberspace is vital to our
  national security, our well being and our prosperity.
 Without it we can't have the economy we aspire to
  have.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 Cyber weapons have attributes not previously
  seen with traditional weapons, nor considered
  during the development of the current Laws of
  War.
 Cyber weapons can deliver, in the blink of an eye,
  wild viral behaviors that are easily reproduced and
  transferred, while lacking target discrimination.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 The nature of cyber space, with its ease of
  anonymity and use of proxies, makes the
  attribution of any attack very difficult. This raises
  the question of proportionality.
 How strongly should a state respond to an attack
  when you do not know who did it, where they did it
  from or what the intention was? In conventional
  military terms these questions are easier to
  answer - not so in the cyber world.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 Capabilities which currently exist include turning
  off power grids, disrupting water supplies, financial
  systems and manufacturing facilities.
 Countries should exchange strategies and
  information to build confidence over the long term,
  so one never gets to the point of a cyber conflict or
  even a larger conflict.
 Any such agreement remains a distant prospect
  because nations lack common legal standards in
  cyberspace and information security is closely
  connected with national interests.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 The infamous Stuxnet worm was blamed for
  infecting industrial control systems and sabotaging
  centrifuges at controversial Iranian nuclear
  facilities.
 Some have described this malware as the world's
  first cyber-weapon though cyber-espionage in
  many guises has undoubtedly been practiced by
  intelligence agencies across the world for many
  years.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 Computer systems underpin the delivery of
  essential services, including utilities and telecoms
  and well as banking and government services.
 Although attacks against various critical systems
  are commonplace they tend to be low level
  information-stealing or denial of service exploits.
 Cyberwar risks are all too real and illustrated by
  the denial of services attacks that blitzed Estonia
  off the web and the Operation Aurora assaults
  against Google and other high-tech firms.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 The cyberwar lexicon is especially confusing
  because it remains immature.
 For example, there is no agreed definition of what
  constitutes a cyber attack on a nation or a breach
  of sovereignty.
 Often theft, espionage, reconnaissance or even
  simple hacking is described as a cyber attack.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 National and international laws, regulations, and
  enforcement are still struggling to catch up to
  cyber activities worldwide.
 Rules, protocols, and standards are few and
  disconnected, often conflicting with each other.
 In most cases, laws have not kept pace with the
  technical ability of an adversary to move rapidly
  through national, academic, commercial, and
  private internet service providers.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 Protection of strategic-crucial infrastructure and
  vital information for national security is of utmost
  importance.
 The rules of cyberwar, once adopted, will help to
  define conditions in which the armed forces can
  go on the offensive against cyber threats and
  decide what specific actions it can take.
 The laws of land warfare and law of armed conflict
  apply to cyberspace.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

 Nation states, non-nation state actors and hacker
  groups are creating tools that are increasingly
  more persistent & threatening, and armed forces
  have to be ready for that.
 Rules of Cyberwar must determine what
  represents a reasonable & proportional response
  to a cyber attack as the law of armed conflict
  authorizes a reasonable, proportional defense
  against a physical attack from another country.
CYBERWAR: THE NEXT THREAT TO NATIONAL
                  SECURITY

  It remains unclear if the response to cyber attack
  includes authority to shut down a computer
  network, even if it‟s been taken over by a
  malicious cyber attacker with intention to destroy
  it.
 If it does, also left unanswered so far is who would
  have that authority: the Ministry of IT, the CBI, the
  military, the Cert-In, the internet service provider
  or any other entity.
CYBERWAR: THE NEXT THREAT
   TO NATIONAL SECURITY


        THANKS

      TALWANT SINGH
        SPECIAL JUDGE CBI
            NEW DELHI
        talwant@yahoo.com

More Related Content

What's hot

Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in PakistanFahad Iqbal
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)Tughral Yamin
 
Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...
Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...
Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...Bryan Len
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingAPNIC
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)Siddharth Anand
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11Dr. Alok Yadav
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence WorkshopPriyanka Aash
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share104016032
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect usLuis Borges Gouveia
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPTashish kumar
 
10 terrorism
10 terrorism10 terrorism
10 terrorismfatima d
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFAndy Thompson
 
Cyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationCyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationDavid X Martin
 

What's hot (20)

Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in Pakistan
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
cyber security and impact on national security (3)
cyber security and impact on national security (3)cyber security and impact on national security (3)
cyber security and impact on national security (3)
 
Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...
Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...
Signals Intelligence (SIGINT), Communications Intelligence (COMINT)Training C...
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
PacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto JackingPacNOG 23: Introduction to Crypto Jacking
PacNOG 23: Introduction to Crypto Jacking
 
CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)CYBER CRIME( DU PRESENTATION FOR FYUP)
CYBER CRIME( DU PRESENTATION FOR FYUP)
 
Information warfare.11
Information warfare.11Information warfare.11
Information warfare.11
 
Threat Intelligence Workshop
Threat Intelligence WorkshopThreat Intelligence Workshop
Threat Intelligence Workshop
 
Non kinetic warfare share
Non kinetic warfare shareNon kinetic warfare share
Non kinetic warfare share
 
The Information Warfare: how it can affect us
The Information Warfare: how it can affect usThe Information Warfare: how it can affect us
The Information Warfare: how it can affect us
 
Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Cyber Security PPT
Cyber Security PPTCyber Security PPT
Cyber Security PPT
 
10 terrorism
10 terrorism10 terrorism
10 terrorism
 
Ransomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDFRansomware: History, Analysis, & Mitigation - PDF
Ransomware: History, Analysis, & Mitigation - PDF
 
Cyber Crime
Cyber Crime Cyber Crime
Cyber Crime
 
Cyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantificationCyber risk management and the benefits of quantification
Cyber risk management and the benefits of quantification
 
Information Warfare
Information WarfareInformation Warfare
Information Warfare
 

Viewers also liked

National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implicationsrajaram.muthukrishnan
 
Climate Change and the Threat to National Security
Climate Change and the Threat to National Security Climate Change and the Threat to National Security
Climate Change and the Threat to National Security American Security Project
 
Chap 5 online security and payment systems
Chap 5   online security and payment systemsChap 5   online security and payment systems
Chap 5 online security and payment systemsNorisuwanah Jaffar
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
CenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III Solution
CenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III SolutionCenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III Solution
CenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III Solution3D Merchant powered by CenPOS
 
Online Security and Payment System - PayPal
Online Security and Payment System - PayPalOnline Security and Payment System - PayPal
Online Security and Payment System - PayPalgaschan
 
Threats to national security
Threats to national securityThreats to national security
Threats to national securityJoann Villareal
 
electronic bill payment and presentment
electronic bill payment and presentmentelectronic bill payment and presentment
electronic bill payment and presentmenttejinderubs
 
E commerce security
E commerce securityE commerce security
E commerce securityShakti Singh
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commercem8817
 

Viewers also liked (11)

National Security & National Interests – Implications
National Security & National Interests – ImplicationsNational Security & National Interests – Implications
National Security & National Interests – Implications
 
Climate Change and the Threat to National Security
Climate Change and the Threat to National Security Climate Change and the Threat to National Security
Climate Change and the Threat to National Security
 
Chap 5 online security and payment systems
Chap 5   online security and payment systemsChap 5   online security and payment systems
Chap 5 online security and payment systems
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
CenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III Solution
CenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III SolutionCenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III Solution
CenPOS EBPP Electronic Bill Presentment & Payment Enterprise Level III Solution
 
Online Security and Payment System - PayPal
Online Security and Payment System - PayPalOnline Security and Payment System - PayPal
Online Security and Payment System - PayPal
 
ibm
ibmibm
ibm
 
Threats to national security
Threats to national securityThreats to national security
Threats to national security
 
electronic bill payment and presentment
electronic bill payment and presentmentelectronic bill payment and presentment
electronic bill payment and presentment
 
E commerce security
E commerce securityE commerce security
E commerce security
 
Security in E-commerce
Security in E-commerceSecurity in E-commerce
Security in E-commerce
 

Similar to Cyberwar Rules Needed to Protect National Security

RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARTalwant Singh
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalLeslie Lee
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonEljay Robertson
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...Ben Griffith
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017NgocHaBui1
 

Similar to Cyberwar Rules Needed to Protect National Security (20)

RULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWARRULES OF THE GAME IN CYBERWAR
RULES OF THE GAME IN CYBERWAR
 
114-116
114-116114-116
114-116
 
The Hacked World Order By Adam Segal
The Hacked World Order By Adam SegalThe Hacked World Order By Adam Segal
The Hacked World Order By Adam Segal
 
Securing Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay RobertsonSecuring Cyber Space- Eljay Robertson
Securing Cyber Space- Eljay Robertson
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
Cyber-Law and Cyber-Crime
Cyber-Law and Cyber-CrimeCyber-Law and Cyber-Crime
Cyber-Law and Cyber-Crime
 
Cyber law and cyber-crime
Cyber law and cyber-crimeCyber law and cyber-crime
Cyber law and cyber-crime
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...Hacking Municipal Government  Best Practices for Protection of  Sensitive Loc...
Hacking Municipal Government Best Practices for Protection of Sensitive Loc...
 
Honeypots in Cyberwar
Honeypots in CyberwarHoneypots in Cyberwar
Honeypots in Cyberwar
 
Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017Cyberdefense strategy - Boston Global Forum - 2017
Cyberdefense strategy - Boston Global Forum - 2017
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 

More from Talwant Singh

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in CourtsTalwant Singh
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in JudiciaryTalwant Singh
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road MapTalwant Singh
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemTalwant Singh
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An IntroductionTalwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICTTalwant Singh
 

More from Talwant Singh (19)

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 

Cyberwar Rules Needed to Protect National Security

  • 2. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  There is no precise definition of „Cyberwar‟.  The Shanghai Co-operation Organization (members include China and Russia) defines cyberwar to include dissemination of information harmful to the spiritual, moral and cultural spheres of other states.  In contrast, the United States‟ approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech.  This difference of opinion has led to reluctance among Nations to pursue global cyber arms control agreements.
  • 3. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  A Ukrainian Professor of International Law, Alexander Merezhko, has developed a project called “The International Convention on Prohibition of Cyberwar in Internet”.  According to this project, cyberwar is defined as the use of internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state.
  • 4. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons.  In the intermingled world of cyberspace, we may need to protect zones that run facilities such as hospitals or schools.  Discriminating between military and civilian targets is more difficult in cyberspace, and may require protected, marked, domain names.
  • 5. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  Ambiguity about what constitutes cyber conflict is delaying international policy to deal with it, and that perhaps the idea of "peace" or "war" is too simple in the internet age when the world could find itself in a third, "other than war", mode.  Ensuring security in cyberspace is vital to our national security, our well being and our prosperity.  Without it we can't have the economy we aspire to have.
  • 6. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  Cyber weapons have attributes not previously seen with traditional weapons, nor considered during the development of the current Laws of War.  Cyber weapons can deliver, in the blink of an eye, wild viral behaviors that are easily reproduced and transferred, while lacking target discrimination.
  • 7. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  The nature of cyber space, with its ease of anonymity and use of proxies, makes the attribution of any attack very difficult. This raises the question of proportionality.  How strongly should a state respond to an attack when you do not know who did it, where they did it from or what the intention was? In conventional military terms these questions are easier to answer - not so in the cyber world.
  • 8. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  Capabilities which currently exist include turning off power grids, disrupting water supplies, financial systems and manufacturing facilities.  Countries should exchange strategies and information to build confidence over the long term, so one never gets to the point of a cyber conflict or even a larger conflict.  Any such agreement remains a distant prospect because nations lack common legal standards in cyberspace and information security is closely connected with national interests.
  • 9. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  The infamous Stuxnet worm was blamed for infecting industrial control systems and sabotaging centrifuges at controversial Iranian nuclear facilities.  Some have described this malware as the world's first cyber-weapon though cyber-espionage in many guises has undoubtedly been practiced by intelligence agencies across the world for many years.
  • 10. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  Computer systems underpin the delivery of essential services, including utilities and telecoms and well as banking and government services.  Although attacks against various critical systems are commonplace they tend to be low level information-stealing or denial of service exploits.  Cyberwar risks are all too real and illustrated by the denial of services attacks that blitzed Estonia off the web and the Operation Aurora assaults against Google and other high-tech firms.
  • 11. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  The cyberwar lexicon is especially confusing because it remains immature.  For example, there is no agreed definition of what constitutes a cyber attack on a nation or a breach of sovereignty.  Often theft, espionage, reconnaissance or even simple hacking is described as a cyber attack.
  • 12. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  National and international laws, regulations, and enforcement are still struggling to catch up to cyber activities worldwide.  Rules, protocols, and standards are few and disconnected, often conflicting with each other.  In most cases, laws have not kept pace with the technical ability of an adversary to move rapidly through national, academic, commercial, and private internet service providers.
  • 13. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  Protection of strategic-crucial infrastructure and vital information for national security is of utmost importance.  The rules of cyberwar, once adopted, will help to define conditions in which the armed forces can go on the offensive against cyber threats and decide what specific actions it can take.  The laws of land warfare and law of armed conflict apply to cyberspace.
  • 14. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  Nation states, non-nation state actors and hacker groups are creating tools that are increasingly more persistent & threatening, and armed forces have to be ready for that.  Rules of Cyberwar must determine what represents a reasonable & proportional response to a cyber attack as the law of armed conflict authorizes a reasonable, proportional defense against a physical attack from another country.
  • 15. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY  It remains unclear if the response to cyber attack includes authority to shut down a computer network, even if it‟s been taken over by a malicious cyber attacker with intention to destroy it.  If it does, also left unanswered so far is who would have that authority: the Ministry of IT, the CBI, the military, the Cert-In, the internet service provider or any other entity.
  • 16. CYBERWAR: THE NEXT THREAT TO NATIONAL SECURITY THANKS TALWANT SINGH SPECIAL JUDGE CBI NEW DELHI talwant@yahoo.com