SlideShare una empresa de Scribd logo
1 de 17
Descargar para leer sin conexión
RULES OF THE GAME
  IN CYBERWAR
        BY
   TALWANT SINGH
   ADDL. DISTT. & SESSIONS JUDGE: DELHI
RULES OF THE GAME IN CYBERWAR

• There is no precise definition of ‘Cyberwar’.
• The Shanghai Cooperation Organization (members
  include China and Russia) defines cyberwar to include
  dissemination of information harmful to the spiritual,
  moral and cultural spheres of other states.
• In contrast, the United States’ approach focuses on
  physical and economic damage and injury, putting
  political concerns under freedom of speech.
• This difference of opinion has led to reluctance among
  Nations to pursue global cyber arms control
  agreements.
RULES OF THE GAME IN CYBERWAR

• A Ukrainian Professor of International Law,
  Alexander Merezhko, has developed a project
  called the International Convention on
  Prohibition of Cyberwar in Internet.
• According to this project, cyberwar is defined as
  the use of internet and related technological
  means by one state against political, economic,
  technological and information sovereignty and
  independence of any other state.
RULES OF THE GAME IN CYBERWAR

• The world needs cyber war "Rules of
  Engagement" to cope with potentially
  devastating cyber weapons.
• In the intermingled world of cyberspace, we
  may need to protect zones that run facilities
  such as hospitals or schools.
• Discriminating between military and civilian
  targets is more difficult in cyberspace, and may
  require protected, marked, domain names.
RULES OF THE GAME IN CYBERWAR

• Ambiguity about what constitutes cyber conflict
  is delaying international policy to deal with it,
  and that perhaps the idea of "peace" or "war" is
  too simple in the internet age when the world
  could find itself in a third, "other than war",
  mode.
• Ensuring security in cyberspace is vital to our
  national security, our well being and our
  prosperity.
• Without it we can't have the economy we aspire
  to have.
RULES OF THE GAME IN CYBERWAR

• Cyber weapons have attributes not previously
  seen with traditional weapons, nor considered
  during the development of the current Laws of
  War.
• Cyber weapons can deliver, in the blink of an
  eye, wild viral behaviors that are easily
  reproduced and transferred, while lacking target
  discrimination.
RULES OF THE GAME IN CYBERWAR

• The nature of cyber space, with its ease of
  anonymity and use of proxies, makes the
  attribution of any attack very difficult. This
  raises the question of proportionality.
• How strongly should a state respond to an
  attack when you do not know who did it, where
  they did it from or what the intention was? In
  conventional military terms these questions are
  easier to answer - not so in the cyber world.
RULES OF THE GAME IN CYBERWAR

• Capabilities which currently exist include turning
  off power grids, disrupting water supplies and
  manufacturing systems.
• Countries should exchange strategies and
  information to build confidence over the long
  term, so one never gets to the point of a cyber
  conflict or even a larger conflict.
• Any such agreement remains a distant prospect
  because nations lack common legal standards
  in cyberspace and information security is
  closely connected with national interests.
RULES OF THE GAME IN CYBERWAR

• The infamous Stuxnet worm was blamed for
  infecting industrial control systems and
  sabotaging centrifuges at controversial Iranian
  nuclear facilities.
• Some have described this malware as the
  world's first cyber-weapon though cyber-
  espionage in many guises has undoubtedly
  been practiced by intelligence agencies across
  the world for many years.
RULES OF THE GAME IN CYBERWAR

• Computer systems underpin the delivery of essential
  services, including utilities and telecoms and well as
  banking and government services.
• Although attacks against various critical systems are
  commonplace they tend to be low level information-
  stealing or denial of service exploits.
• Cyberwar risks are all too real and illustrated by the
  denial of services attacks that blitzed Estonia off the
  web and the Operation Aurora assaults against
  Google and other high-tech firms.
RULES OF THE GAME IN CYBERWAR

• The cyberwar lexicon is especially confusing
  because it remains immature.
• For example, there is no agreed definition of
  what constitutes a cyber attack on a nation or a
  breach of sovereignty.
• Often theft, espionage, reconnaissance or even
  simple hacking is described as a cyber attack.
RULES OF THE GAME IN CYBERWAR

• National and international laws, regulations,
  and enforcement are still struggling to catch up
  to cyber activities worldwide.
• Rules, protocols, and standards are few and
  disconnected, often conflicting with each other.
• In most cases, laws have not kept pace with the
  technical ability of an adversary to move rapidly
  through national, academic, commercial, and
  private internet service providers.
RULES OF THE GAME IN CYBERWAR

• Protection of strategic-crucial infrastructure and
  vital information for national security is of
  utmost importance.
• The rules of cyberwar, once adopted, will help
  to define conditions in which the armed forces
  can go on the offensive against cyber threats
  and decide what specific actions it can take.
• The laws of land warfare and law of armed
  conflict apply to cyberspace.
RULES OF THE GAME IN CYBERWAR

• Nation states, non-nation state actors and
  hacker groups are creating tools that are
  increasingly more persistent & threatening, and
  armed forces have to be ready for that.
• Rules of Cyberwar must determine what
  represents a reasonable & proportional
  response to a cyber attack as the law of armed
  conflict authorizes a reasonable, proportional
  defense against a physical attack from another
  country.
RULES OF THE GAME IN CYBERWAR

• It remains unclear if the response to cyber
  attack includes authority to shut down a
  computer network, even if it’s been taken over
  by a malicious cyber attacker with intention to
  destroy it.
• If it does, also left unanswered so far is who
  would have that authority: the Ministry of IT, the
  CBI, the military, the Cert-In, the internet
  service provider or any other entity.
RULES OF THE GAME IN CYBERWAR

• American “kill switch bill": on June 19, 2010, US
  Senator Joe Lieberman introduced a bill called
  “Protecting Cyberspace as a National Asset Act
  of 2010“, which he co-wrote with senator Susan
  Collins and senator Thomas Carper.
• If signed into law, this controversial bill, which
  the American media dubbed the “kill switch bill”,
  would grant the President emergency powers
  over parts of the internet.
RULES OF THE GAME IN CYBERWAR



            THANKS

     TALWANT SINGH
       ADDL. DISTT. & SESSIONS JUDGE
              NEW DELHI (INDIA)
             talwant@yahoo.com

Más contenido relacionado

La actualidad más candente

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?zapp0
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
English presentation
English presentationEnglish presentation
English presentationGinaSoler10
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 

La actualidad más candente (20)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
English presentation
English presentationEnglish presentation
English presentation
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 

Destacado

All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...shiva rajan
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Miningshiva rajan
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005chithra venkatesan
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 

Destacado (6)

All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
Justice of peace
Justice of peaceJustice of peace
Justice of peace
 
At&t v saudi cable case
At&t v saudi cable caseAt&t v saudi cable case
At&t v saudi cable case
 

Similar a RULES OF THE GAME IN CYBERWAR

Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpowerNoelle Cowling
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 
Cyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern eraCyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern eraBhadra Thakuri
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Chuck Brooks
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghPukhraj Singh
 

Similar a RULES OF THE GAME IN CYBERWAR (20)

Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpower
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 
Cyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern eraCyber power affects war outcomes in modern era
Cyber power affects war outcomes in modern era
 
Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...Event: George Washington University -- National Security Threat Convergence: ...
Event: George Washington University -- National Security Threat Convergence: ...
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Understanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj SinghUnderstanding the 'physics' of cyber-operations - Pukhraj Singh
Understanding the 'physics' of cyber-operations - Pukhraj Singh
 

Más de Talwant Singh

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in CourtsTalwant Singh
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in JudiciaryTalwant Singh
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road MapTalwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemTalwant Singh
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An IntroductionTalwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICTTalwant Singh
 

Más de Talwant Singh (18)

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 

Último

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 

Último (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 

RULES OF THE GAME IN CYBERWAR

  • 1. RULES OF THE GAME IN CYBERWAR BY TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE: DELHI
  • 2. RULES OF THE GAME IN CYBERWAR • There is no precise definition of ‘Cyberwar’. • The Shanghai Cooperation Organization (members include China and Russia) defines cyberwar to include dissemination of information harmful to the spiritual, moral and cultural spheres of other states. • In contrast, the United States’ approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. • This difference of opinion has led to reluctance among Nations to pursue global cyber arms control agreements.
  • 3. RULES OF THE GAME IN CYBERWAR • A Ukrainian Professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. • According to this project, cyberwar is defined as the use of internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state.
  • 4. RULES OF THE GAME IN CYBERWAR • The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons. • In the intermingled world of cyberspace, we may need to protect zones that run facilities such as hospitals or schools. • Discriminating between military and civilian targets is more difficult in cyberspace, and may require protected, marked, domain names.
  • 5. RULES OF THE GAME IN CYBERWAR • Ambiguity about what constitutes cyber conflict is delaying international policy to deal with it, and that perhaps the idea of "peace" or "war" is too simple in the internet age when the world could find itself in a third, "other than war", mode. • Ensuring security in cyberspace is vital to our national security, our well being and our prosperity. • Without it we can't have the economy we aspire to have.
  • 6. RULES OF THE GAME IN CYBERWAR • Cyber weapons have attributes not previously seen with traditional weapons, nor considered during the development of the current Laws of War. • Cyber weapons can deliver, in the blink of an eye, wild viral behaviors that are easily reproduced and transferred, while lacking target discrimination.
  • 7. RULES OF THE GAME IN CYBERWAR • The nature of cyber space, with its ease of anonymity and use of proxies, makes the attribution of any attack very difficult. This raises the question of proportionality. • How strongly should a state respond to an attack when you do not know who did it, where they did it from or what the intention was? In conventional military terms these questions are easier to answer - not so in the cyber world.
  • 8. RULES OF THE GAME IN CYBERWAR • Capabilities which currently exist include turning off power grids, disrupting water supplies and manufacturing systems. • Countries should exchange strategies and information to build confidence over the long term, so one never gets to the point of a cyber conflict or even a larger conflict. • Any such agreement remains a distant prospect because nations lack common legal standards in cyberspace and information security is closely connected with national interests.
  • 9. RULES OF THE GAME IN CYBERWAR • The infamous Stuxnet worm was blamed for infecting industrial control systems and sabotaging centrifuges at controversial Iranian nuclear facilities. • Some have described this malware as the world's first cyber-weapon though cyber- espionage in many guises has undoubtedly been practiced by intelligence agencies across the world for many years.
  • 10. RULES OF THE GAME IN CYBERWAR • Computer systems underpin the delivery of essential services, including utilities and telecoms and well as banking and government services. • Although attacks against various critical systems are commonplace they tend to be low level information- stealing or denial of service exploits. • Cyberwar risks are all too real and illustrated by the denial of services attacks that blitzed Estonia off the web and the Operation Aurora assaults against Google and other high-tech firms.
  • 11. RULES OF THE GAME IN CYBERWAR • The cyberwar lexicon is especially confusing because it remains immature. • For example, there is no agreed definition of what constitutes a cyber attack on a nation or a breach of sovereignty. • Often theft, espionage, reconnaissance or even simple hacking is described as a cyber attack.
  • 12. RULES OF THE GAME IN CYBERWAR • National and international laws, regulations, and enforcement are still struggling to catch up to cyber activities worldwide. • Rules, protocols, and standards are few and disconnected, often conflicting with each other. • In most cases, laws have not kept pace with the technical ability of an adversary to move rapidly through national, academic, commercial, and private internet service providers.
  • 13. RULES OF THE GAME IN CYBERWAR • Protection of strategic-crucial infrastructure and vital information for national security is of utmost importance. • The rules of cyberwar, once adopted, will help to define conditions in which the armed forces can go on the offensive against cyber threats and decide what specific actions it can take. • The laws of land warfare and law of armed conflict apply to cyberspace.
  • 14. RULES OF THE GAME IN CYBERWAR • Nation states, non-nation state actors and hacker groups are creating tools that are increasingly more persistent & threatening, and armed forces have to be ready for that. • Rules of Cyberwar must determine what represents a reasonable & proportional response to a cyber attack as the law of armed conflict authorizes a reasonable, proportional defense against a physical attack from another country.
  • 15. RULES OF THE GAME IN CYBERWAR • It remains unclear if the response to cyber attack includes authority to shut down a computer network, even if it’s been taken over by a malicious cyber attacker with intention to destroy it. • If it does, also left unanswered so far is who would have that authority: the Ministry of IT, the CBI, the military, the Cert-In, the internet service provider or any other entity.
  • 16. RULES OF THE GAME IN CYBERWAR • American “kill switch bill": on June 19, 2010, US Senator Joe Lieberman introduced a bill called “Protecting Cyberspace as a National Asset Act of 2010“, which he co-wrote with senator Susan Collins and senator Thomas Carper. • If signed into law, this controversial bill, which the American media dubbed the “kill switch bill”, would grant the President emergency powers over parts of the internet.
  • 17. RULES OF THE GAME IN CYBERWAR THANKS TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE NEW DELHI (INDIA) talwant@yahoo.com