SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
RULES OF THE GAME
  IN CYBERWAR
        BY
   TALWANT SINGH
   ADDL. DISTT. & SESSIONS JUDGE: DELHI
RULES OF THE GAME IN CYBERWAR

• There is no precise definition of ‘Cyberwar’.
• The Shanghai Cooperation Organization (members
  include China and Russia) defines cyberwar to include
  dissemination of information harmful to the spiritual,
  moral and cultural spheres of other states.
• In contrast, the United States’ approach focuses on
  physical and economic damage and injury, putting
  political concerns under freedom of speech.
• This difference of opinion has led to reluctance among
  Nations to pursue global cyber arms control
  agreements.
RULES OF THE GAME IN CYBERWAR

• A Ukrainian Professor of International Law,
  Alexander Merezhko, has developed a project
  called the International Convention on
  Prohibition of Cyberwar in Internet.
• According to this project, cyberwar is defined as
  the use of internet and related technological
  means by one state against political, economic,
  technological and information sovereignty and
  independence of any other state.
RULES OF THE GAME IN CYBERWAR

• The world needs cyber war "Rules of
  Engagement" to cope with potentially
  devastating cyber weapons.
• In the intermingled world of cyberspace, we
  may need to protect zones that run facilities
  such as hospitals or schools.
• Discriminating between military and civilian
  targets is more difficult in cyberspace, and may
  require protected, marked, domain names.
RULES OF THE GAME IN CYBERWAR

• Ambiguity about what constitutes cyber conflict
  is delaying international policy to deal with it,
  and that perhaps the idea of "peace" or "war" is
  too simple in the internet age when the world
  could find itself in a third, "other than war",
  mode.
• Ensuring security in cyberspace is vital to our
  national security, our well being and our
  prosperity.
• Without it we can't have the economy we aspire
  to have.
RULES OF THE GAME IN CYBERWAR

• Cyber weapons have attributes not previously
  seen with traditional weapons, nor considered
  during the development of the current Laws of
  War.
• Cyber weapons can deliver, in the blink of an
  eye, wild viral behaviors that are easily
  reproduced and transferred, while lacking target
  discrimination.
RULES OF THE GAME IN CYBERWAR

• The nature of cyber space, with its ease of
  anonymity and use of proxies, makes the
  attribution of any attack very difficult. This
  raises the question of proportionality.
• How strongly should a state respond to an
  attack when you do not know who did it, where
  they did it from or what the intention was? In
  conventional military terms these questions are
  easier to answer - not so in the cyber world.
RULES OF THE GAME IN CYBERWAR

• Capabilities which currently exist include turning
  off power grids, disrupting water supplies and
  manufacturing systems.
• Countries should exchange strategies and
  information to build confidence over the long
  term, so one never gets to the point of a cyber
  conflict or even a larger conflict.
• Any such agreement remains a distant prospect
  because nations lack common legal standards
  in cyberspace and information security is
  closely connected with national interests.
RULES OF THE GAME IN CYBERWAR

• The infamous Stuxnet worm was blamed for
  infecting industrial control systems and
  sabotaging centrifuges at controversial Iranian
  nuclear facilities.
• Some have described this malware as the
  world's first cyber-weapon though cyber-
  espionage in many guises has undoubtedly
  been practiced by intelligence agencies across
  the world for many years.
RULES OF THE GAME IN CYBERWAR

• Computer systems underpin the delivery of essential
  services, including utilities and telecoms and well as
  banking and government services.
• Although attacks against various critical systems are
  commonplace they tend to be low level information-
  stealing or denial of service exploits.
• Cyberwar risks are all too real and illustrated by the
  denial of services attacks that blitzed Estonia off the
  web and the Operation Aurora assaults against
  Google and other high-tech firms.
RULES OF THE GAME IN CYBERWAR

• The cyberwar lexicon is especially confusing
  because it remains immature.
• For example, there is no agreed definition of
  what constitutes a cyber attack on a nation or a
  breach of sovereignty.
• Often theft, espionage, reconnaissance or even
  simple hacking is described as a cyber attack.
RULES OF THE GAME IN CYBERWAR

• National and international laws, regulations,
  and enforcement are still struggling to catch up
  to cyber activities worldwide.
• Rules, protocols, and standards are few and
  disconnected, often conflicting with each other.
• In most cases, laws have not kept pace with the
  technical ability of an adversary to move rapidly
  through national, academic, commercial, and
  private internet service providers.
RULES OF THE GAME IN CYBERWAR

• Protection of strategic-crucial infrastructure and
  vital information for national security is of
  utmost importance.
• The rules of cyberwar, once adopted, will help
  to define conditions in which the armed forces
  can go on the offensive against cyber threats
  and decide what specific actions it can take.
• The laws of land warfare and law of armed
  conflict apply to cyberspace.
RULES OF THE GAME IN CYBERWAR

• Nation states, non-nation state actors and
  hacker groups are creating tools that are
  increasingly more persistent & threatening, and
  armed forces have to be ready for that.
• Rules of Cyberwar must determine what
  represents a reasonable & proportional
  response to a cyber attack as the law of armed
  conflict authorizes a reasonable, proportional
  defense against a physical attack from another
  country.
RULES OF THE GAME IN CYBERWAR

• It remains unclear if the response to cyber
  attack includes authority to shut down a
  computer network, even if it’s been taken over
  by a malicious cyber attacker with intention to
  destroy it.
• If it does, also left unanswered so far is who
  would have that authority: the Ministry of IT, the
  CBI, the military, the Cert-In, the internet
  service provider or any other entity.
RULES OF THE GAME IN CYBERWAR

• American “kill switch bill": on June 19, 2010, US
  Senator Joe Lieberman introduced a bill called
  “Protecting Cyberspace as a National Asset Act
  of 2010“, which he co-wrote with senator Susan
  Collins and senator Thomas Carper.
• If signed into law, this controversial bill, which
  the American media dubbed the “kill switch bill”,
  would grant the President emergency powers
  over parts of the internet.
RULES OF THE GAME IN CYBERWAR



            THANKS

     TALWANT SINGH
       ADDL. DISTT. & SESSIONS JUDGE
              NEW DELHI (INDIA)
             talwant@yahoo.com

Mais conteúdo relacionado

Mais procurados

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national securityTalwant Singh
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?zapp0
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopoliticstnwac
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Esam Abulkhirat
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usualEnclaveSecurity
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Ajay Serohi
 
English presentation
English presentationEnglish presentation
English presentationGinaSoler10
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Digicomp Academy AG
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanShojan Jacob
 

Mais procurados (20)

Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyberwar threat to national security
Cyberwar  threat to national securityCyberwar  threat to national security
Cyberwar threat to national security
 
Cyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberwar: (R)evolution?
Cyberwar: (R)evolution?Cyberwar: (R)evolution?
Cyberwar: (R)evolution?
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
Cybersecurity Awareness- Libya' 1st Cybersecurity Days Conference (CDC)
 
Cyberwarfare
CyberwarfareCyberwarfare
Cyberwarfare
 
Cyberware
CyberwareCyberware
Cyberware
 
Cyber war or business as usual
Cyber war or business as usualCyber war or business as usual
Cyber war or business as usual
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
 
English presentation
English presentationEnglish presentation
English presentation
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
About cyber war
About cyber warAbout cyber war
About cyber war
 
Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)Cyber Warfare vs. Hacking (in English)
Cyber Warfare vs. Hacking (in English)
 
Securing Indian Cyberspace Shojan
Securing Indian Cyberspace ShojanSecuring Indian Cyberspace Shojan
Securing Indian Cyberspace Shojan
 

Destaque

All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...shiva rajan
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Miningshiva rajan
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005chithra venkatesan
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proTalwant Singh
 

Destaque (6)

All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
All Illegal Beach Mining Allegations Against The Company Are Baseless VV Mine...
 
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral MiningHC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
HC Dismisses Mining Ban Orders In Respect Of Two Mining Firms VV Mineral Mining
 
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
Popat and kotecha_property_vs_state_bank_of_india_staff_..._on_29_august,_2005
 
Safe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_proSafe harbour protection_for_mobile_service_pro
Safe harbour protection_for_mobile_service_pro
 
Justice of peace
Justice of peaceJustice of peace
Justice of peace
 
At&t v saudi cable case
At&t v saudi cable caseAt&t v saudi cable case
At&t v saudi cable case
 

Semelhante a RULES OF THE GAME IN CYBERWAR

Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingDavid Opderbeck
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...Boston Global Forum
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slidesdondiw
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber WarfareAmit Anand
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav SinghGaurav Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...Pukhraj Singh
 
Cybercrime
CybercrimeCybercrime
CybercrimeSERCOD
 
Military Advances The Private Sector
Military Advances The Private SectorMilitary Advances The Private Sector
Military Advances The Private SectorMelissa Williams
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarDr.S.Jagadeesh Kumar
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Jautkarshjani
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286Udaysharma3
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinAFCEA International
 
Cyber- Terrorism And Information Warfare
Cyber- Terrorism And Information WarfareCyber- Terrorism And Information Warfare
Cyber- Terrorism And Information WarfareHeather Dionne
 
Comparing Cyberwarfare And Private Sectors
Comparing Cyberwarfare And Private SectorsComparing Cyberwarfare And Private Sectors
Comparing Cyberwarfare And Private SectorsAngela Weber
 
Cyberspace Of Business Ethics Essay
Cyberspace Of Business Ethics EssayCyberspace Of Business Ethics Essay
Cyberspace Of Business Ethics EssaySamantha Reed
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpowerNoelle Cowling
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismCharles Mok
 

Semelhante a RULES OF THE GAME IN CYBERWAR (20)

Cybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit MeetingCybersecurity Law and Policy II Slides for First Summit Meeting
Cybersecurity Law and Policy II Slides for First Summit Meeting
 
C3 Cyber
C3 CyberC3 Cyber
C3 Cyber
 
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
BGF-UNESCO-at-UCLA conference - Madness - The dynamics of International Cyber...
 
Dondi West Defcon 18 Slides
Dondi West Defcon 18 SlidesDondi West Defcon 18 Slides
Dondi West Defcon 18 Slides
 
Cyber Security, Cyber Warfare
Cyber Security, Cyber WarfareCyber Security, Cyber Warfare
Cyber Security, Cyber Warfare
 
Cyber Wars.pptx
Cyber Wars.pptxCyber Wars.pptx
Cyber Wars.pptx
 
Cyber security by Gaurav Singh
Cyber security by Gaurav SinghCyber security by Gaurav Singh
Cyber security by Gaurav Singh
 
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...In cyber, the generals should lead from behind - College of Air Warfare - Puk...
In cyber, the generals should lead from behind - College of Air Warfare - Puk...
 
Cybercrime
CybercrimeCybercrime
Cybercrime
 
Military Advances The Private Sector
Military Advances The Private SectorMilitary Advances The Private Sector
Military Advances The Private Sector
 
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh KumarTypes of Cyber Threats By Dr.S.Jagadeesh Kumar
Types of Cyber Threats By Dr.S.Jagadeesh Kumar
 
Cyberspace Usages Challenges And Disputeresolution Ja
Cyberspace Usages Challenges And Disputeresolution  JaCyberspace Usages Challenges And Disputeresolution  Ja
Cyberspace Usages Challenges And Disputeresolution Ja
 
Cyber weapons 1632578286
Cyber weapons 1632578286Cyber weapons 1632578286
Cyber weapons 1632578286
 
USSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert LinUSSTRATCOM Cyber & Space 2011 Herbert Lin
USSTRATCOM Cyber & Space 2011 Herbert Lin
 
Cyber- Terrorism And Information Warfare
Cyber- Terrorism And Information WarfareCyber- Terrorism And Information Warfare
Cyber- Terrorism And Information Warfare
 
Comparing Cyberwarfare And Private Sectors
Comparing Cyberwarfare And Private SectorsComparing Cyberwarfare And Private Sectors
Comparing Cyberwarfare And Private Sectors
 
Cyberspace Of Business Ethics Essay
Cyberspace Of Business Ethics EssayCyberspace Of Business Ethics Essay
Cyberspace Of Business Ethics Essay
 
Cyber Threat
Cyber ThreatCyber Threat
Cyber Threat
 
The rise of cyberpower
The rise of cyberpowerThe rise of cyberpower
The rise of cyberpower
 
Digital Repression and Techno-Authoritarianism
Digital Repression and Techno-AuthoritarianismDigital Repression and Techno-Authoritarianism
Digital Repression and Techno-Authoritarianism
 

Mais de Talwant Singh

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018Talwant Singh
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Talwant Singh
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & PrecautionsTalwant Singh
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in CourtsTalwant Singh
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in JudiciaryTalwant Singh
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawTalwant Singh
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYTalwant Singh
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road MapTalwant Singh
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFTalwant Singh
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courtsTalwant Singh
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technologyTalwant Singh
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courtsTalwant Singh
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet DisputesTalwant Singh
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An OverviewTalwant Singh
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemTalwant Singh
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An IntroductionTalwant Singh
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICTTalwant Singh
 

Mais de Talwant Singh (18)

ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
ICT AND E-JUDICIARY: INDIAN PERSPECTIVE: 2018
 
Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016Judicial Appreciation of Digital Evidence 2016
Judicial Appreciation of Digital Evidence 2016
 
Cyber Crime & Precautions
Cyber Crime & PrecautionsCyber Crime & Precautions
Cyber Crime & Precautions
 
Role of Training and Development in Courts
Role of Training and Development in CourtsRole of Training and Development in Courts
Role of Training and Development in Courts
 
Change Management in Judiciary
Change Management in JudiciaryChange Management in Judiciary
Change Management in Judiciary
 
Appreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan LawAppreciation of Digital Evidence in Sri Lankan Law
Appreciation of Digital Evidence in Sri Lankan Law
 
HRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARYHRM RELATED USE OF ICT IN JUDICIARY
HRM RELATED USE OF ICT IN JUDICIARY
 
E-Justice: The Road Map
E-Justice: The Road MapE-Justice: The Road Map
E-Justice: The Road Map
 
Appreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDFAppreciation of Electronic Evidence-PDF
Appreciation of Electronic Evidence-PDF
 
Electronic evidence
Electronic evidenceElectronic evidence
Electronic evidence
 
Ict in the district courts
Ict in the district courtsIct in the district courts
Ict in the district courts
 
Cyber law & information technology
Cyber law & information technologyCyber law & information technology
Cyber law & information technology
 
Recent trends in use of ict in courts
Recent trends in use of ict in courtsRecent trends in use of ict in courts
Recent trends in use of ict in courts
 
Jurisdictional Issues In Internet Disputes
Jurisdictional Issues  In Internet DisputesJurisdictional Issues  In Internet Disputes
Jurisdictional Issues In Internet Disputes
 
Cyberlaw An Overview
Cyberlaw   An OverviewCyberlaw   An Overview
Cyberlaw An Overview
 
Impact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery SystemImpact Of ICT on Justice Delivery System
Impact Of ICT on Justice Delivery System
 
Indian Legal System An Introduction
Indian Legal System  An IntroductionIndian Legal System  An Introduction
Indian Legal System An Introduction
 
Legal Education & ICT
Legal Education & ICTLegal Education & ICT
Legal Education & ICT
 

Último

In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxAditiChauhan701637
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptxmary850239
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...raviapr7
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17Celine George
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17Celine George
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxheathfieldcps1
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapitolTechU
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxraviapr7
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice documentXsasf Sfdfasd
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICESayali Powar
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and stepobaje godwin sunday
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfMohonDas
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?TechSoup
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsEugene Lysak
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxiammrhaywood
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17Celine George
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxDr. Asif Anas
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17Celine George
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17Celine George
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxraviapr7
 

Último (20)

In - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptxIn - Vivo and In - Vitro Correlation.pptx
In - Vivo and In - Vitro Correlation.pptx
 
3.21.24 The Origins of Black Power.pptx
3.21.24  The Origins of Black Power.pptx3.21.24  The Origins of Black Power.pptx
3.21.24 The Origins of Black Power.pptx
 
Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...Patient Counselling. Definition of patient counseling; steps involved in pati...
Patient Counselling. Definition of patient counseling; steps involved in pati...
 
How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17How to Show Error_Warning Messages in Odoo 17
How to Show Error_Warning Messages in Odoo 17
 
How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17How to Add a New Field in Existing Kanban View in Odoo 17
How to Add a New Field in Existing Kanban View in Odoo 17
 
The basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptxThe basics of sentences session 10pptx.pptx
The basics of sentences session 10pptx.pptx
 
CapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptxCapTechU Doctoral Presentation -March 2024 slides.pptx
CapTechU Doctoral Presentation -March 2024 slides.pptx
 
Education and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptxEducation and training program in the hospital APR.pptx
Education and training program in the hospital APR.pptx
 
The Singapore Teaching Practice document
The Singapore Teaching Practice documentThe Singapore Teaching Practice document
The Singapore Teaching Practice document
 
Quality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICEQuality Assurance_GOOD LABORATORY PRACTICE
Quality Assurance_GOOD LABORATORY PRACTICE
 
General views of Histopathology and step
General views of Histopathology and stepGeneral views of Histopathology and step
General views of Histopathology and step
 
HED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdfHED Office Sohayok Exam Question Solution 2023.pdf
HED Office Sohayok Exam Question Solution 2023.pdf
 
What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?What is the Future of QuickBooks DeskTop?
What is the Future of QuickBooks DeskTop?
 
The Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George WellsThe Stolen Bacillus by Herbert George Wells
The Stolen Bacillus by Herbert George Wells
 
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptxAUDIENCE THEORY -- FANDOM -- JENKINS.pptx
AUDIENCE THEORY -- FANDOM -- JENKINS.pptx
 
How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17How to Add a many2many Relational Field in Odoo 17
How to Add a many2many Relational Field in Odoo 17
 
Ultra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptxUltra structure and life cycle of Plasmodium.pptx
Ultra structure and life cycle of Plasmodium.pptx
 
How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17How to Make a Field read-only in Odoo 17
How to Make a Field read-only in Odoo 17
 
How to Solve Singleton Error in the Odoo 17
How to Solve Singleton Error in the  Odoo 17How to Solve Singleton Error in the  Odoo 17
How to Solve Singleton Error in the Odoo 17
 
Prescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptxPrescribed medication order and communication skills.pptx
Prescribed medication order and communication skills.pptx
 

RULES OF THE GAME IN CYBERWAR

  • 1. RULES OF THE GAME IN CYBERWAR BY TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE: DELHI
  • 2. RULES OF THE GAME IN CYBERWAR • There is no precise definition of ‘Cyberwar’. • The Shanghai Cooperation Organization (members include China and Russia) defines cyberwar to include dissemination of information harmful to the spiritual, moral and cultural spheres of other states. • In contrast, the United States’ approach focuses on physical and economic damage and injury, putting political concerns under freedom of speech. • This difference of opinion has led to reluctance among Nations to pursue global cyber arms control agreements.
  • 3. RULES OF THE GAME IN CYBERWAR • A Ukrainian Professor of International Law, Alexander Merezhko, has developed a project called the International Convention on Prohibition of Cyberwar in Internet. • According to this project, cyberwar is defined as the use of internet and related technological means by one state against political, economic, technological and information sovereignty and independence of any other state.
  • 4. RULES OF THE GAME IN CYBERWAR • The world needs cyber war "Rules of Engagement" to cope with potentially devastating cyber weapons. • In the intermingled world of cyberspace, we may need to protect zones that run facilities such as hospitals or schools. • Discriminating between military and civilian targets is more difficult in cyberspace, and may require protected, marked, domain names.
  • 5. RULES OF THE GAME IN CYBERWAR • Ambiguity about what constitutes cyber conflict is delaying international policy to deal with it, and that perhaps the idea of "peace" or "war" is too simple in the internet age when the world could find itself in a third, "other than war", mode. • Ensuring security in cyberspace is vital to our national security, our well being and our prosperity. • Without it we can't have the economy we aspire to have.
  • 6. RULES OF THE GAME IN CYBERWAR • Cyber weapons have attributes not previously seen with traditional weapons, nor considered during the development of the current Laws of War. • Cyber weapons can deliver, in the blink of an eye, wild viral behaviors that are easily reproduced and transferred, while lacking target discrimination.
  • 7. RULES OF THE GAME IN CYBERWAR • The nature of cyber space, with its ease of anonymity and use of proxies, makes the attribution of any attack very difficult. This raises the question of proportionality. • How strongly should a state respond to an attack when you do not know who did it, where they did it from or what the intention was? In conventional military terms these questions are easier to answer - not so in the cyber world.
  • 8. RULES OF THE GAME IN CYBERWAR • Capabilities which currently exist include turning off power grids, disrupting water supplies and manufacturing systems. • Countries should exchange strategies and information to build confidence over the long term, so one never gets to the point of a cyber conflict or even a larger conflict. • Any such agreement remains a distant prospect because nations lack common legal standards in cyberspace and information security is closely connected with national interests.
  • 9. RULES OF THE GAME IN CYBERWAR • The infamous Stuxnet worm was blamed for infecting industrial control systems and sabotaging centrifuges at controversial Iranian nuclear facilities. • Some have described this malware as the world's first cyber-weapon though cyber- espionage in many guises has undoubtedly been practiced by intelligence agencies across the world for many years.
  • 10. RULES OF THE GAME IN CYBERWAR • Computer systems underpin the delivery of essential services, including utilities and telecoms and well as banking and government services. • Although attacks against various critical systems are commonplace they tend to be low level information- stealing or denial of service exploits. • Cyberwar risks are all too real and illustrated by the denial of services attacks that blitzed Estonia off the web and the Operation Aurora assaults against Google and other high-tech firms.
  • 11. RULES OF THE GAME IN CYBERWAR • The cyberwar lexicon is especially confusing because it remains immature. • For example, there is no agreed definition of what constitutes a cyber attack on a nation or a breach of sovereignty. • Often theft, espionage, reconnaissance or even simple hacking is described as a cyber attack.
  • 12. RULES OF THE GAME IN CYBERWAR • National and international laws, regulations, and enforcement are still struggling to catch up to cyber activities worldwide. • Rules, protocols, and standards are few and disconnected, often conflicting with each other. • In most cases, laws have not kept pace with the technical ability of an adversary to move rapidly through national, academic, commercial, and private internet service providers.
  • 13. RULES OF THE GAME IN CYBERWAR • Protection of strategic-crucial infrastructure and vital information for national security is of utmost importance. • The rules of cyberwar, once adopted, will help to define conditions in which the armed forces can go on the offensive against cyber threats and decide what specific actions it can take. • The laws of land warfare and law of armed conflict apply to cyberspace.
  • 14. RULES OF THE GAME IN CYBERWAR • Nation states, non-nation state actors and hacker groups are creating tools that are increasingly more persistent & threatening, and armed forces have to be ready for that. • Rules of Cyberwar must determine what represents a reasonable & proportional response to a cyber attack as the law of armed conflict authorizes a reasonable, proportional defense against a physical attack from another country.
  • 15. RULES OF THE GAME IN CYBERWAR • It remains unclear if the response to cyber attack includes authority to shut down a computer network, even if it’s been taken over by a malicious cyber attacker with intention to destroy it. • If it does, also left unanswered so far is who would have that authority: the Ministry of IT, the CBI, the military, the Cert-In, the internet service provider or any other entity.
  • 16. RULES OF THE GAME IN CYBERWAR • American “kill switch bill": on June 19, 2010, US Senator Joe Lieberman introduced a bill called “Protecting Cyberspace as a National Asset Act of 2010“, which he co-wrote with senator Susan Collins and senator Thomas Carper. • If signed into law, this controversial bill, which the American media dubbed the “kill switch bill”, would grant the President emergency powers over parts of the internet.
  • 17. RULES OF THE GAME IN CYBERWAR THANKS TALWANT SINGH ADDL. DISTT. & SESSIONS JUDGE NEW DELHI (INDIA) talwant@yahoo.com