Cyber Security
Cyber Security
Cyber
Security
Cybersecurity
Global, Regional and
Domestic Dynamics
Cherian Samuel
AND
DOMESTIC DYNAMICS| 1
CYBERSECURITY
GLOBAL, REGIONAL AND DOMESTIC
DYNAMICS
Cherian Samuel
2 | CHERIAN SAMUEL
978-93-82169-48-2
December 2014
Price:
Rs. 225/-
Published by:
Website: http://www.idsa.in
Cover &
Layout by:
Printed at:
AND
DOMESTIC DYNAMICS| 3
Contents
I.
II.
INTRODUCTION .............................................................................
III.
IV.
V.
4 | CHERIAN SAMUEL
AND
DOMESTIC DYNAMICS| 5
CHAPTER - 1
INTRODUCTION
Fourteen years into the new millennium, governments find themselves
struggling to deal with the issue of cybersecurity. What promised at
the beginning of the century to be a set of technologies, which would
facilitate economic growth and the advancement of knowledge, is
now considered by many governments as having spawned a domain
that is anarchic and in dire need of control and regulation. And not
without reason; cyberspace is being used for a variety of malicious
activities, from crime to state-sponsored attacks on critical infrastructure.
The interconnectedness of cyber networks means that even the most
basic responses end up having a ripple effect or unintended
consequences. Maintaining a balance between security and benefitting
from the many opportunities provided by the deployment of new
cyber technologies is proving to be one of the most vexatious issues
of the 21st century.
The complex nature of cybersecurity has seen even the developed
countries of the West, where many of the technologies, processes and
practices were developed, falter when it came to developing holistic
cybersecurity policies. The countries that succeeded in piecing together
a policy have had difficulties in implementing them, and have also had
to come up with successive iterations as new threats have surfaced.
Such policies have also been of limited use in preventing cyber attacks
or for pre-empting new threats.
While India was among the first countries to have an Information
Technology Act, set up a Computer Emergency Response team
(CERT) and even locate responsibility for cybersecurity within the
National Security Council, it has subsequently lagged behind other
countries in responding to cybersecurity threats.
India has been at the receiving end of various forms of cyber threats;
from attacks on critical infrastructure to cybercrime and the latest
manifestation of the misuse of social media. Moreover, responses at
the official level have been marked by several mis-steps. Till recently,
6 | CHERIAN SAMUEL
AND
DOMESTIC DYNAMICS| 7
CHAPTER - 2
History of Cyberspace
The history of cyberspace is a continuing story of the incremental and
disruptive advancement of a number of technologies.1 Its early days
presaged many of its current applications. It was initially envisaged as a
means of communication among academicians across various academic
institutions, so much so that the various innovations that propelled it
forward can be traced to individuals who improved on the original
system. This also explains why one of the problems facing cyberspace
today is the lack of adequate security protocols.
The initial impetus was provided during the Second World War when
the largest conglomerations of scientists ever, came together at Bletchley
Park in the 1940s to break German encryption codes. The crossfertilisation of ideas that occurred there was disseminated across
different scientific institutions after the war, and these collaborative
efforts continued to maintain the momentum of the great spurt in
8 | CHERIAN SAMUEL
scientific development that was partly the by-product of the war effort.2
Communication between institutions was an expensive affair since costs
were based on distance, and dedicated lines required to transfer data
were prohibitively expensive. Despite that, many networks were
established between institutions, but the technology to transmit data
remained primitive, with messages sent on the store-and-forward
principle taking time to reach their destination. Theoretical alternatives
began to make their appearance in the early 60s with the first paper on
what was to become the mainstay of cyberspace, the packet switching
theory, being published in 1961. The first system based on this theory,
the Advanced Research Projects Agency Network (ARPANET), was
developed by the US Department of Defence Advanced Research
Projects Agency (DARPA) by 1967. DARPAs interest in technology
was based on the need to develop a communications network that
could survive a nuclear war. While the ARPANET was a single network,
other scientists began work on facilitating communication between
networks leading to the development of Transmission Control
Protocol/Internet Protocol (TCP/IP) in the 1970s.
The ARPANET connected various universities, research institutes, and
scientists and was further improved throughout the 60s and 70s. The
Local Area Networks (LANs), mainframes, and personal computers
led to increasing use of these networks, which in turn increased the
demand for these devices. Since the data had to be transferred between
the supercomputers of the time, a premium was placed on increasing
the speed of data transfer. As universities became the largest users of
the facility, the National Science Foundation took over and instituted
the National Science Foundation Network (NSFNet), which became
the Internet backbone and was utilised by the smaller networks.
The Internet flourished because of its underlying simplicity. It consisted
of just four layers, each focusing on one aspect of data flow.3 Data
was split into packets, and transmitted on a best effort basis, with the
various layers ensuring that the data arrived at its final destination by a
2
Stephen Little, From Bletchley Park to the NSA: Scientific Management and
Surveillance Society in the Cold War and Beyond, Unpublished Paper Presented at
the Critical Management Studies 3 Conference, Lancaster University, July 7-9, 2003, at
http://www.stephenelittle.com/cms03.pdf (Accessed 8 May 2013).
AND
DOMESTIC DYNAMICS| 9
Andrew L. Russell, OSI: The Internet that Wasnt, IEEE Spectrum, July 29, 2013, at
http://spectrum.ieee.org/computing/networks/osi-the-internet-that-wasnt (Accessed
October 25, 2013).
Thank You, Porn! 12 Ways the Sex Trade Has Changed the Web, December 21, 2008, at http:/
/www.pcworld.com/article/155745/porn_on_the_web.html (Accessed May 8, 2013).
10 | CHERIAN SAMUEL
Threats in Cyberspace
While threats have existed right from the early days of cyberspace,6 the
sporadic nature of the attacks and their targets suggested that they
were largely the handiwork of hackers and low-level criminal elements.
The major delivery vehicles were spam mails containing viruses and
malware. These were however manageable and up-to-date antivirus
programmes and firewalls were deemed sufficient for keeping such
risks at bay. Subsequently, new forms of malware such as Worms and
Trojans, which exploited the vulnerabilities of buggy software, also
began to make their appearance. Phishing and Denial of Service (DoS)
attacks also entered the lexicon. Whilst the former was a technique for
gaining personal information for purposes of identity theft or access
to e-mails or bank accounts, the latter consisted of malevolent attacks
on websites with the intention of making them inaccessible. All these
threats7 took advantage of the existing vulnerabilities8, whether in the
software, networks or security architecture.
For a detailed run-down of cyber threats from the early days of the Internet, see: Jason
Healey, A Fierce Domain: Conflict in Cyberspace, 1986 to 2012, Cyber Conflict Studies
Association, 2013.
The Computer Emergency Response Team (CERT) in 1993 defined a threat as: Any
circumstances or event that has the potential to cause harm to a system or network
.That means, that even the existence of a(n unknown) vulnerability implies a threat by
definition.
AND
DOMESTIC DYNAMICS| 11
In 2003, the US intelligence agencies had drawn up plans for a cyberattack to freeze
Iraqs financial system, but the Bush Administration, concerned about the possibility
of a ripple effect leading to worldwide financial havoc, refused to give the go-ahead.
Halted 03 Iraq Plan Illustrates U.S. Fear of Cyberwar Risk, New York Times, August 1,
2009, at http://www.nytimes.com/2009/08/02/us/politics/02cyber.html (Accessed
September 22, 2012).
12 | CHERIAN SAMUEL
10
11
According to one estimate, cyberattacks work out to about 4 cents per computer.
Before the Gunfire, Cyber Attacks, New York Times, August 12, 2008.
12
Dr. Kenneth Geer, Highlights and Analysis on FireEyes Advanced Threat Report
2013", 19 March 2014, at https://www.brighttalk.com/webcast/7451/104453 (Accessed
May 02, 2014).
AND
DOMESTIC DYNAMICS| 13
Perspectives on Cyberspace
Cyberspace is a phenomenon that has acquired a certain strategic
position by virtue of global reach and its rapid integration into the
global social, political and economic discourse and framework. At the
same time, it is too nascent a medium to have regulatory norms and
conventions in place.
The development of cyberspace worldwide has been informed by
various factors and imperatives. However, the rapidity at which
cyberspace has developed has meant that there are many different
perspectives/imperatives at play simultaneously, resulting in widely
varying approaches to cybersecurity.
14
FireEye Advanced Threat Report: 2013, Fireeye, Inc. February 1, 2014, at http://
www2.fireeye.com/advanced-threat-report-2013.html (Accessed March 1, 2014).
14 | CHERIAN SAMUEL
15
IETF vs. ITU: Internet Standards Face-off , Network World, December 3, 2012, at http:/
/www.networkworld.com/news/2012/120312-argument-ietf-itu-264594.html.
16
Sumit Roy, Globalisation, ICT and Developing Nations: Challenges in the Information Age, Sage
Publications, Delhi, 2005, p. 115.
17
Peter Lovelock, The Asian NII Experience, Paper presented at The Seventh Annual
Conference of the Internet Society, Kuala Lumpur, Malaysia, June 27, 1997, at http:/
/www.isoc.org/inet97/proceedings/E3/E3_2.HTM (Accessed December 11, 2012).
18
Parminder Jeet Singh, Hyping One Threat to Hide Another, The Hindu, November
28, 2012, at http://www.thehindu.com/opinion/lead/hyping-one-threat-to-hideanother/article4140922.ece.
AND
DOMESTIC DYNAMICS| 15
19
16 | CHERIAN SAMUEL
the shortest time, after an attack).20 This model has been held partly
responsible for the lack of interest on the part of information security
professionals to identify the source and perpetrators of an attack. There
have been calls to add forensics to the model so that the perpetrators
can be prosecuted on the basis of legally admissible evidence.21
Given the increasingly sophisticated cyberattacks, the moot question is
whether the models that have been developed and adopted worldwide
are adequate to deal with the escalating threats on enterprises in
cyberspace. While more critical areas such as banking and finance have
their own additional standards and rules, the challenge lies in their
effective implementation.
The Survivable Network Analysis Method: Assessing Survivability of Critical Systems, CERT
Coordination Centre, Presentation: Software Engineering Institute, Carnegie Mellon
University, Pittsburgh, at www.cert.org/archive/pdf/sna-short.pdf (Accessed
November 15, 2013).
21
AND
DOMESTIC DYNAMICS| 17
22
The White House, Report and Recommendations of The Presidents Review Group on Intelligence
and Communications Technologies, 12 December 2013 at www.whitehouse.gov/sites/default/
files/docs/2013-12-12_rg_final_report.pdf (Accessed January 10, 2013)
23
India Asked to Join Convention on Cyber Crime, Outlook, March 30, 2009, at http://
news.outlookindia.com/item.aspx?657030 (Accessed March 1, 2012).
18 | CHERIAN SAMUEL
Its concerns, which are shared by other countries including India, pertain
to the implicit dilution of sovereignty inherent in these clauses. There
have been many criticisms of the treaty, including that it is biased in
favour of the law enforcement agencies without taking the rights of
other stakeholders into consideration. While it has sweeping powers
of computer search and seizure and government surveillance of voice,
e-mail and data communications, there are no correspondingly detailed
standards to protect privacy and limit the use of such powers by
governments.25 Some have also argued that the Convention is largely
symbolic, and its long-term effectiveness is in doubt.26
25
26
AND
DOMESTIC DYNAMICS| 19
Larry Press, William A. Foster and Seymour E. Goodman, The Internet in India and China,
Annual Conference of the Internet Society, San Jose, California, 1999, at http://
www.isoc.org/inet99/proceedings/3a/3a_3.htm (Accessed July 23, 2009).
28
Tang Lan, Chinas Perspective, in Ashley J.Tellis and Sean Mirski (eds.), Crux of Asia:
China, India and the Emerging Global Order, Carnegie Endowment for International Peace,
New York 2013, p. 187. Also see: UN Press Release, Unregulated Information Highway
Is Non-Traditional Security Threat With Too Many Traffic Accidents, China Tells
First Committee, Warning Of Security Breaches, Sixty-sixth General Assembly First
Committee 17th Meeting, October 20, 2011, at http://www.un.org/News/Press/docs/
2011/gadis3442.doc.htm (Accessed August 23, 2012).
20 | CHERIAN SAMUEL
29
30
AND
DOMESTIC DYNAMICS| 21
32
ICANN and the Problem of Legitimacy, Duke Law Journal, 50 (187), 250 (2000), p. 215219.
33
34
22 | CHERIAN SAMUEL
The UN Track
The UN would seem to be the institution of choice to resolve various
issues concerning effective Internet governance given its position as the
apex comity of states, as well as a multitude of subsidiary bodies for
areas ranging from culture to human rights and technology. The UN
made an early start in this direction with the convening of the World
Summit on the Information Society (WSIS) in 2003 and 2005. One of
its outcomes was the constitution of a Working Group on Internet
Governance (WGIG) headed by Nitin Desai, the former UN UnderSecretary-General for economic and social affairs. This group came
up with four organisational models for Internet governance which
ranged from largely maintaining the status quo to radical restructuring
by the creation of a Global Internet Council (GIC) which would
take over the functions relating to international Internet governance
performed by the Department of Commerce of the United States
Government.35 But even before these recommendations, the US had
declared that it would continue to maintain its historic role in the
development of the Internet through its control of the root servers.36
In the event, the only two institutions that saw the light of day from
the WGIG recommendations were the General Advisory Council to
ICANN and the Internet Governance Forum (IGF).
35
Report of the Working Group on Internet Governance, United Nations, Geneva, 2005, at http:/
/www.wgig.org/docs/WGIGREPORT.pdf (Accessed November 12, 2012).
36
U.S. Principles on the Internets Domain Name and Addressing System, US government Department
of Commerce, June 2005, at http://www.ntia.doc.gov/other-publication/2005/usprinciples-internets-domain-name-and-addressing-system (Accessed December 18, 2012).
37
AND
DOMESTIC DYNAMICS| 23
38
This criticism was addressed by Lynn St. Amour, President of the Internet Society, in
her inaugural address at the Third Internet Governance Forum held at Hyderabad,
India, in 2008. http://www.internetsociety.org/igf-2008-opening-address (Accessed May
13, 2013).
39
40
41
24 | CHERIAN SAMUEL
42
43
44
AND
DOMESTIC DYNAMICS| 25
Tim Maurer, Cyber Norm Emergence at the United Nations An Analysis of the
UNs Activities Regarding Cyber-security, Belfer Centre for Science and International
Affairs, Harvard Kennedy School, Cambridge, Mass., September 2011, p. 22.
46
Tikk-Ringas attributes the forward movement in this GGE, as compared to the earlier
GGE, to a number of factors, including the Obama Administrations more cooperative
approach. Eneken Tikk-Ringas, No. 45, p. 7.
47
See the press release of the US State Department following the conclusion of the
third GGE which reports considerable progress in narrowing differences:
Statement on Consensus Achieved by the UN Group of Governmental Experts On
Cyber Issues, US Department of State, June 7, 2013, at http://www.state.gov/r/pa/
prs/ps/2013/06/210418.htm (Accessed July 12, 2013).
48
Other than the permanent members, the other states included Argentina, Australia,
Belarus, Canada, Egypt, Estonia, Germany, India, Indonesia and Japan. India has been a
member of all three GGEs dealing with this issue.
49
26 | CHERIAN SAMUEL
While the efforts of the GGE have been lauded by some50, there are
others who see these as being ill-suited for cyberspace. In the words
of Jonathan Zittran:
Such efforts import from professional diplomacy the notion of
process and unanimity above all. Their solution for the diffculties
of individual state enforcement on the Net is a kind of negotiated
intellectual harmony among participants at a self-conscious
summit - complex regimes to be mapped out in a dialogue taking
place at an endlessly long table, with a role for all to play. Such
dialogues end either in bland consensus pronouncements or in
final documents that are agreed upon only because the range of
participants has been narrowed.51
Asia
Within Asia, much of the discussion has been perfunctory with the
emphasis largely on cybercrime-related issues. Even as most of the
major cyber attacks have taken place in West Asia, the few multilateral
organisations where meaningful discussion on cyber issues is taking
place are largely in the East.
51
Jonathan L. Zittrain, The Future of the Internet And How to Stop It, Yale University Press,
New Haven & Penguin, UK, 2008, pp. 242-243.
AND
DOMESTIC DYNAMICS| 27
the US. Cybercrime was placed on the agenda of the ASEAN ministerial
meetings as early as 2001.52 Its 2009-2015 Roadmap for an ASEAN
Community focuses on cybercrime, but a unified stand would give it an
influential voice in cybersecurity discussions. ASEAN, in the course of
its history has spawned a number of ancillary organisations such as the
ASEAN Regional Forum (ARF) and the Council for Security
Cooperation in the Asia Pacific (CSCAP) that also have cybersecurity
on their agenda.
52
53
Rodolfo Severino, The ASEAN Regional Forum, Institute of Southeast Asian Studies,
Singapore, 2009, p. 98
54
28 | CHERIAN SAMUEL
55
56
Desmond Ball and Kwa Chong Guan, Assessing Track 2 Diplomacy in the Asia-Pacific
Region, A CSCAP Reader, 2010, p. 28.
57
Ensuring a Safer Cyber Security Environment, Memorandum No. 20, May 2012, Council
for Security Cooperation in the Asia Pacific (CSCAP), at http://www.cscap.org/uploads/
docs/Memorandums/CSCAP%20Memorandum%20No%2020%20%
20Ensuring%20a%20Safer%20 Cyber%20Security%20Environmenet.pdf (Accessed
May 15, 2013).
58
Promoting a Safe and Trusted ICT Environment, Strategic Action Plan: 2010-2015,
APEC Telecommunications and Information Working Group, 2010, at http://
www.apec.org/Meeting-Papers/Ministerial-Statements/Telecommunications-andInformation/2010_tel/ActionPlan.aspx (Accessed May 15, 2013).
AND
DOMESTIC DYNAMICS| 29
Europe
Council of Europe
The Council of Europe (CoE), founded in 1949, has become an
important stakeholder in cybersecurity discussions, by the creation and
propagation of a Convention on Cyber Crime in 2001 which seeks to
harmonise cybercrime-related legislations in various countries. Russia
has been one of the notable opponents of the Budapest Convention
despite being a member of the CoE, and has been particularly
vociferous in its protests against Article 32, which calls for a softening
of state sovereignty in the interests of fighting cybercrime.
59
60
30 | CHERIAN SAMUEL
2)
3)
4)
5)
6)
7)
8)
Multinational Tracks
Organisation for Economic Cooperation and
Development (OECD)
OECD is a 34-member grouping consisting largely of high-income
countries. As the name suggests, its primary focus is economic, but it
has also been active in pushing forward its proposals in the security
61
Ibid. p. 4.
AND
DOMESTIC DYNAMICS| 31
and political arenas. The policy development process within the OECD
is multilayered and consists of over 200 committees and working
groups. The bodies dealing with cybersecurity include the Working
Party on Information Security and Privacy (WPISP), Business and
Industry Advisory Committee (BIAC), Civil Society Internet Society
Advisory Council (CSISAC) and Internet Technical Advisory Committee
(ITAC). The Information, Computer and Communications Policy
(ICCP) Committee is the apex committee.62 India has observer status
in the ICCP Committee and in some other subordinate working
parties.63
OECD has brought out a large number of documents on issues related
to cyberspace; it has largely pushed for status quo in Internet governance
while strengthening punitive provisions relating to intellectual property.
It has been accused of trying to push the agenda of the rich countries
that benefit from the status quo.64
Committee for Information, Computer and Communications Policy (ICCP) has the
following Working Parties reporting to it: Working Party Indicators for the Information
Society (WPIIS), Working Party Communication Infrastructures and Services Policy
(CISP), Working Party on Information Security and Privacy (WPISP) Working Party on
the Information Economy (WPIE).
63
64
Parminder Jeet Singh, A Development Agenda for Internet Governance Call for a
Framework Convention on the Internet, IT for Change Position paper, Delhi, July
2008, at http://thepublicvoice.org/events/seoul08/OECD-ITfC.pdf (Accessed
December 15, 2013).
65
Jason Healey and Leendert van Bochoven, NATOs Cyber Capabilities: Yesterday,
Today, and Tomorrow, Issue Brief , Atlantic Council, 2012, at http://www.acus.org/
files/publication_pdfs/403/022712_ACUS_NATOSmarter_IBM.pdf Accessed on 1
February 2013
32 | CHERIAN SAMUEL
IBSA
The India, Brazil, South Africa (IBSA) grouping has been active in
internet governance related issues with Brazil hosting a multistakeholder
meeting on Internet Governance in 2011. Indias proposal to create a
Committee for Internet-Related Policies (CIRP) submitted to the United
Nations in 2011 was largely based on the proceedings of this meeting.
BRICS
The Brazil, Russia, India, China (BRICS) grouping has also had
cybersecurity on their agenda with discussions being spearheaded by
the respective National Security Advisors of these countries.67 As with
IBSA, the lack of a secretariat and differing objectives among the
partner countries are the major obstacles to better co-ordinated
strategies.
66
Michael N. Schmitt (ed.), Tallinn Manual on the International Law Applicable to Cyber Warfare,
Cambridge University Press, 2013.
67
AND
DOMESTIC DYNAMICS| 33
Other Tracks
In addition to the aforementioned ones, there are a number of other
functional tracks, notably for law enforcement and cybersecurity cooperation, such as the Interpol, Forum of Incident Response and
Security Teams (FIRST) and Asia Pacific CERT (APCERT). While
these have largely been involved in co-ordination, they are gradually
becoming more pro-active. Interpol, for instance, has opened an Interpol
Global Complex for Innovation (IGCI) in Singapore with a focus on
cybercrimes. Its Europe-centric counterpart, EUROPOL also launched
the European Cybercrime Centre (EC3) in January 2013.
Despite the plethora of organisations and technical and policy oriented
frameworks, the rising tide of malicious activities are affecting
governments, corporations and individuals. There is increasing demand
from the private sector that they be allowed to respond to attacks
more proactively, using the euphemism Active Cyber Defence. From
being a response considered on the fringes of information security,
this approach has become mainstream in recent years.68 The essence of
active cyber defence is creating a legal framework in which technically
feasible counter-measures could be legitimised.
68
This topic was the main thememe at CYCON 2014, the annual conference of the
NATO Centre of Excellence in Estonia in 2014.
34 | CHERIAN SAMUEL
CHAPTER - III
69
For instance, see Interview with John Mroz, President, East-West Institute, India: An
Emerging Cyber Power, East West Institute, September 24, 2012, at http://
www.ewi.info/idea/india-emerging-cyber-power (Accessed December 18, 2012).
70
An IT Superpower, India Has Just 556 Cyber Security Experts, The Hindu, June 19,
2013, at http://www.thehindu.com/news/national/an-it-superpower-india-has-just-556cyber-security-experts/article4827644.ece (Accessed June 20, 2013).
71
Shyam Saran, India and the Age of Acceleration, The Tribune, August 14, 2013, at http:/
/ w w w. m e a . g o v. i n / a r t i c l e s - i n - i n d i a n - m e d i a . h t m ? d t l / 2 2 0 7 3 /
India+and+the+Age+of+Acceleration (Accessed August 20, 2013).
72
The National Informatics Centre now hosts some 30,000 government websites in
addition to its other functions.
AND
DOMESTIC DYNAMICS| 35
73
74
Peter Wolcott, The Provision of Internet Services in India, in R.M. Davison, R.W.
Harris, S. Qureshi, D.R. Vogel and G.J. de Vreede (eds.), Information Systems in Developing
Countries: Theory and Practice, University of Hong Kong Press, Hong Kong, 2005, p. 256,
at http://mosaic.unomaha.edu/India_2005.pdf (Accessed March 15, 2009).
75
Peter Wolcott and Seymour E. Goodman, Global Diffusion of the Internet - I: India:
Is the Elephant Learning to Dance?, Communications of the Association for Information Systems,
11 (32), 2003, at http://aisel.aisnet.org/cais/vol11/iss1/32, p.571 (Accessed June 15, 2009).
76
36 | CHERIAN SAMUEL
77
The only other entity allowed to have its own gateway was the Software Technology
Parks of India (STPI), an organisation set up in 1991 to facilitate software exports.
78
79
VSNL Braces for Competition from Private ISPs, India Abroad, 1998, HighBeam
Research, at http://www.highbeam.com/doc/1P1-22128808.html (Accessed June 15,
2012).
80
Ibid.
AND
DOMESTIC DYNAMICS| 37
2.
5.
6.
38 | CHERIAN SAMUEL
AND
DOMESTIC DYNAMICS| 39
Economic Sectors, Draft 12th Five Year Plan, 2012-2017, Planning Commission, 2,
2012, p. 260.
83
84
40 | CHERIAN SAMUEL
85
The NKN is a high speed network that connects educational institutions, while the
NOFN plans to take broadband right down to the panchayat level. More details may be
found on the respective websites: http://www.nkn.in and http://www.bbnl.nic.in/.
86
Raja Mohan, Cyber War: Blaming Pakistan Is Not Enough, Indian Express, August 20,
2012, at http://www.indianexpress.com/news/cyber-war-blaming-pakistan-is-notenough/990637 (Accessed November 27, 2012).
87
Mary McEvoy Manjikian, From Global Village to Virtual Battlespace: The Colonising
of the Internet and the extension of Realpolitik, International Studies Quarterly, 54 (2),
June 2, 2010, pp. 382-383.
AND
DOMESTIC DYNAMICS| 41
Shiv Shankar Menon, Speech, at the Shangri La Dialogue, June 05, 2010, at http://
www.iiss.org/conferences/the-shangri-la-dialogue/shangri-la-dialogue-2010/plenary-sessionspeeches/second-plenary-session/shivshankar-menon/ (Accessed October 10, 2012).
89
Towards Stable and Effective Use of Cyberspace, Ministry of Defence, Japan, September 2012,
p. 2, at http://www.mod.go.jp/e/d_act/others/pdf/stable_and_effective_use_
cyberspace.pdf (Accessed October 12, 2012).
90
For instance, in the context of India-US relations, managing the security of the global
commons was identified as one of the chief areas of cooperation for the two countries
in the joint statement issued at the end of the Obama visit. The operative sentence
read, In an increasingly inter-dependent world, the stability of, and access to, the air,
sea, space, and cyberspace domains is vital for the security and economic prosperity
of nations. Acknowledging their commitment to openness and responsible
international conduct, and on the basis of their shared values, India and the United
States [will] explore ways to work together, as well as with other countries, to develop
a shared vision for these critical domains to promote peace, security and development.
91
C. R. Mohan, Rising India: Partner in Shaping the Global Commons? The Washington
Quarterly, 33 (3), pp. 133148.
42 | CHERIAN SAMUEL
lost cachet in the US92 and amongst other cyber powers for a variety
of reasons. Firstly, there is a perception that this is resulting in the socalled tragedy of the commons, with none of the stakeholders being
willing or able to take responsibility for the security of cyberspace,
various actors are taking advantage of the lacunae to unleash malicious
attacks.93 Secondly, there are doubts whether the very concept of global
commons applies to cyberspace since it is composed of networks and
structures that are owned by various corporations and governments.
Thirdly, many governments are uneasy about the complete lack of
control over cyberspace, and have made determined efforts to assert
authority, at least within their sovereign territories. They have also sought
to claim legitimacy for their actions by pushing these alternative
approaches at a variety of multilateral forums.
92
The US National Military Strategy of 2004 refers to the global commons of air, seas,
space and cyberspace, whereas the US National Military Strategy published in 2011
distinguishes between the global commons and the globally connected domains
such as cyberspace.
The National Military Strategy of the United States of America, 2011, Department of Defence,
p.3. Also see: James A. Lewis, Cybersecurity: Next Steps to Protect Critical Infrastructure,
Testimony to the US Senate Commerce Committee, February 23, 2010.
93
NATO in the Cyber Commons, NATO Allied Command Transformation Workshop, Tallinn,
Estonia, October 19, 2010.
AND
DOMESTIC DYNAMICS| 43
the Task Force, 50 were for business, 23 for infrastructure and the rest
for development.
Despite these inputs, the Information Technology Act of 2000 largely
dealt with only those aspects of information technology that were
relevant to outsourcing with neither cybersecurity nor cybercrime, as
terms, appearing anywhere in the legislation.94 The Preamble to the
Act stated that it was an act to provide legal recognition for transactions
carried out by means of electronic date interchange and other means
of electronic communication, commonly referred to as electronic
commerce.
Even the amendments made in 2006, largely added provisions related
to outsourcing and indemnifying Internet services against certain
liabilities.95 The proposed amendments in 2006 were prompted by the
arrest of the CEO of an online marketing site in 2004 because the site
was used to peddle pornographic material. The resultant outcry led to
the constitution of a committee in 2005 to examine the Act and suggest
how it could be improved in line with other such Acts in place around
the world.96 In the event, these amendments were not passed, as they
were seen to be too industry-friendly.
It may be seen that the private sector is both a leading provider and
user of cyberspace, and thus has a major influence on cybersecurity
policies. Companies that use cyberspace to facilitate their commercial
activities are focussed on ensuring that government policies do not
add to their costs or come in the way of their doing business. For
instance, in banking, there is a strong regulatory body in the form of
94
95
The Bill was listed for business in the Rajya Sabha as follows: To incorporate the
recent developments nationally and internationally particularly with reference to
provisions related to data protection and privacy in the context of Business Process
Outsourcing (BPO) operations, liabilities of network service providers, computer
related offences, regulation of cyber cafes, issues relating to child pornography, etc.
Available at http://164.100.24.167/newsite/lb/legislative/bil/billexpected206.htm
(Accessed February 23, 2012).
96
A. Balakrishnan, The Wave Rider: A chronicle of the Information Age, Pan Macmillan, Delhi,
2012, p. 72.
44 | CHERIAN SAMUEL
the Reserve Bank of India (RBI); however, in many cases, banks have
only paid lip service to the diktats of the RBI.
More active lobbying activities are carried out by both multinational
and Indian companies who utilise cyberspace for their core commercial
activities. These range from Indian outsourcing companies to
multinationals such as Google and Facebook that have a huge stake in
one of the fastest growing internet subscriber bases in the world.
The ministry is itself a relatively recent addition to the ranks, having been established
as the Ministry of Information Technology in 1999 and merged with the Ministry of
Communications in 2001.
98
As a case in point, India was represented in the 2004 UN GGE by a senior official from
the NSCS, and in the 2010 GGE by a senior scientist from DEITY. The 2011 GGE has
representation from the Ministry of External Affairs.
AND
DOMESTIC DYNAMICS| 45
framework. These countries have also been able to revise, build and
flesh out their strategies, based on both their experiences and in keeping
with the rapidly changing technologies and the threats in the cyber
domain. The Indian Government also embarked on this endeavour,
and a draft policy was brought out by the Department of Information
Technology in March 2011.99 While measures to secure critical
infrastructure and governmental networks found place in the policy,
the absence of timelines and roadmaps made the policy more a manual
of cybersecurity than a policy. The final version of the National Cyber
Security Policy (NCSP) was released in June 2013, but it too has been
criticised for many of the same deficiencies.
A comprehensive ICT policy that goes beyond the techno-centrism
of the Ministry of Communication and Information Technology is
lacking at the government level. The term more commonly used is egovernance indicating the narrow focus on improving governance
through the use of ICT. The central governments e-governance strategy
is encapsulated in the National e-governance Plan of 2010.100. Prior to
this, there had been many isolated endeavours at the state and central
government level, and even private sector initiatives such as the echoupal.101 A similar scheme undertaken by the Karnataka state
government was the Bhoomi initiative.102 Both these initiatives suffered
from similar drawbacks: lack of reliable connectivity, scarcity of enduse devices and lack of basic infrastructure such as electricity in the
rural areas. Lack of standardisation and difficulties in scaling up were
the other issues faced by, what were essentially, pilot projects. Similar
travails may be expected with regard to cybersecurity that is necessary
for effective e-governance in terms of ensuring security of data and
individual privacy up and down the electronic pipeline.
99
Draft of the National Cyber Security Policy, Department of Information Technology, March
26, 2011, p. 3.
100
101
David M. Upton and Virginia A. Fuller, ITC eChoupal Initiative, Harvard Business School,
January 2004, at http://cb.hbsp.harvard.edu/cb/product/604016-PDF-ENG (Accessed
July 26, 2012)
102
Keya Acharya, Flaws in Bhoomi, Indias model e-governance project, Infochange India,
July 2003, at http://infochangeindia.org/technology/features/flaws-in-bhoomi-indiasmodel-e-governance-project.html (Accessed July 27, 2012).
46 | CHERIAN SAMUEL
103
104
AND
DOMESTIC DYNAMICS| 47
105
According to Rule 3, Sub Rule 2(b), Users shall not host, display, upload, modify,
publish, transmit, update or share any information that is grossly harmful,
harassing, blasphemous, defamatory, obscene, pornographic, paedophilic,
libellous, invasive of anothers privacy, hateful, or racially, ethnically objectionable,
disparaging, relating or encouraging money laundering or gambling, or otherwise
unlawful in any manner whatever. Sub Rule 2(c) forbids users from publishing
anything that threatens the unity, integrity, defence, security or sovereignty of
India, friendly relations with foreign states, or public order or causes incitement to
the commission of any cognisable offence or prevents investigation of any offence
or is insulting any other nation. The Information Technology (Intermediaries guidelines)
Rules, 2011, at http://www.mit.gov.in/sites/upload_files/dit/files/
RNUS_CyberLaw_15411.pdf (Accessed May 15, 2012).
106
These provisions have also been described in media reports as akin to the censorship
followed in China. India Puts Tight Leash on Internet Free Speech, New York Times,
April 27, 2011, at http://www.nytimes.com/2011/04/28/technology/
28internet.html?_r=1&ref=asia (Accessed May 05, 2013).
107
List of Countries with whom India Has MLATs, Central Bureau of Investigation, at
http://cbi.nic.in/interpol/mlats.php Accessed on 12 June 2012
48 | CHERIAN SAMUEL
108
Cyber Police Dreads Crimes that Crosses National Boundaries, Times of India, July 23,
2012, at http://timesofindia.indiatimes.com/city/ahmedabad/Cyber-police-dreadscrimes-that-crosses-national-boundaries/articleshow/15103023.cms (Accessed August
15, 2012).
AND
DOMESTIC DYNAMICS| 49
109
50 | CHERIAN SAMUEL
Unfolding Threats
The low level of computer security, largely because of pirated software
and the presence of patriotic hackers in the countries of the region,
have made it an arena for low-level hacking and website defacement.
The hidden hand of the intelligence agencies of these countries can be
discerned in the so-called cyber wars that break out every now and
then. This is also probably why such attacks have not crossed any red
lines, despite threats to bring down the financial systems and attack
critical infrastructure. Nearly all the upswings in defacements and hacking
that normally follow a tit-for-tat pattern have ended in truces being
called by the hackers on various sides. Though these defacements do
not amount to anything more than digital graffiti, they prove that more
grievous damage could be easily inflicted. More destructive attacks
might also have taken place, but these have not been reported either
because they are yet to be discovered or they have been discovered
but not publicised. As observed in other parts of the world, the usual
trajectory begins with hactivism and then advances to other activities
ranging from espionage to attacks on critical infrastructure.
Evidence of advanced persistent threats embedded in sensitive Indian
networks and systems has been presented through successive reports
AND
DOMESTIC DYNAMICS| 51
both from India and abroad. While the evidence remains circumstantial
and cannot be confirmed, in view of the scope for spoofing in
cyberspace, the cumulative logic of means, motive, method and
opportunity, all pointed to China even though there were suspicions
that intelligence agencies of friendly countries were also carrying out
similar activities. While the attackers have engaged in comparatively
benign activities like espionage, their presence within the networks means
that the networks are compromised and open to more destructive
actions by the perpetrators.
The first known case of cyberespionage in India was targeted against
Tibetan organisations based in India, as revealed in the Ghostnet Report
of 2009.110 Other instances of cyberespionage were brought to light
by investigators in other countries, beginning with the Shadows in the
Cloud Report 111 in 2010, followed by the Operation Shady Rat Report
in 2011 released by an anti-virus company.112 That trend continues to
this day, with the recent revelations of the Red October Report in
2013.113
110
111
Shadows in the Cloud: Investigating Cyber Espionage 2.0 Joint Report, Information
Warfare Monitor and Shadowserver Foundation, Toronto, 2010.
112
113
52 | CHERIAN SAMUEL
CHAPTER - IV
114
AND
DOMESTIC DYNAMICS| 53
Many countries in Asia also rely on the Internet for egovernance, with the Government of India alone, expected
to spend about $ 33 billion on its flagship Unique Identity
Programme by the time it is completed.
115
116
James Manyika et al. (eds.), Internet Matters: The Nets Sweeping Impact on Growth, Jobs, and
Prosperity, Rep. McKinsey Global Institute, May 2011, at http://www.mckinsey.com/
Insights/MGI/Research/Technology_and_Innovation/Internet_matters (Accessed
Sept. 15, 2012).
54 | CHERIAN SAMUEL
AND
DOMESTIC DYNAMICS| 55
117
According to one estimate, it took the equivalent of six man years and around 1.5
million dollars to develop.
118
Cyberwar on Iran more widespread than first thought, say researchers, Guardian,
September 21, 2012, at http://www.guardian.co.uk/technology/2012/sep/21/
cyberwar-iran-more-sophisticated (Accessed February 15, 2013).
56 | CHERIAN SAMUEL
119
However, as David Betz notes, anonymity is as much a problem for the aggressor as it
is for the target. Clues have been left in malware software both to misguide and to
claim ownership.
D. Betz, Cyberpower and International Security, June 2012, at http://www.fpri.org/enotes/
2012/201206.betz.cyberpower-international-security.pdf (Accessed December 13, 2012).
120
Bank Hacking Was the Work of Iranians, Officials Say, New York Times, January 8, 2013,
at http://www.nytimes.com/2013/01/09/technology/online-banking-attacks-werework-of-iran-us-officials-say.html (Accessed December 15, 2013).
AND
DOMESTIC DYNAMICS| 57
121
Japanese Websites Come under Attack as Senkaku Squabble Continues, Japan Times,
September 20, 2012, at http://www.japantimes.co.jp/text/nn20120920b7.html (Accessed
September 25, 2012).
122
The most severe of the cyberattacks took place in March 2013 when several banks and
media houses were infected with a virus that deleted data from their systems. The
malware was reported to be similar to Shamoon malware, earlier used against Saudi
Aramco.
South Korea Cyberattacks Hold Lessons, Computerworld UK, Mar. 20, at http://
www.computerworlduk.com/news/security/3436305/south-korea-cyberattacks-holdlessons-for-us/ (Accessed May 8, 2014).
123
58 | CHERIAN SAMUEL
124
M. Stokes and Jenny Lin, The Chinese Peoples Liberation Army Signals Intelligence and Cyber
Reconnaissance Infrastructure, Project 2049 Institute, 2011, at http://project2049.net/
documents/pla_third_department_sigint_cyber_stokes_lin_hsiao.pdf.
125
S. Korea Charts Out National Cyber Security Strategy, Yonhap, August 8, 2011, at
h t t p : / / e n g l i s h . y o n h a p n e w s. c o. k r / t e c h s c i e n c e / 2 0 1 1 / 0 8 / 0 8 / 4 5 /
0601000000AEN20110808006500320F.HTML (Accessed October 30, 2012).
126
127
Japan Defence Firm Mitsubishi Heavy in Cyber Attack, BBC, September 20, 2011, at
http://www.bbc.co.uk/news/world-asia-pacific-14982906 (Accessed September 25,
2012).
AND
DOMESTIC DYNAMICS| 59
Upper House Computers Also Hacked, Asahi Shimbun, November 3, 2011, at http:/
/ajw.asahi.com/article/behind_news/social_affairs/AJ2011110316472 (Accessed
September 25, 2012).
129
130
131
Toward Stable and Effective Use of Cyberspace, Ministry of Defence Panel on Cybersecurity,
Tokyo, Japan, 2012, at http://www.mod.go.jp/e/d_act/others/pdf/
stable_and_effective_use_cyberspace.pdf (Accessed September 26, 2012).
132
60 | CHERIAN SAMUEL
U.S.-Japan Set Road Map for Next 20 Years amid Asian Threats, Bloomberg, Oct. 03,
2013, at <http://www.bloomberg.com/news/2013-10-03/u-s-japan-to-expand-militaryties-for-first-time-in-16-years.html (Accessed January 8, 2014).
AND
DOMESTIC DYNAMICS| 61
the above questions. When we suddenly realise that all these nonwar actions may be the new factors constituting future warfare,
we have to come up with a new name for this new form of war:
Warfare which transcends all boundaries and limits, in short:
unrestricted warfare.
If this name becomes established, this kind of war means that all
means will be in readiness, that information will be omnipresent,
and the battlefield will be everywhere. It also means that many of
the current principles of combat will be modified, and even that
the rules of war may need to be rewritten.134
134
Qiao Liang and Wang Xiangsui, Unrestricted Warfare, (Beijing: PLA Literature and Arts
Publishing House, February 1999).
135
Dean Cheng, The Chinese Peoples Liberation Army and Special Operations, Special
Warfare, 25 (3), July-September 2012, at http://www.soc.mil/swcs/SWmag/archive/
SW2503/SW2503TheChinesePeoplesLiberationArmy.html (Accessed August 15, 2013).
136
Ibid.
62 | CHERIAN SAMUEL
of information systems, and the side, with the more resilient and secure
systems will prevail. While the focus of Western military planners is on
accelerated decision-making through the use of technologies and
concepts such as the Observe, Orient, Decide and Act OODA loop137, they
are constrained in their efforts to secure their networks, because of the
differing capabilities and capacities of the allies. Conversely, the Chinese
emphasis is on degrading hostile capabilities to the extent possible while
at the same time securing their networks.
For the PLA, non-symmetric war justifies the use of methods such as
hacking and the expropriating of intellectual property: 1) As a tool for
getting access to and parity with the advanced technologies of the
West 2) As part of psychological warfare (by visibly penetrating
networks in other countries and raising the spectre of cyber instability)
By all accounts, some aspects of the air-sea battle concept recently
publicised by the US Military, work along similar lines.138 While the US
military has been first off the block in declaring cyberspace as a war
fighting domain, it is still struggling to formulate doctrines for cyber
warfare in the light of its unique characteristics. The classified US
Presidential Directive 20 issued in October 2012, which was leaked by
the Guardian newspaper in June 2013, while discussing cyber operations
and command and control, makes no mention of cyber weapons.139
The Directive, however, noted:
The United States Government shall integrate DCEO (Defensive
Cyber Effect Operations) and OCEO (Offensive Cyber Effect
137
The OODA loop was developed by USAF Col. John Boyd to explain the decision
making process in a network enabled warfighting environment.
138
Sydney Freedburg Jr, Glimpse inside Air-Sea Battle: Nukes, Cyber at Its Heart,
Breaking Defence, July 9, 2013, at http://breakingdefense.com/2013/07/09/glimpseinside-air-sea-battle-nukes-cyber-at-its-heart (Accessed September 10, 2013).
139
Martin Libicki notes in the context of nuclear weapons that before a device or a
technique could be considered weaponised, hurdles of command and control,
predictable effects and collateral damage, conformity with recognised norms of
conduct, deployability in time and space, integration into combined arms, safety of
storage and use, integrated logistics support and training. Many of these hurdles are
applicable to cyber weapons as well though there are very few practical solutions.
Martin Libicki, Conquest in Cyberspace: National Security and Information Warfare, The Rand
Corporation, 2007, p. 109.
AND
DOMESTIC DYNAMICS| 63
140
However, OCEO and DCEO does not include cyber collection, defined as operations
for the primary purpose of collecting intelligence.
Obama Tells Intelligence Chiefs to Draw up Cyber Target List Full Document
Text, The Guardian, June 07, 2013, at <http://www.guardian.co.uk/world/interactive/
2013/jun/07/obama-cyber-directive-full-text (Accessed November 8, 2013).
141
Michael N. Schmitt, Tallinn Manual on the International Law Applicable to Cyber Warfare,
Cambridge University Press, Cambridge, 2013, p. 57.
64 | CHERIAN SAMUEL
142
Ibid., p. 76.
143
Ibid., p. 83.
144
Ibid., p. 34.
145
Ibid, p. 118-122.
AND
DOMESTIC DYNAMICS| 65
CHAPTER - V
CHALLENGES
AND
RESPONSES
146
Bhairav Acharya, The National Cyber Security Policy: Not a Real Policy, ORF Cyber
Monitor, 1 (1), August 2013, at http://orfonline.org/cms/sites/orfonline/html/cyber/
cybsec1.html (Accessed September 23, 2013).
66 | CHERIAN SAMUEL
147
148
Defence Minister opens UK cyber security test range, UK MOD Press release,
October 26, 2010, at http://www.mod.uk/DefenceInternet/DefenceNews/
DefencePolicyAndBusiness/DefenceMinisterOpensUkCyberSecurityTestRange.htm.
AND
DOMESTIC DYNAMICS| 67
149
UK Announces Extra Funding for Cyber Security Capacity Building, Cabinet Office,
October 4, 2012, at http://www.cabinetoffice.gov.uk/news/uk-announces-extrafunding-cyber-security-capacity-building (Accessed October 23, 2012).
150
Kokoda Foundation, Optimising Australias response to the cyber challenge February 14, 2011
at http://www.kokodafoundation.org/Resources/Documents/KP14Responseto
Cyber.pdf
68 | CHERIAN SAMUEL
151
152
Shortage of Right People for National Security Jobs: NSA, Hindustan Times, January
22, 2013, at http://www.hindustantimes.com/India-news/Bangalore/Shortage-of-rightpeople-for-national-security-jobs-NSA/Article1-997948.aspx.
AND
DOMESTIC DYNAMICS| 69
153
154
Council for Data Security, Times of India, June 25, 2007, at http://
articles.timesofindia.indiatimes.com/2007-06-25/chandigarh/27976424_1_data-securitycouncil-software-and-service-companies-place.
70 | CHERIAN SAMUEL
155
Saikat Datta, Executive of Telecom Giant that Aided NSA Spying Is on Indias Cyber
Security Panel, Hindustan Times, 8 Apr. 2014, at http://www.hindustantimes.com/
india-news/executive-of-telecom-giant-that-aided-nsa-spying-is-on-india-s-cybersecurity-panel/article1-1205483.aspx (Accessed May 11, 2014).
AND
DOMESTIC DYNAMICS| 71
have fallen foul of trade treaties; further, the competitive prices offered
by Chinese manufacturers are big draw. Australia was one of the first
countries to get exercised about the excessive use of Chinese-made
equipment in Australian telecom and digital networks. This came to a
head in 2009 when the Chinese manufacturer Huawei with supposed
close links to the Peoples Liberation Army (PLA) was banned from
bidding for the $ 38 billion National Broadband Network.
156
OECD figures. Of the total imports from China valued at $55 billion, ICT manufactures
and five billion smart phones accounted for $13 billion.
157
Joji Thomas Philip, Intelligence Agencies Fear China is Trying to Encircle India via
Tech Deals with Neighbouring Nations, Economic Times, January 23, 2013, at http://
articles.economictimes.indiatimes.com/2013-01-23/news/365054791huawei-and-ztenepal-telecom-telecom-and-internet-communication.
72 | CHERIAN SAMUEL
158
159
Huawei Spies for China, Claims Ex-CIA Chief , Times of India, July 19, 2013, at http:/
/articles.timesofindia.indiatimes.com/2013-07-19/security/40678109_1_chinesetelecoms-global-cyber-security-officer-giant-huawei.
160
Bharti Jain, Home ministry May Seek Review of IISc-Huawei Pact to Set Up Telecom
Lab, Economic Times, June 28, 2011, at http://articles.economictimes.indiatimes.com/
2011-06-28/news/29722347_1_telecom-gear-chinese-telecom-telecom-equipment.
Other companies did not come forward because of issues of intellectual property
rights.
AND
DOMESTIC DYNAMICS| 73
If one model passes certification, that means all the models are
certified. Then there are the patch attacks; a software or hardware
might be certified as secure, but they need regular patching and
the patches might be trojanised and make the equipment insecure.
The third vulnerability is in the supply-chain and distribution
network; while a particular piece might be sent to the test lab and
certified as secure, there is nothing to stop insecure and trojaned
equipment being sent to the company. So, while a policy might
seem feasible at a theoretical level, it might not work out at the
operational level.161
Indias Cyber Security Challenges, Task Force Report, IDSA, May 2011.
162
China is also attempting to make inroads into this sector with companies such as
Tencent rolling out products such as WeChat globally. However, Chinese companies
are constrained both by their reputation as well as their relative lack of innovation and
production values.
74 | CHERIAN SAMUEL
On the Indian side, the emphasis was on capacity building and research
and development. The joint statement at the end of President Bushs
visit to India also declared that the two sides:
[] recognised the importance of capacity building in cyber
security and greater cooperation to secure their growing electronic
163
164
165
AND
DOMESTIC DYNAMICS| 75
166
India-US Joint Statement, Press Release, Prime Ministers Office, March 2, 2006, at
http://pmindia.nic.in/press-details.php?nodeid=401 (Accessed March 10, 2012).
167
168
169
U.S.-India Joint Fact Sheet: International Security, U.S. Department of State, June 24,
2013, at http://www.state.gov/r/pa/prs/ps/2013/06/211020.htm (Accessed October
5, 2013).
76 | CHERIAN SAMUEL
170
Milton Mueller, A United Nations Committee For Internet-Related Policies? A Fair Assessment,
Internet Governance Project Blog, October 11, 2011, at http://
www.internetgovernance.org/2011/10/29/a-united-nations-committee-for-internetrelated-policies-a-fair-assessment/.
AND
DOMESTIC DYNAMICS| 77
171
172
Investigations revealed that the terrorists had used Google Earth used for training and
VOIP to communicate with their handlers; Garmin GPS units and satellite phones
were also found in their possession.
78 | CHERIAN SAMUEL
173
Five-Year Plan in the Works to Revamp Cyber Security, Times of India, December 18,
2012.
174
AND
DOMESTIC DYNAMICS| 79
Cyber Command
Though the Indian Armed Forces have been asked repeatedly by the
top political leadership about the need to develop defences against
cyberattacks, they only play a limited role in the absence of an official
policy on offensive actions.175 That notwithstanding, the armed forces
have been mulling the structures necessary to carry out operations in
the new domain and according to reports, the navy will lead these
efforts.176
There is a profusion of agencies, ranging from the Corps of Signals to
the Army Computer Emergency Response Team (A-CERT), the IT
Departments of the various HQs and the the Integrated Defence Staff
(IDS). The Defence Information Assurance and Research Agency
(DIARA) has been designated as the nodal agency mandated to deal
with all cyber security related issues of Tri Services and Ministry of
Defence according to a statement made by the defence minister in
Parliament in 2010.177 There has been no official role for the military in
175
Subimal Bhattcharjee, in Ashley J. Tellis and Sean Mirski (eds.), Crux of Asia: China,
India, and the Emerging Global Order, Carnegie Endowment for International Peace, Jan. 10,
2013, at http://carnegieendowment.org/2013/01/10/crux-of-asia-china-india-andemerging-global-order/f0gw (Accessed June 2, 2013).
176
Indian Armed Forces Mulling Three Joint Commands , The Times of India, Sept. 24,
2012, at http://articles.timesofindia.indiatimes.com/2012-09-24/india/
34061038_1_aerospace-command-cyber-command-strategic-forces-command
(Accessed June 2, 2013).
177
80 | CHERIAN SAMUEL
cybersecurity, other than that of protecting its own networks that have
been reportedly penetrated on and off.178 This, despite the Minister of
Defence referring to cyber threats as a major threat to the nation in
virtually every speech made to the apex military gathering, the Combined
Commanders Conference over the past three years.179
With the cyber arena now recognised as a new domain of war, setting
up a force competent to achieve the dual objectives of defending the
country from cyber attacks in war and securing the militarys network
operations in peace requires considerable thought. While the Armed
Forces have an advantage in that legacy issues will be kept to a minimum
since many of the networking initiatives are only now bearing fruition,
the fact remains that the Army, Navy and Air Force all have their own
separate networks where common networks are being created in the
interests of efficiency and jointness.180
In addition to the offensive and defensive aspects, cyberspace also
plays a support function. This would entail training at the lower end
and re-training at the higher end to incorporate such aspects into overall
defence planning and preparedness. While signals have always been
seen as a support function, and personnel treated as such, the unfolding
environment calls for altered career graphs to draw and retain suitable
manpower in a highly competitive environment.
While the Pentagon made waves in 2010 by declaring cyberspace as a
new domain of warfare, the main purpose was to stand up men and
allocate a budget. Even if the lions share of the 2015 budget allocation
request has gone to Cyber Command, the Army, Navy and Air Force
178
The Corps of Signals describes itself as the lead agency and nodal centre
for information and cyber
security
both
within the
Defence
Services and at the National level on the Indian Armys website. See http://
indianarmy.nic.in/Default3.aspx?MenuId=Qd7lMkEdWdE (Accessed November 15,
2012).
179
Antony Asks Army to Build Cyber Security Capabilities, The New Indian Express, Apr.
22, 2014, at http://www.newindianexpress.com/nation/Antony-Asks-Army-to-BuildCyber-Security-Capabilities/2014/04/22/article2182471.ece (Accessed May 13, 2014).
180
George Seffers, Lightening the Workload for Cyber Command, SIGNAL Magazine,
Apr. 3, 2014, at <http://www.afcea.org/content/?q=node/12599 (Accessed April 13,
2014).
AND
DOMESTIC DYNAMICS| 81
have also begun to create the structure of a future Cyber Force. In the
case of the Army, a military occupational specialty, the cyber network
defender has been created with appropriate promotional avenues to
encourage enlistment of people with a technical background as well as
to encourage migration from other military occupational specialities.181
181
Army Graduates Its First Class of Cyber Network Defenders, Defense Systems, Dec. 09,
2013, at http://defensesystems.com/articles/2013/12/09/army-cyber-networkdefender-graduation.aspx (Accessed February 5, 2014).
82 | CHERIAN SAMUEL
Conclusion
The preceding examination of cybersecurity issues throws up different
priorities and perspectives at global, regional and domestic levels.
At the global level, shorn of its complexities, the major issues
surrounding cyberspace are cybersecurity at the operational/technical
level, internet governance at the socio-political and intergovernmental
level, and adapting existing laws and conventions to cyber conflict.
The responsibility for cybersecurity is shifting from technical bodies to
states even though most states are ill prepared to shoulder that
responsibility. Cybersecurity is the outcome of having the requisite
knowledge, capabilities and capacities to ensure full awareness and
mastery over the domain. In the absence of this, it is all too easy to be
lulled into a sense of complacency based on the perception that there
are no major disruptions in systems.
From a technical standpoint, the history of cyberspace is a continuing
story based on advancement in a number of technologies leading to
disruptive innovation. These progressions have been encapsulated in
three eponymous laws, viz. Moores Law, according to which the
processing power of a microchip doubles every 18 months as a
consequence of which computers become faster and the price of a
given level of computing power halves every 18 months; Gilders Law
which states that the total bandwidth of communication systems triples
every twelve months and Metcalfes Law which propounds that the
value of a network is proportional to the square of the number of
nodes: as a network grows, the value of being connected to it grows
exponentially, while the cost per user remains the same or even reduces.
Till such a time that these laws reach their endpoint, and the pace of
technological innovation slows down, policymakers will be behind the
curve in responding to the challenges of cybersecurity.
Even going by the conventional wisdom that the lack of a formal,
hierarchical governance structure is what enabled cyberspace to expand
and scale up, the fact remains that this is a vacuum that needs to be
filled. Cyberspace itself is a challenge, being one part virtual, and one
part physical, having many of the characteristics of a global commons
AND
DOMESTIC DYNAMICS| 83
or a global public good, but denied that space by virtue of its increasing
strategic significance. The jostling for dominance over cyberspace, or
preventing any one country or entity from dominating, creates a
governance vacuum which in turn impacts on cybersecurity and makes
the task of securing cyberspace all the more difficult. This manoeuvring
for dominance takes place at many levels, from internet related
technologies to standards and protocols.
This jostling is more pronounced in internet governance which has
consequently been in a state of stasis ever since a roadmap of sorts
was laid out at the WSIS in 2003. However, there was some movement
in terms of the Netmundial summit which took place in November
2013,
There are no easy solutions to the challenges thrown up by the various
forms of cyber conflict. In fact, the effect is more akin to smoke and
mirrors, with policymakers in most countries responding to the more
visible hostile acts and responding to them, and that too in a piecemeal fashion, the various cybersecurity policies notwithstanding.
Indias unfolding objectives in the cyber domain could be said to be to
secure cyberspace domestically, extend the benefits of cyberspace
regionally, and ensuring that it is a part of the rule making process
globally. Securing cyberspace is proving to be a big challenge largely
because government fiats and cybersecurity policies not withstanding,
it is the law enforcement and judicial systems that are found wanting.
Illegal activities in cyberspace, whether it be in the form of
cyberespionage, or cybercrime, are adequately covered by laws but
the law enforcement agencies lack even the most basic forensic
capabilities to investigate such activities. This is not unique to India but
sets apart the developing countries from the developed countries. A
second shortcoming is that of domestic hardware manufacturers which
necessitates the purchase of foreign hardware with all its attendant
vulnerabilities even for sensitive projects where the project contract is
in the hands of Indian software companies. While India is an IT
superpower, it is not a cyber power in that there are very few software
products that would enhance cybersecurity being manufactured by
Indian companies. Knowledge and capabilities in technologies such as
software encryption are severely lacking with the best minds either
84 | CHERIAN SAMUEL