Cyber warfare: A roadmap for India

Nurture our world-class talent in software with infrastructural support to safeguard critical infrastructure

sanjpandey

Sanjay Pandey | April 3, 2013



North Korea has declared that it is at war with South Korea. As per news reports its nuclear missiles are being positioned to target the US as well as South Korea. In response, the US flew stealth bombers close to the North Korean territory.  This reaction could appear drastic but considering the capabilities of North Korea this is not surprising. Besides its nuclear capabilities, North Korea over the years has built an army of as many as 30,000 cyber warfare specialists which over the years have been trained in various aspects of cyber warfare. This indeed is a serious concern and there is a reason too behind it. While there may be stealth bombers, which have been tried and tested to overcome normal combat, measures to control and combat cyber war are in a fledgling state.

With manifold increase in internet applications using computer networks, development of measures to secure these network and applications has been lagging behind. The malware side of software was not anticipated when the applications were developed. Malware which earlier was at best a nuisance has slowly transformed into ransomware where money is being demanded for undoing the damage caused and of late has taken the shape of actual weaponry targeting national networks, for example, the 2007 cyber attack on Estonia in which the entire nation’s computer network was crippled in cyber attacks. Unleashing of Stuxnet, allegedly to impede Iranian nuclear facilities, showed not only sophistication but also use of cyber capabilities to meet political ends.

India, on its part, too has been facing its share of cyber attacks. Most of these attacks have been related to defacement of websites and collection of information from government networks. These trends are worrisome. Countries, across the world, are scrambling for options to prepare against such attacks.

Most options being tried today are in the area of launching counter offensives in case of a cyber attack and also surveillance options to collect information from rival networks. Ghostnet, allegedly developed by China, has almost engulfed computer networks of entire countries and has been secretly scurrying data from their networks. Alongside surveillance, cyber weapons of different types have been developed. Some of these collect information, others make systems dysfunctional (Wiper) and yet others aim at sabotaging critical national infrastructure (Stuxnet).

In this scenario, it is imperative to build a model which will attempt to make these attacks ineffective. With approximately 12 million internet connection and increase in e-commerce transactions in India, development of this model is a need which can’t remain just a thought process anymore.

One of the first steps towards building this model is to promote and develop research capabilities in the area of internet technologies. This includes issues like crypto analysis, surveillance and interception techniques. These topics need to be part of the curriculum of technological institutions in the country. Attempts of research at IITs/IISc and Indian Standard Institution (ISI) will need to be broad-based so that this encompasses and encourages a much larger section of Indian students.

Apart from education and research, another growing need is to develop and enforce standards for computer hardware and applications. Stories of how hardware manufactured allegedly in China being used for espionage abound on the internet. India should be worried about forays of certain technology firms in India which have otherwise found themselves unwelcome elsewhere in the world. The entry of IT-related companies, particularly those dealing with products need to undergo greater scrutiny to ensure safety and security of Indian data. While ISI does provide standards for most items of day-to-day use, computer software and hardware being sold in India should be certified prior to its sale and use in the country. Development and enforcement of standards like Federal Information Processing Standards (FIPS) and expected assurance level (EAL) ratings which are common in the western world need to be considered, if we need to develop an effective preventive model to combat cyber menace in future.

Alongside these measures it is mandatory that laws dealing with the internet use and application are developed and enforced in the country. Limitations on import and export of software at best are loosely defined and need to be more specific and detailed focusing on confidentiality and integrity of data that they are intended to handle. Controls need to exist to prevent people working on connected leased lines developing software for international markets doing illegal work and illegally colluding in future. Development of privacy laws and restrictions as imposed by green harbour principles of Europe are needed to effectively arm this model. Amendments to the IT Act 2000, which was to enforce digital signature regime, fall short of addressing the scale and nature of these attacks.

Lastly, it is required that the entire area of computer research, development and deployment comes under a regulated purview of an independent entity on the lines of Securities Exchange Board of India (Sebi), which should monitor and direct development of right educational requirements, research initiatives, standards and adjudicate on any disputes. This proposition is not without any parallel. In fact, National Institute of Standards and Technology (NIST) in the US does just this and is supported by National Security Agency (NSA) in its efforts. Attempts by private associations and bodies promoted through private initiatives may be good to initiate the process, but have nowhere been able to match up to national needs. These efforts have to be promoted and nurtured by the government, maybe with private support but by private entities alone.

We may not have stealth bombers to terrorise, but we do have world-class talent in computer software. This talent with proper infrastructural support can build and execute protective cyber shield which will safeguard our critical infrastructure in times of need in future.
 

These are the author's personal views.

Comments

 

Other News

Voter turnout: Drop from 2019 reduces further

As the voting percentages dropped drastically in the first couple of phases of the ongoing general elections, observers and analysts spoke of ‘voter apathy’ blamed it on a lack of “wave” this time – apart from the heatwave, that is. The latest figures after the fourth phase, h

GAIL reports annual revenue of Rs.1,30,638 crore

GAIL (INDIA) Limited has reported 75% increase in Profit before Tax (PBT) of Rs.11,555 crore in FY24,  as against Rs 6,584 Cr in FY23. Profit after Tax (PAT) in FY24 stands at Rs. 8,836 Cr as against Rs.5,302 Cr in FY23, a 67 % increase. However, revenue from operations registered a fa

Women move forward, one step at a time

“Women’s rights are not a privilege but a fundamental aspect of human rights.” —Savitribai Phule In India, where almost two-thirds of the population resides in rural areas, women’s empowerment initiatives are extremely critical for intensifying l

Why you should vote

What are the direct tangible benefits that you want from the government coming in power? The manifestos of various parties set a host of agendas which many times falls back in materialising the intended gains. Governance failures, policy lapses, implementation gaps, leadership crisis and cultural blockages

How the role of Ayurveda evolved pre- and post-independence

Ayurveda, Nation and Society: United Provinces, c. 1890–1950 By Saurav Kumar Rai Orient BlackSwan, 292 pages, Rs 1,400  

General Elections: Phase 4 voting on in 96 seats

As many as 17.7 crore electors are eligible to vote in the fourth phase of general elections taking place on Monday in 10 states/UTs. 175 Legislative Assembly seats of Andhra Pradesh and 28 Legislative Assembly seats of Odisha are also going to polls in this phase. Polling time in select as

Visionary Talk: Amitabh Gupta, Pune Police Commissioner with Kailashnath Adhikari, MD, Governance Now


Archives

Current Issue

Opinion

Facebook Twitter Google Plus Linkedin Subscribe Newsletter

Twitter