Вы находитесь на странице: 1из 4

Role of Defence Forces

Role of defence forces in case of Cyber war is limited. They are required to protect only
its own domain and at the most government domain such as .gov.in, .mil.gov.in, army.in
etc. But if this control is not practiced in peace time same cannot be undertaken in war
time.
How prepared is Indian Force to counter this attacks :
Indian Endeavour:
The army is cognisant of the threat to its cyber space from various state and non-state
actors. But our network is well secured in compliance with the highest standards of cyber
security, a senior official in the military headquarters told !"#$ on condition of
anonymity.
The army has established an impenetrable and secure wide area network e%clusively for
its functioning.
The !ndian army is confident.The secret information had been secured with unhackable
electronic passwords,various cryptographic controls have been incorporated in the
wake of a significant number of viruses, worms and other forms of malware.
The army frequently upgrades its comprehensive cyber security policy to pro-actively
deal with and anticipate these threats.
The force has established the Computer &mergency Response Team 'C&RT( to respond
to attacks targeting the army)s critical systems and infrastructure.
The army has its own cyber audit process conducted by cyber security personnel.
The audit is conducted in accordance with established security standards such as !$*
+,--.. "udit of the network is a continuous and active process which helps identification
and mitigation of vulnerabilities in a network to counter latest threats as also check the
network for cyber security policy compliance.
!n the area of cyber space, the battle between hackers and defenders is an ongoing
process, influenced by latest technological developments. /ue to the dynamic nature of
threats, the army is constantly upgrading its network.
Technology alone, however, cannot guarantee fool-proof security,!ndian "rmy therefore
emphasises on the people and the process to achieve compliance of best practices in this
field.
Regular training programmes are being conducted to enhance user awareness and counter
threats like social engineering and phishing.
!ndian #aval Chief "dmiral $ureesh 0ehta told to $tart 1ost2
3The !ndian "rmed 4orces are increasingly investing in networked operations, both
singly and in a 5oint fashion. 6e cannot afford to be vulnerable to cyber attacks.
!nformation Technology is our country7s known strength and it would be in our interest
to leverage this strength in developing a formidable 8offensive7 and 8defensive7 cyber
warfare capability. 9arnessing the gene pool available in academia, private industry and
the younger generation of talented individuals is imperative,:
$tatement of the !ndian #aval Chief is an endorsement to the media reports that !ndia has
offensive cyber warfare plans.
!n "ugust +-.- the !ndian government decided to recruit and form cyber army of
software professionals to spy on the classified data of hostile nations 'read 1akistan and
China( by hacking into their computer systems.
" strategy was drafted for this purpose earlier in a high level security meeting on ;uly +<,
+-.-, chaired by !ndian #ational $ecurity "dvisor $hiv $hankar 0enon and attended by
the director of !ndian !ntelligence Bureau '!B( as well as the senior officials of the
telecom department, !T ministry and R"6.
"ccording to the strategy drafted in the meeting, !ndia will recruit !T professionals and
hackers who will be assigned to be on the offensive or to launch pre-emptive strikes by
breaching the security walls of enemy7s computer systems.
The most important factor to note is the involvement of the !ndian #ational Technical
Research *rgani=ation '#TR*( along with the /efence !ntelligence "gency '/!"( who
will be responsible for creating these cyber-offensive capabilities.
!t is to be noted that #TR* is a key government agency of !ndia that gathers technical
intelligence while /!" is tasked with collating inputs from the #avy, "rmy and the "ir
4orce.
The !ndian "rmy conducted a war game called the Divine Matrix in 0arch +--<. The
most interesting aspect of this e%ercise was that !ndian 0ilitary simulated a scenario in
which China launches a nuclear attack on !ndia somewhere in +-.,. The purpose of the
e%ercise was to describe how China will launch a cyber attack on !ndia before the launch
of the actual nuclear strike.
!n +--> a group of !ndian hackers defaced a 1akistani website of the 0inistry of *il and
?as. !n a quick and effective retaliation 1akistani hackers attacked and defaced many
!ndian websites. This year too, many websites were defaced by the hackers on both sides.
!nstitute of /efence $tudies and "nalyses has attempted to give some course correction
to this rudderless situation through its recently released book 8!ndia7s Cyber $ecurity
Challenges7. '!/$", +-.+2 !/$" Task 4orce, 0arch +-.+( 9owever overall paralysis is
continuing and well planned structure such as C&RT-!#, #TR* and #$C$ are being
consistently undermined. !t is therefore necessary the #ational !nformation Board 'a
board of score of secretary ranked officer( be resuscitated and board meeting be held at
least every quarter till things stabilise and we as nation become competent to defend our
cyberspace.
Conclusion
6ar is serious matter which involves lives of all citi=ens. &ven if e%ternal declaration of
war has become redundant, this is required internally to divert resources for fighting the
war. 6hen war get 'internally( declared there are changes in organisational structure of
governance2 6ar Book comes into force2 Rules of &ngagement changes2 financial
allocation made2 civilian criminal laws stand suspended for actions taken in pursuance of
war2 and #ational &mergency may be declared. These are too profound changes which
cannot be taken lightly. Therefore every cyber-attack does not amount to cyber war.
!nvolvement of defence forces along with enlisting of hackers and allocation of cyber-
targets for proper coordination is required. The international treaties and conventions
such as !9@ and @*"C come into force. 6ars are not limited to action on ground but
diplomatic struggle also begins. #on-state actors have the ability to stand winnable
chance against a nation state. Therefore it recommended that Cyberwar be looked at with
all seriousness and following steps should be take-up in double quick time to prepare our
nation for CyberwarA
a. /eclare #ational !nformation $ecurity 1olicy after wide consultation with all stake
holders. $uch policy should be as much as possible technology neutral, overarching and
long lasting2
b. &volve Cyber warfare doctrine and develop capacity to implement such doctrine2
c. 0odify #ational 6ar-Book to include this new form of war and its peculiar
characteristics such as no-contact war and role of non-actors2
d. /efine Rule-of-engagement for Cyberwar to prevent unintended escalation of war and
unintended 9uman Rights violations2
e. &stablish command and control structures for efficient and effective conduct of
Cyberwar and prevent turf war within during the period of crisis.
f. "nd to do all this and much more, #ational !nformation Board should meet at frequent
interval2 else Cabinet Committee on $ecurity should find an alternative.

Вам также может понравиться