Securing cyberspace

Securing cyberspace
x
Highlights

There is a lack of consensus in the international community on the norms of behaviour in cyberspace\" and this is leading to ad hocism and preventing the issue being addressed in a holistic manner, writes noted security expert Arvind Gupta in the opening chapter of this book, which is a compilation of 24 presentations made at the 18th Asian Security Conference hosted by the Defence Ministry-funded

"There is a lack of consensus in the international community on the norms of behaviour in cyberspace" and this is leading to ad hocism and preventing the issue being addressed in a holistic manner, writes noted security expert Arvind Gupta in the opening chapter of this book, which is a compilation of 24 presentations made at the 18th Asian Security Conference hosted by the Defence Ministry-funded think-tank Institute of Defence Studies and Analyses (IDSA).

Gupta believes that we are at a stage where technology is far ahead of cyber laws and cyber norms. While the UN Group of Government Experts (UNGGE) has proved to be a useful platform to discuss these issues, the absence of "a broader representative platform where contentious issues can be hammered out and consensus arrived at" is absent.

Gupta, incumbent Deputy National Security Advisor and a former IDSA Director General, says the global community needs to come together to discuss how to deal with growing threats in cyberspace, and serious reflection is needed on whether the world needs a Cyber Convention on cyber-security.

Closer home, India also faces the "daunting task" of stopping and preventing cyber-attacks on its networks. India will, in fact, have to study the evolution of the idea of cyber deterrence.

To build an effective cyber-deterrence capability would require robust networks "that can be defended, encouraging comprehensive R&D in the area of cyber-security and strengthening indigenous manufacturing of ICT products".

Not to speak of strong cyber diplomacy "to ensure that India is not at the receiving end of the emerging ICT Export Control regime under the Wassenaar Agreement".

Gupta maintains that there is a need to analyse the patterns of cyber-attacks against India so as to adopt suitable counter-measures, "including the capability to conduct cyber operations, if required".

The country must internalise the "increasingly assertive cyber-security doctrines that are being adopted by other countries" as it works out its own cyber-security doctrines.

Holding that cyber-attacks cannot be seen in isolation, Gupta says that cyberspace today has close links to "other domains of warfare, namely, land, water, air and space".

The book has been divided into two sections -- International Perspectives on Cyber-security and Asian Perspectives on Cyber-security.

Among its highlights: Sanjeev Relia, a serving Colonel in the Indian Army, seeks a clear delineation between the different non-state actors. In the first instance, there are the good non-state actors, like companies and nonprofits who are largely responsible for the creation and maintenance of cyberspace.

The bad non-state actors can be sub-divided into those who form part of radical organisations such as the ISIS and Al-Qaeda; also referred to as cyber-terrorists.

The book's editors, Cherian Samuel and Munish Sharma (both with the IDSA), hold that as an economic and geopolitical organisation of eight countries, the South Asian Association for Regional Cooperation (Saarc) can play a pivotal role in capacity-building as well as coordinating cyber-security efforts of all the members facing non-traditional security threats, such as cyber-terrorism and cyber-crime, from non-state actors to both their populace and businesses.

Nandkumar Saravade, a former IPS officer who has served as CEO of the Data Security Council of India, points to a rather grim scenario: India lacks the necessary structures and capabilities within the country to understand complex cyber-security issues, and the government has to build the necessary frameworks to engage in consultations with the key stake-holders and develop a position on key cyber-security issues.

Comparing the American and Chinese perspectives on cyber-security, Cuihong Cai, an Associate Professor of International Relations at the Center for American Studies at Shanghai's Fudan University, contends that over-interpretation of cyber-security risks strengthens the threat cognition, which results in conflicts and control-oriented security practices.

It further leads to trust-deficit and weakening of rules, resulting in the self-fulfilling prophecy of heightened cyber conflicts.

Show Full Article
Print Article
Next Story
More Stories
ADVERTISEMENT