Skip to main content

Cyber wars: Are we legally ready to counter the attacks


By Nishant Ahlawat

India as the world knows has become the centre stage for the corporate and political affairs of the globe.  Having a sneak peek into the recent happenings, it becomes much evident that India is bound to face unprecedented friction in all spheres, be it social, political, structural, financial or related to national security. When we thought it was just the direct acts of strategic terrorism from our enemies operating within and from distant lands that we are facing, the booming IT industry and everyday improvising means and modes of communication and data transfer has opened new options for attacking and challenging the very existence of the greatest democracy in the world .
The use of advance means of communication in terms of GPS, Blackberry, Switchable Sim cards, remailers and VOIP as was revealed in the investigations or the follow up cyber attacks by the Pakistani Cyber Army as they hacked into the websites of Indian Institute of Remote Sensing[i] , the Center for Transportation Research and Management  etc  this happenings have marked the advent  a new cause for understanding our cyber and technology rights in backdrop of an almost complicated and inefficient regulatory regime as it exists on date.
The year-wise summary of various types of incidents handled by CERT IN is given below:

An overview of the table itself establishes the steep rise in number of security incidents related to cyber attacks. While these figures give an idea of the gravity of the situation, the actual picture is far grimmer. It becomes much difficult to ascertain and identify the conspirators of such attacks and their intentions as for executing such an attack they don’t even have to leave the comfort zone of their houses.
While lately the dependency on technology and networks in all walks of life  has established the need for an active and effective mechanism for regulating the cyber world , the rules and legislations on date hardly make up to deal with the complicated situation which have and which will arise in years to come.
Besides, the Aadhar cards that are being in the process of becoming the most effective Identity for the Citizens, the nature of data related to every citizen as is being profiled for the purpose of these cards and being stored in huge databases is not actually away from the eyes of the enemy. The nature of personal information which if exposed to wrong eyes can truly be misused in all possible sense.
What further darkens the issue is the fact that except totally relying on the Constitution of India or some of the enabling acts, India has no data privacy or protection laws as on date to cope up with and handle any issue that may arise with the loss of any such data.
It’s high time that a nationwide debate be called in for the country and countrymen to understand the very nature of these attacks that are and that will take place in future and be prepared to counter them in the true sense of maintaining and securing the integrity of this great country.



[i] Kamlesh Bajaj , -‘Tweaking  the law to deal with the cyber terrorism,’liveMint.com,http://www.livemint/2009/01/15222108/Tweaking-the-law-to-deal-with.html,accessed on January 15,2009.http://www.technolegals.com/internet-law

Comments

Popular posts from this blog

What will happen to your virtual property after your life time?

By Nishant Ahlawat Techno Legals LLP Introduction Lately a lot of my clients have raised queries about getting legitimate access to virtual accounts and e- properties of their deceased loved ones. Analyzing these queries I intend to explain the complexity and solution to simplify legal and practical issues so emanating out in form of a virtual property will. In today’s world use, of computers, storage devices and software(s) is no more an option or utility but a necessity. While this virtual reality opens gateway to new form of user experience(s), gaming, data depositions, creative, social interactions and revenue generation models it also calls for an interpretation of existing laws from a new spectrum. Virtual Property Have you ever thought why you are able to access large number of virtual/ internet services for no cost at all?  The answer lies in their usage by large number of users including you. Knowingly- Unknowingly not only you contribute to increased val...

ADMISSIBILITY OF EVIDENCE RELATED TO ELECTRONIC RECORDS UNDER INFORMATION TECHNOLOGY ACT AND INDIAN EVIDENCE ACT

ADMISSIBILITY OF EVIDENCE RELATED TO ELECTRONIC RECORDS UNDER INFORMATION TECHNOLOGY ACT AND INDIAN EVIDENCE ACT WRITTEN BY: VIVEK NASA ELECTRONIC EVIDENCE / EVIDENCE RELATED TO ELECTRONIC RECORDS NOT ADMISSIBLE WITHOUT CERTIFICATE UNDER SECTION 65B(4) OF INDIAN EVIDENCE ACT. ANY AUDIO/VIDEO RECORDING OF ANY CRIMINAL OFFENCE GIVEN TO POLICE ON CD/DVD/PEN DRIVE, NOT ADMISSIBLE EVIDENCE PER SE . After implementation of Information Technology Act 2000 (as amended), amendments were made to other statues like Indian Penal code and Indian Evidence Act, to recognize offences/ criminal acts done, using computer systems (including electronic devices). Amendments were also introduced to Indian Evidence Act to recognize evidence collected using computer systems. Section 65A and 65B were added to recognize admissibility of evidence related to electronic records. Section 65A of Indian Evidence Act reads as under: “Section 65A: Special provisions as to evidence relating to el...

IMPORTANT CHECKLIST TO GET A SOFTWARE DEVELOPMENT AGREEMENT DRAFTED

By Nishant Ahlawat Techno Legals LLP 28 August 2014 Scenario With rise of e-commerce in India and the world, new and naïve form of e-commerce business models and technologies are coming up every minute in market. In fact some of these services have become integral part of our day today life and have changed the way we travel, we shop, we buy items of our daily needs, etc. On other perspective these concepts or models may either be identical or distinct of each other, but all of these streams have one common feature. This common feature is their dependency on multiple software platforms for effective running and smooth execution of their concepts.  Now be it a startup or an IT giant, they all have their technical dependency on in-house or outside Technical teams for their IT resource development depending upon multiple factors like skills, team size, turn- around time, costing etc. Like any other business, getting a software developed also requires to be safeguarded w...