India cybersecurity frontline for drill

advertisement
Frontline One
Counterplan
The USFG should provide cyber assistance to India to help them secure the CMS.
Hack won’t work – India’s cyber-defenses are strong and improving.
Times of India ‘10
(Internally citing senior military officials - “Cyber war: Indian Army gearing up” - Times of India - July 19, 2010 –
http://timesofindia.indiatimes.com/tech/tech-news/Cyber-war-Indian-Army-gearing-up/articleshow/6187297.cms)
The Indian Army is fighting attacks in the cyber world with electronic warfare capability of the "highest
standard", say officials pointing out that virtual strikes have shot up from hostile quarters in both sophistication and frequency. " The army is
cognisant of the threat to its cyber space from various state and non-state actors. But our network is well
secured in compliance with the highest standards of cyber security," a senior official in the military headquarters told IANS on
condition of anonymity. The official said the army has established an "impenetrable and secure wide area network
exclusively for its functioning". Officials in the 1.3 million force privately admit they are facing "next generation threats" and are rather worried over the complex
world of cyber warfare amid reports of Chinese and Pakistani spies targeting the Indian military establishment via the internet. Though attacks from hackers professional or amateur - can come from anywhere in the world, cyber onslaughts have been more frequent from China and Pakistan, which have reportedly been
peeking into India's sensitive business, diplomatic and strategic records. As per reports from the cyber industry, China and Pakistan hackers steal nearly six million
files worldwide every day. A report in the US-based Defence Systems magazine found that there were 25 million new strains of malware created in 2009. That
equals a new strain of malware every 0.79 seconds. The report underlines how the current cyber threat environment is dramatically changing and becoming more
challenging as the clock ticks. Howevever, the Indian army is confident. Revealing that secret
information had been secured with
unhackable electronic passwords, the official said various "cryptographic controls" have been incorporated in the wake of a significant number
of viruses, worms and other forms of malware. To address cyber defence, which is also under threat from terrorist outfits that have their own trained recruits,
officials said the army frequently upgrades its comprehensive cyber security policy to pro-actively deal with and anticipate these threats. The force has established
the Computer Emergency Response Team (CERT) to respond to attacks targeting the army's critical systems and infrastructure. Another official said the army has its
own cyber audit process conducted by cyber security personnel. "The audit is conducted in accordance with established security standards such as ISO 27001. Audit
of the network is a continuous and active process which helps identification and mitigation of vulnerabilities in a network to counter latest threats as also check the
network for cyber security policy compliance," he said. However, the official admitted there was no room for complacency in times of rapid technological change.
"In
the area of cyber space, the battle between hackers and defenders is an ongoing process, influenced by latest
army is constantly upgrading its network," he said.
technological developments. Due to the dynamic nature of threats, the
Frontline 2
Counterplan
The USFG should provide cyber assistance to India to help them secure the CMS.
Hack won’t work – India’s cyber-defenses are strong and improving.
Times of India ‘10
(Internally citing senior military officials - “Cyber war: Indian Army gearing up” - Times of India - July 19, 2010 –
http://timesofindia.indiatimes.com/tech/tech-news/Cyber-war-Indian-Army-gearing-up/articleshow/6187297.cms)
The Indian Army is fighting attacks in the cyber world with electronic warfare capability of the "highest
standard", say officials pointing out that virtual strikes have shot up from hostile quarters in both sophistication and frequency. " The army is
cognisant of the threat to its cyber space from various state and non-state actors. But our network is well
secured in compliance with the highest standards of cyber security," a senior official in the military headquarters told IANS on
condition of anonymity. The official said the army has established an "impenetrable and secure wide area network
exclusively for its functioning". Officials in the 1.3 million force privately admit they are facing "next generation threats" and are rather worried over the complex
world of cyber warfare amid reports of Chinese and Pakistani spies targeting the Indian military establishment via the internet. Though attacks from hackers professional or amateur - can come from anywhere in the world, cyber onslaughts have been more frequent from China and Pakistan, which have reportedly been
peeking into India's sensitive business, diplomatic and strategic records. As per reports from the cyber industry, China and Pakistan hackers steal nearly six million
files worldwide every day. A report in the US-based Defence Systems magazine found that there were 25 million new strains of malware created in 2009. That
equals a new strain of malware every 0.79 seconds. The report underlines how the current cyber threat environment is dramatically changing and becoming more
challenging as the clock ticks. Howevever, the Indian army is confident. Revealing that secret
information had been secured with
unhackable electronic passwords, the official said various "cryptographic controls" have been incorporated in the wake of a significant number
of viruses, worms and other forms of malware. To address cyber defence, which is also under threat from terrorist outfits that have their own trained recruits,
officials said the army frequently upgrades its comprehensive cyber security policy to pro-actively deal with and anticipate these threats. The force has established
the Computer Emergency Response Team (CERT) to respond to attacks targeting the army's critical systems and infrastructure. Another official said the army has its
own cyber audit process conducted by cyber security personnel. "The audit is conducted in accordance with established security standards such as ISO 27001. Audit
of the network is a continuous and active process which helps identification and mitigation of vulnerabilities in a network to counter latest threats as also check the
network for cyber security policy compliance," he said. However, the official admitted there was no room for complacency in times of rapid technological change.
"In
the area of cyber space, the battle between hackers and defenders is an ongoing process, influenced by latest
technological developments. Due to the dynamic nature of threats, the army is constantly upgrading its network," he said.
( ) Successful hack couldn’t create havoc – too much of India’s critical infrastructure is
not yet online. Dedicated networks also check risk of an attack.
Shukla ‘13
Ajai Shukla is Indian journalist and retired Colonel of Indian Army. He currently works as Consulting Editor with Business
Standard writing articles on strategic affairs, defence and diplomacy. He earlier worked with DD News and NDTV– “India's
digital battleground” - Business Standard - June 21, 2013 - http://www.business-standard.com/article/current-affairs/india-sdigital-battleground-113062101013_1.html
India has been slow in fixing its attention on cyber security. This may partly be because much of the country's
critical infrastructure - power grids, public transportation, nuclear power plants, defence systems - is
controlled by manual systems, or by standalone computer systems that are not linked over the internet. In that respect,
India's infrastructural backwardness has proved useful against cyber-attacks. "It is not unusual to find central ministry
officials in New Delhi using unsecured email systems, sometimes even commercial email accounts on public servers. But India's sensitive networks
tend to be isolated, with no point of contact with the Internet that would render them vulnerable to
online hacking. Several agencies have their own dedicated, secure fibre-optic networks, notably the
military, Defence R&D Organisation (DRDO), and police's Crime and Criminal Tracking Network System," says Praveen Swami,
strategic affairs editor of Network18.
( ) CMS surveillance is not a honeypot of privacy. Aff exaggerates how much content is
truly being gathered.
Xynou ‘13
Maria Xynou is a Policy Associate on the Privacy Project at the Centre for Internet & Society. She has previously interned with
Privacy International and with the Parliament of Greece. Maria holds a Master of Science in Security Studies from the University
College London. “India's 'Big Brother': The Central Monitoring System (CMS)” – April 8th - http://cis-india.org/internetgovernance/blog/indias-big-brother-the-central-monitoring-system
Another cyber security expert argued that the
idea that the privacy of our messages and online activity would be
intercepted is a misconception. The expert stated that: ´The police are actually looking out for open source
intelligence for which information in public domain on these sites is enough. Through the lab, police can access what is
in the open source and not the message you are sending to your friend.´ Cyber security experts also argued that
the purpose of the creation of the Mumbai social media lab and the CMS in general is to ensure that Indian law
enforcement agencies are better informed about current public opinion and trends among the youth,
which would enable them to take better decisions on a policy level. It was also argued that, apparently, there is no harm in
the creation of such monitoring centres, especially since other countries, such as the U.S., are conducting the same type of surveillance, while have enacted
stringent privacy regulations. In other words, the
monitoring of our communications appears to be justified, as long as it is in
the name of security.
( ) New Freedom Act is sufficient to solve US’s global credibility gap.
HRW ‘15
Human Rights Watch is an independent, international organization that works as part of a vibrant movement to uphold human
dignity and advance the cause of human rights for all. “Strengthen the USA Freedom Act” - May 19, 2015 http://www.hrw.org/news/2015/05/19/strengthen-usa-freedom-act
As the Senate considers the USA Freedom Act this week, policymakers should strengthen it by limiting large-scale collection of records and reinforcing transparency
and carrying court reforms further. The
Senate should also take care not to weaken the bill, and should reject any
amendments that would require companies to retain personal data for longer than is necessary for business purposes. It has been two years since the
National Security Agency (NSA) whistleblower Edward Snowden unleashed a steady stream of documents that exposed the intention by the United States and the
United Kingdom to “collect it all” in the digital age. These revelations demonstrate how unchecked surveillance can metastasize and undermine democratic
institutions if intelligence agencies are allowed to operate in the shadows, without robust legal limits and oversight. On
May 13, the US House of
Representatives approved the USA Freedom Act of 2015 by a substantial margin. The bill represents the latest attempt by Congress to rein in
one of the surveillance programs Snowden disclosed—the NSA’s domestic bulk phone metadata collection under Section 215 of the USA Patriot Act. The House vote
followed a major rebuke to the US government by the US Court of Appeals for the Second Circuit, which ruled on May 7 that the NSA’s potentially nationwide
dragnet collection of phone records under Section 215 was unlawful. Section 215 is set to expire on June 1 unless Congress acts to extend it or to preserve specific
powers authorized under the provision, which go beyond collection of phone records. Surveillance reforms are long overdue and can be accomplished while
protecting US citizens from serious security threats. Congress and the Obama administration should end all mass surveillance programs, which unnecessarily and
disproportionately intrude on the privacy of hundreds of millions of people who are not linked to wrongdoing. But reforming US laws and reversing an increasingly
global tide of mass surveillance will not be easy. Many of the programs Snowden revealed are already deeply entrenched, with billions of dollars of infrastructure,
contracts, and personnel invested. Technological capacity to vacuum up the world’s communications has outpaced existing legal frameworks meant to protect
privacy. The Second Circuit opinion represents an improvement over current law because it establishes that domestic bulk collection of phone metadata under
Section 215 of the Patriot Act cannot continue. Section 215 allows the government to collect business records, including phone records, that are “relevant” to an
authorized investigation. The court ruled that the notion of “relevance” could not be stretched to allow intelligence agencies to gather all phone records in the US.
However, the opinion could be overturned and two other appeals courts are also considering the legality of the NSA’s bulk phone records program. The opinion also
does not address US surveillance of people not in the US. Nor does it question the underlying assumption that the US owes no privacy obligations to people outside
its territory, which makes no sense in the digital age and is inconsistent with human rights law requirements. Even if the Second Circuit opinion remains good law,
congressional action will be necessary to address surveillance programs other than Section 215—both domestic and those affecting people outside the US—and to
create more robust institutional safeguards to prevent future abuses. The courts cannot bring about reforms to increase oversight and improve institutional
oversight on their own. Human
Rights Watch has supported the USA Freedom Act because it is a modest, if
incomplete, first step down the long road to reining in the NSA excesses. Beyond ending bulk records collection, the bill would begin to reform the
secret Foreign Intelligence Surveillance Act (FISA) Court, which oversees NSA surveillance, and would introduce new transparency measures to improve oversight. In
passing the bill, the House of Representatives also clarified that it intends the bill to be consistent with the Second Circuit’s ruling, so as to not weaken its findings.
The bill is no panacea and, as detailed below, would not ensure comprehensive reform. It still leaves open the possibility of
large-scale data collection practices in the US under the Patriot Act. It does not constrain surveillance under Section 702 of the FISA Amendments Act nor Executive
Order 12333, the primary legal authorities the government has used to justify mass surveillance of people outside US borders. And the bill does not address many
modern surveillance capabilities, from mass cable tapping to use of malware, intercepting all mobile calls in a country, and compromising the security of mobile SIM
cards and other equipment and services. Nonetheless,
passing a strong USA Freedom Act would be a long-overdue step in the
right direction. It would show that Congress is willing and able to act to protect privacy and impose oversight
over intelligence agencies in an age when technology makes ubiquitous surveillance possible. Passing this bill would also help shift the
debate in the US and globally and would distance the United States from other countries that seek to
make mass surveillance the norm. On a global level, other governments may already be emulating the
NSA’s approach, fueling an environment of impunity for mass violations of privacy. In the last year, France, Turkey,
Russia, and other countries have passed legislation to facilitate or expand large-scale surveillance. If the
USA Freedom Act passes, it would be the first time Congress has affirmatively restrained NSA activities since
the attacks of September 11. Key supporters of the bill have vowed to take up reforms to other laws next, including
Section 702 of the FISA Amendments Act.
( ) Deterrence checks India-Pakistan war.
Khan ‘12
(Ikram Ullah, analyst for the South Asian Strategic Stability Institute, “Nuclear Pakistan: Defence Vs Energy Development,” 7/26,
http://www.eurasiareview.com/26072012-nuclear-pakistan-defence-vs-energy-development-oped/)
We must be clear that nuclear
weapons are here to maintain peace and stability between Pakistan and India. Pakistan was
forced to run its nuclear weapon program due to India’s nuclear weapon program and its hegemonic ambition. Pakistan has long said that its
nuclear weapon program is security driven. While on other hand Indian nuclear weapon program is not security driven, rather it is based on
its regional and global aspirations. ¶ The security threats still exist for Pakistan, but due to its credible nuclear deterrence Pakistan is
capable of crushing such threats or plans. In the recent past, the tragedy, which many historians remember as the “Fall of Dhaka”, carries some lessons
for us to be learnt. If India could intervene at that time, then it is quite possible it could intervene in Baloachistan. Now the nuclear capability of
Pakistan deters India from perusing any kind of intervention because of the fear of perceived
consequences.¶ It is Pakistan’s credible nuclear deterrence capability that effectively neutralizes any ill intent of its opponent
against its integrity and sovereignty. It is evident that after the December 13, 2001 terrorists attack on Indian Parliament, India
mobilized its armed forces to attack on Pakistan, but refrained from doing so as it realized that any such
irrational action would lead to a nuclear war. The same was the case after Mumbai attacks on November 26, 2008
– the nuclear deterrence prevailed and it prevented the likelihood of an all out nuclear war in South Asia.
( ) India-Pakistan tensions will never escalate to the point where nuclear deployments
on seriously on the table.
Loudon ‘8
(Bruce Loudon has worked as a foreign correspondent since 1968. He has been visiting and reporting on Pakistan since the
1970s. He is currently The Australian’s South Asia correspondent. The Australian, “Doomsday dread”, December 04, 2008,
http://www.theaustralian.news.com.au/story/0,25197,24746635-25837,00.html)
THE doomsayers' published assessments tell the grim story: upwards of 12 million people killed on the first day of a nuclear exchange, more than 150 million dead
in a longer nuclear conflict. Devastation and destruction on a scale that is almost unimaginable. A catastrophe that would vastly transcend that seen at Hiroshima
and Nagasaki at the end of World War II. That is why, as India and Pakistan muscle up to each other after the Mumbai massacre and leaders from across the world
hurry to counsel cool heads and caution in New Delhi and Islamabad, the unspoken fear
everywhere is that the two South Asian
neighbours could be pushed into the unthinkable: their fourth war, and one in which they would mobilise their nuclear
arsenals. It is, it must be said, an unlikely prospect. No one in either capital -- even among the hotheads -- is
thinking in those terms. Experienced strategic analysts rule it out. "Don't even think about it. It ain't going to happen," one
says. But as the crisis over terrorism across South Asia deepens and jihadist groups linked to al-Qa'ida launch devastating attacks such as the one in Mumbai last
week -- attacks designed to exacerbate tensions between India and Pakistan -- there is, in the view of most analysts, always the potential for events to tumble out of
control and lead to a doomsday nuclear conflagration, with enormous loss of life. "South Asia's a nuclear tinderbox," a leading military analyst in New Delhi tells
The Australian. "Yes, of course, I'd just about rule it out in the context of the face-off following the Mumbai attack. "But it's always there, always nagging at the
edges of the constant tensions in the subcontinent. And there's no doubt that Osama (bin Laden) is doing his bit to stir the pot and do what he can to increase those
tensions, since conflict between India and Pakistan serves the jihadist cause." Yesterday, US military officials in Washington, DC, closely monitoring the situation
described the military temperature between the two neighbours as "pretty low right now", adding that although Pakistan has moved some aircraft and air defence
units closer to the Indian border since the Mumbai attack, "on the nuclear side there is nothing". Which is hardly surprising, for the
political will in both
sides, despite the muscle-flexing, is overwhelmingly against resort to their nuclear arsenals. India, since it demonstrated its
nuclear capability in 1998, has maintained a firm no-first-strike policy and a few days ago Pakistan's President Asif Ali Zardari turned longstanding Pakistani policy on
On both sides there is a mood of
extreme caution on the subject of any possible use of nuclear weapons, matched only by the intense secrecy that surrounds
its head (some believe to the annoyance of the country's powerful generals) by articulating a similar stance.
their arsenals.
Download