“India absorbs and survives its conquerors, Indians say. But...I wonder if intellectually for a thousand years India has not always retreated before the conquerors and if in its periods of apparent rebirth India has not only made itself archaic again, intellectually smaller, always vulnerable" Say no to plagiarism Get a tailor-made essay on "Why violent video games should not be banned"? Get an original essay In past centuries, the tiger ruled the jungle, today it is the "mouse", who wears the crown and canonizes cyberspace the said "power flows from the barrel of the gun" is now outdated; instead the power flows from mouse clicks in bits and bytes, later, when optical and quantum computing will hope for its presence, it will be in "photons" and "qubits ". "respectively; or even later, in the "gears" of cognitive computing, yet to be explained philosophically. The cybernetic canvas is large, the pieces plentiful, and the moves surprisingly complex and varied, provoking checks, fighting for checkmate. The most significant paradigm The change that has occurred is the transition of ICT from a support function to the focus of military affairs and control of the economy and crucial national efforts. Likewise, the pertinent example in warfare is that of the force multiplier, the weapon of mass destruction, which leads to widespread, split-second destruction of the adversary's sinews of power. There are cyber attacks "ahoy", the variety of weapons that push the limits and the styles breaking limits of fairness and ethics ad nauseam. Affordable, high-speed mobile technology has facilitated these attacks due to its easy access to people around the world (see Figures 1.1 and 1.2, respectively). They target national governments, militaries, critical infrastructure, economies, and social buildings by disrupting or destroying networks, software, hardware, cellphones, user interfaces, and even “wetware.” The latest in the series are the Shady RAT, Nitro and Red October operations, real or alleged, originating from Chinese soil, and "revolutionary" malware of the kind; Ransomware, Stuxnet, Duqu, and Flame are believed to be state-sponsored with real or fictitious speculation targeting Israel and the United States. These are complemented by CHAMP which targets enemy electronic systems with NNEMP; HERF gun, electronic bombs. photonic weapon systems, EMR weapons like DRDO's "Kali", laser weapons, among others energy beam weapons and revitalized DEW from the secret research of the last century. In the above context, on 16 April 2010, addressing the senior officers of the Defense Services and Ministry of Defense, the then Defense Minister AK Antony invited the leaders of the Armed Forces to coordinate closely with the various national IT agencies and prepare an action plan to counter cyber attacks and cyber terrorism. He repeated this advice at several forums, the latest of which was the 14th Asian Conference on "Non-Traditional Security Threats – Today and Tomorrow", held from 13 to 15 March 2012 under the aegis of the Institute for Studies and defense analyses. cybersecurity is timely and definitely sought after. He believes: “Cyber security is a critical area of concern. With the digitalization of the world and various services, the world is becoming more and more dependent on the Internet and information technology. However, network security has become a serious concern, as huge, vital and critical data passes every day. Any breach of computer networks can cause untold damage to the security of any society and countryseriously and promptly and cooperate with each other to strengthen cyber security." It is not that the defense services were unaware of the importance of cyber combat, but their involvement had not been welcomed by the "agencies" for fear of gaining the upper hand. Furthermore, geeks and laymen alike, harbor the widespread impression that cyber breaches are more common in nature than fraud, the spread of malware, spoofing, spamming and phishing, all within the ambit of law and order. These oddities, together with the indifference of the ex-establishment, have kept the Defense Services comatose, even worse, out of the count. However, each Service, on its own initiative, has organized a minimum of cyber evenings precisely to keep up with this that is happening around the world. However fragmented, low-cost and self-initiated, the effort can hardly match non-state actors from abroad and homegrown terrorists at home, let alone our avowed and aggressive adversaries and their proxies. disguised as professionals. The time has come to abandon corporate-tainted cost-benefit platitudes and take cyber warfare seriously in light of the prevailing caution and challenging environment, which requires specific synchronicity for the armed forces in developing defensive and offensive capabilities in the IT arena. IDSA released a Task Force report titled, India's cyber Security Challenges, in 2012, which represents a thought-provoking and timely, yet somewhat aggregative, reconciliation of different stakeholder views. It astutely describes the “Regional Security Scenario 2020,” highlighting the challenges of asymmetry, anonymity, unattributable bias, and deniability as characteristics of cyber warfare, but discreetly defers details of the attacks so far targeted on India, the their authors, the cyber weapons used, or in sight. Yet in “Back to the Future 1997 to 2012” and “Events of June 30, 2020” the report wisely presents and provides the “unsaid,” the “known unknown” to make the point. There has been an exponential growth in computing. Not a day goes by without technology throwing up surprises or ICANN proposing new measures for Internet governance. In 2011, the successful trials of the new Internet Protocol "IPV6" and new "domain name suffixes" are examples of euphoria and apprehension. While the aforementioned IDSA report provides a “top-down” approach, this exposition highlights a “bottom-up” analytical point of view. In this context, we must also deliberate on establishing cyber units along the chain, training warriors and conducting exercises for the delivery of multiple weapons payloads from combat platforms, both real and virtual, manned or unmanned. It would be prudent to take cues from what others are doing, lest we be excluded from the futuristic cybernetic, psychotronic, scalar or DEW club or, for that matter, Internet governance – as is the pertinent example of isolation from the nuclear club. India's cybersecurity and warfare policy paradigms are dated, clichéd and unimaginative, with obvious exceptions, and even the slightest is contained and confined to the coffers of the top of the hierarchy. If computer intrusion, techno-espionage, network espionage, infrastructure sabotage, and electromagnetic attack are recognized as warfare, then “offensive action” is vital to any strategic or tactical plan. Combat, whether real or virtual, is a legitimate concern of the man in uniform and, too, "exclusive" and "elitist" in design and logic. The saying Secure or Perish given as the titleto a previously published work based on the project “Emerging Global and National Infrastructure and their Security Implications: an Analysis” awarded by USI of India under DRDO, Dr. Kothari Fellowship in 1998, calls for a shift to Pre-erut or Repent, more consistent with emerging risks and challenges; even if the hitherto prevalent tendency to "protect" continues to bring appreciable, if not imperative, virtues. The first word, prevention, underestimates the widespread propensity to post attack "pups" and rethought "saves"; instead placing significant emphasis on preventative intelligence and constant 24/7 surveillance. It also does not in itself rule out knockout “punches.” The second word, repent, highlights the inevitable regrets for not taking timely action, including retaliation or threats. Furthermore, unlike the dictates and doctrine of “Cold Start” or “TwoFront War”, the action plan cannot and should not be specific to a country, since cyberspace defies borders; furthermore, abominable acts hide sources hostile, initiated as perhaps by a fair-weather friend or a time-tested enemy. It is widely known, if not acknowledged, that many decision makers would not have heard of MVTWs, botnets, zombies, logic bombs, trapdoors, EMRs. , EMP and scalar weapons, or ostentatious strategy and multiplicity of devices in the form of entry, anonymity, autonomy, self-replication and intelligent traits of the Chinese and Pakistani army's malware.PLA through the control of ISI hackers, crackers and Whackerz, while in India we keep our armed forces, scholars and scientists barred from sharing information and surveillance, not to mention assessing latent threats and unambiguous doctrine with the aim of training offensive options. This research work is not a manual for either so-called ethical hacking or counter-hacking. However, its logic and thrust would be lost if malware technologies, both currently revolutionary and futuristic, were not taken into account and their impact on political dynamics ignored. Cyber warfare mandates the creation of dedicated training institutes and the deployment of cyber warrior units in learning and practicing its art. Unlike kinetic warfare, the involvement of these units is not only limited to active hostilities, but also during peacetime; not only within the geographic boundaries of a state, but also in outer space, in water space, and in friendly, hostile, or neutral airspace or the commons beyond. Cyber warriors are disciplined in the art and scientific academics of ICT, electromagnetic propagation, next generation networks, software programming, cognitive radio and exploiting the complexities of computer networks, robotics, cryptography and a myriad of other inherited and emerging attacking skills and know-how. The focus of this research is on both conceptual and practical aspects of technology language and computer language, such as bandwidth, packet-switched networks, grid topologies, malware almanac, system analysis and database management, storage and mining; as well as common tactical terms associated with and preceded by “cyber,” such as reconnaissance, surveillance, convergence, situational awareness, and asymmetric doctrine. The findings and recommendations reported here are designed to illuminate risks and challenges, engineer futuristic techno-coups; be wary of war-defined perspectives abroad, promote real-world deliberations; and stimulate policy solutions appropriate to the identified zero-day challenges in some way and in some way foreseen. This jobevokes a basic orientation towards the India-centric political dynamics of cybersecurity and warfare. It addresses several fundamental perspectives, namely: It emphasizes the central idea that cyberspace is a virtual, versatile and dynamic domain or medium with its own rules, while warfare strictly follows established principles. The synthesis of the two terms, cyber and war, produces a unique, lucid, powerful and resilient paradigm, decidedly always exploratory. It originates from the scientific interpretation that cyberspace has separate layers (physical, syntactic and semantic) the conquest of each of which has a very different meaning. It supports the oft-stated belief that cyberspace is an indivisible “global commons” and that it will not replace geographic space or abolish state sovereignty. But the spread of power in cyberspace will occur concurrently with geographic space. and greatly obscures what exercising power in each of these domains entails. It gives an overview of the vulnerabilities, past incidents, and anti-virus, worm, and Trojan horse technologies that plague us, followed by swarm tactics; zapping, war driving, blue-jacking, counter-sniffing, Identity Shelter and Deep Packet Inspecting, to then evaluate variants and methodologies of cyber attacks; - distributed, reflected, unified, massed and mixed. It highlights the susceptibility of our infrastructures to terrorist and enemy attacks, particularly those equipped with SCADAICS. These are cyber or computer-controlled systems that highlight to industries, businesses, infrastructure managers and security forces that they are an integral and vital part of national security. It behooves them to learn how to effectively deal with cyber threats, and that too in concert with each other. Emphasizes the need to establish inter-service structures that train and conduct cyber exercises identifying current and future threats, expected from states and non-states. entity with the goal of engaging in war and peace. It seeks to create an elite army of futuristic tech geeks who innovate and propagate software-defined computing gadgets with intelligence; a bevy of black box inspectors who predict, track, track, and “black hole” even “zero-day malware”; and a motivated, low-profile, but crisis-hardened, cyber-warrior community that serves the country to become a responsive and deterrent cyber power based on reckoning and merit. first, a "war", both by name and by implication; therefore, a primary and serious concern of the armed forces. In our deliberations we should avoid: First, differentiation between civilian and military in matters of jurisdiction. Instead, there is a need for a policy that is nuanced, unhindered and unambiguous, and that “enables combatant commanders to execute the full spectrum of cyber activities” before, during and after combat operations. It suggests that protective offense is the best form of defense; giving a cue to the US military seeking the right to retaliate. The preventative attribute may be non-lethal, for example, radio frequency jamming, HERF attack, or NNEMP attack. You are cautioned that the above does not mean that the defense should be ignored. Cyber attacks are not facilitated by the use of force, but by the manipulation and exploitation of the enemy's defenselessness. The time has come to pay attention to our skills: scientists, academics and information warriors - especially the latter - suggest strategic and hi-tech options to neutralize attempts at espionage, sabotage, subversion and..
tags