Professional Documents
Culture Documents
TALLINN MANUAL and GLOBAL CYBER WARFARE POLICIES
TALLINN MANUAL and GLOBAL CYBER WARFARE POLICIES
by Anupam Tiwari
by Anupam Tiwari
INFORMATION SHARED in the presentation
is available along with source links in slides and
all documents referenced in the presentation will
be SHARED in a Google drive link at the
conclusion
by Anupam Tiwari
I WILL RUSH THROUGH FEW SLIDES &
DELIBERATE ON FEW
The slides I rush are respective take off points for
interested participants to explore and know more
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
Cyber Terrorism & Warfare Digital payments, credit, debit & cash cards,
mobile wallets, net banking, UPI
Artificial Intelligence
Domain name disputes
Torrents, dark web, p2p networks, and file-sharing
Cloud computing Spam, hate speech and trolling E-governance, E-courts & E-tenders
Intermediaries like Internet Service Providers (ISPs), Social Media Platforms, Email services,
video streaming services by Anupam Tiwari
Cyber Terrorism & Warfare Digital payments, credit, debit & cash cards,
mobile wallets, net banking, UPI
Artificial Intelligence
Domain name disputes
Torrents, dark web, p2p networks, and file-sharing
Cloud computing Spam, hate speech and trolling E-governance, E-courts & E-tenders
Intermediaries like Internet Service Providers (ISPs), Social Media Platforms, Email services,
video streaming services by Anupam Tiwari
STEP 4 : Towards Conclusion: ????? (We will discuss)
by Anupam Tiwari
TALLINN
MANUAL
& by Anupam Tiwari
Michael N. Schmitt
,an American
international law
scholar specializing
in international
humanitarian law,
use of force issues,
and the international
law applicable to
cyberspace
Known for his work in directing
the 7+ year project leading to
publication of the two Tallinn
by Anupam Tiwari
Manuals
by Anupam Tiwari
Tallinn is the capital and most populous city of
Estonia. Located in the northern part of the country,
on the shore of the Gulf of Finland of the Baltic Sea, it
has a population of 437,619 in 2020
by Anupam Tiwari
TALLINN MANUAL
Between 2009 and 2012, the Tallinn Manual was
written at the invitation of the Tallinn-based NATO
Cooperative Cyber Defence Centre of Excellence by
an international group of approximately twenty
experts. In April 2013, the manual was published by
Cambridge University Press
by Anupam Tiwari
TALLINN MANUAL
by Anupam Tiwari
BIRTH OF NATO
by Anupam Tiwari
BIRTH OF NATO with 12 countries
Belgium, Canada, Denmark, France,
Iceland, Italy, Luxembourg, Netherlands,
Norway, Portugal, United Kingdom and
United States
Often said that the North Atlantic
Treaty Organization was
founded in response to the threat
posed by the Soviet Union
by Anupam Tiwari
BIRTH OF NATO with 12 countries
These countries were sworn to stand
against aggression
“AN ATTACK AGAINST ONE WILL BE AN
ATTACK AGAINST ALL”
by Anupam Tiwari
NATO started with 12 countries
by Anupam Tiwari
NATO 30 Countries
by Anupam Tiwari
NATO
North Atlantic Treaty Organization also called
the North Atlantic Alliance, is an
intergovernmental military alliance between
30 European and North American
countries.
by Anupam Tiwari
NATO PURPOSE
The organization implements the North Atlantic Treaty that
was signed on 4 April 1949
by Anupam Tiwari
NATO PURPOSE
by Anupam Tiwari
NATO PURPOSE
Alliance’s creation was part of a broader effort to serve three
purposes:
by Anupam Tiwari
NATO HQs
by Anupam Tiwari
by Anupam Tiwari
i.e. after 58 years 23 days
by Anupam Tiwari
ESTONIA
by Anupam Tiwari
NATO CCD COE
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
BRONZE SOLDIER OF TALLINN
by Anupam Tiwari
BRONZE SOLDIER OF TALLINN
Informal name of a controversial Soviet World War II
war memorial in Tallinn, Estonia, built at the site of
several war graves
by Anupam Tiwari
BRONZE SOLDIER OF TALLINN
by Anupam Tiwari
Attacks that had any influence on the general public
were DISTRIBUTED DENIAL OF SERVICE TYPE ATTACKS
ranging from single individuals using various
methods like ping floods to expensive rentals of
botnets usually used for spam distribution
by Anupam Tiwari
Spamming of bigger news
portals commentaries and
DEFACEMENTS including that
of the Estonian Reform Party
website also occurred
by Anupam Tiwari
May have been the SECOND-LARGEST INSTANCE of
state-sponsored cyberwarfare, following TITAN RAIN
by Anupam Tiwari
Titan Rain was a series of coordinated attacks on
computer systems in the United States since 2003
which went ON for at least three years
by Anupam Tiwari
Estonia's response & Legalities
by Anupam Tiwari
Estonia's response & Legalities
by Anupam Tiwari
Estonia's response & Legalities
Russian State DELEGATION PROMISED that it
would AID such investigation in every way and
visit Estonia soon
by Anupam Tiwari
Estonia's response & Legalities
by Anupam Tiwari
Estonia's response & Legalities
Estonian Public Prosecutor's Office CRITICIZED this
decision while pointing out that all the requested
processes are actually enumerated in the MLAT
by Anupam Tiwari
RUSSIAN Response
by Anupam Tiwari
International & NATO Response
The attacks triggered a number of MILITARY
ORGANIZATIONS around the world TO RECONSIDER
THE IMPORTANCE OF NETWORK SECURITY to modern
military doctrine
by Anupam Tiwari
NATO organisation
by Anupam Tiwari
by Anupam Tiwari
NATO response
In response to such attacks, NATO
conducted an internal assessment of
their cyber security and
infrastructure defenses
by Anupam Tiwari
CCDCOE
On 25 June 2007, Estonian president met with US
president, and among the topics DISCUSSED were the
attacks on Estonian infrastructure and est of NATO
Cooperative Cyber Defence Centre of Excellence
(CCDCOE) to operate out of Tallinn, Estonia, since
August 2008
by Anupam Tiwari
by Anupam Tiwari
• Human Intelligence
• Integrated Air and Missile
• Analysis and Simulation for Air Defence
operations • Joint Air Power
• Civil-Military Cooperation • Joint Chemical, Biological,
• Cold Weather Operations Radiological and Nuclear Defence
• Combined Joint Operations from • Maritime Security
the Sea • Military Engineering
• Command and Control • Military Medicine
• Cooperative Cyber Defence • Military Police
• Counter-Improvised Explosive • Modelling and Simulation
Devices • Mountain Warfare
• Counter Intelligence • Naval Mine Warfare
• Crisis Management and Disaster • Operations in Confined and
Response Shallow Waters
• Defence Against Terrorism • Security Force Assistance
• Energy Security • Stability Policing
• Explosive Ordnance Disposal • Strategic Communications
by Anupam Tiwari
CYBER Interventions
by Anupam Tiwari
ESTABLISHED on 14 May 2008, it
received full accreditation by NATO and
attained the status of International
Military Organisation on 28 October
2008
by Anupam Tiwari
NATO CCD COE
i.e. NATO Cooperative Cyber Defence
Centre of Excellence
by Anupam Tiwari
“DIRECT RESULT of the cyberattacks was
the creation of the NATO Cooperative
Cyber Defence Centre of Excellence in
Tallinn, Estonia”
by Anupam Tiwari
NATO CCD COI
by Anupam Tiwari
NATO CCD COI
by Anupam Tiwari
TALLINN MANUAL
by Anupam Tiwari
TALLINN MANUAL
by Anupam Tiwari
TALLINN MANUAL
The Tallinn Manual is an academic, non-
binding study on how international law (in
particular the jus ad bellum and jus in
bello) applies to cyber conflicts and cyber
warfare
by Anupam Tiwari
by Anupam Tiwari
Jus ad bellum
by Anupam Tiwari
LEX FERENDA
by Anupam Tiwari
SOVEREIGNTY
Sovereignty is the SUPREME AUTHORITY within a TERRITORY
Source: Couture, Stephane & Toupin, Sophie. 2019. “What Does the Notion of “Sovereignty”
by Anupam Tiwari
Mean When Referring to the Digital?”, New Media & Society, 21(10):2305-2322.
CYBERCRIME LEGISLATION
WORLDWIDE
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
United Nations Conference on Trade and Development
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
https://unctad.org/page/cybercrime-legislation-worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
Legal frameworks addressing cyberspace are
well-developed in DEVELOPED countries
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
Source: Kittichaisaree, Kriangsak. 2017. Public International Law of Cyberspace. New York:
by Anupam Tiwari
Springer.
Cybercrime Legislation Worldwide
INDONESIA is in worse condition–its proposed law on
cybersecurity was postponed to be adopted due to massive
student demonstrations in 2019 caused by human rights
concerns
by Anupam Tiwari
Source: https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/185
Cybercrime Legislation Worldwide
by Anupam Tiwari
Source: https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/189
Cybercrime Legislation Worldwide
by Anupam Tiwari
Source: https://www.coe.int/en/web/conventions/full-list/-/conventions/treaty/189
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
"They are the founder members, they
will make the law and they will
change the law. We can become a
member but we cannot participate in
making or changing the law,”
https://www.outlookindia.com/newsscroll/india-cant-be-guest-member-of-eu-budapest-
convention-dr-gulshan-rai/1373827
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
https://www.nationaldefensemagazine.org/articles/2020/3/18/geneva-conventions-for-cyber-warriors-long-
by Anupam Tiwari
overdue
COMPLEXITIES & CHALLENGES
IN INTERNATIONAL CYBER
LAWs
by Anupam Tiwari
COMPLEXITIES & CHALLENGES OF INTERNATIONAL LAW
Source:
by Anupam Tiwari
https://www.e-ir.info/2020/03/14/international-law-on-cyber-security-in-the-age-of-digital-sove
COMPLEXITIES & CHALLENGES OF INTERNATIONAL LAW
Source:
by Anupam Tiwari
https://www.e-ir.info/2020/03/14/international-law-on-cyber-security-in-the-age-of-digital-sove
COMPLEXITIES & CHALLENGES OF INTERNATIONAL LAW
Source:
by Anupam Tiwari
https://www.e-ir.info/2020/03/14/international-law-on-cyber-security-in-the-age-of-digital-sove
CHINA AND RUSSIA CYBER ALLIANCE ON DIGITAL
SOVEREIGNTY
by Anupam Tiwari
CHINA AND RUSSIA CYBER ALLIANCE ON DIGITAL
SOVEREIGNTY
by Anupam Tiwari
CHINA AND RUSSIA CYBER ALLIANCE ON DIGITAL
SOVEREIGNTY
by Anupam Tiwari
The STRONG Chinese HOLD : GFWC
by Anupam Tiwari
The STRONG Chinese HOLD : GFWC
by Anupam Tiwari
The STRONG Chinese HOLD : GFWC
by Anupam Tiwari
The STRONG Chinese HOLD : GFWC
by Anupam Tiwari
The STRONG Chinese HOLD : GFWC
by Anupam Tiwari
The STRONG Chinese HOLD : GFWC
by Anupam Tiwari
The STRONG Chinese HOLD : GFWC
Source: https://en.wikipedia.org/wiki/Deep_packet_inspection
by Anupam Tiwari
by Anupam Tiwari
GRASS MUD HORSE
Is a Chinese Internet meme created as a mocking
protest against Internet censorship and the Great
Firewall and means literally "fuck your mother“
by Anupam Tiwari
Source: https://en.wikipedia.org/wiki/Grass_Mud_Horse
CHINA AND RUSSIA CYBER ALLIANCE ON DIGITAL
SOVEREIGNTY
Rather than an alliance, Russia and China have a marriage of convenience that
reflects a shared priority: REGIME STABILITY
by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Source: www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwiRvNz86KXwAhUlyzgGHc9dBDQQFjAAegQIBRAD&url=https%3A%2F
%2Fwww.aph.gov.au%2FDocumentStore.ashx%3Fid%3Db52d9a86-9d30-4029-9168-4c429289cb6e%26subId
%3D668365&usg=AOvVaw2mOCX2hF_X0dje4WPreixn by Anupam Tiwari
SNOWDEN & ASSANGE
Continues…..
by Anupam Tiwari
GAFA PRIVACY, SECURITY & TAX
ISSUES
by Anupam Tiwari
GAFA PRIVACY, SECURITY & TAX
by Anupam Tiwari
The Indian context
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&ved=2ahUKEwit3cXrl5nwAhV64zgGHSjZD5cQFjABegQIBBAD&url=https
%3A%2F%2Fniti.gov.in%2Fsites%2Fdefault%2Ffiles%2F2019- by Anupam Tiwari
07%2FCyberSecurityConclaveAtVigyanBhavanDelhi_1.pdf&usg=AOvVaw3OYxN5diQ7XE-N04oCU6mm
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
Cybercrime Legislation Worldwide
Source: https://www.asianlaws.org/blog/the-ultimate-guide-to-global-cyber-laws/
by Anupam Tiwari
Cybercrime Legislation Worldwide
Cyber Law of Antigua and Barbuda
by Anupam Tiwari
Cybercrime Legislation Worldwide
Cyber Law of Australia
Australia has a VERY MATURE CYBER LAW ECOSYSTEM comprising
several Acts and Regulations
by Anupam Tiwari
Cybercrime Legislation Worldwide
Cyber Law of Australia
by Anupam Tiwari
Cybercrime Legislation Worldwide
SYDNEY: Australia Thursday
Cyber Law of Australia passed controversial laws
allowing spies and police to
snoop on the encrypted
communications of
suspected terrorists and
criminals, as experts warned
the "unprecedented
powers" had far-reaching
implications for global
cybersecurity. There has
been extensive debate
about the laws and their
reach beyond Australia's
shores in what is seen as
the latest salvo between
global governments and
tech firms over national
security and privacy.
Source:
https://theconversation.com/a-state-actor-has-targeted-australian-political-parties-bu
by Anupam Tiwari
t-that-shouldnt-surprise-us-111997
Cybercrime Legislation Worldwide
Cyber Law of the Commonwealth
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
Cyber Law of GCC countries
Cooperation Council consisting Bahrain, Kuwait, Oman, Qatar, Saudi
Arabia, and the United Arab Emirates
by Anupam Tiwari
Cybercrime Legislation Worldwide
~400 pages
by Anupam Tiwari
Cybercrime Legislation Worldwide
~100 pages
by Anupam Tiwari
Cybercrime Legislation Worldwide
~100 pages
by Anupam Tiwari
Cybercrime Legislation Worldwide
~120 pages
by Anupam Tiwari
Cybercrime Legislation Worldwide
at
https://cyberlaw.ccdcoe.org/wiki/Main_Page
by Anupam Tiwari
Cybercrime Legislation Worldwide
19 HYPOTHETICAL SCENARIOS
by Anupam Tiwari
Cybercrime Legislation Worldwide
19 HYPOTHETICAL SCENARIOS
by Anupam Tiwari
Cybercrime Legislation Worldwide
19 HYPOTHETICAL SCENARIOS
https://cyberlaw.ccdcoe.org
/wiki/Main_Page
by Anupam Tiwari
Cybercrime Legislation Worldwide
by Anupam Tiwari
Cybercrime Legislation Worldwide
On July 16, 2020, the Court of Justice of the European Union issued
a judgment declaring as “invalid” the European Commission’s
Decision (EU) 2016/1250 of 12 July 2016 on the adequacy of the protection
provided by the EU-U.S. Privacy Shield. As a result of that decision, the EU-
U.S. Privacy Shield Framework is no longer a valid mechanism to comply
with EU data protection requirements when transferring personal data
from the European Union to the United States
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
&
CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
STOP
WAIT
GO
by Anupam Tiwari
CYBER WARFARE CONTEXT
by Anupam Tiwari
CYBER WARFARE CONTEXT
by Anupam Tiwari
CYBER WARFARE CONTEXT
REASONABLE
ABSOLUTE
by Anupam Tiwari
Michael N. Schmitt
by Anupam Tiwari
Michael N. Schmitt
SMALLER vs BIGGER
Countries
by Anupam Tiwari
Michael N. Schmitt
by Anupam Tiwari
FEW EXAMPLES : CHALLENGES IN CLARITY
by Anupam Tiwari
G E S
G E S 648 PA
303 PA
by Anupam Tiwari
Charter of the United Nations: Article 51
by Anupam Tiwari
Source : https://legal.un.org/repertory/art51.shtml
Charter of the United Nations: Article 51
by Anupam Tiwari
Source : https://legal.un.org/repertory/art51.shtml
TALLINN MANUAL 1.0
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
ed , t hen
re a tta ck
b s ite s a
0 0 0 w e c h o f
If > = 1 0 d a br e a
… ns id e r e
b e c o
it will y… .
e re ig n t
so v
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
ed , t hen
re a tta ck
b s ite s a
0 0 0 w e c h o f
If > = 1 0 d a br e a
… ns id e r e
b e c o
it will y… .
e re ig n t
so v
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
3
Importance of THE INTERNATIONAL INSTITUTION and rule-
based multilateralism in managing
by Anupam Tiwari
cyberspace
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
Source: Gueham, Farid. 2017. Digital Sovereignty – Steps Towards a New System of Internet
by Anupam Tiwari
Governance. Paris: Fondapol
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
Source: Ellen Nakashima, “Iran Blamed for Cyberattacks on US Banks and Companies,” The Washington Post, September 21,
2012, l; Jeb Boone,“Who Are the Izz Ad-Din Al-Qassam Cyber Fighters?”
by Anupam GlobalPost, November 9, 2012,
Tiwari
http://www.globalpost.com/dispatches/globalpost-blogs/thegrid/who-are-the-izz-ad-din-al-qassam-cyberfighters
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
PLEASE BEAR WITH LONG TEXT
“A state agent hacks into a computer belonging to a private company
in another state in order to extract a ransom. The control and authority
over the computer are with the private company that owns the computer.
The computer and its contents have no relationship with the state’s
exercise of its powers save for such purposes as criminal law
enforcement. As per xxx Law, a state’s inherently sovereign powers
relate to areas over which a state has exclusive control, including state
infrastructure, rather than private citizens. If this is correct, such cyber
activity would not violate the independent powers of the state in which
the computer is located and neither could the activity be construed
as intervention, regardless of whether it is coercive”
by Anupam Tiwari
Source: https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/4-application-law-case-studies
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
PLEASE BEAR WITH LONG TEXT
A state agent remotely shuts down the operation of a dominant internet
platform provider (such as Facebook) in another state, such that the entire
population of the latter state is unable to access the platform for three
days. On the basis of the above, only if the shutting down of the company
had a direct effect on the territorial state’s exercise of its inherently
sovereign functions. Would the state-sponsored cyber activities constitute
a violation of the territorial state’s sovereignty? If, for example, the
platform provider operated a portal on which a significant proportion
of the population were exclusively dependent to submit welfare claims,
that could be regarded as constituting a violation of sovereignty and the
non-intervention principle.
by Anupam Tiwari
Source: https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/4-application-law-case-studies
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
PLEASE BEAR WITH LONG TEXT
by Anupam Tiwari
Source: https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/4-application-law-case-studies
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
In November 2014 , Sony PicturesSony’s US affiliate was
hacked and confidential data extracted from its servers,
followed by the release of a huge quantity of personal data
by Anupam Tiwari
Source: https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/4-application-law-case-studies
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
The US attributed the cyberattack to North Korea
Secretary of State said that the hack ‘violated international norms but NO
ACTION except few sanctions effected and criticism of North Korea
by Anupam Tiwari
Source: https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/4-application-law-case-studies
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
Cody Wilson
by Anupam Tiwari
Cody Wilson
Click, Print, Shoot!
Unimaginable as it may
sound, Cody Wilson, a law
student at the University
of Texas has made it
possible. Wilson created
the world’s first entirely
3d printed gun and named
it “The Liberator” as a
homage to the one-shot
pistols designed to be air-
dropped by the Allies over
France during its Nazi
occupation in World War
II by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
But how it ended up was with certain individuals involved indicted by the
US government in 2016 for attacking critical infrastructure
by Anupam Tiwari
Source: https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/4-application-law-case-studies
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
A state could use cyber operations to manipulate another country’s electoral
infrastructure
For example, a hacking operation that tampers with the election results; changing
the status of voters on the roll so that their vote is listed only as provisional;
or deleting voters’ names from the electoral roll.
In 2016, the website of Ghana’s Central Election Commission was hacked and false
results announced from the Commission’s Twitter account while votes were still
being counted
by Anupam Tiwari
Source: https://www.chathamhouse.org/2019/12/application-international-law-state-cyberattacks/4-application-law-case-studies
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
“In response to cyberattacks
on their election
infrastructure, some states
have designated their
electoral infrastructure
as critical national
infrastructure. This brings
electoral infrastructure
within the scope of the
consensus report of the 2015
UN Group of Governmental
Experts”
by Anupam Tiwari
Source: https://leidensecurityandglobalaffairs.nl/articles/turning-down-the-heat-on-cyber-norms
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
…………….
Source: For an excellent review of State and non-State activities in cyberspace, see Kenneth Geers etal., World War C:
Understanding Nation-State Motives Behind Today’s Advanced
by AnupamCyber Attacks (Fire-Eye Labs), accessed January 31, 2014,
Tiwari
http://www.fireeye.com/resources/pdfs/fireeye-wwc-report.pdf.
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
While all AGREED that a cyber operation by another state that caused
damage to cyber infrastructure violated the territorial state’s
sovereignty, whereas mere CYBER MONITORING DID NOT
BUT
DISAGREED over whether PLACING MALWARE INTO CYBER
INFRASTRUCTURE or altering or destroying data qualified as a violation
by Anupam Tiwari
INTERNATIONAL LAWS ON CYBER SPACE : CHALLENGES
By this logic,
A cyber operation by State A that alters critical data stored in a
server on State B’s territory violates State B’s sovereignty.
BUT
However, if State B stored the same data in State C, State A’s
operation would only violate State C’s sovereignty
by Anupam Tiwari
Source site: https://www.yjil.yale.edu/grey-zones-in-the-international-law-of-cyberspace/
by Anupam Tiwari
by Anupam Tiwari
by Anupam Tiwari
As Russia operates in this GRAY ZONE which does
not have clear laws established they get two
advantages:
by Anupam Tiwari
As Russia operates in this GRAY ZONE which does
not have clear laws established they get two
advantages:
by Anupam Tiwari
As Russia operates in this GRAY ZONE which does
not have clear laws established they get two
advantages:
by Anupam Tiwari
CYBERSPACE Anonymity
Lex lata (also called de lege lata) is a Latin expression that means "the law as it exists"
by Anupam Tiwari
TALLINN MANUAL 1.0 vs 2.0
and
by Anupam Tiwari
TALLINN MANUAL: EXPERT GROUPS
by Anupam Tiwari
TALLINN MANUAL: EXPERT GROUPS
The International Committee of the Red Cross (ICRC) was
invited to send observers to both groups, as were other states
and organizations
The last part is the rest of Tallinn 1.0 and applies to the law of cyber
armed conflict.
by Anupam Tiwari
TALLINN MANUAL: EXPERT GROUPS
In many cases, its panel of drafters was
unable to reach a consensus, illustrating the
complexities that still haunt the cyber world.
by Anupam Tiwari
TALLINN MANUAL: EXPERT GROUPS
by Anupam Tiwari
TALLINN MANUAL: EXPERT GROUPS
Countermeasures to a CYBER OPERATION
RULE NINE establishes that the mere fact alone that a cyberattack
originates in a state’s territory and that a cyberattack is routed through a
state’s cyber infrastructure is NOT ENOUGH to attribute that attack to the
state in question. Therefore, rule nine regulates a victimized state’s
potential countermeasures to a cyber operation.
by Anupam Tiwari
TALLINN MANUAL: EXPERT GROUPS
Countermeasures to a CYBER OPERATION
RULE NINE establishes that the mere fact alone that a cyberattack
originates in a state’s territory and that a cyberattack is routed through a
state’s cyber infrastructure is NOT ENOUGH to attribute that attack to the
state in question. Therefore, rule nine regulates a victimized state’s
potential countermeasures to a cyber operation.
by Anupam Tiwari
TALLINN MANUAL: EXPERT GROUPS
Protection of the PoW in the CYBER ERA
“Prohibited cyber actions include posting defamatory information that
reveals embarrassing or derogatory information or their emotional state.
This would embrace, for example, posting information or images on the
Internet that could be demeaning or that could subject prisoners of war or
interned protected persons to public ridicule or public curiosity… guard
against intrusion by public and private actors into the communications,
financial assets, or electronic records of prisoners of war or interned
protected persons.”
by Anupam Tiwari
Source: Tallinn Manual 2.0 page 522
TALLINN MANUAL: EXPERT GROUPS
Source:
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwjMtO2QsaXwAhXOfH0KHax
vBUcQFjAFegQICxAD&url=https%3A%2F%2Fjournals.muni.cz%2Fmujlt%2Farticle%2Fdownload%2F11810%2F10665&usg=AOvV
by Anupam Tiwari
aw3Gi6biqps0IhNUez2Aimzo
Do we need a Tallinn Manual 3.0?
Criticism in the previous efforts was many states felt sidelined as their
viewpoints were not taken into consideration. Therefore, many experts
suggest that we NEED A TALLINN MANUAL 3.0, taking into account the
private interests and the interests of the Non-NATO member states from a
much broader spectrum
Another challenge highlighted in the previous capacity building effort was that
“the states didn’t want anyone to tell them what to do in the cyberspace.”
They want to leverage the cyberspace to fight a proxy war. Therefore, Tallinn
Manual 3.0 must be made with defined mechanisms of accountability, and all
the ambiguities must be addressed. Also, it must take into account incidents of
cyber-espionage and deem the act wrongful
by Anupam Tiwari
The Paris Call for Trust and Security in Cyberspace of 12
November 2018 is a call to come together to face the new
threats endangering citizens and infrastructure
by Anupam Tiwari
The Paris Call invites all cyberspace actors to
work together and encourage States to
cooperate with private sector partners, the
world of research and civil society
THANK YOU
anupamtiwari@protonmail.com
by Anupam Tiwari