Thursday, 26 May 2016

Limits and challenges of cyber warfare

Does cyber warfare limits and rules? Are they protected against cyber attacks computers, networks and cyber infrastructure civilians? The answer is yes, according asserts an international group of jurists and military experts in Tallinn Manual, whose production document the ICRC has participated as an observer. This document explains that the Tallinn Manual, demonstrating the relevance of international humanitarian law in all armed conflicts, represents an important step towards reducing human suffering.

Why cyber warfare is of concern to the ICRC?


The term "cyber war" has been used by several people in reference to different situations. In the manual, "cyber warfare" means the means and methods of warfare employed in cyber operations that meet the threshold of armed conflict or are conducted in the context of an armed conflict within the meaning of international law humanitarian. For the ICRC, the wars of this kind are of concern because of the vulnerability of cyber networks and humanitarian cost which may entail. When computers or networks of a State are under attack, infiltration or a blockage, civilians may be deprived of basic services such as drinking water supply, healthcare and electricity. In case of shutdown of global positioning systems (GPS), there may be civilian casualties, for example, if flight operations of rescue helicopters providing vital services are interrupted. Dams, nuclear power plants and air traffic control systems are also vulnerable in the event of cyber attack, because of their dependence on computers. The degree of interconnection of networks is such that it can be difficult to limit the effects of an attack directed against part of the system without causing damage to other equipment or without disturbing the whole. Welfare, health and even countless lives of people could be affected. One of the tasks of the ICRC is to remember, to all parties to the conflict, to be taken at all times, the necessary precautionary measures to preserve the lives of civilians. The wars have rules and limits that are applicable to the use of both cyber weapons as rifles, artillery shells or missiles.
In manual recently published by a group of lawyers and military experts, known as the Tallinn Manual provides that IHL applies in case of cyber warfare and modalities of implementation of IHL rules in this area are described.
We are pleased to note that experts reflect on the consequences of cyber warfare and the law applicable in this case. The use of cyber operations in armed conflicts can have devastating humanitarian consequences. Trial ICRC is crucial to identify channels to limit the humanitarian cost of cyber operations and, in particular, to reaffirm the relevance of IHL when this new technology used in armed conflict. That is exactly what experts assert the Tallinn Manual. The means and methods of warfare evolve over time and is plain that not resemble those that existed when the Geneva Conventions were drafted in 1949; However, IHL is still applicable in all the activities that the parties conduct during armed conflict and must be respected. You cannot rule out, however, that it may be necessary to continue developing the right in order to provide sufficient protection to the civilian population, as they evolve the cybernetic technologies or better understand their humanitarian consequences. This issue should be settled by the states.
While the Tallinn Manual is a non-binding document, prepared by a group of experts, we hope to contribute usefully to encourage discussions among States on this complex issue. We also desire that both states and non-state armed groups ensure fulfillment with its international responsibilities to resort cyber operations in armed conflicts. The ICRC will continue to provide expert advice on IHL to address these challenges.
This does not mean that IHL is applicable in any cyber operation or all is often called "cyber attacks" in everyday language. IHL does not regulate cyber operations unrelated to a situation of armed conflict. Businesses and governments are so exposed to cyber espionage, cyber crimes and other malicious cyber activities as cyber attacks incumbent IHL. While similar technical means can be used to protect infrastructure cyber espionage or an attack, the right that governs these operations is different. Therefore, it is essential to determine the circumstances in which it can be considered a cyber operation is conducted during armed conflict or gives rise, in itself, an armed conflict; so that it fits implement IHL.

Role of the ICRC in this process:


The ICRC participated as an observer in the deliberations of the experts who wrote the Manual Tallinn, make it reflect, as far as possible, existing provisions of IHL and maintain the protection that this branch of law gives the victims of armed conflict. The 95 standards included in the manual reflect the issues that were the subject of consensus among experts. The ICRC generally consistent with the formulation of standards, with some exceptions: for example, contrary to the findings of the ICRC study on customary IHL, cultural goods are not included in the standard by which the ban retaliate recalls war against certain persons and certain goods that enjoy special protection. In the manual, helpful comments on standards are also presented, including discrepancies between experts. For example, one of the differences concerning the obligation of the parties to armed conflict to take all feasible precautions to protect the effects of cyber attacks on the population and civilian objects under their control; although in the comments of the manual states that the scope of this standard be limited to international armed conflicts, the ICRC considers that the obligation be applied in all types of armed conflict.

Main challenges of cyber war:


There is only one cyberspace, shared by civil and military users, in which everything is interconnected. The main challenges lie in ensuring that attacks are directed exclusively against military targets and constantly ensure the preservation of life of the population and civilian infrastructure. In addition, deaths among civilians and damage to civilian objects that can cause incidentally should not be excessive in relation to the concrete and direct military advantage anticipated achieved through a cyber attack. If you cannot meet these conditions, you should not attack. In this respect, the manual is a timely reminder that for collateral damage means the effects of both direct and indirect effects of an attack and should be taken into account all planned indirect effect when the proportionality assessment is carried out in phases planning and execution of an attack, an issue extremely relevant in cyberspace. These issues highlight the importance of States to take extreme caution when resorting to cyber attacks.

Monday, 23 May 2016

Cyber Crime in Modern Society

These days, criminal that cosset in cyber crimes are not obsessed by self-image or knowledge. In its place, they wish to use their data to increase profit speedily. They are using their proficiency to filch, betray and take advantage of people as they get it effortless to get money without working honestly.
Cyber crimes have turn out to be a genuine risk today and are fairly diverse from traditional crimes; such as robbing, attacking or pinching. Contrasting these crimes, cyber crimes can be devoted solitary handed and does not necessitate the physical occurrence of the criminals. The crimes can be devoted from a distant place and the criminals don’t require worrying regarding the commandment of enforcement organization in the nation where they are assigning crimes. The similar systems that have made it simpler for people to perform e-commerce and online communication are now being oppressed by cyber criminals.

Sunday, 22 May 2016

Cyber Crimes: How to avoid Investments fraud?


Investment frauds approach in countless types with singular behavior although a general characteristic is being guarantee a soaring return or tax-free profit. Fraudsters may speak to you out of the blue later than taking your phone number from openly accessible investor register. But the high stress auction strategy can also approach by email, post, word of mouth or at a discussion group. You might be told you could get within information business secret, a scorching tip or extraordinary skill, frequently in a foreign country markets you have never heard of.  But this should be a word of warning that this might be a trick that will indicate you lose mainly or the entire invested money
To assist you stain and keep away from investment rip-off, follow these quick advices:
·         Be rigid in saying NO
·         Keep away from useless sales calls
·         Double check that company is genuine
·         Get professional advice
·         Beware of getting scam again if you have gone through it before


·         Report the scam

Friday, 20 May 2016

Cyber Crimes, Sales and Investment Fraud:

Since Internet tradition is rising daily the globe is impending closer. World Wide Web sounds akin to a gigantic occurrence but amazingly one of its personas is carrying the planet nearer building it a slighter lay to survive in for its consumers. Nevertheless, it has also controlled to build a new trouble for people who use extensive hours browsing the Cyber World which is known as cyber crime. There are many types of cyber crime; the most common known cyber crime is sales and investment fraud.

What is sales and investment fraud?

Sales and investment fraud force a gigantic figure of public every year transversely a wide series of financial products and marketplace: one in ten people have fallen sufferer to financial deception in the precedent five years, estimate in surplus of 6 billion each year.

 Investment fraud is able to be distinct like the illegitimate movement of providing bogus information to someone consequently so as to they will spend in a little. Fraudsters make contact with unsuspicious folks and propose them thrilling investment opportunities with apparently extremely high profits. On the other hand, the money churn out be unreal, unfeasible to trade or insignificant. Each year, an anticipated 1.2 billion is vanished to investment frauds, by means of a common loss of 20,000 per patron.

Wednesday, 18 May 2016

Classes Of Cyber Crimes


Cyber crimes are generally classified into three categories:
  • Individual
  • Belongings
  • Government
Individual:
Individual cyber crime could in the shape of cyber annoyance, spreading pornography, and trafficking.  The law of enforcement agencies are taking this category very seriously and joining forces internationally to arrest the perpetrators.
Belongings:
Stealing and robbing is possible in cyber world just like in our real life. In cyber case, criminal steals bank details and draw off money, misuse the credit card, purchases online; runs scam deals to get people hard earned money, uses malicious software to access organization website and hack their systems. This malicious software can also damage hard just like robber damage your property while robbing.
Government:
However, it is not as common as other two categories. This category is about cyber crime in opposition to government which is referred as cyber violence. In this category cyber criminals hack government websites, military websites or socialize propaganda. The criminals could be of unfriendly government of other nations.

Thursday, 27 August 2015

Modern Society And Cyber Crime

Earlier, all crimes were based on some stories, ego, revenge and power. Now, crimes are based on knowledge, intelligence, skills, expertise and easy source of gaining benefits in short time. By cyber crime, you don't have to work all the day with honesty, you need to learn to cheat and exploit people with their belongings, as this is easiest way of earning money.

Why Cyber Crime is Real Threat Now:


With the advancement in our living style and technology, advancement in crimes can be observed as well, that's why, cyber crime word is getting popular with each passing day. Cyber Crime is totally different from the traditional crimes such as murder, quarrel and stealing. The beauty of the cyber crime is that, it can be performed single handedly and safest part is that, criminal don't need to show his physical appearance or he don't need to be on the crime spot. He can do this crime from any part of the world and no law will be applying on him. He can do this act freely without fear of being caught and he can easily deceived the authorities in their countries as well.

Severe Disadvantage of Cyber Crime on Modern Society:


There may be many disadvantages but the cyber crime effect on e-commerce and online transactions is very vital because if your money is not save then you're going to be in serious trouble. Even your private data and personal information is on the risk of being stole, as this stealing can make them rich and they can demand anything in return and can blackmail you in their ways.

Tuesday, 25 August 2015

DNSChanger: Is Your Computer Save ?

DNS stands for Domain Name System. Websites have two kinds of addresses. One is URL(Uniform Resource Locator) and other is IP(Internet Protocol) address. People uses URLs to find websites, but computer use IP addresses to find websites. DNS translate the URL into IP address and IP address into URL. When you enter a domain name in your web browser, then the IP address of website is determined by the DNS server on the request of your Computer. Computer is using this IP address to connect to website. DNS servers are handled by Internet Service Providor and are present in your PC network configuration. DNS and DNS Servers are very important, without them, you cannot connect to the outer world and share information with them.

Now a days, criminals are using different tactics as if they can control DNS server, they can see those sites, to whom user is connecting. By controlling user DNS, criminal can enter fake user in user DNS and can interfere with user online web browsing. DNS Changer is a malware software, by which criminal used to infect user computer. Criminal replace the user DNS server with their own DNS server and then control all the traffic on user computer and this DNS server is known as rogue DNS server.

FBI have detected this DNS server as posted on their website and taking proper measures to block this server and let the user feel safe in internet world. In many cases, user are feeling connectivity issues as they get disconnect by rogue DNS server. This is just temporary and you will be back to normal speed asap.

You need to regularly check your DNS and DNS Servers configuration and if you see any kind of malware activity, then just report it, and avoid future worries. This is question of your computer privacy, and a big question to your data security. So, never hesitate to take any step regarding this criminal activity.