Thursday, 26 May 2016

Limits and challenges of cyber warfare

Does cyber warfare limits and rules? Are they protected against cyber attacks computers, networks and cyber infrastructure civilians? The answer is yes, according asserts an international group of jurists and military experts in Tallinn Manual, whose production document the ICRC has participated as an observer. This document explains that the Tallinn Manual, demonstrating the relevance of international humanitarian law in all armed conflicts, represents an important step towards reducing human suffering.

Why cyber warfare is of concern to the ICRC?


The term "cyber war" has been used by several people in reference to different situations. In the manual, "cyber warfare" means the means and methods of warfare employed in cyber operations that meet the threshold of armed conflict or are conducted in the context of an armed conflict within the meaning of international law humanitarian. For the ICRC, the wars of this kind are of concern because of the vulnerability of cyber networks and humanitarian cost which may entail. When computers or networks of a State are under attack, infiltration or a blockage, civilians may be deprived of basic services such as drinking water supply, healthcare and electricity. In case of shutdown of global positioning systems (GPS), there may be civilian casualties, for example, if flight operations of rescue helicopters providing vital services are interrupted. Dams, nuclear power plants and air traffic control systems are also vulnerable in the event of cyber attack, because of their dependence on computers. The degree of interconnection of networks is such that it can be difficult to limit the effects of an attack directed against part of the system without causing damage to other equipment or without disturbing the whole. Welfare, health and even countless lives of people could be affected. One of the tasks of the ICRC is to remember, to all parties to the conflict, to be taken at all times, the necessary precautionary measures to preserve the lives of civilians. The wars have rules and limits that are applicable to the use of both cyber weapons as rifles, artillery shells or missiles.
In manual recently published by a group of lawyers and military experts, known as the Tallinn Manual provides that IHL applies in case of cyber warfare and modalities of implementation of IHL rules in this area are described.
We are pleased to note that experts reflect on the consequences of cyber warfare and the law applicable in this case. The use of cyber operations in armed conflicts can have devastating humanitarian consequences. Trial ICRC is crucial to identify channels to limit the humanitarian cost of cyber operations and, in particular, to reaffirm the relevance of IHL when this new technology used in armed conflict. That is exactly what experts assert the Tallinn Manual. The means and methods of warfare evolve over time and is plain that not resemble those that existed when the Geneva Conventions were drafted in 1949; However, IHL is still applicable in all the activities that the parties conduct during armed conflict and must be respected. You cannot rule out, however, that it may be necessary to continue developing the right in order to provide sufficient protection to the civilian population, as they evolve the cybernetic technologies or better understand their humanitarian consequences. This issue should be settled by the states.
While the Tallinn Manual is a non-binding document, prepared by a group of experts, we hope to contribute usefully to encourage discussions among States on this complex issue. We also desire that both states and non-state armed groups ensure fulfillment with its international responsibilities to resort cyber operations in armed conflicts. The ICRC will continue to provide expert advice on IHL to address these challenges.
This does not mean that IHL is applicable in any cyber operation or all is often called "cyber attacks" in everyday language. IHL does not regulate cyber operations unrelated to a situation of armed conflict. Businesses and governments are so exposed to cyber espionage, cyber crimes and other malicious cyber activities as cyber attacks incumbent IHL. While similar technical means can be used to protect infrastructure cyber espionage or an attack, the right that governs these operations is different. Therefore, it is essential to determine the circumstances in which it can be considered a cyber operation is conducted during armed conflict or gives rise, in itself, an armed conflict; so that it fits implement IHL.

Role of the ICRC in this process:


The ICRC participated as an observer in the deliberations of the experts who wrote the Manual Tallinn, make it reflect, as far as possible, existing provisions of IHL and maintain the protection that this branch of law gives the victims of armed conflict. The 95 standards included in the manual reflect the issues that were the subject of consensus among experts. The ICRC generally consistent with the formulation of standards, with some exceptions: for example, contrary to the findings of the ICRC study on customary IHL, cultural goods are not included in the standard by which the ban retaliate recalls war against certain persons and certain goods that enjoy special protection. In the manual, helpful comments on standards are also presented, including discrepancies between experts. For example, one of the differences concerning the obligation of the parties to armed conflict to take all feasible precautions to protect the effects of cyber attacks on the population and civilian objects under their control; although in the comments of the manual states that the scope of this standard be limited to international armed conflicts, the ICRC considers that the obligation be applied in all types of armed conflict.

Main challenges of cyber war:


There is only one cyberspace, shared by civil and military users, in which everything is interconnected. The main challenges lie in ensuring that attacks are directed exclusively against military targets and constantly ensure the preservation of life of the population and civilian infrastructure. In addition, deaths among civilians and damage to civilian objects that can cause incidentally should not be excessive in relation to the concrete and direct military advantage anticipated achieved through a cyber attack. If you cannot meet these conditions, you should not attack. In this respect, the manual is a timely reminder that for collateral damage means the effects of both direct and indirect effects of an attack and should be taken into account all planned indirect effect when the proportionality assessment is carried out in phases planning and execution of an attack, an issue extremely relevant in cyberspace. These issues highlight the importance of States to take extreme caution when resorting to cyber attacks.

Monday, 23 May 2016

Cyber Crime in Modern Society

These days, criminal that cosset in cyber crimes are not obsessed by self-image or knowledge. In its place, they wish to use their data to increase profit speedily. They are using their proficiency to filch, betray and take advantage of people as they get it effortless to get money without working honestly.
Cyber crimes have turn out to be a genuine risk today and are fairly diverse from traditional crimes; such as robbing, attacking or pinching. Contrasting these crimes, cyber crimes can be devoted solitary handed and does not necessitate the physical occurrence of the criminals. The crimes can be devoted from a distant place and the criminals don’t require worrying regarding the commandment of enforcement organization in the nation where they are assigning crimes. The similar systems that have made it simpler for people to perform e-commerce and online communication are now being oppressed by cyber criminals.

Sunday, 22 May 2016

Cyber Crimes: How to avoid Investments fraud?


Investment frauds approach in countless types with singular behavior although a general characteristic is being guarantee a soaring return or tax-free profit. Fraudsters may speak to you out of the blue later than taking your phone number from openly accessible investor register. But the high stress auction strategy can also approach by email, post, word of mouth or at a discussion group. You might be told you could get within information business secret, a scorching tip or extraordinary skill, frequently in a foreign country markets you have never heard of.  But this should be a word of warning that this might be a trick that will indicate you lose mainly or the entire invested money
To assist you stain and keep away from investment rip-off, follow these quick advices:
·         Be rigid in saying NO
·         Keep away from useless sales calls
·         Double check that company is genuine
·         Get professional advice
·         Beware of getting scam again if you have gone through it before


·         Report the scam

Friday, 20 May 2016

Cyber Crimes, Sales and Investment Fraud:

Since Internet tradition is rising daily the globe is impending closer. World Wide Web sounds akin to a gigantic occurrence but amazingly one of its personas is carrying the planet nearer building it a slighter lay to survive in for its consumers. Nevertheless, it has also controlled to build a new trouble for people who use extensive hours browsing the Cyber World which is known as cyber crime. There are many types of cyber crime; the most common known cyber crime is sales and investment fraud.

What is sales and investment fraud?

Sales and investment fraud force a gigantic figure of public every year transversely a wide series of financial products and marketplace: one in ten people have fallen sufferer to financial deception in the precedent five years, estimate in surplus of 6 billion each year.

 Investment fraud is able to be distinct like the illegitimate movement of providing bogus information to someone consequently so as to they will spend in a little. Fraudsters make contact with unsuspicious folks and propose them thrilling investment opportunities with apparently extremely high profits. On the other hand, the money churn out be unreal, unfeasible to trade or insignificant. Each year, an anticipated 1.2 billion is vanished to investment frauds, by means of a common loss of 20,000 per patron.

Wednesday, 18 May 2016

Classes Of Cyber Crimes


Cyber crimes are generally classified into three categories:
  • Individual
  • Belongings
  • Government
Individual:
Individual cyber crime could in the shape of cyber annoyance, spreading pornography, and trafficking.  The law of enforcement agencies are taking this category very seriously and joining forces internationally to arrest the perpetrators.
Belongings:
Stealing and robbing is possible in cyber world just like in our real life. In cyber case, criminal steals bank details and draw off money, misuse the credit card, purchases online; runs scam deals to get people hard earned money, uses malicious software to access organization website and hack their systems. This malicious software can also damage hard just like robber damage your property while robbing.
Government:
However, it is not as common as other two categories. This category is about cyber crime in opposition to government which is referred as cyber violence. In this category cyber criminals hack government websites, military websites or socialize propaganda. The criminals could be of unfriendly government of other nations.