Cyber Security in India Present Status
Cyber Security in India Present Status
Maj Gen PK Mallick, VSM (Retd) is a graduate of Defence Services Staff College and M.
Tech from IIT, Kharagpur. He has wide experience in command, staff and instructional
appointments in the Indian Army. He has been the Chief Signal Officers of a Command
and a Senior Directing Staff (SDS) at the National Defence College, New Delhi.
–
Introduction
The Information Technology (IT) Act in India was promulgated as early as 2000. The
Indian Computer Emergency Response Team (CERT-In) was established in 2004 and
continues to act. India has undertaken several steps at protection, detection and
containment of these potentially disruptive attacks against the nation’s networks.
Government initiatives such as ‘Digital India’ and ‘Smart City’, and the increasing
involvement of the private sector in nation-building endeavours are progressive steps
that are also increasing the scope and complexities of cyber security efforts. It is time to
review the Indian Cyber Security scene in the present context.
The National Cyber Security Policy, however lacked the following key elements:-
Milestones and performance measures.
Cost and resources.
Roles and responsibilities.
Linkage with other key strategy documents.
It is time therefore now to review the National Cyber Security Policy.
USA Model
The Government of India has been studying the model of United States of America (USA)
on cyber security, and has tried to adopt some of their organisations and policies. It will
be worthwhile to see how the USA has organised its cyber security and the models that
have been adapted.
–
NCCIC Mission
Major tasks before the NCCIC are to operate at the intersection of the private sector,
civilian, law enforcement, intelligence and defense communities; to apply unique
analytic perspectives; to ensure shared situational awareness; and to orchestrate
synchronised response efforts while protecting the Constitutional and privacy rights of
Americans in both the cybersecurity and communications domains.
The NCCIC’s missions include:-
Leading the protection of federal civilian agencies in cyberspace.
Working closely together with critical infrastructure owners and operators to
reduce risk.
Collaborating with state and local governments through the Multi-State
Information Sharing and Analysis Center (MS-ISAC).
Cooperating with international partners to share information and respond to
incidents.
Coordinating national response to significant cyber incidents in accordance with
the National Cyber Incident Response Plan (NCIRP).
Analysing data to develop and share actionable mitigation recommendations.
Creating and maintaining shared situational awareness among its partners and
constituents.
Orchestrating national protection, prevention, mitigation and recovery activities
associated with significant cyber and communication incidents.
Disseminating cyber threat and vulnerability analysis information.
Assisting in the initiation, coordination, restoration and reconstitution of
National Security or Emergency Preparedness (NS/EP) telecommunications
services and facilities under all conditions, crises, or emergencies, including
–
Jurisdiction Issues
There is a conflict of interest as to who is overall responsible for cyber security in most
countries. In the USA the Department of Defense (DoD) is responsible for cyber attacks
originating abroad and for protecting DoD networks, while Department of Homeland
Security (DHS) is responsible for coordinating protection of domestic civilian
infrastructure. However, many cyber attacks originate from abroad and have the
potential to disrupt critical infrastructure. Responding to cyber attacks is a difficult task
for DHS because it operates without the requisite authority that would allow it to
dismantle a foreign actor’s network operations. In addition to these legal complications,
DHS lacks the same degree of cyber operations competency as the DoD.
Information sharing between government and the industry has always been a key
component of strengthening a country's resilience to hacking campaigns by foreign
governments, criminals and hacktivists and non-state actors. However, while the
industry is responsible for sharing instances of breaches, there are proprietary, privacy
and reputational considerations that can inhibit their willingness to do so freely. There
are also major inhibitions to the free flow of information from government to industry –
most notably the risk of compromising intelligence sources and methods.
The presence of government bodies, such as DHS, that insulate intelligence agencies
from industry is notable. Adding layers of bureaucracy to public private collaboration in
cybersecurity decreases the timeliness of the information shared. James Clapper, the
–
former Director of National Intelligence of USA argues, “The DHS is the appropriate
storefront and that’s the way it ought to be. I don’t think the spy crowd should be
directly engaging with the private sector.”
Yet this is precisely what the United Kingdom (UK) is seeking to do with its new
National Cyber Security Centre (NCSC), which is revamping the way British intelligence
agencies collaborate with private industry by leaning toward more open and direct
exchanges to help secure the UK against cyber attacks. Chris Inglis, the former Deputy
Director of the National Security Agency, argues that the UK has proposed to “radically
transform collaboration between intelligence agencies and the private sector.”
Practically, this has meant bringing in some 650 people from the Government
Communications Headquarters (GCHQ), the UK’s primary signals intelligence agency
and having them work directly alongside industry partners.
The national division of responsibilities for cybersecurity in the USA are as follows:
The Justice Department would, among other things, “Investigate, attribute,
disrupt and prosecute cyber crimes; lead domestic national security operations
and conduct domestic collection, analysis and dissemination of cyber threat
intelligence;”
Department of Homeland Security (DHS) would, among other things “coordinate
the national protection, prevention, mitigation of and recovery from cyber
incidents; disseminate domestic cyber threat and vulnerability analysis and
protect critical infrastructure;”
DoD would “defend the nation from attack; gather foreign threat intelligence and
determine attribution and secure national security and military systems.”
(SSP), which details the application of the National Infrastructure Protection Plan
(NIPP) concepts to the unique characteristics and conditions of their sector. Sector-
Specific Plans have been updated to align with the NIPP 2013
[https://www.dhs.gov/national-infrastructure-protection-plan].
The Sector Specific Agency for each critical infrastructure in the USA is given below:-
National Institute of Standards and Technology (NIST) is responsible for improving the
cyber security of critical infrastructure under Executive Order (EO) 13636. It
established the voluntary NIST Framework to help critical infrastructure owners and
operators reduce cyber risks. NIST Framework for Improving Critical Infrastructure
Cybersecurity, version 1.0, 12 February 2014 gives out a fair idea how this organisation
helps in cybersecurity efforts. India does not have any such organisation.
In India, Section 70 of the IT Act 2000, Critical Information Infrastructure (CII) is
defined as, “The computer resource, the incapacitation or destruction of which, shall
have debilitating impact on national security, economy, public health or safety.” Under
Section 70A(1) of the Information Technology (Amendment) Act 2008, the National
Critical Information Infrastructure Protection Centre (NCIIPC) of National Technical
–
Research Organisation (NTRO) is the nodal agency that takes all measures including
associated Research and Development for the protection of CIIs in India. NCIIPC was
deemed to be created by a gazette notification with specific responsibilities for
protecting all CII. While the law was amended in 2008, it would take six years before
NCIIPC was formally created through a Government of India gazette notification in
January 2014.
The NCIIPC started off with several sectors, but has now truncated them into five broad
areas that cover the ‘critical sectors’. These are:-
Power and Energy
Banking, Financial Institutions and Insurance
Information and Communication Technology
Transportation
E-governance and Strategic Public Enterprises
While defence and intelligence agencies have also been included under the CII
framework, these have been kept out of the purview of the NCIIPC’s charter. Balance of
the sectors are now the responsibility of CERT-In. However, CERT-In does not have any
executive authority and is known to issue advisories.
have virtual independence. In a way it is good that they can get things done at a faster
pace. But there is always a danger of getting overboard and taking unnecessary risks
with grave consequences when there is no control over them.
salient guiding principles and objectives on the Public Private Partnership (PPP) are as
under:-
Given the diverse stakeholders in cyber security, institutional mechanisms
should be set up to promote convergence of efforts both in public and private
domains.
Use existing institutions and organizations to the extent possible in both private
sector and government and create new institutions where required to enhance
cyber security.
Set up a permanent mechanism for private public partnership.
Identify bodies that can play a wider role in funding and implementation in the
public and private sector.
Identify areas where both private and public sector can build capacities for cyber
security.
Put in place appropriate policy and legal frameworks to ensure compliance with
cyber security efforts.
Promote active PPP cooperation in international forums and in formulating
India’s position on global cyber security policies.
Establish India as a global hub of development of cyber security products,
services and manpower.
Promote indigenization and work on joint R&D projects to meet the cyber
security needs of the country.
Four years have passed. There has hardly been any progress on the PPP model.
Code Breaking
India does not have any credible code breaking capability. Introduction of the 128 or the
256 bits keys have made the issue of code breaking extremely difficult. However, this
capability exists in NSA of USA, GCHQ of UK and probably in Russia and China. If we do
not have this capability, we must make efforts to develop these capabilities. Academia,
industry and expertise from countries like Ukraine, Belarus and such other East
European countries and South Africa can be explored.
–
they find out vulnerabilities in their networks. The Indian Armed Forces must also do
something like this.
Within the US Department of Defense, there is an organisation called Defense
Information Systems Agency (DISA). DISA provides, operates and assures command and
control and information sharing capabilities in direct support to joint war fighters,
national level leaders and other missions across the full spectrum of military operations.
It works under DoD’s Chief Information Officer (CIO). In India, the three services as well
as the MoD do not have CIOs. Should we have an organisation like DISA in MoD? We
must have CIO organisation in MoD as well as in the three services.
There should be clarity as to what is to be constituted as an act of war in the cyber
domain. Factors like loss of life and property, economic impact, diplomatic and political
effects can be considered which can be termed as attack of significant consequences.
Who will give permission for offensive cyber operations? What are the rules of
engagement? India procures huge amount of Defence equipment from foreign countries.
What is the mechanism to check whether there is any malware in the increasingly
sophisticated technology areas? No country shares the codes. What is the mechanism in
the procurement of equipment procedure and supply chain management system to
ensure that bugs are not present? The human resource development policies for the
Armed Forces in the cyber domain will require drastic changes to attract and keep
talents in such niche technology areas. Present policies are inadequate.
Armed Forces must initiate R&D efforts on their specific requirements especially in the
battlefield. Can they compromise adversary’s classified military network, interfere in the
command or data link of the Unmanned Aerial Vehicle (UAV)/ drones, task the Special
Forces with appropriate wherewithal to compromise adversary’s Optical Fibre
Communication (OFC) network? Can we de-anonymise the Darknet. It has been done by
the three leading universities of three different countries.
Conclusion
India must enunciate its cyber strategy for both cyber security and offensive cyber
operations. A part may be classified but the relevant aspects must be made known to the
–
people concerned about their tasks and responsibilities. On cyber related issues projects
have to be implemented on fast track and no delay is acceptable. Responsibility and
accountability of different agencies must be clearly defined. The huge approximately
USD 150 billion IT industry should be made a partner in national cyber security efforts
as Government alone cannot do this job. There is no alternative to indigenous cyber
security solutions. Snowden revelations have shown what the multinational revered
companies do for US Government agency like NSA.
Bibliography
- US Army Field Manuals FM 3- 38 and FM 3-12.
- James Van De Velde, The Fifth Domain Won’t be the Sole Battleground, August 30, 2017,
available at: https://www.thecipherbrief.com/article/exclusive/tech/fifth-domain-wont-sole-
battleground
- Lewis, Patricia, Livingstone, David, “What to Know About Space Security”, Chatham House, 27
September 2016 available at: https://www.chathamhouse.org/expert/comment/what-know-
about-space-security
- Livingstone, David, Lewis, Patricia, “Space, the Final Frontier for Cybersecurity?”, Chatham
House, September 2016 available at :
https://www.chathamhouse.org/sites/files/chathamhouse/publications/research/2016-09-
22- space-final-frontier-cybersecurity-livingstone-lewis.pdf
- Suzuki, Kazuto, “Satellites, the floating targets”, The World Today, February & March 2016.
- Madeleine MOON (United Kingdom), NATO Parliamentary Assembly, Defence and Security
Committee the Space Domain and Allied Defence Draft Report, Sub-Committee on Future
Security and Defence Capabilities, 20 March 2017 available at www.nato-pa.int
- Joint Chief of Staffs, “Cyberspace Operations,” US Army Joint Publication 3-12, February 5,
2013, available at : http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf
- The Department of Defense Cyber Strategy,” The Department of Defense, April 2015, available
at : https://www.defense.gov/home/features/2015/0415_cyber-
strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
- Report of the Defense Science Board (DSB) Task Force on Cyber Deterrence, February, 2017
available at : http://www.dtic.mil/get-tr-doc/pdf?AD=AD1028516
- From the website of the Prime Minister of Israel,
http://www.pmo.gov.il/secretary/govdecisions/2011/pages/des3611.aspx
- Gabi Siboni and Ido Sivan-Sevilla, Israeli Cyberspace Regulation: A Conceptual Framework,
Cyber, Intelligence,and Security, Volume1, No.1, January 2017 available at :
http://www.inss.org.il/he/wp-
content/uploads/sites/2/systemfiles/Israeli%20Cyberspace%20Regulation%20A%20Concept
ual%20Framework,.pdf
- Puneet Bhalla, Investments in the space and cyber realm for India’s national security, CLAWS
Journal, Winter 2016 available at :
http://www.claws.in/images/journals_doc/273305959_1742641027_PuneetBhalla.pdf
- Cristin Flynn Goodwin J. Paul Nicholas, Developing a National Strategy for Cybersecurity
Foundations for Security, Growth, and Innovation, October 2013.
- Isaac R. Porche III, Christopher Paul, Chad C. Serena, Colin P. Clarke, Erin-Elizabeth Johnson,
Drew Herrick, Tactical Cyber ; Building a Strategy for Cyber Support for Corps and Below, Rand
Corporation Report available at :
–
https://www.rand.org/content/dam/rand/pubs/research_reports/RR1600/RR1600/RAND_RR
1600.pdf
- Eric Schmidt and Jared Cohen, The New Digital Age, John Murray, 2013.
- USA, Deportment of Defence Strategy for Operating in Cyberspace, July 2011.
- Resilient Military Systems and the Advanced Cyber Threat, US Department of Defense, Defense
Science Board (DSB) Task Force Report January 2013, Page 14.
- CYBERSECURITY National Strategy, Roles and Responsibilities Need to Be Better Defined and
More Effectively Implemented United States Government Accountability Office Report to
Congressional Addressees February 2013.
- Microsoft, Cyber security: More than a good headline, Oct 2011.
http://www.dhs.gov/organization
- United States Government Accountability Office, Report to Congressional Requesters,
Outcome-Based Measures Would Assist DHS in Assessing Effectiveness of Cyberscurity Efforts,
April 2013. GAO-13-275.
- Brig Shantanu Dayal et al, Safeguards Required in the Cyber Domain for Security of India’s
National Interests, Paper submitted to National Defence College for Nationa Defence College
Integrated Analysis Group (IAG) Paper, 2013.
- Government releases National Cyber Security Policy 2013, The Economic Times, PTI Jul 2,
2013.
http://www.nic.in/node/41
- 2011-2012 annual report of the Department of Telecommunications.
- Discussion draft on National Cyber Security Policy 2013, Department of IT Ministry of
Communications & IT, dated 02 July 2013.
- Ministry of Communication and Information Technology Department of Electronics and
Information Technology Notification on National Cyber Security Policy-2013 (NCSP-2013).
- Institute for Defence Studies & Analysis IDSA Task Force Report on India’s Cyber Security
Challenges, 2012.
- Maj Gen PK Mallick, VSM, Cyber Security – An Appraisal, Perspectives and Reflections of India’s
Nation Building Ed Dr Rajendra Prasad, Radha Publication, New Delhi, 2014, PP 333-362
(Maj Gen PK Mallick, VSM(Retd) is an expert in Cyber Warfare, Signal Intelligence and
Electronic Warfare)
Images:
http://www.itsecurityguru.org/wp-content/uploads/2016/11/cybersecurity-professionals-top-
complaints.jpg
http://www.thecyberadvocate.com/wp-content/uploads/2015/03/cybersecurity-rules-
linkedin.png
–