Vol4issue46nov26dall

Total Page:16

File Type:pdf, Size:1020Kb

Vol4issue46nov26dall www.theindianpanorama.com VOL 4 ISSUE 46 ● TEXAS ● NOV 25 - DEC 01, 2016 ENQUIRIES: 646-247-9458 ● PRICE 40 CENTS YEARS Indian Origin Nikki Haley to be Thousands line streets for Houston the US Ambassador to the United Nations Thanksgiving Day Parade Accepting the offer, Haley said "I always expected to finish the remaining two years of my second term as governor," but added she was "moved to accept this new assignment" out of a "sense of duty." Cheering girls with flowers lead the parade Santa Claus showed up before Christmas NEW YORK (TIP): South Carolina's Governor of HOUSTON (TIP): The 67th Annual H- thousands of people took over sighting of the year. Two groups you'll Indian origin Nikki Haley has been chosen by President E-B Thanksgiving Parade has wrapped downtown to watch the parade. see are the Caporales San Simon dancers elect Donald Trump to be the US ambassador to the United for this year, and there was plenty of Many Houstonians made their way and the Blue Streak Cloggers. Nations, the transition team announced Wednesday, action out on the streets of Houston as downtown to see their first Santa contd on Page 20 November 23. She would be the first woman and minority representative to join Trump administration and the first CUBA'S ICONIC LEADER FIDEL CASTRO ever Indian-American Cabinet rank official in any Implications of contd on Page 20 DIES AGED 90 AAPI President Ajay Lodha asks Demonetization and NEW YORK (TIP): Fidel Castro, Cuba's Trump Victory Trump to enact medical liability former president and leader of the Communist revolution, has died aged 90, reform state TV has announced. It provided no Page 08 further details. Fidel Castro ruled Cuba as a NEW YORK (TIP): Dr. one-party state for almost half a century Monetary Stalinism Ajay Lodha, president of before handing over the powers to his the largest body of Indian- brother Raul in 2008. His supporters praised American doctors has him as a man who had given Cuba back to Page 09 asked President-elect the people. But his Donald Trump to enact contd on Page 20 The Kudi from medical liability reform, which it claimed is Fidel Castro led the Communist revolution in Cuba in 1959. Only in April this Amritsar is their envoy driving up the healthcare year, he had made a rare appearance at the Communist Party congress where he spoke of his advancing age and exuberated confidence that Cuban people cost in its current shape Page 10 will be "victorious" through "extra testing and the practice of defensive medicine". "AAPI (American Association of Dr. Ajay Lodha, President of Physicians of Indian AAPI has called upon Origin) supports a President-elect Donald Trump to enact Medical Liability contd on Page 20 Reform Trump election: Request for Wisconsin vote recount sent NEW YORK (TIP): The election commission in Wisconsin has received a request for a recount of the votes in the state narrowly won by Donald Trump. The request has been filed by Green Party presidential candidate Jill Stein. Dr Stein has also pledged to file vote recounts in Michigan and Green Party presidential Pennsylvania. candidate Jill Stein has sought contd on Page 20 recount of the votes in Wisconsin and plans to ask for recount in Michigan and Pennsylvania, too. www.theindianpanorama.com THE INDIAN PANORAMA 2 FRIDAY, NOVEMBER 25, 2016 YEARS INDIAN ABROAD The Sikh Awards 2016 to honor global Sikh excellence given away in London Indian woman among Journalists Canadian Bob Singh Dhillon is Businessman of the Year Mr. Bob Singh Dhillon, a Canadian businessman, honored for Courageous Reporting was honored with Businessman of the By Nirpal Singh Shergill Year awardat the 7th LONDON (TIP): Journalists from annual The Sikh Awards India, Egypt, Turkey, and El Salvador 2016 on Saturday, 19th were honored Tuesday, November 22 November 2016 in night in New York, at the Committee to London Protect Journalists' 26th annual International Press Freedom Awards for LONDON (TIP): Mr. Bob Singh Dhillon, Founder, courageous work amid risks including President and CEO of Mainstreet Equity Corp, Canada's imprisonment, threats, and legal action. highest performing real estate company with assets valued "These awardees are truly remarkable over $1.5 billion, was named Business Man of the Year at the journalists, all of whom have carried 7th annual The Sikh Awards 2016 on Saturday, 19th out their work with the knowledge that November 2016 at Park Plaza Hotel, London. The coveted doing so puts them in real danger," said award is in recognition of an organization or individual that Sandra Mims Rowe, CPJ Board has best demonstrated how they have made exceptional Chairman. "It is heartening to see such financial returns, shown strong growth, innovative resolve, and to know that even under the strategies and clear market leadership in the sector. most threatening conditions, journalists Mr. Dhillon Founded Mainstreet which consists of nearly will always find a way to do their job." 10,000 apartment units in Western Canada. He sits on the Malini Subramaniam, who has International Press Freedom Awards Ceremony at the Waldorf Astoria Hotel, New Canadian Mortgage and Housing Corporation Board and is reported on issues including abuses by York on November 22, 2016 in New York City. Indian journalist Malini Subramaniam also the Honorary Consul General for Belize, owning a police and security forces, and sexual (left) was among those honored. Photo by Jeff Zelevansky/Getty Images private 3,000-acre island in Belize. Mr. Dhillon is also the violence against women in her home contributor to The New York Times and video because she is under a travel ban. owner of National Payments, a Visa and MasterCard state of Chhattisgarh,India, received the former LA Times journalist, presented Both Rezaian and Ismayilova were approved merchant processing business. He has been the award from Susan Chira, former deputy the award to Óscar Martínez, an imprisoned for their work. Amanpour recipient of numerous awards, the Ernst & Young 2015. executive director for The New York investigative reporter for the online has consistently used her own Entrepreneur of the Year, The Queen's Diamond Jubilee Times and CPJ board member. Award- news magazine El Faro. Martínez has journalism to defend the rights of Medal, one of Alberta's 50 Most Influential People and winning U.S. photojournalist Lynsey been threatened for his coverage of gang journalists around the world. recognized as one of the 25 Most Influential Indians in North Addario presented an award in absentia violence and extrajudicial killings in El The awards dinner at New York's America. A major philanthropist donating $500,000 to the to Mahmoud Abou Zeid, the Egyptian Salvador. Waldorf-Astoria hotel was chaired by town of San Pedro, Belize, he raised $60,000 for photojournalist also known as Shawkan, Christiane Amanpour, chief Jeff Zucker, president of CNN underprivileged children in San Pedro and donated free who has been imprisoned since August international correspondent and anchor Worldwide, and hosted by David apartment suites to victims of the Slave Lake, Fort 2013. Can Dündar, the former editor-in- at CNN, received the Burton Benjamin Remnick, editor of The New Yorker and McMurray Alberta fires. chief of Turkish daily Cumhuriyet who Memorial Award for her extraordinary CPJ board member. The dinner raised Other high profile winners this year included: Ms is facing imprisonment on charges of efforts in the cause of press freedom. $1.75 million for CPJ's global advocacy Kiran Singh (UK) - Business Woman award; Mr. Supreet disclosing state secrets, received his Her award was presented by Washington and new Emergencies Response Team- Singh Manchanda (USA) - Entrepreneur Award; Khalsa Aid award from Lindsey Hilsum, Post correspondent Jason Rezaian and including a special appeal during the (UK) - Sikhs in Charity; Dr Brinder Singh Mahon (UK) - international editor for the U.K.'s Azerbaijani investigative journalist evening that was matched by the John S. Sikhs in Education; Mrs. Manika Kaur (Dubai) - Sikhs in Channel 4 News. Héctor Tobar, op-ed Khadija Ismayilova, who appeared via and James L. Knight Foundation. Entertainment; Akaal Television / Mr. Amrik Singh Kooner (UK) - Sikhs in Media; Mr. Jaspal Singh Bindra (India) - Sikhs in Profession; Mr. Gurmeet Singh (India) - Sikhs in Seva; Mr. INDIAN AMERICANS AMONG SIX NEW MEMBERS TO JOIN USIBC Ram Singh Nayyar (Canada) - Sikhs in Sport; Natasha Kaur Mudhar (UK) - The Sikh People's Choice Award; Sant Baba TO ADVANCE INDIA-US COMMERCIAL RELATIONSHIP Iqbal Singh Ji (India) - The Sikh Lifetime Achievement WASHINGTON (TIP): The U.S.-India Award; and His Highness Sheikh Mohammed Bin Rashid Al Business Council's (USIBC) board of Maktoum (Dubai) - The Special Recognition Award. Hosted directors announced, November 22, 2016, by Ranvir Singh, a journalist and broadcaster, best known for the appointments of six global business her presenting role on the ITV Breakfast program 'Good leaders to serve as members of the Morning Britain', The Sikh Awards recognizes the pivotal board. Among them are three Indian contributions made by the Sikh community across a variety Americans. They are Sanjay Bhatnagar, of fields, from business, charity, education, entertainment, President & CEO, WaterHealth professional services, seva (selfless service), and sport, with International; Amit Midha, President of winners selected across the globe from Asia, USA, Canada, Asia Pacific and Japan Region and Australia, Europe, Africa and the Middle East. The Chairman, Global Emerging Markets, Sanjay Bhatnagar, President & CEO, Water Health International, Amit Midha, prestigious event saw 750 guests in attendance from elite Dell and Bob Patel, CEO, LyondellBasell. President of Asia Pacific and Japan Region and Chairman, Global Emerging Markets, international dignitaries to public figures, community Others nominated are John Rood, Senior Dell, and Bob Patel, CEO, LyondellBasell are among the six to join a prestigious group of CEOs and executives on USIBC's board of directors heroes, sports stars and celebrities.
Recommended publications
  • 2016 8Th International Conference on Cyber Conflict: Cyber Power
    2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 31 MAY - 03 JUNE 2016, TALLINN, ESTONIA 2016 8TH International ConFerence on CYBER ConFlict: CYBER POWER Copyright © 2016 by NATO CCD COE Publications. All rights reserved. IEEE Catalog Number: CFP1626N-PRT ISBN (print): 978-9949-9544-8-3 ISBN (pdf): 978-9949-9544-9-0 CopyriGHT AND Reprint Permissions No part of this publication may be reprinted, reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written permission of the NATO Cooperative Cyber Defence Centre of Excellence ([email protected]). This restriction does not apply to making digital or hard copies of this publication for internal use within NATO, and for personal or educational use when for non-profit or non-commercial purposes, providing that copies bear this notice and a full citation on the first page as follows: [Article author(s)], [full article title] 2016 8th International Conference on Cyber Conflict: Cyber Power N.Pissanidis, H.Rõigas, M.Veenendaal (Eds.) 2016 © NATO CCD COE Publications PrinteD copies OF THIS PUBlication are availaBLE From: NATO CCD COE Publications Filtri tee 12, 10132 Tallinn, Estonia Phone: +372 717 6800 Fax: +372 717 6308 E-mail: [email protected] Web: www.ccdcoe.org Head of publishing: Jaanika Rannu Layout: Jaakko Matsalu LEGAL NOTICE: This publication contains opinions of the respective authors only. They do not necessarily reflect the policy or the opinion of NATO CCD COE, NATO, or any agency or any government.
    [Show full text]
  • Hacking for ISIS: the Emergent Cyber Threat Landscape
    Hacking for ISIS: The Emergent Cyber Threat Landscape By Laith Alkhouri, Alex Kassirer, & Allison Nixon April 2016 Hacking For ISIS Contents Click on a title to navigate to the page Introduction ...........................................................................................................................................2 Cyber Caliphate ...................................................................................................................................3 Islamic State Hacking Division .......................................................................................................6 Islamic Cyber Army ............................................................................................................................9 Rabitat Al-Ansar ................................................................................................................................ 12 Sons Caliphate Army ...................................................................................................................... 15 United Cyber Caliphate .................................................................................................................. 17 Techniques, Tactics, & Procedures (TTPs) .............................................................................. 20 The Future of ISIS’s Cyber Capabilities .................................................................................... 24 Conclusion .........................................................................................................................................
    [Show full text]
  • Cyber Activities in the Syrian Conflict CSS CY
    CSS CYBER DEFENSE PROJECT Hotspot Analysis The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Zürich, October 2017 Version 1 Risk and Resilience Team Center for Security Studies (CSS), ETH Zürich The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Authors: Marie Baezner, Patrice Robin © 2017 Center for Security Studies (CSS), ETH Zürich Contact: Center for Security Studies Haldeneggsteig 4 ETH Zürich CH-8092 Zürich Switzerland Tel.: +41-44-632 40 25 [email protected] www.css.ethz.ch Analysis prepared by: Center for Security Studies (CSS), ETH Zürich ETH-CSS project management: Tim Prior, Head of the Risk and Resilience Research Group; Myriam Dunn Cavelty, Deputy Head for Research and Teaching; Andreas Wenger, Director of the CSS Disclaimer: The opinions presented in this study exclusively reflect the authors’ views. Please cite as: Baezner, Marie; Robin, Patrice (2017): Hotspot Analysis: The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict, October 2017, Center for Security Studies (CSS), ETH Zürich. 2 The use of cybertools in an internationalized civil war context: Cyber activities in the Syrian conflict Table of Contents 1 Introduction 5 2 Background and chronology 6 3 Description 9 3.1 Attribution and actors 9 Pro-government groups 9 Anti-government groups 11 Islamist groups 11 State actors 12 Non-aligned groups 13 3.2 Targets 13 3.3 Tools and techniques 14 Data breaches 14
    [Show full text]
  • Troll Hunting
    For my father, Brian, who taught me to love wor ds. Hell is empty, and all the devils are here. William Shakespeare, The Tempest, Act 1, Scene 2 THIS IS A work of nonfiction, researched and documented to the best of my ability. There were significant security risks in writing this book. I sought expert advice and wrote according to it. Therefore, some of the trolling syndicates mentioned within these pages have been given pseudonyms or go unnamed. Likewise, some of the trolls themselves are discussed only with a pseudonym. A few of the trolls who spoke to me behind the scenes are not named at all and others are composites or have been segmented. Some readers may be critical of the decision to provide anonymity for people who are hurting others so much. However, sometimes access to information comes at a cost – and, all things being equal, the trolls gave me great access. By the same token, some predator-troll victims are in physical danger. This is especially true where domestic violence is involved. In those cases, names and other identifying details may have been altered but the facts of the stories are unchanged. I have worked hard to quote all interviewees verbatim, but for the sake of readability have corrected some spelling errors and syntax. When I’m messaging with trolls in the United States, I use Australian spelling and they use American spelling. For authenticity, I’ve left this as is. This is a book about the internet and how it bleeds into real life. When quoting links and screenshots, I’ve aimed for accuracy.
    [Show full text]
  • A Cybersecurity Threat Model for a Combined Cyberattack Against Hospitals and Terrorist Attack in Spain
    A Cybersecurity Threat Model for a Combined Cyberattack against Hospitals and Terrorist Attack in Spain Oxford University - Universidad Autónoma de Madrid Project Report CONSULTANTS: Lucas Kello (Principal Consultant) Ivan Martinovic Martin Strohmeier Florian Egloff Academic Coordinator (UAM): Raquel Galindo Dorado A Cybersecurity Threat Model for a Combined Cyberattack against Hospitals and Terrorist Attack in Spain 1. INTRODUCTION This report is structured as follows: Section 2 will provide the necessary background on cybersecurity in the healthcare Hospital cybersecurity is a global concern. According sector. Section 3 discusses the capabilities and motivations to an investigation by Pulse magazine, health record of different threat actors while Section 4 presents the analysis security breaches in the United Kingdom’s at National of potential vulnerabilities in the reviewed hospitals in Health Service rose 20 percent in the last year. Data from Madrid. Section 5 compares the different IT infrastructure 55 hospitals indicated breaches included records dumped paradigms in terms of security and risk. In Section 6, a in public places, records given to the wrong patient and case study on large medical devices discusses the patching patient data given to relatives without permission. In 2015 process. Finally, Section 7 provides recommendations and alone, more than 94 million U.S. health records were concludes this report. compromised, costing affected institutions approximately $46 billion. According to Experian’s 2014 Data Breach Industry Forecast, the healthcare industry will be among 2. BACKGROUND the most susceptible industries to publicly disclosed and This section will discuss the current cybersecurity widely scrutinized data breaches.1 The October 2013 environment in the healthcare sector.
    [Show full text]
  • Cyber-Terrorism Activities Report No. 16 January
    ICT Cyber-Desk PERIODIC REVIEW Cyber-Terrorism Activities Report No. 16 January – March 2016 Highlights This report covers the period of January - March 2016 and covers two main subjects: cyber-terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse) and cyber-crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report: The continuing trend of publishing information security guidelines and recommendations, including information and recommendations for correct methods of operation and software manuals, or services with a high encryption or anonymity level. Terrorist organizations continue to publish information about the dangers of intelligence and law enforcement officials who operate on the Internet to search for and locate terrorism supporters. In addition, all supporters are called on to continue spreading the organizations’ messages and guidelines for proper work. Officials in jihadist organizations continue to spread Best Practice guidebooks on the Internet and guidelines for using software and applications to increase information security. These are mainly used to encrypt data on the device and/or for data trafficking and maintaining the anonymity of Internet users. In addition, manuals for video processing are found. As previously stated, in recent years organizations have been using a wide range of software in order to create visual content at a professional level. Terrorists and terrorism supporters continue to hack Internet sites, especially as part of defacement attacks. In January 2016, Islamic State activists tried to recruit hackers to hack into government databases for pay. In February 2016, a television interview in Lebanon reported the existence of a Shi’ite hacker group, affiliated with Hezbollah, named Kadimon (translation – we are coming).
    [Show full text]
  • Security Challenges
    Security Challenges Volume 13 Number 1 (2017) Security Challenges ISSN 1833 – 1459 EDITORS: Dr Greg Raymond Dr Andrew Carr Ian Henry Managing Editors [email protected] Robert Wylie Geoff Hunt Consulting Editor Defence Industry Policy Production Editor [email protected] [email protected] EDITORIAL BOARD: Robert Ayson Sam Bateman Rod Lyon Victoria University University of Wollongong ASPI Wellington, New Zealand Wollongong, Australia Canberra, Australia Leszek Buszynski Eliot Cohen Ralph Cossa Strategic and Defence John Hopkins University, Pacific Forum CSIS Studies Centre, Australian Washington, DC, USA Honolulu, Hawaii, USA National University Bates Gill Gerald Hensley Ramesh Thakur Professor of Strategic Studies Former Secretary of Defence Asia-Pacific College of Strategic & Defence Studies New Zealand Diplomacy, Australian Centre, Australian National National University University Andrew Mack Andrew O’Neill Rizal Sukma Simon Fraser University Director, Griffith Asia Institue, Centre for Strategic and Vancouver, Canada Griffith University, International Studies Brisbane, Australia Jakarta, Indonesia William Tow Akio Watanabe Department of International Research Institute for Peace Relations, Australian National and Security University Tokyo, Japan Project Management and Cover: Qote Canberra (02) 6162 1258 Published and distributed by: The KoKoda Foundation 2/10 Kennedy St (PO Box 4060), Kingston ACT 2604 T: (02) 6295 1555 F: (02) 6169 3019 E: [email protected] W: www.securitychallenges.org.au © The KoKoda Foundation. All rights reserved. Apart from any fair dealing for the purposes of private study, research, criticism or review as permitted by the Copyright Act, no part of this publication may be reproduced, stored, transmitted or disseminated in any form or by any means without prior written permission.
    [Show full text]
  • Cyber-Terrorism Activities Report No. 14 July – September 2015
    ICT Cyber-Desk PERIODIC REVIEW Cyber-Terrorism Activities Report No. 14 July – September 2015 International Institute for Counter Terrorism (ICT) Additional resources are available on the ICT Website: www.ict.org.il Highlights This report covers the period of July - September 2015 and covers two main subjects: cyber- terrorism (offensive, defensive, and the media, and the main topics of jihadist discourse) and cyber- crime, whenever and wherever it is linked to jihad (funding, methods of attack). The following are among the issues covered in this report: Islamic State supporters continued to publish and distribute guidebooks and informational materials on the topic of information security and maintaining anonymity online: “personal computer security”, “smart phone security”, how to post informational material on Twitter using several accounts simultaneously, how to inspect files and links infected with viruses, how to open a Twitter account without a cell phone number, how to use encrypted email, and more. During this period, we continued to see cooperation between players affiliated with the Islamic State, such as Cyber Caliphate, IS Hacking Division and ISIS Cyber Army, and hacker groups that began to identify with the organization. For instance, it was reported that a hacker named Ardit Ferizi stole personal details about US army and government personnel that he sent to members of the organization, who then leaked the information under the name “Cyber Caliphate”. Members and supporters of the Islamic State continued to hack Web sites and social networks, and leak the information obtained. During this period, we witnessed a “spam campaign” – a virtual campaign that called on Islamic State supporters to report Twitter accounts belonging to opponents of the organization as spam in order to have them closed.
    [Show full text]
  • Conflict in Cyberspace and International Law Ido Kilovaty a Thesis Submitted in Partial Fulfillment of the Requirements For
    Conflict in Cyberspace and International Law Ido Kilovaty A thesis submitted in partial fulfillment of the requirements for the degree of Doctor of Juridical Science (S.J.D.) at the Georgetown University Law Center 2017 1 Published as: Law journal publications Doxfare – Election Hacking as Prohibited Intervention 9 HARVARD NATIONAL SECURITY JOURNAL (Forthcoming Fall 2017) World Wide Web of Exploitations: The Case of Peacetime Cyber Espionage Operations Under International Law: Towards a Contextual Approach 18 COLUMBIA SCIENCE AND TECHNOLOGY LAW REVIEW 42 (2017) Virtual Violence – Disruptive Cyberspace Operations as "Attacks" under International Humanitarian Law 22 MICHIGAN TELECOMMUNICATION AND TECHNOLOGY LAW REVIEW 113 (2017) ICRC, NATO and the U.S. – Direct Participation in “Hacktivities” – Targeting Private Contractors in Cyberspace under the Law of Armed Conflict 15 DUKE LAW AND TECHNOLOGY REVIEW 1 (2016) Op-eds Want to Keep Hackers Out of Gadgets? Try International Law WIRED.COM (February 7, 2017). Violence in Cyberspace: Are Disruptive Cyberspace Operations Legal under International Humanitarian Law? JUST SECURITY (March 3, 2017). The Democratic National Committee Hack: Information as Interference JUST SECURITY (August 1, 2016). Will “Cyber Bonds” Mitigate Transnational Cyberspace Threats? JUST SECURITY (June 15, 2016). 2 ABSTRACT Conflict in Cyberspace and International Law Ido Kilovaty In this dissertation, through four separately published articles, I address several contentious questions with regard to offensive cyberspace capabilities and the role of international law in the digital era. Offensive cyberspace capabilities, which for clarity purposes I refer to as “cyber- attacks,” are operations in cyberspace that target the confidentiality, integrity, and availability (colloquially known as the CIA triad) of information technology systems.1 Throughout these four articles, I explore contemporary international law as it applies to cyber conflict.
    [Show full text]
  • Why the United States Needs a National Political Warfare Center and Regional Embassies
    Georgetown Security Studies Review 4:2 1 Georgetown Security Studies Review Volume 4, Number 2 June 2016 A Publication of the Center for Security Studies at Georgetown University’s Edmund A. Walsh School of Foreign Service http://gssr.georgetown.edu Georgetown Security Studies Review 4:2 2 GEORGETOWN SECURITY STUDIES REVIEW Published by the Center for Security Studies at Georgetown University’s Edmund A. Walsh School of Foreign Service Ashley L. Rhoades, Editor-in-Chief Devon Hill, Deputy Editor Jacob Goldstein, Associate Editor for Africa John Chen, Associate Editor for Asia Michael Sexton, Associate Editor for Cyber Security Joe Pedley, Associate Editor for Europe Brendan Kinslow, Associate Editor for the Middle East Morgan Byrne-Diakun, Associate Editor for National Security & the Military Access Georgetown Security Studies Review online at http://gssr.georgetown.edu Connect on Facebook at http://www.facebook.com/GeorgetownUniversityGSSR Follow GSSR on Twitter @gssreview Contact the Editor-in-Chief at [email protected] DISCLAIMER The views expressed in Georgetown Security Studies Review do not necessarily represent those of the editors or staff of GSSR, the Edmund A. Walsh School of Foreign Service, or Georgetown University. The editorial board of GSSR and our affiliated peer reviewers strive to verify the accuracy of all factual information contained in GSSR. However, the staffs of GSSR, the Edmund A. Walsh School of Foreign Service, and Georgetown University make no warranties or representations regarding the completeness or accuracy
    [Show full text]
  • Icrc, Nato and the U.S. – Direct Participation in Hacktivities – Targeting Private Contractors and Civilians in Cyberspace Under International Humanitarian Law
    ICRC, NATO AND THE U.S. – DIRECT PARTICIPATION IN HACKTIVITIES – TARGETING PRIVATE CONTRACTORS AND CIVILIANS IN CYBERSPACE UNDER INTERNATIONAL HUMANITARIAN LAW IDO KILOVATY† ABSTRACT Cyber-attacks have become increasingly common and are an integral part of contemporary armed conflicts. With that premise in mind, the question arises of whether or not a civilian carrying out cyber-attacks during an armed conflict becomes a legitimate target under international humanitarian law. This paper aims to explore this question using three different analytical and conceptual frameworks while looking at a variety of cyber-attacks along with their subsequent effects. One of the core principles of the law of armed conflict is distinction, which states that civilians in an armed conflict are granted a set of protections, mainly the protection from direct attacks by the adversary, whereas combatants (or members of armed groups) and military objectives may become legitimate targets of direct attacks. Although civilians are generally protected from direct attacks, they can still become victims of an attack because they lose this protection “for such time as they take direct part in hostilities.”1 In other words, † Cyber Fellow at the Center for Global Legal Challenges, Yale Law School; Resident Fellow Information Society Project, Yale Law School; S.J.D. Candidate, Georgetown University Law Center. I would like to gratefully acknowledge the generous support of the Minerva Center for the Rule of Law under Extreme Conditions at the Faculty of Law and Department of Geography and Environmental Studies, University of Haifa, Israel and of the Israeli Ministry of Science, Technology and Space, who made this project possible.
    [Show full text]
  • Chapter 29 Cyber Attacks by Terrorists and Other Malevolent Actors
    Chapter 29 Cyber Attacks by Terrorists and other Malevolent Actors: Prevention and Preparedness With Three Case Studies on Estonia, Singapore, and the United States Shashi Jayakumar The field of cyberterrorism has existed for as a long as it has been possible to interdict or compromise computer systems. While contributions of scholars, researchers, and practitioners have enriched discussions, there are longstanding and unresolved issues of definition which can give rise to confusion. Does cyberterrorism mean attacks only by individuals groups that fall within widely accepted definitions of “terrorist” or “terrorist organizations?” To what degree does the aim or intention of the malicious actor matter? For the purposes of the present volume, this study (without sidestepping these questions) examines attacks against computer infrastructure and Critical Information Infrastructure (CII) by all actors with capability, and not just groups such as Al-Qaeda or ISIS. As the author notes and establishes early in his discussion, this is necessary given that while conventional terrorist groups might have intent, they have not to date acquired the capability to carry out a genuinely destructive cyber-attack of the type that might lead to major loss of life or infrastructural damage. It is (for the most part) states which have this capability. Cyber prevention and preparedness covers a wide range. This three-part chapter includes technical aspects of cyber protection, systems (and people) resilience, risk mitigation, as well as nurturing talent within
    [Show full text]