Make this your homepage
Column
Home > Column
Cybersecurity & Counter-Terrorism beyond the Borders
Saumen Sarker
Cybersecurity & Counter-Terrorism beyond the Borders
PHOTO : TIWN

Cybersecurity is not now, and never will be, an issue that one state or a country can solve alone in most of the high profile terrorism cases. The solution will require a concerted—and ongoing—collaboration among different law enforcement agencies, technical experts and like-minded political will powers. Treaties and global governance do not contain bad actors, so countries like India, Bangladesh must work with other friendly nations to counter the spread of Terrorism by web based ISIS, Jihadi organizations.

It is important to mention that, Cybersecurity, Counter-Terrorism in Cyberspace is not the domain of traditional khaki wearing Policemen or traditional Military officials but it should be 100% driven and run by top-notch technical experts on Cyber Security, Network Communication Engineering professionals alongwith traditional law enforcement organizations.

Cybersecurity & Counter-Terrorism Experts in advanced countries like Israel, USA, Russia work in sync with traditional law enforcement professionals to contain terrorism.

The first step to effectively conducting a fruitful Cyber Security strategy is to determine a Country’s domestic policy on cybersecurity. It would be foolish to jump into international negotiations until the countries. has the kind of national conversation that sorts out definitional and policy positions such as those policies described above. However, it would be just as foolish to ignore the need to make international connections and establish cooperative relationships in this field.

Cyber Security Policy Model

Enable cyber information sharing by removing ambiguities, providing strong protections to sharers, and establishing a public-private partnership to facilitate sharing. 

Entities that share cybersecurity information need certain protections. These protections include exempting all shared information from FOIA requests and regulatory use, and providing information sharers with strong liability protection. Effective information sharing requires the government to share fully and in a timely manner with the private sector through a public-private partnership established for this purpose.

Promote the development of a viable cybersecurity liability and insurance system. 

Liability for irresponsible cybersecurity actions should be established through common law development. This process may need some initial incentives from the government, but, ultimately, such a system returns cybersecurity liability to those who are largely responsible for cybersecurity losses. The natural establishment of a cyber insurance community will then assist in the administration of risk assessments and foster improved security methodologies.

Encourage the creation of cyber-supply-chain security ratings. 

Such ratings should be granted by a nonprofit organization that will assess the surety of an organization’s supply chain, similar to how Underwriters Limited assesses the safety of various commercial products. By promoting such ratings, consumers will be able to make risk-based decisions and support better security by tying it to their profit motive.

Clarify boundaries and standards for cyber self-defense. 

The terms of an entity’s right to self-defense must be set within reasonable limits. Such terms would allow entities with the correct capabilities to take active measures to protect themselves without usurping the responsibility or authority of the federal government.

Advocate more private-sector awareness, education, and training for the general population.

Such an effort will ensure that the American public becomes an asset, not a liability, in the struggle. Making the public more aware, without hype or feel-good security measures, is a start. Ongoing cyber education for the general workforce must also be promoted through standardized yet dynamic education programs, most likely originating in the private sector. This must be a major priority, not a minor ancillary effort

Cybersecurity is one of the most critical issues the world faces today. The threats are real and the need is pressing. Despite the best intentions of those involved with previous cyber legislative efforts, a regulatory basis simply will not work. It will not improve security and may actually lower it by providing a false level of comfort and tying the private sector down with outdated regulations. Cyberspace’s dynamic nature must be acknowledged and addressed by policies that are equally dynamic.

Terrorists have always used whatever technology was available to get their message across and recruit new followers. In the past it was audiotapes and photocopiers; now computer technology makes it incredibly easier for all web based terrorist organizations like ISIS to recruit misguided youths in the name of religious duty worldwide.

From India’s terror attacks to massive rise of terrorism in Bangladesh, it is extremely important for all South Asian nations to create a Cyber-Counter-Terrorism platform to share expertise on terror tracking in Cyber space.

Tripura’s leading online news media TRIPURA INFOWAY organizing a Conclave on 3pm Friday, August 26, 2016 at Sukanta Academy, Agartala on  the key topic of “Terrorism in Bangladesh: Implications for India’s Border States”.

Tripura Conclave dialogue will be conducted by top security and intelligence officials from India and Bangladesh with the goal of promoting greater security and intelligence cooperation between not only Delhi and Dhaka but between Bangladesh and the Indian border states .

( With inputs from SITE Intelligence Institute, Kathryn and Shelby Cullom Davis Institute for International Studies, US based think tank on Cyber Security,Global Terrorism)

Writer is a US based Network Communications & Security Engineering Architect with 20+ yrs experience in Internetworking, Network Security and previously worked at General Electric, Cisco Systems, Bank of New York, Merrill Lynch, NYC Govt DoITT,  NEC , Hewlett Packard.

Add your Comment
comments powered by Disqus
Comments (0)

Special Articles

Sanjay Majumder Sanjay Majumder
Anirban Mitra Anirban Mitra