Tuesday, June 30, 2009

Al-Qaida plans cyber war against Britain: Top UK minister

LONDON: Britain faces growing threat from the al-Qaida, which is on track to launch a cyber-warfare campaign against the country, UK's security minister has warned.

Lord West warned that al-Qaida is aiming to use the internet to launch a cyber-warfare campaign against Britain.

"We know terrorists use the internet for radicalisation and things like that at the moment, but there is a fear they will move down that path (of cyber attacks)," he was quoted as saying by the Daily Telegraph newspaper.

Britain's security minister issued the warning as he published the government's new cyber security strategy to combat the cyber-warfare threats.

Published in Times of India

IT industry backs cyber-security strategy

By James Boxell and Jeremy Lemer

The IT industry welcomed the UK’s first cyber-security strategy as providing much-needed clarity about who companies should talk to in government about investment in research and development.

However, there was disappointment at defence and security companies that the broader national security strategy, also published on Thursday, did not promise similar engagement in other critical areas of homeland security, such as counter-terror and protecting critical infrastructure.


Published in www.ft.com

Cyber Cold War: U.S. Vs. Russia

June 28, 2009 - Eric Chabrow

A new Cold War, of sorts, is emerging in cyberspace between the United States and Russia over the best way to respond to the mounting assaults on information systems and the Internet.


Whether the American or Russian approach prevails ... major governments are reaching a point of no return in heading off a cyberwar arms race.

Though both nations' governments recognize the mayhem virtual assaults pose, they are at odds on how the international community should ban together to limit cyber attacks, according to an article Sunday in The New York Times:

Russia favors an international treaty along the lines of those negotiated for chemical weapons and has pushed for that approach at a series of meetings this year and in public statements by a high-ranking official.

The United States argues that a treaty is unnecessary. It instead advocates improved cooperation among international law enforcement groups. If these groups cooperate to make cyberspace more secure against criminal intrusions, their work will also make cyberspace more secure against military campaigns, American officials say.

Other points the article makes:

Russia would ban a country from secretly embedding malicious codes or circuitry that could be later activated from afar in the event of war, apply humanitarian laws banning attacks on noncombatants and a ban on deception in operations in cyberspace - an attempt to deal with the challenge of anonymous attacks, and call for broader international government oversight of the Internet.

The U.S. would resist agreements to allow governments to censor the Internet, saying they would provide cover for totalitarian regimes. American officials worry that a treaty would be ineffective because it can be almost impossible to determine if an Internet attack originated from a government, a hacker loyal to that government, or a rogue acting independently.

The article concludes:

"Whether the American or Russian approach prevails ... major governments are reaching a point of no return in heading off a cyberwar arms race."

Published in blogs.govinfosecurity.com


Tuesday, June 23, 2009

Update on Defamtion suit filed against Google in Bombay High Court, India

Google India Faces Defamation Suit

19-08-2008
Bombay High Court has ordered Google to disclose the identity of a blogger who allegedly had criticized a Mumbai based construction company. The judgment has come in pursuance of a suit filed by Mumbai-based Gremach Infrastructure Equipments & Projects Ltd. Appellant in the plea had demanded for Google’s discloser of the name of the person who had criticized them using Google's blogging service.

Now, if Google does not disclose the name, it could face the charge of defamation. Incidentally, blogger.com offers a facility to a blogger to blog without disclosing real identity. And, in the given case the blogger had used the name ‘Toxic Writer’ and had criticized the said company. Now, the Bombay High Court has asked Google to present the blog written on February 26.

The court observed that there is merit in the contention, and on the basis of the article put up by the defendant on the blog site defamation is apparent. The court further ordered to defendant to reveal the identity of the blogger within four weeks of the order. However, Google India has not yet revealed the name of the concerned blogger.

Published in www.india-server.com


Google India says it has no control over blog content
23 Jun 2009

MUMBAI: Google India said on Monday (22 Jun 2009) that it will not be able to control the publication of content on its blogging website. The company has moved the Bombay High Court over an order restraining the website from allowing the publication of defamatory blogs.


Google India’s lawyer Srikant Doijode said that it had no control over the blogging site and the same was managed by Google Inc, USA. Even if there was an order restraining such blogs, it could not do anything, Google India submitted in court.

“The blogger service is provided by Google Inc. We (Google India) are not a party to the agreement between Google Inc and those who use the blog. We have no liability or responsibility for the content of the blog,” the company argued.

Earlier, city-based cardiologist Dr Ashwin Mehta had approached the court after finding that over 20 blogs on the website were defaming him.

A single judge of the high court had ordered Google to remove those blogs and prevent such incidents in the future.

“Google only provides a platform,” argued Google India’s counsel, adding that on account of the earlier order, it (Google) will be held in contempt if there was any fresh offensive blog about Dr Mehta. Mr Doijode pointed out that if the content was defamatory and the court wanted its removal from the website, the same could be done.

Chief Justice Swatanter Kumar and justice SC Dharmadhikari have posted the case for final hearing on July 7.

Published in Economic Times

Wednesday, March 11, 2009

Cyber Law Update February 2009 - Issue no. 2

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Russia engaged in cyber war with neighboring countries

This January marked “the third successful cyberattack against a country” — when suspected Russian attackers distributed a denial of service attack that overwhelmed three of the four Internet service providers in Kyrgyzstan, disrupting Internet access, reports DefenseTech. Published in Blogs.zdnet.com

Chinese Hackers Attack U.S. Computers, Thompson Says

Chinese government and freelance hackers are the primary culprits behind as many as several hundred daily attacks against U.S. government, electric-utility and financial computer networks, a senior congressman said.

“Sophisticated hackers could really wreak havoc on our financial systems if they were successful,” House Homeland Security Committee Chairman Bennie Thompson said in an interview. The threat is “primarily from China.”

China’s Denial

Wang Baodong, a spokesman for the Chinese Embassy in the U.S., denied that the Chinese government was attacking U.S. computer systems. Published in Bloomberg

Cyber-crime cases hit record high in Japan in 2008

The police across Japan uncovered 6,321 cases of Internet-related or cyber crime in 2008, up 15.5% from the previous year and the highest number since comparable data became available in 2000, a National Police Agency survey showed Thursday. The figure represented a threefold jump from 2,081 cases recorded in 2004. Published in Japan Today

Cyber terrorists learn how to take advantage of cyberspace

The U.S. government and armed forces need to develop the knowledge, skills and attributes required for cyber-strategic leaders. And that next generation of leaders needs to understand the cyber environment.

Beginning in 1988 with the infamous "Morris Worm" attack, cybersecurity has grown in importance along with the degree of reliability the United States and other nations have placed on the cyber domain. Published in UPI

Obama orders review of cyber security

WASHINGTON (AP) — President Barack Obama on Monday ordered a 60-day review of the nation's cybersecurity to examine how federal agencies use technology to protect secrets and data. Published in Google

Nigeria: That Delay on Cyber Crime Law is Dangerous

Internet-based attacks and crimes are increasing in Nigeria as 'greedy' criminals continue to steal data from businesses and individuals.

The sad story however is government's attitude to curb the menace. IT World's Zakariyya Adaramola, wrote on the implications of the delay to act fast on the criminals. Published in All Africa

IBM Report: Threat Scores Should Give Weight to the Economics of Cyber-crime

With the number of Web-based threats and vulnerabilities growing, IBM X-Force is recommending that the security industry rethink how it ranks vulnerability threats--how easily an attack can be monetized and to what degree should be components of vulnerability scoring.

IBM’s X-Force is pushing for a reprioritization of security threats. Published in eWeek

Data Breaches Costing Customers, Not Just Money

A study by the Ponemon Institute found the average cost of data breaches - from detection to notification to lost business - is rising. The No. 1 cost to companies is lost business, which now accounts for 69 percent of total costs.


Data breaches are costly, and they are not getting any cheaper – particularly breaches due to third parties. Published in eWeek

Browsing child porn will land you in jail

The newly passed Information Technology Bill is set to make it illegal to not only create and transmit child pornography in any electronic form, but even to browse it. The punishment for a first offence of publishing, creating, exchanging, downloading or browsing any electronic depiction of children in "obscene or indecent or sexually explicit manner" can attract five years in jail and a fine of Rs 10 lakh. Published in Times of India

Cyber Crime can Kill

"It's dangerous in 'Cyberville,'" Banks said.Peter Banks, 17 year veteran of the National Center for Missing and Exploited Children, was a presenter at DMACC's Cyber Crime Awareness Conference last Saturday. Banks said that "Cyberville," as he calls it is a place where anyone with malintent has access to 30 million sites where children are exploited. Banks said that there are 600,000 registered sex offenders in America. He said that the center receives about 2000 calls a week on suspicions of the usage of child pornography, the luring of children, and child exploitation. Published in Campus Chronicle

Cracking down on cyber crime tough for experts: IGP

MANGALORE: "It is too technical! I bet half your police constables there did not understand a word of what you said", these words by a law degree student to M K Nagaraj, inspector general of police (Anti- Terrorist Cell) put the focus of a one-day workshop on cyber law for police personnel in its right perspective. Cracking down on cyber crime, Nagaraj admitted is sometimes difficult even for experts in this new area of white-collar crime. Published in Times of India

Don't Fall Victim To Cyber Crime

Cyber crime is on the attack, and it can happen to anyone.

That was the message at a day-long exercise addressing cyber-security. Published in Kfox TV

3 men charged with 'cyber flashing'

DETROIT (AP) — Authorities say three Saginaw-area men have been arrested after exposing themselves online to Wayne County sheriff's deputies posing as teenage girls.

Information from: The Saginaw News, http://www.mlive.com/saginaw and published in wsbt.com

Schools battle the bullies

…."Cyber-bullying presents unique challenges to schools because once something is put out on the Internet, it has the power to become available to the entire school and more," said Martha Turner, a counselor at Robious Middle School. "Before the Internet, bullying took the form of gossip, verbal or physical harassment." Published in Times Dispatch


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PRODUCTS AND SERVICES
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email to mailto:digitialsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitialsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details to dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOBS/ FREELANCE MARKETS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details to dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW/IS EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting cyber law or IS event, please email details to mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email to mailto:dipak@lawyer.com with subject line “Advertise”


Tuesday, January 20, 2009

Cyber Law Update January 2009 - Issue no. 1

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW NEWS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Cyber attacks are the greatest threat to the United States after nuclear war

FBI exports stated cyber attacks created the greatest threat to the United States after nuclear war and weapons of mass destruction. US experts highlighted that the economy, where almost everything important is linked to or controlled by computers is especially under the risk of being hacked. Published in Ecommerce Journal

FBI calls for global cooperation on cyber crime

The FBI has called for greater international coordination in anti-hacking laws at the first International Conference on Cyber Security. Published in VNUNet

Fordham/FBI Conference Draws Experts In Fight Against Cyber Crime

Some 300 international experts on cyber security gathered at Fordham University Tuesday, Jan. 6 for a three-day conference on the emerging global threat of cyber crime and cyber terrorism.The conference, which attracted representatives from 37 nations, runs through Thursday and is sponsored jointly by the Federal Bureau of Investigation’s New York Division and Fordham’s Department of Computer and Information Sciences.“We live in a world of instant connectivity . . . where we have no geographic boundaries, are not limited by time zones nor foreign languages,” said John Tognino, chairman of Fordham’s Board of Trustees, who joined Joseph M. McShane, S.J., president of Fordham, in welcoming conference participants to the Lincoln Center campus. “It is also true that almost anyone today has the ability, despite increasingly sophisticated firewalls, to bring down an entire computer operation.”“How then, do we protect our nation, or local communities and even our very own identities?” Published in Fordham

Cyber attack has Pentagon worried

Senior military leaders took the exceptional step of briefing President George W. Bush last week on a severe and widespread electronic attack on Defense Department computers that may have originated in Russia, posing unusual concern among commanders and potential implications for national security. Published in Chicago Tribune

Its not just war; its cyber war! Israel and Gaza engaged in cyber war

News of cyber war fare is reported from the warzone! News bases sites, telecommunication etc are the initial targets on both sides. Israel and the Arab world are showing mastery of cyber war fare and hacking of enemy sites on the rise due to the recent escalation of tension.Published in Hacked Info

Iran cyber attacking Israel

Iranian hackers have launched a massive campaign against Israeli web sites and have managed to bring many of them to a standstill. Published in Press IT

Kosovo, Serb Hackers Fight Cyber War

A group of hackers from Kosovo defaced the website of Serbia’s ministry of energy on Thursday in a payback strike for a similar intervention on the website of Kosovo’s energy ministry by Serb hackers earlier this week.
"United States of Albania" and “Don’t play if you don’t know the game”, were the messages displayed in red and black colours on the page of the Serbian energy ministry, hacked by the self-proclaimed Albanian and Kosova Hackers Group. "Oops!! you got owned , This is our revenge." Publihsed in Balkanin Sight

New initiative in Omaha: Cyber crime put on notice

From the outside, the central Omaha office building doesn't look as if it would house FBI agents in dark suits searching for cyber predators. But on the second floor, investigators are tracking down criminals who exploit children, scam adults and steal identities via computer.Published in Omaha

Cyber security vital to prevent corporate espionage

"Business organisations need to induct integrated security technologies to safeguard their operations as hacking' for corporate espionage now constitutes a real threat," Naveen Agrawal, executive director for advisory services in KPMG said here on Saturday. Published in Times of India

Cyber hunters in China in for crash landing

BEIJING, Jan 3 — The cyber hunters who roam China's online space could soon become the hunted themselves. The Chinese legislature is deliberating a new law ...Published in The Malaysian Insider

Cyber court to help net online criminals

Malaysia may need a cyber court to deal with cyber crimes in view of the increasing number of such cases, says Energy, Water and Communications Minister Datuk Shaziman Abu Mansor.
He said the ministry had submitted more than 30 cases to the Attorney-General’s Chambers in three years.
“If in future we cannot cope any more, we may need to have a cyber court,” he told reporters after launching a community broadband centre in Kampung Merchang here yesterday.Published in the Star

Avoiding the Most Common Programming Errors

These mistakes show that the bad guys aren't necessarily skilled as they are simply exploiting your errors.Published in Internetnews

Spam e-mails pose many risks

For many, receiving one special e-mail can brighten a bad day. But opening the wrong e-mail can ruin a day, or worse, a computer’s operating system.

As spam e-mail gets more sophisticated, including spam posing as coming from familiar e-mail addresses, or even your own, it’s increasingly difficult for people to determine safe messages from detrimental ones.
Published in Carroll Country Times

'Cyber stalker' denied bail

A 30-year-old man asked a police officer posing as a child in an internet chat room to wear a miniskirt with no knickers when they met, a court in Perth has heard.Published in SMH

Hong Kong businessman guilty of spam to influence stocks

A Hong Kong businessman has recently pleaded guilty for his part in dispatching tens of millions of spam messages to pump up the prices of Chinese stocks between 2004 and 2006. Published in Network World

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
PRODUCTS AND SERVICES ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Cyber Law College has been the pioneer in Cyber Law education in India. It provides various courses and trainings on Cyber Law for E-Commerce Professionals, Law Students, Business Management Students, Engineers, Company Secretaries and Chartered Accountants and Legal professionals who would like to specialize in Cyber Laws. For more details email to dipak@lawyer.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

iPro, a unique software to comply with the MCA-21 e-filing & Company Law requirements.

It enables an easy & secure access and also e-filing and compliance to MCA services. MCA 21 Project facilitates e-Filing of various forms & applications under the Company Act, 1956. It is fully compatible with the MCA21 Project. In addition to these there are various other utilities of the package.
Salient Features of iPro:
 New format of e-forms – as and when updated / revised
 Efilling of Forms
 Annual Return as per Schedule 5
 All major e-Forms like- 1, 1A, 2, 5, 8, 17, 18, 20B, 23, 23AC, 23ACA, 32, 32AD, 62, 66, DIN 2, DIN 3, etc.
 Minutes book with 500+ resolutions in-built plus user editing option
 Compliance Certificate
 Combined Company Registers
 Allotment, Transfer, Consolidation, Split, Transmission, Forfeiture, Cancellation of shares
 Fixed Asset Registers & Reports
 Charges and Notice
 Certificate Printing
 Director Details Entry
 Attachment in PDF format.
For more details of the above software email to mailto:digitialsigncert@gmail.com

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For TCS Class 2 Digital Signature with Cryptographic FIPS Certified USB Token email at digitialsigncert@gmail.com


~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting your products and services, please email details to dipak00001@gmail.com with subject line “Product”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
JOBS/ FREELANCE MARKETS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Coming soon….

For posting cyber law or IS related jobs or assignments, please email details to dipak00001@gmail.com with subject line “Job”

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
CYBER LAW/IS EVENTS
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

For posting cyber law or IS event, please email details to mailto:dipak@lawyer.comwith subject line “Events”
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
BUSINESS STUFF
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

Advertise with Cyber Law Update!!!
For more details email to mailto:dipak@lawyer.com with subject line “Advertise”