INDIAN ARMED FORCES CHIEFS ON
OUR RELENTLESS AND FOCUSED PUBLISHING EFFORTS

 
SP Guide Publications puts forth a well compiled articulation of issues, pursuits and accomplishments of the Indian Army, over the years

— General Manoj Pande, Indian Army Chief

 
 
I am confident that SP Guide Publications would continue to inform, inspire and influence.

— Admiral R. Hari Kumar, Indian Navy Chief

My compliments to SP Guide Publications for informative and credible reportage on contemporary aerospace issues over the past six decades.

— Air Chief Marshal V.R. Chaudhari, Indian Air Force Chief
       

Doctrine to establish rules of engagement against cyber attacks

November 01-15, 2011

New doctrine under review by the Joint Staff will lay out rules of engagement against an attack in cyberspace, the commander of US Cyber Command has said.

The doctrine, once adopted, will help to define conditions in which the military can go on the offensive against cyber threats and what specific actions it can take, Army General Keith B. Alexander told reporters at an International Systems Security Association conference here.

It will support the Defense Department’s strategy for operating in cyberspace, released in July, and President Barack Obama’s international cyberspace strategy, the General added.

Once the doctrine is approved, Cyber Command will put out guidance to its cyber warriors spelling out, “Here is how we operate in cyberspace,” and tailor its training accordingly, Alexander said. In the meantime, the laws of land warfare and law of armed conflict apply to cyberspace, he said. The challenge, he explained, is how to translate laws that govern physical space to cyberspace — now a fifth domain of conflict.

“That is what the Defense Department and others are working right now: to come up with the standing rules of engagement and those different parts,” he said.

Among issues the Defense Department is considering, Alexander said, is what constitutes a war in cyberspace.

The United States also must determine what represents a reasonable and proportional response to a cyber attack, he said. The law of armed conflict authorises a reasonable, proportional defence against a physical attack from another country. Extending that logic to cyberspace, Alexander said, it remains unclear if it includes authority to shut down a computer network, even if it’s been taken over by a malicious cyber attacker intent on destruction.

If it does, also left unanswered so far is who would have that authority: the FBI, the National Security Agency, the military, the Internet service provider or another entity.

another entity. “That is something policymakers are going to have to tell us: ‘Here is what you are authorised to do’,” Alexander said.