• +91 7042148991
  • editor@ijlra.com
image
  • Home
  • Ethics & policy
    • Duties Of Authors
    • Editors Responsibilities
    • Reviewrs Responsibilities
    • Plagiarism Policy
    • Copyright Policy
  • For authors
    • About us
    • Call for paper
    • Verify certificate
    • Track Paper
    • Copyright form
    • How to Publish Paper
  • Issue
    • Past issue
    • VOLUME 1
      • ISSUE 9
      • VOLUME 1 ISSUE 3
      • VOLUME 1 ISSUIE 7
      • VOLUME 1 ISSUIE 5
      • VOLUME 1 ISSUIE 6
    • VOLUME 2
      • VOLUME 2 ISSUE 5
      • VOLUME 2 ISSUE 6
      • VOLUME 2 ISSUE 7
      • VOLUME II ISSUE 7
      • VOLUME 2 ISSUIE 1
      • VOLUME 2 ISSUE 2
      • VOLUME 2 ISSUE 8
      • VOLUME 2 ISSUE 9
      • VOLUME 2 ISSUE 10
    • VOLUME 3
      • VOLUME 3 ISSUE 1
      • VOLUME 3 ISSUIE 2
  • Editorial Board
  • Verify certificate
  • Submit Paper
image
  • Home
  • Ethics & policy
    • Duties Of Authors
    • Editors Responsibilities
    • Reviewrs Responsibilities
    • Plagiarism Policy
    • Copyright Policy
  • For authors
    • About us
    • Call for paper
    • Verify certificate
    • Track Paper
    • Copyright form
    • How to Publish Paper
  • Issue
    • Past issue
    • VOLUME 1
      • ISSUE 9
      • VOLUME 1 ISSUE 3
      • VOLUME 1 ISSUIE 7
      • VOLUME 1 ISSUIE 5
      • VOLUME 1 ISSUIE 6
    • VOLUME 2
      • VOLUME 2 ISSUE 5
      • VOLUME 2 ISSUE 6
      • VOLUME 2 ISSUE 7
      • VOLUME II ISSUE 7
      • VOLUME 2 ISSUIE 1
      • VOLUME 2 ISSUE 2
      • VOLUME 2 ISSUE 8
      • VOLUME 2 ISSUE 9
      • VOLUME 2 ISSUE 10
    • VOLUME 3
      • VOLUME 3 ISSUE 1
      • VOLUME 3 ISSUIE 2
  • Editorial Board
  • Verify certificate
  • Submit Paper

RIGHT TO ADVERTISMENT AS PART OF FREEDOM OF SPEECH AND EXPRESSION BY - SINDHUJA DHAYANANTHAN

Authors : SINDHUJA DHAYANANTHAN
Registration ID : 106452 Published Paper ID: IJLRA6452
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : sindhujadhayananthan@gmail.com
Page No :20 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

A CRITICAL ANALYSIS ON THE EMPLOYMENT LAW OF DISABLED INDIVIDUALS IN INDIA BY- ALKA VAISHNAVI

Authors : ALKA VAISHNAVI 
Registration ID : 106451 Published Paper ID: IJLRA6451
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : alkavaishnavi1707@gmail.com
Page No :18 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

MANKASTU IMPEX PRIVATE LIMITED V. AIR VISUAL LIMITED, (2020) 5 SCC 399 BY - DR. LEENA MOUDGIL

Authors : DR. LEENA MOUDGIL
Registration ID : 106450 Published Paper ID: IJLRA6450
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : leenapundit@gmail.com
Page No :12 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

AGRICULTURAL INCOME A SOURCE OF MONEY LAUNDERING IN INDIA BY: REINHARD LUKE COLLACO

Authors : REINHARD LUKE COLLACO
Registration ID : 106449 Published Paper ID: IJLRA6449
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : reinhardcollaco@gmail.com
Page No :11 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

CYBER EXTORTION IN INDIA AND ITS LEGISLATIVE MEASURES BY - R. USHA

Authors : R. USHA
Registration ID : 106448 Published Paper ID: IJLRA6448
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : usharajaram.sha46@gmail.com
Page No :15 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

HUMAN RIGHTS AND PRESERVATION OF HUMAN HEALTH BY: RAJESH GOVIND DEKATE

Authors : RAJESH GOVIND DEKATE
Registration ID : 106447 Published Paper ID: IJLRA6447
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : rajdekate@rocketmail.com
Page No :32 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

A LEGISLATIVE ELUCIDATE ON TRIPLE TALAQ; ANALYSING THE GLOBAL PERSPECTIVES BY - AHAMMED RIFAI KM

Authors : AHAMMED RIFAI KM
Registration ID : 106446 Published Paper ID: IJLRA6446
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : advrifai@gmail.com
Page No :22 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

THE ART OF STATECRAFT AND INTELLIGENCE ANALYSIS IN THE KAUTILYA-ARTHASHASTRA: A CRITICAL STUDY BY - DR.S. KRISHNAN & DR. ANIL BUNDELA

Authors : DR.S. KRISHNAN  & DR. ANIL BUNDELA 
Registration ID : 106444 Published Paper ID: IJLRA6444 & IJLRA6445
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : s.krishnan22@gmail.com
Page No :34 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

Access To Information In The Uk And India. By - Dr. S. Krishnan & Ms. Rashmi Meena

Authors : Dr. S. Krishnan & Ms. Rashmi Meena
Registration ID : 106442 Published Paper ID: IJLRA6442 & IJLRA6443
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : s.krishnan22@gmail.com
Page No :32 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google

NATO, CYBER DEFENSE, AND INTERNATIONAL LAW BY - DR.S. KRISHNAN

Authors : DR.S. KRISHNAN 
Registration ID : 106441 Published Paper ID: IJLRA6441
Year : Dec-2023 | Volume : II | Issue : 7
Approved ISSN : 2582-6433 | Country : Delhi, India
Email Id : s.krishnan22@gmail.com
Page No :28 | No of times Downloads: 0065
Doi Link
  • Share on:
  • Citation
  • Download
  • Full Details
  • Search on Google
« Previous Next »

International journal for legal research and analysis

Abbreviation:IJLRA

ISSN:2582-6433

Website:https://www.ijlra.com/

Accessibility:Open Access

License:Creative Commons 4.0

Submit Manuscript:Click here

Licensing:

All research articles published INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS are fully open access. i.e. immediately freely available to read, download and share. Articles are published under the terms of a Creative Commons license which permits use, distribution and reproduction in any medium, provided the original work is properly cited.

Disclaimer:

The opinions expressed in this publication are those of the authors. They do not purport to reflect the opinions or views of the INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS or its members. The designations employed in this publication and the presentation of material therein do not imply the expression of any opinion whatsoever on the part of the INTERNATIONAL JOURNAL FOR LEGAL RESEARCH AND ANALYSIS

Ethics and Policy

  • Duties of Authors
  • Editors Responsibilities
  • Reviewrs Responsibilities
  • Plagiarism Policy
  • Copyright Policy

For Authors

  • About us
  • Call for paper
  • Verify Certificate
  • Copyright Form
  • How to Publish Paper
  • Editorial Board
  • Contact us

Citation


[1] https://www.ijlpa.com/_files/ugd/006c7e_cf6e0c14712e4bd78c51b379984e7ffc.pdf?index=true
[2] https://www.scconline.com/blog/post/tag/commercial-Speech/
[3] sanette nel, Freedom of Commercial Speech: evaluating the Ban on Advertising of Legal products such as tobacco, 37 jstor (2004).
[4] Akhil Deo & joshita pai, COMMERCIAL SPEECH: A VARIANT OR A STEP-CHILD OF FREE SPEECH, 2.1 manputra (2014).
[5] madhavi  goradia divan, statutory regulation of advertisement, in facets of media law (2 ed. 2017).
[6] ICIC Bank V. Municpal Corpn. Of Greater Bombay (2005) 6 SCC 404 AIR 2005 SC 3315.
[7]  1995 AIR 2438, 1995 SCC (5) 139
[8] 1995 AIR 2438, 1995 SCC (5) 139
[9] Cent. Hudson Gas & Elec. Corp V. Pub. Serv. Commn’n 447 u.s. 557 (1980.
[10] Geethika ES, “Commercial Speech and Article 19” (Legal BitesOctober 12, 2022) <https://www.legalbites.in/topics/Articles/commercial-Speech-and-Article-19-351565> accessed February 5, 2023
[11]  1995 AIR 2438, 1995 SCC (5) 139
[12] AIR 1960 SC 554: 1960 Cri LJ 735.
[13] (1985) 01 SCC 641 : AIR 1986 SC 515
[14] Indian express newspaper (Bombay) (P) Ltd v. UOI, (1985) SCC 641
[15] AIR 1960 SC 305: (1962) 3 SCR 842.
[16] Bennett Coleman & Co. v. Union of India 1973 AIR 106, 1973 SCR (2) 757
[17]  Hamdard Dawakhana v. union of India AIR 1960 SC 554: 1960 Cri LJ 735
[18] Tata Press Ltd. V. Mahanagar telepjone Nigram Ltd 1995 AIR 2438, 1995 SCC (5) 139
[19] Tata Press Ltd. V. Mahanagar telepjone Nigram Ltd 1995 AIR 2438, 1995 SCC (5) 139
[20] Madhavi Goradia Divan, The Facets of Media Law (2nd edition2013)
[21] Madhavi Goradia Divan, The Facets of Media Law (2nd edition2013)
[22]Hemant Goya “India: Advertising and Marketing Advertising Law”,( global jurix), https://www.globaljurix.com/our-publications/advertising-and-marketing-law-india.pdf accessed February 5, 2023.
[23] Hemant Goya “India: Advertising and Marketing Advertising Law”,( global jurix), https://www.globaljurix.com/our-publications/advertising-and-marketing-law-india.pdf accessed February 5, 2023
[24] 2nd edition, Madhavi Goradia Divan, Facets of the Media law, 375, 2013
[25] Sec.3 Indecent Representation Of Women (Prohibition) Act 1986
[26] Drugs And Cosmetics Act, 1940
[27] Prize Competition Act, 1955
[28] Representation Of The People (Amendment) Act, 1996
[29] Hemant Goya “India: Advertising and Marketing Advertising Law”,( global jurix), https://www.globaljurix.com/our-publications/advertising-and-marketing-law-india.pdf accessed February 5, 2023
[30] Pranav Rudresh, “What Are the Laws Governing the Advertisement in India” (iPleadersOctober 22, 2019) <https://blog.ipleaders.in/laws-governing-advertisement-india/> accessed February 5, 2023
[31] Hemant Goya “India: Advertising and Marketing Advertising Law”, (global jurix), https://www.globaljurix.com/our-publications/advertising-and-marketing-law-india.pdf accessed February 5, 2023
[32] Pranav Rudresh, “What Are the Laws Governing the Advertisement in India” (iPleadersOctober 22, 2019) <https://blog.ipleaders.in/laws-governing-advertisement-india/> accessed February 5, 2023

Citation

[1]http://indianexpress.com/article/india/india-others/3-quota-must-for-disabled-in-all-govt-jobsincluding-ias-supreme-court/
[2] http://ncpedp.org/employ/em-resrch.htm
 
[3] As shared by Mr. Basavaraju, GRAM at a conference organized by DNA and CII on Employment in Bangalore, 2015
[4] Ranjita Dawn: Challenges in the Employment of Disabled Persons, Economic and Political Weekly, September 8, 2012, Vol. XLVII, No. 36, pp. 20-22, at p. 20
[5] http://www.dnis.org/Employment.pdf
[6] Website of NREGA,
 http://mnregaweb4.nic.in/netnrega/all_lvl_details_dashboard_new.aspx
[7] Employment in Bangalore, 2015
Numbers do not matter in case of PwD living in rural areas, Study by GRAM, http://graam.org.in/numbers-do-not-matter-case-pwd-living-rural-areas
[8] National Federation for the Blind v. State of Maharashtra, 2005 (1) Bom CR 740 (Bom HC)
 Tami Taniang v. State of Arunachal Pradesh, PIL No. 11 of 2007 (Gua HC)

Citation

* Associate Professor,Vivekananda School of Legal Studies,Vivekananda Institute of Professional Studies, GGSIPU, Delhi.
[1]Mauro Rubino-Sammartano, International Arbitration: Law and Practice56 (Kluwer Law International, Delhi, 1st Indian edn., 2007).
[2] Sabyasachi Chatterjee, “Law applicable to International Commercial Arbitration”, 109- 116 JSLC 4 (2004).
[3] Dickson Oruaze Moses, Chrispas Nyombi and Tom Mortimer, “The Practicalities of Delocalisation in International Commercial Arbitration”, International Business Law Journal 2017 .
[4] Nigel Blackaby and Constatine Partasides(et.al), Redfern and Hunter on International Arbitration 165 (Oxford University Press, 2009).
[5]P.C. Markanda, Law relating to Arbitration and Conciliation 385 (Wadhwa and Company Nagpur, 5thedn, 2003).
[6]The case is decided by Full Bench Judges namely Justice R. Bhanumathi, Justice A.S. Bopanna, and JusticeHrishikesh Roy. Justice R. Bhanumathi authored the judgment.
[7] (2012) 9 SCC 552.
[8](2014) 5 SCC 1.
[9] (2018) 7 SCC 374.
[10] 2019 (17) SCALE 369. 
[11]Alan Redfern & Martin Hunter et.al., Law and Practice on International Commercial Arbitration 87 ( Sweet& Maxwell, 4thedn., 2006).   
[12] Julian DN Lew QC, Loukas A. Mistellis and Stefan M. Karol (Kluwer Law International) (referred from P.C. Markanda,Law relating to Arbitration and Conciliation, (Lexis Nexis, 2019, 9th edn) (Reprint).
[13]https://www.macmillandictionary.com/dictionary/british/administer
[14] Pearsall, The Concise Oxford Dictionary 17 (Oxford University Press, 1999).
[15] Bryan A. Garner, Black’s Law Dictionary 44 (West Group, St. Paul, Minn., 1999)

Citation

[1] Income Tax Act ,1961 ,Section 2(1)A ,Acts of Parliament ,1949(India)
[2] Income Tax Act ,1961 ,Section 10 ,Acts of Parliament ,1949(India)
[3] Tax Guru, https://taxguru.in/income-tax/agricultural-income-justification-objections.html (last visited Dec 12, 2022)
[4] Prevention of Money Laundering Act,2002,Section 3, Acts of Parliament,1949(India)
[5] The Quint, https://www.thequint.com/news/india/even-as-farmers-die-trillions-laundered-as-agricultural- income#read-more#read-more#read-more (last visited Dec 10, 2022)

Citation

[1] Kimberlee Leonard, What Is Cyber Extortion?, Updated Nov 07, 2023, What Businesses Should Know About Cyber Extortion - business.com, accessed - 24 Dec 2023.

[2] Sherri Davido,­ Matt Durrin, Karen Sprenger, Ransomware and Cyber Extortion Response and Prevention, 2023, Anddison Wesley, ISBN-13: 978-0-13-745033-6, ISBN-10: 0-13-745033-8, accessed - 29 Nov 2023.
[3] By Adrian, What to do when you receive an extortion email, Internet Security, June 19, 2020, What to do when you receive an extortion email (internetsecurity.tips), accessed -  28 Nov 2023
[4] Vaibhav Ruparel, CYBER EXTORTION, Published Oct 31, 2023, CYBER EXTORTION (linkedin.com), accessed - 26 Nov 2023.
[5] Gautam Chaudhary, All about cyber extortion, December 24, 2022, All about cyber extortion - iPleaders, accessed - 26 Nov 2023.
[6] Nehal Misra, What can I do if someone is blackmailing me online, June 5, 2021, What can I do if someone is blackmailing me online - iPleaders, accessed - 22 Nov 2023.
[7] Information Technology Act, 2000.
[8] Nehal Misra, What can I do if someone is blackmailing me online, June 5, 2021, What can I do if someone is blackmailing me online - iPleaders, accessed - 22 Nov 2023.
[9] Gautam Chaudhary, All about cyber extortion, December 24, 2022, All about cyber extortion - iPleaders, accessed - 26 Nov 2023.
[10] Economic Times, Cyber terrorists attack AIIMS-Delhi eHospital server, health data of top ministers under threat, Updated On Nov 25, 2022 at 03:49 PM IST, Cyber terrorists attack AIIMS-Delhi eHospital server, health data of top ministers under threat, ET Government (indiatimes.com), accessed - 01 Dec 2023.
[11] Times of India, MeitY reaches out to RBI, others against Wanna Cry ransomware, May 14, 2017, 22:47 IST, MeitY reaches out to RBI, others against Wanna Cry ransomware - Times of India (indiatimes.com), accessed - 01 Dec 2023.

Citation

[1] https://www.physio- pedia.com/Human_Rights_and_Health#:~:text=As%20declared%20in%201948%20in,security%20in%20the%20eve nt%20of
[2] https://www.who.int/news-room/fact-sheets/detail/human-rights-and-health
[3] https://www.drishtiias.com/daily-updates/daily-news-analysis/right-to-health- 3#:~:text=Fundamental%20Rights%3A%20Article%2021%20of,of%20the%20right%20to%20health.
[4] https://www.ohchr.org/en/special-procedures/sr-health/about-right-health-and-human-rights
[5] https://equityhealthj.biomedcentral.com/articles/10.1186/s12939-022-01634-3
[6] https://blog.ipleaders.in/right-to-health/
[7] http://hrlibrary.umn.edu/edumat/IHRIP/circle/modules/module14.htm
[8] https://www.jstor.org/stable/4065261
[9] https://www.humanrightscareers.com/issues/examples-of-human-rights/
[10] https://www.un.org/en/global-issues/human-rights
[11] https://humanrights.gov.au/our-work/education/introduction-human-rights

Citation

[1]Amiruddin v. Mst. Khatun Bibi, (1917) 39 All.371
[2] Dr.Moin Qazi, (2010) ‘Tracing the history of Triple Talaq to look to the future’ Qrius,  https://qrius.com/history-triple-talaq-future.  
[3] Shayara Bano v. Union of India &Others, (2017) 9 SCC 1
[4] Jiauddin Ahmed v. Anwara Begum, (1981) 1 GLR 358, Rukia Khatoon v. Abdul Khalique Laskar, (1981) 1 GLR 375, Nazeer v. Shemeema, 2017 (1) KLT 300.
[5] The Code of Family Law, 1984.
[6] Shahid, Ayesha, (2013) "Post-divorce maintenance for Muslim women in Pakistan and Bangladesh: A Comparative Perspective," International Journal of Law, Policy and the Family: p- 197-215.
[7] The Muslim Family Laws Ordinance, 1961.
[8] Jamila Ahmed Chowdhary, (2006) “Family Court ADR in Egypt and some exemplary provisions for other Muslim Countries.”  http://www.diac.ae/idias/journal/volume2sp2/chowdhurye.pdf.
[9] The Law of Personal Status 1929.
[10] Ropi, Ismatu. (2017) Religion and regulation in Indonesia. Springer.
[11] Kelsey Cherland, (2014) “The Development of Personal Status Law In Jordan & Iraq,” CMC Senior Theses , 89, http://scholarship.claremont.edu/cgi/viewcontent.cgi?article=1926&context=cmc_theses.
[12] The Code of Personal Status 1959.
[13] Article 79 Code of Personal Status 2004 (Law 70.03 of 2004)
[14] Article 80 The Code of Personal Status 2004.
[15] Article 81  of The  Code of Personal Status 2004
[16] Article 82 of the Code of Personal Status 2004.
[17] Article 83 of the Code of Personal Status 2004.
[18] Article 90 of the Code of Personal Status 2004.
[19] Article 1 of the Law on Talaq, 1935.
[20] Article 2 of the Law on Talaq, 1935.
[21] Article 3 of the Law on Talaq, 1935.
[22] Article 4 of the Law on Talaq, 1935.
[23] Article 140 of the Law of Personal Status 2005
[24] Article 61 of the Decree on Personal Status, 1992.
[25] Article 65 of the Decree on Personal Status, 1992.
[26] Article 66 of the Decree on Personal Status, 1992.
[27] Article 64 of the Decree on Personal Status, 1992.
[28] Article 67 of the Decree on Personal Status, 1992.
[29] Article 71 of the Decree on Personal Status, 1992.
[30] Article 102 of the Code of Personal Status, 1984
[31] Article 109 of the Code of Personal Status, 1984
[32] Article 104 and 105 of the Family Rights Law, 1962
[33] Article 28 of the Family Law,1984
[34] Article 30 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[35] Article 32 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[36] Ibid
[37] Article 35 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[38] Article 47 of the Family Law,1984 (Law 10 of 1984 as amended by Law 15 of 1984)
[39] Article 46 of the Code of Muslim Personal Law 1977.
[40] Article 85 of the Code of Muslim Personal Law 1977.
[41] Article 161 of the Code of Muslim Personal Law 1977.

Citation


[1] The Author is an Associate Professor, Seedling School of Law and Governance, Jaipur National University, Jaipur.
[2] The Author is an Assistant Professor, School of Education, Jaipur National University, Jaipur.

Citation

Citation


[1] Associate Professor, Seedling School of Law and Governance, Jaipur National University, Jaipur. Earlier worked as an Assistant Professor in Apex Professional University, Pasighat, Arunachal Pradesh. Had worked as a Journalist in esteemed newspapers like Indian Express, Daily News Analysis, online newsportals and magazines in Ahmedabad. He had also worked as a Liaison Officer in Indian Society of International Law, New Delhi.
[2] This section is based primarily on Richard Pregent’s Symposium presentation, “Cyber Operations and Collective Self-Defense.”
[3] See, e.g., NATO, A Short History of NATO, http://www.nato.int/history/nato-history.html (last visited June 13, 2013).
[4] North Atlantic Treaty art. 5, Apr. 4, 1949, 63 Stat. 2244, 34 U.N.T.S. 243, 246.=
[5] Id. at art. 9.
[6] NATO, NATO Member Countries, http://www.nato.int/cps/en/ natolive/nato_countries.htm (last updated Apr. 9, 2013).
[7] On the Estonian cyber attacks, see ENEKEN TIKK, KADRI KASKA & LIIS VIHUL, INTERNATIONAL CYBER INCIDENTS: LEGAL CONSIDERATIONS 14?34 (2010).
[8] Jason Healey & Leendert van Bochoven, Atlantic Council, NATO’s Cyber Capabilities: Yesterday, Today, and Tomorrow, at 2 (Feb. 2012), available at http://www.atlanticcouncil.org/publications/issue-briefs/natos-cyber-capabilities-yesterday-today-and-tomorrow.
[9] See, e.g., U.S. Dep’t of Def., An Assessment of International Legal Issues in Information Operations, at 5 (May 1999) (observing that “the proliferation of global electronic communication systems and the increased interoperability of computer equipment and operating systems . . . have made information systems that are connected to any kind of network . . . vulnerable to computer network attacks”).
[10] NATO, NATO and Cyber Defence, http://www.nato.int/ cps/en/natolive/topics_78170.htm? (last updated Oct. 22, 2013) [hereinafter NATO and Cyber Defence].
[11] Healey & Bochoven, supra note 8, at 2.
[12] Id.
[13] NATO and Cyber Defence, supra note 10.
[14] Stéphane Abrial, NATO Builds Its Cyberdefenses, N.Y. TIMES (Feb. 27, 2011), http://www.nytimes.com-/2011/02/28/opinion/28iht-edabrial28.html?_r=1&# (commander of NATO’s Allied Command Transformation observing that the damage caused by the cyber attacks on Estonia “was a wake-up call for NATO”).
[15] NATO, Bucharest Summit Declaration para. 47 (Apr. 3, 2008), http://www.nato.int/cps/en/natolive/official_texts-_8443.htm.
[16] NATO, Active Engagement, Modern Defence: Strategic Concept for the Defence and Security of the Members of the North Atlantic Treaty Organization, at 16 (Nov. 2010), http://www.nato.int/nato_static/assets/pdf/pdf_publications/20120214_strategic-concept-2010-eng.pdf [hereinafter NATO Strategic Concept] (highlighting the need for NATO to “develop further our ability to prevent, detect, defend against and recover from cyber-attacks”).
[17] NATO, Lisbon Summit Declaration para. 2 (Nov. 20, 2010), http://www.nato.int/nato_static/assets/pdf/pdf_2010_11/2010_11_11DE1DB9B 73C4F9BBFB52B2C94722EAC_PR_CP_2010_0155_ENG-Summit_LISBON.pdf.
[18] NATO, Defending the Networks: The NATO Policy on Cyber Defence (2011), http://www.nato.int/nato_static/assets/pdf/pdf_2011_09/20111004_110914-policy-cyberdefence.pdf [hereinafter NATO Policy on Cyber Defence].
[19] NATO, Chicago Summit Declaration para. 49 (May 20, 2012), http://www.nato.int/cps/en/natolive/official-_texts_87593.htm?mode= pressrelease.
[20] NATO and Cyber Defence, supra note 10.
[21] NATO Cooperative Cyber Defence Centre of Excellence, https://www.ccdcoe.org (last visited Sept. 8, 2013).
[22] NATO, Defence Ministers Make Progress on Cyber Protection, http://www.nato.int/cps/en/natolive/news-_101143.htm (last updated Jun. 4, 2013).
[23] NATO, Exercising Together Against Cyber Attacks, http://www.nato.int/ cps/en/natolive/75747.htm (last updated Oct. 9, 2012).
[24] NATO, The NATO Defence Planning Process, http://www.nato.int/ cps/en/SID-F7C21EDE-DEEA4EA7/natolive/topics_49202.htm (last updated May 18, 2012).
[25] NATO Policy on Cyber Defence, supra note 18, at 1.
[26] This section is based on Alex Vandurme’s Symposium presentation on “NATO Cyber Defence: An Operational Perspective.”
[27] This part is based on David P. Fidler’s Symposium presentation on “NATO, Cybersecurity, and International Law.”
[28] NATO Strategic Concept, supra note 16, at 6, 7.
[29] NATO COOP. CYBER DEF. CTR. OF EXCELLENCE, Focus Areas, https://www.ccdcoe.org/37.html (last visited Sept. 19, 2013).
[30] Applying laws developed before the emergence of cyber threats to such threats is also sometimes called applying “law by analogy.” See, e.g., Duncan B. Hollis, Why States Need an International Law for Information Operations, 11 LEWIS & CLARK L. REV, 1023, 1029 (2007) (questioning the “law-by-analogy approach to government cyberoperations”).
[31] Convention on Cybercrime, Nov. 23, 2001, ETS No. 185, 2296 U.N.T.S. 167.
[32] WARFARE (Michael N. Schmitt ed., Cambridge University Press 2013) [hereinafter TALLINN MANUAL].
[33] See, e.g., WHITE HOUSE, DEF. SECURITY SERVICE, ADMINISTRATION STRATEGY ON MITIGATING THE THEFT OF U.S. TRADE SECRETS 1 (2013).
[34] Convention on Cybercrime (June 13, 2013), C.E.T.S. 185, http://conventions.coe.int/Treaty/en/Treaties/Html/185.htm.
[35] TALLINN MANUAL, supra note 32, at 1.
[36] See WHITE HOUSE, supra note 33.
[37]NATO, NATO and the Fight Against Terrorism, http://www.nato.int/cps/en/ SID-8E7AA87D-4AEBB4C6/natolive/76706.htm (last updated Oct. 12, 2012).
[38] For ratification status of these instruments, see United Nations Treaty Collection, Text and Status of the United Nations Conventions on Terrorism, http://treaties.un.org/Pages/DB.aspx?path=DB/studies/page2_en.xml.
[39] See, e.g., President Barack Obama, Remarks by the President at the National Defense University (May 23, 2013), http://www.whitehouse.gov/the-press-office/2013/05/23/remarks-president-national-defense-university.
[40] See, e.g., Clapper v. Amnesty Int’l U.S., 133 S. Ct. 1138, 185 L. Ed. 2d. 264 (2013) (Supreme Court decision rejecting on standing grounds a challenge by Amnesty International and others against the constitutionality of the Foreign Intelligence Surveillance Act Amendments Act).
[41] See, e.g., Michelle Richardson, CISPA: A Legislative Threat to Privacy and Civilian Control of the Internet, AMERICAN CIVIL LIBERTIES UNION (Apr. 4, 2013), http://www.aclu.org/blog/national-security-technology-and-liberty/cispa-explainer-1-what-information-can-be-shared (critical privacy analysis of a legislative proposal in Congress that seeks to increase information sharing).
[42] Michael S. Schmidt & Nicole Perlroth, Obama Order Gives Firms Cyberthreat Information, N. Y. TIMES, Feb. 12, 2013, at A16 (reporting on the issuance by President Obama on an executive order on improving cybersecurity for critical infrastructure as an alternative to Congress’ failure to pass legislation addressing this issue).
[43] In addition to Fidler’s Symposium presentation, this section draws on Pregent’s presentation on “Cyber Operations and Collective Self-Defense.”
[44] For proposals for how NATO could address offensive cyber operations, see Healey & Bochoven, supra note 8, at 8 (recommending that NATO should consider coordination of NATO members’ offensive cyber operations and “creating a group modeled on NATO’s existing Nuclear Planning Group, to consider offensive cyber policy”).
[45] NATO’s standing rules of engagement (ROE) might theoretically provide a basis for NATO offensive cyber operations under the ROE for information operations, but reliance on such ROE for offensive cyber operations is very unlikely given existing NATO sensitivities about offensive cyber issues. On NATO ROE generally, see NATO, NATO LEGAL DESKBOOK 254–62. (2d. ed., 2010).
[46] NATO’s reluctance to address offensive cyber operations does not mean that the law of armed conflict prohibits such operations generally or in specific contexts where such operations might be militarily advantageous or ethically preferable.
[47] Michael Birnbaum, Merkel, Other European Leaders Raise Concerns on U.S. Surveillance, WASH. POST (June 10, 2013), http://www.washingtonpost.com/ world/merkel-other-european-leaders-raise-concerns-on-us-surveillance/2013/ 06/10/305eddda-d1da-11e2-a73e-826d299ff459_story.html.

Citation 2

65876451 adaskdjlkh lkhlkhasd

IJLRA N. Raj Kumar ; Kamble Shivadayal . "Design of Fault Tolerance Parallel FFT’s Using Xilinx 14.5v" Iconic Research And Engineering Journals Volume 5 Issue 8 2022 Page 1-6
IEEE N. Raj Kumar ; Kamble Shivadayal . "Design of Fault Tolerance Parallel FFT’s Using Xilinx 14.5v" Iconic Research And Engineering Journals, 5(8)
  • +91-7042148991
  • editor@ijlra.com

LAW JOURNAL

  • About Us
  • Verify certificate
  • Editorial Board
  • Contact Us

IMPORTANT LINKS

  • Call for paper
  • How to Publish Paper
  • Submit Paper
  • Track your Paper Status
  • Search Issue

ETHICS & POLICY

  • Duties Of Authors
  • Editors Responsibilities
  • Reviewrs Responsibilities

© 2022 International Journal For Legal Research and Analysis

Designed by 1Web Experts