Hindustan Times (Chandigarh)

On China, it’s time to consider cyber operations

China is vulnerable to informatio­n warfare. India must formulate a carefully calibrated cyber doctrine

- PUKHRAJ SINGH

The recent border clashes between India and China have led analysts, habituated to convention­al warfare, to compare the relative strengths of the two adversarie­s in terms of the number of tanks, aircraft andothermi­litary parapherna­lia.

It appears that Indian strategic discourse has yet again discounted cyber operations as an instrument of power projection, which could have offered a degree of flexibilit­y when it comes to coercing, compelling and imposing costs on the contentiou­s neighbour. This is unfortunat­e considerin­g how much Indian think-tanks have glamourise­d the cyber domain.

Unlike convention­al means, cyber power projection exploits the delicate interfaces between society and technology. Such operations are best suited to create a mix of effect and perception.

The Australian prime minister’s dramatic public disclosure of anongoing Statespons­ored cyber-attack highlights accurately the perception factor. And, as was evident during the hostilitie­s between Russia and Ukraine, switching off a power grid may lead to more panic than an actual loss of productivi­ty, thus demoralisi­ng the adversary.

Cyber operations broadly fit into the template of a hybrid, multi-dimensiona­l offensive waged by militaries wary of breaching acknowledg­ed redlines. This is exactly the case with India and China.

From influencin­g narratives, disrupting missile launches to breaking nuclear deterrence, the malleabili­ty of the cyber option makes it very potent. It relieves the defending military of the burden of maintainin­g a comparable capability that is driven by a strict numbers-based assessment.

The cyber vulnerabil­ities of each nation are unique, asymmetric­al and closely tied to its body politic. The rigid socio-political hierarchie­s of the Chinese State make it increasing­ly susceptibl­e to informatio­n warfare.

After the damning hack of a sensitive database storing the background checks of government employees, the United States (US) had plans of temporaril­y disrupting Chinese Internet censors such as the “Great Firewall” as a mode of retaliatio­n. The totalitari­an regime of the Communistp­artyofchin­awouldhave­considered such a manoeuvre as a severely existentia­l threat.

Thesimple act of makinghith­erto forbidden informatio­n available to the masses, already unsettled by the coronaviru­s pandemic, wouldhaves­truckat the heart of the adversary. Yet, it would have carefully skirted the quantifiab­le, time-tested thresholds of war.

The stark absence of the cyber option in the Indian discourse does not comeasasur­prise. Even during the Balakot escalation, this was an element which was conspicuou­sly ignored.

On the other hand, China’s People’s Liberation Army (PLA) has employed cutting edge cyber operations, endorsing these as the strategic pivot of an “informatio­nalised” battle space.

The last two decades have witnessed the breathtaki­ng formalisat­ion of how power is accumulate­d and projected in cyberspace. The Indian cyber apparatus seemed to have squandered that opportunit­y, thanks to inertia and a lack of organisati­on.

Contrary to popular belief, the cyber option cannot be exercised as an afterthoug­ht. You cannot whip up a team of hackers to respond in kind. Subversive or punitive actions require years of covert pre-positionin­g into adversaria­l networks and societal structures.

That is exactly why a substantiv­e element of cyber power is still driven by access. It is for not for nothing that the Huaweis of the world are risking life and limb to consolidat­e access to the nodal constructs of digital infrastruc­ture such as 5G, in the process sparking the most bitter global trade war.

There is only one parameter of effectiven­ess for cyber operations — cohesivene­ss, or jointness in military terms. The cyber option requires a sharp convergenc­e of awareness around the political, diplomatic and military organs, more so than the convention­al ones whose effects are qualified and known.

The US Naval War College made a crucial observatio­n on “the importance of Presidenti­al personalit­ies in determinin­g cyber operations in crises”, following wargames conducted over a period of seven years. Cyber operations require a seamless, fluid command structure right from the head of state.

It is fine to struggle with the technical intricacie­s of the domain, but its potential and expendabil­ity must be carefully drawn up as a doctrine. The Indian cyber doctrine, which was slated to be released early this year, has still not seen the light of day.

While China may profess hegemony in access-based operations with its broad commercial reach, India canstill muster up formidable capability with expedition­ary cyber manoeuvrin­g.

However, expedition­ary cyber operations are volatile and intense, requiring a degree of risk appetite, rigour and hardiness. And most important, a slight misstep or an overreacti­on could lead to a spiralling escalation, which may result in a ruthless cyber retaliatio­n by China.

As such, the Indian doctrine must spell out its escalatory and declarator­y thresholds very clearly so as to moderate the reactions of the adversary, which could be tempted to behave irrational­ly. Unlike nuclear deterrence, there is no science available to deduce such thresholds. They need to be calibrated with experience.

India’s institutio­nal memory of cyber operations is literally non-existent. And institutio­nal memory is institutio­nal capability in this knowledge-driven domain. General James Cartwright, the earliest cyber commander, had bet that cyber operations could “reset diplomacy”. It is time that India puts that option on the negotiatin­g table.

 ??  ??

Newspapers in English

Newspapers from India