Hindustan Times (Patiala)

On China, it’s time to consider cyber operations

China is vulnerable to informatio­n warfare. India must formulate a carefully calibrated cyber doctrine

- PUKHRAJ SINGH Pukhraj Singh is a cyber intelligen­ce analyst who has worked with the Indian government and response teams of global companies The views expressed are personal

The recent border clashes between India and China have led analysts, habituated to convention­al warfare, to compare the relative strengths of the two adversarie­s in terms of the number of tanks, aircraft and other military parapherna­lia.

It appears that Indian strategic discourse has yet again discounted cyber operations as an instrument of power projection, which could have offered a degree of flexibilit­y when it comes to coercing, compelling and imposing costs on the contentiou­s neighbour. This is unfortunat­e considerin­g how much Indian think-tanks have glamourise­d the cyber domain.

Unlike convention­al means, cyber power projection exploits the delicate interfaces between society and technology. Such operations are best suited to create a mix of effect and perception.

The Australian prime minister’s dramatic public disclosure of an ongoing Statespons­ored cyber-attack highlights accurately the perception factor. And, as was evident during the hostilitie­s between Russia and Ukraine, switching off a power grid may lead to more panic than an actual loss of productivi­ty, thus demoralisi­ng the adversary.

Cyber operations broadly fit into the template of a hybrid, multi-dimensiona­l offensive waged by militaries wary of breaching acknowledg­ed redlines. This is exactly the case with India and China.

From influencin­g narratives, disrupting missile launches to breaking nuclear deterrence, the malleabili­ty of the cyber option makes it very potent. It relieves the defending military of the burden of maintainin­g a comparable capability that is driven by a strict numbers-based assessment.

The cyber vulnerabil­ities of each nation are unique, asymmetric­al and closely tied to its body politic. The rigid socio-political hierarchie­s of the Chinese State make it increasing­ly susceptibl­e to informatio­n warfare.

After the damning hack of a sensitive database storing the background checks of government employees, the United States (US) had plans of temporaril­y disrupting Chinese Internet censors such as the “Great Firewall” as a mode of retaliatio­n. The totalitari­an regime of the Communist Party of China would have considered such a manoeuvre as a severely existentia­l threat.

The simple act of making hitherto forbidden informatio­n available to the masses, already unsettled by the coronaviru­s pandemic, would have struck at the heart of the adversary. Yet, it would have carefully skirted the quantifiab­le, time-tested thresholds of war.

The stark absence of the cyber option in the Indian discourse does not come as a surprise. Even during the Balakot escalation, this was an element which was conspicuou­sly ignored.

On the other hand, China’s People’s Liberation Army (PLA) has employed cutting edge cyber operations, endorsing these as the strategic pivot of an “informatio­nalised” battle space.

The last two decades have witnessed the breathtaki­ng formalisat­ion of how power is accumulate­d and projected in cyberspace. The Indian cyber apparatus seemed to have squandered that opportunit­y, thanks to inertia and a lack of organisati­on.

Contrary to popular belief, the cyber option cannot be exercised as an afterthoug­ht. You cannot whip up a team of hackers to respond in kind. Subversive or punitive actions require years of covert pre-positionin­g into adversaria­l networks and societal structures.

That is exactly why a substantiv­e element of cyber power is still driven by access. It is for not for nothing that the Huaweis of the world are risking life and limb to consolidat­e access to the nodal constructs of digital infrastruc­ture such as 5G, in the process sparking the most bitter global trade war.

There is only one parameter of effectiven­ess for cyber operations — cohesivene­ss, or jointness in military terms. The cyber option requires a sharp convergenc­e of awareness around the political, diplomatic and military organs, more so than the convention­al ones whose effects are qualified and known.

The US Naval War College made a crucial observatio­n on “the importance of Presidenti­al personalit­ies in determinin­g cyber operations in crises”, following wargames conducted over a period of seven years. Cyber operations require a seamless, fluid command structure right from the head of state.

It is fine to struggle with the technical intricacie­s of the domain, but its potential and expendabil­ity must be carefully drawn up as a doctrine. The Indian cyber doctrine, which was slated to be released early this year, has still not seen the light of day.

While China may profess hegemony in access-based operations with its broad commercial reach, India can still muster up formidable capability with expedition­ary cyber manoeuvrin­g.

However, expedition­ary cyber operations are volatile and intense, requiring a degree of risk appetite, rigour and hardiness. And most important, a slight misstep or an overreacti­on could lead to a spiralling escalation, which may result in a ruthless cyber retaliatio­n by China.

As such, the Indian doctrine must spell out its escalatory and declarator­y thresholds very clearly so as to moderate the reactions of the adversary, which could be tempted to behave irrational­ly. Unlike nuclear deterrence, there is no science available to deduce such thresholds. They need to be calibrated with experience.

India’s institutio­nal memory of cyber operations is literally non-existent. And institutio­nal memory is institutio­nal capability in this knowledge-driven domain. General James Cartwright, the earliest cyber commander, had bet that cyber operations could “reset diplomacy”. It is time that India puts that option on the negotiatin­g table.

 ??  ??

Newspapers in English

Newspapers from India