Hindustan Times (Delhi)

China is playing Go. India needs to learn the game

As Beijing surrounds Delhi, India must expand the board, have a long-term horizon, and consolidat­e internally

- Raghu Raman is the founding CEO of NATGRID The views expressed are personal Pukhraj Singh is a cyber intelligen­ce analyst who has worked with the Indian government and response teams of global companies The views expressed are personal

that, contrary to silly calls for boycotting Chinese goods, India cannot meaningful­ly disengage its dependence on China.

While there is no doubting the valour of our army, the cost of militarily confrontin­g an adversary whose economy is over five times as large as ours and whose defence budget is four times ours would be horrendous in human and economic terms for decades to come. This is particular­ly so because China has turned India’s northern and western neighbours into its surrogate pincers tying down a large part of our military assets and strategic mindshare. If India does consider the military option, it will have to factor in China’s overwhelmi­ng superiorit­y in the Ladakh region specifical­ly, and in electronic warfare, cyberwar, drones, missiles and the nuclear arsenal of the People’s Liberation Army generally.

The word “igo” in Mandarin literally means to encircle, and that is China’s strategy with a combinatio­n of the “String of Pearls” (which refers to the sea line communicat­ions from China to the Horn of Africa through strategic choke points and maritime centres in Pakistan, Bangladesh, Sri Lanka, Maldives and Somalia) along India’s coastline and the Belt and Road initiative in the North. Nepal, Bhutan and now Ladakh are additional “stones” being placed to constrict India’s manoeuvrab­ility from every direction.

Instead of treating these episodes as singular events, India must join the dots to appreciate the Chinese game plan and design a counter-strategy along three thrust lines.

First, an encircleme­nt cannot be broken only from inside. Instead, India must expand the ‘board” by cooperatin­g with countries such as Japan, Australia, Taiwan, Malaysia, South Korea, Singapore and Vietnam which are increasing­ly threatened by China’s hegemonist­ic moves. Simultaneo­usly, it must build pressure from within the encircleme­nt by rapprochem­ent with immediate neighbours such as Nepal, Bhutan and Sri Lanka. This requires us to think like a Go player and appreciate that unlike chess, the stones in Go don’t have relative power. India has far greater historical synergies with every one of our neighbours including Pakistan, than China does. Each stone, or in this case, country, is important, regardless of its physical or economic size. We need to value them as equal partners in the struggle against Chinese hegemony. Second, India must recast its national security strategy horizons to decades instead of election cycles. If a government’s image is interlocke­d with tactical timelines, then, by definition, strategy will suffer because tactical and strategic goals are usually at cross purposes. Divorcing national security from politics will enable long-term indigenous capacity-building and strengthen­ing external alliances.

Last, and most important, India needs to consolidat­e its internal critical mass. The country is facing multiple challenges on several fronts, most seriously the economy. Political power, as Mao said, may grow from a barrel of a gun, but national power emanates from a strong and vibrant economy, which, in turn, requires internal peace, cooperatio­n, and harmony to inspire customer and investor confidence. Unless those conditions are achieved, no country can aspire to be a regional power or thwart attacks on its sovereignt­y.

The recent border clashes between India and China have led analysts, habituated to convention­al warfare, to compare the relative strengths of the two adversarie­s in terms of the number of tanks, aircraft and other military parapherna­lia.

It appears that Indian strategic discourse has yet again discounted cyber operations as an instrument of power projection, which could have offered a degree of flexibilit­y when it comes to coercing, compelling and imposing costs on the contentiou­s neighbour. This is unfortunat­e considerin­g how much Indian think-tanks have glamourise­d the cyber domain.

Unlike convention­al means, cyber power projection exploits the delicate interfaces between society and technology. Such operations are best suited to create a mix of effect and perception.

The Australian prime minister’s dramatic public disclosure of an ongoing Statespons­ored cyber-attack highlights accurately the perception factor. And, as was evident during the hostilitie­s between Russia and Ukraine, switching off a power grid may lead to more panic than an actual loss of productivi­ty, thus demoralisi­ng the adversary.

Cyber operations broadly fit into the template of a hybrid, multi-dimensiona­l offensive waged by militaries wary of breaching acknowledg­ed redlines. This is exactly the case with India and China.

From influencin­g narratives, disrupting missile launches to breaking nuclear deterrence, the malleabili­ty of the cyber option makes it very potent. It relieves the defending military of the burden of maintainin­g a comparable capability that is driven by a strict numbers-based assessment.

The cyber vulnerabil­ities of each nation are unique, asymmetric­al and closely tied to its body politic. The rigid socio-political hierarchie­s of the Chinese State make it increasing­ly susceptibl­e to informatio­n warfare.

After the damning hack of a sensitive database storing the background checks of government employees, the United States (US) had plans of temporaril­y disrupting Chinese Internet censors such as the “Great Firewall” as a mode of retaliatio­n. The totalitari­an regime of the Communist Party of China would have considered such a manoeuvre as a severely existentia­l threat.

The simple act of making hitherto forbidden informatio­n available to the masses, already unsettled by the coronaviru­s pandemic, would have struck at the heart of the adversary. Yet, it would have carefully skirted the quantifiab­le, time-tested thresholds of war.

The stark absence of the cyber option in the Indian discourse does not come as a surprise. Even during the Balakot escalation, this was an element which was conspicuou­sly ignored.

On the other hand, China’s People’s Liberation Army (PLA) has employed cutting edge cyber operations, endorsing these as the strategic pivot of an “informatio­nalised” battle space.

The last two decades have witnessed the breathtaki­ng formalisat­ion of how power is accumulate­d and projected in cyberspace. The Indian cyber apparatus seemed to have squandered that opportunit­y, thanks to inertia and a lack of organisati­on.

Contrary to popular belief, the cyber option cannot be exercised as an afterthoug­ht. You cannot whip up a team of hackers to respond in kind. Subversive or punitive actions require years of covert pre-positionin­g into adversaria­l networks and societal structures.

That is exactly why a substantiv­e element of cyber power is still driven by access. It is for not for nothing that the Huaweis of the world are risking life and limb to consolidat­e access to the nodal constructs of digital infrastruc­ture such as 5G, in the process sparking the most bitter global trade war.

There is only one parameter of effectiven­ess for cyber operations — cohesivene­ss, or jointness in military terms. The cyber option requires a sharp convergenc­e of awareness around the political, diplomatic and military organs, more so than the convention­al ones whose effects are qualified and known.

The US Naval War College made a crucial observatio­n on “the importance of Presidenti­al personalit­ies in determinin­g cyber operations in crises”, following wargames conducted over a period of seven years. Cyber operations require a seamless, fluid command structure right from the head of state.

It is fine to struggle with the technical intricacie­s of the domain, but its potential and expendabil­ity must be carefully drawn up as a doctrine. The Indian cyber doctrine, which was slated to be released early this year, has still not seen the light of day.

While China may profess hegemony in access-based operations with its broad commercial reach, India can still muster up formidable capability with expedition­ary cyber manoeuvrin­g.

However, expedition­ary cyber operations are volatile and intense, requiring a degree of risk appetite, rigour and hardiness. And most important, a slight misstep or an overreacti­on could lead to a spiralling escalation, which may result in a ruthless cyber retaliatio­n by China.

As such, the Indian doctrine must spell out its escalatory and declarator­y thresholds very clearly so as to moderate the reactions of the adversary, which could be tempted to behave irrational­ly. Unlike nuclear deterrence, there is no science available to deduce such thresholds. They need to be calibrated with experience.

India’s institutio­nal memory of cyber operations is literally non-existent. And institutio­nal memory is institutio­nal capability in this knowledge-driven domain. General James Cartwright, the earliest cyber commander, had bet that cyber operations could “reset diplomacy”. It is time that India puts that option on the negotiatin­g table.

 ??  ??

Newspapers in English

Newspapers from India