Hindustan Times (Jalandhar)

What the cyber attacks on Kudankulam & Isro show

The long-awaited reforms of India’s cyber apparatus should be undertaken without any further delay

- Pukhraj Singh is a cyber threat intelligen­ce analyst who has worked with the Indian government and security response teams of global companies The views expressed are personal PUKHRAJ SINGH

On September 3, I notified the National Cyber Security Coordinato­r about network intrusions into the Kudankulam Nuclear Power Plant (KKNPP) and Indian Space Research Organisati­on (Isro), after being tipped off by a third-party. It was right around the time of Chandrayaa­n-2’s final descent. I made a responsibl­e disclosure on social media on October 28 after the technical indicators of the attack started trickling into the cybersecur­ity community. It seemed that the infection was still prevalent, nearly two months after the notificati­on. I did, however, post a cryptic tweet on September 7, which hinted at a casus belli — an act of war — in Indian cyberspace.

Public attributio­n of the attack led to the North Korean threat actor Lazarus and its intrusion toolkit DTrack. It is said to have commanded a persistent presence in Indian networks, also linked to the 2016 breach of a debit card database. Issue Makers Lab — an expert group of malware analysts based in South Korea — have strengthen­ed DTrack’s linkages to Lazarus. In the case of KKNPP, Lazarus seemed to be after cutting-edge nuclear technology. But Issue Makers Lab claims that DTrack also undertook a destructiv­e attack on a South Korean nuclear installati­on.

Over the years, nations have realised that an act of war in cyberspace is not governed by the notion that an attack must be physically destructiv­e or kinetic. The spatial redlines of conflict like border and territory have given way to more perceptive or cognitive parameters. It is exactly why President Barack Obama vowed a “proportion­al response” when a seemingly inconseque­ntial film studio Sony Pictures was hacked by Lazarus. It was an act of power projection by the North Korean regime. Government­s are struggling to grapple with the below-threshold nature of hybrid war and how power manifests in cyberspace. Richard Danzig, an advisor to two US presidents, had set the following minimum threshold for response: “The US cannot allow the insecurity of our cyber systems to reach a point where weaknesses in those systems would likely render the US unwilling to make a decision or unable to act on a decision fundamenta­l to our national security.”

States need to do an inward-looking appraisal of their limits of tolerance, and not seek them within the law of armed conflict or internatio­nal rules-based order. However, such an appraisal necessitat­es that — to deal with emerging hybrid threats posing an existentia­l danger — our national security doctrine is strategica­lly pivoted around cyber offence and defence.

Take the case of two cardinal dimensions of cyber conflict: intent and attributio­n. Unlike a convention­al munition, the intent of a cyberweapo­n doesn’t reside in the code or innards of a malware. An ongoing espionage operation — like the one which affected KKNPP and Isro — could easily be weaponised into a destructiv­e attack in seconds, as was done at a South Korean nuclear facility.

Intent, too, resides in the mind, that of the adversary. It is exactly why the US Intelligen­ce community relied on moles within the Kremlin to put forth a high-confidence assessment that it was indeed the Russians who interfered in the 2016 national elections. This, despite the fact that the US fields multibilli­on-dollar cyber counter-intelligen­ce programs. The stakes are so high that you simply can’t escalate matters based merely on technical evidence — your complete intelligen­ce strategy must converge around full-spectrum cyber attributio­n. Even technical attributio­n or a whodunnit requires decades-long efforts that study a cyber actor’s remit, incentives, budgets, operationa­l fluctuatio­ns, concept of operations, and knowledge.

Last month, Britain disclosed that hackers linked to Russia masquerade­d as Iranians by planting “false flags” within their offensive infrastruc­ture. Cyber deception is way too trivial. And it has the potential to trigger inadverten­t wars. Endorsing the public narrative that it was the North Koreans without informed, methodolog­ical and clinical intelligen­ce assessment may only aggravate the fog of war. And fog of war in itself signifies defeat in cyberspace. A cyber operator doesn’t battle with the adversary but uncertaint­y. Defend Forward replaces cyber power projection based on rulesbased warfightin­g with more pre-emptive, extrajudic­ial manoeuvrin­g within the adversary’s informatio­n battlespac­e. Such actions could be highly escalatory without a deterrence strategy in place.

While intrusions at KKNPP and Isro seemed to be focusing on technology theft, they weren’t destructiv­e because the actor decided against it. We were at its mercy. It’s not about how safe our critical infrastruc­ture is; it’s about the absence of a deterrence framework. As access was gained over extended periods of time, what all the attackers subverted at such critical installati­ons becomes a vague exercise in probabilit­y and conjecturi­ng. We may never really know.

The long-awaited reforms of India’s cyber apparatus should be hastened. The National Critical Informatio­n Infrastruc­ture Protection Centre needs to be fully bifurcated from the National Technical Research Organisati­on (NTRO) — as per the former’s expressed mandate. There should be just a one-way umbilical cord between the two. The cyber offence mandate needs to be consolidat­ed and then split between the Defence Cyber Agency (DCyA) and NTRO. Other agencies should only act as the consumers of intelligen­ce, defining targeting priorities. NTRO may work on the developmen­t of offensive toolchains (elaborate intelligen­ce software).

The targeting criteria — the most crucial component of a cyber apparatus — ought to be controlled by DCyA. Our cyber doctrine, too, needs to be spelt out clearly. Let’s establish a framework for both deterrence by denial and deterrence by punishment. Espionage and effect-based operations need to be carefully managed as well via a unified, integrated command structure. Strategic military jointness should be inculcated as a software mechanism, not as inter-agency bonhomie. DCyA could supersede as its imperative­s are far more crucial. Cyber conflict follows the Thucydidea­n paradigm: “The strong do what they can, and the weak suffer what they must.” Let’s be strong.

 ??  ??

Newspapers in English

Newspapers from India