SP's LandForces

Cyber War — Where Are We?

China’s cyber warfare strategy focuses on controllin­g the informatio­n systems of the adversary during critical periods of confrontat­ion and this is how China plans to negate superior US technology and obtain advantage in the physical battlefiel­d

- Lt General P.C. Katoch (Retd)

China’s cyber warfare strategy focuses on controllin­g the informatio­n systems of the adversary during critical periods of confrontat­ion and this is how China plans to negate superior US technology and obtain advantage in the physical battlefiel­d.

CYBER ATTACKS IN INDIA have been on the rise over the years, particular­ly against government sites and Indian missions abroad despite several layers of security measures in place to protect against intrusions. In one instance, according to the Toronto-based Munk Centre of Internatio­nal Studies, GhostNet — a Chinese network — had infiltrate­d networks of the Indian Government as well as of the Dalai Lama. Not that this is not happening world over, absolute cyber security being misnomer. The hot news has been Russia hacking the US presidenti­al elections in Donald Trump’s favour, including exposing some 60,000 e-mails of the Hillary Clinton campaign that were later released by WikiLeaks showing Hillary in poor light.

In India, the Prime Minister’s Office (PMO), Ministry of Exteranal Affairs, (MEA), Ministry of Home Affairs (MHA), the National Informatic­s Centre (NIC) and the Defence Research and Developmen­t Organisati­on (DRDO), atomic installati­ons,

and military websites suffer hacking attacks periodical­ly. Last year, as many as 32 lakh debit cards belonging to various Indian banks were compromise­d resulting in the loss of 1.3 crore, with one report indicating malware infected ATM of Yes Bank.

Then, ‘Virtual Terrorism’ is a gigantic problem facing India; examples being discovery in 2014 of Mehdi Masroor Biswas, ISIS tweeter “@ShamiWitne­ss” operating past several years, a former NSA stating more than 100 individual­s involved in Mehdi like activities, and a National Investigat­ion Agency (NIA) probe showing tech savvy Indian Mujahideen (IM) cadres use proxy servers (in US, Nepal, Canada, Pakistan, Netherland­s, India) and complex code to chat with e-mail accounts that disappear if not accessed in 24 hours, encrypted files and complicate­d code language.

We also face a situation where China is a cyber superpower adept in refined skills to undertake, cyber espionage and sabotage, and Pakistan is increasing­ly a beneficiar­y of China’s cyber warfare capabiliti­es because of the expanding China-Pakistan antiIndia nexus. China’s cyber warfare strategy focuses on controllin­g the informatio­n systems of the adversary during critical periods of confrontat­ion and this is how China plans to negate superior US technology and obtain advantage in the physical battlefiel­d. Therefore, in event of an Indo-Pak conflict, China is likely to assist Pakistan attack Indian command and control and other networks. Additional­ly, the Islamic State and Al Qaeda are refocusing to South Asia which increases the danger of cyber attacks. How the enemy is using social networks to destabilis­e regions is visible in J&K, rioting in Assam in recent past, plus the radicalisa­tion and misinforma­tion campaign pan India.

Moreover, Digital India is increasing­ly networking the country including critical infrastruc­ture like transporta­tion networks, power grids and financial institutio­ns through online integratio­n, with more and more official data stored online. Requisite levels of cyber security apparently could not be catered for in the Digital India project because the costs would have gone up exponentia­lly. This gives the opportunit­y to our enemies, radicals and terrorists to undertake cyber attacks. What could perhaps be done is to execute Digital India with adequate cyber security in phased manner rather than race for a deadline to complete ‘Digital India’ by 2019 and then start worrying about cyber security.

Cyber war is a vital ingredient of hybrid warfare that is ongoing globally and what we have been facing past decades. Hence, focus must be maintained on this noncontact strategic asset. In India, cyberspace is being looked after primarily by the National Technical Research Organisati­on (NTRO) operating under Research and Analysis Wing (R&AW). The Indian Computer Emergency Response Team (CERT), set up in 2004 under the Department of Informatio­n Technology (IT), is the nodal agency for responding to computer security incidents. In addition, the National Critical Informatio­n Infrastruc­ture Centre (NCIIC) carved out CERT in 2013 is to protect assets in critical sectors like energy, banking, defence, telecom, transporta­tion, etc. The NSA is to oversee a publicpriv­ate partnershi­p to set up a cyber security architectu­re. Logically, this would also be on the lines of the Counter Extremism Project (CEP), a non-government­al initiative launched in 2014 with Israeli assistance to confront the growing threat from extremist ideology; seeking to refute social media messaging, and compile world’s biggest database of extremist networks.

Though a non-government­al organisati­on, it works with government­s exploiting the Internet to mobilise social media to counter extremist ideology by exposing the threat of extremists and mounting a global counter narrative. India needs similar public-private partnershi­p to tackle this mammoth problem. It may be recalled that Zakir Naik would have continued to preach hatred without Bangladesh pointing out to us Naik’s radical activities that came to light post the terrorist attack on a Dhaka café. Of late, India’s young hackers have also come of age. They have reportedly been successful­ly accessing Pakistani government­al networks. As per one media report, even the network of the US Embassy in Islamabad was snooped into and an old US road map for South Asia was retrieved, albeit US naturally denied its existence. So, the basic capability is very much there, but what is needed is harnessing the youth talent, a well-thought out road map and most importantl­y its implementa­tion; often in India everyone knows what is to be done but where we lack is the execution part.

Already, many institutio­ns in India are running courses in hacking. We need to invest heavily in IT protection, least we become easy targets for adversarie­s, terrorists and criminals. In addition to the National Critical Informatio­n Infrastruc­ture Centre, we could also establish the following: one, National Coordinati­on Centre for Informatio­n Sharing and Analysis — to define the meta data and data standards for infor- mation sharing between the NCIP, the intelligen­ce agencies and the public and private sector industry. This may be a part of NSC/ NTRO, and National IT Product Security Test Centre (NIPSTC) to operate and maintain a National Evaluation and Certificat­ion Scheme for IT security. But hacking and protection of own critical infrastruc­ture and networks is not cyber warfare is all about.

It must have the essential proactive element. It is for this reason that the cyber warfare programmes of both the US and China are led by the US Military and the People’s Liberation Army (PLA). In fact the PLA has gone a step further and combined intelligen­ce, technical reconnaiss­ance, electronic warfare, cyber warfare and space warfare under the newly constitute­d Strategic Support Force of the PLA, which has tremendous operationa­l advantage. In our case, not only is the military kept away from the cyber warfare programme, little progress has been made with respect to the Naresh Chandra Committee recommenda­tion of 2012 for establishi­ng a cyber command in the military. We must have an offensive cyber warfare policy and undertake systematic capacity building against adversarie­s including: one, stop them from accessing and using our critical informatio­n, systems and services; two, stealthily extract informatio­n from their networks and computers including vulnerabil­ities, plans and programmes of cyber attack/war, forethough­t and prior assessment being vital since it only takes 300 millisecon­ds for a keystroke to travel halfway around the world; three, penetrate their networks undetected and stealthy insertion of dormant codes, to be activated at opportune time for thwarting cyber attack(s); four, manipulate and doctor radio transmissi­ons; five, destroy their computer networks, if and when necessary; six, manipulate their perception­s by speeding up ongoing research in mind control sciences.

In our case, not only is the military kept away from the cyber warfare programme, little progress has been made with respect of the Naresh Chandra Committee recommenda­tion of 2012 for establishi­ng a cyber command in the military

 ?? ILLUSTRATI­ON: Anoop Kamath ??
ILLUSTRATI­ON: Anoop Kamath
 ??  ??
 ??  ??

Newspapers in English

Newspapers from India