Skip to main content

Cyber Security Command on cards in India


The National Security Advisory Board (NSAB) has recommended formation of a central cyber security command on the lines of the US Cyber Command (USCYBERCOM) set up last May to fight back the new generation attacks on the government’s computer systems and networks.

A policy paper of the board stresses need for such a command not only to prevent any leaks of the sensitive information but also to ensure the valued government data is not hacked or destroyed by anybody from outside or from within the system. The document gives an insight to a lot of work done by China for inflicting damage to the computer networks in other countries.

The latest such attack was made on the website of Central Bureau of Investigation (CBI), purportedly from Pakistan, destroying all the data on its website (cbi.nic.in) which is still not up even after 11 days of struggle by the National Informatic Centre engineers who maintain the government websites. Luckily, the intruders could not get into the CBI’s computer that stores the sensitive data, inaccessible easily from the Internet.


India does not have the risk of wiki type leaks as access to the classified and sensitive material is limited to a very limited number of top officials unlike even a corporal having access to the diplomatic cables of the US missions, the government sources say.

Moreover, they say the government organisations doing the sensitive works have been already ordered to prepare cyber crisis management plans.
Defence and nuclear installations had upgraded their measures and laid down standard operating procedures even before wiki-leaks started trickling early last July, when Iranian nuclear facilities in Natanz were reportedly hit by a computer worm Stunxnet. 

This work is touted as the first discovered worm that spies on and reprogrammes industrial systems. Russians described it as a working and fearsome prototype of a cyber-weapon that will lead to the creation of a new arms race in the world.


Only the other day Defence Minister A K Antony admitted in Parliament that India is already exposed to the possible cyber attacks and explained how the top army brass was working in unison to make cyber systems secure and non-porous to protect systems.


“The paradigms of security in the age of information technology are seldom constant. The evolving security matrix is complex and calls for co-operation and coordination of the highest level,” Antony said.
Earlier last month, he also told the army commanders that cyber attacks were “fast becoming the next generation of threats” and as such, no single service could work in isolation. “We need to make our cyber systems as secure and as non-porous as possible,” he said.

The assertion comes amid frequent attacks and the subsequent alerts sounded by the army authorities over China and Pakistan-based cyber spies peeking into India’s sensitive business, diplomatic and strategic records. 

The policy paper distributed by NSAB among the country’s strategic community stresses on simultaneous creation of a security centre that should monitor cyber operations and undertake active monitoring of cyber space. 

It also stresses need for funding to develop innovative technologies to protect the Indian networks and promote growth of critical skills in the arena.

The research paper, titled “Informationising Warfare” warns that “as China grows militarily and economically, its resultant strategies are all likely to expand, especially in the cyber warfare arena.” Perhaps the most crucial among the beyond rules criteria is manifested in the form of “asymmetric warfare” — for instance, cyber attacks directed against data networks.

“The primary idea is to strike in unexpected ways against vulnerable targets,” the paper says, stressing that India has to prepare for these strategies that do not fall in the terrain of the present defence structure of Indian Army, Indian Air Force and Indian Navy, the researcher underlined.

The research paper quotes two Chinese strategists explaining a “combination scenario” being tried by China in which it secretly musters large amounts of capital and launches a sneak attack on an adversary’s financial markets. 


Subsequently, it inflicts a computer virus and hacker attachment in the opponent’s computer systems and attacks his networks to disrupt and paralyse the networks of civilian electricity, traffic dispatch, financial transactions, telephone communications, and mass media, thereby causing social panic, street riots, and political crises for the adversary, the paper said.

The cyber warfare consists of two types: Cyber attacks and cyber protection. Cyber attacks include virus attacks and hacker attacks. Computer virus attacks refer to operational actions that use computer viruses to destroy or tamper information stored in computer systems in a manner that they do not work properly.


“In the military field, the core equipment of military information systems and cyberised weapons are all likely targets of computer virus attacks. Computer hacker attacks refer to those actions taken by hackers to intrude upon and destroy an opponent’s cyber systems,” the paper stressed.

It points out that Beijing is also pursuing a diverse and comprehensive portfolio of space warfare investments since the late 1980s. The status of these programmes runs from advanced concept development and testing, through product engineering evaluation, line-level manufacturing and acquisition from foreign sources, to integration as war-fighting capabilities into the Chinese armed forces.

“The evidence suggests that these programmes are protean: They lend themselves to steady evolution across the spectrum, from space denial to space dominance, if Beijing’s political goals change over time, though at present and for the foreseeable future, they are optimised for the space-denial mission,” the paper said.

Its stress is that the defence planning and implementation in future has to incorporate the virtual word to limit physical damage to the real one as China is increasingly integrating computer technology into modern military organisations to play the twin roles of being both a target and a weapon.

Cyber forces are most likely to be integrated by China into an overall battle strategy as part of a combined arms campaign. The aim is to increase the ‘fog of war’ for the enemy and to reduce it for one’s own forces—to  be achieved through direct military strikes designed to degrade the enemy’s information-processing and communications systems or by attacking the systems internally to achieve, not denial of service, but a denial of capability.



READ MORE

Comments

Popular posts from this blog

Pakistani JF-17 A Thunder OR A Blunder

Pakistan has witnessed new defense acquisitions in this decade than any other, and in the center of it all is the new fighter which was designed by China with partial funding from Pakistan. It is formally known as JF-17 Thunder. When the fighter was in development, Pakistani online communities were jumping with excitement comparing it with its arch rival India’s modern combatants Su-30MKI, Mig-29S & Mirage-2000H. There were claims of it featuring western Radars and long range missiles, & Chinese ordering some due to its superior capabilities. But the reality is far from it. China having spent significant amount of money into a fighter which it is never going to use, most probably forced Pakistan to accept its avionics to offset some its development costs. Chinese who are known for their self reliance first and quality next, are further downgrading JF-17s capabilities with their poorly copy-pirated avionics. Along with their dubious weapons, any chance of JF

Pakistani F-16s Shoot Down RAF Eurofighter Typhoons During Air Combat Exercises In Turkey

Pakistani pilots flying modernised versions of the 1970s-vintage F-16 Falcon fighter have beaten the RAF's brand-new Eurofighter Typhoon superfighters during air combat exercises in Turkey, according to a Pakistani officer. Analysis: The RAF Typhoon, formerly known as the Eurofighter, should nonetheless have been vastly superior in air-to-air combat whether BVR or close in within visual range (WVR). The cripplingly expensive, long-delayed Eurofighter was specifically designed to address the defects of its predecessor the Tornado F3 – famously almost useless in close-in, dogfighting-style air combat. The Typhoon was meant to see off such deadly in-close threats as Soviet "Fulcrums" and "Flankers" using short-range missiles fired using helmet-mounted sight systems: such planes were thought well able to beat not just Tornados but F-16s in close fighting, and this expectation was borne out after the Cold War when the Luftwaffe inherite

India Planned Attack On Pak Navy Mehran Base To Kill Chinese Engineers

The terrorist attack on Karachi's Mehran Naval Station on May 22 was conceived and launched by India with the primary objective of killing the Chinese engineers present there, a Pakistani newspaper has claimed, citing 'informed sources'. Four to six Taliban terrorists had entered PNS Mehran on May 22, destroying two maritime surveillance aircraft and killing ten military personnel during their 17-hour siege of the naval air base. "India is the only country in the region that feels troubled by the Pakistan Navy, which had awfully beaten the Indian Navy in Operation Dwarka of 1965. Since then, it has been an earnest desire of India to harm the Pakistan Navy but it was perhaps not possible on the battle front, hence it struck the PNS Mehran," The News quoted sources as saying.