Preamble
This is the information age and therefore like all lucrative assets
of the past ages, information assets must be an object of competition
and conflict – and in extreme cases, warfare. This conflict is being
played out in a new domain: the cyber-space. With increasing dependency
on the cyber domain for every aspect of human endeavours, it is obvious
that like all national assets, India’s cyber-space has to be secured
against all forms of espionage, subversion, sabotage and attack.
In this article, it is proposed to discuss the theology of cyber
security and the fundamental considerations that might lead to its
effective implementation in the Indian context.
Civil and Military Functions of Cyber Security
There are five domains in which the civil as well as military
functions of national security have to be performed, viz, land, sea,
air, space and cyber- space. In reference to the last named, it is a
common supposition that there is singular convergence of civil and
military functions. The misconception is reflected in the use of
undefined terminologies and loose semantics which lead to confusing
juxtaposition of concepts that govern the issue of cyber security.
Factually though, the said convergence is no more prominent than it is
in the context of civil-military interplay in all of the other domains
of inter-state competition and conflict. In order to make the best use
of our resources in achieving a fair degree of cyber security therefore,
it is important to promote clarity and consistency in ruling
definitions and concepts in the Indian context.
We understand that every nation nurtures its own set of specific
aspirations in consonance with a given set of geo-political, social and
natural assets. These aspirations go to define the path for national
prosperity which are then sought to be protected by the triumvirate of
national power, viz, socio-political, economic and military security.
The first two of these aspects of security are civil functions whereas
the third takes recourse to warfare to perform its role. The distinction
to note here is that the civil functions of socio-political and
economic security of a nation is bound by inter-state ideological
differences, geo-political adversities, competition for resources and
business rivalries - all aimed at extracting more and more
self-advantages. This is a continuous process. Military security, on the
other hand, is an extreme step that is performed as a last resort to
force the adversary to desist from his unbearable animosity either by
threatening to, or by actually inflicting physical punishment on him.
For the intervening periods of no-war, the purpose of the military
institution is to prepare for that extreme eventuality called ‘war’.
This distinction between the civil and military functions of national
security influences the domain of the cyber-space just as it does in
others domains of competition and conflict; it has universal
applicability.
Appreciation of the afore-stated distinction is more relevant in the
Indian context. This is so because in the Indian dispensation, military
power is not seen as a fulcrum of nationhood as it is in the case of
America or China and a host of other countries. Recognition of the
distinction would obviate emergence of discrepancies between the civil
and military functions that is caused by use of undefined phraseology
like ‘cyber security’, ‘cyber-attack’, ‘cyber warfare’ etc.; our cyber
policies must clearly convey as to what is intended to be accomplished.
Cyber Security and Cyber Warfare
In general, civil functions of national security involve fierce
inter-state machinations that are marred by economic usurpation,
industrial espionage, technology denial, geo-political ganging etc. –
all carried out under a façade of civility. These machinations, vicious
as these may be, are yet not described as ‘warfare’ simply because there
is no element of force-imposition here. In the civil domain therefore,
cyber-intrusions, disablers, corrupters, theft, sabotage etc., and the
counter-measures against these, may not be termed as cyber warfare.
Conversely, ‘cyber warfare’ is a military function and its prosecution
is but a military operation, to be conducted in the spirit of extreme
measures - just as it is in the case of conventional, sub-conventional
or nuclear warfare. Notably however, when it comes to cyber security
skills and resources, there is near-total commonality between the civil
and military domains. In view of these subtle-yet-salient distinctions,
formal apportionment between the civil functions of ‘cyber security’
from its military counterpart, ‘cyber warfare’, is obligatory to obviate
emergence of policy irrationalities.
Civil Functions of Cyber Security
Civil functions over the cyber-space have four denominators :-
- Public Services (health, education, civil-supplies, social security schemes, essential services),
- Financial Services (banking, subsidy funding),
- Industry (manufacturing, service sector, R&D, trade),
- Governance (policy, procedure, statistics, survey, records, administration).
The burden of cyber security is driven by inter-state political and
ideological differences, competition for resources including ‘knowledge’
itself, business rivalries and even terrorism. Accordingly, civil
functions of cyber security aim at securing the cyber-space in a manner
as to prevent inimical acts of the following kinds :-
- Sabotage of ‘National Information Infrastructure’ (NII) through intrusion into electro-magnetic spectrum,
- Inducing collapse, corruption or diversion of the nation’s Information Technology (IT) driven public service, administrative, economic, technical and industrial infrastructure.
- Psychological subversion of the society to manipulate public opinion.
Cyber-threat in civil domain may emanate from foreign or domestic
sources, both adversarial or friendly. These sources could be state
intelligence agencies, economic and technological competitors, foreign
military establishments as part of their war preparedness, and lastly,
rogue non-state elements perpetrating acts of cyber-terrorism. The
threats are characterised as follows:-
- Paralysis of cyber intensive systems at the national level to freeze the adversary’s ability to function unencumbered.
- The saboteur may not be easily identifiable. Even if identified, the perpetrator’s system architecture may be difficult to decipher, thus hampering effective counter-action.
- Once triggered, even the perpetrator will not be able to control the intended degree of paralysing effects upon the adversary, neither is it possible to contain the damage from affecting unintended parties. To that extent cyber-sabotage is like terrorism.
- It would be banal to expect a nation to submit to launch, or the threat of launch, of cyber-sabotage. Therefore, it is not a civil deterrence like economic sanction, technology denial etc.
- Dependence on global cyber-assets like the Internet, GPS, digital information, satellite images etc. has some advantages too. Due to its world-wide connectivity, cyber-sabotage on one party would also cause collateral damages to the cyber-assets of unintended public and private sectors at the global arena – and that imposes caution upon the saboteurs.
Notably, in the matter of cyber security, only a thin line separates
the passive and defensive measures with the active and offensive ones.
Therefore, there must be a strong pro-active as well as reactive element
of offensive built into the civil functions of cyber security. However,
in instituting these measures, the problems of role-overlap and mix-up
of organisations would arise. It would therefore be necessary to
formally define the civil functions of cyber security activities to
distinguish these from their more intense and destructive military
counterpart, and so obviate defocus and redundancy. This end could be
met through promulgation of a comprehensive ‘National Cyber Security
Protocol’ (NCSP), a part of which may remain confidential.
Cyber Security Mechanisms
Considering India’s policy orientations, protection of the
cyber-space from manipulations and intrusions from inimical parties
would mostly be sought to be achieved through passive measures;
execution of pro-active disabling actions seems to be rather farfetched
in our context. Accordingly, the civil functions of cyber security in
our context would involve the following mechanisms:-
- Warning and response to cyber-attacks,
- Retrieval of cyber-assets – primary, secondary and tertiary data, protocols and processes, and,
- Restoration of the compromised cyber driven systems – economic, industrial, technological, societal systems.
It will be noticed that first of the three mechanisms involves
adoption of pre-emptive and retaliatory counter-measures. The problem,
however, is that in the cyber domain, defensive actions come the cropper
unless coupled with pre-planned, debilitating cyber-intrusions.
Therefore, notwithstanding any reluctance over policy endorsement, the
mechanism must have an element of pro-active offensive to be able to
warn and respond to an impending cyber-attack. The other two mechanisms
are skill, process and resource intensive in nature. Obviously, all
three mechanisms have to be operative at full gear at all times.
For judicious and overarching control over these complex and
widespread mechanisms, India will have to go beyond just promulgating
rhetorical cyber security policies. Indeed, formal enunciation of an
elaborate NCSP would meet that end. Further, to implement and control
the NCSP, it would be sensible to construct an organisation, duly
empowered in terms of authority over policy direction, coordination,
legal scrutiny and enforcement across the public as well as private
sectors.
Cyber Warfare in the Military Domain
In the military domain, operations that are undertaken to gain
information superiority fall under the ambit of ‘Information Warfare’
(IW). Within that ambit, offensive and defensive ‘Information
Operations’ (IO) are waged by means of weaponised intervention,
electronic warfare etc., ‘cyber warfare’ being one such mean that is
prosecuted in the cyber-space. Cyber warfare therefore is truly a
‘military operations of war’, to be conducted as an element of offensive
and defensive IO, and waged in the same spirit of ultimate measures. It
is distinguished by predominance of offensive content and is to be
prosecuted through military-dedicated IT-based satellites, data
warehouses, maps, communication net-works, GPS, UAV, AWACs, PGM etc.
However, while civil functions are to be operational at all times, the
military function during peace-time is to prepare and test continuously,
letting go at war-time to disable the opponent’s military,
quasi-military and civil infrastructure. Herein lies the distinction
between the civil and military functions of cyber security. Conversely,
there are many commonalities between the two functions with respect to
the above discussed civil cyber security mechanisms as well as the
software skills, hardware and processes.
Objectives of Cyber Warfare
The purpose of cyber warfare is to degrade the adversary’s
surveillance, reconnaissance, command, control, communication and
intelligence systems through cyber-attacks on his operational nerve
centres. These are ‘disabling’ attacks which must be complemented with
‘disorienting’ attacks which are aimed at registration of false
information to the enemy and make him 'see' non-existent battle groups,
missiles, bridges, etc, thus inducing him into irrelevant committal of
his forces. The combined result is expected to lead to disruption and
dislocation of the enemy’s orchestration for war.
As an element of IO in defensive as well as offensive modes, cyber warfare would focus upon the following aspects: -
- Command and Control Warfare (C2W): The objective is to attack the adversary’s ability to generate and communicate commands to its forces and disable or corrupt his Defence Information Infrastructure (DII).
- Intelligence Based Warfare (IBW): It is the integration of sensors, processors and data-links to achieve efficient reconnaissance, surveillance, target acquisition, target engagement and finally, damage assessment.
- Electronic Warfare (EW): Communication as well as non-communication combat to achieve degradation, disorientation, interruption and corruption of the adversary’s electro-magnetic emissions is classified as EW. In other words, it implies domination of electro-magnetic spectrum.
- Psychological Warfare: This is aimed at targeting the adversary's mental orientation and perception, and thereby influence his intent.
- Hacker Warfare: This is defined as destruction, degradation or corruption of adversary’s computer data-base and automated decision support and executive processes.
- Infrastructural Warfare: Under the civil functions, this involves ‘information blockade’ and ‘information imperialism’ to derive political and economic advantage. Under warlike conditions, its extreme manifestation leads to attacks on the adversary’s primary infrastructure – railways, power plants, oil sector etc. for example.
The Regime of Cyber Security
Most advanced countries have instituted robust mechanisms to protect
their cyber domain. In this respect, USA enjoys overwhelming superiority
even if she takes care to keep her elaborate activities under wraps.
Besides passive measures, she secures her cyber-space by technology
driven barrage of highly complex cyber-intrusions and backs it up with
deliberate enticement of cyber-attacks from adversaries and friends
alike to break into their algorithm. To do so, civil and military
functions of cyber security are seamlessly enmeshed to produce the best
results, cyber- attacks like ‘Gauss’, ‘Stuxnet’, ‘Duqu’, ‘Flame’ etc.
being a few known ones. China, on the other hand, depends upon her
innovative mass of cyber operatives, reportedly two million strong, to
support her cyber security regime, much of which is committed on
internal surveillance and the rest being devoted to intrusive hacking.
The score for the European nations stands even despite many reported
hacking attacks from China and Russia, not to speak of their all-weather
ally, the US. In any case, not being at the centre-stage of global
circus, the European stakes are mainly limited to economic cyber-assets.
India is a novice in comparison, even if there have been some
tentative attempts made to venture into the realm of cyber security.
These attempts are however, more or less confined just to work-station
access-denials, blocks against hacking and back-up storage. Whereas the
private sector has taken few baby-steps to maintain a facade of security
of its IT-based assets, the state, nonplussed as it seems to be in the
matter, is not motivated enough to proceed beyond promulgating a
policy-outline that cries out for more serious substance. Of course,
certain laudable efforts have been made in the Government’s intelligence
set up and the ‘Department of Electronics and Information Technology’,
but these are individual rather than institutional initiatives, and
therefore confined just to specific bands of the threat-spectrum.
A Structure for Cyber Security
Having discussed the functions of civil cyber security and military
cyber warfare and the differences as well as commonalities between the
two, it becomes apparent that: One, there would have to be a substantial
degree of congruence of resources and efforts in protecting the Indian
cyber-space; and Two, when it comes to prosecution of cyber warfare, it
would have to be a purely military venture. Thus appears the necessity
for an apex body to coordinate these primary and secondary functions at
the national level. Accordingly, we may conclude the discussion with a
brief look at some of the measures that might afford the desired level
of protection to the indigenous cyber-space. These measures could be:-
- Establishment of a ‘National Cyber Regulatory, Control and Security Authority’ (NCRCSA), to coordinate between the civil NCSP and the military ‘Cyber Warfare’. Incorporation of a ‘Cyber Research Department’ would also be necessary.
- Regulation, coordination and strengthening of the civilian cyber activities of the ‘National Information Centre’, ‘National Crisis Management Centre’, ‘National Cyber Response Centre’, ‘National Information Infrastructure Protection Centre’, ‘Computer Emergency Response Teams’, NDMA, NTRO, Department of IT, DOT, MHA, MoD and the private sector under the aegis of the proposed NCRCSA. The responsibility and wherewithal for cyber security is too diffused at present to be able to prevent cyber-attack, and respond to it quickly and effectively.
- ‘Cyber Command’ may be formed to plan and prepare prosecution of Cyber Warfare across the service barriers, and in coordination with the national level authority. A ‘Cyber Warfare Research Establishment’ must form part of this Command. NCSP and Cyber Warfare must be permanent and continuously performing commitments, with permanent set ups and flexible recruitment and training rules, and as stated, function under the overarching management of the proposed NCRCSA.
Conclusion
The stage when creation of cyber-assets becomes contingent upon its
robust protection has arrived in India. It is time therefore to accord
high priority to cyber security even if it means some compromise with
proliferation of the nation’s cyber domain. The foremost consideration
in seeking that end is that if our cyber security has to remain
inviolable, the security measures have to be tailored to Indian
conditions and devised by native genius. This consideration further
reinforces the cause of formal apportionment of roles and
responsibilities between the civil and military functions of cyber
security.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.