Sei sulla pagina 1di 6

4/6/13

Rise of The Asian Cyber Armies | USNI News

MENU

SEARCH

Home Foreign Forces Rise of The Asian Cyber Armies

Rise of The Asian Cyber Armies


By: Adam Elkus Wednesday, August 8, 2012

States are increasingly standing up military and intelligence organizations for computer network operations. While countries everywhere perceive a need to attack and defend in cyberspace, cyber forces are of particular interest to security in Asia because they coincide with a regional investment in naval, air, and command, control and communications systems. And although American society may be vulnerable to disruption, highly technical and increasingly informatized Asian societies also face complex security challenges. For years, most understood Asian cyber issues through the prism of China. Since the early 1990s, the Chinese have evinced an intense doctrinal and practical interest in information warfare. The Chinese simultaneously desired to informatize their conventional forces in imitation of the United States while developing command and control warfare tools as part of a larger asymmetric warfare strategy.

news.usni.org/2012/08/08/rise-asian-cyber-armies

1/6

4/6/13

Rise of The Asian Cyber Armies | USNI News

India is centralizing network defense around the National Critical Infrastructure Protection Centre, with the Intelligence Bureau in charge of patrolling government networks. The Indian Defense Intelligence Agency may be vested with power to conduct offensive attack. While India has not developed a cyber strategy like the United States, it is taking cyber seriously. As in the United States, Indias cyber efforts are split between civilian cybersecurity and the offensive tools of the state. Symantec recently decried a lack of security knowledge.

South Korea is looking to promote its cyber commander to major general from the rank of brigadier general. The South established its cyber command to map out strategies and carry out both wartime and peacetime operations in January 2010. Seoul also set up a cyber protection policy team at the Defense Ministry in March 2011. South Korea is investing in cyber operations to counter a known threat. North Korea launched a distributed denial-of-service attack to paralyze the banking system of the National Agricultural Cooperative Federation for several weeks in April 2011 and has jammed traffic navigation signals in the South last month.

North Korean investment in cyber operations is put under the authority of the National Reconnaissance Bureau and the North is said to have 3,000 hackers on its payroll. While it may seem farfetched that a state as poorly developed, as the North could be a cyber power, Pyongyang has heavily invested in informatizing its military. Unlike China, which seeks to create information-warfare capabilities to augment its conventional forces, North Korea is looking to support its potent special operations forces and artillery combination. Cyber attacks, electronic warfare, and artillery all would support infiltration by special operations groups into the South to raise havoc.
news.usni.org/2012/08/08/rise-asian-cyber-armies 2/6

4/6/13

Rise of The Asian Cyber Armies | USNI News

These cyber advancements cannot be viewed in isolation from the general growth of information technology in Asia. As Michael Horowitz argues, the ongoing spread of commercial information technologies and advanced production practices are expanding the information capacities of many East Asian countries. These countries lead the world in several emerging technologies Japanese in robotics, the South Koreans and Taiwanese in substrate glass production for liquidcrystal displays and the Chinese and Taiwanese in semiconductors. Many East Asian states have deliberately nurtured leadership in key emerging technology markets through innovative publicprivate partnerships, and have amassed a substantial human capital base in information capabilities. In South Korea, for example, a recent World Bank report cited investments in research parks to create inter-industry synergies, government support for links between key industries and universities and government spending on research and development in nanotechnology, biotechnology and other areas that Seoul sees as vital to successful efforts to stay at the forefront of high technology industry. These capabilities are the technical basis of investment in dual-use technologies, not only for carrying out computer network attacks but also in creating precision weapons and command and control weapons for maneuvering in cyberspace. Cyberpower should be understood not just as the ability of execute computer network attacks, but also to utilize cyberspace to enable military operations in multiple domains. Cyberpower is critical to the general impact of the information-based revolution in military affairs in Asia. Integrated precision-strike networks command, control, computers and intelligence are crucial to the management of high-end air, naval, and missile systems. As Horowitz argues, there is a risk of an arms race in information-based weapons among Asian militaries. State-on-state warfare, however, will not be the sole outlet for Asian cyberpower. More efficient military battle management militaries are also critical for disaster relief and counterterrorism. Chinas Peoples Liberation Army (PLA), for example, has looked at how the United States utilized modular force structure, logistics, and precision weapons to enable operations in Afghanistans mountainous expanse. While many of these capabilities carry over to conventional warfare, China also has internal security challenges in mountainous regions and has stepped up its general level of investment in internal security capabilities. Network-centric enabled maneuver by small units in Afghanistan thus caught the PLAs attention. Moreover, cyberpower can also enable states to project influence and engage in brinksmanship. North Korea has constantly provoked the South through various means of irregular force, and the development of cyber warfare capabilities will only create more ways to coercively posture. Not all cyberpower enables cyber war. There is also cyber conflict. China and the Philippines use of
news.usni.org/2012/08/08/rise-asian-cyber-armies 3/6

4/6/13

Rise of The Asian Cyber Armies | USNI News

civilian vessels and obsolescent military vehicles to contest the South China Sea points to the age-old utility of discrete force to struggle for position. While nationalistic hackers and cyber espionage are common in Asia, more direct and kinetic means of coercion may also come to the fore. Like the United States, Asian societies also face acute cybersecurity vulnerabilities. As a report recently noted, Asian countries are also tied into the growing trend of targetable cyber infrastructure. ATM networks, banking, and credit card networks all use the Internet, and the mobile revolution in Asia also renders consumers and organizations vulnerable to mobile malware. Control systems for critical functions increasingly tie into the Internet. The economic prosperity enjoyed by many Asian countries is also deeply tied to information technology. In India, data security problems threaten the outsourcing boom, e-payments and a $10 million government investment in e-governance technologies. China has suffered large-scale data breaches and struggles to exercise information control over its fractious and voluminous cadre of microbloggers. Japan has also been victimized by cyber-espionage on a massive scale. Asia will likely be central to 21st century cyberpower. Information age weaponry and battle management systems are key to military dominance, and offensive computer network attack will likely manifest itself in low intensity operations and high-end warfare.

Recommended For You

The Asymmetric Nature of Cyber Warfare China vs. Japan Dispute is No Gordian Knot Article Keywords: China, cyber, North Korea

Security Firm: PLA Unit Major Hacker AP: North Korea Cancels 60-year-old Nonaggression Pact

Categories: Foreign Forces, Military Personnel

About Adam Elkus


news.usni.org/2012/08/08/rise-asian-cyber-armies 4/6

4/6/13

Rise of The Asian Cyber Armies | USNI News

Adam Elkus is a PhD student at American University. He blogs at Abu Muquwama, CTOVision and Information Dissemination on strategy, technology and international politics.
View all posts by Adam Elkus

0 comments
Leave a message...

Best

Com m unity

Share

No one has commented yet.

ALSO ON USNI NEWS

What's this?

Opinion: Navy Should Avoid a Flight III Arleigh Burke


3 comments 12 days ago

Opinion: Historys Costliest Fleet Auxiliary


2 comments 11 days ago

beyonddefence Here's a different thought. Why not create a new design to accomodate the new radar and electronic systems using as

Spurlockda Not to be disrespectful to the good Captain however some of his points could not be further from reality. First and foremost,

MoH Recipient: New Unmanned Medal is Ludicrous


7 comments 23 days ago

Senate Wants a USS Ted Stevens


6 comments 22 days ago

David Dunn And they say immersive role playing games don't sink in. By the logic of awarding medals for drone pilots we should

CDR_Ret You know how it goes: all your good deeds can be wiped out by an "aw s_ _ _". Look somewhere else for a name.

C o m m e n t fe e d

Su b s cri b e vi a e m a i l

MENU

2012 U.S. NAVAL INSTITUTE | WWW.USNI.ORG


Pow ered by Unleashed T echnologies

news.usni.org/2012/08/08/rise-asian-cyber-armies

5/6

4/6/13

Rise of The Asian Cyber Armies | USNI News

news.usni.org/2012/08/08/rise-asian-cyber-armies

6/6

Potrebbero piacerti anche