Cyber Tensions & Capabilities In Asia

As geopolitical tensions grow, governments across the Indo-Pacific region are racing to develop their cyber capabilities in order to ensure their future security and prosperity. Combined with ongoing Russian and North Korean cyber aggression and new artificial intelligence-powered threats, the cyber security landscape of the Indo-Pacific region appears increasingly ominous.

Comprising approximately 40 economies, the Indo-Pacific is set to represent over 50% of the world’s GDP by 2040, with China, Japan, India, South Korea and Australia’s combined GDP more than the whole of the European Union.

The Indo-Pacific region forms a chessboard for complex technological disputes. At stake is not just data security, but the depth of regional ties. Governments and businesses can only connect and cooperate to the extent they trust their counterparts' network security. 

Indo-Pacific Region

This vast and diverse region forms a chessboard for complex technological disputes over the production of semiconductors in Taiwan, US-China geopolitical clashes concerning the latter’s state-linked cyber operations, concerns around mixing of cyber security, press freedon and disinformation along withincreasing cyber threats from both state and non-state actors.

ASEAN and other cross-regional efforts have also sought to address some of these challenges by focusing on cyber capacity building, infrastructure building  and building shared resilience. However, cyberspace has become a reflection of tensions within the region.

Earlier this year, a published leak from a Chinese firm showed that the country had been conducting cyber espionage campaigns against multiple governments in the region. This included telecom service providers in Pakistan, Mongolia and Malaysia, as well as various parts of the Indian government. India, meanwhile, has sought to ramp up its own capabilities through the creation of a National Cyber Agency in 2018.  

At the same time, Pakistan has been developing its capabilities, with Pakistan-linked hackers attacking organisations in India. Elsewhere, Vietnam-linked hackers have attacked domestic human rights organisations in as well as in Laos and the Philippines.   

Five Eyes Intelligence

The Five Eyes intelligence sharing co-operative,  comprising Canada, the UK, the US, Australia and New Zealand,  have built wider security partnerships in the region, these include the trilateral AUKUS initiative and the QUAD with the addition of India, These groups focus on developing a range of capabilities and to share and increase inter-operability between national armed forces, including cyber capabilities, AI, quantum and other emerging technologies.

Countries in the region face numerous challenges and have in most cases committed to norms for responsible state behaviour at the UN (with the notable exception of Northh Korea). 

How they will manage to reconcile this commitment with the development of cyber capabilities such as the establishment of cyber commands, the use of offensive cyber capabilities, or being more active in responding to and preventing cyber operations.

For cyber capabilities to be effective instruments of diplomacy, states must also be transparent about their intentions. As with military power, developing cyber capabilities without some degree of transparency creates uncertainties, which breed distrust.

While no state is expected to be completely open about the systems that make up its cyber security capabilities, it remains important that states demonstrate their commitment to the UN global framework of responsible state behaviour in cyberspace by establishing clear doctrines, ensuring rigorous oversight  and fostering transparency through engagements with  international and domestic partners.

These elements not only enhance operational effectiveness but also contribute to the stability and security of the global cyber environment. As countries continue to evolve their cyber strategies, it is fundamental that they work to develop trust through confidence-building.

RUSI     |     UNAV     |     Atlantic Council     |     Nikkei Asia     |     Air University     |     US Dept of Defense

Image: photobank kiev

You Might Also Read: 

Japan’s New Cyber Security Strategy:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ukraine Has An AI-Generated Government Spokesperson
Microsoft Reforms ‘Weak’ Cyber Security Strategy »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Boxcryptor

Boxcryptor

Boxcryptor encrypts your sensitive files before uploading them to cloud storage services.

Center for Identity - University of Texas at Austin

Center for Identity - University of Texas at Austin

The mission of the Center is to deliver the highest-quality discoveries, applications, education, and outreach for excellence in identity management, privacy, and security.

SIGA

SIGA

SIGA provides cyber security solutions for Industrial Control Systems SCADA systems used in critical infrastructures and industrial processes.

SteelCloud

SteelCloud

SteelCloud has spent the last decade inventing technology to automate policy compliance, configuration control, and Cloud security.

Cyber Talents

Cyber Talents

CyberTalents is on a mission to close the gap of cyber security professionals shortage across the globe.

Zacco

Zacco

Zacco offer a 360° perspective on intellectual property: From patent filing and trademark registration to software development, digital brand protection, cyber security and portfolio management.

AUTOCRYPT

AUTOCRYPT

AUTOCRYPT is a mobility security provider dedicated to the safety of future transportation

ProWriters

ProWriters

As a leading cyber insurance company, ProWriters offers flexible Cyber Liability Insurance coverage designed to cover privacy, data, and network exposures.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Dasera

Dasera

Dasera’s Radar and Interceptor products deliver visibility, governance, and protection solutions for data-agile companies.

Trustifi

Trustifi

Trustifi leads the market with the easiest to use and deploy email security products, providing both inbound and outbound email security from a single vendor.

AVANT Communications

AVANT Communications

AVANT is a premier distributor of next generation technologies with the resources and relationships needed to successfully navigate the ever-changing world of communications and IT infrastructure.

Eden Data

Eden Data

Eden Data is on a mission to break the outdated mold of traditional cybersecurity consulting. We handle all of your security, compliance & data privacy needs.

Mercury Systems

Mercury Systems

Mercury Systems is the leader in making trusted, secure mission-critical technologies profoundly more accessible to aerospace and defense.

Excite Cyber

Excite Cyber

Excite Technology Services (formerly Cipherpoint) is focused on improving the security posture of our customers.

Hiya

Hiya

Hiya's mission is to secure voice with trust, identity and intelligence. We're protecting people from spam and fraud calls, and helping carriers secure their networks for all.