Cyber Tensions & Capabilities In Asia

As geopolitical tensions grow, governments across the Indo-Pacific region are racing to develop their cyber capabilities in order to ensure their future security and prosperity. Combined with ongoing Russian and North Korean cyber aggression and new artificial intelligence-powered threats, the cyber security landscape of the Indo-Pacific region appears increasingly ominous.

Comprising approximately 40 economies, the Indo-Pacific is set to represent over 50% of the world’s GDP by 2040, with China, Japan, India, South Korea and Australia’s combined GDP more than the whole of the European Union.

The Indo-Pacific region forms a chessboard for complex technological disputes. At stake is not just data security, but the depth of regional ties. Governments and businesses can only connect and cooperate to the extent they trust their counterparts' network security. 

Indo-Pacific Region

This vast and diverse region forms a chessboard for complex technological disputes over the production of semiconductors in Taiwan, US-China geopolitical clashes concerning the latter’s state-linked cyber operations, concerns around mixing of cyber security, press freedon and disinformation along withincreasing cyber threats from both state and non-state actors.

ASEAN and other cross-regional efforts have also sought to address some of these challenges by focusing on cyber capacity building, infrastructure building  and building shared resilience. However, cyberspace has become a reflection of tensions within the region.

Earlier this year, a published leak from a Chinese firm showed that the country had been conducting cyber espionage campaigns against multiple governments in the region. This included telecom service providers in Pakistan, Mongolia and Malaysia, as well as various parts of the Indian government. India, meanwhile, has sought to ramp up its own capabilities through the creation of a National Cyber Agency in 2018.  

At the same time, Pakistan has been developing its capabilities, with Pakistan-linked hackers attacking organisations in India. Elsewhere, Vietnam-linked hackers have attacked domestic human rights organisations in as well as in Laos and the Philippines.   

Five Eyes Intelligence

The Five Eyes intelligence sharing co-operative,  comprising Canada, the UK, the US, Australia and New Zealand,  have built wider security partnerships in the region, these include the trilateral AUKUS initiative and the QUAD with the addition of India, These groups focus on developing a range of capabilities and to share and increase inter-operability between national armed forces, including cyber capabilities, AI, quantum and other emerging technologies.

Countries in the region face numerous challenges and have in most cases committed to norms for responsible state behaviour at the UN (with the notable exception of Northh Korea). 

How they will manage to reconcile this commitment with the development of cyber capabilities such as the establishment of cyber commands, the use of offensive cyber capabilities, or being more active in responding to and preventing cyber operations.

For cyber capabilities to be effective instruments of diplomacy, states must also be transparent about their intentions. As with military power, developing cyber capabilities without some degree of transparency creates uncertainties, which breed distrust.

While no state is expected to be completely open about the systems that make up its cyber security capabilities, it remains important that states demonstrate their commitment to the UN global framework of responsible state behaviour in cyberspace by establishing clear doctrines, ensuring rigorous oversight  and fostering transparency through engagements with  international and domestic partners.

These elements not only enhance operational effectiveness but also contribute to the stability and security of the global cyber environment. As countries continue to evolve their cyber strategies, it is fundamental that they work to develop trust through confidence-building.

RUSI     |     UNAV     |     Atlantic Council     |     Nikkei Asia     |     Air University     |     US Dept of Defense

Image: photobank kiev

You Might Also Read: 

Japan’s New Cyber Security Strategy:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ukraine Has An AI-Generated Government Spokesperson
Microsoft Reforms ‘Weak’ Cyber Security Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

GovCERT.CZ

GovCERT.CZ

GovCERT.CZ is the Government Computer Emergency Response Team of the Czech Republic.

Microsoft Security

Microsoft Security

Microsoft Security helps protect people and data against cyberthreats to give you peace of mind. Safeguard your people, data, and infrastructure.

Critical Infrastructures for Information and Cybersecurity (ICIC)

Critical Infrastructures for Information and Cybersecurity (ICIC)

ICIC addresses the demand for cybersecurity for National Public Sector organizations and civil and private sector organizations in Argentina.

StrongKey

StrongKey

StrongKey (formerly StrongAuth) is a leader in Enterprise Key Management Infrastructure, bringing new levels of capability and data security at a price point significantly lower than other solutions.

Pathway Forensics

Pathway Forensics

Pathway Forensics is a leading provider of computer forensics, e-discovery services and digital investigations.

AllegisCyber Capital

AllegisCyber Capital

AllegisCyber is an investment company with a focus on seed and early stage investing in cybersecurity and its applications in emerging technology markets.

achelos

achelos

achelos is an independent software development company providing innovative technical solutions for micro-processor chips / security chips and embedded systems in security-critical application fields.

Metrarc

Metrarc

Metrarc has developed a ground-breaking technology called ICMetrics™ for deriving secure encryption keys from the properties of digital systems without the need to store any of the encryption keys.

GBT Technologies

GBT Technologies

GBT Technologies is a technology company focused on chip design and software to enable IoT, global mesh networks, and for applications relating to artificial intelligence.

Internet 2.0

Internet 2.0

Internet 2.0 is a Cyber Security technology company with a core focus on developing affordable but sophisticated cyber security solutions.

Axio Global

Axio Global

Axio is a leading cyber risk management SaaS company. Our Axio360 platform gives companies visibility to their cyber risk, and enables them to prioritize investments to protect their business.

Grant Thornton

Grant Thornton

Grant Thornton is one of the world’s leading networks of independent assurance, tax and advisory firms.

Cyber Tzar

Cyber Tzar

Cyber Tzar is a new approach at dealing with an old problem; assessing and managing risks to your IT estate.

Ibento Global

Ibento Global

Ibento organises the CyberX series of cybersecurity conferences.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.