Cyber Tensions & Capabilities In Asia

As geopolitical tensions grow, governments across the Indo-Pacific region are racing to develop their cyber capabilities in order to ensure their future security and prosperity. Combined with ongoing Russian and North Korean cyber aggression and new artificial intelligence-powered threats, the cyber security landscape of the Indo-Pacific region appears increasingly ominous.

Comprising approximately 40 economies, the Indo-Pacific is set to represent over 50% of the world’s GDP by 2040, with China, Japan, India, South Korea and Australia’s combined GDP more than the whole of the European Union.

The Indo-Pacific region forms a chessboard for complex technological disputes. At stake is not just data security, but the depth of regional ties. Governments and businesses can only connect and cooperate to the extent they trust their counterparts' network security. 

Indo-Pacific Region

This vast and diverse region forms a chessboard for complex technological disputes over the production of semiconductors in Taiwan, US-China geopolitical clashes concerning the latter’s state-linked cyber operations, concerns around mixing of cyber security, press freedon and disinformation along withincreasing cyber threats from both state and non-state actors.

ASEAN and other cross-regional efforts have also sought to address some of these challenges by focusing on cyber capacity building, infrastructure building  and building shared resilience. However, cyberspace has become a reflection of tensions within the region.

Earlier this year, a published leak from a Chinese firm showed that the country had been conducting cyber espionage campaigns against multiple governments in the region. This included telecom service providers in Pakistan, Mongolia and Malaysia, as well as various parts of the Indian government. India, meanwhile, has sought to ramp up its own capabilities through the creation of a National Cyber Agency in 2018.  

At the same time, Pakistan has been developing its capabilities, with Pakistan-linked hackers attacking organisations in India. Elsewhere, Vietnam-linked hackers have attacked domestic human rights organisations in as well as in Laos and the Philippines.   

Five Eyes Intelligence

The Five Eyes intelligence sharing co-operative,  comprising Canada, the UK, the US, Australia and New Zealand,  have built wider security partnerships in the region, these include the trilateral AUKUS initiative and the QUAD with the addition of India, These groups focus on developing a range of capabilities and to share and increase inter-operability between national armed forces, including cyber capabilities, AI, quantum and other emerging technologies.

Countries in the region face numerous challenges and have in most cases committed to norms for responsible state behaviour at the UN (with the notable exception of Northh Korea). 

How they will manage to reconcile this commitment with the development of cyber capabilities such as the establishment of cyber commands, the use of offensive cyber capabilities, or being more active in responding to and preventing cyber operations.

For cyber capabilities to be effective instruments of diplomacy, states must also be transparent about their intentions. As with military power, developing cyber capabilities without some degree of transparency creates uncertainties, which breed distrust.

While no state is expected to be completely open about the systems that make up its cyber security capabilities, it remains important that states demonstrate their commitment to the UN global framework of responsible state behaviour in cyberspace by establishing clear doctrines, ensuring rigorous oversight  and fostering transparency through engagements with  international and domestic partners.

These elements not only enhance operational effectiveness but also contribute to the stability and security of the global cyber environment. As countries continue to evolve their cyber strategies, it is fundamental that they work to develop trust through confidence-building.

RUSI     |     UNAV     |     Atlantic Council     |     Nikkei Asia     |     Air University     |     US Dept of Defense

Image: photobank kiev

You Might Also Read: 

Japan’s New Cyber Security Strategy:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

« Ukraine Has An AI-Generated Government Spokesperson
Microsoft Reforms ‘Weak’ Cyber Security Strategy »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Centre for International Governance Innovation (CIGI)

Centre for International Governance Innovation (CIGI)

CIGI research areas include Conflict Management & Security which encompass cyber security and cyber warfare.

Cysec Resource Co (CRC)

Cysec Resource Co (CRC)

We offer expertise in information and cyber security, sourcing individuals and teams who provide information security expertise to the public and private sector.

NextLabs

NextLabs

NextLabs provides data-centric security software to protect business-critical data and applications.

Backup112

Backup112

Backup112 has been delivering professional cloud backup services since 2004.

Protenus

Protenus

Protenus provide a solution to proactively monitor and protect patient privacy in the electronic health record (EHR).

ACM-CCAS

ACM-CCAS

ACM is a UKAS-accredited certification body helping businesses around the world perform to a higher standard. Our certifications include ISO 27001 and ISO 22301.

GuardSight

GuardSight

GuardSight is a provider of specialized cybersecurity services to safeguard businesses, government, and remote workers against sophisticated cyber threats.

WebSec B.V.

WebSec B.V.

WebSec is a Dutch Cybersecurity firm mainly focused on offensive security services such as pentesting, red teaming and security awareness and phishing campaigns.

Cyolo

Cyolo

Cyolo’s Secure Access Service Edge (SASE) platform securely connects onsite and remote users to authorized assets, in the organizational network, cloud or IoT environments and even offline networks.

IPKeys Technologies

IPKeys Technologies

IPKeys delivers innovative cybersecurity and technology solutions focused on helping the federal government reduce risk and protect the US from cyberattacks.

Institute for Pervasive Cybersecurity - Boise State University

Institute for Pervasive Cybersecurity - Boise State University

Boise State University’s Institute for Pervasive Cybersecurity is a leader of innovative cybersecurity research and advancement in Idaho and the region.

Intel Ignite

Intel Ignite

Intel Ignite is an internationally renowned acceleration program for early-stage deep tech startups.

KBE Information Security

KBE Information Security

KBE is a global consulting firm, with offices in Toronto and Milan, which specializes in the area of IT and information security with over 20 years of experience.

ConductorOne

ConductorOne

ConductorOne is building the identity security platform for the modern workforce.

Raito

Raito

Raito's unique solution integrates with the data development process and lets data teams monitor, manage, and automate data security across the data stack.

Zyxel Networks

Zyxel Networks

Zyxel Networks is a leading provider of secure, AI-powered networking solutions for small to medium businesses (SMBs) and the enterprise edge.