Cyber Warfare

You are here

  • Share
  • Tweet
  • Email
  • Whatsapp
  • Linkedin
  • Print
  • Sonny asked: Is cyber warfare actually a war? How does it affect India's security?

    Reply: Refer to the IDSA Task Force Report titled, “India's Cyber Security Challenges”; and, the Edited Transcript of IDSA Cyber Security Report Release & Panel Discussion, including the Keynote Address by Amb. Shivshankar Menon, National Security Advisor, May 16, 2012, at

    Also, refer to the following:
    Arvind Gupta, “CBMs in Cyber Space: What should be India’s Approach?”, IDSA Web Comment, June 27, 2012.

    Cherian Samuel, “Emerging Trends in Cyber Security”, IDSA Web Comment, March 28, 2012.

    Amit Sharma, “Cyber Wars: A Paradigm Shift from Means to Ends”, Strategic Analysis, 34 (1), January 2010.

    Subimal Bhattacharjee, “The Strategic Dimensions of Cyber Security in the Indian Context”, Strategic Analysis, 33 (2), March 2009.

    Operational Lessons of the Wars of 21st Century

    Operational Lessons of the Wars of 21st Century

    Military capabilities matter. Countries and regions where wars have taken place have one important attribute- battle and operational experience. The monograph examines 21st century wars in Afghanistan, Iraq, Lebanon, Georgia and Libya. New trend of cyber war is also included. Key highlights have been extracted and distilled into lessons to be learnt.


    The Invisible War in West Asia

    The two recent malware attacks on energy companies in West Asia are particularly worrisome since they represent a rapid escalation in capabilities and intent on the part of the perpetrators.

    September 07, 2012

    India's Cyber Security Challenge

    India's Cyber Security Challenge
    • Publisher: Institute for Defence Studies and Analyses

    This report argues that Government and the private sector give cyber security some priority in their security and risk management plans, and do this jointly. Being a report that is addressed to the security community in the widest sense and intended to stimulate public discussion, it relies on publicly available information.

    • ISBN 81-86019-98-7,
    • Price: ₹. 125/-
    • E-copy available

    China’s new great firewall and publicity offensive

    After ensuring that its people are only able to access ‘filtered’ news, the Chinese leadership has also decided to refurbish its image abroad through a major public relations effort.

    December 19, 2011

    China’s Cyber Warfare Capability and India’s Concerns

    The Chinese cyber warfare department’s multiple agencies and individuals are seriously working towards the overall objective of instantly disrupting or at least weakening the adversary’s computer networks so as to paralyse his decision making capability at the very commencement of hostilities. It is very difficult to protect networks from such attacks. The weakest link in cyber security measures are the persons operating the system who often, knowingly or unknowingly, default on cyber security measures.

    April 2011

    Integrated Network Electronic Warfare: China's New Concept of Information Warfare

    The People's Liberation Army (PLA) considers active offence to be the most important requirement for information warfare to destroy or disrupt an adversary's capability to receive and process data. Launched mainly by remote combat and covert methods, the PLA could employ information warfare pre-emptively to gain the initiative in a crisis.

    April 2010

    Pentagon Report on China: Assessment or Exaggeration?

    Even though the report is fairly cautious in what it says and does not highlight anything new, the reactions on the Chinese side have not been that positive.

    August 26, 2010

    Jai Singh Shekhawat asked: In view of the Chinese cyber war doctrine do we need a dedicated cyber command/institution under MOD. Its organistaion and likely charter?

    Cherian Samuel replies: Cyberspace as a theatre of war is still in its infancy, but one of its axioms is that offensive capabilities are easier to create than defensive capabilities. While many countries are developing offensive capabilities, accompanying strategies or doctrines are yet to make an appearance, with the exception of the Chinese who have developed a concept of “informationised war”. The absence of a doctrine inhibits the creation of an institutional structure as seen in the several false starts on the part of the US military before the establishment of the US Cyber Command in May 2010. Its mission statement, to “direct the operations and defence of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries” suggests that its primary objective is to build up a defensive capability.

    A cyber command has many negative connotations, and India is not inclined to be a party to the militarization of cyberspace, preferring instead to work towards considering cyberspace on the lines of existing global commons such as sea and space. That the emphasis is on preserving the integrity of defence information networks is seen in the statement of the Defence Minister in the Lok Sabha on July 26, 2010. However, even such a limited mandate might be difficult to fulfill given the fact that there is already a profusion of agencies within the military dealing with this, ranging from the Corps of Signals, to the A-CERT (Army Computer Emergency Response Team), to the IT Departments of the various HQs and the IDS. Even though the Defence Minister referred to the Defence Information Assurance and Research Agency (DIARA) as being the “nodal agency mandated to deal with all cyber security related issues of Tri Services and Ministry of Defence,” the increasing magnitude of cyber threats necessitates both consideration and co-ordination of responses at a much higher level.

    Cyber Wars: A Paradigm Shift from Means to Ends

    The last couple of decades have seen a colossal change in terms of the influence that computers can have on the battlefield, with defence pundits claiming it to be the dawn of a new era in warfare. Under these circumstances, there has been a gradual paradigm shift in military thinking and strategies from the strategic aspect to the tactical aspect of cyber warfare, laying more emphasis on it being a potent force multiplier. The author believes this is wrong and rather than cyber warfare being an enhancement of traditional operations, the latter will be force multipliers of cyber warfare.

    March 2010