<?xml version="1.0" encoding="utf-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" article-type="research-article" dtd-version="1.3" xml:lang="EN">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Polit. Sci.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Political Science</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Polit. Sci.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">2673-3145</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpos.2026.1748496</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Original Research</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Cyber coercion in the indo-pacific: a comparative analysis of India&#x2019;s and Australia&#x2019;s responses</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname>B&#x0131;&#x00E7;akc&#x0131;</surname>
<given-names>Salih</given-names>
</name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3304906"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Data curation" vocab-term-identifier="https://credit.niso.org/contributor-roles/data-curation/">Data curation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Project administration" vocab-term-identifier="https://credit.niso.org/contributor-roles/project-administration/">Project administration</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name>
<surname>G&#x00FC;c&#x00FC;yener Evren</surname>
<given-names>Ayhan</given-names>
</name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x002A;</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3283594"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
</contrib>
<contrib contrib-type="author">
<name>
<surname>Maail</surname>
<given-names>Arthur Glenn</given-names>
</name>
<xref ref-type="aff" rid="aff3"><sup>3</sup></xref>
<uri xlink:href="https://loop.frontiersin.org/people/3372460"/>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &#x0026; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x0026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Formal analysis" vocab-term-identifier="https://credit.niso.org/contributor-roles/formal-analysis/">Formal analysis</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>Department of International Relations, Ni&#x015F;anta&#x015F;&#x0131; University</institution>, <city>&#x0130;stanbul</city>, <country country="tr">T&#x00FC;rkiye</country></aff>
<aff id="aff2"><label>2</label><institution>Ni&#x015F;anta&#x015F;&#x0131; University</institution>, <city>&#x0130;stanbul</city>, <country country="tr">T&#x00FC;rkiye</country></aff>
<aff id="aff3"><label>3</label><institution>The ASEAN Secretariat</institution>, <city>Jakarta</city>, <country country="id">Indonesia</country></aff>
<author-notes>
<corresp id="c001"><label>&#x002A;</label>Correspondence: Ayhan G&#x00FC;c&#x00FC;yener Evren, <email xlink:href="mailto:ayhangucuyener@hotmail.com">ayhangucuyener@hotmail.com</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-02-24">
<day>24</day>
<month>02</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>8</volume>
<elocation-id>1748496</elocation-id>
<history>
<date date-type="received">
<day>17</day>
<month>11</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>16</day>
<month>01</month>
<year>2026</year>
</date>
<date date-type="accepted">
<day>26</day>
<month>01</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x00A9; 2026 B&#x0131;&#x00E7;akc&#x0131;, G&#x00FC;c&#x00FC;yener Evren and Maail.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>B&#x0131;&#x00E7;akc&#x0131;, G&#x00FC;c&#x00FC;yener Evren and Maail</copyright-holder>
<license>
<ali:license_ref start_date="2026-02-24">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>Cyberattacks targeting critical infrastructures are becoming the new normal. In the Indo-Pacific context, the severity of cyber-attacks on critical infrastructure continue to rise. Although the concept of coercion is contested in the context of cybersecurity, cyberattacks targeting critical infrastructures may serve strategic policy objectives. States do not employ cyber tools uniformly. The evolution of Chinese cyber statecraft presents a significant case, as Beijing has increasingly utilized cyber tools for long-term access, capability testing, and shaping regional dynamics. Despite conceptually rich discussions on cyber coercion, comparatively little attention has been paid to the strategically diverse ways in which states respond to such coercion within the Indo-Pacific context. In this regard, this study delves into the emergence of cyber coercion as a pivotal instrument in the Indo-Pacific region and focuses on the role of China&#x2019;s state-backed cyber operations in targeting critical infrastructure in India and Australia. It employs process tracing, policy analysis, and incident data analysis to provide a comparative analysis of how both countries attempt to deter cyber coercion. The findings reveal that India&#x2019;s <italic>diversity-driven ambiguity</italic> and Australia&#x2019;s <italic>alliance-driven transparency</italic> in countering cyber coercion are not isolated choices but rather interwoven with their broader strategic orientations and institutional dynamics.</p>
</abstract>
<kwd-group>
<kwd>advanced persistent threats (APTs)</kwd>
<kwd>Australia</kwd>
<kwd>critical infrastructures</kwd>
<kwd>cyber coercion</kwd>
<kwd>India</kwd>
<kwd>indo-pacific</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was not received for this work and/or its publication.</funding-statement>
</funding-group>
<counts>
<fig-count count="3"/>
<table-count count="2"/>
<equation-count count="0"/>
<ref-count count="139"/>
<page-count count="16"/>
<word-count count="13914"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Politics of Technology</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="sec1">
<label>1</label>
<title>Introduction</title>
<p>The Indo-Pacific region has emerged as a critical arena for geopolitical maneuvering, where cyber capabilities are increasingly employed as instruments of strategic coercion, deeply interwoven with broader foreign policy objectives. As the region becomes more reliant on digital technologies, critical infrastructures have become a prime target for cyber operations with significant regional security implications. Critical infrastructures, including energy grids and telecommunications, are essential for the functioning of modern societies and economies. Given their strategic and economic significance, cyberattacks targeting critical infrastructures with national security paralyzing capabilities have been on the rise (<xref ref-type="bibr" rid="ref34">Borrett et al., 2024</xref>; <xref ref-type="bibr" rid="ref134">Vaidya, 2015</xref>). Disruptions to these systems and their cascading effects can have far-reaching consequences, impacting essential services, economic activity, public safety, and underscoring the states&#x2019; inability to safeguard their assets.</p>
<p>Employing cyber operations against critical infrastructures presents a distinctive strategy for influencing state behavior. Capitalizing on the inherent ambiguity and deniability in cyberspace enables the attainment of strategic objectives without escalating into direct conflict. As observed in the Colonial Pipeline incident and the Ukraine power blackout, when cyberattacks against critical infrastructure generate kinetic effects, such as the loss of availability, states and operators adopt a range of measures to enhance system resilience and respond to malicious actions, including inspections and the deployment of cyber diplomacy tools. Yet, the more pressing and coercive challenge today lies in the undetected and persistent presence of malicious actors within critical infrastructure networks, which may lay the groundwork for future operations (<xref ref-type="bibr" rid="ref51">DHS, 2025</xref>).</p>
<p>In the middle of the ongoing discussions regarding the effectiveness, methods, and timing for employing cyber tools for coercive purposes, scholars underscore the intricate interplay between contemporary critical infrastructure systems, the dependence on privately managed infrastructure, and digital vulnerabilities, which collectively present substantial avenues for coercion through cyber operations (<xref ref-type="bibr" rid="ref33">Borghard and Lonergan, 2017</xref>; <xref ref-type="bibr" rid="ref59">Gomez, 2018</xref>; <xref ref-type="bibr" rid="ref68">Hodgson, 2018</xref>, <xref ref-type="bibr" rid="ref69">2024</xref>; <xref ref-type="bibr" rid="ref82">Kostyuk and Zhukov, 2019</xref>; <xref ref-type="bibr" rid="ref90">Lonergan, 2025</xref>; <xref ref-type="bibr" rid="ref135">Valeriano et al., 2018</xref>). Drawing on this scholarship, this study defines cyber coercion as meticulously orchestrated operations that exploit vulnerabilities and influence state behavior without escalating to conventional conflict (<xref ref-type="bibr" rid="ref26">Baram, 2025</xref>; <xref ref-type="bibr" rid="ref35">Buchanan and Corera, 2025</xref>; <xref ref-type="bibr" rid="ref93">Manantan, 2020</xref>). Through attacks on critical infrastructures, cyber coercion is considered not merely a technical risk but a tactical foreign policy instrument employed by states to exert influence and attain geopolitical objectives. Such actions frequently operate in the ambiguous realm of international relations, where activities fall below the threshold of conventional warfare but constitute hostile acts intended to compel or dissuade specific behaviors.</p>
<p>Amid the escalating geopolitical rivalry, cyber competition in the Indo-Pacific has entered a new era in which regional actors are increasingly advancing their military cyber capabilities with minimal external oversight (<xref ref-type="bibr" rid="ref71">Hogeveen, 2023</xref>). Several states, including China, Russia, and North Korea, are known to sponsor Advanced Persistent Threat (APT) groups to execute cyber operations and target critical infrastructures (<xref ref-type="bibr" rid="ref101">Nachiappan, 2025</xref>). Although discussions on responsible state behavior in cyberspace and cyber norms have been advanced by international and regional organizations such as ASEAN, gaps in international cooperation remain a persistent challenge.</p>
<p>China&#x2019;s cyber operations have garnered particular concerns from neighboring nations and the global community. While numerous countries have accused China of engaging in espionage and intellectual property theft, disruptive attacks on critical infrastructures have increasingly become a primary concern. For instance, during the mid-2020 border clashes between China and India, Chinese actors targeted at least four Regional Load Dispatch Centers and two State Load Dispatch Centers (<xref ref-type="bibr" rid="ref32">Bommakanti, 2022</xref>). These centers oversee the electricity supply across India, indicating a deliberate intention to disrupt vital services and jeopardize India&#x2019;s economic stability. In 2024, APT40, an actor affiliated with China, repeatedly targeted Australian networks, conducting reconnaissance activities to identify potential points of compromise (<xref ref-type="bibr" rid="ref15">Australian Government, 2024c</xref>).</p>
<p>Cyber competition is intensifying in Indo-Pacific, as one in ten cyber incidents targeted essential services in Australia (<xref ref-type="bibr" rid="ref113">Reuters, 2024</xref>) and India became the second most targeted country in the world (<xref ref-type="bibr" rid="ref31">Bharadwaj, 2025</xref>). Nevertheless, the region&#x2019;s unique characteristics, such as the coexistence of democratic and authoritarian regimes, different levels of technological advancement, and various strategic orientations, create a complex environment for understanding the dynamics of cyber coercion. Furthermore, regional actors&#x2019; responses to coercive activities in cyberspace vary widely, notably with India and Australia illustrating particularly divergent approaches. However, while cyber coercion is widely discussed, comparative analysis for understanding different response paths to cyber coercion across states with different dynamics remains underdeveloped, particularly in the Indo-Pacific.</p>
<p>In other words, there is a notable lack of comparative scholarly research examining how cyberattacks on critical infrastructures are employed as strategic tools of coercion and how and why states adopt divergent policy and diplomatic strategies in response in Indo-Pacific. Notably, the rise of cyber coercion in the region presents complex implications for regional security and strategic stability, underscoring the need for a deeper understanding of the national dynamics shaping its use. Given the diversity in institutional structures, cybersecurity capabilities, and national interests, a comparative approach is essential to understanding the patterns of cyber coercion, deterrence, and response in the Indo-Pacific.</p>
<p>Against this backdrop, this study seeks to investigate how China employs cyber capabilities, particularly within the framework of its <italic>weishe (&#x5A01;&#x6151;)</italic>,<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref> doctrine and how the two main regional powers, India and Australia, diverge in their responses to such cyber coercion. To this end, the study addresses two central research questions: (1) How does China orchestrate its cyber statecraft by utilizing cyber coercion as a foreign policy instrument targeting critical infrastructure? (2) In what ways do India and Australia differ in their strategic responses to cyber coercion, and to what extent do underlying geopolitical alignments and institutional dynamics account for this variation?</p>
<p>The remainder of the paper is structured as follows: The research design and contemporary debates on cyber coercion are reviewed. Subsequently, China&#x2019;s cyber doctrine is examined, with a specific focus on the concept of <italic>weishe</italic>. Next, the responses of India and Australia to cyber coercion attempts are analyzed, highlighting their distinct approaches influenced by contrasting strategic preferences: <italic>diversity-driven ambiguity</italic> and <italic>alliance-driven transparency</italic>. Finally, the paper explores cyber norms and governance within the Indo-Pacific order, assessing existing initiatives and identifying critical deficiencies.</p>
</sec>
<sec id="sec2">
<label>2</label>
<title>Research design</title>
<p>Amid the dynamics of cyber competition in the Indo-Pacific, India and Australia were designated as case countries due to their shared characteristics, such as their ambitious digitalization initiatives and expanding attack surfaces. Furthermore, they have a growing number of suspected cyber incidents associated with China that target national assets. Notably, their divergent response trajectories to cyber coercion, both institutionally and diplomatically, set them apart.</p>
<p>This study employs a process tracing methodology to comprehensively capture the outcomes and the underlying pathways shaping each country&#x2019;s response. Process tracing enables us to reconstruct pivotal events and institutional adaptations that transpired following significant cyber incidents attributed to China. By systematically tracing the evolution of both countries&#x2019; cyber strategies, we elucidate the causal mechanisms that link specific threats to policy and geopolitical outcomes. This approach fortifies the comparative analysis by elucidating the mechanisms through which India and Australia have diverged, moving beyond superficial similarities and differences to uncover the processes driving this divergence.</p>
<p>Based on this selection, illustrated in <xref ref-type="table" rid="tab1">Table 1</xref>, our comparative analysis draws on policy documents, public attribution statements, threat reports, and technical analyses for key incidents to demonstrate how each country&#x2019;s approach reflects distinct strategic, institutional, and diplomatic choices. Furthermore, three major datasets, the Cyber Operations Tracker (Cyber Ops) (<xref ref-type="bibr" rid="ref39">CFR, 2025</xref>), European Repository of Cyber Incidents (EuRepoC) (<xref ref-type="bibr" rid="ref56">EuRepoC, 2025</xref>), and Cyber Events Database (Cyber Events) (<xref ref-type="bibr" rid="ref131">University of Maryland, 2025</xref>), are integrated to attain a more comprehensive understanding of Chinese-originated cyberattacks on India and Australia, particularly for the period between 2020&#x2013;2025.</p>
<table-wrap position="float" id="tab1">
<label>Table 1</label>
<caption>
<p>Overview of the main sources used in the study.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Type</th>
<th align="left" valign="top">Sources</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Policy documents</td>
<td align="left" valign="top">India: Press Information Bureau, Data Security Council of India; Australia: Digital Economy Strategy 2030, 2023&#x2013;2030 Australian Cyber Security Strategy</td>
</tr>
<tr>
<td align="left" valign="top">Public attribution statements</td>
<td align="left" valign="top">Attribution to China&#x2019;s Ministry of State Security for exploited vulnerabilities in the Microsoft Exchange software, Attribution to APT 40 for cyber espionage</td>
</tr>
<tr>
<td align="left" valign="top">Technical threat reports for incident analyses</td>
<td align="left" valign="top">Dragonfly Intelligence report, Recorded Future, Australian Signals Directorate&#x2019;s cyber threat trends for critical infrastructures, SOCRadar<sup>&#x00AE;</sup> reports</td>
</tr>
<tr>
<td align="left" valign="top">Cyber policy and cyber incident databases</td>
<td align="left" valign="top">UNIDIR Cyber Policy Portal Database, Cyber Operations Tracker, EuRepoC, Cyber Events Database</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>To comprehensively analyze not only India and Australia&#x2019;s national strategies but also their international engagements, the UNIDIR Cyber Policy Portal database (<xref ref-type="bibr" rid="ref130">UNIDIR, 2025b</xref>) was used as a key source, providing an interactive map of the global cyber policy landscape and detailing intergovernmental and multilateral cybersecurity frameworks.</p>
</sec>
<sec id="sec3">
<label>3</label>
<title>Conceptualizing cyber coercion</title>
<p>Building on Baldwin&#x2019;s relational conception of power, coercion can be understood as a situation in which actor A changes actor B&#x2019;s behavior by manipulating B&#x2019;s incentives, typically through threats or pressures rather than persuasion or simple exchange (<xref ref-type="bibr" rid="ref24">Baldwin, 2016</xref>). The strategic employment of cyber operations to compel adversaries, such as cyber coercion, extends classical coercion theory into the digital realm. Building on Schelling&#x2019;s seminal concept of coercion as manipulating an adversary&#x2019;s decision calculus through credible threats of future harm (<xref ref-type="bibr" rid="ref119">Schelling, 1966</xref>), cyber coercion transposes this logic into a domain defined by anonymity, rapid maneuverability, and contested attribution (<xref ref-type="bibr" rid="ref33">Borghard and Lonergan, 2017</xref>). Unlike conventional coercion, which presupposes transparent actor identity and declaratory signals, cyberspace inherently undermines these premises, necessitating a theoretical recalibration.</p>
<p>The efficacy of cyber coercion hinges on the capacity to credibly convey capability and intent without triggering undesired escalation. However, this signaling is mediated by cyberspace&#x2019;s inherent opacity and technical intricacies, which undermine conventional assumptions regarding coercive clarity and credibility. Cyber coercion operates through three interdependent mechanisms: Attribution obfuscation, semantic ambiguity in signaling, and volatile escalation dynamics.</p>
<p>Attribution obfuscation is related to coercion reliably. Cyber operations systematically leverage ambiguities in attribution, using proxy networks, false flags, and anonymizing technologies to obscure identity, thus complicating adversary response strategies and allowing coercers to manipulate uncertainty as a form of power (<xref ref-type="bibr" rid="ref68">Hodgson, 2018</xref>; <xref ref-type="bibr" rid="ref91">Longabaugh, 2020</xref>). Semantic ambiguity in signaling is couched in technical operations, imposing cognitive and strategic burdens on the target, forcing decision-makers to navigate uncertainty about severity, intent, and future threat likelihood, which alters the traditional signaling calculus (<xref ref-type="bibr" rid="ref91">Longabaugh, 2020</xref>). Volatile escalation dynamics concern cyber coercion&#x2019;s relatively low cost but unpredictable escalation potential. This factor challenges coercer strategy and target&#x2019;s responses (<xref ref-type="bibr" rid="ref77">Jensen et al., 2017</xref>).</p>
<p>Cyber coercion poses a challenge to conventional security paradigms by empowering states to exert influence and accomplish strategic objectives without resorting to conventional military force. Cyberattacks on critical infrastructures can disrupt vital services and cripple economies, emphasizing the necessity of robust cybersecurity measures and international collaboration (<xref ref-type="bibr" rid="ref84">Kramer et al., 2009</xref>). These cyber capabilities are part of broader efforts to exert influence and achieve strategic objectives, making it essential to analyze cyber coercion within the context of overall foreign policy.</p>
<p>Cyber operations increasingly target not only political leaders, government officials, and diplomatic activities but also the critical infrastructures essential to national security and daily life. Because disruptions to these vital systems can have cascading effects on governance and public trust, such operations can be exploited to manipulate political processes, disrupt elections, and undermine decision-making, thereby threatening a nation&#x2019;s governance and overall stability (<xref ref-type="bibr" rid="ref105">Olafuyi, 2023</xref>).</p>
<p>A nuanced understanding of their technical dimensions, including the specific malware deployed, attack vectors, and exploited vulnerabilities, especially those affecting critical infrastructure, is essential for assessing the sophistication and strategic intent underlying cyber coercion (<xref ref-type="bibr" rid="ref70">Hodgson et al., 2019</xref>). State-backed APT groups are often leveraged as strategic instruments by states to augment their military or economic power (<xref ref-type="bibr" rid="ref001">Katagiri, 2024</xref>). APTs can also be used as coercive tools by demonstrating latent capabilities, inflicting limited harm, conveying a political message, and particularly targeting critical infrastructures.</p>
<p>More recently, scholars have adopted a more cautious approach to the concept of cyber coercion. One of the foundational critiques is advanced by <xref ref-type="bibr" rid="ref57">Fischerkeller et al. (2022)</xref>, who argue that cyberspace constitutes an &#x201C;environment of exploitation&#x201D; rather than one of coercion and that, instead of relying on episodic coercive acts, states employ persistent, non-violent campaigns to generate cumulative strategic effects. <xref ref-type="bibr" rid="ref90">Lonergan (2025)</xref> also argues that scholars have empirically demonstrated the limited coercive utility of cyber operations, yet U.S. practitioners remain optimistic about their effectiveness due to bureaucratic and political interests and the lack of viable alternatives.</p>
<p>Drawing on these insights, we also advocate a cautious approach to the concept of cyber coercion and introduce the dimension of persistent cyber pressure as a structural form of coercion particularly for operations targeting critical infrastructure, without rejecting their coercive impact. In classic coercion logic, including cyber coercion, three elements are central: a concrete demand to change or maintain some behavior, a conditional threat to impose costs if the demand is rejected, and communication that allows the target to understand the link between behavior and punishment or restraint. Persistent cyber pressure differs in form. It is continuous rather than episodic and consists of repeated intrusions, leaks, distributed denial of service campaigns, low level disruptions, and information operations, sometimes combined with non cyber instruments such as sanctions. It often lacks a clearly articulated demand and is instead experienced by neighboring states as an ongoing pattern of digital friction.</p>
<p>Although persistent cyber pressure differs from classic cyber coercion, repeated low level operations demonstrate capability and a basic level of resolve and teach the target that the regional actor is willing to impose costly nuisances. Even without explicit demands, continuous cyber harassment can lead neighboring states to anticipate that any move displeasing the regional power will trigger further harassment, to internalize a perception that certain policies are too costly, and to begin self-censoring their foreign policy options in order to avoid additional pain.</p>
<p>If a regional actor uses persistent cyber pressure to slowly shift facts on the ground, it moves into grey zone competition and salami-slicing. Each individual cyber operation remains limited and often deniable, yet the cumulative effect gradually alters the status quo. In this context, persistent cyber pressure begins to resemble a form of background compellence, in which the target is pushed over time to accept a new regional order rather than confronted with a single large demand. The underlying logic remains coercive, but the tempo and clarity differ from classic cyber coercion.</p>
<p>As the following section outlines, this understanding of persistent cyber pressure resonates with the Chinese concept of <italic>weishe</italic>, which integrates deterrence and compellence without requiring clear demands. In this sense, we advocate that sustained cyber activity of China targeting critical infrastructure reflects a <italic>weishe</italic>-style logic of coercion that looks for cumulative pressure rather than episodic coercive moves.</p>
</sec>
<sec id="sec4">
<label>4</label>
<title>China&#x2019;s cyber doctrine: cyber statecraft and <italic>weishe</italic></title>
<sec id="sec5">
<label>4.1</label>
<title>Characteristics and tools of Chinese cyber statecraft</title>
<p>Despite ongoing scholarly debates on the effectiveness of cyber weapons (<xref ref-type="bibr" rid="ref82">Kostyuk and Zhukov, 2019</xref>), Cunningham&#x2019;s strategic substitution approach offers insight into why nuclear powers like China adopt &#x201C;information-age weapons&#x201D; in a changing threat environment, as they provide a means to exert coercive pressure without escalating to the use of nuclear force (<xref ref-type="bibr" rid="ref44">Cunningham, 2022</xref>).</p>
<p>Accordingly, cyber capabilities play a crucial role in modern warfare, allowing nations to project power and influence without traditional military force (<xref ref-type="bibr" rid="ref40">Chen and Dinerman, 2018</xref>). China&#x2019;s cyber coercion strategy involves a mix of tactics, ranging from espionage and intellectual property theft to disruptive attacks on critical infrastructure (<xref ref-type="bibr" rid="ref93">Manantan, 2020</xref>). These actions are conducted with more overt displays of military, political, economic, and cultural power (<xref ref-type="bibr" rid="ref75">Insikt Group&#x00AE;, 2021</xref>). This strategy enables China to exert influence over its neighbors and project its power on the global stage, including in the Indo-Pacific.</p>
<p>What distinguishes Chinese cyber statecraft from other states is the substantial number of identified state-linked hacking groups and China&#x2019;s prominent position in the global economy. Additionally, the Chinese model of cyber operations is characterized by the uneven distribution of its tools, a highly structured hacking talent pool, and extensive access to supply chain vulnerabilities (<xref ref-type="bibr" rid="ref64">Handler, 2023</xref>; <xref ref-type="bibr" rid="ref85">Kuo, 2024</xref>). The fundamental doctrine of Xi Jinping&#x2019;s leadership is the &#x201C;Whole-of-Nation&#x201D; approach. This strategy entails mobilizing all components of national power, encompassing the military, intelligence agencies, state-owned enterprises, private companies, universities, and even individuals, to achieve national objectives, including cyberspace (<xref ref-type="bibr" rid="ref37">Center for Global Security Research, 2022</xref>).</p>
<p>To illustrate, the development and utilization of cyber ranges for capability building constitute a core element of this strategy, aligning with China&#x2019;s broader defense mobilization efforts (<xref ref-type="bibr" rid="ref75">Insikt Group&#x00AE;, 2021</xref>). According to <xref ref-type="bibr" rid="ref137">Whyte (2016)</xref>, Chinese actors employed sophisticated network reconnaissance combined with selective system denial. Initial intelligence gathering pinpointed critical nodes. Gradually, successive service disruptions progressively eroded system reliability, approaching crisis thresholds. This espionage-combined-with-denial strategy effectively communicated that escalation remained a viable option. The espionage-based denial model illustrates how effective cyber coercion can combine intelligence gathering and system degradation to compel restraint without resorting to kinetic conflict.</p>
<p>Scholars explain that Chinese cyber statecraft has transitioned from prioritizing economic benefits to targeting political objectives, and from a passive stance to more assertive involvement (<xref ref-type="bibr" rid="ref44">Cunningham, 2022</xref>; <xref ref-type="bibr" rid="ref96">Martin, 2025</xref>). Therefore, China&#x2019;s current cyber operations often involve a combination of state-sponsored actors and private individuals or groups, blurring the lines between government and non-government activities.</p>
<p>In this context, Cunningham argues that China&#x2019;s tools for coercive leverage, cyber weapons, have distinctive characteristics. First, these weapons can disrupt large-scale systems while remaining difficult to defend against. In cyberspace, zero-day vulnerabilities can spread to critical infrastructure networks in hours, overwhelming defenders. Anti-satellite weapons threaten communication and navigation systems, creating outsized effects without physical occupation. These tools target systems deeply dependent on societies and militaries, making temporary outages or breaches disproportionate. Second, these weapons signal crises by crossing political and psychological markers. Crippling a national power grid, interrupting satellite services, or a ransomware attack on a defense ministry can force adversaries to reconsider their course of action without resorting to overt means. Third, these weapons inherently raise the risk of escalation, even with restraint. Many cyber and counter-space systems are entangled with nuclear command-and-control networks, so an attack can generate uncertainty in the adversary&#x2019;s leadership about the compromise of its nuclear deterrent. This uncertainty alone can be coercive. China benefits from creating fear of escalation while claiming plausible deniability about its intentions.</p>
<p>Cunningham also discusses that China&#x2019;s information-age weapons are dual-use by design, intended for coercion and conventional warfighting. This dual functionality enhances their credibility and cost-effectiveness. From a coercive perspective, the existence of these tools, with rapid activation capabilities, deters adversaries. Escalation risks blinding satellites, disabling critical infrastructure, or penetrating communication systems. Even without explicit demands, the latent threat shapes adversary decision-making (<xref ref-type="bibr" rid="ref44">Cunningham, 2022</xref>). These weapons are fully integrated into China&#x2019;s warfighting doctrine. In open conflict, cyber and counter-space operations disrupt enemy C4ISR systems.</p>
<p>This dual-purpose design allows Beijing to extract value from its investment across various scenarios: as tools of quiet pressure in peacetime, as coercive leverage in crises, and as force multipliers in war. The blending of coercive and warfighting roles illustrates China&#x2019;s flexible information-age arsenal. It signals resolve without full-scale hostilities, ensuring scaling up if a crisis escalates into military confrontation. China&#x2019;s strategy balances risk and maximizes the strategic utility of its non-nuclear assets. This multidimensional design of information-age weapons demonstrates the presence of China&#x2019;s strategic culture, which emphasizes long-term planning, deception, and the importance of gaining a strategic advantage.</p>
</sec>
<sec id="sec6">
<label>4.2</label>
<title><italic>Weishe</italic> and Chinese cyber doctrine</title>
<p>While the <italic>weishe</italic> has long been integrated into Chinese military thinking (<xref ref-type="bibr" rid="ref41">Cheng, 2011</xref>), a 2011 definition identifies it as a strategy of &#x201C;displaying or threatening the use of armed power in order to compel an opponent to submit&#x201D; (<xref ref-type="bibr" rid="ref30">Beauchamp-Mustafaga et al., 2021</xref>, p. 19). <italic>Weishe</italic> plays a pivotal role in China&#x2019;s comprehensive foreign policy strategy, which aims to promote its interests, uphold its values, and influence the global order in its favor. This doctrine signifies a comprehensive approach to deterring and compelling adversaries through calibrated cyber operations, reflecting a blend of strategic objectives and tactical capabilities (<xref ref-type="bibr" rid="ref79">Kania, 2015</xref>). In other words, <italic>weishe</italic>, serves as the foundation for China&#x2019;s approach to cyber warfare, blending deterrence and compellence to achieve national security objectives in the Indo-Pacific region (<xref ref-type="bibr" rid="ref110">Pollpeter, 2015</xref>).</p>
<p><italic>Weishe</italic> doctrine is operationalized through carefully calibrated cyber operations, leveraging state-linked actors, such as APT10 and APT41, which systematically target critical infrastructure and intellectual property (<xref ref-type="bibr" rid="ref94">Manantan, 2021</xref>). <italic>Living-off-the-Land</italic> (LOTL) techniques, which blend in normal system activity and leverage legitimate tools already present in a victim&#x2019;s network rather than deploying custom malware (<xref ref-type="bibr" rid="ref124">SOCRadar&#x00AE;, 2023</xref>), align closely with the operational logic of China&#x2019;s <italic>weishe</italic> doctrine by enabling ambiguity and calibrated signaling. As observed in the Volt Typhoon incident, which was publicly exposed in 2023 (<xref ref-type="bibr" rid="ref42">CISA, 2023</xref>), such techniques allow APT groups to infiltrate and surveil critical infrastructures by staying under the radar and without generating detectable noise. LOTL techniques pose a fundamental challenge to conventional cybersecurity defenses&#x2019; mindset, as they enable attackers to remain undetected within systems for extended periods, sometimes even years, while maintaining the capability to strike at any moment (<xref ref-type="bibr" rid="ref62">Grove, 2024</xref>).</p>
<p><italic>Weishe</italic> also involves a deep understanding of the adversary&#x2019;s decision-making processes and vulnerabilities, enabling China to tailor its cyber operations for maximum impact. The concept includes not only deterring adversaries from taking hostile actions but also compelling them to adopt specific behaviors desired by China (<xref ref-type="bibr" rid="ref94">Manantan, 2021</xref>). The People&#x2019;s Liberation Army (PLA) believes that intruding into a rival state&#x2019;s network still carries a coercive purpose, even if the intrusion is primarily for intelligence gathering or undermining critics through disinformation campaigns (<xref ref-type="bibr" rid="ref93">Manantan, 2020</xref>).</p>
<p>In addition to the concept of <italic>weishe</italic>, Chinese military literature introduces two pivotal concepts that can be effectively applied to contemporary cyber coercion tactics: Unrestricted Warfare and Active Defense. &#x201C;Unrestricted Warfare,&#x201D; formulated in 1999 by PLA colonels Qiao Liang and Wang Xiangsui, significantly broadens the definition of conflict beyond conventional battlefields, including land, sea, and air. It posits that any instrument of national power or non-state action can be employed as a means of coercion. According to this doctrine, states utilize cyberattacks, economic measures like trade sanctions or supply chain disruptions, legal maneuvers such as international litigation and treaty processes, and cultural or media operations, including propaganda and information campaigns, in a coordinated and asymmetric strategy to exploit adversaries&#x2019; vulnerabilities.</p>
<p>Notably, the Unrestricted Warfare approach emphasizes stealth, deniability, and ambiguity, enabling these actions to transpire below the threshold of open hostilities. This approach aligns with contemporary theories of cyber coercion, which utilize espionage, economic pressure, and legal pretexts to impose costs without resorting to conventional warfare. The doctrine&#x2019;s most profound insight lies in its recognition that contemporary strategic competition is multi-domain and global, compelling defenders to develop comprehensive resilience across cybersecurity, economic stability, legal countermeasures, and strategic communications rather than solely relying on traditional military capabilities (<xref ref-type="bibr" rid="ref88">Liang and Xiangsui, 1999</xref>).</p>
<p>The concept of Active Defense guides China&#x2019;s cyber strategy, combining defensive and offensive measures to protect its territory and interests (<xref ref-type="bibr" rid="ref79">Kania, 2015</xref>). This approach allows China to take the initiative and dictate the terms of engagement (<xref ref-type="bibr" rid="ref70">Hodgson et al., 2019</xref>). In addition, China&#x2019;s perception of cyberspace as a domain for strategic competition is intrinsically linked to its ambition of achieving great power status. China perceives &#x201C;informatization&#x201D; or &#x201C;information conflict&#x201D; as a technical aspect of a broader concept.</p>
<p>Active Defense conceptualizes both preemptive and retaliatory cyber operations as inherently defensive measures, thereby eradicating conventional distinctions between offensive and defensive actions and legitimizing coercive tactics under the pretext of national security objectives. This paradigm enables a state to justify probing, intrusion, or disruption activities as indispensable protective responses to perceived threats, thereby amplifying strategic ambiguity and complicating adversary decision-making processes (<xref ref-type="bibr" rid="ref106">Ornelas, 2021</xref>). The Chinese official language often describes &#x201C;active&#x201D; cybersecurity for digital government as a capability package centered on continuous monitoring, early warning, and coordinated response, supported by security technologies. A key objective is to enhance the ability to detect and warn of large-scale cybersecurity incidents, including major network intrusions and data leakage events (<xref ref-type="bibr" rid="ref36">CAC, 2022</xref>).</p>
<p>China&#x2019;s cyber campaigns against India and Australia typify this strategic logic. By targeting critical infrastructures such as power grids, telecommunications, and governmental data repositories, China demonstrates technological superiority and signals intent in a manner consistent with <italic>weishe</italic>, balancing assertiveness with deniability to sustain long-term pressure without provoking direct military reprisal (<xref ref-type="bibr" rid="ref72">Holm, 2017</xref>; <xref ref-type="bibr" rid="ref77">Jensen et al., 2017</xref>). The multidimensional coercion exploits attribution ambiguity and signaling opacity to enforce implicit behavioral modifications aligned with Chinese geopolitical interests. We now advance to granular analyses of India and Australia as case studies, leveraging this conceptual architecture to dissect China&#x2019;s real-world cyber coercion.</p>
</sec>
</sec>
<sec id="sec7">
<label>5</label>
<title>Case study: India at the strategic faultline</title>
<p>As of 2025, India has become the most populous country in the world, with a population exceeding 1.463 billion (<xref ref-type="bibr" rid="ref138">Worldometer, 2025</xref>). Alongside this demographic growth, India&#x2019;s digital posture has undergone a significant transformation. The size of the digital economy grew from $107.7 billion in 2014 to $222.5 billion in 2019 (<xref ref-type="bibr" rid="ref61">Government of India, 2025</xref>). Furthermore, it is expected that digital economy in India would contribute nearly one-fifth of the overall national economy [<xref ref-type="bibr" rid="ref111">Press Information Bureau (PIB), 2025</xref>].</p>
<p>While India&#x2019;s internet user base is expected to exceed 900 million by 2025 (<xref ref-type="bibr" rid="ref128">The Indian Express, 2025</xref>), there are two major turning points in India&#x2019;s digital transformation: The first is the implementation of the digital identity system called Aadhaar in 2009 and the second is the launch of the Unified Payments Interface (UPI) in 2016 (<xref ref-type="bibr" rid="ref23">Awasthi et al., 2024</xref>; <xref ref-type="bibr" rid="ref25">Bandura et al., 2024</xref>). To elaborate briefly, Aadhaar provides citizens with a 12-digit digital identity using fingerprints, iris scans, and photographs. UPI, developed by the National Payments Corporation of India, enabled financial transactions without the need for any physical payment instrument.</p>
<p>With the launch of the &#x201C;Digital India&#x201D; initiative, the Indian government also announced an ambitious program aimed at digitizing infrastructures (<xref ref-type="bibr" rid="ref104">OECD, 2023</xref>). However, as more assets became increasingly dependent on digital channels, this also significantly increased the India&#x2019;s exposure to cyber threats. According to the Data Security Council of India (DSCI), the healthcare sector emerged as the most frequently targeted. The report also highlights a significant increase expected in AI-driven cyber-attacks in 2025. Furthermore, the geopolitical dynamics adds another complexity to India&#x2019;s cyber threat landscape [<xref ref-type="bibr" rid="ref48">Data Security Council of India (DSCI), 2025</xref>].</p>
<p>The most significant challenges among these are the cyber manifestations of India&#x2019;s geopolitical dynamics with Pakistan and China. To illustrate, a report by the Indian Computer Emergency Response Team (CERT-In) noted that cyber-attacks from China made up 35% of the total number of cyber-attacks in 2018 (<xref ref-type="bibr" rid="ref127">The Indian Express, 2018</xref>) whereas several sources claim that this figure reached 79% in 2023 (<xref ref-type="bibr" rid="ref49">Debates, 2025</xref>). In the context of cyber rivalry between Pakistan and India, attacks tend to intensify around symbolically significant dates, such as national independence days, and often follow a tit-for-tat pattern, with both sides targeting each other&#x2019;s official websites (<xref ref-type="bibr" rid="ref52">Dragonfly Intelligence, 2025</xref>; <xref ref-type="bibr" rid="ref108">Patil, 2025</xref>). Furthermore, recent researches highlight that India is also frequently targeted by Pro-Palestinian groups since the country has a close relationship with Israel (<xref ref-type="bibr" rid="ref86">Lemos, 2025</xref>).</p>
<p>Particularly, tensions between China and India are rooted in a multifaceted interplay of historical, strategic, and economic factors. At the core of this tension lies their longstanding border dispute, particularly along the Line of Actual Control in regions such as Aksai Chin and Arunachal Pradesh. This dispute has periodically escalated into military standoffs and even violent confrontations, with the most recent incident occurring in the Galwan Valley.</p>
<p>Beyond these border disputes, both nations vie for influence in South Asia, striving to expand their political and economic presence among neighboring countries and within the Indian Ocean. This rivalry is further intensified by their respective strategic alliances: India is apprehensive of China&#x2019;s close partnership with Pakistan, as exemplified by the China-Pakistan Economic Corridor, while China perceives India&#x2019;s involvement in the Quad (which comprises the United States, Japan, and Australia) as a deliberate attempt to restrain its growing influence. Economic dynamics also contribute to the complexity of their relationship, characterized by a substantial trade imbalance favoring China. Ongoing disputes concerning technology, investment, and market access have prompted calls within India for enhanced economic self-reliance. Collectively, these factors foster a climate of mutual suspicion and competition that transcends their contested borders.</p>
<p>Several prominent APT groups have targeted India in recent years. One of the most notable is APT36 (also known as Transparent Tribe), which is reportedly affiliated with Pakistan. APT36 primarily focuses on critical Indian entities, such as defense and government institutions, often employing deceptive domains and phishing campaigns as its core tactics for espionage purposes [<xref ref-type="bibr" rid="ref38">CFR, 2024</xref>; <xref ref-type="bibr" rid="ref47">CYFIRMA, 2025</xref>; <xref ref-type="bibr" rid="ref48">Data Security Council of India (DSCI), 2025</xref>]. Another incident concerns the attack on the Kudankulam Nuclear Power Plant (KNPP), which was flagged in 2019 by independent researchers and assessed as being conducted by state-sponsored actors from North Korea (APT 38), reportedly motivated by India&#x2019;s advanced research in the nuclear energy sector (<xref ref-type="bibr" rid="ref92">Mallick, 2019</xref>).</p>
<p>Another APT group targeting India is the RedEcho, which is believed to be linked to China. RedEcho has been actively involved in persistent intrusions aimed at compromising India&#x2019;s critical infrastructure. It exhibits similarities and utilizes infrastructure in common with other China-associated groups, such as APT41, and has been associated with the deployment of ShadowPad malware (<xref ref-type="bibr" rid="ref99">MITRE ATT&#x0026;CK&#x00AE;, 2025</xref>). RedEcho is particularly notable for its focus on critical energy infrastructures, including a high-voltage transmission substation and a coal-fired thermal power plant (<xref ref-type="bibr" rid="ref121">SecurityWeek, 2021</xref>). One of the most significant cyber incidents attributed to this group is the attack that caused a widespread blackout in the Mumbai region in 2020 which occurred shortly after the border clashes between China and India in the Galwan Valley.</p>
<p>Although Indian authorities did not make any explicit attributions, cyber threat intelligence firms assessed the attack as a form of strategic signaling, intended to demonstrate China&#x2019;s cyber capabilities to India during a period of heightened tension (<xref ref-type="bibr" rid="ref112">Recorded Future, 2021</xref>; <xref ref-type="bibr" rid="ref118">Sanger and Schmall, 2021</xref>). Analysts also interpret the surge in attacks targeting Indian entities as part of China&#x2019;s retaliatory efforts following the Galwan Valley clash as a means of imposing costs, gathering intelligence, and undermining India&#x2019;s strategic posture in the long term (<xref ref-type="bibr" rid="ref95">Manhas, 2023</xref>). In addition to energy infrastructure, the maritime sector is also pivotal to the Indian economy, especially as India pursues its ambitious Maritime India Vision 2030 and competes with China in the maritime domain. Consequently, the country has faced cyber threats targeting its maritime infrastructure, including a cyber-attack on the Jawaharlal Nehru Port Trust&#x2019;s IT systems, which forced operators to revert to manual processes until restoration was completed (<xref ref-type="bibr" rid="ref97">MCAD Maritime Cyber Attack Database, 2022</xref>).</p>
<p>To address intensifying tensions in cyberspace, India employs a combination of policy and institutional measures and a proactive cyber diplomacy. While India adopted its first National Cybersecurity Strategy in 2013, the National Critical Information Infrastructure Protection Centre (NCIIPC), Indian Cybercrime Coordination Centre (I4C), and the CERT-In are considered the cornerstones of the country&#x2019;s cybersecurity architecture. As being the main national intelligence apparatus, The National Technology Regulatory Organization (NTRO) is pivotal in gathering cyber intelligence and actively protecting critical infrastructures whereas The Research and Analysis Wing (R&#x0026;AW) acts India&#x2019;s external intelligence agency (<xref ref-type="bibr" rid="ref102">News4hackers, 2024</xref>; <xref ref-type="bibr" rid="ref122">Shende and Chaudhuri, 2024</xref>). Additionally, National Cyber Security Coordinator (NCSC) post is responsible to harmonize cybersecurity issues in national level and directly report to Prime Minister&#x2019;s Office (<xref ref-type="bibr" rid="ref107">Patil, 2021</xref>). Despite ongoing ambiguity regarding India&#x2019;s capabilities and intentions to conduct offensive cyber operations (<xref ref-type="bibr" rid="ref50">Devanny and Laudrain, 2025</xref>; <xref ref-type="bibr" rid="ref74">IISS, 2021</xref>), the Defence Cyber Agency (DCA), established in 2018 under the Ministry of Defence, should be also recognized as a key institution in managing cybersecurity threats (<xref ref-type="bibr" rid="ref27">Basu, 2022</xref>; <xref ref-type="bibr" rid="ref123">Singh, 2025</xref>).</p>
<p>When it comes to India&#x2019;s global position in terms of capabilities, it varies significantly depending on the evaluative framework. For instance, India is placed among Tier-1 in the International Telecommunication Union&#x2019;s (ITU) latest (2024) Global Cybersecurity Index (<xref ref-type="bibr" rid="ref76">ITU, 2024</xref>), whereas in the Harvard University&#x2019;s Belfer Center&#x2019;s Cyber Power Index (2022), India is positioned among countries with lower intent and lower capability (<xref ref-type="bibr" rid="ref65">Harvard University, 2022</xref>). This difference may reflect the gap between India&#x2019;s developing level of cyber resilience and its relatively limited strategic cyber influence.</p>
<p>India&#x2019;s international cybersecurity strategy and cyber diplomacy should be analyzed through both broader regional and global political-strategic lenses. From an institutional perspective, Cyber Diplomacy Division and the New and Emerging Strategic Technologies (NEST) Division, under the Ministry of External Affairs, coordinate India&#x2019;s cyber diplomacy activities (<xref ref-type="bibr" rid="ref46">Cyber Policy Portal, 2025</xref>). While India&#x2019;s threat perception in cyberspace has increasingly centered on China (<xref ref-type="bibr" rid="ref50">Devanny and Laudrain, 2025</xref>), the country&#x2019;s international cyber policies and cyber diplomacy efforts cannot be understood in isolation from its broader foreign policy orientation, which is trying to balance multilateralism and sovereignty (<xref ref-type="bibr" rid="ref107">Patil, 2021</xref>). To put this in further detail, while India and China are competing for influence in South Asia, India&#x2019;s alignment with the West remains limited, as the country is pursuing strategic autonomy, acknowledging and seeking to reduce its dependence on China for critical imports, including renewable energy technologies, electronics, plastics, and more.</p>
<p>When combined with India&#x2019;s evolving cyber threat perception and its pursuit of strategic autonomy, the realities on the ground have led the country to seek not only influence but also balance competing interests through multiple diplomatic channels. While doing so, the country deliberately avoids sharp or confrontational moves in cybersecurity. For example, although cyber threat intelligence firms pointed out the likely source of the Mumbai blackout, India has consistently refrained from making public attributions to any specific state or group (<xref ref-type="bibr" rid="ref28">Basu, 2024</xref>), reflecting its cautious and restrained cyber diplomacy posture.</p>
<p>UNIDIR&#x2019;s Cyber Policy Portal provides a valuable lens into India&#x2019;s cyber diplomacy, which is characterized by a multilateral yet cautious approach. India is not only engaged in multiple bilateral agreements, including with the UK, France, and Australia, on cybersecurity cooperation but it also actively participates in major international initiatives such as the Counter Ransomware Initiative, UN Open-ended Working Group (OEWG) on security of and in the use of information and communications technologies, and UN Group of Governmental Experts (GGE) on Developments in the Field of Information and Telecommunications in the Context of International Security (<xref ref-type="bibr" rid="ref129">UNIDIR, 2025a</xref>). In addition, India&#x2019;s participation in both the Shanghai Cooperation Organisation&#x2019;s (SCO) International Information Security initiatives and the Quad Cybersecurity Partnership (<xref ref-type="bibr" rid="ref98">Ministry of Foreign Affairs of Japan, 2023</xref>), formed by Australia, Japan, and the United States, demonstrates its pursuit of balance and strategic diversification, particularly when considering the bold differences between these entities in terms of internet governance models and cyber threat conceptualizations.</p>
<p>Significant challenges remain for India&#x2019;s cybersecurity stance. At the national level, despite robust efforts, authority and capabilities are still dispersed across multiple agencies, leading to coordination and implementation gaps (<xref ref-type="bibr" rid="ref74">IISS, 2021</xref>). At the international level, SCO&#x2019;s emphasis on cyber sovereignty limit India&#x2019;s normative engagement with other global cybersecurity initiatives and may contradict its cautious multilateralism. Moreover, India&#x2019;s non-alignment policy can hinder the deepening of cybersecurity cooperation, particularly in areas such as cyber threat intelligence sharing, and may ultimately constrain its influence in global cyber governance fora.</p>
</sec>
<sec id="sec8">
<label>6</label>
<title>Case study: Australia navigating tensions</title>
<p>As outlined in Australia&#x2019;s ambitious digital strategy, digitalization is expected to contribute approximately $315 billion to the Australian economy over the next decade. Accordingly, the strategy provides for investments for growing the digital economy, building capabilities in emerging technologies, and enhancing digital skills across various sectors (<xref ref-type="bibr" rid="ref8">Australian Government, 2021a</xref>). The government also endorses a &#x201C;cloud-first&#x201D; approach and collaborates with major technology companies such as Amazon Web Services to foster cloud innovation in areas including national security and defense (<xref ref-type="bibr" rid="ref117">Rouse, 2024</xref>). In line with global trends, Australia aims to increasingly deliver public services through digital platforms.</p>
<p>Analogous to India&#x2019;s situation, Australia is grappling with an escalating number of cyber incidents as its digital footprint expands. Notably, Australia has experienced several severe data breaches in recent years, including the 2022 incidents involving Optus Telecom and Medibank Health Insurance. The Optus breach compromised the personal information of 9.7 million customers, while the Medibank ransomware attack is suspected of causing the release of claims data and sensitive medical records on the dark web (<xref ref-type="bibr" rid="ref80">Kost, 2025</xref>).</p>
<p>Attacks targeting critical infrastructure have been a major concern in Australia and are increasingly perceived as instruments of malign influence and coercion (<xref ref-type="bibr" rid="ref10">Australian Government, 2022</xref>). Critical Infrastructure Security Centre (CISC), under the Department of Home Affairs, is the regulator of the national critical infrastructures. In addition to the broader designation of national critical infrastructure, Australia&#x2019;s classification of &#x201C;Systems of National Significance&#x201D;, a smaller subset of critical infrastructure assets, is a distinctive practice, as these entities are subject to enhanced obligations, including the development of cybersecurity incident response plans (<xref ref-type="bibr" rid="ref5">Australian Associated Press, 2025</xref>).</p>
<p>According to the Australian Cyber Security Centre (ACSC) under the Australian Signals Directorate (ASD), more than 11 percent of the cybersecurity incidents identified in FY2023&#x2013;24 were found to be related to critical infrastructures (<xref ref-type="bibr" rid="ref13">Australian Government, 2024a</xref>; <xref ref-type="bibr" rid="ref114">Ribeiro, 2024</xref>). To illustrate, the cyber-attack targeting DP World, Australia&#x2019;s largest port operator, led to a three-day suspension of operations (<xref ref-type="bibr" rid="ref4">Australian Associated Press, 2023</xref>). Unlike India, which refrains from explicit attribution, Australia&#x2019;s official cyber threat report for FY2023&#x2013;24 clearly names state-linked actors, such as Chinese threat groups, as part of its national cyber threat landscape. For instance, these reports refer to state-sponsored actors leveraging LOTL techniques and &#x201C;pre-positioning for disruptive effects&#x201D;, illustrating how cyberspace is increasingly intertwined with broader geopolitical rivalry (<xref ref-type="bibr" rid="ref14">Australian Government, 2024b</xref>, pp. 1&#x2013;14).</p>
<p>Over the past decade, the relationship between China and Australia has become increasingly strained, characterized by a multifaceted array of disputes that encompass economic, security, political, and ideological dimensions. A notable escalation occurred in trade tensions, particularly after Australia initiated an independent investigation into the origins of COVID-19 (<xref ref-type="bibr" rid="ref136">Walsh, 2021</xref>). This prompted China to impose tariffs and restrictions on key Australian exports, such as barley, wine, and coal. These economic pressures are particularly noteworthy given Australia&#x2019;s longstanding dependence on China as its largest trading partner, resulting in a dynamic of mutual reliance and vulnerability.</p>
<p>In addition to trade concerns, Australia has raised serious allegations of Chinese interference in its political system, universities, and diaspora communities. Furthermore, ongoing accusations of cyber-espionage targeting sensitive sectors have deepened the strategic dimension of this rivalry. Australia&#x2019;s engagement in the Trilateral Security Partnership Between Australia, U.K. and U.S (AUKUS) and its open criticism of China&#x2019;s actions in the South China Sea have underscored this shift. Human rights issues have also added an ideological element to the tensions. Australia has condemned China&#x2019;s policies in Hong Kong and Xinjiang, often receiving sharp rebukes from Beijing. Moreover, the competition in technology has intensified, with Australia&#x2019;s ban on Huawei from its 5G network and heightened scrutiny of Chinese investments in critical infrastructure highlighting this aspect (<xref ref-type="bibr" rid="ref132">Uren and Cave, 2018</xref>). Overall, these frictions reflect a broader contest for influence, values, and security in the Indo-Pacific region. They underscore the challenges of managing a relationship that balances deep economic ties with significant strategic and political mistrust.</p>
<p>Australia has also been targeted by several APT groups in recent years. For instance, APT40 (also known as Kryptonite Panda, Gingham Typhoon, Leviathan, and Bronze Mohawk up to industry reporting), attributed to China, has been repeatedly identified as responsible for intrusions into Australian networks, including both government and private sector systems. The group is associated with cyber-espionage campaigns, particularly focused on critical sectors such as defense and emerging technologies (<xref ref-type="bibr" rid="ref16">Australian Government, 2024d</xref>; <xref ref-type="bibr" rid="ref125">SOCRadar&#x00AE;, 2024</xref>). Another group, APT10 (Additionally, certain sources have also identified this threat actor as menuPass and Stone Panda) (<xref ref-type="bibr" rid="ref63">Grunzweig and Miller-Osborn, 2017</xref>), has also been associated with intellectual property theft, particularly through its involvement in Operation Cloud Hopper in 2017, an extensive cyber-espionage campaign that leveraged cloud service providers to pivot from one victim network to another (<xref ref-type="bibr" rid="ref6">Australian Government, 2019</xref>; <xref ref-type="bibr" rid="ref115">Richmond, 2019</xref>).</p>
<p>When Australia&#x2019;s two most recent cybersecurity strategies are compared, a more assertive emphasis emerges, particularly on setting clear obligations for critical infrastructure and situating cyber threats within a deepening geopolitical contest. For instance, while the 2020 strategy primarily framed cyber threats around financial gain, the latest strategy views them as part of broader strategic rivalry and unchecked coercion in the Indo-Pacific (<xref ref-type="bibr" rid="ref7">Australian Government, 2020</xref>, <xref ref-type="bibr" rid="ref11">2023a</xref>). Therefore, Australia&#x2019;s responses to evolving cyber threats involve a combination of institutional, legislative, and diplomatic responses.</p>
<p>Following major cyber incidents such as the Optus and Medibank breaches, one of the most notable developments in Australia&#x2019;s cyber ecosystem has been the appointment of a dedicated Minister for Cyber Security, alongside the Minister for Home Affairs, to strengthen strategic coordination at the national level (<xref ref-type="bibr" rid="ref43">CSO Online, 2024</xref>). Besides, in Australia, ASD and ACSC are the pivotal institutions in national cybersecurity governance. ASD operates across the full spectrum of signals intelligence and cybersecurity operations (<xref ref-type="bibr" rid="ref20">Australian Government, 2025c</xref>). Within this framework, the ACSC, as a part of ASD, leads the Australian Government&#x2019;s efforts to enhance national cyber resilience and coordinate cybersecurity initiatives (<xref ref-type="bibr" rid="ref19">Australian Government, 2025b</xref>).</p>
<p>Computer Emergency Response Team Australia (CERT Australia) operates under ACSC and provides support to critical infrastructure operators and shares information (<xref ref-type="bibr" rid="ref21">Australian Government, 2025d</xref>). One of the most recent aspects of the latest strategy is the commitment to establish an &#x201C;Executive Cyber Council&#x201D; and to engage industry leaders in order to consolidate public&#x2013;private partnerships on cybersecurity. From a legislative perspective, Australia has introduced a dedicated Cybersecurity Act in 2024, which includes provisions for mandatory ransomware payment reporting and the establishment of a Cyber Incident Review Board (<xref ref-type="bibr" rid="ref17">Australian Government, 2024e</xref>).</p>
<p>From the perspective of critical infrastructure protection, the CISC, plays a central role in supporting the implementation of regulatory obligations for critical infrastructure sectors, including mandatory incident reporting. Despite criticism over the lack of a publicly articulated doctrine, such as the UK&#x2019;s Responsible Cyber Power framework (<xref ref-type="bibr" rid="ref120">Scott, 2023</xref>), Australia is also among the few countries that openly acknowledge possessing offensive cyber capabilities, including tools for deterrence and disruption, even though the specifics of such operations remain classified. While the REDSPICE Project aims to triple the offensive cyber effects capability, ASD has been described as both a &#x201C;poacher&#x201D; and a &#x201C;gamekeeper,&#x201D; reflecting its dual role in conducting offensive cyber operations while also defending national assets (<xref ref-type="bibr" rid="ref10">Australian Government, 2022</xref>).</p>
<p>As attacks on critical infrastructure are no longer isolated incidents but increasingly reflect broader geopolitical contests, thus necessitating proactive cyber diplomacy. International engagement is defined as a core tenet of Australia&#x2019;s foreign policy, with the country playing a pivotal role in advancing cyber diplomacy practices coordinated by the Ambassador for Cyber Affairs and Critical Technology within the Department of Foreign Affairs and Trade.</p>
<p>The International Cyber and Critical Technology Engagement Strategy delineates three fundamental principles that guide Australia&#x2019;s global approach to cyber policy: values, security, and prosperity. The values pillar embodies Australia&#x2019;s dedication to employing technology in a manner that safeguards liberal democratic principles. Conversely, the security pillar underscores its aspiration to foster resilience both domestically and within the Indo-Pacific region. The prosperity pillar emphasizes Australia&#x2019;s aspiration to leverage technology for economic efficiency and innovation, while opposing the fragmentation of global technology markets (<xref ref-type="bibr" rid="ref22">Australian Government, 2025e</xref>). Australia is also an active member of the UN GGE and chaired the UN GGE on cyber norms in 2013, while its position in UN processes is shaped by its Five Eyes partnership (<xref ref-type="bibr" rid="ref3">Austin, 2025</xref>).</p>
<p>Based on documented practices and observed strategies, it would not be inaccurate to argue that Australia&#x2019;s cyber diplomacy efforts to counter cyber coercion and safeguard its national assets rely also on direct instruments such as sanctions, public attribution, joint statements, and coordinated naming-and-shaming with like-minded coalitions, which are coupled with signaling its offensive cyber capabilities to shape both the current and future operational and normative environment (<xref ref-type="bibr" rid="ref53">Egloff, 2020a</xref>; <xref ref-type="bibr" rid="ref94">Manantan, 2021</xref>). For instance, since 2017, Australia has publicly attributed malicious cyber activities to North Korea, Russia, China, and Iran, efforts that are reinforced by an autonomous sanctions framework (<xref ref-type="bibr" rid="ref9">Australian Government, 2021b</xref>, <xref ref-type="bibr" rid="ref12">2023b</xref>).</p>
</sec>
<sec id="sec9">
<label>7</label>
<title>Comparative discussion: strategic divergence in response to cyber coercion</title>
<p>Strategies to counter coercion may be pursued through national, minilateral, and multilateral avenues (<xref ref-type="bibr" rid="ref73">Hunter et al., 2023</xref>). Consequently, states addressing cyber coercion may utilize a combination of institutional and diplomatic channels. While institutional channels encompass different state agencies or legislative reforms, diplomatic channels concern alliances, partnerships, and implementation of cyber diplomacy tools, including public attribution. Adopting an actor-centric perspective is crucial for examining these strategic responses to cyber coercion, as the perception of cyber threats and the strategic preferences among actors may not be uniform. As Gomez emphasized, various factors, including material and strategic considerations, can influence the cybersecurity preferences of states (<xref ref-type="bibr" rid="ref60">Gomez, 2022</xref>).</p>
<p>Acknowledging this diversity, in the preceding two parts, we analyzed the digital landscape, key incidents, the institutional and (cyber) diplomatic landscape of India and Australia to counter cyber coercive attempts, particularly posed by China. Based on detailed examination of these cases, we found that both countries, which are pivotal actors in the Indo-Pacific region, are increasingly pursuing digitalization efforts and confronting advanced threats employing sophisticated techniques aimed at their critical infrastructures, including maritime and energy assets. Yet, their responses to cyber coercion have notably diversified in both national and international contexts (<xref ref-type="table" rid="tab2">Table 2</xref>).</p>
<table-wrap position="float" id="tab2">
<label>Table 2</label>
<caption>
<p>Factors drive strategic responses of India and Australia.</p>
</caption>
<table frame="hsides" rules="groups">
<thead>
<tr>
<th align="left" valign="top">Dimension</th>
<th align="left" valign="top">India: diversity-driven ambiguity</th>
<th align="left" valign="top">Australia: alliance-driven transparency</th>
</tr>
</thead>
<tbody>
<tr>
<td align="left" valign="top">Digitalization efforts</td>
<td align="left" valign="top">Digital India initiative</td>
<td align="left" valign="top">Data and Digital Government strategy</td>
</tr>
<tr>
<td align="left" valign="top">Threat landscape</td>
<td align="left" valign="top">Grid sabotages; multiple threat actors</td>
<td align="left" valign="top">Port disruptions; more focused threat actors</td>
</tr>
<tr>
<td align="left" valign="top">Attribution strategy</td>
<td align="left" valign="top">Suspected actors but strategic silence; internal focus</td>
<td align="left" valign="top">Public and precise attribution; alliance coordination with like-minded states</td>
</tr>
<tr>
<td align="left" valign="top">External stance</td>
<td align="left" valign="top">Digital sovereignty; strategic ambiguity; diversification</td>
<td align="left" valign="top">Transparency; norm and capacity building</td>
</tr>
<tr>
<td align="left" valign="top">CI protection</td>
<td align="left" valign="top">Multiple agencies; developing</td>
<td align="left" valign="top">Documented; legislative backing like Security of Critical Infrastructure Act 2018 (SOCI)</td>
</tr>
<tr>
<td align="left" valign="top">Foreign policy alignment</td>
<td align="left" valign="top">Non-aligned; hedging</td>
<td align="left" valign="top">U.S.-aligned; regional leadership</td>
</tr>
<tr>
<td align="left" valign="top">Main cybersecurity institutions</td>
<td align="left" valign="top">More fragmented; The National Security Council (NSC), The National Technology Regulatory Organization (NTRO), National Critical Information Infrastructure Protection Centre (NCIIPC), National Cyber Security Coordinator (NCSC).</td>
<td align="left" valign="top">More unified with Minister for Cyber Security; Australian Signals Directorate (ASD); different institutions Australian Cyber Security Centre (ACSC), Critical Infrastructure Security Centre (CISC)</td>
</tr>
</tbody>
</table>
</table-wrap>
<p>To put this with further details, India&#x2019;s responses to cyber coercion tactics reflect a &#x201C;<italic>diversity-driven ambiguity</italic>.&#x201D; This stance emphasizes both an ambiguous stance regarding its capabilities and intentions and an active cyber diplomacy approach grounded in strategic sovereignty, marked by multilateralism and diversification efforts. In other words, while the country seeks to advance its interests in cyberspace through institutional engagement and policy reforms, India also attempts to counter coercive actions by cautiously yet proactively participating in international cyber cooperation efforts with multiple parties, including both the Quad and the SCO.</p>
<p>On the other hand, this diversity encompasses not just India&#x2019;s international engagement preferences to address cyber coercion but also illustrates its institutional framework, which is fragmented among various parties and lacks coordinated, harmonious, or unified cyber leadership. It should be equally noted that India has a population almost 50 times larger than that of Australia, necessitating a more nuanced understanding of differences in digitalization rates, online population, attack surface, and, consequently, cybersecurity governance efforts.</p>
<p>India&#x2019;s cybersecurity focus extends beyond China to include other actors, especially Pakistan. This may explain its preference for ambiguity in responding to cyber coercion, which is not solely due to its non-alignment stance. The multiplicity of threat actors, institutional fragmentation, and cyber security leadership contribute to this approach. India&#x2019;s emphasis on strategic ambiguity and decentralized incident response reflects a broader strategy to maintain autonomy and avoid direct confrontation. The effort to evade direct attribution must consider India&#x2019;s unique threat assessment, influenced by historical conflicts with China, particularly the recent incident in Galwan Valley. This ambiguous position is shaped by both internal institutional dynamics and external confrontational landscape.</p>
<p>This approach significantly differs from Australia&#x2019;s &#x201C;<italic>alliance-driven transparency</italic>&#x201D; policy, characterized by a proactive and transparent methodology to counter cyber coercion, including a strong alignment with allies such as the U.S. and the Five Eyes intelligence alliance, demonstrating a strategic choice to bolster deterrence and collective security. The focus on transparency reflects Australia&#x2019;s approach not only in terms of its relative openness about offensive cyber capabilities, but also in its frequent public attributions of cyber incidents. As elaborated by Egloff and Smeets, public attribution is a tedious task necessitating strong intelligence capabilities, decision-making behind public attribution is complex, and it may also carry risks (<xref ref-type="bibr" rid="ref55">Egloff and Smeets, 2023</xref>).</p>
<p>In terms of its functions, beyond its immediate signaling purpose, Australia&#x2019;s assertive approach to public attribution and transparency may serve its broader strategic aims, such as norm development, reinforcing accountability, and articulating state behaviors in the evolving domain of cyber operations (<xref ref-type="bibr" rid="ref54">Egloff, 2020b</xref>). In terms of actor capacity, different than India, Australia&#x2019;s &#x201C;whole-of-economy&#x201D; threat intelligence network, built on strong public-private partnerships and its shared intelligence network with its allies, may also be an enabling factor for Australia&#x2019;s sharper position on public attribution (<xref ref-type="bibr" rid="ref66">Heiding et al., 2025</xref>). Unlike India, Australia has access to NATO-led cybersecurity initiatives, as it became a member of the NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) in 2018 and engages in NATO-led cyber exercises such as Locked Shields (<xref ref-type="bibr" rid="ref3">Austin, 2025</xref>). Overall, Australia&#x2019;s dedication to international cooperation and robust alliance partnerships influences its strategy for cyber deterrence based on precise attributions and incident response, especially in terms of information exchange and collaborative exercises.</p>
<p>Another factor making Australia&#x2019;s responses to cyber coercion distinct from India&#x2019;s is its focus on investing in cyber capacity building across the Indo-Pacific, not only in a technical sense, but also in terms of enhancing the region&#x2019;s ability to implement and institutionalize international norms (<xref ref-type="bibr" rid="ref87">Lewis, 2020</xref>). Australia&#x2019;s $26.2 million investment in the Cyber Rapid Assistance for Pacific Incidents and Disasters (Cyber RAPID) initiative (<xref ref-type="bibr" rid="ref22">Australian Government, 2025e</xref>), alongside $4.5 million to support cyber incident response efforts in Southeast Asia, exemplify its commitment to technical assistance. In parallel, the Australian Department of Foreign Affairs and Trade sponsors initiatives such as Cyber ASEAN, which aim to foster collaborative policymaking and normative convergence (<xref ref-type="bibr" rid="ref45">Cyber ASEAN, 2024</xref>).</p>
<p>So far, India&#x2019;s and Australia&#x2019;s divergent approaches have been conceptualized through the lenses of diversity-driven ambiguity and alliance-driven transparency to counter cyber coercion. What warrants further inquiry, however, is what drives these divergent strategies beyond explanations rooted in actors&#x2019; strategic culture or foreign policy orientation. There is a recent growing academic interest in how bureaucratic dynamics, especially between intelligence and military institutions, inform a state&#x2019;s strategic cybersecurity choices. For instance, Egloff and Smeets point out the intricacies behind the public attribution decision-making process, arguing that such decisions are shaped not only by inter-agency collaboration but also by competing viewpoints and institutional missions (<xref ref-type="bibr" rid="ref55">Egloff and Smeets, 2023</xref>). In addition, the framework proposed by <xref ref-type="bibr" rid="ref81">Kostyuk et al. (2025)</xref>, which suggests that when the military prevails, strategy tends to favor aggressive and assertive actions, whereas dominance by intelligence agencies leads to more discreet subversion and espionage, can also be applied to examine India&#x2019;s and Australia&#x2019;s strategic preferences in cyberspace.</p>
<p>As illustrated in <xref ref-type="table" rid="tab2">Table 2</xref>, in India, despite the presence of multiple actors, the national cybersecurity ecosystem is more fragmented and distributed across multiple agencies. While the NSC holds a strategic coordination role, operational leadership is largely concentrated in the NTRO, an intelligence-focused institution. Australia demonstrates stronger national cybersecurity leadership, reinforced by the creation of a dedicated Minister for Cyber Security. However, in terms of operational capabilities, the ASD and its sub-agency, the ACSC, take the lead. Unlike NTRO, ASD has a more hybrid character, it is a statutory agency reporting directly to the Minister for Defence under the Intelligence Services Act 2001. In addition to collecting foreign signals intelligence, it also supports the Australian Defence Force (ADF) by providing both intelligence and offensive cyber capabilities (<xref ref-type="bibr" rid="ref18">Australian Government, 2025a</xref>). In this respect, it may be reasonable to speculate that the dominance of intelligence agencies in India encourages strategic ambiguity, whereas Australia&#x2019;s institutional hybridity, which combines intelligence and defense within the ASD, enables a more assertive response to cyber coercion through public attribution and offensive signaling.</p>
<p>The final inquiry concerns how cyber coercion attempts and state responses interact over time. Drawing on event data from the Cyber Ops, EuRepoC, and Cyber Events, Chinese-originated cyberattacks on India and Australia between 2020 and 2025 show a significant increase, often aligned with major geopolitical flashpoints, such as the India&#x2013;China border dispute and the AUKUS security pact.</p>
<p>As illustrated in <xref ref-type="fig" rid="fig1">Figure 1</xref>, between 2010 and 2024, the pattern of incidents demonstrates a steady baseline of cyber activity, punctuated by noticeable surges that align closely with diplomatic and security crises. In the case of India, the Doklam standoff in 2017 and the Galwan Valley clashes in 2020 stand out as moments of heightened cyber pressure. During these years, Chinese-attributed operations targeted Indian defense, aerospace, and government institutions, reflecting Beijing&#x2019;s emphasis on intelligence collection during periods of military escalation. These operations enabled China to closely monitor India&#x2019;s strategic posture while maintaining plausible deniability.</p>
<fig position="float" id="fig1">
<label>Figure 1</label>
<caption>
<p>Timeline of cyber-attacks originating from China for India and Australia.</p>
</caption>
<graphic xlink:href="fpos-08-1748496-g001.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Line graph showing the number of reported incidents from two countries, India and Australia, between 2007 and 2022. Both display spikes after 2020.</alt-text>
</graphic>
</fig>
<p>A similar pattern emerges in Australia. Cyber operations attributed to China rose in the aftermath of Canberra&#x2019;s exclusion of Huawei from its 5G infrastructure in 2018 and again during the diplomatic rupture of 2020, when Australia called for an international inquiry into the origins of COVID-19. These campaigns extended beyond government targets to include telecommunications networks, universities, and media outlets, indicating an effort both to access sensitive information and to influence key sectors of public life.</p>
<p>This integrated evidence reinforces the notion that Chinese cyber operations against India and Australia are best understood as an extension of statecraft. The timing of operations suggests a deliberate effort to utilize cyberspace as a pressure valve during crises, projecting power, gathering intelligence, and influencing adversaries&#x2019; decision-making without escalating into overt military conflict. In this context, cyberspace becomes a domain where the geopolitical contest is both persistent and acutely responsive to moments of tension.</p>
<p>Finally, India&#x2019;s and Australia&#x2019;s divergent strategic responses should not be assessed solely by their capacity to prevent attacks, but also by their efforts to shape the cost and consequences of coercive cyber operations. As revealed in <xref ref-type="fig" rid="fig2">Figures 2</xref>, <xref ref-type="fig" rid="fig3">3</xref>, the absence of a visible decline in attack frequency suggests that the effectiveness of these responses lies not in elimination but in influencing the attackers&#x2019; calculus, through either strategic ambiguity or public attribution, to increase the cost and reduce the operational impact of cyber coercion.</p>
<fig position="float" id="fig2">
<label>Figure 2</label>
<caption>
<p>Chinese-originated cyber attacks on India (2020&#x2013;2025).</p>
</caption>
<graphic xlink:href="fpos-08-1748496-g002.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Line graph showing reported Chinese-originated cyber attacks on India from 2020 to 2024 from different databases. The post-2023 surge is  associated with key events such as the Galwan Valley clashes and persistent border tensions.</alt-text>
</graphic>
</fig>
<fig position="float" id="fig3">
<label>Figure 3</label>
<caption>
<p>Chinese-originated cyber attacks on Australia (2020&#x2013;2025).</p>
</caption>
<graphic xlink:href="fpos-08-1748496-g003.tif" mimetype="image" mime-subtype="tiff">
<alt-text content-type="machine-generated">Line graph showing reported Chinese-originated cyber attacks on Australia from 2020 to 2024 from various databases. The post-2023 surge is  associated with key events such as AUKUS agreement, stronger Australia&#x2013;US security ties.</alt-text>
</graphic>
</fig>
</sec>
<sec id="sec10">
<label>8</label>
<title>Cyber norms and governance in the Indo-Pacific order</title>
<p>After analyzing India&#x2019;s and Australia&#x2019;s strategic responses, it is imperative to assess how these align with the evolving cyber norms framework in the Indo-Pacific region. The Indo-Pacific region is increasingly at the forefront of global discourse on cyber norms and digital governance, as states seek to balance the competing imperatives of openness, national sovereignty, and the protection of critical infrastructures. This dynamic unfolds within an increasingly contested strategic environment, where cyber coercion has become a salient instrument in the geopolitical rivalry between major powers (<xref ref-type="bibr" rid="ref100">Murphy and Nagy, 2024</xref>).</p>
<p>In the Cold War era, norms played a pivotal role in establishing binding constraints between superpowers with fundamentally divergent worldviews. In the post-Cold War context, where deterrence has become increasingly complex and fragmented, norms can serve to delineate the boundaries of appropriate behavior in cyberspace (<xref ref-type="bibr" rid="ref126">Stevens, 2012</xref>). In a context where efficient deterrence against cyber coercion is not efficient, norms may serve as tools for making cyber coercion attempts more costly for the coercer or put shared thresholds for signalling.</p>
<p>However, the development of cyber norms is far from straightforward, as it often reflects underlying tensions between competing strategic interests. At the core of this evolving contest is a normative struggle between two dominant models: one that promotes an open, global, and interoperable Internet grounded in multistakeholder governance, and another that advocates for digital sovereignty, wherein states assert greater control over data flows and content regulation (<xref ref-type="bibr" rid="ref89">Liaropoulos, 2016</xref>; <xref ref-type="bibr" rid="ref109">Pohle and Santaniello, 2024</xref>). This normative divide is evident in diverging regional policies on data localization, cross-border information sharing, and harmonization of the cybersecurity standards and norms for state behaviors in the context of protecting critical infrastructure (<xref ref-type="bibr" rid="ref83">Kouloufakos, 2023</xref>).</p>
<p>A notable development within this contested environment is the emergence of the strategic engagement of the so-called middle power in Indo-Pacific. Countries such as Australia, India, Indonesia, Japan, South Korea, and Singapore are not merely responding to great power competition but are actively contributing to cyber norms implementation, institutional capacity building, and confidence-building measures in cyberspace. Numerous initiatives have emerged to foster cyber governance cooperation and strengthen collective resilience. Southeast Asian countries have articulated a regional vision through the ASEAN Cybersecurity Cooperation Strategy, which outlines priorities for regional capacity-building, voluntary adoption of UN Cyber Norms, and incident response coordination among member states (<xref ref-type="bibr" rid="ref2">ASEAN, 2022</xref>). This strategy leads to the establishment of the ASEAN Regional CERT to bolster coordinated response to cyber threats. ASEAN Regional Forum (ARF) Inter-Sessional Meeting (ISM) on Security of and in the Use of Information and Communication Technologies (ICTs) plays a pivotal role in advancing transparency, trust, and regional stability through cyber confidence-building measures between ASEAN and its external partners in Indo-Pacific. At the bilateral level, the U.S.-Indonesia maritime cyber partnership exemplifies how cyber capacity-building is being integrated into broader maritime and economic cooperation, with an emphasis on protecting undersea cables, port infrastructure, and maritime logistics systems (<xref ref-type="bibr" rid="ref133">US Department of Homeland Security, 2024</xref>).</p>
<p>Parallel efforts, such as Australia&#x2019;s Pacific Cyber Cooperation Partnership and Southeast Asia and Pacific Cyber (SEA-PAC) Program, provide targeted technical assistance, incident coordination mechanisms, and training opportunities for Southeast Asian and Pacific Island countries, particularly those with limited cybersecurity resources. These initiatives illustrate how middle powers seek to operationalize cyber norms in practice, mitigating coercive cyber behaviors by fostering transparency, resilience, and cooperative security in a region increasingly shaped by the strategic uses of cyberspace.</p>
<p>However, despite the momentum generated by these initiatives, critical structural gaps continue to impede the emergence of a robust and coherent framework for critical infrastructure protection in Indo-Pacific. Chief among these is the absence of binding international norms or legal instruments specifically dedicated to the protection of critical infrastructure, leaving key sectors such as energy, healthcare, and telecommunications exposed to malicious actors (<xref ref-type="bibr" rid="ref83">Kouloufakos, 2023</xref>).</p>
<p>The lack of a common framework for attributing cyber incidents also presents a significant challenge. Attribution requires the integration of technical, legal, and diplomatic processes, and without shared standards, coordinated responses to cyber threats remain limited and fragmented (<xref ref-type="bibr" rid="ref116">Rid and Buchanan, 2015</xref>). Compounding these vulnerabilities is the varying levels of preparedness of the private sector, which controls large segments of the region&#x2019;s critical infrastructures. Small and medium-sized enterprises (SMEs), in particular, often lack mature cybersecurity capabilities, financial resources, and compliance with regulations (<xref ref-type="bibr" rid="ref1">Alahmari and Duncan, 2020</xref>; <xref ref-type="bibr" rid="ref78">Kabanda et al., 2018</xref>). Without stronger public-private partnerships and greater regional alignment on baseline cybersecurity practices, the Indo-Pacific risks becoming increasingly disjointed in its approach to cyber resilience.</p>
<p>As digital interdependence deepens across the Indo-Pacific, reinforcing trust, interoperability, and collective preparedness will be vital to maintaining a secure and inclusive regional digital cyberspace. Achieving this vision will require not only sustained investments in capacity-building and technical cooperation but also renewed political will to advance cyber norm implementation to promote responsible state behavior, and capacity-building measures to manage cyber conflict and escalation risks (<xref ref-type="bibr" rid="ref67">Hitchens and Gallagher, 2019</xref>; <xref ref-type="bibr" rid="ref103">Nye, 2017</xref>).</p>
</sec>
<sec sec-type="conclusions" id="sec11">
<label>9</label>
<title>Conclusion</title>
<p>The geopolitical tensions and friction points of the Indo-Pacific are clearly evident in the cyber domain. The persistent and low-intensity cyber operations are shaping regional balances and subtly conveying certain strategic messages to the regional audience. In the realm of international relations literature, cyber coercion is defined as a form of signaling between states. Moving from Schelling&#x2019;s perspective to the contemporary context, cyber coercion operations are conducted in a gray zone where both the attacker and the attacked actor refrain from escalating the situation to a war-level conflict. Cyber operations, irrespective of their effectiveness, often remain below the threshold of armed conflict while simultaneously serving to exert influence and accomplish strategic objectives without engaging in an overt confrontation.</p>
<p>In this paper, by evaluating the core elements of the Chinese cyber doctrine embedded in the <italic>weishe</italic> doctrine, we conduct a comparative pattern identification of the responses of India and Australia to Chinese cyber coercion. Our analysis focuses on critical infrastructure as it represents a particularly salient domain of cyber coercion, not only because of its disruptive potential and capacity for strategic signaling, but also because contemporary Chinese cyber campaigns increasingly involve sustained peacetime activity aimed at positioning in critical assets for future crises and conflicts, thereby sustaining coercive impact (<xref ref-type="bibr" rid="ref58">Fischerkeller et al., 2025</xref>).</p>
<p>We further asserted that two significant actors in the Indo-Pacific, have developed distinct approaches to these challenges. Australia has extensively relied on international coalitions and collaborated with like-minded states, without refraining from making public attributions or signaling its offensive cyber capabilities. India&#x2019;s approach differs from Australia&#x2019;s stance. India prefers ambiguity and obscurity not only about its capabilities but also about its potential response options and strategic directions. These preferences are not stand-alone choices but rather reflect each country&#x2019;s foreign policy orientation and institutional dynamics: for India, the diversity model prioritizes flexibility (<xref ref-type="bibr" rid="ref29">Basu and Priyandita, 2025</xref>), whereas for Australia, the Five Eyes framework and close bilateral relations with the United States are central (<xref ref-type="bibr" rid="ref3">Austin, 2025</xref>).</p>
<p>In the ongoing scholarly discourse on cyber coercion, the evidence presented in this study also provides a novel perspective on Chinese cyber operations against India, Australia, and other actors. Our research on the volume of attacks and the tactics, techniques, and procedures (TTP) employed by the threat actors revealed that these cyber operations transcend the conventional boundaries of coercion or cyber coercion, presenting a distinct approach. Coercion typically involves explicit demands, a credible threat of punishment, and clear conditions for restraint. However, the documented Chinese operations do not fully align with this pattern. A closer examination of the Chinese strategy literature and their modus operandi facilitate the identification of the behavior as &#x201C;<italic>persistent pressure</italic>,&#x201D; which better encapsulates a broader strategy. In the face of persistent pressure, actors engage in a continuous and opportunistic exploitation of adversaries&#x2019; vulnerabilities, designed to maintain a state of strategic friction and domination.</p>
<p>A defining characteristic of these operations is the rapidity and scope with which Chinese threat actors exploit newly disclosed vulnerabilities. Unlike APTs that invest years in designing highly sophisticated, one-off malware campaigns such as Stuxnet, Chinese APTs are known to move within hours of public vulnerability announcements. They swiftly compromise multiple targets across sectors, including telecommunications networks, defense contractors, universities, and government agencies. This agility emerges as a certain characteristic of Chinese cyber threat actors. This approach prioritizes scalability over customization. Instead of developing bespoke tools to exert pressure on a single adversary in a crisis, Chinese operators seize every opportunity to penetrate exposed systems. Consequently, there is a continuous stream of intrusions, ensuring that rivals such as India and Australia remain in a perpetual state of cyber defense. They are constantly engaged in patching, investigating, and recovering from attacks.</p>
<p>Such activities generate persistent friction rather than discrete, coercive episodes (<xref ref-type="bibr" rid="ref57">Fischerkeller et al., 2022</xref>). This strategy maintains Beijing&#x2019;s position of initiative, compelling adversaries into reactive cycles that drain resources and attention. By relying on widely available exploits rather than highly distinctive malware, Chinese groups blur the distinction between state-sponsored and criminal activity, thereby reducing attribution clarity and avoiding escalation triggers. Notably, the absence of explicit demands does not render these operations strategically inconsequential. Conversely, the cumulative impact of continuous exploitation diminishes the resilience of Indian and Australian institutions, complicates policy responses, and guarantees that China retains informational and psychological advantages during periods of heightened geopolitical tension.</p>
<p>In this context, Chinese cyber operations are most accurately characterized as a doctrine of persistent cyber pressure. However, this approach does not disregard the extensive long-term preparation necessary for cyber operations by Chinese APTs. Instead, it endeavors to formulate a distinct type of operation within the cyber domain within the Indo-Pacific region. Rather than seeking immediate concessions through cyber coercion, they aim to gradually shape the strategic environment over time, embedding digital insecurity into the routine realities of their adversaries. This persistence, more than any singular crisis, underscores how cyberspace has emerged as a crucial domain of Chinese statecraft.</p>
</sec>
</body>
<back>
<sec sec-type="data-availability" id="sec12">
<title>Data availability statement</title>
<p>Publicly available datasets were analyzed in this study. This data can be found at: <xref ref-type="bibr" rid="ref38">CFR (2024</xref>, <xref ref-type="bibr" rid="ref39">2025</xref>), <xref ref-type="bibr" rid="ref56">EuRepoC (2025)</xref>, <xref ref-type="bibr" rid="ref131">University of Maryland (2025)</xref>, <xref ref-type="bibr" rid="ref129">UNIDIR (2025a</xref>,<xref ref-type="bibr" rid="ref130">b</xref>).</p>
</sec>
<sec sec-type="author-contributions" id="sec13">
<title>Author contributions</title>
<p>SB: Visualization, Conceptualization, Data curation, Supervision, Writing &#x2013; review &#x0026; editing, Project administration, Methodology, Writing &#x2013; original draft. AG: Writing &#x2013; review &#x0026; editing, Investigation, Writing &#x2013; original draft, Conceptualization, Formal analysis. AM: Writing &#x2013; review &#x0026; editing, Writing &#x2013; original draft, Validation, Formal analysis, Investigation.</p>
</sec>
<sec sec-type="COI-statement" id="sec14">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="sec15">
<title>Generative AI statement</title>
<p>The author(s) declared that Generative AI was not used in the creation of this manuscript.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p>
</sec>
<sec sec-type="disclaimer" id="sec16">
<title>Publisher&#x2019;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="ref1"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Alahmari</surname><given-names>A.</given-names></name> <name><surname>Duncan</surname><given-names>B.</given-names></name></person-group> (<year>2020</year>). &#x201C;<article-title>Cybersecurity risk Management in Small and Medium-Sized Enterprises: a systematic review of recent evidence</article-title>&#x201D; in <source>2020 international conference on cyber situational awareness, data analytics and assessment (CyberSA)</source>, <fpage>1</fpage>&#x2013;<lpage>5</lpage>.</mixed-citation></ref>
<ref id="ref2"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll1">ASEAN</collab></person-group> (<year>2022</year>). <source>The ASEAN cybersecurity cooperation strategy 2021&#x2013;2025</source> <publisher-name>ASEAN</publisher-name>. Available online at: <ext-link xlink:href="https://asean.org/wp-content/uploads/2022/02/01-ASEAN-Cybersecurity-Cooperation-Paper-2021-2025_final-23-0122.pdf" ext-link-type="uri">https://asean.org/wp-content/uploads/2022/02/01-ASEAN-Cybersecurity-Cooperation-Paper-2021-2025_final-23-0122.pdf</ext-link></mixed-citation></ref>
<ref id="ref3"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Austin</surname><given-names>G.</given-names></name></person-group> (<year>2025</year>) in <source>The Palgrave handbook on cyber diplomacy</source>. eds. <person-group person-group-type="editor"><name><surname>Christou</surname><given-names>G.</given-names></name> <name><surname>Vosse</surname><given-names>W.</given-names></name> <name><surname>Burton</surname><given-names>J.</given-names></name> <name><surname>Koops</surname><given-names>J. A.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer Nature Switzerland</publisher-name>), <fpage>613</fpage>&#x2013;<lpage>631</lpage>.</mixed-citation></ref>
<ref id="ref4"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll2">Australian Associated Press</collab></person-group>. <year>2023</year>. <article-title>DP world hack: port operator gradually restarting operations around Australia after cyber-attack</article-title>. <publisher-name>The Guardian</publisher-name>. Available online at: <ext-link xlink:href="https://www.theguardian.com/australia-news/2023/nov/13/australian-port-operator-hit-by-cyber-attack-says-cargo-may-be-stranded-for-days" ext-link-type="uri">https://www.theguardian.com/australia-news/2023/nov/13/australian-port-operator-hit-by-cyber-attack-says-cargo-may-be-stranded-for-days</ext-link></mixed-citation></ref>
<ref id="ref5"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll3">Australian Associated Press</collab></person-group> (<year>2025</year>). <article-title>The enhanced cyber security obligations framework</article-title>. Available online at: <ext-link xlink:href="https://www.cisc.gov.au/resources-subsite/Documents/cisc-factsheet-systems-of-national-significance-enhanced-cyber-security-obligations.pdf" ext-link-type="uri">https://www.cisc.gov.au/resources-subsite/Documents/cisc-factsheet-systems-of-national-significance-enhanced-cyber-security-obligations.pdf</ext-link></mixed-citation></ref>
<ref id="ref6"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll4">Australian Government</collab></person-group>. (<year>2019</year>). <source>Attribution of Chinese cyber-enabled commercial intellectual property theft</source> Available online at: <ext-link xlink:href="https://www.dfat.gov.au/international-relations/themes/cyber-affairs/Pages/attribution-of-msps-cyber-intrusions" ext-link-type="uri">https://www.dfat.gov.au/international-relations/themes/cyber-affairs/Pages/attribution-of-msps-cyber-intrusions</ext-link></mixed-citation></ref>
<ref id="ref7"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll5">Australian Government</collab></person-group> (<year>2020</year>) <source>Australia&#x2019;s cyber strategy</source></mixed-citation></ref>
<ref id="ref8"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll6">Australian Government</collab></person-group>. (<year>2021a</year>). <source>Digital economy strategy</source>. <publisher-name>Australian Government</publisher-name>. Available online at: <ext-link xlink:href="https://apo.org.au/sites/default/files/resource-files/2021-05/apo-nid312247.pdf" ext-link-type="uri">https://apo.org.au/sites/default/files/resource-files/2021-05/apo-nid312247.pdf</ext-link></mixed-citation></ref>
<ref id="ref9"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll7">Australian Government</collab></person-group>. (<year>2021b</year>). <source>Australia joins international partners in attribution of malicious cyber activity to China</source>. <publisher-name>Defence Ministers</publisher-name>. Available online at: <ext-link xlink:href="https://www.minister.defence.gov.au/statements/2021-07-19/australia-joins-international-partners-attribution-malicious-cyber-activity-china" ext-link-type="uri">https://www.minister.defence.gov.au/statements/2021-07-19/australia-joins-international-partners-attribution-malicious-cyber-activity-china</ext-link></mixed-citation></ref>
<ref id="ref10"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll8">Australian Government</collab></person-group> (<year>2022</year>). <source>REDSPICE: a blue print for ASD&#x2019;S capabilities</source> Available online at: <ext-link xlink:href="https://www.asd.gov.au/sites/default/files/2022-05/ASD-REDSPICE-Blueprint.pdf" ext-link-type="uri">https://www.asd.gov.au/sites/default/files/2022-05/ASD-REDSPICE-Blueprint.pdf</ext-link></mixed-citation></ref>
<ref id="ref11"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll9">Australian Government</collab></person-group>. (<year>2023a</year>). <source>2023&#x2013;2030 Australian cyber security strategy</source>.</mixed-citation></ref>
<ref id="ref12"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll10">Australian Government</collab></person-group>. (<year>2023b</year>). <source>Guidance Note&#x2014;Cyber sanctions</source>. Available online at: <ext-link xlink:href="https://www.dfat.gov.au/international-relations/guidance-note-cyber-sanctions" ext-link-type="uri">https://www.dfat.gov.au/international-relations/guidance-note-cyber-sanctions</ext-link></mixed-citation></ref>
<ref id="ref13"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll11">Australian Government</collab></person-group>. (<year>2024a</year>). <source>2023&#x2013;2024 cyber threat trends for critical infrastructure</source>. Available online at: <ext-link xlink:href="https://www.cyber.gov.au/sites/default/files/2024-11/2023-24-cyber-threat-trends-for-critical-infrastructure.pdf" ext-link-type="uri">https://www.cyber.gov.au/sites/default/files/2024-11/2023-24-cyber-threat-trends-for-critical-infrastructure.pdf</ext-link></mixed-citation></ref>
<ref id="ref14"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll12">Australian Government</collab></person-group>. (<year>2024b</year>). <source>Annual cyber threat report 2023&#x2013;2024</source> <publisher-name>Australian Signals Directorate</publisher-name> Available online at: <ext-link xlink:href="https://www.cyber.gov.au/sites/default/files/2024-11/asd-cyber-threat-report-2024.pdf" ext-link-type="uri">https://www.cyber.gov.au/sites/default/files/2024-11/asd-cyber-threat-report-2024.pdf</ext-link></mixed-citation></ref>
<ref id="ref15"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll13">Australian Government</collab></person-group>. (<year>2024c</year>). <source>APT40 advisory</source>. Available online at: <ext-link xlink:href="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/apt40-advisory-prc-mss-tradecraft-in-action" ext-link-type="uri">https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories/apt40-advisory-prc-mss-tradecraft-in-action</ext-link></mixed-citation></ref>
<ref id="ref16"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll14">Australian Government</collab></person-group>. (<year>2024d</year>). <source>APT40 advisory&#x2014;PRC MSS tradecraft in action</source>. Available online at: <ext-link xlink:href="https://www.cyber.gov.au/sites/default/files/2024-07/apt40-advisory-prc-mss-tradecraft-in-action.pdf" ext-link-type="uri">https://www.cyber.gov.au/sites/default/files/2024-07/apt40-advisory-prc-mss-tradecraft-in-action.pdf</ext-link></mixed-citation></ref>
<ref id="ref17"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll15">Australian Government</collab></person-group> <year>2024e</year> <source>Cyber security act</source> <publisher-name>Department of Home Affairs Website</publisher-name> Available online at: <ext-link xlink:href="https://www.homeaffairs.gov.au" ext-link-type="uri">https://www.homeaffairs.gov.au</ext-link></mixed-citation></ref>
<ref id="ref18"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll16">Australian Government</collab></person-group> (<year>2025a</year>). <source>About | Australian signals directorate</source>. Available online at: <ext-link xlink:href="https://www.asd.gov.au/about" ext-link-type="uri">https://www.asd.gov.au/about</ext-link></mixed-citation></ref>
<ref id="ref19"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll17">Australian Government</collab></person-group> (<year>2025b</year>). <article-title>ACSC-about us</article-title>. Available online at: <ext-link xlink:href="https://www.cyber.gov.au/about-us" ext-link-type="uri">https://www.cyber.gov.au/about-us</ext-link></mixed-citation></ref>
<ref id="ref20"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll18">Australian Government</collab></person-group> (<year>2025c</year>). <article-title>Australian signals directorate</article-title> Available online at: <ext-link xlink:href="https://www.asd.gov.au/about/who-we-are" ext-link-type="uri">https://www.asd.gov.au/about/who-we-are</ext-link></mixed-citation></ref>
<ref id="ref21"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll19">Australian Government</collab></person-group> (<year>2025d</year>). <article-title>Computer emergency response team Australia | directory</article-title> Available online at: <ext-link xlink:href="https://www.directory.gov.au/portfolios/defence/department-defence/computer-emergency-response-team-australia" ext-link-type="uri">https://www.directory.gov.au/portfolios/defence/department-defence/computer-emergency-response-team-australia</ext-link></mixed-citation></ref>
<ref id="ref22"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll20">Australian Government</collab></person-group> (<year>2025e</year>). <article-title>Cyber affairs and critical technology</article-title> Available online at: <ext-link xlink:href="https://www.dfat.gov.au/international-relations/themes/cyber-affairs-and-critical-technology" ext-link-type="uri">https://www.dfat.gov.au/international-relations/themes/cyber-affairs-and-critical-technology</ext-link></mixed-citation></ref>
<ref id="ref23"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Awasthi</surname><given-names>P.</given-names></name> <name><surname>Ganapati</surname><given-names>S.</given-names></name> <name><surname>Tai</surname><given-names>K. T.</given-names></name></person-group> (<year>2024</year>). <article-title>Digital transformation in a large democracy: the case of India</article-title>. <source>Asia Pac. J. Public Adm.</source> <volume>46</volume>, <fpage>326</fpage>&#x2013;<lpage>359</lpage>. doi: <pub-id pub-id-type="doi">10.1080/23276665.2024.2339874</pub-id></mixed-citation></ref>
<ref id="ref24"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Baldwin</surname><given-names>D. A.</given-names></name></person-group> (<year>2016</year>). <source>Power and international relations: a conceptual approach</source>: <publisher-name>Princeton University Press</publisher-name>.</mixed-citation></ref>
<ref id="ref25"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bandura</surname><given-names>R.</given-names></name> <name><surname>McLean</surname><given-names>M.</given-names></name> <name><surname>Smutny</surname><given-names>C.</given-names></name></person-group> (<year>2024</year>). <source>Approaches to digital public infrastructure in the global south</source> <publisher-name>CSIS</publisher-name>. Available online at: <ext-link xlink:href="https://www.csis.org/analysis/approaches-digital-public-infrastructure-global-south" ext-link-type="uri">https://www.csis.org/analysis/approaches-digital-public-infrastructure-global-south</ext-link></mixed-citation></ref>
<ref id="ref26"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Baram</surname><given-names>G.</given-names></name></person-group> (<year>2025</year>). <source>Chinese cyber skirmishes in the indo-Pacific show emerging patterns of conflict</source>. <publisher-name>The Strategist</publisher-name>. Available online at: <ext-link xlink:href="https://www.aspistrategist.org.au/chinese-cyber-skirmishes-in-the-indo-pacific-show-emerging-patterns-of-conflict/" ext-link-type="uri">https://www.aspistrategist.org.au/chinese-cyber-skirmishes-in-the-indo-pacific-show-emerging-patterns-of-conflict/</ext-link></mixed-citation></ref>
<ref id="ref27"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Basu</surname><given-names>A.</given-names></name></person-group> (<year>2022</year>). <source>India&#x2019;s international cyber operations: Tracing National Doctrine and capabilities</source>: <publisher-name>UNIDIR</publisher-name>.</mixed-citation></ref>
<ref id="ref28"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Basu</surname><given-names>A.</given-names></name></person-group> (<year>2024</year>). <source>International cyber incidents: On the question of public attribution</source>. <publisher-name>Orfonline.Org</publisher-name>. Available online at: <ext-link xlink:href="https://www.orfonline.org/research/international-cyber-incidents-on-the-question-of-public-attribution" ext-link-type="uri">https://www.orfonline.org/research/international-cyber-incidents-on-the-question-of-public-attribution</ext-link></mixed-citation></ref>
<ref id="ref29"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Basu</surname><given-names>A.</given-names></name> <name><surname>Priyandita</surname><given-names>G.</given-names></name></person-group> (<year>2025</year>). <source>India and Indonesia are managing cyber strategy and cyber diplomacy on their own terms</source>. <publisher-name>Binding Hook</publisher-name>. Available online at: <ext-link xlink:href="https://bindinghook.com/india-and-indonesia-are-managing-cyber-strategy-and-cyber-diplomacy-on-their-own-terms/" ext-link-type="uri">https://bindinghook.com/india-and-indonesia-are-managing-cyber-strategy-and-cyber-diplomacy-on-their-own-terms/</ext-link></mixed-citation></ref>
<ref id="ref30"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Beauchamp-Mustafaga</surname><given-names>N.</given-names></name> <name><surname>Grossman</surname><given-names>D.</given-names></name> <name><surname>Gunness</surname><given-names>K.</given-names></name> <name><surname>Chase</surname><given-names>M. S.</given-names></name> <name><surname>Black</surname><given-names>M.</given-names></name> <name><surname>Simmons-Thomas</surname><given-names>N. D.</given-names></name></person-group> <year>2021</year> <source>Deciphering Chinese deterrence Signalling in the new era: an analytic framework and seven case studies</source>. Available online at: <ext-link xlink:href="https://www.rand.org/pubs/research_reports/RRA1074-1.html" ext-link-type="uri">https://www.rand.org/pubs/research_reports/RRA1074-1.html</ext-link></mixed-citation></ref>
<ref id="ref31"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bharadwaj</surname><given-names>T.</given-names></name></person-group> (<year>2025</year>). <source>Mapping India&#x2019;s cybersecurity administration in 2025</source>. <publisher-name>Carnegie Endowment for International Peace</publisher-name>. Available online at: <ext-link xlink:href="https://carnegieendowment.org/research/2025/09/mapping-indias-cybersecurity-administration-in-2025?lang=en" ext-link-type="uri">https://carnegieendowment.org/research/2025/09/mapping-indias-cybersecurity-administration-in-2025?lang=en</ext-link></mixed-citation></ref>
<ref id="ref32"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Bommakanti</surname><given-names>K.</given-names></name></person-group> (<year>2022</year>). <source>Chinese cyberattacks against Ladakh electricity grid: A d&#x00E9;j&#x00E0; vu</source>. <publisher-name>Orfonline.Org</publisher-name>. Available online at: <ext-link xlink:href="https://www.orfonline.org/expert-speak/chinese-cyberattacks-against-ladakh-electricity-grid" ext-link-type="uri">https://www.orfonline.org/expert-speak/chinese-cyberattacks-against-ladakh-electricity-grid</ext-link></mixed-citation></ref>
<ref id="ref33"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Borghard</surname><given-names>E. D.</given-names></name> <name><surname>Lonergan</surname><given-names>S. W.</given-names></name></person-group> (<year>2017</year>). <article-title>The logic of coercion in cyberspace</article-title>. <source>Secur. Stud.</source> <volume>26</volume>, <fpage>452</fpage>&#x2013;<lpage>481</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09636412.2017.1306396</pub-id></mixed-citation></ref>
<ref id="ref34"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Borrett</surname><given-names>C.</given-names></name> <name><surname>Bund</surname><given-names>J.</given-names></name> <name><surname>Bendiek</surname><given-names>A.</given-names></name> <name><surname>Zettl-Schabath</surname><given-names>K.</given-names></name> <name><surname>M&#x00FC;ller</surname><given-names>M.</given-names></name></person-group>  (<year>2024</year>). <source>Critical infrastructure cyberattack monitor (version V1.0) SWP</source>.</mixed-citation></ref>
<ref id="ref35"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Buchanan</surname><given-names>J.</given-names></name> <name><surname>Corera</surname><given-names>E.</given-names></name></person-group> (<year>2025</year>). <source>In case we forgot, typhoon attacks remind us of China&#x2019;s cyber capability&#x2014;and intent</source>. <publisher-name>The Strategist</publisher-name>. Available online at: <ext-link xlink:href="https://www.aspistrategist.org.au/in-case-we-forgot-typhoon-attacks-remind-us-of-chinas-capability-and-intent/" ext-link-type="uri">https://www.aspistrategist.org.au/in-case-we-forgot-typhoon-attacks-remind-us-of-chinas-capability-and-intent/</ext-link></mixed-citation></ref>
<ref id="ref36"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll21">CAC</collab></person-group>. (<year>2022</year>). <source>Guiding opinions of the state council on strengthening the construction of digital government</source>. <publisher-name>Central Cyberspace Administration of China</publisher-name>. Available online at: <ext-link xlink:href="https://www.cac.gov.cn/2022-06/23/c_1657599988283555.htm" ext-link-type="uri">https://www.cac.gov.cn/2022-06/23/c_1657599988283555.htm</ext-link></mixed-citation></ref>
<ref id="ref37"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll22">Center for Global Security Research</collab></person-group> (<year>2022</year>). <source>Strategy and statecraft in cyberspace</source> Available online at: <ext-link xlink:href="https://cgsr.llnl.gov/sites/cgsr/files/2024-08/Workshop-Summary-Strategy-and-Statecraft-in-Cyberspace.pdf" ext-link-type="uri">https://cgsr.llnl.gov/sites/cgsr/files/2024-08/Workshop-Summary-Strategy-and-Statecraft-in-Cyberspace.pdf</ext-link></mixed-citation></ref>
<ref id="ref38"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll23">CFR</collab></person-group> (<year>2024</year>). <source>Targeting of Indian aerospace, defense, and government sectors</source> Available online at: <ext-link xlink:href="https://www.cfr.org/cyber-operations/targeting-indian-aerospace-defense-and-government-sectors" ext-link-type="uri">https://www.cfr.org/cyber-operations/targeting-indian-aerospace-defense-and-government-sectors</ext-link></mixed-citation></ref>
<ref id="ref39"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll24">CFR</collab></person-group> (<year>2025</year>). <source>Cyber operations tracker</source> Available online at: <ext-link xlink:href="https://www.cfr.org/cyber-operations" ext-link-type="uri">https://www.cfr.org/cyber-operations</ext-link></mixed-citation></ref>
<ref id="ref40"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Chen</surname><given-names>J. Q.</given-names></name> <name><surname>Dinerman</surname><given-names>A.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Cyber capabilities in modern warfare</article-title>&#x201D; in <source>Cyber security: Power and technology</source>. eds. <person-group person-group-type="editor"><name><surname>Lehto</surname><given-names>M.</given-names></name> <name><surname>Neittaanm&#x00E4;ki</surname><given-names>P.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>21</fpage>&#x2013;<lpage>30</lpage>.</mixed-citation></ref>
<ref id="ref41"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Cheng</surname><given-names>D.</given-names></name></person-group> (<year>2011</year>) <article-title>Chinese views on deterrence</article-title> <source>Joint Force Q.</source> <volume>60</volume> <fpage>92</fpage>&#x2013;<lpage>94</lpage>. Available online at: <ext-link xlink:href="https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-60/jfq-60_92-94_Cheng.pdf" ext-link-type="uri">https://ndupress.ndu.edu/Portals/68/Documents/jfq/jfq-60/jfq-60_92-94_Cheng.pdf</ext-link></mixed-citation></ref>
<ref id="ref42"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll25">CISA</collab></person-group> (<year>2023</year>). <source>People&#x2019;s republic of China state-sponsored cyber actor living off the land to evade detection</source> Available online at: <ext-link xlink:href="https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a" ext-link-type="uri">https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-144a</ext-link></mixed-citation></ref>
<ref id="ref43"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll26">CSO Online</collab></person-group> (<year>2024</year>). <source>PM names new cybersecurity minister</source> Available online at: <ext-link xlink:href="https://www.csoonline.com/article/3478227/pm-names-new-cybersecurity-minister.html" ext-link-type="uri">https://www.csoonline.com/article/3478227/pm-names-new-cybersecurity-minister.html</ext-link></mixed-citation></ref>
<ref id="ref44"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cunningham</surname><given-names>F. S.</given-names></name></person-group> (<year>2022</year>). <article-title>Strategic substitution: China&#x2019;s search for coercive leverage in the information age</article-title>. <source>Int. Secur.</source> <volume>47</volume>, <fpage>46</fpage>&#x2013;<lpage>92</lpage>. doi: <pub-id pub-id-type="doi">10.1162/isec_a_00438</pub-id></mixed-citation></ref>
<ref id="ref45"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll27">Cyber ASEAN</collab></person-group> (<year>2024</year>). Cyber ASEAN Available online at: <ext-link xlink:href="https://cyberasean.pacforum.org/cyber-asean" ext-link-type="uri">https://cyberasean.pacforum.org/cyber-asean</ext-link></mixed-citation></ref>
<ref id="ref46"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll28">Cyber Policy Portal</collab></person-group> (<year>2025</year>) India Available online at: <ext-link xlink:href="https://cyberpolicyportal.org/states/india" ext-link-type="uri">https://cyberpolicyportal.org/states/india</ext-link></mixed-citation></ref>
<ref id="ref47"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll29">CYFIRMA</collab></person-group> (<year>2025</year>). APT PROFILE: transparent tribe aka APT36. CYFIRMA Available online at: <ext-link xlink:href="https://www.cyfirma.com/research/apt-profile-transparent-tribe-aka-apt36/" ext-link-type="uri">https://www.cyfirma.com/research/apt-profile-transparent-tribe-aka-apt36/</ext-link></mixed-citation></ref>
<ref id="ref48"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll30">Data Security Council of India (DSCI)</collab></person-group> (<year>2025</year>). <source>India cyber threat report. Data security Council of India (DSCI)</source> Available online at: <ext-link xlink:href="https://www.dsci.in" ext-link-type="uri">https://www.dsci.in</ext-link></mixed-citation></ref>
<ref id="ref49"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Debates</surname><given-names>R.</given-names></name></person-group> (<year>2025</year>). <source>Indo-Pacific responses to Chinese cyber hegemony</source>. <publisher-name>Orfonline.Org</publisher-name> Available online at: <ext-link xlink:href="https://www.orfonline.org/expert-speak/indo-pacific-responses-to-chinese-cyber-hegemony" ext-link-type="uri">https://www.orfonline.org/expert-speak/indo-pacific-responses-to-chinese-cyber-hegemony</ext-link></mixed-citation></ref>
<ref id="ref50"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Devanny</surname><given-names>J.</given-names></name> <name><surname>Laudrain</surname><given-names>A. P. B.</given-names></name></person-group> (<year>2025</year>) <source>Interpreting India&#x2019;s cyber statecraft. Carnegie endowment for international peace</source> Available online at: <ext-link xlink:href="https://carnegie-production-assets.s3.amazonaws.com/static/files/Devanny_India%20Cyber%20Statecraft.pdf" ext-link-type="uri">https://carnegie-production-assets.s3.amazonaws.com/static/files/Devanny_India%20Cyber%20Statecraft.pdf</ext-link></mixed-citation></ref>
<ref id="ref51"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll31">DHS</collab></person-group> (<year>2025</year>) <source>Secure cyberspace and critical infrastructure</source> Available online at: <ext-link xlink:href="https://www.dhs.gov/archive/secure-cyberspace-and-critical-infrastructure" ext-link-type="uri">https://www.dhs.gov/archive/secure-cyberspace-and-critical-infrastructure</ext-link></mixed-citation></ref>
<ref id="ref52"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll32">Dragonfly Intelligence</collab></person-group> (<year>2025</year>). <source>India / Pakistan | tit-for-tat cyber operations likely. Dragonfly intelligence</source> Available online at: <ext-link xlink:href="https://dragonflyintelligence.com/news/india-pakistan-tit-for-tat-cyber-operations-likely/" ext-link-type="uri">https://dragonflyintelligence.com/news/india-pakistan-tit-for-tat-cyber-operations-likely/</ext-link></mixed-citation></ref>
<ref id="ref53"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Egloff</surname><given-names>F. J.</given-names></name></person-group> (<year>2020a</year>). <article-title>Public attribution of cyber intrusions</article-title>. <source>J. Cybersecur.</source> <volume>6</volume>:<fpage>tyaa012</fpage>. doi: <pub-id pub-id-type="doi">10.1093/cybsec/tyaa012</pub-id></mixed-citation></ref>
<ref id="ref54"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Egloff</surname><given-names>F. J.</given-names></name></person-group> (<year>2020b</year>). <source>Why do states publicly attribute cyber intrusions? | Council on Foreign Relations</source>. <publisher-name>CFR</publisher-name> Available online at: <ext-link xlink:href="https://www.cfr.org/blog/why-do-states-publicly-attribute-cyber-intrusions" ext-link-type="uri">https://www.cfr.org/blog/why-do-states-publicly-attribute-cyber-intrusions</ext-link></mixed-citation></ref>
<ref id="ref55"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Egloff</surname><given-names>F. J.</given-names></name> <name><surname>Smeets</surname><given-names>M.</given-names></name></person-group> (<year>2023</year>). <article-title>Publicly attributing cyber-attacks: a framework</article-title>. <source>J. Strateg. Stud.</source> <volume>46</volume>, <fpage>502</fpage>&#x2013;<lpage>533</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01402390.2021.1895117</pub-id></mixed-citation></ref>
<ref id="ref56"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll33">EuRepoC</collab></person-group> (<year>2025</year>) <article-title>EuRepoC. EuRepoC: European repository of cyber incidents</article-title> Available online at: <ext-link xlink:href="https://eurepoc.eu/about-us/" ext-link-type="uri">https://eurepoc.eu/about-us/</ext-link></mixed-citation></ref>
<ref id="ref57"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Fischerkeller</surname><given-names>M. P.</given-names></name> <name><surname>Goldman</surname><given-names>E. O.</given-names></name> <name><surname>Harknett</surname><given-names>R. J.</given-names></name></person-group> (<year>2022</year>). <source>Cyber persistence theory: Redefining National Security in cyberspace</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref>
<ref id="ref58"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Fischerkeller</surname><given-names>M.</given-names></name> <name><surname>Goldman</surname><given-names>E.</given-names></name> <name><surname>Harknett</surname><given-names>R.</given-names></name></person-group> (<year>2025</year>). <source>Setting the stage: Cyber contingency campaigning</source>. <publisher-name>Lawfare</publisher-name>. Available online at: <ext-link xlink:href="https://www.lawfaremedia.org/article/setting-the-stage--cyber-contingency-campaigning" ext-link-type="uri">https://www.lawfaremedia.org/article/setting-the-stage--cyber-contingency-campaigning</ext-link></mixed-citation></ref>
<ref id="ref59"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Gomez</surname><given-names>M. A.</given-names></name></person-group>. (<year>2018</year>). <source>Coercion and cyberspace</source>. <publisher-name>Elcano Royal Institute</publisher-name>. Available online at: <ext-link xlink:href="https://www.realinstitutoelcano.org/en/analyses/coercion-and-cyberspace/" ext-link-type="uri">https://www.realinstitutoelcano.org/en/analyses/coercion-and-cyberspace/</ext-link></mixed-citation></ref>
<ref id="ref60"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gomez</surname><given-names>M. A.</given-names></name></person-group> (<year>2022</year>). <article-title>Tracing strategic preferences in cyberspace: the role of regional and domestic strategic culture</article-title>. <source>Comp. Strateg.</source> <volume>42</volume>, <fpage>103</fpage>&#x2013;<lpage>127</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01495933.2022.2111912</pub-id></mixed-citation></ref>
<ref id="ref61"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll34">Government of India</collab></person-group> (<year>2025</year>). <source>Digital India. Digital India | leading the transformation in India for ease of living and digital economy | MeitY</source>, <publisher-name>Government of India</publisher-name> Available online at: <ext-link xlink:href="https://www.digitalindia.gov.in/growth-story/" ext-link-type="uri">https://www.digitalindia.gov.in/growth-story/</ext-link></mixed-citation></ref>
<ref id="ref62"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Grove</surname><given-names>C.</given-names></name></person-group> (<year>2024</year>). <source>Living off the land: The silent cyber threat to critical infrastructure</source>. <publisher-name>The Strategist</publisher-name>. Available online at: <ext-link xlink:href="https://www.aspistrategist.org.au/living-off-the-land-the-silent-cyber-threat-to-critical-infrastructure/" ext-link-type="uri">https://www.aspistrategist.org.au/living-off-the-land-the-silent-cyber-threat-to-critical-infrastructure/</ext-link></mixed-citation></ref>
<ref id="ref63"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Grunzweig</surname><given-names>Josh</given-names></name> <name><surname>Miller-Osborn</surname><given-names>Jen</given-names></name></person-group>. (<year>2017</year>). <article-title>MenuPass returns with new malware and new attacks against Japanese academics and organizations</article-title>. <source>Unit 42</source>. Available online at: <ext-link xlink:href="https://unit42.paloaltonetworks.com/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/" ext-link-type="uri">https://unit42.paloaltonetworks.com/unit42-menupass-returns-new-malware-new-attacks-japanese-academics-organizations/</ext-link></mixed-citation></ref>
<ref id="ref64"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Handler</surname><given-names>S.</given-names></name></person-group> (<year>2023</year>). <source>The 5&#x00D7;5&#x2014;China&#x2019;s cyber operations</source>. <publisher-name>Atlantic Council</publisher-name>. Available online at: <ext-link xlink:href="https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-chinas-cyber-operations/" ext-link-type="uri">https://www.atlanticcouncil.org/content-series/the-5x5/the-5x5-chinas-cyber-operations/</ext-link></mixed-citation></ref>
<ref id="ref65"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll35">Harvard University</collab></person-group> (<year>2022</year>). <source>National Cyber Power Index 2022</source> <publisher-name>Harvard University Belfer Center for Science and International Affairs</publisher-name> Available online at: <ext-link xlink:href="https://www.belfercenter.org/publication/national-cyber-power-index-2022" ext-link-type="uri">https://www.belfercenter.org/publication/national-cyber-power-index-2022</ext-link></mixed-citation></ref>
<ref id="ref66"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Heiding</surname><given-names>D. F.</given-names></name> <name><surname>O&#x2019;Neill</surname><given-names>A.</given-names></name> <name><surname>Price</surname><given-names>L.</given-names></name></person-group> (<year>2025</year>). <source>Cybersecurity strategy scorecard</source> <publisher-name>Harvard University Belfer Center for Science and International Affairs</publisher-name> Available online at: <ext-link xlink:href="https://www.belfercenter.org/sites/default/files/2025-03/Cyber%2520Strategy%2520Scorecard_3.1.pdf" ext-link-type="uri">https://www.belfercenter.org/sites/default/files/2025-03/Cyber%2520Strategy%2520Scorecard_3.1.pdf</ext-link></mixed-citation></ref>
<ref id="ref67"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hitchens</surname><given-names>T.</given-names></name> <name><surname>Gallagher</surname><given-names>N. W.</given-names></name></person-group> (<year>2019</year>). <article-title>Building confidence in the cybersphere: a path to multilateral progress</article-title>. <source>J. Cyber Policy</source> <volume>4</volume>, <fpage>4</fpage>&#x2013;<lpage>21</lpage>. doi: <pub-id pub-id-type="doi">10.1080/23738871.2019.1599032</pub-id></mixed-citation></ref>
<ref id="ref68"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Hodgson</surname><given-names>Q. E.</given-names></name></person-group> (<year>2018</year>). &#x201C;<article-title>Understanding and countering cyber coercion</article-title>&#x201D; in <source>2018 10th international conference on cyber conflict (CyCon)</source>, <fpage>73</fpage>&#x2013;<lpage>88</lpage>. doi: <pub-id pub-id-type="doi">10.23919/CYCON.2018.8405011</pub-id></mixed-citation></ref>
<ref id="ref69"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hodgson</surname><given-names>Q. E.</given-names></name></person-group> (<year>2024</year>). <article-title>Cyber coercion as a tool of statecraft: how often, how effective?</article-title> In <source>Research handbook on cyberwarfare</source>. <publisher-name>Elgar</publisher-name>. Available online at: <ext-link xlink:href="https://www.elgaronline.com/edcollchap/book/9781803924854/book-part-9781803924854-23.xml" ext-link-type="uri">https://www.elgaronline.com/edcollchap/book/9781803924854/book-part-9781803924854-23.xml</ext-link></mixed-citation></ref>
<ref id="ref70"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hodgson</surname><given-names>Q. E.</given-names></name> <name><surname>Ma</surname><given-names>L.</given-names></name> <name><surname>Marcinek</surname><given-names>K.</given-names></name> <name><surname>Schwindt</surname><given-names>K.</given-names></name></person-group> (<year>2019</year>). <article-title>Fighting shadows in the dark: understanding and countering coercion in cyberspace</article-title>. <publisher-name>RAND Corporation</publisher-name>. Available online at: <ext-link xlink:href="https://www.rand.org/pubs/research_reports/RR2961.html" ext-link-type="uri">https://www.rand.org/pubs/research_reports/RR2961.html</ext-link></mixed-citation></ref>
<ref id="ref71"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hogeveen</surname><given-names>B.</given-names></name></person-group> (<year>2023</year>). <source>The future of cyber warfare in the indo-Pacific</source> <publisher-name>Observer Research Foundation</publisher-name> Available online at: <ext-link xlink:href="https://www.orfonline.org/research/the-future-of-cyber-warfare-in-the-indo-pacific" ext-link-type="uri">https://www.orfonline.org/research/the-future-of-cyber-warfare-in-the-indo-pacific</ext-link></mixed-citation></ref>
<ref id="ref72"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Holm</surname><given-names>L.</given-names></name></person-group> (<year>2017</year>). <article-title>Cyber-attacks &#x0026; coercion in the digital era a qualitative case analysis of the north Korean cyber-attack on Sony pictures</article-title>. <publisher-name>Uppsala University</publisher-name>. Available online at: <ext-link xlink:href="https://www.diva-portal.org/smash/get/diva2:1106765/FULLTEXT01.pdf" ext-link-type="uri">https://www.diva-portal.org/smash/get/diva2:1106765/FULLTEXT01.pdf</ext-link></mixed-citation></ref>
<ref id="ref73"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Hunter</surname><given-names>F.</given-names></name> <name><surname>Impiombato</surname><given-names>D.</given-names></name> <name><surname>Lau</surname><given-names>Y.</given-names></name> <name><surname>Triggs</surname><given-names>A.</given-names></name> <name><surname>Zhang</surname><given-names>A.</given-names></name> <name><surname>Deb</surname><given-names>U.</given-names></name></person-group> (<year>2023</year>). <source>Countering China&#x2019;s coercive diplomacy</source> <publisher-name>ASPI</publisher-name> Available online at: <ext-link xlink:href="https://ad-aspi.s3.ap-southeast-2.amazonaws.com/2023-02/Countering%20Chinas%20coercive%20diplomacy_1.pdf?VersionId=HZDwezgnFY5eitQqtEMEU7WuFci8S75z" ext-link-type="uri">https://ad-aspi.s3.ap-southeast-2.amazonaws.com/2023-02/Countering%20Chinas%20coercive%20diplomacy_1.pdf?VersionId=HZDwezgnFY5eitQqtEMEU7WuFci8S75z</ext-link></mixed-citation></ref>
<ref id="ref74"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll36">IISS</collab></person-group> (<year>2021</year>). <source>India</source> <article-title>The International Institute for Strategic Studies</article-title> Available online at: <ext-link xlink:href="https://www.iiss.org/globalassets/media-library---content--migration/files/research-papers/cyber-power-report/cyber-capabilities-and-national-power---india.pdf" ext-link-type="uri">https://www.iiss.org/globalassets/media-library---content--migration/files/research-papers/cyber-power-report/cyber-capabilities-and-national-power---india.pdf</ext-link></mixed-citation></ref>
<ref id="ref75"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll37">Insikt Group&#x00AE;</collab></person-group>. (<year>2021</year>). <source>From coercion to invasion: The theory and execution of China&#x2019;s cyber activity in Cross-Strait relations</source>. Available online at: <ext-link xlink:href="https://www.recordedfuture.com/fr/research/from-coercion-to-invasion-the-theory-and-execution-of-china-cyber-activity" ext-link-type="uri">https://www.recordedfuture.com/fr/research/from-coercion-to-invasion-the-theory-and-execution-of-china-cyber-activity</ext-link></mixed-citation></ref>
<ref id="ref76"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll38">ITU</collab></person-group> (<year>2024</year>). <source>Global cybersecurity index 5th edition</source> <publisher-name>International Telecommunication Union (ITU)</publisher-name> Available online at: <ext-link xlink:href="https://www.itu.int/dms_pub/itu-d/opb/hdb/d-hdb-gci.01-2024-pdf-e.pdf" ext-link-type="uri">https://www.itu.int/dms_pub/itu-d/opb/hdb/d-hdb-gci.01-2024-pdf-e.pdf</ext-link></mixed-citation></ref>
<ref id="ref77"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Jensen</surname><given-names>B.</given-names></name> <name><surname>Valeriano</surname><given-names>B.</given-names></name> <name><surname>Maness</surname><given-names>R. C.</given-names></name></person-group> (<year>2017</year>). <source>Cyber Compellence: Applying coercion in the information age</source>. Available online at: <ext-link xlink:href="https://www.semanticscholar.org/paper/Cyber-Compellence-%3A-Applying-Coercion-in-the-Age-Jensen/aad808b706370ec473f47b9159e1026bdda0c4a0" ext-link-type="uri">https://www.semanticscholar.org/paper/Cyber-Compellence-%3A-Applying-Coercion-in-the-Age-Jensen/aad808b706370ec473f47b9159e1026bdda0c4a0</ext-link></mixed-citation></ref>
<ref id="ref78"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kabanda</surname><given-names>S.</given-names></name> <name><surname>Tanner</surname><given-names>M.</given-names></name> <name><surname>Kent</surname><given-names>C.</given-names></name></person-group> (<year>2018</year>). <article-title>Exploring SME cybersecurity practices in developing countries</article-title>. <source>J. Organ. Comput. Electron. Commer.</source> <volume>28</volume>, <fpage>269</fpage>&#x2013;<lpage>282</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10919392.2018.1484598</pub-id></mixed-citation></ref>
<ref id="ref79"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Kania</surname><given-names>E.</given-names></name></person-group> (<year>2015</year>). <source>China: Active defense in the cyber domain</source> <publisher-name>The Diplomat</publisher-name> Available online at: <ext-link xlink:href="https://thediplomat.com/2015/06/china-active-defense-in-the-cyber-domain/" ext-link-type="uri">https://thediplomat.com/2015/06/china-active-defense-in-the-cyber-domain/</ext-link></mixed-citation></ref>
<ref id="ref001"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Katagiri</surname><given-names>N.</given-names></name></person-group> (<year>2024</year>). <article-title>Advanced persistent threats and the &#x201C;big four&#x201D;: State-sponsored hackers in China, Iran, Russia, and North Korea in 2003&#x2013;2021</article-title>. <source>Comp. Strategy.</source> <volume>43</volume>, <fpage>280</fpage>&#x2013;<lpage>299</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01495933.2024.2317251</pub-id></mixed-citation></ref>
<ref id="ref80"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Kost</surname><given-names>E.</given-names></name></person-group> (<year>2025</year>). <source>13 biggest data breaches in Australia</source>. Available online at: <ext-link xlink:href="https://www.upguard.com/blog/biggest-data-breaches-australia" ext-link-type="uri">https://www.upguard.com/blog/biggest-data-breaches-australia</ext-link></mixed-citation></ref>
<ref id="ref81"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kostyuk</surname><given-names>N.</given-names></name> <name><surname>Perkoski</surname><given-names>E.</given-names></name> <name><surname>Poznansky</surname><given-names>M.</given-names></name></person-group> (<year>2025</year>). <article-title>The bureaucratic politics of cyber strategy</article-title>. <source>J. Glob. Secur. Stud.</source> <volume>10</volume>:<fpage>ogaf007</fpage>. doi: <pub-id pub-id-type="doi">10.1093/jogss/ogaf007</pub-id></mixed-citation></ref>
<ref id="ref82"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Kostyuk</surname><given-names>N.</given-names></name> <name><surname>Zhukov</surname><given-names>Y. M.</given-names></name></person-group> <year>2019</year> <article-title>Invisible digital front: can cyber attacks shape battlefield events?</article-title> <source>J. Confl. Resolut.</source> <volume>63</volume>  <fpage>317</fpage>&#x2013;<lpage>347</lpage>. Available online at: <ext-link xlink:href="https://www.jstor.org/stable/48596899" ext-link-type="uri">https://www.jstor.org/stable/48596899</ext-link></mixed-citation></ref>
<ref id="ref83"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Kouloufakos</surname><given-names>T.</given-names></name></person-group> (<year>2023</year>). <article-title>Untangling the cyber norm to protect critical infrastructures</article-title>. <source>Comput. Law Secur. Rev.</source> <volume>49</volume>:<fpage>105809</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.clsr.2023.105809</pub-id></mixed-citation></ref>
<ref id="ref84"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Kramer</surname><given-names>F.</given-names></name> <name><surname>Starr</surname><given-names>S. H.</given-names></name> <name><surname>Wentz</surname><given-names>L.</given-names></name></person-group> (<year>2009</year>). <source>Cyberpower and national security (Illustrated edition)</source>. <publisher-loc>Washington, DC</publisher-loc>: <publisher-name>POTOMAC Books</publisher-name>.</mixed-citation></ref>
<ref id="ref85"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Kuo</surname><given-names>M. A.</given-names></name></person-group> (<year>2024</year>). <source>China&#x2019;s cybersecurity and statecraft</source> <publisher-name>The Diplomat</publisher-name> Available online at: <ext-link xlink:href="https://thediplomat.com/2024/02/chinas-cybersecurity-and-statecraft/" ext-link-type="uri">https://thediplomat.com/2024/02/chinas-cybersecurity-and-statecraft/</ext-link></mixed-citation></ref>
<ref id="ref86"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Lemos</surname><given-names>R.</given-names></name></person-group> (<year>2025</year>). <source>India is top global target for hacktivists, regional APTs</source> Available online at: <ext-link xlink:href="https://www.darkreading.com/cyber-risk/india-tops-global-targets-hactivists-regional-apt" ext-link-type="uri">https://www.darkreading.com/cyber-risk/india-tops-global-targets-hactivists-regional-apt</ext-link></mixed-citation></ref>
<ref id="ref87"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Lewis</surname><given-names>J. A.</given-names></name></person-group> (<year>2020</year>). <source>Cyber stability, conflict prevention, and capacity building</source> <publisher-name>CSIS</publisher-name> Available online at: <ext-link xlink:href="https://www.csis.org/analysis/cyber-stability-conflict-prevention-and-capacity-building" ext-link-type="uri">https://www.csis.org/analysis/cyber-stability-conflict-prevention-and-capacity-building</ext-link></mixed-citation></ref>
<ref id="ref88"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Liang</surname><given-names>Q.</given-names></name> <name><surname>Xiangsui</surname><given-names>W.</given-names></name></person-group> (<year>1999</year>). <source>Unrestricted warfare</source>. <publisher-loc>Beijing</publisher-loc>: <publisher-name>PLA Literature and Arts Publishing House</publisher-name>.</mixed-citation></ref>
<ref id="ref89"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Liaropoulos</surname><given-names>A.</given-names></name></person-group> <year>2016</year> <article-title>Exploring the complexity of cyberspace governance: state sovereignty, multi-stakeholderism, and power politics</article-title> <source>J. Inf. Warf.</source> <volume>15</volume>  &#x2013; <lpage>26</lpage>. Available online at: <ext-link xlink:href="https://www.jstor.org/stable/26487548" ext-link-type="uri">https://www.jstor.org/stable/26487548</ext-link></mixed-citation></ref>
<ref id="ref90"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lonergan</surname><given-names>E. D.</given-names></name></person-group> (<year>2025</year>). <article-title>Minding the gap? The strategic logic of cyber coercion in theory and practice</article-title>. <source>J. Strateg. Stud.</source> <fpage>1</fpage>&#x2013;<lpage>29</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01402390.2025.2565191</pub-id></mixed-citation></ref>
<ref id="ref91"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Longabaugh</surname><given-names>E. E.</given-names></name></person-group> (<year>2020</year>). <source>Signaling for coercion in cyberspace</source> Available online at: <ext-link xlink:href="https://calhoun.nps.edu/server/api/core/bitstreams/1f7d302c-73c8-488c-b092-5ab1206b3933/content" ext-link-type="uri">https://calhoun.nps.edu/server/api/core/bitstreams/1f7d302c-73c8-488c-b092-5ab1206b3933/content</ext-link></mixed-citation></ref>
<ref id="ref92"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Mallick</surname><given-names>P. K.</given-names></name></person-group> (<year>2019</year>). <source>Cyber attack on Kudankulam nuclear power plant &#x2013; A wake up call</source>. <publisher-name>The Vivekananda International Foundation</publisher-name>. Available online at: <ext-link xlink:href="https://www.vifindia.org/sites/default/files/cyber-attack-on-kudankulam-nuclear-power-plant.pdf" ext-link-type="uri">https://www.vifindia.org/sites/default/files/cyber-attack-on-kudankulam-nuclear-power-plant.pdf</ext-link></mixed-citation></ref>
<ref id="ref93"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Manantan</surname><given-names>M. B.</given-names></name></person-group> (<year>2020</year>). <article-title>The people&#x2019;s republic of China&#x2019;s cyber coercion: Taiwan, Hong Kong, and the South China Sea</article-title>. <source>Issues Stud.</source>, <volume>56</volume>. Available online at: <ext-link xlink:href="https://www.worldscientific.com/doi/abs/10.1142/S1013251120400135" ext-link-type="uri">https://www.worldscientific.com/doi/abs/10.1142/S1013251120400135</ext-link></mixed-citation></ref>
<ref id="ref94"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Manantan</surname><given-names>M. B. F.</given-names></name></person-group> (<year>2021</year>). <article-title>Advancing cyber diplomacy in the Asia Pacific: Japan and Australia</article-title>. <source>Aust. J. Int. Aff.</source> <volume>75</volume>, <fpage>432</fpage>&#x2013;<lpage>459</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10357718.2021.1926423</pub-id></mixed-citation></ref>
<ref id="ref95"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Manhas</surname><given-names>N. S.</given-names></name></person-group> (<year>2023</year>). <source>China-India brief #230: from the border to cyberspace: investigating the post-Galwan escalation of Chinese cyber attacks against India</source> Available online at: <ext-link xlink:href="https://lkyspp.nus.edu.sg/cag/publications/center-publications/publication-article/detail/from-the-border-to-cyberspace-investigating-the-post-galwan-escalation-of-chinese-cyber-attacks-against-india" ext-link-type="uri">https://lkyspp.nus.edu.sg/cag/publications/center-publications/publication-article/detail/from-the-border-to-cyberspace-investigating-the-post-galwan-escalation-of-chinese-cyber-attacks-against-india</ext-link></mixed-citation></ref>
<ref id="ref96"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Martin</surname><given-names>C.</given-names></name></person-group> (<year>2025</year>). <source>Typhoons in cyberspace</source>. <publisher-name>RUSI</publisher-name>. Available online at: <ext-link xlink:href="https://www.rusi.org" ext-link-type="uri">https://www.rusi.org</ext-link></mixed-citation></ref>
<ref id="ref97"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll39">MCAD Maritime Cyber Attack Database</collab></person-group>. (<year>2022</year>). <source>Jawaharlal Nehru port container terminal hit by hacking attack</source> in <publisher-loc>India</publisher-loc>. Available online at: <ext-link xlink:href="https://maritimecybersecurity.nl/incident/N0r68rPzb3" ext-link-type="uri">https://maritimecybersecurity.nl/incident/N0r68rPzb3</ext-link></mixed-citation></ref>
<ref id="ref98"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll40">Ministry of Foreign Affairs of Japan</collab></person-group> (<year>2023</year>) <source>Quad cybersecurity partnership: joint principles</source> Available online at: <ext-link xlink:href="https://www.mofa.go.jp/files/100347801.pdf" ext-link-type="uri">https://www.mofa.go.jp/files/100347801.pdf</ext-link></mixed-citation></ref>
<ref id="ref99"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll41">MITRE ATT&#x0026;CK&#x00AE;</collab></person-group>. (<year>2025</year>). <source>RedEcho</source>. Available online at: <ext-link xlink:href="https://attack.mitre.org/groups/G1042/" ext-link-type="uri">https://attack.mitre.org/groups/G1042/</ext-link></mixed-citation></ref>
<ref id="ref100"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Murphy</surname><given-names>T.</given-names></name> <name><surname>Nagy</surname><given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>Middle power cyber security cooperation in the indo-Pacific: an analysis through the lens of neo-middle power diplomacy</article-title>. <source>J. Intell. Confl. Warfare</source> <volume>7</volume>:<fpage>1</fpage>. doi: <pub-id pub-id-type="doi">10.21810/jicw.v7i1.6454</pub-id></mixed-citation></ref>
<ref id="ref101"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Nachiappan</surname><given-names>K.</given-names></name></person-group> (<year>2025</year>). <article-title>Cyber resilience in the indo-Pacific [the National Bureau of Asian research (NBR)]</article-title>. <source>Roundt. Asia Policy</source> <volume>20</volume>. Available online at: <ext-link xlink:href="https://www.nbr.org/publication/cyber-resilience-in-the-indo-pacific/" ext-link-type="uri">https://www.nbr.org/publication/cyber-resilience-in-the-indo-pacific/</ext-link></mixed-citation></ref>
<ref id="ref102"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll42">News4hackers</collab></person-group> (<year>2024</year>). <source>The National Technical Research Organization (NTRO): a closer look</source> Available online at: <ext-link xlink:href="https://www.news4hackers.com/the-national-technical-research-organization/" ext-link-type="uri">https://www.news4hackers.com/the-national-technical-research-organization/</ext-link></mixed-citation></ref>
<ref id="ref103"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nye</surname><given-names>J. S.</given-names></name></person-group> (<year>2017</year>). <article-title>Deterrence and dissuasion in cyberspace</article-title>. <source>Int. Secur.</source> <volume>41</volume>, <fpage>44</fpage>&#x2013;<lpage>71</lpage>. doi: <pub-id pub-id-type="doi">10.1162/ISEC_a_00266</pub-id></mixed-citation></ref>
<ref id="ref104"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll43">OECD</collab></person-group> (<year>2023</year>). <source>Digital India</source> Available online at: <ext-link xlink:href="https://stip.oecd.org/stip/interactive-dashboards/policy-initiatives/2023%2Fdata%2FpolicyInitiatives%2F99998006" ext-link-type="uri">https://stip.oecd.org/stip/interactive-dashboards/policy-initiatives/2023%2Fdata%2FpolicyInitiatives%2F99998006</ext-link></mixed-citation></ref>
<ref id="ref105"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Olafuyi</surname><given-names>B. A.</given-names></name></person-group> (<year>2023</year>). <article-title>Cyber threats to national security: an in-depth analysis of the United States landscape</article-title>. <source>Int. J. Sci. Res. Publ.</source> <volume>13</volume>, <fpage>134</fpage>&#x2013;<lpage>139</lpage>. doi: <pub-id pub-id-type="doi">10.29322/IJSRP.13.12.2023.p14415</pub-id></mixed-citation></ref>
<ref id="ref106"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Ornelas</surname><given-names>M. T. A.</given-names></name></person-group> (<year>2021</year>). <article-title>China&#x2019;s active defense military strategy</article-title>. <source>Mar. Corps Gaz</source>. Available online at: <ext-link xlink:href="https://www.mca-marines.org/wp-content/uploads/57-Chinas-Active-Defense-Military-Strategy.pdf" ext-link-type="uri">https://www.mca-marines.org/wp-content/uploads/57-Chinas-Active-Defense-Military-Strategy.pdf</ext-link></mixed-citation></ref>
<ref id="ref107"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Patil</surname><given-names>S.</given-names></name></person-group> (<year>2021</year>). <source>Securing India in the cyber era</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>Routledge India</publisher-name>.</mixed-citation></ref>
<ref id="ref108"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Patil</surname><given-names>S.</given-names></name></person-group> (<year>2025</year>) <source>Operation Sindoor and India-Pakistan&#x2019;s escalated rivalry in cyberspace</source> <person-group person-group-type="author"><collab id="coll44">RUSI</collab></person-group> Available online at: <ext-link xlink:href="https://www.rusi.org" ext-link-type="uri">https://www.rusi.org</ext-link></mixed-citation></ref>
<ref id="ref109"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pohle</surname><given-names>J.</given-names></name> <name><surname>Santaniello</surname><given-names>M.</given-names></name></person-group> (<year>2024</year>). <article-title>From multistakeholderism to digital sovereignty: toward a new discursive order in internet governance?</article-title> <source>Policy Internet</source> <volume>16</volume>, <fpage>672</fpage>&#x2013;<lpage>691</lpage>. doi: <pub-id pub-id-type="doi">10.1002/poi3.426</pub-id></mixed-citation></ref>
<ref id="ref110"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Pollpeter</surname><given-names>K.</given-names></name></person-group> (<year>2015</year>). &#x201C;<article-title>Chinese writings on cyberwarfare and coercion</article-title>&#x201D; in <source>China and cybersecurity: Espionage, strategy, and politics in the digital domain</source>. eds. <person-group person-group-type="editor"><name><surname>Lindsay</surname><given-names>J. R.</given-names></name> <name><surname>Cheung</surname><given-names>T. M.</given-names></name> <name><surname>Reveron</surname><given-names>D. S.</given-names></name></person-group> (<publisher-loc>New York</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>).</mixed-citation></ref>
<ref id="ref111"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll45">Press Information Bureau (PIB)</collab></person-group>. (<year>2025</year>). <source>Future ready: India&#x2019;s digital economy to contribute one-fifth of National Income by 2029-30</source>. Available online at: <ext-link xlink:href="https://www.pib.gov.in/www.pib.gov.in/Pressreleaseshare.aspx?PRID=2097125" ext-link-type="uri">https://www.pib.gov.in/www.pib.gov.in/Pressreleaseshare.aspx?PRID=2097125</ext-link></mixed-citation></ref>
<ref id="ref112"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll46">Recorded Future</collab></person-group> (<year>2021</year>). <source>China-linked group TAG-28 targets India&#x2019;s &#x201C;the times group&#x201D; and UIDAI (Aadhaar) government agency with Winnti malware</source>. Available online at: <ext-link xlink:href="https://www.recordedfuture.com/blog/china-linked-tag-28-targets-indias-the-times-group" ext-link-type="uri">https://www.recordedfuture.com/blog/china-linked-tag-28-targets-indias-the-times-group</ext-link></mixed-citation></ref>
<ref id="ref113"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll47">Reuters</collab></person-group>. (<year>2024</year>). <source>Australia critical infrastructure faces cyber threats, report says</source>. <publisher-name>Reuters</publisher-name>. Available online at: <ext-link xlink:href="https://www.reuters.com/technology/cybersecurity/australia-critical-infrastructure-faces-cyber-threats-report-says-2024-11-20/" ext-link-type="uri">https://www.reuters.com/technology/cybersecurity/australia-critical-infrastructure-faces-cyber-threats-report-says-2024-11-20/</ext-link></mixed-citation></ref>
<ref id="ref114"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Ribeiro</surname><given-names>A.</given-names></name></person-group> (<year>2024</year>). <article-title>Australia&#x2019;s cyber defense report highlights evolving threats and strategic countermeasures</article-title>. <source>Industrial Cyber</source> Available online at: <ext-link xlink:href="https://industrialcyber.co/reports/australias-cyber-defense-report-highlights-evolving-threats-and-strategic-countermeasures/" ext-link-type="uri">https://industrialcyber.co/reports/australias-cyber-defense-report-highlights-evolving-threats-and-strategic-countermeasures/</ext-link></mixed-citation></ref>
<ref id="ref115"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Richmond</surname><given-names>N.</given-names></name></person-group> (<year>2019</year>). <source>Operation cloud hopper case study</source>. Available online at: <ext-link xlink:href="https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/" ext-link-type="uri">https://www.sei.cmu.edu/blog/operation-cloud-hopper-case-study/</ext-link></mixed-citation></ref>
<ref id="ref116"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rid</surname><given-names>T.</given-names></name> <name><surname>Buchanan</surname><given-names>B.</given-names></name></person-group> (<year>2015</year>). <article-title>Attributing cyber attacks</article-title>. <source>J. Strateg. Stud.</source> <volume>38</volume>, <fpage>4</fpage>&#x2013;<lpage>37</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01402390.2014.977382</pub-id></mixed-citation></ref>
<ref id="ref117"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Rouse</surname><given-names>I.</given-names></name></person-group> (<year>2024</year>). <source>AWS partnering with the Australian government to deliver cloud innovation in national security &#x0026; defence</source>. <publisher-name>AU About Amazon</publisher-name> Available online at: <ext-link xlink:href="https://www.aboutamazon.com.au/news/company-news/partnering-with-the-australian-government-to-deliver-cloud-innovation-in-national-security-defence" ext-link-type="uri">https://www.aboutamazon.com.au/news/company-news/partnering-with-the-australian-government-to-deliver-cloud-innovation-in-national-security-defence</ext-link></mixed-citation></ref>
<ref id="ref118"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Sanger</surname><given-names>D. E.</given-names></name> <name><surname>Schmall</surname><given-names>E.</given-names></name></person-group> (<year>2021</year>). <article-title>China appears to warn India: push too hard and the lights could go out</article-title>. <source>N. Y. Times.</source> Available online at: <ext-link xlink:href="https://www.nytimes.com/2021/02/28/us/politics/china-india-hacking-electricity.html" ext-link-type="uri">https://www.nytimes.com/2021/02/28/us/politics/china-india-hacking-electricity.html</ext-link></mixed-citation></ref>
<ref id="ref119"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Schelling</surname><given-names>T. C.</given-names></name></person-group> (<year>1966</year>). <source>Arms and influence</source>. <publisher-loc>New Haven</publisher-loc>: <publisher-name>Yale University Press</publisher-name>.</mixed-citation></ref>
<ref id="ref120"><mixed-citation publication-type="other"><person-group person-group-type="author"><name><surname>Scott</surname><given-names>B.</given-names></name></person-group> (<year>2023</year>). <article-title>Australia needs to talk more openly about offensive cyber operations</article-title>. <source>The Strategist.</source> Available online at: <ext-link xlink:href="https://www.aspistrategist.org.au/australia-needs-to-talk-more-openly-about-offensive-cyber-operations/" ext-link-type="uri">https://www.aspistrategist.org.au/australia-needs-to-talk-more-openly-about-offensive-cyber-operations/</ext-link></mixed-citation></ref>
<ref id="ref121"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll48">SecurityWeek</collab></person-group> (<year>2021</year>). <source>Suspected Chinese APT group targets power plants in India</source>: <publisher-name>SecurityWeek</publisher-name>.</mixed-citation></ref>
<ref id="ref122"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Shende</surname><given-names>S.</given-names></name> <name><surname>Chaudhuri</surname><given-names>R.</given-names></name></person-group> (<year>2024</year>). &#x201C;<article-title>The research and analysis wing</article-title>&#x201D; in <source>Institutional roots of India&#x2019;s security policy</source>. ed. <person-group person-group-type="editor"><name><surname>Vaishnav</surname><given-names>M.</given-names></name></person-group> (<publisher-loc>Oxford</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>).</mixed-citation></ref>
<ref id="ref123"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Singh</surname><given-names>M.</given-names></name></person-group> (<year>2025</year>). <source>Cyber Suraksha exercise simulates high-paced threats to test national cyber resilience</source>: <publisher-name>New Indian Express</publisher-name>.</mixed-citation></ref>
<ref id="ref124"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll49">SOCRadar&#x00AE;</collab></person-group> (<year>2023</year>). <source>Living off the land (LOTL): the invisible cyber threat lurking in your system</source>: <publisher-name>SOCRadar&#x00AE; Cyber Intelligence Inc.</publisher-name></mixed-citation></ref>
<ref id="ref125"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll50">SOCRadar&#x00AE;</collab></person-group> (<year>2024</year>). <source>Dark web profile: APT40</source> Available online at: <ext-link xlink:href="https://socradar.io/dark-web-profile-apt40/" ext-link-type="uri">https://socradar.io/dark-web-profile-apt40/</ext-link></mixed-citation></ref>
<ref id="ref126"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Stevens</surname><given-names>T.</given-names></name></person-group> (<year>2012</year>). <article-title>A cyberwar of ideas? Deterrence and norms in cyberspace</article-title>. <source>Contemp. Secur. Policy</source> <volume>33</volume>, <fpage>148</fpage>&#x2013;<lpage>170</lpage>. doi: <pub-id pub-id-type="doi">10.1080/13523260.2012.659597</pub-id></mixed-citation></ref>
<ref id="ref127"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll51">The Indian Express</collab></person-group> (<year>2018</year>). <source>35% of cyber-attacks on Indian sites from China: official report</source>: <publisher-name>Indian Express</publisher-name>.</mixed-citation></ref>
<ref id="ref128"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll52">The Indian Express</collab></person-group> (<year>2025</year>). <source>India&#x2019;s internet users to surpass 900 million in 2025, regional content driving growth: IAMAI-kantar report</source>: <publisher-name>Indian Express</publisher-name>.</mixed-citation></ref>
<ref id="ref129"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll53">UNIDIR</collab></person-group> (<year>2025a</year>). <source>India-cyber policy portal database</source> Available online at: <ext-link xlink:href="https://database.cyberpolicyportal.org/en/library/?q=(allAggregations:!f,filters:(state:(values:!(o6q38gieq4)),topics:(values:!(m6gf60v2no))),from:0,includeUnpublished:!t,limit:30,order:desc,sort:creationDate,treatAs:number,types:!(%275bfbb1a0471dd0fc16ada146%27),unpublished:!f)" ext-link-type="uri">https://database.cyberpolicyportal.org/en/library/?q=(allAggregations:!f,filters:(state:(values:!(o6q38gieq4)),topics:(values:!(m6gf60v2no))),from:0,includeUnpublished:!t,limit:30,order:desc,sort:creationDate,treatAs:number,types:!(%275bfbb1a0471dd0fc16ada146%27),unpublished:!f)</ext-link></mixed-citation></ref>
<ref id="ref130"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll54">UNIDIR</collab></person-group> (<year>2025b</year>). <source>UNIDIR cyber policy portal database</source> Available online at: <ext-link xlink:href="https://database.cyberpolicyportal.org/" ext-link-type="uri">https://database.cyberpolicyportal.org/</ext-link></mixed-citation></ref>
<ref id="ref131"><mixed-citation publication-type="other"><person-group person-group-type="author"><collab id="coll55">University of Maryland</collab></person-group> (<year>2025</year>). <source>Cyber events database (version 2025)</source> Available online at: <ext-link xlink:href="https://cissm.umd.edu/cyber-events-database" ext-link-type="uri">https://cissm.umd.edu/cyber-events-database</ext-link></mixed-citation></ref>
<ref id="ref132"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Uren</surname><given-names>T.</given-names></name> <name><surname>Cave</surname><given-names>D.</given-names></name></person-group> (<year>2018</year>). <source>Why Australia banned Huawei from its 5G telecoms network</source>: <publisher-name>ASPI</publisher-name>.</mixed-citation></ref>
<ref id="ref133"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll56">US Department of Homeland Security</collab></person-group> (<year>2024</year>). <source>DHS bolsters indo-Pacific maritime cybersecurity through partnership with Indonesia</source>: <publisher-name>Homeland Security</publisher-name>.</mixed-citation></ref>
<ref id="ref134"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Vaidya</surname><given-names>T.</given-names></name></person-group> (<year>2015</year>). <article-title>2001-2013: survey and analysis of major cyberattacks</article-title>. <source>arXiv</source>. doi: <pub-id pub-id-type="doi">10.48550/arXiv.1507.06673</pub-id></mixed-citation></ref>
<ref id="ref135"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Valeriano</surname><given-names>B.</given-names></name> <name><surname>Jensen</surname><given-names>B.</given-names></name> <name><surname>Maness</surname><given-names>R. C.</given-names></name></person-group> (<year>2018</year>). <source>Cyber strategy: The evolving character of power and coercion</source>. <publisher-loc>New York</publisher-loc>: <publisher-name>Oxford University Press</publisher-name>.</mixed-citation></ref>
<ref id="ref136"><mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Walsh</surname><given-names>M.</given-names></name></person-group> (<year>2021</year>). <source>Australia called for a COVID-19 probe. China responded with a trade war</source>: <publisher-name>ABC News</publisher-name>.</mixed-citation></ref>
<ref id="ref137"><mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Whyte</surname><given-names>C.</given-names></name></person-group> (<year>2016</year>). <article-title>Ending cyber coercion: computer network attack, exploitation and the case of North Korea</article-title>. <source>Comp. Strateg.</source> <volume>35</volume>, <fpage>93</fpage>&#x2013;<lpage>102</lpage>. doi: <pub-id pub-id-type="doi">10.1080/01495933.2016.1176453</pub-id></mixed-citation></ref>
<ref id="ref138"><mixed-citation publication-type="book"><person-group person-group-type="author"><collab id="coll57">Worldometer</collab></person-group> (<year>2025</year>). <source>India population</source>: <publisher-name>Worldometer</publisher-name>.</mixed-citation></ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0002">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3054326/overview">Mariana Grilli Belinotte</ext-link>, Brazilian Army Command and General Staff College, Brazil</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0003">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3291196/overview">Thangjam Singh</ext-link>, Central University of Gujarat, India</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3293932/overview">Randhi Satria</ext-link>, Sebelas Maret University, Indonesia</p>
</fn>
</fn-group>
<fn-group>
<fn id="fn0001">
<label>1</label>
<p>The Chinese term <italic>weishe</italic> is often understood as <italic>deterrence</italic>. However, unlike Western understandings of deterrence, <italic>weishe</italic> also encompasses <italic>compellence</italic>, defined as &#x201C;the display of military power, or the threat of the use of military power, in order to compel an opponent to submit&#x201D; see <xref ref-type="bibr" rid="ref41">Cheng (2011)</xref>.</p>
</fn>
</fn-group>
</back>
</article>