06 Cyber Warfare PDF
06 Cyber Warfare PDF
06 Cyber Warfare PDF
Abstract
Computer networks serve as the backbone of modern-day information and
communications technologies. These networks have no physical boundaries that contain
important data and information critical to any state’s national security, which is vulnerable
to cyber-attacks in the digital domain. This dilemma gives birth to the term cyber-warfare
and it is one of the most critical security issues in present-day world. Huge investments are
being done by the countries to use it as an offensive tool vis-à-vis they are also trying to
build a steady force for the protection of their cyber-space. Cyber-Warfare poses a much
complex and dangerous threat to the National security of Pakistan in the era of hybrid-
warfare. This paper aimed to explain, what kind of threat does Pakistan faces in the domain
of cyber-warfare and what effective measures Pakistan should take against such threats.
This paper is based on deductive reasoning from the experiences of other nations to chart
out a way forward for the National cyber policy of Pakistan as Pakistan is indeed developing
with an effective speed in the field of information and communication technology, but the
security aspects are not focused upon, which exposes a major unregulated domain of cyber-
space to cyber-attacks, which can undermine the national security of Pakistan.
Introduction
P akistan has witnessed the impact of cyber-warfare in the shape of minor cyber-
attacks and violent use of its cyber-space in the last five years in the form of hate
speech and exploitation of religious sentiment of its population. We as a nation have
witnessed the use of social media, such as Facebook, Twitter, YouTube etc. for
different religious and political movements. The threat of religious violence and
propaganda of extremist views through the social media is, at the moment, on an
insignificant level and not so powerful in shaping the anti-state propaganda.
However, this might escalate to a significant level in the future if left untapped. The
Government of Pakistan has been involved in the development of a policy against
*
Muhammad Imad Ayub Khan is a Software Engineer and MPhil Scholar at Department of Strategic Studies,
National Defence University Islamabad, Pakistan.
cyber-attacks since 2003, but so far, no real implementation has been put in practice.
With the passage of time, the domain of cyber-space is not only abused by cyber-
criminals, but has also become the strongest safe-heavens for cyber-terrorists to
recruit and use the networks for communication, data collection, psychological
warfare and mobilization.1
Cyber warfare domain can be identified from the technical history of cyber
development. Cyber warfare is traced backed to the start of the electronic warfare
era, where the use of electric and radio communication came to the battlefield. The
rapid evolution of computer technology since the dawn of the 21st century, have led
most security thinkers to define cyber-warfare as part of military strategy and tactics.
Sometimes these attacks are organized to weaken a state's fighting capacity in
hostility, but the main problem still exists in terms of the purpose for which the
attack was launched and the nature and desire of attackers. In both cases, cyber-
attacks are not merely military instruments. The increasing use of information
technology, especially in military and logistical operations, has made the militaries
and other critical national security infrastructures vulnerable to cyber-attacks; thus
leading to the creation of new military institutions, such as “Cyber-Commands” by
various countries, whose primary purpose is not to prevent these attacks but rather
to prevent, protect and counter-attack. There are many aspects of attribution-related
cyber-attacks, as these attacks are not fully defined in international law, and more
importantly, it is very difficult to investigate and gather evidence to prosecute when
it comes to litigation.
Concept of Cyber-warfare
Cyber-warfare means the use of cyber-space for political aggression against
the enemy for sabotaging its digital capacity. It involves the use of digital battle
space for attacking enemy's computers and networks in which one can be either the
offender or the defender involving operations pertaining to cyber-threats such as
espionage, sabotage. The ongoing debate on cyber-warfare to define it as an act of
war still resultless in its definition but still, this developing area in information
technology has raised the alarms and nations have started taking countermeasures
by developing capabilities and has technically involved with the term cyber-warfare
either as an aggressor, defendant or even both. The terms cyber-security, cyber-
warfare and cyber-space are as interrelated as in the practical arena the terms
security, battlefield and warfare.
Pakistan has even lagged behind its neighboring countries, such as India
and Iran, in vision, leadership, infrastructure, appropriate legislation and thoughtful
policies to respond to any cyber-attack.3 Our traditional rival, India, which has
invested a lot on this front in the previous two to three years and has also activated
the Defence Cyber Agency (DCA), which a tri-services command of the Indian army
responsible for cyber-defence and led by Rear Admiral Mohit Gupta.4 Researchers
and lawmakers have already on many occasions pointed out that cyber-threats pose
threats to the national security of Pakistan. Senator Mushahid Hussain, Chairman
Senate Committee on Defense and Defense Production in 2013, said that;
Similarly, former National Security Advisor, Naser Khan Janjua also said,
“Cyber-attacks pose an enormous threat to the national economy, defense and
security.”6
Cyber- Data
Cyber-Theft
Terrorism Breaches
Cyber- Crypto-
Sabotage
Propaganda Currencies
Relying on
Cyber-
Ransomware Foreign
Harassment
Equipments
Lack of
Awareness of
Public
Unregulated Cyber-space
The laws regulating the Pakistani cyber-space are very minimal and can be
easily evaded by someone with a little knowledge of the computer systems. 7 For
Instance, we go back to 2008, when the first time Pakistani authorities ordered to
block anti-Islamic content on the internet but due to the lack of an effective URL
filtering system small free available softwares were used, which easily bypassed the
Pakistan Telecommunication Authority blocking system. 8 Similar the Pakistani
government on numerous occasions has banned access to many website contain
blasphemous, pornographic and anti-state content, which has been termed almost
totally in-effective because of poor blocking mechanisms. This is because Pakistan
has been on the very low rating of ICAN (The Internet Corporation for Assigned
Names and Numbers) where there is a very poor system to maintain the records of
internet data flow. Freeware software can easily hide the real identities and location
of a user using the internet in Pakistan which is very alarming indeed. The
unregulated cyber-space has given birth to the following threatening concepts in
Pakistan.
event can easily make it a platform for anti-state elements to exploit the
weakness of participants to promote anti-state agenda. Similarly, the
internet and social media have been flooded many times by fake news
to create panic within the public.
Cyber-Harassment: Also known as cyber-bullying, this is the
individual use of cyber-domain to bully people across many social
media platforms. Most of the times the victims are general users of
social media, who are blackmailed and used for different purposes. The
effects of cyber-bullying are different, but research shows that cyber-
bullying has a disproportionate impact on young people than
adolescents and adults. Young people are more likely to suffer as they
continue to grow physically and mentally. Children who are harassed
are likely to experience anxiety, depression, loneliness and depression. 16
Lack of Awareness of Public: The most critical problem that Pakistan
faces in cyber-domain is the lack of understanding of the public on how
to use the internet/social media platforms. Lack of knowledge
convinces mostly under-educated class to believe fake news rather than
even now understanding what they are seeing on their devices. Lack of
understanding of cyber-ethics often leads to cyber-bullying,
harassment, theft or being terrorized. This category fuels the above-
defined categories to act as a catalyst to broaden the spectrum of cyber-
attacks. The major cause of this is the lack of the subjects from the
Pakistani educational curriculum from primary to university levels. No
Computer subject books cover the subject of Computer Ethics and
cyber-warfare. Even today only one University in Pakistan i.e. National
Defence University (NDU) offers the course of cyber-Security as an
elective subject but the lack of interest of students often leads the
course to be dropped due to less number of students. This issue has
created concern in Pakistani cyber-experts as the public can hardly
understand the threat posed by the spectrum of cyber-space. This is not
only important on the academic level but rather at the national level to
make the public aware of how to surf and use the cyber-domain safely
to secure them from being a soft target for the outside world.
Economic Disruptions
The modern era has become dependent on ICT based economic facilities
such as e-trade, e-commerce and e-banking. Such terms have made life extremely
fast and brought tremendous changes in the existing patterns of life, at the same
time such practices have become vulnerable to cyber-attacks. Economic disruption
in the cyber-domain is considered as the most critical because the purpose of such
cyber-attacks is to target the economic system of any country, which can create
panic among the public. Such attacks are either to inflict damage or maybe even led
to direct stealing of money. The target can be banking systems, which are directly
linked to the economies of nation consequently economy is one of the most
important pillars of any nation’s national security. Pakistan has most recently been
the target of such attacks at minor levels targeting many bank account holders in
2018 but coordinated attacks in this domain can have a catastrophic impact.
Following terms have cautioned the life of an individual and brought a huge impact
on national security;
Cyber-Physical Attacks
These attacks are also known as “cyber-to-physical effect,” when the
hacker/attacker reaches the real world from his virtual computer world results in a
catastrophic consequences. The use of “Stuxnet” computer virus by the Americans
and Israelis, which infected the computers of the Iranian nuclear program and
caused disruption in thousands of programmable logic controllers (PLCs) controlling
the centrifuges used for the uranium enrichment process. 24 Such attacks are
identified as top-level attacks by countries such as the US; which considers these
attacks as critical to their automated SCADA systems (Supervisory control and data
acquisition) and Information Control Systems (ICS) which is used in many of their
systems such as Water Management, Electrical Power grids and other critical
infrastructure. The following cyber practices fall in physical cyber attacks.
media. This can lead to an unwanted situation in the future if such data
is breached illegally.
Relying on Foreign Equipments: The use of foreign equipment in
the domain of information and communication technology is one of the
most ill researched areas in cyber-space. Most of the computer systems
used around the world is developed by major powers and used in the
critical infrastructure of many countries. The use of such systems can
be exploited if the manufacturers leave a back door, backchannel, RAT
(Remote Access Trojan), etc. in computer equipment. Pakistan like
most of the countries around the world relies on foreign computer
equipment’s from small microprocessors, embedded systems to heavy-
duty industrial computer system, which can at some time in the future
pose a threat to the national security.
The National Response Center for Cyber-crime (NR3C) was set up in 2007
and mandated to the Federal Investigation Agency (FIA) to primarily combat
technological crime in Pakistan. It is the only unit of its kind in the country and, in
addition, to directly receive complaints, it also helps other law enforcement agencies
in their own affairs.28But since the inception of NR3C, if one compares it on the
technological analysis to the modern innovations in cyber-crimes, the statistics of
NR3C reports about its implementation are poor. Neither it is up to the standard
neither it is properly regulated. Even the basic setup of the agency is not up to the
marks when compared with other agencies of the world.
International Level
Information and Communications Technology (ICT) is one of the main
security challenges around the world. Risk assessments suggest that the real and
universal emergency may be caused by the fact that the state or group of companies
may create fear by using ICT to destroy the basic framework or military coordination
systems. The proliferation of asymmetric warfare (i.e., conflicts between nations or
groups that have disparate military capabilities) has expanded the use of ICTs by the
states, which requires the promotion of a digital lead code throughout the
world.29There is an urgent need for interstate participation to mitigate the dangers of
Cyber-Crime, Basic Cyber-Attacks, Electronic Secret Work, Mass Information
Interventions and Proposed Hostile Actions to expand control through the power of
the Internet. The development of digital hazards can accelerate the monstrous social
and financial damage, and it is necessary to re-calibrate worldwide efforts to present
this new reality. Multinational organizations or regional partners such as UN, SCO,
BRICS, SAARC and many others like these can work together to jointly tackle the
issue of cyber-security to avoid confrontations between states. Especially these
organizations can work jointly to make a mechanism to stop the spread of cyber-
terrorism. The 2016 EU Parliament Directive on the Network and Information
Security Systems, is a good example for such joint mechanisms in which the EU
Parliament initiative focused on cyber-threats to sensitive and critical infrastructure
with the aim to improve its countermeasures and enhances safeguarding
mechanisms of its online services such as e-commerce, data systems against such
digital infrastructures could have severe consequences and can inflict huge
operational costs30and other services vital to the businesses of its governments and
citizens. Any coordinated cyber-attacks
National level
At the national level the recommendations are divided into two categories;
the Critical Category and the Future Strategy Category.
o Broad National Security Policy: The first critical step for the
government is to legislate a broad and comprehensive national
Future Strategy
o Regulation of Imported Computer Hardware: Apart from
mobile phones most of the computer equipment such as CPUs,
hard drives, network switches, routers and many other computer
equipment are coming in the country without proper checks and
are being used in different important institutions. Factory-built
codes and viruses is not a difficult task to implant in these devices.
The subversion due to firmware malware at the hardware level is
the most difficult to detect and the most dangerous for critical
infrastructures. Most of the states, including Pakistan, depend on
foreign suppliers to supply computer systems, such as SCADA and
ICS. The built-in malware created during the production phase can
lead to chaos. The incidents of ban on Chinese mobile phones in
Europe with respect to the allegation of hardware spying
equipment is a clear example of such level. Consequently, a
separate wing of PTA or FIA should be trained to check incoming
hardware equipment for spying and viruses before making its way
to public or government systems. As an intermediate option, it is
necessary to configure the equipment purchased before buying it in
operation.
o Indigenous Manufacturing of Computer Hardware: Pakistan
must strive to achieve the capacity of producing all components of
computer hardware, which are used in different industries
particularly in power plants along with network routers, Switches
etc.
o Broad introduction of Cyber-Warfare in the Curriculum at
Secondary and Higher Secondary level: In Pakistan, primary
and secondary level computer books do not have any material on
cyber-security. Even at universities level the topic is not specifically
discussed. In this regard, the university curriculum should be
amended so that our future generations are not dependent on
foreign products.
Conclusion
The world has witnessed a phenomenal growth in cyber-space. The impact
of ICT extends to all business areas. Cyber-space is an activator for all other domains
and unprotected cyber-space can pose a threat to the economy and safety of any
country’s national security in the modern era.33 Many kinds of cyber-threats are
The research highlight that Pakistan is becoming more and more vulnerable
day by day to the current and newly developing cyber-threats. The unserious attitude
of the governments towards cyber-security is making Pakistan a soft target for cyber-
attacks and even at many times the issue is being raised as recently by the DG ISPR
in a seminar he urged media workers and journalists to counter the anti-state
narrative being spread out on the internet platform which is known as fifth
generation and hybrid war that is already being imposed against Pakistan. 35 This
clearly points out that the war bells have already rung, and it is critical for Pakistan
to start and secure the cyber-space as soon as possible.
NOTES
1
Zaheema Iqbal, “Cyber Security in Pakistan: Myth or Reality,” Eurasia Review, January 12, 2018,
https://www.eurasiareview.com/12012018-cyber-security-in-pakistan-myth-or-reality-oped/.
2
John J. Mearsheimer, The Tragedy of Great Power Politics (New York: W. W. Norton, 2003), 29–54.
3
“Cyber Threats: Implication on National Security,” Seminar Report (Islamabad: Institute of Policy Studies, December 18,
2015), http://www.ips.org.pk/pakistan-lags-behind-in-cyber-security-preparedness/.
4
Sudhi Ranjan Sen, “Centre May Create Single Agency for Cyber Defence,” Hindustan Times, November 11, 2019,
https://www.hindustantimes.com/india-news/centre-may-create-single-agency-for-cyber-defence/story-
pD3QUcNvU2a9THFCF01SMO.html.
5
Mehwish Khan, “7-Point Action Plan Proposed for Cyber Secure Pakistan,” ProPakistani, 2013,
https://propakistani.pk/2013/07/09/7-point-action-plan-proposed-for-cyber-secure-pakistan/.
6
Sana Jamal, “Pakistan’s First-Ever Cyber Security Centre Launched,” Gulf News, May 22, 2018,
https://gulfnews.com/world/asia/pakistan/pakistans-first-ever-cyber-security-centre-launched-1.2225435.
7
“Cyber Threats.”
8
“Pakistan Blocks Access to YouTube in Internet Crackdown,” BBC News, May 20, 2010,
https://www.bbc.com/news/10130195.
9
“Afghan Soil Used for BKU Attack, Envoy Told,” DAWN, January 26, 2016, http://www.dawn.com/news/1235516.
10
“TTP’s Support for IS Disturbing for Pakistan,” The News, October 6, 2014, https://www.thenews.com.pk/
archive/print/640902-ttp%E2%80%99s-support-for-is-disturbing-for-pakistan.
11
“TTP’s Support for IS Disturbing for Pakistan.”
12
“‘Terrorist’ Killed, Wife Held in Lahore Encounter,” DAWN, April 16, 2017, https://www.dawn.com/news/1327252.
13
Asad Hashim, “Pakistan: Thousands Protest Blasphemy Acquittal, Ignore PM’s Call,” Al Jazeera, January 11, 2018,
https://www.aljazeera.com/news/2018/11/pakistan-thousands-protest-blasphemy-acquittal-ignore-pm-call-
181101140852399.html.
14
“Pakistan Army Called on to Stop ‘blasphemy’ Clashes in Islamabad,” BBC News, November 25, 2017,
https://www.bbc.com/news/world-asia-42124446.
15
Raza Rumi, “Young Pashtuns Have Shown the Mirror to ‘Mainstream’ Pakistan,” Daily Times, November 2, 2018,
https://dailytimes.com.pk/199383/young-pashtuns-shown-mirror-mainstream-Pakistan/.
16
“Online Bullying: Tips for Prevention,” American Osteopathic Association, 2015, https://osteopathic.org/what-is-
osteopathic-medicine/online-bullying-tips-for-prevention/.
17
Senator Rehman Malik, “Pak Cyber Security and Cyber Crime,” The News, November 19, 2018,
https://www.thenews.com.pk/print/395551-pak-cyber-security-and-cyber-crime.
18
“Card Data of 20,000 Pakistani Bank Users Sold on Dark Web: Report,” Dunya News, November 6, 2018,
https://dunyanews.tv/en/Crime/465384-Card-data-Pakistani-bank-users-sold-dark-web-report.
19
“All Cryptocurrencies,” CoinMarketCap, accessed December 15, 2019, https://coinmarketcap.com/all/views/all/.
20
Hanibal Goitom, “Regulation of Cryptocurrency in Selected Jurisdictions” (The Law Library of Congress, Global Legal
Research Center, June 2018).
21
Goitom.
22
Malik, “Pak Cyber Security and Cyber Crime.”
23
Conner Forrest, “NotPetya Ransomware Outbreak Cost Merck More than $300M per Quarter,” TechRepublic, October
30, 2017, https://www.techrepublic.com/article/notpetya-ransomware-outbreak-cost-merck-more-than-300m-per-
quarter/.
24
Robert McMillan, “Siemens: Stuxnet Worm Hit Industrial Systems,” Computerworld, September 14, 2010,
https://www.computerworld.com/article/2515570/siemens--stuxnet-worm-hit-industrial-systems.html.
25
McMillan.
26
Carole Cadwalladr and Emma Graham-Harrison, “Revealed: 50 Million Facebook Profiles Harvested for Cambridge
Analytica in Major Data Breach,” The Guardian, March 17, 2018,
https://www.theguardian.com/news/2018/mar/17/cambridge-analytica-facebook-influence-us-election.
27
“Prevention of Cybercrime Act 2015” (2016).
28
National Response Center for Cybercrime (NR3C), is a wing of the Federal Investigation Agency to counter cybercrime
according to the constitution of Pakistan.
29
Elena Chernenko, “Increasing International Cooperation in Cybersecurity and Adapting Cyber Norms,” Council on
Foreign Relations, February 23, 2018, https://www.cfr.org/report/increasing-international-cooperation-cybersecurity-
and-adapting-cyber-norms.
30
“The Directive on Security of Network and Information Systems (NIS Directive)” (2019), https://ec.europa.eu/digital-
single-market/en/network-and-information-security-nis-directive.
31
“National Cyber Security Policy 2013” (2013).
32
IP address means Internet protocol address which identifies a specific user on internet. VPN is Virtual proxy network
which is intended to route data through a proxy server.
33
Nasir Jamal, “Cyber Challenges to Nuclear Infrastructures” (National Defence University, 2017).
34
Iqbal, “Cyber Security In Pakistan.”
35
“DG ISPR Urges Media to Show Progress, Potential of Pakistan,” Geo.tv, December 6, 2018,
https://www.geo.tv/latest/220948-dg-ispr-holds-press-conference.