You are on page 1of 3

Technology advancement.

As the regular armies are only trained to fight regular armies, the conflict in 4GW results in higher casualties of and other losses inflicted on the regular state armies. In order to minimize human and material losses, modern states having the advantage of technology have developed multiple weapons; the latest weapon developed after losing to insurgents is called predator drone. We can also call it a Fifth Generation Soldier. The latest version is General Atomics MQ-1 Predator which is an unmanned aerial vehicle (UAV) used primarily by the United States Air Force (USAF) and Central Intelligence Agency (CIA). The Predator carries cameras and other sensors but has been modified and upgraded to carry and fire two AGM-114 Hellfire missiles or other munitions. The aircraft, in use since 1995, has seen combat over Afghanistan, Pakistan, Bosnia, Serbia, Iraq, Yemen and Libya. Since June, 2004, the CIA has been operating the drones to attack militants in Pakistan's Federally Administered Tribal Areas. Since May 2005 the MQ-1 Predator fitted with Hellfire missiles has been successfully used to kill a number of prominent al Qaeda operatives.
Indo-Israeli Cyber nexus against Pakistan: Though no large scale cyber attack has been reported as yet in Pakistan, yet a number of limited cyber sk irmishes have already taken place between the Indian and Pakistani hackers in the recent years. In 2008 a group of Indian hackers defaced a Pakistani website of the Ministry of Oil and Gas. In a quick and effective retaliation Pakistani hackers attacked an d defaced many Indian websites. This year too, many websites were defaced by the hackers on both sides. This is where the interests of both India and Israel converged. According to reports, Israel has recently established a Cyber Task Force for Cyber Warfare against Islam and Pakistan, besides harming the Palestinian cause. A 15 million dollar budget has been allocated to this force to carry out various digital espionage and information gathering operations against Islam and Pakistan. Indian endavour In August 2010 the Indian government decided to recruit and form cyber army of software professionals to spy on the classified data of hostile nations (read Pakistan and China) by hacking into their computer systems. A strategy was drafted for this purpose earlier in a high level security meeting on July 29, 2010, chaired by Indian National Security Advisor Shiv Shankar Menon and attended by the director of Indian Intelligence Bureau (IB) as well as the senior officials of the telecom department, IT ministr y and RAW. According to the strategy drafted in the meeting, India will recruit IT professionals and hackers who will be assigned to be on the offensive or to launch pre-emptive strikes by breaching the security walls of enemys computer systems. The most important factor to note is the involvement of the Indian National Technical Research Organization (NTRO) along with the

Defence Intelligence Agency (DIA) who will be responsible for creating these cyber- offensive capabilities. It is to be noted that NTRO is a key government agency of India that gathers technical intelligence while DIA is tasked with collating inputs from the Navy, Army and the Air Force. The Indian Army conducted a war game called the Divine Matrix in March 2009. The most interesting aspect of this exercise was that Indian Military simulated a scenario in which China launches a nuclear attack on India somewhere in 2017. The purpose of the exercise was to describe how China will launch a cyber attack on India before the launch of the actual nuclear strike. Chinese were not amused by this Indian war gaming and simulation. Their Foreign Ministrys spokesman Qin Gang expressed his views on the Indian cyber warfare exercise. We are surprised by the report. Leaders of China and India had alread y reached at consensus that the two countries will not pose a threat to each other but rather treat each other as partners. However, recently the Indian Army chief and the ex- chief have clearly threatened that there can be a nuclear war in the region (a veiled threat to both Pakistan and China). Final Thoughts: In Pakistan, as compared to the adequate measures being taken for the upkeep of the conventional forces and the safety and security of the strategic assets, it is alarming to see the absence of any serious threat perception in the theatre of cyber warfare. The government as well as the armed forces seem to have neglected this threat for too long now and are not prepared to readily respond to this new challenge. Pakistan cannot afford any more compl acency in this regard and better take immediate steps to respond to this lurking threat on literal war footings. It would need absolute coordination, planning or understanding within various civil and military organizations and intelligence agencies respo nsible for the Cyber Warfare and perception management through propaganda wars in the cyber space. The whole existing system and organizations are to be revamped and some restructured to deliver effectively in these times of great crisis and threats in this arena. Reliance on the old fashioned methods of collecting and collating information and processing have to be updated. This should be clearly understood that in the modern world only those nations would have the advantage on the battle field, in both conventional and unconventional wars, which have fought and won the war in the cyber world first. The entire military equation in a war can be changed dramatically without even firing a shot, by controlling the critical infrastructure and perception of the t arget population through propaganda war in the cyber world. Weapons like E-bombs have emerged as a new threat to cripple the military communication infrastructure by producing massive electromagnetic pulse. Pakistan must start work on Transient Electro Magnetic Pulse Emanations Standards, known as TEMPEST in military parlance to counter electromagnetic-pulse bombs that can interrupt wireless signals. Pakistan has already faced interception of its vital secrete data on military operations in FATA by India through its assets in the area. It is, therefore, a must that we should work on TEMPEST and harden it to a degree of zero chances of interception of data transferred by defence agencies.

Pakistan needs urgently to create a centralized, aggressive and pro-active Command for Cyber and Information warfare under the Chairman Joint Chiefs of Staff Committee. The unguarded flank of Pakistan defence must be secured at the soonest.

http://www.defence.pk/forums/india-defence/122982-new-war-between-india-pakistan-cyberwarfare.html

You might also like