Should Pakistan have a cyber army?
PUBLISHED January 16, 2022
Cyberspace is an exceptional man-made domain that was created to facilitate communication and can be characterized as an interconnected global infrastructure. It has made possible the free exchange of data via a networked system for more than half of the world’s population. Emerging threats in cyberspace present new risks and challenges to today’s societies around the world, potentially compromising the security of their citizens and significantly disrupting political, social and economic life.
To intellectualize the security of cyberspace, it is necessary to differentiate between two quantities of risk: the risk for cyberspace and the risk via cyberspace. Cyberspace risk can be seen as a threat to the physical infrastructure of communication technologies. The threat through cyberspace, on the other hand, is a danger posed by cyberspace itself and is made possible by the use of its technologies.
Even though the Internet was developed to be a primarily powerful network, its growth and change in status from a small network of interconnected devices to the global hub of social and economic life has introduced a wide range of security vulnerabilities into its physical structure. After being repeatedly targeted with malicious intent to disrupt, many states have recognized cyberspace as “a key national asset” and have planned to create special organizations that will protect critical infrastructure, thereby reducing risks to normal functioning. of the network.
It is important to keep in mind that cyberspace is a prerequisite for the existence of universal capitalism in its current form; therefore, emerging risks to cyberspace threaten to undermine international capital markets and disrupt the prevailing economic order. Therefore, the security needs of cyberspace infrastructure and information flow coincide with some of the essential elements of national security and must be protected by government actors. To this end, Communications Security Establishment Canada (CSEC) and the National Security Agency (NSA) have established national encryption standards and protection protocols.
In addition, the task of protecting critical infrastructure from deliberate attacks and other risks has prompted many states to develop policies related to “offensive operations in cyberspace”.
Risks via cyberspace
The technological explosion of the previous decade was linked to the creation of civic networks that facilitated the establishment of social and political activities of many nations more efficiently and enabled countless entities to spark their ideas without the help of intermediaries such as the radio and the press. The new media channels have enabled a substantial change in the landscape of public discourse bringing radical variations in countries like Egypt. Nevertheless, cyberspace has also been increasingly used to express minority views of terrorist organizations.
They have used information and communication technologies to disseminate their military doctrines and promote extremist activities. Many jihad-oriented groups have been known to explore the anonymous nature of cyberspace for purposes of radicalization and recruitment within different societies. Moreover, they have also used them to fund terrorist activities and engage with radicals around the world. An additional challenge presented by cyberspace is the ever-increasing criminal activity: online extortion, distributed denial-of-service (DDoS) attacks, and unauthorized access.
Cyberterrorism in Pakistan
The presence of extremist and radical groups on the Internet is an ancient phenomenon because they have been manifesting their appearance in cyberspace since their inception. However, their reliance on cyberspace operations has grown tremendously over the past two decades. The threat of cyberterrorism has become a complex and multi-faceted enigma where various conceptual doctrines are transforming the world into cyber warfare. By 2000, virtually all terrorist groups had established their online presence worldwide and activities in cyberspace were carried out by terrorist organizations operating in Pakistan. Terrorist organizations including Islamic State (IS), Jamat Ud Dawa (JuD), Baloch Liberation Army (BLA) and Lashker-e-Tayyaba (LeT) showed their presence online and used social media for assisting and carrying out terrorist attacks and uploading/sharing videos of their attacks on social media, which creates harassment and a sense of insecurity among the people of our country. These organizations use cyberspace for fundraising, online recruitment, psychological warfare, propaganda, and information sharing. Therefore, the existing cyber laws and the National Cyber Security Policy 2021 must be implemented in Pakistan effectively and efficiently to curb, control and deal with modern crimes and potential threats to our people and national infrastructure. reviews.
The Need for a Cyber Force
Cyber warfare is generally defined as a cyberattack or a series of attacks targeting a country. It has the potential to wreak havoc on government and civilian infrastructure and disrupt critical systems, resulting in damage to the state and even loss of life.
According to the Cyber Security and Infrastructure Security Agency, the purpose of cyber warfare is “to weaken, disrupt, or destroy” another nation.
A cyber army is a group of highly trained information technology soldiers with cyber skills. Cyber armies are the invisible military cyber power that countries should use to maintain national cyber security.
Establishment of National Center for Cyber Security (NCCS), PECA-2016, FIA NR3C, CERT and National Cyber Security Policy of Pakistan are valuable initiatives of our government to curb, control and address potential threats of cyber crimes in Pakistan. United States Cyber Command (USCYBERCOM) is a unified combatant command of the United States Armed Forces.
Many risks to and through cyberspace have a long-term negative impact on commercial, development, defense and government activities; therefore, all cyber threats must be properly addressed by security agencies and other organizations through appropriate implementation of cyber security laws and policies, risk and vulnerability assessment frameworks, and awareness of ordinary mortals.
(The author is a researcher and doctoral student in the field of cybersecurity and cybercrime.)