Cyber Warfare Trends, Tactics and Strategies: Lessons for Pakistan
Keywords:Cyber-attack, cybersecurity, cyber warfare, cyber weapons, digital revolution
With the advent of the digital revolution, computer security has gradually evolved from a technology problem to a business and safety problem. Unlike conventional warfare, cyber warfare is inexpensive, effective and obscure, which in case of conflict, offers nation states a combination of cyber tools such as espionage, subversion, disinformation, and propaganda. Cyber warfare may prove decisive in many international conflicts in the future. This paper discusses the evolution of cyber-attack surfaces, adversaries and next generation cyber-attacks, and illustrates the security risks posed by the technological revolution and its impacts. It further discusses the potential solutions, and measures which the Government of Pakistan (GoP) may take to build effective detection and response cyber warfare capabilities. The GoP should consolidate the available cluster of skills and technology to establish a national agency mandated to conduct cybersecurity for efficient critical asset protection and effective response to any kind of cyber-attack.
Benzel, T. 2015, ‘A Strategic Plan for Cybersecurity Research and Development’, IEEE Security & Privacy, vol. 13, pp. 3-5.
Brandom, R. 2017, ‘It’s Already Too Late for Today’s Ransomware Victims to Pay Up and Save their Computers’, The Verge, 27 June,
Chen, T. M. and Abu-Nimeh, S. 2011, ‘Lessons from Stuxnet’, Computer, vol.44, no. 4, pp. 91-93.
Daniel, J. 2017, ‘Chinese Theft of Sensitive US Military Technology is still a ‘Huge Problem,’ says Defense Analyst’, CNBC, 9 November,
DeSombre, W. 2016, Getting Harder to Catch Analyzing the Evolution of China’s Cyber Espionage Campaigns against the United States through a Case Study of APT1, Tufts University, Massachusetts.
Dias, E. 2016, ‘Hillary Clinton Campaign Pushes Back on “Anti-Catholic” Charge’, TIME, 5 October, <https://time.com/4528532/hillary-clinton-campaign-pushes-backon-anti-catholic-charge/>.
DNI 2017, ‘Background to “Assessing Russian Activities and Intentions in Recent US Elections”: The Analytic Process and Cyber Incident Attribution’, Office of the Director of National Intelliegnce, National Intelligence Council, 6 January, <https://www.dni.gov/files/documents/ICA_2017_01.pdf>.
Dukes, E. 2018, ‘The Cost of IOT Sensors is Dropping Fast’, iOFFICE, 11 September, <https://www.iofficecorp.com/blog/cost-of-iot-sensors>.
Erol, M.S. 2015, ‘Hybrid Warfare Studies and Russia’s Example in Crimea’, Gazi Akademik Bakış, vol. 9, no. 17, pp. 261-277.
Gady, F.S. 2015, ‘New Snowden Documents Reveal Chinese Behind F-35 Hack’, The Diplomat, 27 January, <https://thediplomat.com/2015/01/new-snowdendocuments-reveal-chinese-behind-f-35-hack/>.
GoP 2016, The Prevention of Electronic Crimes Act, 2016, Government of Pakistan, <http://www.na.gov.pk/uploads/documents/1470910659_707.pdf>.
Greenberg, A. 2019, ‘A Brief History of Russian Hackers’ Evolving False Flags’, The Wired, 21 October , <https://www.wired.com/story/russian-hackers-false-flags-iranfancy-bear/>.
Healey, J. 2017, Cyber Warfare in the 21st Century: Threats, Challenges, and Opportunities, Committee on Armed Services, House of Representatives, One Hundred Fifteenth Congress, First Session, H.A.S.C. No. 115-8, Washington, D.C.: U.S. Government Publishing Office, <https://www.govinfo.gov/content/pkg/CHRG115hhrg24680/pdf/CHRG-115hhrg24680.pdf>.
Hosenball, M. Eckert, P. and Maler, S. 2011, ‘China Under Suspicion in U.S. for Lockheed Hacking’, Reuters, 3 June, <https://www.reuters.com/article/us-lockheedchina/china-under-suspicion-in-u-s-for-lockheed-hackingidUSTRE7517B120110602>.
ITU 2019, ‘Global Cybersecurity Index (GCI) 2018’, International Telecommunication Union, <https://www.itu.int/dms_pub/itu-d/opb/str/D-STRGCI.01-2018-PDF-E.pdf>.
Kaska, K. Beckvard, H. and Minarik, T. 2019, ‘Huawei, 5G and China as a Security Threat’, Estonia: Cyber Defence Centre of Excellence (CCDCOE),
Kelley, M. B. 2013, ‘The Suxnet Attack on Iran’s Nuclear Plant was “Far More Dangerous” than Previously Thought’, Business Insider, 20 November, <https://www.businessinsider.com/stuxnet-was-far-more-dangerous-than-previousthought-2013-11>.
Kovacs, E. 2012, ‘MI6 Call, Possibly to FBI, Leaked by TeaMp0isoN (Audio)’, Softpedia News, 12 April, <https://news.softpedia.com/news/MI6-Call-Possibly-toFBI-Leaked-by-TeaMp0isoN-264168.shtml>.
Mengting, L. and Lee, C. 2019, ‘US Blacklist on Huawei: Leverage for the US-China Trade Talks?’, Singapore: S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, 7 June, <https://www.rsis.edu.sg/rsispublication/cms/rsis-wto-parliamentary-workshop-us-blacklist-on-huawei-leveragefor-the-us-china-trade-talks/#.XpTED8gzbIU>.
Martin, D. 2016, ‘Russian Hacking proves Lethal after Ukrainian Military App Hijacked’, CBS News, 22 December, <https://www.cbsnews.com/news/russianhacking-proves-lethal-after-ukrainian-military-app-compromised/>.
Marvin, T. R. 2015, ‘World War II Information Security: Hacking the Enigma’, Kaspersky, <https://www.kaspersky.com/blog/ww2-enigma-hack/8628/>, accessed 23 December 2019.
Myers, R. 2015, ‘British Hacker Suspected of Cyber Attack on US Central Command Twitter Account’, Mirror, 13 January, <https://www.mirror.co.uk/news/worldnews/british-hacker-suspected-cyber-attack-4974855>.
O’Hara, T. F. 2004, ‘Cyber Warfare/Cyber Terrorism’, USAWC Strategy Research Project, Masters Thesis, Carlisle, Pennsylvania: U.S. Army War College.
Paul, L. and Paul, H. 2018, ‘Leaked: Cambridge Analytica’s Blueprint for Trump Victory’, The Guardian, 23 March, <https://www.theguardian.com/uknews/2018/mar/23/leaked-cambridge-analyticas-blueprint-for-trump-victory>.
Quadir, S. 2019, ‘Bangladesh to Sue Manila Bank over $81 Million Cyber Heist: Cenbank Governor’, Reuters, 30 January, <https://www.reuters.com/article/us-cyberheist-bangladesh/bangladesh-to-sue-manila-bank-over-81-million-cyber-heistcenbank-governor-idUSKCN1PO19J>.
Roberts, J. J. 2016, ‘Sneaky Ads on Twitter Tell Voters to Text Votes for Hillary Clinton’, Fortune, 3 November, <https://fortune.com/2016/11/03/text-vote-hillaryclinton/>.
Robinson, M. Jones, K. and Janicke, H. 2015, ‘Cyber Warfare: Issues and Challenges’, Computers & Security, vol. 49, pp. 70-94.
Shin, J. 2008, ‘Psychographics in Politics’, Encyclopedia of Political Communication, vol. 1, pp. 665-665, DOI: 10.4135/9781412953993.n549.
Siobhan, G. and Shara, T. 2011, ‘Security “Tokens” Take Hit’, The Wall Street Journal, 7 June,
The Tribune 2019, ‘Pakistan Ranked Among Least Cyber Secure Countries’, 13 February, <https://tribune.com.pk/story/1909680/8-pakistan-ranked-among-leastcyber-secure-countries>.
Tim, M. and Rubenstein, P. S. 2017, ‘American Voters Back Sanctions for Russian Hacking, Quinnipiac University National Poll Finds; Israel, Palestinians Not Sincere About Peace, Voters Say’, Hamden: Quinnipiac University,
<https://poll.qu.edu/national/release-detail?ReleaseID=2417>, accessed 25 April 2020.
Wakefield, J. 2019, ‘Russia “Successfully Tests” Its Unplugged Internet’, BBC News, 24 November , <https://www.bbc.com/news/technology-50902496>.
Zetter, K. 2016, ‘Inside the Cunning, Unprecedented Hack of Ukraine’s Power Grid’, Wired, 3 March, <https://www.wired.com/2016/03/inside-cunning-unprecedentedhack-ukraines-power-grid/>.
How to Cite
Copyright (c) 2023 Rafay Baloch
This work is licensed under a Creative Commons Attribution 4.0 International License.