The looming threat of Cyber warfare

War is shifting to cyberspace

A cyber attack is no less lethal than a nuclear attack. It could cripple financial systems, stock markets, navigation systems of ships at sea or airplanes in air, and shut down industrial or nuclear plants.

Cyber-warfare is, relatively, a new phenomenon. Though the FBI had already been exploring cyberspace in respect of domestic intelligence, the NSA awoke after the aerial attack on the New-York Twin Towers.  It was a bit hard for the NSA to convince President Bush that a cyberforce was the need of the hour. The USA accuses China of having penetrated defence contractors’ computers to get information about the $737 billion F-35. China points to Huawei penetration and Snowden’s leaks about hacking of Chinese universities computers.

Bush, engrossed in his War on Terror kept aloof from the Internet/Google. Shane Harris, in his book @War: The Rise of Cyberwarfare writes: “This was the man who had once said he used “the Google” only occasionally to look at satellite images of his ranch in Texas. It would be difficult to explain in technical terms how someone sitting at a keyboard could wreak havoc from thousands of miles away, using a machine with which the president was largely unfamiliar.” Like nuclear weapons, releasing cyber weapons required presidential assent.

A long last, the president sanctioned an ambitious cyber-warfare and espionage programme with required funding. During the Iraq War, the neophyte cyber warriors fought well in locating insurgents’ networks. In a way, the cost of the programme was repaid with dividends. Since then the USA has fortified its cyber-capability to meet not only external but also internal threats.

“During US military operations in Libya in 2011, which led to the ouster of Muammar Gaddafi, the NSA worked with the Navy’s cyber warriors to track targets in Libya and help create “strike packages”. Not only the NSA but also the FBI and CIA have cyber forces of their own. The FBI is however engaged in domestic cyber-espionage.

US defence production is closely allied with a host of defence contractors. For instance, Lockheed Martin, Northrop Grumman and BAE System were the sub-contractors in the $337 billion Joint-Strike fighter project. The USA surmised China had hacked contractors’ or sub-contractors’ computer systems. The NSA thoroughly checked the computer systems to make them foolproof. In so doing, they had to re-write the software, resulting in delay. The USA’s nightmare was that if China happened to know the vulnerabilities of the F-35 then it could exploit them in jet-to-jet combat.

It is difficult to sift propaganda from the truth in the USA’s allegation. Before the collapse of the USSR, several books portrayed it as a potent threat to the USA. But it collapsed like a house of cards. Maybe, the China bogey, also, was a hoax.

When an employee opened an email of a defence contractor from a “trusted source”, the incoming mail inserted a digital backdoor to allow China to monitor every keystroke the employee typed, besides every website visited and every file, created, uploaded, or downloaded. China even captured all the passwords that the contractors used for logging in to web forums. The NSA claims to have tracked “threat signatures” and communicated them to defence contractors.

The USA regards Huawei as a Chinese military-intelligence proxy. As such, it successfully penetrated it besides Beijing’s Tsinghua university. Snowden showed documents to journalists that revealed “the NSA had penetrated at least sixty-three [Chinese] universities’  computers or servers”.

Success in use of cyber-weapons stimulated the USA to create a robust cyber-force. Rigorous aptitude tests were developed by the US military to recruit the best warriors. It is already mandatory for all entrants to the US Air Force to undergo basic cyber-security training. Five military academies now include cyber-warfare as a field of study. The NSA sponsors a war game among all the services to choose the best hackers.

Incredible advances in technology will change our lifestyle. Electric car and bots to recharge electric batteries may outnumber gasoline filling stations and gas-guzzling cars. Online education and online commerce may become a permanent feature of everyday life with concomitant threats. Card cloners may outnumber pickpockets

Shortlisted USAF cyber specialists are trained at Keesler Air Force Base, on the Gulf Coast of Mississippi, just like pilots. The would-be cyber warriors have to run a gauntlet before being qualified to wear the cyberspace badge, a pair of silver wings crossed by a lightning bolt centred on a globe.

There were 12,600 USAF cyber-force warriors (2013 estimate). The majority guarded networks, plugged vulnerabilities, and updated networks. Only one percent were assigned the”exquisite” work of penetrating enemy computer systems. We know Stuxnet crawled into Iranian  nuclear systems and destroyed one-fifth of fast-spinning Iranian centrifuges.

Stuxnet is a cyber weapon built jointly by the USA and Israel in a collaborative effort known as the “Olympic Games” during 2005 -10. Stuxnet reportedly ruined almost one-fifth of Iran’s nuclear centrifuges. It caused the fast-spinning centrifuges to tear themselves apart. It could paralyse factory assembly-lines or power plants, most of which are in Europe, Japan, and the USA. Stuxnet functions by targeting machines using the Microsoft Windows operating system and networks, then seeking out Siemens Step7 software.

Shane writes that Bush was incredulous about claims made in briefings about capability of cyber-penetration. “Bush wanted to know: was the White House at risk? Bush pointed to the secure phone on his desk that he used to talk to cabinet officials and foreign leaders. “Could someone get into that?” he asked. McConnell realized that until this moment, the President had never been told just how weak the government’s own electronic defenses were, or the country’s. “Mr. President, “McConnell said, “if the capability to exploit a communication device exists, we have to assume that our enemies either have it or are trying to develop it.”

It is a myth that standalone computers (not connected to the Internet) can’t be penetrated. Even they are vulnerable, perhaps more vulnerable as everybody in an organisation knows their importance.

The age of bipolar cold-war is over. We now live in an unpredictable age where “speed” is the most important element of power. Armistead E. Leigh, in his book Information Operation: Warfare and the Hard Reality of Soft Power says, `What the future holds for military forces, and the national security establishment is unclear”. The age we live in is unpredictable. COVID19 turned it topsy-turvy.

Incredible advances in technology will change our lifestyle. Electric car and bots to recharge electric batteries may outnumber gasoline filling stations and gas-guzzling cars. Online education and online commerce may become a permanent feature of everyday life with concomitant threats. Card cloners may outnumber pickpockets.

Pakistan too should do its best to adjust with the changing world of information power.

Amjed Jaaved
Amjed Jaaved
The writer is a freelance journalist, has served in the Pakistan government for 39 years and holds degrees in economics, business administration, and law. He can be reached at [email protected]

Must Read

The AI Paradox

The use of Artificial Intelligence is revolutionary, defining new pathways in various aspects of the modern era including education. AI provides opportunities like efficient...

Defending the dollar

Epaper_24-12-23 LHR

Epaper_24-12-23 KHI