In principle, excluding Huawei’s 5G from the US networks certainly does not make them safer.
The logic for the operation of the 5G network is such that the criteria for secure transmission shall be defined immediately.
An executive order of President Trump, issued last May, prevents US companies from buying materials and information technology from companies that pose a danger to national security.
There is an obvious reference to Huawei and ZTE, the two Chinese companies that currently set and dictate the rules in the 5G sector.
At the basis of these operations for excluding Huawei-ZTE products there is the new Chinese National Intelligence Law of 2017, which obliges all Chinese companies to support the government abroad.
It should be recalled, however, that – according to all independent analysts – Huawei and its 5G network are at least a year “ahead” of their Western competitors, besides being less expensive and more user-friendly.
The 2017 law provides the Chinese system (and the CPC) with new tools – especially in the cyber sphere – for State security. Exactly the opposite of what happens in the West, where the intelligence services seem to be bogged down in an eternal wasteland made of little money, excess of regulations, hatred on the part of decision-makers and closed-minded attitude vis-à-vis civil society.
Considering this strategic context, it is easy to predict what will happen to us.
Nevertheless, it is not just a matter of naive evaluation of hardware – as far as the Huawei 5G network is concerned – considering that the dangers to security are always present also in software and networks.
Thinking that there is only one danger for the 5G networks, and not for others, is a colossal naivety, which will be exploited by those who do not want us to equip ourselves with 5G networks at the best level available on the world market.
In fact, both the Russian Federation and North Korea have already penetrated some US web networks without using – in any way – Huawei or Chinese-made material.
Hence why so much ado about Huawei, considering that the current 5G or 4G networks are equally penetrable, and certainly not by China?
As I hope it is clear, the origin of a network says nothing about who wants to use it illegally or “covertly” and how.
The US 5G system has not yet an international standard, while the 4G security measures, which may well be adapted to the new network, have not yet been fully adapted to the new use paradigm, both in the USA and in the EU.
A recent study on the 5G authentication by the ETH of Zurich and the universities of Lorraine and Dundee has showed that the standard currently used on the 5G network- derived from the 3rd Generation Partnership Project (3GPP), an international organization of telecommunication industries – lacks security and accuracy.
Hence, this is certainly not a “fault” of Huawei.
The Authorization and Key Agreement (AKA), which is a security protocol used mainly in the 5G network, also shows structural weaknesses, which can enable some people to steal data and intercept communications.
Once again this does not regard Huawei. Quite the reverse.
It should be recalled that currently the US government has no control over the 5G procedures and standards. It can only collaborate – and not substantially – with the companies operating in the sector. Nevertheless, we believe it is already too late.
The myth of the “free market” is back again. If the USA still believes that a network like the 5G – which, as was said in the Davos Forum, will create the “fourth industrial revolution” – can do without the State support, we are really stuck back in the nineteenth century.
Instead of always thinking about the links between the founder of Huawei and Chinese Armed Forces (and, indeed, we should wonder how many US companies are born from the military sector and hence why should we trust them), the USA should be able to establish – by legislation – the built-in network security standards and criteria.
But it will never do so. Hence also the USA is interested in building 5G networks with backdoors, while Huawei follows the world market and adapts to it.
This should obviously apply to all producers. Why is no world Conference of 5G producers organized to set the network security criteria? Is someone – who is not Huawei – afraid of it?
A further problem for the advanced networks will arise with the Internet of Things (IoT), one of the 5G elective applications.
The IoT is a particularly sensitive system and many attempts have already been made by hackers to block it, especially with the Distributed Denial of Service (DDOS).
We can partly survive with the same 5G flow rate, but nothing can be guaranteed and taken for granted.
But, ultimately, what is really the 5G network?
It is a set of technologies, which can connect both self-driving cars and the most traditional data networks.
The transmission bandwidth is over 20 gigabits per second, but the 5G network operates with two different frequencies.
In one of two modes, the 5G system uses the same networks and the same frequencies as 4G and WI-FI, but with a better coding system and with wider transmission channels.
In the second mode, the 5G system uses much smaller frequencies, which can send data even faster than 4G, but for shorter distances.
Hence, considering that the 5G system operates mainly with small and very small waves, which “fall” after a short distance, it will need more transmitters – in series or in parallel.
With a view to increasing the bandwidth, the 5G cells use – in particular – a technology called Multiple Input, Multiple Output (MIMO).
In this case, hundreds of antennas operate at the same time, which significantly increases the speed and proportionally decreases the signal latency.
In the 5G network it is currently one millisecond only, while in the 4G system the standard latency is 30 milliseconds.
There is also a specific 5G technology available, enabling both transmitters and receivers to send / receive data on the same wavelength.
It is known as full duplex and operates with specific circuits, so that the outgoing and incoming signals can never interfere with one another.
At security level, the 5G network is weak when exchanging cryptographic data and, obviously, the greater the number of processing points, the more the possibility of data theft increases geometrically.
Currently, however, it is weak for everyone, not just for Huawei users.
The average 5G speed is currently one gigabyte per second (1GBps) – far beyond the 4G standard and the standard of any WI-FI network operating today.
As already seen, with a view to reaching the very high speed of its signal, the 5G network uses the millimeter waves (MMS).
They are radio signals with frequencies ranging between 30 and 300GHz. Obviously, high frequency waves have a great signal transfer capability and carry much data, while the lower frequency ones carry little data and can be blocked by buildings, cars, airplanes and trees.
With a view to solving this problem, the 5G network resorts to small cell antennas, which must be placed in a far more widespread way than 4G antennas – one every 150 meters approximately.
The small cell antennas are 1.3 meter high, but if the 4G uses frequencies ranging between 1 and 5 GHz, the 5G networks operate with frequencies between 24 and 90 GHz, with serious health risks.
As we all know, however, if the signal dispersion is proportional to the distance squared, the possibility that the 5G spreads data not allowed by the source is intrinsically high.
It is not an issue of naive IT backdoors in sensors (which seems, however, rather unlikely) but of simple squared spreading of signals.
After all the 5G is very similar to microwave radiation.
And there are now certainties about its negative effects on both the skin and the reproductive organs.
Nevertheless, as often maintained by the supporters of the new 5G network, it is not so much a 100 times faster system than the 4G for Internet communication, but rather the way in which the future world will organize production, life, trade and exchanges.
So far, at least in Europe, the US Presidency’s activities to block Huawei have been such that the 5G network in Europe will cost over 55 billion US dollars more than expected.
Currently, in Europe, Huawei and ZTE hold 40% of the 5G networks and the related equipment.
Hence, half of the 55 billion US dollars comes from our EU markets’ loss of competitiveness.
Not to even mention the situation in which the 5G network operators in Europe were to rebuild the entire network of fixed structures – an incalculable cost.
In fact, the companies operating in the sector should rebuild the entire physical lines, at a huge cost, apart from the networks’ loss of effectiveness.
At that point, we might just as well keep the 4G network.
What about the interference with the other networks, especially the military ones?
Here the USA tells us that the danger lies in the width of the spectrum used by the Huawei 5G network but, as we have already seen, both the very low signal permanence in the networks and the multiple antennas prevent any signal closure, any backdoor and any parallel recording.
Normally the US military and intelligence transmission systems are “sub-6”, which means they use a band ranging between 3 and 4 GHz.
The signal overlap is therefore unlikely.
Furthermore, the USA – with South Korea and Japan – had planned a 5G network with a wave width of 24-300 GHz, a very different and far more expensive technology than the Chinese one, which was supposed to go into production around 2022.
It would have been called mm Wave technology, a technical procedure transmitting with a wavelength of approximately a millimeter that, however, can penetrate solid materials, is very directional – like light – and is also selective in targets.
Hence Huawei has therefore shot ahead, with simpler, sounder and more reliable technology. This is the real reason underlying the opposition to the Chinese 5G project – cheap intelligence issues are only a pretext.
On the technological and commercial levels, considering that the Chinese 5G networks provide greater coverage and fewer disruption risks, China has already installed 350,000 5G stations in China and over 10,000 abroad, in 30 countries including Turkey and Iceland.
Between 2009 and 2011, however, Vodafone Italia discovered “backdoors” in the Huawei network – not in the 5G, but in the standard network.
No data was tampered with or illegally recorded, as claimed by Vodafone Italia itself and by the media that reported the news.
The Italian Internet operator also said that the network security problems had been quickly solved.
The Chinese company defined those defects as mere “errors”, not as backdoors, a term designating a voluntary mechanism of non-permitted data recording.
Hence this is the reason why the NATO Centre of Excellence claims that “there is no alternative to Huawei’s 5G” but that “it would be necessary to define autonomous security standards”.
It is therefore inevitable that the Chinese 5G networks become essential parts of the communication system, but also of the defense-control system of many Western countries, including the United States.
In any case, Huawei has always said that there have never been any security incidents concerning its network and, indeed, Huawei is the most controlled and checked industry in the cyber sector worldwide.
Considering that every part of the network built or designed by Huawei is fully verifiable and usable, a way to make a 5G network completely safe is encryption. We imagine it will be developed in a short lapse of time and with homogeneous criteria for all global operators.
Nevertheless, insofar as Huawei networks are built in the world we have outlined, they cannot anyway be intelligence networks in favour of China, considering that: a) the Huawei 5G network is already the most widespread and used system and statistics is such as not to allow any ambiguity; b) the technology itself – with the minimum signal latency – is such as not to allow backdoors that are neither obvious nor hidden and which, however, would be capable of blocking the entire global market for the Huawei 5G system; c) the idea that the founder of Huawei is a former officer of the People’s Liberation Army and a CPC member makes us smile.
What if we applied the same criterion to the huge number of components or tools for the web that are produced in China, but for the major Western companies?
Moreover, d) it is irrational to think that a company like Huawei ruins its market – which is what really matters – or even its reputation for technical and political reliability for some IT backdoors.
It should be reiterated that intelligence is not made by eliciting unmentionable secrets, but by discovering the creative mechanism of the enemy’s thinking.
Intelligence is not about a “fact”, but about a concept.
As Napoleon used to say: “Unhappy the general who comes on the battlefield with a system”.
The drone attacks on Saudi Arabia’s oil wells
In the early morning of Saturday, September 14 last, at 3.31 and 3.42 a.m., the Yemeni Houthi Shiite rebels supported by the Iranian “Revolutionary Guards” – the right eye of Imam Qomeini, as they are called in Iran – launched about ten drones against the largest Saudi oil extraction area owned by ARAMCO.
Allegedly the operation was launched from Iraq. Both Abqaiq, the largest stabilization facility in the world, as well as the Buqaiq facility in the extraction field, and finally Kurais, about 60 kilometres from Abqaiq, were hit with drones.
It is the largest oil disruption ever, considering all those caused by wars or other reasons.
The Shiite attacks have immediately reduced Saudi production by about five million barrels per day, i.e. about half of the Saudi Kingdom’s daily output.
With the drone attacks, the world has lost 6% of its oil output.
The Saudi authorities have said that, as early as September 17, everything has been under control.
The first geopolitical deduction that can be made is that the current attacks, much more virulent than those already occurred last May, open a second front of Arabia’s war against Iraq, which, in any case, would severely strain the Saudi armed forces, already absorbed by the war in Yemen- albeit with meagre results.
Moreover this could open a new strategic area, in which the USA could be forced to help Saudi Arabia and Israel could be forced to later project its power not only onto its northern and southern borders, but also onto eastern Syria and Iraq – and permanently so, unlike what currently happens.
Certainly, all this regards above all Iran that, however, could not afford a hybrid and conventional war with Saudi Arabia and its traditional regional allies.
Moreover, the Shiite Houthi’s attack on the Saudi oil facilities was conceived and probably planned by the Head of the Pasdaran, Qassem Soleimani.
Hence the Houthi operation has run parallel with the action directly organized by the Pasdaran on September 15 last, i.e. the seizure of a ship – the name of which is still unknown -carrying a fuel cargo of over 250,000 litres.
All this happened in the Strait of Hormuz, near the island of Tunb, in Iranian waters.
A full option strategy to show Iran’s new regional strategic status.
According to Iranian sources, the rationale underlying the naval operation of the Iranian Revolutionary Guards concerns the substantial oil smuggling to and fro the United Arab Emirates.
Tout se tient.
Iran, on the one hand, while assessing the war burden for Saudi Arabia in Yemen, wants to open other fronts of the conflict, thus also extending Israel’s defence chain. Hence Iran pursues the overstretch of its traditional opponents.
Another possible assessment of the drone operation carried out by the Houthis and Iran is that it could be an Iranian response to the actions undertaken by French President Macron who has recently tried to organize a side meeting, at the UN General Assembly, between US President Trump and Iranian President Rouhani.
Ali Khamenei, the Rahbar and, hence, Iran’s Supreme Leader, was, however, clearly opposed to a new Iran-US diplomatic relationship, and his Revolutionary Guards have immediately understood the issue.
Moreover, the very recent drone attacks on the two Saudi facilities are not even the first and only ones. As mentioned above, on May 15 last, two Saudi pumping stations – placed on the East-West pipeline that reaches up to the Yanbu oil terminal were attacked with two drones probably launched from Iraq.
Hence Iran has an efficient and stable network in Iraq to launch attacks on the Saudi territory and its surrounding areas, not necessarily with drones only.
With its satellite photos, Israel has shown that the Al Quds Force, the elite of the Pasdaran, is building an Iranian military station in Albukamal, on the Syrian-Iraqi border-and probably these operations indicate that the base is already finished.
It is supposedly a base for at least 3,500 soldiers, with means that should be used above all for the “hybrid war”, but not only for it.
Once again Israel has become a target for Iran, from the new bases in Northern Iraq. The United States, however, does not want to be entangled and bogged down into a new “long war” in the Middle East, even though it will help Saudi Arabia (and, obviously, Israel) from afar, while Saudi Arabia has explicitly stated that the Iranian drones are very hard to track.
At economic level, however, the Saudi oil crisis has the same magnitude as the oil crisis following the Yom Kippur war.
This crisis, however, is really such only because Saudi Arabia has proved to be fragile, not only in terms of mere oil quantity, which has been immediately reintroduced into the daily balance, using the Saudi huge reserves.
Nevertheless they will run short and nobody really knows what the reserves of the Saudi wells are, which are reportedly still very large. However, there are those who have doubts in this regard, since it is the best kept Saudi State secret.
This has been the worst attack ever on the “oil bank”, as analysts call the Saudi Kingdom.
Hence the attack is a real game change rand it is currently hard to predict all its effects, even for technical experts and strategic analysts.
It much depends on Mohammed bin Salman’s moves, as well as on the US real engagement in the region, and finally on Israel’s future military policy.
According to some organizations that study oil markets, the Iranian and Houthi operation is at least as severe as the invasion of Kuwait – which also “sucked” Iraqi oil- or as the 1979 Iranian Shiite revolution itself.
President Trump has already authorized the release of US strategic reserves (SPR), where necessary, “to keep the markets well supplied”.
As early as September 16, however, Saudi ARAMCO has been expected to recover at least a third of its production, with a maximum of two or three million barrels of Saudi oil that will go back to the markets within two-five days, while additional 2.7 million barrels will arrive on the market later, considering the nature and specificity of the Abqaiq facility.
It is a huge facility located in a Saudi area where the presence of Shiite Islam is far from negligible, i.e. about 15-20%, mainly in the eastern zones and among the workers operating in the wells and facilities.
This is another political sign-halfway between religion and class struggle – not to be neglected.
When the markets opened, on the Monday following the attacks, the oil barrel price increased by 20%, with a peak of 71.6 USD per barrel.
However, what are the Iranian assets in the current war launched against the great Wahhabi and Sunni power, namely Saudi Arabia – a war which is a proxy one only from a formal viewpoint?
They are manifold and remarkable.
There are over 45 Iranian military airports. The maritime positions currently held by the Revolutionary Guards are over 16, all located on the coasts and islands of the Persian Gulf.
The missile stations in Iran and Iraq have several carriers capable of reaching a range of 2,500 kilometres.
Iran’s area denial and access denial capabilities are much greater than those of any country in the region.
Iran has a significant submarine fleet, both in the Persian Gulf and in the Indian Ocean, as well as a large fleet of very fast motorboats and patrol boats.
At military level, Iran is not afraid of its obvious tactical superiority nor of the first or second-level reactions of its opponents.
Cyberattacks are another Iranian “excellence” while, only recently, Saudi ARAMCO has been updated in terms of protection from cyberattacks- albeit we are still at less relevant levels than Iran’s.
It is no by mere coincidence that the Saudi oil company has already suffered cyberattacks, with the Shamoon virus in 2018. Moreover, due to their geographical location, also the Saudi ports and infrastructure are scarcely protected from missile or air attacks.
But also from sea bombings, especially on the ports of Ras Tanura and Ras Juaymah, located in the Persian Gulf, and of Yanbu, in the Red Sea, which are hard to protect.
So far, however, the Saudi critical infrastructure has been defended only from Qaedist attacks, not from a real military operation, possibly with the Houthi conventional or hybrid war protection.
Not to mention the desalination plants, which process 70% of all the drinking water distributed in Saudi homes, in addition to electricity grids, which are based on the production of energy using over two thirds of the abundant oil supplies. They are surely targets of the drone attacks, as well as cyberattacks or conventional operations.
Another factor not to be neglected regards one of the mainstays of Mohammed bin Salman’ strategy, namely the sale of Saudi ARAMCO.
Clearly the attacks significantly reduce the stock market value of the company, and it just so happened that, in the last days before the attack of last Saturday, the sale procedure had recorded a strong acceleration.
Mohammed bin Salman has set the cost of the ARAMCO operation at 2 trillion dollars.
Hence, considering the infrastructure weakness shown by Saudi Arabia, it will be very unlikely for investors to run to buy the company and carry out transactions on the Stock Exchange.
It is also easy to understand that Iran’s and its proxies’ operation against Saudi Arabia is such as to place Iran in a vantage position in a future new negotiation on the nuclear issue.
It should be recalled that the war in Yemen started in 2015 when Saudi Arabia entered that country to free some areas, including the capital Sana’a, from the insurgents.
Later Saudi Arabia established a friendly government, led by Abu Mansur Hadi.
Saudi Arabia, however, was not able to hold its positions and reach its strategic objectives.
In fact, holding Yemen means to completely control the Persian Gulf and the areas pertaining to it.
Saudi Arabia has kept only Aden and Al Mokha, as well as few other areas, while the border between Arabia and Yemen is still a land of conflict and clashes, in a tribal zone, on the Saudi side of the border line, which has always been scarcely favourable to the Al Saud family and to the Wahabi tradition of Islam.
Nevertheless, not the whole Ansar Allah, the Houthi Shiite movement, is strictly dependent on Iran.
Hence the war in Yemen is a huge cost for Saudi Arabia, while it is negligible for Iran.
We should also consider the support provided to the rebels in the South by Abu Dhabi, the other Emirates and Oman, a country that has always had its own specific policy vis-à-vis Iran.
It should also be recalled that Saudi Arabia was directly hit by drones on December 4, 2017.
However, only a part of the Yemeni tribes are currently loyal to Hadi’s central government and they have often had to enter the Saudi territory, while the other tribes, including the Sunni ones, have supported the tribal-national autonomy proposed by the Houthis.
As already mentioned above, however, ultimately not even Iran will be able to control Ansar Allah completely.
Other effects of the oil crisis will be seen in India, whose economic take-off relies solely on Middle East oil, with 18% of its annual consumption resulting from Saudi oil alone.
Other Asian countries shall change their main supplier, but also the United States – despite its shale oil production -has so far imported 400,000 barrels per day in 2019 alone.
The situation is not bad at all for Russia which, for years, has been setting oil prices similar to OPEC’s. The same holds true for Kuwait and the Emirates, but the possible expansion of production could currently reach a million barrels per day, which are not enough to cover the Saudi shortfall.
Reverting to Yemen, it should also be recalled that the local war is the result of the US-sponsored “Arab spring”.
Hence, it is however unlikely that the attacks on oil wells and facilities (and we should consider that they are not far from the Yemeni border) provide the opportunity for a combined Saudi, US and Israeli attack on Iranian military positions in Iraq or in the Persian Gulf.
From a disadvantaged position, Iran has managed to create its own strategic level playing field with regional and international players, which is the real new fact of the drone attack on the Saudi oil facilities that took place last Saturday.
Iran: New details of shooting Global Hawk disclosed
Deputy of Operations of Iran’s Passive Defense Organization Amir Khoshghalb, in an interview with Mehr news agency, released the details of downing US Northrop Grumman RQ-4 Global Hawk spy drone by IRGC.
“We were precisely observing the US drone’s activity even from the beginning moments of its flight,” he said, “We knew its route and it was under full supervision of Iran Defense Organization.”
“The drone was moving towards Iran, breaching international regulations i.e. taking that route it was making a threat to Iran,” the Iranian official said.
“It had even turned off its identification system,” he added.
“We needed to take a tactical measure, accordingly,” he said.
“Our tactical measure has various aspects; first we issued a radio warning,” Khshghalb described, “In some cases, the warning is stronger and will lead into a strong tactical measure such as shooting.”
“On its route, which was longer than three hours, the drone, which was under our full surveillance, was seeking something,” he reiterated.
“May be we could take initial measures much earlier but we let the drone do its job and end its route,” he said, “We repeatedly issued warnings when the drone was on its way moving towards us asking it to act upon international regulations but it ignored all of them.”
On June 20, In June, Iran’s IRGC downed a US Northrop Grumman RQ-4 Global Hawk spy drone after it had violated Iranian airspace. Despite the US claims that the drone had been flying over international waters, Iran said it had retrieved sections of the drone in its own territorial waters where it was shot down.
The intruding drone was shot by Iran’s homegrown air defense missile system “Khordad-3rd”.
US President Donald Trump said afterward that he aborted a military strike to retaliate against Iran’s downing of the US drone because it could have killed 150 people, and signaled he was open to talks with Tehran.
Chief of General Staff of Iranian Armed Force, Major General Mohammad Hossein Bagheri, said on Wednesday that the US was on the verge of attacking Iran but called off the plans after Iran downed the intruding drone.
“The US was to take a practical measure [military strike] against us but in the name of a high number of probable victims, it overturned the decision,” he said, adding, “The main reason, however, was Iran’s deterrence power.”
These are the result of the Iranian thought and the commands of the Revolution Leader, he said, noting that despite all problems, Iran enjoys great capabilities in the defense sector and the Iranian nation will not let eruption of another war.
From our partner MNA
Rethinking Cyber warfare: Strategic Implications for United States and China
“Every age had its own kind of war, its own limiting conditions, and its own peculiar preconceptions.”Carl von Clausewitz
Internet has transformed the front lines of war. Modern conflicts are now waged online in cyberspace. World Wide Web (WWW) has eradicated all physical borders and defences, without which weak and powerful states are all prone to attacks. Concurring to this pretext, a number of countries have formally recognized cyber as the new domain of warfare in their strategy papers and documents. United States and China are the master players in this realm having military units active, with sophisticated state of art capabilities dedicated to cyber strikes. The consequences are dire, for the sole superpower, and for the rising economic giant which is projected to take over the former by 2025.
The dynamic nature of cyber warfare has caused frustration in the inner circles of Washington and Beijing. Both the public and the private sector have been targeted. The former to get hands on state secrets and latter for intellectual property rights. According to an estimate by US Cyber Command (USCYBERCOM), it has cost the American economy $338 billion, an amount closer to the entire Gross Domestic Product (GDP) of Pakistan. China on the other hand leads the Asia-Pacific region in cyber losses which incurs the country an annual estimated loss of $60 billion.
Next Generation Warfare
There is a surge seen in cyber attacks against the US. The Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI) and National Security Agency (NSA) at multiple times have came under attack. This is followed by Silicon Valley tech giants, such as Netflix, Twitter and Spotify who on numerous occasions have been taken down by cyber attackers. It is very difficult to trace the identity and origin of the attack, as various techniques like changing Internet Protocol (IP) cannot only hide identity of attacker but misattribute it to other nations. Cyber security analysts working in their private capacity have collected evidence that seems indicate China as the alleged perpetrator of recent waves of cyber-attacks.
However, cyber pundits have openly stated that they cannot guarantee with a hundred percent accuracy that the evidence collected in wake of cyber-attacks is authentic and not planted by perpetrators to seem to look genuine. In cyberspace. An attack could be from anywhere around the globe. It could be from friends and foes alike, anyone can attack and make it look like an attack came from China or other adversary. In the past, cyberattackers from France bypassed into secured servers stealing classified information relating to American products and designs. Added to that, it is an expensive and difficult task to analyze these attacks. To know that you have been attacked or infiltrated is itself a big achievement. Considering that, it take days or even months to find that your security has been compromised. It took seven months for security analyst to find the Stuxnet virus that was hiding itself into a legitimate Siemens software responsible for controlling centrifuges at nuclear power plants around the world. According to an estimate starting rates for analyzing and identifying cyber attacks start from $650 dollars per hour, which often end up towards an uncertain conclusions.
Philippe Goldstein author of Babel Zero argues that attacking against a wrong adversary would be catastrophic. A troublesome scenario, where attacks in cyberspace can be met with conventional and even nuclear culminating a “Cyber Armageddon”. It is this reason that states have taken cyber warfare seriously and synonymous to national security. China has incorporated cyber command structure within its armed forces, under the“Three Warfare strategy.”
Cybersecurity analysts have called minuet “cyber bullets” as ‘Cyber weapons of Mass Destruction.’ All one needs is ‘bad timings, bad decision making and some bad luck!’ and you can end up having a World War III which was 24/7 nightmare of Cold War veterans. The world is not immune from such attacks. Anyone having an access to any computing device, from iPods to digital smart watches, having right technical skills can cause a national security crisis. This is well depicted in John Badham’s film, WarGames where a young hacker unknowingly sets a US military supercomputer to launch nuclear weapons on the former Soviet Union. Few years back, an attack on FBI’s website resulted in leaking of classified data caused alarm bells in Washington. Later it was found out the perpetrator was a 15 year old school boy from Glasgow, Scotland.
The way forward for states remains cumbersome in the absence of legal framework from the United Nations (UN). Further complications arise when the attack is orchestrated by a non-state actor or private individual from a particular state. Recent debates among the North Atlantic Treaty Organization (NATO) members have arisen in the wake of alleged Russian sponsored cyber activities against Europe and America whether the collective defence measures under Article 5 would apply to a cyber-attack.
Cyber security is a relatively new introduction in war studies. The US Department of Defence (DOD) recognized cyber warfare, as the fifth domain of warfare following land, sea, air and outer space. There are around 30 countries that have dedicated cyber military units, whereas more than 140 countries have or are in developing stages to acquire cyber weapons. Cyber is the means by which countries irrespective of their financial standing can acquire to further states objectives. US and China are considered advanced states in cyber realm, having cyber military technology and capabilities that are rarely matched by other contenders. Therefore, studying their way of cyber dealings, strategies and policy making would allow other countries such as Pakistan to better able to understand the dynamics and nature of this new type of warfare. India has tasked the Defence Cyber Agency (DCA), presently headed by a two-star Admiral which reports directly to Chairman of the Chiefs of Staff Committee (CCSC). DCA is presently undertaking to prepare a Cyber warfare doctrine for India. The repercussions of the developments are critical for Pakistan, which require a comprehensive safety and information guideline to be prepared for the masses.
Renewables Can Lead the World’s Response to Climate Change
The International Renewable Energy Agency (IRENA) will deliver a clear message to policy makers, civil society leaders and business decision...
My struggles with depression and finding lasting romantic love
These are things that make me happy. The stars brightness turns in the air. Dandelions. Reading Hemingway. The pouring rain....
Not very long ago (Sept 2, 2019), India launched a rocket to the far side of the moon. It carried...
Decade of the Battery: Sustainable Batteries Represent the Best Prospect for Meeting Paris Climate Goals
Advances in the production, use and reuse of batteries mean that the technology could become the most significant intervention to...
JCPOA: Forward Into the Past
In the last few months, the U.S.¬–Iran confrontation has been rapidly and steadily plunging the Middle East into the atmosphere...
The world can’t afford to relax about oil security
Authors: Tim Gould and Tae-Yoon Kim* The recent attacks in Saudi Arabia were a sharp reminder that the world can’t...
Taxes on polluting fuels are too low to encourage a shift to low-carbon alternatives
Taxing polluting sources of energy is an effective way to curb emissions that harm the planet and human health, and...
South Asia3 days ago
‘Six weeks of Indian Disinformation in Kashmir Lockdown’
Energy3 days ago
U.S. Fracking Will Continue Its Forward March
Economy2 days ago
Foreign direct investment is not coming to Indonesia. Really?
Middle East2 days ago
Saudi oil attacks put US commitments to the test
Science & Technology2 days ago
How to Design Responsible Technology
Reports2 days ago
Emerging East Asia Bond Markets Continue Growth Despite Risks
South Asia2 days ago
Kashmir: The Unconquerable Will of Kashmiris is still Alive
Middle East3 days ago
Growing Tensions on the Road to Persian Gulf Security