Hybrid Warfare is a military strategy that employs political warfare and composites conventional warfare, irregular warfare and cyber warfare with other influencing methods such as fake news, diplomacy, and electoral intervention.
Hybrid warfare is a new challenge that Pakistan is facing and is linked with the exploitation of identity issues especially in tribal areas which were recently merged with Khyber Pakhtunkhawa province. Hybrid Warfare can be defined as externally provoked identity conflicts, which exploit historical, ethnic, religious, socio-economic and geographic difference within geostrategic transit states through the phased transition from color revolutions to unconventional warfare to disrupt, control, or influence multipolar transnational connective infrastructure projects by the means of regime tweaking, regime change or regime reboot. Such wars are supported by external powers to fuel identity conflicts such as Pashtun Tahafuz Movement, provoking Baluchistan insurgency or terrorism in whole Pakistan.
In Pakistan, India is actively involved in exploiting these fault lines since 1947 and Pakistan lost thousands of citizens and security persons due to Indian conspiracies. This type of conflicts are fuelled which are a combination of natural and synthetic reasons and these conflicts pre-exist almost within every single country in the world with different intensity, but these conflicts do not catalyze political change unless external actors support or aggravation is present and India is working constantly to create such divisions.
Indian intelligence agencies are actively involved in destabilizing Pakistan recently caught an Indian intelligence agent commander Kulbhushan, he revealed during interrogations Indian Hybrid war plans against Pakistan. Baluchistan issue is an example of India’s hybrid warfare against Pakistan, which has been evolving from time to time, a recent wave of suicide attacks by Baloch separatists and attack on Chinese embassy depicts India’s intention to disrupt CPEC in Baluchistan in future. Different external actors are also involved in destabilizing Pakistan such as America and western countries and some Arab countries also fund separatists in Baluchistan and harbor them.
This problem is not only in Pakistan but every single country is vulnerable to at least one of five identity indicators that are historical, ethnic, religious, socio-economic and geo-graphic.
In Pakistan’s security dynamics external actors constantly try to provoke these fault lines. These above-mentioned identity indicators do not have to be active anywhere but the ground for exploitation exists, which in some cases could then be manipulated by others to create artificial conflicts, historical differences which every country has, these might relate to old political rivalries between groups or to recently acquired territory. Then there are ethnic and religious issues, which are between or within different groups, while socio-economic issues also emerge due to inequality and systematic economic and institutional challenges and in the end there, are identity differences.
Geographic differences are further divided into physical and political. People living in Baluchistan for instance usually have a different identity than those living in the Punjab or Kashmir and the same goes for politics. At the moment our nation is at externally provoked identity conflict in geostrategic transit states. Pakistan is a multicultural and multi-ethnic state and we need to take measures to tackle such threats.
Hybrid wars are just tactically defended against through democratic institutions and inclusive patriotism, but also through advanced knowledge about how they function and what they entail, so the more awareness among citizens less potential recruiters for foreign hostile actors. And also if citizens are educated and aware of hybrid warfare, then there are fewer chances of success of foreign agendas. Unity is a killer of identity conflicts and Pakistan must promote it with full force, if the whole society is aware of hybrid warfare and about its functioning then there are quite fewer chances of damage in case of crucial times.
Indian National Security Advisor Ajit Doval’s doctrine indicates India’s hybrid warfare ambitions against Pakistan. The doctrine envisages engaging the enemy at three levels, defensive, defensive-offensive and offensive. The offensive-defensive mode requires going into Pakistan and tackling the problem where it originated which is a fabrication. As his infamous statement is on record in which he said that you do one Mumbai you may lose Baluchistan and further said that India will unconventionally use conventional means to achieve its goals which are part of hybrid warfare. So the hybrid war already has been waged against Pakistan especially in Baluchistan where India is fuelling the fire. Pakistan requires a credible response by formulating offensive rules of engagement toward all hostile nations especially India and our future national security measures require a major up-gradation on all fronts of war ranging from conventional modernization, cybersecurity to offensive actions against enemies of Pakistan beyond borders by whatever means required.
USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware
Pegasus Spyware Scandal has shaken whole India and several other countries. What will be its fallout no one knows as we know only tip of iceberg. Amidst Pegasus Spyware Scandal USA and Australia both have shown serious concerns about Cyber Attacks on US and Australian interests. Both say that China is hub of malware software and both face millions of such attacks daily.
I am trying to understand why a software is needed to spy on a particular individual when all calls, messages, data, emails are easily accessible from server. In most of cases these servers are located in USA and some cases these are located in host country. In certain sensitive cases Government Agencies have their own server like Central Intelligence Agency and hundreds of other agencies and military establishment world over including India. Now point is who installs those servers.
A couple of years back I had talked to Mr Mike Molloy who is Chief Executive Officer of Orion Global Technologies previously known as Orion SAS. He had explained me how his company installs servers in host countries on request of private or gov bodies. He talks about contract and trust. That means even when a company or Gov buys a server or software for designated uses the “Secrecy” Factor remain on discretion of company which has supplied server or software.
Now if all data, e-mail, chat, messages, calls are accessible to Gov as per law and technology (Through Server all components of Communication are accessible and thats why me and you see start seeing call recording of a person even after many years later), I am unable to understand why a Gov will be needing a software to Spy on any one.
Now coming to where Australia and USA wants to carry the whole debate.
Australian Foreign Minister Sen Marise Payne said, “Australian Government joins international partners in expressing serious concerns about malicious cyber activities by China’s Ministry of State Security.
“In consultation with our partners, the Australian Government has determined that China’s Ministry of State Security exploited vulnerabilities in the Microsoft Exchange software to affect thousands of computers and networks worldwide, including in Australia. These actions have undermined international stability and security by opening the door to a range of other actors, including cybercriminals, who continue to exploit this vulnerability for illicit gain”, She further added.
She opined, ”The Australian Government is also seriously concerned about reports from our international partners that China’s Ministry of State Security is engaging contract hackers who have carried out cyber-enabled intellectual property theft for personal gain and to provide commercial advantage to the Chinese Government”.
She warned China by saying, “Australia calls on all countries – including China – to act responsibly in cyberspace. China must adhere to the commitments it has made in the G20, and bilaterally, to refrain from cyber-enabled theft of intellectual property, trade secrets and confidential business information with the intent of obtaining competitive advantage”.
On other hand USA’s The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory on Chinese State-Sponsored Cyber Operations. National Security Advisor said, ”Chinese state-sponsored cyber activity poses a major threat to U.S. and allied systems. These actors aggressively target political, economic, military, educational, and critical infrastructure personnel and organizations to access valuable, sensitive data. These cyber operations support China’s long-term economic and military objectives”.
The information in this advisory builds on NSA’s previous release “Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities.” The NSA, CISA, and FBI recommended mitigations empower our customers to reduce the risk of Chinese malicious cyber activity, and increase the defensive posture of their critical networks.
Afghan issue can not be understood from the simplistic lens of geopolitical blocs
Authors: Tridivesh Singh Maini and Varundeep Singh*
On July 14, 2021 a terror attack was carried out in Khyber Pakhtunkhwa (KPK) province in which a number of Chinese engineers, working on the Dasu hydropower project (a project which is part of the China Pakistan Economic Corridor) were killed. The attack predictably evinced a strong response from China. The Chinese foreign minister, Wang Yi speaking before a Shanghai Cooperation Organisation (SCO) Foreign Minister’s meeting asked the Taliban to disassociate itself from ‘terrorist elements’ and in a meeting with Pakistan Foreign Minister, Shah Mehmood Qureshi, asked Pakistan to bring the perpetrators to book. Earlier in April 2021, a car bomb attack took place at Serena hotel in Quetta which was hosting China’s Ambassador to Pakistan (four people were killed and twelve were injured)
Wang Yi significantly praised the Ashraf Ghani government, for its attempts towards building national unity and providing effective governance. Beijing clearly realizes that its economic investments in the country as well as big ticket infrastructural projects can not remain safe if there is no security. Afghanistan also criticized Pakistan for its role in sending 10000 Jihadis to Taliban, this is important in the context of the region’s geopolitics.
Like all other countries, Beijing and Islamabad, would have expected uncertainty after the US withdrawal of troops but perhaps over estimated their capabilities in dealing with the turbulence which had been predicted by many.
Importance of Chinese Foreign Minister’s statements
Wang Yi’s statements are important because days earlier a Taliban spokesman, Suhail Shaheen had praised China and welcomed its role in the country’s reconstruction. He had also assured China that those involved in the insurgency in Xinjiang would not be given refuge in Afghanistan (one of China’s major concerns has been the support provided by Taliban to the East Turkmenistan movement)
While Beijing may have opened back channels with the Taliban and realized that it needs to adapt to the changing geopolitics, recent developments would have increased its skepticism vis-à-vis the Taliban. On the other hand, Russia has been more favorable towards the Taliban. Russia’s Deputy Chief of Mission in India, Roman Babushkin argued that the Taliban are a reality which needs to be accepted, and also that any military activities without a political process are insufficient.
Babushkin did make the point that for successful negotiations, Taliban needed to end violence.
‘that Taliban should deal with the problem of terrorism and other related issues in order to become legitimate, in order to [get] delisted [at the UN Security Council], in order to go ahead with the future Afghanistan and creation of the inclusive government
It would be pertinent to point out, that Zamir Kabulov, Russian President’s Afghanistan envoy went a step further and said that the Afghan government was not doing enough to make talks with Taliban a success.
China’s statements subtle warning to the Taliban, indicating its reservations, and praise of Ghani indicate a possibility of greater understanding between Washington and Beijing (even though Beijing has repeatedly attributed the current troubles in Afghanistan to Washington’s decision to withdraw troops).
Can US and China find common ground
It remains to be seen if Biden who has exhibited dexterity on a number of complex issues reaches out to Xi Jinping to find common ground with regard to Afghanistan. Significantly, while US-Turkey relations had witnessed a downward trajectory and Biden has been critical of Turkish President Recep Tayyip Erdogan’s authoritarian tendencies and Human rights record, both leaders met on the sidelines of the NATO Summit in June 2021. During the meeting Turkey agreed to secure Kabul Airport. US National Security Advisor Jake Sullivan while commenting on Turkey’s assurance said
‘The clear commitment from the leaders was established that Turkey would play a lead role in securing Hamid Karzai International Airport, and we are now working through how to execute to get to that,’
Taliban earlier this week warned Turkey of ‘consequences’ if the Middle Eastern nation increased its troop presence in Afghanistan.
Russia’s statements with regard to the Taliban indicate that it is not totally on the same page as China (its prior experience in Afghanistan has made it more cautious and circumspect), and that the Afghan issue can not be understood from the simplistic lens of geo-political blocs and traditional lenses. All major stakeholders in Afghanistan, both within the region and outside, seem to be understandably befuddled by the turn of events. It is not just the US, but even China which would be worried not just from an economic stand point but the overall security implications of the turmoil in Afghanistan. The terror attack in KPK indicates that other CPEC related projects could also face threats from militant groups. Beijing would thus need to be quick to react to the overtures from the Taliban in order to secure its economic assets and lives of Chinese workers in neighbouring Pakistan.
It is especially important for Washington, Beijing and other important stakeholders in the region to work together for dealing with the near term turbulence as well as long term challenges Afghanistan is likely to face.
*Varundeep Singh is an Independent Policy Analyst.
Pegasus: Human rights-compliant laws needed to regulate spyware
The UN human rights chief on Monday said the apparent widespread use of Pegasus spy software to illegally undermine the rights of those under surveillance, including journalists and politicians, was “extremely alarming” and confirmed “some of the worst fears” surrounding the potential misuse of such technology.
“Various parts of the UN Human Rights system, including my own Office, have repeatedly raised serious concerns about the dangers of authorities using surveillance tools from a variety of sources supposed to promote public safety in order to hack the phones and computers of people conducting legitimate journalistic activities, monitoring human rights or expressing dissent or political opposition”, said High Commissioner Michelle Bachelet in a statement.
According to reports, the Pegasus data leak allegations which surfaced through a consortium of media organisations over the weekend, suggests widespread and continuing abuse of the software, which the manufacturers insist, is only intended for use against criminals and terrorists.
The Pegasus malware infects electronic devices, enabling operators of the tool to obtain messages, photos and emails, record calls, and even activate microphones, according to the consortium’s reporting. The leak contains a list of more than 50,000 phone numbers which reportedly belong to those identified as people of interest, by clients of the company behind Pegasus, including some governments.
Surveillance software has been linked to the arrest, intimidation and even killing of journalists and human rights defenders, according to the senior UN official.
Reports of surveillance also trigger fear and cause people to censor themselves.
“Journalists and human rights defenders play an indispensable role in our societies, and when they are silenced, we all suffer”, she said, reminding all States that surveillance measures can only be justified in narrowly defined circumstances when necessary and proportional to a legitimate goal.
Given that Pegasus spyware, “as well as that created by Candiru and others, enable extremely deep intrusions into people’s devices, resulting in insights into all aspects of their lives”, the UN rights chief underscored, “their use can only ever be justified in the context of investigations into serious crimes and grave security threats.”
If recent allegations about the use of Pegasus are even partly true, she maintained that the “red line has been crossed again and again with total impunity”.
Companies developing and distributing surveillance technologies are responsible for avoiding human rights abuses, she said, and they must take immediate steps to mitigate and remedy the damage their products are causing, or contributing to, and carry out “human rights due diligence” to ensure that they no longer play a part in “such disastrous consequences” now, or in the future.
States also have a duty to protect individuals from privacy rights abuses by companies, she added.
One key step in this direction is for States to require by law that the businesses meet their human rights responsibilities by becoming more transparent in their design and use of products and by putting in place effective accountability mechanisms.
Better regulation key
Reports also confirm “the urgent need to better regulate the sale, transfer and use of surveillance technologies and ensure strict oversight and authorization.”
Governments should not only immediately stop using surveillance technologies in ways that violate human rights, but also “take concrete actions” to protect against such invasions of privacy by “regulating the distribution, use and export of surveillance technology created by others”, the High Commissioner said.
Without human rights-compliant regulatory frameworks, Ms. Bachelet upheld that there are “simply too many risks” that the tools could be used to intimidate critics and silence dissent.
Six things you can do to bring back mangroves
Don’t be fooled by their modest appearance: mangroves are important players in some of the greatest challenges facing the world...
ADB Calls for Just, Equitable Transition Toward Net Zero in Asia and Pacific
Asian Development Bank (ADB) President Masatsugu Asakawa today called for countries in Asia and the Pacific to take bold action...
Oil, acid, plastic: Inside the shipping disaster gripping Sri Lanka
It’s visible in satellite images from just off Sri Lanka’s coast: a thin grey film that snakes three kilometres out...
A question mark on FATF’s credibility
While addressing a political gathering, India’s external affairs minister S. Jaishanker made a startling lapsus de langue “We have been...
UNSC calls for ‘immediate reversal’ of Turkish and Turkish Cypriot decision on Varosha
The Security Council said in a statement released on Friday that settling any part of the abandoned Cypriot suburb of Varosha, “by people other than...
Biden Revises US Sanctions Policy
In the United States, a revision of the sanctions policy is in full swing. Joe Biden’s administration strives to make sanctions instruments more effective in achieving his...
Unleashing India’s True Potential
As India strives to unleash its true potential to rise as a global powerhouse, it is tasked with a series...
Economy3 days ago
Entrepreneurialism & Digitalization: Recovery of Midsize Business Economies
Middle East3 days ago
Greater Middle East may force China to project military power sooner rather than later
Americas3 days ago
Maximizing Biden’s Plan to Combat Corruption and Promote Good Governance in Central America
Middle East3 days ago
Chinese FM Wraps Up his Visit to Egypt
Intelligence2 days ago
USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware
Europe3 days ago
Anti-Macron protests underline classism, as corona protesters and gilets jaune join forces
Eastern Europe2 days ago
Latvia developed new tasks for NATO soldiers
Europe2 days ago
Belarus divorces from the Eastern Partnership: A new challenge for the EU Neighborhood Policy