AGL 35.20 Decreased By ▼ -0.50 (-1.4%)
AIRLINK 123.23 Decreased By ▼ -10.27 (-7.69%)
BOP 5.04 Increased By ▲ 0.07 (1.41%)
CNERGY 3.91 Decreased By ▼ -0.12 (-2.98%)
DCL 8.15 Decreased By ▼ -0.27 (-3.21%)
DFML 44.22 Decreased By ▼ -3.18 (-6.71%)
DGKC 74.35 Decreased By ▼ -0.65 (-0.87%)
FCCL 24.47 Increased By ▲ 0.22 (0.91%)
FFBL 48.20 Increased By ▲ 2.20 (4.78%)
FFL 8.78 Decreased By ▼ -0.15 (-1.68%)
HUBC 145.85 Decreased By ▼ -8.25 (-5.35%)
HUMNL 10.85 Decreased By ▼ -0.15 (-1.36%)
KEL 4.00 Decreased By ▼ -0.06 (-1.48%)
KOSM 8.00 Decreased By ▼ -0.88 (-9.91%)
MLCF 32.80 Increased By ▲ 0.05 (0.15%)
NBP 57.15 Decreased By ▼ -0.65 (-1.12%)
OGDC 145.35 Increased By ▲ 2.55 (1.79%)
PAEL 25.75 Decreased By ▼ -0.26 (-1%)
PIBTL 5.76 Decreased By ▼ -0.16 (-2.7%)
PPL 116.80 Increased By ▲ 2.20 (1.92%)
PRL 24.00 Decreased By ▼ -0.15 (-0.62%)
PTC 11.05 Decreased By ▼ -0.42 (-3.66%)
SEARL 58.41 Increased By ▲ 0.41 (0.71%)
TELE 7.49 Decreased By ▼ -0.22 (-2.85%)
TOMCL 41.10 Decreased By ▼ -0.04 (-0.1%)
TPLP 8.31 Decreased By ▼ -0.36 (-4.15%)
TREET 15.20 Increased By ▲ 0.12 (0.8%)
TRG 55.20 Decreased By ▼ -4.70 (-7.85%)
UNITY 27.85 Decreased By ▼ -0.15 (-0.54%)
WTL 1.34 Decreased By ▼ -0.01 (-0.74%)
BR100 8,528 Increased By 68.1 (0.8%)
BR30 26,868 Decreased By -400.5 (-1.47%)
KSE100 81,459 Increased By 998 (1.24%)
KSE30 25,800 Increased By 331.7 (1.3%)

In a highly sophisticated cyber-attack that has sent shockwaves across the globe, thousands of Hezbollah members’ pagers exploded simultaneously throughout Lebanon (and Syria).

The attack killed at least 9 people and injured thousands of individuals, including the Iranian ambassador. Security experts speculate that Israel, utilising its advanced cyber warfare capabilities, infiltrated the supply chain of Motorola devices used by Hezbollah operatives.

Hezbollah exploding pager trail runs from Taiwan to Hungary

Small amounts of military grade explosives were possibly embedded during the manufacturing or distribution process which were remotely detonated using a viral malware to trigger the explosions in unison.

This unprecedented breach highlights the growing use of cyber tactics in modern conflicts, raising concerns about the vulnerabilities of everyday electronic devices in global espionage and military operations.

Recently, in a major setback for Iran’s nuclear ambitions, scientists at the Natanz nuclear facility were left baffled as the centrifuges used to enrich uranium began spinning uncontrollably, leading to repeated failures.

Cyber warfare, controlled by AI driven autonomous tools, can have widespread and unpredictable consequences, potentially damaging critical infrastructure, economic systems, or even triggering military conflicts

Not only were the centrifuges malfunctioning, but the computers controlling them were also crashing without clear explanation. This mysterious malfunction destroyed nearly one-fifth of Iran’s centrifuges and delayed their nuclear program by several years.

Is the US ‘sleepwalking’ into a wider conflict in the Middle East?

The culprit was later identified as Stuxnet, a highly sophisticated cyber-weapon unlike any other malware seen before. Unlike traditional viruses, which typically steal data or disrupt software, Stuxnet crossed into the physical realm, causing real damage to industrial equipment.

It is widely believed that the cyber-attack was a joint operation by the United States and Israel, marking one of the first known instances of a cyber weapon being used to cause large-scale physical destruction.

The following year, Iran landed a highly classified US spy plane called RQ-170 Sentinel stealth in a daring feat of cyber warfare and electronic warfare.

Iran used very sophisticated electronic jamming and GPS spoofing techniques. By tricking the drone’s navigation system into believing it was landing at its home base, Iranian forces were able to guide the aircraft into a controlled descent on Iranian soil with minimal damage.

This audacious operation not only delivered a prized piece of U.S. military technology into Iranian hands but also showcased the growing ability of nation-states to counter even the most advanced surveillance systems through cyber and electronic tactics.

Usually, countries often refrain from launching high-end cyber-attacks against each other due to the risk of uncontrollable escalation and retaliation.

Cyber warfare, controlled by AI driven autonomous tools, can have widespread and unpredictable consequences, potentially damaging critical infrastructure, economic systems, or even triggering military conflicts.

Much like nuclear deterrence, the fear of mutually assured destruction in the cyber domain acts as a restraint. Attribution in cyber attacks is often difficult, and misidentification of the attacker could provoke unintended conflicts or diplomatic crises.

As a result, nations carefully weigh the risks of large-scale cyber offensives, favouring covert operations, espionage, or more targeted cyber tactics to avoid spiralling into all-out cyber war.

According to IBM, the average global cost of each data breach is approximately $4.88 million. Meanwhile, a report from Statista estimates that the total cost of cybercrime worldwide will surpass $15 trillion by 2029.

Over the past six months, numerous cyber incidents have emerged on the international stage, with not only rogue criminal groups responsible for these activities but also governments leveraging cyber-attacks as a strategic tool.

Most recently, South Korea’s military is investigating the leak of highly sensitive information on Seoul’s espionage activities and issued an arrest warrant for a suspect.

In July this year, a faulty software update for Microsoft caused a global IT outage disrupting airlines and hospital operations around the world. This affected 8.5 million machines and cost Fortune 500 companies over $5.4 billion.

Germany accused China of directing a “serious” cyberattack against Germany’s Federal Office for Cartography and Geodesy (BKG), which conducts precision mapping of the entire country.

Japan’s space agency has suffered a series of cyberattacks since last year. Hackers hit Britain’s Ministry of Defence with a cyberattack that exposed sensitive information on every troop apart from the UK’s special forces.

AI is also being used to improve espionage efforts by analysing vast amounts of data to identify vulnerabilities within government systems, political figures, or key institutions.

AI’s ability to process and sift through data efficiently enables more effective intelligence gathering, which can be used to discredit political figures, expose corruption, or leak sensitive government information.

The growing cyber warfare between nuclear powers like India and Pakistan adds a new layer of complexity to their already tense relationship. Both countries, possessing nuclear arsenals and advanced military capabilities, are increasingly incorporating cyber strategies into their defence postures.

India, which has been rapidly modernising its military, is investing heavily in cyber defence and offensive capabilities. The establishment of its Defence Cyber Agency (DCA) in 2019 highlights India’s growing focus on integrating cyber warfare into its national security strategy.

As India seeks to strengthen its digital infrastructure and counter external threats, Pakistan must also enhance its own cyber capabilities to avoid vulnerabilities that could be exploited during any potential conflict.

For Pakistan, addressing the threat of cyber warfare requires a multi-faceted approach. Strengthening cyber defences for critical infrastructure, such as nuclear facilities, energy grids, and communication networks, must be a top priority.

Investing in advanced cybersecurity frameworks and establishing specialised cyber command units can help Pakistan secure its national assets. Implementing AI-driven early-warning systems and bolstering public-private partnerships will ensure a more resilient defence posture.

Given that cyberattacks often operate in the shadows, it is crucial for Pakistan to develop strong attribution capabilities to accurately identify potential threats and avoid miscalculations that could escalate tensions.

Pakistan can adopt a diplomatic strategy by engaging in international forums to advocate for norms and regulations in cyber warfare. This could include pushing for agreements on non-targeting of critical infrastructure, particularly nuclear sites, in the event of cyber conflicts.

By fostering regional dialogue on cyber security and cooperating with global powers, Pakistan can mitigate the risks of cyberattacks spiralling into broader military confrontations with India, ensuring stability in an increasingly digitised geopolitical landscape.

As AI and Cyber Security become more integral to geopolitics, nations must grapple with both the opportunities it offers and the risks it introduces. In this unfolding new era of AI geopolitics, the balance of power, national security, and global peace may increasingly depend on how nations wield this double-edged sword.

The article does not necessarily reflect the opinion of Business Recorder or its owners

Author Image

Dr Ajaz Ali

The writer is a British Pakistani, and holds an MBA from the University of Birmingham and doctorate in Computer Science from the University of Sunderland. He is currently the Director of Higher Education at BMet, Birmingham

Comments

200 characters
Nadeem Sheikh Sep 19, 2024 07:22am
Our cell phones are scary now
thumb_up Recommended (0) reply Reply
Nadeem Sheikh Sep 19, 2024 07:36am
What about the TVs, Laptops, home appliances in every household. Everything appears scary
thumb_up Recommended (0) reply Reply
amigo Sep 19, 2024 11:26am
"highly sophisticated cyber-attack that has sent shockwaves across the globe" 100% Correct
thumb_up Recommended (0) reply Reply
Ch K A Nye Sep 19, 2024 12:47pm
Motorola? Stopped reading after the false information.
thumb_up Recommended (0) reply Reply
Taimoor Sep 19, 2024 01:49pm
Pakistan uses Israeli technology at the highest levels (Haaretz). Although Pakistan and Israel are "enemies", it's mostly rhetoric. Don't expect exploding laptops/cell phones during cabinet meetings.
thumb_up Recommended (0) reply Reply