14. Audio Gate - Sir Ashfaque - Article thematic Image 2 copy

Over the past few days, social media initially and later mainstream media in Pakistan have been abuzz with news of alleged leaked audio clips from the Prime Minister’s Office. The alleged hacker has claimed possession of 8 GB data covering audio time of 100 hours. According to the hacker, who has demanded 180 Bitcoin for sale of the data, the audios pertain to almost all important appointment holders in the country. A few short audio clips have been released as a sample. Authenticity of the audio clips and hackers’ claims are yet to be ascertained.

In today’s day and age, cyberspace provides global connectivity in an information environment dependent on interdependent network of Information Technology infrastructure and resident data. Significance of technology and internet access for modern society cannot be understated. It is estimated that at least four to five billion people connect on one or more devices every day. Extensive usage of these systems suggests how technology has changed ways of communication, education, conduct of businesses and management of critical infrastructure and execution of government functioning. Many countries, including our eastern adversary, are known for developing offensive cyber capabilities, though none acknowledges the same.

Although extensive connectivity offers numerous benefits, interconnectivity with freedom to cross international borders has also encouraged many governments to establish organisational set-ups for national defence as well as power projection. Ease of availability of this technology has also encouraged many non-state actors to exploit cyber vulnerabilities. During the last one decade, cyber units have evolved at an unprecedented rate in militaries and serious cyber-attacks from state sponsored and non-state actors have become increasingly frequent.

In the case of alleged audio clips in Pakistan, there are numerous possibilities of communication leakage. Carrying a hacked mobile phone in official meetings can be used for recording of conversations. E-office systems employed in workplaces could be another possibility if the hardware or software is not locally developed, opening the way for backdoors into the system. Data can also be stolen from any equipment installed to record meeting conversations. This can only be possible with insider help. However, if recorded data is transferred to some server, it can be hacked from outside as well as stolen by an insider. Another possibility could be of a member of the meeting intentionally keeping his mobile or video recording on.

As a rule, sensitive meetings are not recorded on electronic devices. Additionally, for reasons of security of information, mobile phones cannot be carried in sensitive official meetings. In case e-systems are used in meetings, the hardware and software should either be locally developed or verified by a Pakistani technical authority for its safety and security. Official meeting rooms are kept locked when not in use to prevent chances of placement of bugging devices. Additionally, intelligence agencies are responsible for scanning these rooms for any bugging devices. Such meeting rooms are well inside PM office premises and are (rather should be) physically secure. However, one of the audios suggests conversations in the PM office or in his house as well, indicating the possibility of bugging of multiple locations in PM Secretariat.

In case this alleged data leak is true, then there seems to have been more than one violation. Either mobile phones were carried in meetings for intentional recording, or they were hacked or recording devices were placed in the meeting rooms as well as some other important offices. If the recording device was placed covertly, it raises a question on who could do it and why intelligence agencies failed to uncover such a massive set up.

If true, we may never be able to estimate the damage caused to national security as the Prime Minister office is the hub of all national level decision-making. We may never be able to estimate economic, diplomatic and security consequences of the leaked information. We may also not be able to ascertain the duration for which the information was being stolen and who all possesses the information.

In any other country, those responsible for such failure would have owned/accepted responsibility and rendered their resignations. However, this is not expected in the land of the pure. Some serious incidents of data breach in the SECP, NADRA and Finance Ministry in the past were possibly not considered grave enough to demonstrate the fragility of our systems to cyber hacking and give a wakeup call to concerned offices. Despite the fact that the present incident is of catastrophic consequences as the data can be used by hostile states and agencies to harm Pakistan, there are no signs of seriousness of the government on the issue.

The seriousness of the matter in my view, requires rising above party politics, organisational interests and inter-departmental rivalries. There is a need for a thorough inquiry by a professionally capable team mandated to assess the loss, reasons for the data breach and identification of the individuals or organisations responsible for this national embarrassment and catastrophe. The team should also identify shortcomings in the existing cyber security policies within high-level government offices and recommend improvements to avert such incidents in the future. However, the failures, causes of failures and those responsible for the failures must not only be brought to fair trial but also be made public. To keep the inquiry objective, it must ascertain the data loss, reasons for the breach and assign responsibility for the failure. The political aspects of the conversations, legality of various individual’s actions involved in the conversations etc. should be left to the courts and other responsible departments. Since this episode highlights weaknesses in our systems, it needs rigorous and immediate investigation because a nuclear power with 220 million people cannot be left rudderless and insecure like this.

The author is a retired Air Marshal of the PAF who served as Pakistan’s Air Advisor at New Delhi from 2002-06, presently working as Advisor to the Chief of Air Staff on CASS and Director Emerging Technologies at the Centre for Aerospace & Security Studies, Islamabad, Pakistan. The article was first published in the Nation.


Share this article

Facebook
Twitter
LinkedIn

Recent Publications

Browse through the list of recent publications.

The Cover-up: IAF Narrative of the May 2025 Air Battle

Even after one year since the India-Pakistan May war of 2025, the Indian discourse regarding Operation Sindoor remains uncertain under its pretence of restraint. The Pahalgam attack on 22 April, which killed 26 people, triggered an escalatory spiral. New Delhi quickly accused Pakistan-linked elements, while Islamabad refuted the allegation and demanded an independent investigation. On 7 May, India launched attacks deep inside Pakistan under what it later termed as Operation Sindoor. The political motive was intended to turn the crisis into coercive signalling by shifting the blame onto the enemy and projecting a sense of military superiority.
This episode, however, began to fray immediately as war seldom follows the intended script. Within minutes PAF shot down 7 IAF aircraft including 4 Rafales. On 8 May, Reuters reported that at least two Indian aircraft were shot down by a Pakistani J-10C, while the local government sources reported other aircraft crashes in Indian-occupied Jammu and Kashmir

Read More »

Why the IAF’s Post-Sindoor Spending Surge is a Sign of Panic

After Operation Sindoor, India is spending billions of dollars on new weapons. This is being taken by many people as an indication of military prowess. It is not. This rush to procure weapons is in fact an acknowledgement that the Air Force in India had failed to do what it was meant to do. The costly jets and missiles that India had purchased over the years failed to yield the promised results.

Sindoor was soon followed by India in sealing the gaps which the operation had exposed. It was reported that Indian Air Force (IAF) is looking to speed up its purchases of more than 7 billion USD. This will involve other Rafale fighter jets with India already ordering 26 more Rafales to the Navy in 2024 at an estimated cost of about 3.9 billion USD. India is also seeking long-range standoff missiles, Israeli loitering munitions and increased drone capabilities. Special financial powers of the Indian military were activated to issue emergency procurement orders. The magnitude and rate of these purchases speak volumes.

Indian media and defence analysts have over the years considered the Rafale as a game changer. When India purchased 36 Rafales aircrafts at an approximate cost of 8.7 billion USD, analysts vowed that the aircraft would provide India with air superiority over Pakistan. Operation Sindoor disproved all those allegations. Indian aircraft did not even fly in Pakistani airspace when the fighting started. India solely depended on standoff weapons that were launched at a safe distance. The air defence system of Pakistan, comprising of the HQ-9 surface-to-air missile system and its own fighters, stood its ground.

Read More »

May 2025: Mosaic Warfare and the Myth of Centralised Air Power

Visualise a modern-day Air Force commander sitting in the operations room, miles away from the combat zone, overseeing every friendly and enemy aircraft and all assets involved in the campaign. In a split second, he can task a fighter, reposition a drone, and authorise a strike. In today’s promising technological era, he does not even need an operations room; a laptop on his desktop will suffice. The situation looks promising as it offers efficiency, precision, and control. The term used for such operational control is ‘centralisation’, which has been made possible with advanced networking, integrating space, cyber, surveillance, artificial intelligence, and seamless communication, enabling a single commander to manage an entire campaign from a single node. Centralised command and control, championed by the Western air forces and then adopted by many others, has thus been seen as a pinnacle of modern military power.
The concept of centralisation, enabled by state-of-the-art networking, may seem promising, but it is nothing more than a myth.

Read More »