960x0

Cyberwarfare in its present form may be a new phenomenon, but the concept is as old as warfare itself. In the olden days also, rivals made efforts to physically disrupt the communication systems of their adversary. Likewise, well-thought-out strategies were adopted to access information systems and create mechanisms of misinformation in enemy ranks; utilising all available means.

Rapid developments in applications of communication tools are making human beings dependent on technology. The efficacy of these technological tools was tested during the COVID-19 pandemic. Even the most advanced states with state-of-the-art medical facilities remained paralysed for months and had to resort to working digitally from their homes–from executives to clerical staff. Education institutions remained closed for nearly two years at some places and conducted online classes and Zoom webinars for an extended period till pharmaceutical industries came up with the vaccines considered reliable to resume normal lives. In some places, like Italy, Brazil and India, the mortality rate shot up to alarming levels during different phases of the pandemic and a total shutdown had to be observed for weeks. Likewise, the manufacturing of small and large industrial goods remained under tremendous stress, thereby, affecting global supply chains, causing demand and supply gaps that negatively impacted inflation, and led to a price hike of essential food items. While newly-developed technological tools greatly helped human beings in their routine lives, they concurrently put them at risk due to online privacy issues, especially for financial transactions.

Although, no large-scale cyber-attacks were reported during the pandemic nor more recently in the ongoing Russia-Ukraine war, reports of cyber-attacks on financial institutions syphoning off huge sums has become a routine. Numerous systems related to economy, defence, business, and decision-making processes at all levels, remain vulnerable. Even “Hacktivism,” which is ‘the use of computer-based techniques such as hacking as a form of civil disobedience to promote a political agenda or social change,” has increased manifold.

In the contemporary environment, competition between inter-state relations often unfolds in physical, information, digital, cultural and cognitive arenas. However, direct military confrontations are not very common between equal military powers. Alternatively, the tactics used by non-state actors play a significant role in their political and strategic goals, and the efficiency of these tactics has often surpassed those of traditional military means. The characteristics of the irregular forms of warfare have manifested as a combination of violent acts during these confrontations, “such as terrorist activities, cyber-attacks, economic and diplomatic sanctions, and several other components.”

Moreover, the concept of cyber threats has blurred the internal and external dimensions of state security and allowed less powerful state and non-state actors to amplify their attempts at influence. The changing nature of traditional concepts of armed conflict and war has also been identified as one of the factors that have encouraged the appearance of hybrid threats or made irregular warfare more attractive, because these may not trigger military action.

Today, cyber warfare, due to its immense power of disruption in the communication systems, is considered a more suitable tool of offensive action against one’s rival. This is extremely dangerous in the sense that such an action can paralyse the target system through disruption for the defined timeframe. These systems may include highly sensitive defence establishments including command and control systems, missile-firing sites, air defence systems, and more seriously, decision-making mechanisms at the strategic level.

The race for supremacy in space which began with the launch of Sputnik-I by the erstwhile Soviet Union in 1957 and was responded to by the United States with the launch of its first manned space flight in 1958, was perhaps to achieve better connectivity, integration, and networking in the decades to come. However, the knowledge acquired through developments in the domain of information and space technologies is now negatively employed to disrupt the same very communication and integration.

The employment of cyber warfare, as part of a strategy, to disrupt enemy lines of communication and cause harm to its potential capabilities has made state institutions highly vulnerable. Likewise, personal security which is an essential element of human security also remains susceptible to disruptions in one’s communication, location, and financial transactions, to mention a few. Therefore, it is incumbent upon international and national organisations to device legal procedures, thereby ensuring that cyber warfare does not impinge upon an individual’s rights, and s/he is not deprived of his/her financial assets.

Dr Zia Ul Haque Shamsi is the author of ‘Nuclear Deterrence and Conflict Management Between India and Pakistan’ (2020) and ‘South Asia Needs Hybrid Peace’ (2021). He is presently working as Director at the Centre for Aerospace & Security Studies (CASS), Islamabad, Pakistan. The article was first published in Daily Times. He can be reached at [email protected].

Image Source:Columbus, L 2020, “Cyber Warfare – Truth, Tactics, And Strategies Is A Good Read”, Forbes, May 28, https://www.forbes.com/sites/louiscolumbus/2020/03/28/cyber-warfare–truth-tactics-and-strategies-is-a-good-read/?sh=57ead7511d3f


Share this article

Facebook
Twitter
LinkedIn

Recent Publications

Browse through the list of recent publications.

The Cover-up: IAF Narrative of the May 2025 Air Battle

Even after one year since the India-Pakistan May war of 2025, the Indian discourse regarding Operation Sindoor remains uncertain under its pretence of restraint. The Pahalgam attack on 22 April, which killed 26 people, triggered an escalatory spiral. New Delhi quickly accused Pakistan-linked elements, while Islamabad refuted the allegation and demanded an independent investigation. On 7 May, India launched attacks deep inside Pakistan under what it later termed as Operation Sindoor. The political motive was intended to turn the crisis into coercive signalling by shifting the blame onto the enemy and projecting a sense of military superiority.
This episode, however, began to fray immediately as war seldom follows the intended script. Within minutes PAF shot down 7 IAF aircraft including 4 Rafales. On 8 May, Reuters reported that at least two Indian aircraft were shot down by a Pakistani J-10C, while the local government sources reported other aircraft crashes in Indian-occupied Jammu and Kashmir

Read More »

Why the IAF’s Post-Sindoor Spending Surge is a Sign of Panic

After Operation Sindoor, India is spending billions of dollars on new weapons. This is being taken by many people as an indication of military prowess. It is not. This rush to procure weapons is in fact an acknowledgement that the Air Force in India had failed to do what it was meant to do. The costly jets and missiles that India had purchased over the years failed to yield the promised results.

Sindoor was soon followed by India in sealing the gaps which the operation had exposed. It was reported that Indian Air Force (IAF) is looking to speed up its purchases of more than 7 billion USD. This will involve other Rafale fighter jets with India already ordering 26 more Rafales to the Navy in 2024 at an estimated cost of about 3.9 billion USD. India is also seeking long-range standoff missiles, Israeli loitering munitions and increased drone capabilities. Special financial powers of the Indian military were activated to issue emergency procurement orders. The magnitude and rate of these purchases speak volumes.

Indian media and defence analysts have over the years considered the Rafale as a game changer. When India purchased 36 Rafales aircrafts at an approximate cost of 8.7 billion USD, analysts vowed that the aircraft would provide India with air superiority over Pakistan. Operation Sindoor disproved all those allegations. Indian aircraft did not even fly in Pakistani airspace when the fighting started. India solely depended on standoff weapons that were launched at a safe distance. The air defence system of Pakistan, comprising of the HQ-9 surface-to-air missile system and its own fighters, stood its ground.

Read More »

May 2025: Mosaic Warfare and the Myth of Centralised Air Power

Visualise a modern-day Air Force commander sitting in the operations room, miles away from the combat zone, overseeing every friendly and enemy aircraft and all assets involved in the campaign. In a split second, he can task a fighter, reposition a drone, and authorise a strike. In today’s promising technological era, he does not even need an operations room; a laptop on his desktop will suffice. The situation looks promising as it offers efficiency, precision, and control. The term used for such operational control is ‘centralisation’, which has been made possible with advanced networking, integrating space, cyber, surveillance, artificial intelligence, and seamless communication, enabling a single commander to manage an entire campaign from a single node. Centralised command and control, championed by the Western air forces and then adopted by many others, has thus been seen as a pinnacle of modern military power.
The concept of centralisation, enabled by state-of-the-art networking, may seem promising, but it is nothing more than a myth.

Read More »