Home » Blog » Cyber Warfare and National Security : The Growing Threat

Cyber Warfare and National Security : The Growing Threat

Authored By: Muhammad Noor

International Islamic University Islamabad

  1. Introduction: The Digital Battlefield:

In an increasingly interconnected world, the concept of warfare has expanded beyond traditional battlefields to encompass a digital dimension where conflicts are waged without physical violence but with potentially devastating consequences. Cyber warfare represents one of the most significant threats to national security in the 21st century, challenging conventional notions of defense, sovereignty, and conflict. The strategic landscape has evolved to the point where nation-states continuously probe and attack each other’s digital infrastructure, creating a perpetual state of undeclared cyber conflict that threatens economic stability, essential services, and public safety. This article examines the complex relationship between cyber warfare and national security, exploring its definitions, manifestations, legal frameworks, and mitigation strategies with particular attention to Pakistan’s evolving cybersecurity posture.

The relevance of this topic to national security cannot be overstated. As nations become more dependent on digital infrastructure for everything from power distribution to financial systems, their vulnerability to cyber-attacks increases proportionally. The asymmetric nature of cyber warfare where small groups can potentially inflict massive damage demands new approaches to defense and international cooperation. This article argues that cyber warfare constitutes a fundamental threat to national security that requires immediate, coordinated, and multifaceted response strategies at both national and international levels.

  1. Cyber Warfare Defined: conceptualizing the Digital Battlefield

Cyber warfare involves the use of digital attacks by nation-states or international organizations to disrupt, damage, or destroy another country’s critical infrastructure and information systems. Pakistan Electronic Crime Act (PECA) 2016 under definition clause defines both critical infrastructure and information systems. Under section 2 (x) of PECA it explains critical Infrastructure as assets, facilities, systems, networks, or processes whose loss or compromise could have major detrimental impact on essential services ( healthcare, utilities), potentially causing loss of life, significant economic or social impacts and significant impact on national security, national defense, or state functioning[1] and Section 2 (xx) defines the information system as an electronic system for creating, generating, sending, receiving, storing, reproducing, displaying, recording or processing any information[2].  According to Imperva, cyber warfare is typically defined as “a cyber attack or series of attacks that target a country with the potential to wreak havoc on government and civilian infrastructure and disrupt critical infrastructure , resulting in damage to the state and even loss of life”[3]. Unlike traditional warfare, cyber warfare operate in a legal gray area where attribution is challenging, and the boundaries between acts of war and criminal activity are often blurred.

There exists significant debate among cyber security experts regarding what activities constitute cyber warfare. The U.S. Department of Defense recognizes the threat to national security posed by the malicious use of the internet but does not provide a precise definition. Some experts contend that only cyber-attacks that result in or potentially result in loss of life should be classified as cyber warfare, while others advocate for a broader definition that include significant disruption to critical infrastructure and government functions.

2.1 Distinguishing Cyber Warfare from Cybercrime

It is crucial to distinguish cyber warfare from cybercrime, as they differ fundamentally in motivation, perpetrators, and impact:

Cybercrime: is primarily motivated by financial gain and targets individuals or businesses. According to Cyber security Ventures, it is more profitable than the global drug trade. Common examples include identity theft, phishing scams, and financial fraud.

While Cyber warfare: is politically or militarily motivated and typically sponsored by nation-states. It targets critical national infrastructure, government systems, and military networks to achieve strategic objectives.

Comparing Cybercrime and Cyber Warfare

 Cybercrime

Cyber Warfare

Motivation Financial gain

Political/military objectives

Perpetrators are Individual criminals & Organizations

Nation-states, state-sponsored groups

Targets Individuals, businesses

Critical infrastructure, government systems

Scale of Impact Individual or organizational harm

National security threats

Examples are Identity theft, ransomware

Grid attacks, cyber espionage[4]

2.2 Common Types of Cyber Warfare Attacks

Cyber warfare encompasses a diverse range of attack methodologies and are each with distinct objectives and mechanisms:

  • Espionage: Refers to monitoring other countries to steal secrets. Muhammad Asif khan in his journal wrote that “Cyberspace has become a heaven for persons involved in spying because of several reasons. First, there is a lot of confidential information stored on cyberspace, which is of potential interest for people involved. Second, the identification of intruder is a unknown as it is termed as an anonymous domain. Third, in cases where the identity of the intruders is uncovered, the jurisdiction of states is limited in applying its laws upon the intruders. This makes espionage a risk-free task in cyberspace.[5] Espionage are phishing attacks to compromise sensitive computer systems before infiltrating sensitive information. This includes theft of intellectual property, military secrets, and diplomatic communications.
  • Sabotage: It involves destroying or compromising critical infrastructure.
  • Denial of Service (DoS) Attacks: Those attacks, which prevent legitimate users from accessing essential services. When conducted on a large scale. They can disrupt critical operations and block access to sensitive websites by civilians, military, and security personnel.
  • Electrical Power Grid Attacks: Targeting energy infrastructure allows attackers to disable critical systems, disrupt infrastructure, and shutting of power grids.
  • Propaganda Attacks: Attempts to control the minds and thoughts of people living in or fighting for a target country. Propaganda can be used to expose embarrassing truths, spread lies to undermine trust in institutions, or promote sympathy for enemies.
  1. National Security Implications: The Strategic Threat Landscape

National security is no longer solely defined by the protection of physical borders and military assets. In the 21st century, it has expanded to include the security of a nation’s digital infrastructure, data & information ecosystems, and financial systems. Cyber warfare represents one of the most significant and evolving threats to this expanded concept of national security.

The national security implications of cyber warfare are profound and multifaceted. The interconnected nature of these systems means that a successful attack on one sector can create cascading effects across multiple domains, potentially paralyzing essential services and creating societal chaos. Attacking nation’s digital infrastructure, data & information ecosystems, and financial systems.

Pakistan, has two approach to cyber attacks

  1. A Strong Declaratory Policy (stating that attacks on critical infrastructure are acts of aggression).
  2. A developed legal Framework (PECA 2016) to criminalize and prosecute cyber threats and crimes.

       4 International Legal Frameworks: Governing the Ungovernable

4.1 Principle of Non-Intervention

The prohibition of intervention is widely accepted throughout international law in both customary international law and treaties. The prohibition of intervention is widely accepted throughout international law in both customary international law and treaties. The ambiguity in applying the principle of non-intervention in actions related with cyberspace arise because of the nature of actions possible through new technologies. Any state-sponsored cyber operation against the domestic or foreign affairs of another state has challenged the efficacy. A cyber operation against another state is possible through a cyber attack, digital election interference, and use of social media tools for negative propaganda. To establish that a cyber operation is against the principle of non-intervention, it must be proved that the actions were coercive and against a protected state. Principle of Non-Intervention The legal status of cyber warfare remains unclear due to the absence of comprehensive international laws specifically governing the use of cyber weapons. This legal vacuum creates significant challenges for deterrence, attribution, and response to cyber attacks. The current international framework is based on a patchwork of existing international laws and emerging norms that struggle to address the unique characteristics of cyber conflict. If attacked are proved to be against principle of non-intervention, Article 51 of UN Charter comes in place for self defense[6].

4.2 The Tallinn Manual and International Law

The Cooperative Cyber Defense Center of Excellence (CCDCoE) has attempted to address gaps in international law through the Tallinn Manual, a textbook that addresses serious cyber threats. The manual explains when cyber attacks violate international law and how countries may respond to such violations.

Key principles include:

  • “Application of existing international law: The manual affirms that existing international law, including the United Nations Charter and laws of armed conflict, applies to cyber operations
  • Sovereignty: Cyber operations that violate the sovereignty of another state may constitute unlawful intervention
  • Proportionality: Responses to cyber attacks must be proportional to the provocation
  • Distinction: Cyber operations must distinguish between military and civilian targets”[7]

Despite these efforts, the Tallinn Manual remains an academic exercise without binding legal authority, highlighting the challenges of adapting traditional legal frameworks to cyber warfare.

Several international forums have emerged to develop norms of state behavior in cyberspace. The United Nations Group of Governmental Experts (UN GGE) has produced reports outlining recommendations for responsible state behavior, including:

  1. Voluntary norms: Such as not attacking critical infrastructure during peacetime
  2. Capacity building: Encouraging states to develop cybersecurity capabilities
  3. Information sharing: Promoting cooperation on cyber threats
  4. Crisis communication: Establishing channels to prevent escalation during cyber incidents
  1. Pakistan’s Legal Landscape: Cyber Warfare Preparedness

Pakistan has developed a legal framework to address cyber threats, primarily through the Prevention of Electronic Crimes Act (PECA) 2016. This legislation represents the cornerstone of cybercrime law in Pakistan, addressing a wide range of offenses from hacking to cyber terrorism. While not specifically designed for cyber warfare.

Cyber Terrorism under (Section 10) [8] is any activity that harms the integrity, defense, security, or sovereignty of Pakistan. Unauthorized Access[9], Electronic Fraud [10] and Cyber Espionage[11] are criminalize under tis act. Cyber espionage in Pakistan is conventionally dealt through the official secrets act 1923 (OSA).
Cyber warfare represents a fundamental challenge to national security in the 21st century, blurring traditional boundaries between peace and war. For Pakistan, joining international frameworks like the Budapest Convention on Cybercrime would enhance cooperation with other nations and improve access to technical assistance

Reference(S):

[1] Section 2(x) Pakistan Electronic Crime Act 2016

[2] Ibid Section 2(xx)

[3] https://www.imperva.com/learn/application-security/cyber-warfare/

[4] https://www.experian.com/blogs/ask-experian/20-types-of-identity-theft-and-fraud

[5] Muhammad Asif Khan, Legal Analysis of the Pakistan’s National Cyber Security Policy in the Context of Cyber Warfare 2023, Journal of Law & Social Studies (JLSS) Volume 5, Issue 1, pp 12-20

[6] Article 51 United nation Charter

[7] https://ccdcoe.org/research/tallinn-manual/

[8] Pakistan Electronic Crime Act 2016

[9] Section 14 PECA 2016

[10] Section 14 PECA 2016

[11] Ibid 16

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top