AGL40▼ -0.13 (0.00%)AIRLINK191.7▲ 2.27 (0.01%)BOP9.82▼ -0.52 (-0.05%)CNERGY7.02▼ -0.19 (-0.03%)DCL10.4▲ 0.19 (0.02%)DFML41.55▼ -0.25 (-0.01%)DGKC105.6▼ -3.03 (-0.03%)FCCL37.8▼ -0.79 (-0.02%)FFBL93▲ 3.09 (0.03%)FFL15.18▲ 0.16 (0.01%)HUBC122.15▼ -1.08 (-0.01%)HUMNL14.3▼ -0.15 (-0.01%)KEL6.14▼ -0.2 (-0.03%)KOSM8.1▼ -0.3 (-0.04%)MLCF49▼ -0.47 (-0.01%)NBP71.9▼ -2.92 (-0.04%)OGDC221.9▲ 8.49 (0.04%)PAEL33.78▲ 0.79 (0.02%)PIBTL9.77▲ 0.7 (0.08%)PPL199.65▼ -0.28 (0.00%)PRL33.6▼ -0.95 (-0.03%)PTC26.8▼ -0.41 (-0.02%)SEARL117.9▼ -0.29 (0.00%)TELE9.65▼ -0.23 (-0.02%)TOMCL36.76▲ 1.34 (0.04%)TPLP11.95▼ -0.62 (-0.05%)TREET24.1▲ 1.81 (0.08%)TRG61.02▲ 0.12 (0.00%)UNITY35.9▼ -0.79 (-0.02%)WTL1.8▲ 0.01 (0.01%)

The 5th generation warfare

Share
Tweet
WhatsApp
Share on Linkedin
[tta_listen_btn]

WARS have significantly shaped world history, with five stages: first-generation warfare, second-generation warfare, third-generation warfare and modern warfare. First-generation warfare involves ancient battles with tribal flags and weapons.

Second-generation warfare involves advancements in weapons and techniques, while third-generation warfare also known as “modern warfare” involves the establishment of air forces and long-range weaponry. The fourth-generation warfare began with the Gulf War and the breakup of former Yugoslavia in the 1990s.

The fifth generation warfare is considered to be more dangerous as it threatens global peace in the 21st century. Instead of using force to subdue one another, nations are attempting to do it through cyber operations during this time. Disinformation and social engineering abound online, and cyber attacks and manipulation are commonplace. Nations are fighting the war of “information and perception”. Protecting a country’s vital infrastructure has never been more difficult, as the world watches as warfare increasingly moves into the domains of cyber attacks, information manipulation and unconventional tactics. A nation’s essential infrastructure assumes increasing significance in the context of Fifth Generation Warfare (5GW), as it is the primary target for a variety of unconventional threats. The term “critical infrastructure” describes the components of the infrastructure that are most crucial to lose or compromise: buildings, networks, systems, assets or processes.

However, in Pakistan’s case, the growing threat to its vital infrastructure and essential information infrastructure is not being adequately addressed by a concerted effort. There have been several cyber attacks in Pakistan. Pakistan’s biggest cybercrime was in 2021 when hackers broke into the Federal Board of Revenue (FBR) and took $30k worth of personal data. The data was sold on Russian networks even after the system was restored. This resulted from the use of an outdated version of Microsoft Hyper-V software.

Pakistani music streaming platform Patari was hacked, exposing 275,000 user information and credentials due to a misconfiguration of their MongoDB database on Russian and English platforms. Hackers also targeted K-electric, stealing critical and sensitive data on the citizens, including CNICs, bank account information and NTNs. The hackers demanded a $7 million ransom and threatened to sell K-electric’s customers’ information on the dark web. Nevertheless, K-electric chose not to take the chance and instead discarded 8.5 GB of the stolen data.

Particularly, the organizations and apps that need the private data of their clients ought to exercise caution when it comes to the kind of software they use and whether it is more vulnerable to cyber attacks. It’s best to make it a practice to update the program regularly or to have it update itself automatically and always have the funds on hand to purchase the most recent upgrades for the software. It is essential to have well-defined cyber deterrence tactics supported by the capacity to identify and take revenge on adversaries. Investing in cyber talent guarantees a staff with the necessary skills to counter sophisticated threats. To respond to transnational cyber threats in a coordinated manner and to encourage responsible state behaviour in cyberspace, international collaboration and diplomacy are essential developments.

—The writer is a researcher, DHA Suffa University, Karachi.

 

Related Posts

Get Alerts