Event Report Cyber Security
Event Report Cyber Security
Printed in Pakistan
Tel: +92-51-8319682
3
Participants
The Seminar was attended by almost 300 participants including government
representatives, retired senior armed forces officers, diplomats, and cyber experts from
across the country and individuals from public and private entities.
4
Introduction of the Speakers
5
served as Secretary Board of Investment, and Federal Secretary Wafaqi Mohtasib.
6
Mr. Yusuf Hussain- Chairman IGNITE – National
Technology Fund, Ministry of Information &
Technology
Mr. Yusaf Hussain is the Chairman IGNITE- National
Technology Fund, Ministry of Information and
TECHNOLOGY. He recommends policy guidelines and
future strategy to the federal government about development
of Cyber security Mechanisms.
7
Opening Remarks by
8
Opening Address
He further stated that wars have long been fought on land, air and at sea. Future wars,
however, will be fought on cyber space. Cyber warfare is internet-based which include
politically motivated attacks on information and information systems. Cyber warfare
attacks can disable official websites and network, disrupt essential services, even steal,
alter or destroy classified data and cripple financial systems among many other
possibilities. Cyber insecurity is now established as a serious unconventional threat.
An electronic army of simple hackers using computers to gain unauthorized access to the
computers of the target country with the objective of crippling the target country’s
networks is the process of cyber-warfare. Today, an embedded computer in every modern
device like our mobile phones, exposes each and every one of us to cyber-threats. The
image of a country’s electronic army taking over our plants, refineries, pipelines, airlines,
banks even nuclear reactors, is a horrifying one.
9
In 2010, online hackers named as ‘India Cyber Army’ attacked 36 of Pakistan’s
government websites. In 2013, another clan of Indian hackers sabotaged the Election
Commission website of Pakistan. In retaliation, a group of Pakistan’s hackers named as
‘True Cyber Army’ sabotaged 1059 websites of India’s electoral bodies. On September 18,
2016, a militant attacked India’s army brigade in Uri, leading to a full-scope cyber war
between hackers from both the countries.
These incidents make us realize that the world we live in has changed and it has changed
fast. The management of data is ‘key’ to prevent cyber-attacks. In the past, physically
access files led to data manipulation. Today, however, a person sitting millions of miles
away can access all forms of data in an instant. Cyber space knows no geographical
limitations or boundaries. Data that is compromised and data that is sensitive can
influence our lives and security. The ‘WannaCry virus’ which made the headlines recently,
is a ransom-ware that makes data unreadable. Thus, the protection of data is as important
as the protection of human lives. Our governments and various state intuitions have
stored sensitive data. While it is safe to assume that Pakistan’s sensitive agencies protect
the data and take steps to ensure its integrity, it is not always true. The possibilities of the
data with the Federal Board of Revenue or the NADRA, or the Pakistan intelligence
10
agencies being hacked, can be excessively worrisome to Pakistan. The seminar thus aims
to raise awareness on this issue and the choices we have as users in the cyberspace.
He further stated that the threat of cyber warfare is real to mention many examples. In
2009, Indian Army’s Military Operations Directorate conducted a war-game code-named
Divine Matrix. In 2010, Indian National Security Advisor drafted an offensive cyber
warfare strategy that brought all the intelligence agencies and RAW on the same page. In
2010, Stuxnet, an American-Israeli malicious computer worm brought down one of Iran’s
uranium plant in Isfahan province. In 2012, Shamoon, an Iranian linked worm attacked
Saudi Aramco. In 2015, Chinese hackers pillaged secret details of Lockheed Martin’s F35
stealth aircraft. On 9th December 2016, US President Barrack Obama ordered a review of
a US election related serious cyber-attacks by Russia.
The prediction is that by 2021, the global annual cybercrime cost will double to 6 trillion
dollars every year. Cyber security market will rise to 101 billion dollars in 2018 and will
become 170 billion dollars by 2020. He also enlightened the audience with a list of top
five countries, with cyber warfare capabilities, namely USA, UK, Russia, China and Israel.
To achieve the status of cyber readiness, Pakistan needs to address areas of instant
response to counter the threat. Greater investments in cyber research and development,
capacity and skill development are required to achieve cyber-security. Concerned
organizations of the civil and military dimension are making tangible efforts in developing
cyber security capabilities. Pakistan’s Ministry of IT is working day and night to formulate
the Prevention of Electronic Crimes Act, 2016 legislated to prevent unauthorized acts with
respect to information systems, related offences as well as mechanisms for their
prosecution.
Talking about national security means talking about the security of 200 million civilians
and protecting the sovereignty of a country, strategically located and economically
emerging.
Concluding the remarks, the secretary NSD stated that Pakistan presently is facing the
menace of both terrorism and warfare, thus a cyber-security strategy is an integral part of
national security policy. Cyber security needs to be ensured in a coordinated manner
through cooperation among all relevant agencies, interconnecting their infrastructure
11
and services in cyber space. Pakistan must establish its foothold in cyber-space and
formulate its state policy before the world further enhances its capabilities.
He ensured the audience that National Security Division serves as a secretariat for
National Security Committee. The recommendations of this seminar will be processed
and put up for consideration before the national security committee, which is the highest
policy making and decision making body on the security related issues at national level
presided over by the Prime Minister of Pakistan.
12
Speaker 1:
1. Information security
2. Data privacy
3. Identity theft
4. Cyber-crime
5. Cyber-terrorism
6. Cyber warfare
13
found out that US’ Airforce Cyber Security Vision 2025 is one of the best documents to
refer. It covers aspects of space, air, infrastructure and the modern way of covering all the
domains of satellite communications, regular network communication or
hardware/infrastructure.
The document is mainly focused on the need to forecast future threats, mitigate
vulnerabilities, enhance the industrial base, and develop the operational capabilities and
cyber workforce necessary to assure cyber advantage across all Air Force mission areas.
Furthermore, to create an integrated, Air Force-wide, near-, medium- and far-term
science and technology (S&T) vision to meet or exceed air force cyber goals and, where
possible, create revolutionary cyber capabilities to support core air force (AF) missions.
It identifies state of the art and best practices in government and private sector and
analyzes current and forecasted capabilities, threats, vulnerabilities, and consequences
across core missions to identify critical S&T gaps. Moreover, it articulates AF near (FY11-
16), mid (FY16-20) and long (FY21-25) term S&T to fill gaps, indicating where AF should
lead, follow, or watch. It also addresses cyber S&T across all Air Force core missions and
functions (air, space, C4ISR) comprehensively including policy as well as DOTMLPF
considerations and engage different partners from industry, academia, national labs
FFRDC and government. Cyber security cannot be overlooked in any field be it military,
intelligence or economy. A cyber-mission thus should be drafted with utmost clarity.
US Air Force document further states that future Air-force fighters will be two guys rather
one i.e. one the fighter pilot and other a
cyber-security warrior, who will be sitting
in a building trying to hack into enemy jets
and gaining relative control over them.
Controlling the avionics and electronics of
a fighter jet can dismantle the pilot entirely.
The stated technology is the landmark
objective of cyber-warrior today. Today,
developing such a capability is the central
pillar of US future fighter air-crafts.
14
He further stated that Iran’s nuclear power plant attacked by the Stuxnet worm proved
that cyber-threats need to be addressed competitively. The Stuxnet worm installed itself
in the nuclear plant’s PLC (Programming Logic Controller) computer-controlled system
and caused a change in the rotational speed of machinery making the nuclear plant fusion
center spin uncontrollably, up until it exploded. Explaining the different dimensions of
cyber-conflict, he said the difference between Cyber-warfare and Cyber-terrorism is very
small. The state’s involvement in the cyber-space is deemed as cyber-security/cyber-
warfare, while a non-state actor’s involvement in manipulating the cyber-space is termed
cyber-terrorism. The ultimate objective of both the entities is almost the same, while the
intentions may vary. Cyber-terrorism is an evolving concept with possibilities of critical
damages to infrastructure, networks and cyberspace. Issues of cyber-terrorism are vital
to information security specialists and to some extent the society. There are cyber armies
all around the world: China having the biggest cyber-army in the world. The Unit 61398
of the Chinese cyber army is partially situated on Datong Road in Gaoqiaozhen. The US
is also responding back equally with a lieutenant general appointed as the head of cyber-
army in the US. The cyber mission force of the US is divided into four teams: the National
Mission Team, which is responsible to defend the US and its interests against cyber-
attacks of significant consequences; the Cyber Protection Team, which is responsible to
defend Department of Defense networks and systems against priority threats; the combat
mission team responsible to support combatant commands by integrated cyberspace
effects in support of operational plans and contingency operations; and the support team,
which is responsible to provide analytic and planning support to the national mission and
combat mission teams.
In the cyber domain, there is a war going on between China and the US. The intentions of
the Chinese were exposed due to their unsophistication as compared to Russians and
Israelis cyber-armies. Currently, the Chinese intrusions into the US military or corporate
sector have reduced raising many concerns. The two countries can possibly be indulged
in a mutual agreement to make efforts to reduce cyber-attacks as a sign of ‘seize fire’. It is
also possible that the Chinese hackers have become more sophisticated, due to which the
intrusions are going un-detected by the US system.
15
Cyber-Warrior
The speaker defined cyber-warriors as the best intellectual minds, studying in elite
universities, with enormous knowledge into the cyber-space. These individuals need to be
recognized and utilized through military and intelligence training, to help maneuver
techniques to protect a country from cyber-threats. These intellectuals must have the
ability to bear the stress of military training and intelligence operations.
Collaborative efforts under the following three dimensions will enable Pakistan to
quantum leap in the cyber-space:
16
the interests of Pakistan from all
dimensions. He also recommended that
Pakistan’s military and political leadership
should initiate programs to identify
country’s critical infrastructures and
vulnerabilities and help develop an
organization such as Pakistan Cyber
warfare Academy (PCA), training centers
for cyber warriors for national cyber
defense and offense. It will help to train them in both cyber security and military/
intelligence. Moreover, both public and private organizations need to work together to
achieve the capability.
Speaker 2:
Mr. Irfan Ur Rehman
Former Head of Cyber Security Operations at PTCL
Today, a
single hacker can completely
compromise the national security
infrastructure to get the control of the
internet, education, health, banking
and electricity systems. With the rapid development of technology, cyber terrorism is also
17
increasing. Soon, a click on the keyboard will cause more collateral damage than a
physical bomb. The United States of America has officially declared cyber-warfare as the
fifth domain of warfare after land, sea, air and space. This should help Pakistan realize
the grave importance of cyber-warfare.
Examples of cyber-terrorism:
Prevention of cyber-attacks:
18
He further stated that China has adopted the concept of ‘Great Firewall of China’. China
is using its own social media networks, messengers and search engines. Pakistan can
develop a similar system linking networks, applications and search engines, to be in
complete control of the information sharing.
Mobile operators can offer inbuilt social media applications and systems in smart phones,
so the risk of a third party manipulation is eliminated.
Defense strategies need to be focused upon, rather than offense strategies. Different
malware and Trojans can obtain data or information from other countries, but the
defensive side lacks infrastructure and sophistication.
National governance need to focus more on cyber-space running the risk, compliance and
policy framework. Cyber-security policies need to be accommodated with governance and
implementation.
The speaker concluded his speech by manifesting the fact that the intangibility of cyber-
threats should not be confused with lack of danger to national security.
19
Speaker 3:
Today’s terrorists are using the internet for the command and control systems for
recruiting. The era of cyber criminals has been transformed into the era of cyber terrorists.
Cyber criminals can inflict huge damage on infrastructure with almost no cost. The virtual
world for criminals and terrorists is a real one. The influx of technology in individual lives
cannot be stopped. In order to prevent cyber-crimes and attacks, understanding the
technology before the criminals is necessary. No government in the world today can think
of working without access to the internet and technology, due to which the traditional
diplomacy is reshaping into e-diplomacy.
He further states that cyber-crimes pose grave threats to critical infrastructure. Pakistan
requires strong mechanisms to counter such threats. Currently different public and
private institutions are working in isolation from one another. A cyber-security policy
must be formulated to integrate and synergize these individual entities into a single
20
collective effort to fight cyber-crimes. The country also needs to understand the difference
between cyber-crime and cyber-security. Every individual is a victim of cyber-crime.
There are existent laws for cyber-crimes, but they lack policies for cyber security.
He further stated that the future innovations in the world will be regarding crypto-
currencies, internet of things (IOTs) and artificial intelligence. The democratization of
artificial intelligence is excessively worrisome and will pose new challenges in cyber-
space.
In the next two to three years, 95% of things will be in the cyber-clouds. Thus,
understanding the ecosystem of the cloud holds crucial importance. In the cloud, things
work in sync and are interdependent. If one element is damaged, it will disrupt the entire
eco-system.
21
Elements of Cloud Services:
1. Hardware
2. Software
3. Integrators
4. Engineers
5. Third party vendors
The interdependence within the system is increasing quickly. Therefore, the dangers
posed by a single point of failure are also simultaneously increasing. Software-as-a-
service trends are catching up, which offer cheap solutions but are difficult to integrate.
The previously devised disaster recovery strategies are outdated today. They were most
reactive strategies only utilized once a disaster struck had struck. Pakistan thus needs a
proactive approach which will anticipate the threat before it materializes.
Opportunities:
The speaker further stated that the need to introduce cyber insurance for organizations is
necessary. In three to five years, the banking systems will change greatly. Industrial
revolution 4.0 will take over the world. Thus investments are needed in the SMEs, to make
the system prone to the upcoming change in the cyber-environment.
Concluding the speech, Mr. Ammar Jaffery talked about the need for an ecosystem
comprising of the government, private sector, business corporations, academia, civil
society and the public.
A cyber-security policy drafted in 2013 with the help of all stakeholders needs to be
implemented. Pakistan also requires research and development to immediately identify
new patterns of threat in the cyber-space. Cyber scouts and warriors need to be engaged
effectively in countering cyber-crimes. Cyber drills must be conducted, both at national
and international levels. There is also a need for regional & global cooperation in cyber-
security. The capacity building of law enforcement authorities, with regards to cyber-
22
security need to be worked upon. Accumulative efforts can help strengthen the cyber-
security of Pakistan against new threats and challenges.
Speaker 4:
The speaker focused on innovations required for a self-built product and the time needed
to develop such technologies. A threat that may not be imminent today, might become of
concern a few years down the line, making current solutions obsolete. Thus, IGNITE
works to make innovations that unlike a research project, solve problems pertaining to
different sectors and professions of the society.
Artificial intelligence:
23
Artificial Intelligence currently helping doctors and lawyers abroad in researching
databases to come up with referral cases, and judge profiles much better than a
professional lawyer. In Shaukat Khanum Hospital Pakistan, a cancer diagnostic system is
being developed to detect cancer, ten times better than a doctor. IGNITE itself is currently
funding a diagnostic system for detecting bovine/cow diseases, which helps dairy
production and elongates the cow’s life.
Robotics
Robots around the world, are replacing jobs. A textile manufacturer in India has
mentioned that robots will be taking away 10,000 jobs in the times to come. Letting robots
replace humans, creates unemployment, but not doing so leads to lack of competiveness,
decreasing exports even further. Pakistan is currently working on various innovation
projects such as a fire-fighting robot being created in Karachi. He further proclaimed that
with time the threat multiplies, as it is not just one device but all devices that are
endangered by cyber-attacks. The behavior patterns of individuals are analyzed by Google
and Facebook, finding out what they would want to buy and when, and so the pop-ups
come up as per the prediction. This is called analyzing data, to create a personality profile.
Block-Chain
A block-chain is a system through which any individual can run an IT system without the
assistance of another system. A block-chain creates similar opportunities without
requiring a central authority. Currently, the block-chain is being utilized for crypto-
24
currency such as the bitcoins. The block-chain facilitates transactions that cannot be
tracked using the dark web.
Neuro-tech
Neuro-tech is a developing technology that can read an individual’s dream and mind. It
can also place a training module in your brain. Some of these technologies are still in the
process of developing, but they will be seen being utilized in the near future. He further
stated that no cryptography can sustain quantum computing.
The world economic forum has stated that cyber-security can no longer be seen as a
primitive defense, and should rather be
seen as cyber resilience, assuming that
the parameter will be breached. Once
the parameter is violated, the response
mechanism needs to be worked upon.
Elements of cyber-security:
1. Network
2. Application
3. Data
4. Host
IGNITE mostly deals with developing technologies for network and application. IGNITE
is currently building a Pakistan-based artificial intelligence matching employment
software, to preserve the data. Data access and possession holds a lot of importance in
today’s world.
25
Projects by IGNITE:
A company called Plum-Grid was made around the project, which was then bought by an
American software company called vm-ware, turning out to be a great success.
N-Visible is a network application that performs real time analysis for anomaly detection,
compliance, profiling and reporting, with minimum human intervention, using cognitive
visualizations and machine learning.
26
The speaker further stated that iFahja has developed a solution that overcomes the issue
of existing RFID based security systems by using a password to authenticate the user.
Stolen car, a stolen e-tag, a regenerated e-tag would not be used to enter the secure
premises.
Innovation is always built by startup businesses. Today, the 5 most valuable companies
of the world, were once like any other startup. All these startups, are bringing in industry,
academic, government research, bringing it together and generating results. The
following is a list of startups operating within and beyond Pakistan:
Government
27
MoITT Cyber-Governance Policy Committee
Trillium
Five Rivers Technologies
Security Wall
Cyphlon
Ciklum Pakistan
PISA
C@RE
Global level
Sparkcognition
Elastica
FireEye
All three of the top, global level cyber-security companies were either built by a Pakistan
national, or a Pak-American national. This means that Pakistan does not lack the brains,
and with the rightly invested potential, a cyber-secure Pakistan can be created.
28
Speaker 5:
To secure such a complex environment the speaker further explained that the city has
several departments and each department has thousands of sensors spread across the city
collecting data. Each department then sends the data to smart government data center.
The data is carried back via telecom operator. There exists a large cloud infrastructure,
along with an application provider and integrator. Backend application with data
repository, its security and managing the authenticity of sensors, communication and
encryption is known as ‘IoT platform’. The platform is what manages all incoming
information. The problem is, sensors are unintelligent devices, and are installed in
millions. A culprit can change the firmware of a sensor and may use it for cyber-attack
against the city. A sensor could be easily manipulated in re-channeling the information,
incorrect data or causing delays. All these cases can create issues for city managers and
29
may damage their services, including damage to important services such as trains and
aviation traffic.
Infrastructure
30
Identification– If the firmware of a sensor is changed, one can identify that the
sensor now has a different code
Communication / Transport
Discovery: one cannot register millions of sensors manually, thus a system is
required
Data Protocols
Device Management
Semantic Multi-layer Frameworks
Security (Open Trust Protocol (TEE), X.509) – most important, stores the
cryptography to look after all the devices, while each device is given a certificate,
which can be changed when required
Industry Vertical (Connected Home, Industrial, etc)
Security Challenges:
31
Identity: Authenticating endpoints, services, and the customer or end-user
operating the endpoint
Privacy: Controls the access to the multi-tenant environment, reducing the
potential for harm to individual end-users
Security: Ensuring that system integrity can be verified, tracked, and monitored
For example to connect millions of sensors together a neighborhood network (NAN) was
created, and the network itself decides the meter to send back data.
He further stated that applications like the firewall are basic need but does not provide
full security. They are not the solution to advance security threats. Security must be
implemented at all the aforementioned layers, or else a secure environment cannot be
ensured.
Requirements
Matrix
32
Timeframe
The concept was created by Defense Information Systems Agency (DISA). In this model
software components communicate on a need-to-know model, in which device posture
and identity are verified before access to application infrastructure is granted.
Conclusion
Security of smart city project was extremely complex, but was achieved. Security was
added at all the layers of IoT environment, from edge sensor to Datacenter, from
33
application to multiple department’s users, from sensor registration to Platform and from
data availability to data intelligence access.
Mr. Tariq expressed his views regarding general IT and communication security. He said,
that an end user does not have to be an expert on IT security, they should the risk but
shall not be responsible for security of their devices. It’s the responsibility of IT providers
to encapsulate complexity and take the security responsibility of their users. Security
must be implemented at design stage, then the environment can sustain user mistakes. A
user should only have applications necessary to perform their job, and nothing extra to
make them vulnerable. The solution is to keep the complexity away from the user, and to
be moved to data center.
34
Speaker 6:
35
with the governance, institutional and cross-sector collaboration models. Currently, due
to lack of collaboration between different sectors, a holistic image of our cyber-readiness
has not evolved. He suggested that the policy should also present a risk assurance
framework to address the ambiguity regarding the sources of the information received by
users.
A self-created cyber-security framework may look like an attractive option, but the reality
is much different. Even if such a framework is backed by research and development
facilities of Ignite (formerly National ICT R&D fund), addressing the cyber-security
challenges in isolation is not the solution. We need a policy that addresses the concerns
of all local sectors, and that also acquires international collaboration.
The speaker also pointed out that the common user of the internet is widely uninformed
about the threats cyber-crimes pose. The cyber-security framework must increase the
awareness among individuals
for the sake of protecting their
own interests. While a rough
structure for such a policy
already exists, a revamped
cyber-security policy should
address all the mentioned
concerns, and amalgamate
them into becoming legislation
for implementation. A cyber-security policy for Pakistan is the need of the hour because
cyber-crime is no more a neglected threat but a reality. The successful implementation of
such a policy however, depends upon the collaborative efforts made by different sectors
in pursuing cyber-security goals.
36
Lastly, Mr. Mudassar mentioned that open and closed discussions are the key to
developing an extensive cyber-security policy for Pakistan, and so quickening the process
of developing such a policy is exactly what Pakistan needs.
37
Question and Answer Session
Moderator
Mr. Amer Hashmi – Advisor, National University of Science and Technology (NUST),
Islamabad
Question No.1
Question No.2
The implementation of a cyber-secure policy is not entirely under the influence of geo-
strategic players, but rather under a national authority, such as the National Security
Division, thus the implementation is not sufficiently affected by geostrategic challenges.
Ms. Asna Hassan from Center for Global & Strategic Studies
Question No.3
While developing a cyber-security policy for Pakistan, what do you think we can do about
the collection and manipulation of ‘big data’ by countries like the United States of
America?
In the last few decades, the internet has evolved immensely. Some believe that the
evolution was organic, while others believe that the deliberate efforts brought about the
evolution of the internet. Today in all parts of the world, the personal data of individuals
using online websites, is being harvested. The concern regarding the usage of this data is
common to all involved. For any research or innovation, data is indeed the ‘key’. The
39
question is ‘how this data will be exposed by organizations like NADRA, and once
exposed, will it be anonymous, to not compromise the privacy of the individual or
organization.’
One way of working is to have a data protection law, based on international norms. Once
a big bulk of data is collected, the countries can interact among themselves. This is a
difficult process of having a correlation between nations. Even in the international
community, there is still a lot of ambiguity about as to how will this data will be pursued
by countries.
There are three different approaches to secure the data of a country. The first is the China
approach, China has built a cyber-great wall, having their own search engines and
interactive websites, isolated from the influence of the rest of the world. The second is a
regional approach, the one European Union utilizes, through which each country in a
region could protect themselves, a global consensus is unnecessary. And the third is a
block-chain approach through with the block-chain developers enables individuals in
protecting their own identity. It is easy to say, that Facebook is using individual data, but
in return, Facebook is also free of any cost. Through a block-chain, individuals can decide
which data to give out, and which to protect. Such a system gives you power as well as
independence.
Pakistan needs to develop data safeguards, which will protect the data of individuals from
being manipulated. Currently, there are countries that have made massive success in
securing themselves in the cyber-space, while others are still exploring the dimensions of
the cyber-world. Pakistan for one is at the elementary stage, and so it has a long way to go
in achieving cyber-security.
Question No.4
40
What are the diplomatic efforts of Pakistan in formulating international legislation for
cyber-security and what alliances is Pakistan making with like-minded countries with
regard to cyber-security?
Pakistan has a long way to go, in developing alliances with regard to cyber-security. We
need to identify the allies, which will negotiate terms with us as per the current state of
affairs. Countries with similar interests can turn out to be better allies. However, cyber-
security alliances are tricky. Many precautions need to be looked into to cater all the global
dimensions of the cyber-space, and that is exactly what Pakistan is currently working
upon.
Question No.6
41
matter of funding the shift, but a matter of whether we want to switch the course or not.
A shift will have its own repercussions. By far, the discussion is focused on keeping the
information open to the general public and our industries. All countries, even the US, face
challenges in pursuing policies on cyber-security. In the US, hundreds of companies are
pursuing cyber-security in their own specific domains.
Organizations like the European Union and its defense mechanisms are very different.
Pakistan is still devising its priorities as per the needs of the cyber-environment to
implement policies. He further stated that China is open, it is not blocked. China has just
created their own applications. Sharing his own experience, he talked about conveniently
communicating with Chinese counter-parts and friends on we-chat. Individuals can go
buy things from Ali Baba. China is, however, managing and controlling its own internet.
The issue Pakistan faces is regarding the financing. Once sufficiently funded, telecom
operators and providers need to be trained, to secure the network, while also letting it be
open.
Question No.7
42
occurs to steal the data. End-point security is thus primitive. Thus the solution is to use
standard encryption and harden the entry point security accordingly.
The way these companies have come up, they are products of innovation, once companies
like Facebook and Google became corporate citizens, they also became corporate citizens
to the US system and followed their laws. Having access to data requires mutual legal
assistance among companies. Treaties under the UN to seek information have been
negotiated in accordance with the data available. Companies can now sense the curiosity
the individuals have towards these applications. Pakistan, thus, requires strong
implementation of data protection laws that will define the usage and repercussions of
intermediaries using your data.
The policy regarding cyber-security exist, but the lack of implementation is due to the lack
of training provided for research and development professionals.
Question No.8
Donald Trump’s new nuclear posture, according to the New York Times, stated that the
United States is considering lowering down its nuclear threshold; a cyber-attack may be
responded through a tactical nuclear weapon:
a. Is this true?
b. Are we (as Pakistan), in accordance with other nations, considering lowering
down our threshold, to respond to a cyber-attack, with a tactical nuclear
weapon?
43
Individuals mix up Pakistan’s defensive views with that of the United States. The nuclear
narrative of Pakistan is well thought out, and has no linkages to the direct changes. the
US may be making to its policies. He concluded his answer by stating that America’s
strategy may not be Pakistan-centric, but for the entire globe, so a direct correlation
should not be made between the two entities.
44
Closing Address by
Further to it, he mentioned that Pakistan is deeply engulfed in addressing its traditional
and conventional threats, that the country neglects the threats emulating from non-
conventional innovations. Without any further ado, existing and new threats need to be
confronted simultaneously. We as a nation, need to effectively address the rising
challenges, now more than ever before.
Cyber-threats happen to be a fairly new challenge to many nations. Many of such nations
are still in a process of developing a cyber-security framework, to protect its national
interests against the threats posed by the cyber-space. Information technology in today’s
date profoundly affects the thought process of a state, with regards to warfare and
security. The advancement in technologies has created many seen and unseen boundaries
which transcend the influence of states. With increased dependence on digital technology,
rises the need to secure our information from being maliciously disrupted or misused. On
one hand, the internet provides us with information, and on the other is poses a security
threat to the state. The need of the hour is to develop cyber-security solutions to protect
45
information, along with benefitting
from the World Wide Web. With the
growing sophistication of cyber-
attacks, programmers have been
unable to entirely protect
computers, data-bases, programs
and networks. Pakistan being a
country with strategic capability,
currently needs to securitize its
cyber-space to protect communication systems, financial systems and conventional
systems against cyber-threats. At a societal level, Pakistan’s cyber-security is highly
vulnerable to threats. This increases the chances of losing critical information and disrupt
national critical infrastructure of the country. Enemies can exploit, disrupt and destroy
information to harm the state. Cyber-security should not just be addressed as per priority
for the government, but also should be prioritized by individuals, as a direct national
threat. Currently, only a few individuals understand the gravity of the issue.
General Janjua concluded his remarks by stating the importance of a collaborative effort
of individuals, organizations, companies and institutions to take responsibility to protect
their respective parts of the system to create a cyber-secure Pakistan. The advisor further
mentioned that the digital regime stretches around the globe, irrespective of geographical
boundaries. The core objective is to align Pakistan’s standards of cyber precautions,
preventions and preparations with international standards. Lastly, he called upon experts
to extend a helping hand and requested the state institutions, corporate sector and the
general public to effectively leverage potential in this field.
46
Concluding Remarks by
Lieutenant General Muhammad Zahir Ul Islam HI (M), Retd – Chairman
CGSS
The Chairman initiated his closing remarks by expressing
his gratitude to all those that added to the success of the
event through active participation. He extended a special
thanks to General Nasser Khan Janjua for providing Center
for Global & Strategic Studies the opportunity to be a
partner in this important conference. He further stated that
the level of expertise demonstrated at the seminar had
humbled me immensely.
He shared his experience from a War College in the US, which had many international
students. Scandinavian countries have achieved a lot in regards to cyber-security.
Moreover, he mentioned a Swedish army officer, who narrated extensive progress his
country had made in cyber-warfare and cyber-security. They had designed a strategy, a
game was designed. The game comprised of two teams. The red team comprised of
hackers, who attacked the cyber-security networks of the other team. After an ongoing
effort of almost three years, a complete cyber-security network was created. To test the
security network, hackers from around the countries tried to break through the system.
The individual who ultimately broke the code in a week’s span was a young whiz kid from
Pakistan.
He concluded his remarks by stating that Pakistan has the potential. The intelligent
individuals of Pakistan should be able to provide the required cyber-security. To sum up,
he extended his faith in the cyber-security team led by Lieutenant General Nasser Khan
Janjua in devising a ‘Cyber-Security Policy’ addressing all concerns discussed at the
seminar.
47
Recommendations
National Cyber Security strategy is an essential component of any country’s Overall Security &
Development Strategy. The responsibility includes protection of its citizens, assets and
information against cyber terrorism and implementation of measures to help achieve this
responsibility.
It is challenging but possible to catch up with the increase in national cyber threats and counter
it with appropriate vigilance and response from the government. National Security Division has
rightly tried to highlight the issue for all stakeholders. There is good understanding of the issue
within the higher echelons. Moving onwards, this understanding is now required to be
transformed into concrete steps towards formulation of a national strategy and its responsibility
matrix.
For proper execution, the cyber security response and its control responsibility must lie with an
empowered Organisation properly mandated for this purpose by the government. This body must
be allowed to act as a steering committee to coordinate the plans and efforts of different
departments on agreed milestones, while ensuring their culmination into a cohesive National
Cyber Security Framework. The LEAs, armed forces, FIA and civilian organisations may be
encouraged to continue to perform their individual roles within the overall ambit of this
framework. It is to be ensured that each of the efforts feeds into the achievement of specific
objectives of the strategy.
National mandate is missing from the equation with multiple stakeholders and unclear
jurisdiction. National level role and effort at federal government level to glue fragmented efforts
and to device the national cyber strategy is missing.
The learned panel highlighted several cyber security related issues and recommended methods to
close the gap. They also emphasized the need of:
48
Based on the discussions and input it is recommended to:
Mandate the creation of a group under National Security Division to discuss and
recommend national level security strategy and a framework to achieve its objectives. The
group to consider following while preparing their recommendations:
Creation of National Cyber Security Organization (NCSO). Define their mandate,
coverage, responsibility and authority.
Brainstorm and identify priority areas for the NCSO to focus on
Creation of National CERT (Computer Emergency Response Team). Define their
mandate, responsibility and finances required.
Define pillars of our cyber security strategy and a framework on how to take them
along
Cyber security Centres where local research and development shall be encouraged by:
o Local Universities to develop intellectual property and capacity building for
equipped manpower
o Funding by Government (IGNITE)
o Indigenous security products to be developed and supported by Government.
Create a program to review and update the existing policies at departmental and
division level to harmonize them in line with the framework
Security awareness campaign for Government and Citizens
49
50