• About Us
  • The TFT Story
  • Team
  • Write for TFT
  • Online advertisement tariff
  • Donate To Us
The Friday Times - Naya Daur
Friday, March 24, 2023
  • Home
  • Editorials
  • News
  • Analysis
  • Features
  • Spotlight
  • Videos
  • Citizens’ Voice
  • Lifestyle
  • Editor’s Picks
  • Good Times
  • More
    • About Us
    • Team
    • Write for TFT
    • The TFT Story
    • Donate To Us
No Result
View All Result
  • Home
  • Editorials
  • News
  • Analysis
  • Features
  • Spotlight
  • Videos
  • Citizens’ Voice
  • Lifestyle
  • Editor’s Picks
  • Good Times
  • More
    • About Us
    • Team
    • Write for TFT
    • The TFT Story
    • Donate To Us
No Result
View All Result
The Friday Times - Naya Daur
No Result
View All Result
Home Analysis

The Emergence Of Cyber-Weapons On The Dark Web

Cyber-terrorists and state-sponsored hackers are the key actors in cyber-war, who not only attack websites to deface them and steal Facebook accounts, but also compromise and destroy countries' economic security.

Ayaz Hussain Abbasi by Ayaz Hussain Abbasi
May 30, 2022
in Analysis
The Emergence Of Cyber-Weapons On The Dark Web
109
SHARES
Share on FacebookShare on Twitter

“The emergence of hybrid threats has been aided by the shifting character of classic ideas of armed conflict.” State-developed cyberweapons will be available on the darknet in a “few of years,” says Interpol Secretary General Jurgen Stock.

The Internet first appeared in the late 1980s, and it quickly became the primary engine for economic progress, wealth, and scientific discovery. We have become so accustomed to supplying applications and infrastructure services over the Internet in our modern environment that it is difficult to fathom life without email, online banking, data storage, and quantum computing capability.

Cyber-war is more concerning to today’s policymakers and decision-makers than cybercrime. Cyber-terrorists and state-sponsored hackers are the key actors in cyber-war, who not only attack websites to deface them and steal Facebook accounts, but also compromise and destroy countries’ economic security.

A malware agent used in a cyberattack for military, paramilitary, or intelligence purposes is usually referred to as a cyberweapon. Data theft and electronic or physical destruction are examples of cyber weapons. While a cyberweapon nearly always causes direct or indirect financial harm to the target organization, direct financial gain for the sponsor is not the primary goal of this type of agent.

A cyber-army is a group of troops with advanced cyber talents who are extremely competent in information technology. Countries should use cyber-armies to maintain national cybersecurity. China is ranked first in cyber defensive power, followed by the Netherlands and France, then the United States and Canada.

According to researchers, the United States leads in cyber offensive, cyber norms influence, and cyber intelligence.

Teams at Cyber Command are allocated to specific adversaries—including Iran, North Korea, Russia, and China—and have worked with the intelligence community for years to get access to digital networks. Cyber Weapons are stealth weapons that, like any computer code, are written in zeros and ones. They have the ability to infiltrate entire networks as well as infect individual PCs. They have the ability to block communication systems, confound enemy signals, and stop military attacks before they happen, all without the flash and bang of traditional weapons of war.

Although cyber warfare is a new phenomenon in its current form, the notion is as old as warfare itself. Rivals used to try to physically interrupt their opponent’s communication networks in the old days as well. Similarly, using all available means, well-thought-out strategies were used to gain access to information systems and develop mechanisms of misinformation in the enemies’ ranks.

Humans are becoming increasingly reliant on technology due to rapid advancements in communication tool applications. During the COVID-19 pandemic, the efficacy of these technical techniques was put to the test. Even the most advanced states with cutting-edge medical facilities were crippled for months, forcing everyone from executives to administrative staff to work digitally from their homes.

Furthermore, the idea of cyber threats has muddled the internal and external dimensions of national security, allowing less powerful state and non-state actors to increase their influence efforts. One of the causes that have fostered the formation of hybrid threats or made irregular warfare more appealing is the shifting nature of traditional ideas of armed conflict and war, because these may not motivate military action.

Due to its great capacity to disrupt communication infrastructure, cyber warfare is now regarded as a more appropriate tactic for offensive action against a rival. This is particularly risky because it has the potential to immobilize the target system for the duration of the disruption. Highly sensitive defense installations, such as command and control systems, missile-firing sites, air defense systems, and, more importantly, strategic decision-making mechanisms, may be included in these systems.

The race for space dominance, which began in 1957 with the launch of Sputnik-I by the then-Soviet Union and ended in 1958 with the launch of the United States’ first manned space voyage, was perhaps to attain improved connectedness, integration, and networking in the decades to come. However, knowledge gained via advancements in the fields of information and space technology is now being used in a bad way to disrupt the same communication and integration.

State institutions have become increasingly vulnerable as a result of the use of cyber warfare as part of a strategy to disrupt enemy lines of communication and cause harm to their prospective capabilities. Personal security, which is an important component of human security, is also vulnerable to disruptions in communication, location, and financial activities, to name a few examples. As a result, international and national organizations must establish legal procedures to ensure that cyber warfare does not violate an individual’s rights or deprive him or her of his or her financial assets.

Interpol fears that military-grade cyberweapons could soon be available on the dark web:

State-developed cyber weapons will be available on the darknet in a “few of years,” according to Interpol Secretary General Jurgen Stock.

Cyberwar has long been a source of fear for governments around the world, but it has resurfaced in the wake of the Russia-Ukraine conflict.

According to the World Economic Forum’s Global Cybersecurity Outlook study, the number of cyberattacks worldwide more than doubled in 2021.

Cyber-warfare tools used by the military could eventually fall into the hands of hackers.

In a “few years,” state-developed cyber weapons will be available on the darknet, a hidden area of the internet that cannot be accessed using search engines like Google.

“In the physical world, that is a significant problem—we have weapons that are used on the battlefield today and will be utilized by organized crime groups tomorrow.”

Also Read:

Saudi-Iran Détente: What Does It Hold For Pakistan?

Democracy In QAU: The Only Way Forward

“The same is true for digital weapons that are currently in use by the military, have been created by the military, and will be available to criminals tomorrow.”

Ransomware, in which hackers lock down a company’s computer systems and demand a ransom payment to regain control, is one of the most common cyber weapons. Cyberwar has long been a source of fear for governments around the world, but it has resurfaced in the wake of the Russia-Ukraine conflict.

Moscow has been blamed for a number of cyberattacks that occurred before and during its military invasion of Ukraine, but it has always denied the allegations. Meanwhile, Ukraine has solicited the assistance of volunteer hackers from all around the world to aid in its defense against Russian aggression. A “significant number” of cyberattacks go unnoticed. “It’s not just law enforcement that demands we develop bridges between our silos, the islands of information,” says the author.

According to the World Economic Forum’s Global Cybersecurity Outlook study, the number of cyberattacks worldwide more than doubled in 2021. According to the research, ransomware remains the most common sort of assault, with firms being targeted 270 times each year on average.

Critical energy infrastructure and supply lines are being jeopardized by cyberattacks.

Tags: cyberweaponscybercrimespakistan cybercrime
Previous Post

Rights Movement Haq Do Tehreek Sweeps Local Govt Elections In Gwadar

Next Post

HEC Budget Not Being Cut, Clarifies PM Shehbaz

Ayaz Hussain Abbasi

Ayaz Hussain Abbasi

The author is a researcher, writer and analyst in the field of cyber security. He holds LLB and an M.Phil in Cyber Crimes and is currently pursuing his Ph.D in CS

Next Post
Rights Movement Haq Do Tehreek Sweeps Local Govt Elections In Gwadar

Rights Movement Haq Do Tehreek Sweeps Local Govt Elections In Gwadar

Recent News

Nawaz says Imran is a fraud

Never Seen A Bigger Fraud Than Imran Khan, Says Nawaz

March 24, 2023
Fact-Check: Online Harassment Based On Doctored Subtitles

Fact-Check: Online Harassment Based On Doctored Subtitles

March 24, 2023
Azhar Mashwani

PTI Focal Person On Digital Media Azhar Mashwani ‘Goes Missing’

March 24, 2023

Twitter

Newsletter



Donate To Us

Archives

  • March 2023
  • February 2023
  • January 2023
  • December 2022
  • November 2022
  • October 2022
  • September 2022
  • August 2022
  • July 2022
  • June 2022
  • May 2022
  • April 2022
  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021
  • September 2021
  • August 2021
  • July 2021
  • June 2021
  • May 2021
  • April 2021
  • March 2021
  • February 2021
  • January 2021
  • December 2020
  • November 2020
  • October 2020
  • September 2020
  • August 2020
  • July 2020
  • June 2020
  • May 2020
  • April 2020
  • March 2020
  • February 2020
  • January 2020
  • December 2019
  • November 2019
  • October 2019
  • September 2019
  • August 2019
  • July 2019
  • June 2019
  • May 2019
  • April 2019
  • March 2019
  • February 2019
  • January 2019
  • October 2018
  • September 2018
  • August 2018
  • July 2018
  • June 2018
  • May 2018
  • April 2018
  • March 2018
  • February 2018
  • January 2018
  • December 2017
  • November 2017
  • October 2017
  • September 2017
  • August 2017
  • July 2017
  • June 2017
  • May 2017
  • April 2017
  • March 2017
  • February 2017
  • January 2017
  • December 2016
  • November 2016
  • October 2016
  • September 2016
  • August 2016
  • July 2016
  • June 2016
  • May 2016
  • April 2016
  • March 2016
  • February 2016
  • January 2016
  • December 2015
  • November 2015
  • October 2015
  • September 2015
  • August 2015
  • July 2015
  • June 2015
  • May 2015
  • April 2015
  • March 2015
  • February 2015
  • January 2015
  • December 2014
  • November 2014
  • October 2014
  • September 2014
  • August 2014
  • July 2014
  • June 2014
  • May 2014
  • April 2014
  • March 2014
  • February 2014
  • January 2014
  • December 2013
  • November 2013
  • October 2013
  • September 2013
  • July 2011
  • July 2005
  • June 2000
The Friday Times – Naya Daur

THE TRUTH WILL OUT


The Friday Times is Pakistan’s first independent weekly, founded in 1989. In 2021, the publication went into collaboration with digital news platform Naya Daur Media to publish under a daily cycle.


Social Media

Latest News

  • All
  • News
  • Editorials
  • Features
  • Analysis
  • Lifestyle
Nawaz says Imran is a fraud

Never Seen A Bigger Fraud Than Imran Khan, Says Nawaz

by News Desk
March 24, 2023
0

PML-N supremo has said that he hasn’t seen...

Fact-Check: Online Harassment Based On Doctored Subtitles

Fact-Check: Online Harassment Based On Doctored Subtitles

by News Desk
March 24, 2023
0

As Pakistani society gets more polarised by the...

Social Feed

  • About Us
  • The TFT Story
  • Team
  • Write for TFT
  • Online advertisement tariff
  • Donate To Us

© 2022 All Rights Reserved.

No Result
View All Result
  • Home
  • Editorials
  • News
  • Analysis
  • Features
  • Spotlight
  • Videos
  • Citizens’ Voice
  • Lifestyle
  • Editor’s Picks
  • Good Times
  • More
    • About Us
    • Team
    • Write for TFT
    • The TFT Story
    • Donate To Us

© 2022 All Rights Reserved.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist