You are on page 1of 2

POSITION PAPER

Committee: General Assembly


Country: Islamic Republic of Pakistan
Agenda:Weaponization of AI and Cyber Warfare

Cyberattacks are very frequently seen in the current era.


The threat of cyberattacks has multiplied along with the rate at which society is becoming more
digital. But a challenging component of cyberattacks is their capacity for widespread disruption and
their inherent anonymity. The ransomware attack on Colonial Pipelines in the US, which resulted in
significant fuel shortages across the nation, serves as an illustration of this. In a similar vein, data
breaches are a component of cyber-attacks whose goal is to destroy or obtain information about a
cyber-adversary. Such cyberattacks may result in disruption and uncertainty in the near future, with
cyberspace being described as a new global common.Cyber Attacks of this nature are not immune
to Pakistan. Our Opponent’s offensive cyber capabilities, according to a recent analysis from the
International Institute for Strategic Studies (IISS), are primarily geared toward Pakistan. It’s capital
is also enhancing its offensive capabilities using contemporary technologies that its global partners
share.
Recently, Pakistani espionage with the opponent’s base has also been revealed. The "Pegasus"
program, a mobile phone spying spyware, was exposed, shedding light on the use of offensive cyber
capabilities to perform espionage on both domestic and foreign targets. Pakistani politicians were
among the prominent ones.

A strategy framework must be created in order to reduce this broad-spectrum cyber threat. We must
protect our conventional military capability. Against this hidden danger. When addressing the 110th
Midshipmen's passing out parade on December 22, 2018, Pakistan's Chief of Army Staff (COAS),
General Qamar Javed Bajwa, said, "You have to prepare yourself to read the environment, gauge
enemy's latest moves, and be ready to respond, even when a surgical strike exists only in the
cognitive domain or even when the attack comes, not in the battlefield but in cyberspace."
Therefore, a coordinated and comprehensive national response that properly integrates military and
civil institutions is necessary. With this perspective, following response measures are available for
consideration:
SOLUTIONS

a) A shift in perspective: A shift in thinking is required, and a greater emphasis should be placed on
emerging IT trends. As a long-term solution, IT and cyber topics should be covered in schools
and colleges. The military and government agencies must modernize their standard operating
procedures to comply with the most recent IT developments. Cyber issues should be taken into
account when fighting a battle.

b) Cell for Cyber Policy: A policy unit made up of top software developers under the Ministry of
Science and Technology, businesses, civil servants, and military personnel may be founded.
Conducting in-depth analysis of cyber threat and its manifestations across various segments and
dimensions should be the cell's mandate.

c) thorough inspection of every equipment, especially military hardware, during induction.

d) uniform IT and communications platforms across all federal agencies

CONCLUSION
The traditional military has undergone considerable changes as a result of the computer technology
revolution. A comprehensive, coordinated national initiative involving both civil and military assets
will need to be put into motion. The only way Pakistan can address these issues is by developing a
proactive strategy that encourages the creation of an efficient AI-based cybersecurity system.

BIBLIOGRAPHY
https://www.cfc.forces.gc.ca/259/290/22/192/Yaqub.pdf
https://jcs.ndu.edu.pk/site/article/download/188/139/150

You might also like