<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Topic:cyber-attacks &#8212; Global Security Review %</title>
	<atom:link href="https://globalsecurityreview.com/subject/cyber-attacks/feed/" rel="self" type="application/rss+xml" />
	<link>https://globalsecurityreview.com/subject/cyber-attacks/</link>
	<description>A division of the National Institute for Deterrence Studies (NIDS)</description>
	<lastBuildDate>Thu, 05 Feb 2026 11:49:17 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://globalsecurityreview.com/wp-content/uploads/2023/10/cropped-GSR-Banner-LogoV2-32x32.png</url>
	<title>Topic:cyber-attacks &#8212; Global Security Review %</title>
	<link>https://globalsecurityreview.com/subject/cyber-attacks/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</title>
		<link>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/</link>
					<comments>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/#respond</comments>
		
		<dc:creator><![CDATA[Tahir Mahmood Azad]]></dc:creator>
		<pubDate>Thu, 05 Feb 2026 13:15:13 +0000</pubDate>
				<category><![CDATA[AI & Deterrence]]></category>
		<category><![CDATA[Archive]]></category>
		<category><![CDATA[Deterrence & Foreign Policy]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[AI]]></category>
		<category><![CDATA[AI–HUMINT fusion]]></category>
		<category><![CDATA[automated analysis]]></category>
		<category><![CDATA[big data]]></category>
		<category><![CDATA[CMS]]></category>
		<category><![CDATA[cyber technologies]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[data exfiltration]]></category>
		<category><![CDATA[espionage]]></category>
		<category><![CDATA[false information]]></category>
		<category><![CDATA[HUMINT]]></category>
		<category><![CDATA[India]]></category>
		<category><![CDATA[Intelligence]]></category>
		<category><![CDATA[ISI]]></category>
		<category><![CDATA[NADRA]]></category>
		<category><![CDATA[NATGRID]]></category>
		<category><![CDATA[nuclearized]]></category>
		<category><![CDATA[Pakistan]]></category>
		<category><![CDATA[Pegasus spyware]]></category>
		<category><![CDATA[political profiling]]></category>
		<category><![CDATA[RAW]]></category>
		<category><![CDATA[Safe City projects]]></category>
		<category><![CDATA[South Asia]]></category>
		<category><![CDATA[strategic vulnerabilities]]></category>
		<category><![CDATA[surveillance]]></category>
		<category><![CDATA[Terrorism]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=32261</guid>

					<description><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence (ISI) and India’s Research and Analysis Wing (RAW) are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>For decades, intelligence agencies in developing countries, especially in South Asia, have been portrayed as all-knowing, all-seeing, and deeply involved in every part of politics and security. Pakistan’s Inter-Services Intelligence <a href="https://ciaotest.cc.columbia.edu/olj/sa/sa-feb00-2.html">(ISI)</a> and India’s Research and Analysis Wing <a href="https://www.cfr.org/backgrounder/raw-indias-external-intelligence-agency">(RAW)</a> are often mythologized as all-powerful institutions capable of shaping domestic politics and manipulating regional events. However, this description disguises a basic reality: the traditional human intelligence <a href="https://www.dhs.gov/sites/default/files/2024-09/2024aepimpactofaiontraditionalhumananalysis.pdf">(HUMINT)</a>–centered model that sustained these agencies is being fundamentally disrupted by artificial intelligence (AI), big-data surveillance, and automated analysis. The actual picture today is not the strength of these institutions but the growing mismatch between their legacy intelligence cultures and the demands of the AI era.</p>
<p>AI has improved intelligence operations in developing nations, but it has also created a new intelligence gap due to disjointed technological implementation, political exploitation of surveillance, reliance on foreign suppliers, and insufficient integration between HUMINT and AI-driven systems. Pakistan and India have large human resources and developing technological ecosystems, but institutional fragmentation and political agendas prevent the development of integrated, modern intelligence frameworks.</p>
<p>The problems that South Asian intelligence services are having are part of a larger global transformation. AI is now a segment of intelligence operation in the US, China, Israel, and some <a href="https://rejolut.com/blog/13-top-ai-countries/#:~:text=Conclusion,and%20interact%20with%20the%20world.">European countries</a>. This includes automated translation, pattern-of-life analysis, algorithmic triage of intercepted data, commercial satellite imagery analytics, and cyber-enabled anomaly detection. <a href="https://bigdatachina.csis.org/the-ai-surveillance-symbiosis-in-china/">China’s surveillance</a> state uses AI-powered facial recognition, behavior prediction, and nationwide data fusion to show what a fully integrated intelligence model looks like. <a href="https://academic.oup.com/jogss/article/8/2/ogad005/7128314?login=false">The U.S.</a> is pushing for automated signals intelligence (SIGINT) processing and predictive analysis in all its intelligence agencies in the Office of the Director of National Intelligence (ODNI). As shown in studies of its military AI systems, <a href="https://media.setav.org/en/file/2025/02/deadly-algorithms-destructive-role-of-artificial-intelligence-in-gaza-war.pdf">Israel uses</a> AI in real-time targeting and ISR fusion.</p>
<p><a href="https://www.lesswrong.com/posts/cM7sR7seBRwtxctGY/the-ai-governance-gaps-in-developing-countries">Developing countries</a> are just as vulnerable to cyber-attacks, terrorism, and false information, but they do not have the institutional frameworks that let AI grow. This global gap is what makes the changes in intelligence in Pakistan and India so important for strategy. <a href="https://www.csohate.org/2025/09/15/advanced-surveillance-in-pakistan/#:~:text=On%209%20September%2C%20Amnesty%20International,regime%20of%20surveillance%20and%20censorship.">Pakistan</a> and <a href="https://ohrh.law.ox.ac.uk/ai-surveillance-and-privacy-in-india-human-rights-in-the-age-of-technology/#:~:text=This%20permissiveness%20undermines%20the%20Supreme,on%20getting%20that%20balance%20right.">India</a> have both spent resources on AI-enabled surveillance systems like ID databases, CCTV networks, predictive policing tools, interception systems, and cyber technologies that come from other countries. <a href="https://genderit.org/articles/between-privacy-and-power-fine-line-pakistans-data-protection-bill">The NADRA</a> database and <a href="https://www.biometricupdate.com/202402/pakistan-executes-ai-powered-criminal-identification-system#:~:text=Pakistan%20is%20rapidly%20advancing%20into,biometric%20criminal%20identification%20and%20detention.">Safe City</a> projects in Pakistan give a lot of biometric and real-time data. <a href="https://compass.rauias.com/current-affairs/surveillance-india/">India has made</a> the Central Monitoring System (CMS) and the National Intelligence Grid (NATGRID) to connect databases between state agencies. The ministry, military, police, and intelligence systems are separate. Legacy bureaucracies promote compartmentalization over integration. AI needs centralized databases, clean data, agency cooperation, and agreed <a href="https://link.springer.com/chapter/10.1007/3-540-48317-9_10">analysis criteria</a>. These requirements are missing; hence, AI systems exhibit limited and inconsistent intelligence. Agencies are collecting more data than ever but lack the framework to analyze it.</p>
<p>Pakistan and India still value HUMINT for intelligence. It is crucial for counterterrorism, political spying, and regional operations. HUMINT alone can&#8217;t compete with hybrid enemies who use AI-driven processing. Strategically, China’s integrated military and civilian AI ecosystem is advantageous. <a href="https://moderndiplomacy.eu/2024/10/17/ai-adoption-in-developing-countries-opportunities-challenges-and-policy-pathways/">Developing states</a> are stuck between two sources of intelligence: First is a legacy HUMINT system with deep networks and second is an AI ecosystem that is fragmented and not fully developed, so it cannot support strategic analysis. In cross-border threat assessments, cyber invasions, and emerging non-traditional security issues like information warfare, this mismatch causes delays, blind spots, and analytical distortions.</p>
<p>In both Pakistan and India, AI-enabled surveillance has been used more for political purposes than for improving strategic intelligence. <a href="https://www.amnesty.org/en/latest/news/2023/12/india-damning-new-forensic-investigation-reveals-repeated-use-of-pegasus-spyware-to-target-high-profile-journalists/#:~:text=In%202020%2C%20Amnesty%20International%20and,us%20for%20digital%20forensics%20support.">Amnesty International</a> reported that India’s use of Pegasus spyware targeted journalists, activists, and political opponents. <a href="https://ianslive.in/pakistan-deploys-digital-technology-to-spy-on-citizens--20251002183604#:~:text=The%20authorities%20have%20also%20repeatedly,been%20prevalent%20in%20Pakistani%20politics.">Pakistan</a> has been criticized for using automated social media monitoring and political profiling, which often focuses on threats from within the country rather than threats from other countries. When surveillance tools are used to control political competition within a party, two things happen. First, institutional resources prioritize domestic control over strategic analysis. Second, technology investments strengthen policing instead of updating intelligence. This challenges national security by making it harder for the intelligence system to predict cyberattacks, regional crises, and threats from outside the country.</p>
<p>South Asia has a lot of foreign AI and cyber infrastructure. Pakistan employs Chinese surveillance equipment (<a href="https://www.dailymirror.lk/amp/international/Pakistan-adopts-Chinas-surveillance-model-Amnesty-warns/107-319168">Hikvision, Huawei</a>), while India uses <a href="https://ijhssm.org/issue_dcp/Cybersecurity%20Synergy%20How%20India%20and%20Israel%20Are%20Teaming%20Up.pdf">Israeli,</a> <a href="https://www.business-standard.com/economy/news/india-s-reliance-on-us-software-cloud-services-poses-economic-risks-gtri-125091400281_1.html">US,</a> and European and American forensics platforms. This increases structural risks, including <a href="https://www.paloaltonetworks.co.uk/cyberpedia/data-exfiltration">data exfiltration</a> and espionage due to entrenched vulnerabilities, strategic reliance on foreign updates, and weakened sovereignty over vital intelligence activities.</p>
<p>Two traditional rivals, nuclear-weapon states, are weakened by this reliance. AI-powered surveillance systems increase digital access points for assault. Big national data repositories attract attackers. Pakistan has had multiple government system hacks, and India has had large breaches that compromised critical infrastructure and government information.  Failures in the past were largely caused by human error, but in the AI era, bias in algorithms, data manipulation, hostile and automated cyberattacks, and misclassification can lead to erroneous operational decisions. These dangers make the strategy unstable.</p>
<p>Increasing intelligence gaps between <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">Pakistan</a> and <a href="https://www.cloudsek.com/blog/brief-disruptions-bold-claims-the-tactical-reality-behind-the-india-pakistan-hacktivist-surge">India</a> jeopardize national and regional security. More likely to misjudge opponents: In fast-moving crises, agencies may miss signals, misjudge threats, or misread trends without AI–HUMINT fusion. Cross-border escalation risks rise; poor intelligence integration in nuclearized environments may aggravate misperceptions during crises like the 2019 Pulwama–Balakot incident or the May 2025 standoff. Cyber attacks expose national secrets. Easy-to-get digital network intelligence can have fatal repercussions. China-asymmetric strategic competition: China is decades ahead in intelligence upgrading, and Pakistan and India may fall further. Domestic AI reduces institutional capacity: political survival trumps strategic intelligence.</p>
<p>In summary, countries that do not update their intelligence risk being caught off guard, making mistakes, and becoming more vulnerable. The myths of shadows, secrecy, and huge people networks that fueled emerging country intelligence organizations are gone. AI has highlighted bureaucratic opacity’s long-hidden structural flaws: dysfunctional systems, politicized surveillance, reliance on foreign technology, and a lack of HUMINT-AI integration. Thus, Pakistan and India’s new intelligence divide is not about data or resources. It is about institutions’ failure to transition from analogue intelligence to AI-connected ecosystems. State and non-state adversaries that accelerate this transformation will benefit.</p>
<p>In nuclearized, crisis-prone South Asia, small misunderstandings could lead to massive wars. Pakistan and India need more than AI tools to stay competitive strategically. They need data architectures that work together, technical specialists, protocols to prevent politicians from abusing their authority, and strategic AI–HUMINT fusion.</p>
<p><em>Dr. Tahir Mahmood Azad is currently a research scholar at the Department of Politics &amp; International Relations, the University of Reading, UK.  Views expressed in this article are the author&#8217;s own. </em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2026/02/The-Intelligence-Illusion-How-AI-is-Exposing-Strategic-Vulnerabilities-in-the-Developing-World.pdf"><img decoding="async" class="alignnone wp-image-32091" src="http://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png" alt="" width="245" height="68" srcset="https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button.png 450w, https://globalsecurityreview.com/wp-content/uploads/2026/01/2026-Download-Button-300x83.png 300w" sizes="(max-width: 245px) 100vw, 245px" /></a></p>
<p><a href="https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/">The Intelligence Illusion: How AI is Exposing Strategic Vulnerabilities in the Developing World</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/the-intelligence-illusion-how-ai-is-exposing-strategic-vulnerabilities-in-the-developing-world/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A South Asian Blueprint for Nuclear Risk Reduction</title>
		<link>https://globalsecurityreview.com/a-south-asian-blueprint-for-nuclear-risk-reduction/</link>
					<comments>https://globalsecurityreview.com/a-south-asian-blueprint-for-nuclear-risk-reduction/#comments</comments>
		
		<dc:creator><![CDATA[Sana Ahmed]]></dc:creator>
		<pubDate>Thu, 03 Apr 2025 12:02:28 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Arms Control & Nonproliferation]]></category>
		<category><![CDATA[Strategic Adversaries]]></category>
		<category><![CDATA[Additional Protocol I ​]]></category>
		<category><![CDATA[Bhabha Atomic Nuclear Plant]]></category>
		<category><![CDATA[bilateral accord]]></category>
		<category><![CDATA[Chernobyl]]></category>
		<category><![CDATA[conflict zones]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[disruptive technologies]]></category>
		<category><![CDATA[drone attack]]></category>
		<category><![CDATA[Geneva Conventions]]></category>
		<category><![CDATA[global emergency]]></category>
		<category><![CDATA[IAEA]]></category>
		<category><![CDATA[India-Pakistan Non-Attack Agreement]]></category>
		<category><![CDATA[international framework]]></category>
		<category><![CDATA[Kahuta Nuclear Research Laboratories]]></category>
		<category><![CDATA[nuclear facilities]]></category>
		<category><![CDATA[nuclear infrastructure]]></category>
		<category><![CDATA[nuclear power plant]]></category>
		<category><![CDATA[nuclear restraint]]></category>
		<category><![CDATA[nuclear risk reduction]]></category>
		<category><![CDATA[P-5 states]]></category>
		<category><![CDATA[radioactive contamination]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Smiling Buddha]]></category>
		<category><![CDATA[South Asian model]]></category>
		<category><![CDATA[transparency]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=30442</guid>

					<description><![CDATA[<p>The recent drone attack on the Chernobyl nuclear power plant reignited the critical debate about the security of nuclear infrastructure in active conflict zones. It also underscored the need for a robust international framework to safeguard nuclear facilities. Such targeting of nuclear facilities, deliberate or inadvertent, poses a significant risk and sets a precarious precedent [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/a-south-asian-blueprint-for-nuclear-risk-reduction/">A South Asian Blueprint for Nuclear Risk Reduction</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The recent <a href="https://news.un.org/en/story/2025/02/1160141">drone</a><u> attack</u> on the Chernobyl nuclear power plant reignited the critical debate about the security of nuclear infrastructure in active conflict zones. It also underscored the need for a robust international framework to safeguard nuclear facilities. Such targeting of nuclear facilities, deliberate or inadvertent, poses a significant risk and sets a precarious precedent for rival states to follow.</p>
<p>Nuclear incidents could lead to catastrophic radioactive contamination and a global emergency. In this regard, the South Asian model for the India-Pakistan Non-Attack Agreement is a milestone achievement in nuclear risk reduction. It was a breakthrough agreement that prevented two arch-rivals from attacking each other’s nuclear sites despite several intense standoffs. It played a crucial role in ensuring nuclear facilities remain off-limits by preventing catastrophic escalations and reinforcing stability.</p>
<p>Contemporary conflicts are increasingly defined by disruptive and cutting-edge technologies, such as drone and cyber attacks that introduce a new dimension to conflict and exposed nuclear infrastructure to unprecedented vulnerabilities. It is thus time for P-5 states and the IAEA to formulate an international non-attack agreement to ensure nuclear restraint. The world cannot afford another nuclear disaster due to the negligence of the international community and the absence of a proper enforcement mechanism.</p>
<p>After the nuclearization of South Asia in 1974, India conducted its first nuclear test, Smiling Buddha. Pakistan sensed a pre-emptive strike against its nuclear research labs. The rivalry got more intense when India hedged against blowing up Pakistan’s <a href="https://www.dawn.com/news/1195904">Kahuta</a><a href="https://www.dawn.com/news/1195904"> Nuclear Research Laboratories</a><a href="https://www.dawn.com/news/1195904">.</a> In return, Pakistan assured India that any attack on Kahuta would evoke a retaliatory strike on its <a href="https://www.dawn.com/news/889781/threat-to-destroy-indian-n-plant-stopped-attack-on-kahuta#:~:text=ISLAMABAD%20Pakistan%20had%20warned%20India%20in%20the,evoke%20a%20retaliatory%20strike%20on%20its%20Bhabha">Bhabha Atomic Nuclear Plant</a>.</p>
<p>To avert such future scenarios, both states agreed to sign the bilateral accord. Since doing so, and despite several conflicts like the <a href="https://www.tandfonline.com/doi/pdf/10.1080/03071840208446752">Kargil conflict </a>(1999), the 2001–2002 <a href="https://issi.org.pk/nuclear-signalling-and-escalation-risk-in-the-india-pakistan-context-a-critical-overview-of-the-2001-02-standoff/#:~:text=A%20terrorist%20attack%20on%20the,speeches%2C%20statements%20and%20press%20briefings.">military standoff,</a> and the <a href="https://www.stimson.org/2024/reflections-on-pulwama-balakot-at-five-years/">Pulwama-Balakot crisis</a> (2019), neither state has targeted the other’s nuclear facilities. Therefore, the <a href="https://www.nti.org/wp-content/uploads/2021/09/india_pakistan_non_attack_agreement.pdf">India-Pakistan Non-Attack Agreement’s</a> successful implementation in a highly volatile region, where nuclear-armed neighbors are eyeball-to-eyeball, sets a precedent that serves as a model for other states to follow.</p>
<p>The provisions of the India-Pakistan Non-Attack Agreement, require that both states refrain from “undertaking, encouraging, or participating in any action aimed at causing the destruction or damage to any nuclear installation or facility in the other country.” This is a model for a global nuclear security non-attack commitment. The agreement clearly defines nuclear installations to include research reactors, uranium enrichment plants, reprocessing facilities, and storage sites for radioactive material.</p>
<p>The second provision of the agreement is the Classification of Protected Sites. The Annual Exchange of Nuclear Facility List is the most important clause. Under this clause India and Pakistan exchange lists of their nuclear facilities every January 1, ensuring transparency, avoiding miscalculations, and implementing risk mitigation. This agreement sets the ground rules that even hostile states can uphold nuclear restraint, and the international community must take a lesson from this model to formulate an international nuclear non-attack agreement.</p>
<p>Moreover, the <a href="https://www.unscear.org/unscear/en/chernobyl.html">Chernobyl disaster of 1986 </a>is a stark reminder of the devastating consequences of nuclear incidents, with radiation leaks contaminating large areas and causing long-term ecological and health crises. While commenting on an attack, Ukrainian President Volodymyr Zelensky said that a drone hit the concrete shelter, sparking a fire that caused <a href="https://edition.cnn.com/2025/02/14/europe/russia-ukraine-drones-chernobyl-intl-hnk/index.html">significant</a> damage, but radiation remained under control. Both Ukrainian and Russian officials released their respective statements, denying the responsibility for the drone strike.</p>
<p>The pertinent question here is not who is responsible, but rather the safety and security of nuclear facilities during conflict and the need for militaries to exercise restraint. The war might end one day, but the hazards of nuclear radiation persist far longer. Meanwhile, existing international laws provide some protections for nuclear sites, but they lack enforceable mechanisms to deter attacks. The <u>Geneva Conventions</u><a href="https://www.icrc.org/en/document/additional-protocols-geneva-conventions-1949-factsheet"> and Additional Protocol I (1977)</a> classify nuclear power plants as civilian objects that should not be targeted. However, these clauses are not binding under all circumstances, leaving loopholes for states to exploit during wartime.</p>
<p>Furthermore, the International Atomic Energy Agency (IAEA) safeguard protocols primarily focus on nonproliferation and the safety of nuclear materials, rather than averting military strikes on nuclear sites. Here the absence of clear, legally binding enforcement mechanisms in international law means that states can act with impunity while targeting nuclear sites in conflict zones. Hence, the Chernobyl drone attack demonstrates the urgency for a comprehensive and enforceable global agreement.</p>
<p>The new international nuclear non-attack agreement should essentially address the weaknesses in existing laws. The P5 (China, France, Russia, the UK, and the US) and the IAEA must spearhead a legally binding comprehensive treaty prohibiting any form of attack on nuclear infrastructure. This new agreement should explicitly include these several nuclear restraints. Starting from the military restrictions that should prohibit all military operations in the vicinity of designated nuclear sites. This includes ground forces, aerial strikes, reconnaissance missions, and drone activities near nuclear installations.</p>
<p>Further states must ensure annual transparency measures to prevent miscalculations. Each party must be required to exchange lists of their nuclear facilities annually, similar to the India-Pakistan model.</p>
<p>Most importantly, there must be severe consequences if any state violates the agreement by conducting a strike, covert operation, or cyberattack on nuclear facilities. Such a state must face severe economic sanctions, diplomatic consequences, and potential designation as a rogue state. Finally, there must be a prohibition on cyber and non-kinetic attacks.</p>
<p>The UN Security Council and leading nuclear powers, the P5 states, should take the responsibility of drafting and enforcing the agreement. These nations must set aside geopolitical rivalries and recognize that the threat of nuclear facility attacks endanger global stability. Additionally, the IAEA must play a more proactive role in integrating nuclear facility protection into global conflict prevention strategies.</p>
<p>The Chernobyl drone strike and the volatile situation in Zaporizhzhia is a wake-up call, a warning that nuclear security cannot be taken for granted in modern warfare. As conflicts become increasingly complex, nuclear sites will remain vulnerable unless strong, enforceable international agreements are put in place. The world cannot afford to wait for another disaster before taking decisive action.</p>
<p><em>Sana Ahmed is an </em><em>MS scholar at the Center for International Peace and Stability (CIPS), NUST, and a researcher at the Islamabad-based independent think tank Strategic Vision Institute (SVI).</em></p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2025/04/Pakistans-Nuclear-Non-Attack-Agreement_-a-Lesson-for-all.pdf"><img decoding="async" class="alignnone wp-image-29852" src="http://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png" alt="" width="310" height="86" srcset="https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1.png 450w, https://globalsecurityreview.com/wp-content/uploads/2025/01/2025-Download-Button-1-300x83.png 300w" sizes="(max-width: 310px) 100vw, 310px" /></a></p>
<p><a href="https://globalsecurityreview.com/a-south-asian-blueprint-for-nuclear-risk-reduction/">A South Asian Blueprint for Nuclear Risk Reduction</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://globalsecurityreview.com/a-south-asian-blueprint-for-nuclear-risk-reduction/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>Russia and the Growing Danger of Satellite Cyberattacks</title>
		<link>https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/</link>
		
		<dc:creator><![CDATA[Alexis Schlotterback]]></dc:creator>
		<pubDate>Sun, 19 Nov 2023 12:17:01 +0000</pubDate>
				<category><![CDATA[Archive]]></category>
		<category><![CDATA[Emerging Threats]]></category>
		<category><![CDATA[Space Deterrence & Conflict]]></category>
		<category><![CDATA[cyber-attacks]]></category>
		<category><![CDATA[encryption]]></category>
		<category><![CDATA[Russia]]></category>
		<category><![CDATA[satellite attack]]></category>
		<category><![CDATA[spacecraft]]></category>
		<guid isPermaLink="false">https://globalsecurityreview.com/?p=26327</guid>

					<description><![CDATA[<p>To prove itself a formidable competitor in space, Russia is turning to space warfare. This includes anti-satellite tactics using cyber. Even in terrestrial cyber conflicts, Russia possesses the ability to engage in advanced denial-of-service, ransomware, and other types of malware attacks. While no single agency oversees Russian cyberattacks, the amount of personnel involved in these [&#8230;]</p>
<p><a href="https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/">Russia and the Growing Danger of Satellite Cyberattacks</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>To prove itself a formidable competitor in space, Russia is turning to space warfare. This includes anti-satellite tactics using cyber. Even in terrestrial cyber conflicts, Russia <a href="https://www.defenseone.com/technology/2021/05/russias-latest-hack-shows-how-useful-criminal-groups-are-kremlin/174401/">possesses the ability</a> to engage in advanced denial-of-service, ransomware, and other types of malware attacks.</p>
<p>While no single agency oversees Russian cyberattacks, the amount of personnel involved in these operations continues to increase. There is a <a href="https://crsreports.congress.gov/product/pdf/IF/IF11718">heavy reliance</a> on criminal and civilian involvement to conduct offensive measures. Combining Russian interest in cyber and outer space has led to the “proliferation of handheld Global Positioning System (GPS) jammers, deployment of road-mobile jammers, and even development and testing of space-based jammers,” as reported on by <a href="https://spacenews.com/op-ed-russian-threats-a-reminder-of-the-need-to-protect-gps/">Sarah Mineiro</a>. She also warns that Russia can hack American ground control systems for the GPS constellation.</p>
<p><strong> </strong><strong>Types of Satellite Cyberattacks</strong></p>
<p>Though electronic means of interfering with satellite signals, such as jamming or spoofing, occur at a more frequent rate, attacks using cyber may prove to be more impactful and frequent in the next decade. Cyberattacks “<a href="https://www.csis.org/analysis/space-threat-assessment-2022">target the data itself and the systems that use, transmit, and control the flow of data</a>,” potentially causing irreparable harm for military commanders and civilians reliant on communications and navigation systems for decision-making.</p>
<p>Like other cyberattacks, those on satellites and their networks require <a href="https://dsiac.org/technical-inquiries/notable/technologies-and-strategies-to-protect-satellites-from-cyber-and-electronic-warfare/">four main components</a>: “access, vulnerability, a malicious payload, and a command-and-control system.” Multiple methods and modes of attack can take out a satellite system or render it inoperable without using kinetic force. <a href="https://www.hdi.global/infocenter/insights/specialty/technical-study/">Adversaries</a> can target the networks that satellites use, individual satellites, and the supply chains that produce satellite hardware and software. <a href="https://www.csis.org/analysis/space-threat-assessment-2022">The Center for Strategic and International Studies</a> describes three main types of cyberattacks: data intercept/monitoring, data corruption, and seizure of control.</p>
<p>First, there is data interception or monitoring, which is often seen as espionage. Adversaries may find spying to be a strategically sound decision to anticipate the next moves of the United States and leverage this knowledge in diplomatic or military channels. Secure World Foundation reports that many attempts of back door installations into American satellite networks were found in “<a href="https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf">Chinese electronics and Russian software packages</a>.”</p>
<p>Additionally, the communications from the ground to a satellite and a satellite to the ground often use “open (unencrypted) telecom network security protocols,” <a href="https://www.hdi.global/infocenter/insights/specialty/technical-study/">Luke Shadbolt</a> warns—making these systems vulnerable.</p>
<p>Second, data corruption, like a denial-of-service (DoS) attack, is accomplished through corrupting satellite data or even ransomware attempts to hold data hostage unless payment is received by the attackers. <a href="https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf">Secure World Foundation</a> describes how a group of university students developed a DoS technique that causes GPS receivers to crash when they try to decode malicious signals. Reports in 1999 surfaced that an unknown actor hacked the United Kingdom’s Skynet satellite, requiring payment to become operational again. Though the British Minister of Defense described the claim as “<a href="https://www.cnet.com/tech/mobile/satellite-hack-raises-security-questions/">impossible</a>”  at the time, more of these instances may occur as computer systems advance and space networks fail to evolve with greater security.</p>
<p>Third, while American policymakers may focus mainly on protecting networks, defending against the seizure of a satellite remains equally important. Such seizures could result in the deliberate destruction of the spacecraft, creating considerable debris that threatens <a href="https://www.chathamhouse.org/publications/the-world-today/2016-02/satellites-floating-targets">other systems on orbit</a>.</p>
<p>Equally likely, a hacker could transfer ownership of a system, so the original user is completely locked out and the capability of a satellite is given to the adversary. <a href="https://swfound.org/media/206118/swf_global_counterspace_april2018.pdf">In 1998</a>, a German-American satellite was hacked and destroyed. Attackers fried the optics by turning the satellite towards the sun. Unfortunately, examples of hacked satellites continue into the twenty-first century. <a href="https://www.defenseone.com/technology/2019/09/nsa-studying-satellite-hacking/160009/">Bill Malik</a> reports that “there are six known examples of hackers successfully interfering with or even commanding unauthorized maneuvers of NASA satellites before 2011.”</p>
<p><strong> </strong><strong>Looking Forward: Addressing Cyber Threats</strong></p>
<p>The US currently invests in multiple avenues to combat the possibility of satellite hacking, a challenge made more difficult by the same factors that affect other industries and targets. For general satellite protection, the Air Force Research Laboratory is beginning its fourth year of sponsoring a satellite hacking challenge to involve researchers across the country. The Hack-A-Sat competition opened for registration in February with this year’s format involving the use of an on-orbit satellite for the first time.</p>
<p>“Space cybersecurity is a global issue, which is why it is so important that Hack-A-Sat is open to the global security research community,” said <a href="https://www.afmc.af.mil/News/Article-Display/Article/3342967/hack-a-sat-competition-highlights-on-orbit-hacking/">Col. Kenny Decker</a>. Across the Atlantic, the European Space Agency sponsors similar competitions with <a href="https://www.cysec.com/hack-cysat-europes-first-satellite-hack/">HackCYSAT</a>.</p>
<p>Recently, the geospatial intelligence company, Orbital Insight, won a Department of Defense contract to identify intentional global navigation system disruptions. Orbital’s platform aims to use artificial intelligence to detect spoofing operations. According to the National Security Agency’s (NSA) <a href="https://www.defenseone.com/technology/2019/09/nsa-studying-satellite-hacking/160009/">Aaron Ferguson</a>, it is a goal of NSA is to develop, “a way to characterize telemetry data so that as we deploy new satellites, we can make adjustments.” Finally, <a href="https://www.hdi.global/infocenter/insights/specialty/technical-study/">HDI Global Specialty</a> argues that “the backbone of a cyber-resilient spacecraft should be a robust Intrusion Detection System (IDS).” Encryption and authentication must become priorities for the US government to implement in satellites and satellite systems.</p>
<p><strong>Conclusion</strong></p>
<p>Russia poses a large security threat to the United States even outside the future possibility of satellite hacking. Russian aggression in Ukraine demonstrated blatant disregard for Western ideals of a rules-based international order. It is no longer possible for policymakers to secure stability and prevent conflict by relying on post–Cold War paradigms.</p>
<p>Previous engagement through international communication channels is unlikely to reduce threats to critical infrastructure. As state-sponsored groups and proxy actors continue to target American assets, it is necessary to prepare for multiple modes of attack, especially in the space and cyber domains. A whole-of-government approach to defend against this new generation of conflict can increase reactivity in the event of an attack and aims to provide a deterrent against the targeting of satellites. As the twenty-first century evolves, implementing these solutions is one of the most important challenges the nation faces.</p>
<p><a href="http://globalsecurityreview.com/wp-content/uploads/2023/11/Russia-and-the-Growing-Danger-of-Satellite-Cyber-Attacks.pdf"><img decoding="async" class="alignnone wp-image-26183 size-full" src="http://globalsecurityreview.com/wp-content/uploads/2023/11/get-the-full-article.jpg" alt="" width="150" height="43" /></a></p>
<p><a href="https://globalsecurityreview.com/russia-and-the-growing-danger-of-satellite-cyberattacks/">Russia and the Growing Danger of Satellite Cyberattacks</a> was originally published on <a href="https://globalsecurityreview.com">Global Security Review</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
