National Security Risks in Air and Space Infrastructure

by Rimsha Malik

The emergence of globalisation and the digital change of society have created cyberspace, a domain where practically all human activities may be monitored. Cyberspace offers myriad potential, particularly in commercial, scientific, and cultural spheres, as it enables trade, hence fostering advancement and wealth accumulation. Nonetheless, owing to its capacity to connect with all users and systems, it also cultivates envy, promotes crime, espionage, and influence.

Cyberspace offers myriad potential, but also cultivates crime, espionage, and influence.

Our systems must have real, operational cyber defence based on a permanent cyber defence posture to counter the risks posed by cyberspace, which could limit military action in the air and space. Additionally, we must be able to plan and execute offensive and defensive military operations in cyberspace, whether it’s in defence of our digital systems or external theatres of operation. Despite appearing paradoxical in this hyper-tech world, our reaction to the difficulties we face will be driven by the inherent attributes of humans when put to use within the context of that new technology.

The United Nations estimates that digital services exports account for half of all service exports globally. Approximately 15.5% of global GDP is attributed to the digital economy, according to some research. Businesses, both public and private, stand to benefit from being among the first to market with data due to the interconnected nature of the internet. Like compound interest, digital economies benefit from information. Thirteen Governments have sought to exert control over cyberspace because information has become a tool for earning income. The location of the physical infrastructure needed to mine, store, and process digital information has been restricted by laws and regulations enacted by both democratic and communist governments.

Cybercriminals primarily target the aerospace and space sectors as their digital infrastructure is so complicated and interconnected. Particularly for nations like Pakistan seeking to improve their air and space capabilities in a sensitive region, real-life events in these domains offer insightful analysis on our level of cybersecurity readiness and the speed with which we should modify our approach.

Pakistan must invest in cyber incident management and digital resilience as it integrates AI, drones, and satellite systems.

In 2018, malicious code was surreptitiously introduced into British Airways’ web systems, causing a large data hack. Over 400,000 client records were compromised by poor web application security, inadequate monitoring systems, and the absence of multi-factor authentication (MFA). Significance of tight user-access controls and real-time threat identification in civil aviation networks was brought to light by this occurrence.

Worldwide supplier of aviation-related IT, affecting more airlines across the world. A compromise highlights the systemic dangers of inadequately screening and overseeing third-party vendors. Initially, the third party’s supply chain became compromised. Pakistan is increasingly integrating foreign technologies into its aviation and satellite programs, and this incident emphasises the critical need of end-to-end supply chain security for the government.

Air Lines was caused by malicious software issued by a cybersecurity provider in 2024, demonstrating the risks of operational dependence on such services. An example of how a systemic problem with vendor management can have far-reaching consequences is the cancellation of thousands of flights. techniques for handling them and rely on redundant systems, developing nations that rely on cyber defense professionals should exercise caution in these scenarios.

In the same vein, breaking into space is crucial. Even the Most technologically proficient space enterprises were not immune to the 2011 and 2016 incidents due to inadequate device management and a failure to separate their networks. The Jet Propulsion Laboratory (JPL) of NASA has been the victim of many invasions. Most recently, in 2019, someone gained access to the lab’s internal network via an unauthorised Raspberry Pi. The Most cutting-edge space businesses were not immune to the effects of inadequate device management and a failure to segment their networks in 2011 and 2016. The Deep Space Network and other critical platforms were vulnerable to intrusion because of the possibility of lateral movement through NASA networks.

The Jet Propulsion Laboratory was breached via an unauthorised Raspberry Pi, exposing NASA’s critical systems.

Relatively undetected instances of signal interference and hijacking expose control systems and encryption technology, adding to the ongoing issues with satellite communications. Deficiencies are of the utmost importance for the protection of space-based assets, including navigation, communication, and surveillance, which are crucial for both civilian and military purposes.

Incidents bring to light a collection of general cybersecurity issues that impact every sector, but which are particularly pertinent to developing nations attempting to compete in aviation and space events. A susceptible system is the result of weak encryption, unmonitored third-party interfaces, slow incident response, and weak endpoint controls. Inadequate access control, poorly separated networks, and mismanaged devices all raise the possibility of catastrophic breaches. The Delta problem is a prime example of the concealed hazards associated with unvalidated automation, as it fails to verify the existence of security upgrades before deployment.

Pakistan is strategically significant. As the government incorporates drones, satellite systems, and artificial intelligence into its national defence policy and relies more on C4ISR frameworks, it must simultaneously invest in cyber incident management and digital resilience. An anticipatory posture, incorporating pre-emptive screening of all external interfaces, real-time monitoring, blended with strong authentication, encrypted command channels, is necessary for national agencies, military forces, and civilian stakeholders.

Cyber combatants aren’t IT, communications, intelligence, social engineering, or “soldier” types. Because he combines elements from many sources, he will need training that is ever more specific, modular, and ongoing to teach him the skills he needs for his job, whether that’s in the civilian academic or industrial sectors. Having the right mindset for cyberspace is just as important as having the necessary skills.

Those who were born into the digital age, or “digital natives,” have the hacker mentality (the ethical kind, of course!) and the ability to learn on the fly, so they can “play” with their computers to tackle challenges head-on. It is true that certain people who learnt on their shine. The success of military cyberdefence relies on attracting and retaining skilled personnel.

Military cyberdefence success depends on attracting and retaining skilled digital-native personnel with an ethical hacker mindset.

Space and the air benefit from digitalization’s advantages but also face the risks associated with the cyberenvironment, just like any other place. Having a highly operational strategy in cyberspace and establishing a persistent cyber defence posture to protect our weapons and information systems would assist us in managing the primary risks and defeating the known threats.

There is a need to have the ability to seize the opportunities offered by cyberspace within a highly controlled environment to conduct offensive activities. These actions can be executed independently or in conjunction with others since they offer a significant tactical and strategic benefit, allowing for the reversal of forces and immobilisation of the enemy. Human beings are fundamental to any organisation because, in the face of rapid changes in cyberspace, their adaptability, responsiveness, diversity of thought, and commitment are what matter.

Disclaimer: The opinions expressed in this article are solely those of the author. They do not represent the views, beliefs, or policies of the Stratheia.

You may also like

Leave a Comment

Stay Connected

Follow and subscribe

Contact CISS AJK

Center for International Strategic Studies AJK, King Abdullah Campus Chatter kalas Muzaffarabad, Azad Jammu and Kashmir

05822922322

admin@cissajk.org.pk

career@cissajk.org.pk