Connect with us

Intelligence

Da’wah-Propagation as the Chief Islamic Strategy to Occupy the World

Published

on

The objectives of Da’wah are to come back to the religion by keeping all the Sharī’ah’s commandments; to be a good and devoted Muslim; to establish unity among all the Muslims; and to exalt the word of Allah on earth with the purpose to establish the good and legitimate society, the Ummah.

As about the infidels, the objectives is to promote the Islamic Sharī’ah among them and to encourage them to join the ranks of Islam as Allah’s chosen religion. This means, to guide all the peoples of the world to Islam, being the only legitimate religion deserves of worshiping. This requires the use of wisdom in persuading the infidels of the supremacy righteousness of Islam as compare to other religions. This is the Da’wah of the word, and assist it then comes the financial Da’wah, to support the converts so that Islam can prevail.

This is Jihād al-Da’wah, the spreading of Islam among the infidels by peaceful propagating means, such as argumentations and reasonable examples:

Call them in the way of Allah, with wisdom and words of good advice; and reason with them in the best way possible. Allah surely knows who strays from his path and He knows those who are guided in the right way (Sûrat al-Nahl, 16:125).

He who finds the right path does so for himself; and he who goes astray does so to his own loss…we never punish till we send a messenger [to preach] (Sûrat Banī Isrā’īl, 17:15).

The question is, were the Islamic territorial expansion historically, and the conversion to Islam religiously, an intended strategic plan, or a result of historical circumstances? The Muslim exegetes do believe that Allah commanded Muhammad to start making the Da’wah, to preach to Islam, and to use Jihad war to subdue the entire world under Islamic rule, from the first day he was entrusted with the mission of Islam. From this point of view, Islam is a missionary religion from its very inception, yet, we suggest that this was a gradual process, which developed hand by hand with the Islamic political success. In the battleground, all Islamic exegetes agree that when the Muslims meet infidels, they should not fight them until they have been asked to convert to Islam or to come under Islamic rule. Jihad war to eliminate the infidels comes only later on. This means that Jihad can be conducted only after the missionary activity of Da’wah has failed. Indeed, in Islam, al-Da’wah Qablal-Qitāl (invitation to Islam before death in war). It is based on the commandment: “We never punish till we have sent a messenger” (Sûrat Banī Isrā’īl, 17:15) and by the Ahādīth:

Muhammad said: When you meet your enemies among the infidels, offer them three choices, whichever of these they agree to, accept it from them: call them to Islam. If they accept, make peace with them; if they refuse, demand they pay the Jizyah. If they agree, accept it from them; if they still refuse… fight and slay them for the sake of Allah.

Umar sent the Muslims to the great countries to fight the pagans. Every place they came, the Muslim declared: “our Prophet has ordered us to fight you till you worship Allah Alone or give Jizyah; and our Prophet has informed us that whoever amongst us is killed, he is a Shahīd and shall go to Paradise to lead a luxurious life as he has never seen, and whoever amongst us remain alive, becomes your master.

Muslim theologians and the four Islamic schools of jurisprudence have pointed out that Islam was spread by proof and evidence, in the case of those who responded positively to the message, and by strength and sword, in the case of those who stubbornly resisted it, until they had no choice. It is best elaborated by Tirmidhi:

And there is no group of people on earth in which you cannot bring to me from them Muslims. And the best I like that you bring their wives and sons and kill their men.

Da’wah can work as an active, dynamic and missionary force, and the Muslims have to invite, to call, to reason with, and to exhort all those who are not Muslims with the objective of submitting to Allah’s will. At the same time Muslims must let the infidels know about their perfect religion and its mission to mankind. They have to deliver the message of Islam in its totality to other peoples who are not acquainted with it, and to aid them to embrace Islam. This is facilitated by contacting individuals and families with information; lecturing about the values of Islam as the perfect way of life.

From the Free World vantage point, the most important aspect of Da’wah is concerned with education. He, who wishes to stop fanaticism and radicalism in contemporary Islamic activity, must spend his energies to totally eradicate the deep-rooted connection between religion and education, the extreme incitement and hatred to the other. Muslim propagators work mainly in schools, colleges and universities, and it includes publishing material about Islam; using of the communication media to deliver the message of Islam; and de-legitimizing all other religions, cultures, political systems and way of life.

Domestically, the means to achieve these purposes within the Islamic community is by the establishment of Muslim religious and educational institutions, mainly the mosque (Masjid) and the school (Madrasah). It is carried out by eloquent scholars and Imāms, through sophisticated propaganda, and it presented as the cure to all modern ills: the destruction of family values, the high crime rates, alcoholism and the drug problem.

The Da’wah activity includes gentle preaching with reasonable argumentations and ideas to attract the infidels. The Islamic facts should be taught in such an elegant and beautiful language, as to bring in those with the capacity to accept Islam. The preachers must understand that the call to Islam should be clear, eloquent, self-evident and effective. They should present arguments in many ways and be replete with emotions and zeal, uniformity and unity of purpose. They should develop friendship and win the trust and confidence of those inclined towards Islam, be patient with them.

Da`wah should be pursued at all various societal and educational levels, and the communications media are considered imperative for the preaching. Special attention is given to campuses of colleges and universities where the Islamic propaganda is valued as effective and profitable. The second level of attention, after the campuses, is the Afro-Americans. The Muslim should carry the message of Islam to these groups in the ghettoes and in prisons, which are more susceptible to religious transformation. The emergence, in fact the flourishing, of mosques all-around of Western countries, together with the educational activity, the visiting of trained, sophisticated Imāms and scholars, alongside the distribution of informative literature and the proliferation of Islamic presses and publishers, all are intended to assist the spreading of the Da’wah in the West.

These twofold objectives of the Da’wah, to convert infidels to Islam and to strengthen the faith of the Muslims according to the Sharī’ah, not necessarily in this order, are illuminated by the above-mentioned activities. The interesting fact is that to the Muslim communities, the demand is for a more conservative and strict interpretation of Islam, urging them to reject all the elements of Western culture as Bid’ah (sin, unlawful). The projection is of the moral chaos and decadence of Western societies. Praying and visiting the mosques regularly, being educated in Islamic Madāris (schools), and dealing with any cultural and marital assimilation, become part of an ideological commitment to Islam as a way of life. This also means that the Muslims should organize themselves in communities, as close and segregated as possible.

Since they are considered missionaries and not immigrants, Muslim propagators are taught to master the modern languages and disciplines, and to have an absolute command of what they have to offer. By this, they can eliminate, amend, reinterpret and adapt the teaching of Islam according to the situation and the surroundings, producing and disseminating Islamic knowledge and providing daily requirements. They have a mission to the new generations of Muslims and the converted, how to follow in their footsteps and become a devoted Muslim. The Da’wah is connected to Jihad through the abandonment of personal wishes and sensual desires; promoting the unity of the Islamic community, and facilitating the absorption of Islamic values among the infidels.

From the early days of Islam, Da’wah was used extensively to denote the mission of Muhammad to the believers: to follow him and to believe in Allah’s Tawhīd. By that, the words Da’wah, Sunnah, Sharī’ah, Dīn are exchangeable and replaceable by one another. That is, Da’wah represents the real Islam in its full context, and a clear message to the world concerning Islamic intentions. One can find on many internet Islamic sites with huge passages and detailed instructions how to approach the infidels in deceit, concerning the character of Islam; proofs that Islam is the only true religion; the advantages of Islam to all mankind; how to convert to Islam; civil rights and human freedoms; Islam and terror.

From Islamic perspective, it is not only in order to convert people to Islam, but to liberate them from the dark slavery in which they live in by showing them the beauty of life in Islam. This is clearly echoed in the Muslim Brotherhood periodical, al-Da’wah, which indicates: the Da’wah is the genuine representative of the Islamic cultural and historical personality and identity, to recreate the Islamic true society, the Ummah. Da`wah is used as the chief diplomatic operation of the Muslims to deceive, disorient, and confuse the infidels about the real objectives of Islam. Moreover, it helps to redirect and twist reality. The aims of the Da’wah are very clear: to summon all the peoples of the world to accept Islam as the only true religion and to help its world spread.

Da’wah is the political use to divert public opinion from the horrors of Jihad, to whitewash Islamic terrorism: one hand butchers and demolishes, and the other condemns and misleads. So it turns that after a terrorist Jihad act is executed, Muslim organizations and NGOs rush immediately up to deny any connection to Islam and to reassure that Islam is a peaceful religion. Condemning and denying is only one aspect of Da’wah. There is the strategy aimed at subduing public opinion and by capitulating it to Islamic will. It is elaborated by Islamic practice in the US, with the aim to propagate in all fields and sources to exhibit Islam as a religion of peace and compassion.

While the operations of Jihad and Da’wah are carried out by different perpetrators and different means, they are all part and parcel of the objective to resurrect the Islamic caliphate as Allah’s kingdom on earth. This objective is compulsory on Muslims, and verifies the dictum of the Qur’an that the opponents of Islam will convert or become its supporters. Ibn Khaldun clearly articulates this division:

Because of the universalism of the Muslim mission, it becomes a religious duty to convert everybody to Islam or to bring them under Islamic rule, either by persuasion (Da’wah) or by force.

S. K. Malik elaborates this interaction between Jihad and Da’wah:

“…our main objective is the opponent’s heart or soul, and our main weapon of offence against this objective is the strength of our own souls… (These) are not only a means, but the end itself… It can be instilled only if the opponent’s faith and belief systems are destroyed.”

Muhammad as a model

For the Muslims, Muhammad is not merely a prophet, and not only a political and military leader, but an admired symbol; the representative of Allah on earth, the person with immunity to sin and error. He is the perfect embodiment of a human being on earth, and a model of the reality to come true by his deeds and sayings. It is the utmost goal of every believer to obey and to imitate him. Muhammad encouraged these trends by demanding that all the believers love him supremely and cherish him by his name. This is the reason why almost every Muslim also has “Muhammad” or “Ahmad,” or “Mahmud” or “Hamdan” as one of his names.

Narrated Anas: “The Prophet said: ‘none of you will have faith till he loves me more than his faith, his children and all mankind.’”

Narrated Abu Hurairah: “The Prophet said: ‘name yourself after me…and whoever sees me in a dream, he surely sees me, for Satan cannot impersonate me. Who intentionally ascribes something to me falsely he will surely take his place in hell fire.’”

If we understand the deep and total admiration to Muhammad, we can understand the reasons for today’s violent Muslim riots against even mere cartoons of Muhammad. It is demonstrated with the horrific slogans used by the Muslims marching all around the world: “Slay those who insult Islam”, “Butcher those who mock Islam”, “Behead those who insult Islam”, “Exterminate those who slander Islam”, “Massacre those who insult Islam”, “Europe is the cancer, Islam is the answer”, “Europe take lessons from 9/11”, “Europe you will pay. Your 9/11 is on its way”, “Freedom go to hell”, “Be prepared for the real holocaust,” and the most: “Islam will dominate the world.”

Contrary to the exegesis of most classical Islamic exegetes and the four schools of Islamic jurisprudence, the second part of the twentieth century brought a resurgence propagation and reinterpretation of the attitude to Jihad. Moulavi Ali, a Pakistani scholar and exegete, puts it very blatantly:

Almost all Muslim and European writers think that the religious war of aggression is one of the tenets of Islam, and prescribed by the Qur’an for the purpose of proselytizing. I do not find any such doctrine enjoined in the Qur’an or preached by Muhammad. His sole mission was to enlighten the Arabs to the true worship of one Allah. These have nothing to do with popular jihad and exterminating the idolaters. All the verses of the Qur’an are related only to defensive war without exception, and none of them has any reference to make warfare offensively. All fighting injunctions within the Qur’an are only in self-defense, none of them has any reference by which to make warfare offensively. There are several passages in the Qur’an which forbid taking offensive measures and enjoin only defensive war.

In a booklet “The Basics of Islam at a Glance” prepared by The Islamic Cultural Center in Tempe, Arizona, we read:

There is no historical proof that Islam was “spread by the sword”. Even non-Muslim scholars now admit that this is nothing more than a vicious myth which cannot be substantiated by historical fact. Others have claimed that Islam is a religion of love and peace and forgiveness.

An Egyptian exegete of Islam, Mahmoud Shaltut:

Muhammad revealed a book containing the principles of happiness. It commands to judge by reason, it propagates science and knowledge, it gives clear rules, it proclaims mercy, it urges to do good, it preaches peace, it gives firm principles concerning politics and society, it fights injustice and corruption. The Islamic community is commanded to do only what is good and is forbidden to do what is reprehensible and evil. The Islamic mission is clear and evident, easy and uncomplicated. This is the mission of Muhammad to humanity.

Here is the verse that Muslim Propagators falsely deceive the infidels, and most

Western leaders quote without any trace of understanding, as if Islam is tolerant, compassionate, and peace-loving: Sûrat al-Mā’idah, 5:32

“If anyone slew a person – unless it be for murder or for spreading mischief in the land -it would be as if he slew the whole people: and if any one saved a life it would be as if he saved the life of the whole.”

However, the full verse is:

“[Because of Cain killing Abel], That is why we decreed for the Children of Israel that whosoever kills a human being except for murder or for spreading corruption in the land it shall be killing all humanity. And whosoever saves a life saves the entire human. Our apostle brought clear proofs to them, but even after that most of them committed excesses in the land.”

One of the last misuse of this verse as a diplomacy of deceit was the White House Summit on Countering Violent Extremists, on February 18, 2015. Imam Abdisalam Adam of the Islamic Civil Society of America said that “Mosques serve as beacon of hope,” and they “provide moral compass for the Muslim community in navigating life… The peace, safety, and security of the US are of fundamental importance to the Muslim American community, and we oppose any form or shape of violent extremism that threatens peaceful coexistence… We believe in the right of all people to live in peace and security… Muslim imams have condemned and continue to denounce anyone who tries to use the religion of Islam to support terrorism.”

He has quoted verse 5:32, as to prove Islam is a religion of peace. President Obama used this passage in his Cairo Speech as do many apologists for Islam. What is actually presented by apologists is a distorted, out-of-context and misleading paraphrasing of the verse. The phrase “if any one saved a life it would be as if he saved the life of the whole” is taken from the Jewish Mishnah, Sanhedrin, 4:5. Hence, this commandment is not incumbent upon Muslims, but on Jews. And the reference to “our messengers” is the Jewish prophets coming to the Jews with “clear proofs” which the Jews ignored, and filled the land with excess. This verse is written in past tense and does not apply to Muslims but to “the Children of Israel,” who, according to Islam itself, received the scriptures earlier.

In fact, this passage mentioned in the Qur’an is not a prohibition on Muslims to kill anyone, but explicitly not to kill fellow Muslims. Ibn Kathir explains this verse: he who kills a believing soul intentionally, Allah makes the Fire of Hell his abode. He will become angry with him, and curse him, and has prepared a tremendous punishment for him, equal to if he had killed all people. He explains the meaning of “mischief:” Do not commit acts of disobedience on the earth. Their mischief is disobeying Allah, because whoever disobeys Allah on the earth, or commands that Allah be disobeyed, he has committed mischief on the earth. This commentary also appears in Tafsīr al-Jalālayn. Moreover, Muhammad himself said the life of a non-Muslim is not sacred:

“Narrated Anas bin Malik: Allah’s Apostle said, ‘I have been ordered to fight the people till they say: None has the right to be worshipped but Allah. And if they say so, pray our prayers, face our Qiblah and slaughter as we slaughter, then their blood and property will be sacred.'”

“Narrated Maimun ibn Siyah that he asked Anas bin Malik, ‘What makes the life and property of a person sacred?’ He replied, ‘Whoever says, none has the right to be worshipped but Allah… then he is a Muslim.'”

Furthermore, Muhammad also gave the Fatwah that a Muslim cannot be killed for killing a non-Muslim. However, most important, the problem emerges in its fullest expression in the following verse (5:33), which is tightly connected, reveals the issue clearly: The price to pay for the “mischief” (Fasād) done is death:

“The punishment for those who wage war against Allah and his prophet and perpetrate disorder in the land is to kill and hang them or have a hand on one side and a foot on the other cut off. Or banish them of the land. Such is their disgrace in the world, and in the hereafter their doom shall be dreadful, except for those who repent before you apprehend them. Allah is forgiving and merciful.”

Continue Reading
Comments

Intelligence

How security decisions go wrong?

Sajad Abedi

Published

on

Photo by Ryan Young on Unsplash

Information warfare is primarily a construct of a ‘war mindset’. However, the development of information operations from it has meant that the concepts have been transferred from military to civilian affairs. The contemporary involvement between the media, the military, and the media in the contemporary world of the ‘War on Terrorism’ has meant the distinction between war and peace is difficult to make. However, below the application of deception in the military context is described but it must be added that the dividing line is blurred.

The correct control of security often depends on decisions under uncertainty. Using quantified information about risk, one may hope to achieve more precise control by making better decisions.

Security is both a normative and descriptive problem. We would like to normatively how to make correct decisions about security, but also descriptively understand follow where security decisions may go wrong. According to Schneider, security risk is both a subjective feeling and an objective reality, and sometimes those two views are different so that we fail acting correctly. Assuming that people act on perceived rather than actual risks, we will sometimes do things we should avoid, and sometimes fail to act like we should. In security, people may both feel secure when they are not, and feel insecure when they are actually secure. With the recent attempts in security that aim to quantifying security properties, also known as security metrics, I am interested in how to achieve correct metrics that can help a decision-maker control security. But would successful quantification be the end of the story?

The aim of this note is to explore the potential difference between correct and actual security decisions when people are supposed to decide and act based on quantified information about risky options. If there is a gap between correct and actual decisions, how can we begin to model and characterize it? How large is it, and where can someone maybe exploit it? What can be done to fix and close it? As a specific example, this note considers the impact of using risk as security metric for decision-making in security. The motivation to use risk is two-fold. First, risk is a well-established concept that has been applied in numerous ways to understand information security and often assumed as a good metric. Second, I believe that it is currently the only well-developed reasonable candidate that aims to involve two necessary aspects when it comes to the control of operational security: asset value and threat uncertainty. Good information security is often seen as risk management, which will depend on methods to assess those risks correctly. However, this work examines potential threats and shortcomings concerning the usability of correctly quantified risk for security decisions.

I consider a system that a decision-maker needs to protect in an environment with uncertain threats. Furthermore, I also assume that the decision-maker wants to maximize some kind of security utility (the utility of security controls available) when making decisions regarding to different security controls. These different parts of the model vary greatly between different scenarios and little can be done to model detailed security decisions in general. Still, we think that this is an appropriate framework to understand the need of security metrics. One way, maybe often the standard way, to view security as a decision problem is that threats arise in the system and environment, and that the decision-maker needs to take care of those threats with available information, using some appropriate cost-benefit tradeoff. However, this common view overlooks threats with faults that are made by the decision-maker. I believe that many security failures should be seen in the light of limits (or potential faults) of the decision-maker when she, with best intentions, attempts to achieve security goals (maximizing security utility) by deciding between different security options.

I loosely think of correct decisions as maximization of utility, in a way to be specified later.

Information security is increasingly seen as not only fulfillment of Confidentiality, Integrity and Availability, but as protecting against a number of threats having by doing correct economic tradeoffs. A growing research into the economics of information security during the last decade aims to understand security problems in terms of economic factors and incentives among agents making decisions about security, typically assumed to aim at maximizing their utility. Such analysis is made by treating economic factors as equally important in explaining security problems as properties inherent in the systems that are to be protected. It is thus natural to view the control of security as a sequence of decisions that have to be made as new information appears about an uncertain threat environment. Seen in the light of this and that obtaining security information usually in it is cost, I think that any usage of security metrics must be related to allowing more rational decisions with respect to security. It is in this way I consider security metrics and decisions in the following.

The basic way to understand any decision-making situation is to consider which kind of information the decision-maker will have available to form the basis of judgments. For people, both the available information, but also potentially the way in which it is framed (presented), may affect how well decisions will be made to ensure goals. One of the common requirements on security metrics is that they should be able to guide decisions and actions to reach security goals. However, it is an open question how to make a security metric usable and ensuring such usage will be correct (with respect to achieving goals) comes with challenges. The idea to use quantified risk as a metric for decisions can be split up into two steps. First do objective risk analysis using both assessment of system vulnerabilities and available threats in order to measure security risk. Second, present these results in a usable way so that the decision-maker can make correct and rational decisions.

While both of these steps present considerable challenges to using good security metrics, I consider why decisions using quantified security risk as a metric may go wrong in the second step. Lacking information about security properties of a system clearly limits the security decisions, but I fear that introducing metrics do not necessarily improve them;this may be due to 1) that information is incorrect or imprecise, or 2) that usage will be incorrect. This work takes the second view and we argue that even with perfect risk assessment, it may not be obvious that security decisions will always improve. I am thus seeking properties in risky decision problems that actually predict the overall goal – maximizing utility – to be, or not to be, fulfilled. More specifically, we need to find properties in quantifications that may put decision-making at risk of going wrong.

The way to understand where security decisions go wrong is by using how people are predicted to act on perceived rather than actual risk. I thus need to use both normative and descriptive models of decision-making under risk. For normative decisions, I use the well-established economic principle of maximizing expected utility. But for the descriptive part, I note that decision faults on risky decisions not only happen in various situations, but have remarkably been shown to happen systematically describe by models from behavioral economics.

I have considered when quantified risk is being used by people making security decisions. An exploration of the parameter space in two simple problems showed that results from behavioral economics may have impact on the usability of quantitative risk methods. The results visualized do not lend themselves to easy and intuitive explanations, but I view my results as a first systematic step towards understanding security problems with quantitative information.

There have been many proposals to quantify risk for information security, mostly in order to allow better security decisions. But a blind belief in quantification itself seems unwise, even if it is made correctly. Behavioral economics shows systematic deviations of weighting when people act on explicit risk. This is likely to threaten security and its goals as security is increasingly seen as the management of economical trade-offs. I think that these findings can be used partially to predict or understand wrong security decisions depending on risk information. Furthermore, this motivates the study how strategic agents may manipulate, or attack, the perception of a risky decision.

Even though any descriptive model of human decision-making is approximate at best, I still believe this work gives a well-articulated argument regarding threats with using explicit risk as security metric. My approach may also be understood in terms of standard system specification and threat models: economic rationality in this case is the specification, and the threat depends on bias for risk information. I also studied a way of correcting the problem with reframing for two simple security decision scenarios, but only got partial predictive support for fixing problems this way. Furthermore, I have not found such numerical examinations in behavioral economics to date.

Further work on this topic needs to empirically confirm or reject these predictions and study to which degree they occur (even though previous work clearly makes the hypothesis clearly plausible at least to some degree) in a security context. Furthermore, I think that similar issues may also arise with several forms of quantified information for security decisions.

These questions may also be extended to consider several self-interested parties. in game-theoretical situations. Another topic is using different utility functions, and where it may be normative to be economically risk-aversive rather than risk-neutral. With respect to the problems outlined, rational decision-making is a natural way to understand and motivate the control of security and requirements on security metrics. But when selecting the format of information, a problem is also partially about usability. Usability faults often turn into security problems, which is also likely for quantified risk. In the end the challenge is to provide users with usable security information, and even more broadly investigate what kind of support is required for decisions. This is clearly a topic for further research since introducing quantified risk is not without problems. Using knowledge from economics and psychology seems necessary to understand the correct control of security.

Continue Reading

Intelligence

Cyberspace: A Manmade Sphere for Wars

Anahit Parzyan

Published

on

Internet can be considered as one of the greatest achievements of humanity of the last century, which connected the entire world. It created a new space for connections, information and communications, as well as cooperation. Thus, it created also a new platform for conflicts which involved not only individuals but also states. The invention of the twentieth century, the internet, has become another sphere for international relations, and a new space for defensive and offensive policies for regulating and balancing those affairs. The space called cyberspace has become a platform for interactions not only between individuals, but also between states. The interactions on their side were not only developed in a positive manner, but were also transformed into attacks, which pose a real threat to the security of states. Thus, the following questions arise:

Can cyberspace be considered a new sphere for war? Can conflicts and offensive and defensive operations in cyberspace be considered a real war?

The aim of this article is to specify offensive and defensive actions occurring in cyberspace and to explain the differences and similarities between them and the classical approach to war present in other spheres: land, water, air, and space. Despite the overgrowth of offensive interactions in cyberspace and defensive strategies for enriching the cyber arsenal of states, military specialists have concerns over the reality of cyberwars in general. Parallels are drawn to show the similarities and differences between definitions and perceptions of war, and whether concepts from the classical approach can be transferred to describe wars in the cyber sphere.  This research puts cyberwars in line with other wars, thus analyzing their peculiarities, whilst Cyberspace is seen as another sphere for war and international relations in addition to the existing spheres of land, water, air, and space

Internet’s Two Sides of the Coin: From Good to Threat

The Internet that we use today, is based on the Transmission Control Protocol or just Internet Protocol commenced in 1973. The network became operational in January 1983. For the first two decades of its existence, it was the preserve of a technological, academic, and research elite. From the early 1990s, it began to percolate into mainstream society and is widely regarded as a General-Purpose Technology (GPT) without which modern society could not function.

Only half a century ago it was difficult to imagine that human interactions would be developed in a manmade sphere, totally virtual and artificial. It must have been impossible to imagine that it would penetrate our lives so closely that it would cover everyday life, from communication and information sharing to purchasing products and regulating temperature at home.

Now internet has connected the entire world breaking the land borders which lined geographically differentiating the places people live. It substituted land borders with digital ones, making it possible to connect the entire world into one sphere.

With the start of the World Wide Web in 1993, the greatest accretion of communication came into existence. Since then, information being secret for a limited groups or organizations that were historically used for military purposes as an intellectual advantage, soon became available for masses.

Moreover, equal access to information for all, one of the ultimate achievements of humanity and one of the supreme advantages of the internet, has started to provide information not only for good will, having also provoked irregular warfare.

These chaotic interactions, which Garnett called “fourth generation warfare” (4GW), through networks would become a wave of social reactions and pressure that would provide an opportunity for an asymmetric warfare. The tendency is obviously dangerous since not only states possess these “digital” weapons but also non-state actors including terrorist networks. Basically, the Internet allows anyone to join digitally and to be a force or power that could have a significant impact on states’ policies.

The sphere were those actions take place with the usage or within the system of information and communication technologies is broadly named cyberspace and the actions that take place in this sphere get their terminology accordingly; cyber-attacks, cyberwar, etc… Though states have various definitions of a cyberspace and with the scope it covers, it is meant to be a non-physical Information and telecommunication technologies environment (ICT).The term cybersecurity has been emerging from the US since the mid-1990s, which later have become widely used in other countries and international organizations such as United Nations (UN), Organization for Security and Co-operation in Europe (OSCE), Organization for Economic Co-operation and Development(OECD), North-Atlantic Treaty Organization (NATO), the Council of Europe(CE), BRICS, Shanghai Cooperation Organization (SCO) and many others.

A cyber-attack is not an end in itself, but a powerful means to a wide variety of ends, from propaganda to espionage, from denial of services to the destruction of critical infrastructure.

From the prism of threat, they may cause, cyberattacks can be implemented using methods, such as malicious programs, that can penetrate systems of specific or not specified group of people or entities causing dysfunctions of computer operations, stealing personal information, phishing stealing passwords of the user as well as infecting computer systems to slow down specific processes, etc.  In current internet-run infrastructure a single penetration can be fatal for a society and become a threat for a state. A penetration into the command-control system of critical infrastructures, for example, can cut the supply of energy, change the chemical construction of water thus making it poisoned, etc. and the anonymity can stand as an advantage as cyberattacks are still not attributable through international humanitarian law. Moreover, in a cyber conflict, the terrestrial distance between adversaries can be irrelevant so cyber weapon can reach its target much beyond its borders.

The advance of technology made it possible to give room for clashes between States and non-states actors involved in operations in cyberspace. These clashes have become a real threat for international security. As compared with kinetic weapons that are relatively expensive to obtain, as well as possible to detect their origin, malicious programs are available to download or buy and even create if there is a good specialist of it: even a teenager can formulate it.

Therefore, it is becoming nearly impossible to patrol all the purchase and supply chain of the cyber arsenal. Malicious viruses or programs can penetrate various computer systems of public and private usage and cause dysfunctions, changing the primary command-control systems, slowing their base speed of operation and causing very costly problems for state security.

Per media reports, the group which rampaged through and besieged part of Mumbai in November 2008 made use of readily available cellular and satellite phones, as well as overhead imagery from Google Earth, to coordinate and plan their attack.

However, this invention is an issue of arguments among scientist from the prism of war definition.

Theoretical Dilemma of cyberwars and cyber reality

Despite different conflicts occurring in cyberspace between state and non- state actors, state-sponsored operations, and developments in international relations, military specialists argue about the exact definition of cyberspace, whether to evaluate it as real war or not, and as whether to count operations in cyberspace as a real war between parties involved.

Various conflicts in cyberspace including attacks of regular and irregular origin performing symmetric or asymmetric tactic, do not correspond with the classical approach of the war including only some or one or even missing any aspect of the war characterization. Despite of the current actions and bilateral, multilateral etc., agreements signed by states and international organizations, associations on the cybersecurity issues and despite of the threats the world overcomes or will overcome in cyberspace, theorists have certain disbelieves while defining or accepting cyberspace as a new sphere for wars as well as cyberwars as already occurring facts.

The issue is that there had not been a single verifiable case of cyber terrorism nor has there been any human casualty caused by cyber-attacks, giving grounds for disbelief.

Thomas Rid a specialist of war, is among those scientists and experts who see debates about cyber wars exaggerated, moreover, he expresses mistrusts related to cyberspace as a new space for war in a classical approach of war definition. He believes that “Cyber war has never happened in the past, it is not occurring on the present and it is highly unlikely that will disturb the future.”

The fact that computer and internet assisted attacked may penetrate the operating systems of targets stealing data or causing dysfunction of potentiality of operations Rid, however, in this respect differentiates between sabotage operations and direct physical harm.

Rid refers to Carl von Clausewitz, a nineteenth-century Prussian military theorist, who defines war according to three criteria, “First, all acts of war are violent or potentially violent. Second, an act of war is always instrumental: physical violence or the threat of force is a means to compel the enemy to accept the attacker’s will. Finally, to qualify as an act of war, an attack must have political goal or intention.”

Theoretical description of war through centuries might have changed its primary strategies and instruments, while his goal is always the same. Within this respect, it is important to observe this definition on a broad way: Of course, computer warm or virus cannot kill directly a person, like it could have a sword, but it can cut the energy supply of a hospital causing a chain of violence, or it can penetrate the command control of the Airplane system and change the direction of the plane or to cause and a catastrophe.

In contrary to classical approach of war, the reality of cyber war is supported by those who believe that cyber wars have already occurred, are occurring and will, possibly, continue to occur in future, thus cyber strategies must be implemented.

In July 2016, Allies reaffirmed NATO’s defensive mandate and recognized cyberspace as a domain of operations in which NATO must defend itself as effectively as it does in the air, on land and at sea.

Former U.S. President Obama speaking about cybersecurity mentioned:

“America’s economic prosperity, national security, and our individual liberties depend on our commitment to securing cyberspace and maintaining an open, interoperable, secure, and reliable Internet. Our critical infrastructure continues to be at risk from threats in cyberspace, and our economy is harmed by the theft of our intellectual property.  Although the threats are serious and they constantly evolve, I believe that if we address them effectively, we can ensure that the Internet remains an engine for economic growth and a platform for the free exchange of ideas”.

Thomas Reed, a former staffer on the US National Security Council argues that Cyber wars are even new. They occurred in past, in Cold War Era, and had devastating results. As an example, he mentions about the first ever cyber-attack- a massive pipeline explosion in the Soviet Union in June 1982, counting as the most violent cyber-attack ever. “According to Reed, a covert US operation used rigged software to engineer a massive explosion in the Urengoy-Surgut-Chelyabinsk pipeline, which connected Siberian natural gas fields to Europe. Reed claims that Central Intelligence Agency (CIA) managed to insert malicious code into the software that controlled the pipeline’s pumps and valves. The rigger valves supposedly resulted in an explosion that the US Air Force rated at three kilotons, equivalent to the force of a small nuclear device.”

Although, neither there is a factual evidence of accident being a cyber-attack confirmed or supported by the official U.S, nor there are any Soviet media reports from 1983 also confirming that Reed’s mentioned explosion took place. Though Soviet Union media regularly reported about accidents and pipeline explosions at the time. In case of cyber-attacks, it is not an easy task to investigate fully and in a short period of time. Forensic examination is needed which presupposes experts and conditions for objective examination. Under the condition of Cold war, the parties would hardly agree to do such an investigation which will reveal secrets about their technical capabilities and the real cause of the explosion. Incase Reed’s claims are true, then the massive violence it could have done would theoretically rank cyber weapons among extremely dangerous means and cyber wars would have been defined accordingly.

Another example that speaks about possible cyberattack that will “suit” to the description of war can be considered the 2008th cyberattacks on Georgian most prominent websites, including those of the country’s national bank and the Ministry of Foreign Affairs. In August 2008, in the period of the military conflict over South Ossetia, Georgian Government blamed the Kremlin, but Russia denied sponsoring the attackers, and later NATO investigation found no conclusive “proof” of who had carried them out. The fact that the “proof” is not found can illustrate two possible judgments: first, the attacker is technically equipped well enough so it is hard to distinguish him, second: the attack was not carried out by a potential suspect. However, the situation can be judged by the following viewpoint: you are innocent unless your guilt is proved. And because the anonymity is a priority in cyber wars, so it is highly efficient especially for states to use it in hybrid war strategies.

In cyberspace the sides, that are involved in the attacks or counterattacks can be distinguished only in two ways: first, by their own wish (which may occur rarely, or even impossible to happen especially when attacks are carried out by States rather than other subjects) or, according to the evidence. The last one is directly connected with the technical capabilities of an attacker as well as technical competences of an attacked side to be able to detect.

According to Oleg Demidov, a Cybersecurity expert at the Russian Centre for Policy studies (PIR Center), the overview of the NATO experts suspecting Russia in attacking Estonian infrastructure in 2007, Georgian government and private sector networks in 2008, and U.S. financial institutions and private companies in 2014 Spring, as not fundamental, because there was no practical evidence of the proof of the attacker, or lack of technical capabilities to be able to define the source of the attacker.

In his contribution “Global Internet Governance and International Security in The Field of ICT Use”, Demidov stresses high possibility and risk of an international conflict between nuclear-weapon states. As he mentioned;

 “In the event of lighting-fats cyber-attack that imitates the ‘signature’ of Russian perpetrators (for example, Cyrillic code fragments and other linguistic patters) and targets the infrastructure of NATO countries using servers in Russian territory, there is a risk of NATO military retaliation against Russia. In accordance with NATO doctrine, retaliatory measures may include the use of kinetic weapons and the involvement of all NATO members in a retaliatory strike”.

These two cyber incidents- the Georgian cyber-attacks and Estonian cyberattacks, are regarded by the U.S. and other Western nations as causes for great attention and much reflection.

Estonian cyber incidents were followed by the establishment of cyber strategies for national and system level for EU members and partners.

Particularly, in 2008, a year after the attacks, NATO set up the Cooperative Cyber Defense Centre of Excellence (CCD COE) in Tallinn. The military-defense usage of Information and Communication Technology (ICT) is one of the main purposes of the center. The center is technically equipped well enough to protect its members by providing technical support and human resource to protect internet infrastructure.

Another well-known and destructive cyber program that processed a worldwide discussion over the reality of cyber wars is the “Operation Olympic Games”, a large operation, that included the “development, testing, and use of malware against specific targets to collect information about the Iranian Nuclear program, as well as to sabotage it and slow it down as much as possible. It included such malware as Stuxnet, Duqu, Flame, and Guass (all of them targeting special operation for espionage and sabotage), active in between 2007-2013.The US presidential administration and Israeli secret services have been named as perpetrators.

Ex-head of the Foreign Relations Committee of Iran’s Supreme National Security Council Seyed Hossein Mousavian, in his “The Iranian Nuclear Crisis: memoir confirms Stuxnet as a malicious computer warm developed to target the computer system that control Iran’s huge enrichment plant at Natanz. Moreover, according to Mousavian, Ali Akbar Salehi, Iran’s Representative to the International Atomic Energy Organization (IAEA) at that time confirmed that Iran was experiencing espionage at its nuclear plants. According to the IAEA, there was a big decrease in the amount of the operating centrifuges caused by the Stuxnet with a vivid decline to more than 100 – from 4920 in May 2009 to 3772 in August 2010. Despite of the Fact that Ahmadinejad mentioned about the problems directly related to the computer software, installed by the spies to slow down centrifuge’s operation, nevertheless, Mousavian does not think that this could have cause a big problem and an obstacle for enriching the centrifuges.

In fact, Stuxnet did affect the nuclear enrichment system, and did make problems for Iran’s nuclear program. The computer worm was operating inside the system for quite a long time unnoticed, slowing down the operational capabilities of both experts and technical equipment. If we note the fact that it successfully slowed down the system’s operation, then we can conclude that operations reached a certain level much later then they could have without the worm Now that sanctions have hit Iran’s economy and forced it to make concessions, we can conclude that the situation would have been different if Stuxnet had not affected Iranian programs; Iran would have finished its program faster, before sanctions could devastate its economy. But since Iran discovered the problem much later and the whole process was slowly altered by the worm, we can see that Stuxnet led to a longer timeframe for enrichment, and subsequently longer terms for sanctions.

The action brought not only psychological damage, as would be named and labeled by Israel and U.S. specialist, but it brought also to economical, technical(human resources as well as technical capabilities) crises.

According to M. Sahakyan, an Armenian researcher.

“…sanctions were hard and maybe they were the main reason why Iran agreed to the Interim agreement. Though Iranian leaders like to mention that sanctions were not problem, but the Iranian economy had been effectively hit hard by these sanctions. Iranian economy mostly declined when EU member states imposed an oil embargo on Iran. China also reduced its average oil import levels from Iran in a disagreement on Iran’s nuclear program. The depreciation of Iranian Rial, reduction of oil exports and shortages of foreign currency created hard social-economic situation in Iran. So sanctions were hard and maybe they were the main reason why Iran agreed to the Interim agreement.”

It is evident that, not directly but indirectly cyber war may influence politics of a specific State. Today cyber-attacks can target political leadership, military systems, and average citizens anywhere in the world, during peacetime or war, with the added benefit of attacker anonymity.

Stuxnet influenced the Iranians’ centrifuges, causing them to overload an intelligence program. This is a new type of and reason for war. While the basic definition of war presupposes physical violence, Stuxnet presupposes a psychological intent. In addition to the technical harm it did, it also influenced the psychology of those who had encountered the undiscovered cyber worm. Regarding the first, undiscovered phase of the computer worm, imagine a specialist working on the program, who faced long-lasting technical problems, becoming filled with doubt towards their personal professional skills and also doubting the capability of Iran in general to develop its program. This is a new approach in the definition of war, as it dramatically shifts the choice of instruments that can cause harm to a State.

From Wars with Swords to Cyber Wars: State Security is Still a Priority

Nevertheless, the war in cyberspace is real, it has happened in the past, it is happening now and it will certainly happen in future.

The classical approach to war sees physical violence carried out by military operations. Cyberwar presupposes physical violence as well as bringing a new, psychological violence, which may cause no less harm.  Ideas and things important for state security have changed over the centuries, as have the instruments and measurements of security, but the problem of state security is still a priority. Maybe unexpected ships won’t attack from the sea, but cyber-attacks will come.

In past centuries, population size was an important issue for the state in maintaining its governance. It determined the size of the workforce and the size of the army, and the strength of armies was measured by the quantity of troops.

Centuries ago, a human, a good soldier was to aim to harm the opposing side. To conquer the army was to win the war. Afterwards, the period of weapons and technology began, and would enable opposing sides measure their technical and tactical capabilities to win. At that time, to mobilize technical capabilities was to conquer the army. Due to growing population and technological achievements, in addition to the number of troops, now the amount of military equipment is of much importance. A single-pilot jet may cause greater harm than 1000 troops on the same territory. Nowadays unmanned aircraft can jeopardize enemies’ strategic targets in specific cases even without any physical violence, because in a certain situation to harm a strategical unit even without causing physical violence from neither attaching side nor from the attacked still may have fatal result for the states being attacked.

In current stage, the military parades mostly demonstrating technical capability of a certain state, will alarm a possible harm while attack or attacking. Aside from the traditional military spheres like land, sea, and air (added later),an epoch of adding a new sphere, cyberspace, has begun, in which technical capabilities do no less harm than in a traditional war. One of the ultimate advantage of cyberwars is the anonymity of the attacker, which makes it a reasonable choice for state’s foreign policy.

In addition to the traditionally distinguished types of harm for a state security, cyberwar brings the conception of psychological trauma for the sates making it doubt its capabilities on a certain level. In the case of Stuxnet, the attack was “emotional” and technical.

The definition of the emotional damage through cyberwars was used to describe Russia’s so-called internet interference in 2016. “The New Yorker” expresses viewpoints of national-security officials who believed that those series of cyber hackings were directed to destabilize the conception of democracy in the States.

For many national-security officials, the e-mail hacks were part of a larger, and deeply troubling, picture: Putin’s desire to damage American confidence and to undermine the Western alliances—diplomatic, financial, and military—that have shaped the postwar world.

To technically dysfunction a system just causing a technical harm is a small incident, while targeting CI with technically destabilizing them already has grown into a political scandal.

In turn, cyberattack may cause harm on a specific target without involving other sides especially in case of state sponsored attacks, as it remains undiscovered for a while and the stereotypes and cliché of the traditional war definition will empower the attacker to have “excuses” for the attack. Cyberwars will become more dangerous, if not included and named as war and not struggled as traditional wars.

Cyber Arm race has started

Despite of the distrust and interpretation of cyberwars within the framework of classical approach of war, states are accelerating cyber arms race. This development has several political and strategic implications that pose the need to find specifically political answers. What is often forgotten or neglected is the increasing importance of understanding cyberspace as a political domain and cyber politics is needed more than ever before.

While experts are debating over the exact description and definition of cyberwar, States are enriching their State defensive arsenal with cyber equipment and technical staff for better governance in cyberspace, as well as regulations and doctrines that will define the strategy for the defensive and offensive operations for ICT threat.

In November 2011, the Department of Defense of the U.S. issued a report to Congress confirming, that it was ready to add cyberspace to sea, land, air, and space as the latest domain of warfare – the military would, if necessary, use force to protect the nation from cyberattacks. This statement shape the interactions in cyberspace on the same level with other spheres making them equally important and in case of need, changeable and cooperative.

By this, next to the traditional war spheres: ground, sea, air, space, a new battlefield-the cyberspace is differentiated.

With the technological developments, nearly every aspect of our lives is technically run, so it becomes very sensitive to any cyberattack, since any non-functioning in a technical field may cause human harm, economic harm, and be a serious problem for the entire National security.  In this regard, the former Secretary of Homeland Security of the U.S.Jeh Johnson at The White House Cybersecurity Framework Event on February 12, 2014, specifying the seriousness of the cyberattacks on electrical substations specifically, mentioned:

“What the public needs to understand is that today the disruption of a critical public service like an electrical substation need not occur with guns and knives. A cyberattack could cause similar, and in some cases far greater, damage by taking several facilities offline simultaneously, and potentially leaving millions of Americans in the dark”.

The focus was on the electrical substations but it may refer to other sectors too: telecommunication, hospitals, libraries and federal departments courts and prisons. Any entity, that is functioning with technology may be in a real attack risk.

The technological developments of the last century bring the automated industrial control systems as well as most Critical Infrastructure (CI), the list of which may vary from state to state but have similarities, under possible cyber-attack which may be fatal for national defense. The range of facilities on the list of CIsmay include but not limited to nuclear industry, electricity, telecommunication, water supply, transport system on ground, sea and air, governmental buildings and their communication facilities, the financial and banking system, healthcare and defensive facilities etc. In 2017, the USA Department of Homeland security announced about its decision to include also election infrastructures into the list of Critically Important infrastructure for the State.

The cyber- defensive policy of states becomes an urgent issue and States are engaged in implementing special cybersecurity projects on national level to defend the CI of their countries.

Many states, for instance the U.S., Russia, China, Germany, UK, France etc. are enriching their cyber arsenals and developing cyber security system for defensive operations for their countries. Not only states are engaged in national mechanisms but they also are involved in developing global cooperative platforms for better and clean cyber environment of the World. Specifically, it would be interesting to mention U.S. Russia, China cyber triangle and their input of cyberspace as a significant priority for a State development and Security. The countries are involved in various discussions and cooperation agreements to maintain cooperation and peace in cyberspace globally. Despite of ideological differences in cyberspace and the attitudes of maintaining the policy for it, however these three cyber powers found a common ground for mutual understanding and possible fundamental cooperation. United Nations (UN) Governmental Group of Experts is one of the examples of that which is currently the only platform that has united the U.S. Russia, and China with commonly acceptable norms and suggestions. Since the scope of interests in cyberspace includes all groupings of society including governmental and federal entities private and public sectors as well as common citizens on a national level, private supra-powers regulation beyond borders and being responsible for larger audiences, there is an urgent need to focus on cooperation and establishment of fundamental rights in cyberspace as well as mechanism to establish security in this sphere.

Conclusion

Can a cyber-attack pose a serious threat to national security?

With the clear majority of undergone, ongoing and possible cyberattacks and with the current defensive strategy of the states, the cyberwar is nothing than a real threat for states’ national security as well as private sector. It enflames not only regular warfare which can cause as much harm as it is assumed to have by traditional approach of the war, it may also provoke irregular warfare with the privilege of the equal information access and anonymity.  The technological invention of twentieth century may considered to be a disaster along with such scientific invention as atomic energy. It may give a good, but it may harm severely.

The difficulty of cyberwar falls also on the lack of common norms and definitions as well as specifically composed legislation equally acceptable for all states for peaceful and collaborative regulations of problematic issues on this field.

I do believe that cooperation on this issue is of great importance. Joint legislation, understanding and definition of conceptual ideas, common cooperative grounds will bring to a better and secure life, eliminating or declining the possibility of occurring private or non-state organizational subjects to be involved in irregular warfare destabilizing the peaceful cooperation of states and people on internet sphere for a good and productive will.  The classical approach of war definition should be able to include a new sphere of violence before a certain violence occurs rather than defining right after it occurs, as mostly happens in historical approach. Aside from the traditional military spheres like land, sea, and air (added later),an epoch of adding a new sphere, cyberspace, has begun, in which technical capabilities do no less harm than in a traditional war.

Cybersecurity is an urgent, necessary strategy, which will lead to a secure sphere for cooperation, free and secure access to and sharing of information, and, due to its technical capabilities, to a more comfortable and economically developed way of life.

While Cybersecurity is an issue for the whole world, strategies for the development of cybersecurity may vary from state to state, in some cases occurring a national level, while in others limited to certain federal entities.

I believe that Cyberspace is very much like the environment; it is a digital environment, and just as a virus that penetrates a certain country is spread worldwide if not stopped, so is a computer virus. Just as pollution in one part of the world pollutes air or water that we all share, a cyberattack may cause a global problem. Networking, sharing information, and a global security approach are musts for a safe and productive global cyber environment and maintenance of all roads for better digital development for the sake of humanity.

(*) This essay adapted from the article Cyberspace – A Manmade Sphere for Wars, (21-st Century, N.1, 2017, pp.42-58). Used by permission. All rights reserved.

Continue Reading

Intelligence

The Importance of National Media in the World and its Structural Role in Preserving the Country

Sajad Abedi

Published

on

The media, information, and their influential role in governments are at the center of attention of all governments, parties and political movements. In recent decades, the role of the media has been enhanced in the field of information on the impact of governments and macro policies of the countries. In the colorful or velvet revolutions in the last decade, this role has become quite distinct and has led scholars to examine the dimensions of media power in recent political developments. Following the end of the Cold War and the formation of a unipolar world, the United States has changed its strategy from the Cold War to a cultural battle and a soft war to dominate the liberal values of its strategy, and by implementing colored or velvet revolutions, in some countries, such as Ukraine, Georgia and Lebanon, their foothold In these countries.

The radical neoconservatives of the United States have seen one of their options in dealing with Iran on the challenging issues of changing the Iranian government, the method of change through “soft power.” Here, we are going to explore the various dimensions of the American effort to realize the soft overthrow in the Islamic Republic of Iran and examine several methods to combat the threats posed by it. Whenever power sought to overthrow a state, if it did not have the military power or saw its cost heavy, it would try to achieve its goal in various ways other than a military attack, sometimes with security methods and sometimes on the method Cultural and propaganda use today due to the remarkable progress of human beings in different sciences and the emergence of a new generation of media, as well as the development of free societies and democracy, as well as the increasing power of governments to confront the military and security threats of the approach of arrogant governments to The overthrow of softness was more than the former Is. The use of new methods in this regard also seems to work as if soft overthrow is a new way of destroying the governments of the opposing powers of arrogance.

The soft war policy, in the United States, is becoming more and more popular every day. In their latest studies and studies, politicians and the American men have also considered the serious approach to soft war in the face of the Islamic Republic of Iran, the “Current Risk Committee”, which makes its members the most prominent political and military elements of the United States. , In its latest decision in October 2005, considering the strength of the Islamic Republic and the failure of dozens of strategies against the Iranian nation over the past years, considered the war as a useless war and called for greater attention from the US government to the software project “Subversion from within “Marc Palmarraz was a leading member of the committee and the influential figure of the foreign policy device Maryka recently opposed the idea of a military offensive against the Islamic Republic of Iran in a conversation with Deborah Solomood, an American military correspondent in the New York Times, saying: “Iran, in terms of territorial scope, population size, quality of manpower, military facilities, The rich natural resources and the privileged geographic location in the Middle East and the Hartland region have become a substitute for the international system that can no longer be overthrown by military invasion. ”

In the report of the Risk Committee, commissioned by Mark Palmer, the overthrow of the Islamic Republic of Iran was emphasized and advocated by concentrating its activities on the three pillars of inhibition, media outreach and the organization of civil disobedience. Political experts, inspired by the experiences of the editors of this report and the influence of the committee’s decisions on US government policies, believe that this report will be inspired by the general spirit of the future, even if it does not become an executive act. Delta’s plan was one of these projects that US politicians and statesmen used in their latest studies and studies to counteract Iran.

In order to achieve the above objectives, the strategy of pressure from outside and change from within is used. It should be noted that the slogan of creating democracy and civil change in the countries is based on the will and interests of the invading country, and therefore it is completely relative and the awareness and sense of the need of the people of the country is aimed at, leading to political demands or ultimately to change Not political.

Soft substitution is actually social in nature, in which social factors challenge the overthrow of the rule of the ruling political system. In this social-political process, society is the arena of struggle for power and competition between non-governmental organizations and institutions and the state for business Consolidation of social power.

In a soft subversion in a long and continuous process, part of the loyalty of the people of society and the acceptance of the system are transferred to other authority centers, such as non-governmental organizations or ethnic institutions.

In other words, the lack of proper and effective functioning of government functions such as social security, addressing specific patients, urban affairs, inflation, social security, population structure changes, emergence of new groups with new demands, political constraints and facilitators are considered.

Basically, the foreign actor can also manage soft overthrowing where the social contexts necessary for its formation and expansion in the target community are provided. The Subjects are such as political, social and economic disadvantages, with little hope for reform. Establishing and forming non-governmental organizations and organizations that are prone to control and organize a part of society and use various media and psychological tools to influence the minds of people. The attachment and membership of an important part of society to the goals of the above organizations give them the power of recall.

Therefore, the roots of soft overthrow should be sought in general discontent as a result of the ineffectiveness of the political system. This situation has led to the strengthening of non-governmental groups for social recall, in which society is divided into several categories, and the individual provides their financial, mental and social needs from different institutions of government. Whatever the extent of meeting these needs from non-governmental organizations is more than government institutions, the level of loyalty of the people and elites to the ruling system will be reduced. So, from the standpoint of opposition, until the state has a dominant call in society, the methods of subversion will not be usable.

It should be remembered that soft swooping is a social process, so it will at least be reached in the medium term. Therefore, governments with strong and powerful enemies are always subject to enemy action to create the ground for implementing plans to overthrow new methods. In this framework, the enemies are trying to make the election campaign and the maximum participation of the people in the elections very vague, and in contrast to the dual creation of the “People’s System” and the design of a kind of loss-of-game game, any election result would undermine national security. Give Within the framework of such destructive efforts, some prominent candidates are attempting to portray the system as representatives of the system and some as representatives of the people or opponents of the system. This dual destruction with special propaganda and negative subjectivity creates the initial ground for creating psychological and political tensions in society. Accordingly, controlling any deliberate or unconscious actions directed toward this type of duplication and dealing with them can prevent the election from becoming a challenge to national security.

Continue Reading

Latest

Newsletter

Trending

Copyright © 2018 Modern Diplomacy