Connect with us

Intelligence

The Social Network, the alter-globalization movement and counter-forums

Avatar photo

Published

on

An attentive analysis of the ways in which the alter-globalization galaxy enacts its antagonism to the system, especially in regard to national and transnational political, economic and military institutions,

reveals both how the alter-globalization movement implements its antagonistic demands above all through social networks and counter-forums and the extent to which it is capable of mobilizing non-homogeneous groups, often by exerting substantial influence on the choices made by political decision-makers on one hand, and capable of implementing vast and widespread disinformation campaigns on the other. Like all technological instruments, also social networks can cut both ways: like two-faced Janus, they can incite terrorist violence or contribute to the consolidation of antagonist ideologies by catalyzing discontent or just as equally consolidate consensus around national and super-national political and/or military institutions. Attempts at censure in today’s democracy would be destined to fail because the web offers such a wide variety of technological solutions that any type of shutdown imposed could be bypassed. Even if the manipulation of information is not only possible but desirable in a context of information warfare between institutions and movements or between national institutions themselves, in fact, the web offers the possibly to provide counter-information also through film footage and photos taken by cell phones and transmitted via Youtube. As regards the role played by information in the contexts of both sociology and social psychology, the domination of a particular piece of information and the ability to spread it can have such profound effect on civil society that Gen. Sullivan, ex-Chief of General Staff of the US Army, once claimed that information is the equivalent of a victory on the battlefield. On the other hand, as aptly noted by Luther Blisset, theoretician of anti-establishment media warfare, it is necessary to act within the mass media communication system and fight the power structure using its own arms. In light of these considerations, the definition of war as “…a struggle of opposing wills between organizations that use any violent or coercive means (armed conflict, cold war, evident and occult coercion) available to impose their own best interests or point of view” provided by Gen. Fabio Mini appears more appropriate than ever. The relevance of this definition depends on the absence of the adjective “military” and the presence of the expression “any struggle” between organizations. This means that the previous limit on the participants in traditional war – opposing nations – disappears and gives way to an opposition between nations and economic or social groups and/or political and other types of organization. In this light, also the definition provided of netwar by Arquilla and Ronfeldt is extremely interesting because it amounts to the aggregate of activities conducted for the purpose of disturbing, damaging or modifying what a determined population knows or thinks it knows about itself and its surroundings. In other words, what the antagonists have promoted and continue to promote through the social network may be considered warfare strategy in the Minian sense of the term, and more exactly, in information warfare, and therefore in propaganda and deception or altered, deceitful and/or misleading information. As correctly observed by Capt. Alfonso Montagnese, the Social Media are instruments of mass communication and relation whose utilization takes place in cyberspace using hardware (Internet, cell phones, pc, etc.) and software (Facebook, Twitter, MySpace, LinkedIn, YouTube, etc.). Compared to traditional media channels, social media users can interact and overcome geographic limits in real-time. Yet when social networks are used in an asymmetric context of conflict (with a governmental institution or a national or multinational industry one on side with a group of alter-globalization activists on the other, for example), the opposition takes form alternately in psychological warfare (through disinformation and propaganda) and antagonistic mobilization with the expenditure of reduced resources. The political and cultural subjects that have enacted asymmetric-type oppositions can largely be grouped as national subversive groups (Marxist-Leninist groups, anarchical-insurrectionist groups); antagonist movements/extra-parliamentary powers (anti-global, environmental protection, anti-nuclear power groups, xenophobe groups, organized sports hooligans, right-wing extremist groups); non-profit associations/foundations; religious groups, and trade union/political party groups. Appropriately, Capt. Montagnese mentions the comments of Gen. Francesco Lombardi, Ce.Mi.S.S. Military Sociology Department vice-Director and Head, who emphasizes how the protest movements of the future will still manifest themselves through physical conflict, the illegal occupation of public space, demonstrations, and rioting, and as in the past will still have antagonistic ends, but will differ from those of the past in the interaction between the demonstrators themselves, between the demonstrators and the power against them, and between the demonstrators and the world at large.
Strategic warning must certainly be included among the counter-measures to be enacted, and horizon scanning is extremely important because as noted by Montagnese it permits threat trends to be monitored in the mid- and long-term, the orientation of opponent force to be identified, and their evolution to be predicted. Specifically, national security institutes must draft a Social Media Strategy capable of alternating offensive activity through influence, deception, and propaganda with defensive activities like counter-propaganda, counter-interference, and the early warning conducted through the direct or indirect use of Social Media.

The Social Network and alter-globalization

In the context of the antagonism of the alter-globalization movements, the independent networks developed by civil society in the wake of Seattle (such as Indymedia, for example) have proven to be fundamentally important in globalizing the antagonism and making it more widespread and efficacious; these activists have made use of independent networks to convey clearly defined ideological content: ecologist, pacifist, anti-militarist, anti-capitalistic. In such regard, the promoters of these networks, whether consciously or unconsciously, have adopted as reference at the levels of both topic and mobilization technique the protest movements of the ‘60s, ‘70s and ‘80s in their implementation of both virtual and operative activism. The structure of these networks is naturally horizontal and this affords a greater degree of freedom in the flow of information while precluding every form of hierarchy similar to those of traditional political organizations. At the base of these networks lies the conviction of the existence of a universal right to knowledge and networking and that this right is an essential component in the exercise of the rights of citizenship in the context of participative democracy. It is enough to consider in this regard the networks of hacker movements that trace their roots to the social movements of ‘70s, the cyberpunk/artistic avant-garde, internationalism, and the self-managed social centers in general. Specifically, during an encounter in Naples in March 2001 against the Global forum, the Italian hacker movement implemented a technique known as netstrike designed to jam institutional internet sites. Again in 2001, but this time in Genoa, the independent networks were able to create a media center capable of efficacious counter-information for the purpose of de-legitimizing the work of the law enforcement system. In Italy, the Isola nella rete – the most significant entity inside the independent network is undoubtedly important. Founded as an association in the mid-‘90s with the purpose of placing communication and mobilization tools at the disposal of social movements, through an extensive network of links, the association has constructed an authentic virtual community of the antagonists. It is enough to consider that a dossier entitled “Under Accusation” that documents the violations of individual rights during the Genoa demonstration has been created in the Isole nella rete and that the new media sociologists use the expression controversial political communication to define this new communication vehicle, intending the combination of techniques or repertory of communication actions adopted to de-legitimize national, transnational and/or determined representatives of the same as an expansion of democracy. This new approach in communication has opened representative democracy to alternating direct and indirect criticism of increasingly wider scope. Another expression employed by mass-media sociologists is “counter-democracy”, which is used to emphasize the increasingly important role played by alter-globalization movements in monitoring and criticizing the institutions that hold political and economy power in blogs, forums, on-line campaigns, and mailing lists as tools that coordinate the activities of different groups. In this sense, Facebook becomes a fundamentally important instrument of counter-information because when it is used in an antagonist context, it can transform the consumption of news articles into a participative and antagonist process at both virtual and physical level. In this regard, the experience of the Popolo viola bears much significance. Using Facebook, it has proven capable of organizing at national level a campaign such as the one entitled No Berlusconi day with great visibility. Another example of political aggregation with antagonist ends in mind is provided by Beppe Grillo’s blog, which has now become a new place of meeting, encounter, and political interaction among citizens. This blog succeeds in attracting fairly constantly a considerable participation of around 200,000 visits a day and over 1000 comments on every single posted entry; beyond that, the blog has led to the birth of around 400 local groups in over 200 cities under the name Amici di Beppe Grillo (Friends of Beppe Grillo). The blog’s operative efficacy is demonstrated by the fact that between 2007 and 2008 it proved capable of collecting from a minimum of 350,000 to a maximum of 1,350,000 signatures for a law proposal made at popular demand. At international level, another successful example of popular mobilization is certainly the American movement known as MoveOn.org, which even if it cannot be considered unequivocally a part of the alter-globalization movement has, in any case, dealt with similar questions and adopts similar operating methods. In the context of new media sociology, this organization is known as a meta organization, meaning that it is radically decentralized and possesses a number of specific characteristics, including that of consisting of an organizational core of limited dimensions that serves as both facilitator and producer of organizational processes. First of all, it has smaller size than traditional organizations because its nucleus oscillates between 20-30 people; secondly this organization does not have a physical office ands therefore has ho administration costs. In other words, in legal terms, MoveOn.org resembles a cross-linked non-profit organization. This organization has a mailing list of 5 million members and is currently the most authoritative pressure group on the US political scene at network level. Its significance is demonstrated by its role in a promotional campaign for Obama that raised 88 million dollars in 2008 and provided the future president with 933,000 volunteers. Back on the Italian scene, much of the alter-globalization movement has used freeware software to create its own websites on the basis of precise assumptions: a common struggle against multinationals and their influence, and the establishment of an alternative society to the current one based on the freedom of information and spontaneous self-organization. Above and beyond the purely idealistic motivation, it is evident that the use of freeware gives anti-global movements an undeniable economic advantage. It is no coincidence that during the 2005 World Social Forum held in Porto Alegre, Brazilian President Lula committed his nation to both freeware and open-source software. One of the most important characteristics of the anti-global organizations that use the telematic network is certainly the promotion of alternative information that lets the public participate firsthand in the management of certain aspects of communication, provides additional documentation to sympathizers of determined movements like the peace movement or the antagonistic left. Another extremely important aspect is the need to integrate information with widespread work in the territory by creating, for example, local branches that collect all the most pertinent information on the issues under consideration. Another alternative communication tool is certainly TeleStreet, or in other words, “street television” that is closely linked to the local dimension. In purely technical terms, street television is born in a neighborhood or some other small center of inhabitation. Historically speaking, street tv was born with the 1977 movement and more precisely in the free radio movement. One particularly important event regarding street tv occurred in 2003, the year when numerous Italian tv activists promoted the widespread flying of rainbow-colored peace flags in their towns. The public addressed by Italian anti-global movements – prevalently the people who use Internet through websites and mailing lists – is a global and therefore heterogeneous one. The websites Indymedia, ControllArmi and Peacelink are undoubtedly particularly significant in the context of alter-globalization movements. ControllArmi, for example, is nothing but a website that runs by the Rete Italiana per il Disarmo (Italian Disarmament Network) set up in March 2004. This network has proven capable of mobilizing its resources to report the amendments made to Law No. 185 regulating arms exports; in particular, ControllArmi was born precisely to defend Law No. 185 and obtained an impressive and significant success after applying pressure to certain influential representatives of parliamentary institutions. The establishment of ControllArmi arose from the need to exert short-term control over arms sales on one hand and general disarmament in the long-term on the other. The presence of a number of important alter-global movements such as Rete Lilluput, Attac, Arci, Acli, Fiom-Cgil, Fiom-Cisl, Pax Christi, Un ponte per…, and Emergency in the organization is significant. The study of arms and the general disarmament desired in the future can be seen in the organization’s detailed analysis of every aspect of the world of arms, starting from small arms and covering international arms brokers, nuclear arms, depleted uranium, and the economic and political problems linked to the legal and otherwise exportation of arms. Also extremely interesting are the organization’s bonds with Iansa – the global small arms control movement founded in England – and with Safer World set up to monitor and study armaments; equally significant is the pressure exerted on the European Parliament – together with Safer World – in the defense of Law No. 185.

Counter-forums and the alter-globalization movement

According to the alter-globalization movements, only diplomats or government representatives who were never publicly elected usually take part in the world’s decision-making summits, but this, on the contrary, reflects a balance of power between nations. In other words, the alter-globalization movements lay claim to a logic of direct democracy that would enable civil society movements to become key players on the international scene. The counter-forums are characterized as unofficial meetings that deal with the same problems as traditional forums but with a deeply critical stance in regard to the choices made by governments and even those of neo-liberal companies on one hand, and on the other, the counter-forums utilize operative methods far different from those used by traditional ones (including counter-information, civil disobedience, etc.). From the historical point of view, counter-forums first came into existence in the ‘60s with the Tribunal against war crimes in Vietnam created in 1967 and then in the Permanent Peoples’ Tribunal founded in Algiers in 1976 and instituted in definitive form in 1979. Naturally enough the composition of these tribunals – far from being impartial and unbiased – reflects world views with a strong ideological slant: in favor of the under-developed world, anti-capitalist and anti-militarist. Another historical root of the counter-forums that Mario Pianta identifies lies in the Peace movements that developed during the ‘80s. Experts on alter-global movements explicitly acknowledge the extent to which experiences in the leftist and ecologist movements of the ‘70s and ‘80s were fundamentally important because a large part of the activists on these fronts continued their activities in alter-globalization movements. As regards the risk posed to national and transnational military institutes, it must be remembered that some of these counter-forums have questioned the need for the existence of NATO and demanded the democratization of the UN, intending by such term the widespread presence of alter-globalization organizations in UN decision-making processes. From the historical point of view, the first counter-forum undoubtedly took place in Seattle (1999) and was organized alternately by structured and unstructured groups and an articulated organization that succeeded in bringing 60,000 people to the city. The media impact created by the counter-forum was such to raise hopes of a grass-roots globalization to be achieved precisely through such counter-forums. The Davos counter-forum of 2000, the counter-forum held in April in Washington, the one held in May, 2000 in New York called the Millennium Forum with 1200 participants must also be remembered in this sense. The apogee of such counter-forums was certainly the one held in Porto Alegre in January 2000, the fruit of an alliance between the Brazilian Workers’ Party, the trade unions, and the Sem Terra and Attac movements. This event with worldwide media coverage featured the participation of 20,000 activists from every continent and was the launching pad for the counter-forum to the G8 meeting in Genoa held in July, 2001. Naturally enough, one of the reasons for which these counter-forums developed is to pose a challenge to the nation-state system and the neo-Liberalist economy on the political and economic levels. The strategy pursued by the exponents of these counter-forums was – to use Mario Pianta’s expression – alternately reformist (this approach centers its attention on procedural change and specific political choices and is a strategy developed by the NGOs for the purpose of implementing integration with inter-governmental organizations wherever possible), radical alternative (an approach that places existing concentrations of power in serious doubt and indicates new models of collective actions such as new democratic structures as alternatives to neo-Liberalist structures), and lastly the strategy of resistance, which has been particularly developed in the undeveloped world for the purpose of implementing coordinated antagonistic action at national and international level. The strategy pursued so far by institutions – above and beyond the legitimate repression of manifestations of violence – has consisted in enacting surface level modifications in their political plans on one hand and in integration through co-opting whenever possible, on the other. The UN has chosen to accept some of the demands made by civil society and to acknowledge the validity of certain anti-Liberalist choices made by numerous NGOs, permitting these latter in this way to increase the gap between transnational institutions and intensify – for example – the contrast between decisions made by NATO and those made by the UN. At any rate, it is clear that the long-term strategy pursued by the counter-forums is to implement real and therefore structural change in the system. In this sense, it is well worth analyzing certain aspects of the document issued by the Assembly of Young People’s UN in Perugia, Italy, in September 1995. Firstly, it is clear that the alter-global movement wishes to convey all transnational institutions into the United Nations system, and that member nations must abandon thinking in terms of national security as the first step towards real disarmament (and the conversion of national military institutions in an international police force under the authority or command of the United Nations). It also emerges that nations must create an unarmed, non-violent force in replacement of today’s military, and lastly, that education in peace and human rights must be initiated in public schools and training institutes. The considerations made in the Tavola della pace (The Peace Table) in the Documents of the Assembly of the People’s UN drafted in Perugia between 1995 and 1999 are particularly interesting. First of all, the authors of this document express the need to bring institutions like the World Monetary Fund and the World Bank under the control of the United Nations; they also expound the concept that member nations must abandon thinking in terms of national security once and for all; thirdly – and consequently – the pacifism theorized in the document implies disarmament, the cessation of the international arms trade, the conversion of national military institutions in an international police force under the authority or command of the United Nations, and above all the creation of an unarmed, non-violent force in gradual replacement of today’s military. In light of these proposals, the refusal of the document’s authors to legitimize rightful warfare or interference on humanitarian grounds is clearly evident; on the other hand, the authors express the need to internationalize penal law through international courts, to condemn neo-Liberalism, and above all, emphasize the determinant role that must be played by organizations coming from civil society if a positive change is to be made, organizations that play – and can play – a determinant role in the establishment of world peace, a fair economy enhanced by solidarity, the promotion of human rights and democracy. Equally significant is the idea of education that emerges clearly from the document: the authors of the Tavola della pace also emphasize the need to promote education in the principles of world peace, human rights, and non-violence in the curricula of public schools. These proposals formulated at the Tavola della pace are democratic in nature but a more careful reading – especially one capable of identifying the operative implications of these proposals – clearly reveals their substantially antagonistic nature, and therefore one of radical rupture with the existing order. The proposals that the Tavola della Pace intends to achieve are as follows: first of all the dismantling of international trade organizations and the gaining of access to the nerve centers of transnational power by first gaining credit at the institutional level at UN level, the substitution of existing institutions for the purpose of planning an international policy and economics completely opposed to the one in existence. Secondly, the Tavola della pace aims at the elimination of the existing national and transnational military institutions and their substitution with non-violent armed force. The unswerving and radical rejection of neo-Liberalism – the third aspect – induces the document’s authors to identify in fair trade and solidarity organizations – such as alternative banks such as the ethical or sustainable banks – the only feasible alternatives capable of dismantling the current commercial organizations founded on the principle of mere capitalistic profit. Lastly, the fourth aspect, the emphasis posed on educating young people in the principles of peace at school and university level, really aims at systematic psychological warfare through widespread disinformation to induce them to reject the legitimacy of military institutions, which are portrayed only as illegitimate and immoral institutions. In short, the program formulated by the Tavola della pace is to every effect a political program – and one wide in scope, to be sure – that aims at taking power – even with the use of non-violent instruments (and therefore rejecting the traditional techniques or military overthrow, terrorism or guerilla warfare) and replacing the existing military and economic institutions with others controlled by delegates from lay and religious organizations of pacifist and alter-globalization origin.

Bibliography

Cap. CC Alfonso Montagnese, Impatto dei Social media sulla sicurezza nazionale, OSN, 2011

Lorenzo Mosca e Christian Vaccari, Nuovi media, nuova politica? Partecipazione e mobilitazione on-line da MoveOn al movimento 5 stelle, Franco Angeli, 2011

Mario Pianta, Globalizzazione dal basso. Economia mondiale e movimenti sociali, Il Manifesto Libri, 2001

Donatella della Porta e Lorenzo Mosca, Globalizzazione e movimenti sociali, Il Manifesto Libri, 2003

Umberto Rapetto-Roberto Di Nunzio, Le nuove guerre, Bur, 2001

Francesca Veltri, La rete in movimento. Telematica e protesta globale, Rubbettino, 2005

Continue Reading
Comments

Intelligence

High-Altitude Espionage (Spy Balloon) and India’s National Security

Avatar photo

Published

on

Throughout the nineteenth century, balloons were a vital tool for obtaining intelligence. Since then, their value has drastically decreased. In order to spy on the Soviet Union in the 1950s, the United States utilised high-altitude balloons (that the Soviets complained about and subsequently shot them down). The U-2 high-altitude reconnaissance plane, (which was also shot down) and the Corona reconnaissance satellites, (the first of many generations of spy satellites) that many nations utilise today, succeeded in replacing balloons. Now that a Chinese balloon has flown above the United States, serious worries are being expressed.

During the first two weeks of February, the Chinese spy balloon saga that concerned the United States, Canada, and rest of the world seemed to have come to an end. The four balloons, or “high-altitude objects,” as they were officially referred to, were shot down by American fighter aircraft.

Similar to airships, surveillance balloons are equipped with sensors, cameras, or communication equipment to track and gather information. The spy balloons can either be anchored to the ground or can float at a great height, giving them the ability to take extensive pictures of their surroundings. Safety and monitoring, process sensing, climatology, and disaster response are all possible uses for the collected data.

Among the many uses of balloon surveillance equipment by spies are the following: ‍

SIGINT: The intelligence community can use communication signals, such as voice and data transmissions, to intercept and analyse signals intelligence (SIGINT), which enables the collection of information on foreign governments, military forces, and other organisations. SIGINT is typically collected using balloons fitted with specialised sensors and equipment.

GEOINT: Spy Balloons collect geospatial information (GEOINT) in order to create detailed maps and photographs of the ground and track changes over time.

HUMINT: Balloons can be used to acquire human intelligence (HUMINT) to keep an eye on people, groups, and activities on the ground.

ELINT: Balloons enable the intelligence community to intercept and analyse signals from foreign military and other electronic equipment to learn more about their capabilities and intentions. This is known as electronic intelligence (ELINT).

Balloons were employed during the Cold War for psychological operations, or PSYOP, to drop pamphlets or books. In the 1950s, the CIA (Central Intelligence Agency) deployed millions of hot air balloons off West Germany’s coast to drift through the Iron Wall with their prized cargo, George Orwell’s book Animal Farm (1945).

The usage of balloons for espionage operations and surveillance is not hidden from the world. Today, China adopted the earlier existing technology of balloons in its advanced version to fulfil its own intelligence needs. According to sources, US intelligence authorities think the recently discovered Chinese spy balloon is part of a vast surveillance operation managed by the Chinese military.

Such practices of China and the balloon system leaves an important question on India’s national security. A similar balloon like the one in America was sighted in January 2022 over the Andaman Nicobar tri-service command by the Indian forces last year. “But soon it flew off. These advances sparked conversations about some rethinking of the tactics to counter emerging dangers like spy balloons, ” said by former DG of DRDO. Even if such a balloon isn’t armed, it can gather private information about vital infrastructure, such as the activities of the armed troops near the border, in the islands, or anywhere else on the mainland, and test India’s capacity to recognise aerial surveillance gadgets.

China’s stance on the balloons were that it was a weather balloons, however the high resolution cameras could serve for the purpose of stationary Surveillance. Spy balloons, however, are difficult to shoot down. Elevated targets are inaccessible to anti-aircraft guns that are mounted on the ground. The fired bullets from the ground may cause casualties or injuries. Only a small number of fighter jets have the ability to launch an air-to-air missile from a height of 20 km which could quite expensive. Spy Balloons might make it easier for China’s military to collect electromagnetic emissions that reveal a weapon system’s capabilities when compared to using sophisticated satellite systems positioned at higher altitudes.

India has to improve its intelligence and counterintelligence capabilities in light of the latest incident. Sino-Indian ties are already fraught with uncertainty, so failing to recognise and address new dangers, especially those in the grey area, would have serious consequences. New Delhi needs to improve its technological proficiency and work with nations that share its interests.

Data collection today has become a very important part of a state’s strategies. Being unaware of such actions in its own backyard would have negative effects on India, given the tensions between the two countries. Although, advancement of the technology has led to blurring of the geographical border lines India needs to be rigorously vigilant to such espionage attempts especially near its borders and critical infrastructure.

Continue Reading

Intelligence

Maritime Cybersecurity: A Potential Threat to India’s National Security

Avatar photo

Published

on

India has a huge coastline of 7516.6km comprising 13 major ports (including one private port) and more than 200 minor ports across the coastline. It is a very known fact that the maritime sector is very crucial for India’s security, stability, economy, and sustainable development. India conducts around 70 percent of its total trade by value through the sea. India is strategically placed in the Indian Ocean, which gives it greater access to trade with the world’s major shipping routes. India’s seaborne trade has grown at a rate that is twice the 3.3% rate experienced globally. India is now focusing on strengthening its maritime sector through the upgradation of safety and security standards at the ports, enhancing port capacity and operations, and automation. It is placing emphasis on automation and technology upgradation through projects like SAGAR and Sagarmala. With digitalization in place in almost all the port operations and in the surveillance of the maritime waters, as shown in figure 1, the maritime domain is vulnerable to cyber threats ashore and afloat. 

Figure.1 Technology in the Maritime Sector 

With Information and Communication Technology (ICT) coming into use, increasing reliance on seaways, and the growing importance of the data as a weapon in the hands of the state, all these pave the need for better cybersecurity management systems in the maritime sector. 

The maritime business, its ships, and its cyber environment are all protected by a variety of tools, policies, security concepts, safeguards, guidelines, risk management techniques, actions, training, best practices, assurance, and technologies. 

Maritime cyber risk can be referred to as the extent to which the technology in use could be attacked, that could result in the loss or compromise of information.

Pirates and opposing nations have been a menace to the maritime transportation business for thousands of years, but as the sector has developed and technology has been more thoroughly integrated for enhanced efficiency, so too has the magnitude of possible cyber threats. Now, even using something as simple as a USB flash drive, or even an unsecured Wi-Fi, the hacker can get access to the critical systems of the vessel, thereby obstructing the entire port operations. For example, a suspected ransomware attack on the Management Information System (MIS) crippled the operations of the Jawaharlal Nehru Port, Mumbai, in 2017 and again in 2022. 

Though the primary motive behind cyber threats is profiteering, there are several aspects that motivate a cybercriminal to conduct a cyberattack on the port or vessel operations. This includes espionage, activism, terrorism, warfare, and others. 

The various kinds of cyberattacks on the maritime sector involves malware, trojans, botnets, advanced persistent threats, ghost shipping attack, cryptocurrency hijacking, and other. In addition to these cyber threats, the maritime domain is vulnerable to cyber terrorism as well. The awareness in the maritime sector over cyber terrorism is very minimal or negligible, with very little emphasis given to it. Chinese cyber activity is a major security threat to India. China is also using cyber technology in its South China Sea AntiAccess/Area Denial (A2/AD) strategy. The A2/AD strategy denies freedom of movement and navigation to rival powers by increasing defense systems that threaten their ships/submarines. 

The technologies like the Automatic Identification System (AIS), ECDIS, GPS, information systems, Industrial Control Systems, and other operational technologies have played a crucial role in enhancing the efficiency of port and vessel operations. Nevertheless, these technologies are of no exemption to cyberattacks as every technology comes up with its own loopholes. For example, the adoption of AIS is compulsory for any vessel to ensure its safe navigation, but as it is unencrypted and unauthenticated, the maritime sector is vulnerable to spoofing, water holing, social engineering, and other cyberattacks. It is also important to identify the human role in operating such technologies, as it is noted that human error and equipment flaws are primary reasons behind the success of these cyberattacks. 

Maintaining the integrity of supporting systems, protecting ship systems from physical assault, and making the maritime sector resilient to both internal and external threats are all critical. Protection from various cyberattacks is necessary to prevent a breach of the network and its systems. Proper countermeasures and in-depth defense strategies must be deployed for each attack to prevent an attack from taking advantage of a flaw or vulnerability in the technology. 

Primarily, it is important to promote awareness among the staff or the crew to identify cyber threats and on responding to such threats and, for example, alerting the officials if any malicious or unusual mail or notification is identified in the system. 

Block chain technology can be an efficient solution as it allows for a continuous monitoring system and provides real-time status on the ship’s security. It also enables secure communication and storage of data in the control centers. It helps in avoiding loss of data and data modifications by unauthorized users. 

The AIS and GNSS systems must adopt encryption and authentication measures which are given zero attention to this date.

With the vast coastline, it is not possible for India to secure the coastline through manpower. Israel based startups, in order to effortlessly secure the maritime IoT ecosystem, Cydome Security offers a cyber solution to handle this precise problem. The company’s solution is intended for systems with links to coastal infrastructure as well as guidance, sensors, control, and command. 

Fighting fire with fire is one way that organizations can aid in stopping such intrusions: AI-driven security systems can successfully foresee and thwart AI-driven threats in real-time with appropriate data.

It is crucial to note right away that there is no magic solution for marine cybersecurity. An interconnected era has been retrofitted with a history of outdated shipboard equipment, leading to a shattered and vulnerable maritime environment. 

It is in India’s interest to take a leading role in negotiations and developments with global countries, given its crucial position in the Indian Ocean Region and the need to protect itself against China’s growing threat in that region. In order to take shipping on to the next level of connectedness, strong cybersecurity is imperative. 

Continue Reading

Intelligence

CIA’s Supremacy in Global Spy Ring and Hammering Russian Intelligence Since Cold War

Published

on

I Doubt Therefore I Survive”- Michael Richard Daniell Foot, British Intelligence Historian.

Since world war US always had upper hand in conducting sub/ unconventional warfare especially Covert Psyops, Americans have always heavily invested in sinister designs- the famous MKultra progaramme of using high psychotic drugs- LSD to psychologically weaken Human’s mental state and force confessions out of them. Also, Its aim was to develop mind-controlling drugs for use against the Soviet bloc. The project attempted to produce a perfect truth drug for interrogating suspected Soviet spies during the Cold War, and to explore other possibilities of mind control. CIA’s Subversion techniques and plans into the Soviet’s camp and other communist camps are also one of the greatest security headache for Soviets. The problem was that Soviets espionage/ Intelligence temperament was not that ruthless, hard and developed as CIA’s. Eventually, this became a reason of how and why US’s psychological operations substantially harmed Russian/Soviets’ influence too much. If we leave Vietnam, the scores of US in espionage circles, activities of de-installing regimes and squeezing Soviets sphere of influence and even now squeezing Russia’s sphere of influence are much higher than of Russia. Further, this also becomes a strong reason why Russians were not able to swiftly retort to these activities in a fashion in which US does or the tit for tat temperament was not proactively seen from the Russian or Soviet’s side. In other words, they struggled to match and register covert successes in countering US’s influence in substantial sense.  A story of one of the greatest female speies and phenomenal covert operations led by US and west which set the stage rolling for “espionage” in global politics.

We mostly idealize male as spies, because of their endurance and the tradition or culture of talking only about male spies, the amount of glorification/popularization  which a male spy gets is somewhere reduced to less when the story of female spy comes in. Though the mindset is now changing and people are now equally focusing on both the cases, However, it has been observed that stories of female spies are still struggling to get glorified or talked about in some parts of the world. The tides changed their directions when a female spy- Virginia Hall, regarded as one of the greatest female spy whose contribution led to Allied Forces Victory in World War-II. In America she is regarded as one of America’s greatest heroes.

The Past

She was born on 6th April 1906  in Maryland,  attended Roland Park country school, later for her higher studies she went to Barnard College(Columbia University)  where she learned French, Italian and German and later moved to Geroge Washington University to peruse Economics.  Virginia Hall’s life was filled with roller coaster rides with dramatic twists and turns. She had a dream to become the first female Ambassador of the United States. She even started to work towards her dream by taking up the job of a clerk at the consular office in Warsaw Poland and later in Turkey. She didn’t know that a major setback is still waiting for her. In an accident she lost her left leg, However, this accident didn’t slow down Hall’s dream, She was firm and determined to achieve her dreams and serve for her country.

 Making of A Spy

Later, She applied for Foreign Services and her application in the foreign services was turned down because of disability and her gender(Females were rarely hired at that time). Repeatedly her applications were turned down over and over. However as usual her determination and refusal to comprise with her dreams were fueling/ not letting her dreams die. Later she moved to France for employment, where During World War-II in February 1940 (the early period of war) she become an ambulance driver for France Army, after the defeat of French she again moved to Spain for employment where she accidentally met British Intelligence Official name Geroge Bellows. Bellows got amazed by her communication and thinking skills and gave her the number of a “friend” who was working in Special Operations Executive(SOE), United Kingdom secret operations unit in World War-II. After getting in touch with “friend” she joined the SOE in April 1941.

The First Job

She gets the training in SOE and sent to France by France Section of SOE. She was given a cover of a reporter/ journalist for New York Post which enabled her to interview people, gather information from surroundings which can be useful for intelligence/ military officials of Allied Forces. Gradually she became an expert and learned how to arrange contacts, logistics, and who to bribe to get information and get the required work done. She also learned how to distribute and supervise wireless sets among agents and the network of SOE.   Despite the French occupation by the Germans, she managed a long tenure as a spy-transmitting information to London about German which highlights her operational brilliance and. She also sensed danger and refused to attend a meeting of SOE Agents and later French Police raided the meeting place and SOE agents got arrested.

The Journey with Americas

After successfully planning an escape of the SOE agents from jail, when Hall returned, she was declined  to serve in France because she and SOE networks were almost compromised, and sending her again would be too much risk. After this, Hall got in the contact with OSS(predecessor of CIA) and joined American Intelligence at the low rank. She was sent to France again by OSS. This time she was given a cover of poor peasant women, she used to roam around the various places and often changed her disguise to a milkmaid and prepared Cheese and sold cheese to German Soldiers. Hall was tasked to prepare resistance force known as Maquis and set up Anti- Nazi The environment in France, which would help Allied Forces during Invasion. Hall continued to gather information about German Soldier’ locations and finance Maquis and help to set up resistance force which later helped Allied Forces in planning effective Invasions- Operation Jedburgh. No doubt with an artificial leg, she ruled the helm of Spy Networks, and in those times when females were rarely hired for jobs. German described her as “Most Dangerous Allied Spy” She successfully established Anti Nazi resistance which eventually led to the collapse of the Nazi and victory of Allied Forces, It was Hall with whom help Allied Forces were victories over the Axis Powers effectively. Hall broke all the stereotypes in the spying network who believe that Females are not that smart witted to survive in the Intelligence Word. She was awarded Distinguished Service Cross in 1945 and earlier she was also awarded prestigious British Medal. Later She becomes the first female to work in CIA, she was given desk jobs in CIA and due to her age she couldn’t perform well in the tests which were mandatory in CIA and after a brief period of time she resigned and took retirement at the age of 60. She lived with her husband Paul  Barnesville, Maryland, until her death in 1982. She always refused to talk/write about her World War-II or in-field experience which led to the curiosity of many. The way she believed in her instincts, intuition, and with the brilliant skill set despite one leg has made her one of the greatest spies of all time.

Continue Reading

Publications

Latest

World News18 mins ago

Pompeo: The Biden administration allowed the Chinese and Russians to come together

Former Secretary of State Mike Pompeo on Fox News weighs in on the Biden administration’s response to the meeting between Presidents...

Finance2 hours ago

Credit Suisse Collapse – this is a robbery of Arab investors

Riding an oil-price boom last year, Saudi Crown Prince Mohammed bin Salman directed government-backed Saudi National Bank to make a...

Middle East4 hours ago

Arab plan for Syria puts US and Europe in a bind

A push by Arab allies of the United States to bring Syria in from the cold highlights the limits of...

Middle East6 hours ago

Iraq’s Geopolitics, Key Factor for US, EU Energy Security Strategies

Twenty years after the US-led coalition invasion of Iraq in 2003, which resulted in the overthrow of the Baath regime...

Economy8 hours ago

Impact of technological advancements on International Trade and Finance

Technological advancements have had a significant impact on international trade and finance in recent years. These advancements have facilitated cross-border...

Russia9 hours ago

The Political and Diplomatic Implications of the ICC’s Arrest Warrant for Vladimir Putin

On March 17, 2023, the International Criminal Court (ICC) issued an arrest warrant for Russian President Vladimir Putin for alleged...

Russia11 hours ago

An inquiry into geopolitical logic of China and Russia relations

Chinese President Xi Jinping’s state visit to Russia during March 20-23 is hailed as “vigorous, mature and stable”. During his...

Trending