Connect with us

Intelligence

The “dirty bomb” issue and the jihadist strategy in Europe

Giancarlo Elia Valori

Published

on

On November 30, 2015 the Belgian police discovered a film regarding the movements of a Belgian nuclear researcher and his family who operated in Dohel-1, one of the seven nuclear production sites in that country, four in the Dohel region and three in the Tihange region.

The long film of all the nuclear expert’s movements was found in the Auvelais house of a man linked to the network of Al Baghdadi’s Caliphate. The jihadists were interested not so much in the nuclear plant as such, but in the possibility of using radioisotopes, namely products capable of causing poisonings, diseases, various temporary or permanent disorders in those who come into contact with them for a certain period of time.Radioisotopes, also known as radionuclides, are unstable nuclei which radioactively decay, resulting in the emission of nuclear radiations. As already said, the effects may be scarcely or highly significant, depending on the dose of radiations received and/or the type of emissions absorbed.

The α radiations carry two positive charges and can be stopped by a thin aluminium foil. They strongly ionize gases (hence air) but, if produced by a source inside the human body (water, contaminated food), they can cause very severe damage.The β radiations have a negative charge only and are more penetrating than the α ones, but they ionize gases to a lesser extent.They have a greater power to penetrate the human body than α radiations, but these emissions, too, can become dangerous when given off by a source inside the human body.On the contrary the γ radiations have no electric charge but have an undulatory nature, such as electric waves.

The latter have a very high power of penetrating the human body and can cross relevant thick layers of lead and other metals.They are a hundred times more penetrating than the β radiations and are, in effect, electromagnetic wave emissions.All radioisotopes are widely used in medicine, biology, pharmacology (the “radiopharmaceuticals”), archaeology and paleontology.Not to mention industrial applications: the lasers which use the radioisotope emissions are now fundamental in telecommunications, through the “fibre optics” technology.Even the common CD players use these lasers, which are also used for cutting some metal sheets in the manufacturing industry.In all likelihood, the jihadists stationed in Belgium wanted to kidnap that nuclear expert or a member of his family so as to force him to make one or more “dirty bombs”.Here the technological issue turns into a strategic and political issue.

A team of experts is needed to make a dirty bomb, but we cannot rule out that a single “lone wolf” may be able to make it alone, with few recycled materials and using the usual homemade explosives which now characterize most of the blasts occurred so far in Europe due to the sword jihad.You only need saltpetre, sugar or normal gunpowder, which can be easily made at home.It is worth clarifying that the jihad does not want to conquer our territory, but it wants to fully subjugate it, particularly at political and cultural levels.For the jihadists, a “dirty” bomb” has the same value as a cyber attack or a demonstration against miniskirts or halal food in public schools.The important factor is intimidation, leading to hegemony and finally to dominance.This means that, at geopolitical, economic, cultural and demographic levels, the jihadist militants want to make their fight fully functional to the primary interests of the umma, namely the Islamic global community.

The strategic goal is the cultural and economic submission and subjugation of our territories to Islam, possibly with some mass conversion.

The fear, terror and social dissociation caused by the terrorist actions carried out by the men (and women) of Daesh/Isis are aimed at weakening the reactions of the “infidel”.The attacks also serve to increase the costs of our defence, up to making them economically unsustainable and finally blocking the European society so as to freeze it until the final “submission”, just to borrow the title of a smart and successful book by Michel Houellebecq.Therefore it is a long-term warfare, with strong elements of traditional war combined with a real psywar, “psychological warfare.”These actions relate to the management of the good side, the good cop, of integration up to beyond the limits allowed by our social system – which implies cultural and mental-mythical submission and subjugation – and the harsh side, the bad cop, the brutal violence of the recent massacres in Paris and Brussels.Hence a mechanism “if …. then” sets in into the victims’ minds, namely us, whereby we start to think that if we are good and keep quiet and we adapt without saying a word they will not do us harm any more.

This is not true: if we are good and keep quiet, we will be subjugated even more cruelly.Needless to explain this to current politicians in Italy and Europe; they are just canvassers and salesmen in search for foreign capital, possibly from the countries which have always funded the jihad.There are also important socio-economic factors in this psywar using all the elements of our non-orthodox warfare techniques.Again needless to explain these techniques to the above stated canvassers and salesmen who, unfortunately, have also “polluted” the intelligence services.

Firstly, there is the plan already made explicit by Osama Bin Laden to hit the West – the inevitable advocate, for economic and energy reasons, of the “apostate” regimes of Islam and the Jewish State – with a war which is very cheap for the jihad that wages it, but costs a lot, even too much, to those who must defend themselves from it.Compared to the relatively scarce funds needed for the attacks of September 9, 2001, Osama Bin Laden and his Al Qaeda cost over three billion dollars in fifteen years, including the costs of wars, new security and safety standards and part of the covert operations necessary for finding and killing him.Not to mention the still high costs for supporting about 150,000 military staff and one quarter more of the normal US military budget.The jihad started by Bin Laden – a wealthy “daddy’s boy” who became radicalized at the university in Saudi Arabia, as a result of his contacts with a professor linked to the Muslim Brotherhood – is an asymmetrical war of the poor against us, the would-be “rich”.

Hence the jihadists are used as proxy warriors by the rich Muslim countries to progressively impoverish the West, make it suitable for diversified and profitable investment by the OPEC Sunni area and finally create not only an economic, but also a political dependence on the Middle East oil and gas.The terrorist attacks in Paris and Brussels, not to mention the now sadly neglected affair of mass rapes in Cologne, are the beginning of a new phase of this non-orthodox Islam war in Europe and other continents.Before Al Baghdadi’s Caliphate – which has created the territorial entity needed to the global jihad, for political mythology and as a military base – Mohammed Badie, the former Supreme Guide of the Muslim Brotherhood in Egypt and later leader of the Ikhwan International, had explicitly stated: “There is no need for the sword jihad in Europe, we will conquer it only with our growing population”.

The transition from the old to the new jihad, which came to maturity with the establishment of the Daesh-Isis Caliphate, has already changed this Islamist strategic project on Europe.This is exactly the reason why we must be very careful with nuclear “dirty bombs” that will certainly reach their political goal (which is what matters), regardless of their actual potential for nucleotide radiation.Fear is a mechanism which now increases also with small doses of violence.It is hard to estimate how many sites exist today in the world where radionuclides are produced and stored, but the best statistics now available point to over 70,000 storage systems placed in at least 13,000 facilities.The brutality of the attacks and the size of the widespread jihadist network discovered so far in Belgium may be explained by the fact that this country is one of the major world producers of radionuclides and there is at least one researcher of Islamic origin and faith who works in this facility, as we will see shortly.It is the nuclear complex called SK-CEN, a nuclear research centre located near the Bocholt-Herentals Canal, 53 miles away from Brussels.It no longer receives the periodical shipments of radioactive material from the United States, which in 2004 had reported the poor defence structures of the Belgian system in view of a possible attack by Al Qaeda.

Not to mention the fact that the two fake journalists who killed the anti-Taliban Afghan leader, Ahmad Shah Massoud, two days before the September 11 attack came from Molenbeek, the neighbourhood which hosted and still partially hosts the Caliphate’s jihadists who carried out the massacres in Paris and Brussels.In 2003 there had been reports of an attempt by one of the Belgian soccer star, Nizar Trabelsi, to put a bomb in the military area of Kleine Brogel, 18 miles away from the aforementioned nuclear research centre, a base hosting twenty US tactical nuclear weapons related to a F-16 squadron.

The base safety and security structures were later deactivated in 2010, even by a group of peace activists, who run about the military structure undisturbed for over two hours.Only in 2014, and after the renovations made by the Belgian government upon US request, did IAEA confirm that the safety and security net in SK-CEN and the nearby military base were effective and robust.It is worth noting that the Belgian nuclear plants supply over 50% of electricity in that country. Is this series of   terrorist actions possibly designed to force Belgium to supply itself only with the Middle East oil and gas?In Italy, the disastrous decision to relinquish civilian nuclear energy was taken with a richly-funded referendum in June 2011, after the equally richly-funded one in 1987, cunningly held shortly after the disaster occurred at the Chernobyl power plant.No one better than the peoples who are not strategically Clausewitzian knows how to better use “psychological warfare” than Muslims.They do not believe that the war obeys strict, Kantian rules, but they think that the war confrontation is always the essence of politics, not its “polarization of extremes”.Hence there will probably be no need for terrorist actions in Italy: in this sector we have already simulated and achieved the effects of a jihad attack on our own.

Furthermore, the Belgian power plants have recently been the target of a series of accidents which have endangered the city of Antwerp, geographically close to the SK-CEN centre, and Germany has repeatedly called into question the technical and strategic safety and security nets of the Belgian nuclear system.

It is worth noting that Ilyass Boughalab, a Moroccan expert linked to the old information network, though still operational but today silent, known as Sharia4Belgium, works in Dohel-1.Today, globally, the components (and not the finished products of the radioisotopes, about which we have already spoken) are found in approximately 3,500 sites located in 110 countries.

In Iraq, Al Baghdadi’s Caliphate has already reached the nuclear sites of the former regime of Saddam Hussein and is supposed to already have such a quantity of radioactive material as to build a “dirty” bomb which could “infect” a small city, thus making it uninhabitable (and this is the tactical goal pursued).Moreover, the IAEA countries adhering to the international safety and security net for the storage and use of radioactive materials are only 23, accounting for 14% of the total 168 IAEA members.

Statistically, in 2013 and 2014, at least 325 nuclear accidents were reported officially in the IAEA databases, with heavy losses of radioactive materials.85% of those accidents regarded non-nuclear radioactive material – hence nucleotides.According to the most reliable estimates, the non-reported accidents are supposed to be over 753 in the two-year period under consideration, already used as statistical basis.Conversely, highly enriched uranium (HEU) is stored in sites located in 25 countries while, as already seen, the radioactive substances are much more widespread.Moreover, “dirty bombs” certainly cause less damage than nuclear ones, but they can cost a huge amount of money for “cleaning up” the area, as well as for displacing and protecting the population.According to the rule of asymmetric economic war started by Bin Laden and today continued by Al Baghdadi’s Caliphate, this is exactly what is needed.

“Dirty bombs” have been called weapons of mass disruption and not weapons of mass destruction.

This is the reason why they are suited to reach two goals at the same time: the psycho-political crushing of the enemy, namely us, as well as the increase in costs for defending ourselves from the jihad – costs which could force some European governments (the aforementioned canvassers and salesmen) into a strategic or anyway political surrender.Not to mention the area interdiction which could be generated by a radiological dispersal device (RDD) so as to later act undisturbed, with traditional terrorism, in areas close to those hit by the dirty bomb.Technically, the most easily available and used radionuclides among the 16 theoretically available include Cobalt-60, with a half-life of 5.3 years, which appears as a hard metal. It is used for anti-cancer therapies.They also include Cesium-137, with a half-life of 30.1 years, which appears as powder salt and is used for blood transfusions in specific therapies.The same holds true for Iridium-192, which appears as a metal and is still used for X-rays.

Finally they include Americium-124 and Beryllium, with a half-life of 432.2 years, showing the consistence of a metal oxide and mainly used for stratigraphic analysis in geology and archaeology.

Out of the total number of nations adhering to the IAEA rules for radionuclides, only 19 have a specific strategy to monitor or recover the illegally extorted material; 8 of them are developing a procedure for notifying neighbouring countries of any illegal release or transfer of radioactive material, while the others are studying new safer storage and monitoring systems.The Code of Conduct currently in force for all the countries adhering to the special IAEA system for radionuclides is inevitably vague and full of “shortcomings” at procedural and penalty levels.Moreover only 130 IAEA countries have accepted the Code of Conduct.So far many thefts of radioactive material have occurred, apart from those carried out by the so-called Syrian-Iraqi Caliphate (two, as far as we know).In 1993, the Russian mafia placed small pieces of radioactive material in the office of a Russian businessman, causing him to die in a few minutes.In 1995, the jihadist Chechen rebels buried a container full of Cesium-137 in Moscow’s Ismailovsky Park.

The terrorists let the police know where it was before it could cause too much damage.In 1998, 19 tubes containing Cesium-137 were stolen from a hospital in Greensboro, North Carolina.Again in 1998, the secret services of the pro-Russian Chechen government discovered a container hidden under a railroad, already connected to an explosive ignition device.Others thefts were recorded, often not even reported by “open sources”.Hence, on the basis of logical inferences, how many Chechens are hosted as foreign fighters by Daesh/Isis? A number ranging between 200 and 700 – an amount exceeded only by militants from Afghanistan, Bosnia and Somalia.Just to make an example of costs and damage which may be caused, a dirty bomb charged with an average quantity of Cesium-137 could “pollute” and contaminate 250 square meters at a certain minimum cost of decontamination/ repopulation equal to over 81 billion euro, obviously depending on the infrastructure existing in the RDD detonation area.

Hence what must be done to prevent “dirty bomb” attacks?

Meanwhile, many specific sensors can be placed and monitored often and very carefully in “sensitive” facilities and densely populated areas.As already happened in the United States, a government committee should select a number of critical points for RDD attacks and then proceed to the ongoing computerized monitoring of the most important sites which may be targeted by a jihad attack.This holds true also for parks, cities’ central areas, schools and universities, but this shall be decided by the relevant committee, when it is established.Furthermore we shall also significantly improve the storage and destruction, after use, of such materials, coming from hospitals, research centres or other structures – a practice to be certified and be entrusted to the police, not to garbage collectors.How many sites of radionuclide production or storage are there in Italy?A huge amount: suffice to list – and it would be virtually impossible – all the hospitals, private radiology medical centres, as well as biological, archaeological, physical, chemical and paleontological research centres.Radioactive waste and, in any case, the waste coming directly from nuclear power plants, have the size of 30,000 square metres, for a quantity of waste produced over 30 years.Less than a quarter of France and less than a sixth of Germany.

In Italy approximately 140,000 tons of special waste, including radionuclides, are produced every year, while hazardous waste (including some specific radionuclides) has a size of 9 tons/year.In Italy the management of such radioactive waste, mainly coming from hospitals, is currently regulated by Article 4 of Legislative Decree No. 230/95.The legislation governs the management of such waste, but mainly defines stringent criteria for notifications, requirements and regulations, also in the event of a transfer of such waste abroad.Even with the very dangerous rule of tacit consent.Hence is the registration of radionuclide transport companies with the Ministry sufficient?We do not think so, particularly because said waste thefts occur precisely during transfers and by staff who may not be registered with the relevant Authority.

Article 17 of EU Directive 2006/EURATOM, transposed in Italy in 2007, envisages specific criminal offences for those who abandon or carry out illicit trafficking of radioactive materials in addition to mandatory confiscation of the material seized – where possible.Better, but not enough, because there are no indications, apart from criminal penalties, specifically protecting from an RDD, of which we will never know the origin of the radionuclide used in the blast.Once again, little can be done, except for quick management and processing of information in the EU area and careful intelligence prevention on the radicalization of Islamic subjects from communities near the radionuclide production or storage sites.

The likelihood of an RDD explosion is statistically not measurable.

Nevertheless, it will be good to think about it in time.

Advisory Board Co-chair Honoris Causa Professor Giancarlo Elia Valori is an eminent Italian economist and businessman. He holds prestigious academic distinctions and national orders. Mr. Valori has lectured on international affairs and economics at the world’s leading universities such as Peking University, the Hebrew University of Jerusalem and the Yeshiva University in New York. He currently chairs “International World Group”, he is also the honorary president of Huawei Italy, economic adviser to the Chinese giant HNA Group. In 1992 he was appointed Officier de la Légion d’Honneur de la République Francaise, with this motivation: “A man who can see across borders to understand the world” and in 2002 he received the title “Honorable” of the Académie des Sciences de l’Institut de France. “

Continue Reading
Comments

Intelligence

Psychological programming and political organization

Giancarlo Elia Valori

Published

on

Contemporary politics and the ensuing organization of consensus currently employ techniques and methods never used before.

 We are going through an era in which completely new mechanisms operate within the traditional Parliamentary political representation, inherited from the liberal and democratic thought of the eighteenth century and of the following century. These mechanisms are much more powerful than those that – in the modern imitation of the Athenian agora -formed the will of the people and the guidelines and directions of the government.

 Democracy of Ancients and Democracy of Moderns – just to use the simile of Benjamin Constant – were basically similar, but different in their functioning.

 The number of citizens did not constitute a substantial difference, except that, according to Constant, modern democratic citizens delegated to the ruling class what did not fall within their being “private individuals, with private interests”.

Again according to Constant, the reason lay precisely in the new category of “private individuals” who, with a view to maintaining their wealth or work, deemed it right to delegate to someone else their power to make and break laws. Nowadays the private sphere does no longer exist. But not in the sense of the society of “one thousand eyes” and of continuous supervision and surveillance, but because the very category of “private” is over even in the political discourse.

Hence a mass totalitarian society, with a repressive apparatus that applies to everything would previously have been the subject of the strictly personal sphere of life.

 Everything has currently changed, but everything still appears to be similar to the criteria and principles we have studied in the manuals of history of political doctrines. This is not the case.

 Meanwhile, since the beginning of the 20th century, Eduard Bernays, Freud’s nephew and the father and pioneer of public relations, had established some connections between Sigmund Freud’s psychology (and with Gustave Le Bon’s Psychology of the Crowds, Mussolini’s favourite book) and political practice.

 That was the beginning of what we now call “corporate communication”.

 The suffragettes smoked and that was an operation funded by Bernays through the US tobacco producers.

  The exaltation of sex – following the publication of the Kinsey Report and the mass spread of the contraceptive pill-changed and upset the consumption styles and habits of vast masses of young people who, in the 1960s, were to shape the consumption habits of what Galbraith called the “affluent society”.

 That was the objective, not sex.

Hence, based on what discovered by Sigmund Freud, with a view to selling or prompting and inducing political behaviours, there was the need to “work” above all on the unconscious.

Currently, whatever is implanted from outside into the unconscious – if repeated constantly – always becomes real in the future.

 The real for itself always becomes in itself, because what individuals think -in crowds, but solitarily (Riesman’s “lonely crowd”) -becomes either consumption or political behaviour, which is basically the same.

 The subconscious has a huge power, i.e. controlling all subjective experiences. It is the autopilot of life, also from a practical viewpoint.

Nowadays no one speaks to the “reason”, the myth of the eighteenth century, but to instincts, to the subconscious, even to the unconscious.

The whole mechanism of the subconscious is already well in place and ready at 7-8 years of age and continues all lifelong.

With a view to reprogramming it, we need at first to limit the external and environmental negativities.

Indeed, we need to look for fully “positive” people, things and environments, as well as information.

 Needless to say, this rule is carefully followed by all political propagandists and, above all, by advertisers.

Currently politics always follows the rules of consumer goods advertising. The leader is a testimonial. The script is the program and the government an oligopoly.

 With a view to de-programming the “negative” mind, we need instead to visualize – as in a daydream – positive situations which we have already experienced.

We also need to reprocess the feelings of joy, which reach the subconscious immediately, well before the other ones.

 The subconscious mind always and only knows the present.

 Past and future are conceptual notions and processing – hence they are conscious. The subconscious interprets the negative of a negative proposition only as negative.

Creating positive propositions that counteract the negative ones processed and produced by the subconscious and then continuously repeat these actions. This is the basic technique.

 This is, in short, the subjective mechanism that is currently used in political and commercial communication.

What are, however, the current technologies used to program and reprogram people’s minds?

 We can mention the theory of social warfare, the virtual but all-out clashtaking place in the minds of citizens of a target country, using current technologies.

 The aim of any reprogramming campaign is, in fact, to make the enemy (the enemy people, indeed) think like us.

 It is a new kind of manipulation, much wider than the one carried out with the old disinformation or with the intelligence intoxication that was the non-violent part of the Cold War.

 The most used information technologies are now Precision Targeting – which sends messages and behavioural inductions to a specific group – as well as the wide range of Artificial Intelligence mechanisms that are used to simulate online the behaviour and thought in relation to the primary information we wants to convey. There is also the algorithmic decision-making, which processes information through specific algorithms in view of formulating recommendations or taking fully automated decisions.

 This holds true both for decision-makers and for the vast mass of users, citizens and voters of the aforementioned decision-makers.

We can also mention the Virtual Reality (VR) and Augmented Reality (AR) technologies, which create partially or completely artificial environments for both the programmers of the public opinion and the public itself.

  But also the Internet of Things (IoT) is used in this field, by correlating machines and sensors for the construction of a Complete Reality, which becomes facts and data to be spread as such.

 In this context of complete manipulation of information, which becomes the Complete Reality, also voice interfaces are useful. They allow to exchange information between the Source and the User or between Users, thus allowing the psychological reinforcement of news.

 Again in the field of information manipulation, blockchains are also important. They allow to control and process information only through the users enabled to use the “chain”.

We should also recall the computerized programs that generate completely false videos and images – fakes which, however, are absolutely plausible.

Precision Targeting is used above all to reprogram groups of pre-selected individuals, who provide the Web with a continuous flow of information, from mobile phones, from the Web and from the other channels, to those who can selectively access the Web. All this is currently used, above all, through social media.

 In this case, we have already reached the phase of neuromarketing, which changes the desires and habits of specific population groups, by combining the mental effects with the emotional ones.

 As if it were a sign which, according to De Saussure, is the indestructible connection between signified and signifier. But the product of neuromarketing is not at all a language sign.

In this case, the above mentioned technology could be used for indirect facial recognition, manoeuvred by Artificial Intelligence systems.

 Facial recognition will enable those who manoeuvre -also temporarily – the Web to quickly check the emotions of millions of people, and we all know how important emotions are now to tamper with the psyche and communicate concepts that often have very little relevance at conceptual and even at emotional or mental levels.

 By 2035 these technologies are expected to be spreading like wildfire, since they are very important both for commercial operations and for political marketing.

 Artificial Intelligence is the primary axis of development of all the other technologies we are talking about.  AI will be used above all in verbal and textual recognition, as well as in the collection and analysis of very broad spectrum data, and for the processing of raw initial data, again in a very large population.

AI, however, will above all be used for defining an automated decision-making that can support the human decision-makers when they do not know, remember or understand all facts and, above all, the underlying determinants of facts.

 We will get to imitate, without realizing it, Elsa Morante’s book “The World Saved by Kids” and certainly what is happening in global communication already guarantees this future to us. They are more manipulable. They have no memory and they are perfect for the Brave New World that stands before us.

We can easily imagine what all this means for advertising, for the selection of markets, for business decisions but, above all, for the development of political platforms, both in terms of the electoral process and for the more specific decision-making process.

 The next level will be content, which will often be produced directly by AI systems.

 But let us better analyse what algorithmic decision-making is.

 It is often currently applied in medicine.

 Disease analysis, therapy forecasting, statistical analysis of diseases and their effects, both at subjective and population levels. In the near future, however, other sectors will be ever more like the banking system. Human Resources, even political decision itself, will be the subject of these applications, which will often become so complex as not to be understood – in the future – by the computers using them.

 If you collect a lot of data, it is increasingly likely that a sequence of decisions or simple new data is not recognized by the program operating in the computer.

 Also for AI networks we will have a process of learning by doing.

 There are two dangers. Firstly, that the private ownership of the most important databases makes competition between systems impossible; secondly that the algorithms are hackable or manipulable by third parties unknown to the system.

 There are also Virtual Reality and Augmented Reality.

If we proceed with the increasingly analytical and obsessive adaptation of the devices to the Ego of the User, or to his/her tastes- considered, for some reason,  immutable – we risk an ideological drift of new technologies, i.e. that of hyper-subjectivism and, as happens in current educational practice, that of the permanence of the mass Ego in an eternal childhood.

 The “Minor Ego” advocated by some people is a very real risk and it is not even clear how a super-massified production can be adapted to the increasingly self-referential psychologies of the Consumer Ego.

 Not to mention the natural limit – currently often evanescent – that the Augmented Reality keeps between the imaginary and reality – a limit that, in the propaganda and political implementation of the Virtual Reality, could become very dangerous to cross.

 Immanuel Kant spoke of the 100 gold Thalers that can be in your pocket or just in your imagination, but that cannot certainly be mistaken one for the other.

Hence beyond any technological processing, Reality is never the Imaginary.

 Although the imaginary can induce behaviours very similar to those that the subject would have if subjected to reality, the one that – as Voltaire said – has “hard head”.

By Internet of Things (IoT) we generally mean an environment full of machines that interact with one another through the Web.

As can be easily guessed, the IoT information potential is huge.

 Human consumption habits, but also communication, ways of life, lifestyles, exchanges between subjects, positions and information exchanged between individuals will be part of huge databases.

Probably, in the future, it will be difficult to find exactly what is needed in those databases, considering that the bias of the IT and data storage systems tends to increase with the quantity and complexity of data.

 It is estimated that, by 2030, there will be over one and a half trillion sensors connected to IoT networks, which will be worth half of the entire Internet traffic of “simple” users.

 According to Deloitte, the entire IoT market is expected to be worth a trillion, in addition to further 750 billion for IoT network connection modules.

 It can be easily imagined to what extent this makes it possible to hack data not only from IoT networks, but also from all other networks connected to the Internet and ending up in an IoT structure.

By 2030 blockchains will be the basis of financial, control, check and analysis networks.

 It will be the beginning of virtual monetization, which is, in itself, the opening of the financial gates of Hell.

 The miserable level of the current economic thinking allows it.

Nevertheless, all this technological development – between imagination and reality – will lead us towards a society of the unverifiable and probable, with no possibility of responding to a   government financial or information fake and with an increasing penetrability of information networks, to which the whole social fabric and not only its control will be delegated.

However, the society of the imaginary 100 Thalers – believing that the imagined ones are already in the pocket – will not be able to pay anything.

Continue Reading

Intelligence

Baghdadi Dead : What it means for Terrorism in West and South Asia?

Gen. Shashi Asthana

Published

on

President Trump’s announcement  that Abu Bakr al-Baghdadi, the Islamic State(IS) commander, died during a US military operation in Syria, later confirmed by ISIS itself, was a welcome news for all fighting terrorism or suffering from it in any part of the world.  This was followed by death of their spokesperson and arrest of his sister and wife by Turkey. After the decimation of IS caliphate, IS continues to exist in small modules in many parts of the world, mainly in West Asia, but the loss of its undisputed leader who inspired many youth globally towards radicalisation as never before, during his peak performance days will not be easy to fulfil. He revolutionised the art of extending terror network through internet, made IS the richest terror group in the world, with a caliphate to govern through sharia laws and revived sex slavery. It’s a major setback to IS & affiliated terror groups but long overdue good news for those suffered its brutality like Yezidi women. The idea of IS does not end with leader, who stands replaced by Ibrahim al Hashemi al Qurayshi from Prophet Mohammad lineage (qualified to become caliph) with a vow to avenge Baghdadi’s death. There being no change in the overall aim and ideology of IS, it will manage to regroup with lesser fund flow and area of influence and wait for opportunity to re-emerge; hence the global fight against IS has to continue.

What does it mean for Regional Terror Groups?

The US has given a strong message to terrorists but its declared withdrawal from Syria is untimely; hence the Middle-East needs a fresh look from strategic perspective. Turkey cross-border offensive on October 9 against the Kurdish YPG militia, whose fighters made up the bulk of the SDF controlling IS is a game spoiler in fight against IS. Turkeys double game with terrorists is marred with helping IS and treating Kurds as terrorists as they demand a homeland. Its desire to invade Syria and destroy Assad’s supporters made it an ally of US, but US is not keen on decimation of Kurds, who will be left with no choice but to commence terrorist activities against Turkey. The temporary five days truce, sanctions against Turkey could buy some time, but is unlikely to change Erdogan’s intent who seems to have decided to go Wahhabi way. It does give some extra lifeline to IS, which is going to get dispersed to other areas, in addition to some existing ones like Afghanistan. US withdrawal also cedes this strategic space in Syria to the forces loyal to Assad and Russia, something which US was not very keen to concede till short while ago as it was not in the best interest of Israel. This strategic equation does not change the terror potential of Hamas appreciably.

The internal political disturbance Lebanon puts Hezbollah in tight spot. The current internal political turbulence in Iraq is helpful for reorganisation of IS as it dampens the Shia spirit which indirectly helps Sunni terror groups. The recent strategic clash between Iran and Saudi Arabia triggered by a drone attack on Saudi’s oil establishment followed by attack on Iran oil tanker is also a recipe for refuelling of Shia – Sunni terror competition in West Asia. After US walked out of JCPOA (Iran Nuclear Deal) renewed and clamped additional sanctions on Iran which European Union could not prevent, Iran has also climbed the escalation ladder by announcing to fill gas in over 1000 centrifuges to enrich uranium further, which it was holding out due to the deal. This is another dangerous spiral in the region to increase the insecurity of Saudi Arabia and may result in further push to Sunni cause.  These developments have blurred the definition of victim and oppressor. The internal turbulence of West Asia therefore is creating an environment for breeding terrorists.

After IS suffered these reverses it has opened opportunities and ignited some competition for other terror groups like Taliban and al Qaeda, to strive to gain the influence they lost to ISIS earlier. This has increased their quest to grab more power and money, a bulk of which comes from coercion globally, prove their terror potential to the target population and governments to get more attention, followers, logistics and other resources. It is however noteworthy a number of terror organizations having allegiance to IS have still not changed their allegiance, indicating that demise of IS may not be on the card so soon and the group is still not out of competition.

What does it mean for Afghanistan-Pakistan (Af-Pak) Region?

Afghanistan continues to face aggressive and coordinated attacks by ISIS’s branch in the region, the Islamic State’s Khorasan Province (ISIS-K) and the Afghan Taliban, including the affiliated Haqqani Network (HQN). Afghan Taliban seems to have grown much stronger for the fact that it controls more territory in Afghanistan than what it controlled when US forces marched in 19 years back. The fact that all world powers talked to them for peace (to fulfil their respective interests) indicate the blackmailing potential of Taliban.  Afghan National Defense and Security Forces (ANDSF) and remaining US forces have not been able to control their terror strikes despite their best efforts, which are likely to increase if US choses to withdraw completely. I do visualise some more efforts of global powers for talks to Taliban in near future.  Although al-Qa’ida in Afghanistan and Pakistan was degraded earlier by multinational forces, remnants of al-Qa’ida’s global leadership, as well as its regional affiliate – al Qa’ida in the Indian Subcontinent (AQIS), continue to operate from remote locations in the region have a reason to cheer Baghdadi’s death.

Pakistan continues to be the epicenter of global terrorism playing host to maximum UN designated terrorist organisations and terrorists in the world, a large No of them have indicated allegiance to IS. Pakistani military counter-terrorism operations are more of ethnic cleansing acts against Pashtuns and Baluchis directed against groups which conducted attacks within Pakistan, such as Tehrik-e-Taliban Pakistan (TTP). Pakistan Army and ISI supports externally focused groups such as Lashkar e-Tayyiba (LeT) and Jaish-e-Mohammad (JeM), which continue to train, organize, and fundraise in Pakistan with a narrative of pseudo Islamic Jihad. The Pakistani Army does not restrict the Afghan Taliban and HQN from operating in Pakistan and threatening US and Afghan forces in Afghanistan, despite being placed on the “grey list” continuously till date, since June, 2018.The support of Pakistan to Sunni terror groups is well known and IS is no exception. The increasing radicalisation of establishments in Pakistan, conglomeration of terrorist groups in Af-Pak Region is a dangerous sign as it indicates a caliphate in making, far more dangerous than ISIS caliphate.

What does it mean for South Asia?

After the declaration of the caliphate, the newly named Caliph, Baghdadi while addressing the jihadists the world over explicitly mentioned China and India as one of the prime targets of the ISIS amongst many others and there are no signs of change in that narrative. ISIS and other militant groups are attempting to spread their ideology to countries that have Muslim population, and where there is a chance to reach out to dis-satisfied youth. al-Qa’ida in the Indian Subcontinent (AQIS) and ISIS have together claimed responsibility for over 40 attacks in Bangladesh since 2015. The Government in Bangladesh continues to battle terrorism with strict Anti- terrorism Act in place, however terrorists do manage to operate there with backing from ISI, Pakistan. Terrorist organizations are using internet, social media to spread their ideologies and solicit followers globally including South Asia and many terrorists have been featured in multiple publications, videos, and websites associated with ISIS and AQIS. Terrorist attacks in Sri Lanka and rapid radicalisation in Maldives are some more examples of IS mastered methodologies to spread terror, which is likely to continue. 

India having the second largest Muslim population in the world is an obvious target for IS. India is a tolerant and pluralist society with a mix of Shias and Sunnis, which has absorbed all religious faiths, hence the rate of penetration of radicalisation has been extremely low, although some individuals have been attracted to it. Many Lone Wolf Attacks in Europe, like the suicidal car crash attack in Westminster in London on 22 March 2017, are a possibility in India as well, in future, for which it needs to be prepared. The Incidents like the train explosion in Bhopal-Ujjain express by a terror suspect, Mohammad Saifurullah alias Ali, allegedly a member of the ISIS(K) module, on 07 March 07, 2017 injuring 10 passengers, occasional display of IS flags in Kashmir Valley, bursting of few IS modules in South India by National Investigative Agency, announce the arrival of IS in India. These incidents need to be viewed in consonance with the global scene, wherein Daesh is looking for new hosts after decimation of their caliphate.

Recent Trends in Terrorism

The peaceful coexistence of IS, Taliban and al Qaeda in Afghanistan and so many terror groups in Pakistan indicates that they are also collaborating and economising on certain activities and efforts like intelligence sharing, training camps, arms transfers, irregular trade and related activities on mutual benefit basis, hence it is increasingly difficult to use one against the other, despite intense competition amongst some of them. They are generally keen to expand their terror industry under pseudo religious cause of avenging perceived atrocities to muslims and continue to fight security forces trying to disturb their design. Their fight against each other is rarely seen in recent times. The other interesting trend especially in Pakistan is that whenever a terrorist organisation is banned globally, it changes its name, registers as social welfare organisation, and continues terrorist activities as usual.

A very well organized media and cyber campaign by the IS by incorporating technologically savvy cadres from western countries affecting some Indian youth is still on. Some media news that it had gained access to fissile material and suspected access to chemical weapons like Sarin gas, indicates that its potential for global nuisance is far from being over. The same is being tried by other terror groups as well. To fight the global war on terror the world community will have to shun double gaming, individual country interest over global safety, the concept of good and bad terrorist and strict sanctions on terror sponsoring countries because terrorism cannot flourish without financial and logistics support.

Continue Reading

Intelligence

The Strategy of cybernetic on Practical of International Relations

Sajad Abedi

Published

on

The space for policy and cyber interaction or, more accurately, the “cyber policy” space, is considered to be the most recent and most important area of ​​interest among policy and international experts in the theoretical and practical field, which neglects it can cause serious damage and unpredictable for countries as the most important actors in the field of international relations.

Today, cyber policy and cyber security are discussed in the field of international relations and politics. Real space cyberspace is a real new field for influencing and, consequently, friendship, cooperation, competition, hostility and even war between nations and other actors. These cases show well that the Internet and cyberspace have provided a new field for politics, a space in which individuals, groups and governments are acting and policy makers.

Cyber policy is a bipartisan concept that refers to the interaction and coherence of the two arenas of politics (the place of friendship, cooperation, competition, conflict, and war on values ​​and interests) and the Internet (a new platform for acting). Some experts have gone even further and talked about cyber policy “great politics” versus “undercover politics”.

In the field of international relations, under the influence of the tradition of realism, international issues are divided into very important and crucial issues such as security and less important issues, such as economic issues. Some experts believe that because of the importance of cyberspace, cyber policy has to be considered as one of the most important, critical and security issues or great politics. They point out that today, millions of people worldwide have access to computers and the Internet, and each day they increase the number of users and the level and depth of Internet use, which provides a very important area for acting and, consequently, policy is making every day, the number of users as well as the level of technology is added. Under these circumstances, cyberspace plays an important role in guiding public opinion, creating priorities and desires, public diplomacy, spying, vandalism, war, conflict, and everything that actually forms the realm of real politics. As a result, cyberspace should be considered an excellent policy.

The theoretical framework and the most influential impact of cyberspace on politics and international relations are three main issues. The first issue is the presentation of a “conceptual order” to explain the relationship between cyberspace and politics. The second issue is identifying and believing in the widespread connection between cyberspace and politics. The third issue is the explanation of the route and the important issues in this connection.

 The theory of “surplus pressure” is the applicable theory in this field. The theory of lateral pressure means a new level of analysis beyond Stefan Walt’s three levels. He believes that cyberspace cannot be discussed based on previous levels and attitudes of people like Kenneth Boulding and Kenneth Waltz.

In addition to the three levels of “human”, “states” and “international system,” space requires a different level. At this new level, which is the “global level”, the impact of cyberspace is emphasized by the emphasis on the separation between the “social system” and the “natural environment.” At the global level, it is emphasized that the Internet space and its widespread impact on the world of politics cannot be discussed with the old levels that emphasize the individual or state or international arena. Internet space is a space for acting actors, non-state actors such as terrorists and private companies in terms of economic, cultural, security and even military. Therefore, it should be emphasized on the global level that, while combining the other levels, creates a broad interconnection between all levels and dimensions and is capable of analyzing other political space. Therefore, in lateral suppression theory, there is an attempt to establish a relationship between the individual, state and international levels as the old levels and the level of global analysis.

Based on the experience of the past decades, the Internet and cyberspace have affected the relations between countries, especially the United States and Iran. Indeed, a serious competition between countries in this area has a positive and negative or positive effect. In this conflict, major nations, including China and the United States, are trying to outsource the other in the field of technology, which has positive implications for the advancement of the Internet, but the Internet, meanwhile, has created a new atmosphere of competition, hostility and warfare, sometimes with some countries, including America and Iran have been attracted.

Regarding the content of the Internet and the role and policies of governments to control cyberspace, powerful nations are trying to influence the direction and overall space of the Internet and determine its future path. In contrast to the weaker countries in this area, they are struggling with a sophisticated look and feel, with influences such as content filtering, affecting the Internet. In such a space, the serious competition that has emerged between the West and the rest of the world has a different shape every day.

In the “cyber policy” space as a major new issue in the field of politics and international relations, as in other areas of politics, “values” and “interests” by various factors such as governments, organizations and government actors And non-governmental organizations, and even people who produce, distribute and consume. In fact, cyber policy, unlike the past, has placed new actors alongside governments as the most important actors in international relations, which are sometimes more capable and successful in the Internet.

However, apart from all the benefits and benefits of the Internet, the fact is that the Internet has provided “a new war space”, which is referred to as “cyber warfare”. In this type of war, countries and other actors use the Internet to spy, sabotage, and create insurrections, revolutions and even the destruction of military installations and vital centers of the other side.

Of course, the Internet has created a new space for “cooperation” and “interaction” between countries. In spite of this, the Internet has made the relationship between all actors, including governments, individuals, organizations and institutions, cheap and comfortable, due to its high speed and precision. As a result, the conditions for cooperation and engagement have been more interesting than before. While countries and other actors are aware of the need for extensive international cooperation on the Internet, they know that cyberspace has created a new area of international cooperation.

Regarding the widespread impact of the Internet on all aspects of politics and international relations through the spread of knowledge and knowledge of individuals, the fact is that the Internet has been instrumental in facilitating and expanding access to information and knowledge in the national and international arena. Individuals and communities have become more aware and more educated than before, and the world faces a new phenomenon called “Human Awakening,” which is known in Muslim countries as “Islamic Awakening.” As a result, political demands such as the consideration of democracy and the necessity of respect for the political independence of nations, reverence for cultural and religious values, the right to decent social economic development, etc., and increased sensitivity to issues such as the environment. Accordingly, the Internet has affected the field of action of countries and other actors.

Finally, a new atmosphere in the international arena that cannot be analyzed based on theories, approaches, and levels of the past is being analyzed. In fact, the content and philosophy of the new space, known as cyberspace, is very different from the past. In this new space, new types of friendship, cooperation, rivalry, hostility and war have been created alongside past patterns. Meanwhile, various and varied actors have been added to traditional actors that are very vague and unpredictable. Consequently, these conditions must emphasize new ideas, approaches and perspectives that are much more flexible and open to the past.

Cyber policy and cyber security in the current context are considered by the international relations experts as the main issue, along with older issues of war, economics, women and the environment, and even consider some of its importance more than other areas; Because the cyberspace has all the domains and the old ones.

For example, cyberspace has provided new conditions for cooperation and competition between countries and, of course, other actors in the military, security, political, economic, environmental, women’s, children’s, health, education and other fields. Therefore, the cyber space has created new conditions in which issues of international relations are presented in a different way, resulting in a new form of cyber policy, with particular implications for national and international security. Based on this, a comprehensive review of cyber policy and cyber security, and its impact on all domains, will reinforce the deployment of passive defense at the national level.

Continue Reading

Latest

Trending

Copyright © 2019 Modern Diplomacy