So far Al Baghdadi’s Caliphate has been very successful in using the techniques of psychological warfare. From professional footage and commercials of its ferocious executions, all the more brutal precisely because fear had to be instilled among the Western countries’ public, to the sequence of repeated threats about the future invasion of Europe by the “sword jihad”, to the Russian aircraft shot down in the Sinai, to the very publicized “allegiance” of Boko Haram, Al Qaeda in the Islamic Maghreb, the many jihadist groups in North Africa and Yemen, up to the threats regarding the “dormant terrorist cells” in the West.
An escalation which is both strategic and informative, because it aims at blocking the enemy’s defences and making it blind to possible new areas and moments of attack.
As the Qur’an maintains, the art of deception, carried out by the Prophet himself, applies to three cases: reconciliation between two or more Muslim litigants, reconciliation with one’s own wife and during war.
In the holy book of the Islam Allah is described as “the best of deceivers” (3:54, 8:30, 10:21).
“And fight them until persecution is no more and religion is all for Allah” (8:39).
Hence, whatever the truth of the operational and strategic threat, nothing has been forgotten by the Syrian-Iraqi Caliphate.
And it is exactly the specific cultural and political structure of the current jihad to make effective this mix of ancient Koranic doctrine and very modern psywar doctrines, of postmodern and information warfare with the most innovative technologies and the ancient tradition of the Prophet’s Hadith.
Obviously, the fact of having – from the outset – the contribution of the Stay Behind structures of the Sunni Iraqi Baathist forces for Isis – after the mad US choice, following the second Gulf War, to “put an end” to the entire apparatus of Saddam’s regime – was not irrelevant to define the complexity and sophistication of the Caliphate’s psychological warfare.
During an operation of Saddam’s forces in the Second Gulf War, carried out with simultaneous bomb blasts at a very large distance between them, the former Italian President, Francesco Cossiga, made me open my eyes to the fact that it was very likely for the Stay Behind Iraqi and Baathist network to be still fully operational.
In fact, Saddam Hussein’s covert structures had been prepared by France during the Cold War, and had remained hidden also for most Soviet “advisers” during the long Saddam Hussein’s regime.
Probably they re-emerged later with the destabilization following the so-called Iraqi “democratization”, thus finally creating their own autonomy with the “Caliphate”.
It is also worth mentioning here the very ferocious actions perpetrated in Paris and in Belgium.
Operations which can certainly be defined as symbolic, but not only so.
They aim at a showdown of strength not affected and conditioned by the enemy which primarily means: 1) we members of the jihad are already fully operational within your countries and we do not fear you; 2) hence we can hit when and where we want, without you ever knowing it. You, the “infidel”, have no way to hit us – hence do not do so because the fault and the effects would only fall upon you.
Suffice to recall here the burst of rhetoric and exceptional ignorance of historical and political facts against Israel: the official and hidden jihad propagandists maintain that if there were no Jewish State, there would be no Islam resentment against us – hence we should annihilate it by ourselves.
I.e.: accept our conditioning, so as to become our agents and, hence, allies untouchable by our jihad.
Therefore Propaganda + Action managed by ISIS and its operational-information system at the same time, with a view to frightening and taming the great silent front of permanent jihad.
Furthermore, the Caliphate’s operational psyops emphasize the cultural autonomy of European Islam vis-à-vis the multiethnic and multicultural societies- a breeding ground which will be fully completed and easy to manipulate, when there are Islamist parties within the EU and Koranic union organizations.
As was the case with the Autonomia Operaia movement during Italy’s so-called “Years of Lead”, a period of political turmoil characterized by terrorist attacks, which was the revolving door, cover and training area for the Red Brigades.
By means of violent actions, the Caliphate threatens the Western information and cultural world, which has to be convinced a) that it is never possible to fight the jihad on its own territory, and b) that the European Union and the United States must give up supporting Israel.
And, most importantly, they have to surrender unconditionally to the jihad. Only after absolute surrender there will be peace.
Once again the Koranic criteria for war apply: .if they (the unbelievers) propose peace, accept it and trust in God. God is All-Hearing and All-Knowing (8:61).
The communication variable, vis-à-vis Osama Bin Laden’s jihad, is that – for Isis – the West must no longer withdraw its support for the “takfiri”, the “apostates” of the Gulf monarchies that, however, support almost officially the new Caliphate’s territorial and statist jihad.
Their operating logic is the one against the Iran of the Shi’ites “infidel”, of their supporters. Previously, with Bin Laden’s “solid base” (Al Qaeda al Sulbah), this variable was fully secondary.
Another aspect of propaganda for the second-generation Islamic young proletarians born in Europe is that the “new State” of the Syrian-Iraqi Islam is also a myth, a source of livelihood in the EU and US crisis, and especially a source of glory in fighting – in short a flag, a banner for which to live and die.
It is the myth that has always mobilized peoples.
Therefore it is a multi-layer propaganda, as is always the case in every old and modern psywar operation.
Nevertheless, as all psyops, it must never be repetitive.
Quite the reverse. It must always be very innovative and incorporate that clever and unexpected move which distorts the enemy’s communication, intoxicates it and leads the enemy to self-made defeat.
Here the lessons to be learnt from the Russian Federation and China are crucial: the former has materially and completely eliminated its jihad in Chechnya, without any restrictions – and this is the reason why, after breaking the operational arm of the proxy warriors on its territory or along its vital borders, it can afford a regional war in Syria against the jihadist allies of the petromonarchies.
Without obstacles whatsoever, except for Turkey, reduced to a proxy of Saudi Arabia despite the fact that President Erdogan’s AKP was born as an offshoot of the Muslim Brotherhood and that them, among the Saudis, are put to death.
It was a university professor of the Brotherhood, in Riyadh, to radicalize the young Osama Bin Laden.
It is also worth recalling that Russia’s power on oil and gas enables it to strike a geoeconomic blow against OPEC, maybe short but very hard, in terms of management of the oil and gas market – an option we obviously lack completely.
Everything happens just when Saudi Arabia, for the first time since 2015, has recorded a budget deficit and its entry onto the global market of public debt.
Therefore the Russian one is not a hidden challenge to be disregarded and set aside with conceit.
Hence elimination of the ways, means, intermediaries and areas of a future destabilizing proxy war for Moscow.
The aim is to subsequently negotiate, without limits, also with the countries supporting the jihad against the European Union, by having good cards to play and not just paying lip service to humanitarian principles.
Conversely, China’s following actions can be regarded as anti-jihadist: the geoeconomic equalization of all the forces on the field; the use of buffer areas for specific initiatives – just think of China’s aid to Pakistan, one of its long-standing friend in the region, for the Gwadar port; the opening to India with its recent entry into the Shanghai Cooperation Organization.
China does not even neglect sending as many as 5,000 units of its elite forces, such as the Siberian Tiger and assault troops that, after the “green light” to the specific law given by the People’s Congress on December 28, 2015, can operate abroad.
If Turkey wants to open its front after the clash in Syria, it will know what it will be heading for.
In particular, China wants to avoid the contagion between the Uighur Xinjiang and the Syrian jihad, considering that the region of Turkmen Muslims borders with Kyrgyzstan, Tajikistan, Afghanistan, Pakistan and India.
It is not to be ruled out that some Chinese units are already positioned for a “hybrid war” and an operational psywar in the hottest areas of the Syrian-Iraqi region.
Hence Russia and China already have the strength to wage and fight an asymmetric warfare against another asymmetric warfare, without limits of territorial borders, “humanitarian” rules to be followed, agreements between countries with inattentive and fearful publics, numbed by self-destructive slogans such as Charlie c’est moi or insanely pacifist appeals just after the Paris attacks.
Each hybrid war is fought only with another hybrid war.
And it is worth recalling that it had been the Atlantic Alliance to invent, in 2014, the concept of hybrid war, by thinking of the Russian operations in Ukraine, thus defining the so-called “ambiguous warfare”.
Hence if a definition is sought, the ISIS jihad is precisely waging a hybrid war against us.
A conflict with no time and space limits, using legal forces and illegal structures, organized crime and official elite structures, information warfare and the official news networks.
The purpose of these specific psyops is to include an unpredictable mechanism in the enemy’s decision-making process, which makes it either unable to provide an adequate response or suitable for an equally dangerous oversized response going in the wrong direction.
Furthermore, the enemy has to be indirectly trained – thanks to the “hybrid” jihadist psyops, because also military actions are communication – not to be able to foresee or accuse anyone, or rather, to have to always accuse the wrong perpetrator of the jihad striking it.
And this is done in order to expand the front of its enemies and to make the area of its sensitive targets further unpredictable.
But, of course, the hitting subject is always the true “centre of operations”, the vertical core of the jihadist command structure, through any operational arm, always occasional or even unaware of who is really engaging it.
This mechanism holds true also for the Egyptian airplane flying from Paris to Cairo.
On the basis of the information available to us, the US intelligence services had already discovered an ISIS specialized team operating in Raqqa for weeks, which probably planned the attack against the EgyptAir airplane, hit 288 kilometres north of Alexandria.
Considering that these operations are never programmed alone and are planned long in advance, for obvious reasons of secrecy and compartmentalization, it is very likely that from now a swarm of terrorist or, more exactly jihadist, attacks will take place in the European Union and probably also in the United States.
This is exactly the reason why Paris and the other European capitals – as well as the Egyptian intelligence services that are still suffering from the ambiguous defamation of the Regeni affair – tend not confirm the terrorist nature of the attack against the Egyptian airplane.
Obviously if they confirm so, they will prove to be weak, while if they do not confirm so, they will be in a position to temporarily play down and defuse the ISIS jihad, not to mention the fact that, traditionally, each air strike entails a future ground operation.
This also implies that – as already happened – the Head of the US forces in the Middle East, General Votel, has recently travelled secretly to Syria to visit the YPG Kurdish base and the US special forces in their base of Ramelan, about 288 kilometres from Raqqa.
The AH-64 Apache combat helicopters can easily attack the Caliphate’s capital, while the Kurdish forces of the YPG unified command, which have not been invited to the negotiations in Geneva and Vienna, will operate on the ground, also with new weapons.
The relations between the United States and Egypt are still weak, but there is news of joint actions by the US Special Forces and the Egyptian operational Services against the ISIS areas in the region around the Tobruk port.
Therefore, the rules of asymmetric warfare are as follows: 1) hit secretly; 2) when the strike is successful, decide whether to spread the precise news or create “information intoxication”. The decision depends on whether you still want to cover the action base or whether, since already quickly shifted, you can make it public and then 3) create information ambiguity not only in the enemy’s data, but above all in its decision-making process.
This is the hybrid war of the ISIS territorial jihad and of its covert bases abroad. Hence this is the ground for implementing and testing the Western equal and opposite strategies (Opposing Force, OPFOR), without fear, without false moralism and, above all, without the old-fashioned idea – which was buried with the Cold War – that we should only “contain” the enemy.
The enemy must be eliminated, and above all be destabilized internally by demoralizing it, by spreading news intoxicating its decision-making process, by destroying the morale of its soldiers, by defaming it and thus undermining its relations with friendly States or its hidden covers.
It is the phase – new for the West – that in 1996 two Chinese Colonels, Quiao Liang and Wang Xiangsui, defined “the unrestricted warfare” in a book published in the West two years later.
OSINT in Current and Future Military Operations
In recent years, the international security environment has evolved in a way that lays greater emphasis on information gathering and analysis. This is largely due to the proliferation of digital technologies and the internet, which have made it easier for individuals, organisations, and governments to access, share, and disseminate information. As a result, the traditional concept of ‘national security’ has expanded to include cyber security, information security, and online propaganda.
In this context, ‘Open-Source Intelligence’ (OSINT) has emerged as an important tool and resource for governments, militaries, intelligence organisations, and individuals. It refers to information that is publicly available and can be collected from a wide range of sources, including the internet, social media, newspapers, and government websites.
The rise of information warfare and the need for intelligence on digital fronts has made OSINT an even more crucial resource for organisations dealing with the national security of a state. Various examples and case studies show it can provide valuable information that can be used to make informed decisions about foreign policy, intelligence operations, and military strategy; understand and respond to global security threats; support military operations; and gain a deeper understanding of conflicts. By analysing data from various sources such as social media, online forums, and satellite imagery, OSINT analysts can gain a better understanding of movements and activities in conflict areas. For instance, the US military used OSINT to track and monitor the Islamic State of Iraq and Syria (ISIS), through information on the location, movements, and activities of ISIS leaders and fighters, as well as its financial and logistical networks. Thereby, becoming a true force multiplier.
Not only this, OSINT can be used to monitor and counter disinformation, propaganda, and misinformation, which are widely used by state and non-state actors to influence public opinion and political decisions. The ongoing Russia-Ukraine War, characterised by a high degree of disinformation and propaganda on both sides, is also a case study of OSINT. One of the key aspects of OSINT in this war has been the use of social media. Social media platforms such as Twitter, Facebook, and YouTube have been used to disseminate information by the warring parties. OSINT analysts have been able to use these platforms to track the movement of troops, equipment, and weapons. They have also been able to identify and track individuals and organisations that have been involved in the conflict. Besides social media, another important aspect of OSINT in the Russia-Ukraine War is the use of satellite imagery. Analysts on both sides have been able to use satellite imagery to accurately track the movement of troops and equipment, as well as to identify and track changes in the terrain. OSINT specialists have also been able to track the flow of money to different groups and individuals involved in the conflict, which has helped to identify potential sources of funding for the war.
Since OSINT allows for the collection of information from a wide variety of sources, it enables a more comprehensive understanding of the situation on the ground, while also allowing for cross-referencing and verification of the information. Another advantage of OSINT is that it is relatively low cost and accessible to a wide range of individuals and organisations. This has enabled a diverse group of actors, including journalists, researchers, and analysts, to play an active role in monitoring and analysing conflicts worldwide.
Despite these advantages, it is important to note that OSINT is not without its limitations. The information collected from open sources may be incomplete, biased, or even deliberately misleading. It is also important to be aware of ‘information pollution’ where a large amount of false or misleading information is spread deliberately to confuse or mislead.
In short, OSINT has become increasingly relevant in today’s strategic environment due to the abundance of open-source information. As conflicts become more complex and globalised, it is essential for governments, military organisations, and other stakeholders to have access to accurate and timely information in order to make informed decisions in a variety of fields, including cyber security, intelligence, surveillance, and national security. As the world becomes more interconnected and the amount of publicly available information continues to grow, the use of OSINT is likely to assume a critical role alongside traditional means of intelligence gathering.
Chinese spy balloon over Latin America
Intelligence gathering has been conducted using balloons since the 19th century, and their usefulness has significantly declined. During the 1950s, the U-2 spy plane was used to spy on the Soviet Union, and the country’s satellites were eventually replaced by the Corona reconnaissance units. A Chinese balloon that drifted across the US has raised concerns about people’s knowledge.
Sending out balloons is not an ideal strategy for gathering intelligence. They are not designed to be easily hidden, and they tend to go where the winds lead. During World War II, Japan launched incendiary devices known as firebombs into Washington state in an attempt to destroy Seattle. Unfortunately, they were unable to get them to fly over the city. Since a balloon will never return to its base, it has to find a way to retrieve the data it collects. During the 1960s, the US developed a system that allows a plane to snatch the payload from a reconnaissance satellite. Unfortunately, using this method would be very risky for China.
If China wants to collect intelligence, it should consider using a parachute to land the payload on the ground. This would prevent the people from recovering it unless the country has people in places such as Labrador or Montana. The balloon could also transmit data to a Chinese satellite. Not being able to retrieve the data collected by a balloon is a waste of money and time. China has numerous spy satellites that fly over the US every day. These satellites collect various data points, such as radio signals and photos. The country launched four more satellites last year. Since China has never used balloons for espionage, it is believed that the incident was caused by an error. The country’s meteorological agency might have lost the balloon, which is the basis of numerous UFO sightings.
Despite China’s claims that it does not spy on the US, it is still conducting a massive espionage campaign against the country’s allies and the US. This is more extensive than the operations carried out by the Soviet Union during the Cold War. Until 2015, America was still accepting Chinese espionage as a cost of doing business with the country. The U.S. was wrong when it believed that China was using a balloon for espionage. The country reacted after the Office of Personnel was hacked in 2015, which revealed the private information of millions of employees. If the U.S. is truly interested in learning what the balloon is capable of, it should shoot it down. The incident has highlighted the need for China to reduce its espionage activities as the U.S. is on edge. Americans must learn from this and act more aggressively to prevent this kind of behavior from happening in the future. Some of the measures the U.S. can take include increasing the number of FBI agents, establishing more effective cyber security measures, and negotiating with the Chinese government directly. The use of Chinese balloons is a distraction, and this will not stop the country from carrying out its espionage activities. As aggressive as China is, focusing on them is like looking into the bedroom every night for its spies.
Montana has long been a location for the US’ nuclear weapons. One of the country’s major missile silos is situated in the state. The Pentagon revealed that a Chinese spy balloon was detected flying over various sensitive sites in the US. It’s believed that the route the object took could be linked to Montana’s nuclear facilities. During a briefing in Washington DC, the Pentagon confirmed that the object was spotted in Montana. It was revealed that the balloon had flown over the Alaskan islands and Canada before it entered the US.
The Air Force’s Malmstrom facility is situated in central Montana and houses 150 intercontinental ballistic missiles (ICBM) silos. The Pentagon stated that the balloon did not pose a threat to civilians and was currently flying at an altitude well above the commercial air traffic. This type of activity has been observed in the past. After learning about the incident, the US government launched an immediate response to protect the sensitive data inside the balloon. The country’s fighter jets were dispatched to intercept the object. Despite the government’s initial response, the Pentagon decided not to launch a missile against the object. The agency noted that the balloon’s size could create a dangerous debris field. On which, China responded about the incident and it stated that it was looking into the matter and urged the US to remain calm. According to the country, it has no intention of violating other nations’ airspace and territory. China is a responsible nation that follows international laws. It does not intend to violate the airspace or territory of any country. Foreign Ministry spokesperson Mao said that the country was taking the matter seriously. The public should refrain from speculation and hype until the details of the incident are clear. This official also stated that the public should wait for more information before making judgements.
According to a statement released by the Chinese government, the balloon was a civilian airship that was used for meteorological research and it was malfunctioned due to wind. It deviated from its intended flight path due to the Westerlies. China expressed its regret over the incident and noted that it would continue to communicate with the US. The country’s foreign ministry also said that it would handle the situation properly.
India’s Strategic Use of TTP to Undermine Pakistan’s Stability
Again, bloodshed in the city of flowers, with more than 90 martyrs and at least 250 injured in a suicide attack by the Tehrik-i-Taliban Pakistan in Peshawar. India’s backing for the TTP and its participation in the group’s avowed jihad against Pakistan have emerged as the most important security challenges in South Asia, with significant ramifications for regional stability and peace.
The Tehrik-i-Taliban Pakistan (TTP), commonly known as the Taliban in Pakistan, is a Pakistan-based Islamist extremist group. The group, which was founded in 2007, has claimed responsibility for a number of fatal assaults against Pakistani civilians and military personnel. TTP has proclaimed war against Pakistan’s government and military forces, arguing that they are not Islamic enough.
TTP has become a major security danger to Pakistan over the years, spreading widespread fear and instability. The group’s constant strikes on civilians and military targets have resulted in hundreds of deaths and massive devastation. The rising frequency and savagery of TTP assaults has caused considerable alarm among Pakistanis and the international world. Despite significant international criticism, the TTP continues to carry out atrocities with impunity.
Evidence of India’s Support for TTP:
Over the last decade, Pakistani security services have often reported on the Indian intelligence agency (RAW) providing support to the TTP. This assistance has been reported to include financing, training, and weaponry, all of which have aided the TTP’s capacity to carry out strikes against Pakistan. Pakistani officials, security professionals, and independent investigators have claimed India’s participation with TTP, citing proof of Indian involvement in TTP activities and divulging the false flag operations.
TTP commanders obtaining safe shelter in India is another piece of evidence pointing to India’s connection with TTP. TTP commanders have been said to have crossed the border into India for medical treatment and then stayed for lengthy periods of time. The granting of safe haven to TTP commanders implies that India is not only supporting the organization, but also shielding its leaders from prosecution and reprisal.
In addition to the Indian intelligence agency’s direct backing for TTP, there have been claims of Indian media outlets distributing misinformation in favor of TTP. This has included interviews with TTP officials and positive coverage of TTP’s efforts by Indian news sources. The media coverage has been interpreted as a means for India to legitimize the TTP’s conduct and seek sympathy from the world community.
India is contributing to Pakistan’s instability by supplying TTP with the money, safety, and legitimacy it requires to carry out its assaults.
India’s Motives Behind Supporting TTP:
One of India’s key motivations for supporting the TTP is to undermine Pakistan’s government and military. By assisting the organization, India is able to undermine Pakistan’s ability to maintain security and stability, creating an atmosphere in which the TTP may operate with impunity. The ultimate purpose of this assistance is to weaken Pakistan’s military and political institutions, making it easier for India to achieve a regional advantage.
Another reason India backs the TTP is to create a political and security vacuum in Pakistan. By assisting the organization, India may foment turmoil and instability in the country, creating possibilities for India to exploit the situation. The political and security vacuum left by the TTP’s operations can then be utilized by India to further its own goals and acquire more influence in the area.
India’s backing for the TTP might also be interpreted as an attempt to shift attention away from its own human rights violations in Kashmir. By assisting the TTP and producing turmoil and instability in Pakistan, India is able to divert attention away from its own activities in Kashmir, which have been severely condemned for abusing the human rights of Kashmiris. By helping TTP, India can divert attention away from its own acts and position itself as a responsible regional actor.
The Consequences of India’s Actions:
One of the most serious consequences of India’s backing for the TTP is the worsening of terrorism in Pakistan. India is feeding the fire of terrorism in the area by supplying finance, training, and equipment to the group, making it easier for TTP to carry out its heinous actions. This has had a significant influence on Pakistan’s security and stability, as well as the safety of its population. Terrorism has exacerbated violence and loss of life, creating an environment of dread and insecurity throughout the country.
India’s backing for TTP worsens regional tensions and instability. The rise of terrorism in Pakistan has heightened tensions between Pakistan and India, as well as between Pakistan and its neighbors. This has produced a climate of insecurity and uncertainty in the region, threatening regional peace and security. As each side gets more entrenched in its stance, the international community’s ability to find a solution to the crisis has become more difficult.
India’s backing for TTP has had a significant influence on regional peace and security. The rise in terrorism and tensions has made it increasingly difficult to establish regional peace and stability. This has had a detrimental influence on the region’s economic development, social advancement, and people’s well-being. The continuation of violence and insecurity has also made it more difficult for the international community to address the underlying causes of conflict and work toward a long-term solution.
The international community must take steps to confront India’s backing for TTP. India’s activities are clearly against international law and standards, and they endanger regional peace and security. The international community must strongly denounce India’s conduct and endeavor to hold those involved accountable for their acts.
Holding those involved accountable for their conduct is critical to preventing such incidents in the future. The international community must act to bring individuals who promote terrorism and destabilize the area to account. This involves investigating and punishing individuals responsible for supplying TTP with support, as well as those involved in planning and carrying out terrorist actions. Only by taking firm action can we expect to restore stability and security to the area and prevent such actions in the future.
The U.S. Approach to Deal with China
For all the talk about the World entering a new global era, the past year bears a striking resemblance to...
Nations and Capital:The Missing Link in Global Expansion
Most theorists of nationalism claim that nationalism is a modern phenomenon. However, they commonly fail to notice that the phenomenon...
The Challenges of Hybrid Warfare in Pakistan
Hybrid warfare refers to the use of a mixture of conventional and unconventional military tactics and techniques in order to...
Blinken’s visit to China and Moscow’s announcement of the visit of Xi Jinping to Russia
The visit of Anthony Blinken US Secretary of State to China comes after the official Chinese announcement of the visit...
The current economic crisis in Egypt and the attempts to drag the Egyptian army into a war against Iran
The United States of America is trying to force Egypt to enter into a regional war against Iran for the...
Israel gives Ukraine intelligence. “The best thing” that could have happened to Israel-NATO relations?
NATO sources tell ‘Haaretz’ some of the intel is on the Iranian drones in Ukraine, writes Yossi Melman at Israeli...
Why the Indo-Pacific turned out the US center of strategic gravity?
As a dominant power, the US keeps grave concerns about its hegemonic position at all times. Because the decline of...
Europe4 days ago
The Giedroyć-Mieroszewski Doctrine and Poland’s Response to Russia’s Assault on Ukraine
New Social Compact4 days ago
Misinformation Backfire on the COVID-19 Vaccine – Exposed
Middle East3 days ago
Sisi’s visit to Armenia and Azerbaijan to join the Eurasian Union and BRICS
Economy4 days ago
The Crippled Economy
World News4 days ago
More Americans believe US provides ‘too much support’ to Ukraine
World News3 days ago
February 19: An anti-interventionist coalition to March to White House from Lincoln Memorial
World News4 days ago
Sergey Lavrov: ‘If you want peace, always be ready to defend yourself’
Economy3 days ago
Prospects of Vietnam’s Economic Growth in 2023