Dr. Matthew Crosston & Anonymous(*)
Every month another story of cybertheft linked to China or Russia emerges. Recent data breaches at Target, United Airlines, Blue Cross Blue Shield, and OPM have been linked back to Russia, while theft of key technology across major Department of Defense contractors such as Lockheed Martin and US government laboratories have been linked to China.
Neither China nor Russia’s government formally admit to leveraging the internet to steal secrets from other countries but hacks have been linked directly to their intelligence services’ respective buildings or individuals known to be under governmental influence. International cyber incidents in Ukraine, Georgia, and Estonia have all been apparently linked back to Russia while the Canadian government recently set up domestic cyber-protection programs after several major corporations were hacked by Chinese intelligence. The US government struggles on how to approach these cyber intrusions. Should they be ignored so that other foreign policy initiatives can move forward? Are these initiatives acts of war or a new method of state gamesmanship? Do these collections of vast amounts of information count as high treason/espionage or simple economic theft? Environmental negotiations just about broke down several years ago when President Obama called out China for hacking several governmental systems during the negotiations. What does all of this signify as Russia and China become more important strategic world partners, while still at least semi-maintaining long-held intelligence and military adversarial attitudes toward the US? Welcome to the REAL cyber era, where multiple players try to steal the world one byte at a time while pretending to do nothing of the sort.
The Chinese, American, and Russian intelligence services have no issue launching clandestine internet attacks to pursue what they all consider to be legitimate national security and foreign policy objectives. Sometimes the information collected is economic, directed against or about important corporations; other times the information is military and political. In all cases the information is highly strategic. While it is true that the information the Russian and Chinese intelligence services are providing to their respective policymakers is much broader in scope than the CIA or US Department of Defense, and is arguably much more domestically invasive than the FBI or DEA, both Russia and China have successfully started campaigns questioning the ‘purity of purpose’ within American intelligence given the details of the Snowden scandal. All of which begs questions: should American intelligence maneuvers match Chinese and Russian cyber precedence? Is the American public aversion to cyber collection programs really just a front for a private philosophy that already rivals China and Russia? Is there something fundamentally important for states to consider in this style vs. substance cyber spy debate?
Crucial differences in intelligence organizational culture and mission make figuring these questions out quite difficult. While the United States has been quick to leverage open-source collection for its own programs, it has supposedly been hesitant to execute the power of its cyber abilities in invasive, offensive, global scenarios (although this consideration is now being heavily debated in the classified sector and some accuse it of already transpiring). This article will attempt to determine if Chinese and Russian intelligence services have gained a tactical advantage over the United States because of a political and bureaucratic blind spot, or if the United States intelligence collection culture is different only at the superficial level and is largely the same as its rivals in terms of true cyber substance.
The first important aspect in understanding the Grand Cyber Game is to understand how the Russian, Chinese, and US intelligence communities are structured. The United States is known for the ‘big brothers’ of its IC, the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA). However, there are actually 17 members of the US Intelligence Community. Some of these include intelligence offices for each branch of the US military, Department of Homeland Security, Department of Energy, Department of State, Department of the Treasury, Drug Enforcement Administration, National Reconnaissance Office (NRO), and National Geospatial-Intelligence Agency (NGA). The first five use intelligence collection as part of a law enforcement mission, while the NSA, NRO, and NGA all harvest data and imagery collection. Traditionally, the CIA operates overseas and cultivates human sources while conducting clandestine operations. The FBI traditionally manages counterterrorism operations domestically, provides investigation support overseas when American citizens are involved, and acts under an enforcement jurisdiction to maintain the law. The NSA was established to provide cryptologic services and to protect US information systems and signals intelligence. It supports military customers, national policymakers, and counterterrorism and counter-intelligence communities under the Department of Defense. However, in a post-9/11 world, these explicitly defined roles have become more blurred and opaque as global travel and transnational collections are intensely complicated by the internet.
Conversely, modern Chinese intelligence services have always had domestic and international missions intertwined. China’s Ministry of Public Security (MPS) was formed in 1954 as a domestic law enforcement agency. It managed criminal investigations, security protection, public information network security, traffic control, legal affairs, counter-terrorism, drug control, and other anti-smuggling and anti-corruption duties. In 1983, the Ministry of State Security (MSS) was established as the formal intelligence and security agency of China for non-military areas of interests. It has the same authority to arrest or detain people as the MPS with a nearly identical oversight mission by the courts, but it is also a separate, parallel network to the MPS. The MSS mission is to ensure “the security of the state through effective measures against enemy agents, spies, and counter-revolutionary activities designed to sabotage or overthrow China’s socialist system.” Similar to the CIA, the MSS gathers foreign intelligence from targets in various countries overseas while the MPS gathers information domestically to protect against domestic terrorism and political coups. Both heavily rely on cyber collection.
Russia operates with three principal intelligence services. The SVR focuses on foreign intelligence collection, but mainly with civilian affairs. It is formally responsible for intelligence and espionage activities outside the Russian Federation. The GRU is the main foreign military intelligence directorate of the General Staff of the Armed Forces. It is Russia’s largest foreign intelligence agency, deploying at least six times as many agents as the formal KGB successor, the SVR. The FSB operates in theory only across the former Soviet Republics and domestically, but having had its operational portfolio increased in 2003 to include the Border Guard Service and the Federal Agency of Government Communication and Information. The three intelligence services often overlap and sometimes compete against one another in the recruitment and collection of intelligence sources. Russia also established an Anti-Terrorist Center that falls under full control of the FSB. The Center’s mandate was to create a database for intelligence sharing among the security services of all members of the Commonwealth of Independent States (CIS). Although the SVR has promised not to spy within CIS territories, the FSB has not. As such, it has become the de facto leading intelligence service for foreign collection activities for Russia. Interestingly, Russia has often turned a blind eye to Central Asian intelligence service activity within its borders, when Central Asian leaders are making moves against so-called political enemies (these moves are usually abductions back to Central Asia for detainment). These activities have included both the Chinese MSS and MSP. In 2001, the Shanghai Cooperation Organization (SCO) was established by China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan, to work together against terrorism, separatism, and extremism. They established their own Regional Anti-Terrorist Structure (RATS) that became the mechanism of choice for carrying out abductions across national boundaries, outside of standard judicial procedures. RATS operations have been compared to the CIA’s practice of extraordinary rendition and allow members to detain suspects in the six participating states outside of any rule of law. The members’ operators are not subject to criminal liability and they are immune from arrest and detention within the six states.
The reality is, on an international level, the intelligence services of all three nations operate with remarkably similar mission goals and objectives: they wish to protect the national interests of their respective states and garner advantages for said states via the acquisition of important information. While Hollywood has often focused on the political deviance and violence of intelligence missions around the world, the less exciting reality is that intelligence is more often utilized simply for political leverage. On the domestic level, the United States has long-held the moral superiority card against rivals like Russia and China, largely based on the democratic system in America supposedly being more altruistic and legally-minded than the so-called autocratic-type regimes in Beijing and Moscow. Snowden and other details in the past several years have started to make some at least wonder how much that moralism is built upon a foundation of sand and not stone. Finally, the stylistic aspect of intelligence public relations is significantly different between the three: the US decidedly tries to maintain an air of secrecy and deniability over just about everything its Intelligence Community does or needs to do. Russia and China, while revealing no secrets, tend to be a bit more unabashed about the role and necessity intelligence plays for the furthering of state power and do not fear making public statements to that effect anywhere, anytime. For them, therefore, the only difference between the three great players in the Grand Cyber Spy Game is the costuming and marketing of their respective goals, but NOT the ploys, initiatives, and overall desires. When it comes to winning, it seems all three are set and determined to virtually steal, that is, ‘obtain’ as much as possible. The Grand Cyber Spy Game demands no less.
(*) Anonymous is currently a graduate student in International Security and Intelligence Studies at Bellevue University and works within the US governmental system. The opinions expressed are strictly personal and do not reflect a formal endorsement of or by the United States’ government and/or Intelligence Community.
Towards Increasingly Complex Multipolarity: Scenario for the Future
A “New World Order” (NWO) is emerging before everyone’s eyes, said Aleksandr Fomin, Russian Deputy Defense Minister, in an interview for RT earlier this month. He is quoted by the outlet as saying that:
“Today we are witnessing the formation of a new world order. We see a tendency for countries to be drawn into a new Cold War, the states being divided into ‘us’ and ‘them’, with ‘them’ unambiguously defined in doctrinal documents as adversaries. The existing system of international relations and the security framework is being systematically destroyed. The role of international organizations as instruments of collective decision-making in the field of security is being diminished. Fundamentally new types of weapons that radically change the balance of power in the modern world are emerging, with warfare getting into new areas – into space and cyberspace. This, of course, leads to a change in the principles and methods of war.”
He did not elaborate any further beyond that but it is still possible to make some reasonable conjectures about the NOW’s contours based on empirical evidence to speculate about possible implications.
The processes described by the Deputy Minister can be attributed to a combination of Trump’s US-Chinese trade war that provoked a new Cold War mostly between those two great powers—or “superpowers” according to some—and a World War C, the full-spectrum paradigm-changing processes catalyzed by the world’s uncoordinated attempts to contain COVID-19. The former resulted in purging the U.S. permanent military, intelligence, and diplomatic bureaucracies (the “deep state”) of any pragmatic Chinese-friendly influence as well as comprehensively redirecting the might of the American military more fully against the People’s Republic. This second-mentioned observation made it all but impossible for the supposedly Chinese-friendly Democrats to reverse Trump’s grand strategic designs following Biden’s inauguration, which is why they, too, have finally jumped onto the anti-Chinese bandwagon.
As for the World War C, it exacerbated the already intense global competition between the U.S. and China, thereby putting additional pressure on American policymakers to pioneer a strategic breakthrough designed to give them an edge over their top global rival. The specifics of their strategic calculations can only be speculated upon, but it is apparently the case that the previously Russophobic Democrats have recently engaged much more pragmatically with Russia over the past month. This is evidenced by the seemingly surprising de-escalation in Ukraine back in late April from the brink of what many thought would be an all-out war between the two, the U.S. equally surprising decision to impose mostly superficial sanctions on Nord Stream 2, the Pentagon spokesman’s unexpected declaration that Russia is not an “enemy” as well as the upcoming Putin-Biden Summit—despite the U.S. leader previously calling the Russian President a “killer”.
Strategic Designs of the “Deep State”
The Democrats—or rather the “deep state” forces behind them—evidently realized the strategic wisdom of Trump’s grand vision of repairing relations with Russia so that the U.S. can concentrate more fully on “containing” China. This is not due to any newfound appreciation of the Eurasian great power, which many of them still hate with a passion on account of its pragmatic dealings with Trump and implementation of conservative policies that contradict the much more liberal approach preferred by American elites, but due to simple pragmatism countering the geostrategic consequences of Trump’s previous four years of global disruptions. With the U.S. military-industrial complex (MIC) increasingly redirected towards “containing” China more than Russia, as is evident from the doctrines that were promulgated during Trump’s presidency and the subsequent shifts in policies, the “deep state” basically had no other choice but continue the course, no matter how begrudgingly.
This explains the expectation that Bidenэs EU trip will lead to a comparative improvement of relations with Russia, even if only resulting in each of their “deep states” regulating their comprehensive competition with one another more responsibly. Russia would receive a relative relief in pressure along its Western flank while the U.S. could redirect more of its military-strategic focus from Central and Eastern Europe (CEE) to the “Indo-Pacific”. The continuation of the Obama-era “Pivot to Asia” under the Trump and Biden Administrations is proven by both of their moves to reduce the U.S. military-strategic commitments in West Asia (Syria/Iraq) and Central-South Asia (Afghanistan). Biden’s decision to withdraw from Afghanistan was rather unexpected, considering the Democrats’ prior opposition to any of Trump’s policies, but only speaks to how they have been compelled by the circumstances to revise their grand strategic outlook.
The Eurasian “Balancing” Act
The arguably emerging NWO will be characterized by plenty of “balancing”, especially as regards Russian, Turkish, Indian, and Chinese grand strategies in Eurasia:
The Eurasian great power will seek to optimize its Afro-Eurasian “balancing” act between West and East, the former comprising the U.S./EU while the latter encompassing China vis-a-vis BRI; India with respect to the possibility of jointly leading a New Non-Aligned Movement (Neo-NAM); Turkey insofar as managing their “friendly competition” especially in West Asia, the South Caucasus, Central and Eastern Europe (CEE), and perhaps soon in Central Asia as well; and Africa when it comes to scaling up the export of Moscow’s “democratic security” solutions to hybrid war-threatened states.
The West Asian great power will double down on its “Middle Corridor” to China via the South Caucasus, Caspian Sea and Central Asia (made all the more viable after its Azerbaijani ally’s victory in last year’s Karabakh War); expand the aforementioned to more closely connect with its Pakistani ally via a revival of the Lapis Lazuli Corridor; further entrench itself in Northern Syria; leverage its Muslim Brotherhood allies for the purpose of expanding its ideological influence throughout the international Muslim community; and continue making inroads in Africa and CEE (especially through arms sales).
The South Asian great power will attempt to use Russia and the U.S. as “balancing” partners for preventing disproportionate dependence on China (though probably moving closer to Moscow than Washington in response to the latter’s recent pressure upon it via S-400 sanctions threats, negative media coverage of its government, violation of its exclusive economic zone and continued failure to reach a free trade deal); explore a detente of sorts with China for the sake of pragmatism; and revive the joint Indo-Japanese Asia-Africa Growth Corridor (AAGC) to attract more (mostly Western) stakeholders to its campaign to economically compete with China across the Global South.
The East Asian great power will pursue the formation of a Chinese-Muslim bloc in the Eurasian Heartland by leveraging its strategic partnerships and planned W-CPEC+ connectivity with Pakistan, Iran, and Turkey (which might extend as far as Syria and also facilitate the latter three’s incipient plans to create their own Muslim bloc); increasingly rely on S-CPEC+ to expand Chinese-African connectivity via Pakistan (thus importantly avoiding the South China Sea and the Strait of Malacca); intensify trade relations with the RCEP states (especially the neighboring ASEAN); explore improving relations with India for pragmatic reasons (so as to avoid a US-provoked two-front war along their frontier and the South China Sea); and ultimately rally the entire Global South behind it via BRI.
Convergences & Contradictions
With the above insights in mind, it is important to point out some key convergences and contradictions:
- All four great powers are interested in economic connectivity, though India is still reluctant to join BRI and will likely remain that way, hence its desire to revive the AAGC and possibly even incorporate Russia into this trans-continental trade framework (focusing on the Arctic, Far East, ASEAN, and Africa);
- Neither of these primary players has any interest in provoking instability, though Turkey’s efforts to expand its influence across the Ummah via its Muslim Brotherhood allies could prolong instability in West Asia and North Africa;
- Each of them is also actively expanding their influence through regional institutions such as Russia’s Eurasian Union, Turkey’s Turkic Council, India’s BIMSTEC, and China’s BRI-linked structures, all of which could better coordinate if Turkey ever joins the SCO (since it is the only of the four nations that is not a SCO member).
-China’s growing economic influence in Central and West Asia could eventually displace Russia’s traditional and newfound role in those two regions, compelling Moscow to increasingly “accommodate” Beijing to gradually cede its current and envisioned leadership there to the People’s Republic;
-Russia is becoming worried that Turkey’s expansion of influence in Moscow’s traditional “spheres of influence” (South Caucasus and Central Asia) might become “unmanageable”, with the worst-case scenario resulting not in “accommodation” like with China but a more intensified trans-regional competition there;
-India’s predicted revival of the AAGC (including with some role for Russia even if in the Arctic and Far East only, as well as a leading role for the U.S.) will heighten China’s threat perception of the South Asian state if it succeeds in expanding its economic influence across the “Global South” and especially along Beijing’s borders.
This forecasted state of strategic affairs will facilitate certain divide-and-rule schemes by the U.S., which might:
-Intensify its information warfare against BRI all across the Global South in order to provoke color revolutions against Chinese-friendly governments there so as to deprive Beijing of the resources and markets that it requires to sustain its planned growth while perhaps also replacing its lost investments there with AAGC ones;
-Refocus its strategic partnership with India on the economically-driven AAGC as opposed to the military-led Quad in order to provide the South Asian great power with financial, leadership and organizational assistance that it requires to compete with China across the Global South and exploit the U.S. planned hybrid war gains there;
-Consider co-opting Turkey sometime in the future in order to leverage its newfound influence in Russia’s traditional spheres of the South Caucasus and Central Asia, thus provoking the earlier mentioned worst-case scenario of intensified competition in the region.
These speculative schemes can be preempted through the following ways:
-China must successfully convince its targeted audience in the Global South that it is pioneering a truly new model of international relations that is much more beneficial for the majority of their people than that the U.S. seeks to retain (albeit through “Lead From Behind” reforms) even if it still takes time to materialize;
-China and India must seriously consider very difficult mutual compromises in order to restore the lost trust between them, especially in the economic-financial-tech spheres, in order to ensure that BRI and the AAGC converge rather than compete, heralding the best-case scenario of a “Renaissance 2.0”;
-Russia and Turkey must sustainably regulate their “friendly competition” through more than just the trust between their present leaders that has been responsible for managing this so far, necessitating some sort of institutionalized framework among them as well as the states within their overlapping “spheres of influence”.
The NWO that was described up until this point is disproportionately dependent on the following conditions:
-The U.S. and Russia successfully beginning a new era of relations, whereby they sincerely intend to regulate their comprehensive competition more responsibly, with an aim towards eventually clinching a “new détente” that would prospectively consist of a series of mutual compromises all across Eurasia;
-India and Turkey continuing to “balance” between the U.S. and Russia so as to ensure their rise as great powers in an increasingly complex world order, which will in turn improve their strategic leverage vis-a-vis China and enable them to expand their envisioned “spheres of influence” more sustainably;
-China continuing to formulate its grand strategy under the unofficial influence of the Mao-era “Three Worlds Theory” wherein the People’s Republic as the largest developing (“Third World”) nation aims to consolidate its leadership over the Global South through win-win BRI deals that lead to a Community of Common Destiny.
Nobody seems to know for sure what sort of the NWO exactly Russian Deputy Defense Minister A. Fomin envisioned when he shared his thoughts about this with RT earlier in the month, but the present analysis attempted to compellingly make the case that this emerging scenario will represent a much more complex version of multipolarity than the current one. Trump’s U.S.-Chinese trade war, which in turn provoked the new Cold War between these two great powers, combined with the black swan event of a World War C to inspire the U.S. “deep state” to pragmatically recalibrate America’s grand strategy away from its hitherto unsuccessful attempts to simultaneously “contain” both Russia and China. The resultant outcome could fundamentally transform the geostrategic situation in Eurasia, both by providing the U.S. with new opportunities to divide and rule the supercontinent but also by giving Russia and China a chance to finally stabilize it in a sustainable way.
From our partner RIAC
UN: Revealing Taliban’s Strategic Ties with Al Qaeda and Central Asian Jihadists
As the 20th anniversary of the 9/11 attacks and the deadline for the withdrawal of American troops from Afghanistan draws near, the region has been witnessing sudden adjustments. The Taliban have not only intensified assaults against the Afghan government forces and captured new territories but also began to demonstrate their regional ambitions to reduce Washington’s influence in Central and South Asia. As the US military has completed more than half of its withdrawal from Afghanistan, the Taliban believe that they defeated America after 20 years of grueling war. The Taliban leaders, who were driven by the latest military successes, began further setting their own conditions for the neighbors and stepping on the toes of Washington in order to prevent the establishment of a new US military base in Central Asia.
On May 26, the Taliban issued a statement warning Afghanistan’s neighbors not to allow the US to utilize their territory and airspace for any future military operations against them. The Sunni Islamist jihadi group cautioned that facilitating US military operations by neighboring countries in the future will be a “great historical mistake and a disgrace that shall forever be inscribed as a dark stain in history.” They further emphasized that the presence of foreign forces is “the root cause of insecurity and war in the region.” The insurgent group strictly warned without elaborating that “the people of Afghanistan will not remain idle in the face of such heinous and provocative acts”. At the end of the statement, they exerted political pressure on the Central Asian states, threatening that “if such a step is taken, then the responsibility for all the misfortunes and difficulties lies upon those who commit such mistakes.”
Given the past experience of US military presence in the region, the Taliban’s threatening appeal is most likely addressed to the governments of Kyrgyzstan, Uzbekistan and Tajikistan. After the 9/11 attacks the Kyrgyz, Tajik, and Uzbek governments hosted the American military to wage a campaign against the Taliban, Al Qaeda and their Salafi-Jihadi subsidiaries. But virtually every US military base in Central Asia was suddenly expelled when the personal interests of the regional authoritarian leaders have been infringed upon. Uzbekistan expelled the US base from Karshi-Khanabad amid strong political disagreements over a bloody 2005 crackdown on protesters in Andijan. The Dushanbe and Kulob airports in Tajikistan were used very briefly by the NATO forces. The US base at the Bishkek airport in Kyrgyzstan also was closed in 2014 under heavy Russian hands. It is no secret that following the expel of US military bases, some political leaders of Central Asia became skeptical of Washington, thus further perceiving it as an unreliable partner.
The Taliban’s warning to the Central Asian states is fully consistent with the strategic expectations of Al Qaeda, its loyal and faithful ideological partner in the global jihad, both of which jointly seek to push the US out not only from Afghanistan, but also from Central and Southeast Asia. Based on propaganda releases and the rhetoric on Telegram channels, the Central Asian Salafi-Jihadi groups which are linked to the Taliban and Al Qaeda, strongly supported the withdrawal of US forces from the region. Consequently, Uighur and Uzbek jihadists potentially see the Taliban and Al Qaeda as powerful parent organizations, whose resurgence in Afghanistan offers major advantages for their military and political strengthening. Unsurprisingly, Al Qaeda and Taliban aims to oust the US forces from the region, hence playing into the hands of Moscow and Beijing, considering that both unlikely to welcome an increased US military presence in their backyard.
Taliban leaders are well aware that the possible deployment of US military assets in Central Asia will impede their strategic goal in rebuilding the so-called Islamic Emirate of Afghanistan. Today Washington is actively working with nations surrounding Afghanistan on the deployment of its troops to support Afghan forces “over the horizon” after withdrawal from the country on September 11. The US air support for the Afghan military could thwart Taliban plans to quickly seize Kabul and force them to sit at the negotiating table with the Ashraf Ghani administration. The Taliban have consistently and clearly emphasized in their numerous public statements opposing the negotiation and power share with the Kabul regime. They consider themselves the only and undeniable military-political force that has the right to rule the country in accordance with Sharia law. The Taliban jihadists are determined to continue waging jihad until establishing the Islamic Emirate of Afghanistan, and their emir, Mullah Haibatullah Akhundzada, becomes the country’s “lawful ruler”.
On June 6, 2021, the Taliban once again appealed to Kyrgyzstan and Tajikistan “to resolve their border issues through a dialogue” and “seeking a logical solution that would benefit both sides.” Recall, during the two-day border conflict between the armed forces of the two post-Soviet countries at the end of April, more than 50 people were killed, hundreds were injured and thousands were forced to leave their homes. In its statement, the Taliban, called on Tajik and Kyrgyz leaders to value “the peace and security of their respective nations.” According to the local analysts, Taliban’s “peace-aiming appeal” looks like a mockery of the Afghan people suffering from their bloody jihad.
Taliban’s “Soft Power” Under Construction
The question to be posed is what kind of leverage does the Taliban has with the Central Asian states to put pressure on them in preventing the possible deployment of new US military bases in the region?
The Taliban, an insurgent Islamist group that has yet to come to power, does not have any economic or political leverage over the former Soviet republics of Central Asia. But it is imperative to mention that the Taliban holds “soft power” tools, such as Central Asian Salafi-Jihadi terrorist groups affiliated with the Taliban and Al Qaeda. These groups challenged the region’s secular regimes, hence aiming to establish an Islamic Caliphate in the densely populated Fergana Valley, sandwiched between Kyrgyzstan, Uzbekistan and Tajikistan.
It is no secret that the Central Asian post-Soviet countries consider the Al Qaeda-linked Uzbek and Uighur Sunni Salafi-Jihadi groups hiding in Taliban-controlled Afghan soil as a threat to the security of the entire region. Recall, the first group of radical Islamists from Central Asia who found refuge in Afghanistan in the mid-90s was the Islamic Movement of Uzbekistan (IMU), which had close and trusting ties with both Al Qaeda and the Taliban. Currently, Uighur fighters of Turkestan Islamic Party (TIP) from China’s Xinjiang, Uzbek militant groups such as Katibat Imam al-Bukhari (KIB), Katibat Tawhid wal Jihad (KTJ), the Islamic Jihad Union (IJU) and Tajik militants of Jamaat Ansarullah (JA) wage jihad in Afghanistan under the Taliban’s umbrella.
The Taliban still strongly support Uzbek and Uighur jihadists despite the 2020 US-Taliban peace agreement that requires the Taliban to sever ties with Al Qaeda and all Central Asian terrorist groups.
In response to documentary evidence of the UN Security Council and the US Defense Intelligence Agency on the Taliban’s close-knit relationship with Al Qaeda and their failure to fulfill the obligation, the Taliban have adopted new tactics to publicly deny the presence of transnational terrorist groups in the country and their ties to them. The Taliban still insist that there are no foreign fighters in the country. But regular UN reports reveal the true face of the Taliban, who are trying to hide their deep network links with Al Qaeda and Central Asian Islamists — a decades-old relationship forged through common ideology and a history of joint jihad.
Thus, a recently released report by the UN Security Council’s Taliban Sanctions Monitoring Team confirms that there are “approximately between 8,000 and 10,000 foreign terrorist fighters from Central Asia, the North Caucasus and China’s Xinjiang in Afghanistan. Although the majority are affiliated foremost with the Taliban, many also support Al Qaeda.” The UN report stated that Uzbek and Uighur jihadists’ ties with the Taliban and Al Qaeda remain “strong and deep as a consequence of personal bonds of marriage and shared partnership in struggle, now cemented through second generational ties.” Further the UN monitoring team revealed Al Qaeda’s core strategy of “strategic patience,” according to which the group would wait for “a long period of time before it would seek to plan attacks against international targets again.”
According to the report, “several hundred Uighur jihadists of Turkestan Islamic Party (TIP) located primarily in Badakhshan and neighboring Afghan provinces, whose strategic goal is to establish an Islamic Uighur state in Xinjiang, China.” To achieve its goal, TIP facilitates the movement of fighters from Afghanistan and Syria to China. Abdul Haq al-Turkistani, who is a member of Al Qaeda’s Shura Majlis, leads the Syrian and Afghan branches of TIP for more than two decades. According to the UN monitoring group, “Uighur militant Hajji Furqan, the TIP’s deputy emir, is also a deputy leader of Al Qaeda and responsible for the recruitment of foreign fighters.” Such mixed appointments of group leaders highlight the close and deep ties between the troika: Taliban-Al Qaeda-TIP.
The UN report found more evidence of close cooperation between Uzbek IMU jihadists and the Taliban. The report stated that the “IMU fighters are currently based in Faryab, Sar-e Pol and Jowzjan provinces, where they dependent on the Taliban for money and weapons”. The UN monitoring team also highlighted the activities of Central Asian Salafi-Jihadi groups such as KIB, IJU and Jundullah, which are waging jihad in the northern Afghan provinces of Faryab and Kunduz under Taliban shelter and control. “The Taliban has forbidden these groups from launching independent operations, resulting in a reduction of their income.” In conclusion, UN analysts noted that pressure on the Taliban to cut their ties with Al Qaeda and Central Asian Salafi groups has not succeeded. Thus, the UN report once again refuted the Taliban’s assertion that Al Qaeda and Central Asian jihadists are not present in Afghanistan.
Thus, it can be assumed that while US military pressure persists, the Taliban’s tactics will continue to publicly deny their trust relationships and close ties with Al Qaeda, Central Asian jihadists, and other transnational terrorist groups in the country. But as long as the Taliban’s perception of its own level of influence and control in Afghanistan remains high, insurgents will continue to insist that they are abiding by the accord with the US.
The Taliban’s strategy is to build the foundation of their “soft power” through the patronage and protection of Al Qaeda and Central Asian Salafi-Jihadi groups in Afghanistan. Thus, in this complex process, not only material interests, but also common religious roots originating in the Hanafi school of Sunni Islamic theology and mutual sympathy for jihadist ideological visions might play a significant role.
Cyber-attacks-Frequency a sign of Red Alert for India
The biggest target is in terms of transportations, nuclear power plants, Power system Operation Corporation Limited, V.O. Chidambaram Port Trust, Telangana State Load Dispatch Centre, logistic industries and research organisations which eventually can lead to destruction of the whole ecosystem. The confidentiality breach in the case of medical data leak as reported by a German cyber security firm –Greenbone Sustainable Resilience wherein Picture Archiving and Communication Servers were linked to public internet without any requisite protection is a point of concern. Then, there are certain individualistic attacks such as hacking email and financial crimes (banking), etc. In the last two years the attacks radar of focus has been defence, government accounts and the vaccine manufacturing companies.
Cyber Security – Individualistic awareness need of the hour
The target of the individual in a peculiar case which led to heinous crimes casted was due to opening of a document which was a bait to install Netwire- a malware. The bait was eventually delivered through a file and what prompted a person to open that link was a Drop box sent to him on his email was actually opening a Pandora Box of malicious command and control server. An emphasis to understand the technicality that Netwire stands for a malware which gives control of the infected system to an attacker. This in turn paves way for data stealing, logging keystrokes and compromise passwords. In the similar vein the Pegasus used the tactic to infiltrate the user’s phones in 2019.
Cyber Security – Attacking Power Distribution Systems
The intrusions by Chinese hacker groups in October, 2020 as brought out by Recorded Future was done through Shadow Pad which opens a secret path from target system to command and control servers. And, the main target is sectors such as transportation, telecommunication and energy .And , there are different tags that are being used by the Chinese Espionage Industry such as APT41, Wicked Spider and Wicked Panda , etc.
The institutions backing legitimisation
The Institutions which are at working under the cyber security surveillance are the National Security Council and National Information Board headed by National Security Adviser helping in framing India’s cyber security policy .Then, in 2014 there is the National Critical Information Infrastructure Protection Centre under the National Technical Research Organisation mandating the protection of critical information infrastructure. And, in 2015 the National Cyber Security Coordinator advises the Prime Minister on strategic cyber security issues. In the case of nodal entity , India’s Computer Emergency Response Team (CERT-in) is playing a crucial role under the Ministry of Electronics and Information Technology(MEITY).But, there is a requirement of clarity in National Cyber Security Policy of 2013 and the needed updates desired in it respectively.
A cohesive approach – Data Protection and Privacy Importance
The Data privacy i.e. the personal data protection bill is an important imperative in which services of private actors can be bridged through a concerned law which is missing link in that sense. The point of Data localisation falls squarely within this dimension of Section 40 and 41 of the draft bill where in the Indian stakeholders have the capacity to build their own data centres .In this contextualisation there also a need to understand certain technicalities involved in terms of edge computing which in a way is enabling the data to be analysed, processed, and transferred at the edge of a network. An elaboration to this is the data is analysed locally, closer to where it is stored, in real-time without delay. The Edge computing distributes processing, storage, and applications across a wide range of devices and data centres which make it difficult for any single disruption to take down the network. Since more data is being processed on local devices rather than transmitting it back to a central data centre, edge computing also reduces the amount of data actually at risk at any one time. Whereas on the other hand, there is insistence on data localisation has paved the way for companies such as Google Pay to adhere to the policy and synchronise their working with the United Payments Interface (UPI).
What do you understand by Data Share?
In the recent case of WhatsApp privacy issue and drawing in parallel other organisation a similar platform such as Facebook and Google shared the data to the third party with a lopsided agreement and with continuance of the data trade business industry. In 1996 the internet was free so was perceived as carte blanche , a safe harbour falling under the Section 230 of the Communication Decency Act in the United States but with the evolution of the circumstances the laws in that specifications are also required to change in that respect. In relations to the Indian law under the Information Technology Act, 2000 under the Section 69 the Indian government has the powers to monitor and decrypt any information that’s store in any computer resource but on certain conditions such as in regards to the sovereignty, defence and security of the country.
Cyber-attacks understanding on the International Forums
In terms of Lieber Code of Conduct of 1863 or be it Hague Convention of 1899 there is a need of updating the definitions and where in the cyber army falling under the categorisation of civilians , not possessing any of the warfare weapons cause the main weapon that they possess is a malware which is invisible but can have deep repercussions leading to destruction of that particular economy altogether .So, in recent evolving circumstances there is an undue importance to for the target country to respond with equal force and having a right to self-defence in this manner regardless of the attack being from a non-state actor from a third country and masquerading under the civilian garb .Henceforth , there a thorough understanding of the complex environment that one is dealing with , there is undue emphasis to change and respectively update with the current world.
Innovation performance keeps improving in EU Member States and regions
The Commission has today released the European Innovation Scoreboard 2021, which shows that Europe’s innovation performance continues to improve across the...
Beyond Being Friends: Russia and China Need an Exclusive Trade Deal
RIAC’s 6th “Russia and China: Cooperation in a New Era” conference in early June showcased once again the will of...
Joe Biden’s European vacations
Joseph Biden, better known as Joe Biden, is an American politician from the Democratic Party who won last year’s presidential...
Promoting ‘Brand Africa’ to Realize the Continent’s Tourism Potential
UNWTO’s African Member States will work together to establish a new narrative for tourism across the continent. To better realize...
High time for India to Reconsider the One-China Policy
Sino-Indian bilateral relations have seen major challenges in the recent years, beginning with the Doklam crisis to the current pandemic situation. The sugar-coated rhetoric of Beijing proved to be mere duplicity after...
How food waste is trashing the planet
18 June is Sustainable Gastronomy Day, an international celebration of local cuisine that is produced in ways that are both...
COVID-19 and social protection
The June segment of the 109th International Labour Conference has come to a close – the first virtual ILC in...
Energy3 days ago
Nuclear Energy is not Dead! The Drivers Underpinning the Ongoing Nuclear Renaissance
Intelligence2 days ago
Towards Increasingly Complex Multipolarity: Scenario for the Future
Middle East2 days ago
Egypt-China relations after the “U.S. and Israel Policies” in the Middle East
South Asia3 days ago
Pakistan, Quo Vadis?
South Asia3 days ago
Why successful mediation efforts could not be employed to resolve the Kashmir conflict?
Development3 days ago
Financing to Support Reforms for Inclusive Growth and Development
Russia2 days ago
Modest results of the meeting in Geneva
Europe3 days ago
Fostering Tolerance in Europe: Issues of Migration and Populism in Italy