Connect with us

Intelligence

The Grand Cyber Spy Game: Russia, America, and China Stealing the World One Byte at a Time

Avatar photo

Published

on

Dr. Matthew Crosston & Anonymous(*)

Every month another story of cybertheft linked to China or Russia emerges. Recent data breaches at Target, United Airlines, Blue Cross Blue Shield, and OPM have been linked back to Russia, while theft of key technology across major Department of Defense contractors such as Lockheed Martin and US government laboratories have been linked to China.

Neither China nor Russia’s government formally admit to leveraging the internet to steal secrets from other countries but hacks have been linked directly to their intelligence services’ respective buildings or individuals known to be under governmental influence. International cyber incidents in Ukraine, Georgia, and Estonia have all been apparently linked back to Russia while the Canadian government recently set up domestic cyber-protection programs after several major corporations were hacked by Chinese intelligence. The US government struggles on how to approach these cyber intrusions. Should they be ignored so that other foreign policy initiatives can move forward? Are these initiatives acts of war or a new method of state gamesmanship? Do these collections of vast amounts of information count as high treason/espionage or simple economic theft? Environmental negotiations just about broke down several years ago when President Obama called out China for hacking several governmental systems during the negotiations. What does all of this signify as Russia and China become more important strategic world partners, while still at least semi-maintaining long-held intelligence and military adversarial attitudes toward the US? Welcome to the REAL cyber era, where multiple players try to steal the world one byte at a time while pretending to do nothing of the sort.

The Chinese, American, and Russian intelligence services have no issue launching clandestine internet attacks to pursue what they all consider to be legitimate national security and foreign policy objectives. Sometimes the information collected is economic, directed against or about important corporations; other times the information is military and political. In all cases the information is highly strategic. While it is true that the information the Russian and Chinese intelligence services are providing to their respective policymakers is much broader in scope than the CIA or US Department of Defense, and is arguably much more domestically invasive than the FBI or DEA, both Russia and China have successfully started campaigns questioning the ‘purity of purpose’ within American intelligence given the details of the Snowden scandal. All of which begs questions: should American intelligence maneuvers match Chinese and Russian cyber precedence? Is the American public aversion to cyber collection programs really just a front for a private philosophy that already rivals China and Russia? Is there something fundamentally important for states to consider in this style vs. substance cyber spy debate?

Crucial differences in intelligence organizational culture and mission make figuring these questions out quite difficult. While the United States has been quick to leverage open-source collection for its own programs, it has supposedly been hesitant to execute the power of its cyber abilities in invasive, offensive, global scenarios (although this consideration is now being heavily debated in the classified sector and some accuse it of already transpiring). This article will attempt to determine if Chinese and Russian intelligence services have gained a tactical advantage over the United States because of a political and bureaucratic blind spot, or if the United States intelligence collection culture is different only at the superficial level and is largely the same as its rivals in terms of true cyber substance.

The first important aspect in understanding the Grand Cyber Game is to understand how the Russian, Chinese, and US intelligence communities are structured. The United States is known for the ‘big brothers’ of its IC, the Central Intelligence Agency (CIA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA). However, there are actually 17 members of the US Intelligence Community. Some of these include intelligence offices for each branch of the US military, Department of Homeland Security, Department of Energy, Department of State, Department of the Treasury, Drug Enforcement Administration, National Reconnaissance Office (NRO), and National Geospatial-Intelligence Agency (NGA). The first five use intelligence collection as part of a law enforcement mission, while the NSA, NRO, and NGA all harvest data and imagery collection. Traditionally, the CIA operates overseas and cultivates human sources while conducting clandestine operations. The FBI traditionally manages counterterrorism operations domestically, provides investigation support overseas when American citizens are involved, and acts under an enforcement jurisdiction to maintain the law. The NSA was established to provide cryptologic services and to protect US information systems and signals intelligence. It supports military customers, national policymakers, and counterterrorism and counter-intelligence communities under the Department of Defense. However, in a post-9/11 world, these explicitly defined roles have become more blurred and opaque as global travel and transnational collections are intensely complicated by the internet.

Conversely, modern Chinese intelligence services have always had domestic and international missions intertwined. China’s Ministry of Public Security (MPS) was formed in 1954 as a domestic law enforcement agency. It managed criminal investigations, security protection, public information network security, traffic control, legal affairs, counter-terrorism, drug control, and other anti-smuggling and anti-corruption duties. In 1983, the Ministry of State Security (MSS) was established as the formal intelligence and security agency of China for non-military areas of interests. It has the same authority to arrest or detain people as the MPS with a nearly identical oversight mission by the courts, but it is also a separate, parallel network to the MPS. The MSS mission is to ensure “the security of the state through effective measures against enemy agents, spies, and counter-revolutionary activities designed to sabotage or overthrow China’s socialist system.” Similar to the CIA, the MSS gathers foreign intelligence from targets in various countries overseas while the MPS gathers information domestically to protect against domestic terrorism and political coups. Both heavily rely on cyber collection.

Russia operates with three principal intelligence services. The SVR focuses on foreign intelligence collection, but mainly with civilian affairs. It is formally responsible for intelligence and espionage activities outside the Russian Federation. The GRU is the main foreign military intelligence directorate of the General Staff of the Armed Forces. It is Russia’s largest foreign intelligence agency, deploying at least six times as many agents as the formal KGB successor, the SVR. The FSB operates in theory only across the former Soviet Republics and domestically, but having had its operational portfolio increased in 2003 to include the Border Guard Service and the Federal Agency of Government Communication and Information. The three intelligence services often overlap and sometimes compete against one another in the recruitment and collection of intelligence sources. Russia also established an Anti-Terrorist Center that falls under full control of the FSB. The Center’s mandate was to create a database for intelligence sharing among the security services of all members of the Commonwealth of Independent States (CIS). Although the SVR has promised not to spy within CIS territories, the FSB has not. As such, it has become the de facto leading intelligence service for foreign collection activities for Russia. Interestingly, Russia has often turned a blind eye to Central Asian intelligence service activity within its borders, when Central Asian leaders are making moves against so-called political enemies (these moves are usually abductions back to Central Asia for detainment). These activities have included both the Chinese MSS and MSP. In 2001, the Shanghai Cooperation Organization (SCO) was established by China, Kazakhstan, Kyrgyzstan, Russia, Tajikistan, and Uzbekistan, to work together against terrorism, separatism, and extremism. They established their own Regional Anti-Terrorist Structure (RATS) that became the mechanism of choice for carrying out abductions across national boundaries, outside of standard judicial procedures. RATS operations have been compared to the CIA’s practice of extraordinary rendition and allow members to detain suspects in the six participating states outside of any rule of law. The members’ operators are not subject to criminal liability and they are immune from arrest and detention within the six states.

The reality is, on an international level, the intelligence services of all three nations operate with remarkably similar mission goals and objectives: they wish to protect the national interests of their respective states and garner advantages for said states via the acquisition of important information. While Hollywood has often focused on the political deviance and violence of intelligence missions around the world, the less exciting reality is that intelligence is more often utilized simply for political leverage. On the domestic level, the United States has long-held the moral superiority card against rivals like Russia and China, largely based on the democratic system in America supposedly being more altruistic and legally-minded than the so-called autocratic-type regimes in Beijing and Moscow. Snowden and other details in the past several years have started to make some at least wonder how much that moralism is built upon a foundation of sand and not stone. Finally, the stylistic aspect of intelligence public relations is significantly different between the three: the US decidedly tries to maintain an air of secrecy and deniability over just about everything its Intelligence Community does or needs to do. Russia and China, while revealing no secrets, tend to be a bit more unabashed about the role and necessity intelligence plays for the furthering of state power and do not fear making public statements to that effect anywhere, anytime. For them, therefore, the only difference between the three great players in the Grand Cyber Spy Game is the costuming and marketing of their respective goals, but NOT the ploys, initiatives, and overall desires. When it comes to winning, it seems all three are set and determined to virtually steal, that is, ‘obtain’ as much as possible. The Grand Cyber Spy Game demands no less.

(*) Anonymous is currently a graduate student in International Security and Intelligence Studies at Bellevue University and works within the US governmental system. The opinions expressed are strictly personal and do not reflect a formal endorsement of or by the United States’ government and/or Intelligence Community.

Dr. Matthew Crosston is Executive Vice Chairman of ModernDiplomacy.eu and chief analytical strategist of I3, a strategic intelligence consulting company. All inquiries regarding speaking engagements and consulting needs can be referred to his website: https://profmatthewcrosston.academia.edu/

Continue Reading
Comments

Intelligence

Cyberwar, Netwar: The Untouchable and Unpredictable

Avatar photo

Published

on

Territorial integrity, sovereignty and non-interference are salient features of a just and secure state. For a state to exist, compete and survive in the international context, a country must be well equipped. The unbiased, neutral and non-aligned movement is the best way to reach heights, especially for small states. However, this is not an easy task, ‘everything has a price’. The existence and co-dependence of a state are made further vulnerable as well as strengthened by way of ‘information’. Unlike in past, when troops protected borders, at present country must face and react to content generated and disseminated on online platforms.

Cyberwar and Netwar are mechanisms that are used by certain individuals as well as entities to infiltrate systems, pass a message, steal information or change the material content. “Cyberwar” is the act of “disrupting, if not destroying, information and communication systems”. On the contrary, “Netwar” is to “disrupt, damage, or modify what a target population knows or thinks it knows about the world around it”.  These threats are vicious to national security. Since the whole world is digitalized, any information regardless of its credibility reaches a wide audience. There are various modes of cyberwar including Phishing, Ransomware, E-commerce data interception, Crimeware-as-a-Service, Cyber Scams and Crypto-jacking. (Arquilla and Ronfeldt 1995) states, that a Netwar may focus on public or elite opinion, or both. It may involve diplomacy, propaganda and psychological campaigns, political and cultural subversion, deception of or interference with local media, infiltration of computer networks and databases and efforts to promote dissident or opposition movements across computer networks.

According to Blackfog’s 2021 State of Ransomware Report, government agencies were the top targets for cybercriminals, followed by education, healthcare, services, technology, manufacturing and retail. According to Curran, Concannon and McKeever (in Janczewski and Colarik 2008: 03) have pointed out; the LTTE became the world’s first terrorist outfit to attack a country’s computer system in 1998. Another example is India. In August 2013, Indira Gandhi International Airport (IGI) faced a Cyberattack. ‘Technical snag’ hit the operations of terminal no. 03. Nisar & StepovayaIn (2022) has cited (UNODC, 2021) which states that in September in Malaysia, a web-hosting service was the target of a ransomware attack demanding US$ 900,000 in cryptocurrency and In May, four subsidiaries of an international insurance company in Thailand, Malaysia, Hong Kong, and the Philippines were hit by a ransomware attack asking for US$ 20 million. Where that being said for cyber-war, net war is also a crucial problem. This is explicit in Russia and Ukraine conflict where information advantage is heavily discussed and debated. Byman (2022) has mentioned, “Confrontation between Bahrain, Egypt, Saudi Arabia, and the UAE (the so-called “Quartet”) and Qatar, for example, began in 2017 in part due to social media exploitation involving hacked email accounts and associated disinformation”. Sri Lanka too faces disinformation by LTTE and its international networks.

Threats, which occur on online platforms, are equally important as much as militaristic aspects of warfare. Where the militaristic aspect includes conquering and declaring power, Cyberwar and Netwar disrupt systems and brainwash people respectively. Since crimes conducted, are unpredictable, intangible and cross borders, ascertaining the criminal is daring. Due to these reasons, imposing liability as to whether it is collective or individual becomes strenuous. Furthermore, lack of experience, expertise in personnel, lack of technology and inadequate infrastructure can be identified as problems. Information illiteracy is another pertaining issue, which is the inability of individuals to recognize when information is needed and have the ability to locate, evaluate and use information effectively. Moreover, cyber-attacks are widely done due to their low cost and widespread nature.

With that being said, it is imperative to reiterate, that national security is threatened by Cyberwar as well as Netwar. Thus, any country must overcome the challenges mentioned afore. For that, to fight cyber war, enhancing technological infrastructure and technical capacity is important. In netwar, information literacy must be instilled to the population. Hence, people will be able to evaluate the quality, credibility and validity of the content. In addition, it is crucial to have a reporting mechanism for false content disseminated online. International cooperation is effective to combat Netwar and Cyberwar. Likewise, it is vital to sign and ratify necessary laws and follow resolutions in the international context. Furthermore, individuals, government, as well as private entities, must behave in a cyber-resilient manner that they are otherwise not incentivized to do.

Continue Reading

Intelligence

Operation Neptune Spear and the Killing of Osama bin Laden

Avatar photo

Published

on

The founder and first leader of Al-Qaeda, And establishing 20-years republican government in Afghanistan: Neptune Spear was the secret name or code of the operation that was carried out under the leadership of the CIA on May 2, 2011 in the Abbottabad region of Khyber Pakhtunkhwa for killing of the leader of the Al-Qaeda group Osama bin Laden. This operation, which was carried out from Afghanistan to the territory of Pakistan by former President of the United States Barack Obama, is generally known as JSOC.

 Why this mission was named Neptune Spear? 

The reason why the operation to kill Osama Bin Laden, the leader of the al-Qaeda group, was given the name Neptune’s Spear is as follows: The mission was named Operation Neptune’s Spear because it was the emblem of the United States Navy Seal, and Neptune in classical mythology means the god of the sea. In addition, this operation is commonly known as JSOC, because the Joint Special Operations Command (JSOC) is a sub-command of the United States Special Operations Command (USSOCOM), which played an important role in the operation to kill Osama Bin Laden on May 2, 2011.

The Neptune Spear operation started on May 1, 2011 from the American military base in Jalalabad province of Afghanistan, and ended on May 2 in Abbottabad, Pakistan. Former President Obama, Secretary of State Hillary Rodham Clinton, Vice President Joe Biden, Defense Secretary Robert Gates and members of the national security team were monitoring the operation online. All involved in Operation Neptune Spear were 23 SEALs, an interpreter, two helicopters and a combat dog. The operation started from a base of the American forces in Jalalabad, Afghanistan, on May 1, 2011 at 10:30 pm local time, and on May 2, 2011, after 40 minutes long operation, they ended by killing Osama Bin Laden before one o’clock. Who was Osama Bin Laden and how did he become a big threat to the world, especially the United States?  Osama bin Laden, the son of Muhammad bin Awad, was born on March 10, 1957 in Riyadh, Saudi Arabia, but some sources close to Osama believe that he was born in 1958. Osama bin Laden had five wives, his first wife was Najwa Ghanim, who married him in 1974, his second and divorced wife was Khadija Sharif, who married him in 1983, and His third wife was Khairya Saber who married Osama bin Laden in 1985. His fourth wife was Siham Saber, who married Osama bin Laden in 1987, and his fifth wife was Amal al-Sadah, who married Osama bin Laden in 2000.

 Osama had about twenty male and female children from his first four wives, but according to some sources, Osama had twenty-four male and female children from his fifth wife, and some put the number of children at 26, but the exact report is 24 about Osama’s children. Osama bin Al-Adeen studied economics at Abdul Aziz University, And in addition to this, after receiving education in the field of Civil engineering, politics and Shari’a, he studied partially in English literature at Oxford University in England, But intellectually, he was more encouraged towards the jihadist ways and intellectually he chose the jihadist way. Before Osama Bin Laden left Britain and went to Pakistan to choose the path of war, he showed intellectual interest in the Muslim Brotherhood in Egypt. Moreover, during his university years, he financially supported jihadist groups in South Sudan, Egypt, Syria and a number of African countries, because he inherited 20 to 25 million dollars from his father, And Osama spends a part of that money on construction projects and financially supports terrorist groups with the money received from those construction companies. In 1979, Bin Laden went to Pakistan and stayed with his intellectual and jihadist teacher, Abdullah Azzam, and prepared for the war against the former Soviet Union in Afghanistan, after that, he became friends with Ayman al-Zawahiri and founded the (Maktab-Al-Khadamat) in 1984 with Abdullah Azzam, Ayman al-Zawahiri and Osama bin Laden. After that, he started recruiting fighters for Mujahideen against the Soviet Union in Afghanistan and spent most of his wealth on financing terrorists. After that, Osama bin Laden started a massive effort to establish Al-Qaeda and started recruiting fighters from Africa, the Middle East and South Asia, And he accelerated the search for young people with a fighting and jihadist mindset from all over the world, and he focused on Egypt in order to attract Egyptian engineers. After extensive financial and armed cooperation with other jihadist organizations in Pakistan, in 1988, the Al-Qaeda armed group was activated by Osama, Not only did they continue their attacks in Afghanistan, but they also carried out many bloody attacks in the Middle East and Africa. The bloodiest attack was the 11th of September 2001 and the darkest day in the history of the United States. September 11 or 9/11, on September 11, 2001, 19 Al-Qaeda terrorists hijacked four commercial airplanes, and the first two commercial airplanes and suicide bombers targeted the New York City International Trade Center. The third plane targeted the headquarters of the Pentagon in Arlington County, Virginia, and the fourth plane planned to attack the federal government building in Washington DC, but did not reach the target, And in four attacks, around 3000 Americans were killed and up to 25000 Americans and foreigners were injured. After this attack, Osama was included in the list of the most wanted terrorists by the United States and the Western alliance, a list controlled by the FBI.

 After 10 years of intense investigations and intelligence investigations, on May 2, 2011, the US government avenged 9/11 by killing Osama at the ISI’s most secure location in Abbottabad, Pakistan. However, Osama’s body was thrown into the sea before his body should be presented to the intelligence agencies of the world as evidence. But there is some confidential information that Osama bin Laden, the American dictator and the founder of al-Qaeda, was recruited by the CIA in 1979 at the beginning of the US-sponsored jihadist war against Afghanistan, And he was 22 years old and trained in a CIA-sponsored guerrilla training camp. In any case, Osama’s entry into Afghanistan led to the fall of the first Taliban regime, and at the same time, a person who was famous for so dear to Westerners came to power in Afghanistan.

How did Hamid Karzai get from immigration to the presidency?

 Common understanding between former President Hamid Karzai and the Central Intelligence Agency of the United States and some untold facts: When the Al-Qaeda group carried out the deadly attacks in New York, Washington and Pennsylvania on September 11, 2001, and the leader of this group, Osama bin Laden, took refuge in Afghanistan. In addition, the first Taliban regime of Afghanistan at that time, under the leadership of Mullah Omar Mujahid, accepted the refuge of Osama Bin Laden. Not only that, the American people knew that the United States and the security agencies of this country would not remain silent, and would soon start preparing for revenge. But before that the United States, the Central Intelligence Agency, the Army, and the Special Operations Command of the United States Army started a response plan, they first proposed to the Afghan government to hand over Osama Bin Al-Adeen to the United States. Nevertheless, the leader and founder of the Taliban, Mullah Omar Mujahid, rejected their request, and for the second time, the United States tried to mediate the Saudi Arabia. The US asked the Taliban government to hand over Osama to the government of Saudi Arabia, but Mullah Omar Mujahid said that handing over Osama Bin Al-Aden to Saudi Arabia means handing over to America.

Furthermore, after rejecting the second proposal, the plan to attack Afghanistan was started by the United States and its allies on October 7, 2001. Just 15 days after the terrorist attacks of September 11, 2001, CIA and US Special Forces personnel were sent to northern Afghanistan, to meet local tribal leaders and local commanders such as Abdul Rashid Dostum and work together, to start a war against the Taliban, who controlled the country and gave shelter to Osama bin Laden. A CIA team arrived with $3 million in $100 bills to use to recruit tribal leaders and strengthen the war against the Taliban, and teams of military units came from the fifth Special Forces Group. The then President of the United States, George W. Bush, together with the head of the CIA, George J. Tenet, made a coordinated decision to overthrow the Taliban government by appointing an influential person from the southwest zone of Afghanistan after the formation of a new government in the country.

That person was Abdulhad Karzai’s son Hamid Karzai who spent a lot of time in exile in Pakistan,  not only  he was the national leader for the Pashtuns of this side of the border, but he also had a special status among the Pashtuns of that side of the border in Pakistan. This position made him a target of the CIA. After October 7, 2001, members of the Central Intelligence Agency began to secretly visit Hamid Karzai’s house in Quetta and Chaman, Baluchistan, Pakistan, as a result, in July 2002, Hamid Karzai came to power in Afghanistan under the warm support of the CIA and the West, and he remained the president of Afghanistan until September 2014.

Continue Reading

Intelligence

World Economic Forum and India steered Indo-pacific Strategy-Centric Policy

Avatar photo

Published

on

According to the sources, CIA members have gone to Switzerland to lead the security of the WEF meeting due to a possible attack. While the meeting of the World Economic Forum or WEF begins on January 16 in Davos, the Swiss Army has started security preparations under the leadership of CIA in the field for the annual meeting of the World Economic Forum (WEF) in Davos. For the WEF meeting in Davos, the Parliament has approved the preparation of 5000 soldiers, and now about 500 soldiers have been deployed to guard the meeting place, led by members of the United States’ Central Intelligence Network. The identities of the CIA Ops are not clear, because if the anti-western countries talk about the WEF meeting, that the security responsibility of the WEF meeting has been handed over to the CIA and only the soldiers will be from Switzerland, then it will increase the challenges to the WEF meeting. Intelligence experts and analysts of intelligence reports believe that this time, the war between Russia and Ukraine in Eastern Europe has led to the possible targeting of the WEF meeting in Switzerland, because in this international economic meeting, a number of economic topics will be also discussed against of Russia and its allies.

What is purpose of the Annual meeting of WEF?

This annual meeting, which is hosted by the Swiss country of Europe, is very important because the international economic companies and political bonds are led through the annual meeting of the World Economic Forum, and for years to come, this World Economic Forum engages leading political, business, cultural and other community leaders to shape global, regional and industry agendas. On the other hand, this annual meeting faces a number of possible risks and challenges, such as the religious war between Muslims and non-Muslims, which affects the economic forum, and the sabotage of the WEF annual meeting by terrorist and intelligence groups.

In addition, after the terrorist attacks in France in November 2015, the biggest challenge to the security of international meetings in Europe, and the current sensitive situation in Europe, the flames of war have started. The impact of the Russia-Ukraine conflict is being felt at the annual meeting of the World Economic Forum in Davos, and European and American business organizations and political processes may use tough measures against Russia. The political and business leaders of the world are worried about the economic future of Europe, because, the series of power division in Eastern Europe is going on rapidly, along with religious extremist non-militant and armed groups are also increasing in Europe, which can easily increase violence in Europe under the pretense of freedom of expression and religion. A clear example of which is the expansion of the Muslim Brotherhood and Hizb-ul-Tahrir groups in Britain, France and Germany. On the other hand, the economic and industrial promptness in Europe is increasing day by day, and at the same time, due to the war between Russia and Ukraine, the lack of energy and the trend of economic stagnation have created a sense of depression among many business leaders.

Other investment destinations also seem uncertain, but India has emerged as a region of both economic dynamism and political stability under the support of the United States, which is currently trying to include India in the P-5+1. Eager to capitalize on this current mood as an economic marketer, India is drawing the attention of world leaders to its reform decisions, and to the rapid pace at which a new unicorn is being created in the country.

Because the West is also trying to weaken the economic side of the European Union, And transfer the European economic and trade zone from Europe to South Asia and open a new economic zone by connecting Iran’s Chabahar port and Gwadar port in the future country of Baluchistan.

 In turn, China is reaching the Caspian Sea through Northern Afghanistan to expand its trade with the Middle East by using the Caspian, until to leave and forget of Pakistan’s Gwadar. And the United States is preparing to give a large share in the new economic zone to its close allies from the continent of Europe, such as France, Germany, England and a number of other countries, And before that, with the support of the United States, the UAE signed an agreement with France in the field of energy. In this way, the European allies of the United States will be included in the economic contracting countries of the new economic zone, in order to reach this point; there are now efforts to disrupt the economic agreements under the umbrella and leadership of the European Union.

The current World Economic Forum is looking at a different world than it did in the past, and this is a reason for India to find itself in the sweet spot and take advantage of Europe’s current external status to emerge as a new economic leader. Chain’s future role in the WEF and what will be its alternative approach against India. Before this, Chinese President Xi Jinping focused on the Davos summit; And Xi Jinping again presented China as a champion of free trade, while the United States under the leadership of Donald Trump was seen on the other side of the fence. However, with the end of Trump’s reign, the relations between the China and the West led by the United States have become more complicated, and the challenges to China’s economic development have increased.

Because of that, China is not present as a leading trader in the current Davos summit and is standing behind, and the main reason is China’s tough stance against Taiwan, So the focus of WEF next annual meeting has shifted to India, and India is enjoying potential benefits as an alternative investment destination. In bringing India to this position, the United States has lost its closest ally in the Middle East, Saudi Arabia, and the main reason was the United States allowing India to emerge as the star of EVs in the global economic competition against China until 2030.

Apart from this, another important topic for India is the renewable energy of green hydrogen. Green hydrogen is hydrogen made with renewable energy, India’s plan aims to replace fossil fuels with hydrogen in the production of fertilizer and steel, mix it into city gas supplies and promote its use in transportation. While India’s current production of green hydrogen is low and comes from a few pilot projects, But the country wants to produce 5 million tons of green hydrogen by the end of this decade. The Narendra Modi-led government has recently approved the National Green Hydrogen Mission, which is expected to open up new opportunities towards net-zero goals in the next five decades,  which will further reduce the role of China’s green hydrogen market in the international trade market. And India’s economy is estimated to grow by $20-30 trillion over the next three to five decades, which is in line with India’s net-zero commitment. Companies that want to promote India’s green hydrogen policy include Adani New Industries Ltd, Reliance Industries Ltd, Indian Oil Corporation Ltd, ONGC, GAIL India Ltd, Bharat Petroleum Corporation Ltd, NTPC Ltd, Larsen & Turbo, and Hindustan Petroleum Corporation Ltd, Started investing in green hydrogen innovations. These are the economic developments that can introduce India’s presence at the next WEF meeting.

What will be the position of the economic embargo of the United States against Venezuela and Iran at the 2023 World Economic Forum meeting?

After 2022, there is still a big question whether the United States will ease the sanctions on Venezuela and Iran in order to get oil alternative for the economic sanctions imposed on Russia due to the Russian invasion of Ukraine. Earlier, US Secretary of State Anthony Blinken said on March 6, 2022 that the US and its European allies might impose a ban on Russian oil imports in response to the war in Ukraine.

The administration under the leadership of US President Biden was ready to improve relations with Venezuela and ease sanctions after the 2022 WEF meeting because the United States needed Venezuela’s energy reserves. However, currently the question is the relationship between Iran and Venezuela, the negative effects of which can once again make the relationship between the United States and Venezuela difficult, meanwhile, the President of Venezuela, Nicolas Maduro, has recently expressed his willingness to close relations with the United States. However, Iran’s President Ibrahim Raisi, on Sunday, January 8, 2023, in a meeting with the new Venezuelan ambassador in Tehran, warned Venezuela to avoid closer relations with the United States. In addition, the tension in relations with Venezuela will complicate the security situation in Latin America, and these all were the most important factors to the security of the WEF annual meeting, which is currently receiving increased attention.

Continue Reading

Publications

Latest

South Asia1 hour ago

A Hybrid Political System for Pakistan: A Proposal

The political system of Pakistan is an amalgamation of Islamic, British, and Indian influences, shaped by a multifaceted array of...

china india pakistan china india pakistan
South Asia3 hours ago

Regional Implications of Strategic Triangle of China-India & Pakistan

Strategic Triangle is defined as three states binding in a triangle’s strategic relationship. It is focused on three factors. 1)...

gun terrorism gun terrorism
Americas5 hours ago

America’s Exceptionalism in Mass-Shooting and Its Culture of Rugged Individualism

Amid an unrelenting surge of gun massacres, many have wondered why the United States- the world’s leading country in mass...

Southeast Asia9 hours ago

Can the BURMA Act Coagulate the Frozen Conflict in Myanmar?

The BURMA Act of 2021, which seeks to hold the Myanmar’s military junta responsible for human rights violation, is up...

Tech News11 hours ago

EU and Singapore launch Digital Partnership

EU and Singapore are strengthening their cooperation as strategic partners. Following the announcement of a new Digital Partnership between the...

Eastern Europe12 hours ago

Ukraine war’s first anniversary and beyond

The first anniversary of Russia’s special military operation in Ukraine falls on February 24. The Russian strategy of attrition war...

Environment14 hours ago

The Green Deal Industrial Plan: putting Europe’s net-zero industry in the lead

Commission presents a Green Deal Industrial Plan to enhance the competitiveness of Europe’s net-zero industry and support the fast transition...

Trending