In 1975 Senator Frank Church convened a joint senatorial/congressional inquiry into the egregious human rights and civil liberties violations of the Central Intelligence Agency (“CIA”), National Security Agency (“NSA”), as well as the Federal Bureau of Investigation (“FBI”) against people both foreign and domestic. Such blatant transgressions included the “neutralization” and “elimination” of political dissidents, “enemies of the state,” real or imagined threats to National Security, and anyone else on the proverbial shit list of the Military Industrial Complex (“MIC”).
The Church Committee was the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, a U.S. Senate committee chaired by Senator Frank Church (D ID) in 1975. A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the aforementioned agencies after certain activities had been revealed by the Watergate affair.
Some famous examples which have since emerged include: (1) the FBI sending letters to Martin Luther King Jr encouraging him to kill himself or else they would tell the world about his sexual proclivities; (2) the planned or successful assassinations of foreign leaders such as Fidel Castro, Patrice Lumumba, and countless other South American, Middle Eastern or Asian leaders; (3) the wholesale undermining of entire foreign economies if they democratically elected someone at odds with the elite power structure deep state of the United States such as what occurred against Salvatore Allende of Guatemala; (4) the possible assassination of John F Kennedy; (5) revelations of Christopher Pyle in January 1970 of the U.S. Army’s spying on the civilian population; (6) the December 22, 1974 New York Times article by Seymour Hersh detailing operations engaged in by the CIA over the years that had been dubbed the “family jewels,” involving covert action programs involving assassination attempts against foreign leaders and covert attempts to subvert foreign governments were reported for the first time; (7) efforts by intelligence agencies to collect information on the political activities of US citizens; and (8) countless other examples, both overseas and domestically.
The end result of the Church Committee Hearings was the outright banning on CIA assassinations as well as the FBI/DOJ COINTELPRO gang-stalking programs. In 1975 and 1976, the Church Committee published fourteen reports on various U.S. intelligence agencies’ formation, operations, and the alleged abuses of law and of power that they had committed, with recommendations for reform, some of which were later put in place.
Among the other matters investigated were attempts to assassinate other foreign leaders such as Rafael Trujillo of the Dominican Republic, the Diem brothers of Vietnam, Gen. René Schneider of Chile, and Director of CIA Allen Dulles’s plan (approved by President Dwight Eisenhower) to use the Sicilian Mafia to kill Fidel Castro of Cuba.
Under recommendations and pressure by this committee, President Gerald Ford issued Executive Order 11905 (ultimately replaced in 1981 by President Reagan’s Executive Order 12333) to ban U.S. sanctioned assassinations of foreign leaders.
Together, the Church Committee’s reports have been said to constitute the most extensive review of intelligence activities ever made available to the public. Much of the contents were classified, but over 50,000 pages were declassified under the President John F. Kennedy Assassination Records Collection Act of 1992.
The Church Committee learned that beginning in the 1950s, the CIA and FBI intercepted, opened, and photographed more than 215,000 pieces of mail by the time the program was shut down. The Church report found that the CIA was zealous about keeping the US Postal Service from learning that mail was being opened by government agents. CIA agents moved mail to a private room to open the mail or in some cases opened envelopes at night after stuffing them in briefcases or coat pockets to deceive postal officials.
On May 9, 1975, the Church Committee called CIA director William Colby. That same day Ford’s top advisers (Henry Kissinger, Donald Rumsfeld, Philip W. Buchen, and John Marsh) drafted a recommendation that Colby be authorized to brief only rather than testify, and that he would be told to discuss only the general subject, with details of specific covert actions to be avoided except for realistic hypotheticals. But the Church Committee had full authority to call a hearing and require Colby’s testimony. Ford and his top advisers met with Colby to prepare him for the hearing.
The Ford administration, particularly Rumsfeld, was “concerned” about the effort by members of the Church Committee in the Senate and the Pike Committee in the House to curtail the power of U.S. intelligence agencies. It seemed that Rumsfeld et al was comfortable giving the power to arbitrarily destroy anyone as “enemies of the state” by anyone working in the IC and MIC.
COINTELPRO (COunter INTELligence PROgram) was a series of covert and illegal projects conducted by the FBI aimed at surveilling, infiltrating, discrediting, and disrupting domestic “political dissidents.”
FBI records show that COINTELPRO resources targeted groups and individuals that the FBI deemed subversive, including anti Vietnam War organizers, activists of the Civil Rights Movement or Black Power movement (e.g., Martin Luther King, Jr. and the Black Panther Party), feminist organizations, anti colonial movements (such as Puerto Rican independence groups like the Young Lords), and a variety of organizations that were part of the broader New Left.
FBI Director J. Edgar Hoover issued directives on COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and especially their leaders. Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.
Tactics included anonymous phone calls, IRS audits, and the creation of documents that would divide their targets internally.
After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote: “In the light of King’s powerful demagogic speech, we must mark him now, if we have not done so before, as the most dangerous Negro of the future in this nation from the standpoint of communism, the Negro, and national security.”
The Final Report of the Select Frank Church Committee blasted the behavior of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:
“The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law. Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that – the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.”
According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:
(1) Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents;
(2) Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad jacketing to create suspicion about targeted activists, sometimes with lethal consequences;
(3) Harassment via the legal system: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters;
(4) Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations. The object was to frighten or eliminate dissidents and disrupt their movements.
The FBI specifically developed tactics intended to heighten tension and hostility between various factions in their targeted groups and individuals, and this resulted in numerous deaths, among which were San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.
While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI actions indicate that post COINTELPRO reforms did not succeed in ending COINTELPRO tactics.
ENTER THE “COPS” FEDERAL AND STATE SANCTIONED GANG-STALKING PROGRAM
“Community Oriented Policing,” (“COPS”) is a strategy of policing that focuses on police “building ties and working closely with members of the communities,” and originated in 1994 when then Senator Joseph Biden wrote and then President Bill Clinton enacted the Violent Crime Control and Law Enforcement Act (“VCCLEA”) establishing the Office of Community Oriented Policing Services (“COPS”) within the US Department of Justice.
Community policing is supposedly a policy that requires police to engage in a “proactive approach” to address public safety concerns, and is a cornerstone of the Clinton Administration, gaining its funding from the 1994 Violent Crime Control and Law Enforcement Act.
Common implementations of community policing include: (1) relying on community based crime prevention by utilizing “civilian education,” neighborhood watch, and a variety of other techniques, as opposed to relying solely on police patrols; (2) restructuring the patrol from an emergency response based system to emphasizing proactive techniques such as foot patrol; (3) increased officer accountability to civilians they are “supposed to serve;” and (4) decentralizing police authority, allowing more discretion amongst lower ranking officers, and more initiative expected from them.
In other words, federal and state sanctioned and approved GANG-STALKING.
Gang Stalking has been described as fascism, using East Germany style “Stasi Tactics,” a systemic form of control, which seeks to control every aspect of a “Targeted Individual’s” life. Gang Stalking has many similarities to workplace mobbing, but takes place outside in the community, where the target is followed around and placed under surveillance by groups of organized civilian spies/snitches 24/7, 365 days a year. Targeted Individuals are harassed in this way for months or years before they realize that they are being targeted by an organized program of gang-stalking harassment. This is very similar to what happened to many innocent individuals in the former East Germany or activists and dissidents in the former Soviet Union. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. In the former USSR it was used by the state to target activists, political dissidents, or anyone that the Secret Police thought was an “enemy of the state,” or as “mentally unfit,” and many were institutionalized or murdered using this form of systematic control.
In Bill Clinton’s COPS Gang-Stalking Program, civilian spies are recruited from every segment of society, and everyone in the “targets” life is made a part of this ongoing, continuous, and systematic form of control and harassment, with such actions that are specifically designed to control the target and to “keep them in line,” like a Pavlovian Dog. These actions are also designed to mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroy the target over years, to make them appear to be crazy, and leave them with no form of support, whatsoever.
For the targets of this harassment, COPS Gang Stalking is experienced as a covert psychological, emotional and physical attack that is capable of immobilizing and destroying a target over time. For the state, it is a way to keep their targets in line, control them, or ultimately destroy them.
This modern day systematic form of control is funded at the highest levels of government, just like it has in other societies where these similar types of harassment programs have been implemented.
Targets can be chosen for many reasons: (1) political views; (2) whistle blowing; (3) political dissidence; (4) asserting rights at work; (5) making the wrong enemy; (6) too outspoken; (7) investigating something that the state does not want investigated; (8) signing a petition; (9) writing a letter; (10) being “suspicious” by a civilian spy/snitch; or (11) being a religious/ethnic/racial minority.
The goal of the COPS state sanctioned organized gang-stalking program is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalized, or forced suicide. Other goals of this harassment are to destroy the targets reputation and credibility, and to make the target look “crazy” or unstable.
The process often involves sensitizing the target to every day stimuli’s as a form of control, which is used to control targets when they “get out of line.” Targets of this harassment become vulnerable and destitute, and often become homeless, jobless, have a breakdown, are driven to suicide, similar to targets of the banned COINTELPRO. The government eliminates perceived “enemies of the state” in this manner.
When a target moves or changes jobs, the harassment continues.
Every time the target moves, the same defamation, lies, libel, and slander will be spread, and the systematic harassment will continue. Online defamation, libel, and slander on the internet has made this continuation of COPS gang-stalking a great deal easier.
People from all segments of society can be recruited to be the “eyes and ears” of the state, such as laborers, drug dealers, drug users, street people, prostitutes, punks, church groups, youth groups, your best friend, your lawyer, local policeman, doctor, emergency services, a neighbor, family, social workers, politicians, judges, dentists, vet, supermarket cashier, postman, religious leader, care worker, landlord, anyone.
Most of these recruited civilian spies/snitches do not understand or even care that the end consequence of this harassment protocol is to eventually destroy the targeted person, and function as “useful idiots” of the state sanctioned COPS gang-stalking program.
It has been reported that people participate in this COPS gang stalking because it: (1) gives them a sense of power; (2) is a way to make friends; (3) is something social and fun; (4) breaks down race/gender/age/social barriers; (5) is forced or blackmailed upon them by the State or police to take part; (6) is told to them that they are part of “homeland or national security” to help keep an eye on “dangerous” or “emotionally disturbed” individuals where they are “heroic spies for the state;” (7) is used on local thugs or informants who are already being used for other activities where their energies are diverted into these COPS gangstalking community spy programs; (8) is either a choice of spying for the State or police, or else go to jail; (9) involves outright lies and slander about the target to get them to go along with ruining the targets life; (10) includes average citizens recruited by the state the same way citizens were recruited in the former East Germany and other countries.
Some techniques used against targets in this organized COPS Gang-stalking program include: (1) classic conditioning where a target is sensitized to everyday stimuli over a period of months and years to harass them in public to let them know they are constantly being harassed and monitored; (2) 24/7 Surveillance following the target everywhere they go, learning about the target and where they shop, work, play, who their friends and family are, getting close to the target, moving into the community or apartment where they live, across the street, monitoring the targets phone, house, and computer activity; (3) isolating the target via defamation, libel, and slander campaigns, (eg, people in the target’s community are told that the target is a thief, into drugs, a prostitute, pedophile, crazy, in trouble for something, needs to be watched, false files will even be produced on the target, shown to neighbors, family, store keepers); (4) constant or intermittent noise and mimicking campaigns disrupting the targets life and sleep with loud power tools, construction, stereos, doors slamming, etc; (5) talking in public about private things in the target’s life; (6) mimicking actions of the target and basically letting the target know that they are in the target’s life; (7) daily interferences, not too overt to the untrained eye, but psychologically degrading and damaging to the target over time; (8) everyday life breaks and street theater such as flat tires, sleep deprivation, drugging food, putting dirt on targets property; (9) mass strangers doing things in public to annoy targets such as getting called/text messages to be at a specific time and place to perform a specific action; (10) blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from the target; (11) “baiting” tactics where a surveillance operation can selectively capture evidence of a targeted person responding to harassment, and then that evidence could then be used to justify the initiation of more formal scrutiny by a government agency.
The COPS Gang-Stalking Program, as all other state sanctioned/approved gang-stalking programs, have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These coordinated efforts then join hands with others for this systemic form of control and harassment.
Such operations have nothing to do with the target’s criminality – they are led and perpetrated by federal agents and intelligence/security contractors, often with the support of state and local law enforcement personnel. Unofficial operations of this type are often private investigators and vigilantes – including many former agents and police officers, sometimes on behalf of corporate clients and others with connections to the public and private elements of America’s security industry.
The goal of such operations is “disruption” of the life of an individual deemed to be an enemy (or potential enemy) of clients or members of the security state. Arguably, the most accurate term for this form of harassment would be “counterintelligence stalking.”
Agents of communist East Germany’s Stasi (state police) referred to this process as Zersetzung (German for “decomposition” or “corrosion” – a reference to the severe psychological, social, and financial effects upon the victim). Victims have described the process as “no touch torture” – a phrase which also captures the nature of the crime: cowardly, unethical (and often illegal), but difficult to prove legally, because it generates minimal forensic evidence.
Tactics include online and personal slander, libel, defamation, blacklisting, “mobbing” (intense, organized harassment in public), “black bag jobs” (residential break ins), abusive phone calls, computer hacking, framing, threats, blackmail, vandalism, “street theater” (staged physical and verbal interactions with the minions of the people who orchestrate the stalking), harassment by noises, and other forms of bullying.
Such stalking is sanctioned (and in some cases, orchestrated) by federal agencies; however such stalking is also sometimes used unofficially for personal and corporate vendettas by current and former corrupt employees of law enforcement and intelligence agencies, private investigators, and their clients.
Since counterintelligence stalking goes far beyond surveillance – into the realm of psychological terrorism, as it is essentially a form of extrajudicial punishment. As such, the harassment is illegal – even when done by the government. It clearly violates the US Constitution’s Fourth Amendment, which prohibits unwarranted searches, and the Sixth Amendment which guarantees the right to a trial. Such operations also violate similar fundamental rights defined by state constitutions. Stalking is also specifically prohibited by the criminal codes of every state in America.
As was stated above, organized stalking methods were used extensively by communist East Germany’s Stasi (state police) as a means of maintaining political control over its citizens. Although this is supposedly illegal in the US, the same covert tactics are quietly used by America’s local and federal law enforcement, and intelligence agencies, to suppress political and domestic dissent, silence whistle blowers, and get revenge against persons who have angered someone with connections to the public and private agencies involved.
Although Edward Snowden’s revelations about the National Security Agency (“NSA”) in 2013 and 2014 generated a great deal of public discussion about mass surveillance, US domestic counterintelligence activities such as the COPS Program receive relatively little attention.
The FBI’s COINTELPRO operation is still happening, involving even more advanced surveillance technology – and this program is none other than Joseph Biden and Bill Clinton’s COPS Program.
US Department of Justice crime statistics from a 2006 survey indicated that an estimated 445,220 COPS gangstalking victims reported three or more perpetrators (the only ones reported), and this number is growing exponentially on a daily basis.
In addition to being morally reprehensible, the COPS gang stalking program, just like the original version of the FBI’s COINTELPRO operations, is very, very illegal. It violates criminal laws in all fifty states against stalking, as well as grossly violates the US Constitution’s prohibitions against warrantless searches and extra judicial punishment.
While the vast majority of Americans are never personally targeted by the Joseph Biden/Bill Clinton COPS gangstalking program, they should still be concerned about the existence of such operations.
Even if such activities were constitutionally legitimate (which they are not), they still have an enormous potential for abuse as a personal or political weapon by enemies currently employed or friendly with these governmental institutions.
Ending this cowardly and illegal practice by law enforcement agencies, intelligence agencies, and their parasitic corporate and individual recruits will first require exposing what is happening, to the public.
India’s Strategic Use of TTP to Undermine Pakistan’s Stability
Again, bloodshed in the city of flowers, with more than 90 martyrs and at least 250 injured in a suicide attack by the Tehrik-i-Taliban Pakistan in Peshawar. India’s backing for the TTP and its participation in the group’s avowed jihad against Pakistan have emerged as the most important security challenges in South Asia, with significant ramifications for regional stability and peace.
The Tehrik-i-Taliban Pakistan (TTP), commonly known as the Taliban in Pakistan, is a Pakistan-based Islamist extremist group. The group, which was founded in 2007, has claimed responsibility for a number of fatal assaults against Pakistani civilians and military personnel. TTP has proclaimed war against Pakistan’s government and military forces, arguing that they are not Islamic enough.
TTP has become a major security danger to Pakistan over the years, spreading widespread fear and instability. The group’s constant strikes on civilians and military targets have resulted in hundreds of deaths and massive devastation. The rising frequency and savagery of TTP assaults has caused considerable alarm among Pakistanis and the international world. Despite significant international criticism, the TTP continues to carry out atrocities with impunity.
Evidence of India’s Support for TTP:
Over the last decade, Pakistani security services have often reported on the Indian intelligence agency (RAW) providing support to the TTP. This assistance has been reported to include financing, training, and weaponry, all of which have aided the TTP’s capacity to carry out strikes against Pakistan. Pakistani officials, security professionals, and independent investigators have claimed India’s participation with TTP, citing proof of Indian involvement in TTP activities and divulging the false flag operations.
TTP commanders obtaining safe shelter in India is another piece of evidence pointing to India’s connection with TTP. TTP commanders have been said to have crossed the border into India for medical treatment and then stayed for lengthy periods of time. The granting of safe haven to TTP commanders implies that India is not only supporting the organization, but also shielding its leaders from prosecution and reprisal.
In addition to the Indian intelligence agency’s direct backing for TTP, there have been claims of Indian media outlets distributing misinformation in favor of TTP. This has included interviews with TTP officials and positive coverage of TTP’s efforts by Indian news sources. The media coverage has been interpreted as a means for India to legitimize the TTP’s conduct and seek sympathy from the world community.
India is contributing to Pakistan’s instability by supplying TTP with the money, safety, and legitimacy it requires to carry out its assaults.
India’s Motives Behind Supporting TTP:
One of India’s key motivations for supporting the TTP is to undermine Pakistan’s government and military. By assisting the organization, India is able to undermine Pakistan’s ability to maintain security and stability, creating an atmosphere in which the TTP may operate with impunity. The ultimate purpose of this assistance is to weaken Pakistan’s military and political institutions, making it easier for India to achieve a regional advantage.
Another reason India backs the TTP is to create a political and security vacuum in Pakistan. By assisting the organization, India may foment turmoil and instability in the country, creating possibilities for India to exploit the situation. The political and security vacuum left by the TTP’s operations can then be utilized by India to further its own goals and acquire more influence in the area.
India’s backing for the TTP might also be interpreted as an attempt to shift attention away from its own human rights violations in Kashmir. By assisting the TTP and producing turmoil and instability in Pakistan, India is able to divert attention away from its own activities in Kashmir, which have been severely condemned for abusing the human rights of Kashmiris. By helping TTP, India can divert attention away from its own acts and position itself as a responsible regional actor.
The Consequences of India’s Actions:
One of the most serious consequences of India’s backing for the TTP is the worsening of terrorism in Pakistan. India is feeding the fire of terrorism in the area by supplying finance, training, and equipment to the group, making it easier for TTP to carry out its heinous actions. This has had a significant influence on Pakistan’s security and stability, as well as the safety of its population. Terrorism has exacerbated violence and loss of life, creating an environment of dread and insecurity throughout the country.
India’s backing for TTP worsens regional tensions and instability. The rise of terrorism in Pakistan has heightened tensions between Pakistan and India, as well as between Pakistan and its neighbors. This has produced a climate of insecurity and uncertainty in the region, threatening regional peace and security. As each side gets more entrenched in its stance, the international community’s ability to find a solution to the crisis has become more difficult.
India’s backing for TTP has had a significant influence on regional peace and security. The rise in terrorism and tensions has made it increasingly difficult to establish regional peace and stability. This has had a detrimental influence on the region’s economic development, social advancement, and people’s well-being. The continuation of violence and insecurity has also made it more difficult for the international community to address the underlying causes of conflict and work toward a long-term solution.
The international community must take steps to confront India’s backing for TTP. India’s activities are clearly against international law and standards, and they endanger regional peace and security. The international community must strongly denounce India’s conduct and endeavor to hold those involved accountable for their acts.
Holding those involved accountable for their conduct is critical to preventing such incidents in the future. The international community must act to bring individuals who promote terrorism and destabilize the area to account. This involves investigating and punishing individuals responsible for supplying TTP with support, as well as those involved in planning and carrying out terrorist actions. Only by taking firm action can we expect to restore stability and security to the area and prevent such actions in the future.
Cyberwar, Netwar: The Untouchable and Unpredictable
Territorial integrity, sovereignty and non-interference are salient features of a just and secure state. For a state to exist, compete and survive in the international context, a country must be well equipped. The unbiased, neutral and non-aligned movement is the best way to reach heights, especially for small states. However, this is not an easy task, ‘everything has a price’. The existence and co-dependence of a state are made further vulnerable as well as strengthened by way of ‘information’. Unlike in past, when troops protected borders, at present country must face and react to content generated and disseminated on online platforms.
Cyberwar and Netwar are mechanisms that are used by certain individuals as well as entities to infiltrate systems, pass a message, steal information or change the material content. “Cyberwar” is the act of “disrupting, if not destroying, information and communication systems”. On the contrary, “Netwar” is to “disrupt, damage, or modify what a target population knows or thinks it knows about the world around it”. These threats are vicious to national security. Since the whole world is digitalized, any information regardless of its credibility reaches a wide audience. There are various modes of cyberwar including Phishing, Ransomware, E-commerce data interception, Crimeware-as-a-Service, Cyber Scams and Crypto-jacking. (Arquilla and Ronfeldt 1995) states, that a Netwar may focus on public or elite opinion, or both. It may involve diplomacy, propaganda and psychological campaigns, political and cultural subversion, deception of or interference with local media, infiltration of computer networks and databases and efforts to promote dissident or opposition movements across computer networks.
According to Blackfog’s 2021 State of Ransomware Report, government agencies were the top targets for cybercriminals, followed by education, healthcare, services, technology, manufacturing and retail. According to Curran, Concannon and McKeever (in Janczewski and Colarik 2008: 03) have pointed out; the LTTE became the world’s first terrorist outfit to attack a country’s computer system in 1998. Another example is India. In August 2013, Indira Gandhi International Airport (IGI) faced a Cyberattack. ‘Technical snag’ hit the operations of terminal no. 03. Nisar & StepovayaIn (2022) has cited (UNODC, 2021) which states that in September in Malaysia, a web-hosting service was the target of a ransomware attack demanding US$ 900,000 in cryptocurrency and In May, four subsidiaries of an international insurance company in Thailand, Malaysia, Hong Kong, and the Philippines were hit by a ransomware attack asking for US$ 20 million. Where that being said for cyber-war, net war is also a crucial problem. This is explicit in Russia and Ukraine conflict where information advantage is heavily discussed and debated. Byman (2022) has mentioned, “Confrontation between Bahrain, Egypt, Saudi Arabia, and the UAE (the so-called “Quartet”) and Qatar, for example, began in 2017 in part due to social media exploitation involving hacked email accounts and associated disinformation”. Sri Lanka too faces disinformation by LTTE and its international networks.
Threats, which occur on online platforms, are equally important as much as militaristic aspects of warfare. Where the militaristic aspect includes conquering and declaring power, Cyberwar and Netwar disrupt systems and brainwash people respectively. Since crimes conducted, are unpredictable, intangible and cross borders, ascertaining the criminal is daring. Due to these reasons, imposing liability as to whether it is collective or individual becomes strenuous. Furthermore, lack of experience, expertise in personnel, lack of technology and inadequate infrastructure can be identified as problems. Information illiteracy is another pertaining issue, which is the inability of individuals to recognize when information is needed and have the ability to locate, evaluate and use information effectively. Moreover, cyber-attacks are widely done due to their low cost and widespread nature.
With that being said, it is imperative to reiterate, that national security is threatened by Cyberwar as well as Netwar. Thus, any country must overcome the challenges mentioned afore. For that, to fight cyber war, enhancing technological infrastructure and technical capacity is important. In netwar, information literacy must be instilled to the population. Hence, people will be able to evaluate the quality, credibility and validity of the content. In addition, it is crucial to have a reporting mechanism for false content disseminated online. International cooperation is effective to combat Netwar and Cyberwar. Likewise, it is vital to sign and ratify necessary laws and follow resolutions in the international context. Furthermore, individuals, government, as well as private entities, must behave in a cyber-resilient manner that they are otherwise not incentivized to do.
Operation Neptune Spear and the Killing of Osama bin Laden
The founder and first leader of Al-Qaeda, And establishing 20-years republican government in Afghanistan: Neptune Spear was the secret name or code of the operation that was carried out under the leadership of the CIA on May 2, 2011 in the Abbottabad region of Khyber Pakhtunkhwa for killing of the leader of the Al-Qaeda group Osama bin Laden. This operation, which was carried out from Afghanistan to the territory of Pakistan by former President of the United States Barack Obama, is generally known as JSOC.
Why this mission was named Neptune Spear?
The reason why the operation to kill Osama Bin Laden, the leader of the al-Qaeda group, was given the name Neptune’s Spear is as follows: The mission was named Operation Neptune’s Spear because it was the emblem of the United States Navy Seal, and Neptune in classical mythology means the god of the sea. In addition, this operation is commonly known as JSOC, because the Joint Special Operations Command (JSOC) is a sub-command of the United States Special Operations Command (USSOCOM), which played an important role in the operation to kill Osama Bin Laden on May 2, 2011.
The Neptune Spear operation started on May 1, 2011 from the American military base in Jalalabad province of Afghanistan, and ended on May 2 in Abbottabad, Pakistan. Former President Obama, Secretary of State Hillary Rodham Clinton, Vice President Joe Biden, Defense Secretary Robert Gates and members of the national security team were monitoring the operation online. All involved in Operation Neptune Spear were 23 SEALs, an interpreter, two helicopters and a combat dog. The operation started from a base of the American forces in Jalalabad, Afghanistan, on May 1, 2011 at 10:30 pm local time, and on May 2, 2011, after 40 minutes long operation, they ended by killing Osama Bin Laden before one o’clock. Who was Osama Bin Laden and how did he become a big threat to the world, especially the United States? Osama bin Laden, the son of Muhammad bin Awad, was born on March 10, 1957 in Riyadh, Saudi Arabia, but some sources close to Osama believe that he was born in 1958. Osama bin Laden had five wives, his first wife was Najwa Ghanim, who married him in 1974, his second and divorced wife was Khadija Sharif, who married him in 1983, and His third wife was Khairya Saber who married Osama bin Laden in 1985. His fourth wife was Siham Saber, who married Osama bin Laden in 1987, and his fifth wife was Amal al-Sadah, who married Osama bin Laden in 2000.
Osama had about twenty male and female children from his first four wives, but according to some sources, Osama had twenty-four male and female children from his fifth wife, and some put the number of children at 26, but the exact report is 24 about Osama’s children. Osama bin Al-Adeen studied economics at Abdul Aziz University, And in addition to this, after receiving education in the field of Civil engineering, politics and Shari’a, he studied partially in English literature at Oxford University in England, But intellectually, he was more encouraged towards the jihadist ways and intellectually he chose the jihadist way. Before Osama Bin Laden left Britain and went to Pakistan to choose the path of war, he showed intellectual interest in the Muslim Brotherhood in Egypt. Moreover, during his university years, he financially supported jihadist groups in South Sudan, Egypt, Syria and a number of African countries, because he inherited 20 to 25 million dollars from his father, And Osama spends a part of that money on construction projects and financially supports terrorist groups with the money received from those construction companies. In 1979, Bin Laden went to Pakistan and stayed with his intellectual and jihadist teacher, Abdullah Azzam, and prepared for the war against the former Soviet Union in Afghanistan, after that, he became friends with Ayman al-Zawahiri and founded the (Maktab-Al-Khadamat) in 1984 with Abdullah Azzam, Ayman al-Zawahiri and Osama bin Laden. After that, he started recruiting fighters for Mujahideen against the Soviet Union in Afghanistan and spent most of his wealth on financing terrorists. After that, Osama bin Laden started a massive effort to establish Al-Qaeda and started recruiting fighters from Africa, the Middle East and South Asia, And he accelerated the search for young people with a fighting and jihadist mindset from all over the world, and he focused on Egypt in order to attract Egyptian engineers. After extensive financial and armed cooperation with other jihadist organizations in Pakistan, in 1988, the Al-Qaeda armed group was activated by Osama, Not only did they continue their attacks in Afghanistan, but they also carried out many bloody attacks in the Middle East and Africa. The bloodiest attack was the 11th of September 2001 and the darkest day in the history of the United States. September 11 or 9/11, on September 11, 2001, 19 Al-Qaeda terrorists hijacked four commercial airplanes, and the first two commercial airplanes and suicide bombers targeted the New York City International Trade Center. The third plane targeted the headquarters of the Pentagon in Arlington County, Virginia, and the fourth plane planned to attack the federal government building in Washington DC, but did not reach the target, And in four attacks, around 3000 Americans were killed and up to 25000 Americans and foreigners were injured. After this attack, Osama was included in the list of the most wanted terrorists by the United States and the Western alliance, a list controlled by the FBI.
After 10 years of intense investigations and intelligence investigations, on May 2, 2011, the US government avenged 9/11 by killing Osama at the ISI’s most secure location in Abbottabad, Pakistan. However, Osama’s body was thrown into the sea before his body should be presented to the intelligence agencies of the world as evidence. But there is some confidential information that Osama bin Laden, the American dictator and the founder of al-Qaeda, was recruited by the CIA in 1979 at the beginning of the US-sponsored jihadist war against Afghanistan, And he was 22 years old and trained in a CIA-sponsored guerrilla training camp. In any case, Osama’s entry into Afghanistan led to the fall of the first Taliban regime, and at the same time, a person who was famous for so dear to Westerners came to power in Afghanistan.
How did Hamid Karzai get from immigration to the presidency?
Common understanding between former President Hamid Karzai and the Central Intelligence Agency of the United States and some untold facts: When the Al-Qaeda group carried out the deadly attacks in New York, Washington and Pennsylvania on September 11, 2001, and the leader of this group, Osama bin Laden, took refuge in Afghanistan. In addition, the first Taliban regime of Afghanistan at that time, under the leadership of Mullah Omar Mujahid, accepted the refuge of Osama Bin Laden. Not only that, the American people knew that the United States and the security agencies of this country would not remain silent, and would soon start preparing for revenge. But before that the United States, the Central Intelligence Agency, the Army, and the Special Operations Command of the United States Army started a response plan, they first proposed to the Afghan government to hand over Osama Bin Al-Adeen to the United States. Nevertheless, the leader and founder of the Taliban, Mullah Omar Mujahid, rejected their request, and for the second time, the United States tried to mediate the Saudi Arabia. The US asked the Taliban government to hand over Osama to the government of Saudi Arabia, but Mullah Omar Mujahid said that handing over Osama Bin Al-Aden to Saudi Arabia means handing over to America.
Furthermore, after rejecting the second proposal, the plan to attack Afghanistan was started by the United States and its allies on October 7, 2001. Just 15 days after the terrorist attacks of September 11, 2001, CIA and US Special Forces personnel were sent to northern Afghanistan, to meet local tribal leaders and local commanders such as Abdul Rashid Dostum and work together, to start a war against the Taliban, who controlled the country and gave shelter to Osama bin Laden. A CIA team arrived with $3 million in $100 bills to use to recruit tribal leaders and strengthen the war against the Taliban, and teams of military units came from the fifth Special Forces Group. The then President of the United States, George W. Bush, together with the head of the CIA, George J. Tenet, made a coordinated decision to overthrow the Taliban government by appointing an influential person from the southwest zone of Afghanistan after the formation of a new government in the country.
That person was Abdulhad Karzai’s son Hamid Karzai who spent a lot of time in exile in Pakistan, not only he was the national leader for the Pashtuns of this side of the border, but he also had a special status among the Pashtuns of that side of the border in Pakistan. This position made him a target of the CIA. After October 7, 2001, members of the Central Intelligence Agency began to secretly visit Hamid Karzai’s house in Quetta and Chaman, Baluchistan, Pakistan, as a result, in July 2002, Hamid Karzai came to power in Afghanistan under the warm support of the CIA and the West, and he remained the president of Afghanistan until September 2014.
Israelis and Palestinians do what they do best, but for the wrong reasons
Prime Minister Binyamin Netanyahu has put Israel’s closest allies and some of his key partners on the spot. So has...
Mushrooms emerge from the shadows in pesticide-free production push
By Ali Jones Mention La Rioja in northern Spain and most people will picture majestic sun-drenched vineyards nestled in the...
Sisi’s visit to Armenia and Azerbaijan to join the Eurasian Union and BRICS
President El-Sisi’s visit to India, followed by Armenia and Azerbaijan, came as an affirmation from the Egyptian side and its...
West sees Iran in a new way
The Wall Street Journal reported from Tehran that “a lethal crackdown and an ailing economy have quieted anti-government street demonstrations...
Sergey Lavrov: ‘If you want peace, always be ready to defend yourself’
Russian Foreign Minister Sergey Lavrov gave an exclusive interview to Sputnik on Thursday, February 2. The conversation took place at...
More Americans believe US provides ‘too much support’ to Ukraine
A growing portion of Americans think that the U.S. is giving too much support to Ukraine, as the Biden administration...
Will COPUOS five-year mission produce a new “international governance instrument” for outer space resources?
Introduction During its 2022 session, the Legal Subcommittee (LSC) of the United Nation’s Committee on the Peaceful Uses of Outer...
Finance4 days ago
How Twitter can help your business
Finance3 days ago
Your brand needs to be on Twitter, here is why
World News3 days ago
Russian Ministry of Defence: We acquired over 20,000 documents of the U.S. biological programmes
Economy4 days ago
The Prolongation of BRICS: Impact on International World Order and Global Economy
Russia4 days ago
Any “red lines” left for Putin?
Intelligence4 days ago
Cyberwar, Netwar: The Untouchable and Unpredictable
Economy4 days ago
The Theatrics of the US Debt Ceiling: Fiscal Austerity or Political Brinkmanship?
Green Planet4 days ago
Staring an Ecological and Humanitarian Disaster in the Face