In 1975 Senator Frank Church convened a joint senatorial/congressional inquiry into the egregious human rights and civil liberties violations of the Central Intelligence Agency (“CIA”), National Security Agency (“NSA”), as well as the Federal Bureau of Investigation (“FBI”) against people both foreign and domestic. Such blatant transgressions included the “neutralization” and “elimination” of political dissidents, “enemies of the state,” real or imagined threats to National Security, and anyone else on the proverbial shit list of the Military Industrial Complex (“MIC”).
The Church Committee was the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, a U.S. Senate committee chaired by Senator Frank Church (D ID) in 1975. A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the aforementioned agencies after certain activities had been revealed by the Watergate affair.
Some famous examples which have since emerged include: (1) the FBI sending letters to Martin Luther King Jr encouraging him to kill himself or else they would tell the world about his sexual proclivities; (2) the planned or successful assassinations of foreign leaders such as Fidel Castro, Patrice Lumumba, and countless other South American, Middle Eastern or Asian leaders; (3) the wholesale undermining of entire foreign economies if they democratically elected someone at odds with the elite power structure deep state of the United States such as what occurred against Salvatore Allende of Guatemala; (4) the possible assassination of John F Kennedy; (5) revelations of Christopher Pyle in January 1970 of the U.S. Army’s spying on the civilian population; (6) the December 22, 1974 New York Times article by Seymour Hersh detailing operations engaged in by the CIA over the years that had been dubbed the “family jewels,” involving covert action programs involving assassination attempts against foreign leaders and covert attempts to subvert foreign governments were reported for the first time; (7) efforts by intelligence agencies to collect information on the political activities of US citizens; and (8) countless other examples, both overseas and domestically.
The end result of the Church Committee Hearings was the outright banning on CIA assassinations as well as the FBI/DOJ COINTELPRO gang-stalking programs. In 1975 and 1976, the Church Committee published fourteen reports on various U.S. intelligence agencies’ formation, operations, and the alleged abuses of law and of power that they had committed, with recommendations for reform, some of which were later put in place.
Among the other matters investigated were attempts to assassinate other foreign leaders such as Rafael Trujillo of the Dominican Republic, the Diem brothers of Vietnam, Gen. René Schneider of Chile, and Director of CIA Allen Dulles’s plan (approved by President Dwight Eisenhower) to use the Sicilian Mafia to kill Fidel Castro of Cuba.
Under recommendations and pressure by this committee, President Gerald Ford issued Executive Order 11905 (ultimately replaced in 1981 by President Reagan’s Executive Order 12333) to ban U.S. sanctioned assassinations of foreign leaders.
Together, the Church Committee’s reports have been said to constitute the most extensive review of intelligence activities ever made available to the public. Much of the contents were classified, but over 50,000 pages were declassified under the President John F. Kennedy Assassination Records Collection Act of 1992.
The Church Committee learned that beginning in the 1950s, the CIA and FBI intercepted, opened, and photographed more than 215,000 pieces of mail by the time the program was shut down. The Church report found that the CIA was zealous about keeping the US Postal Service from learning that mail was being opened by government agents. CIA agents moved mail to a private room to open the mail or in some cases opened envelopes at night after stuffing them in briefcases or coat pockets to deceive postal officials.
On May 9, 1975, the Church Committee called CIA director William Colby. That same day Ford’s top advisers (Henry Kissinger, Donald Rumsfeld, Philip W. Buchen, and John Marsh) drafted a recommendation that Colby be authorized to brief only rather than testify, and that he would be told to discuss only the general subject, with details of specific covert actions to be avoided except for realistic hypotheticals. But the Church Committee had full authority to call a hearing and require Colby’s testimony. Ford and his top advisers met with Colby to prepare him for the hearing.
The Ford administration, particularly Rumsfeld, was “concerned” about the effort by members of the Church Committee in the Senate and the Pike Committee in the House to curtail the power of U.S. intelligence agencies. It seemed that Rumsfeld et al was comfortable giving the power to arbitrarily destroy anyone as “enemies of the state” by anyone working in the IC and MIC.
COINTELPRO (COunter INTELligence PROgram) was a series of covert and illegal projects conducted by the FBI aimed at surveilling, infiltrating, discrediting, and disrupting domestic “political dissidents.”
FBI records show that COINTELPRO resources targeted groups and individuals that the FBI deemed subversive, including anti Vietnam War organizers, activists of the Civil Rights Movement or Black Power movement (e.g., Martin Luther King, Jr. and the Black Panther Party), feminist organizations, anti colonial movements (such as Puerto Rican independence groups like the Young Lords), and a variety of organizations that were part of the broader New Left.
FBI Director J. Edgar Hoover issued directives on COINTELPRO, ordering FBI agents to “expose, disrupt, misdirect, discredit, neutralize or otherwise eliminate” the activities of these movements and especially their leaders. Under Hoover, the agent in charge of COINTELPRO was William C. Sullivan.
Tactics included anonymous phone calls, IRS audits, and the creation of documents that would divide their targets internally.
After the 1963 March on Washington for Jobs and Freedom, Hoover singled out King as a major target for COINTELPRO. Under pressure from Hoover to focus on King, Sullivan wrote: “In the light of King’s powerful demagogic speech, we must mark him now, if we have not done so before, as the most dangerous Negro of the future in this nation from the standpoint of communism, the Negro, and national security.”
The Final Report of the Select Frank Church Committee blasted the behavior of the intelligence community in its domestic operations (including COINTELPRO) in no uncertain terms:
“The Committee finds that the domestic activities of the intelligence community at times violated specific statutory prohibitions and infringed the constitutional rights of American citizens. The legal questions involved in intelligence programs were often not considered. On other occasions, they were intentionally disregarded in the belief that because the programs served the “national security” the law did not apply. While intelligence officers on occasion failed to disclose to their superiors programs which were illegal or of questionable legality, the Committee finds that the most serious breaches of duty were those of senior officials, who were responsible for controlling intelligence activities and generally failed to assure compliance with the law. Many of the techniques used would be intolerable in a democratic society even if all of the targets had been involved in violent activity, but COINTELPRO went far beyond that – the Bureau conducted a sophisticated vigilante operation aimed squarely at preventing the exercise of First Amendment rights of speech and association, on the theory that preventing the growth of dangerous groups and the propagation of dangerous ideas would protect the national security and deter violence.”
According to attorney Brian Glick in his book War at Home, the FBI used four main methods during COINTELPRO:
(1) Infiltration: Agents and informers did not merely spy on political activists. Their main purpose was to discredit and disrupt. Their very presence served to undermine trust and scare off potential supporters. The FBI and police exploited this fear to smear genuine activists as agents;
(2) Psychological warfare: The FBI and police used myriad “dirty tricks” to undermine progressive movements. They planted false media stories and published bogus leaflets and other publications in the name of targeted groups. They forged correspondence, sent anonymous letters, and made anonymous telephone calls. They spread misinformation about meetings and events, set up pseudo movement groups run by government agents, and manipulated or strong armed parents, employers, landlords, school officials and others to cause trouble for activists. They used bad jacketing to create suspicion about targeted activists, sometimes with lethal consequences;
(3) Harassment via the legal system: The FBI and police abused the legal system to harass dissidents and make them appear to be criminals. Officers of the law gave perjured testimony and presented fabricated evidence as a pretext for false arrests and wrongful imprisonment. They discriminatorily enforced tax laws and other government regulations and used conspicuous surveillance, “investigative” interviews, and grand jury subpoenas in an effort to intimidate activists and silence their supporters;
(4) Illegal force: The FBI conspired with local police departments to threaten dissidents; to conduct illegal break ins in order to search dissident homes; and to commit vandalism, assaults, beatings and assassinations. The object was to frighten or eliminate dissidents and disrupt their movements.
The FBI specifically developed tactics intended to heighten tension and hostility between various factions in their targeted groups and individuals, and this resulted in numerous deaths, among which were San Diego Black Panther Party members John Huggins, Bunchy Carter and Sylvester Bell.
While COINTELPRO was officially terminated in April 1971, critics allege that continuing FBI actions indicate that post COINTELPRO reforms did not succeed in ending COINTELPRO tactics.
ENTER THE “COPS” FEDERAL AND STATE SANCTIONED GANG-STALKING PROGRAM
“Community Oriented Policing,” (“COPS”) is a strategy of policing that focuses on police “building ties and working closely with members of the communities,” and originated in 1994 when then Senator Joseph Biden wrote and then President Bill Clinton enacted the Violent Crime Control and Law Enforcement Act (“VCCLEA”) establishing the Office of Community Oriented Policing Services (“COPS”) within the US Department of Justice.
Community policing is supposedly a policy that requires police to engage in a “proactive approach” to address public safety concerns, and is a cornerstone of the Clinton Administration, gaining its funding from the 1994 Violent Crime Control and Law Enforcement Act.
Common implementations of community policing include: (1) relying on community based crime prevention by utilizing “civilian education,” neighborhood watch, and a variety of other techniques, as opposed to relying solely on police patrols; (2) restructuring the patrol from an emergency response based system to emphasizing proactive techniques such as foot patrol; (3) increased officer accountability to civilians they are “supposed to serve;” and (4) decentralizing police authority, allowing more discretion amongst lower ranking officers, and more initiative expected from them.
In other words, federal and state sanctioned and approved GANG-STALKING.
Gang Stalking has been described as fascism, using East Germany style “Stasi Tactics,” a systemic form of control, which seeks to control every aspect of a “Targeted Individual’s” life. Gang Stalking has many similarities to workplace mobbing, but takes place outside in the community, where the target is followed around and placed under surveillance by groups of organized civilian spies/snitches 24/7, 365 days a year. Targeted Individuals are harassed in this way for months or years before they realize that they are being targeted by an organized program of gang-stalking harassment. This is very similar to what happened to many innocent individuals in the former East Germany or activists and dissidents in the former Soviet Union. Many innocent people in the former East Germany would be targeted for these harassment programs, and then their friends, family, and the community at large would be used to monitor, prosecute, and harass them. In the former USSR it was used by the state to target activists, political dissidents, or anyone that the Secret Police thought was an “enemy of the state,” or as “mentally unfit,” and many were institutionalized or murdered using this form of systematic control.
In Bill Clinton’s COPS Gang-Stalking Program, civilian spies are recruited from every segment of society, and everyone in the “targets” life is made a part of this ongoing, continuous, and systematic form of control and harassment, with such actions that are specifically designed to control the target and to “keep them in line,” like a Pavlovian Dog. These actions are also designed to mentally, physically, emotionally, spiritually, financially, socially, and psychologically destroy the target over years, to make them appear to be crazy, and leave them with no form of support, whatsoever.
For the targets of this harassment, COPS Gang Stalking is experienced as a covert psychological, emotional and physical attack that is capable of immobilizing and destroying a target over time. For the state, it is a way to keep their targets in line, control them, or ultimately destroy them.
This modern day systematic form of control is funded at the highest levels of government, just like it has in other societies where these similar types of harassment programs have been implemented.
Targets can be chosen for many reasons: (1) political views; (2) whistle blowing; (3) political dissidence; (4) asserting rights at work; (5) making the wrong enemy; (6) too outspoken; (7) investigating something that the state does not want investigated; (8) signing a petition; (9) writing a letter; (10) being “suspicious” by a civilian spy/snitch; or (11) being a religious/ethnic/racial minority.
The goal of the COPS state sanctioned organized gang-stalking program is to isolate the target from all forms of support, so that the target can be set up in the future for arrest, institutionalized, or forced suicide. Other goals of this harassment are to destroy the targets reputation and credibility, and to make the target look “crazy” or unstable.
The process often involves sensitizing the target to every day stimuli’s as a form of control, which is used to control targets when they “get out of line.” Targets of this harassment become vulnerable and destitute, and often become homeless, jobless, have a breakdown, are driven to suicide, similar to targets of the banned COINTELPRO. The government eliminates perceived “enemies of the state” in this manner.
When a target moves or changes jobs, the harassment continues.
Every time the target moves, the same defamation, lies, libel, and slander will be spread, and the systematic harassment will continue. Online defamation, libel, and slander on the internet has made this continuation of COPS gang-stalking a great deal easier.
People from all segments of society can be recruited to be the “eyes and ears” of the state, such as laborers, drug dealers, drug users, street people, prostitutes, punks, church groups, youth groups, your best friend, your lawyer, local policeman, doctor, emergency services, a neighbor, family, social workers, politicians, judges, dentists, vet, supermarket cashier, postman, religious leader, care worker, landlord, anyone.
Most of these recruited civilian spies/snitches do not understand or even care that the end consequence of this harassment protocol is to eventually destroy the targeted person, and function as “useful idiots” of the state sanctioned COPS gang-stalking program.
It has been reported that people participate in this COPS gang stalking because it: (1) gives them a sense of power; (2) is a way to make friends; (3) is something social and fun; (4) breaks down race/gender/age/social barriers; (5) is forced or blackmailed upon them by the State or police to take part; (6) is told to them that they are part of “homeland or national security” to help keep an eye on “dangerous” or “emotionally disturbed” individuals where they are “heroic spies for the state;” (7) is used on local thugs or informants who are already being used for other activities where their energies are diverted into these COPS gangstalking community spy programs; (8) is either a choice of spying for the State or police, or else go to jail; (9) involves outright lies and slander about the target to get them to go along with ruining the targets life; (10) includes average citizens recruited by the state the same way citizens were recruited in the former East Germany and other countries.
Some techniques used against targets in this organized COPS Gang-stalking program include: (1) classic conditioning where a target is sensitized to everyday stimuli over a period of months and years to harass them in public to let them know they are constantly being harassed and monitored; (2) 24/7 Surveillance following the target everywhere they go, learning about the target and where they shop, work, play, who their friends and family are, getting close to the target, moving into the community or apartment where they live, across the street, monitoring the targets phone, house, and computer activity; (3) isolating the target via defamation, libel, and slander campaigns, (eg, people in the target’s community are told that the target is a thief, into drugs, a prostitute, pedophile, crazy, in trouble for something, needs to be watched, false files will even be produced on the target, shown to neighbors, family, store keepers); (4) constant or intermittent noise and mimicking campaigns disrupting the targets life and sleep with loud power tools, construction, stereos, doors slamming, etc; (5) talking in public about private things in the target’s life; (6) mimicking actions of the target and basically letting the target know that they are in the target’s life; (7) daily interferences, not too overt to the untrained eye, but psychologically degrading and damaging to the target over time; (8) everyday life breaks and street theater such as flat tires, sleep deprivation, drugging food, putting dirt on targets property; (9) mass strangers doing things in public to annoy targets such as getting called/text messages to be at a specific time and place to perform a specific action; (10) blocking targets path, getting ahead of them in line, cutting or boxing them in on the road, saying or doing things to elicit a response from the target; (11) “baiting” tactics where a surveillance operation can selectively capture evidence of a targeted person responding to harassment, and then that evidence could then be used to justify the initiation of more formal scrutiny by a government agency.
The COPS Gang-Stalking Program, as all other state sanctioned/approved gang-stalking programs, have always been funded by the Government. They are the only ones with enough money, coordination, and power to keep such a system in place. These coordinated efforts then join hands with others for this systemic form of control and harassment.
Such operations have nothing to do with the target’s criminality – they are led and perpetrated by federal agents and intelligence/security contractors, often with the support of state and local law enforcement personnel. Unofficial operations of this type are often private investigators and vigilantes – including many former agents and police officers, sometimes on behalf of corporate clients and others with connections to the public and private elements of America’s security industry.
The goal of such operations is “disruption” of the life of an individual deemed to be an enemy (or potential enemy) of clients or members of the security state. Arguably, the most accurate term for this form of harassment would be “counterintelligence stalking.”
Agents of communist East Germany’s Stasi (state police) referred to this process as Zersetzung (German for “decomposition” or “corrosion” – a reference to the severe psychological, social, and financial effects upon the victim). Victims have described the process as “no touch torture” – a phrase which also captures the nature of the crime: cowardly, unethical (and often illegal), but difficult to prove legally, because it generates minimal forensic evidence.
Tactics include online and personal slander, libel, defamation, blacklisting, “mobbing” (intense, organized harassment in public), “black bag jobs” (residential break ins), abusive phone calls, computer hacking, framing, threats, blackmail, vandalism, “street theater” (staged physical and verbal interactions with the minions of the people who orchestrate the stalking), harassment by noises, and other forms of bullying.
Such stalking is sanctioned (and in some cases, orchestrated) by federal agencies; however such stalking is also sometimes used unofficially for personal and corporate vendettas by current and former corrupt employees of law enforcement and intelligence agencies, private investigators, and their clients.
Since counterintelligence stalking goes far beyond surveillance – into the realm of psychological terrorism, as it is essentially a form of extrajudicial punishment. As such, the harassment is illegal – even when done by the government. It clearly violates the US Constitution’s Fourth Amendment, which prohibits unwarranted searches, and the Sixth Amendment which guarantees the right to a trial. Such operations also violate similar fundamental rights defined by state constitutions. Stalking is also specifically prohibited by the criminal codes of every state in America.
As was stated above, organized stalking methods were used extensively by communist East Germany’s Stasi (state police) as a means of maintaining political control over its citizens. Although this is supposedly illegal in the US, the same covert tactics are quietly used by America’s local and federal law enforcement, and intelligence agencies, to suppress political and domestic dissent, silence whistle blowers, and get revenge against persons who have angered someone with connections to the public and private agencies involved.
Although Edward Snowden’s revelations about the National Security Agency (“NSA”) in 2013 and 2014 generated a great deal of public discussion about mass surveillance, US domestic counterintelligence activities such as the COPS Program receive relatively little attention.
The FBI’s COINTELPRO operation is still happening, involving even more advanced surveillance technology – and this program is none other than Joseph Biden and Bill Clinton’s COPS Program.
US Department of Justice crime statistics from a 2006 survey indicated that an estimated 445,220 COPS gangstalking victims reported three or more perpetrators (the only ones reported), and this number is growing exponentially on a daily basis.
In addition to being morally reprehensible, the COPS gang stalking program, just like the original version of the FBI’s COINTELPRO operations, is very, very illegal. It violates criminal laws in all fifty states against stalking, as well as grossly violates the US Constitution’s prohibitions against warrantless searches and extra judicial punishment.
While the vast majority of Americans are never personally targeted by the Joseph Biden/Bill Clinton COPS gangstalking program, they should still be concerned about the existence of such operations.
Even if such activities were constitutionally legitimate (which they are not), they still have an enormous potential for abuse as a personal or political weapon by enemies currently employed or friendly with these governmental institutions.
Ending this cowardly and illegal practice by law enforcement agencies, intelligence agencies, and their parasitic corporate and individual recruits will first require exposing what is happening, to the public.
Coronavirus: Bioterrorism or Not, Who Is the Winner?
Authors: Sajad Abedi and Mohammad Amin Zabihi*
It has been so long since the early instances of using toxins, chemicals, and diseases as agents of assassinations and/or even mass murder. There are numerous historical and even modern instances of using toxins in assassinations, or using contagious diseases in warfare without even knowing about the bacteria or virus. For example, (allegedly) the first registered event of such method goes back to 14th century when Tatar army, desperate to win after three years of siege, threw corpses of plague victims to the Caffa city, causing an outbreak of this disease within the city. But the most important part happened afterwards; some soldiers could manage to escape on boats – Caffa was a port city on the Crimea Sea – to Italy, unaware of the fact that they were already infected. Nevertheless, most of them died along the way, but infected rats and remaining bodies caused one the major waves of plague pandemic all over the Europe.
The paramount point is that in our modern world, it is just a matter of hours to leave New York and land somewhere else, thousands of miles away, even before the first symptoms of your disease manifest itself. In fact, the most horrifying factor of any contagious disease could be its latent period.
On the other hand, considering the unprecedent pace of ever-growing biological technologies, many developed countries possess the ability to develop an intelligent virus equipped with customized features in order to remain unnoticed on the victim’s (vector’s) body for quiet a time, and only manifest itself after it infected a considerable number of surrounding people. More interestingly, such customized virus can be planned whether to disable a specific organ or to metastasize within the whole system of the host. Even more, it can be planned according to the genetic map of people within a given region.
Looking at the whole picture with broader perspective, it does not matter whether the agent is toxic, chemical, or biological. The capability to produce and employ a virus, bacteria, or toxin by malicious actors, namely terrorists or criminals, could bring disastrous results.As we witnessed such case during 1990s in Japan – the Aum Shinrikyo Cult.
In fact, if we are going to prevent such disasters, first we should find the potential actors who may resort to such actions, investigate the probable ways, and also understand the costs, benefits, motives, and risks of which for these potential actors.
Of course, terrorists and criminals are the first probable examples which may pop up in our minds, but looking more rigorously, state actors are also among the potential cases. In the case of Coronavirus outbreak, if one considers it as an instance of bioterrorism/biological-war act, the probability of participation of terrorist or criminal organizations seems to be low, due to the complexity of production process and the highly advanced technologies required to produce such virus at the first place. On the other hand, a terrorist organization typically claims the responsibility of such attack in order to earn the reputation, and a criminal organization may demand ransom prior to release the virus – otherwise it would not be beneficial, unless they already have the cure (vaccine/antidote) ready to sell. In any case, it doesn’t seem probable.
Considering the fact that, in the case of a pandemic, finding the main cause and the zero patient in this complex, interconnected world is significantly difficult (if possible), state actors may resort to such options due to multiple reasons. They may try to initiate a hidden biological war against another country (countries), in order to cause economic interruptions, socio-political chaos, create power vacuum in a specific area, forcing another actor to leave a region, or just simply to enjoy the economic benefits of selling the vaccine or antidote to victims. Obviously, there will be some serious prosecutions and consequences in the case that some concrete evidence shows any tracks of participation of an actor – whether a sovereign state or even a pharmaceutical company; but in such cases, states usually start to throw allegations at each other anyway.
We are living in a world that any kind of news affect the open markets immediately; the more important the news is, the deeper it affects the markets. In this case – Coronavirus – we witnessed a serious drop in international stock markets –especially oil markets – all over the world, which coincided with Russia’s ambivalence approach regarding the cutting supply decision made by OPEC – and also Saudi Arabia’s reaction to the whole story. Altogether, these factors caused a serious drop in different markets which, in fact, started with the news of Coronavirus outbreak at the first place. Who gets the best use of such scenario? The oil and gas producers are the main victims, obviously; but if one (the alleged perpetrator) knows the whole story before it happens, he would sell at the highest price and buy at the lowest price again – after the price crash, president Trump ordered to stock up the US oil reserves.
Although it seems pretty convincing, but is it really rational? What are the risks and costs? In reality, the pandemic of a dangerous virus – one like Coronavirus – equipped with a two-week latent period, in a high-populated country like China can cause sever problems in almost every corner of the planet; in fact, the bigger economy you have, the deeper your challenge would be. The implications of such outbreak are considerably wide: (1) it causes decrease in oil prices which will result in budget deficits in oil-dependent countries – like Russia, Iran, Saudi Arabia; (2) it interrupts the production process and consequently the sale chains – like China; (3) reduces the tourists travels which will consequently result in budget deficits in tourist-dependent countries – like Turkey and most of EU; (4) it causes sever socio-economic costs, especially for populated countries – like China, US, and Russia.
Altogether, if one state actor decides to initiate a biological war against another state, using a virus agent which has the potential to cause a global pandemic, it should consider the possibility of backfiring the same gun inside its own country in numerous ways. In an interconnected world like the one we are living in, such actions cause gargantuan reactions in different ways, one may not be able to predict all of them. Considering such costs and also the risk of being traced back and accused of committing such horrifying act, the possibility of state-sponsorship in these cases will be considered relatively low (but still possible). It is not like creating a computer virus – like Stuxnet – that may or may not blow back to your face; it is the matter of people’s lives.
Amin Zabihi, MSc. Regional Studies, Allameh Tabatabaei University
 Nowadays it is Feodosia, Ukraine
Also known as Black Death
The Prospect of Bioterrorism: The Threat of Pathogen, Biting Insects and Dirty Bomb in Europe and UK
The recent coronavirus attacks authenticate my postulation of the intensification of bioterrorism in Europe and Asia in 2020. The blame game between Washington and China further prompted misunderstanding about the hegemonic role of the US army that it wants to mitigate the future role of nuclear weapons and missile technology in peace and war. Chinese Ambassador was summoned in Washington when Foreign Ministry in Beijing tweeted that the deadly coronavirus was seeded in Wuhan by the US military. US President Donald Trump also called Covid-19 a “Chinese” and “foreign” virus, earning condemnations not only from Beijing but also from much of the mainstream media. However, China categorically stated that the coronovirus attack was a hybrid war against its economy and industry. Moreover, initially, Iranian officials also declared that the coronavirus was a biological weapon created in US military laboratories. Some state in Europe demonstrated weakness in fighting the Coronavirus war against their population.
Italy and France have been irritated in overcoming the death rate from the disease, while the British Prime Minister become frustrated in changing his controversial approach to the pandemic spread across the country. On 22 March 2020, the Guardian newspaper reported frustration of Downing Street about the shameless statement of controversial adviser to the Prime Minister Boris Johnson, Dominic Mckenzie Cummings, who argued in a private meeting that the government’s strategy towards the coronavirus was “herd immunity, protect the economy and if some pensioners die”. The allegations, which were widely circulated online widely criticised that the government response to the Coronavirus was initially too weak, frustrated and controversial based on a notion that rather than limiting its spread, enough people could be allowed to contract it to give population-wide “herd immunity”. Dominic Mckenzie Cummings was born 25 November 1971 is a British political strategist who has been serving as Chief Adviser to Prime Minister Boris Johnson since July 2019.
Since 9/11, the threat of nuclear and biological terrorism has been at the forefront of the international security agenda. Bio terror experts have stressed the need on prevention of terrorist groups operating in Europe and the UK from gaining access to weapons of mass destruction and from perpetrating atrocious acts of biological terrorism. Recent events in Europe have raised the prospect of extremist and jihadist groups using biological, radiological and chemical attacks against civilian and military installations. The greatest threat to the national security of Europe and the UK stems from smuggling of material of dirty bomb, pathogen and smuggling of biting insects. As international media focused on the looming threat of chemical and biological terrorism in Europe, extremist and jihadist groups are seeking these weapons to inflict fatalities on civilian population.
Bioterrorism is terrorism involving the intentional release or dissemination of biological agents. These agents are bacteria, viruses, fungi, or toxins, and may be in a naturally occurring or a human-modified form, in much the same way in biological warfare. Biological agents are used by the terrorists to attain their social or political goals and are used for killing or injuring people, plants and animals. Response of Europe to the threat of future bioterrorism seems limited due to political and economic reservations of some member states. The approach to searching for biological agents at airports and shipping container entry points, and promoting bio-hazard awareness raised several important questions. Biological terrorism can be loosely categorised based on the agent used. The virus threat including smallpox, influenza, dengue fever, yellow fever, Rift Valley fever, and haemorrhagic fevers like Lassa, Ebola, and Marburg. Smallpox spreads directly from person to person. The third category of bio-threat is ‘bacteria’, which includes anthrax, plague, and cholera. There are numerous reports on the genetically development of viruses by some states to use it and achieve their political and economic goal.
One of these reports on insect war is the investigative report of Bulgarian investigative journalist and Middle East correspondent Dilyana Gaytandzhieva (12 September 2018), who published a series of reports. Her current work focuses on war crimes and illicit arms exports to war zones around the world. The Alternative World Website and Zodlike Productions, a news forum has published her fresh analysis of future insect war. She has painted a consternating picture of US insect war in her investigative report, and warns that the prospect of biological terrorism is consternating:
“Pentagon’s scientists have been deployed in 25 countries and given diplomatic immunity to research deadly viruses, bacteria and toxins at US military offshore biolaboratories under a $2.1 billion DoD program. The US Embassy to Tbilisi transports frozen human blood and pathogens as diplomatic cargo for a secret US military program. Internal documents, implicating US diplomats in the transportation of and experimenting on pathogens under diplomatic cover were leaked to me by Georgian insiders. According to these documents, Pentagon scientists have been deployed to the Republic of Georgia and have been given diplomatic immunity to research deadly diseases and biting insects at the Lugar Center–the Pentagon biolaboratory in Georgia’s capital Tbilisi. In 2014, The Lugar Center was equipped with an insect facility and launched a project on Sand Flies in Georgia and the Caucasus. In 2014-2015 sand fly species were collected under another project “Surveillance Work on Acute Febrile Illness” and all (female) sand flies were tested to determine their infectivity rate. A third project, also including sand flies collection, studied the characteristics of their salivary glands. Sand flies carry dangerous parasites in their saliva which they can transmit to humans through a bite”.
With the establishment of Islamic State ISIS in Syria and Iraq, Pakistan and Afghanistan, and its secret networks in Europe, international community has now focused on the proliferation and smuggling of chemical and biological weapons in the region. Recent debate in Europe-based think tanks suggests that, as the group retrieved nuclear and biological material from the Mosul University in Iraq, it can possibly make Nuclear Explosive Devices (NED) with less than eight kilogrammes plutonium. The debate about bioterrorism and bio-defence is not entirely new in the military circles of Europe; the involvement of ISIS in using biological weapons against the Kurdish army in Kobane is a warning for the UK and European Union member states to deeply concentrate on the proliferation of these weapons in the region.
As Islamic State ISIS now controls parts of Iraq and Syria and has carried out successful attacks in France, Germany, UK and Brussels, the group now wants to expand its terror networks to the borders of Russia and China. According to some confirmed reports, hundreds of Pakistanis have joined the army of ISIS in Syria and Iraq, while a women brigade of the ISIS army is operating in Pakistan. The problem of nuclear and biological terrorism deserves special attention from the EU and UK governments because experts warned that the army of ISIS has retrieved capabilities to develop a dirty bomb in which explosives can be combined with a radioactive source like those commonly used in hospitals or extractive industries. The use of this weapon might have severe health effects, causing more disruption than destruction.
In Europe, there is a general perception that ISIS has already used some dangerous gases in Iraq, and it could use biological weapons against civilian populations in UK and EU. If control over these weapons is weak, or if their components are available in the open market, there would be huge destruction in the region. In July 2014, the government of Iraq notified that nuclear material had been seized by the ISIS army from Mosul University. The ISIS published a 19-page document in Arabic on how to develop biological weapons, and a 26-page religious fatwa that allows the use of weapons of mass destruction. “If Muslims cannot defeat the kafir (non-believers) in a different way, it is permissible to use weapons of mass destruction,” warns the fatwa.
The effects of biological weapons are worse as they cause death or disease in humans, animals or plants. The fatalities of dengue and ebola viruses in West Africa are the worst forms of bioterrorism. There are speculations that, in future, measles, dengue, polio and the ebola viruses can be used as weapons of bioterrorism in Europe and the UK. Some states might use drones for the purposes of bio-war against their rival states. In 2013, writing in the Global Policy journal, Amanda M Teckman warned that ISIS might possibly use ebola as a weapon against the civilian population: “It remains to be seen if a terrorist group like ISIS, which has demonstrated a willingness to engage in large scale mass murder, including the uninhibited murder of civilians, has the capability to produce a weaponised version of ebola.”
Debate among the European Union intelligence experts normally starts with the assumption that without a professional intelligence analysis on law enforcement level, prevention of bioterrorism is impossible. In the wake of the terrorist attacks in Brussels, security experts raised the question of intelligence-sharing failure, which caused huge infrastructural destruction and the killings of innocent civilians. Terrorists killed more than 34 innocent people and injured over 200 in Brussels. The failure of French and Brussels intelligence agencies to tackle the menace of extremism and the exponentially growing networks of the Islamic State (ISIS) prompted a deep distrust between the law enforcement agencies and civil society of the two states. The French and Belgium intelligence infrastructure also suffered from a lack of check and balance. This huge intelligence gap has badly affected the intelligence cooperation with other EU member states. The Belgian Foreign Minister warned that more intelligence on home-growing extremism was a must after the EU secret agencies came under heavy criticism immediately after they failed to share intelligence with France about the Paris attackers. French Interior Minister complained that no information about possible attacks was provided by EU secret agencies.
Cybercrime effecting banking sector/economy of Pakistan
Cyber-crime is not a conventional offence as its ramifications transcend borders. It affects a society in different ways. The term “cybercrime” denotes any sort of illegal activity that uses a computer, cell phone or any other electronic device as its primary means of commission. The computer and electronic devices serve as the agents and the facilitator of the crime. Cyber criminals take full advantage of obscurity, secrecy, and interconnectedness provided by the internet and are able to attack the foundations of our modern information society. Breaching of cyber space is an issue of utmost concern for the banks and financial institutions. The menace of data theft is growing in magnitude with huge financial impact. As custodian of highly valuable customer information, banks have always been the favorite target of the cyber-attacks.
Moreover it is estimated that banks are more frequently targeted by the hackers than any other business organization. IT based financial solutions of the banks such as ATMs, mobile banking and internet banking are exposed to various forms of frauds including skimming and phishing etc. Affected banks may also witness decline in their share prices. Banking industry is more susceptible to the breach of cyber security due to its financial lure for the transgressors. In Pakistan, banking is increasing its user base at a brisk pace; the resulting threats are also multiplying. Financial services in Pakistan i.e. credit cards, accounts information and other, can also be acquired for theft or fabrication. During last few years Pakistan faced some serious cyber breaches in the banking sector. In 2018 it lost US $6 million in cyber-attacks as online security measures failed to prevent breach of security in which overseas hackers stole customer’s data.Data from 19,864 debit cards belonging to customers of 22 Pakistani banks has been put on sale on the dark web, according to an analysis conducted in year 2018 by Pakistan’s Computer Emergency Response Team, PakCERT.
However Cyber breaches of January 24 and January 30, 2019 included such data in large quantities pertaining to bank Meezan Bank Ltd. Gemini Advisory; a body that provides guidance with addressing emerging cyber threats stated that the compromised records posted between January 24 and January 30, 2019 is associated with a compromise of Meezan Bank Limited’s internal systems. Cyber security company “Group-IB”on a February 22,2019 in advisory stated that money mules use the fake cards, to either withdraw money from ATMs or buy goods” that are later resold by fraudsters. Despite efforts of banks to eliminate ATM card fraud, criminals still find ways around security measures to acquire card data at the point of sale.
The impact of a single, successful cyber-attack can have far-reaching implications including financial losses, theft of intellectual property, and loss of consumer confidence and trust. The overall monetary impact of cyber-crime on society and government is estimated to be billions of dollars a year. While, the banks in Pakistan claim that they have insurance policies, they do not seem much interested in securing their system and the public remains highly affected by such attacks. There is growing sense of distrust in the online banking. Several banking organizations fail to provide proper insurance to their customer. That is why people are more comfortable in keeping their money and reserves at home rather than banks. This is one of the major factors that add to country’s severe economic decline.
Pakistan needs to develop its cyber capabilities infrastructure and should invest in the youth to build a cyber security force of young experts. Simultaneously, there is a need to focus on artificial intelligence, block chains and software robots as suggested by Chief Technology Officer Huawei (Middle East and European Union) Jorge Sebastiao in the recent international seminar on Global Strategic Threat and Response (GSTAR). Establishing a stronger cyber infrastructure will provide stronger security guarantees to the IT enabled services especially to the banking systems of Pakistan. This will in turn enhance the economic growth and security. Furthermore, the transnational nature of cyber-crime makes cyber-security a global challenge and, hence, demands collective and collaborative measures at the international level with flawless and strong legal and cyber policy framework.
In this regard, Pakistan’s cyber-law provides for ‘international cooperation.’ It has the membership of the International Multilateral Partnership against Cyber Threats (ITUIMPACT) and participates in Asia Pacific Security Incident Response Coordination Working Group (APSIRC-WG). However, cyber-security does not appear to be a priority on the country’s agenda for international dialogue and agreements. Pakistan needs to review the Prevention of Electronic Crimes Bill which will contribute mainly to increase the security of banking systems.
Covid-19 Might not be the End
The world seems to be oblivious when it comes to the non-traditional security paradigms hence certain natural cycles repeat overtime....
Peru Will Receive US$ 50M from the World Bank to Strengthen Key Social Protection
The World Bank Board of Directors today approved a US$ 50 million loan to strengthen key policies and strategies to...
AIIB To Scale Up Public Health Infrastructure in Wake of COVID-19
Recognizing that countries with fragile infrastructure have less capacity to handle health crises, the Asian Infrastructure Investment Bank (AIIB) is...
Pakistan is striving enthusiastically to quell the COVID-19
International cooperation has become necessary for the nations across the globe, to defeat the Coronavirus pandemic -an invisible enemy. For...
Coronavirus is Trump’s most important electoral rival
The Earth is intertwined with space in various group, ethnic, religious, national, and other forms. National spaces within countries are...
Calling on Innovators and Entrepreneurs to Accelerate Tourism Recovery
In the face of an unprecedented challenge, the World Tourism Organization (UNWTO), with the support of the World Health Organization...
COVID-19 Diplomacy and the Role of the United Nations Security Council
On 30th January 2020 World Health Organisation declared COVID-19 a Public Health Emergency of International Concern, soon after on 11th...
Eastern Europe2 days ago
Russia aids Italy in fight against COVID-19: Why we should be aware
Energy News3 days ago
Battery Storage Paves Way for a Renewable-powered Future
Green Planet3 days ago
Covid-19 crisis and Earth Hour: An opportunity to reflect on the deteriorating health of the planet
East Asia3 days ago
The Thucydides’ Trap: the Avoidable Destiny Between the US and China
Middle East3 days ago
The rapport between Iran and Turkey over Syria: Liaisons or tussle?
Newsdesk3 days ago
Somalia to Receive Debt Relief under the Enhanced HIPC Initiative
New Social Compact3 days ago
Coronavirus the Catalyst of Shaping the Global Integrated Space
Environment2 days ago
China: Developing Green Finance in Agriculture