Connect with us

Intelligence

Metaphysics and strategic analysis

Giancarlo Elia Valori

Published

on

[yt_dropcap type=”square” font=”” size=”14″ color=”#000″ background=”#fff” ] S [/yt_dropcap]peaking about metaphysics today seems almost an insult to the standard Western culture, all based on Reason and Feeling and on empiricism without a subject. On the contrary, this does not happen in the political civilizations currently emerging in the world. Inevitability pertains to losers while the culture of reality transformation pertains to winners.

And currently the West is an Accident compared to the great phenomena of global change, halfway between a Chinese empire emerging victoriously from the post-1989 Americanization and the Russian Federation creating an unavoidable and leading role for itself in the Middle East.

The losers believe only in few obvious facts, while the winners bend them to their will.

In China, in the military academies and intelligence services’ specialization schools, Taoist and Confucian traditions and classic martial arts – designed to fight both against the external and the internal enemy, the old empirical self – are taught.

On the other hand, as René Guenon used to say, the Tao is the esoteric aspect of exoteric Confucianism.

It is worth recalling that the spiritual Knowledge is always linked to a warrior culture: the Taoist-Buddhist Hagakure of Japanese Samurai is at the origin of classic geopolitical analysis, with the still very useful book entitled Dai Nihon by Karl Haushofer, the founder of German and European modern geopolitics.

Or it is linked to Sun Tzu’s “Art of War”.

The Soviet intelligence defectors were particularly surprised that in the US and NATO military academies there were not those classics they had to carefully analyze.

Historical science is Wisdom and therefore it combines a multiple and value-based dimension with the collection and analysis of facts.

Furthermore, in India, the Hindu religion is particularly widespread among young people living in the cities, while governments use the Hindu tradition to rebuild an identity-based political culture.

In Russia, the traditional Slavic nationalism of the Orthodox Church currently merges with Vladimir Putin’s Eurasian project.

When the Russian leader went to visit Pope Francis, he brought as a gift the icon of Our Lady of Vladimir, namely the holy image that Stalin secretly flew over Moscow in the hardest moments of the Nazi siege.

Finally nothing can be understood of Iran’s politics and strategy without the Twelver Shia Islam of today’s Iran.

The fact that the Twelfth Imam, a descendant from martyr Husseyn Ali, returns – as he has always been alive – to the visible world and converts to Islam the whole world, as well as Christians and Jews, by definitely destroying the Antichrist’s works, is a myth that tells us more about Iran’s foreign policy than a thousand descriptions of its missiles and weapons.

In short, the laicité that the West is flaunting from the rooftops, as if it were some kind of novelty, is a sign of weakness, not of strength.

It is accounting, not mathematics.

Those who are currently winning the globalization war always unite the people around myths, strong ideas, symbols, rituals and identity, while those who are losing the “Third World War in pieces” – just to use Pope Francis’ phrase – live their own history according to the Enlightenment myth. Indeed this, too, is a myth.

In fact, while it is believed that only myths and religious identities lead to wars, as claimed by the theorists of contemporary laïcité, it should be recalled that – in the case of the great slaughters of history – the revolutionaries waged war against the Europe of Kings under the tripartite motto Freedom, Equality and Brotherhood, thus turning a nation of 27 million people, as was France at the time, into a wasteland inhabited by approximately 9 million people.

The same holds true also for the Bolshevik Revolution which, according to the speech delivered by Solzhenitsyn before the Duma in 1994, upon his return to Russia, exacted a toll of 60 million victims in the period between the beginning of “Trotsky’s coup” and the end of Stalinism.

The current myth of laicité is a myth whereby, before the 1798 French Revolution, there was “darkness” while, after the largest massacre in modern history, the Enlightenment – and hence Reason – would come, thus destroying every myth – and hence Metaphysics, foolishly considered similar to Religion.

Hence, a value-based curvature of foreign policy emerges: if “they”, namely the emerging countries’ peoples, are as “we” are, enlightened and rationalist, it is fine, whereas if they are still in the grip of old myths there can only be war.

Just think of the fact that decades of war have left Afghanistan still in the hands of the Taliban or that the actions in Iraq have created a failed state which currently only serves the interest of the Iranian leadership.

While, as you may recall, in 2003 the US Governor of Iraq, Paul Bremer Lewis, adapted the chaotic flow of vehicles in Tehran to Boston’s traffic rules.

The West has long been viewing the Other as if he/she were himself/herself, obviously a more “primitive” and less “secular” Self.

And this is the biggest mistake, the pathological narcissism of the West which, in politics, leads to the same situations as those occurring in psychology: a “grandiose” self, leading to manipulative tactics vis-à-vis the others.

In fact, the West interprets the jihad as if it were “terrorism”, while the Islamic “holy war” certainly uses terror, but as part of its strategy, not as an end in itself.

“I will cast terror into the hearts of those who disbelieved, so strike them upon the necks and strike from them every fingertip!” (Sura Al-Anfal 8:12).

But, if we studied the traditional Islamic law compared to jihad, at least 32 major rules from the Qur’an and an endless number of interpretations would further complicate the practice of the “holy war”.

In the Sunni tradition, the jihad is always defensive, but it is anyway intended to expand the community of believers. It is a complex political theology that does not only regard war as such, but also propaganda, Islam’s internal organization, its economy and its law in peacetime.

How can we indicate the Other as simple and primitive, when Islam, in its ferocity, is organizing an entire society against the “infidels”, by using the oil market, soft and hard propaganda actions, demographic penetration and a very wise manipulation of the most helpless and unarmed Western political system?

Moreover the West interprets Putin’s new Russia as a return of the Stalinist and Communist repressed aspects, thus forgetting that a country with eleven time zones and over 24 ethnic groups spread over 17 million square kilometers must be ruled in a centralized way or cannot be ruled at all.

Would a Eurasia “of autonomies and self-governments” – as unfortunately envisaged by Zbigniew Brzezinski some years ago – be more democratic and less dangerous for the Eurasian peninsula, namely for us?

Later the United States thought that the forced liberalization, developed in Yeltsin’s time, would lead Russia to be a peripheral country, but it was wrong.

While, as likely, the KGB defector to the USA, Anatoli Golytsin, was not entirely wrong, his theory developed in an old and useful book entitled New Lies for Old is that supposedly the USSR transformation and the end of the CPSU were carefully planned within the KGB First Chief Directorate.

Destroying the Party that blocked the State, bring fresh capital where there was none any longer and make Russia participate in the new “great globalization game”.

Clearly a country such as Russia cannot be studied by only checking – with the famous Reason – what the record of “democracy” or “human rights” is.

In the case of China, after an initial period in which Westerners were inebriated for the implementation of liberalizing reforms – because they believed them to mark the end of the Communist system – later they realized that the Four Modernizations of Deng Xiaoping (and, earlier, by Zhou Enlai) saved the Party from collapse, while the Chinese society remained strongly and often spontaneously Communist.

Hence there is no correlation between the “bourgeois” – and hence enlightened – “freedoms” and the political system, as indeed Benedetto Croce had already taught us.

Nevertheless, how can we avoid this “critical” and rationalistic thinking in foreign policy, which make us not understand the Other and obliges us, as Westerners, to always accept the fait accompli?

Etymologically krisis is the act of discerning, separating, judging and assessing.

Criticism and critique comes from krino, which is the art of judging – based on the values of beauty, justice and goodness – works and actions, as well as the people performing them.

However, how can the firm principles, the initial and final values of the kritikè teknè, namely the art of separating and hence judging, be created ? Obviously, metaphysics does so.

The West – and hence certainly Heidegger was not wrong – is characterized by the forgetfulness of Being in its “concealment”, which reveals itself only in its appearing, in its being temporary “semblance”.

Like a wave reveals the sea or the wind tells us about the air, by making us perceive and feel it.

Therefore, according to our interpretation, the Western krisis is currently lacking because its kritikè teknè has forgotten its foundations, the criteria which enable it to operate by separating appearances and leading them back to an original and initial principle.

As Wisdom, and not teknè, art and technology, philosophy is not only theoretical, abstract and hence partial knowledge, but it means knowing simultaneously “for us” and within the “actual reality of things”, which are both useful for fully guiding our lives.

Therefore foreign policy cannot be judged only based on one single aspect – be it military, economic or diplomatic – but by comparing all the aspects of a phenomenon.

In this regard, for example, suffice to think of the current Chinese rearmament, which is relevant both for domestic policy and for the Chinese project in the Pacific region, and finally for protecting the future Belt and Road Initiative, etc..

If we rationalistically consider one single aspect – the first which springs to our mind or we like – we isolate it and make it absolute, we only create a new myth, not a manifestation of Being.

Hence, metaphysics prefers an overall and global vision, the search for the cause or reason why – since nothing ever appears without a reason or, more exactly, a cause, and every cause always prompts the same metaphysical question: “why is this happening or is so and not otherwise?”

Moreover metaphysics knows that things and events have a meaning.

For Husserl, who was Heidegger’s professor, the distinction between sense and meaning “responds to the distinction between experience and what is lived and experienced” – hence, along the lines of his professor, in his book Being and Time Martin Heidegger tells us that the “sense is the possibility of action offered by the world we understand”.

Hence no formulas good for each phenomenon, for each partial unveiling of Being, as always happens in rationalistic geopolitics – in this regard, just think of Russian “militarism” or “bottom-up” democracy in the Maghreb region, which has strengthened al-Qaeda rather than the usual “pluralists” – but phenomena interpreted according to their sense, i.e. according to the scope of the objective correlations they generate.

Certainly, today metaphysics does not enjoy a good reputation. The Enlightenment has hidden it, more or less in the same way as the tutor in Rousseau’s Emile, or On Education cunningly and artfully hid, in the woods, the tools that the protagonist believed to discover by chance.

It is worth recalling that the term was coined in the first century A.D. by Andronicus of Rhodes, who had placed – in the library of Alexandria – Aristotle’s books on the “first philosophy”, namely metaphysics, after those on Physics, tà metà tà physikà.

Metaphysics – in Aristotle’ meaning, that the position chosen by Andronicus of Rhodes entails – goes beyond physical research by using the same methods as those used in research among particular beings.

In this connection, Giorgio Colli would have said that in the “Greek wisdom”, i.e. among the Pre-Socratics – the Being needed a faculty other than research into the world but, unlike modern rationalism, Aristotle’s intention is to use the investigating rationality in the whole sphere of Being.

Hence our knowledge is always abstract and there are no primitive or original languages – or even more inherently “true” languages than others – as the logical neo-Positivists and hence also the Empiricists imagined.

There exists no original or essential fact around which all the others are structured, as thought by all those who imagine an action from which everything begins – be it the liberation of Paris on August 25, 1944 or the signing of the “short armistice” in Cassibile on September 3, 1943.

There is no objectively original fact – only the rationalists and wizards believe so.

Hence we extrapolate from the “metaphysical” analysis what is common to various facts; later we check the story of these facts and their actual connection. Then we extract-abstract from the various phenomena studied what can be subjected to a rational analysis, i.e. their number and their form.

Finally, we define the rules of things and of their being in that way and not in another and then we define their absolute necessity which – as also Kant taught us – cannot be based only on empirical experience.

Empiricism tells us about the constancy of phenomena, not about their necessity.

Hence we rise to metaphysics when we do not refuse to think specifically of the condition thanks to which we think everything else.

In historical terms, this means when we analyze all the contexts in which the facts occurred and, hence, their “not being otherwise”.

The metaphysical consciousness has no other objects than daily experience, this world, the others, human history, truth and culture.

However, instead of considering them as already existing, as empirical data available to everyone, or as consequences without premise – and hence as if they proceeded magically by themselves – metaphysics rediscovers their being alien to the world and the miracle of their appearing.

This means that metaphysics is the opposite of the “system”.

Therefore let us think about what might happen if we applied this way of thinking – not mutilated as the poor wretched rationalism of our times – to history and strategic analysis.

The perception and efficacy of all our evaluations would change: the Chinese policy, for example, would no longer be a sort of adaptation to the “market” economy, but the joint effort of a country to win the so-called globalization war.

Or the public debt would no longer be analyzed as an alternative between “austerity” and default, but as a universal financial market like that of all other securities.

And again, we would start to perceive – with “astonishment”, as Plato taught us, because reality is so and not in another way – the great future geopolitical tectonics, such as Africa’s transformation, the overlapping between technology and new mysticism or even the great subjectivization of our Western political culture, between Orwell’s 1984 and a new configuration of primary instincts.

Advisory Board Co-chair Honoris Causa Professor Giancarlo Elia Valori is an eminent Italian economist and businessman. He holds prestigious academic distinctions and national orders. Mr. Valori has lectured on international affairs and economics at the world’s leading universities such as Peking University, the Hebrew University of Jerusalem and the Yeshiva University in New York. He currently chairs “International World Group”, he is also the honorary president of Huawei Italy, economic adviser to the Chinese giant HNA Group. In 1992 he was appointed Officier de la Légion d’Honneur de la République Francaise, with this motivation: “A man who can see across borders to understand the world” and in 2002 he received the title “Honorable” of the Académie des Sciences de l’Institut de France. “

Continue Reading
Comments

Intelligence

Transnational Crimes in the Maritime Realm

Zaeem Hassan Mehmood

Published

on

Maritime trafficking routes closely follow the commercial shipping lanes. The modalities, technologies and strategies put into place by criminals are often times more sophisticated in caliber than those used in regulated trade. The vast expanses of the sea, the complexity of the maritime transportation system, the immense volume of cargo transferred at each port, and the limited capacity for inspections of cargo creates opportunity for criminals. Seaborne trade in the maritime realm follows a defined set of “sea lines of communication” based on currents and weather. Because of the robustness of shipping and mass amounts of cargo moved, traffickers utilize the same shipping industry routes with great effect. Shipping and sea lanes tend to offer anonymity for criminals, whereas their activities can be hidden behind legitimate industries. Criminal activity, especially illicit trade in narcotics, humans, and weapons, has become so extensive that it is difficult according to various studies to rule out implications of states and corporations in the criminal enterprise.

Individuals from various nationalities, followed by multiple vessels flagged to different states, adds the UN Drug Trade Report 2019, are used in the networks which transit the waters of various states and call at different ports before reaching their final destination. Despite the abundance of laws designed to combat illicit trafficking and an apparent impetus to stop specific types of crime, government’s remains only marginally successful in preventing the global flow of illegal goods due to the overwhelming volume and complexity of the markets for illicit trade. Working in tandem, the maritime forces nevertheless have made successful efforts to disrupt the illicit supply chains as a result of sea-based security operations; cooperation and collaboration between law enforcement organizations.

Nevertheless, legal complexity arises as the high seas “fall outside the jurisdiction of any single state” under the United National Convention on the Law of the Sea (UNCLOS). The ocean space is to be collectively policed by all states governed by principles of Freedom of navigation. Piracy and the illicit trafficking of narcotics, humans, and weapons comprise the main varieties of transnational crime. UNCLOS addresses these matter of concern in the realm of the sea, where various articles provide guidance in order to curb or limit the threats. Article 110 expounds the customary rule that warships may “approach and visit” on the high seas “any ship that is suspected of piracy, human trafficking, unauthorized broadcasting; and is without nationality”; or, “is flying a foreign flag or refusing to show its flag.” Article 111 addresses the right of “hot pursuit”, allowing warships of one state to follow a vessel through the different maritime zones of the ship if based on “reasonable grounds,” it is suspected of illegal activity.

Narcotics Trafficking

UNCLOS under Article 108 empowers states to cooperate and offer assistance to suppress drug trafficking by other state-flagged vessels. Traditionally, drug traffickers used overland routes, but since last two decades, they have shifted transportation into the “Indo-Pacific Ocean”. The majority of this trafficking has proliferated in the littoral regions, and often within territorial waters. In the latter years, advancement in technologies, providing for larger ships have allowed traffickers to move further into the sea to capitalize “blue water” areas, outside the 12-nautical mile mark and at times further than the 200-mile Exclusive Economic Zone (EEZ) of any country. It is a documented fact that U.S. is the world’s largest consumer of illegal drugs, also according to various studies the source and transit zones of drug trafficking between South America and the U.S despite high patrols on the border.

Piracy and Armed Robbery at Sea

Piracy has been one of the most ancient forms of maritime crime that is treated rigorously under the provisions of UNCLOS. Article 101 defines piracy as “any illegal act of violence or detention, any act of depredation, committed for private ends by the crew or passengers of a private ship or private aircraft on the high seas against another ship or aircraft, outside the jurisdiction of any state.” The latter parts highlights an important aspect that piracy is a type of transnational crime conducted by non-state actors in international waters. Article 105 of UNCLOS grants everystate the authority to seize any vessel, associated property and to arrest any persons engaged in piracy. Domestic courts of the state conducting the seizure have the mandate prosecute the pirates under domestic law and determine what to do with the vessels; however, to date the courts remain inadequate or unsupported in many places.

Piracy became a security issue of international concern since the last decade and half, primarily in the Horn of Africa, Gulf of Aden, and the Red Sea largely due to weak patrolling and sea blindness by the littoral states of the region. However, to an extent order at sea has been maintained with the presence Combined Task Force-151(CTF-151), focused on counter-piracy, and Combined Task Force-150 (CTF-150) to combat illicit activities at sea. Supported by several U.N. Security Council Resolutions, these task forces have “engaged with regional partners to build capacity and improve capabilities to protect global maritime commerce and secure freedom of navigation.” 

Piracy in the Asia-Pacific remains a matter of concern, however most of the incidents are underreported and those reported are of such small scale that they cloud the assessment of major piracy events. In the region, although piracy has been contained in the eastern region of Africa whereas it has proliferated in the western Africa around the Gulf of Guinea. This subject-matter experts conclude is a result of an increased trafficking in narcotics from Latin America, along with the various other illicit elements involving illegal fishing and human trafficking. The increased in piracy is a reminder for states that piracy remains a persistent and widespread challenge to maritime security. The recent activities in Somalia and Yemen foreshadow a resurgence of piracy in the region, encouraged by trafficking of light weapons and small arms, along with non-state actor’s unprecedented access to ship monitoring, tracking devices, and use of unmanned systems and long range communications.

Conclusion

United Nations Convention on the Law of the Sea (UNCLOS) identifies only certain types of transnational crime that affect maritime security, but there are many varieties and combinations of criminal activity that affect security and safety from the high seas to internal waters. Domestic laws however need be brought in line with international law, and cooperative partnerships between the states, law enforcement, and militaries to combat illicit activity needs to transcend the morass of politics that are often a hurdle in the way of more comprehensive legal regimes. It is recommended that information and intelligence sharing, along with TTPs (tactics, techniques, and procedures) need to be employed by the maritime forces to ensure freedom of the seas. UNCLOS provides a strong framework and multilateral efforts to deter criminal activity at sea for a more secure, safer operating environment for all. However, it is the difficulty in effective prosecution and applying of an equitable punishment to the culprits, involved in piracy, human trafficking and illicit drugs that must serve as a reminder to all states that much awaits for an all-inclusive solution.

Continue Reading

Intelligence

Fighting Corporate Espionage by a Counterintelligence Agent

Bob Budahl

Published

on

Corporate executives must bear the responsibility of today’s evolving corporate world entering into a global community where not only are the exposures to such a wide market area lucrative to an already thriving business, but also to a grave danger of the companies’ trade and technology secrets, systems, financial accounts and much more. No longer is “Security” to the facility and personnel all that is required. Many foreign countries and interests take short cuts to becoming competitive through the theft of trade secrets, products and overt and covert espionage of all sorts. Some of these entities are now facing a growing challenge from United States corporations with safeguarding of commercial information, proprietary information, and economic factors.

Many of the tactics utilized in private sector counterintelligence have much in common with the secrets and information the government does its best to safeguard from theft of foreign governments or non-traditional actor threats. The FBI estimates U.S. Corporations lose over $100 billion annually. There are open and legal methods of collection open that are harmful and a good counterintelligence program should target this as well as illegal activities such as electronic eavesdropping, hacking, etc. Passive counterintelligence tries to curtail what a collector may do through countermeasures, and awareness training. Active counterintelligence will prove beneficial to identify and detect a threat, and will conduct operations including eliminating threats or ongoing targeting. A mitigation policy should be of avail. After an attack it may raise shareholder concern which needs to be quelled quickly. Quick realization of a threat and implementing action promptly and efficiently can stop immeasurable damage.

The leaders in the private sector need to be proactive and realize that it is no longer only local threats they face. The threats can be global and may not only be an economic threat but also a threat to national security. In the U.S. private sector ties to the Defense, Intelligence and other government entities can be vast with a great deal of interplay and interconnectedness. Also, corporations do not employ many of the safeguards put in place by the defense and other government departments. Compartmentation, clearance, and many operations taken for granted in the government aren’t serving the corporate structures well-being at all or as well as it should be. The Economic Espionage Act of 1996, Title 18, Sections 1831 and 1832 of the U.S. Code covers economic espionage and also if they are considered trade theft prosecutions.

Where once economic espionage meant directly infiltrating a company or recruiting an employee within the corporation our biggest challenge today is cyber espionage. In reality secrets and information are stolen often and not even known they were taken. And a much less chance of apprehension. Cybercrimes operate in a stealth mode in many ways, but in a contrast way can be identified and detected and countered with effective counterintelligence methods. The U.S. economy has changed over the past 20 years. “Intellectual capital rather than physical assets now represent the bulk of a U.S. corporation’s value.”

With the growth of cybercrimes including corporate espionage some tips for safeguarding and thwarting foreign hostile intrusions include

Conduct real-time monitoring of networks and retaining access records

Software tools for content mgt., data loss prevention, network forensics

Encrypt data on servers

Utilize multi-factor authentication measures such as biometrics, PINS, passwords

Mobility policy in which measures are developed to oversee which connections can and cannot be made to corporate systems

Limits on social networking

Establish contingency plans

Many others

When deciding to emplace a counterintelligence program to safeguard a corporation the first stepis to conduct a risk assessment by assessing vulnerabilities and estimating the consequences of losing critical assets. This should be headed up by a board member or senior executive.

Then move to step two in which groundwork is laid for establishing a corporate counterintelligence program. Hire a manager dedicated to counterintelligence. Hook up the company’s security, intelligence assurance, general counsel and HR departments. Develop liaison with government law and intelligence. Ensure centralized management of the counterintelligence program. And have legal counsel provide guidance on the counterintelligence program actions.

Identify the Capabilities needed

Threat awareness and training

Analysis, Reporting and Response

Suspicious activity reporting

Counterintelligence Audit

Counterintelligence Investigations.

Liaison

Implement the Counterintelligence Program

A basic counterintelligence program description will look something like this: PM (Program Manager) interplay such as:

PM develops and implements CI program

PM oversees a centralized CI Program office

PM maintains insight into all corporate elements

PM is responsible for liaison with US Government

Security officers responsible for tactical CI

PM provides CI guidance through training programs

Also be aware that not only high tech companies are targeted since the targeted information they seek may be deemed important by who is doing the shopping.

Continue Reading

Intelligence

Where does allegiance lie?

Bob Budahl

Published

on

Dongfan “Greg” Chung who is a native of China and a naturalized U.S. Citizen had “secret” security clearance while working with Rockwell and Boeing Corporations on the Space Shuttle project. He had retired in 2002 but returned a year later as a contractor until fall 2006. The government proved Chung committed espionage by taking and concealing Boeing secrets regarding the Delta IV rocket and also the Space Shuttle. He did this for the People’s Republic of China. He was convicted on charges of acting as an agent of the PRC as well as economic espionage.

The investigation of a different engineer working within the U.S is what led to Chung’s investigation and resulting conviction. He was sentenced to more than 24 years in prison.

The Chinese had sent letters requesting information as far back as 1979. In correspondence with the PRC Chung expressed his wishes to help the PRC modernize. He also sent 24 manuals related to the important B-1 Bomberfrom Rockwell Corporation which was very damaging.

Travel trips to the People’s Republic of China occurred on multiple occasions to lecture but he also met with government officials. In letters from his handlers they use his wife Rebecca and Chi Mak to transmit information. In the fall of 2006 FBI and NASA agents searched his home and discovered more than 250,000 documents from Boeing, Rockwell and others which were secret.

The Shuttle Drawing System or “SDS” that Rockwell and Boeing engineers created held information regarding performing processes regarding the Space Shuttle. The engineers need a password and authorization to be able to access this system and files. This is a clear case that defensive counterintelligence measures could have prevented printing, concealment and removal of documents from the workplace. One great example of offensive counterespionage was the search of Chung’s trash which led to much revealing evidence.Also his extensive travel to the PRC was an indicator that his scope of activities while in the PRC were above speaking engagements, seminars, teaching, personal. The authorities did conduct offensive counterintelligence to the best of their abilities once it learned via the other agent implicated in similar dealings with the PRC.

Continue Reading

Latest

Trending

Copyright © 2019 Modern Diplomacy