Intelligence
Telegram: the Mighty Application that ISIS Loves

Authors: Ahmet S. Yayla & Anne Speckhard
[yt_dropcap type=”square” font=”” size=”14″ color=”#000″ background=”#fff” ] I [/yt_dropcap]SIS has been the most successful terrorist organization in history using social media and the Internet for distributing its propaganda, dissemination of its news and more importantly to communicate. There is no doubt that the frequency and quality of ISIS posts on the Internet, including their videos, memes and online journals are of a quality to make many professional editors and producers envious and they also receive much attention[1].
ISIS usually does not host its posts on dedicated servers but uses several free and open mediums including Google drive, Cloud.mail.ru, Yandesk, YouTube, Sendvid.com, Dailymotion.com, Drive.ms, Archive.org, Justpaste.it, Bitly.com and some other recent platforms. Of course, hosting is not enough; hosted posts need to be distributed to followers, the target audience and the public. At this point, several social media platforms including Facebook, Twitter, Telegram, WhatsApp, Google+, Instagram, Pinterest, Tumblr, Viber, and WeChat are utilized by ISIS to circulate their posts so that the target audience and public are made aware and can watch or read them by clicking on the web addresses posted to those mediums.
Among these social media platforms Twitter, YouTube, Facebook, Tumblr and Instagram were previously heavily utilized by ISIS, but since takedowns on these sites, ISIS currently favors Telegram where ISIS users maintain a presence in several different languages. ISIS has assigned administrators in several languages who are in charge of ISIS social media accounts including Telegram. When interviewing ISIS defectors[2], we also learned that female foreign fighters are specifically tasked for the administration of social media accounts, and they have special offices in Raqqa to carry out their tasks under the control of their emirs. A Belgian female defector recently recounted being recruited upon her arrival to ISIS to serve as an Internet seductress, a role she declined[3]. Indian police also told us that most of their ISIS recruitment occurs via the Internet and consists of female seducing males into the group[4]. Indeed, American Mohamad Khweis appears to have been seduced in this way, marrying his ISIS bride when he arrived to Istanbul and then traveling into ISIS territory with her[5].
At ICSVE, our researchers closely follow ISIS’s Telegram posts on a daily basis and download any relevant videos, journals, memes, pictures or anything else useful for our research. While the terrorist organization utilizes several different platforms to distribute their posts, the most reliable medium of late for their purposes has been the Telegram social media application. This is because other platforms usually quickly take down posts or shut down the accounts posting the links to these hosts. Hosting mediums also delete posts as soon as they realize they are ISIS content. As a result, Telegram has become the main social media platform for ISIS members and followers primarily because, so far, Telegram administrators do not usually shut down ISIS accounts, and when they do, the frequency is far less when compared to other social media accounts. For example, Twitter or Facebook take down ISIS accounts in a day or most two in many cases, and when the same account owners open new accounts, they block them even sooner. However, there are Telegram accounts opened or used by ISIS members that stay active for months or basically never get closed.
Telegram was launched in 2013 by two brothers, Nikolai and Pavel Durov, who also founded Russia’s largest social network Russian VK. The Telegram Messenger LLP is registered as an independent nonprofit company in Berlin, Germany. The founders claim that Telegram is “faster and safer” than other apps and more importantly the “messages sent through Telegram cannot be bugged by third parties.” [6] Indeed, Telegram is an encrypted social media application that is very difficult for law enforcement to penetrate or eavesdrop.
Apart from accounts not being closed as often as other ISIS social media accounts, there are two other advantages to ISIS for using Telegram. The first is that while in most cases the links to hosts are distributed in Telegram groups where there are several members or directly sent to individual accounts, they become useless as soon as the hosting companies realize they are ISIS posts and take them down, making them dead links. However, Telegram’s large file-hosting feature becomes very handy in this case because almost all files pushed through Telegram with links are also uploaded to the Telegram channels, and those files remain as long as the channels are open or the user who posts does not delete them. Therefore, even if a file is not available as a link, if it is uploaded to Telegram, it will exist there unless it is deleted or the channel is closed. Furthermore, Telegram allows uploading large files simultaneously consequently allowing the ISIS social media accounts to simultaneously upload videos with four or five different resolutions and sizes beginning from the largest to the smallest, such as a video in full HD from which would be 1.5 gigabytes to smaller resolution versions such as 800 megabytes, 500 megabytes, 200 megabytes and 50 megabytes. The smallest size versions would be for mobile devices.
The other advantage of Telegram is providing users a forum to be able to communicate in a secure way through a secure algorithm. While Telegram chat rooms are usually open to all members, one-to-one communications are secret and cannot be seen by others. There have been several attacks where it was later established that ISIS members communicated internationally about the attacks before they took place. For example, the Istanbul Reina club attacker got his orders from his Emir in Raqqa, Syria through Telegram and communicated over Telegram with his Emir both before and after the attack[7]. The same was true of the Paris attacks[8]. Telegram has thus become one of the main communication apparatus of ISIS, particularly with foreign fighters deployed outside of ISIS territories.
In addition to all these advantages, like all other applications, Telegram is convenient and mobile as it can be installed on cell phones, Windows PCs, and IOS computers, therefore, making it available on many different devices.
Joining Telegram is easy. The only requirement on the side of Telegram, to sign up, is having a cell phone number and verifying that number after the registration through a text message verification step. In some cases, some Internet proxy phones (phone accounts created over the Internet) work as well, omitting the requirement of a cell phone number as long as the Telegram system does not recognize the number provided as a proxy Internet number. Telegram, therefore, only requires a cell phone number to verify the user and once a user is verified, the user does not need to maintain the phone number, enabling users to use a number once to verify an account without the necessity to keep that number. In fact, the one of the cell phones ICSVE staff use to track ISIS telegram accounts was registered through a cell phone number and that number has been inactive since 2015, but the account has still been in use without any problems. This feature becomes a great tool for ISIS terrorists as they do not need to reveal their real identities or provide anything to be traced other than a phone number which they don’t need to maintain.
On the side of ISIS, in most cases, there is no vetting to join their public channels or groups, but private ones do vet potential members with a range of questions, sometimes having to do with the basics of Islam such as cleansing before prayer (wudu) etc. If ISIS members need to connect over the Telegram without physically being in touch, they either use other known members to reach and connect to the desired members or for their foreign fighters, they pre-arrange known passwords and indicators to vet the people they are communicating with to ensure the authenticity of the parties.
As a user interface, Telegram is no different than many other similar mediums such as WhatsApp and Twitter. When it comes to peer-to-peer communication, it is more like WhatsApp where users can message each other, share documents, links, videos and voice messages similar to the chat features of many social media platforms. There are even time stamps indicating when the messages were sent and if they were read or not. Telegram channels are a different from common social media groups as followers are not allowed to interact with the others in the channel openly unless authorized by the administrator. Members are only able to read and download posts shared in the channel unless they have permission for greater access. Posts flow on the timeline chronologically and with time stamps and an indicator “eye” acting as a counter showing how many times a post was downloaded by the channel members. Telegram groups, as opposed to channels, are just like other social media groups where members can interact with each other and their individual posts, therefore, making it possible to communicate with sometimes thousands of people at once. Based on our experience at ICSVE, several channels and individual accounts in the same languages are usually run by the same administrators, or there are a handful of administrators who appear to share the same posts simultaneously.
Reaching out on to ISIS members via Telegram channels is a significant challenge for beginners. First of all, as the Telegram application is installed, the application copies all the contact numbers on one’s cell phone and connects the users with any of his contacts who are already registered with Telegram. However, to connect with ISIS members, channels, or groups, the key is knowing what channels are ISIS channels and what their names or addresses are. ISIS usually does not require verification for its public channels, therefore if one knows the name or address of an ISIS channel, joining those channels is simple—locate the channel and click the join button. As soon as one joins a channel all that channel’s posts are available to the new user. For peer-to-peer communication, however, the users must know each other’s registered phone numbers or user names. If a user is not originally recorded in one’s downloaded phone connections, in order to connect with that user over Telegram, one of the users has to provide the other his registered cell phone number. This process is useful for ISIS foreign fighters operating abroad as they often switch phones and need to reconnect with their emirs or middlemen and can easily do so even with a new burner phone, using their original login credentials. ISIS members may also open accounts before traveling and exchange those accounts beforehand so when they need to use them they can easily install Telegram on whatever device they are currently using and log into Telegram with their credentials to communicate with their ISIS peers.
ISIS frequently posts on new and backup channels with different names for different purposes including: media and video sharing, book and journal sharing, news and daily updates, hisbah (morality police) office, accounts of personal well-known ISIS members, pamphlets and meme accounts, ISIS Amaq News Agency and several other channels or groups with different names. These lists are frequently shared on different social media platforms alerting users to subscribe to new or backup accounts in the case an account is closed or expected to be closed. While being banned and dropped in other social media mediums occurs to ISIS endorsers, supporters and distributors quite often, Telegram, as mentioned previously, does not frequently close ISIS accounts. However, the backup or spare ISIS channels usually function as a mirror of the original channel or simply are ready to be facilitated if an original channel is closed. ISIS cross shares the lists of their Telegram channels as they appear and reappear via different social media accounts. For example, they post their new or existing Telegram channel addresses on Twitter or Facebook, and then in their Telegram channels, they provide their Twitter, Facebook or Instagram account names and encourage their members to follow those accounts as well to be updated of any changes when channels are taken down. In that manner, they efficiently migrate their followers from Telegram channel to channel. ISIS social media administrators also often share bulk ISIS Telegram account lists both in regular social media and also in their Telegram channels, by which users are alerted to join channels or follow individuals simply clicking the links of those accounts. If someone starts to follow an ISIS Telegram account, it is thus very easy to update and enrich their ISIS network of account collections and lists by simply subscribing to the post lists or by following the users who post to the groups and simply by looking at the forwarded posts and reaching to the original post owners with a few clicks. Therefore, following or communicating with ISIS Telegram accounts is an easy task as long as one understands how they work and basically keeps following the posts to update their related contact lists. Even if one completely loses ISIS Telegram channels on Telegram, it is still easy to reach out to those channels again by simply following ISIS related Twitter and Facebook accounts.
ISIS users or administrators are not shy about their posts, and they are usually aware of the fact that many of their followers in the channels are not ISIS members, but are intelligence members or researchers. In fact, it happened several times with our ICSVE Twitter posts sharing some important incidents or updates from the ISIS Telegram channels we follow, that they would then openly post into the same channels saying “We know you are here and you are sharing our posts on your Twitter account. You are an infidel, and we don’t care if you are following us.” Strangely enough, ISIS administrators have never banned or blocked us from their channels thus far, perhaps enjoying the attention and being a threatening presence. Of course, there are strategies behind that as well. Simply put, the terrorist organization is using its Telegram channels to disseminate its propaganda and the narratives they would like to share, and they are aware of the fact that outsiders may be the ones who also become conduits for their shares to the outer world.
There are countless channels and groups on Telegram, not only related to ISIS but also to other Salafist-jihadi terrorist organizations as well. If one does not know the specifics of different terrorist organizations, one would very easily confuse other Salafist terrorist organization’s channels with ISIS channels as they promote very similar thinking. While ISIS dominates the Telegram terrorism cyber-space, other groups use the same medium as well and just like ISIS, maintain groups and channels in different languages, probably more than twenty.
One may witness a variety of things in ISIS channels. First of all, regular known ISIS channels or groups maintained by well-known recognized ISIS members such as Khilafah News, the Strangers, Mr. State, al-Firdaws English or Mr. Killer, share ISIS related breaking news, videos, memes, propaganda campaigns, brochures, new ISIS journals including Rumiyah and others, nasheeds, pictures or stories, or anything they would like to push. However, theme specific channels or groups only share related posts. For example, ISIS video channels would periodically post new or old ISIS videos in different resolutions or sizes, book channels would only post books or booklets mostly in pdf forms, news channels would only post news or news articles and so on. Therefore, based on the type of the channel or group, it is possible to reach and follow groups in different categories.
Another important feature of Telegram is being able to search the channels posts, group messages, individual messages or any kind of communications or posts in one’s account. This feature is available for both cell phone applications and the Web-based Telegram interface making it possible to reach any content by simply searching. This basically makes Telegram one of the largest free ISIS databases available to the public especially considering the fact that many other mediums including Google, YouTube, Twitter and Facebook are continuously taking down ISIS posts.
Telegram has enabled ISIS to create, without much effort, its grand propaganda machine to further its reach beyond it’s so-called “Caliphate” to the whole world with only the click of a button, pushing its new media content constantly and reaching to its targets momentarily, and most importantly communicating with its fighters abroad to direct them for new attacks or facilitate their operations in different countries[9]. The nature of the Telegram application with a secure algorithm providing protection from the outside world and making it almost impossible, or very difficult, for law enforcement to trace back to the original users, also has become a magnificent advantage for the terrorist organization in terms of the anonymity of its users and for carrying out terrorist operations via secure communications. These two qualities are the most valuable qualifications, or gifts, for a terrorist organization like ISIS. Thanks to Telegram, ISIS has now been using their application very heavily almost without any interruptions with great success when compared to other social media applications.
While other social media platforms have since 2014 taken strong stances to institute takedown policies when it comes to ISIS, the stand of the Telegram application when it comes to allowing ISIS to use its platform without interference is quite different and difficult to understand. Recently, Rob Wainwright, the director of Europol, European Union’s policing body, condemned Telegram owners for failing to join the fight against terrorism. Wainwright said that Telegram’s reluctance to work with anti-terrorist authorities was causing major problems[10] considering the fact that the application is in widespread use among the target population of ISIS.
Telegram has become the choice of the ISIS due to its specifications—providing secure encrypted communications and allowing users to share large files and act with their accounts operating with impunity. While Telegram administrators claim, they favor speech free of interference; it is time for the owners of Telegram to thoroughly consider the existence of ISIS presence and activities on their digital platform. Telegram has become the ultimate tool for the bloodiest terrorist organization in history, carrying and spreading its terrorist ideology around the world, recruiting and even directing cadres to carry out attacks globally. Recently, the families of the San Bernardino shooting sued Facebook, Google, and Twitter, claiming that these social media companies permitted ISIS to flourish on these social media platforms[11]. It may soon happen that Telegram will also have to deal with several legal actions as ISIS cadres continue to utilize their application for their terror operations and communications.
Reference for this Article: Yayla, Ahmet S. & Speckhard, Anne (May 5, 2017) Telegram: the Mighty Application that ISIS Loves, ICSVE Research Reports, http://www.icsve.org/brief-reports/telegram-the-mighty-application-that-isis-loves/
References
[1] Speckhard, Ph.D., Anne; Shajkovci, Ph.D., Ardian; and Yayla, Ph.D., Ahmet S.. “Defeating ISIS on the Battle Ground as well as in the Online Battle Space: Considerations of the “New Normal” and Available Online Weapons in the Struggle Ahead.” Journal of Strategic Security 9, no. 4 (2016): 1-10.
[2] Speckhard, A., & Yayla, A. S. (2016). ISIS Defectors: Inside Stories of the Terrorist Caliphate: Advances Press, LLC.
[3] Speckhard, Anne research interview Brussels, Belgium January 2017
[4] Speckhard, Anne research interview New Delhi, India March 8th, 2017
[5] Speckhard, Anne & Yayla, Ahmet S. (March 20, 2016) American ISIS Defector – Mohamad Jamal Khweis & the Threat Posed by “Clean-Skin” Terrorists: Unanswered Questions and Confirmations. ICSVE Brief Report http://www.icsve.org/american-isis-defector—mohamad-jamal-khweis-and-the-threat-of-clean-skin-terrorists-.html
[6] Editorial, “Russia’s Zuckerberg launches Telegram, a new instant messenger service,” Reuters, August 30, 2013, http://www.reuters.com/article/idUS74722569420130830
[7] Yayla, A.S., “The Reina Nightclub Attack and the Islamic State Threat to Turkey” CTC Sentinel, Combating Terrorism Center at West Point, Vol 10, Issue 3, pp. 9-16, March 2017.
[8] Evan Perez & Shimon Prokupecz, “First on CNN: Paris attackers likely used encrypted apps, officials say,” December 17, 2015, http://www.cnn.com/2015/12/17/politics/paris-attacks-terrorists-encryption/
[9] Speckhard, A., & Yayla, A. S. (2017). The ISIS Emni: The Origins and Inner Workings of ISIS’s Intelligence Apparatus. Perspectives on Terrorism, 11(1). Retrieved from http://www.terrorismanalysts.com/pt/index.php/pot/article/view/573
[10] Dominic Kennedy, “Message app used by Isis refuses to fight jihadists,” May 4, 2017, https://www.thetimes.co.uk/article/message-app-used-by-isis-refuses-to-fight-jihadists-jrddv7c93?utm_content=buffer2b755&utm_medium=social&utm_source=twitter.com&utm_campaign=buffer
[11] Dan Whitcomb, “Families of San Bernardino shooting sue Facebook, Google, Twitter,” May 4, 2017, http://www.reuters.com/article/us-sanbernardino-attack-lawsuit-idUSKBN1802SL
Intelligence
Mounting Cyber Espionage and Hacking Threat from China

Earlier this month a ransomware attack on America’s Prospect Medical Holdings, which operates dozens of hospitals and hundreds of clinics and outpatient centres across the states of Connecticut, Rhode Island, Pennsylvania and Southern California was forced to shut off its centres in several locations as the healthcare system experienced software disruptions. In June India’s premier hospital, the All India Institute of Medical Sciences (AIIMS) faced a malware attack on its systems which was thwarted by its cyber-security systems. This is not the first time that the premier hospital’s data was breached. In November 2022, AIIMS had experienced a cyberattack within weeks of announcing that from January 2023, it would operate on a completely paperless mechanism. The cyber attack which involved ransomware, designed to deny a user or organisation access to files, lasted for nearly a month affecting the profile of almost 4 crore patients – affecting registration, appointments, billing, laboratory report generation, among other operations of the hospital. Regarding the quantum of data that was compromised, the government revealed that “five servers of AIIMS were affected and approximately 1.3 terabytes of data was encrypted.”
Till June this year, Indian Government organisations faced over one lakh cyber security incidents and financial institutions saw over four lakh incidents. Data presented by the Indian Computer Emergency Response Team (CERT-In), which has the mandate of tracking and monitoring cybersecurity incidents in India, indicates rising Cyberattacks to government organisations. or systems year on year. From 70798 in 2018, to 112474 in 2023 (up to June) incidents of cyber attacks have been on the rise, on a year on year basis. Presenting this data at the Parliament, Minister for electronics and IT Ashwini Vaishnaw said, “With innovation in technology and rise in usage of the cyberspace and digital infrastructure for businesses and services, cyber-attacks pose a threat to confidentiality, integrity and availability of data and services, which may have direct or indirect impact on the organisation.”
A lot of the hacking activity points towards China. Western intelligence agencies are becoming increasingly wary of digital intrusion by hacking teams that they believe are being backed by China’s government. Almost a decade ago, American computer security firm Mandiant had made the startling claim that these hacking groups are operated by units of China’s army. The firm was able to trace an overwhelming percentage of the attacks on American corporations, organisations and government agencies to a building on the outskirts of Shanghai. Mandiant made the case that the building was one of the bases of the People’s Liberation Army’s corps of cyberwarriors. US intelligence analysts have detected that a central element of Chinese computer espionage is Unit 61398 which targets American and Canadian government sites. Mandiant, which was hired by The New York Times, found that hacker groups like “Comment Crew” or “Shanghai Group” were behind hundreds of attacks on U.S. companies, focusing “on companies involved in the critical infrastructure of the United States — its electrical power grid, gas lines and waterworks” thereafter bringing that information to the military unit 61398.
In their defence the China’s authorities simply denied any form of state-sponsored hacking, and have in turn dubbed the US National Security Agency (NSA) as “the world’s largest hacker organisation.”
Nonetheless, since the 2013 revelations, Chinese hacking teams have generated a lot of interest and Western cybersecurity companies and intelligence agencies have accused them of global digital incursion. They allege that Chinese government-backed hackers attempt to target everything from government and military organisations to corporations and media organisations.
Most recently in the footsteps of the incident involving the Chinese spy balloon Microsoft claimed that in an ongoing effort Chinese state-sponsored hackers group ‘Storm-0558’ was forging digital authentication tokens to gain unauthorised access to Microsoft’s Outlook accounts and urged users “close or change credentials for all compromised accounts”. On May 24, Microsoft and US intelligence state-sponsored hackers of ‘Volt Typhoon’ were engaged in ongoing spying of critical US infrastructure organisations ranging from telecommunications to transportation hubs, using an unnamed vulnerability in a popular cybersecurity suite called FortiGuard, and had been active since mid-2021.
According to US cybersecurity firm Palo Alto Networks cyber espionage threat group ‘BackdoorDiplomacy’ has links to the Chinese hacking group called ‘APT15’and they are all involved in cyber intrusions and financially motivated data breaches for the Chinese government. During the visit by then-US House of Representatives Speaker Nancy Pelosi to Taipei, APT27 initiated a range of cyber attacks targeting Taiwan’s presidential office, foreign and defence ministries as well as infrastructure such as screens at railway stations. Television screens at 7-11 convenience stores in Taiwan Began to display the words: “Warmonger Pelosi, get out of Taiwan!”
Mara Hvistendahl’s article in Foreign Policy, 2017 ‘China’s Hacker Army’ estimated China’s “hacker army” anywhere from 50,000 to 100,000 individuals, but rejected the belief that it was a monolithic cyber army. Mara contends that Chinese hackers are for the most part dangerous ‘freelancers’ whose ‘causes neatly overlap with the interests of the Chinese government’ and these hackers are left alone as long as they target foreign sites and companies.
Although cyber attacks have gone up globally, data by Check Point, an American-Israeli software company, reveals that weekly cyber attacks in India have gone up by 18 per cent this year, which is 2.5 times more than the global increase. Furthermore the cyber attacks are becoming more sophisticated as hackers try to weaponize legitimate tools for malicious gains. For instance the use of ChatGPT for code generation, enables hackers to effortlessly launch cyberattacks.
Last year in a massive case of cyber espionage, Chinese-linked hackers broke into mail servers operated by the Association of Southeast Asian Nations (ASEAN) in February 2022 and stole sensitive data. At the recent ‘Conference on Crime & Security on the theme of ‘NFTs, AI and the Metaverse’, current G20 President India, has highlighted the need for cooperation to build cyber-resilience in an increasingly connected world. Both cyber attacks and cyber crimes have national security implications.
In India, investigations into the cyberattack, which had crippled the functioning of India premier health institution AIIMS, revealed that “the IP addresses of two emails, which were identified from the headers of files that were encrypted by the hackers, originated from Hong Kong and China’s Henan province”.
Earlier this year, US Federal Bureau of Investigation (FBI) Director Christopher Wray had an alarming metric, – that Chinese hackers outnumber FBI cyber staff 50 to one. Addressing a Congressional panel he said, China has “a bigger hacking programme than every other major nation combined and has stolen more of our personal and corporate data than all other nations — big or small — combined.”
China is today home to some of the most sophisticated hackers, whose capabilities have only improved with time. Their motivations and actions might be independent but are conveniently entwined. However, much more needs to be understood about the hacker culture from China in recent years, if the menace of cybercrime and ransomware is to be mitigated successfully .
Intelligence
Whistleblowers: the Unsung Heroes

Whistleblowing is a bribery and corruption prevention strategy that does not receive the credit it deserves. In fact, rather than relying exclusively on laws, regulations, and resolutions, whistleblowing can be considered a highly effective method to combat bribery and corruption in any field, including government or corporate settings. Whistleblowing often leads to sustainable solutions, as it involves voices from various levels, ranging from grassroots to top-tier management. However, there are plethora of challenges whistleblowers face when they blow the whistle. Nonetheless, whistleblowers play a crucial role in preventing bribery and corruption, and this pivotal role enables preserving the security of any nation.
As stated by the National Center for Whistleblowing (2021), at its core, a whistleblower is an individual who discloses instances of wastefulness, fraudulent activities, misconduct, corruption, or hazards to public well-being, with the intention of prompting corrective actions. While whistleblowers are often affiliated with the organization where the wrongdoing occurs, it is not a prerequisite; anyone can assume the role of a whistleblower as long as they reveal information about the wrongdoing that would otherwise remain concealed. In simple terms, a whistleblower is a person who acts responsibly on behalf of themselves as well as others. Whistleblowers play an extremely imperative role in any society, as they stand for justice, promote accountability, and advocate transparency.
When looking at its link to national security, whistleblowers play a crucial role. One prominent action is whistleblowers exposing imminent and occurred security threats. They are capable of disclosing breaches of security, illegal surveillance, and in situations where individuals or entities are attempting to divulge material information. Whistleblowers uncover injustices, misconduct, and beyond-the-scope activities of decision-makers within government or private entities. If individuals engage in unethical practices, illegal actions, or actions jeopardizing integrity, whistleblowers blow the whistle. One such example, as reported by St. Francis School of Law in 2022, is whistleblower Frank Serpico’s case. He was the first police officer who openly testified about corruption within the New York Police Department, reporting instances of police corruption, including bribes and payoffs, despite facing numerous obstacles. His revelations contributed to a 1970 New York Times story on systemic corruption in the NYPD, leading to the formation of the Knapp Commission. In 1971, he survived a suspicious shooting during an arrest, raising concerns about potential attempts to harm him. Serpico’s bravery emphasized the importance of accountability and transparency in law enforcement.
Whistleblowers also contribute by facilitating accountability by bringing into light corrupt practices such as mismanagement of money. An example is, in 1968 when A. Ernest Fitzgerald, known as the “godfather of the defense movement,” exposed a staggering $2.3 billion cost overrun related to the Lockheed C-5 transport aircraft. His courageous testimony before Congress shed light on issues in defense contracting and resulted in substantial government savings. Fitzgerald’s contributions went beyond the immediate case, playing a crucial role in the passage of the Whistleblower Protection Act of 1989. This results in a culture of accountability where representatives of the public are answerable to their actions. Whistleblowers uphold the rule of law and promote justice by defending the rights of the citizens. It fosters democracy.
However, whistleblowers are often subjected to criticism for standing up against injustice. They fear retaliation, as guilty parties may try to silence them out of revenge. Additionally, companies or institutions may not take whistleblowers seriously, leading them to avoid addressing the reported issues. In many cases, this happens because governments or authorities in power might be involved in bribery and corruption. Public recognition and appreciation of whistleblowers’ contributions to society are vital and should not be perceived as excessive. In addition, there are situations where groups of individuals create sub cultures within organisation and act against rules and protocols jeopardising inclusive culture. In such situations, reporting to a superior will be seen as favoritism or being overly devoted to the institution. This toxic environment demotivates valuable employees or those willing to stand against injustice. The lack of adequate legal protection further compounds the challenges faced by whistleblowers. Moreover, the courage to stand against bribery and corruption is in dire need, as many individuals may lack the moral fortitude to do so.
Whistleblowers are internationally and domestically protected, primarily through the adoption of the United Nations Convention against Corruption. Other international agreements, such as the African Union Convention on Preventing and Combating Corruption and the Organization of American States Inter-American Convention against Corruption, also demonstrate a commitment to whistleblower protection. Various influential international organizations, including the G20, OECD, and APEC, have played a role in promoting whistleblower laws and best practices worldwide. On the domestic front, countries like Sri Lanka have specific laws dealing with corruption, while OECD findings highlight countries with comprehensive whistleblower laws such as the United States, Canada, Japan, and others.
Despite these efforts, there are still some ambiguities and gaps in provisions that hinder effective whistleblowing. For instance, the proposed anti-corruption bill in Sri Lanka allows public officers to accept gratifications authorized by written law or employment terms, which undermines the core objectives of the bill and enables influential individuals to evade accountability for corrupt gains. In Russia, whistleblower protection is limited, with unsuccessful attempts to establish protective measures in 2017. This puts Russia behind the EU, which has implemented robust whistleblower protection through the Whistleblowing Directive.
It is evident that whistleblowers play an indispensable role in combatting bribery and corruption, acting as a highly effective strategy to preserve the security of any nation. Despite facing numerous challenges, these individuals contribute significantly by uncovering wrongdoing, promoting accountability, and upholding transparency. By exposing imminent security threats and holding corrupt practices accountable, whistleblowers safeguard the rule of law and foster democracy. However, to harness the full potential of whistleblowing, it is crucial to address barriers to reporting and remedy afore mentioned legal hurdles. Encouraging a whistleblowing culture and recognizing their contributions will enable society to effectively mitigate and combat bribery and corruption, by creating a more just and transparent environment. To accomplish this, organizations can embrace a culture of whistleblowing, by conducting awareness campaigns, implementing training programs, and fostering a safe and supportive environment for whistleblowers to come forward. In addition, implementing technical measures and policies to ensure whistleblower protection, authorities can demonstrate their commitment to supporting those who expose wrongdoing. These collective actions will strengthen the pivotal role of whistleblowers in preserving security by combating bribery and corruption, fostering a safer and more ethical society for the future.
Intelligence
Breaking the Grip: Comprehensive Policy Recommendations to Defeat Drug Cartels

In 2022, drug overdoses claimed the lives of over 100,000 Americans. The primary sources of illegal drugs flooding into the United States are the Mexican drug cartels, who exploit a network of corrupt politicians, police officers, and military personnel in Mexico. Within Mexico itself, these cartels are responsible for a staggering level of violence, including tens of thousands of homicides each year. Within the United States, the cartels establish distribution cells, collaborating with either Mexican gangs or affiliated criminal organizations.
The U.S. Drug Enforcement Agency (DEA) considers the Mexican drug cartels to be the number-one threat to the United States. Among them, the Sinaloa Cartel and Jalisco New Generation Cartel (CJNG) are the richest and most powerful. Their exceptional earnings allow them to invest in soldiers and weapons, as well as payoffs and bribes, enabling them to expand their territorial control.
To effectively address the challenge posed by the cartels, the United States should adopt a comprehensive set of policy measures. These include securing the southern border, fostering enhanced cooperation with the Mexican government, implementing immigration reforms, bolstering drug enforcement efforts domestically, designating the cartels as terrorist organizations, imposing targeted financial and economic sanctions, and considering if limited military intervention is necessary.
While these measures hold significant potential, there exist political barriers that hinder their implementation.
Secure the Southern Border
Since January 2020, over five million people have illegally crossed the southern border. The U.S. Customs and Border Protection (CBP) identifies protecting the border from illegal movements of people and drugs as being essential to homeland security. Transnational criminal organizations, such as the Sinaloa Cartel and CJNG, are responsible for most of the drugs entering the country. On an average day, CBP seizes 1,797 pounds of illegal narcotics. In 2022, CBP seized a total of “more than 1.8 million pounds of narcotics and 14,700 pounds of fentanyl.” Preventing the cartels from being able to transport drugs into the United States would take away their income, causing their soldiers and friendly politicians to stop cooperating with them.
In order to better secure the border, CBP has created a preparedness plan which consists of a number of crucial elements, such as increasing the number of personnel, while improving technology and infrastructure. In addition to new hires, the number of personnel can be augmented through increased cooperation with other branches of law enforcement and the military. In May, President Biden, in response to a request from the Department of Homeland Security (DHS), which oversees CBP, ordered an additional 1,500 troops to the border for a 90-day deployment. This was on top of the 2,500 already in place. Texas Governor Ron Abbot deployed his national guard and the new Texas Tactical Border Force to the border. North Dakota and Tennessee, as well as other states, also sent members of their national guard to Texas. In addition to national guard troops, the state of Florida sent a mix of state law-enforcement officers from varying branches. To effectively control the border, however, and have a major impact on illegal immigration, the number of troops will have to be drastically increased and the deployment would have to be permanent.
The technological improvements called for by the DHS include increased use of high-tech assets for aerial surveillance such as drones and manned aircraft. They also want sensors on border barriers, land sensors, cameras, radar, and autonomous surveillance towers. This technology will allow the DHS to better detect, monitor, and track unauthorized border crossings. Additionally, improved data analytics and artificial intelligence would help with screening and processing of legal entrants as well as illegals who have been apprehended.
The DHS has called for improved infrastructure towers, as well as facility expansion and upgrades. Some U.S. lawmakers would also like to see the border wall completed, particularly along vulnerable areas. A wall would impede illegal entry to the country, while making it easier for officials to spot illegal crossings.
Plans to secure the border have been rejected on a number of grounds. First, it would be expensive to station the necessary number of personnel at the border. Increased infrastructure, particularly the wall, would also be very costly and would not provide a 100-percent solution. Even more, it would be seen as racist, with Bloomberg calling the border wall a monument to White Supremacy.
Increased Cooperation with Mexican Government
One part of the cooperation with Mexico has to include Mexico’s willingness to help staunch the flow of illegal immigrants into the United States. Mexican President López Obrador formed a national guard tasked with this purpose, but the group has been condemned by human rights activists. Furthermore, the national guard, like other elements of Mexico’s law enforcement and military, suffers from corruption.
If migrants were turned away by the U.S. in large numbers, Mexico would have to stand ready to accept them. Mexico would also have to form agreements with other countries in the chain of drug transit, from Colombia, through Central America, to the U.S. border. These countries will have to similarly agree to help prevent migrants from entering Mexico and they will have to stand ready to receive those migrants returned by Mexico.
Inside of Mexico, the Mexican government must actively fight the cartels, disarming them, disbanding them, and loosening their hold over both territory and people. This includes targeting high-profile cartel leaders. This will create command and control vacuums which historically have caused in-fighting among cartel members. Large cartels would then splinter into independent and warring groups with considerably less power. Changes within Mexico, however, would be dependent on reducing corruption, and these policies would be very unpopular among politicians, police, and military officers who benefit from the status quo.
Because of the massive corruption and the influence the cartels have over the Mexican authorities, U.S. Rep. Dan Crenshaw (R-TX) has abandoned any hope of cooperating with the Mexican government, calling the country “a failed narco-state.” Sen. Lindsey Graham (R-SC) has similarly given up on the Mexican government, saying that the U.S. should notify Mexico that the cartels will soon be designated as terrorist organizations.
Immigration Reform
The screening process for legal immigrants must be strengthened, while backdoor avenues, such as illegal entry and asylum-seeking, must be curtailed. Under the Biden administration, anyone arriving at the southern border can claim to be seeking asylum. This allows them to remain in the United States awaiting their asylum hearing. Republicans see this as an enticement for people wishing to enter the country, bypassing normal immigration procedures. Rights groups, on the other hand, complain that Washington should not curtail its acceptance of asylum seekers. In this case, asylum seekers should be returned to Mexico to await their court date. Knowing that they cannot get a free pass into the U.S. would reduce the number of people seeking to exploit the system. This change in immigration procedure would have to be coordinated with Mexico, however, as the undocumented would be entering Mexican territory.
Increased Drug Enforcement in the U.S.
Drug laws in the U.S. must be rigorously enforced in order to reduce the demand for drugs. Law enforcement must be strengthened, including additional training, and increased investigation and prosecution of drug-related crimes. Intelligence gathering must be enhanced through the creation of specialized units and task forces. The DEA reported that drug cartels are exploiting social media to sell fentanyl and methamphetamine. The authorities should closely monitor these social media in order to identify and arrest buyers and sellers. Furthermore, the DEA must coordinate with federal, state, local, and tribal law enforcement agencies to increase arrests of people selling or buying illegal drugs.
Beyond law enforcement and prosecution, there must be comprehensive drug prevention and treatment programs, education campaigns, addiction treatment, and rehabilitation programs. Opponents of strict enforcement claim that enforcement does not work because drug use has increased during the 50 years that the U.S. war on drugs has been going on. The war on drugs has cost $1 trillion, and roughly one in five incarcerated people were arrested on drug charges. Opponents also complain that prisoners are disproportionately Black and Latino. Although only 13.4 percent of the population is African American, about 25 percent of all persons arrested for drugs are African American adults.
Identify Cartels as International Terrorist Organization
The cartels are known to cooperate with international terrorist organizations, such as Hezbollah, Taliban, the Revolutionary Armed Forces of Colombia (FARC) and al-Qaeda, in order to sell their drugs in other parts of the world. They also aid terrorism by smuggling terrorists into the United States. To launder their illicit income, they employ the services of Chinese criminal organizations which pose their own threat to the United States. U.S. lawmakers have proposed designating the cartels as terrorist organizations, because they use violence and threats of violence to influence and control judges, politicians, and lawmakers. Designating the cartels as terrorist organizations would facilitate U.S. government seizure of cartel assets. It would make it easier for the U.S. to arrest cartel members inside of the United States, and possibly inside of Mexico. The U.S. could deport or bar from entry persons associated with the cartels. A terrorism designation would also enable the U.S. to deploy the military, even inside of Mexico.
However, there would be a number of disadvantages. First, violence would most likely increase, particularly if the U.S. military became involved. Next, it would effectively destroy U.S.-Mexico relations. The U.S. would be able to sanction or arrest high-ranking members of the Mexican government and security forces, which might be perceived as an act of war. These types of purges might destabilize the Mexican government and would, at the very least, cause a breakdown in cooperation between the two nations. Furthermore, bilateral trade, valued at $800 billion and accounting for millions of jobs on both sides of the border, would dry up. Increased violence, a destabilized government, and a loss of jobs would increase the flow of illegal immigrants into the United States.
Military Intervention
Rep. Dan Crenshaw and other U.S. lawmakers have called for an Authorization for Use of Military Force (AUMF) to target Mexican drug cartels, saying “We must start treating them like ISIS – because that is who they are.” Those who back an AUMF point to the fact that the cartels are responsible for more American deaths each year than the entire Vietnam War. An AUMF would provide the president with the sophisticated hardware and expert personnel of the U.S. military, more powerful assets than those possessed by law enforcement or the DHS. Supporters of an AUMF also make the point that the soldiers would be engaging foreign hostiles in a foreign nation and, therefore, would not be infringing on the civil rights of U.S. citizens.
In addition to arresting or killing key cartel members, military intervention could disrupt drug supply chains by destroying growing fields and drug labs. The government of Mexico has protested discussions of U.S. military operations in his country, calling it an offense to the Mexican people. Mexico’s President Lopez Obrador said that he would not “permit any foreign government to intervene in our territory, much less that a government’s armed forces intervene”.
Another disadvantage of U.S. military operations in Mexico would be an increase in violence. Inevitably, civilians would suffer, and the U.S. would be portrayed as the villain in the international and liberal press. The threat of cartel violence against Americans would also increase. Historically, the cartels have tried to avoid killing Americans, for fear of provoking Washington’s wrath. If the U.S. military began engaging in cross-border operations, the cartels would most likely declare all-out-war on Americans. Cartel violence within the U.S. would also accelerate as the cartels would be risking nothing by upping the ante.
Increased Financial and Economic Sanctions
Financial and economic sanctions can be powerful tools to break the cartels and to punish those who assist them. This includes enforcement of anti-money laundering laws, as well as targeting financial institutions that handle cartel money. Cartel assets held in banks around the world could be seized if U.S. allies also participated in the sanctions. If Mexico is legitimately interested in curbing corruption in their own government, this intense scrutiny would also help them to discover which public officials were accepting bribes.
Sanctions have already been used against the cartels: In 2022, the U.S. Treasury Department, in cooperation with their Mexican counterparts, brought sanctions against a cartel member who was trafficking weapons from the United States. Under the sanctions, Obed Christian Sepulveda Portillo had his property in the U.S. seized. U.S. Entities and persons from the U.S. are also prohibited from doing business with him or completing transactions on his behalf. Those who violate these sanctions may face criminal charges or civil lawsuits. In July 2023, the Treasury Department imposed sanctions against ten individuals, including several Sinaloa Cartel members, as well as one Mexico-based company, for their role in the production of illicit fentanyl and the precursor chemicals necessary for fentanyl production. Under the sanctions, all of their properties and interests in the U.S. were seized. Americans were banned from doing business with them. Companies in which they had a direct or indirect stake of 50 percent or more were also prohibited from doing business in the U.S. or with Americans. These are good examples, but to break the cartels, these types of sanctions would have to increase in scope, hitting large numbers of people participating in criminal networks.
From an efficacy standpoint, the above policy recommendations, if taken together, would result in a decrease in the supply side, a decrease in the demand side, and a long-term reduction in drug deaths and violent deaths in both the U.S. and Mexico, eventually leading to the stabilization of Mexico. Breaking the hold the cartels have on the country would allow Mexico to develop economically. This would benefit the entire population and the United States. But this success, which could take painful years to achieve, would come with a political and human cost which politicians may not be willing to pay.
-
East Asia4 days ago
Al-Assad’s Beijing Visit: A Stepping Stone to a Strategic Partnership Between the Two Nations
-
Economy4 days ago
Why Global Goals Are Global Holes in Need to Be Filled With Entrepreneurialism?
-
Economy4 days ago
IMF Conditions vs. Pakistan’s Economic Future
-
World News4 days ago
China has the capacity to build combat ships at 200 times the rate that the US can
-
Middle East3 days ago
Iran and Sudan’s Rapprochement in 2023: New Changes in the Regional Geopolitics of the Middle East
-
World News3 days ago
Foreign Affairs: Will the West abandon Ukraine?
-
Finance3 days ago
Why the West’s sanctions on Russia miss the mark
-
Southeast Asia4 days ago
Biden’s ASEAN Summit Absence Sparks Multilateral Concerns