A terrorist attack committed by a 29-year-old national of Uzbekistan, Sayfullo Saipov, in the downtown of New York City, which killed 8 civilians has set a new task of forecasting and preventing future attacks that can be committed by the immigrants from the post-Soviet states of Central Asia for the Western intelligence agencies.
It is worth mentioning that the states of the former Soviet empire, compared to some Middle East and Arab countries, have been considered as the region least exposed to the Islamic radicalism. However, the following acts of terror have made experts search for the roots of the “Central Asian-specific” Islamic extremism:
The blast in the subway of St. Petersburg, which was committed by an Uzbek terrorist from southern Kyrgyzstan Akbarzhon Dzhalilov in April 2017;
The truck attack in the center of Stockholm Sweden by an immigrant from Uzbekistan, Rakhmat Akilov, rammed through the crowd last April;
The terrorist attack by a native of the Fergana Valley of Central Asia, Abdulkadir Masharipov, on December 31, 2016 murdered 39 people in the Reina nightclub in Istanbul;
The terrorist attack at the international airport of Ataturk in Turkey by citizens of Kyrgyzstan and Tajikistan in June 2016;
Another Uzbek terrorist, Ulugbek Kodirov, tried to kill even US President Barack Obama in July 2011 and was sentenced to 15 years in prison;
More than a dozen Uzbeks have been charged with terrorism between 2012 and 2016 in the USA and are now involved in continuing legal proceedings, which is evidence of the growing Islamic terrorism among immigrants from Central Asia.
Western countries need to understand that the idea of establishing the Caliphate will never disappear from the agenda. Modern Salafites and Wahhabis willing to clean Islam from innovations want to turn back time to the days when four Caliphs ruled the Islamic world. The establishment of the Caliphate, the fight against kafirs, and the desire to become a Shahid (to die as martyr for the sake of Allah) are the eternal ideas that inspires radicals around the globe to commit terrorist attacks. Therefore, Western countries should amplify the activities of the special service for counter-terrorism in order to identify Islamic terrorist at an early stage by studying the jihadist ideology. Their officers should have deep and analytical insight into the historical roots and causes of the radicalization of immigrants from Central Asia. The comprehensive study of religious views, social networks and family values can help draw initial conclusion about a suspect.
The identification of Islamic radicals among the crowd and the prevention of future attacks are the most important elements of the fight against religious extremism. The object of research should be the national diaspora centers, or religious communities in the country of domicile, where an immigrant could catch the ideas of the Caliphate. The activity of mosques attended by the immigrant should be analyzed deeper. The lives of immigrants from Central Asia in Russia, Europe and the USA have shown that it is there where they are exposed to the influence of radical ideas of the Salafism and Wahhabism.
Experts in religion need to know that the peoples of Central Asia, especially from the Fergana Valley, have a historical memory of the greatness of Islam, which the communist government failed to erase during a period of more than 70 years. It is no coincidence that the first extremist groups in Central Asia, such as the Islamic Movement of Uzbekistan, appeared in the Fergana Valley. Extremists have named their terrorist groups by the name of famous Islamic scholar Imam al-Bukhari, whose hadiths “Sahih al-Bukhari” are considered in Islam as the second most holy book after the Quran. This proves that radicals use the Sacred Book to achieve their criminal purposes.
Today the core of terrorist groups of Katibat al-Imam Bukhari, Katibat al Tawhid wal Jihad, The Islamic Jihad Union and ISIS’s Horasan, who are pursuing jihad in Syria, Iraq and Afghanistan, is made up of ethnic Uzbeks, Kyrgyz and Tajiks from the Fergana Valley. Therefore, the counterterrorism officers should know the environment and origin of the religious views of those, whom they would place under observation. Also, they should investigate thoroughly the works of Islamic thinkers that have shaped the radical views of suspect immigrants. As a result, only experienced experts in the religion of Islam, who can analyze the complex world of Islam will likely be able to identify a radical among the crowd and prevent a terrorist attack at the initial stage.
What are the signs that can help identify a religious radical who has taken the path of jihad out of a crowd of immigrants? First of all, radical Islamists can be sometimes identified by their appearance. Usually, the followers of Salafism and Wahhabism in Central Asia have a long shaggy beard and no moustache. The beard is considered by the Salafis as the symbol of the manhood. According to the hadiths, Prophet Muhammad has called the Muslims for wearing the beard and not shaving it, “Differ from the polytheists: let your beards (grow), and trim your moustache.” Radical extremists interpret the Quran literally and try to live under the Sharia law that existed during the times of Prophet Muhammad.
Second, the Salafis usually wear short pants (above ankles) and knee-long shirts. Their heads are often shaved smooth. The women of Wahhabis wear tightly closed dark clothes, with scarves covering their faces. It does not mean however that all those who wear such clothes belong to the Islamic radical movements. Yet the counterterrorism officers may pay attention to this and pick up the right trail.
Third, the majority of Wahhabis stand against all forms of innovations and developments calling them a “biddat”, which comprises photography, television and modern music. Islamic radicals consider those who create the “biddat” great sinners. The Quran calls the music the devil’s whisper that calls for sin and crime. During the Taliban rule in Afghanistan, music was forbidden, musicians were shot and those who listened to music on the radio had their ear cut off. There is another hadith in Islam that forbids keeping photos at home, “The angels do not enter a house which contains a picture.” In this respect, we should pay attention to the following fact: in June 2017 at the JFK Airport Sayfullo Saipov refused to take a picture with Kobiljon Matkarov. This is the evidence of his adherence to the radical ideology of Salafism. Therefore, a follower of the Takfiri ideology can be identified by his/her attitude to “biddat.”
Fourth, however trite it may sound, the followers of the Wahhabism can be identified by their extremely unfriendly and hostile attitude to pet dogs. Dogs in Islam are traditionally seen as unclean animals that may not be contacted by the Muslims. The hadith says that “prayer is annulled by a dog if it passes in front of the praying people.” In the Western countries, such a hostile attitude of a religious radical towards a dog is easily seen by neighbors and others.
Fifth, the aggressive attitude towards the representatives of other religions can point out the Islamic radical who nourishes the idea of committing a terrorist attack. The followers of the Wahhabism and Salafism typically have zero tolerance for non-Muslims, which can result in conflict situations. Radicals often have aggressive behavior when it comes to the relationship between the Islam and other religions. Extreme Wahhabis are committed to pursuing jihad against non-Muslims.
Sixth, a distinctive feature of Central Asian Wahhabis is the denial to worship the deceased. In recent years, they have obsessively destroyed epitaphs and gravestones, have been fervently fighting against the historical past by destroying relics and cultural artifacts. Both the Taliban in Afghanistan and ISIS militants in ancient Palmyra in Syria have engaged in historical and archaeological destruction campaigns. Thus, they deny their ethnic background and try to create the new historical community of Muslims. This sign is an additional clue that can be used by counterterrorism officers to find religious radicals among the crowd. It can be seen during the funerals among immigrants living in the West.
All of the above signs are additional clues that can be used to find “lone wolves.” However, Islamist radicals try not to stand out from the immigration crowd. They live in social isolation, work alone, which makes it hard to identify them. Terrorist attacks in the USA organized by the immigrants from Central Asia – the Tsarnaev brothers in Boston, Omar Mateen in Orlando and Sayfullo Saipov in NYC – are the evidence of the self-radicalization of “lone wolves” via the internet. The jihadist ideology of ISIS and al-Qaeda has become the motivating force that pushes them to terror. However, they didn’t receive any material support from external entities or didn’t have any direct contacts with them.
There are two additional ways that a religious radical could be recognized out of a crowd of immigrants, which is related to technology and not to his or her outward appearance or activities. The ability to perform the following recommendations may not be possible in all countries.
First of all, this is electronic tracking of websites and social media often visited by a suspect. ISIS and al-Qaeda keep on recruiting their new adherents over the internet, teach their militants how to make bombs at home, where to commit terrorist attacks, and what tools to use to kill Western kafirs. In July 2017, the Islamic State published the e-book on Telegram Lone Wolf’s Handbook in Turkish, whose purpose is to increase the number of attacks on civilian targets in the United States and Europe. A migrant from Uzbekistan, Sayfullo Saipov, who committed a terrorist attack in New York City in October 2017, strictly followed the instructions given in the Lone Wolf’s Handbook. The fourth chapter of the book reads, “Attackers are advised to choose the most crowded places and drive over people as fast as possible to exact the most damage.” The driver assassins are also instructed to leave a note behind claiming the attack in the name of ISIS, which Saipov did. Therefore, Western countries need to take specific measures to block and destroy the calls for jihad from Salafi groups on the internet and in social media.
Second, cell phones of suspects should be scanned online for apps and videos downloaded by them. Therefore, officers of antiterrorism branches will need the consent and support of internet companies and social media to decode the private part of platforms. According to the FBI, Saipov had about 90 videos and 3,800 images on a cell phone featuring ISIS propaganda, including video of a beheading. The internet jihad has played a major role in the radicalization of his religious views. If his cell phone had been monitored, it might have been possible to prevent the terrorist attack in NYC.
In such situations, when a radical Islamist does not speak to anyone, doesn’t use internet or other modern technology, acts alone, and law enforcement bodies have no other evidence that would allow them to find the prospective terrorist, there’s nothing else to do but to rely on the additional indicators we have specified above.
India’s Strategic Use of TTP to Undermine Pakistan’s Stability
Again, bloodshed in the city of flowers, with more than 90 martyrs and at least 250 injured in a suicide attack by the Tehrik-i-Taliban Pakistan in Peshawar. India’s backing for the TTP and its participation in the group’s avowed jihad against Pakistan have emerged as the most important security challenges in South Asia, with significant ramifications for regional stability and peace.
The Tehrik-i-Taliban Pakistan (TTP), commonly known as the Taliban in Pakistan, is a Pakistan-based Islamist extremist group. The group, which was founded in 2007, has claimed responsibility for a number of fatal assaults against Pakistani civilians and military personnel. TTP has proclaimed war against Pakistan’s government and military forces, arguing that they are not Islamic enough.
TTP has become a major security danger to Pakistan over the years, spreading widespread fear and instability. The group’s constant strikes on civilians and military targets have resulted in hundreds of deaths and massive devastation. The rising frequency and savagery of TTP assaults has caused considerable alarm among Pakistanis and the international world. Despite significant international criticism, the TTP continues to carry out atrocities with impunity.
Evidence of India’s Support for TTP:
Over the last decade, Pakistani security services have often reported on the Indian intelligence agency (RAW) providing support to the TTP. This assistance has been reported to include financing, training, and weaponry, all of which have aided the TTP’s capacity to carry out strikes against Pakistan. Pakistani officials, security professionals, and independent investigators have claimed India’s participation with TTP, citing proof of Indian involvement in TTP activities and divulging the false flag operations.
TTP commanders obtaining safe shelter in India is another piece of evidence pointing to India’s connection with TTP. TTP commanders have been said to have crossed the border into India for medical treatment and then stayed for lengthy periods of time. The granting of safe haven to TTP commanders implies that India is not only supporting the organization, but also shielding its leaders from prosecution and reprisal.
In addition to the Indian intelligence agency’s direct backing for TTP, there have been claims of Indian media outlets distributing misinformation in favor of TTP. This has included interviews with TTP officials and positive coverage of TTP’s efforts by Indian news sources. The media coverage has been interpreted as a means for India to legitimize the TTP’s conduct and seek sympathy from the world community.
India is contributing to Pakistan’s instability by supplying TTP with the money, safety, and legitimacy it requires to carry out its assaults.
India’s Motives Behind Supporting TTP:
One of India’s key motivations for supporting the TTP is to undermine Pakistan’s government and military. By assisting the organization, India is able to undermine Pakistan’s ability to maintain security and stability, creating an atmosphere in which the TTP may operate with impunity. The ultimate purpose of this assistance is to weaken Pakistan’s military and political institutions, making it easier for India to achieve a regional advantage.
Another reason India backs the TTP is to create a political and security vacuum in Pakistan. By assisting the organization, India may foment turmoil and instability in the country, creating possibilities for India to exploit the situation. The political and security vacuum left by the TTP’s operations can then be utilized by India to further its own goals and acquire more influence in the area.
India’s backing for the TTP might also be interpreted as an attempt to shift attention away from its own human rights violations in Kashmir. By assisting the TTP and producing turmoil and instability in Pakistan, India is able to divert attention away from its own activities in Kashmir, which have been severely condemned for abusing the human rights of Kashmiris. By helping TTP, India can divert attention away from its own acts and position itself as a responsible regional actor.
The Consequences of India’s Actions:
One of the most serious consequences of India’s backing for the TTP is the worsening of terrorism in Pakistan. India is feeding the fire of terrorism in the area by supplying finance, training, and equipment to the group, making it easier for TTP to carry out its heinous actions. This has had a significant influence on Pakistan’s security and stability, as well as the safety of its population. Terrorism has exacerbated violence and loss of life, creating an environment of dread and insecurity throughout the country.
India’s backing for TTP worsens regional tensions and instability. The rise of terrorism in Pakistan has heightened tensions between Pakistan and India, as well as between Pakistan and its neighbors. This has produced a climate of insecurity and uncertainty in the region, threatening regional peace and security. As each side gets more entrenched in its stance, the international community’s ability to find a solution to the crisis has become more difficult.
India’s backing for TTP has had a significant influence on regional peace and security. The rise in terrorism and tensions has made it increasingly difficult to establish regional peace and stability. This has had a detrimental influence on the region’s economic development, social advancement, and people’s well-being. The continuation of violence and insecurity has also made it more difficult for the international community to address the underlying causes of conflict and work toward a long-term solution.
The international community must take steps to confront India’s backing for TTP. India’s activities are clearly against international law and standards, and they endanger regional peace and security. The international community must strongly denounce India’s conduct and endeavor to hold those involved accountable for their acts.
Holding those involved accountable for their conduct is critical to preventing such incidents in the future. The international community must act to bring individuals who promote terrorism and destabilize the area to account. This involves investigating and punishing individuals responsible for supplying TTP with support, as well as those involved in planning and carrying out terrorist actions. Only by taking firm action can we expect to restore stability and security to the area and prevent such actions in the future.
Cyberwar, Netwar: The Untouchable and Unpredictable
Territorial integrity, sovereignty and non-interference are salient features of a just and secure state. For a state to exist, compete and survive in the international context, a country must be well equipped. The unbiased, neutral and non-aligned movement is the best way to reach heights, especially for small states. However, this is not an easy task, ‘everything has a price’. The existence and co-dependence of a state are made further vulnerable as well as strengthened by way of ‘information’. Unlike in past, when troops protected borders, at present country must face and react to content generated and disseminated on online platforms.
Cyberwar and Netwar are mechanisms that are used by certain individuals as well as entities to infiltrate systems, pass a message, steal information or change the material content. “Cyberwar” is the act of “disrupting, if not destroying, information and communication systems”. On the contrary, “Netwar” is to “disrupt, damage, or modify what a target population knows or thinks it knows about the world around it”. These threats are vicious to national security. Since the whole world is digitalized, any information regardless of its credibility reaches a wide audience. There are various modes of cyberwar including Phishing, Ransomware, E-commerce data interception, Crimeware-as-a-Service, Cyber Scams and Crypto-jacking. (Arquilla and Ronfeldt 1995) states, that a Netwar may focus on public or elite opinion, or both. It may involve diplomacy, propaganda and psychological campaigns, political and cultural subversion, deception of or interference with local media, infiltration of computer networks and databases and efforts to promote dissident or opposition movements across computer networks.
According to Blackfog’s 2021 State of Ransomware Report, government agencies were the top targets for cybercriminals, followed by education, healthcare, services, technology, manufacturing and retail. According to Curran, Concannon and McKeever (in Janczewski and Colarik 2008: 03) have pointed out; the LTTE became the world’s first terrorist outfit to attack a country’s computer system in 1998. Another example is India. In August 2013, Indira Gandhi International Airport (IGI) faced a Cyberattack. ‘Technical snag’ hit the operations of terminal no. 03. Nisar & StepovayaIn (2022) has cited (UNODC, 2021) which states that in September in Malaysia, a web-hosting service was the target of a ransomware attack demanding US$ 900,000 in cryptocurrency and In May, four subsidiaries of an international insurance company in Thailand, Malaysia, Hong Kong, and the Philippines were hit by a ransomware attack asking for US$ 20 million. Where that being said for cyber-war, net war is also a crucial problem. This is explicit in Russia and Ukraine conflict where information advantage is heavily discussed and debated. Byman (2022) has mentioned, “Confrontation between Bahrain, Egypt, Saudi Arabia, and the UAE (the so-called “Quartet”) and Qatar, for example, began in 2017 in part due to social media exploitation involving hacked email accounts and associated disinformation”. Sri Lanka too faces disinformation by LTTE and its international networks.
Threats, which occur on online platforms, are equally important as much as militaristic aspects of warfare. Where the militaristic aspect includes conquering and declaring power, Cyberwar and Netwar disrupt systems and brainwash people respectively. Since crimes conducted, are unpredictable, intangible and cross borders, ascertaining the criminal is daring. Due to these reasons, imposing liability as to whether it is collective or individual becomes strenuous. Furthermore, lack of experience, expertise in personnel, lack of technology and inadequate infrastructure can be identified as problems. Information illiteracy is another pertaining issue, which is the inability of individuals to recognize when information is needed and have the ability to locate, evaluate and use information effectively. Moreover, cyber-attacks are widely done due to their low cost and widespread nature.
With that being said, it is imperative to reiterate, that national security is threatened by Cyberwar as well as Netwar. Thus, any country must overcome the challenges mentioned afore. For that, to fight cyber war, enhancing technological infrastructure and technical capacity is important. In netwar, information literacy must be instilled to the population. Hence, people will be able to evaluate the quality, credibility and validity of the content. In addition, it is crucial to have a reporting mechanism for false content disseminated online. International cooperation is effective to combat Netwar and Cyberwar. Likewise, it is vital to sign and ratify necessary laws and follow resolutions in the international context. Furthermore, individuals, government, as well as private entities, must behave in a cyber-resilient manner that they are otherwise not incentivized to do.
Operation Neptune Spear and the Killing of Osama bin Laden
The founder and first leader of Al-Qaeda, And establishing 20-years republican government in Afghanistan: Neptune Spear was the secret name or code of the operation that was carried out under the leadership of the CIA on May 2, 2011 in the Abbottabad region of Khyber Pakhtunkhwa for killing of the leader of the Al-Qaeda group Osama bin Laden. This operation, which was carried out from Afghanistan to the territory of Pakistan by former President of the United States Barack Obama, is generally known as JSOC.
Why this mission was named Neptune Spear?
The reason why the operation to kill Osama Bin Laden, the leader of the al-Qaeda group, was given the name Neptune’s Spear is as follows: The mission was named Operation Neptune’s Spear because it was the emblem of the United States Navy Seal, and Neptune in classical mythology means the god of the sea. In addition, this operation is commonly known as JSOC, because the Joint Special Operations Command (JSOC) is a sub-command of the United States Special Operations Command (USSOCOM), which played an important role in the operation to kill Osama Bin Laden on May 2, 2011.
The Neptune Spear operation started on May 1, 2011 from the American military base in Jalalabad province of Afghanistan, and ended on May 2 in Abbottabad, Pakistan. Former President Obama, Secretary of State Hillary Rodham Clinton, Vice President Joe Biden, Defense Secretary Robert Gates and members of the national security team were monitoring the operation online. All involved in Operation Neptune Spear were 23 SEALs, an interpreter, two helicopters and a combat dog. The operation started from a base of the American forces in Jalalabad, Afghanistan, on May 1, 2011 at 10:30 pm local time, and on May 2, 2011, after 40 minutes long operation, they ended by killing Osama Bin Laden before one o’clock. Who was Osama Bin Laden and how did he become a big threat to the world, especially the United States? Osama bin Laden, the son of Muhammad bin Awad, was born on March 10, 1957 in Riyadh, Saudi Arabia, but some sources close to Osama believe that he was born in 1958. Osama bin Laden had five wives, his first wife was Najwa Ghanim, who married him in 1974, his second and divorced wife was Khadija Sharif, who married him in 1983, and His third wife was Khairya Saber who married Osama bin Laden in 1985. His fourth wife was Siham Saber, who married Osama bin Laden in 1987, and his fifth wife was Amal al-Sadah, who married Osama bin Laden in 2000.
Osama had about twenty male and female children from his first four wives, but according to some sources, Osama had twenty-four male and female children from his fifth wife, and some put the number of children at 26, but the exact report is 24 about Osama’s children. Osama bin Al-Adeen studied economics at Abdul Aziz University, And in addition to this, after receiving education in the field of Civil engineering, politics and Shari’a, he studied partially in English literature at Oxford University in England, But intellectually, he was more encouraged towards the jihadist ways and intellectually he chose the jihadist way. Before Osama Bin Laden left Britain and went to Pakistan to choose the path of war, he showed intellectual interest in the Muslim Brotherhood in Egypt. Moreover, during his university years, he financially supported jihadist groups in South Sudan, Egypt, Syria and a number of African countries, because he inherited 20 to 25 million dollars from his father, And Osama spends a part of that money on construction projects and financially supports terrorist groups with the money received from those construction companies. In 1979, Bin Laden went to Pakistan and stayed with his intellectual and jihadist teacher, Abdullah Azzam, and prepared for the war against the former Soviet Union in Afghanistan, after that, he became friends with Ayman al-Zawahiri and founded the (Maktab-Al-Khadamat) in 1984 with Abdullah Azzam, Ayman al-Zawahiri and Osama bin Laden. After that, he started recruiting fighters for Mujahideen against the Soviet Union in Afghanistan and spent most of his wealth on financing terrorists. After that, Osama bin Laden started a massive effort to establish Al-Qaeda and started recruiting fighters from Africa, the Middle East and South Asia, And he accelerated the search for young people with a fighting and jihadist mindset from all over the world, and he focused on Egypt in order to attract Egyptian engineers. After extensive financial and armed cooperation with other jihadist organizations in Pakistan, in 1988, the Al-Qaeda armed group was activated by Osama, Not only did they continue their attacks in Afghanistan, but they also carried out many bloody attacks in the Middle East and Africa. The bloodiest attack was the 11th of September 2001 and the darkest day in the history of the United States. September 11 or 9/11, on September 11, 2001, 19 Al-Qaeda terrorists hijacked four commercial airplanes, and the first two commercial airplanes and suicide bombers targeted the New York City International Trade Center. The third plane targeted the headquarters of the Pentagon in Arlington County, Virginia, and the fourth plane planned to attack the federal government building in Washington DC, but did not reach the target, And in four attacks, around 3000 Americans were killed and up to 25000 Americans and foreigners were injured. After this attack, Osama was included in the list of the most wanted terrorists by the United States and the Western alliance, a list controlled by the FBI.
After 10 years of intense investigations and intelligence investigations, on May 2, 2011, the US government avenged 9/11 by killing Osama at the ISI’s most secure location in Abbottabad, Pakistan. However, Osama’s body was thrown into the sea before his body should be presented to the intelligence agencies of the world as evidence. But there is some confidential information that Osama bin Laden, the American dictator and the founder of al-Qaeda, was recruited by the CIA in 1979 at the beginning of the US-sponsored jihadist war against Afghanistan, And he was 22 years old and trained in a CIA-sponsored guerrilla training camp. In any case, Osama’s entry into Afghanistan led to the fall of the first Taliban regime, and at the same time, a person who was famous for so dear to Westerners came to power in Afghanistan.
How did Hamid Karzai get from immigration to the presidency?
Common understanding between former President Hamid Karzai and the Central Intelligence Agency of the United States and some untold facts: When the Al-Qaeda group carried out the deadly attacks in New York, Washington and Pennsylvania on September 11, 2001, and the leader of this group, Osama bin Laden, took refuge in Afghanistan. In addition, the first Taliban regime of Afghanistan at that time, under the leadership of Mullah Omar Mujahid, accepted the refuge of Osama Bin Laden. Not only that, the American people knew that the United States and the security agencies of this country would not remain silent, and would soon start preparing for revenge. But before that the United States, the Central Intelligence Agency, the Army, and the Special Operations Command of the United States Army started a response plan, they first proposed to the Afghan government to hand over Osama Bin Al-Adeen to the United States. Nevertheless, the leader and founder of the Taliban, Mullah Omar Mujahid, rejected their request, and for the second time, the United States tried to mediate the Saudi Arabia. The US asked the Taliban government to hand over Osama to the government of Saudi Arabia, but Mullah Omar Mujahid said that handing over Osama Bin Al-Aden to Saudi Arabia means handing over to America.
Furthermore, after rejecting the second proposal, the plan to attack Afghanistan was started by the United States and its allies on October 7, 2001. Just 15 days after the terrorist attacks of September 11, 2001, CIA and US Special Forces personnel were sent to northern Afghanistan, to meet local tribal leaders and local commanders such as Abdul Rashid Dostum and work together, to start a war against the Taliban, who controlled the country and gave shelter to Osama bin Laden. A CIA team arrived with $3 million in $100 bills to use to recruit tribal leaders and strengthen the war against the Taliban, and teams of military units came from the fifth Special Forces Group. The then President of the United States, George W. Bush, together with the head of the CIA, George J. Tenet, made a coordinated decision to overthrow the Taliban government by appointing an influential person from the southwest zone of Afghanistan after the formation of a new government in the country.
That person was Abdulhad Karzai’s son Hamid Karzai who spent a lot of time in exile in Pakistan, not only he was the national leader for the Pashtuns of this side of the border, but he also had a special status among the Pashtuns of that side of the border in Pakistan. This position made him a target of the CIA. After October 7, 2001, members of the Central Intelligence Agency began to secretly visit Hamid Karzai’s house in Quetta and Chaman, Baluchistan, Pakistan, as a result, in July 2002, Hamid Karzai came to power in Afghanistan under the warm support of the CIA and the West, and he remained the president of Afghanistan until September 2014.
Sergey Lavrov: ‘If you want peace, always be ready to defend yourself’
Russian Foreign Minister Sergey Lavrov gave an exclusive interview to Sputnik on Thursday, February 2. The conversation took place at...
More Americans believe US provides ‘too much support’ to Ukraine
A growing portion of Americans think that the U.S. is giving too much support to Ukraine, as the Biden administration...
Will COPUOS five-year mission produce a new “international governance instrument” for outer space resources?
Introduction During its 2022 session, the Legal Subcommittee (LSC) of the United Nation’s Committee on the Peaceful Uses of Outer...
Misinformation Backfire on the COVID-19 Vaccine – Exposed
The Government of Canada continues a relentless effort to denigrate opposition to COVID-19 vaccines by sourcing The Council of Canadian...
The Crippled Economy
Lack of money is the root of all evils. Facts do not seize to exist because they’re ignored. Lack of...
The Giedroyć-Mieroszewski Doctrine and Poland’s Response to Russia’s Assault on Ukraine
Although they seem similar, there is a fundamental difference between the Brzezinski Doctrine and the Giedroyć -Mieroszewski Doctrine. Whereas the Brzezinski...
From unidimensional to 3D: the contours of the post-Bretton Woods world
The start of the year 2023 was marked by a series of statements coming from representatives of BRICS countries concerning...
Finance4 days ago
How Twitter can help your business
Finance3 days ago
Your brand needs to be on Twitter, here is why
World News3 days ago
Russian Ministry of Defence: We acquired over 20,000 documents of the U.S. biological programmes
Economy4 days ago
The Prolongation of BRICS: Impact on International World Order and Global Economy
Terrorism4 days ago
Political Scientist: Taliban Rule will lead to terrorism activation in Pakistan
South Asia4 days ago
A Brief History of British Imperialism in India
East Asia4 days ago
Chinese Communist Party and the path of “high-quality development” at Guangdong Province
Finance4 days ago
F.B.I. Official’s Indictment Shows oligarch infiltrated the highest echelons of the government