Connect with us

Intelligence

How to Identify an Islamic Extremist Among the Crowd?

Published

on

A terrorist attack committed by a 29-year-old national of Uzbekistan, Sayfullo Saipov, in the downtown of New York City, which killed 8 civilians has set a new task of forecasting and preventing future attacks that can be committed by the immigrants from the post-Soviet states of Central Asia for the Western intelligence agencies.

It is worth mentioning that the states of the former Soviet empire, compared to some Middle East and Arab countries, have been considered as the region least exposed to the Islamic radicalism. However, the following acts of terror have made experts search for the roots of the “Central Asian-specific” Islamic extremism:

The blast in the subway of St. Petersburg, which was committed by an Uzbek terrorist from southern Kyrgyzstan Akbarzhon Dzhalilov in April 2017;

The truck attack in the center of Stockholm Sweden by an immigrant from Uzbekistan, Rakhmat Akilov, rammed through the crowd last April;

The terrorist attack by a native of the Fergana Valley of Central Asia, Abdulkadir Masharipov, on December 31, 2016 murdered 39 people in the Reina nightclub in Istanbul;

The terrorist attack at the international airport of Ataturk in Turkey by citizens of Kyrgyzstan and Tajikistan in June 2016;

Another Uzbek terrorist, Ulugbek Kodirov, tried to kill even US President Barack Obama in July 2011 and was sentenced to 15 years in prison;

More than a dozen Uzbeks have been charged with terrorism between 2012 and 2016 in the USA and are now involved in continuing legal proceedings, which is evidence of the growing Islamic terrorism among immigrants from Central Asia.

Western countries need to understand that the idea of establishing the Caliphate will never disappear from the agenda. Modern Salafites and Wahhabis willing to clean Islam from innovations want to turn back time to the days when four Caliphs ruled the Islamic world. The establishment of the Caliphate, the fight against kafirs, and the desire to become a Shahid (to die as martyr for the sake of Allah) are the eternal ideas that inspires radicals around the globe to commit terrorist attacks. Therefore, Western countries should amplify the activities of the special service for counter-terrorism in order to identify Islamic terrorist at an early stage by studying the jihadist ideology. Their officers should have deep and analytical insight into the historical roots and causes of the radicalization of immigrants from Central Asia. The comprehensive study of religious views, social networks and family values can help draw initial conclusion about a suspect.

The identification of Islamic radicals among the crowd and the prevention of future attacks are the most important elements of the fight against religious extremism. The object of research should be the national diaspora centers, or religious communities in the country of domicile, where an immigrant could catch the ideas of the Caliphate. The activity of mosques attended by the immigrant should be analyzed deeper. The lives of immigrants from Central Asia in Russia, Europe and the USA have shown that it is there where they are exposed to the influence of radical ideas of the Salafism and Wahhabism.

Experts in religion need to know that the peoples of Central Asia, especially from the Fergana Valley, have a historical memory of the greatness of Islam, which the communist government failed to erase during a period of more than 70 years. It is no coincidence that the first extremist groups in Central Asia, such as the Islamic Movement of Uzbekistan, appeared in the Fergana Valley. Extremists have named their terrorist groups by the name of famous Islamic scholar Imam al-Bukhari, whose hadiths “Sahih al-Bukhari” are considered in Islam as the second most holy book after the Quran. This proves that radicals use the Sacred Book to achieve their criminal purposes.

Today the core of terrorist groups of Katibat al-Imam Bukhari, Katibat al Tawhid wal Jihad, The Islamic Jihad Union and ISIS’s Horasan, who are pursuing jihad in Syria, Iraq and Afghanistan, is made up of ethnic Uzbeks, Kyrgyz and Tajiks from the Fergana Valley. Therefore, the counterterrorism officers should know the environment and origin of the religious views of those, whom they would place under observation. Also, they should investigate thoroughly the works of Islamic thinkers that have shaped the radical views of suspect immigrants. As a result, only experienced experts in the religion of Islam, who can analyze the complex world of Islam will likely be able to identify a radical among the crowd and prevent a terrorist attack at the initial stage.

What are the signs that can help identify a religious radical who has taken the path of jihad out of a crowd of immigrants? First of all, radical Islamists can be sometimes identified by their appearance. Usually, the followers of Salafism and Wahhabism in Central Asia have a long shaggy beard and no moustache. The beard is considered by the Salafis as the symbol of the manhood. According to the hadiths, Prophet Muhammad has called the Muslims for wearing the beard and not shaving it, “Differ from the polytheists: let your beards (grow), and trim your moustache.” Radical extremists interpret the Quran literally and try to live under the Sharia law that existed during the times of Prophet Muhammad.

Second, the Salafis usually wear short pants (above ankles) and knee-long shirts. Their heads are often shaved smooth. The women of Wahhabis wear tightly closed dark clothes, with scarves covering their faces. It does not mean however that all those who wear such clothes belong to the Islamic radical movements. Yet the counterterrorism officers may pay attention to this and pick up the right trail.

Third, the majority of Wahhabis stand against all forms of innovations and developments calling them a “biddat”, which comprises photography, television and modern music. Islamic radicals consider those who create the “biddat” great sinners. The Quran calls the music the devil’s whisper that calls for sin and crime. During the Taliban rule in Afghanistan, music was forbidden, musicians were shot and those who listened to music on the radio had their ear cut off.  There is another hadith in Islam that forbids keeping photos at home, “The angels do not enter a house which contains a picture.” In this respect, we should pay attention to the following fact: in June 2017 at the JFK Airport Sayfullo Saipov refused to take a picture with Kobiljon Matkarov. This is the evidence of his adherence to the radical ideology of Salafism. Therefore, a follower of the Takfiri ideology can be identified by his/her attitude to “biddat.”

Fourth, however trite it may sound, the followers of the Wahhabism can be identified by their extremely unfriendly and hostile attitude to pet dogs. Dogs in Islam are traditionally seen as unclean animals that may not be contacted by the Muslims. The hadith says that “prayer is annulled by a dog if it passes in front of the praying people.” In the Western countries, such a hostile attitude of a religious radical towards a dog is easily seen by neighbors and others.

Fifth, the aggressive attitude towards the representatives of other religions can point out the Islamic radical who nourishes the idea of committing a terrorist attack. The followers of the Wahhabism and Salafism typically have zero tolerance for non-Muslims, which can result in conflict situations. Radicals often have aggressive behavior when it comes to the relationship between the Islam and other religions. Extreme Wahhabis are committed to pursuing jihad against non-Muslims.

Sixth, a distinctive feature of Central Asian Wahhabis is the denial to worship the deceased. In recent years, they have obsessively destroyed epitaphs and gravestones, have been fervently fighting against the historical past by destroying relics and cultural artifacts. Both the Taliban in Afghanistan and ISIS militants in ancient Palmyra in Syria have engaged in historical and archaeological destruction campaigns. Thus, they deny their ethnic background and try to create the new historical community of Muslims. This sign is an additional clue that can be used by counterterrorism officers to find religious radicals among the crowd. It can be seen during the funerals among immigrants living in the West.

All of the above signs are additional clues that can be used to find “lone wolves.” However, Islamist radicals try not to stand out from the immigration crowd. They live in social isolation, work alone, which makes it hard to identify them. Terrorist attacks in the USA organized by the immigrants from Central Asia – the Tsarnaev brothers in Boston, Omar Mateen in Orlando and Sayfullo Saipov in NYC – are the evidence of the self-radicalization of “lone wolves” via the internet. The jihadist ideology of ISIS and al-Qaeda has become the motivating force that pushes them to terror. However, they didn’t receive any material support from external entities or didn’t have any direct contacts with them.

There are two additional ways that a religious radical could be recognized out of a crowd of immigrants, which is related to technology and not to his or her outward appearance or activities. The ability to perform the following recommendations may not be possible in all countries.

First of all, this is electronic tracking of websites and social media often visited by a suspect. ISIS and al-Qaeda keep on recruiting their new adherents over the internet, teach their militants how to make bombs at home, where to commit terrorist attacks, and what tools to use to kill Western kafirs. In July 2017, the Islamic State published the e-book on Telegram Lone Wolf’s Handbook in Turkish, whose purpose is to increase the number of attacks on civilian targets in the United States and Europe. A migrant from Uzbekistan, Sayfullo Saipov, who committed a terrorist attack in New York City in October 2017, strictly followed the instructions given in the Lone Wolf’s Handbook. The fourth chapter of the book reads, “Attackers are advised to choose the most crowded places and drive over people as fast as possible to exact the most damage.” The driver assassins are also instructed to leave a note behind claiming the attack in the name of ISIS, which Saipov did. Therefore, Western countries need to take specific measures to block and destroy the calls for jihad from Salafi groups on the internet and in social media.

Second, cell phones of suspects should be scanned online for apps and videos downloaded by them. Therefore, officers of antiterrorism branches will need the consent and support of internet companies and social media to decode the private part of platforms. According to the FBI, Saipov had about 90 videos and 3,800 images on a cell phone featuring ISIS propaganda, including video of a beheading. The internet jihad has played a major role in the radicalization of his religious views. If his cell phone had been monitored, it might have been possible to prevent the terrorist attack in NYC.

In such situations, when a radical Islamist does not speak to anyone, doesn’t use internet or other modern technology, acts alone, and law enforcement bodies have no other evidence that would allow them to find the prospective terrorist, there’s nothing else to do but to rely on the additional indicators we have specified above.

Continue Reading
Comments

Intelligence

UN: Revealing Taliban’s Strategic Ties with Al Qaeda and Central Asian Jihadists

Published

on

Afghan peace mediators

As the 20th anniversary of the 9/11 attacks and the deadline for the withdrawal of American troops from Afghanistan draws near, the region has been witnessing sudden adjustments. The Taliban have not only intensified assaults against the Afghan government forces and captured new territories but also began to demonstrate their regional ambitions to reduce Washington’s influence in Central and South Asia. As the US military has completed more than half of its withdrawal from Afghanistan, the Taliban believe that they defeated America after 20 years of grueling war. The Taliban leaders, who were driven by the latest military successes, began further setting their own conditions for the neighbors and stepping on the toes of Washington in order to prevent the establishment of a new US military base in Central Asia.

On May 26, the Taliban issued a statement warning Afghanistan’s neighbors not to allow the US to utilize their territory and airspace for any future military operations against them. The Sunni Islamist jihadi group cautioned that facilitating US military operations by neighboring countries in the future will be a “great historical mistake and a disgrace that shall forever be inscribed as a dark stain in history.” They further emphasized that the presence of foreign forces is “the root cause of insecurity and war in the region.” The insurgent group strictly warned without elaborating that “the people of Afghanistan will not remain idle in the face of such heinous and provocative acts”. At the end of the statement, they exerted political pressure on the Central Asian states, threatening that “if such a step is taken, then the responsibility for all the misfortunes and difficulties lies upon those who commit such mistakes.”

Given the past experience of US military presence in the region, the Taliban’s threatening appeal is most likely addressed to the governments of Kyrgyzstan, Uzbekistan and Tajikistan.  After the 9/11 attacks the Kyrgyz, Tajik, and Uzbek governments hosted the American military to wage a campaign against the Taliban, Al Qaeda and their Salafi-Jihadi subsidiaries. But virtually every US military base in Central Asia was suddenly expelled when the personal interests of the regional authoritarian leaders have been infringed upon. Uzbekistan expelled the US base from Karshi-Khanabad amid strong political disagreements over a bloody 2005 crackdown on protesters in Andijan. The Dushanbe and Kulob airports in Tajikistan were used very briefly by the NATO forces. The US base at the Bishkek airport in Kyrgyzstan also was closed in 2014 under heavy Russian hands. It is no secret that following the expel of US military bases, some political leaders of Central Asia became skeptical of Washington, thus further perceiving it as an unreliable partner.

The Taliban’s warning to the Central Asian states is fully consistent with the strategic expectations of Al Qaeda, its loyal and faithful ideological partner in the global jihad, both of which jointly seek to push the US out not only from Afghanistan, but also from Central and Southeast Asia. Based on propaganda releases and the rhetoric on Telegram channels, the Central Asian Salafi-Jihadi groups which are linked to the Taliban and Al Qaeda, strongly supported the withdrawal of US forces from the region. Consequently, Uighur and Uzbek jihadists potentially see the Taliban and Al Qaeda as powerful parent organizations, whose resurgence in Afghanistan offers major advantages for their military and political strengthening. Unsurprisingly, Al Qaeda and Taliban aims to oust the US forces from the region, hence playing into the hands of Moscow and Beijing, considering that both unlikely to welcome an increased US military presence in their backyard.

Taliban leaders are well aware that the possible deployment of US military assets in Central Asia will impede their strategic goal in rebuilding the so-called Islamic Emirate of Afghanistan. Today Washington is actively working with nations surrounding Afghanistan on the deployment of its troops to support Afghan forces “over the horizon” after withdrawal from the country on September 11. The US air support for the Afghan military could thwart Taliban plans to quickly seize Kabul and force them to sit at the negotiating table with the Ashraf Ghani administration. The Taliban have consistently and clearly emphasized in their numerous public statements opposing the negotiation and power share with the Kabul regime. They consider themselves the only and undeniable military-political force that has the right to rule the country in accordance with Sharia law. The Taliban jihadists are determined to continue waging jihad until establishing the Islamic Emirate of Afghanistan, and their emir, Mullah Haibatullah Akhundzada, becomes the country’s “lawful ruler”.

On June 6, 2021, the Taliban once again appealed to Kyrgyzstan and Tajikistan “to resolve their border issues through a dialogue” and “seeking a logical solution that would benefit both sides.” Recall, during the two-day border conflict between the armed forces of the two post-Soviet countries at the end of April, more than 50 people were killed, hundreds were injured and thousands were forced to leave their homes. In its statement, the Taliban, called on Tajik and Kyrgyz leaders to value “the peace and security of their respective nations.” According to the local analysts, Taliban’s “peace-aiming appeal” looks like a mockery of the Afghan people suffering from their bloody jihad.

Taliban’s “Soft Power” Under Construction

The question to be posed is what kind of leverage does the Taliban has with the Central Asian states to put pressure on them in preventing the possible deployment of new US military bases in the region?

The Taliban, an insurgent Islamist group that has yet to come to power, does not have any economic or political leverage over the former Soviet republics of Central Asia. But it is imperative to mention that the Taliban holds “soft power” tools, such as Central Asian Salafi-Jihadi terrorist groups affiliated with the Taliban and Al Qaeda. These groups challenged the region’s secular regimes, hence aiming to establish an Islamic Caliphate in the densely populated Fergana Valley, sandwiched between Kyrgyzstan, Uzbekistan and Tajikistan.

It is no secret that the Central Asian post-Soviet countries consider the Al Qaeda-linked Uzbek and Uighur Sunni Salafi-Jihadi groups hiding in Taliban-controlled Afghan soil as a threat to the security of the entire region. Recall, the first group of radical Islamists from Central Asia who found refuge in Afghanistan in the mid-90s was the Islamic Movement of Uzbekistan (IMU), which had close and trusting ties with both Al Qaeda and the Taliban. Currently, Uighur fighters of Turkestan Islamic Party (TIP) from China’s Xinjiang, Uzbek militant groups such as Katibat Imam al-Bukhari (KIB), Katibat Tawhid wal Jihad (KTJ), the Islamic Jihad Union (IJU) and Tajik militants of Jamaat Ansarullah (JA) wage jihad in Afghanistan under the Taliban’s umbrella.

The Taliban still strongly support Uzbek and Uighur jihadists despite the 2020 US-Taliban peace agreement that requires the Taliban to sever ties with Al Qaeda and all Central Asian terrorist groups.

In response to documentary evidence of the UN Security Council and the US Defense Intelligence Agency on the Taliban’s close-knit relationship with Al Qaeda and their failure to fulfill the obligation, the Taliban have adopted new tactics to publicly deny the presence of transnational terrorist groups in the country and their ties to them. The Taliban still insist that there are no foreign fighters in the country. But regular UN reports reveal the true face of the Taliban, who are trying to hide their deep network links with Al Qaeda and Central Asian Islamists — a decades-old relationship forged through common ideology and a history of joint jihad.

Thus, a recently released report by the UN Security Council’s Taliban Sanctions Monitoring Team confirms that there are “approximately between 8,000 and 10,000 foreign terrorist fighters from Central Asia, the North Caucasus and China’s Xinjiang in Afghanistan. Although the majority are affiliated foremost with the Taliban, many also support Al Qaeda.” The UN report stated that Uzbek and Uighur jihadists’ ties with the Taliban and Al Qaeda remain “strong and deep as a consequence of personal bonds of marriage and shared partnership in struggle, now cemented through second generational ties.” Further the UN monitoring team revealed Al Qaeda’s core strategy of “strategic patience,” according to which the group would wait for “a long period of time before it would seek to plan attacks against international targets again.”

According to the report, “several hundred Uighur jihadists of Turkestan Islamic Party (TIP) located primarily in Badakhshan and neighboring Afghan provinces, whose strategic goal is to establish an Islamic Uighur state in Xinjiang, China.” To achieve its goal, TIP facilitates the movement of fighters from Afghanistan and Syria to China. Abdul Haq al-Turkistani, who is a member of Al Qaeda’s Shura Majlis, leads the Syrian and Afghan branches of TIP for more than two decades. According to the UN monitoring group, “Uighur militant Hajji Furqan, the TIP’s deputy emir, is also a deputy leader of Al Qaeda and responsible for the recruitment of foreign fighters.” Such mixed appointments of group leaders highlight the close and deep ties between the troika: Taliban-Al Qaeda-TIP.

The UN report found more evidence of close cooperation between Uzbek IMU jihadists and the Taliban. The report stated that the “IMU fighters are currently based in Faryab, Sar-e Pol and Jowzjan provinces, where they dependent on the Taliban for money and weapons”. The UN monitoring team also highlighted the activities of Central Asian Salafi-Jihadi groups such as KIB, IJU and Jundullah, which are waging jihad in the northern Afghan provinces of Faryab and Kunduz under Taliban shelter and control. “The Taliban has forbidden these groups from launching independent operations, resulting in a reduction of their income.” In conclusion, UN analysts noted that pressure on the Taliban to cut their ties with Al Qaeda and Central Asian Salafi groups has not succeeded. Thus, the UN report once again refuted the Taliban’s assertion that Al Qaeda and Central Asian jihadists are not present in Afghanistan.

Conclusion

Thus, it can be assumed that while US military pressure persists, the Taliban’s tactics will continue to publicly deny their trust relationships and close ties with Al Qaeda, Central Asian jihadists, and other transnational terrorist groups in the country. But as long as the Taliban’s perception of its own level of influence and control in Afghanistan remains high, insurgents will continue to insist that they are abiding by the accord with the US.

The Taliban’s strategy is to build the foundation of their “soft power” through the patronage and protection of Al Qaeda and Central Asian Salafi-Jihadi groups in Afghanistan. Thus, in this complex process, not only material interests, but also common religious roots originating in the Hanafi school of Sunni Islamic theology and mutual sympathy for jihadist ideological visions might play a significant role.

Continue Reading

Intelligence

Cyber-attacks-Frequency a sign of Red Alert for India

Published

on

The biggest target is in terms of transportations, nuclear power plants, Power system Operation Corporation Limited, V.O. Chidambaram Port Trust, Telangana State Load Dispatch Centre, logistic industries and research organisations which eventually can lead to destruction of the whole ecosystem. The confidentiality breach in the case of medical data leak as reported by a German cyber security firm –Greenbone Sustainable Resilience wherein Picture Archiving and Communication Servers were linked to public internet without any requisite protection is a point of concern. Then, there are certain individualistic attacks such as hacking email and financial crimes (banking), etc. In the last two years the attacks radar of focus has been defence, government accounts and the vaccine manufacturing companies.

Cyber Security – Individualistic awareness need of the hour

The target of the individual in a peculiar case which led to heinous crimes casted was due to opening of a document which was a bait to install Netwire- a malware. The bait was eventually delivered through a file and what prompted a person to open that link was a Drop box sent to him on his email was actually opening a Pandora Box of malicious command and control server. An emphasis to understand the technicality that Netwire stands for a malware which gives control of the infected system to an attacker. This in turn paves way for data stealing, logging keystrokes and compromise passwords. In the similar vein the Pegasus used the tactic to infiltrate the user’s phones in 2019.

Cyber Security – Attacking Power Distribution Systems

The intrusions by Chinese hacker groups in October, 2020 as brought out by Recorded Future was done through Shadow Pad which opens a secret path from target system to command and control servers. And, the main target is sectors such as transportation, telecommunication and energy .And , there are different tags that are being used by the Chinese Espionage Industry such as APT41, Wicked Spider and Wicked Panda , etc.

The institutions backing legitimisation

The Institutions which are at working under the cyber security surveillance are the National Security Council and National Information Board headed by National Security Adviser helping in framing India’s cyber security policy .Then, in 2014 there is the National Critical Information Infrastructure Protection Centre under the National Technical Research Organisation mandating the protection of critical information infrastructure. And, in 2015 the National Cyber Security Coordinator advises the Prime Minister on strategic cyber security issues. In the case of nodal entity , India’s Computer Emergency Response Team (CERT-in) is playing a crucial role under the Ministry of Electronics and Information Technology(MEITY).But, there is a requirement of clarity in National Cyber Security Policy of 2013 and the needed updates desired in it respectively.

A cohesive approach – Data Protection and Privacy Importance

The Data privacy i.e. the personal data protection bill is an important imperative in which services of private actors can be bridged through a concerned law which is missing link in that sense. The point of Data localisation falls squarely within this dimension of Section 40 and 41 of the draft bill where in the Indian stakeholders have the capacity to build their own data centres .In this contextualisation there also a need to understand certain technicalities involved in terms of edge computing which in a way is enabling the data to be analysed, processed, and transferred at the edge of a network. An elaboration to this is the data is analysed locally, closer to where it is stored, in real-time without delay. The Edge computing distributes processing, storage, and applications across a wide range of devices and data centres which make it difficult for any single disruption to take down the network. Since more data is being processed on local devices rather than transmitting it back to a central data centre, edge computing also reduces the amount of data actually at risk at any one time. Whereas on the other hand, there is insistence on data localisation has paved the way for companies such as Google Pay to adhere to the policy and synchronise their working with the United Payments Interface (UPI).

What do you understand by Data Share?

In the recent case of WhatsApp privacy issue and drawing in parallel other organisation a similar platform such as Facebook and Google shared the data to the third party with a lopsided agreement and with continuance of the data trade business industry. In 1996 the internet was free so was perceived as carte blanche , a safe harbour falling under the Section 230 of the Communication Decency Act in the United States but with the evolution of the circumstances the laws in that specifications are also required to change in that respect. In relations to the Indian law under the Information Technology Act, 2000 under the Section 69 the Indian government has the powers to monitor and decrypt any information that’s store in any computer resource but on certain conditions such as in regards to the sovereignty, defence and security of the country.

Cyber-attacks understanding on the International Forums

In terms of Lieber Code of Conduct of 1863 or be it Hague Convention of 1899 there is a need of updating the definitions and where in the cyber army falling under the categorisation  of civilians , not possessing any of the warfare weapons cause the main weapon that they possess is a malware which is invisible but can have deep repercussions leading to destruction of that particular economy altogether .So, in recent evolving circumstances there is an undue importance to for the target country to respond with equal force and having a right to self-defence in this manner regardless of the attack being from a non-state actor from a third country and masquerading under the civilian garb .Henceforth , there a thorough understanding of the complex environment that one is dealing with , there is undue emphasis to change and respectively update with the current world.

Continue Reading

Intelligence

Incidents of Uranium Theft in India: Depleting Nuclear Safety and International Silence

Published

on

Terrorism

In yet another incident of the capture of nuclear-related materials from unauthorized persons in India has made headlines in the Indian media but largely ignored in the international media. On 4th June 2021, as reported in the Indian media, the authorities arrested seven people possessing approximately 6.4 kilograms of Uranium in the Eastern State of Jharkhand. This is the second time in less than a month where Indian authorities have captured such a gang in an attempt to sell uranium illegally. An incident of the same nature was reported just a few days ago in May 2021 where authorities apprehended unauthorized persons, who were trying to sell nearly 7 kilograms of natural uranium on the black market. Notably, Indian authorities themselves believe that these events might be linked to a “national gang involved in illegal uranium trade”. This is a very serious issue because it means two things; first, that Indian local uranium reserves, radioactive nuclear materials, and facilities are not protected and are prone to black marketing. Secondly, this scenario has emerged because India is not adhering to international bindings of nuclear safety and security such as UN resolution 1540 and (Convention on Physical Protection on Nuclear Material) CPPNM under IAEA to secure its materials, reserves, and facilities. But, the most damaging aspect in this scenario is the discriminatory behavior of the international community, which is criminally silent on the violations of norms, practices, and regulations necessary for nuclear safety and security.

Though in both incidents, Uranium was in natural condition, which cannot be used for making bombs; however; it should be of great concern, as even in its natural state the Uranium can spread considerable radioactivity if used with conventional explosives. Moreover, Indian authorities themselves are considering that these activities could be linked with national gangs involved in the illegal supply of uranium. This raises the point that actually how much natural uranium is illegally sold in the black market by India. Since these are only incidents that are being reported in the Indian media, there might be many incidents that have never been reported. Also, this gang was captured from near the area where Indian Uranium mines of Jharkhand are allocated, the likelihood of access of non-state actors to these mines cannot be denied. These incidents are critical for international security and stability because such radioactive material when sold in black markets could be brought by the non-state and states aspiring for nuclearization. Unfortunately, in such a scenario all the efforts currently going on to stop the proliferation of nuclear weapons would be hampered. The recurring of these incidents reflect that India, despite being a member of CPPNM is not ensuring the protection of its nuclear materials from theft and sabotage by proper regulations, stringent mechanisms, and control. Other than CPPNM, India has also signed UN resolution 1540, which makes it mandatory for the states to ensure security regulations, mechanisms, equipment required for the security of Weapons of Mass Destruction (WMD) from the non-state actors. But, surprisingly, so far the UN or any other international organization has not taken notice of these recurring events. Rather, these mishaps by Indian authorities are shoved under the carpet. These incidents have been reportedly re-occurring in India, media reported these events in 2003, 2008, 2009, 2013, 2016, 2019, and now again in 2021. 

Nuclear safety and security is a national matter of any state; however, against the backdrop of the potential damage, which these weapons can bring, they have become an international concern. Specifically, to an extent, where states are sometimes criticized, lauded, and sometimes rewarded for their behavior in this realm. In this regard, India appears as an exceptional case, where the formation of Nuclear Suppliers Group NSG to stop such events in the future has its roots in the Indian so-called peace nuclear explosion (PNE) in 1974. Ironically, a few years down the road, the same NSG gave a waiver to India for conducting nuclear export. Moreover, India was made part of many other regimes such as the Missile Technology Control Regime (MTCR), Australia Group, and Wassenaar Arrangement. Although, these decisions were carried out in lieu of geo-political realities, where the West regards India as a balancer against China but it gave a free hand to India. Even the US-based NTI Report on Nuclear Security Index gives India less score in nuclear safety and security regulations. At a time when many nuclear theft-related incidents have occurred in India in recent years, disgracefully, India still desires to become a member of NSG based on its so-called nuclear record.

To sum up the situation, the occurrence of back-to-back nuclear theft-related incidents has further exposed India’s nuclear credentials and its non-adherence to international practices of nuclear safety and security. If legal bindings such as CPPNM and 1540 would not be implemented in the future by India, the South Asian stability, as well as the international security, would be undermined. Moreover, if the international non-proliferation continues to remain lenient towards states like India, the rest would likely regard the international non-proliferation mechanism not just as discriminatory but even as hoaxing. Many states might prefer to proliferate for their own interests, which would not serve the non-proliferation mechanism and regime. A very candid example is that today even after two years of the last NPT review conference, the next has not been conducted and chances are that it might not be conducted this year.

Continue Reading

Publications

Latest

Trending