Cybersecurity can be an effective way to deal with the exacerbation of risks, the risks that can be gained by increasing malicious gamers using cybercrime, for personal gain or for malicious attacks against key infrastructure of governments and communities, have been created. With the increasing use of cyber-equipment in social, economic, and, in general, human-resource-related vulnerabilities will multiply over time in the medium to long term.
Thus, recent efforts to cyber intervention, especially press releases, on the extent and nature of the Chinese spy program, known as “Shady Rat,” which has infiltrated dozens of companies, government services, and international organizations, suggests that Cyber space has become a relatively deep-seated conflict scene to solve the challenges of using offensive action based on the logic of self-defense.
In the framework of cooperation with countries that share our belief in the information networks, especially the Internet, we must develop effective defenses and allocations. These collaborations include a variety of issues including respect for norms, information exchange, coordination of alert and detection systems, attack response training, and, finally, creating conditions under which the government they can make common intelligence and physical actions identifying actors or their commanders.
Finally, while developing cyber defense in order to respond to the rapid evolution of threats, it seems necessary and necessary, but there are many challenges in creating it. At the moment, it seems that America alone has the equipment and structures that allow them to master these challenges. The NSA, supervised by Cyber Command, thanks to the availability of the Ashleon network and data processing capabilities, appears to be one of the finest global organizations that can analyze the digital data on Networks are transmitted across the globe and can quickly identify all systems involved in an attack.
However, Washington cannot hope to operate such a system on its own. Therefore, it seeks to expand its partnerships with its allies, thereby, on the other hand, to the research facilities of other governments, to endeavor to Facilitating the identification of authorities for a deep offensive and, on the other hand, strengthening its deterrent measures by its allies.
A commitment to using the best results in these reviews is essential. The US government and politics are eager to face a crisis and failure to design new policies or seek quick solutions and examine the issue. In any organization, it’s difficult to transfer funds from steady plans to creative and new ones. Especially in the US government, the fundamentals of the country’s budget are old and weird. Every year the congress and executive branch decide on budgeting for personnel, logistics, operational programs and infrastructure – they decide to continue the same or increase it with a slight change. When the management of the organization, the budget and congress organization agrees with the operational plans, then they will be licensed and funded. It is difficult to compete for the new budget, but basically the competition between the initiatives takes place, not between the new plans and the fixed plans.
One of the hallmarks of CIA operations is the development of creativity. Creative leaders and officers will identify problems and provide solutions, But spending too much on new creativity, regardless of cutting or cutting out budgets. The “stirring up” of something in the database is hard and frustrating. But when all US intelligence facilities are under investigation and new threats, they must be shuffled.
Spying, human gathering and other programs will never be fully realized. Because of this is the nature of the world of information. The only thing they guarantee is that their performance in the context of informing policymakers and military and operational commanders emphasizes the quality, accuracy and utilization of the best available technical and human-coordinated programs.
For this, it would seem that in the world it would be better to look at methods of cyber defense, by which they can threaten malicious actors to credible counter-responses and their benefits in actions that function and integrate. The reduced information systems and sensitive networks, both for national security and for social and economic performance.
Russian Hackers: The shadowy world of US and Gulf hacks just got murkier
The covert Qatar-United Arab Emirates cyberwar that helped spark the 13-month-old Gulf crisis that pits a Saudi-United Arab Emirates-led alliance against Qatar may have just gotten murkier with the indictment of 12 Russian intelligence agents by US Special Counsel Robert Mueller.
Mr. Mueller’s indictment provided detail on website DCLeaks that was allegedly registered by Russian intelligence officers. The website initially distributed illicitly obtained documents associated with people connected to the Republican Party and later hacked emails from individuals affiliated with the election campaign of Democratic presidential candidate Hillary Clinton.
“Starting in or around June 2016 and continuing through the 2016 U.S. presidential election, the Conspirators used DCLeaks to release emails stolen from individuals affiliated with the Clinton Campaign,” the indictment reads.
The indictment focusses exclusively on hacking related to the US election that in 2017 brought Donald J. Trump to office. It makes no mention of hacking related to the 13-month-old Gulf crisis that pits a UAE-Saudi-led alliance against Qatar.
Yet, the indictment’s repeated references to DCLeaks raises the question whether there may also be a Russian link to the hacking last year of Yousef al-Otaiba, the UAE’s ambassador to the United States.
Mr. Otaiba’s revealing and potentially damaging emails that seemed to help Qatar in its public diplomacy campaign were distributed to major media and analysts, including this writer, by an entity that identified itself as Global Leaks.
Questions about a potential link between Global Leaks, DCLeaks and Russia stem not only from Global Leak’s use of a Russian provider that offers free email service but also by the group’s own reference to DCLeaks. The group’s initial email had ‘DCLeaks’ in its subject line.
It remains unclear whether the use of a Russian provider was coincidental and whether the reference to DC leaks was meant to mislead or create a false impression.
Global Leaks initially identified itself in en email as “a new group which is bringing to limelight human right violations, terror funding, illegal lobbying in US/UK to limelight of people to help make USA and UK great again and bring justice to rich sponsors of crime and terror.”
When pressed about its identity, the group said that “we believe that (the) Gulf in general has been crippling the American policy by involving us in their regional objectives. Lately it’s been (the) UAE who has bought America and traditionally it was their bigger neighbour (Saudi Arabia). If we had to hurt UAE, we have so much of documents given by source that it will not only hurt their image and economy but also legally and will for sure result in UN sanctions at the least. But that is not our goal.
Our goal is plain and simple, back off in playing with American interests and law, don’t manipulate our system, don’t use money as a tool to hurt our foreign policy…. It may be a coincidence that most things (we are leaking) do relate to UAE but in times to come if they continue and not stop these acts, we will release all the documents which may hurt all the countries including Bahrain and Qatar,” the group said.
Global Leaks’ allegation that the UAE was seeking to suck the United States’ into Gulf affairs predated reports that Mr. Mueller, the special counsel, was beside Russia also looking into whether George Nader, a highly paid Lebanese-American advisor to UAE Crown Prince Mohammed bin Zayed, had funnelled funds to the Trump campaign.
Mr. Mueller is further investigating a meeting in the Seychelles between Blackwater founder Erik Prince and Kirill Dmitriev, CEO of the Russian Direct Investment Fund, the country’s sovereign wealth fund, that was brokered by the UAE. Messrs. Prince and Dmitriev have denied that the meeting had anything to do with Mr. Trump.
Mr. Trump has not publicly addressed reports that his election campaign may have received Gulf funding but at a news conference with Russian President Vladimir Putin on Monday, Mr. Trump declined to endorse his government’s assessment that Russia interfered in the 2016 presidential election, saying he doesn’t “see any reason why Russia would be responsible.”
A British public relations watchdog, Spinwatch Public Interest Investigations, said, in a report published this week detailing UAE lobby efforts, that the Emirates since the 2011 popular Arab revolts had tasked public relations companies in the United States and Britain with linking members of Qatar’s ruling family to terrorism.
The lobbying effort also aimed to get the Qatar-backed Muslim Brotherhood banned, involved UAE threats to withhold lucrative trade deals from Britain if allegedly pro-Brotherhood reporting by the BBC was not curtailed, and targeted journalists and academics critical of the Gulf country, according to the report.
US intelligence officials said the UAE had last year orchestrated the hacking of Qatari government news and social media sites in order to post incendiary false quotes attributed to Qatar’s emir, Sheikh Tamim Bin Hamad al-Thani. The hacking provided the pre-text for the UAE-Saudi led economic and diplomatic boycott of the Gulf state. The UAE has denied the assertion.
US and Qatari officials said earlier that Russian hackers for hire had executed the attack on the Qatari websites. Cybersecurity experts said at the time that the hackers worked for various Gulf states. They said the methods used in the hacking of the Qatari website and Mr. Otaiba’s email were similar.
“They seem to be hackers-for-hire, freelancing for all sorts of different clients, and adapting their skills as needed,” said security expert Collin Anderson.
Two cybersecurity firms, ThreatConnect and Fidelis Cybersecurity said in 2016 that they had indications that the hackers who hit the Democratic National Committee were preparing a fake version of the U.A.E. Minis Britaintry of Foreign Affairs website that could be used in phishing attacks.
The UAE-Qatari cyberwar was indeed likely enabled by Russian hackers working for their own account rather than in coordination with the Russian government. It is however equally possible that the same hackers also put their services at the disposal of Russia.
None of what is known about the murky world of Russian hackers is conclusive, let alone produces a smoking gun. The various strands of Mr. Mueller’s investigation, however, suggest grounds to query not only Russian cyber efforts to influence the US election but also the involvement of Russian nationals in the cyber war in the Gulf and potential links between the two operations.
India’s Nuclear Imperilment
Recently, a uranium smuggling racket was busted by the Kolkata police with one kilogramme of radioactive material. According to the reports, smugglers were trying to sell uranium, which has a market value of INR 30 million ($440,000).
The theft of highly sensitive material especially uranium is frequently happening in India.In November 1994, Meghalaya Police seized 2.5 kg of uranium from a gang of four smugglers in the Domiasiat region. Police in the Indian state of West Bengal in June 1998, arrested an opposition politician who they say was carrying more than 100 kilograms of uranium. In July 1998, the CBI unearthed a major racket in theft of uranium in Tamil Nadu, with the seizure of over eight kg of the nuclear material. In August 2001, Police in the Indian state of West Bengal arrested two men with more than 200 grams of semi-processed uranium. In December 2006, a container packed with radioactive material was stolen from a fortified research facility in eastern India.
Similarly, in February 2008 the police seized 4 kg of uranium in Supaul district along the Indo-Nepal border.Police in the north-eastern Indian state of Meghalaya said in September 2008 that they have arrested five people on charges of smuggling uranium ore.In December 2009, the Navi Mumbai Crime Branch arrested three people for illegal possession of 5 kg of depleted uranium.Around 9 kg of radioactive uranium, a banned material, was seized from two persons in Thane, in December 2016.
India is operating a plutonium production reactor, Dhruva, and a uranium enrichment facility that are not subject to IAEA safeguards. India’s buildup of South Asia’s largest military complex of nuclear centrifuges and atomic-research laboratories is somehow threatening efforts related to nuclear security and safety. These facilities will ultimately give India the ability to make more large-yield nuclear arms & hydrogen bombs. The international task force on the prevention of nuclear terrorism is of the view that the possibility of nuclear terrorism is increasing keeping in mind the rapid nuclear development by India. Whereas, U.S. officials and experts are of the view that India’s nuclear explosive materials are vulnerable to theft.
Contemporary Indian internal situation is worsening day by day because of the intolerance and extremism. Likewise, India has more than 65 active terrorist groups operating in different states including the location of nuclear installations. These terrorists may possibly gain access to nuclear materials and use them against civilian and military installations. In January 2016, we have seen a controversial Pathankot Airbase attack, which also shows that Indian intelligence had badly failed to provide true information about terrorist networks.
Nuclear facilities must be guarded closely and the people who are working in these facilities must maintain secrecy. However, in India, nuclear facilities are guarded by Central Industrial Security Force (CISF) and CISF guard admitted that security at the installations needs more enhancements. Mysterious deaths of Indian nuclear scientists is a matter of concern as some were reported suicide and some were murdered. The possibility of nuclear secrecy gets out in the hands of terrorists cannot be ignored.
The Naxalites – India’s Maoists from the Communist Party often target the police and military bases. Though most terrifying revelation was by the EU report that seven Indian companies were involved in funding to ISIS for making bombs. Previously Indian companies were involved in illicit nuclear trade with Iran, Iraq and Libya. So the situation will be a lot worst if the Indian companies provide any chemical, biological or the nuclear material to ISIS
Several of these incidents clearly indicate the failure of the Indian nuclear security agencies. Thus the focus of mainstream media and Western governments should be the Indian nuclear program’s flawed security, expansion and rapidly increasing nuclear weapons technology.
Know the psychology of ISIL
In my opinion, the “ISIS phenomenon” is not new; it distinguishes the factors of this group; for example, the audience of the world’s television networks is watching films that ISIS itself publishes. They have internet sites that send their films and photos to the world. On the other hand, the region is full of journalists because both the Syria war is underway and the Middle East regional issues are so important, so journalists can cover the moment.
In addition, the strategic importance of the Iraqi state and its oil resources was due to the fact that ISIS had its first attacks on oil and refineries, but it was effective in triggering their actions, but the thing that shook the world more than anything else, A pattern of behavior that the group represented during the capture of places; films from ISILs that were showing them on the road and checking cars, while carrying laptops with names of those who worked with the government, or any kind of their thoughts It was different from the ideology of ISIL.
The members of the group matched the driver identification card with the list of these names, and if their names were on this list, they would have been executed without trial!
These films spread throughout the world, and the wonder of the whole world prompted which ideology and religion could be, according to which, people were allowed to kill someone by merely naming and without trial, killing someone along the road and rejoicing.
The problem is that the members of this group, other than themselves, do not know the rest of the people as religious and religious, so they assume any violence and murder as loyal to their religious ideology, while many Muslims around the world, especially their classroom, are astonished at these actions and never do such acts godly and on the basis of religion and hate them.
Is Isis a Terrorist?
“Terror” means the creation of horror and fear. In fact, terror means the use of unexpected, shocking and unlawful violence against civilians to force a state or a society to accept demands based on an ideology.
But what does a terrorist want from a psychological point of view, what happens in society and what is his goal? They create psychological phenomena in society, through which they pressure the people and civilians to push them on to governments, and ultimately, to reach the demands of that group. The psychological phenomena that are caused by terrorist movements and their news in people are horror, discomfort and turmoil, unrest and restlessness, pessimism, anxiety and anxiety, anger, grief and tragedy.
Most importantly, the combination of all these unpleasant feelings is causing a lot of confusion, discomfort and insecurity inside people. But what makes the assassination possible? It is clear that those who do such behaviors do not consider themselves brutal or inhumane, and they have the absolute right to do such acts.
In recent years, investigations have been carried out on those who have had extreme behaviors. One of the most important and best investigated was Dr. Wagdey Luzza at the University of Cantabria on the terrorism of religious groups such as al-Qaeda, with the Middle East approach, and the results could be extended to ISIS. According to the study, it turned out that in the West, most of those joining these groups are men aged 17 to 23, usually from middle-class families with relatively high academic and academic achievements in modern science with academic degrees.
But the results of the 1999 study also revealed that those who carry out terrorist acts in their own countries are people with low and unemployed education who have been roughly dropped out of the text of the community, and themselves have separated themselves from the context of society.
The leaders of these radical and radical religious groups, on average 15 years older than the followers and other members of the group, are about 40 years old, have a great deal of affection and influence, are able to inspire the respect of their followers and their own self, Their ideology, in such a way that they can influence others, have intrinsically an influential personality, inspire others, encourage in the best possible way, usually do not fear death and are professors of death. Of course, in the leaders of these groups, there are people who, incidentally, completely escape death while encouraging others to die in the ideology.
Those who are attracted to groups like ISIS are abnormal?
There is no consensus on this. Some studies show that many of these people have personality disorders. Some even suffer from major psychiatric disorders. But the most important point of the personality that can be mentioned is that they have grown up in a family or a community that has created a feeling of self-sufficiency and humiliation.
These people have never been taken seriously and they feel that they are not first class citizens and their rights are different from the rights of other citizens. They feel like they are not treated to others. One of the most prominent examples of this situation may be seen in the behavior of Arab people living in the suburbs of Paris over the past 2-3 years. They were born in Paris and had a French passport, but their sense of belonging and attachment to the French community was not formed, which caused disturbances in Paris, which caused a lot of damage.
After that, the French government has just realized that it cannot continue to discriminate, and must provide grounds for joining these people to French culture while respecting Arab and Islamic culture in order not to face such rebellion and chaos.
Another aspect of the personality of the members of such groups is that they do not have personality independence and they need to follow someone else with a higher appeal. They have no self-confidence and can only feel confident within an ideology, that is, ideology with rough behaviors so that nobody dares to stand in front of them.
People who lack the sense of empathy and sympathy with others, and they are not basically born of a child of conscience, suffered a severe damage to their self-image from a childhood, which is said to be bad in their family and society, they are a bad people, their religion is not worthless. , Have a brutal nationality, and they are constantly seeking to abandon their anger, and one of the best ways to do this is to join groups that can be abused by membership and violent behavior.
Members of these groups are pessimistic about the world around them and the world, and sometimes have a lot of mental employment, for example, under the control of a very violent parent or violent and punitive rule. Groups like ISIS will be able to empower them. People with such characteristics are so influenced and influenced by a kind of hypnosis that their contacts with the facts are discontinued and their perceptions of facts are confused.
One of the things that the leaders of these groups do well is brainwashing, that is, brainwashing ideological issues in the name of reality in the whole universe, and assuring them that the truth is what their leaders say.
Another group of researchers, according to their studies, has concluded that members of the terrorist groups do not have an abnormal character at all; many of them naturally, educated and highly adhered to their ideology, and are even willing to sacrifice their lives for their ideology. In fact, these people, through sacrificing their lives, feel useful, sacrificed and sacrificed and are proud to be in this way, which ultimately leads to a great name in this world and a fortune-telling to come place for them.
In my opinion, naturally, both groups of these people are seen in groups like ISIL, and perhaps we should look at their behavior in order to find out the reality. I believe that what distinguishes natural people from abnormal is the degree of conscientiousness.
Those who believe in devotion and sacrifice and honesty are surely not willing to surrender their captive family members without trial, roadside, and in front of their eyes.
Unfortunately, due to the actions and actions of the ISIS group, it seems that most of its members have an abnormal character and their thoughts are immortal and primitive. They are usually accustomed to learning to look very straightforward. The example of this is the declaration of the caliphate for the whole world from an area in Iraq and the burning of European citizens’ passports to show that they are universal and do not think nationally! These people believe that they have established a government and a caliphate for the whole world, all of which shows their simplicity.
They see phenomena as absolute black or white, or good or bad. They see the world divided into two categories: the helpless rich, the exploited, and the poor, are miserable, and this means thinking all or nothing. Their beliefs are based on the rejection of the thoughts of others, rather than certain beliefs, and they consider all the rights to themselves. Moreover, they believe that their thinking for all ages and for all people and all the conditions is right, so they want to persuade everyone to force their ideology and if anyone opposes it, they seek to hurt him. Clearly, the analytical system of these groups is weak because the training that they have seen in their schools is more based on memory rather than analysis.
Finally, I emphasize that the formation of ISIS and its groups is the result of being repelled and humiliated by the family and society. Therefore, if any country wants a phenomenon like ISIS not to emerge, one must understand that it is necessary to respect the rights of citizenship and religion of the people
Russian Hackers: The shadowy world of US and Gulf hacks just got murkier
The covert Qatar-United Arab Emirates cyberwar that helped spark the 13-month-old Gulf crisis that pits a Saudi-United Arab Emirates-led alliance...
Risk of Decreased Relief Funding for Palestinian Refugees
The United Nations Relief and Works Agency (UNRWA) recognizes the current United States Department of State’s Secretary of State Rex...
Flip-Flops and Foreign Policy: How American Tourist Behavior Hinders U.S. National Security
Dear American tourist, When you are in great European cathedrals, palaces, and important historical sites, would it be possible for...
India Ranked at Top as the Most Dangerous Country for Women
Thomson Reuters Foundation in its recent survey released on June 26, 2018 ranked India as the most dangerous country in...
Iranian Terror Plot Motivated by Threat of Regime Change
Last month, Belgian authorities arrested a married couple of Iranian origin after it was discovered that they were in possession...
New Satellite Data Reveals Progress: Global Gas Flaring Declined in 2017
New satellite data released today shows a significant decline in gas flaring at oil production sites around the world in...
Global energy investment in 2017 fails to keep up with energy security and sustainability goals
The electricity sector attracted the largest share of energy investments in 2017, sustained by robust spending on grids, exceeding the...
Intelligence2 days ago
India’s Nuclear Imperilment
Energy2 days ago
CPEC and Pakistan-China Energy cooperation
Energy2 days ago
Off-grid Renewables are Growing, Bringing Socio-economic Benefits to Millions
Middle East3 days ago
God’s Grace: Reichstag Fire and July 15 Military Coup
Defense2 days ago
Agni-V Canister Launch: Facts and Implications
South Asia1 day ago
Pakistan: A New Space Era
Southeast Asia23 hours ago
Explaining Gendered Wartime Violence: Rohingya Ethnic Cleansing
Europe2 days ago
EU-China Summit: Deepening the strategic global partnership