After “extensively” analysing and assessing global nation’s counter terrorism response towards lone wolf terror attacks along with the challenges faced by domestic and external security and intelligence agencies, numerous “viable” pragmatic counter-terror strategies were drafted by military and strategic experts throughout the world. Actions carried by “Lone-Wolf” terrorists are “virtually invisible” to “identify and separate”, hindering domestic and intelligence agencies to formulate an “accurate response”. The traditional “profiling” in law enforcement is no longer a viable strategy, particularly towards identifying the “lone-wolf” actor, however, the actor’s “operational mechanism” in the form of an “individualistic response” leaves numerous clues which law enforcement departments particularly hailing from domestic and intelligence groups can use to formulate an effective and efficient strategy.
Moreover, roughly every lone wolf attacker has showcased his/her commitment towards a cause, an alignment or a connection with active“terrorist factions”, pointing towards “increasing presence of radicalised youth” separating them from “potential sympathetic individuals and supporters”. In the light of “aggravating attacks” from “lone wolf terrorists”followed by the rise of “aggressive right-wing factions” (such as A.B. Breivik), law enforcement officers continue to face enormous challenges, especially when it comes to formulating a “viable” applicable strategyto identify lone wolf attackers, who continues to “hide in plain sight”, fearlessly.
After the aggressive violence induced by radical Islamic terrorists against Charlie Hebdo on January 7th, 2015, the threat induced by lone wolf attackers have become a “top” priority for law enforcement officers particularly those hailing from domestic and external intelligence agencies. The law enforcement and intelligence agencies in Parisfaced with two prominent questions:
- Was there any intelligence input prior to the attack?
- Was there any way to prevent tragic loss of lives?
- What should be the strategy to identify perpetrators and their plots?
- Can we prevent future attacks from happening?
All the aforementioned questions are difficult to address. The Directorate General for External Security (DGSE) continues to simulate multiple “responses”, whereas the General Directorate for Internal Security has started “counter-terrorism liaison program” with Directorate of Military Intelligence (DRM) along with Directorate for Defence Protection and Security (DPSD) in an effort to “strengthen, cooperate and coordinate” a response against future attacks. There is no absolute way to provide a suitable answer for the fourth aforementioned question, rather than stating the fact that, it is absolutely “difficult” for security and intelligence agencies to forecast and prevent future possible attacks. No intelligence agency would talk the responsibility to answer, however, drawing a strategic response in an effort to forecast and prevent an attack in the future would be “difficult”. The objective of the article is to evaluate and assess viable pragmatic counter-terror approachesagainst the threat posed by lone wolf terrorismwhile especially emphasising on strategies to counter “Charlie Hebdo” styled attacks. To begin with strategic viable solutions, it is imperative for policy makers to first define lone wolf terrorism.
The term “lone wolf” was first introduced by US law enforcement agencies towards individuals carrying out attacks outside a designated command structure.Operation Lone Wolf was carried by Federal Bureau of Investigation (FBI)to “apprehend” Alex Curtis who instigated “right-wing factions” to participate in “lone-wolf” activism. Since then, numerous terminologies have been introduced by various strategic and intelligence experts, some calling it asan “individual resistance”, “self-indoctrinated terrorism tactics”and “self-sponsored terrorism”.
The article does not lean to a particular definition rather encourages law enforcement agencies and security, intelligence establishment to collect all “available definitions under an umbrella” in an effort to formulate an effective strategy. Traditional Counter-terrorism centred think tanksdefine Lone wolf as “an individual who acts on his/her own will outside a traditional organizing structure or a group”. Moreover, the Federal Bureau of Investigation (FBI) taking the definition to an extent, separates the definition with sleeper agents pointing towards the “dormant” nature of the sleeper agent who is “purposefully” tasked to infiltrate an organization and only reveals himself only on the command of a group or an organization. On the contrary, “A lone wolf is an “individual” operative without a “command and control” structurewho on his free will initiatives an attack”. Although,many counter-terrorism agencies ignore the “ideological” connection of the individual with other “active groups”, which the lone wolf could have been interacting either through “intra-personal interaction” or by “accessing internet”.
Throughout the article the focus will remain on “Operational mechanism” of lone wolf attackers. Although, a significant percentage of lone wolf attackers have been found “influenced” with radical Islamic militant organizations, such as the Islamic State or Al-Qaeda, the “decision, operational planning and carrying out procedure” has largely been “self”, instead of following “traditional commands” from the organizational leaders. Moreover, it is imperative for policy makers to include those “individuals that are inspired/self-indoctrinated by violent radical religion-centric terror organization” within the brackets lone wolf terrorism definition. They could have maintained “links” with the radical religion-centric organization, but the structure of the organization could not be “traditional”.
Absence of a “traditional individualistic behaviour”
Numerous terror attacks carried by “lone-wolves”in Germany, France, Italy, Spain, Australia, in particular to the attack by Barend Strydom, an African national, whoshot and killed a dozen people while wounding many, at the Strijdom Square in Pretoria, South Africa; In La Défense, a man stabbed and mortally wounded a soldier Cédric Cordier. The soldier was later declared “out of danger”. The attacker was identified as Alexandre Dhaussy, a French national who converted to Islam; Another Islamist Mohammed Merah killed over seven people in the city of Toulouse while taking numerous hostage. He was later killed during a 32-hour standoff; In one of the first deadliest attack in Germany, Arid Ukashot and killed two US soldiers while mortally wounding many others at Frankfort Airport; On October 22nd, 2014, a Canadian national Michael Zehaf-Bibeau shot a soldier on-guard at the National War Memorial. The suspect then ran towards the Parliament of Canada and was engaged in a gun-battle with the forces. Additionally,subsequent attempts were made to bomb Seaside Park, New Jersey, lower Manhattan, New York; and New Jersey. Injuring over thirty civilians, the perpetrator Ahmad Khan Rahami was apprehended from Linden, New Jersey, after he open fired injuring three responding officers.
Policy makers must note that, the mastermind” individuals of some aforementioned examples of deadly violence and attacks, vary particularly with respect to their operational mechanism and “target locations”, along with ideological and political inclined groups. Moreover, the common element in these attacks point towards a particular indoctrination or “religion induced”. All the lone wolf attackers were strongly “believers of faith”.
It is important to note that, there is absolutely no “traditional” framework of a lone wolf attacker. However, in the light of their religion centric “differences” and “ideological” mindset coupled with the element of “faith in religion”, makes it easy for security and intelligence agencies to “classify or rule out lone wolf terror attack”. Additionally, there are certain characteristics which possess “significant similarities” among all lone wolf attackers. The fact that continues to challenge security and intelligence agencies is the presence of “few lone wolf attacks which were carried by individuals without any connection to a terror faction”. According to a research conducted by the Organization for Security and Co-operation in Europe(OSCE) jointly with INTERPOL, less than 1.34percent out of 78 lone wolf attacks in US, Germany, Canada, Australia were “individualistic” in nature. This numerical value further complicates the investigation carried by security and law enforcement agencies of lone wolf attacks, seriously hindering their ability to formulate a viable counter-terrorism strategy. Besides all agreements considered, the lone wolf attacks continue to accelerate phenomenally.
Identifying “motivating factors” of lone wolf elements
It will not be incorrect to state that, the radical religion-centric lone wolf “modus operandi” hosts similar characteristics of traditional “right-wing” lone wolf attacks. Throughout the 1990s, Tom Metzger and AlexCurtis openly instigated their followers to commit violent acts of crime. Furthermore,“radical-white” advocator Louis Beam, who was a former member of the notorious Ku Klux Klan, drew the “early strategy on how to carry out a leaderless revolution”. He drafted a scenario where “individuals could carry out attacks without responding to a centralised organization or a leader established headquarters”.
Although, experts have not directly linked the modus operandi used by “radical Islamic centred”lone wolf extremists with that of traditional “right-wing” attackers,however there is striking similarity ofsmall-scale attacks. In 2003, Osama-Bin Laden, through his supporters distributed “instructions” asking his followers not to wait for any instructions in “carrying out attacks”. He further asked his followers “to use whatever means available”. In the late 2004, Abu Musab al-Suri, a Spanish-Syrian national, who was an active member of the “closed circle” group of Bin Laden, published his narrative of Islamic Jihad through a paper titled “Call for Worldwide Islamic Resistance,”. In this roughly seventeen hundred “doctrine”, he mentioned a “new form of jihad”, highlighting the acts of terror carried by “small groups”, which he titled them as “leader-less resistance”. Individuals irrespective of their nationality or age, will wage war on allfronts-“fighting the West in the West”. Two years later, Abu Jihad al-Masri, a prominent figure in Al-Qaeda, published his narrative titled “How to fight alone”which was massively downloaded from Jihadi-centric websites.
Challenges faced by security and intelligence agencies
Lone wolf terrorist attacks are one of the most “unpredictable and difficult to diagnose” events. It will not be incorrect to state that, lone wolf terror attacks bring “nightmare” to intelligence agencies, domestic security institutions, national and regional law enforcement organizationsas they are extremely “sensitive” and “revolve around multiple possible scenarios”.
To begin with, lone wolf elements possess “individualistic” characterises, who live “shadowing intelligence agencies” in “plain clothes”. The attacker may be someone’s relative, friend, husband, brother, or neighbour living next door. Intelligence agencies cannot come to a inclusion simply by studying the perpetrators visual appearance or “daily routines”. The individual avoids “absolute outside contact” making his/her actions discreet. This further increases the difficulty for security and intelligence agencies to “identify and apprehend” a lone wolf attacker. While comparing the individual’s actions to “traditional/conventional terrorist factions”or “centralised command centred” terror actors, “individual” actors have the benefit to maintain a “low-life” and avoiding “all forms of attraction/suspicion” before and post-attack.
When “conventional” terror group members operate, the risk of “detection” from security and intelligence agencies remains high.
Furthermore, in the light of growing “right-wing” political activism followed by frequent protests by anti-government groups, it is very difficult for law enforcement agencies to differentiate between a political activist or a terrorist. This poses a grave threat to security and intelligence officers especially when they are forced to swing between their “gut” and “individual actions”, failing repeatedly to identify perpetrator while reassessing the individual’s operational mechanism, choice of targetor activities or propaganda. The epitome of lone wolf is “idiosyncratic”. They are individuals with motivated by “numerous ideologies and factors”: from radical Islamic fundamental or Wahhabi ideology to “extreme-right wing”, while suffering from “suicidal, obsessive compulsive behavioural disorder” which then fuels psychopathy. This “diverse” behaviour induces certain “vision”, which forces them make hateful comments/accusations on the internet, to disruptive activities which later concurs their quest of “violent actions”, which does not give away anything “unusual” characteristics forecasting the individual’s actions to be “violent”, alerting security and intelligence agencies only when the attack has occurred.
Policy makers must note that, it is literally impossible to differentiate between the lone wolves who carry violent attacks and radical fundamentalists who simply advocate their beliefs. In European Union member nations, and in US specifically, the “freedom of speech is absolute” which limits the investigation of intelligence and security agencies to only “active violent actions”. Although all terrorists are “radicals”but not every radical is a terrorist, which makes it a phenomenally difficult task for security agencies to rule out the “lone wolf”who is going to initiate an attack before the concerned agencies apprehend, particularly in the light of digital age and rapidly evolving “technical tools” used in intelligence.Policy makers must note that, the “original” lone wolves could have “seemingly popularity” which could result in the rise of “copiers”and instigate the youths in carrying attacks using “similar techniques”.
It is important to remember that, lone wolf attackers suffer from necessary skills, technical training, and“organizational support”of violent terror factions, their “attacks”,in the form of Charlie Hebdo shooting and the 32-hour hostage crisis in Sydney, can be lethal.
Drafting an effective Counter-terror policy
How should the intelligence and security agencies deal with the“phenomenally” growing threat of lone wolf terror attackswhile facing enormous challenges of identifying and arresting them, without raising suspicions? This question remains “unanswered” especially in an inclusive society which continues to debate on “human rights” and police brutality. Although, the fact remains unchanged: security and intelligence agencies are facing an enormous challenge,especially when it comes to lone wolves carrying out attacks “using all means available”.
However, the aforementioned statements and shortcomings highlight significant factors which could be utilised by policy makers to formulate an effective counter-terror strategy.
To begin with, the approach agency uses to track “radical elements” entering and exiting a country, plays a vital role. Formulating the strategy which focusses more on “how an attack” could take place rather than “the identity of the attacker” creates a big difference. Furthermore, it is imperative for security and intelligence agencies to extensively study on “how does an individual radicalises”, the entire procedure. Such “aggressive” and “out-of-the box” strategy could effectively reinforce the state’scounter-terror policywhich could, if “effectively and efficiently planned”, could put an end to a possible lone wolf attack.
It is imperative for security and intelligence agencies to understand the modus operandi of a lone wolf,while formulating carefully a “detection trap”unavoidable even by the “careful” individuals while reinforced with “every tactical manoeuvre”used in counter-terror planning. Counter-terror training should be extensive throughout law enforcement units, while training in “signal avoidance”, “isolation and individualism” should be provided at all levels, in an effort to apprehend a perpetrator “isolating” himself before an attack. This not only requires real time data inputsbut also requires an “effective and efficient flow of information and its management”. The union between the intelligence analysts and field operation staff makes the difference.
Furthermore, intelligence agencies should bring their attention to the essential “common feature” that might be link one lone wolf with another, separating the individual from “community” while indicating an “irrational behaviour”. At this point, security and intelligence agencies must “coordinate and cooperate” with relevant agencies before “making an arrest”. Also, it is important for security and intelligence agencies to strengthen their grip on community, which can be achieved by hosting confidence building mechanisms within the community, after all the masses are the true “eyes and ears”.
Policy makers must note that, lone wolf operators, although acting alone, at some point of time, receive inspiration from an ideology or violent actors, it is imperative for security and intelligence agencies to disrupt presence of any such materials or “hidden societies”. It the state’s responsibility to condemn any, all such acts, ideologies which promotes violence.
Since, lone wolves act outside the framework of an organization, their acts are ignited by a local incident. State must initiate awareness talks, community development “de-radicalisation” centric program inviting students, teachers, community leaders, parents and all stakeholders, while maintaining an “healthy” atmosphere rather than panic.
The formulation of an effective counter-terror program begins with “communicating” with certain section of communities. Alternatively, this should be carried out without “providing their acts a stage and an audience”. Countering lone wolves is a priority but not at the stake of “publicising” them in a way that incites others to “take the same route”.
In the end, the most effective way to counter lone wolf attacks rests in “understanding their operational mechanism”. In recent violent incidents, all the perpetrators where masculine and used licensed firearms to commit acts of crime.This “selective individuals” who carries licenced arms and significant ammunition needs to be isolated and carefully assessed by security and intelligence agencies. This can be done by “strengthening gun licensing policy along with strict background checks”.
As explained in the aforementioned arguments, security and intelligence agencies face an enormous challenge in countering lone wolf attackswhile any “formidable” counter terror strategy would have limited impact. Similar to all acts of terrorism,there is no way to guarantee absolute elimination of this threat. With this said, the road to counter lone wolf terrorism is “rough and long”. The answers for the question on “factors responsible for radicalisation of lone wolf terror actors” are in its premature stage,needs to be assessed thoroughly. In the light of increasing lone wolf terror attacks, new question repeatedly emerges, particularly highlighting the role of internet along with “narcissistic sadistic” comments made by “right wing” factions against minority communities. With few “radical Islamic” lone wolf actors, the question of “an individual’s sudden change of course to commit acts of terror” makes it difficult for security agencies to respond. Thus, through “extensive cooperation and coordination” between inter and intra domestic and intelligence agencies along with timely sharing of ideas, experience and assessment of lone wolf terror attacks,policy makers will be able to create viable counter-terror response against lone wolf acts of terrorism.
Evolutions of Strategic Intelligence
What is strategic intelligence currently used for? First and foremost, for correctly orienting the long sequence of decision makers’ interpretations.
Secondly, for acting as automatic or non-automatic selector of relevant or non-relevant facts and news for those who have access to the intelligence system.
Finally, for correctly connecting intelligence data with the rest of open source news and the various perceptions on a topic.
Intelligence is never just a sequence of data collection. Certainly data is needed to qualify, think, imagine or refuse any Intelligence Service’s operation. What is really needed, however, is never mere data, but the indication of how the opponent secretly thinks and, therefore, what he/she selects as primary concept and, more generally, how the enemy hierarchizes and interprets his/her notions.
The Strategic Intelligence System (SIS) produces the information needed by the most important decision-makers.
Therefore, it must be simple, immediate and clear -considering that very rarely decision-makers have already experience of Intelligence Service -but also new, fresh, reasonable and, above all, capable of being even counterfactual, where needed.
If, as often happens today, even in Italy, the Intelligence Service produces models that confirm the ideas of the most superficial politicians, it is not good.
Not even for the insubstantial careers of the fools who always say yes.
In other words, an analysis that is not obvious, not always inferable from the most well-known facts, not childish and in any case not taken for granted.
Vaste programme, as De Gaulle said when he was proposed the abolition of idiots.
There is, on the one hand, the childish and very “American” fascination for new technologies, which are undoubtedly extraordinary.
Technologies which, like Artificial Intelligence, can expand, automate and make the collection and processing of intelligence data even more refined. But technologies which, each time, must be adapted to a context in which also the enemy uses AI.
Sure, but it is anyway necessary to deal with staff suitable for analysing the data sequence of an AI system and understanding how it relates to the opponent’s decision-making, whether it has to do with AI networks or not.
Either there are technology experts who understand nothing about intelligence, or there are intelligence experts who know nothing about AI technology.
What if the enemy produced – as has already happened – fragments of voluntarily manipulated information so as to later put out of phase the AI machines that interpret government’s choices from outside?
What if decision-making totally hid its operating mechanisms, thus artfully eliminating any signal capable of bringing the analytical system into its decision-making mechanism? It takes so little, indeed.
Hence we need to see how and to what extent the Artificial Intelligence subsets, cloud computing, machine learning, problem solving and robotics are really useful for intelligence operations.
In the U.S. tradition – very much linked to the “machine” myth – AI allows to automate and simplify (and here there is already a danger) data collection and, in particular, the synthesis between geospatial, Signal, HUMINT and even open source data collection.
That is all well and good, but how can we avoid the opponent knowingly “dirtying” the data sequence or developing and processing models in which the various sources contrast dangerously with each other?
Either you give contradictory news, or you put a useful source in a bad light, or you create a “narrative” that you are working for Good and Democracy, and here the Western idiots will not be able to say anything.
Probably, you shall also go back to the old traditional methods: someone who infiltrates into the enemy’s ruling classes, becomes credible and then changes the enemy’s decision-making process in our favour. Or informs us of how it really goes.
In the case of Geointelligence, AI can collect sensor data very well, often very quickly. So far, all is well, but the truth lies in the brain that evaluates, just as beauty is in the eye of the beholder.
AI is also useful in computer vision and sometimes very useful also for electronic intelligence (ELINT), especially for translation between different languages. But, certainly, this is not the whole intelligence process. We are always talking about hardware, not about conceptual software.
This is what I could call “Descartes’ complex”, i.e. the typical idea of the old Western scientific mentality that we always need to see facts and then find the automatic mechanism of a phenomenon.
This is a completely wrong criterion.
In Intelligence Services’ operations the “facts” are usually not seen, if all goes well, and never have a univocal and certain “mechanism”.
Otherwise it would not be an Intelligence Service’s operation, but a simple police action or a completely public and official operation.
The mythical rationalism of the United States and of other similar countries always tends to “automate” intelligence. Hence the more the data collection of an Intelligence Service is automated, the more predictable and useless it is. Predictable especially by the Enemy.
We always need to use “lateral thinking” and serendipity. “Lateral thinking”, based on the observations made by Maltese psychologist De Bono, uses lateral observation points to solve a problem, without using the most obvious and visible “sequential” logic accepted by everybody.
You do not dig a mine in the wrong place, but in the right one.
Nevertheless, the thinking that De Bono calls “vertical” always digs in the same place, and the human mind which, like all the other organs, does not want to work too much, is attracted by the most probable, obvious and “visible” solution, i.e. what it defines as “natural”.
Serendipity is the possibility of making accidental discoveries. Indeed, it is never by chance, but it shows the imaginative and necessary potential of those who discover a phenomenon, but who know above all how to use accidental or apparently trivial information.
It is another essential characteristic in intelligence analysis.
Furthermore, some countries think that HUMINT, i.e. intelligence from human sources, can be strengthened by AI systems that collect and select the “sources” always according to predefined patterns.
Whatever is predefined must never be used in an intelligence Service, unless there are temporary guarantees. This is the Number 1 Rule. Instead of the standardization of analysis techniques, the opposite must be done in a world where “third” countries acquire powers that were unimaginable until a few years ago.
Therefore, the predefined mechanism is a severe mistake: the “sources” are trained to avoid precisely these systems.
As was also the case at the time of the Cold War, when many Soviet undercover agents infiltrated in the Western Intelligence Services were even trained to succeed without problems in the analysis with the polygraph, the so-called “lie detector”, and also created a credible, but completely imaginary and in any case unverifiable, personal story.
They indeed used serendipity and lateral thinking. The others, with their naive positivism, let themselves be fooled.
The real problem is therefore the analysis of strategic surprise: September 11 is a case in point, but surprises can be either “widespread” or “specific”.
If you donot know how to analyse surprise, it is difficult that you can really do intelligence.
From what does strategic surprise stem anyway? From the fact that you, the victim, do not know how the strategic formula of the opponent (or friend, which is the same) is composed.
If the United States had not well understood the role played in Saudi Arabia by Prince Turki, Director General of the Saudi intelligence agency from 1973 to 2001, resigning the position only 10 days before the “9/11 attacks”, probably it would have understood that a change was taking place in relations between the Arab-Islamic world and the West.
Moreover, on a private level – which in the U.S. world is always equated to the public one – there was IBM’s near bankruptcy. It was bailed out – with difficulty – with very quick operations connected to confidential information.
Well, but this is not always the case.
Indeed, the intelligence system is not a “support” to managers’ decisions, but it is its essence, regardless of what the aforementioned managers may think.
There are new tasks and functions to be evaluated such as the greater perception State managers (except the Italian ones) have of the strategic importance of their choices.
There is also the study of global trends, a naive construction which, however, serves to outline the potential of a country’s development lines.
Moreover, in the U.S. tradition, adverse transactions have only recently been correctly reported: in the past, financial transactions, the unforeseen and clearly hostile industrial acquisitions – in short, everything in business – used to take place in the global market and therefore were fine and went very well.
There is also the adverse “line” of U.S. intelligence against the policies of central banks and large E.U. and Asian financial companies to leave the dollar area, often as quickly as possible.
This is currently a central theme of the U.S. and neighbouring countries’ counter-espionage.
Therefore, two new classes of intelligence are being developed, namely financial intelligence (FININT) and market intelligence (MARKINT).
FININT resulted from the experience gained by governments in studying some agencies in the evaluation and continuation of money laundering, tax evasion and terror financing.
But there is the danger that often completely incompetent leaders base their choices not only on classified information, but also on what they themselves believe to be the direct perception of facts.
Bravo! Let us recall the analysis made by the U.S. Intelligence Services in January 2019, when they reported to President Trump that Iran was not developing a military nuclear project, and the President told them to “go back to school” and that they were “passive and naive”.
We are coming to the “decline of truth” and the rise of what is currently called “narrative” or storytelling.
Intelligence has always defined itself as “truth to power”.
Certainly there was the neopositivist, naive and often completely silly myth of creating stable and unquestionable truths, as if the Other did not know them, thus forging stable and effective mechanisms for analysing the “enemy”, as if the enemy did not know it.
Probably something changes with non-State actors, but Western intelligence interprets these structures as if they were quasi-States. This is not the case, of course.
Rather, they are ideologically cohesive groups that present themselves as States because they represent territories, albeit only with violence.
Hence, at least for the time being, strategic intelligence will be put aside by technological development, which will largely occupy only tactical intelligence. In the very short term, there will also be the necessary training – in one way or another – of the elected politicians, which shall learn – for better or for worse – how to do it.
Then there will be the ability of the automated structures to select the malware, the distorted information, the news capable of putting its own algorithm out of phase.
Chinese Private Security Companies Along the BRI: An Emerging Threat?
When documenting China’s security footprint abroad, the PLA and the PLAN often get the spotlight. But under the hood, a relatively newer force is entering many conflicts ridden zones along China’s land based and maritime Silk Roads. These are up and coming Private Security Companies (PSCs) that are seeking to expand out of domestic Chinese markets and capitalize on growing Chinese businesses throughout the BRI. As the BRI continues to expand into countries with a weak state and ongoing conflicts, BRI businesses need security and protection. On the maritime front, increasing worries about sea piracy have created a demand for armed escorts for merchant ships. As was the case in Pakistan, on ground local government forces have repeatedly failed at providing adequate protection. This is where Chinese PSCs come in. With foreign forces failing to secure BRI projects, businesses are approaching Chinese companies. China’s entry into the international Private Military and Security Company (PMSC) market marks a significant departure in a space that continues to be dominated by American and British contractors. These westerns PMSCs have had decades to develop in the international sphere. During this tenurethey havealso managed to create a whirlwind of criticism around the field. It is in this space that Chinese PSCs, one of Asia’s strongest powers,are trying to leave a mark. Thus, it will be valuable to assess their scope, what they might evolve into, and their connection to the Chinese state.
The Current International Chinese PSCLandscape
Chinese Private Security Companies are a relatively new entry on the international scene. Beginning in the early 2010s, violent incidences – including abductions, killings, brawls, piracy, etc. – involving Chinese individuals in countries such as South Sudan, Pakistan, and Mali experienced an uptick causing concern in Beijing. The wake-up call came in 2010 when separatists from the Baloch Liberation Army in Pakistan attacked the Zaver Palace Continental Hotel situated near the Gwardar port hoping to target Chinese investors.In 2014 ten Chinese individuals working on a Cameroonian construction site run by a state owned company were kidnapped. In 2015, Chinese citizens were kidnapped again in Nigeria and several more died in a car bomb explosion in Somalia. Beijing has responded to these concerns through two step, first by deploying the PLA and the PLAN where possible and secondly by allowing domestic security organizations to go abroad. Allowing PSCs to operate instead of PLAN can actually be the better choice in some situations. China is acutely aware of rising international fears around the potential of a hegemonic China, especially among developing nations. In other cases, using military resources would simply be excessive. In such situations, PSCs can provide a viable middle ground alternative.
Currently there are thousands of Chinese PSCs operational within the country which are providing risk assessment services, surveillance equipment, private security, etc. Much of these functions transfer on to international operations as well. As the domestic market saturatessome companies are looking abroad to expand their business. Consequently, the international footprint of Chinese PSCs is expanding. According to work done by Tsinghua University, Beijing, the top 10 PSCs in China with an international footprint are:
- Control Risks
- Beijing Dewei Security Service
- ZhongguoAnbao China Security Industry
- HuaxinZhongan (Beijing) Security Service (HXZA)
- Shanghai Zhongchenwei Security Service Group
- Beijing DingtaiAnyuan Guard & Technology Research Institute
- ShengzhenZhongzhouTewei Security Consultant
- Beijing Guanan Security & Technology
- Shandong Huawei Security Group
These companies represent a very minor fraction out of a range of domestic PSCs. The reason for the small footprint abroad is manifold. Legally the Chinese government poses several restrictions on domestic PSCs that make it harder to operate abroad. The 1996 “Law of the PRC on Control of Guns” states that only the PLA, the police, and the militia can legally possess weapons andthose who possess arms overseas may face imprisonment for their crime. This is clearly a significant hurdle for PSCs that wish to operate in conflict prone areas. In a 2010 law passed by the Ministry of Commerce concerning the operation of PSCs, the government added several strict criteria for firms looking to operate abroad. These included providing security training to their employees before sending them abroad, set up security management systems and mechanisms for emergency response. Providing security systems and training to employees of firms going abroad provides one avenue for PSCs to enter the international market. While the 2010 lawopens up some paths for PSCs looking to expand, these existing regulations still prove to be a major hurdle for all but a few PSCs. Most do not have the resources to fulfill these basic requirements and cannot afford to set up bases abroad. These concerns are reflected by the Wu Guohua, Executive chairman of the “Overseas Security Guardians” which operates Zhong Jun Jun Hong Security Group. He states that while since 2011 companies, small and large, have jumped at the chance to expand abroad, many smaller companies don’t have the resources to negotiate with foreign governments or local forces, educate their personnel thoroughly on local laws to the same level that bigger companies can. Additionally, major companies that do operate abroad, like the HuaxinZhongan Security Service (HXZA) and the Zhong Jun Jun Hong, also boast a range of international certifications to bolster their bid internationally. Many other security organizations are unable to acquire them. Thus, regulatory requirements in the future must reign in these elements and bring smaller companies into the fold as well.
Scope of Current PSC Tasks
Considering that Chinese PSCs are not permitted to carry arms abroad, PSCs often diverge into a range of other security services that do not require its personnel to be armed. These include training personnel, providing logistical assistance, serving as guards in factories, etc., and collaborating with armed local officials for providing protection to Chinese citizens abroad. The only service where Chinese PSCs have been allowed to use arms has been while escorting Chinese vessels through water bodies like the Gulf of Aden or the straits of Malacca. Maritime escorting is a rising field for many PSCs. Most major PSCs provide multiple, if not all, of these services. One of the largest is HuaxinZhongan(HXZA) Security Service that provides all of these above-mentioned services. HXZAis also recognized for their ability to communicate and cooperate with local authorities and PSCs for support. Another major PSC is the Overseas security Guardians Association, which is part of the Zhongjun Junhong group that operations other domestic security subsidiaries. The association is perhaps the most explicit in its connection to the BRI. The organization aims at “safeguarding the promotion of national ’one belt, one road’ strategy” and “building the great wall of steel” to guard the “overseas economic development and the safety of oversea China-invested enterprises and compatriots”.
Maritime escorting is slowly growing as a prominent service amongst organizations. This usually involves PSCs providing protection to merchant ships or fishing vessels in piracy prone areas of the Indian Ocean and the Gulf of Aden. While the affair is expensive, PSCs can find a relative niche for themselves in the work that sets them apart from the PLAN which frequently serves this purpose. In the Sohu Military Observer, Mr. Wu wrote that using PSCs for escorting services is often more cost effective then a PLAN deployment and PSCs tend to be better matched in force as well. The scale of piracy is also smaller than one would expect. Most piracy operations are not large scale and involve the use of small and fast boats, and light weapons. This strength of force can be proportionally dealt with by well-armed PSCs without the need for large scale investment of troops or equipment from the navy. Additionally, PLAN deployments carry the risk of sending a political statement, whether that was intended or not. Here too the commitments to bolstering the BRI arein both practice and rhetoric. In 2015, HXZA made headlines for escorting a Chinese sailor, Zhai Mo, who was took a 10,000 Nautical Mile journey retracing the ancient Maritime Silk Road.
These modes of engagement however are still limited due to few key restrains. Firstly, the inability of PSCs to use arms restricts their independent operations. Many organizations continue to provide logistical services. Like stated earlier many smaller companies do not have the connections to work with local PSCs or authorities to find local forces that can help provide the muscle. HXZA is one of the few companies that has been authorized to carry arms abroad. This also puts PSC employees into severe danger themselves. In Juba, the capital of South Sudan, Chinese security forces from DeWei Security Services found themselves stuck in an active shooting incident that was occurring between local warring factions. Unarmed and underprepared, the security workers and the employees of its client that it was sent to rescue were trapped in an insecure building awaiting government forces to evacuate them. Secondly, PSC operatives often have limited foreign language abilities, be that inEnglish or the native language in the area of deployment. This creates a barrier between locals and the PSC which makes collaboration even harder. In many BRI locations, local population are distrustful if not outright hostile to Chinese presence as demonstrated above. Lingual barriers can add on to this sense of division between locals and the Chinese guests in addition to posing obvious administrative difficulties.
PSCs and The Chinese State
For the longest time, the Chinese state and the domestic legal framework was not friendly to the establishment of Chinese PSCs abroad. However, over the past decade the ice has started to melt as ministries have eased legal restrictions and HXZA operatives were even allowed to carry arms. Chinese firms will perhaps slowly but surely continue to expand into these new markets. Increasing foot print of Chinese agencies that are actively engaged in security operations, risk assessment, provision of security equipment (as in the case of HXZA) etc., brings with it concerns about their connection to the Chinese state and if they can be fully autonomous in their operations. Many Chinese businesses, such as Huawei, have been subject to these fears thus is it logical to worry if PSCs will function as an extension of the PLA or even the Chinese state. The evidence insupport for this is currently weak. PSCs are still mostly engaged in services like anti-piracy operations, resolving kidnapping incidents, guarding Chinese citizens and infrastructure abroad, etc. This relatively narrow range of services is still quite niche and Chinese PSCs are yet to go fully mainstream. Additionally, while some successful PSCs may have connections with their domestic state clients, it may not necessarily translate into serving as an arm of the state abroad. Thus, today the verifiable connections between PSCs and the state are quite limited.
Perhaps as the industry grows and come of its own, the Chinese state will take greater cognizance of its potential uses for state aims. It is not entirely novel for PSCs or PMCs to take government provided tenders. Afterall, the precedent for this was already set by western PMSCs who provide their own government forces, or even foreign governments, with logistical services among other facilities. Thus, it would not be wise to erase the possibility of state influence altogether either. There are few possible avenues for state influence toseep in through. First, Private Security Companies in china often hire ex-PLA and ex-PAP (People’s Armed Police) officers into their ranks. Many higher-ranking positions within PSCs are also occupied by ex-military or former public security personnel. Second, there are reports that Chinese officials are actively pressuring Chinese enterprises abroad to hire PSCs of Chinese origin.
The Chinese Private Security industry is still as its initial stages. However, it is likely that it will stay given government pressure over overseas enterprises and enthusiasm by Chinese PSCs to establish operations overseas despite the dangers. Little work has been done to study the nature of Chinese PSCs in depth, but as they grow in number and prominence it will become increasingly important to understand their ins and outs and monitor their relationship with the Chinese state. It will also be interesting to consider how, if at all, the role of the PLA might change given the emergence of these new security actors. Granted the PLA will be the most immediate and the strongest projection of Chinese national power, however this poignant power projection is not always desirable. In such scenarios PSCs may become a viable replacement in low intensity missions. Before any of this can happen however, the Chinese government would have to loosen regulation on PSC activities and develop a framework for their operation. For now, prospects are relatively limited, and existing organizations are acting in conjunction with local authorities and companies. However, the international PMSC industry is already under heavy scrutiny for acting eerily like modern mercenaries for hire. The same could happen for Chinese companies as well.
Tackling the Illicit Drug Trade: Perspectives From Russia
The Afghan drug trade supplying the Russian market has fuelled conflict, corruption, and instability in the region, provided financial support to terrorist organisations and led to a devastating addiction and HIV epidemic in Russia. How can this fight be won? While strengthening cooperation with its Central Asian neighbours will be crucial to stemming the flow of drugs, Russia needs to complement law enforcement with a softer approach for the demand side of the drug trade at home.
“The Afghan drug threat is one of the worst problems for Russia’s national security,” said Alexei Rogov, deputy director of the new challenges and threats department of the Russian foreign ministry on November 26, 2019. He thus effectively captured Russia’s persistent drug problem since the collapse of the Soviet Union. Accounting for one-fifth of the world’s opium market estimated at USD 65 billion, Russia is the world’s largest heroin consumer, all of it flowing from Afghanistan through Central Asia.
The Afghan drug trade supplying the Russian market has fuelled conflict, corruption, and instability in the region, provided financial support to terrorist organisations and led to a devastating addiction and HIV epidemic in Russia. Russia has around four to six million drug addicts and a drug-related mortality rate of 10.2 per 100 000 persons. This far surpasses the rate of its European neighbours. The UK, despite being Europe’s largest cocaine consumer, has a drug-related mortality rate of 3.7 per 100 000 persons. With a death toll of around 30 000 per year, it is no wonder Russia has marked the drug trade as a major national security threat.
How can this fight be won? The words of Alexei Rogov perfectly illustrate Russia’s heavily securitised approach to the problem. Russia’s response has focused primarily on the security aspect of the drug trade, such as policing and border control. While regional cooperation is crucial to stemming the flow of drugs, initiatives between Russia and its Central Asian neighbours are short-term and poorly coordinated. Regional organisations’ anti-drug potential could be further exploited, as could cooperation with the EU, which is also affected by the Afghan drug trade. At home, the high mortality rates are explained by the draconian legislation on drug consumption and the lack of comprehensive drug policies. Faced with increasing drug-related mortality, complementing law enforcement and regional initiatives with a softer approach at home is the next logical step.
A Threat to National and Human Security: Developments and Continuities in the Afghan Drug Trade
Drug trafficking in Russia is far from being a recent problem. The drastic rise of organised crime in the tumultuous years that followed the fall of the USSR, as well as the newly opened and poorly controlled borders with former Soviet states, has facilitated the transnational smuggling of opium produced in Afghanistan (which accounts for 90 per cent of the world’s heroin output). Travelling through the Northern route, the drugs are smuggled to Russia through Tajikistan, Kyrgyzstan, and Uzbekistan. While Afghanistan might be the Colombia of Central Asia, the Central Asian drug market presents different characteristics from its well-known Latin American counterpart. It is not organised in mega-cartels with the power of a small state, but in smaller more disparate criminal groups. These groups can extend their influence in the region more thanks to poor border security, lack of transnational cooperation, and rampant corruption among law enforcement and local officials than to their own strengths and ingenuity.
Pointing fingers at borders and even at the Eurasian Economic Union (EEU), which saw Kazakhstan and Kyrgyzstan integrated into a free trade zone with Russia in 2015, is highly misleading. While greater connectivity and opened borders make the region an ideal transit route for illicit trade, it is complicity and impunity that explain why less than 5 per cent of the drugs passing through Tajikistan are seized. The widespread corruption and poverty that lead many to resort to drug trafficking are the root causes of the drug trade in Central Asia.
Regarding Afghanistan, the ongoing conflict (2001-2020) and political instability make it a breeding ground for drug trafficking. The drug trade has led to many disagreements between the U.S. and Russia, with the two parties failing to reach a coherent anti-drug strategy. The possibility of a NATO-Russia cooperation was briefly evoked but has been eliminated by U.S. withdrawal from the country following the U.S.-Taliban peace agreement signed on February 29, 2020. This recent development will risk affecting the anti-drug fight. With 61 per cent of the Afghan population deriving its income from agriculture, the impossibility of cultivating traditional crops amidst conflict, and a new power vacuum, Russia will need to step up to make sure drug production does not explode. Moreover, Afghanistan’s new dabble into the mass production of synthetic drugs, notably methamphetamines, which is cheaper than heroin, is increasingly worrying. A booming market largely driven by the rise of the Russian Hydra darknet, the quantities of synthetic drugs seized by Russian authorities have multiplied by twenty over the 2008-2018 period.
Given the growing availability and affordability of drugs on the Russian market, the security dimension of the Central Asian drug trade naturally dominates the drug discourse and, to some extent, justifies Russia’s militarised approach. With a 7 644 km-long shared border with Kazakhstan and hundreds of tonnes of drugs flowing in each year, drug trafficking has severe implications beyond the social costs of addiction and directly threatens Russia’s security. This is all the more worrying considering that Islamic terrorist groups like the Taliban use the drug trade to finance their operations. The crime and terrorism nexus operating in the region thus makes Central Asia a priority for Russian policy.
The War on Drugs at the Regional Level: Results and Future Perspectives
A relentlessly creative and adaptable market, with a myriad of new ways to conceal and smuggle narcotics every year, the illicit drug trade is truly a transnational problem and requires intense cooperation between the affected states. However, the anti-drug potential of regional organisations such as the Shanghai Cooperation Organisation (SCO), the Sino-Russian led security alliance, or the Collective Security Treaty Organisation (CSTO), is not fully exploited and is limited in terms of capacity and political will.
Russia has been promoting collective security with its Central Asian neighbours through the Shanghai Cooperation Organisation. Created in 2001 and composed of eight member-states (India, Kazakhstan, China, Kyrgyzstan, Pakistan, Russia, Tajikistan, and Uzbekistan), it plays a major role in stemming the Afghan drug trade. The SCO’s 2018-2023 anti-drug strategy marks the creation of an effective anti-drug mechanism within the organisation. The SCO often collaborates with the Collective Security Treaty Organisation, a military alliance between six former Soviet states (Russia, Armenia, Kazakhstan, Kyrgyzstan, Tajikistan, and Uzbekistan), and the Central Asian Regional Information and Coordination Centre for combating the illicit trafficking of narcotics (CARICC).
Most of Russia’s effort in the region has focused on strengthening the governments in place, such as investing in the state structure or their military. Russia has maintained a steady military presence in the region, one likely to increase after U.S. withdrawal. However, regional cooperation has mainly focused on short-termed joint operations and border security, such as operation spider web in July 2019, which led to the seizure of 6 422 kg of narcotic drugs and 3 241 arrests. The porous borders, explained in part by the geographical difficulty of border control in such mountainous terrain, the lack of training and equipment of security forces are certainly worth paying attention to, but they are also short-term solutions to a much more endemic problem. 6 422 kg might seem like a big win, but it is nothing compared to the hundreds of tonnes of heroin crossing the border each year. This purely militarised and short-term response, both from Russia’s part and in its engagement with its neighbours, is necessary but insufficient. Fighting the illicit drug trade will require a long-term strategy and a much greater political will to tackle its systemic causes. At the moment, the drug trade is 30 per cent of Tajikistan’s GDP, with an increasing amount of people turning to drug trafficking to survive. Fighting corruption, implementing institutional reforms and providing economic benefits to the region are as crucial as border policing.
In light of this, international assistance could prove useful, notably from the EU. While Central Asia is not a priority for Brussels, there is still a strong case for cooperation here. Afghan heroin and meth production is not only Russia’s problem. The drug trade in Central Asia might not be a security issue for Europe in the way it is for Russia, but opium trafficking along the Northern and the Balkan route also reaches Europe and the black sea route via Turkey is rapidly emerging as a prominent smuggling corridor. In July 2019, Ukraine intercepted 930 kg of Afghan heroin destined for Western Europe. Europe’s role in Central Asia is limited compared to Russia’s, and its focus on democracy promotion tends to clash with Russia’s priority of supporting the regimes in place to strengthen their capacity to fight the drug trade. But overcoming those differences and finding ground for cooperation would be a positive step towards fighting the drug trade.
The War at Home: the Grim Reality of Drug Addiction in Russia
Draconian legislation criminalising drug use has characterised Russia’s domestic war on drugs for the past three decades. While the dominance of the security discourse in Russia’s anti-drug strategy is somewhat justified, tackling the illicit drug trade purely from a national security perspective does not diminish the social threat posed by drug consumption. Drug use is a pervasive domestic issue, but it has yet to become a policy issue. Underdeveloped drug policies and politicians’ refusal to address it largely explain the high mortality rate.
With 100 000 jailed in 2018 (one in three convicts), Russia has the highest number of people per capita imprisoned for drug crimes in Europe, most of them convicted under Article 228 of the Russian penal code which treats drug possession as a criminal offence. Such harsh legislation not only leads to more risky forms of drug use (the use of dirty needles for drug injection has directly contributed to the HIV epidemic currently affecting 1.16 million people in Russia, one of the fastest-growing HIV rates in the world), but prevents access to treatment. With such large fines and lengthy prison sentences, (for possession of 2.5 grams of meth, users can go to jail for up to ten years) as well as the social taboo around drugs and HIV, users do not seek treatment and are further marginalised.
This addiction and HIV crisis in Russia is largely homegrown and will reach endemic levels in the next few years if it continues to be swept under the rug. The peculiarity and pervasiveness of the drug trade is its creation of a steady base of consumers and addicts. Criminalisation has not and will not diminish the demand for drugs, hence the need to work on demand much as supply reduction. While the legalisation of soft drugs is unlikely to appear as a convincing solution anytime soon in Russia, a softer approach to drug use is needed. At the moment, no long-term treatment or harm reductions services are available, and opioid substitution therapy remains forbidden.
Drug trafficking is a complex issue that must be fought on multiple fronts. Russia’s drug policy needs to involve a wider concept of security that not only encompasses the threat to national security, but also the human and social threat of drugs. Intense cooperation with Central Asia and Afghanistan through the SCO and CSTO is essential, as is strict border policing and law enforcement. Nonetheless, this no-tolerance policy for the supply side of the drug trade needs to be complemented with a softer approach for the demand side at home. To dwell on the social and economic consequences of drug use would be a truism, and Russia has every interest in decreasing the influence of drug trafficking on its population’s health and security. Developing more robust social policies seems at the moment more feasible than tackling the systemic causes of the drug trade in Central Asia. The latter will require a solid long-term strategy that goes beyond anti-drug operations and border control. Russia must step up its fight both at home and abroad.
From our partner RIAC
Evolutions of Strategic Intelligence
What is strategic intelligence currently used for? First and foremost, for correctly orienting the long sequence of decision makers’ interpretations....
An Indian perspective on Afghan peace-process
Afghanistan is staring at a massive political uncertainty with the United States preparing to exit the war-torn nation by 2021....
Why FATF treats India as a protégé and Pakistan as a bête noire?
Indian media is never tired of describing Pakistan as hub of money laundering and terror financing in the world. Indian...
Women During Covid Era
Authors: Priyanka Singh and Sujeet Singh* No Country is cent percent successful in providing safe haven to its Women, her...
Renewable Energy Jobs Continue Growth to 11.5 Million Worldwide
Renewable energy continues to bring socio-economic benefits by creating numerous jobs worldwide, according to the latest figures released by the...
From Prince to Duce: An in depth study about Machiavellianism in the Fascist Doctrine
Although both philosophies of Machiavellianism and Fascism are almost 400 years apart, there is no doubt that the theories of...
Pakistan Making Shift to Clean Power Production and Lower Energy Costs
Today, the World Bank’s Board of Executive Directors approved $450 million in financing to support Pakistan’s transition to renewable energy...
South Asia3 days ago
Interpreting Sheikh Hasina’s Foreign Policy
Urban Development3 days ago
Rebuilding Cities to Generate 117 Million Jobs and $3 Trillion in Business Opportunity
Science & Technology2 days ago
Modern-day threats to human rights in an era of global digitalization
New Social Compact3 days ago
Right to Education as an elementary Human Right: From Thinking to Living it
South Asia2 days ago
Pakistan can maximize the benefits of CPEC by involving China experts
International Law2 days ago
Why Human Rights Abuses Threaten Regional and Global Security
Newsdesk3 days ago
As Businesses Embrace Sustainability, a Pathway to Economic Reset Emerges
Southeast Asia3 days ago
Reflection of Indonesia’s National Farmer’s Day