Connect with us

Intelligence

Information challenges in security agencies

Avatar photo

Published

on

An effort to maintain information security is the responsibility of each individual. This person can be a normal user, technical expert, system administrator, network leader and manager of a system or network in the organization. Paying attention to the importance of information security makes it necessary to ensure the necessary protection of systems and the use of an effective set of security policies is an important step in ensuring this.

In most cases, computers and information will be protected from unauthorized access, and the information can be exchanged securely on the network with others. Information security in electronic organizations, especially municipalities, has been emphasized as one of the basic infrastructures and requirements, because their databases contain confidential information from citizens or customers.

Adopting appropriate security policies and implementing them reduces the risk of sudden loss of information, makes it much more difficult to access the system and provides security tools for detecting attacks and fixing security breaches. To maintain confidential information and to help integrate programs and information stored, a combination of policy making and implementation should be undertaken. This paper covers various components of effective security policies for e-organizations, especially municipal organizations.

In small organizations, the information security requirements can easily be met, and everyone is responsible for their computers and their files.

However, for larger groups such as organizations dealing with business transactions or groups that hold confidential data from citizens or customers (such as municipalities), the need for more formal security policies and procedures becomes more important.

When managers and employees consider the issue of information security, they will always face similar issues. As a result, attention to the role of information as a valuable commodity in today’s trade and the need to protect it is necessary.

Each group needs a certain level of security for its information and clear procedures for implementation by employees, the ability to create and maintain awareness of the needs of customers, and an understanding of how security policies are implemented in an operational environment.

Managers must pay close attention to information security policies in order to achieve their goals. Also, understanding the cost of implementing effective security policies is very important. Technologies Security procedures are a kind of investment and should be evaluated against the cost of likely losses.

Information is like blood in the veins of the organization and without the information of the board of directors (the company’s brain) cannot make key decisions, and the purchasing and financial resources (mouth, heart, etc.) cannot obtain the resources they need to survive the organization’s life.

The role of data and information is crucial in the management of organizations, the more the information system of an organization is more accurate, coherent and systematic, the better the organization can achieve its goals.

Regarding the importance of information, it can be said that the discussion of access to information and, on the other hand, the security and protection of information on the national level have been raised for rulers and managers since ancient times. Access to information can lead to the destruction of the organization. The possibility of data loss due to physical factors and threats to the information of the organization exists. But with the development of information technology and the use of information as a commercial tool and profitable capital, the issue of information security is a new dimension. In today’s trade, information plays the role of capital of a company, and the protection of information in the organization is one of the key pillars of its survival. In this way, categorizing and valuing and protecting information resources is very important and important.

In today’s world, the more we go into machining; the other face-to-face relationships and old solutions cannot answer our problems. In today’s cities, we are faced with increasing levels of traffic and, consequently, increasing urban traffic. Previous paperwork can no longer be an appropriate method for addressing the administrative work of citizens. Of these important organizations, such as the municipalities in the big cities, which are somehow the heart of the city, we must abandon the previous methods and enter the world of information technology and the e-government world.

This is where the Municipal Electronic and Information Technology (IT) have a crucial role in most municipal organizations. After the implementation of the electronic program of municipal services, citizens through their international networks or the Internet can provide their services, such as paying tolls, repairs, fees, and application fees, electronic referrals, and circular letters in various stages Receive in the municipality without a face-to-face visit to the municipality.

Nowadays, IT infrastructure is in an environment that is increasingly being added to the number of enemies and attackers who are not interested in continuous, reliable, and useful computer systems. A world where activities are much faster and more reliable and do not require population density in the physical world. We have to think about ways to reduce urban traffic, the cost of doing work, confrontations, mental ill-health, corruption, etc. that we face every day in municipal organizations, and it is the best solution to create an active and dynamic security framework for each organization.

Implementation and deployment of information security in organizations may be reviewed based on the efficiency, ease of use, and communication with other departments and organizations. Since public procurement is not generally a question of profitability, there is a controlling budget, which limits the ability of the organization to provide the latest hardware and software security. At the same time, municipalities should focus on data protection, as their databases contain sensitive information about individuals; information such as personal and medical records, and taxes.

Unfortunately, even in state-owned organizations of the country, it is difficult to protect information, and it suffers from obsolete systems, inappropriate investments, and employees of the disabled who lack the necessary information security dimension.

However, there are tensions between managerial levels. Without a general plan to create a secure environment for information technology, each episode may develop a solution to the security of information that comes from the missions, goals, and operational intentions of the same section, and may be as good as it is for a particular part. Other parts are not used too much. These different strategies may cause information security in some areas to be over-needed or less than the required level, while the presence of supervision on the part of the high-level management will ensure that security experiences are set in such a way that the organization can functionedits better.

In addition to securing its own intelligence resources, an organization must commit itself to set up a set of policies to safeguard its organization’s information. These policies play an important role in information security, but there is still a contradiction in the fact that the policy framework of the organization should be able to increase the level of security. Methods of dealing with insecurity are identified through crisis identification and insecurity and limitation of insecurity as well as its control tools.

There are sufficient information and adequate systems for the use of information as well as appropriate programs for preventing and, in the event of occurrence, controlling the crisis (proper urban programs) of the main components needed to maintain and develop information security.

Continue Reading
Comments

Intelligence

Afghan Zarqawi is shot dead in Panjsher valley of Afghanistan

Avatar photo

Published

on

According to intelligence information, the leading Taliban commander Maulvi Habibullah Sheeran, who was known as Zarqawi, a resident of Zhrhai District, Kandahar Province, in the southwestern zone of the Taliban was killed in Panjsher battle.

Meantime, the intelligence report indicates, Mullah Abdul Qayyum Zakir, the general military officer of Panjshir and Andrab and the deputy of the Ministry of National Defense, was injured in Panjshir on Friday, September 16 at 3:25 p.m.

Mullah Abdul Qayyum Zakir, who is considered one of the leading and influential war commanders in the southwest zone of the Taliban, has the support of about 4,000 low-ranking and high-ranking Taliban fighters. He is one of the Taliban military commanders who, during the first mobilization of the Taliban, formed the Taliban group with the support of Mullah Muhammad Omar Mujahid, the founder of the Taliban, and attracted hundreds of young men from Helmand province to the Taliban group.

When the Taliban came to power for the second time in Afghanistan, due to internal differences among the Taliban, Mullah Abdul Qayyum Zakir left the Taliban for a short time and went to his native Kajki district of Helmand province. However, due to the many efforts of the Taliban, especially Mullah Abdul Qayyum Zakir’s assistant and the current head of security of presidential palace  Mullah Mutaullah Mubarak, He joined the Taliban again and was appointed as the Deputy Minister of Defense.

Taliban leaders made more efforts to reunite Mullah Abdul Qayyum Zakir with the Taliban, because he was an influential military leader, and on the other hand, Taliban leaders were receiving reports that Mullah Qayyum Zakir wants to join ISIS against Taliban. Nevertheless, when he joined with the Taliban leaders for the second time, he was assigned the position of Deputy Minister of Defense, So, for a period, he cooperated with the Minister of Defense Maulvi Yaqoub as a military advisor in the Ministry of Defense.

 When the rumors of the fall of the northern part of Afghanistan were spread and the fighting between the NRF or the National Resistance Front and the Taliban in Panjshir and Andrab intensified, Mullah Abdul Qayyum Zakir, based on the special permission of Sheikh Haibatullah, Appointed General Military Officer of Northern Afghanistan. In addition, from September 9, under his leadership, a special military operation named Al-Fath began in Panjshir and Andarabs to clear and liberate northern Afghanistan from the fighters of the National Resistance Front.

As a result of the operation, from September 9th to September 16th, dozens of NRF fighters were also killed but the casualties of Taliban fighters are methodically shown below, although scores of Taliban fighters were destroyed.

  • The bodies of 60 to 70 Taliban fighters who were killed in the battle of Panjshir have been transferred to Uruzgan province.
  •  The dead bodies of 50 Taliban fighters have been transferred to Kandahar Province.
  • The dead bodies of 33 Taliban fighters have been transferred to Helmand Province.
  •  The dead bodies of 22 Taliban fighters have been transferred to Ghor Province.
  • The dead bodies of 11 Taliban fighters have been transferred to Takhar province.
  • The dead bodies of 6 Taliban fighters have been transferred to Kunduz Chahar Dara.
  •  The dead bodies of 12 Taliban fighters have been transferred to Zabul province.
  • The dead bodies of nine Taliban fighters have been transferred to Wardag Province.
  • The dead bodies of 10 Taliban fighters have been transferred to Dandi Ghori in Baghlan province.  

Last Friday, September 16, in the bloody battle, Mullah Qayyum Zakir, the military officer in charge of Panjshir and Andrab, was seriously injured and eight of his bodyguards, who were residents of Helmand and Uruzgan provinces, were killed. Mullah Qayyum Zakir was transferred to the 400-bed hospital in Kabul at 10 o’clock in the evening on September 16, and former Taliban doctor Atiqullah was invited to Kabul from Al-Khair Hospital of Balochistan province of Pakistan for treatment.

There is a bloody war going on in the north of Afghanistan and around 300 al-Fatih forces are going to Panjshir from Kabul tonight and may reach tomorrow. Meanwhile, in Vienna, the plan for the formation of a new military and political movement was announced in a three-day meeting of the anti-Taliban political officials of the former government of Afghanistan. Moreover, based on that military plan, after dividing Afghanistan into five major parts, the political and military leaders of each zone will start preparing their organizations against the Taliban, and they will use such political and military tactics as the Taliban used against the government of the Republic of Afghanistan during the last 20 years of resistance.

Continue Reading

Intelligence

U.S. Finally Admits Ukraine Bombs Zaporizhzhia’s Nuclear Power Plant

Avatar photo

Published

on

The Zaporizhzhya nuclear power plant in Ukraine. Ⓒ IAEA

Unnamed American officials, according to the New York Times, have admitted that the explosives fired against Ukraine’s nuclear power plant in Zaporizhzhia have been fired against the plant by Ukraine’s Government, not by Russia’s Government, and furthermore these officials make clear that Ukraine’s attacks against the plant are a key part of Ukraine’s plan to win its U.S.-backed-and-advised war against Russia, on the battlefields of Ukraine, using Ukrainian soldiers.

Zaporizhzhia is a city in Ukraine that is in Russian-controlled territory, and Ukraine’s strategy is to destroy the ability of the plant to function, so that areas controlled by Russia will no longer be able to benefit from that plant’s electrical-power output. The United States Government helped Ukraine’s Government to come up with this plan, according to the New York Times.

This information was buried by the Times, 85% of the way down a 1,600-word news-report they published on September 13th, titled “The Critical Moment Behind Ukraine’s Rapid Advance”, in which it stated that, “Eventually, Ukrainian officials believe their long-term success requires progress on the original goals in the discarded strategy, including recapturing the nuclear power plant in Zaporizhzhia, cutting off Russian forces in Mariupol and pushing Russian forces in Kherson back across the Dnipro River, American officials said.” 

When IAEA inspectors arrived at that plant on September 1st, after a lengthy period of trying to get there to inspect it but which was blocked by Ukraine’s Government, and the IAEA started delivering reports regarding what they were finding at the plant, no mention has, as-of yet, been made concerning which of the two warring sides has been firing those bombs into the plant. Even when the IAEA headlined on September 9th “Director General’s Statement on Serious Situation at Ukraine’s Zaporizhzhya Nuclear Power Plant”, and reported that the plant’s ability to operate “has been destroyed by shelling of the switchyard at the city’s thermal power plant, leading to a complete power black-out in” the entire region, and that “This is completely unacceptable. It cannot stand.”, and closed by saying they “urgently call for the immediate cessation of all shelling in the entire area,” no mention was made as to which of the two sides was shooting into the plant in order to disable it, and which of the two sides was firing out from the plant in order to protect it against that incoming fire. Previously known was only that the city of Zaporizhzhia has been and is under Russian control ever since March 4th. Consequently, all news-media and reporters have known that (since Russia was inside and Ukraine was outside) Russia has been defending the plant and Ukraine has been attacking it, but until “American officials” let slip, in this news-report, the fact that this has indeed been the case there, no Western news-medium has previously published this fact — not even buried it in a news-report.  

So, although nothing in this regard may yet be considered to be official, or neutral, or free of fear or of actual intent to lie, there finally is, at the very least, buried in that news-report from the New York Times, a statement that is sourced to “American officials,” asserting that this is the case, and the Times also lets slip there that this “shelling” of that plant is an important part of the joint U.S.-Ukraine master-plan to defeat Russia in Ukraine. It is part of the same master-plan, which the U.S. Government recommended to Ukraine’s Government, and which also included the recent successful retaking by Ukraine of Russian-controlled land near the major Ukrainian city of Kharkov, which city’s recapture by Ukraine is also included in the master-plan. Both operations — the shelling of the nuclear power plant, and the recapture of that land near Kharkov — were parts of that master-plan, according to the New York Times.

The Times report asserts that

Long reluctant to share details of their plans, the Ukrainian commanders started opening up more to American and British intelligence officials and seeking advice. Jake Sullivan, the national security adviser, and Andriy Yermak, a top adviser to Mr. Zelensky, spoke multiple times about the planning for the counteroffensive, according to a senior administration official. Gen. Mark A. Milley, the chairman of the Joint Chiefs of Staff, and senior Ukrainian military leaders regularly discussed intelligence and military support.

And in Kyiv, Ukrainian and British military officials continued working together while the new American defense attaché, Brig. Gen. Garrick Harmon, began having daily sessions with Ukraine’s top officers.

Continue Reading

Intelligence

The US over the Horizon Counterterrorism War from Pakistan

Avatar photo

Published

on

afghanistan terrorism

In the face of the growing political and security crisis caused by China in East Asia, the US is trying to expand its military presence in South Asian countries and use Pakistan’s air space geo-political and counterterrorism objectives.  When the Afghan Taliban came to power in Afghanistan for the second time on August 15, 2021, and on August 30, the 20-year military presence of the United States in Afghanistan came to end completely, while undermining the military and political presence of the United States not only in South Asia but also in the Middle East.

 Furthermore, in East Asia, the possibility of an attack on Taiwan by China is also increasing day to day, hence, the United States prioritize the acquisition of an air base at a strategic point in South Asia in coordination with the Pakistani army and the ISI network in Pakistan. In order to get an airport at a point that has easy access to the border areas of three countries such as China, Afghanistan and Iran. Thus, after August 15, 2021, the United States once again expanded military and diplomatic relations with Pakistan in the region by overthrowing the government of the pro-Sino-Russia party of PTI in Pakistan.

Moreover, strategic communication between the high-ranking military and political officials of both countries, namely Pakistan and the United States have started to meet in relation to the security of the region, especially Afghanistan. The most important visit of high-ranking US officials to South Asia was the visit of William Burns, the head of the US Central Intelligence Agency, in early September 2021.  Mr. Burns agreed with India and Pakistan on such a security mechanism for the region so that America can once again expand its surveillance and military presence in the region.

 Based on that security mechanism, three areas have been marked so that the United States can deploy its drones and naval forces in those areas such as Ladakh, a border region that has been troubled between India and China for years, Shamsi Airport in Pakistan, which is located in Balochistan, and Bagram Air Base in Afghanistan, which is currently under the control of the Afghan Taliban.

 From these three areas, number of different types of American unmanned aerial vehicles, including naval forces have been transferred to Pakistan’s Baluchistan Shamsi Airport such as Northrop Grumman RQ-4 Global Hawk surveillance and General Atomics MQ-9 Reaper attack drones. India is still in an uncertain position regarding military cooperation with the United States, and recently, both China and India, in coordination with the defense ministries, have removed soldiers from the Ladakh region.

However, if China does not interfere with the naval forces in the southern port of Sri Lanka, Hambantota, or face to the military development in Sri Lanka, So, India will not delay to give a military base to the US Navy in the Ladakh region. In addition, the third point was Afghanistan, however, several times after August 30, American officials tried to deploy their military forces in Afghanistan under the pretext of protecting the American embassy in Afghanistan through the Taliban’s Doha office in Doha. Nevertheless, it seems that their efforts have failed or the Afghan Taliban have backed away from this move after expanding relations with the Eastern Alliance.

On August 7, 2022, eight days after the killing of Al-Qaeda leader Ayman al-Zawahiri in Afghanistan, Pakistan handed over Shamsi Airport to the CIA for the second time.  In return, some of Pakistan’s requests were accepted by the US, which will gradually be adopted into practice.  

-Removing the name of Pakistan from the blacklist of cooperation with terrorist groups.

-forcing the International Monetary Fund or IMF to lend to Pakistan, Agreement on comprehensive military assistance with the Pakistan Army.

-in addition to other material and military assistance.

 From the Shamsi Airbase, America can easily destroy its targets inside Afghanistan besides; it can monitor the border area of ​​Iran and China as well.

Why Shamsi airbase matters?

Pakistan’s Shamsi Airport, located in Washuk, Balochistan, is only 190 km away from the Durand Line, from where American drones can easily monitor Afghanistan entirely, the border areas of Iran and China and the port of Gwadar. Shamsi Airport, located at an altitude of 340 meters above sea level, has a 3012 meter long runway of plane. This airport was built in 1992 by the United Arab Emirates in the name of bird hunting, which was then controlled by the Americans from 2001 to 2011. But when relations between American forces and Pakistan became strained in November 2011, Pakistan ordered American forces to withdraw from Shamsi Airport. Now, once again, this airport has been handed over to the American forces under the leadership of the CIA, to monitor Afghanistan, Iran and East Asia from here.

Continue Reading

Publications

Latest

Reports32 mins ago

Transition to Low-Carbon Rice Will Help Vietnam Meet Its Emission Target

Moving to low-carbon rice production offers the highest potential for Vietnam to meet its goal of cutting methane emissions by...

Economy3 hours ago

Without Reform on Social Protection, Kosovo’s Poorest and Most Vulnerable Will Be Left Behind

There is growing alarm in Kosovo over rising prices for food, electricity, fuel, and firewood. This is not unwarranted. As...

World News4 hours ago

Lavrov: Russia had ‘no choice’ but to launch ‘special military operation’ in Ukraine

Faced with the “inability” of Western countries to negotiate and the Ukrainian Government’s “war against its own people” in the...

Russia8 hours ago

Russia Facing China: Little Red Riding Hood or Cinderella?

Whenever I read another Western report on the prospects of Russian-Chinese relations, the old children’s fairy tale Little Red Riding...

World News10 hours ago

War crimes have been committed in Ukraine conflict

Almost seven months to the day since Russia’s invasion of Ukraine, UN-appointed independent human rights investigators said that war crimes...

Africa12 hours ago

Sahel security crisis ‘poses a global threat’

Rising insecurity, including the proliferation of terrorist and other non-State armed groups, coupled with political instability, is creating a crisis...

Science & Technology15 hours ago

The Development of Artificial Intelligence in China: Advantages and terms of development

Artificial intelligence in China is facing unprecedented development opportunities and has many advantages in terms of development. Let us make...

Trending