There is no doubt that information warfare plays a fundamental role in today’s economy and society. Furthermore, its importance has led to the emergence of a new form of conflict and therefore led to a change in reasoning. Our highly-digitalized economies and society obviously present significant windows of vulnerability linked to the fact that the modern economic system cannot but be open and fluid. At any rate, the concept of information warfare – as is widely known – emerges primarily from American publications and emerges in the moment in which the legitimacy of information has been placed under discussion in the American context. Required to deal with significant budget cuts, the leading US federal intelligence agencies have attempted to justify the preservation of their budget by emphasizing the importance of protecting the nation’s economic security; and yet as early as the 90s, it had become clear that the logics of conflict present in the geopolitical sphere have been transferred to the context of the economic sphere in which nations must be capable of implementing strategies of dominance based on the control of both the information infrastructure and the flows of technological and economic knowledge.
A strategy that takes into account modern new needs must give careful attention to the vulnerability of critical information infrastructures (on the other hand, the rapid growth in computerized piracy has encouraged nations to create ad hoc organizations for the control and surveillance of the development of this new crime). Another observation regards the increase in the strong economic rivalry between nations that has lead to the fundamental apprehension that economic intelligence has become an authentic fact of life for the world’s leading industries; deeper knowledge of information mechanisms, in fact, becomes a fundamental element of success or failure. It is now precisely this crucial importance in economic context of the leading industries and multinationals that has compelled nations to officialize their approaches in the context of information intelligence. Even if the use of denigration, discrediting and disinformation campaigns has always been a part of both the political and economic world, in today’s world the acceleration of the data digitalization has created the need for both nations and certain companies to adopt offensive and defensive systems sufficient to the situation. A large-scale disinformation operation waged against an industry or multinational corporation can create enormous economic damage.
As known to psychological warfare experts, disinformation is certainly an offensive resource with highly particular characteristics because it is a sword that cuts in one direction only, its effects are particularly insidious and can be discovered only in a second moment, but above all, the objectives of disinformation are oriented to the loss of the adversary’s reputation and legitimacy on one hand and the loss of its financial support (in the case of companies, for example), on the other. Yet whereas in traditional conflicts the economy of forces was based on a relationship of inertia, and logistic superiority represented a fundamental dimension for either victory or defeat, in cognitive warfare, similar asymmetry cannot be imposed in the knowledge system, and above all, unlike traditional conflicts, information warfare has its own autonomy regardless of who constructs or sends the message. Eliminating the spokesman of the message therefore does not modify the dimension of the cognitive conflict but on the contrary only strengthens the adversary. Furthermore, Anglo-American practices are based primarily on the need to immediately control the electronic sources that underlay the economic, political, and military decision-making system. In this strategic view, controlling the public news infrastructure assumes fundamental importance; in any case, a closer analysis shows that the control of the world’s information infrastructure is incompatible with its ample and de-structured way of diffusion in today’s world. The exponential growth of the information infrastructure does not permit the possibility for vertical or hierarchical coordination. Furthermore, the concept of strategic dominance is based on the ability of a state to prohibit or dissuade a rival nation from emphasizing its rules of conduct and on perception of reality.
This approach starts from the assumption that the global control of news flows infrastructure would permit the achievement of global economic and political dominion. In any case, this concept is revealed ingenuous because it ignores the fact that the control of the news differs from the formation of judgments and beliefs. Faced today with the emergence of cognitive warfare and the complexity and fluidity of information, traditional security services do not possess adequate culture because the belief system on which such systems are based is built on the collection of observable facts and the processing of such information: we have agents collecting information on one hand and agents making analysis on the other. This dual organization is certainly suited to traditional conflicts but is not adequate to cognitive conflict: the logic is completely different because due to the speed with which information moves only a very short time is available to control and analyze it this therefore requires rapid decision-making processes. In other words, the capacity for interpretation and attribution of meaning in real time is the basis for cognitive warfare; furthermore, given that most non-state organizations are in fierce competition and have access to the same news from the same sources, it is highly improbable that a private or state-owned organization will acquire a decisive competitive advantage unless an improvement is made in the satellite control system over news and human information.
After this clarification has been made, it must be repeated once again how crucial the control of the news flow is to victory and how mistaken it is to believe that merely destroying the adversary’s information infrastructure will suffice. On the contrary, the destruction of the latter can offer the adversary a greater degree of freedom or promote the use of alternative information tools in a context where – as is known – the distribution of information has been liberalized. Security services must realize that the current trend in worldwide information infrastructure is its Balkanization, or in other words, its dispersion and fragmentation. Efficiency in any case depends more and more on the mastery of decentralized cognitive capacity and less and less on the control of the information infrastructure. Their economy of forces in the context of modern political conflict lies on the mastery of very different cognitive systems and the imposition of a unified interpretation schema is not a strategy capable of providing fruit in the long-term.
Russia Says U.S. Trains Jihadists to Do Chemical Attacks Blamed Against Assad
On March 17th, Russia’s Minister of Defense (equivalent to America’s Secretary of Defense) announced, through Russian General Staff spokesman General Sergey Rudskoy: “We have reliable information at our disposal that US instructors have trained a number of militant groups in the vicinity of the town of At-Tanf, to stage provocations involving chemical warfare agents in southern Syria. Early in March, the saboteur groups were deployed to the southern de-escalation zone to the city of Deraa, where the units of the so-called Free Syrian Army are stationed. They are preparing a series of chemical munitions explosions. This fact will be used to blame the government forces. The components to produce chemical munitions have been already delivered to the southern de-escalation zone under the guise of humanitarian convoys of a number of NGOs.”
He also said:
“The provocations will be used as a pretext by the United States and its allies to launch strikes on military and government infrastructure in Syria. We’re registering the signs of the preparations for the possible strikes. Strike groups of the cruise missile carriers have been formed in the east of the Mediterranean Sea, Persian Gulf and Red Sea.”
He went on to add that in the most jihadist-friendly province, Idlib, another such “false flag” attack is being prepared by Al Qaeda in Syria, called there, “Al-Nusra Front terrorist group, in coordination with the White Helmets,” which is a group financed by the U.S. and UK Governments to rescue victims of bombings by Syria’s Government and its ally Russia.
This would hardly be the first example of such attacks. For example, on 14 January 2014, MIT’s Theodore Postol and the former U.N. Weapons Inspector Richard Lloyd co-authored a detailed technical study and analysis, regarding “the Damascus Nerve Agent Attack of August 21, 2013” (which was the most-famous sarin-attack, in East Ghouta), saying that “the US Government’s Interpretation of the Technical Intelligence It Gathered Prior to and After the August 21 Attack CANNOT POSSIBLY BE CORRECT,” and documenting that the rocket had actually — and clearly — been fired from an area that even the U.S. Government’s own maps showed to be under the control of the ‘rebels’, whom the U.S. Government supported, and definitely not of the Syrian Government, whom those ‘rebels’ were trying to overthrow. (That was the incident in which U.S. President Barack Obama announced to the world his “red line” and then said that the Government headed by Bashar al-Assad had crossed it and that this justified a U.S. invasion, but Seymour Hersh said that it had become blocked by the UK/s intelligence lab at Porton Down, by their finding that the sarin which had been used in this attack wasn’t of a type that the Syrian Government had in its arsenals.) There have been several such “false-flag” attacks, in order to get the public to support invading Syria. However, the main way that the U.S. and its allies try to overthrow Assad and his Government is to arm and protect Al Qaeda in Syria, which leads the various jihadist groups there (other than ISIS).
From Radical Ecology to Ecoterrorism
The schools of thought of contemporary eco-terrorism are many, but those that use an antagonist theoretical-practical approach can be identified in deep ecology, feminist ecology, Marxist ecology, primitivism, degrowth ecology, the Slow Food movement, ecology, animalism (which together with vegetarianism is a logical consequence of radical ecology) and, finally, eco-terrorism. In this sense – beyond the often demagogic rhetoric – eco-terrorism does not differ from the above-mentioned schools of thought because of its ethical-philosophical assumptions but rather by the operative procedures through which its antagonism is carried out. Therefore, an ideological community exists, whether implicit or explicit, in the main schools of thoughts of ecology and eco-terrorism. These schools of thought, however, can be associated with the idea of radical ecology.
Definition of radical ecology
While continuing to take the complexity of current ecology into account, the expression “radical” is used to indicate extremely antagonist ecology, from Pinochot’s utilitarian conservationism, which was deeply anthropocentric and aimed to rationalize the use of nature toward a lasting economic exploitation, to Haeckel’s neo-Darwinian approach, Tanskey’s view, Lotka’s trophic-network ecology, and finally, Odum’s thermodynamic approach. Firstly, radical ecology comprises the holistic preservationism of Thoreau, Emerson, and Leopold, ecofeminism, political ecology, deep ecology, primitivism, social ecology, the degrowth movement, the Slow Food movement, eco-regionalism, animalism, and eco-terrorism. Secondly, although the list of the organizations is not complete, it is important to underline that the several “-isms” do not exclude the possibility of profitable contaminations among the different schools of thought. Thirdly, the epistemological, political and philosophical features shared by the above-mentioned schools of thought can be identified as follows:
- they all support a structural modification of the current economic system and are against the supranational institutions that control global capitalism, in particular, the IMF, the WTO, and the World Bank;
- they are in favor of the anti-globalization movement, and know its limits and potentials;
- they share an eco-centric, bio-centric, anti-anthropocentric, holistic and sometimes organicistic perception of natural reality;
- they are against a mechanistic vision of reality such as Bacon’s and Descartes’, and are in favor of legal extensionism;
- they support a relevant extension of representative democracy or a radical exceeding of it in favor of an anarchic, neo-tribal society, or a participatory democracy;
- they share and develop apocalyptical and radical scenes of current society’s environmental and economic condition;
- they advocate a change in the ethic of western civilization through an eco-pacifist reorientation carried out by counter-information;
- they are against military institutions and share a typical interpretation of irenic pacifism;
- they are against the use of biotechnologies in agriculture and the civil and military use of nuclear energy;
- several members of radical ecology share a new interpretation of nature according to neo-romantic or oriental philosophies (such as Buddhism, Hinduism, Taoism and Zen philosophy);
- many scholars and activists belonging to radical ecology embrace animalistic and vegetarian views which they deem deeply coherent with an ecocentric vision of nature.
- Finally, several exponents of radical ecology refer to 1968 culture, and to underground American and tribal cultures.
In short, regarding the operative procedures carried out by the several schools of thought or radical ecology, we should point out the difference between non-violent and terroristic ones. There are three levels of antagonist procedure: a) non-violent practice strictly antagonist toward political and legal institutions; b) non-violent practice with an entryist political logic toward national and supranational political institutions; c) publically terroristic practice. We should, nevertheless, underline the differences between positions a) and b) both of which are well-organized and opposing: the first clearly condemns the use of terroristic procedures, the second supports terrorist procedures – but without putting them into practice – and is therefore ambiguous.
The historical predecessors of radical ecology
According to Livorsi, the genesis of radical ecology can be easily traced from a historical point of view to the philosophical and religious interpretation of Bachofen and the Marxist psychoanalysis of Reich as well. The author of the “Canticle of the Sun” (“Cantico del Frate Sole”) not only asserts the sanctification of the world by God – in other words, the sun, the moon, and the animal world – but also refers to Mother Earth, anticipating the modern concept of “Gaia” . Moreover the heterodox pantheism of Saint Francis implies a brotherhood between human beings and creatures according to an ecocentric and egalitarian view. The French philosopher Rousseau, in his “Discourse on the Origin and Basis of Inequality Among Men” (“Discours sur l’origine et les fondements de l’inégalité parmi les homes”), emphasized the goodness of the state of nature and the existential authenticity of the human being in this pre-civilized context, while condemning in the meantime private property and therefore civilization determined by technique. Moreover, unlike civilized society, tribal society conducted an ecocentric, egalitarian and communal style of life. Bachofen, in his reinterpretation of the history of civilization, emphasized the existence of a gynocratic, anti-patriarchal view in pre-Achaean society in which there was no private life, there was sexual freedom, nature was accepted as a living organism, and above all, the modus vivendi was built on egalitarian pacifism.
In short, regarding Reich, the rise of patriarchy brought about the triumph of capitalism, the closed family, and sexual repression. The natural and erotic man who struggles for a libertarian socialism has reemerged only rarely in history, such as in the Paris Commune in 1871, for example.
Definition of Terrorism and Eco-Terrorism
According to Pisano, terrorism can be defined as a non-conventional form of conflict because it lies outside both democratic, organized and civil dispute and the traditional battlefield of war regulated by international law. Terrorism is characterized by three elements: a) physical and psychic criminal violence, b) political, religious political or social political movement, and c) the use of illegal structure. Traditional terrorism, as Pisano explains, together with neo-terrorism, coexist both as a threat and as a concrete aggression. Neo-terrorism is performed by dynamic and polymorphous schemes that can intertwine while preserving their methodological and operational autonomy at the same time. Pisano indicates ecologic terrorism, narco-terrorism, the NRBC, and cyber-terrorism as the most important.
Ecologic terrorism (the topic of our research) is based on lay and/or religious ideological ideas and from an organizational point of view is carried out alternatively by cellular organizations with no hierarchies and by binary structures that are cellular and propagandistic at the same time. Ecologic terrorism furthers its antagonism through several operative procedures: 1) obstructive human barriers (lock box), 2) machinery sabotage, 3) arson and explosive detonation, 4) legal instruments focused on reporting abuse by police, 5) assemblage and road blocks, 6) intrusion within military installations or scientific and university institutions, 7) wide use of misinformation through media, internet and magazines, and 8) instigation to tax evasion. The enemies or targets to strike are several in number as well: 1) national and supranational capitalism, 2) the state, which defends its interests and consolidates its power, 3) national and supranational military institutions, and 4) scientific and university laboratories.
In a nutshell, eco-terrorism presents two fundamental trends: animal (such as ALF, ARM or JD) and environmental (e.g. Earth First!). In conclusion, Pisano suggests that the dangers of eco-terrorism are linked to the potential strengthening of its organizational power, creation of operative or ideological ties with traditional terrorism, and the consolidation of its relations with the anti-globalization movement.
An American: “Why I Don’t Trust My Government, At All”
Would you trust your government if it were headed by a President who just now appointed to become the head of the CIA, the very same person who had headed the CIA’s interrogation of a 9/11 suspect whose interrogation consisted of 83 waterboardings (plus other tortures, which blinded his left eye), all in order to get him to say that Saddam Hussein was behind the 9/11 attacks, so as to ‘justify’ invading Iraq?
Current U.S. President Donald Trump has appointed, to head the CIA, Gina Haspel, who, as a CIA official in Thailand, the Chief-of-Base there, or Thai “COB”, in 2002, had headed the interrogation of suspect Abu Zubaydeh, and kept using waterboardings and other means of torture against him until he would implicate Saddam Hussein. He told them what he thought they wanted to hear, but didn’t know that this was what they wanted the most to hear. As Raymond Bonner described it at propublica on 22 February 2017:chief of base and another senior counterterrorism official on scene had the sole authority power to halt the questioning.
She never did so, records show, watching as Zubaydah vomited, passed out and urinated on himself while shackled. During one waterboarding session, Zubaydah lost consciousness and bubbles began gurgling from his mouth. … At one point, Haspel spoke directly with Zubaydah, accusing him of faking symptoms of physical distress and psychological breakdown. …
The CIA officials in Thailand understood that the methods they were using could kill Zubaydah and said that should that happen, they would cremate his body. If he survived questioning, Haspel sought assurances that “the subject will remain in isolation and incommunicado for the remainder of his life.”
So far, that promise has been kept. Zubaydah is currently incarcerated at Guantanamo. His lawyers filed a court action in 2008 seeking his release, but the federal judges overseeing the case have failed to issue any substantive rulings [after now 16 years]. …
[Ultimately,] the source on whom the CIA had based its assessment that Zubaydah was number three or four in the al-Qaida organization had recanted his testimony, according to the Senate Intelligence Committee Report on Torture released in 2014. The agency would ultimately conclude that Zubaydah was not even a member of al-Qaeda.
So, a man who wasn’t even in Al Qaeda, is being hidden from the public because the U.S. Government 17 years ago captured him in Pakistan and tried to get him to say that Saddam Hussein was behind 9/11 but they didn’t get the false testimony they required from him, and so he’s still hidden at Guantanamo so as to continue still deceiving the American public (such as to support U.S. use of torture), and to continue keeping his case against the U.S. Government away from whatever (laughable) international-law bodies exist.
Buried in a December 2008 Vanity Fair article by David Rose is this: The tribunal president, a colonel whose name is redacted, asked him: “So I understand that during this treatment, you said things to make them stop and then those statements were actually untrue, is that correct?” Abu Zubaydah replied: “Yes.”
Some of those statements, say two senior intelligence analysts who worked on them at the time, concerned the issue that in the spring of 2002 interested the Bush administration more than almost any other — the supposed operational relationship between al-Qaeda and Iraq. Given his true position in the jihadist hierarchy, Abu Zubaydah “would not have known [about] that [even] if it was true,” says Coleman. “But you can lead people down a course and make them say anything.”
Some of what he did say was leaked by the administration: for example, the claim that bin Laden and his ally Abu Musab al-Zarqawi were working directly with Saddam Hussein to destabilize the autonomous Kurdish region in northern Iraq. There was much more, says the analyst who worked at the Pentagon: “I first saw the reports soon after Abu Zubaydah’s capture. There was a lot of stuff about the nuts and bolts of al-Qaeda’s supposed relationship with the Iraqi Intelligence Service. The intelligence community was lapping this up, and so was the administration, obviously. Abu Zubaydah was saying Iraq and al-Qaeda had an operational relationship. It was everything the administration hoped it would be.”
Within the administration, Abu Zubaydah’s interrogation was “an important chapter,” the second analyst says: overall, his interrogation “product” was deemed to be more significant than the claims made by Ibn al-Shaykh al-Libi, another al-Qaeda captive, who in early 2002 was tortured in Egypt at the C.I.A.’s behest. After all, Abu Zubaydah was being interviewed by Americans. Like the former Pentagon official, this official had no idea that Abu Zubaydah had been tortured.
“As soon as I learned that the reports had come from torture, once my anger had subsided I understood the damage it had done,” the Pentagon analyst says. “I was so angry, knowing that the higher-ups in the administration knew he was tortured, and that the information he was giving up was tainted by the torture, and that it became one reason to attack Iraq.”
As I documented in my “America’s News Is Heavily Censored”, George W. Bush knowingly lied on 7 September 2002 when he said that the IAEA had just issued a new report that Saddam Hussein was within six months of having a nuclear weapon. When the IAEA denied, several times, that there was any such new report, the press ignored it, and the public impression from the President’s lie remained unchallenged in the press.
Barack Obama was no better, and he continued almost all of the cover-ups and lies from his predecessor. This is not a partisan matter. It is a matter of a bipartisan dictatorship, which rules in Washington.
I give this here as only one of the large number of conclusive, rationally undeniable, reasons why it would be ludicrous to trust the U.S. Government.
Russia Says U.S. Trains Jihadists to Do Chemical Attacks Blamed Against Assad
On March 17th, Russia’s Minister of Defense (equivalent to America’s Secretary of Defense) announced, through Russian General Staff spokesman General...
From Radical Ecology to Ecoterrorism
Radical ecology The schools of thought of contemporary eco-terrorism are many, but those that use an antagonist theoretical-practical approach can...
Why At Least Two Nuclear Super-Powers Are Essential
My distinguished colleague at Strategic Culture Foundation, Federico Pieraccini, has recently argued that “nuclear-armed powers decrease the likelihood of a...
Ice Silk Road: From Dream to reality
Authors: Mahdi Torabi, Vahid Pourtajrishi The history of Silk Road backs to thousands years ago. The aim of creation of...
Entrepreneurs in unexpected places: How one Midwest city promotes diverse local innovation
In September of 2017, thousands of people from around the world congregated in an unlikely place: Wausau, Wisconsin. This diverse...
The World without Colonies – Dakhla without Potemkin Village
Last November marked forty two years since 350,000 Moroccans crossed into the Western Sahara as part of the staged manipulation...
What Results When U.S. Invades a Country
The U.S. Government certainly leads the world in invasions and coups. In recent years, it has invaded and occupied —...
Africa2 days ago
The Ethiopian Powder Keg Is a Regional Threat
Russia2 days ago
New American-Russian Conflict: A Confrontation beyond Cold War
Middle East1 day ago
Three Years of Saudi Heinous Crimes in Yemen
Africa1 day ago
The World without Colonies – Dakhla without Potemkin Village
Terrorism2 days ago
New ISIL called the MEK
South Asia2 days ago
India’s Military Spending and South Asian Security
East Asia16 hours ago
Ice Silk Road: From Dream to reality
Energy3 days ago
The Sustainable Energy Forum for East Africa 2018