As the argument goes, law enforcement agencies must protect the safety of citizens, and to do so, they must be in contact with representatives of the IT sector. This in turn compels the representatives of mail services, messaging apps, and smartphone manufacturers to contact the authorities and disclose user information. However, excesses do occur, and the founder of the Telegram messaging app Pavel Durov refused to provide the FSB with their encryption keys. Telegram was repeatedly accused of being the messaging application of terrorists, and in the context of the messaging service’s being blocked, the discussion surrounding the rights of citizens to engage in private correspondence grew more heated. The example of the Islamic State, however, only goes to show that militants shall not live by Telegram alone: they act much more competently and work to keep a step ahead of law enforcement agencies. What tools do terrorists actually use and how should we fight against the digital technologies of militants?
Different Goals, Different Weapons
The success of Islamic State militants can largely be attributed to brilliant propaganda work. Depending on their goals, militants have been able to resort to various tools for propaganda, recruitment, and communication between group members. Propaganda includes all the usual tools: videos, online magazines, radio stations, brochures, and posters designed for both Arabic and Western audiences.
Western services have played a cruel joke on Western society, facilitating the distribution of propaganda videos like, for example, one of the most popular clips, “Salil as-savarim” (The Sound of Swords) on YouTube and Twitter as well as through file sharing services such as archive.org and justpaste.it. YouTube administrators repeatedly deleted the videos, but they were simply uploaded once again from new accounts with the number of views driven up by reposting them on Twitter. The use of Twitter for these purposes is discussed in detail in the article “Twitter and Jihad: the Communication Strategy of ISIS”, published in 2015. According to the former national security adviser of Iraq, Mowaffak al-Rubaie, it was in large part thanks to Twitter and Facebook that 30,000 Iraqi soldiers lay down their weapons, removed their uniforms, and abandoned Mosul to jihadis without a fight in 2014. .
ISIS has taken into account the mistakes of its jihadi predecessors and has skilfully set its own propaganda up against attempts by the foreign press to portray it in a negative light. However, on a deeper, internal level, militants employ other communication tools more reliable than social networks.
In September 2017, political scientist and member of the non-profit RAND Corporation and the International Centre for Counter-Terrorism at The Hague, Colin P. Clarke suggested that ISIS would most likely continue to use encrypted messaging to organize direct terrorist attacks abroad even if the caliphate were to become a “less centralized entity”.
However, terrorists have already resorted to using such tools for some time now. In early 2015, it became known that ISIS had developed a 34-page manual on securing communications. The document, based on a Kuwaiti firm’s manual on cybersecurity, popped up in jihadi forums. The document also listed those applications considered most suitable for use, such as Mappr, a tool for changing the location of a person in photographs. The Avast SecureLine application facilitates the achievement of similar goals, masking the user’s real IP address by specifying, for example, an access point in South Africa or Argentina in place of, say, Syria.
Jihadis have advised using non-American companies such as Hushmail and ProtonMail for email correspondence. Hushmail CEO Ben Cutler acknowledged in comments to Tech Insider that the company had been featured in the manual, but added that “It is widely known that we cooperate fully and expeditiously with authorities pursuing evidence via valid legal channels”. In turn, CEO of Proton Technologies AG Andy Yen mentioned that besides ProtonMail, terrorists likewise made use of Twitter, mobile phones, and rental cars. “We couldn’t possibly ban everything that ISIS uses without disrupting democracy and our way of life,” he emphasized.
For telephone calls, the manual recommended the use of such services as the German CryptoPhone and BlackPhone, which guarantee secure message and voice communications. FireChat, Tin Can and The Serval Project provide communication even without access to the Internet, for example, by using Bluetooth. The programs recommended by terrorists for encrypting files are VeraCrypt and TrueCrypt. The CEO of Idrix (the maker of VeraCrypt) Mounir Idrassi admitted that “Unfortunately, encryption software like VeraCrypt has been and will always be used by bad guys to hide their data”. Finally, the document makes mention of Pavel Durov’s messaging system, Telegram.
It was a massive information campaign that saw Telegram branded with the unofficial stamp of messaging app of terrorists. Foreign politicians played their part. Three days before the attack on the Berlin Christmas Fair in December 2016, senior members of the House Foreign Affairs Committee urged Durov to immediately take steps to block ISIS content, warning him that terrorists were using the platform not only for propaganda, but also to coordinate attacks. Moreover, Michael Smith, an advisor to the US Congress and co-founder of Kronos Advisory, claims that Al-Qaeda also used Telegram to communicate with journalists and spread news to its followers. Against this backdrop, Telegram reported on the blocking of 78 channels used by terrorists. It was this interest and pressure from the authorities that ultimately caused the militants to seek a replacement for this messaging service.
Telegram representatives have repeatedly claimed that their messaging service is the safest in the world thanks to the use of end-to-end encryption. However, this is at very least doublespeak: end-to-end encryption is used only in secret chat rooms and even then possesses obvious shortcomings, as pointed out by Sergey Zapechnikov and Polina Kozhukhova in their article On the Cryptographic Resistance of End-to-End Secure Connections in the WhatsApp and Telegram Messaging Applications . In particular, due to the vulnerability of the SS7 network, which manifests itself through authorization via SMS, it is possible to access chats. Secret chats cannot be hacked, but you can initiate any chat on behalf of the victim. Secondly, developers violated one of the main principles of cryptography – not to invent new protocols independently if protocols with proven resistance assessments that solve the same tasks already exist. Thirdly, the use of the usual Diffie–Hellman numerical protocol and the lack of metadata security, so that you can track message transfer on the server, add any number from the messaging service’s client to the address book, and find out the time a person came online.
In this context, WhatsApp seems more reliable since it uses end-to-end encryption for all chats and generates a shared secret key using the Diffie–Hellman protocol on elliptical curves. Many terrorists have recourse to this messenger. In May 2015, in “The Life of Muhajirun”, the blog of a woman writing about her and her husband’s trip to Germany, the author wrote about how her husband contacted smugglers by WhatsApp while in Turkey.
In the article Hacking ISIS: How to Destroy the Cyber Jihad Malcolm W Nance; Chris Sampson; Ali H Soufan, the authors recount the story of Abderrahim Moutaharrik, who planned an attack on a Milan synagogue with the intent of fleeing afterwards to Syria. He used WhatsApp to coordinate the attack. Italian police were able to identify the criminal after an audio message was sent.
However, jihadis are skeptical about WhatsApp, and not only for reasons of security. In January 2016, a supporter of jihad, security expert Al-Habir al-Takni, published a survey of 33 applications for smartphones, separating them into “safe”, “moderately safe”, and “unreliable”. WhatsApp ended up at the bottom of the rating. In defence of his opinion, the expert mentioned that the messaging service had been purchased by the Israeli Company Facebook (WhatsApp was bought by Mark Zuckerberg in 2014 for $19 billion, the messenger has 1 billion users worldwide).
In the light of complaints about Telegram and WhatsApp and as laws are tightened, terrorists have become preoccupied with the creation of their own application. In January 2016, the Ghost Group, which specializes in the fight against terrorism, uncovered online an instant messaging service created by militants, Alrawi. This Android application cannot be downloaded on Google Play – it is only available on the Dark Web. Alrawi has come to take the place of Amaq — a messaging service providing access to news and propaganda videos, including videos of executions and videos from the battlefield. Unlike Amaq, Alrawi possesses complete encryption. The Ghost report noted that after American drone strikes destroyed the prominent cybersecurity specialist Junaid Hussain in the summer of 2015, the cyber caliphate’s effectiveness declined dramatically. “They currently pose little threat to Western society in terms of data breaches, however that is subject to change at any time” a spokesperson for the hacker group said in a conversation with Newsweek.
The Game to Get Ahead
Jihadis, like hackers, are often a step ahead of the authorities and in tune with the latest technological innovations. Gabriel Weimann, a professor at the University of Haifa in Israel and the world’s foremost researcher of Internet extremism, noted that terrorist groups tend to be the first users of new online platforms and services. As social media companies lag behind in the fight against extremism on their platforms, terrorist groups become more experienced in modifying their own communication strategies. “The learning curve is now very fast, once it took them years to adapt to a new platform or a new media. Now they do it within months,” said G. Weimann.
These words can be confirmed: every popular service, like WhatsApp or Telegram, has alternatives that jihadis are more than willing to make use of. In the above-mentioned article Hacking ISIS: How to Destroy the Cyber Jihad, the authors list dozens of other services jihadis utilize. For example, Edward Snowden’s favourite application, Signal, has open source code, reliably encrypts information, and allows you to exchange messages and calls with subscribers from your phone book. Signal is community sponsored through grants. According to Indian authorities, ISIS member Abu Anas used Signal as a secure alternative to WhatsApp. Another solution, released in 2014, is the messaging service Wickr, created by a group of cyber security and privacy specialists. It was this application that first made it possible to assign a “life” to a message, ranging from a few minutes to several days. Wickr destroys messages not only on smartphones, telephones, and computers, but also on the servers through which correspondence passes. The program has a function to erase the entire history, and after it has been used messages cannot be restored by any means. Australian Jake Bilardi came across an ISIS recruitment message in Telegram and was to meet with a recruiter through Wickr, though he was detained in time.
Surespot, Viber, Skype and the Swedish messaging system Threema are also mentioned. The latter application deserves to be mentioned on its own — Threema received 6 out of a possible 7 points for security from the Electronic Frontier Foundation (a non-profit human rights organization founded in the U.S. with the aim of protecting, in the era of technology, the rights established in the Constitution and the Declaration of Independence). Jihadis have also called the Silent Circle application a preferred app. After learning of this, the developers tightened security requirements, compelled by the fact that one of the creators, Mike Janke, is a former naval officer. Silent Circle now cooperates with governments and intelligence agencies. Though the list doesn’t end there — Junaid Hussain likewise made use of Surespot and Kik.
Militants have a great number of communication tools at their disposal in accordance with the goals they happen to be pursuing.
But if applications are primarily used on smartphones, other programs exist for laptops and PCs, readily used by both Information Security specialists and jihadis; for example, the Tor browser or T.A.I.L.S (The Amnesic Incognito Live System), a Debian-based Linux distribution created to provide privacy and anonymity. All outgoing T.A.I.L.S connections are wrapped in the Tor network, and all non-anonymous ones are blocked. The system leaves no trace on the device on which it was used. T.A.I.L.S. was used by Edward Snowden to expose PRISM, the US State Program, the purpose of which was the mass collection of information sent over telecommunication networks.
It can be concluded that militants have a great number of communication tools at their disposal in accordance with the goals they happen to be pursuing. Banning or blocking these tools will not ensure victory over the terrorists, though that is not to say the methods should be abandoned altogether. The best method to employ is that of having agents infiltrate terrorist ranks to ensure constant online and offline monitoring.
First published in our partner RIAC
- Michael Weiss, Hassan: ISIS: Inside the Army of Terror, ANF, Moscow, 2016
- Sergey Zapechnikov, Polina Kozhukhova, On the Cryptographic Resistance of End-to-End Secure Connections in the WhatsApp and Telegram Messaging Applications: NRNU MEPhI, Information Technology Security, Volume 24, No. 4, 2017
New ISIS Strategy and the Resurgence of Islamic State Khorasan
Unlike Abu Ibrahim al-Hashimi al-Qurayshi, the second late leader of ISIS, who was derided as a “secluded paper caliph” and “an unknown nobody” for his relative anonymity and non-publicity, the new caliph of the Islamic State, Abu al-Hassan al-Hashimi al-Quraishi, has apparently launched a new strategy to strengthen linkages to regional wilayahs (provinces) and boost the group’s global presence.
Indeed, during his short time leading the group (31 October 2019 – 3 February 2022), Abu Ibrahim al-Qurayshi never publicly addressed his followers, which negatively affected the coordination of the activities of Islamic State-Central (ISC) and its regional branch of the Islamic State Khurasan Province (ISKP). Although his killing during a US counterterrorism raid in northwest Syria in early February was a major blow to the global jihadi organization, the change in leadership nevertheless provided it with new opportunities to update its command-and-control, recruitment and propaganda campaign.
Predictably, Abu al-Hassan al-Hashimi al-Quraishi, the new ISIS overall leader, sees his historical role not only in ensuring the Caliphate’s continuity and avoiding its potential fragmentation but also in establishing a more direct and consistent command line between its core in Iraq and Sham and its Central and South Asian affiliates.
The new strategy of the Islamic Caliphate not only gave a new impetus to its Khorasan offshoot waging a holy jihad in post-American Afghanistan against the Taliban but also opened a new front line against the post-Soviet Central Asian regimes. Indeed, the analysis of ISKP activities revealed that the proclamation of Abu al-Hassan al-Quraishi as the new Caliph and the launch of a new campaign “Revenge Incursion for the Two Sheikhs” increased the combat capability of IS Uzbek and Tajik fighters, as well as strengthened the coordination of local language and IS-Central propaganda machines.
Notoriously, on April 17, ISIS launched the new campaign “Revenge Incursion for the Two Sheikhs” to avenge the deaths of the former ISIS leader, Abu Ibrahim al-Qurayshi, and his official spokesperson, Abu Hamza al-Qurashi, who were killed in a US raid in February in the northwest Syrian town of Atmeh. In his recent audio address, Islamic State’s new spokesman Abu-Omar al-Muhajir called on the Caliphate warriors to avenge the deaths of the former ISIS leaders by “painfully striking” the enemies of “al-mujahideen” and saying that if they kill, they should “kill by many.” This call was made to the group’s followers worldwide and asked them to remain patient, but also be ready when the “war” begins. Al-Muhajir called to expand the campaign “Revenge Incursion for the Two Sheikhs” to the territory of US, Europe and Central Asia, urging Muslims living there to follow the lead of past “lone wolves” who conducted operations that “filled with horror.” He asked them to repeat “lone wolf” operations by stabbing, attacking, and ramming, and drawing inspiration from recent attacks in Israel.
ISKP Threat to Central Asia
Among the first to support the Islamic State’s new ‘global offensive’ campaign were ISKP Uzbek and Tajik jihadists challenging the new Taliban government and dreaming of overthrowing the ‘Taghut (idolaters) regimes’ in Central Asia. Thus, inspired by the new Caliph’s new strategy, for the first time in the history of the Islamic State, they managed to conduct a transnational jihadi operation from Afghanistan to the territory of Uzbekistan and Tajikistan.
Initially, on April 18, 2022, the ISKP fired ten rocket salvos into the territory of Uzbekistan, which was successfully exploited by the Uzbek-speaking regional jihadi media and IS-Central’s propaganda resources as evidence of the opening of a “second front” in the Central Asian direction. Expert assessments clearly observed the good coordination between the IS-Central’s media and ISKP’s local jihadi mouthpieces, both in terms of Islamic ideological content and hierarchical sequences.
The Islamic State-Central’s Amaq News Agency reported that “Mujahedeen of the Caliphate have fired 10 Katyusha rockets at a murtad (apostasy) Uzbekistan’s military base in the border town of Termez.” The ISIS central media wing also released a photo and video of the projectiles to back its claims. Another IS-Central’s weekly al-Naba newsletter also widely covered the topic of rocket attacks by detailing how the projectiles were fired from Afghan territory on the Central Asian nation.
Following IS-Central official news agencies reports, IS-Khurasan Willayah’s local media outlets, such as Al-Azaim Foundation and Khurasan Radio, the Uzbek-language Xuroson Ovozi (Voice of Khurasan), Tavhid Habar (Tawhid News), Tajik-language Telegram channels Mujahideen of the Caliphate and The Army of the Victorious Nation published a series of audio, video and text messages in Uzbek and Tajik detailing the goals, causes, and consequences of the rocket attack. In particular, Al-Azaim Foundation glorified the rocket attack as “the heroism of the brave lions of Allah Almighty punishing the corrupt army of the murtad Uzbek government.”
The ISKP media outlets were extremely outraged by the Uzbek government’s denial of the rocket attack, claiming that nothing had landed on their territory. In response, pro-ISKP Uzbek, Tajik and Russian Language Telegram channels re-posted IS-Central’s statement, photos, videos of the attacker and a map marked with the possible rocket impact location in Termez.
Central Asian Salafi-Jihadi experts’ attention was drawn to a 24-minute audio address of Khuroson Mujahid, the leader of ISKP Uzbek group, whose speech style and ideological views strongly resembled the late ISIS chief strategist Abu Mohammed al-Adnani. His speech revealed that the ideological vision of ISKP Central Asian jihadists, staunch followers of Takfiri Salafism, is in line with the Islamic State’s global agenda. He considers democracy to be the religion of “murtad states” of Central Asia, the Taliban government and Pakistan. He believes that due to committing shirk (idolatry), deviating Allah and doubting Tawheed (God’s Oneness), the leaders of taghut countries should be killed.
Considering Khuroson’s oratorical skills, Takfiri persuasion and ideological savvy, it is quite possible that the ISKP recruitment and incitement campaign will intensify in Central Asia in the near future. Obviously, the engagement between IS-Central and ISKP in the military, media and ideological directions reached a new level in the more permissive operating environment of post-American Afghanistan.
On May 7, the ISKP carried out a second rocket attack, this time into Tajikistan. According to the Central Media Office (Diwan al-I’lam al-Markazi) of ISIS, “Caliphate’s fighters fired seven rockets from the Khawaja Ghar district of Afghanistan’s Takhar Province towards the Tajik military base near the city of Kulob.” The rocket attacks on the territories of Uzbekistan and Tajikistan for three weeks nevertheless mark a clear escalation by ISKP Central Asian foreign fighters from just hostile anti-five post-Soviet “murtad governments” rhetoric to direct militant action.
Notably, the methods of media coverage of both attacks and the engagement between IS-Central and ISKP’s local media resources were clearly similar. The algorithm of their actions was in line with the new ISIS strategy. Thus, IS-Central posted a brief information about the rocket attacks with video and photos, then the Tajik, Uzbek and Pashto-language local media resources of ISKP glorified the “warriors of Allah”. The Uzbek-language pro-Islamic State Telegram channels Islomiy Maruza Davat Guruh, Khuroson Ovozi, Tawheed news, the Tajik-language Telegram channel of Ulamoi Rabboni (إنَّ اللّٰهَ مَعَنَا) actively propagated ISKR rocket attacks, undermining the image and credibility of the military potential of Tajikistan and the Taliban.
These Central Asian pro-IS media resources, supported by IS-Central propaganda bodies and comprised of a constellation of official branch outlets, regional pro-ISKP groups, and grassroots supporters have become a prominent voice aggressively impugning the Taliban’s reputation in the global jihadi world. Such method makes it possible to preserve the hierarchical structure and maintain a uniform media strategy of the global jihadi group. This reflects that after the fall of the Caliphate and a series of dramatic losses of its leaders, ISIS has learned a bitter lesson and is now moving from centralizing power to strengthening its wilayahs.
Apparently, the ISKP seeks to broaden its appeal in Central Asia both through increasing cross-border attacks against Afghanistan’s neighbors and ramping up the production, translation, and dissemination of propaganda directed at Uzbek, Tajik, and Kyrgyz communities in the region. These rocket attacks and ISKP’s propaganda campaigns targeting Central Asians for recruitment are any indicators, the group has become a serious jihadi power challenging not only the Taliban government, but also the post-Soviet authoritarian regimes. Through its Uzbek, Tajik and Pashto-language Telegram channels, the ISKP is conducted an unprecedented activity to recruit Central Asian jihadi groups affiliated with al Qaeda and the Taliban, as well as new radical Islamists from the Fergana Valley.
Future of ISKP Central Asian Jihadists
Obviously, the ISKP is exploiting the US military withdrawal from the region and the Afghan Taliban’s deviation from the hardline jihadi concept by successfully portraying their government as a Pashtun ethno-nationalist organization rather than a bona fide Islamic movement.
In conclusion, it is to be expected that the ISKP will actively capitalize external operations to undermine the legitimacy of the Taliban government, which assured the US and Central Asian neighbors not to allow Afghan soil to be used to attack Afghanistan’s neighbors. Strengthening cross-border rocket attacks has already raised the morale of ISKP fighters and consolidated its support base.
Thus, the new Islamic State’s strategy to strengthen its offshoots in its provinces is quite capable to reestablish its positioning in the broader global jihadi movement, which we see in the example of IS-Khorasan Province.
How Memes Can Spread Dangerous Ideas
Internet memes are an excellent way to send powerful messages to millions of people. But what happens when they are used for malicious purposes?
Memes have been a means of transmitting messages for centuries, proliferating immensely in recent decades due to their mass proliferation through the internet and their ability to broadcast messages to a massive audience. They have quite a bit of cultural significance and can be based on almost anything, provided they achieve viral status. However, memes have been subject to abuse by malicious groups and actors.
From the Blue Whale Challenge, an internet challenge that resulted in multiple suicides worldwide, to terrorist organizations like ISIS, which use internet memes to recruit young people, memes can be used for malicious purposes. Even toxic subcultures like MGTOW serve as a pipeline towards the incel movement. Indeed, such male supremacist organizations are not strangers to using memes and viral media to propagate their ideas and recruit young men and boys to their cause. In fact, one influencer, who goes by Sandman MGTOW, often posts such misogynistic memes and videos on his Twitter and YouTube channel.
These kinds of memes are easily identifiable by their bias towards a specific issue and their often-political message. One great example of a meme that has been subject to abuse by malicious actors is Pepe the frog. Based on a character by Matt Furie, this meme was abused by the alt right, being depicted as controversial figures such as Adolf Hitler and Donald Trump. The meme was so badly abused by these far-right actors that it was listed as a hate symbol by the ADL.
Memes have also influenced major world events like the 2016 election in the United States and the Arab Spring revolutions in the early 2010’s, which garnered immense media attention through the use of internet memes and viral media. This shows that memes can have the power to influence elections (albeit slightly) and topple oppressive regimes. Being a powerful tool for spreading information, there is also the use of memes for spreading misinformation.
The COVID-19 pandemic mediated a sizeable but modest anti-vaccine movement in countries like the United States, Canada, and Germany. These anti-vaxx groups used social media like Facebook and Reddit to spread memes full of misinformation and pseudo-science It can also be argued that memes were effective tools in spreading misinformation around the elections of 2016 and 2020 in the United States. Memes, while powerful, can be used by malicious actors such as far-right groups and anti-vaxx groups to peddle false information. This has contributed to the US having a COVID death toll of over one million, higher than most other countries worldwide.
The world has progressed quite a bit in the information age. People are able to communicate ideas with millions of people worldwide in seconds. The proliferation if information has never been more efficient in history. That is why the threats that arise from the mass proliferation of memes and viral media are so dire. As was seen during the 2016 and 2020 US elections, COVID, and Arab Spring, memes can be spread to convey messages that can change nations, affect millions (perhaps even billions) of people, and topple dictators. It has become possible for people to change the course of history with a single tweet or a single meme on Reddit or Instagram going viral.
What can we do to stem the massive proliferation of memes that serve to recruit people into dangerous organizations and fill their minds with misinformation? The answer lies in how we confront our biases and how we detect misinformation. People need to be informed about how they can detect bias and propaganda, in addition to using independent fact-checking services. By identifying propaganda from malicious actors and misinformation from online groups, we can stop the spread of dangerous memes before they proliferate.
The myth of Lashkar-e-Khalsa
During his recent visit to India, the British Prime Minister Boris Johnson, alluding to Khalistan supporters, said that the United Kingdom would not welcome people who planned to use the UK’s legal systems to evade the law in India. Added that his country had set up “an anti-extremist task force” to help India.
Johnson apparently tried to appease India for not having forestalled Khalistan referendum. Johnson’s remarks reflect how hard it was for him to put up with India’s ennui about activities of the British Sikhs for Justice (SFJ) led by t Gurpatwant Singh Pannu . Khalistanis felt short of voting for an independent Khalistan in England on October 31 last year.
A few Sikhs “smeared” the Himachal Pradesh state assembly (winter).This event amounted to showing a red rag to India’s RAW/IB disinformation sleuths. India media first published reports that agonies have intercepted documents that reflected that Pakistan was planning to set up a new organisation Lashkar-e-Khalistan with recruits, inter alia, from Kashmir and Afghanistan to create unrest in India.* They even suggested that social media would be flooded by such separatist elements. Then came a warning from India’s Intelligence Bureau that “Pakistan’s intelligence agency ISI has formed a new terrorist group, named Lashkar-e-Khalsa that is trying to carry out terrorist attacks in India. Quickly they attributed subsequent “terrorist attacks” and arrests to the ISI/ (Pakistan). “On May 6, four Khalistani terrorists were arrested by the Haryana Police at a toll post in Karnal. The police recovered improvised explosive devices (IEDs), arms and ammunition from the vehicle at a toll plaza in Karnal” and an explosion at the Punjab Police Intelligence Headquarters”.
Analysis and corollaries
The ISI is nowadays itself in the throes of a smear campaign at the hands of some myopic politicos. How could it afford bad relations with India? Even the Pakistan’s army chief and prime minister Shahbaz have vehemently desired to improve relations with India.
The allegations had tell-tale signs that they were false. The “document” about creation of Lashkar-e-Khalsa was never published or shared with Pakistan. It baffles one’s imagination that “terrorists” moved so freely with an explosives laden vehicle to be checked at long last at a toll post. Details of damage to the police headquarters were not published or investigated.
It is significant to recall that the Research and Analysis Wing chief Samant Kumar Goel (Balakote “strike” architect, and Kashmir and disinformation expert) and Intelligence Bureau head Arvind Kumar , reputed to be a counter-insurgency and disinformation specialist, were given a one-year extension in their services.
Goel, a 1984-batch IPS officer from Punjab cadre, would continue to be the Secretary of Research and Analysis Wing (RAW) for a one-year period beyond the presence tenure which ends on June 30. Similarly, Kumar, an IPS officer of Assam and Meghalaya cadre continued to head the Intelligence Bureau for a period of one year after June 30.*
Even prestigious Indian newspapers sometimes publish reports or articles that smack of being pieces of state-sponsored disinformation. Harvard’s criteria for detecting fake news could be applied to disinformation bloomers. Harvard suggests `everyone should vet a publisher’s credibility first and then check all the sources and citations’. James Carson offers tips in his article `Fake news: What exactly is it – and how can you spot it‘? (Telegraph January 31, 2019)
Disinformation camouflaged in Op-Eds is hard to detect as they do not usually quote their sources of information. A case in point is Shishir Gupta’s article `In Imran Khan’s 18-point Kashmir plan for Aug 5, outreach to Turkey, Malaysia and China’, published in Hindustan Times dated July 28, 2020.
Shishir writes, `With Pakistan Army expected to take the back seat, Imran Khan may go to occupied Kashmir [Azad Kashmir] to rake up anti-India sentiment in his assembly address to mark one year of India nullifying Article 370’ (How did he know the contents of the address when it was yet to be delivered).` Pakistan Prime Minister Imran Khan who counts the campaign against India over Jammu and Kashmir as his government’s key achievement has roped in the Inter-Services Intelligence, or ISI, in its 18-point plan to commemorate the Aug 5 anniversary of India scrapping Article 370 that extended special status to the valley, people familiar with the development said. The ISI is Pakistan’s notorious spy agency accused of nurturing terror groups, mostly directed at India and Afghanistan’ (How did he know of the ISI’s connexion?).` Before he reaches Muzaffarabad, Khan’s government intends a field trip for foreign journalists to the occupied territory. Like in the past, the terror training camps funded by the ISI would be off-limits for the journalists’ (Looks like he is well aware of the location of the training camps being there himself?). So on.
Gupta’s credibility: Be it noted that Gupta is `Winner of the 2011 Ben-Gurion Award for journalism’. His affinity for Israel and abhorrence of Pakistan is conspicuous. He was also a member of the International Institute of Strategic Studies, London. The ISS. London published the Pakistan-bashing paper `Nuclear Black Markets: Pakistan, A.Q. Khan and the Rise of Proliferation Networks (A Net Assessment) (An IISS Strategic Dossier) Paperback – January 1, 2007′.
: Following the break-up of the Soviet Union, RAW has concluded that the only way it could weaken Pakistan is to sour Pakistan-USA amity. To achieve this objective, IB/RAW is burning midnight oils to exploit USA’s sensitivity about CPEC and certain ticklish subjects like Hawala transactions for funneling funds to “terrorists’, nuclear proliferation, use of missiles to hit aircraft, nuclear weapons and delivery systems and development of chemical biological weapons. India even conducted mock exercises against the CBW attack .A Press Trust of India report stated `Meanwhile, the police has seized a rare pencil pistol and 25 “chemical” cartridges from a militant hideout in North Kashmir’s Kupwara district, leading to suspicion that militants might be switching over to chemical or biological weapons from conventional arms. The pistol and cartridges, marked “neroxin” were seized from the house of Bashir Khan at Krishipora-Nagrimalpora village, the Sub-District Police Officer, Handwara, Altaf Khan, said today. Khan said during the inspection of the ammunition, one of the police officers suffered giddiness and had to be referred to Army hospital for treatment, leading to the suspicion that the cartridges might be carrying chemical or biological agents’.
RAW’s disinformation campaign is well reflected by innocuous-looking news like”Kashmiri Mujahideen are in possession of stinger missiles”.
Not long ago, EU-based non-governmental organisation EU DisinfoLab revealed an India-sponsored dis-informational network of 265 fake media outlets in 65 countries, including the US, Canada, Brussels, and Geneva. The network was being run by the Srivastava Group of India. It listed New Delhi Times as one of its assets, and also ran a think tank called International Institute for Non-Aligned Studies.
The Institute paid for the travel and accommodation of an unofficial far-right delegation of 23 European Union parliamentarians to Srinagar on October 30, 2013. The trip was arranged by Indian –intelligence surrogate Madi Sharma who posed as a self-styled “international business broker”. The delegation’s shikara (boat) ride in Kashmir Lake (dal) pictured Kashmir as heaven in serene peace. Some members however smelt a rat and abandoned the free joy ride.
Confessions by Indian diplomats
Some Indian diplomats have confessed in their memoirs that they have indulged in nefarious activities against Pakistan. Voracious readers my go through Amar Bhushan’s book Terror in Islamabad. Before being posted to Islamabad, Bhushan had served as an officer of India’s premier intelligence agency Research and Analysis Wing, Border Security Force Intelligence, and State Special Branch for quarter of a century. His book mentions another RAW officer, Amit Munshi (real name Veer Singh) posted as “Cultural Attache”.
India’s ambassador Bharath Raj Muthu Kumar played a role in the Afghan insurgency. With the consent of then foreign minister Jaswant Singh, he
`coordinated military and medical assistance that India was secretly giving to Massoud and his forces’… `helicopters, uniforms, ordnance, mortars, small armaments, refurbished Kalashnikovs seized in Kashmir, combat and winter clothes, packaged food, medicines, and funds through his brother in London, Wali Massoud’, delivered circuitously with the help of other countries who helped this outreach’. When New Delhi queried about the benefit of costly support to Northern Alliance chief Massoud, Kumar explained, “He is battling someone we should be battling. When Massoud fights the Taliban, he fights Pakistan.
India’s national-security czar Ajit Doval publicly claims that he acted as a spy under a pseudonym in Pakistan for 11 years, seven years in Lahore. Doval is a retired director of Indian Intelligence Bureau. He boastfully dons the title of “Indian James Bond”. He lived in Pakistan’s Lahore, disguised as a Muslim for seven years. During his years in the country, he befriended the locals visiting mosques and lived among the predominantly Muslim population. “Acknowledged as a master of psychological welfare” in India, Doval, as a part of his job also spied on Pakistan’s intelligence agency, Inter Services Intelligence. Doval credits himself with brainwashing a group of freedom fighters led by Kukkay Parey who detected freedom fighters and killed them.
Sharing an incident from his time in Pakistan, he said that he was once identified as a Hindu by a local from his pierced ears. Doval then underwent plastic surgery to prevent his cover from blowing. Narrating his account, Doval shared, “I was coming back from a Masjid. A man sitting in the corner, who had an intriguing personality and a white beard, called me. He asked, are you a Hindu? I replied saying no. He asked me to come with him, and took me to a small room and shut the door. He told me, ‘See you are a Hindu. Your ears are pierced.’ The place I come from, as a child there is a tradition to pierce the ear. I told him it was pierced when I was born. He told me, get plastic surgery for this, it’s not safe to walk like that. Then I got it (plastic surgery) done.”
In the late 1980s. Doval snuck inside the Golden Temple posing as a Pakistani agent to the Khalistani militants and passed significant information during Operation Black Thunder in 1988. After his stint as an undercover agent, Doval worked in the Indian High Commission in Islamabad. A close-associate of PM Modi, Doval is also responsible for master-minding the surgical strike in 2016.
To harm Pakistan India is engaged in a virulent anti-Pakistan disinformation campaign. India’s role in precipitating Fatf restrictions on Pakistan is obvious. It appears India has meticulously implemented Hitler’s propaganda theorems: `The bigger the lie, the better the results. The success of any propaganda campaign ultimately depends on the propagandist’s down-to-earth understanding of the “primitive sentiments of the popular masses”. Mein Kampf (pp. 179-180).
India’s Strategic Policy Group, idle since Manmohan Singh’s second term, has been revived (to create troubles in Sindh, Balochistan, and KPK).Indian diplomats routinely flouted diplomatic norms.
Awakened Pakistan Now Needs National Mobilization of Entrepreneurialism
No other time in the history of the nation, a single outsider built so much leadership in a real life...
CSTO anniversary summit: New challenges and threats
The Collective Security Treaty Organization (CSTO) has marked its 30th year, at anniversary summit hosted by Moscow, with renewed multilateral...
Lithuanian MOD admits Armed Forces capability deficit
According to the last public opinion poll, the trust of Lithuanian residents of the National Armed Forces is continuously growing,...
Jordan: US$85 million for a New Industry Development Fund
The World Bank has approved US$85 million in financing for the Jordan Support for Industry Development Fund Project, which aims...
Musings of a journalist – Part 2
The entire idea of writing this is that as journalists we find ourselves finding and scratching other people’s truths. However,...
Investing in Quality Early Childhood Education is Key to Tackling Learning Poverty
COVID-19 has hit the youngest children’s learning the hardest, especially in low-income countries, accentuating the need for actionable and evidence-based...
Implications of remote conformity assessment for developing countries
The United Nations Industrial Development Organization (UNIDO) is pleased to announce the launch of a publication titled “Remote conformity assessment...
Green Planet4 days ago
Marine life is on the brink of extinction: Climate reality is a real issue
Middle East4 days ago
Health Silk Route: China and the Middle East
Southeast Asia3 days ago
Vietnam-US relations and the US-ASEAN Summit
East Asia3 days ago
U.S. Interests and Priorities: Why Ukraine & Taiwan are Similar Yet Different Geopolitical Situations
Intelligence4 days ago
How Memes Can Spread Dangerous Ideas
East Asia4 days ago
The Other Political Parties in the People’s Republic of China: Activities
East Asia4 days ago
China’s neighboring Countries Dialogue on Afghanistan: Driven by the fear of US-EU alliance on the Ukraine Crisis?
Middle East2 days ago
Iran Gives Russia Two and a Half Cheers