To put it in a generic but understandable way, Artificial Intelligence (AI) is a technologically mediated ability (but always present in a digital computer or in a computer-controlled robot) to carry out activities usually typical of an intelligent being.
In this case, the intelligence is the traditional one of the definitions born in the twentieth century in the framework of empirical psychology: logical ability, in the sense of abstraction from the characteristics that science considers “secondary” and hence subjective; understanding, that is the thought correctly imitating the future behavior of the human and non-human movements and reactions present in the external world; emotional knowledge; design, in the absence of an image already present in the external world; finally creativity and problem solving.
As the American pragmatist Charles S. Peirce used to say, understanding or thinking is a form of “talking to oneself” and of symbolically representing – not necessarily reflecting – the inferences that can be found in the external reality.
In Peirce’s mind, all these inferences were probabilistic.
According to the Austrian physicist and philosopher, Ernst Mach, science is instead the process replacing experience with representations and images through which “it becomes easier to handle and manage the experience itself”.
This means that in the transition phase between the nineteenth and the twentieth century, science was no longer interested in the “essence of reality” -interpreted in a reductionist sense – but it created a new reality on its own, easier and more adapted to the human mind and to societal needs.
It was Ernst Mach who applied the criteria for analyzing the data which developed between the nineteenth and the twentieth century in human sciences to physical and chemical science.
In essence, at the end of its epistemological program, the Artificial Intelligence (AI) can reach a complete simulation of the human brain and, in some respects, even outperforms it in its results. Possibly even in the forms of information processing-understanding and hence transformation of what – in a long-standing Western philosophical tradition – is called “reality”.
Hence a “Hyperman”, technologically reminding us of the “Beyond Man” or “Overman” (the Übermenschnever to be translated as “Superman”) theorized by Nietzsche, since the homo sapiens sapiens is evolutionarily unstable. Again to use Nietzsche’s words, what we call “man” is a “a rope, tied between beast and overman – a rope over an abyss”.
However, let us revert to military technology.
The IA technology includes not so much the replacement of man with the thinking machine – an idea probably harboured in some people’s minds – but rather more specific techniques: the Virtual Agents; the processing of Natural Language; the platforms for the “self-learning” machines; robotics; the processing of human and computer perception; neural networks.
Incidentally, the Intelligent Virtual Agents (IVAs) are the programs providing pre-established interactions with human beings, especially on the Web.The Natural Language Processing deals with the computer treatment of natural human and non-human language.
The platforms for the “self-learning” machines use the recognition of external patterns and the computational theory of learning – hence they create algorithms that can learn new rules from a wide set of data and make predictions starting from the already pre-defined patterns and from the data sets that grow indefinitely.
In the current phase of this complex “research project” – just to use the terminology of the epistemologist ImreLakatos – we have reached the following levels: a) we can build systems and robots that are already faster, more capable and more powerful than us. The AI systems are expected to reach our same analytical (and creative) power within 2045. The level of singularity, as this point of noreturn is currently defined.
Moreover, b) we will have robots permanently taking care of us, interacting with our body and reading our emotions. But this already happens. Google Home, the Jibo control center and the Roomba “social” robot are already among us.
Furthermore, c) also on the basis of a huge and always updatable universe of data, we can predict the great global phenomena at natural, cosmological, medical-epidemiological and human-statistical levels or even at economic level.
Wewill soon be able to predict also the human behavior in larger populations -often with great accuracy.
On top of it, d) we will have such exoskeletons or extracorporeal extensions as to improve – as never before – our physical and even intellectual/perceptive abilities.
We will shortly become super-human – not in Nietzsche’smeaning of the concept – but rather in the sense of the most popular science fiction comics of the 1960s. Before technological singularity we will record a merger between AI apparata and our mind-body whole.
In the near future, there will be a stable connection between the human brain and computer networks, as already planned and designed by Neuralink or by the Californian company Kernel, which even study the implantation of AI interfaces in the human cerebral cortex.
Finally, e) the end of work.
However, what will the exchange value of the items processed by the AI machines be, considering that our society is based on Smith’s labor theory of value?
How can we set prices, including the non-monetary ones, if there are no values – the classic theme of political economy and also of Marx, his main critic?
In all likelihood, at strategic and military levels we will have 4 types of applicative Artificial Intelligence: the Artificial Narrow Intelligence (ANI), sometimes also referred to as “weak AI”, is an intelligence working within a very limited context, onlyfor specific and routine functions, that cannot take on tasks beyond its field. It is a specific type of AI in which a technology outperforms humans quantitatively in some very narrowly defined task. It focuses on a single subset of cognitive abilities and advances in that spectrum..
Then there is the Artificial General Intelligence (AGI), also known as strong AI, that can successfully perform any intellectual task that a human being can. Finally we achieve the Super Artificial Intelligence (ASI), when AI becomes much smarter that the best human brain in practically every field, including scientific creativity, general wisdom and social skills.
Hence, in principle, the application of Artificial Intelligence in Defense operations and programming will generally regard a) real military organizations; b) the network of political and intelligence organizations developing around real military structures; c) the whole governmental organization, which is a defense structure in itself.
Finally it will regard the whole system of Defense and Security within society, i.e. the whole network of sensors and AI networks that can be used for protectinginfrastructure, the territory, as well as economic, strategic and intellectual resources.
Currently the major powers’ research focuses on level 1, namely the Artificial Narrow Intelligence – the level at which AI outperforms the human mind and perceptions only in some sectors and only quantitatively.
Nowadays ANI is used to apply Artificial Intelligence mainly to the battlefield and the integration of forces, intelligence and tactical decision-making within “industrial age” technologies.
An evolution which is still included in and confined to the US Revolution in Military Affairs(RMA) that had its true baptism of fire during the two Iraqi wars.
It was at the core of the doctrinal and technological transformations of the Chinese, Arab, NATO and, later, Russian Armed Forces.
It is worth recalling that the RMA was based on the central idea of the Network-Centric Warfare, which sought to translate an information advantage, enabled in part by information technology, into a competitive advantage through the robust networking of well-informed geographically dispersed forces. Therefore the network and the integration between weapons and sectoral and regional commands – hence the de factomerging between the political-military decision-making and the activities on the ground.
This means that there will be a two-fold approach in modern and future warfare: high-technology strikes, which determines the strategic superiority on the field, as well as the whole new low or medium-intensity panoply of political warfare – which operates with the apparent opposite of the Special Forces, on the one hand, and of parallel, civil and rank-and file organizations on the other, including armed citizens, mass operations and operations of influence, the use of local criminal and non-criminal organizations, and the stable “black”, “white” and “grey” propaganda.
Future wars will be more widespread and characterized by swarming, because many regional and local actors, including non-State ones, can afford attack and defense panoplies on the basis of Artificial Intelligence – systems more connected to the link between propaganda and politics and less Clausewitz-style: the separation between warfare and non-warfare will disappear in the future and the armed clash will not be “the continuation of politics by other means” – as maintained by the Prussian general and military theorist – but, if anything, there will be a continuum between armed action and political and economic-social operations.
With new and extraordinarily relevant legal issues: who is responsible for an AI or cyberattack? Can we rely on probabilistic analysis of enemy operations or will there be a “cyber or robotic declaration of war”?
Moreover, AI is a way of rethinking, reformulating and reducing military spending, with smarter and more flexible technologies and better cost effectiveness. Hence we will witness the gradual end of the oligopolistic market of technological and military acquisitions – typical of a traditional industrial world – and the emergence of some sort of market economy, open to even the smallest states, in the old political-military establishment that, as early as the 1950s, Eisenhower accused of directing the Western countries’ foreign policies.
In the market of strategic acquisitions there will be specific room for commercial algorithms which, however, can be applied also to the military universe. Nevertheless, in what we have called the “third level” of AI, that is the integration between government and strategic operations, we will have to deal with algorithms that will rationalize bureaucracy and the decision-making process, both at governmental and operational levels.
This will happen also for what we have defined as the Fourth Level, i.e. the dimension of the ecosystem between politics, technology and the rest of society, which is not normally interested in military operations.
As already noted with reference to China and to the Russian Federation, here AI will deal with social prevention (which is the new way of avoiding the post-Clausewitz mix of clash and political representation) and with social resilience, namely the stability of “civil societies”and their critical infrastructure. Not to mention counter-propaganda.
It was Napoleon-style Blitzkrieg.
However, in the future, it will no longer be sustainable, economically and politically, given the military forces’ economic and social limits we are already experiencing today. Hence the link between the AI-Defense Fourth Level and the previous ones will be between Deep Learning, new wide databases, as well as high-speed and highly performing computers.
Within the framework of the NATO countries’ current defense doctrines, the main AI military actors have paid the utmost attention to information and computer technologies that bring together – quickly and easily – the “effectors”, i.e. those or the things that perform the operations with human or artificial “sensors” – the so-called Network Enabled Capabilities, in the NATO jargon.
Nevertheless, how do the old and new superpowers respond to the challenge of military Artificial Intelligence?
China – the country that best stands up to the USA in this field – established the National Laboratory for Deep Learning, which has been operational since February 2017.
Moreover the Chinese company Baidu and the other Chinese web giants have been entrusted with the task of working with the State in sectors such as automatic visual recognition; recognition based on a vast evolutionary database; voice recognition; the new automated models of Man/Machine interaction; intellectual property in the sphere of deep learning.
In this field everything is based on supercomputers, which China can currently manufacture on its own, after the USA blocked the sale of the Intel Xeon processors, up to even producing their autonomous superprocessor, present in the advanced computer Sunway Taihu Light, which is so far the fastest computer in the world, at least in the field of complex computer networks.
Furthermore China’s 13th Five-Year Plan envisages an expansion of the national AI market to the tune of 100 billion renmimbi, with two specific plans: the China BrainPlan, that is AI military-civilian planning for unmanned networks, as well as cybersecurity and complex society’s governance.
The other level, the second one planned by China, is the use of Artificial Intelligence only for military and strategic superiority.
This is President Xi Jinping’s policy line of the progressive “military-civilian integration”.
The Chinese Armed Forces have also established anUnmanned Systems and Systems of Systems Science and Technology Domain Expert Group, in addition to working hard in the sector of visual recognition for the Navy – above all for operations in “disputed waters” – as well as dealing specifically with the command and control of large-range Unmanned Aerial Vehicles (UAVs).
Missiles are another important sector in China’s AI military policy – above all to respond to the recently-deployed US Long Range Anti-Ship Missile program, which has replacedHarpoon.
In China all this is included in the broader theory of Remote Warfare, which is based on drones and advanced missile networks.
This is currently at the basis of many Chinese strategic choices. Hence – at any distance – hitting targets which are a greater danger for China, as well as for the Forces on the ground and for the politics-warfare link – a danger that cannot be replaced or postponed in response.
The Chinese Armed Forces are and will always be used “to defend the Party”.
Moreover, Israel was the first country- even before the USA – to use fully automated robots and unmanned military vehicles in warfare, besides buildingHarpy, the anti-radiation UAV searching, targeting and destroying enemy radar centers without human control and supervision.
In the near future, the Israeli decision-makers plan to deploy “mixed” battalions, with robots and human soldiers operating together.
Moreover the Israeli Armed Forces have already put in place the system called Automatic Decision Making, employing robotics, AI and deep learning and operating with almost instantaneous speed, which is strategically unavoidable for Israel.
Aeronautics Ltd, an IDF contractor, has already built a series of UAVs having complex Artificial Intelligence algorithms.
IA systems to support political decision-making, as well as techniques for the immediate transfer of data from one computer platform to another, and finally AI technologies for the camouflage of networks and human and non-human operatorsare already operating in Israel.
In the Russian Federation, military Artificial Intelligence has a limit, that is the availability of ultra-fast processors for supercomputers – a problem which, however, is being solved.
Currently Russia is mainly interested in developing the Unmanned Ground Vehicles (UGVs), in addition to the robotic platforms for the integration of the various aspects of the battlefield.
In January 2017, President Vladimir Putin ordered the creation of “autonomous robotic complexes” – just to use the Russian government’s terminology – but for military use only.
With the creation of the National Center for the Development of Robotic Technologies and Basic Robotic Components, Russia is implementing a careful policy of acquisition and independent research in the field of military Artificial Intelligence. A network that already operates for acquisitions throughout the worldmarket.
This is an organization which has been operating since 2015-2016.
Russia has already developed unmanned helicopters and the use of remotely-controlled robot-terminators which target alone – again without human supervision – the targets they have autonomously selected by severity of threat and response to actions on the field.
Finally, after the good results reached with its unmanned operating platforms in Syria, Russia is interested in developing AI systems for border protection, with a series of neural networks automatically referring and reporting to cameras, seismic and human sensors, as well as UAV networks, for an immediate response to threats.
For the USA, the first country to be permanently committed to military AI, the next developments will be in the following areas: a) autonomous machines for deep learning, capable of collecting and processing data and making choices, especially in the framework of the current “hybrid warfare”; b) the development of AI strategic doctrines in the field of man-machine collaboration, with the final implementation of the Centaur network; c) the creation of joint man-machine combat units; d) web-connected semi-automatic weapons to survive cyberattacks.
All these systems will be obviously online and interconnected.
Certainly, nowadays, all the major operators of strategic Artificial Intelligence need to use these networks for the crypto-preservation of real intelligence data, as well as for their classification and also for conflict prevention which, as China maintains, must be “predictive, preventive, participatory and shared between political and military decision makers”.
Moreover, the goals of the new AI military networks include “social resilience”, i.e. the stability of the non-military, namely of the members of the “civil society”, faced with any unexpected shocks and actions of “covertor hybrid warfare”.
What about Italy? It has no real document on National Security to be updated every year or for major crises.
This is already a severe limitation. The “White Papers” already drafted in Italy, however, are always political and government documents. They are often drafted by “external” people not involved in the Defense mechanism, or possibly, by the General Staff and they are more focused on the rather vague spending plans and policy lines, as well as on the Grand Strategy, if any, than on the strictly geopolitical and military doctrine.
Little focus on National Interest and much unrequested loyalty to goals set by others.
Furthermore, at the Ministry for Foreign Affairs, there is a group of experts working on the Italian foreign policy challenges until 2020.
Hence, apart from the specific activities of the intelligence services, in Italy there is no doctrine or project for internal use of the AI technologies, also in view of stimulating our currently very scarce industries in the IT-AI sector.
Another great deficiency – among the many shortcomings of our defense criteria – and also scarce integration with the other NATO and Allied Armed Forces.
Operation Neptune Spear and the Killing of Osama bin Laden
The founder and first leader of Al-Qaeda, And establishing 20-years republican government in Afghanistan: Neptune Spear was the secret name or code of the operation that was carried out under the leadership of the CIA on May 2, 2011 in the Abbottabad region of Khyber Pakhtunkhwa for killing of the leader of the Al-Qaeda group Osama bin Laden. This operation, which was carried out from Afghanistan to the territory of Pakistan by former President of the United States Barack Obama, is generally known as JSOC.
Why this mission was named Neptune Spear?
The reason why the operation to kill Osama Bin Laden, the leader of the al-Qaeda group, was given the name Neptune’s Spear is as follows: The mission was named Operation Neptune’s Spear because it was the emblem of the United States Navy Seal, and Neptune in classical mythology means the god of the sea. In addition, this operation is commonly known as JSOC, because the Joint Special Operations Command (JSOC) is a sub-command of the United States Special Operations Command (USSOCOM), which played an important role in the operation to kill Osama Bin Laden on May 2, 2011.
The Neptune Spear operation started on May 1, 2011 from the American military base in Jalalabad province of Afghanistan, and ended on May 2 in Abbottabad, Pakistan. Former President Obama, Secretary of State Hillary Rodham Clinton, Vice President Joe Biden, Defense Secretary Robert Gates and members of the national security team were monitoring the operation online. All involved in Operation Neptune Spear were 23 SEALs, an interpreter, two helicopters and a combat dog. The operation started from a base of the American forces in Jalalabad, Afghanistan, on May 1, 2011 at 10:30 pm local time, and on May 2, 2011, after 40 minutes long operation, they ended by killing Osama Bin Laden before one o’clock. Who was Osama Bin Laden and how did he become a big threat to the world, especially the United States? Osama bin Laden, the son of Muhammad bin Awad, was born on March 10, 1957 in Riyadh, Saudi Arabia, but some sources close to Osama believe that he was born in 1958. Osama bin Laden had five wives, his first wife was Najwa Ghanim, who married him in 1974, his second and divorced wife was Khadija Sharif, who married him in 1983, and His third wife was Khairya Saber who married Osama bin Laden in 1985. His fourth wife was Siham Saber, who married Osama bin Laden in 1987, and his fifth wife was Amal al-Sadah, who married Osama bin Laden in 2000.
Osama had about twenty male and female children from his first four wives, but according to some sources, Osama had twenty-four male and female children from his fifth wife, and some put the number of children at 26, but the exact report is 24 about Osama’s children. Osama bin Al-Adeen studied economics at Abdul Aziz University, And in addition to this, after receiving education in the field of Civil engineering, politics and Shari’a, he studied partially in English literature at Oxford University in England, But intellectually, he was more encouraged towards the jihadist ways and intellectually he chose the jihadist way. Before Osama Bin Laden left Britain and went to Pakistan to choose the path of war, he showed intellectual interest in the Muslim Brotherhood in Egypt. Moreover, during his university years, he financially supported jihadist groups in South Sudan, Egypt, Syria and a number of African countries, because he inherited 20 to 25 million dollars from his father, And Osama spends a part of that money on construction projects and financially supports terrorist groups with the money received from those construction companies. In 1979, Bin Laden went to Pakistan and stayed with his intellectual and jihadist teacher, Abdullah Azzam, and prepared for the war against the former Soviet Union in Afghanistan, after that, he became friends with Ayman al-Zawahiri and founded the (Maktab-Al-Khadamat) in 1984 with Abdullah Azzam, Ayman al-Zawahiri and Osama bin Laden. After that, he started recruiting fighters for Mujahideen against the Soviet Union in Afghanistan and spent most of his wealth on financing terrorists. After that, Osama bin Laden started a massive effort to establish Al-Qaeda and started recruiting fighters from Africa, the Middle East and South Asia, And he accelerated the search for young people with a fighting and jihadist mindset from all over the world, and he focused on Egypt in order to attract Egyptian engineers. After extensive financial and armed cooperation with other jihadist organizations in Pakistan, in 1988, the Al-Qaeda armed group was activated by Osama, Not only did they continue their attacks in Afghanistan, but they also carried out many bloody attacks in the Middle East and Africa. The bloodiest attack was the 11th of September 2001 and the darkest day in the history of the United States. September 11 or 9/11, on September 11, 2001, 19 Al-Qaeda terrorists hijacked four commercial airplanes, and the first two commercial airplanes and suicide bombers targeted the New York City International Trade Center. The third plane targeted the headquarters of the Pentagon in Arlington County, Virginia, and the fourth plane planned to attack the federal government building in Washington DC, but did not reach the target, And in four attacks, around 3000 Americans were killed and up to 25000 Americans and foreigners were injured. After this attack, Osama was included in the list of the most wanted terrorists by the United States and the Western alliance, a list controlled by the FBI.
After 10 years of intense investigations and intelligence investigations, on May 2, 2011, the US government avenged 9/11 by killing Osama at the ISI’s most secure location in Abbottabad, Pakistan. However, Osama’s body was thrown into the sea before his body should be presented to the intelligence agencies of the world as evidence. But there is some confidential information that Osama bin Laden, the American dictator and the founder of al-Qaeda, was recruited by the CIA in 1979 at the beginning of the US-sponsored jihadist war against Afghanistan, And he was 22 years old and trained in a CIA-sponsored guerrilla training camp. In any case, Osama’s entry into Afghanistan led to the fall of the first Taliban regime, and at the same time, a person who was famous for so dear to Westerners came to power in Afghanistan.
How did Hamid Karzai get from immigration to the presidency?
Common understanding between former President Hamid Karzai and the Central Intelligence Agency of the United States and some untold facts: When the Al-Qaeda group carried out the deadly attacks in New York, Washington and Pennsylvania on September 11, 2001, and the leader of this group, Osama bin Laden, took refuge in Afghanistan. In addition, the first Taliban regime of Afghanistan at that time, under the leadership of Mullah Omar Mujahid, accepted the refuge of Osama Bin Laden. Not only that, the American people knew that the United States and the security agencies of this country would not remain silent, and would soon start preparing for revenge. But before that the United States, the Central Intelligence Agency, the Army, and the Special Operations Command of the United States Army started a response plan, they first proposed to the Afghan government to hand over Osama Bin Al-Adeen to the United States. Nevertheless, the leader and founder of the Taliban, Mullah Omar Mujahid, rejected their request, and for the second time, the United States tried to mediate the Saudi Arabia. The US asked the Taliban government to hand over Osama to the government of Saudi Arabia, but Mullah Omar Mujahid said that handing over Osama Bin Al-Aden to Saudi Arabia means handing over to America.
Furthermore, after rejecting the second proposal, the plan to attack Afghanistan was started by the United States and its allies on October 7, 2001. Just 15 days after the terrorist attacks of September 11, 2001, CIA and US Special Forces personnel were sent to northern Afghanistan, to meet local tribal leaders and local commanders such as Abdul Rashid Dostum and work together, to start a war against the Taliban, who controlled the country and gave shelter to Osama bin Laden. A CIA team arrived with $3 million in $100 bills to use to recruit tribal leaders and strengthen the war against the Taliban, and teams of military units came from the fifth Special Forces Group. The then President of the United States, George W. Bush, together with the head of the CIA, George J. Tenet, made a coordinated decision to overthrow the Taliban government by appointing an influential person from the southwest zone of Afghanistan after the formation of a new government in the country.
That person was Abdulhad Karzai’s son Hamid Karzai who spent a lot of time in exile in Pakistan, not only he was the national leader for the Pashtuns of this side of the border, but he also had a special status among the Pashtuns of that side of the border in Pakistan. This position made him a target of the CIA. After October 7, 2001, members of the Central Intelligence Agency began to secretly visit Hamid Karzai’s house in Quetta and Chaman, Baluchistan, Pakistan, as a result, in July 2002, Hamid Karzai came to power in Afghanistan under the warm support of the CIA and the West, and he remained the president of Afghanistan until September 2014.
World Economic Forum and India steered Indo-pacific Strategy-Centric Policy
According to the sources, CIA members have gone to Switzerland to lead the security of the WEF meeting due to a possible attack. While the meeting of the World Economic Forum or WEF begins on January 16 in Davos, the Swiss Army has started security preparations under the leadership of CIA in the field for the annual meeting of the World Economic Forum (WEF) in Davos. For the WEF meeting in Davos, the Parliament has approved the preparation of 5000 soldiers, and now about 500 soldiers have been deployed to guard the meeting place, led by members of the United States’ Central Intelligence Network. The identities of the CIA Ops are not clear, because if the anti-western countries talk about the WEF meeting, that the security responsibility of the WEF meeting has been handed over to the CIA and only the soldiers will be from Switzerland, then it will increase the challenges to the WEF meeting. Intelligence experts and analysts of intelligence reports believe that this time, the war between Russia and Ukraine in Eastern Europe has led to the possible targeting of the WEF meeting in Switzerland, because in this international economic meeting, a number of economic topics will be also discussed against of Russia and its allies.
What is purpose of the Annual meeting of WEF?
This annual meeting, which is hosted by the Swiss country of Europe, is very important because the international economic companies and political bonds are led through the annual meeting of the World Economic Forum, and for years to come, this World Economic Forum engages leading political, business, cultural and other community leaders to shape global, regional and industry agendas. On the other hand, this annual meeting faces a number of possible risks and challenges, such as the religious war between Muslims and non-Muslims, which affects the economic forum, and the sabotage of the WEF annual meeting by terrorist and intelligence groups.
In addition, after the terrorist attacks in France in November 2015, the biggest challenge to the security of international meetings in Europe, and the current sensitive situation in Europe, the flames of war have started. The impact of the Russia-Ukraine conflict is being felt at the annual meeting of the World Economic Forum in Davos, and European and American business organizations and political processes may use tough measures against Russia. The political and business leaders of the world are worried about the economic future of Europe, because, the series of power division in Eastern Europe is going on rapidly, along with religious extremist non-militant and armed groups are also increasing in Europe, which can easily increase violence in Europe under the pretense of freedom of expression and religion. A clear example of which is the expansion of the Muslim Brotherhood and Hizb-ul-Tahrir groups in Britain, France and Germany. On the other hand, the economic and industrial promptness in Europe is increasing day by day, and at the same time, due to the war between Russia and Ukraine, the lack of energy and the trend of economic stagnation have created a sense of depression among many business leaders.
Other investment destinations also seem uncertain, but India has emerged as a region of both economic dynamism and political stability under the support of the United States, which is currently trying to include India in the P-5+1. Eager to capitalize on this current mood as an economic marketer, India is drawing the attention of world leaders to its reform decisions, and to the rapid pace at which a new unicorn is being created in the country.
Because the West is also trying to weaken the economic side of the European Union, And transfer the European economic and trade zone from Europe to South Asia and open a new economic zone by connecting Iran’s Chabahar port and Gwadar port in the future country of Baluchistan.
In turn, China is reaching the Caspian Sea through Northern Afghanistan to expand its trade with the Middle East by using the Caspian, until to leave and forget of Pakistan’s Gwadar. And the United States is preparing to give a large share in the new economic zone to its close allies from the continent of Europe, such as France, Germany, England and a number of other countries, And before that, with the support of the United States, the UAE signed an agreement with France in the field of energy. In this way, the European allies of the United States will be included in the economic contracting countries of the new economic zone, in order to reach this point; there are now efforts to disrupt the economic agreements under the umbrella and leadership of the European Union.
The current World Economic Forum is looking at a different world than it did in the past, and this is a reason for India to find itself in the sweet spot and take advantage of Europe’s current external status to emerge as a new economic leader. Chain’s future role in the WEF and what will be its alternative approach against India. Before this, Chinese President Xi Jinping focused on the Davos summit; And Xi Jinping again presented China as a champion of free trade, while the United States under the leadership of Donald Trump was seen on the other side of the fence. However, with the end of Trump’s reign, the relations between the China and the West led by the United States have become more complicated, and the challenges to China’s economic development have increased.
Because of that, China is not present as a leading trader in the current Davos summit and is standing behind, and the main reason is China’s tough stance against Taiwan, So the focus of WEF next annual meeting has shifted to India, and India is enjoying potential benefits as an alternative investment destination. In bringing India to this position, the United States has lost its closest ally in the Middle East, Saudi Arabia, and the main reason was the United States allowing India to emerge as the star of EVs in the global economic competition against China until 2030.
Apart from this, another important topic for India is the renewable energy of green hydrogen. Green hydrogen is hydrogen made with renewable energy, India’s plan aims to replace fossil fuels with hydrogen in the production of fertilizer and steel, mix it into city gas supplies and promote its use in transportation. While India’s current production of green hydrogen is low and comes from a few pilot projects, But the country wants to produce 5 million tons of green hydrogen by the end of this decade. The Narendra Modi-led government has recently approved the National Green Hydrogen Mission, which is expected to open up new opportunities towards net-zero goals in the next five decades, which will further reduce the role of China’s green hydrogen market in the international trade market. And India’s economy is estimated to grow by $20-30 trillion over the next three to five decades, which is in line with India’s net-zero commitment. Companies that want to promote India’s green hydrogen policy include Adani New Industries Ltd, Reliance Industries Ltd, Indian Oil Corporation Ltd, ONGC, GAIL India Ltd, Bharat Petroleum Corporation Ltd, NTPC Ltd, Larsen & Turbo, and Hindustan Petroleum Corporation Ltd, Started investing in green hydrogen innovations. These are the economic developments that can introduce India’s presence at the next WEF meeting.
What will be the position of the economic embargo of the United States against Venezuela and Iran at the 2023 World Economic Forum meeting?
After 2022, there is still a big question whether the United States will ease the sanctions on Venezuela and Iran in order to get oil alternative for the economic sanctions imposed on Russia due to the Russian invasion of Ukraine. Earlier, US Secretary of State Anthony Blinken said on March 6, 2022 that the US and its European allies might impose a ban on Russian oil imports in response to the war in Ukraine.
The administration under the leadership of US President Biden was ready to improve relations with Venezuela and ease sanctions after the 2022 WEF meeting because the United States needed Venezuela’s energy reserves. However, currently the question is the relationship between Iran and Venezuela, the negative effects of which can once again make the relationship between the United States and Venezuela difficult, meanwhile, the President of Venezuela, Nicolas Maduro, has recently expressed his willingness to close relations with the United States. However, Iran’s President Ibrahim Raisi, on Sunday, January 8, 2023, in a meeting with the new Venezuelan ambassador in Tehran, warned Venezuela to avoid closer relations with the United States. In addition, the tension in relations with Venezuela will complicate the security situation in Latin America, and these all were the most important factors to the security of the WEF annual meeting, which is currently receiving increased attention.
Heathrow nuclear shipment?
Last month, during routine scanning of cargo at the Heathrow Airport, the British police came across a “very small quantity of uranium “package. The undeclared material was discovered on a passenger flight on December 29, 2022. The Indian news agencies and Daily Mail Online reported “it was destined for an Iranian business with premises in the UK (David Barret, Home Affairs Editor for the Daily Mail and Brittany Chain for Mail Online, Published January 10, 2023). Being “not of weapon grade” the uranium was incapable of being used for improvising a “dirty bomb” (a radiation dispersal device). However, some news agencies and uncanny experts tried to whip up “dirty bomb” scare out of the incident. Hamish De Bretton-Gordon, former commander of the UK’s nuclear defence regiment lent credence to the unfounded scare. He said: ‘Uranium can give off very high levels of poisonous radiation. It could be used in a dirty bomb. Indian news agencies and the Daily Mail Online, in their reports, magnified “a very small quantity” into “several kilograms” of uranium. It was claimed that the package “originated” in Pakistan though it was headed for an Iranian business in Britain.
British Police Commander, Richard Smith clarified: ‘I want to reassure the public that the amount of contaminated material was extremely small and has been assessed by experts as posing no threat to the public. ‘Although our investigation remains ongoing, from our inquiries so far, it does not appear to be linked to any direct threat.
‘As the public would expect, however, we will continue to follow up on all available lines of enquiry to ensure this is definitely the case.
‘However, it does highlight the excellent capability we and our partners have in place to monitor our ports and borders in order to keep the public safe from any potential threats to their safety and security that might be coming into the UK.’ ‘The material has been identified as being contaminated with uranium.’
It is unfortunate that India in cahoots with some foreign media is always in the forefront to exploit such incidents and portray Pakistan as a nuclear rogue. For instance, Time magazine, in its article ‘Merchant of Menace’, reported some uranium hexa-flouride cylinders were missing from the Kahuta Research Laboratories (February 15, 2005). Pakistan’ information minister and foreign-office spokesman both refuted the allegation. The information minister told Geo TV channel, “We have checked all the records and no cylinder is missing from the KRL”. Masood Khan (foreign office) told reporters, “The story is a rehash of several past stories”. May read N-Terror Threat the News International, August 27, 2009
India’s own record is dismal. Let us reminisce a few incidents It is not understood why loss of radioactive material from Indian labs is always out of the magazine’s focus _ According to international media reports (February 25, 2004),
India itself reported 25 cases of “missing” or “stolen” radio-active material from its labs to the International Atomic Energy Agency (IAEA). Fifty-two per cent of the cases were attributed to “theft” and 48% to “missing mystery”. India claimed to have recovered lost material in twelve of total 25 cases. She however admitted that 13 remaining cases remained mysterious.
Pot calling kettle black:India’s radio-active bazaar
India has a sprawling civil and military nuclear programme that spreads over several states. In an article in The Diplomat, Sitara Noor highlighted shortcomings in safety and security of India’s nuclear facilities (India’s radio-active bazaar: Recurring incidents involving theft and sale of nuclear materials demonstrate why India must develop an independent nuclear regulatory body.)
<thediplomat.com/2022/03/India’s radio-active bazaar> [Accessed 14 January 2023].
She says: ‘While global markets are taking a dip due to economic recession, India’s illicit uranium market seems to be flourishing. In February, eight people including two Indian officials were apprehended in Nepal for illegally possessing and attempting to sell“uranium like substance”. The material was reportedly smuggled from India. This was not just one-off incident _ theft and sale of nuclear and radioactive material in India is a recurring phenomenon. Earlier in May 2021, reports of the seizure of 7 kilograms of highly radio-active uranium worth 210 million Indian rupees from a scrap dealer raised serious concern about India’s nuclear security capabilities. Over the past two decades over 200 kilograms of nuclear and radio-active materials has reportedly disappeared from Indian facilities. Frequent incidents of loss and theft of nuclear and radio-active materials in India indicate the failure of the nuclear security systems at multiple levels. First there seems to be a gap in the material accounting and control systems to ensure that not even an iota of material is left unaccounted. Second, the nature of incidents in India hints at the involvement of insiders_ someone working at the nuclear facilities or mining sites working independently or colluding with an outsider. This indicates the serious risk of insider threat and a failure of the personnel reliability program. Third, the recurrence of nuclear security lapses with such impunity indicates serious issues with nuclear security culture in India…’
Is Dirty bomb a hoax?
Opinion about the effects of a dirty bomb is divided.
A report by Henry Stimson Center, Washington (followed by several other reports) laments “…Nuclear and radiological terrorism remains a frightening possibility in India and Pakistan, and the source material for nuclear terrorism could come from illicit transactions of poorly protected materials originating outside the region, as well as material from within the region used for military or civilian purposes”.
This report was provided to the US Senate Foreign Relations Committee to facilitate the Cooperative Threat Reduction Program on nuclear proliferation in South Asia.
The report concludes that “although India and Pakistan have established regulatory bodies to deal with the safety and security of their nuclear materials,’ these may not be sufficient to protect against every potential threat”.
Another report, authored by Kishore Kuchibhotla, Ph.D (Biophysics) from Harvard, and Matthew McKinzie, a nuclear physicist serving as a staff scientist with USA’s Nuclear Program at the Natural Resources Defense Council, argues that “…three other types of events could prompt unintended escalation in South Asia: a terrorist use of RDDs (radiological dispersal devices); a terrorist detonation of a nuclear weapon; and the accidental explosion of nuclear arms — for example at military bases in either India or Pakistan… The report points out that while nuclear weapons themselves are closely guarded, all sorts of radioactive material could be found in research laboratories and hospitals that could provide the basic materials for the making of a dirty bomb…. Nearly 10,000 radioactive sources are used throughout India of which about 400 are particularly worrisome…” The report predicts that “…dirty bomb detonation in Karachi, New Delhi, Mumbai and Islamabad” could result in “casualties that at the very minimum would number in the tens of thousands”. It is eerie to note that The Time (Pentagon) correspondent Mark Thompson asserts in his article what is a ‘Dirty Bomb, “It’s unlikely to kill 10,000 people”.)
It appears that the concern about the “dirty bombs” is overblown. History of terrorism reflects that “terrorists” are interested in symbolic targets (which could yield widespread publicity), not in mass killing (vide Verindre Grover’s Encyclopaedia of International Terrorism).
A “dirty bomb” is not known to have been tested by any country or detonated by any “terrorist” anywhere in the world. So, its composition and scope of its destructive power is shrouded in mystery. However, it is generally believed to “consist of a bomb made of conventional explosives such as TNT, salted with radioactive material”.
Contrary to the “dirty bombs”, fall-out of the tested A-bombs is well recorded. The major powers declared moratoriums on nuclear-bombs testing only in 1992. The pre-1992-period test scoreboard of the USA, former Soviet Union, France, and Britain is an explosion every 18 days, 21 days, 61 days, and 331 days (R Venkataraman Nuclear Explosion and its Aftermath).
It is much easier and cheaper to make a chemical or biological bomb than a “dirty bomb” (It is believed that the chemical bombs used by Saddam’s Iraq against Iran were made with Indian know-how). Though a “dirty bomb” has never been used by any “terrorist”, a bio/chemical bomb was actually used by Japan’s former doomsday-cult Guru Shoko Asahara. The Guru stands sentenced to death “for masterminding the deadly 1995 nerve/chemical gas (sarin) attack on the Tokyo subway and a string of other crimes that killed 27 people”.
The cult’s quest for biological weapons was overshadowed by its chemical attack capability. The cult members were trying to develop botulinum toxin by utilising toxin of green Mamba snake and poisonous mushroom spores,
Regarding use of chemical/biological weapons by “terrorists”, Professor Ramesh Chandra points out in his Global Terrorism (volume 1, page 27), “The US government indicates that these weapons are well within the reach of terrorists. According to the Central Intelligence Agency, ‘Terrorist interest in chemical and biological weapons is not surprising, given the relative ease with which some of these weapons can be produced in simple laboratories… Although popular fiction and national attention have focused on terrorist use of nuclear weapons, chemical and biological weapons are more likely choices for such groups’”.
Not only sarin, but also several other chemical agents like mustard, tabun, soman and VX are capable of dual use as pesticides and as a chemical weapon. Chandra (op. cit., page 30) points out, “chemical warfare agents ‘can quite literally be manufactured in a kitchen or basement in quantities sufficient for mass-casualty attacks”. Experts agree that it is more difficult to manufacture Sarin gas, used by the “terrorists” in Japan, than mustard, tabun, soman, et al. To some experts, an effective bio-terrorism facility could be built at $ 200,000 to 2 million.
Biological weapons, too, are easier to manufacture than “dirty bombs”. Viruses could cause smallpox, Venezuelan equine encephalitis and hemorrhagic fevers like Ebola. The threat of biological weapons is obvious from the fact that: (1) The charges for anthrax, Q fever (Coxiella burnetti) and Venezuelian equine encephalomyeletus cultures from a leading US culture collection are about $ 45, $ 80, and $81 respectively. Besides, nature abounds with microscopic killers. Bacillus anthracis resides in hides and carcasses of wild or domesticated animals and plagues in prairie dogs, chipmunks, black rats, deer mouse and coyotes. Chandra (op cit) states that “The cost estimates for a bio-terrorism facility vary quite widely from $ 200,000 to $ 2 million…Instructions for how to mass produce, purify, and concentrate microbes can be found in textbooks and scientific journals”.
The Heathrow nuclear material is now seen as ‘deadly’ but the UK-based media agency reported that the uranium was ‘not weapons-grade’ – and so could not be used to manufacture a thermo-nuclear weapon, as per sources.
It appears that disproportionate emphasis on mythical “dirty bombs” vis-à-vis chemical / bio- bombs is meant to press and exploit non-major or nuclear-threshold states. “Dirty” or clean bomb attacks by “terrorists” need to be understood and explained within the broader frame of “terrorism”.
The US authorities have recorded over 175 cases worldwide of nuclear materials (not bombs) being smuggled out of former Soviet Union territories and other countries. The Federation of American Scientists, nevertheless, admits that “radiological attacks could result in some deaths but not hundreds of thousands of casualties that could be caused by a crude nuclear weapon” .
The US scientist concluded, “Significant quantities of radioactive material have been lost or stolen from US facilities during the past few years. Radiological materials are stored in thousands of facilities around the US, many of which may not be adequately protected against theft by determined terrorists’ ‘. Materials like Iridium-192, Cobalt 60 (Gamma emitter), Cesium-137 (Gamma emitter), Americium (Alpha emitter) and even plutonium could still be stolen from over 21,000 laboratories, food irradiation plants, oil drilling facilities and medical centres in the USA. But, it is not an easy job to make an effective “dirty bomb”.
It appears that “dirty bomb” is a hoax to exploit nouveau-nuclear or nuclear-threshold nations. It could be a weapon of mass disruption, but not a weapon of mass destruction. Real threat emanates from chemical or bio-weapons.
Indian Republic Day: A Black Day for Kashmiris
India celebrates ‘Republic Day’ on January 26th every year to commemorate the day when the Constitution of India came into...
A Brief History of British Imperialism in India
The British Empire The British Empire or Kingdom was an imperial entity that changed the global order in every way...
Political Scientist: Taliban Rule will lead to terrorism activation in Pakistan
The strengthening of terrorist activity in the northwest of Pakistan and the country as a whole is linked with reinforcing...
F.B.I. Official’s Indictment Shows oligarch infiltrated the highest echelons of the government
The search for kompromat on his opponent in a conflict with shareholders was highly regarded by Russian aluminum magnate Oleg...
FOCUS magazine: This is how war becomes U.S. business
Former President Calvin Coolidge’s sentence has been applicable for centuries: “After all, the main business of the American people is...
7 ways to earn cryptocurrency without risks
Today we will talk about earning opportunities with the help of cryptocurrencies and technologies related to them. AirDrops The first...
Are we going into another economic recession? What history tells us
An economic recession or depression is a period of economic decline, typically characterized by a decline in the gross domestic...
Europe4 days ago
Serbia must reject the ultimatum regarding Kosovo
Economy4 days ago
Free-Market Capitalism and Climate Crisis
Science & Technology4 days ago
Deployment of 5G Technology: Scrutinizing the Potential Menace & Its Repercussions globally
Europe3 days ago
Davos more of a show, no longer so important
Diplomacy4 days ago
The Dilemma of Science Diplomacy: Between Advancement of Humanity and The Source of Rivalry
Eastern Europe4 days ago
A turning moment in Ukraine Crisis
South Asia3 days ago
Saudi-Chinese Friendship: Should India be Concerned?
World News3 days ago
Sabah: ‘The Americans have deceived themselves, the Europeans and Ukraine’