Some considerations on Big Data.
As is now well-known, it is a technology which mainly deals with collecting, processing and selecting a huge quantity of different data.
As in some Hegel’s works, here Quantity immediately becomes Quality. The mass of data and the link between them change – hence also its meaning and use change.
A technology or, rather, a series of technologies joined together, which processes many terabytes (2 at the power of 40 bytes, equivalent to 1,048,576 megabytes) at the same time. A huge amount and, above all, simultaneously. Another type of quantity that is immediately turned into quality.
After the creation of the International Telecommunication Union in Geneva in 2017, still led by the Chinese Houlin Zhao, we have some addition alfacts to evaluate the extraordinary relevance of the Big Data Science.
Meanwhile, just the everyday processing-collection of huge amounts of news allows -also by comparison only – the discovery of many new data and often even of industrial or state secrets.
Moreover, if data can be treated with different chains of meaning at the same time, it will be revealed in all its importance and, often, in roles different from those with which we are used to interpret it.
This is obviously essential to make the economic, financial, political, military or intelligence leaders’ analyses and decisions accurate and effective.
Approximately 90% of the data currently present in the world has been generated over the last two years. It seems impossible, but it is so.
Furthermore, every day 2.5 quintillion of new news (every quintillion is 10 at the power of 13) add to the big data networks alone, but 80% of this mass is non-analyzed and cannot be studied with the usual comparative technologies, whatever the speed with which we employ them.
According to other models for analyzing the global news flows, in 2010 over 1,2 zettabytes – i.e. 10 at the power of 21 bytes, equivalent to a sextillion of bytes – were produced in one year only, while in 2020 a total of 35 zettabytes a year will be produced.
Hence the larger the quantity and the form of big data, the lower our ability to use it, if not with very advanced technologies. However, the larger the quantity of big data, the greater the need to choose the policies to be adopted on the basis of these quantities.
Hence, if the world produces all this data, it is inevitable to consider at least the reason for its huge dimension. Hence even the problems are as big as Big Data.
Just think of environmental and ecological issues or of energy and Internet networks.
It seems almost a paradox, but it is inevitable that nowadays the political, military and strategic decision-making is based on a quantity of news by far exceeding what – in the best cases – happened in the twentieth century alone.
Governments, however, mainly need the intrinsic predictive ability these new technologies have.
Certainly big data is currently needed – for example – to predict-manage car traffic in large areas and to organize health, as well as for protection from terrorist attacks or even for environmental protection and protection from natural disasters.
Nevertheless, the Big Data technology is particularly useful for evaluating the development trends of very complex phenomena – trends which become visible and statistically relevant and which are anyway generated only on the basis of huge amounts of data.
However, we are heading for decision-making quantification which is possible, both technologically and ethically, because the huge amount of data collected is anonymous, already structured and, above all, processed for strictly statistical purposes.
With specific reference to military and strategic defense and to intelligence, in particular – which are already the strength of big data technologies – the progress in news gathering stems from the creation of the new In-Q-Tel company “incubator” – at least for the main US intelligence service, namely CIA.
It is the non-profit company which analyzes and later invests in the most technologically advanced projects, or at least in those where there is some relevance for intelligence.
The initial idea for investing in Big Data – at least for the USA and its agencies – was to avoid the most serious mistakes of Human Intelligence (Humint).
As had already happened in Iraq or, previously, in the Lebanon. Still today, however, data is catalogued according to the old system which divides it into structured, semi-structured and non-structured data.
The first class is the one in which each storage element has at least four singular characteristics identifying it. The second class has only some designation features, which are never fully used.
The class of news that currently expands most is obviously that of non-structured data.
Nevertheless the sequence of news to be gathered is more complex: in addition to the typical intelligence collection, there is the operation of cleaning, noting and representing data in such a way that it is readily available for analysis. Furthermore data needs to be processed and specific algorithms to be created, while mechanisms of news similarity must be developed so as to extrapolate the news needed, which are probably not known to human users.
A technology known as data mining.
Algorithms also operate to create data collection models for computers, which can continuously teach computers how to refine their search.
This is what is known as machine learning.
Computers learn from a set of data, defined as “examples”, in an automatic process called learning – hence they automatically adjust their algorithms so as to attribute values and categories already known to examples not yet classified, without deleting or changing the incoming data.
In more practical terms, the thematic big data collections and the creation of examples can permit the wide use of the automatic transcription of audio conversations, with a view to making them usable through key words. Then a sentiment analysis can be made through the reactions on social media. Hence mapping the reaction of the population to an event, a stance, a future law or a future trade war.
There is also – among others – the Geofeedia software, another example of sectoral use and machine learning in the Big Data sector, which is a platform enabling analysts to check the social media in geo-localized areas.
In the case of the analytical process, the large “trawlers” of Big Data are mainly needed to define the most probable strategic scenarios in the future or to create more specific and operative working assumptions in the intelligence field, or to analyze the opinion trends of the public and of the debate within the party and Parliamentary ruling classes.
All this is certainly not enough, because the intelligence that matters is like the black pearl or the black swan, or the particular correlation that – if tested within a range of options – creates the most rational choice or, possibly, even the most obvious one for the leadership of an opposing country.
Here the issue does not lie in collecting all the stamps of New Guinea, but to find the penny black that nobody had seen so far.
Nevertheless the analysis of the popular sentiment, or of the most obvious development trends of a social, financial or natural phenomenon, certainly guarantees that these options will be very probable and above all less “polluted” by adverse operations.
Or is this not the case? Indeed, the trolls’ actions are mainly related to the hybrid war and to the great operations of what -at the time of Cold War – was called dezinformatsjia, literally “disinformation” in Russian.
However, while in a pre-IT phase before the world dimension of the World Wide Web, doing disinformation meant targeting a certain sector of the adversary to fill-saturate it with fake news, which would naturally lead to a wrong decision (to be manipulated as enemy’s mistake or incapacity) or to a decision-making block, or to the decision that the Enemy wants you to take. Everything changes, however, with the trolls, which are a result of Big Data.
Trolls are anyway subjects who interact on the Web with the other participants without disclosing their identity.
Hence the trolls always operate with huge amounts of data that shield them from others’ sight. They enter the social media of vast user communities and finally react so as not to ever disclose their true nature. They often split and create other trolls.
Hence currently online dezinformatsjia operates with large data sets, such as Big Data, and affects the vast masses of Web users with a view to changing their perceptions, their political action – even on the Web -as well as blocking any reaction in the masses penetrated by an Enemy and, indeed, create a new self-image for them.
Much data, many features with which to hide the new identity of users-adversaries – and the more they are flooded with data, the more they will forget their old identity.
This is the action of a troll in the “hybrid war” and hence in what we could today define as an automated “mass psychological war”.
Currently there is both a symmetrical and opposite relationship between the Big Data of two enemy countries – as in the series of frescoes known as The Allegory of Good and Bad Government, painted by Ambrogio Lorenzetti and hosted in Siena’s Palazzo Pubblico.
On the one hand, the Angels ensuring justice – the typically Aristotelian, “commutative” or “distributive” justice – on the other, the Bad Government, the devilish tyrant who administers cruelty, betrayal and fraud, which are the opposite of the three theological-political virtues of the Good Government.
Hence, in more topical terms, Big Data is an extraordinary equalizer of strategic power – there is no longer small or large country, nor even non-State communities, compared to traditional States, which cannot wage a fight – even invisible to the most – with major powers.
Nevertheless, reverting to the current strategic and technological situation, Big Data will have many unexpected effects, at military and geopolitical levels, that we can summarize as follows: a) all “high” and “low” communication will become mobile and geo-localized social media.
Hence, in the future, intelligence will increasingly deal with the selective dissemination of its data, as well as with their careful spatial-personal determination and with their specification according to areas and receptors.
We will have an increasingly tailor-made intelligence. Furthermore, b) the Big Data challenge is somehow the opposite compared to the old Cold War-style technology.
While, in the past, the data collected ranged from Much to Little, looking for the confidential or secret information that changed the whole geopolitical perspective, nowadays it ranges from Much to Much, because the collection of declassified data – if well-processed – generates confidential news and information that are often unknown even to those who generated them.
Currently the secret is a whole technology, not just a mere datum or fact.
It is a technology changing according to the data it processes, precisely at the moment when it processes it.
Furthermore, c) the future “Big Data” solutions will be modeled and increasingly user-friendly.
They will often be intuitive and hence available also to medium-low level operators in the field.
The old division between “analysis” and “operations” will no longer exist. The true or fake news will be so manifold as to become – as such – war actions.
No longer messages to the ruling classes, but mass signals to the masses or selective operations for individual groups.
Moreover, d) the all-pervasive nature of the Web will be such as to create both new information opportunities and unavoidable “holes” that the Enemy will exploit easily.
Nor should we forget the use of other new technologies, such as laser optical space communications, which will make military and “service” communications safer – although further challenges, such as the new encrypted and adaptable “Internet of things”, will already be on the horizon.
In essence, in the intelligence field, Big Data will match the human operators’ analytical potential, thus making them often capable of operating in restricted and selected areas with a speed equal to that of the perceived threat.
A sort of “artisanalisation” of the intelligence Services’ analysis, which will incorporate more data from the action field and will be ever less controllable ex-ante by some central political authorities.
Again thanks to the huge amounts of incoming data (or data targeted to the Enemy), there will be vertical integration between strategic analysis and top political decision-making, while both analytical and operational choices will be entrusted to local units, which will see an ever-increasing integration between operators and analysts.
We must not even forget, however, the real military technologies: the analysis of social networks, which can be automated, at least at the beginning, and manipulate both the popular sentiment and the adversary technologies.
Furthermore the automatic update of the weapon systems networks, increasingly integrated via the “Internet of Things”, as well as intelligence and the analysis of trends for tactical operations. Finally the activity based intelligence, i.e. a methodology – again supported by IT networks – which allows the analysis of even microscopically anomalous behaviors of the enemy’s small patterns of life.
There will be new types of analysis and hence new collections of large (and new) data.
Hence not only Big Data, but new storage for new classes of data.
Moreover, we should not forget a real cultural revolution that all what is very advanced technology will make absolutely necessary.
Hence, while in the past the intelligence area was well defined and regarded a (not always easy) correct perception of the national interest or the position of one’s own stable international alliances, currently – thanks to Big Data -all this becomes not obsolete, but anyway very different from the logic of Nation-States.
Nowadays, for example, the analysis of intelligence Services – at least of the most advanced ones – will be increasingly oriented to the creation-verification of the different fault lines of the opposed public opinions, or to a new sector we could define as “political intelligence”, which is no longer just the manipulation of the enemy ruling classes, but not even the current mass dezinformatsjia spread through Big Data.
In the future, I already see the creation of diversified managerial classes from outside, with the distribution of technologies which is allowed or forbidden depending on the geopolitical choices of one or more adversaries. Hence we shall imagine a new intelligence which, unlike what currently happens, plays a role in the determination of the international “value chains” and in the global distribution of work, but above all of the technologies that enhance it.
Everything will take place ex ante and ever less ex post. Nevertheless this implies a transformation of the ruling classes and hence a profound change in their selection.
Russian Hackers: The shadowy world of US and Gulf hacks just got murkier
The covert Qatar-United Arab Emirates cyberwar that helped spark the 13-month-old Gulf crisis that pits a Saudi-United Arab Emirates-led alliance against Qatar may have just gotten murkier with the indictment of 12 Russian intelligence agents by US Special Counsel Robert Mueller.
Mr. Mueller’s indictment provided detail on website DCLeaks that was allegedly registered by Russian intelligence officers. The website initially distributed illicitly obtained documents associated with people connected to the Republican Party and later hacked emails from individuals affiliated with the election campaign of Democratic presidential candidate Hillary Clinton.
“Starting in or around June 2016 and continuing through the 2016 U.S. presidential election, the Conspirators used DCLeaks to release emails stolen from individuals affiliated with the Clinton Campaign,” the indictment reads.
The indictment focusses exclusively on hacking related to the US election that in 2017 brought Donald J. Trump to office. It makes no mention of hacking related to the 13-month-old Gulf crisis that pits a UAE-Saudi-led alliance against Qatar.
Yet, the indictment’s repeated references to DCLeaks raises the question whether there may also be a Russian link to the hacking last year of Yousef al-Otaiba, the UAE’s ambassador to the United States.
Mr. Otaiba’s revealing and potentially damaging emails that seemed to help Qatar in its public diplomacy campaign were distributed to major media and analysts, including this writer, by an entity that identified itself as Global Leaks.
Questions about a potential link between Global Leaks, DCLeaks and Russia stem not only from Global Leak’s use of a Russian provider that offers free email service but also by the group’s own reference to DCLeaks. The group’s initial email had ‘DCLeaks’ in its subject line.
It remains unclear whether the use of a Russian provider was coincidental and whether the reference to DC leaks was meant to mislead or create a false impression.
Global Leaks initially identified itself in en email as “a new group which is bringing to limelight human right violations, terror funding, illegal lobbying in US/UK to limelight of people to help make USA and UK great again and bring justice to rich sponsors of crime and terror.”
When pressed about its identity, the group said that “we believe that (the) Gulf in general has been crippling the American policy by involving us in their regional objectives. Lately it’s been (the) UAE who has bought America and traditionally it was their bigger neighbour (Saudi Arabia). If we had to hurt UAE, we have so much of documents given by source that it will not only hurt their image and economy but also legally and will for sure result in UN sanctions at the least. But that is not our goal.
Our goal is plain and simple, back off in playing with American interests and law, don’t manipulate our system, don’t use money as a tool to hurt our foreign policy…. It may be a coincidence that most things (we are leaking) do relate to UAE but in times to come if they continue and not stop these acts, we will release all the documents which may hurt all the countries including Bahrain and Qatar,” the group said.
Global Leaks’ allegation that the UAE was seeking to suck the United States’ into Gulf affairs predated reports that Mr. Mueller, the special counsel, was beside Russia also looking into whether George Nader, a highly paid Lebanese-American advisor to UAE Crown Prince Mohammed bin Zayed, had funnelled funds to the Trump campaign.
Mr. Mueller is further investigating a meeting in the Seychelles between Blackwater founder Erik Prince and Kirill Dmitriev, CEO of the Russian Direct Investment Fund, the country’s sovereign wealth fund, that was brokered by the UAE. Messrs. Prince and Dmitriev have denied that the meeting had anything to do with Mr. Trump.
Mr. Trump has not publicly addressed reports that his election campaign may have received Gulf funding but at a news conference with Russian President Vladimir Putin on Monday, Mr. Trump declined to endorse his government’s assessment that Russia interfered in the 2016 presidential election, saying he doesn’t “see any reason why Russia would be responsible.”
A British public relations watchdog, Spinwatch Public Interest Investigations, said, in a report published this week detailing UAE lobby efforts, that the Emirates since the 2011 popular Arab revolts had tasked public relations companies in the United States and Britain with linking members of Qatar’s ruling family to terrorism.
The lobbying effort also aimed to get the Qatar-backed Muslim Brotherhood banned, involved UAE threats to withhold lucrative trade deals from Britain if allegedly pro-Brotherhood reporting by the BBC was not curtailed, and targeted journalists and academics critical of the Gulf country, according to the report.
US intelligence officials said the UAE had last year orchestrated the hacking of Qatari government news and social media sites in order to post incendiary false quotes attributed to Qatar’s emir, Sheikh Tamim Bin Hamad al-Thani. The hacking provided the pre-text for the UAE-Saudi led economic and diplomatic boycott of the Gulf state. The UAE has denied the assertion.
US and Qatari officials said earlier that Russian hackers for hire had executed the attack on the Qatari websites. Cybersecurity experts said at the time that the hackers worked for various Gulf states. They said the methods used in the hacking of the Qatari website and Mr. Otaiba’s email were similar.
“They seem to be hackers-for-hire, freelancing for all sorts of different clients, and adapting their skills as needed,” said security expert Collin Anderson.
Two cybersecurity firms, ThreatConnect and Fidelis Cybersecurity said in 2016 that they had indications that the hackers who hit the Democratic National Committee were preparing a fake version of the U.A.E. Minis Britaintry of Foreign Affairs website that could be used in phishing attacks.
The UAE-Qatari cyberwar was indeed likely enabled by Russian hackers working for their own account rather than in coordination with the Russian government. It is however equally possible that the same hackers also put their services at the disposal of Russia.
None of what is known about the murky world of Russian hackers is conclusive, let alone produces a smoking gun. The various strands of Mr. Mueller’s investigation, however, suggest grounds to query not only Russian cyber efforts to influence the US election but also the involvement of Russian nationals in the cyber war in the Gulf and potential links between the two operations.
India’s Nuclear Imperilment
Recently, a uranium smuggling racket was busted by the Kolkata police with one kilogramme of radioactive material. According to the reports, smugglers were trying to sell uranium, which has a market value of INR 30 million ($440,000).
The theft of highly sensitive material especially uranium is frequently happening in India.In November 1994, Meghalaya Police seized 2.5 kg of uranium from a gang of four smugglers in the Domiasiat region. Police in the Indian state of West Bengal in June 1998, arrested an opposition politician who they say was carrying more than 100 kilograms of uranium. In July 1998, the CBI unearthed a major racket in theft of uranium in Tamil Nadu, with the seizure of over eight kg of the nuclear material. In August 2001, Police in the Indian state of West Bengal arrested two men with more than 200 grams of semi-processed uranium. In December 2006, a container packed with radioactive material was stolen from a fortified research facility in eastern India.
Similarly, in February 2008 the police seized 4 kg of uranium in Supaul district along the Indo-Nepal border.Police in the north-eastern Indian state of Meghalaya said in September 2008 that they have arrested five people on charges of smuggling uranium ore.In December 2009, the Navi Mumbai Crime Branch arrested three people for illegal possession of 5 kg of depleted uranium.Around 9 kg of radioactive uranium, a banned material, was seized from two persons in Thane, in December 2016.
India is operating a plutonium production reactor, Dhruva, and a uranium enrichment facility that are not subject to IAEA safeguards. India’s buildup of South Asia’s largest military complex of nuclear centrifuges and atomic-research laboratories is somehow threatening efforts related to nuclear security and safety. These facilities will ultimately give India the ability to make more large-yield nuclear arms & hydrogen bombs. The international task force on the prevention of nuclear terrorism is of the view that the possibility of nuclear terrorism is increasing keeping in mind the rapid nuclear development by India. Whereas, U.S. officials and experts are of the view that India’s nuclear explosive materials are vulnerable to theft.
Contemporary Indian internal situation is worsening day by day because of the intolerance and extremism. Likewise, India has more than 65 active terrorist groups operating in different states including the location of nuclear installations. These terrorists may possibly gain access to nuclear materials and use them against civilian and military installations. In January 2016, we have seen a controversial Pathankot Airbase attack, which also shows that Indian intelligence had badly failed to provide true information about terrorist networks.
Nuclear facilities must be guarded closely and the people who are working in these facilities must maintain secrecy. However, in India, nuclear facilities are guarded by Central Industrial Security Force (CISF) and CISF guard admitted that security at the installations needs more enhancements. Mysterious deaths of Indian nuclear scientists is a matter of concern as some were reported suicide and some were murdered. The possibility of nuclear secrecy gets out in the hands of terrorists cannot be ignored.
The Naxalites – India’s Maoists from the Communist Party often target the police and military bases. Though most terrifying revelation was by the EU report that seven Indian companies were involved in funding to ISIS for making bombs. Previously Indian companies were involved in illicit nuclear trade with Iran, Iraq and Libya. So the situation will be a lot worst if the Indian companies provide any chemical, biological or the nuclear material to ISIS
Several of these incidents clearly indicate the failure of the Indian nuclear security agencies. Thus the focus of mainstream media and Western governments should be the Indian nuclear program’s flawed security, expansion and rapidly increasing nuclear weapons technology.
Know the psychology of ISIL
In my opinion, the “ISIS phenomenon” is not new; it distinguishes the factors of this group; for example, the audience of the world’s television networks is watching films that ISIS itself publishes. They have internet sites that send their films and photos to the world. On the other hand, the region is full of journalists because both the Syria war is underway and the Middle East regional issues are so important, so journalists can cover the moment.
In addition, the strategic importance of the Iraqi state and its oil resources was due to the fact that ISIS had its first attacks on oil and refineries, but it was effective in triggering their actions, but the thing that shook the world more than anything else, A pattern of behavior that the group represented during the capture of places; films from ISILs that were showing them on the road and checking cars, while carrying laptops with names of those who worked with the government, or any kind of their thoughts It was different from the ideology of ISIL.
The members of the group matched the driver identification card with the list of these names, and if their names were on this list, they would have been executed without trial!
These films spread throughout the world, and the wonder of the whole world prompted which ideology and religion could be, according to which, people were allowed to kill someone by merely naming and without trial, killing someone along the road and rejoicing.
The problem is that the members of this group, other than themselves, do not know the rest of the people as religious and religious, so they assume any violence and murder as loyal to their religious ideology, while many Muslims around the world, especially their classroom, are astonished at these actions and never do such acts godly and on the basis of religion and hate them.
Is Isis a Terrorist?
“Terror” means the creation of horror and fear. In fact, terror means the use of unexpected, shocking and unlawful violence against civilians to force a state or a society to accept demands based on an ideology.
But what does a terrorist want from a psychological point of view, what happens in society and what is his goal? They create psychological phenomena in society, through which they pressure the people and civilians to push them on to governments, and ultimately, to reach the demands of that group. The psychological phenomena that are caused by terrorist movements and their news in people are horror, discomfort and turmoil, unrest and restlessness, pessimism, anxiety and anxiety, anger, grief and tragedy.
Most importantly, the combination of all these unpleasant feelings is causing a lot of confusion, discomfort and insecurity inside people. But what makes the assassination possible? It is clear that those who do such behaviors do not consider themselves brutal or inhumane, and they have the absolute right to do such acts.
In recent years, investigations have been carried out on those who have had extreme behaviors. One of the most important and best investigated was Dr. Wagdey Luzza at the University of Cantabria on the terrorism of religious groups such as al-Qaeda, with the Middle East approach, and the results could be extended to ISIS. According to the study, it turned out that in the West, most of those joining these groups are men aged 17 to 23, usually from middle-class families with relatively high academic and academic achievements in modern science with academic degrees.
But the results of the 1999 study also revealed that those who carry out terrorist acts in their own countries are people with low and unemployed education who have been roughly dropped out of the text of the community, and themselves have separated themselves from the context of society.
The leaders of these radical and radical religious groups, on average 15 years older than the followers and other members of the group, are about 40 years old, have a great deal of affection and influence, are able to inspire the respect of their followers and their own self, Their ideology, in such a way that they can influence others, have intrinsically an influential personality, inspire others, encourage in the best possible way, usually do not fear death and are professors of death. Of course, in the leaders of these groups, there are people who, incidentally, completely escape death while encouraging others to die in the ideology.
Those who are attracted to groups like ISIS are abnormal?
There is no consensus on this. Some studies show that many of these people have personality disorders. Some even suffer from major psychiatric disorders. But the most important point of the personality that can be mentioned is that they have grown up in a family or a community that has created a feeling of self-sufficiency and humiliation.
These people have never been taken seriously and they feel that they are not first class citizens and their rights are different from the rights of other citizens. They feel like they are not treated to others. One of the most prominent examples of this situation may be seen in the behavior of Arab people living in the suburbs of Paris over the past 2-3 years. They were born in Paris and had a French passport, but their sense of belonging and attachment to the French community was not formed, which caused disturbances in Paris, which caused a lot of damage.
After that, the French government has just realized that it cannot continue to discriminate, and must provide grounds for joining these people to French culture while respecting Arab and Islamic culture in order not to face such rebellion and chaos.
Another aspect of the personality of the members of such groups is that they do not have personality independence and they need to follow someone else with a higher appeal. They have no self-confidence and can only feel confident within an ideology, that is, ideology with rough behaviors so that nobody dares to stand in front of them.
People who lack the sense of empathy and sympathy with others, and they are not basically born of a child of conscience, suffered a severe damage to their self-image from a childhood, which is said to be bad in their family and society, they are a bad people, their religion is not worthless. , Have a brutal nationality, and they are constantly seeking to abandon their anger, and one of the best ways to do this is to join groups that can be abused by membership and violent behavior.
Members of these groups are pessimistic about the world around them and the world, and sometimes have a lot of mental employment, for example, under the control of a very violent parent or violent and punitive rule. Groups like ISIS will be able to empower them. People with such characteristics are so influenced and influenced by a kind of hypnosis that their contacts with the facts are discontinued and their perceptions of facts are confused.
One of the things that the leaders of these groups do well is brainwashing, that is, brainwashing ideological issues in the name of reality in the whole universe, and assuring them that the truth is what their leaders say.
Another group of researchers, according to their studies, has concluded that members of the terrorist groups do not have an abnormal character at all; many of them naturally, educated and highly adhered to their ideology, and are even willing to sacrifice their lives for their ideology. In fact, these people, through sacrificing their lives, feel useful, sacrificed and sacrificed and are proud to be in this way, which ultimately leads to a great name in this world and a fortune-telling to come place for them.
In my opinion, naturally, both groups of these people are seen in groups like ISIL, and perhaps we should look at their behavior in order to find out the reality. I believe that what distinguishes natural people from abnormal is the degree of conscientiousness.
Those who believe in devotion and sacrifice and honesty are surely not willing to surrender their captive family members without trial, roadside, and in front of their eyes.
Unfortunately, due to the actions and actions of the ISIS group, it seems that most of its members have an abnormal character and their thoughts are immortal and primitive. They are usually accustomed to learning to look very straightforward. The example of this is the declaration of the caliphate for the whole world from an area in Iraq and the burning of European citizens’ passports to show that they are universal and do not think nationally! These people believe that they have established a government and a caliphate for the whole world, all of which shows their simplicity.
They see phenomena as absolute black or white, or good or bad. They see the world divided into two categories: the helpless rich, the exploited, and the poor, are miserable, and this means thinking all or nothing. Their beliefs are based on the rejection of the thoughts of others, rather than certain beliefs, and they consider all the rights to themselves. Moreover, they believe that their thinking for all ages and for all people and all the conditions is right, so they want to persuade everyone to force their ideology and if anyone opposes it, they seek to hurt him. Clearly, the analytical system of these groups is weak because the training that they have seen in their schools is more based on memory rather than analysis.
Finally, I emphasize that the formation of ISIS and its groups is the result of being repelled and humiliated by the family and society. Therefore, if any country wants a phenomenon like ISIS not to emerge, one must understand that it is necessary to respect the rights of citizenship and religion of the people
President Trump, NATO and the trade war with China
The last Summit of the Atlantic Alliance saw, at least initially, a clear divergence between the United States and NATO’s...
The Muslim Saint of a Greek Orthodox city
The Albanian Bektashi Monastery of Farsala May 1st 2017: Some hundred meters outside Farsala, in the village of Asprogia, cars...
The ‘Reverse Nixon’ and New Nero: Where to Focus After the Trump-Putin Summit
It would be too easy to simply jump on all of the stereotypical bandwagoning going on across most of the...
Russia’s strategy towards the United States over Syrian issues
The Meeting with Donald Trump and Vladimir Putin, the presidents of the United States and Russia on the sidelines of...
Shooting the Messenger: Corruption and Peace
It is the most natural of behaviors for the guilty to lay the blame elsewhere and to make the most...
A double-edged sword: China and Pakistan link up with fibreoptic cable
This month’s inauguration of a fibreoptic cable linking Pakistan with China could prove to be a double-edged sword. Constructed by...
SIPRI Annual Report: Flawed Analysis of Pakistan’s Nuclear Forces
Since its inception Pakistan’s nuclear program became a victim of nuclear apartheid, even though the acquisition of nuclear technology for...
Middle East2 days ago
Iranian Terror Plot Motivated by Threat of Regime Change
South Asia2 days ago
India Ranked at Top as the Most Dangerous Country for Women
South Asia1 day ago
A double-edged sword: China and Pakistan link up with fibreoptic cable
Energy1 day ago
CPEC and Pakistan’s energy crises
Defense1 day ago
SIPRI Annual Report: Flawed Analysis of Pakistan’s Nuclear Forces
Americas2 days ago
Flip-Flops and Foreign Policy: How American Tourist Behavior Hinders U.S. National Security
Middle East2 days ago
Risk of Decreased Relief Funding for Palestinian Refugees
Energy2 days ago
Global energy investment in 2017 fails to keep up with energy security and sustainability goals