Connect with us

Intelligence

Fighting ISIS in the Digital Space in Jordan

Published

on

Authors: Anne Speckhard & Ardian Shajkovci

With estimates of 3000 foreign fighters traveling to Syria and Iraq, Jordan had the highest per capita number of foreign fighters. In addition to Abu Musab Zarqawi having been the leader of al Qaeda in Iraq, Jordanians also rose to leadership positions in ISIS. Given the continued online recruitment of Jordanians by ISIS, the International Center for the Study of Violent Extremism (ICSVE) ran two Facebook Awareness Campaigns in Jordan using ICSVE’s Breaking the ISIS Brand Counter Narrative videos. Between the campaign and organic activities, one of the counter narrative videos received over 1.7 million views. 

Introduction –ISIS and Militant Jihadi Terrorist Recruitment in Jordan

Since the onset of the Syrian conflict in 2011, it is estimated that upwards of 40,000 foreign fighters joined Sunni militant groups such as ISIS and al Nusra in Iraq and Syria. Approximately 11,000 of the estimated 40, 000 are believed to be from the Middle East, with countries such as Jordan, Saudi Arabia, and Tunisia supplying the vast majority of foreign fighters. While estimates differ, Jordan has seen nearly 3,000 men and women join ISIS and other Sunni militant groups in Iraq and Syria over the past years, together with Tunisians and Saudis, rounding out the list of top sources of foreign fighters.[1]According to some estimates, Jordan is ranked as either the first or the second country in the world with the highest number of foreign fighters, on a per capita basis, in the Syrian and the Iraq conflict.[2]Jordanians who joined Jabhat al Nusra the local Syrian arm of al-Qaeda, and later ISIS, often held leadership positions in these groups, advocating for militant jihadi terrorism in the region.[3]In fact, in the first iteration of ISIS, Abu Musab Zarqawi, a Jordanian-born jihadist militant who led al-Qaeda in Iraq, hailed from Zarqa, Jordan.[4]

The drivers of radicalization to violent extremism in Jordan are many. Beginning with a decades-long history of violent extremist and terrorist movements operating in Jordan, and involving Jordanians, alongside the destabilizing and radicalizing factors occurring in the region and globally, once relatively peaceful Jordan has absorbed both its share of terrorist attacks and a growing hub of terrorist groups and their ideologies, with al-Nusra and ISIS operating in Syria and Iraq at its current center. Moreover, the repeated influx of refugees from neighboring conflicts, economic and governance challenges, and Salafi influences migrating into Jordan have all combined to create vulnerabilities and motivations on a psychosocial level that have ideological resonance to terrorist recruitment inside Jordan.[5]Despite the volatile conditions, Jordanian leadership has managed to maintain political stability in the country, and is one of the trusted U.S. and coalition partners against ISIS and the so-called Islamic State. Jordan, however, remains a country of ‘easy recruits’ for terrorist groups like ISIS and al-Qaeda,[6]especially when considering the proximity of the battlegrounds in Syria and Iraq.[7]

Recent Changes in ISIS since its Territorial Defeat

While ISIS has lost most of the territory it once held in Iraq, and much of Syria, some 11,000 ISIS cadres are still believed to be active and operating in Iraq and Syria, though recent research indicates that numbers may actually be upwards of 30, 000.[8]Likewise, ISIS remains a formidable terrorist organization with a brand and dream of creating an Islamic State Caliphate and has also proven itself capable of spreading itself beyond its original territory, namely with ISIS affiliates continuing to recruit for, and control, territories in countries such as Libya, Afghanistan, Egypt, and Algeria.[9]

In addition to kidnappings and insurgent and clandestine type activities in Iraq and Syria,[10]the group also remains focused on orchestrating, inspiring, and carrying out external attacks, which, in part, are carried out to demonstrate the group’s resilience as well as debunk claims and predictions of the group’s ultimate demise. ISIS has inspired or carried out attacks in more than 31 countries that have killed more than 2,000 people outside of Syria and Iraq.[11]For instance, in 2015, ISIS supporters and admirers, inspired by ISIS social media propaganda, were able to carry out one of the deadliest terrorist attacks in the history of modern Tunisia.[12]

Recent militant jihadi activities in Jordan have also given cause for serious concern. In 2016, ISIS terrorists attacked Karak Castle, a popular tourist destination in Jordan, killing 10 and injuring 34. [13]In January 2018, Jordan’s General Intelligence Department (GID) reported to have prevented a major terrorist plot by ISIS involving 17 suspects. Potential targets included civilian, military, and religious facilities.[14]More recently, on August 10th, 2018, a police sergeant was killed in al-Fuheis when a police patrol car was blown up during a music festival in the town. The law enforcement managed to trace the attackers to a house in the city of Salt where they engaged in a shootout with police and ultimately exploded their bomb-rigged hideout rather than be arrested. The attackers were Jordanians. Their affiliation to any known terrorist group remains undisclosed,[15]though some experts in Jordan suggest they were either inspired or directed by ISIS. These represent only a short list of the many terrorist attacks involving Jordan.

Internet Recruiting & Terrorist Activity in Jordan

Compared to other militant jihadist groups, ISIS’ strengths lie in its ability to maximize its reach by betting on innovation and exploiting social media platforms. Its mastery of modern digital tools has enabled it to support its war and state-building efforts during the time it held and controlled significant swaths of territories in Iraq and Syria. Today, given its significant territorial loses, it continues to rely on social media to enable, direct, and inspire terrorist attacks worldwide. The same is now also being used to encourage and facilitate travel to other territories it controls—even still successfully attracting upwards of 100 foreign fighters per month to come to Syria and Iraq while in territorial retreat.[16]ISIS’ propaganda production arm is no longer as prolific, yet the group continues to successfully use the Internet to recruit and orchestrate terrorist attacks. In this regard, the military defeat of ISIS and the so-called Islamic State should not reduce the need and the urgency to counter the online appeal of ISIS and similar violent extremist groups.

In focus testing the International Center for the Study of Violent Extremism’s (ICSVE) Breaking the ISIS Brand Counter Narrative videos in Zarqa and Irbid in 2016 and 2017, respectively, with high school and college-age youth (n=54), we found that ISIS still manages to reach out to youth and attempt to attract them into the group. In fact, in the absence of adequate support and resources, many among the youth we spoke to shared how they often turn to the Internet to find answers regarding the claims made by groups like ISIS.[17]For instance, some noted, “If I say I’m bored on Facebook, they [ISIS recruiters] contact me.” Others pointed out how the ISIS recruiters know Islamic scriptures and hadithsbetter than those they are recruiting. Some commented how their parents, teachers, and imams were not open to discussing such topics, specifically, “No one wants to talk to us about these things.  They are all worried about the GID.” As a result, the youth we spoke to were both vulnerable to ISIS recruitment due to their Internet activities and for searching answers on the Internet to refute their claims.

Fighting ISIS on Facebook in Jordan

In December of 2017 and July of 2018, respectively, the International Center for the Study of Violent Extremism (ICSVE) responded to such concerns in Jordan by promoting two ICSVE-produced counter narrative videos from its Breaking the ISIS Brand Counter Narrative Projectto learn if it was possible to raise public awareness in the vulnerable age group to ISIS recruitment in Jordan and also disrupt ISIS’ online and face-to-face recruitment occurring in social media platforms like Facebook by using video clips produced from interviews of ISIS insiders denouncing the group. (While a full discussion of the ICSVE Breaking the ISIS Brand Counter Narrativevideos is not possible in this limited space, more information about the project can be found here.)

The two ICSVE counter narrative videos that were used in the campaign were Promises of ad-Dawlah to Womenand Rewards of Joining the Islamic State. The former features Laura Passoni, a Belgium woman who left Belgium with her son to join ISIS in Syria after being jilted by her partner. The latter features thirty-three-year old Abu Ghazwan, an Iraqi who, by joining ISIS, hoped to restore rights and dominance to Iraqi Sunnis. In the video, he discusses his involvement with ISIS, namely his role in placing bombs and attacking the enemies of the group. Both ISIS speakers denounce ISIS as un-Islamic, corrupt, and overly brutal, and express their deep regret over ever joining.

The two public safety awareness campaigns in Jordan were run by using Facebook ads. The month-long campaigns served to raise awareness about the dangers of joining violent extremist groups like ISIS as well as to drive online engagement among the citizens of Jordan over Facebook.  Facebook was the digital platform of choice as it remains a popular social media communication platform in Jordan. ICSVE research in Jordan also suggested the need to focus on Facebook, as many vulnerable youth have and continue to be contacted by ISIS via Facebook.

According to a 2016 study, around 93 % of Internet users in Jordan use social networks, with Facebook and WhatsApp representing the most used social media platforms. [18]

Source: Ghazal (2016)[19]

According to Arab Social Media Report, 89 % of the internet users in Jordan prefer Facebook (5,300, 000), 71 % WhatsApp, 66% YouTube, 34 % Instagram, and 33% Twitter (See below for a breakdown). [20]

Middle East Internet Users, Population and Facebook Statistics
Country Pop. (2018 Est.) Users in Dec/2000 Internet Usage Dec-31-2017 % Pop. (Penetration) Internet % users Facebook

Dec-31-2017

Bahrain 1, 566, 993 40,000 1,535,653 98.0% 1.0 % 1,100,000
Iran 82, 011, 735 250,000 56,700,000 69.1 % 34.6 % 40,000,000
Iraq 39,339,753 12,500 19,000,000 48.3 % 11.6 % 17,000,000
Israel 8, 452, 841 1,270, 000 6, 740, 287 79.7 % 4.1 % 5, 800, 000
Jordan 9,903,802 127, 300 8,700, 000 87.8 % 5.3 % 5,300, 000
Kuwait 4, 197, 128 150,000 4, 104, 347 97.8 % 2.5 % 3, 100, 000
Lebanon 6, 093, 509 300, 000 5, 546, 494 91.0 % 3.4 % 3, 600, 000
Oman 4, 829, 946 90,000 3, 310, 260 68.5 % 2.0 % 2, 630, 000
Palestine 5, 052, 776 35,000 3, 055, 088 60.5 % 1.9 % 1, 700, 000
Qatar 2, 694, 849 30, 000 2, 644, 580 98.1 % 1.6 % 2, 300, 000
Saudi Arabia 33, 554, 343 200, 000 30, 257, 715 90.2 % 18.4% 18,000,000
Syria 18, 284, 407 30,000 6, 625, 631 33.0 % 3.7 % 4, 900,000
UAE 9, 541, 615 735,000 9, 385, 420 98.4 % 5.7 % 8, 700, 000
Yemen 28, 915, 284 15,000 7, 031, 784 24. 3 % 4.3 % 2, 352,942
Total 254,438,981 3, 284,800 164,037,259 64.5 % 100 % 116, 482,942

Source: Internet World Stats[21]

 Results of the Jordanian Facebook Public Awareness Campaigns

Video: Promises of ad-Dawlah to Women Campaign (Run Dec 7 to Dec 31, 2017)

Geographic and Demographic Reach:

In terms of geographic breakdown, our first campaign targeted the following areas in Jordan: Balqa Governorate, Ma’an Governorate, Mafraq Governorate, Zarqa Governorate, Irbid Governorate, Amman Governorate, Ajloun Governorate, Jerash Governorate, and Madaba Governorate. Our sample targeted some of the areas considered as hotbeds of radicalization in Jordan, namely Ma’an, Zarqa, and Irbid Governorates. Amman (538, 826), Irbid (117, 364), and Zarqa (46, 203) governorates achieved the highest reach. Seventy percent of the reached population is male and 30 percent female (See figure 1 for demographic and reach breakdown across two genders).

Table A contains a breakdown of video views by age group and the area targeted and serves to demonstrate reach in the relevant age categories in areas considered as the hotbeds of extremism, namely in Salt, Irbid and Zarqa.

Video Views:

Table B presents data on how much our video content was watched. The campaign generated a total reach of 797, 866, while also leading to 1, 456, 872 impressions and close to 869, 472 video views (See Table B).[1]

Table B presents data on how much our video content was watched. There is a total of 869, 472 video views at 3%, 10 %, 25% (89, 733), 50 % (74, 742), 75% (54,220), 95% (38, 545) and 100 % (8, 924) video watches. As the data indicate, there are a total of 266,164 clicked-to-play shared among 25%, 50%, 75 %, 95%, and 100 % recorded watches. Note, however, that the percentages include those who watched the full length of the video and those who skipped to the end of the video.

The video average watch time is 0:19, calculated as the video total watch time/total number of video plays (this includes replays). This number highlights the potential usefulness of making shortened versions of the videos for complementary ads, as some viewers will only watch very short videos. They may click through ashort version and, once hooked by it,  watch the longer version.[22]However, the fact that thousands did watch the entire video may indicate that some will be hooked by the content, while others less so.

The impression score in Table B indicates the total number of times our content was displayed, regardless of whether clicked or not. In other words, the score indicates the number of times our reached target base has been exposed to our video content. The higher the impression score, the more indicative that people are seeing our content, that they are becoming more exposed to our content, and that they are sharing our content.

The impression frequency of 1.83 (Impression/Reach) indicates the average number of times each individual has seen our ad over the period of thirty days. That said, because Facebook ad frequency indicates an average score, in practice, this means that some among our target audience might have been reached a number of times while others only once. Campaigns with high reach naturally have lower frequency rate. Moreover, the relatively low frequency rate of 1.83 suggests that we are not oversaturating out target audience with our content.

The campaign generated  a relevance score of  7, calculated on a 1-10 scale. The higher the relevance score, the better in terms of how our audience is responding to our ad. Facebook calculates the relevance score “based on the positive and negative feedback we expect an ad to receive from its target audience.”[23]It is calculated based on a number of factors, such as the positive vs. negative feedback it is expected to receive. For instance, video views, shares, and likes represent positive indicators. Conversely, the number of times our ad is hidden, or when someone clicks “ I don’t want to see this” our ad, represent negative indicators. Five hundred impressions need to be received before a relevance score is generated. This Facebook ad metric is useful to better identify our target audiences and use it for our campaign optimization. That said, the relevance score is used to measure relevance of a campaign and not the quality of the campaign. Put differently,  it is generated based on interaction and interest in our campaign. The relatively high relevance score suggests that the ads are generating  audience engagement.

Post Reactions:

The Facebook ad also led to a total of 4, 398 post reactions (e.g. Like, love, haha, wow, sad, and angry), comments and shares. For instance, there are 3, 487 post likes, 261 love, and 147 sad reactions. In addition, there are a total of 168 comments and 169 post shares.

Video: Rewards of Islamic State Campaign (run from July 15 to August 15, 2018)

Geographic and Demographic Reach:

The July 2018 campaign  targeted the following areas in Jordan: Balqa Governorate, Ma’an Governorate, Karak Governorate, Mafraq Governorate, Tafilah Governorate, Zarqa Governorate, Irbid Governorate, Amman Governorate, Ajloun Governorate, Jerash Governorate, Aqaba Governorate, and Madaba Governorate. Our sample targeted some of the areas considered as hotbeds of radicalization in Jordan, namely Ma’an, Zarqa, and Irbid Governorates. Amman (35, 136), Irbid (5, 792), and Zarqa (2,496) governorates achieved the highest reach. Ninety-six percent of the reached population is male and four percent female (See figure 2 for demographic and reach breakdown across two genders).

Video Views:

This campaign generated a total reach of 48, 432, while also leading to 74, 875 impressions and close to 38, 584 video views. The video views are calculated at  3%, 10 %, 25%, 50 %, 75%, 95%, and 100 % video views (see Table C)

The Facebook ad led to a total of 214 post reactions, (e.g. Like, love, haha, wow, sad, and angry), 45 post comments, and 7 post shares (See Table C). The video average watch time is 0:57, calculated as the video total watch time/total number of video plays (this includes replays). The campaign generated a relevance score of 10, calculated on a 1-10 scale.

Comments for both Campaigns

As discussed above, the videos generated hundreds of comments related to ISIS, the message, and the messaging strategy applied to our counter-narratives. While there were many supportive comments, there were also those attempting to discredit ICSVE’s videos, claiming they were fake, that the defectors were lying, and that they are used to distort Islam. Arguably, some such comments may have been made by innocent individuals who felt the need to defend their religion, which they may have perceived to be under attack in the video clips. Moreover, the comments might also have been from ISIS supporters and recruiters trying to discredit the anti-ISIS messaging contained in the videos.  See sample comments below.

 “Supportive Category”—comments in support of the video, its message against ISIS, the characters in the video, or the campaign in general. 

“It’s called Daesh, not an Islamic State. It is a sect that does not provide the religion of Islam. Its purpose is to distort Islam, even if you look at Islam from the Holy Quran”—Promises of ad-Dawlah

A really painful reality”—Promises of ad-Dawlah  “She was deceived by these scoundrels because of her bad mental state at the time. But the main reason behind what happened with her was to follow one person and believe what he says without comprehensive knowledge. She was also naive and believed that she will find paradise in the world…The terrorist organization called Daesh is only an extremist group that claims Islam and is in reality expanding geographically and militarily by using naïve ones like this woman…It is very painful to find such criminals who distort the image of Islam in the eyes of  people”—Promises of ad-Dawlah).  “The truest word Laura has said is that they are not Muslims” –Promises of ad-Dawlah.

“ This isn’t Islam”

“Excellent work for awareness”—Rewards of Joining IS

“ It is necessary to slay, kill, explode and destroy until you win. What religion do you belong?”

“ We really believe you, you are not ignorant[defector]. But you are the enemy of Islam”

Comments in defense of Islam and “Negative Category”—comments expressing dislike towards the video, characters featured in the video, or the campaign in general

“ Those who distort images of Islam are wrong…but there is a big conspiracy against Islam that will be revealed by God”

“ISIS=GID”

“…she is really a lie”—Promises of ad-Dawlah  This is all a lie…fabrication and distortion”—Promises of ad-Dawlah  (…an American industry distorting the minds of the Arab-Islamic generation to eliminate Islam gradually, there is no God but Allah, Muhammed is the messenger of Allah”—Promises of ad-Dawlah

“America is the godfather of terrorism”

“ The video lies …to eliminate the Sunnis and Sunni cities…fabrication and distortion in a cancerous way”

Conclusion

Law enforcement, intelligence and CVE professionals around the world continue to assess the extent to which the collapse of so-called ISIS Caliphate will affect ISIS’ propaganda machinery and online recruitment efforts. As evidence from the field suggests, violent extremist groups like ISIS continue to thrive online, and may even have stepped up their online recruitment efforts with vulnerable youth to try to demonstrate the group’s continued virulence. In doing so, groups like ISIS attempt to persuade their online recruits to carry out homegrown terrorist attacks in their name. They also continue to “harass, recruit and incite violence” online,[24]and this may actually increase in the future.

In addition, some Jordanian security experts have noted that “ the roots of Jordan’s security problem lie in prevalence of extremist ideology in the country, which is in turn empowered by the frustrations of everyday life by many Jordanians.”[25]As also evidenced during our research in Jordan, online ISIS recruiters are very adept at exploiting such issues.  ISIS recruiters “sell” one type of narrative, while ISIS insiders disillusioned with the group’s ability to actually deliver what it is selling may be the most potent force to destroy their terrorist narrative.

Despite takedown policies instituted by social media companies, violent extremist groups continue to operate freely online. While important, once an account has been suspended, there is little that can be done to prevent a user from opening a new, or multiple new accounts. Moreover, the shutdown of extremist content online is heavily reliant on user reporting of extremist content online, which is equally problematic.  Likewise, in the case of YouTube, many experts following extremist content online remark that while takedown policies are rapid for English content, Arabic extremist content often remains present for much longer periods of time.

The purpose of this safety ad awareness campaign was to test if vulnerable audiences can be reached through a Facebook awareness campaign and to attempt to raise awareness about the realities of joining extremist groups like ISIS in order to protect potential vulnerable Jordanian recruits from considering joining.  Our campaign was successful  in driving engagement with our counter narrative materials. In combination, our ads generated a total reach of 808, 035 and close to 908, 056 video views. They also led to thousands of page engagements and hundreds of comments related to our video, ISIS in general, and other contentious socio-political issues that drive and affect violent extremism in Jordan.

While we were able to observe engagement with our counter-narratives, it is far more difficult to observe or report direct cognitive or behavioral changes among those who support violent extremist groups or ideologies. We hope that may in fact be occurring. As some researchers have observed,” It is possible that some of the counter-narrative narrative videos have managed to dissuade individuals from joining or supporting extremist groups, but those users are simply not leaving comments like, ‘Great, [this] video really changed my mind.’”[26]We have only engagement statistics to go by, and in that regard, we were able to observe that the videos can reach and engage the demographics in Jordan who are also vulnerable to being reached online by ISIS propaganda and recruitment efforts.

We will continue to expand our targeting campaigns, including in Jordan, and to drive further engagement on our newly created TheRealJihad.org website and seek support from those who may be willing to act as influencers and interact one- on- one with those who comment thereby magnifying the impact of our counter-narratives.[27]

Ardian Shajkovci, Ph.D.is the Director of Research and a Senior Research Fellow at the International Center for the Study of Violent Extremism (ICSVE).  He has been collecting interviews with ISIS defectors and studying their trajectories into and out of terrorism as well as training key stakeholders in law enforcement, intelligence, educators, and other countering violent extremism professionals on the use of counter-narrative messaging materials produced by ICSVE both locally and internationally. He has also been studying the use of children as violent actors by groups such as ISIS and how to rehabilitate them. He has conducted fieldwork in Western Europe, the Balkans, Central Asia, Africa,  and the Middle East, mostly recently in Jordan and Iraq. He has presented at professional conferences and published on the topic of radicalization and terrorism. He holds a doctorate in Public Policy and Administration, with a focus on Homeland Security Policy, from Walden University. He obtained his M.A. degree in Public Policy and Administration from Northwestern University and a B.A. degree in International Relations and Diplomacy from Dominican University. He is also an adjunct professor teaching counterterrorism and CVE courses at Nichols College .

Endnotes:

first published in our partner ICSVE

Anne Speckhard, Ph.D., is an adjunct associate professor of psychiatry at Georgetown University School of Medicine and Director of the International Center for the Study of Violent Extremism (ICSVE). She has interviewed over 500 terrorists, their family members and supporters in various parts of the world including Gaza, the West Bank, Chechnya, Iraq, Jordan, Turkey, the Balkans, the former Soviet Union and many countries in Europe. She is the author of several books, including Talking to Terrorists and ISIS Defectors: Inside Stories of the Terrorist Caliphate. Follow @AnneSpeckhard

Intelligence

China and Russia’s infiltration of the American Jewish and Israeli lobbies

Published

on

 – First: The reasons for the registration of (Communist Lobbyists in the Middle East in the United States of America) in the database documents of the US Department of Justice

 – Second: Did Washington actually seek (with the help of Jewish and Israeli lobbies) to lure the Arab communists into it to prevent Chinese and Russian communist influence in the Middle East?: Iraq as a model

– Third: The establishment of Chinese liberal democratic parties in the United States of America and the Chinese Communist Party allowing them to practice their activities legally and freely inside China until today: the (Chinese Qigongdang Party) as a model

   Despite the strangeness of this previous analysis of the Egyptian researcher, she relied on it through the proof of the relationship of (Jewish lobbies in the United States of America to the opposition communists in Iran and the Middle East), and from here came the Egyptian researcher’s question, about:

  Do China and Russia have a role in supporting the polarization of the oppressed communists from inside Iran and the Middle East in general, planting them in Washington, facilitating and drawing a plan for their relations with the (Zionist lobby and the various Jewish lobbies) within the United States of America itself, and infiltrating all American official circles, to present the communists in the Middle East as persecuted in their homelands in the Middle East?

 Thus, (the Jewish lobby and all the well-known Jewish and Israeli institutions in the United States of America present these communists fleeing from their homelands to the major American institutions as persecuted communists in the Middle East). The most important question for the Egyptian researcher remains, about:

 (Why did the oppressed communists and leftists in Iran and the Middle East choose to flee to the heart of Washington as a superpower that sponsors liberalism around the world and is the most resolute and strictest in the face of the flow of communist ideas). And does it have anything to do with the future Russian and Chinese policies to infiltrate Washington itself and the communist thought to penetrate the Jewish lobbies inside American Trans (the game of spreading Chinese and Russian communist ideology within the major American political institutions).

 Perhaps it is a new global analysis that has not been addressed by any Arab research with analysis and study, but what attracted the Egyptian researcher is her precise area of expertise and her PhD study thesis was on the Chinese political affairs, and the role of the Chinese Communist Party in the political and economic reform issues, and thus the extension of the Egyptian researcher’s interests in studying the history of communists around the world, especially the closest to the region of the Egyptian researcher in the Middle East, Israel, Iran and Turkey as regional powers that seek to support or gain their influence through two unrelated mechanisms, either:

 A) Closeness to Washington and its liberal ideas, and the rejection of Chinese and Russian communist ideas and doctrine

 B) Or by defying Washington and applying pressure towards it by rapprochement with the communists of Russia and China, and thus challenging those liberal ideas and American democratic values ​​that Washington always seeks to promote globally.

  So that some would not accuse me of drawing features of unreasonable or unimaginable relations between (the Communists and the Jewish lobby in Washington through the support of China and Russia together), then the question I had about:

  What is the position of the United States of America and its institutions towards the Jewish lobbies within it regarding the facts of the Chinese and then Russian communist penetration of its institutions with the help and close support of the Jewish and Israeli lobbies most closely related and close to the American administration and the major American institutions themselves?

 – Based on these questions, the Egyptian researcher will analyze the following main elements to understand these new global relations that have not been searched for academically and globally, through:

 – First: The reasons for the registration of (Communist Lobbyists in the Middle East in the United States of America) in the database documents of the US Department of Justice

   Perhaps the “Pilgrimage to Washington” project, which is meant to cover the activities of the Middle East lobbies in the United States, and most of the information in the report is based on documents from a database of the US Department of Justice, which follows the Foreign Agents Registration Act, which is known as “Fara”, which Lobbyists are required to disclose their activities and funds, and all documents are available for browsing on the Internet.

  Through the Egyptian researcher following the previous American report, she was able to find a new relationship that proves the registration of (communists from the Middle East as independent lobbies in the US Department of Justice, and their relations with Jewish and Israeli lobbies inside the American interior itself).

  Looking at the previous US archive of Communist records, we will find that (the documents of the US Department of Justice explicitly refer to the intense political activity of the opposition communist parties in the Middle East inside Washington with the help of Jewish and Israeli lobbies).

   By tracing the relations of the communists in Washington, we will find that, according to the official American data issued by the US Department of Justice, we will find a record of building relations between the Middle Eastern communist parties in Washington and the United States, and building influence networks with politicians in the US Congress and the US State Department itself, with those communist parties communicating  Right-leaning research centers on the American interior, and they have a special influential relationship, according to the American database of the US Department of Justice, with (the Israeli lobby in Washington).

 Hence, the official US reports themselves present a comprehensive and detailed picture of the activities of communist and leftist parties coming from the Middle East, such as the Kurdish party opposing Iranian policies in the world of lobbies.

  The documents indicate that the (Kurdish Communist Party opposed to Iran) contracted with (IF International) to penetrate the corridors of Washington itself through the gate of the Jewish and Israeli lobbies in Washington.

  The files of the US Department of Justice indicate that the opposition communist parties authorized official representatives of their parties in America to establish close relations with the US government with the help of the powerful and most influential Jewish lobby with the help of Israel, and the most significant question mark is the increase in the total payments of these Middle Eastern communist parties inside the US of thousands of dollars per month  Including the expenses of opening representative offices for its parties there.

  For example, we find a document issued by the US Department of Justice on January 2, 2019, in which (the opposition Kurdish Communist Party in Syria and Iran) contracted with the company (IF International), as a well-known international American lobbying company, and among its well-known clients in the Middle East:

  The Syrian Democratic Council, which is the political wing of the (Syrian Democratic Forces), known as the “SDF”, as one of the largest armed Kurdish factions stationed in northern Syria and supported by the United States.

 The services provided by (IF International Company) to those communist, left-wing Arab, Middle Eastern, Iranian and Kurdish opposition parties in their homelands in the Middle East are summarized in:

 1) Communication and pressure on Congress, especially with congressional staff working in the State Department and the armed forces.

  2) Communicating on behalf of those communist and leftist parties with right-leaning think tanks in general, or funded and supported by the Israeli lobby.

 3) In addition to (IF International Company’s keenness) to facilitate communication of communist parties and movements from the Middle East with the largest internationally known Israeli lobby in Washington, known as (AIPAC), and the American-Israel Public Affairs Committee.

 The company of (IF International) is owned by the well-known Jewish American citizen (Eyal Frank), a political consultant who worked for political parties, and has long experience in the field of political pressure, as “Eyal Frank” previously worked in major companies, such as: (Mercury – Qorivs), and he worked as a legislative assistant in Congress between 2000-2002.

   The total payments of the communist and leftist parties from the Middle East to the mentioned American company amounted to thousands of dollars per month, according to its documented documents registered in the (US Department of Justice).

 – Second: Did Washington actually seek (with the help of Jewish and Israeli lobbies) to lure the Arab communists into it to prevent Chinese and Russian communist influence in the Middle East?: Iraq as a model

   The issue of the penetration of communist influence in the Middle East in general and in Iraq in particular is one of the most important issues that have attracted the attention of the United States of America, due to the important strategic location of Iraq in the Middle East, as it is one of the most important centres of oil production in the region and the world, despite the presence of Iraq within the accounts of the American strategy before World War II, however, America’s large entry into Iraq actually began after (the emergence of the communists on the Iraqi political scene) after the 1958 revolution, and this is a piece of information that was overlooked and ignored by most Arab and international research and studies.

  Then the political weight of the (Communist Party in Iraq) began to weaken after the Baathists took power following the movement of November 18, 1963. However, as a result of the intensive arrests and continuous pursuit of members of the Iraqi Communist Party and its organizations, the Iraqi communist and leftist movement subsided, even if it did not end or completely died.

  During the 1967 war between Iraq and Israel and Iraq’s entry into it, the Soviet Union tried to get closer to Iraq, but the American weight was stronger, which caused the collapse of the rule of (Abdul Rahman Aref) in 1968, and the Iraqi political arena was almost completely emptied of the communists.

  What caught the Egyptian researcher’s attention and curiosity was what many American presidents have repeatedly said about their “willingness to fight a third world war if they had to, so that Iraq or the Middle East in general would not be a foothold for communism”.

 Hence, the Egyptian researcher stopped at this previous phrase in research and analysis, regarding:

  Her research on the reasons for the absence of Iraqi, Kurdish, Iranian and Arab communists.

  Then suddenly the Egyptian researcher stopped at the presence of Arab, Iranian and Kurdish communist parties and the Syrian opposition within the American interior itself, which prompted the Egyptian researcher to have a theoretical hypothesis:

 Did America seek to get rid of the influence of the communists and the Arab leftists, especially the Iraqis, the Iranians, the Kurds and the Turks in the Middle East in the face of the Soviet Union and later Russia after its disintegration and China, by inviting them – that is, the communists of the Middle East region – into the United States of America itself and facilitating their unspoken assimilation into the (Liberalism intellectual agenda), and then waiting again to use them against Chinese and Russian influence in the Middle East again?

 Then the Egyptian researcher thought about another theoretical hypothesis that was not put forward at all, which is:

 Did Russia and China, through the Jewish and Israeli lobbies in the American interior itself, seek to re- polarize these communists fleeing their homelands in the Middle East once again and recruit them to serve their interests in the United States of America in the face of Washington itself?

 Which is what the Egyptian researcher could call the theory (playing with toys or returning the game with another game).

  Perhaps the most important thing I relied on in my previous analysis was (the presence of dozens of communist and leftist Arab, Iranian, Kurdish and Turkish parties that are actually opposed inside the American interior), and the emergence of communist names, especially Kurdish, Iranian and Syrian, once again as influential and influential elites in Washington itself.

   And I think that (the game of the Chinese and Russian communist penetration into the American interior is a completely logical game from my point of view), it is not an unlikely game as some will accuse me, after the American political elites and the most prominent American politicians point completely accusing fingers at (the corruption of the ruling Communist Party of China, and talk about the communist and liberal ideological war between Washington and Beijing)

 Perhaps one of the most prominent things that stopped me in this context is the accusation by prominent officials in the American administration itself and in the centers of American rule of the Communist Party of China that it is the cause of the spread of the Corona virus, or the cause of the deterioration of the world and so on. It is a sign, despite its strangeness – but it is understandable to the Egyptian researcher due to her academic research and analytical specialization on that very crucial point – regarding the export of American politicians that the hostility between the United States of America and China is not political, but has become (ideological dispute or ideological war) in the first place.  This raises many questions about:

 (The American, Chinese and Russian play and hack each other through the communist and liberal ideological gate in the face of each other)

 And even the most dangerous proposition went too far, about: Beijing and Moscow unilaterally inviting a number of American politicians to visit their countries and meet their officials in the form of announced unofficial visits. In fact, accusations were extended during the US presidential elections period by supporters of the former President (Trump) to investigate the reasons for inviting (Joe Biden), the current US president to China, and meeting with its officials and praising them, at a time when he assumed the position of responsibility in the administration of former President (Barack Obama).

 Rather, the accusations of the candidate’s supporters (Trump) at the time went even further, accusing (Biden) of working for the Communist Party of China, based on the reasons for his previously unannounced visit to Beijing, and whether he was the favorite communist candidate in Beijing and Moscow?

 Here, we must consider this future game between all its parties, regarding:

 (They accuse each other of adopting a Chinese or Russian communist agenda, or a hegemonic US imperialist liberal agenda seeking world domination)

 It is a matter or a proposal that has become new in its context, and from here I can almost imagine according to this proposition: the extent of the American determination to transform the competition between China, Russia and Washington from being (a political war or just a legitimate political competition for leadership of the new world order to an ideological war or an ideological and ideological competition) between communists and liberals around the world)…and this is where the danger lies, or less the danger of the proposition with which Washington started its game with China, regarding:

 Distracting the attention of the whole world and even its peoples and broadening the base of accusations from political affiliation in favor of the Chinese and Russian alliance together or the US to adopting communist ideology, ideas or values ​​in the face of its liberal or American democratic counterpart, and this proposition is what Washington insists on in all global circles.  This raises many questions about:

 The reasons for the presence of former Arab, Iranian, Turkish and Kurdish communists in Washington itself and the penetration of its political institutions, the reasons and the extent of their relations with the Jewish and Israeli lobby, and what is most dangerous to me and what concerns me personally and academically, are:

 The extent of the relationship between China and Russia in penetrating the communist and leftist lobbies in Washington by supporting those same Jewish and Israeli lobbies in the American interior, and thus the response of the American game itself by luring and protecting communist lobbies in the United States of America, and using them at an appropriate time to confront the agenda of China and Russia through the adoption of China and Russia for these communists who  Washington adopts them in its lands under the pretext of protecting them from the persecution of their homelands to which they belong, especially in the Middle East, as we mentioned.

– Third: The establishment of Chinese liberal democratic parties in the United States of America and the Chinese Communist Party allowing them to practice their activities legally and freely inside China until today: the (Qiqongdang Liberal Democratic Party of China) as a model

  Perhaps this information came as a surprise to many – in the Arab world and from non-academics and specialists in Chinese and communist academic studies around the world – who are not aware of the existence of (eight parties operating within Chinese society itself that follow American liberal democratic values, including parties founded by expatriate Chinese who lived in the United States). The United States of America itself, then they returned and settled inside China, and they were allowed to engage in their opposition party activity.

 Perhaps the most prominent Chinese liberal democratic party founded by a group of Chinese expatriates inside the United States of America itself is (the Qigongdang Party in China), which was founded in the city (San Francisco) in the United States of America by Chinese expatriates who were living within the same American society, most of whom are university graduates.  And when most of them returned to the bosom of the motherland in China, they submitted an official request to establish this party, and the surprise to them and to the American observers was that the official Chinese authorities missed their American counterpart that opportunity, by allowing the ruling Chinese communist authorities to practice their activities according to the scope of the similar liberal democratic party practice.  With those American values ​​that they brought back from abroad, i.e. from the United States of America itself, and carried them into Chinese society, this party is practicing its activities completely freely until this moment with the knowledge of the Chinese authorities without any harassment mentioned by the testimony of its members.

 The Egyptian researcher analyzed this very important point that (the Chinese authorities have succeeded in missing the opportunity for Washington to allow the return of these Chinese expatriates, most of whom studied in American universities and were saturated with liberal American culture, by giving them the freedom to establish a liberal democratic political party in China itself).

  Currently, the (Qiqongdang Liberal Democratic Party of China) consists of Chinese personalities from the middle and upper classes, most of whom are expatriates or Chinese immigrants who have returned to the country. After returning to their homeland in China, these expatriates and immigrants were able to attract their Chinese parents and friends to participate and become members of this party.  And expanding its base, despite following the approach and philosophy of American liberal democratic values ​​that are different from the communist approach that the majority of Chinese owe.

  On the other hand, the official Chinese authorities also allowed the licensing of (seven other parties) that follow the same liberal democratic values, in addition to the (Qigongdang Party) as we mentioned, and all of them were allowed to operate officially and legally in China, bringing the total of those liberal democratic parties in Chinese society (eight liberal parties  Chinese democracy), which is as follows:

 1) (Taiwan Democratic Party Self-Government League): It is located

 In (Hong Kong), however, his official headquarters has moved from (Hong Kong) to the Chinese capital, Beijing), and many information about him and his most prominent current activities and the names of his most prominent members are available in the archive of the well-known (China Network) website.

 2) The (Jiusan Association Party): which focuses on the need to implement democracy within Chinese society.

 3) (Chinese Association Party for the Development of Democracy): which raises the slogans of (implementing democratic policy in China, reforming Chinese authority, and then returning power to the Chinese people themselves). This party is currently adopting an agenda dominated by (the blending of American liberal democratic values ​​with Chinese socialist values), by promoting the adoption of the (socialist democracy model).

 4) The (Chinese Democratic Party of Peasants and Workers): which is based on the slogan of (establishment of the power of the Chinese people), and most importantly, its current constitution expressly provides for the acceptance of (the leadership of the Communist Party of China), and welcomes the cooperation of all liberal democratic parties with the ruling Communist Party in China, according to  The mechanism or system of (political consultation), according to what is recorded in the a well-known (China Network Website Archive) in China.

5) (KMT Revolutionary Committee Party): whose members adopt the liberal democratic doctrine, noting that (KMT) itself is an old party that was overthrown by the ruling Communist Party in China, but it is a group of old party members who wanted to work legitimately under the supervision of the same Chinese state, and applied for the founding of the (KMT Revolutionary Committee Party), and the official Chinese authorities immediately approved their request, and its members currently adopt the principles and slogans of (Unification of China), and include members of the upper and middle levels or classes in the Chinese society mainly.

  6) (Chinese Democratic National Building Association Party): The political advocacy of this party is to guarantee the basic political rights of the Chinese citizen, protect the human rights of citizens, protect and develop national industry and trade, and oppose the rule of the (old Kuomintang Party), that was overthrown by the ruling Communist Party in China. There are many data published about him, according to the official Chinese media.

  7) (Chinese Democratic Front Party League): bearing the name of (Chinese Democratic League), officially recognized by the Chinese authorities, which began its political activity as a joint political organization of parties and political forces calling for democracy, and was welcomed by the ruling Communist authorities in China.

  Hence, we find that the Chinese official authorities had (a future view in their relationship with the United States of America as a global hegemon that seeks to spread its liberal democratic values ​​around the world), by allowing the return of its Chinese citizens from the United States of America and giving them the right to exercise their political convictions in complete freedom within the framework of the state and the law and the prevailing Chinese constitution, while ensuring the freedom to exercise their own liberal democratic political beliefs and ideology under the supervision of the Chinese authorities at home. And it is the most dangerous and most important point that all of us should stop at, which indicates a (Chinese foresight regarding its future relationship with the world and the American values ​​themselves).

  Hence, the ruling Chinese communist authorities raise in the face of the United States of America and the West themselves critics of its political practice under the slogan of (political consultation between the political parties in China, and collective consultative decisions), which means: those decisions taken by the ruling Communist Party after consulting (the Eight Liberal democracy Parties) in the Chinese society, and this is one of the most prominent points of intelligence in the mechanism of exercising governance in China, by allowing the absorption of those opposition political entities and parties as long as they submit an official request to work within Chinese society itself under the supervision of the Chinese state itself.

  This is what Washington fears when other Chinese expatriates submit the similar requests to the American authorities to allow them to establish communist and left ideological parties within the American society, expand their membership base by attracting and recruiting new members, and push those communist and leftist parties with Chinese communist ideology to compete in the future in the American elections by the Chinese or Russian financial fund raising.

  Through the previous analysis, the Egyptian researcher concluded that the current competition between the United States of America, China and Russia is no longer a political or even economic and cultural competition as much as it is a tacit recognition by Washington itself and its politicians that it is (an ideological and doctrine competition between the American liberal values ​​and Chinese communist values).

  By shedding light on what is happening inside the American interior by polarizing the communists themselves to work under the supervision of the American authorities, and the Chinese attracting these liberal democrats with American orientations to work inside communist China officially, it becomes clear to us that it is (an ideological game that has been preparing for many years between the Americans and the Chinese Communists).

  In the same context, the same idea invokes me in the Arab context and in the Middle East itself, is it possible to expand the base of real partisan competition between those with liberal and communist values ​​in our countries, or does the scale tilt only in favor of American liberal democratic values, despite criticism of the American policy itself in our Arab countries?

  And my last and most serious question remains in this new future analysis of the Egyptian researcher, and it is the inevitable question that I have no choice but to ask without searching for an answer to it, which is:

  Can China and Russia intervene to finance and establish Arab communist and leftist parties and in the Middle East in general, and even around the world under supervision of African, Arab, Latin and other governments closely related to China to expand the base of communists and bearers of communist tendencies at the expense of American liberal values?, It is the question of the future that we should all keep towards the future.

Continue Reading

Intelligence

The New World Order: The conspiracy theory and the power of the Internet

Published

on

“The Illuminati, a mysterious international organisation made up of the world’s top political and social elites, controls the workings of the entire world behind the scenes”. This is the world’s most famous conspiracy theory about the New World Order.

For hundreds of years, legends about the Illuminati have been spread and many people currently believe that the Illuminati still exist. It is believed that the Illuminati operate in various fields such as global politics, military affairs, finance and mass media and control the historical process of the entire world.

The ultimate goal is to establish a New World Order. Nobody can prove it, but many people believe it. This is the greatest paradox about conspiracy theories.

In the 2009 film, Angels and Demons – based on Dan Brown’s best seller of the same name about Professor Langdon, played by Tom Hanks – the story of the Illuminati, who supposedly originated in Europe during the Age of Enlightenment, was recalled. There were physicists, mathematicians and astronomers who questioned the “erroneous teachings” of the authority of the Holy See and dedicated themselves to the scientific field of the search for truth.

Eventually, the Illuminati were forced to become a clandestine organisation and have continued to recruit members for hundreds of years to this day. In Angels and Demons, the historical facts are clearly questionable, and the movie appeared after the great economic crisis of 2007-2008.

The New World Order conspiracy theory has been circulating for a long time and is full of mysterious theories that, however, convince many people who are powerless and dissatisfied with the current state of the world.

The Illuminati, who advocate the establishment of a New World Order through the planning of a series of political and financial events (the financial tsunami of 2007-2008 is said to have been planned by the Illuminati), attempt to influence the course of world history, and ultimately establish an authoritarian world government.

Supporters of the New World Order theory believe that even the powerful US government is now just a puppet government. While another “shadow government” made up of a few people makes decisions that will change the fate of the planet.

You might think that all of the above is just crackpot theories. Many people, however, believe this is true. According to a 2013 poll conducted by the Public Policy Polling Foundation, 28% of US voters believe that the New World Order is actually taking hold.

Brian L. Keeley, a professor of philosophy at Pitts College who devotes himself to the study of modern conspiracy theories, believes that an important feature of conspiracy theorists is that they cite some trivial and overlooked incidents and then propose a perfect explanation compared to an embarrassed official response. The reason why the conspiracy theory explanation can be widely disseminated is that it has no argumentation process to deny. It is just a judgement that jumps directly from hypothesis to conclusion. In the argumentation process, it is only a subjective interpretation of the event.

Nevertheless, for the public that does not fully understand the incident, the conspiracy theory provides an “explanation” for the unknown part of the said incident, and this “explanation” cannot be denied (because its very existence is not corroborated by real arguments and facts). It is therefore recognised as a valid argument by many people.

For example, no one has substantial evidence to prove that the Illuminati actually exist, but no one can prove that the Illuminati are purely fictitious. Therefore, you cannot deny their existence because their existence is “perfection without evidence”.

Columnist Martha Gill wrote in The Guardian on the subject, describing the Illuminati as the most enduring conspiracy theory organisation in world history.

“Conspiracy theories relating to the 1969 moon landing mission, the Kennedy assassination, the 9/11 attacks, etc., are all limited to a specific time and place. But conspiracy theories supporting the existence of the Illuminati can connect them. Anything about these connections, however, is difficult to prove”. In other words, the supporters of conspiracy theories may have common imagination and attribute everything to this organisation, so that every irrational phenomenon in the world can be explained.

Although no one can prove the real existence of the Illuminati, there is actually an alleged “global shadow government” in the world whose name is the Bilderberg Group. The Bilderberg Group holds an annual world-class private meeting and participants include elites from all walks of society such as government, business, media, science and technology.

Known as the “World’s Most Mysterious Conference”, the Bilderberg Group invites various famous political and economic figures to participate in its meetings every year.

Prince Bernhard van Lippe-Biesterfeld (1911-2004) held the first meeting in 1954. As the venue for the meeting was the Bilderberg Hotel in Oosterbeek, that name was used as the name of the group.

The existence of the Bilderberg Group is not a secret, but the content of the topics discussed at the Conferences is absolutely confidential and mainstream media cannot report on the content of the meetings.

The Bilderberg Group issues a press release every year to introduce the Conference participants and the outline of the topics discussed. Over the years, participants have come from many places, including Prince Philip of Edinburgh (1921-2021) of the British Royal Family, Crown Prince Charles, former British Prime Ministers, French President Macron, German Chancellor Merkel, former US Presidents Bush and Clinton, and even Bill Gates and other Internet giants. There were also Italians, as reported years ago in a newspaper of our country.

The 2018 Conference was held in Turin, Italy, in June. According to the description on the Bilderberg Group’s official website, the main topics included European populism, the development of artificial intelligence, quantum computer technology and the “post-truth” era. Obviously the actual content and results of the meeting’s discussion have never been reported.

Therefore, the Bilderberg Group has naturally become a locus where conspiracy theorists want to draw material. They describe the Bilderberg Group as true evidence of the theory that a very small number of elites controls the world, and the participants are planning a New World Order.

On the subject of strange things, let us give some examples. In June 2018, the British Royal Family was also caught up in conspiracy theories. When Prince Harry and his wife Meghan attended a show, they were caught on camera motionless, like two stiff and dull robots. Later related clips went viral on the Internet and netizens were in an uproar: many people believed that the distinguished members of the Royal Family were actually robots developed by high technology.

However, the management of the London museum, Madame Tussauds, later explained the mystery by stating that Harry and Meghan were only played by two actors who wore extremely high-realism wax masks on their faces – all to promote an exhibition of wax statues – and inadvertently caused an uproar.

In that short video, Harry and Meghan did not change their facial appearance and their expressions were stiff just like robots. Consequently, conspiracy theorists used this as evidence that they were robots secretly built by the British Royal Family.

This argument is an extension of the ‘trivial evidence’ mentioned above. The argument proponents ignore any argumentation process and directly draw the final conclusion through the above stated “trivial evidence”. This conclusion is highly topical and quite appealing. With the fast spread of the Internet, the “quick truth” will naturally be recognised and sought after by many people.

I think many people still remember the “Mandela effect” that spread wildly across the Internet in the early years as a false memory. The name “Mandela effect” is believed to have come from Fiona Broome, a self-described “paranormal consultant”, who created a website called the “Mandela effect”. Supporters of the ‘Mandela effect’ claim to “remember” that former South African President Mandela died in prison in the 1980s. But in reality, after being released from prison, Mandela served as President of South Africa from 1994 to 1999 and died in December 2013.

So why should anyone believe this seemingly absurd statement? The Internet has become a support platform for a lot of false content, fake news, as well as unreasonableness and lack of justification. When someone shared that ‘false memory’ with others on the Internet, many people believed it to be true, and even suddenly recalled having that memory: “Mandela died in prison that year”.

As a result, lies inconsistent with facts continue to spread. The lie is repeated thousands of times and many people consider it to be the truth: this learning phase is the first misleading rule on the Internet.

In the Internet era, multidimensional and multiplatform features have generated a number of online “malignancies” of conspiracy theories. Moreover, their dissemination ability is not limited to “believers” only. Since online social media provide a widespread and wide dissemination platform, one passes it onto ten people, ten spread it to a hundred, a hundred to a thousand, and so it goes on in geometric fashion, thus turning a ‘hot’ topic on the Internet into an absolute truth. Those who want to believe are naturally prepared and willing to do so. Moreover, these false opinions on the Internet may even have an impact on the real world.

For example, at the political level, everyone can now comment and participate in the online arena. For politicians to get the right to speak and set the agenda, the key is to rely on the public’s direction on the Internet. The Internet discourse has become the dominant factor of the political storytelling, and not vice versa. The characteristics of social networks are precisely the breeding ground for conspiracy theories.

The Internet is easy to spread among the public and it is exactly the breeding ground for conspiracy theories.

Nowadays, conspiracy theories are enough to influence politics and even political developments. A specific conspiracy theory gains a number of supporters through the Internet that promotes it to become a highly debated topic among the public. Consequently, it enters the real political arena coming from the virtual community and its influence can change the direction of governmental decisions.

Looking at it from another perspective, when conspiracy theories are put on the Internet and continue to proliferate – regardless of whether the Illuminati exist or not – they are enough to establish a New World Order. The real-world public opinions, as well as the composition of opinions and the basis of social discussions are changed, and thus world’s countries, politics and rulers are affected.

Continue Reading

Intelligence

USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware

Published

on

Pegasus Spyware Scandal has shaken whole India and several other countries. What will be its fallout no one knows as we know only tip of iceberg. Amidst Pegasus Spyware Scandal USA and Australia both have shown serious concerns about Cyber Attacks on US and Australian interests. Both say that China is hub of malware software and both face millions of such attacks daily.

I am trying to understand why a software is needed to spy on a particular individual when all calls, messages, data, emails are easily accessible from server. In most of cases these servers are located in USA and some cases these are located in host country. In certain sensitive cases Government Agencies have their own server like Central Intelligence Agency and hundreds of other agencies and military establishment world over including India. Now point is who installs those servers.

A couple of years back I had talked to Mr Mike Molloy who is Chief Executive Officer of Orion Global Technologies previously known as Orion SAS. He had explained me how his company installs servers in host countries on request of private or gov bodies. He talks about contract and trust. That means even when a company or Gov buys a server or software for designated uses the “Secrecy” Factor remain on discretion of company which has supplied server or software.

Now  if all data, e-mail, chat, messages, calls are accessible to Gov as per law and technology (Through Server all components of Communication are accessible and thats why  me and you see start seeing call recording of a person even after many years later), I am unable to understand why a Gov will be needing a software to Spy on any one.

Now coming to where Australia and USA wants to carry the whole debate.

Australian Foreign Minister Sen Marise Payne said, “Australian Government joins international partners in expressing serious concerns about malicious cyber activities by China’s Ministry of State Security.

“In consultation with our partners, the Australian Government has determined that China’s Ministry of State Security exploited vulnerabilities in the Microsoft Exchange software to affect thousands of computers and networks worldwide, including in Australia. These actions have undermined international stability and security by opening the door to a range of other actors, including cybercriminals, who continue to exploit this vulnerability for illicit gain”, She further added.

She opined, ”The Australian Government is also seriously concerned about reports from our international partners that China’s Ministry of State Security is engaging contract hackers who have carried out cyber-enabled intellectual property theft for personal gain and to provide commercial advantage to the Chinese Government”.

She warned China by saying, “Australia calls on all countries – including China – to act responsibly in cyberspace.  China must adhere to the commitments it has made in the G20, and bilaterally, to refrain from cyber-enabled theft of intellectual property, trade secrets and confidential business information with the intent of obtaining competitive advantage”.

On other hand USA’s The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory on Chinese State-Sponsored Cyber Operations. National Security Advisor said, ”Chinese state-sponsored cyber activity poses a major threat to U.S. and allied systems. These actors aggressively target political, economic, military, educational, and critical infrastructure personnel and organizations to access valuable, sensitive data. These cyber operations support China’s long-term economic and military objectives”.

The information in this advisory builds on NSA’s previous release “Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities.” The NSA, CISA, and FBI recommended mitigations empower our customers to reduce the risk of Chinese malicious cyber activity, and increase the defensive posture of their critical networks. 

Continue Reading

Publications

Latest

Trending