Connect with us

Intelligence

Peace or War in Cyberspace?

Published

on

Information and communication technology (ICT) plays an unprecedented role in today’s world, but cyberspace is clearly lacking in security mechanisms that can guarantee stable and sustained world development. Insufficient information security is a barrier to investment in high-tech sectors. Digital technology with its artificial intelligence (AI), cloud computing, big data, the internet of things (IoT), electronic medicine, and electronic finance is a hostage to the absence of internationally accepted rules of behavior in cyberspace.

All countries without exception are increasingly vulnerable to cyber threats. The international community needs to join forces to build a reliable information security system, but instead individual states pursue policies that make cyberspace even less secure.

The United States is undoubtedly a global ICT leader. However, over the past few years it has increasingly demonstrated an open desire to use ICT for military purposes. It has been developing military ICTs and intensively militarizing cyberspace, thereby unleashing a cyber arms race. There is ample evidence of this.

It was the United States that developed the Stuxnet computer worm, and the American use of it against Iran in 2011 was, as it were, a cyber Hiroshima and an alarm signal to the entire international community because that cyberattack might have had irreversible consequences for Iran, and for its region as a whole for that matter. That attack was effectively the first instance in history of a state using a cyber weapon against another state. Thereby, the United States threw Iran’s civilian nuclear program several years back.

In 2009, the Pentagon set up a body to direct cyberspace operations, the United States Cyber Command (USCYBERCOM), and put it in full-scale service the next year. Cyber Command is authorized to conduct both defensive and offensive operations. Its decisions are to be based on reports from the National Security Agency (NSA).

In August 2017, US President ordered Cyber Command to be elevated to the status of an independent unified combatant command. The order, which was implemented in May 2018, put Cyber Command on a par with the nine other unified combatant commands. Cyber Command is currently hiring hundreds of cyber operators to help carry out defensive and offensive cyber operations. The command is planned to eventually comprise nearly 6,200 personnel organized into 133 teams. According to media reports, these teams are due to achieve full operational capability by the end of  2018.

Lieutenant General Paul Nakasone, head of NSA and Cyber Command, has called for a more aggressive approach to opponents in cyberspace. For this reason, in March 2018 a road map was drawn up for Cyber Command that was entitled Achieve and Maintain Cyberspace Superiority. The new strategy requires that the U.S. military carry out practically daily raids on foreign networks and disable suspicious servers before they launch malicious software. The Pentagon is, besides, developing an advanced cyber weapon system to be called United Platform. Hardly any details about it have been disclosed but the facility is known to be planned as the basis for the defense of U.S. government agencies against hacker attacks and for offensive online operations.

The new cyber strategy is expected to force “strategic costs on our adversaries, compelling them to shift resources to defense and reduce [online] attacks.” But, in order to avoid any of its moves being qualified as an act of military aggression against another country, Cyber Command would not cross the line into actual warfare. Cyber Command’s initiatives are reflected in the 2018 National Defense Strategy, the year’s chief military doctrinal document of the United States.

The New York Times has cited current and former U.S. officials as warning that U.S. attacks against foreign networks may provoke “retaliatory strikes against American banks, dams, financial markets or communications networks.” Moreover, Cyber Command admits that its strategy poses diplomatic risks because, according to what it calls  “new vision” of Cyber Command, it is by no means terrorists, hackers or common criminals that are the United States’ main adversaries but states – China, Russia, Iran and others.

Another aspect of the United States’ new cyber policy is legislation. At the National Cybersecurity Summit in New York on July 31, 2018, which was hosted by the Department of Homeland Security (DHS), U.S. Vice President Mike Pence called on the U.S. Senate to enact legislation to create a specialized DHS body11. In order to fund the new body that should act as a centralized hub and encompass resources of the US national government, Mike Pence asked Congress for a record $15 billion.

The United States is going out of its way to monopolize cyberspace. It is an increasingly intensive enterprise, and what makes it particularly dangerous are Trump’s initiatives to do away with the traditional system of White House control of U.S. offensive and defensive cyber activities while a system that is going to replace it is still essentially in embryo.

The Wall Street Journal said that, on August 16, 2018, Trump with a stroke of the pen scrapped Presidential Policy Directive 20, which had been issued by former president Barack Obama and laid down rules on the use of cyber weapons against adversaries of the United States. According to the Wall Street Journal, Trump’s move aimed to lift restrictions on the offensive use of cyber weapons against foreign states because of alleged fears that some supposed hackers were plotting to meddle in U.S. congressional elections in November 2018.14

Hence, the United States is replacing the Obama-era cyber strategy of defense and deterrence with a strategy authorizing aggressive offensive action up to pre-emptive cyberattacks against sovereign countries.

Besides, the United States has for several decades been conducting global espionage via the Echelon electronic system that was based on a 1947 agreement between the United States and four allies. Today’s sophisticated ICTs enrich the resources of U.S. intelligence services. One good example is the Program for Robotics, Intelligent Sensing and Mechatronics (PRISM), which has been running since 2007 and is a facility for the mass-scale secret collection of digital data without judicial approval. In 2013, former CIA employee Edward Snowden publicized documentary evidence that PRISM gave American intelligence services access to the central servers of nine key Internet companies – Microsoft, Yahoo!, Google, Facebook, Paltalk, YouTube, AOL, Skype, and Apple. This implies that the intelligence services are building a global database of audio and video files, photographs, emails, and personal data of social network users. Moreover, according to Snowden’s revelations, NSA tapped the telephone conversations of 35 world leaders and some foreign diplomats, also via PRISM. Experts claim that U.S. intelligence services, in collaboration with Britain’s Government Communications Headquarters (GCHQ), have been cracking practically all Internet cryptography standards by using supercomputers and the services of savvy hackers.

The United States’ cyber weapons buildups and global cyber espionage threaten world security. The United States may accuse any country of a hacker attack without any substantial evidence and launch an aggression, even armed action, against it with the assistance of its allies. The range of actions prescribed by the 2015 version of the U.S. Defense Department’s cyber strategy includes armed retaliation for cyberattacks. Recently, Western politicians, mainly the U.S. administration, have been showering Russia with accusations of cyber transgressions of all kinds. In tune with the established practice, no sustainable evidence has been provided of alleged Russian subversive cyber activities. Because of the fanning of the Russian hacking myth and fake news, it largely goes unnoticed that Russia itself has been a victim to large-scale cyberattacks – in 2017, for example, its critical state infrastructure came under more than 70 million attacks.

Nearly 20 years ago, Russia became the first country to sound the alarm at the United Nations about threats that were germinating in cyberspace. Moscow put forward a breakthrough initiative for a guarantee of international information security – a draft UN General Assembly resolution entitled Developments in the field of information and telecommunications in the context of international security. Since 1998, draft resolutions with the same title have been included in General Assembly session agendas every year. In 2017, to ensure the continuity of information security debates in the United Nations, Russia and more than 60 other countries proposed that the General Assembly put the cybersecurity issue on the agenda for its 73rd session. The proposal received unanimous approval.

Russia also initiated the creation of a UN negotiation mechanism on international information security – the Group of Governmental Experts on Developments in the Field of Information and Telecommunications in the Context of International Security (GGE). The GGE has reached agreement on many key points such as sources of cyber threats, the imperative of taking action against cyber terrorism and cybercrime, and the principle that international law applies to cyberspace. The GGE unanimously approved three detailed reports that recommended rules on the responsible behavior of states in cyberspace. In 2015, the member states of the Shanghai Cooperation Organization (SCO) put before the United Nations a proposed draft document that aimed to prevent conflicts in cyberspace and was entitled International Code of Conduct for Information Security.

The Russian position amounts to the principle that no military or political conflicts in cyberspace are acceptable and that therefore any policy that doctrine declaring the use of force in cyberspace a fair method must be rejected.

Russia stands for a digital world order that is based on equality and justice and guarantees the possibility of advancing national interests to all countries regardless of their level of technological development. State sovereignty, non-use of force, the non-interference of a country in the internal affairs of another country, the observance of the fundamental rights and freedoms of the individual, and the equal rights of all states in governing the Internet must be key principles.

The international community needs to develop universal rules on responsible behavior in cyberspace, rules that would be approved by all states. This is a fundamental condition for peace in cyberspace. Russia as the initiator of UN debates on international information security urges all countries to start full-scale work on such rules. Moscow plans to submit a draft resolution containing a basic set of rules to the General Assembly’s First Committee during the Assembly’s 73rd session this year. The planned resolution would include all of the GGE’s recommendations of 2010, 2013 and 2015. It would propose 25 rules, including –

– purely peaceful use of ICT;

– international action to prevent conflicts in cyberspace;

– observance of the principles enshrined in the UN Charter, including the sovereign equality of states, refraining from the threat or use of force, and the non-interference of states in the internal affairs of other states;

– avoidance of groundless accusations of malicious use of ICT and provision of evidence to support any accusation;

– non-use of ICT by states for interfering in the internal affairs of other states;

– non-use of mediators for cyberattacks;

– measures to prevent the spread of malicious ICT instruments and harmful hidden functions.

Russia proposes that these 25 rules should be a basic set of guidelines that might be adjusted and enlarged afterward. This process could be carried out in 2019 by the renewed UN GGE on IIS, which will ensure continuity of IIS discussion within the UN through already tested format.

Cybercrime has been growing on an unprecedented scale, posing a serious international threat. UN Secretary General António Guterres has said that cybercrime yearly inflicts damages of about $1.5 trillion on the world.

Regional legal mechanisms such as the Council of Europe Convention on Cybercrime (Budapest Convention), which was signed in 2001, cannot defeat this evil, although the West literally tries to force the convention on the entire world, including Russia, as the only possible format for international anti-cybercrime action.

Russia’s position on the Budapest Convention remains unchanged. Moscow has repeatedly pointed out that it cannot accept Article 32b of the convention, which, allegedly in the interests of criminal investigations, effectively allows a state to access information stored on any computer on the territory of another state without seeking the latter’s permission for this and even without notifying that state.

Russia believes that it is imperative to develop a new, universal instrument for combating cybercrime. This idea is enshrined in the declaration of the BRICS summit of July 2018. Russia plans to initiate a full-scale debate on this matter in the UN General Assembly’s Third Committee by submitting a draft resolution “Countering the use of ICTs for the criminal purposes” to that effect.

A draft universal convention on cooperation in combating cybercrime that was submitted by Russia to the United Nations was accepted by the General Assembly as one of its documents on December 28, 2017 and was meant to act as “food-for-thought”. It becomes clear that a start for the relevant wide political discussion within the UN General Assembly in New York is needed.

Absolutely all states are obviously in the same boat as regards cybercrime. Some of them are safer against it than others but all are vulnerable to it, and the United States with all its numerous cybersecurity services is no exception either. In a world harassed by cyber gangs, international community should jointly deal with real and not fake threats and criminals.

There is an alternative to the cyber arms race – a cyberspace peace plan proposed by Russia and other countries standing for strengthening peace and security in information space. Future reactions in the United Nations to Russia’s information security initiatives will make clear who really wants peace in cyberspace and who uses manipulation and fake concerns as a screen for plans to unleash a cyberwar.  Maintenance of peace in cyberspace is the responsibility of each sovereign member of the international community.

First published in our partner International Affairs

Prof. Alexander Zinchenko, D. Sc. (Hist.), Professor, Senior Expert, Center for International Information Security and Scientific and Technological Policy of the Moscow State Institute of International Relations (MGIMO University) of the Russian Ministry of Foreign Affairs, Anastasia Tolstukhina, Cand. Sc. (Political Science), Program director, RIAC

Intelligence

How Taliban Victory Inspired Central Asian Jihadists

Published

on

Old and young generations of Uighur jihadists

Following the fall of the US-backed Afghan government of Ashraf Ghani on August 15, al-Qaeda-linked Uighur, Uzbek and Tajik jihadi groups widely celebrated the Taliban’s “historic victory” over the “enemies of the Muslim Ummah”. In honor of the Taliban’s rebuilding of the Islamic Emirate, leading Jihadi groups from Central Asia and China’s Xinjiang Autonomous Region issued special congratulatory statements, echoed jihadi nasheeds (chants of jihadi glory), arranged a festive feast for their Muhajeers (who immigrated to spread Islam and wage jihad) and gloatingly booed the US military forces leaving Afghanistan on jihadi media.

Turkestan Islamic Party called on all Muslims to unite around the Taliban as one body

Uighur jihadists of the Turkestan Islamic Party (TIP), formerly known as the East Turkestan Islamic Movement (ETIM) from Western China, were one of the first to congratulate the Taliban victory. On August 16, in a statement of the TIP’s Syrian branch, released by its propaganda arm, ‘Muhsinlar’, Uighur militants congratulated the Taliban’s emir Haibatullah Akhunzada and all Afghan fellow believers on the restoration of the Islamic Emirate of Afghanistan.

Notably, in its statement, TIP ‘discovered’ the root causes of the Taliban’s victory in the Muslim holy book of the Quran, which refers to Surah al-Fatiha “Indeed, we have given you, o Prophet, a clear conquest” (48:1). The TIP further emphasized that “one generation of Muslims have sacrificed themselves for the religion of Allah, for today’s boundless joy and rejoicing.” The Taliban’s victory is “a fruit of long and arduous struggle and God’s big gift to Muslims worldwide”, the statement reads.

The TIP’s Syrian branch has called on all Muslims to make dua’s (invocation of God) for the Afghan Mujahedeen, to cooperate and support their fellows of Taliban. Uighur jihadists emphasized the need for the integrity of the Islamic Ummah, which should be governed only by the rule of the Almighty as one nation and one country. At the end of the statement, TIP noted that “East Turkestan Mujahedeens, as an integral part of the Great Ummah, celebrated the historic victory of the Taliban with boundless joy, and will stand alongside them shoulder to shoulder.”

Katibat al Tawhid wal Jihad’s amir Abdul Aziz al-Uzbeki celebrates Taliban victory

It is recalled that ETIM was designated as a terrorist organization by the UN Security Council resolutions 1267 and 1390 on September 11, 2002, for its alleged association with al-Qaeda, its leader Osama bin Laden, and the Afghan Taliban. As part of the “global war on terror,” the US Federal Government designated ETIM as a terrorist organization on August 19, 2002. At that time, China skillfully took advantage of the situation emerging after the 9/11 attacks, achieving the recognition of ETIM as a terrorist group by many members of the U.S.-led “war on terror” coalition.

However, on November 5, 2020, the US Department of State removed ETIM from the blacklist, which provoked a fuming reaction from official Beijing. China on the other hand is pursuing a harsh repressive policy against the Muslim minority in its Xinjiang region detaining more than one million ethnic Uighurs, Kazakhs and Kyrgyz in so-called “re-education camps.” Despite the US decision, the post-Soviet Central Asian countries, Russia and China did not exclude TIP from their banned list of terrorist organizations.

According to the latest 2021 UN Security Council’s report, “several hundred Uighur jihadists of TIP located primarily in Afghan Badakhshan and neighboring provinces, whose strategic goal is to establish an Islamic Uighur state in Xinjiang, China.” The report stated that TIP affiliated with both the Taliban and al-Qaeda, and their ties remain “strong and deep as a consequence of personal bonds of marriage and shared partnership in struggle, now cemented through second generational ties.” Moreover, the notorious leader of TIP, Abdul Haq al-Turkestani, has remained a member of al-Qaeda’s elite Shura Council since 2005. For more two decades, the most wanted key Uighur jihadist has been openly loyal to the Taliban’s top leader Haibatullah Akhunzada and the al-Qaeda’s emir Ayman al-Zawahiri. Today, all three top emirs are successfully continuing their faithful jihadi fellowship, skillfully hiding their close relations, and throwing dust in the eyes of the US and its Western partners, tired of the “longest war”.

Thus, it can be assumed that despite the Taliban’s warm relations with the Chinese government after their return to power in Afghanistan, it is unlikely that they will break ties with the Uighur jihadists of TIP. On the contrary, both are expected to remain loyal to the oath of allegiance (bayat). The long relationship between the Taliban, al-Qaeda and TIP has shown that the bayat has a sacred religious value for them.

Taliban is a source of inspiration for Katibat al Tawhid wal Jihad

The Uzbek jihadist group Katibat al Tawhid wal Jihad (KTJ) on its Telegram channel posted a video congratulating the Taliban on the victory over the most powerful evil empire in the world, which it considers the US. The congratulations were unusual, as the three KTJ leaders via video addressed the Taliban comrades in joint jihad in three official languages of Afghanistan – Pashto, Dari and Uzbek. In particular, the KTJ’s top emir Abdul Aziz al Uzbeki, whom the UN identified as ‘Khikmatov,’ spoke in Pashto, the military commander Sayfiddin in Dari, and the main ideologist of Central Asian Salafi Jihadism, the group’s imam Ahluddin Navqotiy in Uzbek.

Abdul Aziz glorified the Taliban’s victory over the foreign invaders and occupiers as a gift from Allah Almighty to the Ummah. He eulogized the vision of Mullah Muhammad Omar, the Taliban’s first emir, who once said, “Allah has promised us victory and America has promised us defeat, so we shall see which of the two promises will be fulfilled.” Top Uzbek jihadist further noted that “today, after a long-suffering patience, tireless struggle and great jihadi perseverance, finally came Nusrat (victory) in Khorasan, promised by Allah.” “Because the Mujahedeen are stronger in spirit and faith in God than the invaders, who, despite their military might and immeasurable wealth, fled the country in shame”, concluded Abdul Aziz.

Katibat al Tawhid wal Jihad leader Abdul Aziz al-Uzbeki (second right) and KTJ military commander Sayfiddin (second left)

Then, in an emotional speech, the group’s hard Salafi ideologist, Ahluddin Navqotiy, congratulated the Taliban Mujahedeen on behalf of KTJ Muhajeers waging a jihad in Syria’s Idlib province against Bashar al-Assad regime and pro-Iranian radical militias. He expressed confidence that today’s Nusrat of Allah in Afghanistan will become the driving force behind the establishment of Sharia rule in Central Asia.

Noteworthy, the KTJ leader, Abdul Aziz, had close ties with al-Qaeda and the Afghan Taliban, in particular with the Haqqani network. As a native of the Fergana Valley of Uzbekistan, Abdul Aziz made a hijrah (migration) to Afghanistan fleeing the repressive policies of Uzbek President Islam Karimov in the early 2000s. He waged a jihad in Afghanistan as part of the Islamic Movement of Uzbekistan (IMU). Then, in 2015, along with dozens of comrade-in-jihad, he split the group and joined the Islamic Jihad Union (IJU), a splinter faction of the IMU. At the time, Central Asian jihadists split over the internal conflict between al-Qaeda and ISIS struggling for the leadership of global jihad.

On August 20, 2015, when the IMU officially swore allegiance to the ISIS leader, Abu Bakr al Baghdadi, the IJU followed in al Qaeda’s footsteps and renewed bayat to the Taliban’s emir Mullah Akhtar Mohammad Mansour. In May 2005, a decade before these events, the US government listed the IJU as a Specially Designated Global Terrorist organization in May 2005.

He belongs to the first generation of foreign fighters from Central Asia, who went through Taliban’s jihadi school in Afghanistan. He gained prestige among the fellow militants as a military strategist, and not as a deep scholar of the Quran or a public orator-ideologist of Salafi jihadism. In 2008-15, Abdul Aziz, along with the IJU’s leadership, was based in the al-Qaeda’s military hub of Mir Ali in North Waziristan. In one of his Jummah Khutbah preaching he admitted that allowing the Pakistani ISI (Inter-Services Intelligence) to take refuge in North Waziristan saved the lives of many Uzbek jihadists from the US drone strikes. In 2019, Abdul Aziz made a hijrah to Syrian Idlib province and became the leader of the KTJ group.

Motivations and Strategies of the Central Asian Jihadism

The congratulations from the Central Asian Sunni militant groups to the Taliban were a vivid manifestation of their long-term and tested joint jihadi cooperation, which began in the late 1990s. Thus, Uighur’s TIP and Uzbek’s KTJ complemented a long list of global jihadist groups such as al-Qaeda’s Central Command and its franchises in Arabian Peninsula (AQAP), in the Indian Subcontinent (AQIS), Hurras al-Deen (HD), Jamaat Nusrat al-Islam wal-Muslimin (JNIM), Hayat Tahrir al-Sham (HTS), the Tehreek-e-Taliban Pakistan (TTP) and Hamas, congratulating the Taliban on their ‘victory’ over the US and NATO forces.

To celebrate the Taliban’s ‘victory’, Uighur, Uzbek and Russia’s Caucasian Jihadists in Syria also hosted grand feasts for foreign and local Sunni Arab militants and heroized the Afghan Mujahedeen during Jummah Khutbah Sermons. The Central Asian jihadi media widely published photos and videos from these parties and against this background tried to recruit new supporters to make hijrah to Afghanistan and Syria to protect the values of Islam and wage the sacred jihad against the infidels. The dramatic picture of Afghan government soldiers fleeing to Uzbekistan and Tajikistan has made the Taliban and al-Qaeda more attractive for recruiting a new generation of Islamists from Central Asia. Calls to make hijrah, or migrate, to the Taliban’s so-called Islamic Emirate of Afghanistan are also surfacing on jihadist forums. If the Syrian province of Idlib falls, al-Qaeda-aligned and HTS-backed Uzbek and Tajik jihadists’ migration to Afghanistan will be inevitable. The Taliban can easily melt them into Uzbek, Tajik and Kyrgyz societies in northern Afghanistan and use them as leverage over rebellious ethnic minorities.

So, analysis of the jihadist media indicated that al-Qaeda-linked and Taliban-backed Central Asian extremist groups, operating in both Afghanistan and Syria, were deeply inspired by the Taliban’s victory over the pro-Western government of Ashraf Ghani. As a result, small and fragmented Salafi-Jihadi groups from post-Soviet countries have received the biggest boost to unite around the Taliban and al-Qaeda. Consequently, conducive conditions after the Taliban’s takeover of Afghanistan are expected to lead to a resurgence of al Qaeda in the Central Asian region. Latent al-Qaeda sympathizers and other radical Islamists in the “Five Stans” view the restoration of the Islamic Emirate on the other side of the border as the beginning of the great jihad’s revival and the approach of Nusrat. With the decline of ISIS and the rise of the Taliban and al-Qaeda, internal divisions, and inter-group feuds between the jihadist jamaats (group) of Central Asia, sometimes accompanied by bloodshed, are expected to diminish, and the volume of clandestine donations to jihad in the region are also expected to increase markedly.

But the main fear for local authoritarian and corrupt pro-Russian governments is that a Taliban victory could provide a historic boost for Uzbek, Tajik and Uighur violent extremist groups encouraging them in their campaigns to overthrow and replace local regimes. And although the Taliban is viewed by the world community as a Pashtun nationalist jihadi movement, and the Afghan jihad has always been more inward and parochial, nevertheless its ideological influence has always been strong among the Central Asian jihadists.

Despite the fact that the Taliban leadership publicly denies the presence of transnational terrorist groups in the country, a recent UN report revealed that there are about 10,000 foreign fighters in Afghanistan, who are members of al-Qaeda, Uighur’s TIP, Uzbek militant groups Katibat Imam al-Bukhari (KIB), KTJ, IJU and Tajik’s Jamaat Ansarullah (JA). Moreover, some of them took an active part in the recent military attacks against the Afghan army on the side of the Taliban, which led to the rapid fall of Mazar-i-Sharif, the strategically important capital of the Northern Alliance. As we predicted earlier, the Taliban exploited the Central Asian jihadists during the fighting in the north of the country as their “hard power” and political leverage on the former Soviet republics of Central Asia. When the Taliban captured a strategically important security checkpoint near Afghan border with Tajikistan in July, they assigned a Tajik jihadi group Jamaat Ansarullah (JA) to raise the Taliban flag on the site. They also put JA in charge of security in five districts of Afghanistan’s Badakhshan Province – Kuf Ab, Khwahan, Maimay, Nusay, and Shekay – near the Tajik border.

Although the Taliban has repeatedly promised not to allow Afghanistan to be used as a staging ground for any attacks, they will not sever their ties with Central Asian jihadi groups and will not violate the bayat. Uzbek, Uighur and Tajik jihadist groups are expected to maintain a safe haven in Afghanistan under the tacit and tight control of the Taliban. In the jihadist world, bayat or pledging allegiance is a heavy Islamic commitment reaching under the holy gaze of Allah Almighty, and reneging it is considered a serious offence. Therefore, the Taliban has never disavowed the group’s pledge.

In conclusion, the high fighting spirit and ideological strength of al-Qaeda-affiliated Central Asian jihadist groups in Afghanistan is associated not only with the Taliban’s lightning victory, but also with the humiliating and chaotic US withdrawal from the country. One of the Kyrgyz jihadists in Syria wrote on the KTJ Telegram channel that “the honor and dignity of America today is under the Taliban’s feet in front of the great Ummah.” This indicates that a new generation of Central Asian extremists has emerged on the scene of global jihadism, absorbing in itself the al-Qaeda’s Salafi-Takfiri military ideology, and synthesizing it with the Islamist nationalism of the Taliban, based on the common kindred Hanafi’s al-Maturidi Aqeedah (Sunni Islamic theology school). As the US counterterrorism capacity in Afghanistan weakened in the foreseeable future, the terrorism threat from Central Asian region will grow symmetrically for the US and the West as a whole.

Continue Reading

Intelligence

Russia, Turkey and UAE: The intelligence services organize and investigate

Published

on

The FSB (Federal’naja Služba Bezopasnosti Rossijskoj Federácii, the Federal Security Service of the Russian Federation) – created in 1995 from the ashes of the Komitet Gosudarstvennoj Bezopasnosti (KGB), the State Security Committee – is ready for additional responsibilities under the new national security strategy. President Putin’s recent redefinition of the FSB’s role provides some indications on the national security strategy that will soon be announced – a strategy that will affect seas, borders and the security of strategically important intelligence.

On June 1, 2021 President Putin issued a decree outlining the new priorities that will be given to the FSB in Russia’s revised national security strategy, which replaces the one that officially ended last year.

The changes to the Intelligence Service’s regulatory framework, including the peripheral one, provides some indications on the Russian security priorities. Some of the main changes include additional responsibilities for intelligence security, counterterrorism, border control and stronger protection of maritime interests.

Border control and the various references to counterterrorism in its broadest sense – as recently defined by Russia – means entrusting the security service with a number of new areas and tasks, including the redefinition of procedures to detect political radicalisation.

Border control is also strengthened in the revised rules, with FSB border guards acquiring records, filing and storing biometric data and obtaining and processing DNA information obtained during border checks.

The details on access to Russian soil shed light on the Kremlin’s problems with its own fellow countrymen. In the article on the FSB’s involvement in controlling entry into Russia, the decree mentions the “territories requiring special authorisation” such as Transnistria, some parts of Georgia and Eastern Ukraine, and states that the FSB will be involved in a national programme to facilitate the voluntary repatriation of Russians living abroad.

Intelligence is a valuable asset and its security has always been one of the Kremlin’s main concerns. Therefore, the new strategy makes the FSB the leading agency, not just the end user regarding computers, security and telecommunication encryption.

It will oversee and supervise the implementation of the new technological security throughout the community. All this was outlined in December in a law that redefined the role of the FSB’s Centre for State Licensing, Certification and Protection. It will grant licences for the use of “special technical means and equipment intended to receive information secretly”.

The FSB will also examine patents for classified inventions. In addition to its official role in intelligence warfare, the FSB has been tasked with producing more security measures to protect the identity of Russian intelligence agents, and keep the confidentiality of its own officials, officers and soldiers.

The Internal Security Service will also set up a new procedure to inspect agents and individuals entering the army, the intelligence services and the Federal Administration. Using the protection of marine life as an additional task, the FSB will also have increased responsibilities for the seas, including competence and powers over the protection of fishing grounds outside Russia’s exclusive economic zone, the establishment of checkpoints for fishing vessels entering or leaving the zone, and the power to suspend the right of passage for foreign vessels in certain Russian maritime zones.

The Service will also define the structure of operational offices in maritime zones. These measures follow a law adopted last October outlining the FSB’s role in “establishing control and checks in fisheries and the conservation of sea biological resources”.

An important concept in Russian history and life is the silovik. He is a representative of law enforcement agencies, intelligence agencies, armed forces and other structures to which the State delegates the right to use force. This concept is often extended to representatives of political groups, but also to businessmen, associated with power structures in Russia or formerly in the Soviet Union.

As a jargon term, this word is used in other languages as a broad political term in everyday conversation and in journalism to describe political processes typical of Russia or the former Soviet Union. The etymology of the word is the Russian word sila, meaning strength, force and power.

Trying to renew the aforementioned concept, President Putin provides momentum and injects new impetus into the meaning of this word. After putting the issue on the agenda of the National Security Council of May 28 last, the President is now pushing for the publication of the national security strategy. It has been delayed despite the fact that the Deputy Secretary of the Security Council of the Russian Federation (Sovet bezopasnosti Rossijskoj Federacii), Sergej Vachrukov, had announced it was to be published in February.

As we might commonly believe, the steps to strengthen the Russian secret services are not so much focused on the aforementioned and movie-style “derby” between secret agents, but are mainly targeted to Russia’s traditional “Ottoman” adversary, namely neighbouring Turkey.

President Erdogan’s official meeting with the UAE’s National Security Advisor, Tahnun bin Zayed al-Nahyan, and the renewed ties with Abu Dhabi are the result of behind-the-scenes regional intelligence operations in which the Kremlin wants to see straight and clearly.

While there is still a deep political divide both between Russia and Turkey, and between Turkey and the United Arab Emirates, the Turkish President hopes to encourage future Emirates’ investment. Turkish President Erdogan’s unprecedented meeting with the UAE’s national security representative, the aforementioned al-Nahyan, in Ankara on August 18 can be largely attributed to the work of the two countries’ intelligence services over the last few months.

There is a desire to turn a new page after eight years of icy relations, crystallised by the 2013 overthrow of Egypt’s leader Mohamed Morsi, a Muslim Brotherhood’s member close to Turkey and firmly opposed by the United Arab Emirates.  

Steps towards reconciliation began on January 5, 2021 at the Gulf Cooperation Council Summit in al-Ula. The Summit marked the end of Qatar’s isolation, thus paving the way for a resumption of relations between the UAE and Turkey. After the Summit, al-Nahyan flew to Cairo where he met President Abdel Fattah al-Sisi, who strongly encouraged him to begin a new chapter with Turkey.

At the same time, Egypt’s intelligence service, Mukhabarat al-Amma, engaged in secret talks with its Turkish counterpart, the Milli İstihbarat Teşkilatıı. However, it was al-Nahya’s meeting with the Turkish intelligence Chief, Hakan Fidan, in Cairo a few weeks later that achieved the first results.

That meeting was organized by the Chief of the Mukhabarat al-Amma and by Abbas Kamel, al-Sisi’s regional Director, along with Ahmed Hosni, the strongman of Jordanian Dayirat al-Mukhabarat al-Amma, that King Abdallah II had sent from Amman. Since then, there were eight additional meetings between Turkey and Abu Dhabi, which then led to the aforementioned meeting of President Erdogan with al-Nahyan, with the possibility of holding a future Summit between them.

This rapprochement still has difficulty hiding the deep divide between the two countries on key regional issues such as their respective positions on Syria and Libya, in particular. While they have managed to find some common ground for understanding – ending smear campaigns and trade blockades; resuming visa issuance; direct air links and the return of Ambassadors – President Erdogan and al-Nahyan are simply keeping quiet about their current irreconcilable differences.

Political considerations are put aside to facilitate future UAE’s investment in Turkey.

On August 25, the Emirates’ Group International Holding CO announced it would invest massively in Turkey’s health and agrifood industries, while it seems that the sovereign fund Abu Dhabi Investment Authority is willing to lend Turkey 875 million US dollars.

Is it just business? Russia is investigating.

Continue Reading

Intelligence

Power Vacuum in Afghanistan: A By-product of An Incompetent Geopolitical Contract

Published

on

taliban afghanistan

I still recall the evening of December 18, 2011, when I read the news of the last U.S. troops being pulled out of Iraq, that ended an eight-year-long military involvement in the region. Somehow the news instantly gave me an uneasy feeling knowing that a catastrophic storm was awaiting and will mark the beginning of a cataclysmic civil war. Within hours of U.S. military troops leaving the land, Iraqi’s rival Sunni and Shi’ite factions resumed a kind of political infighting that threatened a lurch back into turmoil. Shi’ite Prime Minister Nuri al-Maliki ordered an immediate dissolution of his Sunni deputy and issued an arrest warrant for the Sunni Vice President. Not only Sunnis gradually lost the authority of power in the government and security discourse, but the Sunni elites, who challenged Maliki were subsequently either tortured or killed. Out on the streets, after the ISF raided the home of Iraq’s minister of finance, who was also a member of Iraqiya coalition, Sunni protest broke out in Fallujah; and the fire spread across the country. Iraqi Security forces killed between 50-65 civilians on Maliki’s order. This led to the most notorious consortium in the history of global terrorism – an alliance between the Sunnis and ISIS. On July 21, 2013, ISIS initiated a 12-month campaign called the ‘Soldier’s Harvest’ on Iraqi security forces, teamed up with Sunni tribal leaders and former Baathists, and ultimately forcing ISF to evacuate Fallujah and remnants of its government. Soon after, ISIS attacked Abu Ghraib prison freeing up to 1000 minacious inmates, including senior al-Qaida leaders and militants. Empowered and endued with Sunni support, ISIS officially seized Fallujah, parts of Ramadi and Mosul, by June 2014. By gripping Mosul alone, ISIS gained $480 million in stolen cash and armed itself with two divisions’ worth of military weapons and ammunition that were left behind by the U.S. military troops. And, within six months, ISIS became the world’s most well-funded and equipped terrorist group in the world – controlling approximately 100,00 square kilometers of territory across Iraq and Syria at its zenith. Not just the Middle East, ISIS spread its terror tyranny globally as well with strategic attacks on Paris and Brussels.

So, what led to the birth of ISIS? Two words – Power vacuum; and the U.S. policy in Iraq between 2010 and 2011 actively created this geopolitical conditions in which ISIS thrived.

Stages of Power Vacuum – From The Birth of ISIS in Iraq to Rise of The Taliban in Afghanistan

If one thing that we have learned from the U.S led invasion in Iraq is that an incompetent geopolitical contract abhors a political vacuum. In political science, the term power vacuum is an analogy that deconstructs and artificially manufactures power relations and political conditions in a country that has no identifiable central power or authority. In a critical situation like this, the inflow of armed militia, insurgents, warlords, dictators, and military coups to fill this vacuum becomes an organic response, and it comes with a cost – the cost being a noxious civil war and national unrest. On the other hand, a power vacuum can also thrive in conditions following a constitutional crisis where the majority of the ruling government entities resign or are removed, giving birth to an unclear anecdote regarding succession to the position of power. 

What happened in Iraq starting December 2011, and what is happening in Afghanistan today in 2021, is a result of a power vacuum – a by-product of an incompetent geopolitical contract. Twenty years after being forced into power annihilation by the U.S led military bases in Afghanistan, the Taliban is now actively resuming its power as the U.S continues to execute its full exit. Within hours of Joe Biden announcing the official termination of U.S military involvement in the country, Afghanistan President Ashraf Ghani worded a farewell post on social media, vocalizing that he must leave the country to prevent bloodshed. Today, the only remnant left of his political presence is his departing statement, “Long Live Afghanistan.” With the President fleeing the country, and creating a constitutional crisis of succession to the position of power, what we are witnessing is the manifestation of the initial stage of power vacuum. Soon after the President abandoned the country, the Taliban released a statement declaring that the group has taken over Kabul, a capital city of 6 million civilians, and is working to restore law and order. Considering the reputation of the Taliban – infamous for brutality, repression of women, and execution of religious minorities in the past, the idea of restoration of law and order appears antagonistic.

However, I am not interested in deconstructing the inimical and deleterious ideologies of the Taliban, but unfolding the mechanisms of the power vacuum in Afghanistan. With the Taliban now actively trying to fill this power vacuum created after Ghani’s disappearance, the second stage is at play. The primary question here is not about who will form the national government, but what type of alliance will be established among entities to procure this power. The typology of this alliance – its fundamental values, utility, durability, and workability, will regulate Afghanistan’s democracy and sovereignty in the coming years. If one turns back to 2011 in Iraq, you will recall how the alliance between Sunni tribal leaders and ISIS gave birth to a global terror reign. This was a direct result of abysmal policy deliberation and the abrupt exit of the U.S military troops from Iraq. So, the question is – now that the U.S military troop has ended its twenty-year-long involvement in Afghanistan, what type of alliance will be formed to fill this power vacuum? Will it be as catastrophic as Iraq? As the Taliban continues to coercively occupy the cities, Matthew Levitt, Director of Counterterrorism and Intelligence at The Washington Institute for Near East Policy adds, “The possibility is very strong that Afghanistan will have both – a weak government and a government that has a close alliance with the elements of al-Qaeda. To add, there is an element of ISIS, ISIS Khorasan, as well. Although the Taliban doesn’t like them, but as we are witnessing the effort to evacuate people through Kabul airport and the threats of ISIS suicide bombers coming into Kabul, the fact is that the Taliban probably won’t for a very long time have control over all of the city, let alone all of the country. So, there will be an element of a safe haven even for groups that the Taliban doesn’t like – groups and alliances that will use Afghanistan as a base from which to operate and carry out terrorist attacks nationally and globally.” 

It is worth noting that the alliance between the Taliban and al-Qaeda started with its leaders Osama bin Laden and Ayman al-Zawahiri, who pledged their allegiance to Taliban leader Mullah Omar in kid 1990s, and accepted Omar as Amir al-Mu’minin (Commander of the Faithful) of all Sunni Muslims. Al-Zawahiri later re-affirmed this pledge to Omar’s successors. Soon after, al-Qaeda gained substantial freedom to operate in Taliban-ruled Afghanistan. In return, al-Qaeda doled out money to the Taliban. Since then, to up till now, the alliance between Taliban and al-Qaeda has flourished mutually. Soon after the Taliban’s victory in Afghanistan, al-Qaeda congratulated the group and spoke about their alliance for Kashmir liberation in India. A letter was addressed to the Taliban by al-Qaeda and was shared on Twitter by a journalist. It read, “Allah! liberate the Levant, Somalia, Yemen, Kashmir, and the rest of the Islamic lands from the clutches of the enemies of Islam.”

If this alliance continues to grow stronger to seize power, the probable birthing of one of the deadliest terror organizations is certain – a terror entity that would not only have passive support of the Taliban but would surpass the atrocities committed by ISIS in Iraq. This is a direct result of Biden’s ham-fisted deliberation to exit Afghanistan abruptly, leaving a space to harbor national unrest, the collapse of a democratically elected government, procurement of this political vacuum by insurgents, and brutal violence by the Taliban against its civilians. In short – the fall down of Afghanistan democracy.

The third stage of the power vacuum is yet to mature in Afghanistan. This stage expediates the process of procurement of power, if any of the entities trying to seize power acquires economic funding and gets equipped with advanced military weapons. Jan Pieterzoon Coen, a leading officer of the Dutch East India Company in the 17th century, said, “There’s no trade without war; there’s no war without trade”. He was right. The establishing of power requires a trade that allows an alliance of immaterial ideology between groups and hoarding of material resources (weapons and money)  to execute the ideology. In 2011, the Islamic State armed itself with two divisions’ worth of military weapons and ammunition that were left behind by the U.S military troops. They used these weapons to terrorize the civilians, execute opposition, and expand their captured territory. Another material resource may include stolen or funded cash apart from military machinery. For example, by gripping Mosul alone, ISIS gained $480 million in stolen cash. And, within six months, ISIS became the world’s most well-funded and equipped terrorist group in the world – controlling approximately 100,00 square kilometers of territory across Iraq and Syria at its zenith. So, what we observe here is that the acquisition of economic funding or military weapons gives birth to an effectively exercised political control through coercive means, and internalization of this coercive mechanisms by the civilians. In both cases, the mission is accomplished – an attempt to seize power vacuum by occupying the land and psyche of its civilians. Today, a similar narrative is at play in Afghanistan. The speed with which the Taliban swept across Afghanistan is reminiscent of Islamic State militants taking weapons from the U.S.- supplied Iraqi forces, who like the Afghan Air Force offered little resistance. Grey Myer and Scott Neuman writes, “The Taliban wasted no time in gloating over their new war booty. Photos and video posted to social media show the Taliban posing with captured aircraft, trucks, Humvees, artillery guns and night-vision goggles captured. Such equipment could be used to suppress internal dissent or fight off their rivals. Before the Taliban captured it, the Afghan air force had more than 40 operational U.S.-made MD-530 helicopters. The Taliban has already shown itself ready and willing to use U.S.-made small arms and other technology. Non-weaponry technology like the Handheld Interagency Identity Detection Equipment, U.S. devices containing biometric data, could be used to find potential threats in hiding. I have fallen into the hands of Taliban.” This stage is climacteric

in materializing the procurement of power into a reality. Even if they would be protest in Afghanistan against the rise of the Taliban as the central power, Taliban will use the overwhelming amount of potential weaponry to stifle the dissent and expand their captured territory to places like Panjshir valley.

Who will procure the power in Afghanistan?

The Taliban will eventually seize power, but it would form a weak government, with under-the-table alliance with al-Qaeda; and would potentially foster the inflow and breeding of other groups like ISIS and  ISIS Khorasan in Afghanistan. With opium and rich copper deposits, the international intervention is likely to be seen – motivated by self-interest as opposed to the interest of advocating for civil rest and peace in Afghanistan. Beijing has already held a talk with Taliban officials over the implementation for strategic engagement. It is highly possible that the $25 billion China-Pakistan Economic Corridor project is extended to Afghanistan now that the U.S has vacated the country. Financial support would most likely be delivered hand-in-hand with Beijing’s strongest ally in the region – Pakistan, allowing the Chinese government to persuade the Taliban to sever links with East Turkestan Islamic Movement group, who have executed terrorist attacks in Xinjiang province. On the other side of the border, India – a Hindu extremist governed country, is also in injudicious talks with the Taliban.  Taliban’s close association with al-Qaeda can potentially create a political defilement and unrest in Kashmir, India. This may manifest into border security threat and infiltration of terrorists – manufactured by al-Qaeda, but with the Taliban’s blessings as the central power. To conclude, to think of Afghanistan as a ‘graveyard of empires’ is a zombie narrative. It is being revived to deflect, distract and distort the failure of Biden and the U.S military policies in Afghanistan. The truth is far simpler than we complicate – The creation of a power vacuum in Afghanistan is a direct result of abysmal foreign policy deliberation and the abrupt exit of the U.S military troops. It is indeed a by-product of an incompetent geopolitical contract. Biden’s administration must be held accountable for harbouring a space for demolition of a democratically elected government and rise of the Taliban terror in Afghanistan.

Continue Reading

Publications

Latest

tropical forest tropical forest
Development30 mins ago

Rising demand for agricultural products adds to competing pressures on tropical forest landscapes

Annual consumption of food and agriculture products rose by 48% between 2001 and 2018 – more than twice the rate...

Southeast Asia2 hours ago

Indonesian G20 presidency promises to put a ‘battle for the soul of Islam’ on the front burner

Indonesian religious affairs minister Yaqut Cholil Qoumas set the bar high for President Joko Widodo as well as Nahdlatul Ulama,...

Middle East4 hours ago

Turkey’s Destruction of Cultural Heritage in Cyprus, Turkey, Artsakh

The Mother See of Holy Etchmiadzin of the Armenian Apostolic Church has recently hosted a conference on international religious freedom...

Environment9 hours ago

Act now to slow climate change and protect the planet

The ozone layer – a fragile shield of gas that protects the Earth from the harmful rays of the sun...

Africa Today12 hours ago

Africa faces 470 million COVID-19 vaccine shortfall this year

Africa needs around 470 million doses to accomplish the global of fully vaccinating 40 per cent of its population by the end of the year, the World Health Organization (WHO) said...

Human Rights15 hours ago

UN Women’s feminist roadmap tackles triple crises of jobs, care and climate

The UN’s gender equality and empowerment organization on Thursday published a flagship feminist plan for economic recovery and transformation, which...

Energy News17 hours ago

Strength of IEA-ASEAN energy cooperation highlighted at Ministerial meeting

IEA Executive Director Fatih Birol spoke today to Energy Ministers from across Southeast Asia about the latest global and regional...

Trending