Operational success, whether state or non-state, begins with a solid strategic plan that encompasses key objectives or targets. In today’s globally connected world, cybersecurity is holding the forefront space of challenges, vulnerabilities, and growth (Barrinha 2018). Success, in a globally connected environment, requires an understanding of the environmental systems and connections to appropriately identify the gaps in security and potential points of entry from adversarial actors (Barrinha 2018). Understanding the connected nature and networked capability of potential adversaries’ drives a need to analyze social networks as they relate to the interrelated environmental systems (Tsvetovat and Kouznetsov2011). Therefore, the ability to effectively engage within an interconnected and globalized operational environment is to understand the cybersecurity policies, trends, and vulnerabilities across western and non-western states like Russia, United Kingdom, China, and Israel.
Internationally, states are viewing cyber as the fifth domain of operations, added to air, space, land, and sea. In 2013, fifteen countries agreed with a need for international law for the elaboration of measures, norms, rules, or principles over the cyber domain. Today, military cyber capabilities exist in more than 40 states and of those 12 have explicitly offensive cyber capabilities. Despite the growing application of cybersecurity strategies and advancements in the development of international laws, a standard definition of cybersecurity does not exist (Greiman 2015).
Regardless of the state’s abilities or interest in cybersecurity, the intent is to create an ability to protect domestic networks against domestic or foreign intrusion and attack (Fischer 2016). Cyber-attacks come in many forms. Though attacks vary widely, they generally have a geopolitical, diplomatic, or economic interest, causing business and economic organizations to get involved with political structures to consider policy-setting and strategic capabilities (Jaquire et al. 2018). The difference is that instead of defending against states physically, the defense efforts are against actions exclusively housed within the cyber arena (Duvenage et al. 2018).
National cybersecurity strategies in general tend to possess three main components: strategies with intelligence and counterintelligence capabilities, personal security on information held in databases, and corporate security (Vancouver 2018). As Adamsky (2017) described Israel’s cybersecurity plan, the three interrelated vectors work together to provide robustness, resilience, and defense. The overall intent of national cybersecurity strategies is to provide a means by which the state can protect local networks from adversary threats.
The criticality and concern coming from the international community when dealing with increasing threat potential and vulnerabilities within the cyber domain is reflected by the more than 40 countries working to establish cyber policies. The United States and the United Kingdom both view “terrorism and cyber-attacks as the two greatest threats to national security” (Greiman 2015). As states look at the threat posed by the cyber domain, they must consider non-traditional ways in which foreign non-state actors are leveraging networks to spread their messages — to incite fear, spread support for their anti-state ideologies, or the ability to use virtual space as a meeting location to create extremist support (Cross 2013).
In efforts to standardize, Russia, China, Tajikistan, and Uzbekistan joined forces to submit an international code for information assurance (Grieman 2015). Australia, Canada, New Zealand, United Kingdom, and the United States banded together to create a stronger shared level of intelligence, known as the “Five Eyes” Community (Walsh 2015). However, Israel is still leading the way in the cyber policy, strategy, and successful operations (Adamsky 2017). Though all countries possess a mix of security interests and priorities, there is not a single consensus on how to internationally address threat conditions (Crosston 2016). In an attempt to address those conditions, countries must seek innovative and creative means to establish operations and policies to protect against globalized threats (Cross 2013).
Israel has the lead in leveraging innovation and creativity to develop tangible results and an example for other countries to emulate. In 2002, Israel established the goals and means by which it intended to secure its portion of the cyber domain. Seeking to find a balance between commercial and private needs with a need for national security, Israel established policies to “protect vital computerized systems of selected public and private civilian organizations.” Not wanting to fall short on future threats, Israel included concepts of “education, R&D, security, economic development, and international cooperation” into their policy design (Adamsky 2017). In 2015, the government established a concept of operations (CONOP) to regulate cyber mechanisms and operations focusing on cyber defense, capacity building,and structure. Using an interrelated framework of robustness, resilience, and defense, Israel can operate, sustain, and defend their local cyber domain from intrusion and attack better than most (Adamsky 2017).
Russia and China have similar approaches and practices. In their efforts to collect intelligence, neither country relies solely on confidential sources or methods, nor does collection tie singularly to state-sanctioned collection requests. More importantly, collection in Russia and China does not focus on collection against foreign agencies alone (Crosston 2016). As part of the policy process in Russia and China, the government opts to control exposure and risk by limiting the availability of sites that threaten the influence their control over the population (Cross 2013). While similar in their approaches, Russia and China developed individual strategies to protect their networks (Fei 2010).
China opted for a strategy with a longer-term outlook and sought to respect other nation’s objectives while fostering mutually beneficial cooperation. China’s strategy emphasizes multilateral ties and dealing with both traditional and non-traditional threats. China’s strategic approach consists of four prongs: the inclusion of complex, non-traditional aspects; issue-orientation over country interests; economic development to be independent of foreign technologies; and, a supposed practice of good governance and transparency.
United Kingdom announced, in 2010, a plan to spend $1 billion US dollars over a four-year period to launch a “transformative national cybersecurity program” focused on closing the expanding gaps between current capabilities and emerging technological advancements. The UK outlined its plan with the intention of leveraging private-public partnerships to create a single point-of-contact for cyber-crimes and security issues. The strategy also outlined a plan to develop international cooperation with like-minded nations (Hammond 2010). Not unlike Israel, the United Kingdom is focusing on policy development to protect privacy and reduce crime, while establishing a resilience capability. Through private-public partnerships, the UK aims for capacity building and to implement a risk-based approach to defending against cyberattacks (Greiman 2015).
Private-public partnerships, coupled with dynamic state policies, contribute to the state’s ability for capacity building. This is particularly important with the understanding that the private sector mainly owns and operates activities within the cyber domain for most states (Grieman 2015). While Russia and China understand this phenomenon, they opt to block sites and access as a means of controlling the internet. The efforts of Russia are generally politically inclined, focused on the interest of making the president appear stronger. In China, the state leverages cyber abilities for economic maneuvering. Israel selects a more comprehensive and holistic approach to managing the cyber environment.
Tsvetovat and Kouznetsov (2011) explained the connected nature and networked capability of potential adversaries as driving social connections and purposes. Within the cyber domain, states are able to leverage the connections and networks to shape policy, offensive operations, and international relationship development. As Russia and China continue to work through their controlled approaches to cybersecurity, there is a need for international consensus towards cybersecurity. In an effort to standardize an approach to cybersecurity, the international community should seek to follow in the steps of Israel (Adamsky 2017).As a soft power instrument, Israel is leveraging opportunities and threats to harness the potential of cybersecurity. Over the last decade Russia, China, and many others have reached out to Israel. Additionally, the more success Israel has in leveraging cybersecurity to promote international ties, the greater likelihood it will lead an effort to normalize cyber across the globe (Adamsky 2017).
As academics and practitioners continue to work toward a standard definition and understanding of cybersecurity, there is a distinct need for various states to come together in an effort to establish international norms and standards for the execution of cybersecurity. This effort should be much the same as joint operations govern telling time or tracking targets. It is crucial that the United States continues to find ways to lead the effort to establish agreements that focus on commonalities that can benefit the reduction of cyber dangers between China, Russia, and Israel.
The effort to understand the cyber environment and its various network of connections is vital in working through concerns faced by countries emerging as a new power (i.e.,Brazil, India, Argentina, and Australia among others). The importance of this understanding links back to Brafman and Beckstrom’s (2012) starfish and spider concepts, demonstrating the capability of groups to operate from geographically dispersed locations without a centralized leader. Improved security within the cyber domain will assist in mitigating political, economic, and criminal activities that are counter to a state’s security strategies. Perhaps most importantly, he ability to increase cybersecurity and cooperation in the cyber domain internationally creates a possible platform to work against other threat issues such as transnational organized crime, terrorism, human trafficking, and migration from failing states. Understanding critical elements and the approach other countries use to navigate through their domestics and external threat will continue to prove to be as crucial for the United States and the interaction with other countries in the future.
Who Masterminded the Suicide Attack on Hazara Students’ Educational Center Kaj in Kabul?
According to explicit intelligence information, last Friday, September 30, 2022, a suicide attack on Hazara students in an educational center called (Kaj) in the western part of Kabul was carried out by the Ministry of Education and the so-called ministry of Evil Forbidden of the Taliban in coordination with the leadership of Kandahar. Apparently, Afghans’ feelings were torn apart by the news of the Taliban’s former Minister of Education Maulvi Noorullah Munir that he had signposted in Uruzgan Province, followed by the Minister of the Evil Forbidden of the Taliban, Sheikh Muhammad Khalid Hanafi, claimed that letting women educated is opposed to Sharia law.
After his comments, he was rigorously criticized by the internal and external media, women activists, youth, the UN and the international community. Which is why the masterminds contacted the GDI of the Taliban’s intelligence agency followed by the meeting between the Akhundzada Taliban and Sheikhs of the South West Zone, while giving them permission and sharia fatwa/decree to suicide attacks on women’s schools and all institutions that encourage women to come out of their homes across Afghanistan. In such manner they wanted to be free of international denunciation, since, the responsibility of such attacks is always claimed by the ISIS group in order to gain influence in Afghanistan. On the other hand, the high-ranking leaders of the Taliban are in contact with the ISIS group in the east of Afghanistan, so that the two groups are coordinating in such assaults to happen.
Hence, the Taliban by applying this method want to upsurge the risk and threat towards the female strata of the Afghan community getting them scared, in order to prevent them to go to schools. Learning that, the high-ranking leaders of the Taliban government are forced to take such measures, since in the absence of such attacks, women will not stop studying, especially non-Pashtun Geno. If girls go to school and the Taliban leaders do not stop them, then the low-ranking members and fighters of the Taliban will start rebelling against their own leaders.
As a result, there will be more internal strife and the group will become weak and eventually disappear, which is not in the interest west, who wants to employ the Taliban government and other non-state international armed groups in Afghanistan as an unofficial private militia against China and Russia. Furthermore, the Taliban’s foreign supporters are also forcing the ISIS group to take responsibility for some of the current and potential crimes committed by the Taliban, while paving the way for the Taliban to achieve their goal, subsequently, the external pressures will be reduced and internal differences and resentment of low-ranking fighters will be avoided.
Ethnic War a Newfangled Pakistani Forward-policy for Afghanistan
According to the intelligence information, Pakistan’s ISI is trying to start ethnic and maneuvering war again in Afghanistan, of which distinct objective is to refurbish the age-old enmity between the Achakzai and Noorzai tribes in the southwest zone. Besides, they want to start an ethnic war among Pashtuns and non-Pashtuns across Afghanistan, and between the northern and southern directions, thus, the prominent leaders of the Taliban, who are led by the ISI, have been entrusted with the task. As in the east and north of Afghanistan, Pashtun Taliban militants are oppressing other Non-Pashtuns, raiding their homes; however, no high-ranking Pashtun Taliban officials are preventing them because the ISI network leads this strategy. In order to revamp a civil war in Afghanistan, score of influential figures have been summoned by the Pakistani military establishment.
The latest examples are as follows: Two days ago, the Pashtun Taliban killed the former police chief and an influential tribal leader in Mandol district of Nuristan province, which caused many emotions against Pashtuns especially about southwest zone of Afghanistan. Meanwhile, in order to afresh the years of hostility between the Noorzai and Achakzi tribes in the southwestern region of Afghanistan, the ISI network raised the issue of a mass grave by several leading Taliban militants, especially by the current governor of Kandahar province and Noorzai tribe leading leader, Haji Mohammad Yousef Wafa.
At a time when the former leader of the Noorzai tribe, the leading smuggler of drugs and heavy weapons in Central and South Asia, and the financial supporter of the first Taliban regime, Haji Bashar Noorzai was released from the US prison in Guantánamo. The Noorzai tribe once again became twice as strong and dominant in Afghanistan, especially in the southwest zone. Resulting threats towards the Achakzai people, on the other hand, ISI has started rapid efforts to recommence the years of enmity between these two tribes.
Recently, Pakistan’s intelligence network ISI, with the help of some leading social media and high-ranking Taliban officials, has kept the issue of finding a mass grave in Kandahar province in the southwestern zone of Afghanistan broiling, namely by inducing the blame-game. Meanwhile, local tribal leaders and residents of Spin Boldak district claim that such a grave is the grave of those who were taken out of their homes by the Taliban after August 15. Since, they were connected to Achakzai tribe and on the other hand, they served in the security departments of the overthrown Islamic Republic of Afghanistan that is why the Taliban night raided their houses, and massively killed them.
Moreover, mass murdering Hazaras at their educational institutions via suicide bombing and meantime blowing up the worship places of Sufi-Muslims, who preach the non-violent form of Islam, while calling for De-weaponization and De-politicization of Islam.
Consequently, by applying such a forward-policy, Pakistan will achieve its fancied strategic-depth in Afghanistan, while subjugating the Afghan Nation.
Pakistani Intelligence Agencies ignite Tribal Conflicts in Pak-Afghan Region
According to the intelligence information, Pakistani intelligence community supported by some international rings want to once again spread dispute and disharmony among the tribes in Afghanistan and Pakistan; subsequently the centuries-old evils and wars between the tribes will once more take a new color and become fresh. Recently, rumors of the discovery of a mass grave in Kandahar province in the southwestern zone of Afghanistan are spreading; the blame for this mass murder falls on the former police chief of Kandahar province and the former leader of the Achagzai tribe, General Abdul Razaq Achagzai. In order to afresh raising the reaction of the Norzi tribe against the Ackzai and anew the evil and war between these two tribes. Even though the current governing body of Afghanistan is completely under the control of the Noorzi tribe, because most of the high-ranking leaders of the Taliban, including the leader of the Taliban, Sheikh Haibatullah, are related to the Noorzi tribe, so there is a greater threat posed to the Achakzi tribe.
Even now, in spite of such menaces, more than 6000 Achakzi families live in Kandahar province, whose members served in the security departments under the command of General Abdul Razaq Achakzi, a staunch opponent of the Taliban. Currently, in such a tense situation that the Taliban administration has control over Afghanistan and the head of this administration is connected to the Nurzi tribe, the harsh criticism of General Abdul Razaq Achakzai’s mass killings is logical, which can cause international and internal outcries. As a result, the major victims will be the youths and leading tribal leaders of the Achakzai tribe.
By the advent of Taliban on August 15, 2021, in the first four months, more than 600 youths and tribal leaders from the Achakzi tribe were killed in the southwest zone of Afghanistan, while applying night operations or raids by the Taliban. The most famous case happened to the family of Haji Fida Mohammad Achakzai in Spin Boldak district. Haji Fida Muhammad Achakzai, known as Haji Fida Aka, is a leading leader of the Achakza tribe of Spin Boldak district and had close relations with the family of General Abdul Razaq Achakzai.
When Kandahar province fell to the Taliban before August 15, the two young sons of him were killed by the Taliban on the first night, unfortunately none of the Taliban officials took any action to prevent the tragedy. Nevertheless, this time, there is a plan going on at the international level to renew the age-old differences between the Achakzai and Norzai tribes, which the international media warmly supports. If this time the internal differences and conflicts between the Achakzai and Norzai tribes in Afghanistan get sturdier, then it will have damaging effects not only in Afghanistan, but also, serious negative measures will be taken against the Norzai under the leadership of Mahmoud Khan Achakzai, the head of the Achakzai tribe, in the Pakhtunkhwa provinces of Pakistan.
In the meantime, the decision of the Pakistani government to hand over the Pashtun areas in Pakhtunkhwa provinces to the Taliban was approved and supported by the Nurzi tribe, conversely, this action of the Pakistani government was strongly condemned by Mahmoud Khan Achakzai and PTM leader Manzoor Pashtun.
Torture is ‘widespread’ and likely underestimated in DR Congo
Torture is “widespread” and underestimated in the Democratic Republic of the Congo (DRC), and the abuse involves armed groups and...
Understanding Today’s Russian Government: Putin’s Goals
Following are excerpts from (which constitute only 22% of) Russian President Vladimir Putin’s speech and his answers to questions at...
New WHO strategy aims to strengthen rapid response to health emergencies
Amid mounting health emergencies globally – such as the COVID-19 pandemic, climate-related crises, and the war in Ukraine – the...
Bright future for Pakistan-Iran relations
One of the oldest civilizations, the Islamic Republic of Iran, is situated in Western Asia, bordering Iraq and Turkey to...
Five years of violence in northern Mozambique has forced nearly a million to flee
Nearly one million people have fled extreme violence perpetrated by non-State armed groups in northern Mozambique over the past five...
Ten years of Afghan economic growth, reversed in just 12 months
A year on from the Taliban takeover in Kabul, Afghanistan is gripped by “cascading crises”, including a crippled economy that...
Betting on the wrong horse: The battle to define moderate Islam
Proponents of a moderate Islam that embraces tolerance, diversity, and pluralism may be betting on the wrong horse by supporting...
Eastern Europe4 days ago
A New Phase of Escalation in the Russia-Ukraine War
Green Planet4 days ago
Youth Pessimistic Attitude and Their Noteworthy Role as Climate Justice Norm Entrepreneur
Russia4 days ago
Russia-Zimbabwe’s Parliamentary Relations Still at Exploratory Stage
Middle East4 days ago
Saudi crown prince shifts into high gear on multiple fronts
African Renaissance4 days ago
The New World Order
Defense3 days ago
Between the Greater Russia and the MAD
Defense3 days ago
A Matter of Ethics: Should Artificial Intelligence be Deployed in Warfare?
International Law3 days ago
Factors Influencing the World Order’s Structure