Connect with us

Intelligence

March to Tripoli, or a Third Civil War in Libya: Initial Results

Published

on

The military offensive of the Libyan National Army (LNA) led by Field Marshal (according to the House of Representatives sitting in Tobruk) Khalifa Haftar on Tripoli that began on April 4, 2019 had finally petered out by mid-May, having achieved none of its goals. On the eve of the offensive, the military leader announced that he planned to install a new Government of National Accord by the middle of April. However, these attempts failed. The LNA was not able to breach the inner areas of the Libyan capital due to the fierce resistance it faced on the approaches the city. The blockade of Tripoli was also a failure, as reinforcements continued to arrive from the east (from Misrata) and the west (from Zawia). The Libyan Army that is loyal to the legitimate transition bodies — the UN-recognized Government of National Accord (GNA) and the Presidential Council led by Faiz Sarraj — repelled the attempts of K. Haftar’s militants to enter the city and even carried out successful counter-strikes of its own.

K. Haftar deployed almost all of his combat-ready troops in the offensive to capture Tripoli, including regular units such as the Al-Saiqa brigades (one of the commanders of these brigades is Mahmoud al-Werfalli, who is wanted by the International Criminal Court), and the 106th Brigade led by K. Haftar’s son, Khalid. A number of the LNA’s elite units, which are made up primarily of Salafists, were also deployed in the Libyan capital, including the Tariq Bin-Ziyad Brigade, the 73rd Brigade (formerly the Khalid ibn al-Walid Battalion) and others. However, the only asset that the LNA managed to lay claim to was the intersection of the road connecting Tripoli with the Jabal Nafusah Region controlled by forces loyal to the Government of National Accord and by Tunisia. The LNA blockade also included the strategic port city of Zuwara, which became possible after the LNA established control over Garyan and Sabratah.

Old and New Allies of K. Haftar in Tripolitania: The Only Factor for Success

At the same time, we should bear in mind the fact that almost all of the LNA’s territorial acquisitions in Western Libya were not the result of successful military operations and the defeat of the enemy, but rather the defection to K. Haftar’s side of local forces that had previously been loyal to him. Many of them have long been called “Trojan horses” in Tripoli, meaning that their alliance with the field marshal was a foregone conclusion.

For example, the city of Sabratah to the west of the Libyan capital serves as the base for K.Haftar’s long-term allies, namely, the Salafists from the Anti-ISIS Operations Room and the Al Wadi Brigade. These forces were considered “sleeper cells” of the LNA in Western Libya, and shortly after K. Haftar’s offensive began, they announced that they had severed connections with the Government of National Accord and become part of the LNA.

The town of Bani Walid, which also fell under the control of the LNA, is the main base of the Gaddaffists. The town has always enjoyed independence and was hostile to the Misrata Brigades, the main military force of the Government of National Accord. Shortly after Khalifa Haftar launched his offensive on Tripoli, the Bani Walid sheikhs and the local council declared their neutrality, but allowed the LNA to use its transport infrastructure, including its airfield. The 60th Infantry Brigade, which was established in Bani Walid, joined the LNA.

K. Haftar’s biggest successes in Tripoli were achieved thanks to defection of the former 7th Brigade of the Presidential Guard from the city of Tarhunah. The unit was renamed the 9th Brigade after joining the LNA. These forces led a mutiny against the Government of National Accord in the summer and autumn of 2018 and had some fierce battles with the so-called Big Four brigades in Tripoli for control of the international airport and other suburbs of the Libyan capital. In April, the forces of the 7th/9th Brigade resumed their operations against the Libyan Army from its positions at the international airport, as well as in Ain Zara and Wadi Rabea, but under the flag of the LNA. Reinforcements in the form of K> Haftar’s supporters soon arrived from the east of the country. The conditional front line between the 7th/9th Brigade and the Big Four in Tripoli was transformed into a front line between the LNA and the Libyan Army/Government of National Accord.

K. Haftar’s hopes to enlist the support of the Zintan clans came to nothing, even though the Zintan Brigades were the main allies of the LNA during the Second Libyan Civil War in 2014—2015. While some sheiks in the region declared their support for K. Haftar, their armed units nevertheless refused to participate in the military operations, as other Zintan clans were fighting on the side of the Government of National Accord, and one of its most charismatic leaders — Commander of the Western Military Zone Osama al-Juwaili — is effectively leading the defense of Tripoli. The respect that al-Juwaili commands likely played a large role in the refusal of most of the elders to support K. Haftar.

K. Haftar could not take advantage of the loyalty of the people in Jafara and Aziziya, home to the Warshefana tribal association that has allied ties with Tripoli. Aziziya has been the main base of K. Haftar’s supporters at Tripoli since 2014. However, in late 2017, the 4th and 26th LNA brigades, which are made up of fighters from the Warshefana tribes, were defeated by al-Juwaili’s forces. At the start of the current operation, the LNA managed to enter Aziziya on a number of occasions but was repelled every time. By mid-April, the Libyan Army/Government of National Accord had a firm grip on the city, turning it into an operational base. With Aziziya under its control, the government troops are able to exert constant pressure on Tripoli International Airport by covering it from the flanks, while at the same time continually attacking the LNA communications infrastructure that runs through Gharyan. By maintaining a foothold in Aziziya, the Libyan Army/Government of National Accord may be able to carry out an operation to encircle the LNA forces operating in the areas of Wadi Rabea and Ain Zara at some point in the future. Therefore, without establishing control over the region, any attempts to advance the LNA into Tripoli along other routes would be extremely risky, as the forces operating there may get trapped. This explains why the fiercest battles (most of which have been won by the pro-government forces) have been for the Aziziya District. During these battles, the Libyan Army/Government of National Accord showed that it was able to act within the framework of a general operational plan, and its units demonstrated a high degree of coherence in their actions. The current campaign is likely to further bolster the influence of Major General Osama al-Juwaili, who is heading up Operation “Volcano of Anger” to repel LNA aggression.

“Yes” to an Islamist Militia, “No” to a Military Dictatorship

Even though a few factions that have declared their support for K. Haftar, most people living in Tripolitania would prefer the lesser evil of the “dominance of armed Islamic groups,” which is precisely what K. Haftar is trying to eradicate, to his “hard hand” and military dictatorship. What is more, many Tripolitans rushed to join the militants and fight against the LNA with weapons in their hands. It was precisely this ability to mobilize forces in Western Libya, as well as the willingness of these forces to speak out in support of the extremely unpopular Government of National Accord, that took K. Haftar by surprise.

The military operation contributed to the consolidation of the Misrata forces, which bore the brunt of the fight against the LNA. A maximum of 6000—8000 fighters were located in Misrata and the Misrata District during the relatively peaceful period between the civil wars. Now, they are capable of mobilizing up to 18,000 troops, thereby practically nullifying the numerical superiority of the LNA. Before the start of the campaign, there was no unity among the Misrata clans. For example, some factions from this region and their representatives (for example, the Minister of Interior of the Government of National Accord Fathi Bashagha) called for a dialogue with Field Marshal K. Haftar and were even prepared to consider the possibility of offering him a position in the cabinet. Now they are working together with his staunch opponents from the Bunyan al-Marsous coalition in Misrata. The Misrata groups that had until recently been opponents of Sarraj and were even subject to international sanctions for rallying against him started to provide military support to the Government of National Accord. We are talking here about the “national guard” of the alternative National Salvation Government, which has since sent its troops to protect Tripoli and now acts in lockstep with the government forces.

The Libyan Amazighs (Berbers) who control vast territories in the west of Libya, as well as the port city of Zuwarah also rallied against Haftar’s military operation and supported the actions of the Government of National Accord to repel the onslaught of the LNA.

The Field Marshal’s Last Hope

At the same time, the so-called Tripoli Defence Forces, which included the Big Four factions, adopted a rather ambiguous position. For instance, the Tripoli Revolutionaries Brigade and the Special Deterrence Forces did not deploy significant forces to counter the offensive, confining themselves to the formal deployment of a small group at forward positions, while the majority of their units refrained from fighting, remaining at the rear. These factions clearly want to hang on to the possibility of making a deal with either of the opposing camps. However, this position could lead to the Misrata groups, which the Big Four (with the help of Sarraj) tried to eradicate, further strengthening their influence in Tripoli. In this regard, the special position of the Tripoli Defence Forces, which include a number of moderate Salafists (“madhalits”) that also make up a significant part of Haftar’s army give the field marshal hope of steering the events in Tripoli in his favor. This notwithstanding, the chances of the Big Four choosing to support Khalifa Haftar, especially after all his failures, are very slim. On the contrary, it is entirely possible that their involvement in operations against the LNA will increase against the backdrop of increased military assistance from Turkey (including for groups that are part of the Tripoli Defence Forces).

Khalifa Haftar fully, and erroneously, expected that military support from his external allies (Egypt, the United Arab Emirates, Saudi Arabia, and France) would help his forces overcome the enemy’s resistance. While the LNA could count on the direct participation of the Egyptian special forces (as well as on the operational air force of Egypt and the United Arab Emirates) during its campaigns in Benghazi and Derna, this type of assistance is untenable in current conditions, given the ambivalent attitude of the global community towards K. Haftar’s actions. That being said, these countries do provide support to the LNA in the form of military supplies, including various types of armored vehicle such as armored personnel carriers and the Mbombe and al-Mared armored cars produced in Jordan. Many point to the fact that the LNA uses Chinese-made Wing Loong II drones equipped with Blue Arrow 7 missiles provided or even operated by military personnel from the United Arab Emirates. Moreover, we should not underestimate the role of Saudi Arabia, which has assumed most of the financial costs of the military campaign. Indeed, without proper funding, the LNA, which claims to be a regular army, will split into factions and groups with different ideologies.

Faultline: The Salafists Versus the Muslim Brotherhood

At the same time, the advantage that the LNA had thanks to the deliveries of weapons and military equipment from its allies could be negated by the fact that Turkey started supplying similar products to the Libyan Army/Government of National Accord in May of this year. On May 18, the Amazon Giurgiulesti ship arrived in Tripoli from the port of Samsun in Turkey under the flag of Moldova. The ship was loaded with all kinds of military equipment, including a battalion set of modern Kirpi II and Vuran armored vehicles made in Turkey, as well as anti-tank guided missiles, man-portable air-defense systems and light weapons. Also, according to the Chairman of the High Council of State, Khalid al-Mishri, the Libyan Army/Government of National Accord now has drones as well, which were also probably delivered via Turkey.

Libya has thus turned into a battlefield and Faultline between two antagonistic camps of the Islamic world. Heading up the first of these camps are Turkey and Qatar, which continue to rely on forces that adhere to the ideology of political Islam, are close to the Muslim Brotherhood and support the Government of National Accord. The second camp, led by Egypt, the United Arab Emirates and Saudi Arabia (the “troika”), has practically elevated the fight with the Muslim Brotherhood to an ideology. The “troika” is prepared to rely on any forces in order to eradicate the Muslim Brotherhood, be it secular generals or radical Salafists. It is this ideological “duet” of secular military and Salafists that is most pronounced in the framework of the LNA.

The deeper K. Haftar is drawn into the armed confrontation, the more he will fall under the influence of radical Salafi activists in his own surroundings who issue fatwas, refuse to consider opponents of the LNA Muslims, and prove that the truce in Ramadan does not extend to the fighting in Libya. If the hostilities continue, then the influence of the religious radicals inside the Haftar camp will likely continue to grow, since the offensive on Tripoli has effectively petered out and now the LNA command will need to motivate its supporters (it should be noted here that there are a number of Salafists among them), and attract further concessions regarding the dissemination of their ideology. At the same time, many experts consider the Salafists the most reliable and combat-ready element of the LNA. Thus, we cannot rule out the possibility that the countries which are backing K. Haftar as a secular leader will eventually become witnesses to the creeping “Salafization” of Libya with the active help of Saudi clerics. And this will not stop K. Haftar from further positioning himself as a champion of secularism, while at the same time dictating a completely different agenda on the home front.

Ceasefire as Salvation

Against the background of K. Haftar’s failures, the structures that are affiliated with him in Eastern Libya are looking for opportunities to achieve a ceasefire so that they can maintain their positions near Tripoli and perhaps even prevent the complete destruction of the LNA, which is a distinct possibility at the moment. For example, Abdullah al-Thinni, the prime minister of the provisional government in the east of the country, who is affiliated with K. Haftar, said in an interview with the Alhurra television station that the LNA would be willing to accept a ceasefire without withdrawing from the outskirts of Tripoli, a condition that Sarraj has rejected.

Haftar’s visits to Italy and France, which took place shortly after Sarraj visited these countries, were also devoted primarily to finding ways to establish a ceasefire.

Thus, despite the menacing rhetoric that remains (“I am prepared to hold talks, but there is no one to hold talks with”), the terms of a possible ceasefire were apparently the only topic raised at K. Haftar’s talks with E. Macron in Paris on May 22, 2019. A week earlier, the same issue was discussed at a meeting between K. Haftar and the Prime Minister of Italy. It is, of course, possible that K. Haftar is looking for opportunities to call a ceasefire while at the same time-saving face with all his military bravado. At the same time, in the context of the LNA’s failures, Paris (a long-term partner of K. Haftar) has started to “curtsey” with increasing frequency before the Government of National Accord. The approach of France to the events in Libya is starting to align with the general course adopted by the European Union, which suggests that France may need to abandon its unequivocal support for K. Haftar.

The complexity of the situation lies in the fact that Sarraj is no longer willing to make any kind of deal with K. Haftar, as he considers him to be a rebel and a criminal. And the only acceptable condition for a ceasefire, as far as the head of the Government of National Accord is concerned, is for the LNA to return to the positions they occupied before the start of the campaign. In this situation, K. Haftar cannot directly declare his consent to external mediation when he cannot be sure that Sarraj will accept the terms of the ceasefire. On the other hand, continuing the operation is fraught with unclear prospects and is extremely risky, and in certain circumstances may lead to the complete defeat of the LNA. This is why some of Haftar’s allies see the creation of conditions for a ceasefire as a vital task and a way for the field marshal to hold onto his role as a key player.

Another option is also possible and is connected to the fact that a rift has appeared among Haftar’s allies, with France differing in its assessments of what is going on with the “troika” of Egypt, the United Arab Emirates and Saudi Arabia. We cannot rule out the possibility that K. Haftar is willing to negotiate the terms of a ceasefire with the mediation of France and Italy (if this was not the case, his visits to these countries would make no sense) and that the “troika” is pushing him, by offering increased military aid, for example, to toe the line that the only possible solution to the crisis is through military force.

Hidden Resources

Just how the situation in Libya continues to unfold will likely depend on the degree of engagement of the two great powers, whose positions at present are rather contradictory and unclear. We are talking, of course, about Russia and the United States, which have not yet had their say.

The United States has voiced two opinions to the current Libyan Crisis. One was expressed by Secretary of State Mike Pompeo, who condemned the actions of K. Haftar and called for an end to the offensive. The second opinion is that of President Donald Trump himself, who had a telephone conversation with the field marshal and expressed his support for the fight against terrorism, which many observers took as an endorsement of Haftar’s military campaign. While Trump will certainly have the last word, it is unclear which of these approaches to the events in Libya will eventually prevail in Washington. Another position that should not be ignored is that of the Pentagon, which has developed relations with the Misrata brigades against the background of the fight against Islamic State terrorists in Libya — and it was Haftar’s military operation that opened the door for their increased activity. While the United States Africa Command (AFRICOM) may have withdrawn its personnel from Tripoli and Misrata, it is entirely possible that they will return to Libya and resume interaction with their former partners.

Russia continues to maintain relations with both sides in the Libyan conflict. Despite the increasingly pro-Haftar bias in the Russian approach, Moscow, unlike Saudi Arabia, the United Arab Emirates and Egypt, has not crossed the red line and continues to be regarded as a partner by the Government of National Accord. The problem lies in the fact that the three Russian structures that are currently working on the Libya track the Ministry of Foreign Affairs, the Ministry of Defence and the Russian Contact Group for Intra-Libyan Settlement — assess Russia’s priorities and interests in Libya differently, and on some issues have opposite positions. On top of this, the signals coming from the Kremlin itself about which line to take in regard to Libya are not clear enough. The Russian approach to events in the country is likely determined by the current situation. Russia has demonstrated a certain amount of support for K. Haftar against the background of his military operation and the success he is expected to achieve. However, as the operation proceeds, Russian will have to either return to a more balanced line and pay more attention to the interests of Tripoli or, on the contrary, start increasing aid to K. Haftar, including military assistance.

The latter scenario is the riskiest. Even if the gamble on K. Haftar pays off and he somehow manages to emerge victorious, then the main beneficiaries will be the “troika” of the United Arab Emirates, Saudi Arabia and Egypt, which have invested far more money into him than Russia. At the same time, Russia would benefit from maintaining a certain balance in Libya. To this end, Moscow could make better use of the ties that it has managed to maintain with all the sides in the Syrian conflict — something that Egypt, the United Arab Emirates, and Saudi Arabia, which have “put all their eggs in one basket,” cannot say. Russia has the opportunity to play the role of mediator in the conflict, joining France and Italy in these efforts. Russia should also pay attention to those figures in Libya whose influence continues to grow against the background of the events taking place in Tripoli and who have the opportunity to play a consolidating role in the future. Major General Osama al-Juwaili is one of these figures.

From our partner RIAC

Continue Reading
Comments

Intelligence

Strategy of Cyber Defense Structure in Political Theories

Sajad Abedi

Published

on

Since the principle of defense addresses a wide range of threats, it applies both in the field of justice and in the field of military and strategic affairs. But implementing cyber-defense is only recommended if the risks that can be identified have a direct impact on the security and even survival of a state, so each government is obliged to address any challenges that may arise. To eliminate it. Challenges of identifying the author or authors of an attack, estimating the likely impacts and reconstructions of the attack and setting targets, within the context of public networks and actors, distinguish cyberspace from other spaces in which defense is formed. Defense in cyberspace, while feasible, may not only be limited to existing actions, but unique concepts must be developed and presented.

In fact, some of the challenges in cyber defense are similar to those in other forms of defense. For example, the problem of identifying cyberattacks is reminiscent of the challenge of defending nuclear terrorism. Identifying the effects of a cyber-attack is very similar to identifying the effects of biological weapons. Also, the invisibility of computer weapons is, in many cases, very similar to the challenge posed by biological weapons.

Defensive methodological approaches can therefore be used to define some elements of cyber defense: against the threats of terrorism the concepts of “defense through denial” and “indirect defense” can be conceptualized against biological threats. Applied “symmetrical defense”.

In practice, however, we find that, although governments appear to be heavily dependent on computer systems for their deployment, they are not the same as those charged with using malicious equipment against computer systems. . For this reason, the impact of using cyber defense equipment against them is questionable. In fact, hacker groups that sell or lease knowledge or networks of infected machines to others, often to attack, plan malware or spyware or even to detect security flaws in systems, often the only things they need are a few (powerful) computers and an internet connection. So the question arises whether they can be prevented from doing so only by threatening to respond exclusively to cyber.

The need to establish a balance between action and response and the necessity of influencing the answer itself presents another challenge that must be met with the ability to ensure that the response is repeated and repeated as needed. Some experts believe that cyber defense can disrupt or temporarily disrupt a competitor’s activities, or temporarily disrupt the competitor’s activities, despite the physical (physical) measures that more or less neutralize the competitor; but none of the cyber solutions. It cannot lead to definitive neutralization of the threat.

In such a situation, the impact of the Aztemeric countermeasures point-by-point action cannot be ignored. Therefore, better enforcement of cyber defense against criminal groups – whose realization of financial interests is their top priority – can be resorted to by law enforcement (including actions aimed at the financial interests of the actors). Military responses can also be used if confronted with actors with little reliance on information technology.

Continue Reading

Intelligence

Achieving safety and security in an age of disruption and distrust

MD Staff

Published

on

The ability of citizens and businesses to go about their daily lives with a sense of safety and security is vital to prosperity, but citizens in many countries feel unsafe. Whether it’s because of inadequate responses to natural disasters, terrorist attacks, massive data breaches or the spread of disinformation, trust in governments’ ability to protect society is declining.

To address this requires a new, systemic approach to security that broadens its definition beyond defence and policing. Governments, local authorities and the private sector need to work closely together across all areas that contribute to security. PwC identifies four overlapping domains – physical, economic, digital and social — underpinned by trust, that form the foundation of a secure and prosperous society.

That’s the conclusion of PwC’s new report, Achieving safety and security in an age of disruption and distrust.Itchallenges the traditionally narrow view of physical safety and security, expanding the concept of what security means to include citizens’ basic needs; including food, water and utilities; and the organisations that deliver them.

The report draws on academic research* and case studies to show the necessity and benefits of a collaborative approach to security. It identifies the different elements that cause citizens and businesses to feel unsafe and the players, from private sector communications firms and infrastructure companies to security forces and non-governmental organisations, who need to work together to deliver security in all the domains.

Tony Peake, PwC Global Leader, Government and Public Services, says:“Unless you create a safe and secure environment in which people can go about their daily lives without fear, they won’t be able to work and sustain their families or carve out a decent standard of living.

The breadth of the challenge of delivering security has never been greater, requiring agility in response and innovation in prevention. And while security is a core task of governments, it can’t be achieved in isolation. It needs to be viewed holistically, with governments taking the lead in facilitating collaboration across organisations, sectors and territorial divides to deliver the security that is vital to a functioning society.”

The building blocks of security: physical, digital, social and economic

The report explains how these domains overlap and impact each other, adding to the complexity of delivering security. For example, economic security is closely tied to cyber security and thwarting data theft. Critical infrastructure services like telecommunications, power and transportation systems that rely on technology to operate must be secured both physically and digitally. Border control systems such as passport readers and iris scanning machines rely on digital interfaces that require cyber security.

Peter van Uhm, former Chief of Defence of the Armed Forces of the Netherlands, summarises in his foreword to the report:“It has become increasingly clear that delivering the safety and security that citizens and businesses need to prosper requires ever closer collaborations across borders, sectors and institutions. I learned that (re)building a failed state means realising that everything in a nation is interlinked and that it is all about the hearts and minds of the people. If you want the people to have trust in their society and faith in their future, safety and security in the broadest terms are the prerequisite.”

How governments can safeguard and protect citizens

PwC has identified six key actions that government leaders can take to develop a collaborative, systemic approach to delivering safety and security to their citizens:

1)    Take stock: look at the interplay of the different physical, digital, economic and social domains and spot any weak links across sectors.

2)    Identify and engage the right stakeholders and collaborate to develop a joint agenda and a national and/or local safety and security policy.

3)    Identify what each stakeholder needs to provide in the process and assess their level of interconnectedness to deliver safety and security, e.g. back-up systems for telecommunications failures.

4)    Work with leadership in the different overlapping domains and empower people in the right places to make decisions.

5)    Invest in leaders so that they are skilled in engaging the public and instilling a sense of trust.

6)    Manage carefully the trade-off of security with safeguarding personal data and citizens’ rights.

The recommendations for private sector firms and non-profit organisations include these steps:

1)    Work more closely with trusted governments to improve engagement and collaboration.

2)    Align organisational purpose with the broader societal safety and security agenda.

3)    Develop the capacity and capability to improve safety and security for stakeholders.

Examples of how this works in practice

Crisis readiness and response to a terrorist attack in Sweden

The 2017 Stockholm terrorist attack illustrates the need for collaboration between governments and non-profit partners. This attack was perpetrated by one individual who drove at high speed down a pedestrian street, killing five people and injuring 10 more. A scenario planning exercise between government and security agencies had been carried out several months before the attack and is credited with limiting the number of casualties and the swift arrest of the attacker.

Government authorities and the private sector collaborate to thwart cyber threat

A major cyber attack in Australia, dubbed Cloud Hopper, was identified and mitigated through close collaboration between cyber security experts in both the public and private sectors.

Continue Reading

Intelligence

War of shadows: The psychological and media dimension of future clashes

Giancarlo Elia Valori

Published

on

The Soviets called it “the shadow theatre”, i.e. the set of  psychological warfare techniques of the time, in the Cold War world.

Maskirovka, in particular, e.g. everything is camouflage, deception, real psychological warfare, disinformation.

 In fact, if we analyze the psywar techniques currently used, we realize that we are still at the Cretaceous period.

 No sectoral influence operations, no action on subjects or public targets, little knowledge of the new discoveries of social psychology and biopsychic evolution.

 The scenario of Western psywar operations is still not very brilliant.

 Obviously, explaining to the Defense Ministers of Western countries what these operation are about is a very difficult mission that few people would be able to accomplish successfully.

Actually, nowadays the old maskirovka is not the cover, the shell of real operations, but its true essence.

 Just as today’s industrial production is, above all, communication, induction of a certain behaviour, identification of a target of customers, development of a product that meets their psychological and symbolic needs, currently also war is above all maskirovka well before being military and destructive struggle.

 Nobody cares where engines are produced, which are now all the same, but certainly the market is interested in the symbolism of goods, in its evocative potential and in the ability to define the status of those who buy them.

Furthermore, in an old CIA manual, the Soviet “active measures” were defined and classified as follows: a) the Center gives the green light for a strategic disinformation campaign; b) the news, which is never entirely true or entirely false, is prepared and packed; c) the dezinformatsja news is disseminated abroad so as to later check the results.

The results are eminently practical: the “Euromissile battle” narrated by Michel Tatu, the long end of the Vietnam war, the management of Soviet foreign policy after the Helsinki Treaty.

 But that is not all: currently, the intelligence mainly consists of economic effects, which are continuous and complex. The shift from the Soviet “active measures” and from the political-military clash to the industrial one marks a large part of the post-Cold War period.

All true psychological warfare is active and proactive, but  the whole Western warfare doctrine is defensive and passive,  which means it does not exist.

Hence it is not necessary to wage war manumilitari, for the additional reason that the enemy’s enterprises and infrastructure will be good also for us. At a time when the value chains are now fully global, when cars are manufactured in Spain for the German market and in China for the Indian one – not to mention drugs, the active ingredients of which are produced in India for the French market and even in Mexico, but for the Canadian one.

 All contemporary intelligence, however, is targeted to the economic and technological resources of the possible enemy and operates – 24 hours a day – on the Web and also in the traditional media machinery.

Hence, those who win are not those who have the best weapons or the best products, but those who creates the best and most convincing storytelling around them.

 It is therefore useful to see how the old “shadow theatre” is being changed and perfected.

 This is what is needed in a situation of actual integration of all large companies, not only global but also national ones.

 In the field of social media, for example, the most widespread tactics are those of “selective censorship”, or the hacking of sensitive information, which becomes hegemonic in the common discourse, or even the manipulation of the Internet search algorithms, with a view to linking some content to other one, in a completely unreasonable way.

30-40% of the news that can be found online is designed to deceive at least some of the readers.

 Deception: not to mention something and tell the truth about everything else or, instead, to create a storytelling in which real things appear surrounded by completely fake data.

How so?

By changing the perception of facts, or the news about the facts, with strong or weak adjectives and nouns, or with universal symbols, and even with references to people or things of great fame, either negative or positive.

 15% is the average quota of experts taken out by the automated texts that can be found on the World Wide Web, while about 60% of all readers are usually put on the spot by the texts and news available on the Web.

 The Canadian Services have provided this statistics.

The operating techniques are now known to everybody: a) the Bot, a software that automatically operates on the Web, by selecting the content; b) the countermessage, indeed a message that offers the “true” or “fake” version of what has been said previously; 3) the Denial of Service (DOS), the temporary disruption of the Web for a certain user, and the  old Disinformation; 4) the Noise that covers the relevance of the data sequence useful for understanding a certain message; 5) the Search Engine Optimization (SEO), the optimization of the number of visitors to any website.

On the technical and ideological levels, there are other online practices that are used daily by the authors of Disinformation: a) the BOTs coordinated with each other, which create a series of cross-references that reinforce the (fake) news that is to be spread; b) the use of false Internet “domains” in which websites and content similar to those of the “enemy” are created; c) the use of e-mails or websites that are pirated and disseminate news opposite to those that the primary user would like to spread.

 Contradiction, lie, defamation.

  We are still at the old theme of the aria “La Calunnia” (“slander is a little breeze”) of the Barber of Seville, as well as the “flower duet” of Madama Butterfly, but all with a firepower that Rossini or Puccini could not even imagine.

There are two profound and conceptual limits to these operations. The first is that, in spite of all possible technological refinement, the basic psychological mechanisms are always the same: personal defamation by sexual or other means- just think of the “Tangentopoli” operation in Italy (the judiciary probe known as Bribesville)  at the end of the Cold War and, finally, of the elites’ structural inability to separate wheat from chaff,  news from disinformation.

 If we do something to help a government and then it falls into the trap of dezinformatsja, everything is useless. And this has often happened.

Ministers who tell you that they read it in the newspaper  “Corriere della Sera” (bravo!) or that it was whispered to them by some intelligence agents without any qualification – and hence you need to check whether, as Harlequin, they are Servants of two Masters. It has often happened.

Hence, in many cases, currently the maskirovka strikes back and negatively changes the decision-making of those who have carried it out.  The ruling classes that know it can save themselves, while the others and their countries are bound to become “servant of two masters” and, in any case, irrelevant.

 There are also the undesired effects.

For example, it happened that the reputation of a ruling class was tarnished by convincing citizens that all politicians were “dishonest and thieving” and later we needed to stabilize a country in disarray and adrift without a guide, possibly recovering some of those who had been dismissed as “thieves”, thus creating a cognitive dissonance with the previous message conveyed.

 However, how can we optimally develop the possibility of an IT attack (but not necessarily this type of attack only) on the decision-making system and on the public of a target country?

 The attack will be successful if, for example, there are no useful sources of good information.

 Without a reserve of serious, objective and truthful news and interpretations, the whole public and private system of security and education will fail in the long run.

 Another excellent condition to launch an attack is uncertainty: in a phase of financial, geopolitical, technological and even military insecurity, with terrorism any news – regardless of its importance -can generate  innumerable domino effects.

Probably those who maintain uncertainty have a return –  in this case mainly and economic and industrial one.

 Nor should we neglect the fact that, if there is a lack of  effective information available, the media channels can be bought and sold, infected by adverse agents and induced to acquire information only from certain sources, which are already compromised.

 If the commercial goal is the target and above all the audience, everything becomes possible for a foreign operator with bad intentions.

 No country, not even those which control the Web at best, is protected from similar operations.

With a view to keeping the situation under control – and this applies above all to those who deal with State Security – we need, at first,  to ascertain who makes disinformation.

Very often an individual or a private organisation.

 Then, obviously, the exact opposite must be done, but  preferably using different mechanisms of action: a similar  and possibly “fake” website in case of a Bot, or a personal attack if we are faced with a press campaign.

Hence never use the same usual means and mechanisms.

Generally, abstract and political motivations should not be overlooked: there are NGOs, States, political parties, and companies that usually keep on misinforming.

 And often they are not even traced by the intelligence Services.

 Obviously, there are also terrorists – but in this case we are talking about another communication system.

 Who can say, for example, that German cars are better than Italian ones? Yet it is common sense, albeit wrong.

Nowadays all the environmental propaganda consists of behaviours that favour some countries and companies instead of others. But no one tells you so.

Indeed, this is the real news.

 Fake news to be spread, of course, but also generic discontent and uncertainty.

 A mass perception that a great Portuguese poet, Pessoa, would have defined as desassosego (disquiet and restlessness).

 Obviously, it is even better to let all disinformation go on, with its parallel and unexpected processes, so as to see who makes it and what goals are pursued.

Usually such operations end quickly, but neither the perpetrator nor the victim knows their effects or duration.

Hence the primary goal of all dezinformacja techniques is  the partial or complete alteration of the perception of reality.

It is therefore essential to understand the divisions within the opponent’s field.

 Popular or elitist.

 If we believe that all enemies are the same, we operate for their propaganda and any operation of “psychological warfare” is always inhibited to us.

 An essential resource in this field is the conspiracy theory.

  The field of others is segmented, but the absolute uniqueness of those who generated the content we do not like or that harm us is assumed.

 A well-managed conspiracy manages to work well where few other maskirovka techniques do so.

Perfect for simplifying all matters, it immediately identifies the aim of each psywar: to find the enemy, either true or false.

 Another procedure is usually to use entities that everybody deems “third parties” to spread messages against the enemy (once again the current ecologism is full of examples in this regard) and then reinforce their message through other information sources: truth comes from repetition and the mind learns not from a single fact or event, or from a single person, but always from what Fritj of Capra called the mental ecosystem.

 The human brain is made in such a way that it tends to believe both in repetition, but also in similarity and homogeneity.

Our brain has evolved only among human groups already formed. It is not by chance that, unlike what happens to animals, our brain maturation must take place in a post-natal social, family and group context.

Otherwise – as Nietzsche said – to live alone, one must be either a beastor a god.

 Another factor not to be overlooked is that, as in all  Gestalt psychologies, what counts is not only what you see, but also what you do not see.

 As in the Rorschach test, the inkblots can be perceived either as a glass or two butterflies, but it is the outline, not the inside of the image that can suggest one answer or the other.

However, how can we counteract such an operation? Denial is always the best answer.

 But it is simple and repetitive, always prone to others’ psyops.

We can simply deny having received funding from a certain country.

Mere denial stops the game of cross-references and shadows that would develop if the victim of the operation were to dwell and go into explanations that 87% of the audience – on the Webor even in the old media, never follow. Those who justify themselves are always wrong.

Denial is used to make a quick fix, but it is certainly not a stable and definitive answer.

 Another technique is to defame and attack those who make  disinformation.

It works well, but once again it is a mechanism that does not last long.

 A disinformation campaign is never opposed with  temporary and limited makeshift interventions and stopgap  measures.

Dezinformatsja is always a potentially endless flow, to which we must respond by creating a state of mind (not  “news”, but a stable and possibly ungrounded mental state) that is always potentially and equally endless.

 It should also be added that our intelligence Services know nothing about these things. We are still focused on the  protection of redundant critical infrastructure and possibly even of selected military and information networks. Everything is even too obvious.

Nevertheless, how can we avoid the defamation of one of our most famous chocolate creams in China?

  Furthermore no one will be able to tell you what happens when there is defamation against our production system, as well as against our political system, which is, in fact, also a critical infrastructure.

 Goodness knows what happened to our rubber before Pirelli’s deal with ChemChina. And it was not China that took the first step.

 If we also study the issue of the F-35 fighter that was not acquired by the German Armed Forces, you will also understand the resulting weakness of Chancellor Merkel and her “heir”, as well as the short-lived successes of the Right, which always remains under the threat of being dismissed as neo-Nazi.

The neo-Nazis, however, were still pasture land mainly for the  Eastern and Russian intelligence Services.

Hence using the professional ignorance of our politicians to defame our intelligence Services –  as is currently happening – is certainly a perfectly orchestrated defamation operation.

 A cheap politician who uses the intelligence Services to protect himself is like the main character of the “Manuscript Found in Saragossa”, who files the silver ball he will put into the gun to commit suicide.

 In a different way and with different effects, Italy is drifting to a condition very similar to Great Britain’s in the  Brexit phase.

 A slow and subtle Italian destabilization, with a terrible and useless fragmentation of the voters and the political classes.

Nowadays in Italy there is a sort of geopolitical strike: the country is on the sidelines and reluctant to understand the reality of power relations and national interests.

In the case of the operations carried out by China, however, we have a completely different picture.

It should be recalled that, as early as 2014, China established the Central Leading Group for Internet Security and Informatization, chaired directly by Xi Jinping, in  addition to the Cyberspace Administration of China. The  Chinese leaders’ central idea is to make national sovereignty possible in cyberspace.

This is not easy, but it can be achieved with technological hegemony and strategic wisdom.

 Hence the importance of Huawei’s 5G  global fight and the concrete possibility of “controlling world innovation”, as some Chinese leaders say.

 Therefore, in the “war of shadows”, we currently have to deal with the great influence operations, which are actions of cognitive modification, i.e. actions to change the perceptions, behaviours and decisions of certain target groups, in the country to be influenced, which can be changed to the benefit of the acting Power.

 Or even very broad operations, which regard the whole  political audience.

Conversely, the “influence campaigns” are operations carried out by an adverse and alien Power that tend to put together various small-scale and sectoral influence actions, which may have common goals or, in any case, not contradictory and opposed goals.

 This means that through “influence operations”, we can influence the actions of the rulings class, as well as all or part of the public in a country, or the activities of an allied country.

Influence actions are always linked to strategic deception and the possibility of exploiting the enemy’s weaknesses, particularly those typical of moralism.

Currently moralism is a tool used by some countries against others.

Hence influence operations are certainly deception, but above all they mark a new Intention, or an Interference.

Nevertheless everything happens in the epistemic chain formed by single individuals, and then in the social or para-social sphere, characterized by the real relations among individuals, the real public sphere, the media, the elites, the “experts”, the scientific and technical system of a country.

Currently all Western media are ever weaker and often not very attentive to influence operations because they are subjected to a very fast change of technologies, as well as a quick commercial trend of the system. We are all market oriented in the short term, and currently all the influence operations made so far exploit above all the technological, legal and economic weaknesses of the various countries to reach their own aims.

 The vulnerability of the public is yet another issue. Considering the new technologies, there is not only the possibility for each psywar operator to change the perception of others’ world, but also to do so in a covert way. 

This applies to any Internet operator and any millennial kid.

 And that is what counts. One hundred “denials”, however developed, are always news.

 There is also a psychological problem.

The above mentioned evolution has not provided us with a brain that always seeks the objective truth of facts, but we have a cognitive system that finds an acceptable reality day by day.

Phylogenetically, the conformity to a group is more important than a subjective psychology that always seeks only truth, be it objective or linguistic.

In economics as in politics, free riders always have a hard life. And they are always those who define a new paradigm. Enzo Ferrari invented luxury sports cars against everything and everyone. Some pasta makers in Northern Italy discovered they could sell dried Italian pasta any where in the world.

Not to mention advanced technologies, where Italian companies were bought to be destroyed (Hewlett-Packard with Olivetti, for example) or to be put out of business, or the export of mass technologies, such as Piaggio in India.

Hence we often have to deal with the confirmation bias, i.e.  the psychological tendency to ignore information that goes against accepted beliefs, or with the creation of a protective apparatus against threats to identity and team spirit.

Therefore we have to do with a series of mass influence actions that are now typical:

a) Terrorism. Creation of fear, an essential element of influence operations, but also of the radicalization of certain themes. A primitive, but very effective solution. In this respect, just consider the case of Italy in the 1970s and in the 80s. The sword jihad is a different story, but often not dissimilar to that of “red” terrorism in Europe.

b) The operations of para-State organizations, i.e. criminal structures and vast organized crime. Or do you really think that the international crime organizations have been created and have become powerful on their own, like the Baron  Munchausen, who rescued himself from quicksand by pulling himself out at his own hair? All criminal organizations have always been influence instruments.

c) There are also hackers, who operate divided to strike together. Consciously or not, 78% of them are operators of the Powers that support their projects.

d) Not to mention hackers having only economic goals. After making money they, too, are not aware of the fact  they have resold their data to some countries, but not always those they like.

Hence how can you create a “narrative” for influence operations?

Nowadays you can certainly create a consistent, long, credible and wide-ranging storytelling.

Conversely, “negative” techniques tend to disrupt the narrative over a long period of time.

 There is also distraction, the creation of an external objective far from the themes discussed.

 Therefore, we propose to create an Agency or a unit of it   dealing with the disruption of influence operations which, before the end of the Cold War, Italy hosted like no other country in the world to later maintain its Kantian “minority status” in the following years.

 An Agency that can really carry out influence operations – actively, with no curbs and restraints other than the operational and technical ones.

Therefore, in terms of protection of Italy’s industrial values, patents, as well as “reputation” of the country and its brands, even the less famous ones, we are now almost at death’s door.

Hence it will be good to quickly reverse the course.

Continue Reading

Latest

Trending

Copyright © 2019 Modern Diplomacy