In principle, excluding Huawei’s 5G from the US networks certainly does not make them safer.
The logic for the operation of the 5G network is such that the criteria for secure transmission shall be defined immediately.
An executive order of President Trump, issued last May, prevents US companies from buying materials and information technology from companies that pose a danger to national security.
There is an obvious reference to Huawei and ZTE, the two Chinese companies that currently set and dictate the rules in the 5G sector.
At the basis of these operations for excluding Huawei-ZTE products there is the new Chinese National Intelligence Law of 2017, which obliges all Chinese companies to support the government abroad.
It should be recalled, however, that – according to all independent analysts – Huawei and its 5G network are at least a year “ahead” of their Western competitors, besides being less expensive and more user-friendly.
The 2017 law provides the Chinese system (and the CPC) with new tools – especially in the cyber sphere – for State security. Exactly the opposite of what happens in the West, where the intelligence services seem to be bogged down in an eternal wasteland made of little money, excess of regulations, hatred on the part of decision-makers and closed-minded attitude vis-à-vis civil society.
Considering this strategic context, it is easy to predict what will happen to us.
Nevertheless, it is not just a matter of naive evaluation of hardware – as far as the Huawei 5G network is concerned – considering that the dangers to security are always present also in software and networks.
Thinking that there is only one danger for the 5G networks, and not for others, is a colossal naivety, which will be exploited by those who do not want us to equip ourselves with 5G networks at the best level available on the world market.
In fact, both the Russian Federation and North Korea have already penetrated some US web networks without using – in any way – Huawei or Chinese-made material.
Hence why so much ado about Huawei, considering that the current 5G or 4G networks are equally penetrable, and certainly not by China?
As I hope it is clear, the origin of a network says nothing about who wants to use it illegally or “covertly” and how.
The US 5G system has not yet an international standard, while the 4G security measures, which may well be adapted to the new network, have not yet been fully adapted to the new use paradigm, both in the USA and in the EU.
A recent study on the 5G authentication by the ETH of Zurich and the universities of Lorraine and Dundee has showed that the standard currently used on the 5G network- derived from the 3rd Generation Partnership Project (3GPP), an international organization of telecommunication industries – lacks security and accuracy.
Hence, this is certainly not a “fault” of Huawei.
The Authorization and Key Agreement (AKA), which is a security protocol used mainly in the 5G network, also shows structural weaknesses, which can enable some people to steal data and intercept communications.
Once again this does not regard Huawei. Quite the reverse.
It should be recalled that currently the US government has no control over the 5G procedures and standards. It can only collaborate – and not substantially – with the companies operating in the sector. Nevertheless, we believe it is already too late.
The myth of the “free market” is back again. If the USA still believes that a network like the 5G – which, as was said in the Davos Forum, will create the “fourth industrial revolution” – can do without the State support, we are really stuck back in the nineteenth century.
Instead of always thinking about the links between the founder of Huawei and Chinese Armed Forces (and, indeed, we should wonder how many US companies are born from the military sector and hence why should we trust them), the USA should be able to establish – by legislation – the built-in network security standards and criteria.
But it will never do so. Hence also the USA is interested in building 5G networks with backdoors, while Huawei follows the world market and adapts to it.
This should obviously apply to all producers. Why is no world Conference of 5G producers organized to set the network security criteria? Is someone – who is not Huawei – afraid of it?
A further problem for the advanced networks will arise with the Internet of Things (IoT), one of the 5G elective applications.
The IoT is a particularly sensitive system and many attempts have already been made by hackers to block it, especially with the Distributed Denial of Service (DDOS).
We can partly survive with the same 5G flow rate, but nothing can be guaranteed and taken for granted.
But, ultimately, what is really the 5G network?
It is a set of technologies, which can connect both self-driving cars and the most traditional data networks.
The transmission bandwidth is over 20 gigabits per second, but the 5G network operates with two different frequencies.
In one of two modes, the 5G system uses the same networks and the same frequencies as 4G and WI-FI, but with a better coding system and with wider transmission channels.
In the second mode, the 5G system uses much smaller frequencies, which can send data even faster than 4G, but for shorter distances.
Hence, considering that the 5G system operates mainly with small and very small waves, which “fall” after a short distance, it will need more transmitters – in series or in parallel.
With a view to increasing the bandwidth, the 5G cells use – in particular – a technology called Multiple Input, Multiple Output (MIMO).
In this case, hundreds of antennas operate at the same time, which significantly increases the speed and proportionally decreases the signal latency.
In the 5G network it is currently one millisecond only, while in the 4G system the standard latency is 30 milliseconds.
There is also a specific 5G technology available, enabling both transmitters and receivers to send / receive data on the same wavelength.
It is known as full duplex and operates with specific circuits, so that the outgoing and incoming signals can never interfere with one another.
At security level, the 5G network is weak when exchanging cryptographic data and, obviously, the greater the number of processing points, the more the possibility of data theft increases geometrically.
Currently, however, it is weak for everyone, not just for Huawei users.
The average 5G speed is currently one gigabyte per second (1GBps) – far beyond the 4G standard and the standard of any WI-FI network operating today.
As already seen, with a view to reaching the very high speed of its signal, the 5G network uses the millimeter waves (MMS).
They are radio signals with frequencies ranging between 30 and 300GHz. Obviously, high frequency waves have a great signal transfer capability and carry much data, while the lower frequency ones carry little data and can be blocked by buildings, cars, airplanes and trees.
With a view to solving this problem, the 5G network resorts to small cell antennas, which must be placed in a far more widespread way than 4G antennas – one every 150 meters approximately.
The small cell antennas are 1.3 meter high, but if the 4G uses frequencies ranging between 1 and 5 GHz, the 5G networks operate with frequencies between 24 and 90 GHz, with serious health risks.
As we all know, however, if the signal dispersion is proportional to the distance squared, the possibility that the 5G spreads data not allowed by the source is intrinsically high.
It is not an issue of naive IT backdoors in sensors (which seems, however, rather unlikely) but of simple squared spreading of signals.
After all the 5G is very similar to microwave radiation.
And there are now certainties about its negative effects on both the skin and the reproductive organs.
Nevertheless, as often maintained by the supporters of the new 5G network, it is not so much a 100 times faster system than the 4G for Internet communication, but rather the way in which the future world will organize production, life, trade and exchanges.
So far, at least in Europe, the US Presidency’s activities to block Huawei have been such that the 5G network in Europe will cost over 55 billion US dollars more than expected.
Currently, in Europe, Huawei and ZTE hold 40% of the 5G networks and the related equipment.
Hence, half of the 55 billion US dollars comes from our EU markets’ loss of competitiveness.
Not to even mention the situation in which the 5G network operators in Europe were to rebuild the entire network of fixed structures – an incalculable cost.
In fact, the companies operating in the sector should rebuild the entire physical lines, at a huge cost, apart from the networks’ loss of effectiveness.
At that point, we might just as well keep the 4G network.
What about the interference with the other networks, especially the military ones?
Here the USA tells us that the danger lies in the width of the spectrum used by the Huawei 5G network but, as we have already seen, both the very low signal permanence in the networks and the multiple antennas prevent any signal closure, any backdoor and any parallel recording.
Normally the US military and intelligence transmission systems are “sub-6”, which means they use a band ranging between 3 and 4 GHz.
The signal overlap is therefore unlikely.
Furthermore, the USA – with South Korea and Japan – had planned a 5G network with a wave width of 24-300 GHz, a very different and far more expensive technology than the Chinese one, which was supposed to go into production around 2022.
It would have been called mm Wave technology, a technical procedure transmitting with a wavelength of approximately a millimeter that, however, can penetrate solid materials, is very directional – like light – and is also selective in targets.
Hence Huawei has therefore shot ahead, with simpler, sounder and more reliable technology. This is the real reason underlying the opposition to the Chinese 5G project – cheap intelligence issues are only a pretext.
On the technological and commercial levels, considering that the Chinese 5G networks provide greater coverage and fewer disruption risks, China has already installed 350,000 5G stations in China and over 10,000 abroad, in 30 countries including Turkey and Iceland.
Between 2009 and 2011, however, Vodafone Italia discovered “backdoors” in the Huawei network – not in the 5G, but in the standard network.
No data was tampered with or illegally recorded, as claimed by Vodafone Italia itself and by the media that reported the news.
The Italian Internet operator also said that the network security problems had been quickly solved.
The Chinese company defined those defects as mere “errors”, not as backdoors, a term designating a voluntary mechanism of non-permitted data recording.
Hence this is the reason why the NATO Centre of Excellence claims that “there is no alternative to Huawei’s 5G” but that “it would be necessary to define autonomous security standards”.
It is therefore inevitable that the Chinese 5G networks become essential parts of the communication system, but also of the defense-control system of many Western countries, including the United States.
In any case, Huawei has always said that there have never been any security incidents concerning its network and, indeed, Huawei is the most controlled and checked industry in the cyber sector worldwide.
Considering that every part of the network built or designed by Huawei is fully verifiable and usable, a way to make a 5G network completely safe is encryption. We imagine it will be developed in a short lapse of time and with homogeneous criteria for all global operators.
Nevertheless, insofar as Huawei networks are built in the world we have outlined, they cannot anyway be intelligence networks in favour of China, considering that: a) the Huawei 5G network is already the most widespread and used system and statistics is such as not to allow any ambiguity; b) the technology itself – with the minimum signal latency – is such as not to allow backdoors that are neither obvious nor hidden and which, however, would be capable of blocking the entire global market for the Huawei 5G system; c) the idea that the founder of Huawei is a former officer of the People’s Liberation Army and a CPC member makes us smile.
What if we applied the same criterion to the huge number of components or tools for the web that are produced in China, but for the major Western companies?
Moreover, d) it is irrational to think that a company like Huawei ruins its market – which is what really matters – or even its reputation for technical and political reliability for some IT backdoors.
It should be reiterated that intelligence is not made by eliciting unmentionable secrets, but by discovering the creative mechanism of the enemy’s thinking.
Intelligence is not about a “fact”, but about a concept.
As Napoleon used to say: “Unhappy the general who comes on the battlefield with a system”.
Sino-Russian regional activities after Afghanistan
After the Taliban took control of Afghanistan last August, Russia warned against the threat from the extremist organisation of the Islamic State (ISIS) and the increase in drug trafficking.
The Taliban have decided to cooperate with Russia, China and Iran to maintain regional security. The news agency France-Presse reported that the Taliban had participated in high-level talks in Moscow. During that time, ten countries requested emergency humanitarian assistance for Afghanistan and said that the countries which have recently withdrawn from Afghanistan should provide funds to help with reconstruction. The countries are the following: China, India, Iran, Kazakhstan, Kyrgyzstan, Russia, Pakistan, Tajikistan, Turkmenistan and Uzbekistan.
Before that meeting, Russian President Vladimir Putin had warned that some ten thousand ISIS fighters had gathered in Northern Afghanistan to spread religious and ethnic discord. The Soviet Union once bordered on Afghanistan and Russia still considers this area a zone of influence.
Putin reported in mid-September that the ISIS leader was planning to send people disguised as refugees to neighbouring countries in Central Asia.
The countries participating in the Moscow talks stressed in a joint statement that they were concerned about the actions of terrorist organisations and reaffirmed their willingness to continue to promote security in Afghanistan to contribute to regional stability.
Russian Foreign Minister Sergei Lavrov criticised the absence of US officials during the meeting. He said earlier that ISIS-affiliated fighters and al-Qaeda were trying to take advantage of the power void in some parts of Afghanistan.
In the joint statement, the participating countries urged the Taliban to implement appropriate and cautious domestic and foreign policies and adopt a friendly policy towards Afghanistan’s neighbours.
In terms of internal policy, they demand that the Taliban respect the rights of ethnic groups, women and children. Prior to that meeting, Taliban representatives had met with EU and US officials and had also travelled to Turkey, hoping to gain official recognition and assistance from the international community.
The Taliban are in desperate need of allies at the moment because Afghanistan’s economy is in danger due to the loss of international aid, rising food prices and increasing unemployment.
With specific reference to China and Russia, on the occasion of the 20th anniversary of the establishment of the Shanghai Cooperation Organisation and the signing of the Sino-Russian Treaty of Good Neighbourliness and Friendly Cooperation, relations between the two countries entered the third decade of stability and friendship.
Currently, however, the US withdrawal from Afghanistan has led to at least two negative outcomes for China and Russia: 1) Afghanistan, located in the ‘backyard’ of China and Russia has destabilised; 2) the conflict has been chaotic and the future is uncertain and after thirty years since the end of the Cold War, the United States has freed itself from that burden to focus on the challenges of the two major Eurasian powers.
Before the US withdrawal – although the Sino-Russian-US geopolitical game continued to intensify – Afghanistan was still the place where the interests of the three countries overlapped and the parties were all interested in achieving a “soft landing” on the issue.
Since 2019 the three countries have been working together in the form of an enlarged “troika” to peacefully resolve the Afghan issue. For Russia and China, the US military presence in Afghanistan was a double-edged sword: it did not only represent a geographical threat, but could also effectively contain radical Islamic forces in the region.
Both China and Russia hoped that, after reaching a sustainable peace agreement with the parties involved in Afghanistan, the US military would withdraw from Afghanistan in an orderly way to prevent Afghanistan from becoming a “terrorist sanctuary” again.
The quick US defeat in Afghanistan, however, without agreements and/or compromise solutions, was unexpected for China and Russia, especially when, on May 11, the US military evacuated the Kandahar airport without informing the Afghan government, etc.
China and Russia have no choice but to face an Afghanistan whose political future is doubtful. The two superpowers, however, have completely different attitudes towards the Afghan issue: the former is more proactive in contacting all parties inside and outside Afghanistan.
On May 11, at the Second Meeting of the Five Foreign Ministers in the format of “Central Asia and China” held in Xi’an, the Chinese State Councillor and Minister of Foreign Affairs, Wang Yi, had warned that “foreign troops should withdraw from Afghanistan in an orderly and responsible manner to prevent hasty actions against Afghanistan”. A few days later, the Chinese Foreign Minister told his Afghan counterpart that China was “willing to host Afghanistan’s internal talks and help its efforts against terrorism”. In mid-July, during the Shanghai Cooperation Organisation Foreign Ministers’ meeting in Dushanbe, Wang Yi reiterated that proposal.
It was in that context that Wang Yi paid an official visit to Tajikistan on July 14 and then participated in the Shanghai Cooperation Organisation Foreign Ministers’ meeting and met Russian Foreign Minister Lavrov in Tashkent the following day. Furthermore, on July 16, Chinese President Xi Jinping had a telephone conversation with the then Afghan President Ashraf Ghan. Xi Jinping urged “Afghan-led and Afghan-owned political dialogue to promote national reconciliation and peace processes”. He also promised to provide more assistance to Afghanistan in the fight against Covid-19 and hoped that the Afghan side would provide more protection to Chinese citizens and organisations in Afghanistan.
Ten days after US forces suddenly withdrew from Bagram Air Base (July 6), i.e. when Xi Jinping and Ghani were in talks, the United States announced that the new deadline for the US withdrawal was August 31, thus causing the Afghan army’s collapse across the country as early as late July.
On July 28, while meeting Taliban political leader Abdul Ghani Baradar in Tianjin, Wang Yi said: “The sudden withdrawal of the US and NATO troops from Afghanistan marks the failure of US policy in Afghanistan. The Afghan people are now faced with an important opportunity to stabilise and develop their country”.
Baradar hopes that China will increasingly participate in the peace-building process in Afghanistan and play a greater role in the country’s reconstruction and economic development. Wang Yi said the Taliban should draw a clear line with terrorist organisations such as ISIS. In response, Baradar promised that the Afghan Taliban would “absolutely not permit any force to do anything harmful to China on the territory of Afghanistan”.
Baradar is not the first to visit China. Before September 11, 2001, the Taliban had contacts with China but, after the tragic events, China supported the Afghan Northern Alliance and the aforementioned contacts with the Taliban were interrupted for several years. Nevertheless, China has never classified the Taliban as a terrorist organisation.
China’s active diplomacy towards Afghanistan has two main reasons: firstly, security concerns, particularly China’s Western borders; secondly, economic interests, because all of Afghanistan’s neighbours are countries linked to the Silk Road Initiative.
In the actual operation, security and economy are closely related and are both essential. On July 14, the shuttle bus of the Dasu Hydropower Project in the Khyber Pakhtunkhwa Province, Northwest Pakistan, was attacked by terrorists. The attack caused the death of thirteen people, including nine Chinese citizens. The Dasu Hydropower Plant is part of the construction of the China-Pakistan Economic Corridor.
Moreover, as a neighbouring country to Afghanistan, China has a 92-kilometre-long border at the eastern edge of the 300-kilometre-long Wakhan Valley, which is connected to this war-torn country. According to reports, China provided about 70 million dollars in military assistance to Afghanistan between 2016 and 2018 and helped the Afghan army establish a mountain brigade dedicated to fighting terrorism in the Wakhan corridor.
Furthermore, during the two decades in which the United States occupied Afghanistan, China’s investment there included millions and millions of dollars in economic assistance, including various projects such as schools, hospitals, flats and food assistance, and trained thousands of Afghan students and technicians in China and Afghanistan.
Since 2017 China, Afghanistan and Pakistan have been discussing the possibility of extending the China-Pakistan Economic Corridor to Afghanistan. Nevertheless, some major economic projects, such as the 2008 four billion dollar contract for the Anyak copper mine and the 2011 contract for the Amu Darya Basin joint oil and gas field development, have been suspended due to security concerns.
Unlike China, Russia has considered the Taliban a terrorist organisation since February 2003, but this has not prevented it from having contacts with them. On August 13 last, Russian Foreign Minister Lavrov stressed: ‘We are in dialogue with all important political forces in Afghanistan, including the Afghan government and the Taliban, the representatives of Uzbeks and Tajiks and others”.
In fact, the representatives of the Taliban visited Moscow as early as November 2018 to participate in the peace Conference hosted by Russia. They also held two meetings in 2021 (on March 18 and July 8) to participate in tripartite consultations, Russia’s preferred format for dialogue. Two days before the Taliban took control of Kabul, Foreign Minister Lavrov envisaged an enlarged tripartite consultation mechanism to include Iran and India in addition to Pakistan. Outside Afghanistan, Russia has invested many resources in Central Asia and has considerable influence in the security field (Collective Security Treaty Organisation).
As important countries, many global problems are related to the relationship between China and Russia. Western countries, like colonies led by the United States of America, have preferred to have hammers in their hands and nails in their eyes. China and Russia have not followed the Western model, but have gone their separate ways. This is a hope for the countries that have been devastated by the US interference (former Yugoslavia, Afghanistan, Iraq, Syria, Libya, African countries, etc.), and it is also a hope for the Westphalian world order disrupted by the United States after the Twin Towers attack.
The development and progress of human civilisation cannot have only one pathway, nor should there be only one model. As a Chinese saying goes: “Those who are fit for themselves but forgets the others are abandoned by the people; those who deny themselves and rise again are admired by everybody”.
A More Diverse Force: The Need for Diversity in the U.S. Intelligence Community
As part of a hiring initiative meant to attract new and diverse hires, the Central Intelligence Agency (CIA) released a new recruitment video in March of 2021. The video featured a Hispanic female discussing her background and time in the CIA, as well as why she chose to serve her country. She says at one point, “I’m a woman of color. I am a mom. I am a cis-gender millennial who’s been diagnosed with generalized anxiety disorder…I did not sneak into CIA. My employment was not and is not the result of a fluke or a slip through the cracks. I earned my way in, and I earned my way up the ranks of this organization”.
The video showed a woman who cares for her family, cares for her country, and desires to see a difference be made in the world. However, some took issue with the advert though, though these criticisms came over a month after the video first was published and made available to the public.
In a tweet, the Republican Senator from Texas, Ted Cruz, said, “If you’re a Chinese communist, or an Iranian Mullah, or Kim Jong Un…would this scare you? We’ve come a long way from Jason Bourne”. Many criticized Cruz for his usage of Jason Bourne, a fictional CIA Paramilitary Operations Officer, yet he took to Twitter once again to clarify, saying, “My point is that CIA agents should be bad-asses—not woke, fragile flowers needing safe spaces”.
Donald Trump, Jr. tweeted “China & Russia are laughing their asses off watching CIA go full woke…If you think about it, wokeness is the kind of twisted PSYOP a spy agency would invent to destroy a country from the inside out”. Others, including popular conservative commentators like Dinesh D’Souza and Meghan McCain, also criticized the ad calling a “joke” or “insane” while others went as far to say that the CIA was “actively looking to recruit the most immodest, narcissistic, grotesquely self-serving people in the world”.
Criticism towards the ad did not purely come from the Conservative, rightist personalities either, but also members of the left. Left-leaning publications such as The Intercept and Jezebel both critiqued the ad. It seems that, from all sectors of American public and political life, this advert and total tactic was heavily derided; from members of the left, it was cringey and irrespective of the agency’s long and controversial history while, from members of the right, it was ineffective national security and intelligence policy.
However, what many seem to be forgetting is that diversity within the intelligence world is an extremely important factor in creating effective and accurate foreign policy and in gaining the most up to date and accurate intelligence.
Intelligence analysis is probably the most important part of the Intelligence Cycle and holds just as much, if not more, importance as the end result, the intelligence estimate or packet. To put it simply, if the analysis is corrupted in some way, shape, or form by either the analyst’s personal views or tainted by poorly verified intelligence, then the action taken based upon this intelligence could result in missteps or negative affects to U.S. policymakers, military units, or regions in which the intelligence affects. Throughout history, there are an abundance of examples in which intelligence analysts have misinterpreted situations due to their own biases about a nation, political ideology, or have been selected specifically to sort through intelligence in order to back up a preconceived opinion.
One of the best examples in showing how analysts’ personal views, both conscious and subconscious, can affect their overall analysis is the 1954 coup d’état of Guatemalan President Jacobo Árbenz.
The coup, which was given the CIA codename Operation PBSUCCESS, was a mission in which the U.S. government, via the CIA and U.S. State Department, engaged in fomenting a coup to remove Árbenz, the leftist president who had approved of agrarian reforms within Guatemala. To justify an invasion, members of the State Department and CIA tried to link Árbenz to Guatemalan communists, yet this proved very difficult as there was “no evidence that Arbenz himself was anything more than a European-style democratic socialist”. A CIA paper, published two months before the coup, also, “did not cite any direct contact between Guatemalan Communists and Moscow. The paper offered ideology, not facts…”.
A master’s thesis written by a student at West Virginia University extensively and exclusively covers the CIA’s decision making process, detailing how, “CIA reports from the early 1950s also demonstrated this fear [of Communism]… The “red scare,” in essence, affected nearly all Americans. Many in the Eisenhower government also felt that Moscow had a nefarious hidden hand and controlled communist sympathizers around the globe,” while also noting that the, “ONI [Office of Naval Intelligence] did not feel that CIA had valid reasons or enough sources to reach the conclusion it did regarding Soviet intentions in Latin America”. The heightened fears of Communism and the Soviet Union that permeated the minds of analysts within the State Department and CIA (as well as the desires by some to ensure the survival of the United Fruit Company in the country) resulted in intelligence that was skewed to believing that the Guatemalan government was embracing Communism, when, even according to the CIA’s own histories, was baseless.
Based upon this example, as one can see, the intelligence provided to the U.S. government was based upon analyst biases and did not accurately reflect how the Guatemalan government under Árbenz operated nor how entrenched the Communists were in political life. The fear of Communism overwhelmed the amount of solid and fact-based analysis, resulting in an invasion that removed a democratically elected president.
This coup eventually resulted in the emplacement of a right-wing, military government, which would rule until 1996, overseeing a brutal civil war complete with death squads, acts of genocide committed by presidential administrations, political assassinations, and a drastic increase in governmental corruption. Members of the CIA who were involved in the operation too regretted their actions and acknowledged that the outcome did not benefit Guatemala, the U.S., or Latin America. Operation PBSUCCESS did not bring about a U.S.-friendly democracy, but a U.S.-friendly military dictatorship that engaged in war crimes and severely destabilized the entire country. The failure of this operation to bring about a democracy and U.S. intervention in the country in the first place was, in my own view and examination, based upon biased analyses by the CIA which promoted the view that Guatemala was becoming sympathetic to Communists and the operation itself shows just how important intelligence analysis is.
Not only is analysis an incredibly important tool within the intelligence cycle as a whole, but the analyst themselves are highly important. The analysis is only as good as the analyst and if the analyst is biased, limited in their outlook or worldview, or come from a sole section of society, then the analysis will reflect those beliefs. Most of the analysts involved in the Guatemalan operation were white and male, most likely coming from middle-class backgrounds and either having military service or Ivy League education or both. These beliefs and hiring processes which exclude persons beyond the majority of America’s populace can significantly hinder an agency and promote a poor world outlook. The majority of persons in countries in which the U.S. is involved, thinking of becoming involved, or are creating analyses in anticipation of potential foreign policies are not white or male nor from wealthy societies; they are, most often than not, of an extremely different mindset than many Americans, live in poverty or close to poverty, and have an immensely different culture. While the CIA has made some headway in this area, retired CIA case officers and analysts have made claims that the CIA (and the Intelligence Community as a whole) are severely underperforming and not effectively recruiting towards people from outside of that select pool.
Ted Cruz and Donald Trump, Jr.’s comments about the CIA lowering their standards and fostering an environment in which the CIA now is ineffective at creating intelligence or defending the United States from foreign threats (not being “badass” enough) is nonsensical. If anything, the inclusion of persons who are not white or male, who have experience outside of the military, who are knowledgeable on issues beyond military, intelligence, and national defense/security makes for a more well-rounded force and an agency more effective at analyzing collected intelligence, crafting accurate and informed recommendations, and allowing past mistakes, the misreading of important political events, to take hold. Including strong, analytical persons from more minority backgrounds into the national security framework will perform wonders for American intelligence analysis and in making influential policy decisions.
To quote Marc Polymeropoulos, a retired CIA officer, “Diversity is an operational advantage. Simple as that. I want case officers who look like the UN”.
Women Maoists (Naxalbari)
Every now and then, Indian newspapers flash news about Maoist insurgents, including women being killed. They usually avoid mentioning how many soldiers were killed in encounters, whether fake or genuine. Here is a glimpse of such news: A woman fighter, along with a male c-fighter, was killed in a clash with government forces in Odisha’s Malkagiri district (Press Trust of India, December 14, 2020).
In another incident, a woman Maoist was killed in an encounter with India’s security forces in Sukma district of Chhatisgarh (PTI, October 13, 2010). A woman Maoist was killed near Anrapali forest (Visakhapatnam, Andhrapradesh). And, another woman Maoist, carrying Rs. 16 lac reward on her head was killed in Gadchiroli district of Maharashtra.
Sometimes there are pitched battles between the Indian forces and the Maoists, including women. For instance, there was a head-on confrontation between a Maoist group and government forces of over 1500 “jawan”, equipped with state-of-the-art weapons and helicopters at the Bijapur-Sukma border. Sans air power, the Maoists, armed only with machine guns, gunned down 22 soldiers belonging to Central Reserve Police Force, Commando Battalions for Resolute Action (Cobra), and Bastariya Battalion of the Central Reserve Police.
Why do women join the Maoist Movement?
They find the Maoist narrative of emancipation attractive. . Not only the low-caste women but also the high-caste ones joined the Maoist ranks in droves. About 30 to 40 per cent of combatants are Maoists. The status of women in the Indian society is no better than that of slaves. They are not supposed to form an opinion or dare express it. Even the high-caste women are supposed to be reticent and coy. They are tutored to be housewives confined to quadrilateral of their homes, rear children, and do household chores. The Maoist ideology ingrained the sense of empowerment in them. The Maoist manifesto teems with such words as “mahila sasahktikaran” (women’s empowerment), “raise their voices” (awash uthaunne), “get their voices represented” (mahilako awaj ko pratinidithyo) and “understand women’s grief” (mahila ko dukka bhujnne).
The Maoist struggle is commonly known as “the people’s war”. The “war” aims at abolishing the feudal system, and creating a democratic egalitarian society. The bulwark of the Maoists is rural population, lower castes and women. Women and men of all castes, classes, ethnic backgrounds and education levels joined the movement.
The Maoist has incorporated women’s emancipation in their ideological manifesto, actually a “40-point demand-document”. The gender equality is enshrined in points 19, 20 and 21, mentioned heretofore:
“19. Patriarchal exploitation and discrimination against women should be stopped, girls should be allowed to access paternal property as their brothers.
20. All racial exploitation and suppression should be stopped. Where ethnic communities are in the majority, they should be allowed to form their own autonomous governments.”
The Maoist proved their heart-felt commitment to the manifesto by punishing rapists, wresting back the usurped land of single women, penalising men for polygamy, and prohibiting the sale of liquor as drunken men more often beat the women. Jan adalats (“people’s courts”) ferociously uphold women’s rights on issues of social and domestic violence.
Women were given political or combat position on the basis of merit. Untouchability and gender discrimination has been abolished. The points 19, 20 and 21 of the Maoist manifesto relating to women stress the need to transform state and customary laws to redress gender inequality at all levels.
In 2002, in recognition of their female constituency, the Maoists introduced the so-called “prachanda path,” creating a women’s department in the Central Committee. In several cases, it is the women who slay the incorrigible feudal tyrants. The women realise that they are “agents of change” who have to fight out repression in all its manifestations. The women have become politically aware that they have the right make decisions about their marriages, children’s education, and other everyday gender needs.
Indian police admit it was the women fighters who were in the vanguard of a deadly attack in Chhattisgarh, where 24 people, including some top politicians, were killed.
Because of its liberal manifesto, the insurgency has spread to 11 states, with Chhattisgarh, Jharkhand, and Odisha as epicenters. It has become entrenched in all central and eastern Indian states, often referred to as the “Red Corridor.
Having failed to subdue the Maoists, the government occasionally resorts to spreading false news about deaths of Maoist leaders. For instance, Hindustan Times dated June 24, 2021 reported that Maoist leader Haribushan, carrying a reward of Rs. 40 lac on his head, had died from COVID19. Her wife rebutted the news (Parveen Kumar Bandari Hans News Service October 5, 2021). “More than 16 senior and middle level level communist leaders have died in the last couple of months due to COVID19…Two senior most leaders of Bastar Ganga, including Dandakaryana Special Zone Committee members Ganga and Sobhroi have died due to infection in the last couple of months”.
Sympathy with Naxals is an offence
In the Bhim Koregaon planted-letters case, several intellectuals and rights activists including Navalakha were declared “traitors” by the Indian government. They were even accused of having links with Kashmiri militants. Fake letters were inputted into their computers. They were even accused of being Pakistan’s intelligence agencies agents through Ghulam Nabi Fai, a US-based Kashmiri leader. Fei has served two-year imprisonment in the USA for having illegally received funds from the inter-services intelligence of Pakistan.
The Maoist are trying to disseminate their message to urban areas also. They understand that the minorities are fed up with the regressive caste system. The rebels want to radicalise youngsters and already have carved out a strong network in premier universities of Delhi and Kolkata. The Maoist want to create an urban militia to fight the oppressive enforcement machinery of the states and Indian Union. They are believed to have infiltrated the government intelligence machinery to stay abreact of government’s tactics.
The Maoists make no bones about their plan to set up a “coordination network among like-minded outfits in India, Bangladesh and Nepal. They want unhindered movement of left-wing extremists in these territories to exchange arms, ammunition and information”. To counter the Maoist strategy, India rushed its diplomats to capitals of neighbouring countries to plug up the porous border and obstruct the insurgents’ free movement.
In addition, India launched Special teams for simultaneous searches in Tamil Nadu, Kerala and Karnataka at suspected Maoist training centres and hideouts. The effort was counter-productive because India’s national Investigation Agency framed charges against the innocent people.
During searches, the Indian forces were surprised to know that the retired Gorkha soldiers of both British and the Indian Army harbour sympathy for the Maoists.
They trained the Maoists to use fire arms efficiently. Some Maoists demonstrated their alacrity and military sills in planning bank robberies, and extorting ransom from rich businessmen. Besides arms and ammunition snatched from police stations, the Maoists are believed to have amassed over Rs. 5 billion from bank heists. The general impression in people’s minds is that the Indian forces dare not pursue the Maoists in forests. The insurgents pick up places where to ambush the security forces, and make off with booty with impunity.
Salwa Judum (purification hut)
Having failed to arrest momentum of the movement, India organised a private army ofSalwa Judum ledbyMahendra Karma From among the villagers. To boost their morale, they were given honorary rank of “special police officer. “As a workaround, the government sponsored counter-militias and split tribes into those “for” and “against” Maoists. Those willing to fight the Maoists were offered guns, money and honorary police ranks.
The Maoists shot dead Mahendra Karma and several members of the ruling Indian National Congress whose brainchild the Salwa Judum was. It later transpired that the salwa judum had been cobbled up with help of child soldiers recruited under duress or financial allurement. It was involved in gross human rights violations. When People’s Union of Civil Liberties in India brought its atrocities to the Supreme Court’s notice, it declared it illegal in 2011.
Charu Mazumdar started the movement as a “revolutionary opposition” in 1965. The world came to know of it in 1967 when the Beijing Radio reported “peasants’ armed struggle” at Naxalbari (Siliguri division of West Bengal). In July 1972, the police arrested Charu Mazumdar and tortured him to death on the night of July 27-28. The Naxalite ideology has great appeal for marginalized strata (particularly dalit and adivasis) of India’s caste-ridden society. The Naxalites Central Committee’s resolution (1980) visualises creating a base for spreading people’s democratic revolution. It would include : ‘Homogenous contiguous forested area around Bastar Division (since divided into Bastar, Dantewada and Kanker Districts of Chhatisgarh) and adjoining areas of Adilabad, Karimnagar, Khammam, East Godavari Districts of Andhra Pradesh, Chandrapur and Garchehiroli district of Maharastra, Balaghat districts of Madhya Pradesh, Malkagiri and Koraput districts of Orissa. The Naxalites want to carve out an independent zone extending from Nepal through Bihar and then to the Dandakarnaya region extending up to Tamil Nadu to give them access to the Bay of Bengal as well as the Indian Ocean.
Debunking the Sovereignty: From Foucault to Agamben
“Citing the end of Volume I of The History of Sexuality, Agamben notes that for Foucault, the “threshold of modernity”...
Did India invade Kashmir?
Pakistan has decided to observe 27th October as Black Day. This was the day when, according to India’s version, it...
Landmark decision gives legal teeth to protect environmental defenders
A 46-strong group of countries across the wider European region has agreed to establish a new legally binding mechanism that...
Plastic pollution on course to double by 2030
Plastic pollution in oceans and other bodies of water continues to grow sharply and could more than double by 2030, according to an assessment released on Thursday by the UN Environment...
Global Warming And COP26: Issues And Politics
The president’s massive social services and infrastructure package is under consideration by Congress. The problem is Senator Joe Manchin, a...
The End of the West in Self-annihilation (Intentionality, Directionality and Outcome)
A state of complete physical, mental and social well-being and not merely the absence of disease or infirmity.-Definition of Health,...
Women in leadership ‘must be the norm’
We can no longer exclude half of humanity from international peace and security matters, the UN chief told the Security...
Defense3 days ago
American submarine mangled in the South China Sea
Science & Technology4 days ago
China beats the USA in Artificial Intelligence and international awards
Middle East3 days ago
North Africa: Is Algeria Weaponizing Airspace and Natural Gas?
Americas4 days ago
Iran poll contains different messages for Biden and Raisi
Americas4 days ago
Gallup: World’s Approval of U.S. Govt. Restored to Obama’s Record High
Americas3 days ago
Biden’s Department of Justice: parents as domestic terrorists
Economy4 days ago
The Blazing Revival of Bitcoin: BITO ETF Debuts as the Second-Highest Traded Fund
Defense2 days ago
Will India be sanctioned over the S-400 Air Defense System?