The Soviets called it “the shadow theatre”, i.e. the set of psychological warfare techniques of the time, in the Cold War world.
Maskirovka, in particular, e.g. everything is camouflage, deception, real psychological warfare, disinformation.
In fact, if we analyze the psywar techniques currently used, we realize that we are still at the Cretaceous period.
No sectoral influence operations, no action on subjects or public targets, little knowledge of the new discoveries of social psychology and biopsychic evolution.
The scenario of Western psywar operations is still not very brilliant.
Obviously, explaining to the Defense Ministers of Western countries what these operation are about is a very difficult mission that few people would be able to accomplish successfully.
Actually, nowadays the old maskirovka is not the cover, the shell of real operations, but its true essence.
Just as today’s industrial production is, above all, communication, induction of a certain behaviour, identification of a target of customers, development of a product that meets their psychological and symbolic needs, currently also war is above all maskirovka well before being military and destructive struggle.
Nobody cares where engines are produced, which are now all the same, but certainly the market is interested in the symbolism of goods, in its evocative potential and in the ability to define the status of those who buy them.
Furthermore, in an old CIA manual, the Soviet “active measures” were defined and classified as follows: a) the Center gives the green light for a strategic disinformation campaign; b) the news, which is never entirely true or entirely false, is prepared and packed; c) the dezinformatsja news is disseminated abroad so as to later check the results.
The results are eminently practical: the “Euromissile battle” narrated by Michel Tatu, the long end of the Vietnam war, the management of Soviet foreign policy after the Helsinki Treaty.
But that is not all: currently, the intelligence mainly consists of economic effects, which are continuous and complex. The shift from the Soviet “active measures” and from the political-military clash to the industrial one marks a large part of the post-Cold War period.
All true psychological warfare is active and proactive, but the whole Western warfare doctrine is defensive and passive, which means it does not exist.
Hence it is not necessary to wage war manumilitari, for the additional reason that the enemy’s enterprises and infrastructure will be good also for us. At a time when the value chains are now fully global, when cars are manufactured in Spain for the German market and in China for the Indian one – not to mention drugs, the active ingredients of which are produced in India for the French market and even in Mexico, but for the Canadian one.
All contemporary intelligence, however, is targeted to the economic and technological resources of the possible enemy and operates – 24 hours a day – on the Web and also in the traditional media machinery.
Hence, those who win are not those who have the best weapons or the best products, but those who creates the best and most convincing storytelling around them.
It is therefore useful to see how the old “shadow theatre” is being changed and perfected.
This is what is needed in a situation of actual integration of all large companies, not only global but also national ones.
In the field of social media, for example, the most widespread tactics are those of “selective censorship”, or the hacking of sensitive information, which becomes hegemonic in the common discourse, or even the manipulation of the Internet search algorithms, with a view to linking some content to other one, in a completely unreasonable way.
30-40% of the news that can be found online is designed to deceive at least some of the readers.
Deception: not to mention something and tell the truth about everything else or, instead, to create a storytelling in which real things appear surrounded by completely fake data.
By changing the perception of facts, or the news about the facts, with strong or weak adjectives and nouns, or with universal symbols, and even with references to people or things of great fame, either negative or positive.
15% is the average quota of experts taken out by the automated texts that can be found on the World Wide Web, while about 60% of all readers are usually put on the spot by the texts and news available on the Web.
The Canadian Services have provided this statistics.
The operating techniques are now known to everybody: a) the Bot, a software that automatically operates on the Web, by selecting the content; b) the countermessage, indeed a message that offers the “true” or “fake” version of what has been said previously; 3) the Denial of Service (DOS), the temporary disruption of the Web for a certain user, and the old Disinformation; 4) the Noise that covers the relevance of the data sequence useful for understanding a certain message; 5) the Search Engine Optimization (SEO), the optimization of the number of visitors to any website.
On the technical and ideological levels, there are other online practices that are used daily by the authors of Disinformation: a) the BOTs coordinated with each other, which create a series of cross-references that reinforce the (fake) news that is to be spread; b) the use of false Internet “domains” in which websites and content similar to those of the “enemy” are created; c) the use of e-mails or websites that are pirated and disseminate news opposite to those that the primary user would like to spread.
Contradiction, lie, defamation.
We are still at the old theme of the aria “La Calunnia” (“slander is a little breeze”) of the Barber of Seville, as well as the “flower duet” of Madama Butterfly, but all with a firepower that Rossini or Puccini could not even imagine.
There are two profound and conceptual limits to these operations. The first is that, in spite of all possible technological refinement, the basic psychological mechanisms are always the same: personal defamation by sexual or other means- just think of the “Tangentopoli” operation in Italy (the judiciary probe known as Bribesville) at the end of the Cold War and, finally, of the elites’ structural inability to separate wheat from chaff, news from disinformation.
If we do something to help a government and then it falls into the trap of dezinformatsja, everything is useless. And this has often happened.
Ministers who tell you that they read it in the newspaper “Corriere della Sera” (bravo!) or that it was whispered to them by some intelligence agents without any qualification – and hence you need to check whether, as Harlequin, they are Servants of two Masters. It has often happened.
Hence, in many cases, currently the maskirovka strikes back and negatively changes the decision-making of those who have carried it out. The ruling classes that know it can save themselves, while the others and their countries are bound to become “servant of two masters” and, in any case, irrelevant.
There are also the undesired effects.
For example, it happened that the reputation of a ruling class was tarnished by convincing citizens that all politicians were “dishonest and thieving” and later we needed to stabilize a country in disarray and adrift without a guide, possibly recovering some of those who had been dismissed as “thieves”, thus creating a cognitive dissonance with the previous message conveyed.
However, how can we optimally develop the possibility of an IT attack (but not necessarily this type of attack only) on the decision-making system and on the public of a target country?
The attack will be successful if, for example, there are no useful sources of good information.
Without a reserve of serious, objective and truthful news and interpretations, the whole public and private system of security and education will fail in the long run.
Another excellent condition to launch an attack is uncertainty: in a phase of financial, geopolitical, technological and even military insecurity, with terrorism any news – regardless of its importance -can generate innumerable domino effects.
Probably those who maintain uncertainty have a return – in this case mainly and economic and industrial one.
Nor should we neglect the fact that, if there is a lack of effective information available, the media channels can be bought and sold, infected by adverse agents and induced to acquire information only from certain sources, which are already compromised.
If the commercial goal is the target and above all the audience, everything becomes possible for a foreign operator with bad intentions.
No country, not even those which control the Web at best, is protected from similar operations.
With a view to keeping the situation under control – and this applies above all to those who deal with State Security – we need, at first, to ascertain who makes disinformation.
Very often an individual or a private organisation.
Then, obviously, the exact opposite must be done, but preferably using different mechanisms of action: a similar and possibly “fake” website in case of a Bot, or a personal attack if we are faced with a press campaign.
Hence never use the same usual means and mechanisms.
Generally, abstract and political motivations should not be overlooked: there are NGOs, States, political parties, and companies that usually keep on misinforming.
And often they are not even traced by the intelligence Services.
Obviously, there are also terrorists – but in this case we are talking about another communication system.
Who can say, for example, that German cars are better than Italian ones? Yet it is common sense, albeit wrong.
Nowadays all the environmental propaganda consists of behaviours that favour some countries and companies instead of others. But no one tells you so.
Indeed, this is the real news.
Fake news to be spread, of course, but also generic discontent and uncertainty.
A mass perception that a great Portuguese poet, Pessoa, would have defined as desassosego (disquiet and restlessness).
Obviously, it is even better to let all disinformation go on, with its parallel and unexpected processes, so as to see who makes it and what goals are pursued.
Usually such operations end quickly, but neither the perpetrator nor the victim knows their effects or duration.
Hence the primary goal of all dezinformacja techniques is the partial or complete alteration of the perception of reality.
It is therefore essential to understand the divisions within the opponent’s field.
Popular or elitist.
If we believe that all enemies are the same, we operate for their propaganda and any operation of “psychological warfare” is always inhibited to us.
An essential resource in this field is the conspiracy theory.
The field of others is segmented, but the absolute uniqueness of those who generated the content we do not like or that harm us is assumed.
A well-managed conspiracy manages to work well where few other maskirovka techniques do so.
Perfect for simplifying all matters, it immediately identifies the aim of each psywar: to find the enemy, either true or false.
Another procedure is usually to use entities that everybody deems “third parties” to spread messages against the enemy (once again the current ecologism is full of examples in this regard) and then reinforce their message through other information sources: truth comes from repetition and the mind learns not from a single fact or event, or from a single person, but always from what Fritj of Capra called the mental ecosystem.
The human brain is made in such a way that it tends to believe both in repetition, but also in similarity and homogeneity.
Our brain has evolved only among human groups already formed. It is not by chance that, unlike what happens to animals, our brain maturation must take place in a post-natal social, family and group context.
Otherwise – as Nietzsche said – to live alone, one must be either a beastor a god.
Another factor not to be overlooked is that, as in all Gestalt psychologies, what counts is not only what you see, but also what you do not see.
As in the Rorschach test, the inkblots can be perceived either as a glass or two butterflies, but it is the outline, not the inside of the image that can suggest one answer or the other.
However, how can we counteract such an operation? Denial is always the best answer.
But it is simple and repetitive, always prone to others’ psyops.
We can simply deny having received funding from a certain country.
Mere denial stops the game of cross-references and shadows that would develop if the victim of the operation were to dwell and go into explanations that 87% of the audience – on the Webor even in the old media, never follow. Those who justify themselves are always wrong.
Denial is used to make a quick fix, but it is certainly not a stable and definitive answer.
Another technique is to defame and attack those who make disinformation.
It works well, but once again it is a mechanism that does not last long.
A disinformation campaign is never opposed with temporary and limited makeshift interventions and stopgap measures.
Dezinformatsja is always a potentially endless flow, to which we must respond by creating a state of mind (not “news”, but a stable and possibly ungrounded mental state) that is always potentially and equally endless.
It should also be added that our intelligence Services know nothing about these things. We are still focused on the protection of redundant critical infrastructure and possibly even of selected military and information networks. Everything is even too obvious.
Nevertheless, how can we avoid the defamation of one of our most famous chocolate creams in China?
Furthermore no one will be able to tell you what happens when there is defamation against our production system, as well as against our political system, which is, in fact, also a critical infrastructure.
Goodness knows what happened to our rubber before Pirelli’s deal with ChemChina. And it was not China that took the first step.
If we also study the issue of the F-35 fighter that was not acquired by the German Armed Forces, you will also understand the resulting weakness of Chancellor Merkel and her “heir”, as well as the short-lived successes of the Right, which always remains under the threat of being dismissed as neo-Nazi.
The neo-Nazis, however, were still pasture land mainly for the Eastern and Russian intelligence Services.
Hence using the professional ignorance of our politicians to defame our intelligence Services – as is currently happening – is certainly a perfectly orchestrated defamation operation.
A cheap politician who uses the intelligence Services to protect himself is like the main character of the “Manuscript Found in Saragossa”, who files the silver ball he will put into the gun to commit suicide.
In a different way and with different effects, Italy is drifting to a condition very similar to Great Britain’s in the Brexit phase.
A slow and subtle Italian destabilization, with a terrible and useless fragmentation of the voters and the political classes.
Nowadays in Italy there is a sort of geopolitical strike: the country is on the sidelines and reluctant to understand the reality of power relations and national interests.
In the case of the operations carried out by China, however, we have a completely different picture.
It should be recalled that, as early as 2014, China established the Central Leading Group for Internet Security and Informatization, chaired directly by Xi Jinping, in addition to the Cyberspace Administration of China. The Chinese leaders’ central idea is to make national sovereignty possible in cyberspace.
This is not easy, but it can be achieved with technological hegemony and strategic wisdom.
Hence the importance of Huawei’s 5G global fight and the concrete possibility of “controlling world innovation”, as some Chinese leaders say.
Therefore, in the “war of shadows”, we currently have to deal with the great influence operations, which are actions of cognitive modification, i.e. actions to change the perceptions, behaviours and decisions of certain target groups, in the country to be influenced, which can be changed to the benefit of the acting Power.
Or even very broad operations, which regard the whole political audience.
Conversely, the “influence campaigns” are operations carried out by an adverse and alien Power that tend to put together various small-scale and sectoral influence actions, which may have common goals or, in any case, not contradictory and opposed goals.
This means that through “influence operations”, we can influence the actions of the rulings class, as well as all or part of the public in a country, or the activities of an allied country.
Influence actions are always linked to strategic deception and the possibility of exploiting the enemy’s weaknesses, particularly those typical of moralism.
Currently moralism is a tool used by some countries against others.
Hence influence operations are certainly deception, but above all they mark a new Intention, or an Interference.
Nevertheless everything happens in the epistemic chain formed by single individuals, and then in the social or para-social sphere, characterized by the real relations among individuals, the real public sphere, the media, the elites, the “experts”, the scientific and technical system of a country.
Currently all Western media are ever weaker and often not very attentive to influence operations because they are subjected to a very fast change of technologies, as well as a quick commercial trend of the system. We are all market oriented in the short term, and currently all the influence operations made so far exploit above all the technological, legal and economic weaknesses of the various countries to reach their own aims.
The vulnerability of the public is yet another issue. Considering the new technologies, there is not only the possibility for each psywar operator to change the perception of others’ world, but also to do so in a covert way.
This applies to any Internet operator and any millennial kid.
And that is what counts. One hundred “denials”, however developed, are always news.
There is also a psychological problem.
The above mentioned evolution has not provided us with a brain that always seeks the objective truth of facts, but we have a cognitive system that finds an acceptable reality day by day.
Phylogenetically, the conformity to a group is more important than a subjective psychology that always seeks only truth, be it objective or linguistic.
In economics as in politics, free riders always have a hard life. And they are always those who define a new paradigm. Enzo Ferrari invented luxury sports cars against everything and everyone. Some pasta makers in Northern Italy discovered they could sell dried Italian pasta any where in the world.
Not to mention advanced technologies, where Italian companies were bought to be destroyed (Hewlett-Packard with Olivetti, for example) or to be put out of business, or the export of mass technologies, such as Piaggio in India.
Hence we often have to deal with the confirmation bias, i.e. the psychological tendency to ignore information that goes against accepted beliefs, or with the creation of a protective apparatus against threats to identity and team spirit.
Therefore we have to do with a series of mass influence actions that are now typical:
a) Terrorism. Creation of fear, an essential element of influence operations, but also of the radicalization of certain themes. A primitive, but very effective solution. In this respect, just consider the case of Italy in the 1970s and in the 80s. The sword jihad is a different story, but often not dissimilar to that of “red” terrorism in Europe.
b) The operations of para-State organizations, i.e. criminal structures and vast organized crime. Or do you really think that the international crime organizations have been created and have become powerful on their own, like the Baron Munchausen, who rescued himself from quicksand by pulling himself out at his own hair? All criminal organizations have always been influence instruments.
c) There are also hackers, who operate divided to strike together. Consciously or not, 78% of them are operators of the Powers that support their projects.
d) Not to mention hackers having only economic goals. After making money they, too, are not aware of the fact they have resold their data to some countries, but not always those they like.
Hence how can you create a “narrative” for influence operations?
Nowadays you can certainly create a consistent, long, credible and wide-ranging storytelling.
Conversely, “negative” techniques tend to disrupt the narrative over a long period of time.
There is also distraction, the creation of an external objective far from the themes discussed.
Therefore, we propose to create an Agency or a unit of it dealing with the disruption of influence operations which, before the end of the Cold War, Italy hosted like no other country in the world to later maintain its Kantian “minority status” in the following years.
An Agency that can really carry out influence operations – actively, with no curbs and restraints other than the operational and technical ones.
Therefore, in terms of protection of Italy’s industrial values, patents, as well as “reputation” of the country and its brands, even the less famous ones, we are now almost at death’s door.
Hence it will be good to quickly reverse the course.
Biological warfare: A global security threat
Biological warfare is not a new concept in arena of international politics as it has been used as a tool to sabotage enemy in previous centuries. Biological weapons are a sub-category of Weapons of Mass destruction (WMDs) in which there is a deliberate use of micro-organisms like pathogens and toxins to cause disease or death in humans, livestock and yields.Form its usage in 14th century by Mongols to its usage by imperial Japan during 1930s-40s against Chinese, it has always been a threat to global security. The evolution of bio-weapons can be broadly categorized into four phases; first phase includes the post WWII developments with the evident use of chlorine and phosgene in Ypres.The second phase was marked by the use of nerve agents like tabun, cholinesterase inhibitor and anthrax and plague bombs. The initiation of third phase was marked by the use of biological weapons in Vietnam war during 1970s where deadly agents like Agent orange were used. 4th and last phase include the time of biological and technological revolution where genetic engineering techniques were at their peak. Traditionally they have been used in wartime in order to defeat enemy but with the emergence of violent non-state actors, bioterrorism is another potential threat to the security of states. There are certain goals that are associated with the use of biological weapons. Firstly, it is purposed to hit to economy of the targeted country, breaking down government authority and have a psychological effect on masses of the targeted population. It is also a kind of psychological warfare as it may hit a smaller number of people but leaves impact on wider audience through intimidation and spreading fear. It also creates natural circumstances under which a population is induced with disease without revealing the actual perpetrator.
With the advancement in genetic engineering techniques more lethal biological weapons are being produced everyday around the world. Countries which are economically deprived are more likely to pursue such goals as it is difficult for them to go for heavy military sophistication keeping into consideration their poor economic conditions. Biological weapons serve as inexpensive tool for developing countries to address their issues in prevailing international security environment. During the initial decades of cold war, united states of America (USA) and Soviet Union went for acquiring tons of biological weapons alongside nuclear proliferation.
The quest for these weapons reduced during 1970s with the formation of Biological and Toxin Weapons Convention (BWC). This convention was presented in 1972 before countries and finally came into force in 1975 with 150 countries who signed this convention and 140 countries who fully joined this treaty. This convention prohibits any biological weaponization in order to promote peace and stability around the world. But this convention has obvious defects as it is unable to address many issues like it doesn’t prevents itself the use of biological weapons but just reinforces 1925 Geneva Protocol which forbids the use of bio-weapons. Convention allows ‘defensive research’ to which there are many objections that what is incorporated into this defensive research. It is non-binding to the signatory states and in case if countries are proliferating it lacks the effective oversight techniques to look after them either they are pursuing these biological weapons capabilities or not. Since the inception of this convention till now it has clearly failed in stopping the countries from acquisition as well as usage of these weapons. This is evident as there were many cases after 1975 where these weapons were used as in 1980s when Iraq used mustard gas, sarin and tabun against Iran and many other ethnic groups inside Iran. Another incident which was highlighted was Sarine nerve gas attack in Tokyo subway system leaving thousands injured and many got killed. In post-cold war era, however, the number of these attacks reduced as much attention was shifted to terrorism after 9/11 attacks with the change in global security architecture.
“Anthrax letters” in post 9/11 attacks revealed yet another dimension of bio-weapons which was the threat of bioterrorism from non-state actors. US became a victim of bio-terrorism when in 2001 a powder was transported through letters containing bacterium called anthrax infecting many people. One purpose which terrorists have is to make general masses feel as if they are unsafe in the hands of their government which can be best achieved through the use of these weapons. The fact that biological weapons are cheaper and more devastating than conventional weapons make it more likely for biological weapons to be used by terrorists. Also, the fact that they are easy to hide and transport and a smaller quantity can leave long-lasting impacts on larger population makes these weapons more appealing. Now that we are facing a global pandemic in the form of COVID-19 which according to some conspiracy theories is a biological weapon pose even more serious challenge to the international security in coming decades. There is no such scientific research which proves Corona Virus as a biological weapon but the realization here is that whether or not it is a biological weapon but world was least prepared for it. Not only the developing countries but also developed states suffered more despite having enormous medical infrastructure. The fact that there has been decline in the incidents related to bioterrorism should never let us think that there is no possibility of such attacks. The fact that world failed to handle Covid-19 puts a question mark on the credibility of measures if we are faced with bio-terrorism. The medical community as well as general population needs to develop an understanding of how to respond if there is such attack. At the international level there is a dire need to develop some strong norms which discourage the development and use of such weapons in any capacity.
The ‘Post-Covid-19 World’ Will Never Come
On May 3rd, the New York Times bannered “Reaching ‘Herd Immunity’ Is Unlikely in the U.S., Experts Now Believe” and reported that “there is widespread consensus among scientists and public health experts that the herd immunity threshold is not attainable — at least not in the foreseeable future, and perhaps not ever.”
In other words: the ‘news’-sources that were opposing the governments’ taking action against Covid-19 — libertarian ’news’-sites that oppose governmental laws and regulations, regardless of the predominant view by the vast majority of the scientists who specialize in studying the given subject — are looking wronger all the time, as this “novel coronavirus” (which is what it was originally called) becomes less and less “novel,” and more and more understood scientifically.
The “herd immunity” advocates for anti-Covid-19 policies have been saying that governments should just let the virus spread until nature takes its course and such a large proportion of the population have survived the infection as to then greatly reduce the likelihood that an uninfected person will become infected. An uninfected person will increasingly be surrounded by people who have developed a natural immunity to the disease, and by people who don’t and never did become infected by it. The vulnerable people will have become eliminated (died) or else cured, and so they won’t be spreading the disease to others. That’s the libertarian ’solution’, the final solution to the Covid-19 problem, according to libertarians.
For example, on 9 April 2020, Forbes magazine headlined “After Rejecting A Coronavirus Lockdown, Sweden Sees Rise In Deaths” and reported that, “Sweden’s chief epidemiologist Anders Tegnell has continuously advocated for laid back measures, saying on Swedish TV Sunday that the pandemic could be defeated by herd immunity, or the indirect protection from a large portion of a population being immune to an infection, or a combination of immunity and vaccination. However, critics have argued that with a coronavirus vaccine could be more than a year away, and insufficient evidence that coronavirus patients that recover are immune from becoming infected again, the strategy of relying on herd immunity and vaccinations [is] ineffective.”
The libertarian proposal of relying upon “herd immunity” for producing policies against this disease has continued, nonetheless.
CNN headlined on 28 April 2020, “Sweden says its coronavirus approach has worked. The numbers suggest a different story”, and reported that
On March 28, a petition signed by 2,000 Swedish researchers, including Carl-Henrik Heldin, chairman of the Nobel Foundation, called for the nation’s government to “immediately take steps to comply with the World Health Organization’s (WHO) recommendations.”
The scientists added: “The measures should aim to severely limit contact between people in society and to greatly increase the capacity to test people for Covid-19 infection.”
“These measures must be in place as soon as possible, as is currently the case in our European neighboring countries,” they wrote. “Our country should not be an exception to the work to curb the pandemic.”
The petition said that trying to “create a herd immunity, in the same way that occurs during an influenza epidemic, has low scientific support.”
Swedish authorities have denied having a strategy to create herd immunity, one the UK government was rumored to be working towards earlier on in the pandemic — leading to widespread criticism — before it enforced a strict lockdown.
FORTUNE magazine headlined on 30 July 2020, “How parts of India inadvertently achieved herd immunity”, and reported that, “Around 57% of people across parts of India’s financial hub of Mumbai have coronavirus antibodies, a July study found, indicating that the population may have inadvertently achieved the controversial ‘herd immunity’ protection from the coronavirus.” Furthermore:
Herd immunity is an approach to the coronavirus pandemic where, instead of instituting lockdowns and other restrictions to slow infections, authorities allow daily life to go on as normal, letting the disease spread. In theory, enough people will become infected, recover, and gain immunity that the spread will slow on its own and people who are not immune will be protected by the immunity of those who are. University of Chicago researchers estimated in a paper published in May that achieving herd immunity from COVID-19 would require 67% of people to be immune to the disease. Mayo Clinic estimates 70% of the U.S. population will need to be immune for the U.S. to achieve herd immunity, which can also be achieved by vaccinating that proportion of a population.
On 27 September 2020, Reuters bannered “In Brazil’s Amazon a COVID-19 resurgence dashes herd immunity hopes”, and reported that, “The largest city in Brazil’s Amazon has closed bars and river beaches to contain a fresh surge of coronavirus cases, a trend that may dash theories that Manaus was one of the world’s first places to reach collective, or herd, immunity.”
Right now, the global average of Covid-19 intensity (total cases of the disease thus far) is 19,693 persons per million population. For examples: Botswana is barely below that intensity, at 19,629, and Norway is barely above that intensity, at 20,795. Sweden is at 95,905, which is nearly five times the global average. Brazil is 69,006, which is around 3.5 times worse than average. India is 14,321, which is slightly better than average. USA is 99,754.
However, the day prior, on May 2nd, America had 30,701 new cases. Brazil had 28,935. Norway had 210. India had 370,059. Sweden’s latest daily count (as-of May 3rd) was 5,937 on April 29th, 15 times Norway’s 385 on that date. Sweden’s population is 1.9 times that of Norway. India’s daily count is soaring. Their population is four times America’s, but the number of new daily cases in India is twelve times America’s. Whereas India has had only one-seventh as much Covid-19 intensity till now, India is soaring upwards to become ultimately, perhaps, even worse than America is on Covid-19 performance. And Brazil is already almost as bad as America, on Covid-19 performance, and will soon surpass America in Covid-19 failure.
There is no “herd immunity” against Covid-19, yet, anywhere. It’s just another libertarian myth. But libertarians still continue to believe it — they refuse to accept the data.
Application of Cyber Security: A Comparative Analysis of Pakistan and India
In today’s world, communication is controlled by the internet. The Internet is what links the communication protocol of a state to its cyber domain. Cyber security encompasses techniques, technologies, methods and blueprints made to secure networking systems from potential cyber-attacks. Efficient systems of cyber security therefore mitigate and reduce the danger of network systems being attacked or accessed by unauthorized systems.
Despite the existence of such robust networks and security protocols, the exploit of such systems is always a click away, due to the integration of the internet as a worldwide network, and in times of global outbreaks and crisis, internet activity also inevitably increases. This was particularly observable with the spread of the Covid-19 as a global pandemic, which also saw an increase in over-the-web activity, and gave a new breathing space for cyber-criminals. According to estimates, Covid-19, as a pandemic, can already be classified as the largest ever existing threat to cyber-security across the globe, since the induction of the world wide web as a global chain of networks. Thus, it would be fair to say that the effects of the covid-19 were not selectively felt by developing states only, but also encapsulated great powers of the contemporary era.
While contextualizing Pakistan and India in the cyber-security debate following the events of the covid-19 scenario, the trend in increased virtual cyber-attacks and espionage was no different to the rest of the world. The real question mark lies in the ability of both countries to effectively deal with the overwhelming cyber-activity in the post-pandemic era. The government of Pakistan established the National Center for Cyber Security (NCCS) in June 2018, and continues to strengthen its cyber-security domain, with a dynamic change in policy making, centric to cybersecurity and threats to cybersecurity from its immediate adversary, India. The current Prime Minister of Pakistan, Mr. Imran Khan, also launched ‘Digital Pakistan Vision’, with the primary objectives of increasing connectivity, rectifying digital infrastructure, and investing in the awareness of digital skills and promotion of entrepreneurship. Pakistan also approved the first ‘Digital Pakistan Policy’, aiming to focus on investment opportunities by IT companies and building the framework necessary for a digital ecosystem. Although a sustained effort has been made to strengthen the cyber-domain of Pakistan, there are many technicalities and loopholes that must be addressed with high priority. One, the lack of an effective communication method, that is free from external intrusion, and allows for the restriction of unwanted network traffic on its master server. In more recent times, an intrusion occurred during the webinar of Institute of Strategic Studies (ISSI) due to non-encrypted internet connection, which allowed unspecified individuals access to the digital webinar. Two, the lack of stable internet connectivity, which prevents effective implementation of security protocols and acts as a hindrance to critical data packets, that must be sent between cyber-security officials in an event of a cyber-attack or espionage of any degree. Three, the existence of exploitable source code in key governmental websites and pages that are always prone to cyber-attacks, and must be revisited in the near future.
On the other hand, India saw a 37% in cyber-activity in the wake of the covid-19 pandemic; an eye-opener for state officials, who have prioritized cybersecurity as the next immediate threat to Indian National Security. In recent developments, India has also launched several directives to its cyber-security strategy in the post-pandemic era, including the initiative launched by The Ministry of Electronics and Information Technology (MEITY), namely ‘Cyber Surakshit Bharat’ with the coordination and support of the National E-Governance Division. According to MIETY, 44 training and mock drills are being given to 265 organizations from different states of the world, a landmark achievement in Indian cyber-security history. However, just like its South Asian neighbor Pakistan, India is also equally overwhelmed by the threat and emergence of hostile cyber-activity. With a 45% ratio of internal cyber attacks, and a 38% ratio of external intrusions from proposed adversaries, China and North Korea, India has strengthened its ties with Israel to revamp its cyber-security strategy, in order to mitigate the immediate threat to its cyber-domain, both internally and externally.
Conclusion and Recommendations
There is an immediate need to extend and further research the cyber capabilities of both Pakistan and India, which would primarily define the different types of technologies and how they are being actively made a part of the National security policy of both Pakistan and India. These efforts must be the immediate need of the hour, with the uncertainty of the Covid-19 and its irregular patterns becoming an inevitable fate of regional and global politics, in the times to come. While India seems to have its primary bases covered, there is no denying that the Covid-19 pandemic did not have a sparing effect on its cyber-domain, either, leaving the door open for Pakistan to make significant improvements to its cyber domain and cyber-security strategy, in order to effectively deter the threat faced from its adversary. Moreover, Pakistan can also seek inspiration from a potential integrated tri-service defense cyber strategy, that is being highly considered by Indian cyber-security and state officials, which would aid in keeping any form of cyber-hostility at bay in upcoming times.
UN: Stop evictions in East Jerusalem neighbourhood immediately
The UN’s human rights office (OHCHR), on Friday, called on Israel to immediately halt all forced evictions, including those in...
WHO approves Chinese COVID-19 vaccine for emergency use
A COVID-19 vaccine produced in China has been given the green light for global rollout, potentially paving the way for...
Peacebuilding in Northern Mozambique’s Insurgency: Ways Forward
Abstract: Cabo Delgado, once heartland of the Mozambican national liberation struggle, is turning into an epicenter of conflict and instability,...
Women Rights in China and Challenges
Women rights and gender discrimination have been a problem for many years in china. Various restrictions were imposed on women...
Biden should abolish corporate tax for small business, and make Big Tech pay what they owe instead
If Biden wants to increase tax revenue, create jobs and protect the American Dream, he should abolish corporate income tax...
Vietnam’s Role in ASEAN 2021 meetings
Taking on from the meetings held under the rubric of ASEAN chairmanship of Vietnam in the year 2020, the country...
The challenge of COVID-19 in Africa
Since its emergence in December last year, covid-19 has spread rapidly around the world, flooding the health system and weakening...
Middle East3 days ago
Saudi Arabia and Iran cold war
Reports3 days ago
Asian Ports Dominate Global Container Port Performance Index
South Asia2 days ago
Pakistan desires dialogue and cooperation with the EU
South Asia2 days ago
The World Biggest COVID-19 Crisis: Failure of India’s Vaccine Diplomacy
Eastern Europe3 days ago
Relations between Azerbaijan and the European Union
Europe3 days ago
When diplomacy cannot get the best of geopolitics: Cyprus’s lack of a way forward
Reports2 days ago
COVID-19 has reshaped last-mile logistics, with e-commerce deliveries rising 25% in 2020
Tourism2 days ago
New Report Shows Value of IP to the Tourism Sector