Connect with us

Intelligence

Balochistan `insurgency ‘and its impact on CPEC

Amjed Jaaved

Published

on

A dispute arose between Baloch leader Akber Bugti and then government led by Parvez Musharraf. Bugti was killed. How he was killed remains a mystery. But, his death triggered a lingering `insurgency’, with ebbs and flow in foreign support.

However, there is no let-up in global anti-Pakistan propaganda from Dr. Naila Baloch’s `free Balochistan’ office, working in New Delhi since June 23, 2018. When this office was opened many Bharatya Janata Party parliamentarians and India’s Research and Analysis Wing’s officers attended it.

The office was opened in line with Doval Doctrine that aims at fomenting insurgency in Pakistan’s provinces, including Balochistan and Khyber Pakhtunkhwa. `Free Balochistan’ sponsored offensive posters on taxi cabs and buses in Switzerland and Britain. USA has recently outlawed Balochistan Liberation Army. However, earlier, in 2012, a handful of Republican had moved a pro-separatist bill in US Congress. It demanded `the right to self-determination’ and ` opportunity to choose their own status’ for people of Balochistan.

Pakistan caught a serving Indian Navy officer Kalbushan Jhadav (pseudonym Mubarik Ali) to foment insurgency in Balochistan. Indian investigative journalists Karan Thapar and Praveen Swami suggested that he was a serving officer. India’s security czar,

Along with Baloch insurgents, Pushtun Tahafuzz Movement is being backed up by India. In their over-ebullient speeches, PTM’s leaders openly scold Pakistan’s National Security institutions. Pakistan’s Inter-Services Public Relations had to warn them `not to cross the red line. Yet, sponsored by Pakistan’s enemies they continued their tirade.  While addressing a rally at Orakzai (April 20, 2019), Pakistan’s prime minister expressed sympathy with Pashtun Tahafuzz Movement demands. But he expressed ennui at anti-army slogans shouted by them. Earlier, Pakistan’s senate’s special committee had patiently heard their demands. PTM voices concerns that are exterior to Pashtoon welfare. For instance, Manzoor Pashteen, in his interview (Herald, May 2018, p.48), berates Pak army operations and extols drone strikes. He says, ‘The army did not eliminate even a single Taliban leader.  All the 87 Taliban commanders killed in the last 18 years were eliminated in drone strikes’. At a PTM meeting in Britain, even Malala Yusafzai’s father (Ziauddin), like His Master’s Voice, echoed anti-army sentiments. He said, “Pakistan army and intelligence agencies knew that Fazalullah was a terrorist who continued to operate radio station in Swat’.

For one thing drone strikes amount to aggression. In an article, David Swanson pointed out that any use of military force, be it a drone attack, amounts to a war. The Kellogg-Briand Pact made war a crime in 1928 and various atrocities became criminal acts at Nuremberg and Tokyo.

Genesis of insurgency: Balochistan has been experiencing an armed insurgency since 2005, when veteran Baloch leader Nawab Akbar Bugti became embroiled in a dispute with then-President of Pakistan General Pervez Musharraf. The differences initially centered on royalties from natural gas mined in the resource-rich town of Dera Bugti, in northeast Balochistan. Subsequently, the building of military cantonments in Balochistan, and the development of Gwadar port by China, also became reasons for conflict (The Quint, August 26 2017). On August 26, 2006, Nawab Akbar Bugti was killed in a mountainous region of Balochistan; although the Pakistani government denied killing Bugti, Baloch groups blamed the government for his assassination, and thus the armed insurgency was further intensified (Dawn, August 27 2006).

Baloch insurgents allege that the China is a “partner in crime” with Pakistan’s government in looting the natural resources of Balochistan (The Balochistan Post, November 25 2018). In December 2018, Pakistan officials foiled a plan to attack Chinese workers on the East Bay Expressway in Gwadar, seizing weapons and ammunition that Baloch insurgents had stockpiled for that purpose (Samaa Digital, December 6 2018).

The most active separatist groups in Balochistan are Baloch Liberation Army, Balochistan Liberation Front, Baloch Republican Army, and United Baloch Army.

Balochistan separatist groups are divided into two distinct groups. The first group consists of BLF, UBA and BRA, whereas the second group includes Balochistan Liberation Army and Balochistan National Liberation Front

Emergence of BRAS: In the early hours of April 18, a group of militants in southwestern Pakistan blocked the coastal highway that connects the port of Gwadar, near the Iranian border, to Karachi farther east. The militants stopped six buses near a mountain pass and checked the identity cards of all the passengers. They singled out 14 members of Pakistan’s armed forces, and then executed them all. Hours later, a coalition of three Baloch separatist groups, known as Baloch Raaji Aajoi Sangar, or BRAS, claimed responsibility. The same group had previously owned attack on the Chinese Consulate in Karachi and a bus of Chinese engineers in the town of Dalbandin, north of Gwadar.

Iran’s woes: Iran worries that Pakistan is allowing Saudi Arabia to use Gwadar as a launching pad to destabilize it. Just as Pakistan accuses Iran of harboring Baloch separatists like BRAS, Iran blames Pakistan for giving sanctuary to militant Sunni Baloch groups such as Jaish al-Adl that have attacked Iranian security forces in Iran’s Sistan and Balochistan province.

Active insurgent groups in Balochistan: Balochistan separatist groups are divided into two distinct groups. One sunni funded by Kingdom of Saudi Arabia for attacks in Iran. And the other shia funded by Iran. The main groups are: Baloch Raaji Aajoi Sangar  (involved in attack on Chinese Consulate in Karachi), Baloch Liberation Army, Baloch Liberation Front, , United Baloch Army, Baloch Liberation Tigers, Baloch Nationalists, Baloch Young Tigers, Balochistan Liberation United Front , Balochistan National Army, Lashkar-e-Balochistan, Baloch Republican Party, Baloch Mussalah Diffah Tanzim (Baloch Militant Defense Army), Baloch National Liberation Front, Free Balochistan Army, Baloch Student Organisation, and Baloch Republican Army (BRP). BRP is the political wing of the armed Balochistan Republican Army. However, its central spokesman Sher Mohamad Bugti denies any relation with the BRA.

Strengths and weaknesses: The insurgency draws its sustenance from the popular misconception that China-Pakistan Economic Corridor is detrimental to Baloch interests. When completed, it would follow influx of foreigners. They would grab their land, plunder their resources and change their demography.

Infighting is the main weakness of the insurgency. Unable to harm armed forces, the insurgents began “killing fellow Baloch and non-Baloch settlers, and launching attacks against Sindhi and Pashtun citizens.” Infighting became obvious when the Baloch Liberation Army “killed on of its commanders, Ali Sher, and detained four of its freedom fighters” in 2015,

Solution

Seminars need to be held inside the country, instead of in China, to create awareness in gullible masses. Issues relating to royalty should be settled. Economic deprivation of the people should be reduced.

Sardari (chieftain) system is the bane of economic deprivation: Even when the British government had consented to creation of India and Pakistan as independent states, one thing continually badgered Churchill`s mind. It was concern about downtrodden masses who would groan under tyranny of the nawab, wadera and chaudhri, after the Englishman`s exit from the Sub-Continent. Churchill believed that the Englishman`s legacy to the Sub-Continent was a modicum of justice and rule of law.

No-one better knew the psyche of the feudal lords better than the Englishman himself. Loyalty to the British crown was sine qua non of being a protégé of the British raj. After all, the wadera icons were the Englishman`s own creation. Of all the lords, the conduct of late Akber Bugti baffles one`s wits. His father, Mehrab Khan, was given title of `Sir` by the English rulers and allotted land not only in the Punjab but also in the Sindh province. Akber Bugti, former governor of Balochistan (1972), owned houses in Quetta, Sibi, Jacobabad, Kendkot, Sanghar, besides his native house in Dera Bugti along with about 12,000 acres of land.

The wadera in the yesteryears used to be tyrannical only to the inhabitants of their own constituency, not to the whole country. The situation appears to have changed now. Is it justified to aid or abet blowing up of gas pipelines, shooting at army helicopters, dragging the innocent Punjabi from the Punjab-bound buses and shooting them point-blank, looting buses going to the other provinces.

Will killing innocent passengers lead to forced payment of money by the gas companies, in addition to agreed royalty? By no stretch of logic, such a step could be justified. The matter needs a closer pry by the government into the psyche of our Baluch lords. Why Pak army can`t build cantonments on Pak soil?

The grievance appears to stem from the perception that lion`s share of windfall gains from the multi-billion dollar Gwador port and city project will go to affluent and influential non-Baluchi civilians and non-civilians. Well, that issue could be sorted out at talks.

In terms of area, Balochistan is the largest province of Pakistan. It covers 43.6 per cent of the country`s total area with only 5 per cent of the total population. It is rich in natural resources. Pakistan`s industrial infrastructure mainly depends on the gas and coal of this province. The gas from Dera Bugti meets 60 per cent of Pakistan`s, mainly Punjab`s, domestic and industrial needs. The province has 200 coal mines, which again meet the industrial requirements of Punjab. The province is rich in marble and mineral wealth which is being explored by foreigners under contracts from the Government of Pakistan. Balochistan benefits from the resources of the other provinces just as the other provinces benefit from the resources of Balochistan. The Nawabs received crores of rupees as royalty for the gas transmitted. They are to be blamed for the backwardness of the province. Why don`t they spend a pittance out of the received money on economic development of the province?

Not long ago, gas pipelines in Dera Bugti, the source of the Sui Gas, were frequently attacked by missiles. The government said the attackers were from  Bugti tribe. The Pakistan government had to detail about 50,000 para-military troops to protect sensitive installations in Dera Bugti.

In the Sui-gas-fields area, Akbar Bugti initially owned no land. In collusion with revenue officials he got 7,000 acres transferred in his name. He has been receiving royalty from two gas companies at the rate of Rs. 14,000/- per acre, to the tune of ten crore rupees annually. But this land was the property of the Kalpar tribe.

In 1992 armed Bugti tribesmen forcefully evicted six thousand Kalpars and Masuri Bugtis and occupied their lands, gardens and houses. These people are wandering hither and thither in different districts.

Conclusion

The PTM’s criticism of Pakistan’s armed forces is not fair. They wrogly defend drone attacks. The UN charter maintained war as a crime, but limited it to an ‘aggressive’ war, and gave immunity to any wars launched with the UN approval. If that is indeed the case, did the UN allow drone attacks on Pakistan? Drone attacks on Pakistan’s territory are a clear violation of the country’s sovereignty as an independent state.  Doubtless `patriotism is the last refuge of a scoundrel’. Lest the PTM is dubbed unpatriotic, it should stick on course. And confine itself to its demands.

The root cause of the problem is the medieval sardari system in Balochistan. This system is responsible for suppression of the common man. This system should be abolished. If the Sardars of today had not been constantly loyal to the Englishman, he would have dis-knighted them.

Not all the nawabs are so malevolent, as our Baluch scions of nawabs.

Nawab of Kalabagh tried to abolish the Sardari system by setting up about 40 police stations in Balochistan. However, General Moosa was averse to the policy. The government should seriously consider such steps as would effectively extend its writ in every nook and corner of Balochistan. The Sardari system must be abolished. Meanwhile, a study should be undertaken to evaluate loyalty and political nuisance of the nawab, sardar, waderas, and their ilk. If the Sardars are not loyal to the national interests, what is the fun of propping them up with government`s patronage? Why not take corrective action to cut them to size?

India should stop stoking up insurgencies in Balochistan and Khyber Pakhtunkhwa. Both India and Pakistan are nuclear armed. There is no reason why they should be toujours at daggers drawn.  Entente may flare up into a nuclear Armageddon. India need to shun jingoism, stop its evil machinations in Pakistan, and solve differences through talks.

Mr. Amjed Jaaved has been contributing free-lance for over five decades. His contributions stand published in the leading dailies at home and abroad (Nepal. Bangladesh, et. al.). He is author of seven e-books including Terrorism, Jihad, Nukes and other Issues in Focus (ISBN: 9781301505944). He holds degrees in economics, business administration, and law.

Continue Reading
Comments

Intelligence

Clinton email scandal: Poor Judgment-Yes. Criminal Intent-No. Not guilty

Bob Budahl

Published

on

The Clinton “Email Scandal” was long and damaging to the Democratic Party with a final decision that she would not be charged with violations of federal law regarding the use of a personal email server for both personal and government emails in her role as U.S. Secretary of State. For prosecution to occur the FBI would need to prove intent that she willfully divulged classified information to our adversaries and that clearly was not present. Secretary Clinton may have experienced lack of procedural knowledge and poor judgement but she did not willfully break United States law.

I find it very important to note that the Senate Committee that issued a report on the issue in its summary concluded that the “The FBI did not use a grand jury to compel testimony and obtain the vast majority of evidence, choosing instead to offer immunity deals and allow fact witnesses to join key interviews.” Because of this occurrence of not utilizing the standard Grand Jury procedure the confidentiality of an investigation was compromised and with compounding factors and procedures, did detrimentally affect the Clinton Presidency election campaign.

In an article by Dan Roberts on October 31, 2016 he noted that as Election Day became near Clinton was losing support and Trump was surging. And a week before it had been Clinton who was enjoying a high in the polls after Trump foundered in different matters. At this point it seemed certain of a Clinton victory. The timing of the FBI Director’s new vigor into investigating the Clinton email scandal was condemned by the Congressional Democrats and even to the extent that the NV Senate Minority Leader Harry Reidsaid this partisan action had broken the law, including the “Hatch Act” which limits political activity of Federal employees including trying to influence or interfere with an election. Secretary Clinton was left with a daunting task to prove her innocence with just one week to the election. Her polling showed damage to her lead. And the new interest in candidate Clinton was aided by another email controversy which may have involved Russian hackers and released by WikiLeaks. These emails to and from Clintons to campaign chair John Podesta were not necessarily damaging content but were embarrassing with revelations mostly about Secretary Clinton’s husband, Bill Clinton. Her polls continued to decline as Trump had no negative news being newly released and negative information from Clinton was divulged. Just turning the attention from Trump to Clintonshifted public polling significantly. During this time polling showed support wavered for Clinton by 1/3 of respondents which were wavered from FBI Director Comey’s disclosures.

The Hillary Clinton email controversy did leave open the possibility of access to national security from classified information contained within or referenced to in emails that she had used her private email server for. There is no evidence of damage to national security. The investigation did reveal flaws but she should not have or currently face criminal prosecution.

The fact that the State Department’s own email system was hacked in November 2014 and deemed one of the most severe ever is a counterpoint against blaming a private server for security lapses. It required the State Department IT workers to close down its entire unclassified email system for a weekend which shows the extent of capability that the Russians and other have. It is also noteworthy that a different event involved the disclosure of Clinton’s personal correspondence which had been accessed via the hacking of a confidante of hers, Sidney Blumenthal. This was conducted by a hacker known as Guccifer who was later revealed to be a Romanian with the name of Marcel-Lehel Lazar. There are numerous means and methods of transmitting of classified materials including direct contact, cryptographic systems, courier services, designated hand couriers.

The partisan views, opinions and actions show the controversy involved in the email scandal. The FBI re-started its investigation and resulting negative polling ensued for Secretary Clinton. The State Department did release a large set of emails which were sent on her personal server in May of 2015 which were related to the 2012 Benghazi U.S. Consulate attack. During Secretary Clinton’s term as Secretary of State 62,320 emails were received or sent from her personal server. About half of these were determined official and turned over to the State Department. Her decision to use the personal server in lieu of an official Government email was something that others utilized including predecessors. The Inspector General found that others including the former Secretary of State Colin Powell had not been in compliance with Federal recordkeeping. And the New York Times reported the Mr. Powell had suggested to Clinton to utilize private email unless it was classified information. He later denied issuing that statement. The NY Times also reported that the former Governor of Florida Jeb Bush who was also a 2016 candidate for the U.S. Presidency utilized a private email address. And a poll within a magazine showed 33% of federal workers utilized personal email occasionally for government business. Secretary Clinton said there had been no security breaches of the system she utilized and that it was well protected and the July 2016 FBI report concludes that there was no direct evidence of Secretary Clinton’s server system being hacked. But technology experts conclude that experts can hack without leaving an evidence trail, not to mention that commercial firewalls and security systems are no match for high tech foreign government systems. In May of 2016 a hacker from Romania who was jailed in the U.S. for hacking told news sources he had accessed Clinton’s email numerous times. Secretary Clinton said she only emailed one foreign official which was a United Kingdom destination. The Inspector General of the Intelligence Community however found that she had sent four or more messages which contained classified material. Later it was known that two of the emails sent were classified “top secret.” Two-thousand emails receiving the classified designation had been identified by the time the final batch of Secretary Clinton’s emails were released in March of 2016.

A controversial article appears on the internet which does present assessments and ideas that some or possibly most people will label as partisan politics but it does present a couple of good concepts in my opinion. One is that the U.S. intelligence community did not conduct a thorough investigation of the email scandal and of the national security. This is counterproductive in my opinion as the FBI is one of the top intelligence agencies the nation has and utilizes. It alleges that ultra-secret information on U.S. drone strikes could have been disclosed from Secretary Clinton utilizing a private server for her email use. James Clapper who had been Director of National Intelligence thought it was not needed and said since the details of the ultra-secret information on drone strikes had already been disclosed in earlier leaks, which were unrelated to Clinton’s use of a personal email server, a national security assessment was not needed. Some say his decision was politically motivated. Then U.S. Representative Mike Pompeo, Republican,  Kansas who was a House Permanent Select Committee on Intelligence strongly argued in favor of a DNI investigation.

The Senate Committee even during the initial time of the investigation found a considerable amount of important information. It concluded that Secretary Clinton did set up a private server in her home, which was in violation of the State Department policy and Federal IT standards, according to the Inspector General and State Department. The FBI director James Comey described this as “grossly negligent” which was softened with up slightly with a slight legal distinction.

FBI Director, Comey also indicated the Secretaryutilized her personal email outside of the United States and did send and receive work related emails while in the countries of U.S.adversaries. His comments werethat adversaries had “possible” access to the information. The FBI did find 110 emails in different email chains which contained classified information that was confidential at the time sent or received. Of these eight were with Top Secret information, 36 chains of Secret and eight with confidential.

It is my conclusion that mistakes or lack of judgment were made with the utilization of a personal email server but in no way did she possess intent to purposely release or leak information.

Continue Reading

Intelligence

The hi-tech war between China and the United States

Giancarlo Elia Valori

Published

on

The new directive of the Central Office of the Communist Party of China (CPC), issued on December 8, 2019, ordered all State offices to quickly remove all foreign computer equipment and software within the next three years.

 The CPC directive, which was highlighted only by the Financial Times, has not been made public.

 It is therefore expected that many US companies, especially the likes of Dell, Microsoft, HP and some other smaller companies, will quickly be damaged by this choice of the Party and hence of the Chinese State.

The Chinese press has nicknamed this policy line as “3-5-2” because the substitutions will take place at a pace of 30% in 2020, 50% in 2021 and finally 20% in 2022.

Chinese sources estimate that 20 to 30 million pieces of hardware, mainframes, software and local networks will need to be swapped out throughout China with a large-scale replacement operation.

According to the Financial Times, the source of this news is China Securities, which is one of the companies entrusted by the CPC with the quick switch to domestic information technology.

Obviously this CPC choice is related to the current commercial tension between China and the United States.

Moreover, the IT substitution will allow to isolate government decisions from parallel US technological networks and from the cycle of negotiations and commercial tension between China and the United States.

We can also obviously think that this is a response to the fact that last May the United States entered Huawei into the “black list” of Chinese companies with which all U.S. IT companies and the North American subsidiaries of foreign ones are banned from doing business and carrying out joint operations.

 This means that U.S. companies cannot buy or sell technology to and from Huawei without a specific license issued by the U.S. government’s Bureau of Industry and Security, which is impossible to obtain.

 The Chinese company Huawei immediately responded to the U.S. government, noting that “moving away our company from the American market will not make the United States stronger or safer. Quite the reverse. This choice will force the United States to choose lower quality and more expensive technologies, thus even damaging the interests of U.S. consumers and companies”.

However, the story of relations between Huawei and the United States is long-standing.

 In January 2019, the Department of Justice had announced legal action against two divisions of the Chinese company, on charges of having stolen trade secrets owned by T-Mobile USA, and later stopped the sale or purchase of U.S. government technology by Huawei and by the other Chinese mobile phone company, namely ZTE.

 In December 2018, the Canadian authorities had also arrested Huawei’s CEO, Meng Wanzhou, to comply with an extradition request issued by the United States, based on the fact that the Chinese computer and telephone company had not disclosed payments to and from Iran to some U.S. banks.

 Moreover, the United States included in the “black list” of Chinese companies other undesired ones, such as Hikvison, which sells AI technology for mass surveillance, and the already mentioned ZTE.

It should be recalled that surveillance through Artificial Intelligence technologies is currently used by at least 75 countries, with 56 countries using this technology for road safety and smart cities, and as many as 64 countries using AI technologies for mass facial recognition, of which China alone is accused. Other 52 other countries manage AI systems for smart policing, an activity developed within the American police which brings together advanced databases and the measurement of inspection performance and of computerized mass predictive systems.

 Certainly, thanks to Huawei, Hikvision, Dahua and ZTE, the Chinese technology in the sector takes the lion’s share in this specific global market and sells mass recognition technologies in 63 countries, all members of the China’s Belt & Road Initiative.

Huawei alone sells this AI technology to 55 countries.

 Outside the Chinese market and the Chinese social reconnaissance producers, the world’s largest company in this AI sector is the Japanese NEC.

However, the U.S. companies operating mass control technologies with Artificial Intelligence are still present in 32 countries.

These American companies include IBM, which works for AI facial recognition networks in eleven countries, as well as Palantir, which operates in nine countries and finally CISCO, operating in six countries.

The other countries selling similar AI systems globally are Israel, France, Germany and Japan.

 51% of the universally defined “advanced liberal democracies” use AI mass control technologies, while these control systems are used in only 37% of what the international press calls “closed autocratic States” and in 41% of the States abstractly defined as “illiberal democracies”.

Hence theoften hypocritical alarm for the AI recognition procedures in Xinjiang, sounded by the Chinese government, should remind us of the old Latin Horatian saying De tefabulanarratur.

 All the States we currently call “liberal democracies” use systems of citizens’/users’ facial recognition at various levels.

 There is evidence of partial and uncontrollable use of advanced AI technologies also in countries such as Tunisia, Angola, Azerbaijan, Hungary, Peru, Sri Lanka and Turkmenistan.

 However, the recent Chinese stance on the switching to domestic IT technology regards much of the software currently used in Chinese offices. Nevertheless, there are problems that should not be overlooked.

Lenovo, the world’s largest laptop manufacturer, has been Chinese since 1984, when the Chinese company Legend was entered into the Hong Kong Business Register.

In 2005 Chinese Lenovo bought IBM’s entire personal computer division and IBM’s server-producing division in 2014.

Again in 2014, Lenovo bought the Motorola Mobility Division from the previous owner, namely Google.

 The problem lies in the fact that Lenovo still uses chips produced by the American Inteland the replacement of the old semiconductors seems to be complex.

China may have discovered an effective replacement for Microsoft OS, the operating system of most “Western” computers but, for the time being, this is not known in the West.

Furthermore, the semiconductor industry in China has been greatly stimulated by Huawei’s adventures in the United States and the EU.

 The Chinese “nationalisation” of the semiconductor and computer chip industry, however, is already envisaged in the China 2025 Plan and the Chinese government wants at least 40% of chips to be produced in China and be ready for export by that date.

In vain China tried to negotiate purchases of chips with the American company Xcerra, but the operation was stopped last February for the well-known political reasons mentioned above.

Also the Chinese acquisition of the US company Lattice Semiconductor – a 1.3 million US dollar “deal” – was stopped by the US government.

 Despite the fact that an up-to-date semiconductor industry is hard to set up in a short lapse of time, China’s “National Integrated Circuit Industry Investment Fund” will significantly fund all these operations.

 In its second round of fund-raising, the Chinese Semiconductor Fund raised as many as 200 billion renmimbi (equal to 29 billion US dollars), after a first round of fund-raising which amounted to 138 billion rmb in 2014.

 The Chinese government deems this replacement operation to be absolutely necessary to reduce the dependence of Chinese information technology on U.S. manufacturers.

It should be recalled that in 2017 – the last year of for which data is available – China imported semiconductors to the tune of 300 billion US dollars.

Now China must run twice as fast, otherwise it will lag a technological generation behind, as far as the very fast chip evolution is concerned.

Moreover the Chinese Cyber Security Law, enacted in 2017, requires the user’s real name for registering in any Internet network, as well as very strict rules for the protection of critical infrastructure, and a much greater protection than in the USA and the EU for what China calls “private critical infrastructure”, as well as a few additional control requests for some groups of network operators.

 In 2018 China also enacted new regulations for Personal Information Security Specification, i.e. a set of more stringent web privacy rules than the Western ones.

 In the current year, the Chinese government has also established new rules for checking information technology, for the transfer of personal data abroad, as well as for encryption and cloud security.

 In the EU legislation on network security, the so-called GDPR, the whole set of rules is focused on protecting the user privacy. In addition to legally protecting individuals’ privacy, however, China also protects a specific class of data, which the provisions define as “relevant to national security, the national economy and people’s lives”.

We are far beyond privacy as it is considered and understood in the West.

By mainly using information technology, China wants to stimulate innovation in four areas: a) the manufacturing industry in general; b) digital commercial platforms and their specific markets, especially as regards online payments; c) the development of telematic apps for “social use”, such as those for rented cars or bicycles; d) the enhancement of basic research and development for biotechnology and big computing.

 China currently has around 800 million Internet users, all of whom also having smartphones.

 It should be recalled that the Cyber Security Law enacted in China in 2017 entails the obligation for all web companies to store data on Chinese territory and restricts some data transfers also within China’s national territory.

 In addition to the above mentioned 2025 Plan and the State Fund for Technologies, there is also – in China – the New Generation of Artificial Intelligence Development Plan.

As early as 2017 China has already overtaken the USA as far as investment in Networks and AI is concerned. Currently Research and Development is more funded in China than in the United States, also as to the IT collateral and “hybrid” sectors, such as AI social and medical applications.

 It should also be noted that China is already world leader in the registration of new patents. It currently accounts for 40% of the world total, twice as much as the United States and four times as much as Japan.

 In 2025, China is expected to far exceed the number of papers on Artificial Intelligence – with international citations -developed by the United States.

Furthermore, the fact that China’s domestic IT market is subject to what someone has defined “hi-tech Leninism” makes it obvious -also considering the size of China’s domestic market – that a carefully protected growth of cutting-edge technologies in China slows down the U.S. and Japanese sectoral development also in the short term.

 If Chinese technologies become world market leaders, it will be hard for the USA, the EU and Japan to define and establish reliable and effective data protection criteria.

Certainly there are geoeconomic risks for the United States.

  In the medium term, we will record a Chinese monopoly on international standards, as well as a Chinese leadership on dual-use technologies, considering that the Chinese National Intelligence Law lays down that private or public companies shall provide access and support to the Armed Forces and to the intelligence Services for the collection of sensitive data and for their processing.

Furthermore, the United States, the EU and Japan could be negatively affected by the marketing of Chinese cutting-edge technologies, which would create their own markets and quickly replace “obsolete” or not well-interconnected products and systems.

There is also the possibility that, in the global market of AI surveillance, China may develop data collection models valid also for other countries, thus leading to a structural advantage for its own foreign intelligence.

We should also avoid underestimating the geopolitical effects resulting from China’s non-aggressive foreign policy, starting from Mao Zedong’s Three Worlds Theory (the First World was the USA and the Soviet Union; the Second World was the developed countries, satellites of both powers; the Third World was the “global peripheries” to be led by China) or the saving of often huge economic resources.

 In the last Middle East wars, the United States has spent a total of 7 trillion US dollars, which is more or less the same amount China has invested in Research & Development since 1994.

There is a fact, however, which is in contrast with the above.

Over the last five years both the U.S. and Chinese economies have grown significantly, but the wealth gap between the two countries has remained constant, even using the often misleading measure of GDP.

Moreover, the United States is still “richer” than China by about 7 trillion US dollars.

Hence, apart from the structural fallacy of these measures and putting aside statistical manipulations on both sides, China shall record a much faster development than its GDP to reach, at least, the United States.

China’s global technological victories are now well-known: its Micius satellites; some biotechnologies; hypersonic vehicles; energy technologies, including “green” ones; some AI networks and quantum computers, as well as quantum encryption and obviously the 5G.

 In other sectors, there is still substantial parity between the two countries.

The current U.S. geopolitics, with the usual cyclical return of isolationism, could unintentionally lead to the global expansion of Chinese technologies and to their progressive hegemony, if not worldwide at least in the Belt & Road area, in Africa and in some Asian regions.

Continue Reading

Intelligence

The global strategy of computer hacking

Giancarlo Elia Valori

Published

on

Whoever operates on the Web and has even interesting or relevant data sooner or later will always be hacked by someone or by some organizations.

 Usually “economic” hackers take the data of interest from the victim’s network and resell it in the dark web, i.e. the system of websites that cannot be reached by normal search engines.

Currently, however, after the Bayonet operation of July 2017 in which many dark web areas were penetrated, we are witnessing a specialization of the dark web and an evolution of web espionage methods against companies and States.

 These operations which, in the past, were carried out by web amateurs, such as youngsters at home, are currently carried out by structured and connected networks of professional hackers that develop long-term projects and often sell themselves to certain States or, sometimes, to some international crime organizations.

As often happens in these cases, the dark web was born from research in the military field. In fact, in the 1990s, the Department of Defense had developed a covert and encrypted network that could permanently protect the communications of the U.S. espionage “operatives” who worked abroad.

Later the secret network became a non-profit network that could be used for the usual “human rights” and for protecting privacy, the last religion of our decadence.

 That old network of the State Department then intersected with the new TOR Network, which is the acronym of The Onion Router, the IT “onion” covering communication with different and often separable encryption systems.

 TOR lives on the Internet edge and it acts as the basic technology for its dark web.

 Like the “Commendatore” vis-à-vis Don Giovanni in Mozart’s opera.

 TOR, however, is a free browser that can be easily extracted from the Web.

Obviously, the more the anonymity of those who use TOR and go on the dark web is covered by effective encryption systems, the more unintentional signals are left when browsing the dark web.

Moreover, the farther you have to go, the more pebbles you need to go back, as in the Thumbelina fairy tale.

 TOR and the Dark Web were born to allow the communications of U.S. secret agents, but were later downgraded to “free” communication system to defend Web surfers from “authoritarian governments”. Currently the dark web hosts a wide underground market where drugs, stolen identities, child pornography, jihadist terrorism and all forms of illegal business are traded.

Moreover, if these dark web services are paid with uncontrollable cryptocurrencies, it is very difficult to track any kind of dark web operations.

Nowadays, about 65,000 URLs operate in the dark web, which means Internet websites and Universal Resource Locators that operate mainly via TOR.

A recent study of a company dealing with cybersecurity has demonstrated that about 15% of all dark web URLs facilitate peer-to-peer communication between users and websites usually by means of chat rooms or websites collecting images, pictures and photos, which are often steganographic means and transmit hidden and concealed texts, but also for the exchange of real goods via specialized websites for peer-to-peer trading that are also encrypted, as can easily be imagined.

 Moreover, a further study conducted by a U.S. communication company specialized in web operations has shown that at least 50% of the dark websites is, in fact, legal.

 This means they officially deals with things, people, data and pictures that, apparently, also apply to “regular” websites.

  In other words, the dark websites have been created by means of a regular request to the national reference office of ICANN, which grants the domains and registers the permitted websites, thus communicating them to the Californian cooperative that owns the web “source codes”, although not in a monopolistic way.

Currently all the large web organizations have a dark “Commendatore” in the TOR area, such as Facebook, and the same holds true for almost all major U.S. newspapers, for some European magazines but also for some security agencies such as CIA.

Nevertheless, about 75% of the TOR websites listed by the above stated IT consultancy companies are specialized URLs for trading.

 Many of these websites operate only with Bitcoins or with other types of cryptocurrencies.

Mainly illegal pharmaceuticals or drugs, items and even weapons are sold in the dark web. Said weapons are often advanced and not available in the visible and overt networks.

 Some URLs also sell counterfeit documents and access keys for credit cards, or even bank credentials, which are real but for subjects other than those for whom they were issued.

In 2018 Bitcoin operations were carried out in the dark web to the tune of over 872 million US dollars. This amount will certainly exceed one billion US dollars in late 2019.

It should be recalled that the total amount of money “laundered” in the world accounts for almost 5% of the world GDP, equal to 4 trillion US dollars approximately.

Who invented the Bitcoin?

 In 2011, the cryptocurrency was used for the first time as a term of trade only for drug traffickers operating in the dark web, mainly through a website called Silk Road.

 The alias used for those exchanges was called Satoshi Nakamoto, that was also filmed and interviewed, but was obviously another.

We should also recall web frauds or blackmails: for example, InFraud, a U.S. organization specialized in the collection, distribution and sale of stolen credit cards and other personal data.

Before being discovered, InFraud had illegally made a net gain of 530 million US dollars.

 Another group of illegal operators, Fin7, also known as Carbanak, again based in the United States, has collected over a billion US dollars on the web and has put in crisis, by blackmailing them, some commercial organizations such as Saks Fifth Avenue and Chipotle, a widespread chain of burritos and other typical dishes of Mexican cuisine.

 Obviously the introduction of new control and data processing technologies, ranging from 5G to biometric sensors, or of personal monitoring technologies, increases the criminal potential of the dark web.

Hence the dark web criminals will have an even larger mass of data from which to derive what they need.

 The methods used will be the usual ones, such as phishing, i.d. the fraudulent attempt to obtain or to deceive people into sharing sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication possibly with a fake website, or the so-called “social engineering”, which is an online scam in which a third party pretends to be a company or an important individual in order to obtain the sensitive data and personal details of the potential victim,  in an apparently legal way, or blackmail by e-mail and finally the manipulation of credentials.

With a mass of additional data on their “customers”, the web criminals will be able to perfect their operations, thus making them quicker and more effective. Or the new web technologies will be able to accelerate the time needed for blackmail or compromise, thus allowing a greater number of frauds for more victims.

 Biometrics certainly expands the time for the use of data in the hands of cybercriminals. Facial detection or genetic and health data are stable, not to mention the poor security of data held by hospitals. Or we have to do with the widespread dissemination of genetic research, which will provide even more sensitive data to web swindlers.

 According to some recent analyses carried out by the specialized laboratories for the Web, 56% of the data most used by web criminals comes from the victims’ personal data, while 44% of the data used by swindlers comes from financial news.

 Moreover, specific types of credit cards, sold by geographical area, commercial type and issuing bank, can be bought in the dark web.

 85% of them are credit cards accredited for a bank ceiling, while 15% of “customers” asks for debit cards.

The web scammers, however, always prefer e-mail addresses even to passwords.

Furthermore, less than 25% of the 40,000 dark web files have a single title.

  In the “dark” web there are over 44,000 manuals for e-frauds, available for sale and often sold at very low prices.

The large and sometimes famous companies are the mainly affected ones. In 2018 the following companies were the target of cyberattacks in the United States: Dixus, a mobile phone company which was stolen 10 million files; the Cathay Pacific airline, with 9.4 million files removed, but also the Marriott’s hotel chain (500 million data/files removed) and finally Quora, a website of scientific documents and generic data. Over 45 million files were removed from Quora.

 How can we know whether we are the target of an attack from the Dark Web? There is certainly the presence of ransomware, such as the recent Phobos, which uses the Remote Desktop Protocols (RDP) that allow to control computers remotely.

 Then there is the Distributed Denial of Service (DDoS), which is a temporary block of the Web, apparently accidental, and finally there is the traditional malware, the “malicious” software that is used to disrupt the victims’ computer operations and collects the data present on their computers.

 However, the Dark Web ambiguity between common crime and the defence of “human rights” and safe communications in “authoritarian regimes” always remains.

The United States, Iran, China and other countries have already created a “fourth army”, composed only of hackers, that operates with cyberattacks against the enemies’ defence and civilian networks.

 The US Cyber Command, for example, is estimated to be composed of as many as 100,000 men and women, who operate 24 hours a day to hit enemy servers (and also allies’ ones, when they contain useful information).

Just think also of the private group Telecomix, which supported the 2011 Arab rebellions and, often, also the subsequent ones.

Also in these months both Telecomix and Anonymous are working to permit the free use of the Syrian computer network.

 There is often an operative interface between these groups and the Intelligence Agencies, which often autonomously acquire data from private networks, which, however, soon become aware of the State operations.

 There is also cyber-rebellion, which tries – often successfully – to strike at the victims’ data stored, by deleting them.

 DDoS, the most frequent type of attack, often uses a program called Low Orbit Ion Cannot (LOIC) which allows a large number of connections to be established simultaneously, thus leading to fast  saturation of the enemy server.

The attacking computers can be used remotely and some groups of hackers use thousands of computers simultaneously, called “zombie machines”, to hit the database in which they are interested to delete it or to remove its files.

 This type of “fourth army” can inflict greater damage on a target country than a conventional armed attack. The faster the attack, the easier is to identify the origin of the operation.

It is currently estimated that the “zombie” computers in the world are over 250 million – a greater network than any other today present in the military, scientific and financial world.

Hence a very dangerous military threat to critical infrastructure or to the economic resources of any country, no matter how “advanced” it is technologically or in terms of military Defence.

 There have been reports of hackers linked to global drug organizations, especially Mexican cartels, and to jihadist or fundamentalist terrorist groups.

Financial hacking, which often supports all these initiatives, remains fundamental.

 The South Korean intelligence services’ operative Lim was found “suicidal” after having purchased a program from the Milanese Hacking Team.

A necessary tool for these operations is often a briefcase containing circuits which mimic the towers of cellular repeaters and store in the briefcase itself all the data which is transferred via cetel or via the Internet Network.

The Central Bank of Cyprus, the German CDU Party and many LinkedIn accounts – a particularly favourite target of hackers – some NATO websites and, in Italy, some business and financial consultancy companies were attacked in this way.

 It is a completely new war logic, which must be analysed both at technical and operational levels and at theoretical and strategic levels.

Continue Reading

Latest

Environment1 hour ago

Climate Overshoot: The Important Conversation We’re Not Having

A newly released paper, Planning for Change: Conservation-Related Impacts of Climate Overshoot, published in Oxford University Press journal, BioScience, examines...

Tourism3 hours ago

World’s Biggest Conference on Wine Tourism

The 4th Global Conference on Wine Tourism, hosted by the World Tourism Organization (UNWTO) and the Government of Chile, has...

South Asia5 hours ago

Indian extremists are damaging the Peace and Stability of the whole region

There existed the Citizenship Act, 1955 in India, which was not biased and was applicable to anyone irrespective of its...

Newsdesk7 hours ago

World Bank Supports Knowledge and Innovation Based Economic Development in Serbia

Economic development based on knowledge and innovation will get a boost in Serbia through a $48 million-dollar loan, approved today by the World Bank’s...

Africa9 hours ago

Unprecedented humanitarian crisis in Mali revealed in new report

Escalating violence and insecurity in Mali have sparked an unprecedented humanitarian crisis, rendering 3.9 million people in need of assistance...

Europe11 hours ago

Far-Right Vigilantes

In 2015, Europe faced a dramatic spike in the influx of refugees and illegal immigrants, the biggest since WWII. Migrating...

Middle East13 hours ago

Elections, participation and national security

Democratic establishments in the entire political structures worldwide have been founded based the people’s votes and views. It is for...

Trending