Contemporary politics and the ensuing organization of consensus currently employ techniques and methods never used before.
We are going through an era in which completely new mechanisms operate within the traditional Parliamentary political representation, inherited from the liberal and democratic thought of the eighteenth century and of the following century. These mechanisms are much more powerful than those that – in the modern imitation of the Athenian agora -formed the will of the people and the guidelines and directions of the government.
Democracy of Ancients and Democracy of Moderns – just to use the simile of Benjamin Constant – were basically similar, but different in their functioning.
The number of citizens did not constitute a substantial difference, except that, according to Constant, modern democratic citizens delegated to the ruling class what did not fall within their being “private individuals, with private interests”.
Again according to Constant, the reason lay precisely in the new category of “private individuals” who, with a view to maintaining their wealth or work, deemed it right to delegate to someone else their power to make and break laws. Nowadays the private sphere does no longer exist. But not in the sense of the society of “one thousand eyes” and of continuous supervision and surveillance, but because the very category of “private” is over even in the political discourse.
Hence a mass totalitarian society, with a repressive apparatus that applies to everything would previously have been the subject of the strictly personal sphere of life.
Everything has currently changed, but everything still appears to be similar to the criteria and principles we have studied in the manuals of history of political doctrines. This is not the case.
Meanwhile, since the beginning of the 20th century, Eduard Bernays, Freud’s nephew and the father and pioneer of public relations, had established some connections between Sigmund Freud’s psychology (and with Gustave Le Bon’s Psychology of the Crowds, Mussolini’s favourite book) and political practice.
That was the beginning of what we now call “corporate communication”.
The suffragettes smoked and that was an operation funded by Bernays through the US tobacco producers.
The exaltation of sex – following the publication of the Kinsey Report and the mass spread of the contraceptive pill-changed and upset the consumption styles and habits of vast masses of young people who, in the 1960s, were to shape the consumption habits of what Galbraith called the “affluent society”.
That was the objective, not sex.
Hence, based on what discovered by Sigmund Freud, with a view to selling or prompting and inducing political behaviours, there was the need to “work” above all on the unconscious.
Currently, whatever is implanted from outside into the unconscious – if repeated constantly – always becomes real in the future.
The real for itself always becomes in itself, because what individuals think -in crowds, but solitarily (Riesman’s “lonely crowd”) -becomes either consumption or political behaviour, which is basically the same.
The subconscious has a huge power, i.e. controlling all subjective experiences. It is the autopilot of life, also from a practical viewpoint.
Nowadays no one speaks to the “reason”, the myth of the eighteenth century, but to instincts, to the subconscious, even to the unconscious.
The whole mechanism of the subconscious is already well in place and ready at 7-8 years of age and continues all lifelong.
With a view to reprogramming it, we need at first to limit the external and environmental negativities.
Indeed, we need to look for fully “positive” people, things and environments, as well as information.
Needless to say, this rule is carefully followed by all political propagandists and, above all, by advertisers.
Currently politics always follows the rules of consumer goods advertising. The leader is a testimonial. The script is the program and the government an oligopoly.
With a view to de-programming the “negative” mind, we need instead to visualize – as in a daydream – positive situations which we have already experienced.
We also need to reprocess the feelings of joy, which reach the subconscious immediately, well before the other ones.
The subconscious mind always and only knows the present.
Past and future are conceptual notions and processing – hence they are conscious. The subconscious interprets the negative of a negative proposition only as negative.
Creating positive propositions that counteract the negative ones processed and produced by the subconscious and then continuously repeat these actions. This is the basic technique.
This is, in short, the subjective mechanism that is currently used in political and commercial communication.
What are, however, the current technologies used to program and reprogram people’s minds?
We can mention the theory of social warfare, the virtual but all-out clashtaking place in the minds of citizens of a target country, using current technologies.
The aim of any reprogramming campaign is, in fact, to make the enemy (the enemy people, indeed) think like us.
It is a new kind of manipulation, much wider than the one carried out with the old disinformation or with the intelligence intoxication that was the non-violent part of the Cold War.
The most used information technologies are now Precision Targeting – which sends messages and behavioural inductions to a specific group – as well as the wide range of Artificial Intelligence mechanisms that are used to simulate online the behaviour and thought in relation to the primary information we wants to convey. There is also the algorithmic decision-making, which processes information through specific algorithms in view of formulating recommendations or taking fully automated decisions.
This holds true both for decision-makers and for the vast mass of users, citizens and voters of the aforementioned decision-makers.
We can also mention the Virtual Reality (VR) and Augmented Reality (AR) technologies, which create partially or completely artificial environments for both the programmers of the public opinion and the public itself.
But also the Internet of Things (IoT) is used in this field, by correlating machines and sensors for the construction of a Complete Reality, which becomes facts and data to be spread as such.
In this context of complete manipulation of information, which becomes the Complete Reality, also voice interfaces are useful. They allow to exchange information between the Source and the User or between Users, thus allowing the psychological reinforcement of news.
Again in the field of information manipulation, blockchains are also important. They allow to control and process information only through the users enabled to use the “chain”.
We should also recall the computerized programs that generate completely false videos and images – fakes which, however, are absolutely plausible.
Precision Targeting is used above all to reprogram groups of pre-selected individuals, who provide the Web with a continuous flow of information, from mobile phones, from the Web and from the other channels, to those who can selectively access the Web. All this is currently used, above all, through social media.
In this case, we have already reached the phase of neuromarketing, which changes the desires and habits of specific population groups, by combining the mental effects with the emotional ones.
As if it were a sign which, according to De Saussure, is the indestructible connection between signified and signifier. But the product of neuromarketing is not at all a language sign.
In this case, the above mentioned technology could be used for indirect facial recognition, manoeuvred by Artificial Intelligence systems.
Facial recognition will enable those who manoeuvre -also temporarily – the Web to quickly check the emotions of millions of people, and we all know how important emotions are now to tamper with the psyche and communicate concepts that often have very little relevance at conceptual and even at emotional or mental levels.
By 2035 these technologies are expected to be spreading like wildfire, since they are very important both for commercial operations and for political marketing.
Artificial Intelligence is the primary axis of development of all the other technologies we are talking about. AI will be used above all in verbal and textual recognition, as well as in the collection and analysis of very broad spectrum data, and for the processing of raw initial data, again in a very large population.
AI, however, will above all be used for defining an automated decision-making that can support the human decision-makers when they do not know, remember or understand all facts and, above all, the underlying determinants of facts.
We will get to imitate, without realizing it, Elsa Morante’s book “The World Saved by Kids” and certainly what is happening in global communication already guarantees this future to us. They are more manipulable. They have no memory and they are perfect for the Brave New World that stands before us.
We can easily imagine what all this means for advertising, for the selection of markets, for business decisions but, above all, for the development of political platforms, both in terms of the electoral process and for the more specific decision-making process.
The next level will be content, which will often be produced directly by AI systems.
But let us better analyse what algorithmic decision-making is.
It is often currently applied in medicine.
Disease analysis, therapy forecasting, statistical analysis of diseases and their effects, both at subjective and population levels. In the near future, however, other sectors will be ever more like the banking system. Human Resources, even political decision itself, will be the subject of these applications, which will often become so complex as not to be understood – in the future – by the computers using them.
If you collect a lot of data, it is increasingly likely that a sequence of decisions or simple new data is not recognized by the program operating in the computer.
Also for AI networks we will have a process of learning by doing.
There are two dangers. Firstly, that the private ownership of the most important databases makes competition between systems impossible; secondly that the algorithms are hackable or manipulable by third parties unknown to the system.
There are also Virtual Reality and Augmented Reality.
If we proceed with the increasingly analytical and obsessive adaptation of the devices to the Ego of the User, or to his/her tastes- considered, for some reason, immutable – we risk an ideological drift of new technologies, i.e. that of hyper-subjectivism and, as happens in current educational practice, that of the permanence of the mass Ego in an eternal childhood.
The “Minor Ego” advocated by some people is a very real risk and it is not even clear how a super-massified production can be adapted to the increasingly self-referential psychologies of the Consumer Ego.
Not to mention the natural limit – currently often evanescent – that the Augmented Reality keeps between the imaginary and reality – a limit that, in the propaganda and political implementation of the Virtual Reality, could become very dangerous to cross.
Immanuel Kant spoke of the 100 gold Thalers that can be in your pocket or just in your imagination, but that cannot certainly be mistaken one for the other.
Hence beyond any technological processing, Reality is never the Imaginary.
Although the imaginary can induce behaviours very similar to those that the subject would have if subjected to reality, the one that – as Voltaire said – has “hard head”.
By Internet of Things (IoT) we generally mean an environment full of machines that interact with one another through the Web.
As can be easily guessed, the IoT information potential is huge.
Human consumption habits, but also communication, ways of life, lifestyles, exchanges between subjects, positions and information exchanged between individuals will be part of huge databases.
Probably, in the future, it will be difficult to find exactly what is needed in those databases, considering that the bias of the IT and data storage systems tends to increase with the quantity and complexity of data.
It is estimated that, by 2030, there will be over one and a half trillion sensors connected to IoT networks, which will be worth half of the entire Internet traffic of “simple” users.
According to Deloitte, the entire IoT market is expected to be worth a trillion, in addition to further 750 billion for IoT network connection modules.
It can be easily imagined to what extent this makes it possible to hack data not only from IoT networks, but also from all other networks connected to the Internet and ending up in an IoT structure.
By 2030 blockchains will be the basis of financial, control, check and analysis networks.
It will be the beginning of virtual monetization, which is, in itself, the opening of the financial gates of Hell.
The miserable level of the current economic thinking allows it.
Nevertheless, all this technological development – between imagination and reality – will lead us towards a society of the unverifiable and probable, with no possibility of responding to a government financial or information fake and with an increasing penetrability of information networks, to which the whole social fabric and not only its control will be delegated.
However, the society of the imaginary 100 Thalers – believing that the imagined ones are already in the pocket – will not be able to pay anything.
The New World Order: The conspiracy theory and the power of the Internet
“The Illuminati, a mysterious international organisation made up of the world’s top political and social elites, controls the workings of the entire world behind the scenes”. This is the world’s most famous conspiracy theory about the New World Order.
For hundreds of years, legends about the Illuminati have been spread and many people currently believe that the Illuminati still exist. It is believed that the Illuminati operate in various fields such as global politics, military affairs, finance and mass media and control the historical process of the entire world.
The ultimate goal is to establish a New World Order. Nobody can prove it, but many people believe it. This is the greatest paradox about conspiracy theories.
In the 2009 film, Angels and Demons – based on Dan Brown’s best seller of the same name about Professor Langdon, played by Tom Hanks – the story of the Illuminati, who supposedly originated in Europe during the Age of Enlightenment, was recalled. There were physicists, mathematicians and astronomers who questioned the “erroneous teachings” of the authority of the Holy See and dedicated themselves to the scientific field of the search for truth.
Eventually, the Illuminati were forced to become a clandestine organisation and have continued to recruit members for hundreds of years to this day. In Angels and Demons, the historical facts are clearly questionable, and the movie appeared after the great economic crisis of 2007-2008.
The New World Order conspiracy theory has been circulating for a long time and is full of mysterious theories that, however, convince many people who are powerless and dissatisfied with the current state of the world.
The Illuminati, who advocate the establishment of a New World Order through the planning of a series of political and financial events (the financial tsunami of 2007-2008 is said to have been planned by the Illuminati), attempt to influence the course of world history, and ultimately establish an authoritarian world government.
Supporters of the New World Order theory believe that even the powerful US government is now just a puppet government. While another “shadow government” made up of a few people makes decisions that will change the fate of the planet.
You might think that all of the above is just crackpot theories. Many people, however, believe this is true. According to a 2013 poll conducted by the Public Policy Polling Foundation, 28% of US voters believe that the New World Order is actually taking hold.
Brian L. Keeley, a professor of philosophy at Pitts College who devotes himself to the study of modern conspiracy theories, believes that an important feature of conspiracy theorists is that they cite some trivial and overlooked incidents and then propose a perfect explanation compared to an embarrassed official response. The reason why the conspiracy theory explanation can be widely disseminated is that it has no argumentation process to deny. It is just a judgement that jumps directly from hypothesis to conclusion. In the argumentation process, it is only a subjective interpretation of the event.
Nevertheless, for the public that does not fully understand the incident, the conspiracy theory provides an “explanation” for the unknown part of the said incident, and this “explanation” cannot be denied (because its very existence is not corroborated by real arguments and facts). It is therefore recognised as a valid argument by many people.
For example, no one has substantial evidence to prove that the Illuminati actually exist, but no one can prove that the Illuminati are purely fictitious. Therefore, you cannot deny their existence because their existence is “perfection without evidence”.
Columnist Martha Gill wrote in The Guardian on the subject, describing the Illuminati as the most enduring conspiracy theory organisation in world history.
“Conspiracy theories relating to the 1969 moon landing mission, the Kennedy assassination, the 9/11 attacks, etc., are all limited to a specific time and place. But conspiracy theories supporting the existence of the Illuminati can connect them. Anything about these connections, however, is difficult to prove”. In other words, the supporters of conspiracy theories may have common imagination and attribute everything to this organisation, so that every irrational phenomenon in the world can be explained.
Although no one can prove the real existence of the Illuminati, there is actually an alleged “global shadow government” in the world whose name is the Bilderberg Group. The Bilderberg Group holds an annual world-class private meeting and participants include elites from all walks of society such as government, business, media, science and technology.
Known as the “World’s Most Mysterious Conference”, the Bilderberg Group invites various famous political and economic figures to participate in its meetings every year.
Prince Bernhard van Lippe-Biesterfeld (1911-2004) held the first meeting in 1954. As the venue for the meeting was the Bilderberg Hotel in Oosterbeek, that name was used as the name of the group.
The existence of the Bilderberg Group is not a secret, but the content of the topics discussed at the Conferences is absolutely confidential and mainstream media cannot report on the content of the meetings.
The Bilderberg Group issues a press release every year to introduce the Conference participants and the outline of the topics discussed. Over the years, participants have come from many places, including Prince Philip of Edinburgh (1921-2021) of the British Royal Family, Crown Prince Charles, former British Prime Ministers, French President Macron, German Chancellor Merkel, former US Presidents Bush and Clinton, and even Bill Gates and other Internet giants. There were also Italians, as reported years ago in a newspaper of our country.
The 2018 Conference was held in Turin, Italy, in June. According to the description on the Bilderberg Group’s official website, the main topics included European populism, the development of artificial intelligence, quantum computer technology and the “post-truth” era. Obviously the actual content and results of the meeting’s discussion have never been reported.
Therefore, the Bilderberg Group has naturally become a locus where conspiracy theorists want to draw material. They describe the Bilderberg Group as true evidence of the theory that a very small number of elites controls the world, and the participants are planning a New World Order.
On the subject of strange things, let us give some examples. In June 2018, the British Royal Family was also caught up in conspiracy theories. When Prince Harry and his wife Meghan attended a show, they were caught on camera motionless, like two stiff and dull robots. Later related clips went viral on the Internet and netizens were in an uproar: many people believed that the distinguished members of the Royal Family were actually robots developed by high technology.
However, the management of the London museum, Madame Tussauds, later explained the mystery by stating that Harry and Meghan were only played by two actors who wore extremely high-realism wax masks on their faces – all to promote an exhibition of wax statues – and inadvertently caused an uproar.
In that short video, Harry and Meghan did not change their facial appearance and their expressions were stiff just like robots. Consequently, conspiracy theorists used this as evidence that they were robots secretly built by the British Royal Family.
This argument is an extension of the ‘trivial evidence’ mentioned above. The argument proponents ignore any argumentation process and directly draw the final conclusion through the above stated “trivial evidence”. This conclusion is highly topical and quite appealing. With the fast spread of the Internet, the “quick truth” will naturally be recognised and sought after by many people.
I think many people still remember the “Mandela effect” that spread wildly across the Internet in the early years as a false memory. The name “Mandela effect” is believed to have come from Fiona Broome, a self-described “paranormal consultant”, who created a website called the “Mandela effect”. Supporters of the ‘Mandela effect’ claim to “remember” that former South African President Mandela died in prison in the 1980s. But in reality, after being released from prison, Mandela served as President of South Africa from 1994 to 1999 and died in December 2013.
So why should anyone believe this seemingly absurd statement? The Internet has become a support platform for a lot of false content, fake news, as well as unreasonableness and lack of justification. When someone shared that ‘false memory’ with others on the Internet, many people believed it to be true, and even suddenly recalled having that memory: “Mandela died in prison that year”.
As a result, lies inconsistent with facts continue to spread. The lie is repeated thousands of times and many people consider it to be the truth: this learning phase is the first misleading rule on the Internet.
In the Internet era, multidimensional and multiplatform features have generated a number of online “malignancies” of conspiracy theories. Moreover, their dissemination ability is not limited to “believers” only. Since online social media provide a widespread and wide dissemination platform, one passes it onto ten people, ten spread it to a hundred, a hundred to a thousand, and so it goes on in geometric fashion, thus turning a ‘hot’ topic on the Internet into an absolute truth. Those who want to believe are naturally prepared and willing to do so. Moreover, these false opinions on the Internet may even have an impact on the real world.
For example, at the political level, everyone can now comment and participate in the online arena. For politicians to get the right to speak and set the agenda, the key is to rely on the public’s direction on the Internet. The Internet discourse has become the dominant factor of the political storytelling, and not vice versa. The characteristics of social networks are precisely the breeding ground for conspiracy theories.
The Internet is easy to spread among the public and it is exactly the breeding ground for conspiracy theories.
Nowadays, conspiracy theories are enough to influence politics and even political developments. A specific conspiracy theory gains a number of supporters through the Internet that promotes it to become a highly debated topic among the public. Consequently, it enters the real political arena coming from the virtual community and its influence can change the direction of governmental decisions.
Looking at it from another perspective, when conspiracy theories are put on the Internet and continue to proliferate – regardless of whether the Illuminati exist or not – they are enough to establish a New World Order. The real-world public opinions, as well as the composition of opinions and the basis of social discussions are changed, and thus world’s countries, politics and rulers are affected.
USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware
Pegasus Spyware Scandal has shaken whole India and several other countries. What will be its fallout no one knows as we know only tip of iceberg. Amidst Pegasus Spyware Scandal USA and Australia both have shown serious concerns about Cyber Attacks on US and Australian interests. Both say that China is hub of malware software and both face millions of such attacks daily.
I am trying to understand why a software is needed to spy on a particular individual when all calls, messages, data, emails are easily accessible from server. In most of cases these servers are located in USA and some cases these are located in host country. In certain sensitive cases Government Agencies have their own server like Central Intelligence Agency and hundreds of other agencies and military establishment world over including India. Now point is who installs those servers.
A couple of years back I had talked to Mr Mike Molloy who is Chief Executive Officer of Orion Global Technologies previously known as Orion SAS. He had explained me how his company installs servers in host countries on request of private or gov bodies. He talks about contract and trust. That means even when a company or Gov buys a server or software for designated uses the “Secrecy” Factor remain on discretion of company which has supplied server or software.
Now if all data, e-mail, chat, messages, calls are accessible to Gov as per law and technology (Through Server all components of Communication are accessible and thats why me and you see start seeing call recording of a person even after many years later), I am unable to understand why a Gov will be needing a software to Spy on any one.
Now coming to where Australia and USA wants to carry the whole debate.
Australian Foreign Minister Sen Marise Payne said, “Australian Government joins international partners in expressing serious concerns about malicious cyber activities by China’s Ministry of State Security.
“In consultation with our partners, the Australian Government has determined that China’s Ministry of State Security exploited vulnerabilities in the Microsoft Exchange software to affect thousands of computers and networks worldwide, including in Australia. These actions have undermined international stability and security by opening the door to a range of other actors, including cybercriminals, who continue to exploit this vulnerability for illicit gain”, She further added.
She opined, ”The Australian Government is also seriously concerned about reports from our international partners that China’s Ministry of State Security is engaging contract hackers who have carried out cyber-enabled intellectual property theft for personal gain and to provide commercial advantage to the Chinese Government”.
She warned China by saying, “Australia calls on all countries – including China – to act responsibly in cyberspace. China must adhere to the commitments it has made in the G20, and bilaterally, to refrain from cyber-enabled theft of intellectual property, trade secrets and confidential business information with the intent of obtaining competitive advantage”.
On other hand USA’s The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory on Chinese State-Sponsored Cyber Operations. National Security Advisor said, ”Chinese state-sponsored cyber activity poses a major threat to U.S. and allied systems. These actors aggressively target political, economic, military, educational, and critical infrastructure personnel and organizations to access valuable, sensitive data. These cyber operations support China’s long-term economic and military objectives”.
The information in this advisory builds on NSA’s previous release “Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities.” The NSA, CISA, and FBI recommended mitigations empower our customers to reduce the risk of Chinese malicious cyber activity, and increase the defensive posture of their critical networks.
Afghan issue can not be understood from the simplistic lens of geopolitical blocs
Authors: Tridivesh Singh Maini and Varundeep Singh*
On July 14, 2021 a terror attack was carried out in Khyber Pakhtunkhwa (KPK) province in which a number of Chinese engineers, working on the Dasu hydropower project (a project which is part of the China Pakistan Economic Corridor) were killed. The attack predictably evinced a strong response from China. The Chinese foreign minister, Wang Yi speaking before a Shanghai Cooperation Organisation (SCO) Foreign Minister’s meeting asked the Taliban to disassociate itself from ‘terrorist elements’ and in a meeting with Pakistan Foreign Minister, Shah Mehmood Qureshi, asked Pakistan to bring the perpetrators to book. Earlier in April 2021, a car bomb attack took place at Serena hotel in Quetta which was hosting China’s Ambassador to Pakistan (four people were killed and twelve were injured)
Wang Yi significantly praised the Ashraf Ghani government, for its attempts towards building national unity and providing effective governance. Beijing clearly realizes that its economic investments in the country as well as big ticket infrastructural projects can not remain safe if there is no security. Afghanistan also criticized Pakistan for its role in sending 10000 Jihadis to Taliban, this is important in the context of the region’s geopolitics.
Like all other countries, Beijing and Islamabad, would have expected uncertainty after the US withdrawal of troops but perhaps over estimated their capabilities in dealing with the turbulence which had been predicted by many.
Importance of Chinese Foreign Minister’s statements
Wang Yi’s statements are important because days earlier a Taliban spokesman, Suhail Shaheen had praised China and welcomed its role in the country’s reconstruction. He had also assured China that those involved in the insurgency in Xinjiang would not be given refuge in Afghanistan (one of China’s major concerns has been the support provided by Taliban to the East Turkmenistan movement)
While Beijing may have opened back channels with the Taliban and realized that it needs to adapt to the changing geopolitics, recent developments would have increased its skepticism vis-à-vis the Taliban. On the other hand, Russia has been more favorable towards the Taliban. Russia’s Deputy Chief of Mission in India, Roman Babushkin argued that the Taliban are a reality which needs to be accepted, and also that any military activities without a political process are insufficient.
Babushkin did make the point that for successful negotiations, Taliban needed to end violence.
‘that Taliban should deal with the problem of terrorism and other related issues in order to become legitimate, in order to [get] delisted [at the UN Security Council], in order to go ahead with the future Afghanistan and creation of the inclusive government
It would be pertinent to point out, that Zamir Kabulov, Russian President’s Afghanistan envoy went a step further and said that the Afghan government was not doing enough to make talks with Taliban a success.
China’s statements subtle warning to the Taliban, indicating its reservations, and praise of Ghani indicate a possibility of greater understanding between Washington and Beijing (even though Beijing has repeatedly attributed the current troubles in Afghanistan to Washington’s decision to withdraw troops).
Can US and China find common ground
It remains to be seen if Biden who has exhibited dexterity on a number of complex issues reaches out to Xi Jinping to find common ground with regard to Afghanistan. Significantly, while US-Turkey relations had witnessed a downward trajectory and Biden has been critical of Turkish President Recep Tayyip Erdogan’s authoritarian tendencies and Human rights record, both leaders met on the sidelines of the NATO Summit in June 2021. During the meeting Turkey agreed to secure Kabul Airport. US National Security Advisor Jake Sullivan while commenting on Turkey’s assurance said
‘The clear commitment from the leaders was established that Turkey would play a lead role in securing Hamid Karzai International Airport, and we are now working through how to execute to get to that,’
Taliban earlier this week warned Turkey of ‘consequences’ if the Middle Eastern nation increased its troop presence in Afghanistan.
Russia’s statements with regard to the Taliban indicate that it is not totally on the same page as China (its prior experience in Afghanistan has made it more cautious and circumspect), and that the Afghan issue can not be understood from the simplistic lens of geo-political blocs and traditional lenses. All major stakeholders in Afghanistan, both within the region and outside, seem to be understandably befuddled by the turn of events. It is not just the US, but even China which would be worried not just from an economic stand point but the overall security implications of the turmoil in Afghanistan. The terror attack in KPK indicates that other CPEC related projects could also face threats from militant groups. Beijing would thus need to be quick to react to the overtures from the Taliban in order to secure its economic assets and lives of Chinese workers in neighbouring Pakistan.
It is especially important for Washington, Beijing and other important stakeholders in the region to work together for dealing with the near term turbulence as well as long term challenges Afghanistan is likely to face.
*Varundeep Singh is an Independent Policy Analyst.
Empowering “Smart Cities” toward net zero emissions
The world’s cities can play a central role to accelerate progress towards clean, low-carbon, resilient and inclusive energy systems. This...
Crime of Ecocide: Greening the International Criminal Law
In June 2021, an Independent Expert Panel under the aegis of Stop Ecocide Foundation presented a newly-drafted definition for the...
Indictment of Trump associate threatens UAE lobbying success
This month’s indictment of a billionaire, one-time advisor and close associate of former US President Donald J. Trump, on charges...
Climate change could spark floods in world’s largest desert lake
For years it appeared as though Lake Turkana, which sits in an arid part of northern Kenya, was drying up....
Sweden: Invest in skills and the digital economy to bolster the recovery from COVID-19
Sweden’s economy is on the road to recovery from the shock of the COVID-19 crisis, yet risks remain. Moving ahead...
The New World Order: The conspiracy theory and the power of the Internet
“The Illuminati, a mysterious international organisation made up of the world’s top political and social elites, controls the workings of...
Western Indian Ocean region has declared 550,000 square kilometers as protected
The Western Indian Ocean region has declared 143* marine and coastal areas as protected – an area covering 553,163 square...
Intelligence2 days ago
USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware
Eastern Europe3 days ago
Latvia developed new tasks for NATO soldiers
Middle East2 days ago
A New Era in US-Jordan Relations
Africa Today3 days ago
Greenpeace Africa responds to the cancellation of oil blocks in Salonga National Park
Development2 days ago
10 new cities chosen for World Economic Forum circular economy initiative
Economy2 days ago
The EU wants to cut emissions, Bulgaria and Eastern Europe will bear the price
Europe3 days ago
NATO’s Cypriot Trick
Green Planet2 days ago
Reusing 10% Will Stop Almost Half of Plastic Waste From Entering the Ocean