Connect with us

Intelligence

The global strategy of computer hacking

Published

on

Whoever operates on the Web and has even interesting or relevant data sooner or later will always be hacked by someone or by some organizations.

 Usually “economic” hackers take the data of interest from the victim’s network and resell it in the dark web, i.e. the system of websites that cannot be reached by normal search engines.

Currently, however, after the Bayonet operation of July 2017 in which many dark web areas were penetrated, we are witnessing a specialization of the dark web and an evolution of web espionage methods against companies and States.

 These operations which, in the past, were carried out by web amateurs, such as youngsters at home, are currently carried out by structured and connected networks of professional hackers that develop long-term projects and often sell themselves to certain States or, sometimes, to some international crime organizations.

As often happens in these cases, the dark web was born from research in the military field. In fact, in the 1990s, the Department of Defense had developed a covert and encrypted network that could permanently protect the communications of the U.S. espionage “operatives” who worked abroad.

Later the secret network became a non-profit network that could be used for the usual “human rights” and for protecting privacy, the last religion of our decadence.

 That old network of the State Department then intersected with the new TOR Network, which is the acronym of The Onion Router, the IT “onion” covering communication with different and often separable encryption systems.

 TOR lives on the Internet edge and it acts as the basic technology for its dark web.

 Like the “Commendatore” vis-à-vis Don Giovanni in Mozart’s opera.

 TOR, however, is a free browser that can be easily extracted from the Web.

Obviously, the more the anonymity of those who use TOR and go on the dark web is covered by effective encryption systems, the more unintentional signals are left when browsing the dark web.

Moreover, the farther you have to go, the more pebbles you need to go back, as in the Thumbelina fairy tale.

 TOR and the Dark Web were born to allow the communications of U.S. secret agents, but were later downgraded to “free” communication system to defend Web surfers from “authoritarian governments”. Currently the dark web hosts a wide underground market where drugs, stolen identities, child pornography, jihadist terrorism and all forms of illegal business are traded.

Moreover, if these dark web services are paid with uncontrollable cryptocurrencies, it is very difficult to track any kind of dark web operations.

Nowadays, about 65,000 URLs operate in the dark web, which means Internet websites and Universal Resource Locators that operate mainly via TOR.

A recent study of a company dealing with cybersecurity has demonstrated that about 15% of all dark web URLs facilitate peer-to-peer communication between users and websites usually by means of chat rooms or websites collecting images, pictures and photos, which are often steganographic means and transmit hidden and concealed texts, but also for the exchange of real goods via specialized websites for peer-to-peer trading that are also encrypted, as can easily be imagined.

 Moreover, a further study conducted by a U.S. communication company specialized in web operations has shown that at least 50% of the dark websites is, in fact, legal.

 This means they officially deals with things, people, data and pictures that, apparently, also apply to “regular” websites.

  In other words, the dark websites have been created by means of a regular request to the national reference office of ICANN, which grants the domains and registers the permitted websites, thus communicating them to the Californian cooperative that owns the web “source codes”, although not in a monopolistic way.

Currently all the large web organizations have a dark “Commendatore” in the TOR area, such as Facebook, and the same holds true for almost all major U.S. newspapers, for some European magazines but also for some security agencies such as CIA.

Nevertheless, about 75% of the TOR websites listed by the above stated IT consultancy companies are specialized URLs for trading.

 Many of these websites operate only with Bitcoins or with other types of cryptocurrencies.

Mainly illegal pharmaceuticals or drugs, items and even weapons are sold in the dark web. Said weapons are often advanced and not available in the visible and overt networks.

 Some URLs also sell counterfeit documents and access keys for credit cards, or even bank credentials, which are real but for subjects other than those for whom they were issued.

In 2018 Bitcoin operations were carried out in the dark web to the tune of over 872 million US dollars. This amount will certainly exceed one billion US dollars in late 2019.

It should be recalled that the total amount of money “laundered” in the world accounts for almost 5% of the world GDP, equal to 4 trillion US dollars approximately.

Who invented the Bitcoin?

 In 2011, the cryptocurrency was used for the first time as a term of trade only for drug traffickers operating in the dark web, mainly through a website called Silk Road.

 The alias used for those exchanges was called Satoshi Nakamoto, that was also filmed and interviewed, but was obviously another.

We should also recall web frauds or blackmails: for example, InFraud, a U.S. organization specialized in the collection, distribution and sale of stolen credit cards and other personal data.

Before being discovered, InFraud had illegally made a net gain of 530 million US dollars.

 Another group of illegal operators, Fin7, also known as Carbanak, again based in the United States, has collected over a billion US dollars on the web and has put in crisis, by blackmailing them, some commercial organizations such as Saks Fifth Avenue and Chipotle, a widespread chain of burritos and other typical dishes of Mexican cuisine.

 Obviously the introduction of new control and data processing technologies, ranging from 5G to biometric sensors, or of personal monitoring technologies, increases the criminal potential of the dark web.

Hence the dark web criminals will have an even larger mass of data from which to derive what they need.

 The methods used will be the usual ones, such as phishing, i.d. the fraudulent attempt to obtain or to deceive people into sharing sensitive information such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication possibly with a fake website, or the so-called “social engineering”, which is an online scam in which a third party pretends to be a company or an important individual in order to obtain the sensitive data and personal details of the potential victim,  in an apparently legal way, or blackmail by e-mail and finally the manipulation of credentials.

With a mass of additional data on their “customers”, the web criminals will be able to perfect their operations, thus making them quicker and more effective. Or the new web technologies will be able to accelerate the time needed for blackmail or compromise, thus allowing a greater number of frauds for more victims.

 Biometrics certainly expands the time for the use of data in the hands of cybercriminals. Facial detection or genetic and health data are stable, not to mention the poor security of data held by hospitals. Or we have to do with the widespread dissemination of genetic research, which will provide even more sensitive data to web swindlers.

 According to some recent analyses carried out by the specialized laboratories for the Web, 56% of the data most used by web criminals comes from the victims’ personal data, while 44% of the data used by swindlers comes from financial news.

 Moreover, specific types of credit cards, sold by geographical area, commercial type and issuing bank, can be bought in the dark web.

 85% of them are credit cards accredited for a bank ceiling, while 15% of “customers” asks for debit cards.

The web scammers, however, always prefer e-mail addresses even to passwords.

Furthermore, less than 25% of the 40,000 dark web files have a single title.

  In the “dark” web there are over 44,000 manuals for e-frauds, available for sale and often sold at very low prices.

The large and sometimes famous companies are the mainly affected ones. In 2018 the following companies were the target of cyberattacks in the United States: Dixus, a mobile phone company which was stolen 10 million files; the Cathay Pacific airline, with 9.4 million files removed, but also the Marriott’s hotel chain (500 million data/files removed) and finally Quora, a website of scientific documents and generic data. Over 45 million files were removed from Quora.

 How can we know whether we are the target of an attack from the Dark Web? There is certainly the presence of ransomware, such as the recent Phobos, which uses the Remote Desktop Protocols (RDP) that allow to control computers remotely.

 Then there is the Distributed Denial of Service (DDoS), which is a temporary block of the Web, apparently accidental, and finally there is the traditional malware, the “malicious” software that is used to disrupt the victims’ computer operations and collects the data present on their computers.

 However, the Dark Web ambiguity between common crime and the defence of “human rights” and safe communications in “authoritarian regimes” always remains.

The United States, Iran, China and other countries have already created a “fourth army”, composed only of hackers, that operates with cyberattacks against the enemies’ defence and civilian networks.

 The US Cyber Command, for example, is estimated to be composed of as many as 100,000 men and women, who operate 24 hours a day to hit enemy servers (and also allies’ ones, when they contain useful information).

Just think also of the private group Telecomix, which supported the 2011 Arab rebellions and, often, also the subsequent ones.

Also in these months both Telecomix and Anonymous are working to permit the free use of the Syrian computer network.

 There is often an operative interface between these groups and the Intelligence Agencies, which often autonomously acquire data from private networks, which, however, soon become aware of the State operations.

 There is also cyber-rebellion, which tries – often successfully – to strike at the victims’ data stored, by deleting them.

 DDoS, the most frequent type of attack, often uses a program called Low Orbit Ion Cannot (LOIC) which allows a large number of connections to be established simultaneously, thus leading to fast  saturation of the enemy server.

The attacking computers can be used remotely and some groups of hackers use thousands of computers simultaneously, called “zombie machines”, to hit the database in which they are interested to delete it or to remove its files.

 This type of “fourth army” can inflict greater damage on a target country than a conventional armed attack. The faster the attack, the easier is to identify the origin of the operation.

It is currently estimated that the “zombie” computers in the world are over 250 million – a greater network than any other today present in the military, scientific and financial world.

Hence a very dangerous military threat to critical infrastructure or to the economic resources of any country, no matter how “advanced” it is technologically or in terms of military Defence.

 There have been reports of hackers linked to global drug organizations, especially Mexican cartels, and to jihadist or fundamentalist terrorist groups.

Financial hacking, which often supports all these initiatives, remains fundamental.

 The South Korean intelligence services’ operative Lim was found “suicidal” after having purchased a program from the Milanese Hacking Team.

A necessary tool for these operations is often a briefcase containing circuits which mimic the towers of cellular repeaters and store in the briefcase itself all the data which is transferred via cetel or via the Internet Network.

The Central Bank of Cyprus, the German CDU Party and many LinkedIn accounts – a particularly favourite target of hackers – some NATO websites and, in Italy, some business and financial consultancy companies were attacked in this way.

 It is a completely new war logic, which must be analysed both at technical and operational levels and at theoretical and strategic levels.

Advisory Board Co-chair Honoris Causa Professor Giancarlo Elia Valori is an eminent Italian economist and businessman. He holds prestigious academic distinctions and national orders. Mr. Valori has lectured on international affairs and economics at the world’s leading universities such as Peking University, the Hebrew University of Jerusalem and the Yeshiva University in New York. He currently chairs “International World Group”, he is also the honorary president of Huawei Italy, economic adviser to the Chinese giant HNA Group. In 1992 he was appointed Officier de la Légion d’Honneur de la République Francaise, with this motivation: “A man who can see across borders to understand the world” and in 2002 he received the title “Honorable” of the Académie des Sciences de l’Institut de France. “

Continue Reading
Comments

Intelligence

Pakistan is Not Duplicitous When It Comes to Militancy – It is Just Trapped

Published

on

Pakistan’s Dilemma

Pakistan being labeled as duplicitous today when it comes to militancy by external governments and the international media is not only misinformed but outrageously inaccurate. When it comes to tackling militancy and extremism, Pakistan is one of the only countries that has successfully defeated major terrorist groups (whilst keeping in line with humanitarian standards) and has thwarted a massive insurgency.

Nonetheless, it is also true that the country remains stuck between a rock and a hard place. This predicament originates because of militant groups that are not inherently anti-Pakistan. Pakistan has conducted various military operations against numerous terror outfits, of which the most recent Operation Zarb-e-Azb was, and continues to be, the most successful in undermining terrorist efforts in the country – the security condition has vastly improved in the country in recent years. Unlike the Sri Lankan counterinsurgency model which militarily defeated the Tamil Tigers using indiscriminate means (leading to countless civilian casualties), Pakistan’s Zarb-e-Azb adopted a more humane approach, and was praised by US commanders and the Pentagon. The process in Zarb-e-Azb was generally as follows: A militant-infested area was cordoned off while the villagers/townspeople were conveyed to leave the area. After this, the village elders, the local government, and the military screened exiting people to ensure that no insurgents were trying to escape in the guise of civilians. The civilians were then relocated to internally displaced people (IDP) camps until the battle had ceased – the army and air force fought against terrorists only when all civilians had left.

Operation Zarb-e-Azb, led by the Pakistan Army and supported by the Pakistan Air Force, “broke the backbone” of the biggest purveyor of terrorism in the country, the Tehreek-e-Taliban Pakistan (TTP). As peace and security return to the country, there still exist small pockets of radical groups in certain areas that are not anti-Pakistan, but target other countries and forces instead.

The issue, therefore, is how to engage such residual groups, specifically the Lashkar-e-Taiba or LeT (now known as the Jamat-ud-Dawa) and the Haqqani network, which comes under the umbrella of the Taliban, both of whom have enjoyed Pakistani patronage in the past. The operative word being “past”.

Historical Context

Some historical context here is required to cognize why the country is between the proverbial “rock and a hard place”. Since the 1947 partition of the subcontinent, which led to the newly formed states of Pakistan and India, Kashmir’s territorial dispute has become the raison d’être for the hostility between both countries, with each claiming jurisdiction over the former princely state. To undermine India and counter Indian hostilities in Jammu & Kashmir, Pakistan (post-independence) initiated a policy of empowering and funding non-state militias such as the LeT. Although Pakistan once supported these groups, it clamped down on such efforts since 9/11 and the war on terror due to international pressure that proved disastrous for the country. Regardless of this suppression by Pakistan, some groups remain active as they view themselves as freedom fighters similar to Hamas in Palestine and Hezbollah in Lebanon. These groups could attack India with or without the authorization or complicity of state authorities in Pakistan. India cites Pakistan as the oxygen for the Kashmiri freedom movement and maintains that it supports militancy in the valley, while Pakistan claims that it does not support any proxy groups anymore and that Indian barbarities against Kashmiris are the true fuel.

Many international commentators today agree with the Pakistani stance, that is, that Pakistan had supported militant groups such as the LeT in Indian Administered Kashmir (IAK) in the past, but it has significantly reduced these efforts and therefore the current resistance and the anger of Kashmiris against India is considered homegrown. Indian scholars like Mridu Rai also state that “the oft-asserted contention that Pakistan has created the turmoil in Kashmir ab nihilo is unconvincing”.

Pakistan, with material and financial aid from the United States and Saudi Arabia, trained and assisted Mujahideen forces to combat the Soviet invasion from 1979-1989. The strategy proved successful and the Soviets were defeated. In a continuation of this policy, Pakistan supported the Taliban (and the Haqqani network), helping them seize power in Afghanistan (1996-2001) as they showed promise of being pro-Pakistan.

Pakistan’s woes, however, began when the September 11 attacks took place. After 9/11, President Musharraf faced a stark choice when America arrived with essentially two options: help America or risk war with it. Choosing to side with the Americans or else face a potential war, the country had to publicly rescind their support of the Taliban as they were hosting Al Qaeda in Afghanistan and other groups like the LeT. This led to a massive blowback of unfathomable proportions as it plummeted the country into a state of mass internal conflict. Although the LeT and few other groups did not turn anti-Pakistan, many like-minded militant groups did as they discerned the government to be a puppet of America. Pakistan has since then been fighting a predominantly U.S. war that has led to negative spillovers and repercussions for its internal security. India took spectacular advantage of Pakistan’s bleak security situation and poured fuel to the fire, that is, India, akin to Pakistan in the past, initiated its own proxy warfare in the country.

Since the mid-2000s, India has and continues to use Afghanistan to carry out attacks in Pakistan’s Balochistan province – this was proven by the confession of the apprehended Indian spy, Khulbashan Jadav. The Armed Forces of Pakistan have been fighting these extremist elements since 2001, with terrorism only declining to record lows in recent years. As earlier mentioned, the country has fought and militarily defeated various militant groups such as the TTP, Punjabi Taliban, Islamic Movement of Uzbekistan, East Turkestan Islamic Movement, etcetera. Other than these anti-Pakistan groups, there remained certain groups that displayed no or a lack of hostility towards the country regardless of events unfolded – the two most influential being the LeT and the Haqqani network. The absence of anti-Pakistan inclinations in these groups due to them still maintaining relations with the country’s intelligence agencies has been heavily debated. The international community especially America and India see both these entities as terrorist groups that must be neutralized – with India especially mentioning the LeT and America mainly identifying the Haqqanis.

What is the “Rock” and What is the “Hard Place”?

Fingers have repeatedly been pointed towards Pakistan’s alleged support to both groups, which the country has vehemently denied ad nauseam. The question then arises: why not target these groups if the allegations are faux? The answer is rooted in history and its acrimonious reminder to Pakistan, that is, the country cannot antagonize these outfits and risk staring down the barrel of another mass insurgency as was the case after 9/11 – this is the “rock.”

Groups like LeT have a significant popular base in Pakistan as they engage in social work (schools, hospitals, rehabilitation, and so on) besides militancy and the country would not want to cause a civil uproar in certain areas by targeting them. Conversely, the Haqqani network is well connected to various extremist groups including ones that the military has targeted and fragmented due to its operations – hence antagonizing the Haqqanis will not only bring forth their wrath but also might reinvigorate fragmented extremist groups if they align themselves or get subsumed by the Haqqanis. Secondly, since the Haqqanis are a part of the Taliban umbrella, targeting them could mean the withering away of the America-backed intra-Afghan peace process in which Pakistan has played a pivotal role. It would frankly be an exercise in absurdity if the Haqqanis are targeted while the Taliban is negotiating with the Afghan government and the United States. Simultaneously, however, Pakistan cannot afford to be constantly labeled as duplicitous by the international arena despite previous and ongoing counterterrorism endeavors and sacrifices made by thousands of its soldiers and citizens.

The pressure after Trump taking office augmented spectacularly on the country, and Pakistan was publically called out by Trump for harboring terrorists; in January 2018, the White House moved to block $2 billion in military aid allocated to Pakistan – therefore international pressure to “do more” is the “hard place”. Although, since Imran Khan’s visit to America and the inception of the previously mentioned intra-Afghan dialogue, relations seem to have relatively improved between the two countries – however, international pressure still remains and Biden’s stance is yet to be ascertained. One avenue this pressure is manifested through is the Financial Action Task Force (FATF) – the FATF is a global watchdog that combats money laundering and terror financing. Pakistan has been on the FATF’s (Financial Action Task Force) grey list for over two years. Pakistan obviously wants to exit this list and improve its global image. The worst-case scenario would be for the country to descend into the blacklist.

Stuck within these limitations of not being able to militarily engage such groups because it could initiate another insurgency and being internationally called out for not neutralizing all militant groups, Pakistan is at a crossroads. Pakistan must engage the LeT and Haqqani network in such a manner that it demilitarizes them without any repercussions for the country itself. For countries to doubt Pakistan’s motivations to eliminate militancy, after so much blood has been shed, signals that a departure from this rigid mindset is required.

Pakistan has proven to be one of the few countries in the modern world to have militarily defeated a terrorist insurgency (without indiscriminate means) – although much remains to be done on the non-military level. Behind Afghanistan, Pakistan has suffered the most in terms of lives lost as well as economic damage due to the American-led war on terror – therefore Pakistan understands better than most the ignominious consequences of an insurgency. This rightfully indicates that Pakistan does not want to act precipitously and antagonize militant outfits which might lead to another bloody war, especially with a frail economy and IMF loans to pay off. On the other hand, Pakistan must also show the world that its targeting of militant groups is not selective but extends to all others.

Conclusion

Pakistan is walking a tightrope regionally and internationally and will have to continue to do the same until a permanent solution can be found. Currently, the Hindutva-oriented India of the BJP and Pakistan are more likely to go to war than to achieve any kind of rapprochement. However, if Pakistan can find a way to dismiss this opinion of being duplicitous and that it supports militancy, then things could improve between India (assuming the BJP’s Islamophobic and pro-Hindu policies also change) and Pakistan as well as Pakistan augmenting its international image. Although offering solutions is beyond the scope of this article, one possible way would be to politicize the LeT and Haqqani Network, the former of which already has a political party. History is full of examples of militant groups disarming and becoming a part of the political arena; from the Sinn Féin/IRA (Irish Republican Army) in Northern Ireland to the Nelson Mandela-led uMkhonto we Sizwe in South Africa. There is even an example as recently as 2017 when the FARC (Revolutionary Armed Forces of Colombia) unarmed itself and started a political party in Colombia. Lastly, the two primary takeaways from this article are:

  1. The international arena should give Pakistan the credit it deserves in dismantling one of the biggest terror groups in the world and discern that Pakistan’s support for militancy is a thing of the past.
  2. Concurrently, Pakistan needs to stop the tightrope walk and create an implementable plan that disarms the remaining militant groups, or else the “do more” rhetoric of the Americans and Indians will never cease.

Continue Reading

Intelligence

US-led ‘Psychological Wars’ Against Russia, China Lead to All Lose Situation

Published

on

Andrei Ilnitsky, an advisor to Russian defense minister, said in an interview at the end of March that the US and the West are waging a “mental war” against Russia. Why does the West resort to the psychological war? How will Russia cope with the psychological war? Global Times (GT) reporters Wang Wenwen and Lu Yuanzhi interviewed Andrey Kortunov, director general of the Russian International Affairs Council, on these issues by email.

What are the features of such a psychological war?

There is nothing new about psychological wars – they have always been a part of standard military operations. The goal has been to demoralize both your enemy’s army and its population at large in order to break down the will of your opponent to fight and to resist. Ancient kings, emperors and warlords broadly used over-exaggeration, deception, disinformation, mythology, and so on. However, today states commonly use these instruments of psychological wars not only during military conflicts, but in the peacetime as well. Moreover, new information technology offers plenty of innovative ways to get your message to select target audiences in a foreign country; you can customize and focus this message as never before. Each of us is a target in this warfare, even if we do not feel it.

The US-led West used to wage color revolutions on countries they deem as adversaries. What are the differences between the color revolution and the psychological war? Why does the West resort to the psychological war?

A color revolution is an unconstitutional regime change caused by sizeable and sometimes violent street activities of the radical opposition. Western leaders usually welcome such changes and arguably render them diverse political, organizational and financial assistance. Nevertheless, a regime change cannot come from nowhere. There should be significant political, social, economic or ethnic problems that, if remain unresolved for a long time, gradually lead to a color revolution. Psychological wars help to articulate unresolved problems, deprive the leadership of a target country of legitimacy in the eyes of its own population and, ultimately, prepare a color revolution.

What are the likely outcomes for the West’s psychological war on Russia? How will Russia cope with the psychological war?

Russian authorities are trying to limit opportunities for the West to wage the psychological war by exposing Western disinformation and imposing restrictions on select Western media, NGOs and foundations that are perceived as instruments of waging the war.

Is the West capable of launching a military offensive on Russia?

Russia remains a nuclear superpower with very significant military capabilities. A nuclear war with Moscow could lead to the annihilation of the humankind and therefore cannot be considered a feasible option. Even a full-fledged conventional conflict between Russia and the West in Europe would turn into a catastrophe of an epic scale for both sides. It does not necessarily mean that we can rule out such a scenario, but I think that if there were a war, it would erupt because of an inadvertent escalation rather than because of a rational decision to launch a military offensive.

The West has never dropped the illusion of changing China’s and Russia’s systems to that similar of the West by adopting the tactic of “peaceful evolution.” How could Russia and China join hands in face of such Western attempts?

Indeed, many in the West still believe that their system has a universal value and that eventually both Russia and China should move to Western-type liberal political systems. These views are less popular now than they were twenty or thirty years ago, but we cannot ignore them. Moscow and Beijing have the right to defend themselves against the Western ideological and psychological offensive. Still, I see the solution to the problem of psychological wars in a “psychological peace” should be based on a common understanding on what is allowed in the international information exchange and what is not. Russia and China could work together in defining a new code of conduct regulating the trans-border information flows. In the immediate future, the West will be reluctant to accept this code, but we should keep trying. In my view, this is the only way to proceed; if psychological wars continue, there will be no winners and losers – everybody will lose.

From our partner RIAC

Continue Reading

Intelligence

Boko Haram: Religious Based Violence and Portrayal of Radical Islam

Published

on

Modern-day global and domestic politics have set forth the trend that has legitimized and rationalized the use of religion as a tool to attain political gravity and interests. Similarly, many religion-oriented groups use religion to shape their political agenda and objectives, often using religion as a justification for their violent activities. Most of these mobilized groups are aligned with Islam. These groups have promoted religion-based violence and have also introduced new waves and patterns in global terrorism. Some prominent organized groups that attain world attention include Boko Haram, ISIS, Al- Qaeda, and the Taliban. These groups have potentially disrupted the political establishment of their regions. Although, a comparative insight delivers that these various organizations have antithetical political objectives but these groups use Islam to justify their violent actions and strategies based on violence and unrest.

The manifesto of Boko Haram rests on Islamic principles i.e. establishing Shariah or Islamic law in the region. A system that operates to preserve the rights of poor factions of the society and tends to promote or implement Islamic values. Hence, in this context, it negates westernization and its prospects. However, the rise of Boko Haram was based on anti-western agenda which portrayed that the existing government is un-Islamic and that western education is forbidden. Hence, the name Boko Haram itself delivered the notion that western culture or civilization is forbidden. Boko Haram has a unique political and religiously secular manifesto. Boko Haram was formed by Mohammad Yusuf, who preached his agenda of setting up a theocratic political system through his teachings derived from Islam. And countered the existing governmental setup of the Christians. The violent dynamics surged in 2009 when an uprising against the Nigerian government took the momentum that killed almost 800 people. Following the uprising, Mohammad Yusuf was killed and one of his lieutenants Abu Bakar Shekau took the lead.

Boko Haram used another violent strategy to gain world attention by bombing the UN Compound in Abuja that killed twenty-three people. The incident led to the declaration of Boko Haram as a Foreign Terrorist Organizationby the United States Department. Thus, the group continued the process of violence and also started to seize several territories like Bama, Dam boa, and Abadan. They also extended their regional sphere in terms of occupation using violent strategies. The violence intensified when in the year 2014, 276 girls were abducted from Girl’s school in Chibok. This immediately triggered global outrage and developed an image of religious extremism and violence. This process continued over the years; one reported case articulated that a Christian girl ‘Lean Shairbu’ was kept in captivity for a prolonged period upon refusal to give up her religion. Ever since, the violence has attained an upward trajectory, as traced in the case of mass Chibok abduction and widespread attack in Cameroon in the years 2020 and 2021.

After establishing a regional foothold Boko Haram improvised new alliances especially in 2015 after the government recaptured some of its territories that pushed the militant group near Lake Chad and to the hilly areas. Consequently, Abu Bakar Shekau turned towards international alliance and pledged its allegiance to IS. This created two branches of Boko Haram called Jamat u Ahlis Liddawatiwal Jihad (JAS) headed by Abu Bakar Shekau and Islamic State in West Africa Province (ISWAP) lead by Musab Al Barnarwai. The ISWAP developed strong social, political, and strategic roots in the region. It has embedded itself socially in the hearts and minds of people by establishing their caliphate and judicial system.

The pattern of religion-based conflicts has transformed the global religious conflicts. That is often referred to as extremist terrorism based on religion. Hence the rise of Boko Haram also involved demographics that complimented their political objectives. As the state of Nigeria is an amalgamation of Christians and Muslims; and has been constructed as a distinct ethno-lingual society, historically. The Christians resided in the South of Nigeria while the Muslims were located in Northern Nigeria. The northern side suffered from poverty, illiteracy, unemployment, and public health issues under the government of Goodluck Jonathan. His government was centrally weak and marginalized the Northern side. This also contributed as one of the major factors that granted an edge for the influence and legitimacy of Boko Haram. Therefore, the main reason that triggered the organization and its move was based on Islamic principles of Jihad and Tajdid. This presents new notions of religion to recruit and incorporate more people into their community. The concept of Jihad has been historically driven which reflects and justifies acts against the unjust state and its authority. It also expands the capacity for social hostilities against the non-religious entities promoting hatred and non-acceptance. This also breeds religious extremism and rigidity that further validates the use of violence on their behalf.  Hence Jihad acts as a driving force to strive against the un-Islamic state structure for Islamic religious social fabric. Moreover, this religiously derived conception of violent confrontation has always been legitimized in terms of the historic concept of war and terms of self-defense. 

As a radical and contemporary religious belief; Jihad is regarded as the manifestation of religious violence and extremist terrorism. The establishment of the caliphate and state-like institutions represents a radical Salafist view regarding the establishment of the Islamic state structure. The ISWAP acts as a pseudo-state or state with in state that has established its authority and control. The reflection of another religious proclamation ofTajdid refers to the renewal of religious norms that aims at reconstruction or reset of social structure in accordance with Islamic values. Jihad and Tajdid collaboratively serve to generate notions about the reset of the political framework as an Islamic state system. The socio-religious reconstruction is particularly divergent from the western one. As western societies are often pluralistic, while Boko Haram’s vision aims as establishing Islamic social composition. Moreover, the western setup provided constitutional provisions to women in terms of rights, freedom, education, and liberty. This completely contradicted their conceptualization of women. Hence, this also generated gender-based violence as means to protect Islamic values. This was closely witnessed during the abduction of girls from their school. Furthermore, Islamic radicalization has been pursued through different channels that have extensively contributed to narrative building amongst the population, propaganda, and the development of a religious mindset in the African region. One of the most prominent tactics used for the purpose has been achieved through the propagation of literature. The scholars started to preach about Jihad and its implications since the 15th Century. The channel continues to date where the teachers preach about these scholarly findings that further encourages the youth to turn towards radical Islamization. The degree of radicalization elevates as Boko Haram propagates the concept of exclusivism that tends to oppose other value systems and beliefs. This creates a rift the society and deteriorates the sense of co-existence. As a result, Boko Haram represents a destructive paradox that promotes religious extremism and violence through misinterpretation of Islamic principles. Pursuing the political agenda of Boko Haram under the banner of Islamic law; which is power-oriented and would help them maintain dominance politically, economically, and territorially in the African region.

Continue Reading

Publications

Latest

East Asia1 hour ago

China’s export of higher education

The West is becoming increasingly more concerned about the attempts of communist China to expand its global network of influence....

Health & Wellness3 hours ago

Vaccine inequity triggers ‘huge disconnect’ between countries

Although COVID-19 cases and deaths continue to decline globally for a second consecutive week, the UN health agency chief said...

Environment5 hours ago

Virtual Ocean Dialogues 2021 to focus on climate, food and nature

A resilient and abundant ocean is essential to tackling climate change and key to providing sustainable food and jobs that...

Americas7 hours ago

U.S. And Its Allies Try to Split The World in Two

America’s response to the increasing economic success of China and other nations that until recent decades were impoverished former colonies...

Intelligence9 hours ago

Pakistan is Not Duplicitous When It Comes to Militancy – It is Just Trapped

Pakistan’s Dilemma Pakistan being labeled as duplicitous today when it comes to militancy by external governments and the international media...

South Asia11 hours ago

A Skeptic view of Intermediary Guidelines and Digital Media Ethics Code

On 25, February 2021, the Information and Broadcast Minister of India released the Intermediary Guidelines and Digital Media Ethics Code....

Economy13 hours ago

Summit of Business within Portuguese-Speaking Countries

Long before the Portuguese-speaking countries wrapped up their first business summit in Simpopo, Equatorial Guinea that gathered approximately 250 government...

Trending