How would you feel if your every move and decision were being tracked, recorded, and ranked? Nobody really wants a camera to follow them everywhere they go. Welcome to China where the Chinese government is experimenting a new system of surveillance as part of its overt and covert expansion of government intervention and surveillance. Alarmingly, this surveillance system is increasingly showing up all around the world.
China is widely expanding its surveillance network to strengthen and maintain vigilance of its entire populous by tracking peoples’ movements through cellphones and monitoring content of telephonic conversations and emails. Attempts by the government to transform the internet into a system of surveillance and censorship represent a fundamental threat to media freedom and democracy at large.
Cities in China are under the heaviest CCTV surveillance in the world, according to a new analysis by Comparitech, which provides information for research and comparative analysis of tech services. It has been widely reported that China today has about 200 million CCTV cameras in use, a figure predicted to rise 213% by 2022 to 626 million. China is projected to have one public CCTV camera for every two people. However, the Comparitech report suggests the number could be far higher.
These monitoring systems are tighter and heavier handed in Tibet.
Another striking corroboration of China’s sophisticated surveillance system is the widespread use of highly advanced cameras with artificial intelligence which have facial recognition system and can estimate people’s age, ethnicity and gender. These cameras can run recognition systems that match you with your relatives and your associates and within no time pull out a list of people you frequently meet. These invisible eyes that follow you, wherever you go and whatever you do make you suffocated and generate a strong and lasting sense of fear.
The Chinese government admits that the technology using facial recognition, body scanning, and geo-tracking are matched with personal data to keep tab on people in real life and online. Their master plan is to use these technologies as the backbone of their nascent social credit system.
Social credit system
Since Xi Jinping tightened his power grip on technology and surveillance many new notorious strategies to suppress the freedom of expression have been implemented. These include the introduction of new cyber security law, the launch of Cyberspace Administration of China (CAC) and the initiation of a social credit system – a score-based system relying on the adoption of desired behavior based on social merit. This system both punishes and rewards key behaviors through a range of initiatives such as public shaming, travel bans, limited or extended business opportunities, and favorable or devalued credit ratings. The ultimate goal is to hammer into citizens the idea that “keeping trust is glorious and breaking trust is disgraceful”
The point system citizens will incentivise lawfulness, integrity, and trustworthiness with real time impacts on what citizens can and can’t do. Perks like good behavior could lead to privileges of faster internet services, travel ticket booking convenience in flights and trains, and even concessions on advance deposits for renting cars and booking hotels. Having a low social credit score could mean restrictions on traveling, refusal of passport, difficulty in getting employment and being publicly shamed among others.
China’s National Public Credit Information Center reported that it had cancelled airline tickets of 17.5 million people due to their unproductive scores and 5.5 million were barred from booking train tickets in 2018 because of low social credit scores.
China’s technological power grip around the world
For the Communist Party of China the key motive for gathering, analyzing and evaluating data is to preempt and uncover any threat to the social and political stability of its iron grip on China. It is indeed for the first that a government is employing highly advanced technology to expand internet surveillance and censorship to maintain the stability of own rule. China uses surveillance technology to spy on human right defenders, dissidents, and lawyers, deny freedom of speech and subvert anti-communist party campaigns. This abuse of technology fundamentally undermines democracy and threatens human rights.
According to the People’s Daily, the party-owned largest newspaper group in China, the Chinese capital of Beijing is now completely covered by surveillance cameras that watch over “every corner of Beijing city”.
Authoritarian governments across the globe are acquiring state of the art technologies to repress dissent at a rapid pace. For construction of “Smart Cities” in Pakistan, Philippines and Kenya, Chinese companies including Huawei and ZTE are involved in supplying extensive built-in surveillance technologies. Bonifacio Global City in the Philippines outfitted by Huawei has internet-connected cameras that provide “24/7 intelligent security surveillance with data analytics to detect crime and manage traffic.”
Surveillance built with loans from the Chinese Government
Chinas export of surveillance technology began in 2008 during the Beijing Olympic where it marketed its surveillance mechanisms and ‘solutions’. Prior to the Olympics, 300,000 new cameras were installed in the capital. China then invited many foreign officials to observe the effectiveness of its new authoritarian technologically advanced tools. Since then, the Party has exported its ‘solutions’ to many countries with severe human rights records including but not limited to Ecuador, Venezuela, Ethiopia, Pakistan, Kenya, Iran, and Zimbabwe.
China’s collaboration with authoritarian governments across the globe to build large-scale surveillance systems has given rise to global threats to free speech and privacy.
In his research, Prof. Steven Feldman from Boise State University’s School of Public Service found that China is exporting AI-equipped surveillance technology to at least 54 countries around the world with government types ranging from closed authoritarian to flawed democracies”
With China’s help Ecuador now has a new surveillance system, ECU-911 meant to expand automated policing and reduce crime rates. This $200 million deal was jointly signed by China’s State-controlled C.E.I.E.C and Huawei, and funded by Chinese loans in exchange for Ecuador providing them with their principal export, oil. Ecuador’s surveillance systems were not only made in China, but were installed by Chinese companies and workers. Chinese even trained the Ecuadorians how to use it.
China’s export of advanced technologies is a show of strength and capability to the world. It represents the country’s ability to compete with established powers (notably the US) in important sectors, reducing dependency and promoting self-reliance. However, Chinese companies often lack transparency and, most importantly, are without a doubt subordinate to the Chinese Communist Party.
The seriousness of the perceived security threats from Chinese technology companies is evident from the US’s notable restriction or outright prohibition of companies such as Huawei. The US has also encouraged its allies to do the same. Australia, Great-Britain, New-Zealand, the US, and Canada have all adopted measures to restrict the use of Huawei devices and Chinese infrastructure.
Security implications of the export of Chinese surveillance systems
Under President Xi Jinping, the Chinese government has vastly extended domestic surveillance, fueling a new generation of companies that make sophisticated technology at ever-lower prices. With China’s global outreach, the domestic systems are spreading far and wide.
Loans from Beijing have made surveillance technology available to governments that could not have previously afforded it. Adding to this lucrative deal is China’s total lack of transparency and accountability of its use. This rapid development and export of China’s surveillance equipment is helping strengthen a future of tech-driven repression, potentially leading to the loss of privacy.
CCP’s export of surveillance systems to willing governments around the globe has given rise to significant national security risks for individual states as a result from their extensive reliance on and cooperation with Chinese state-owned enterprises or CCP member-owned firms in key infrastructure development projects and expansion of the state security apparatus. These high-tech exports including 5G infrastructure, fiber optics, and telecom equipment aid China’s rapidly rising control and influence over its trading partners. Ultimately, these strategic moves could lead up to China’s goal of strengthening its internet sovereignty, securing its position as a great global power; widen its sphere of influence particularly in South-East Asia and Africa with the help of the Belt and Road initiative (BRI), promote its economic dominance, and provide an alternative to the United States and its allies.
The advent of modern technology in China granted the government, particularly under President Xi Jinping’s leadership, the opportunity to innovate, the expertise to initiate and the free-hand to implement modern surveillance technologies. This new and extremely effective combination of state control apparatus has proven to be incredibly valuable for the Party in tightening security measures, assuring its long-term survival, shaping public opinion, and suppressing resistance.
CCP’s evolving surveillance strategies in Tibet
The iron curtains on Tibet have been shut for a long time and the entire region is off limits for free and independent visits of international media, journalists, advocates, researchers and government and civil society representatives. The highly repressive situation inside Tibet makes it difficult to understand the scope of digital surveillance in the region. Over the years, China’s surveillance system in Tibet has been growing and evolving at an unprecedented scale. The abundance of manned and unmanned checkpoints, AI, CCTV camera networks and re-education centers under the garb of national security have added another layer of control to an already extremely controlled and oppressed environment in Tibet.
Furthermore, the CCP is constantly upgrading its ‘Great Firewall of China’ to monitor and limit online and offline traffic by creating its ‘own’ internet and limiting access to the ‘traditional’ web. Chinese authorities in Tibet are offering large cash rewards to informants in a bid to stamp out online ‘subversive’ activities curbing free flow and dissemination of information. According to a notice issued on Feb 28 by three government departments of the so called Tibet Autonomous Region information leading to the arrests of social media users deemed disloyal to China can fetch up to 300,000 Yuan ($42,582). People sharing political contents or commentary deemed sensitive they face arrest and heavy criminal penalties.
Surveillance in Tibet and Xinjiang have been widely known as “Orwellian.” In addition to the traditional security surveillance apparatus of the military, police, and neighborhood spies, modern surveillance technologies have been specifically developed and tested in these regions. According to human right reports, tight security measure currently being practiced in Uyghur to suppress the resistance movement were previously successfully developed and practiced in Tibet by Chen Quanquo, TAR’s then party secretary. Following his highly suppressive policies in Tibet, Chen was appointed the party secretary in Xinjiang and continues to be the chief architect of the massive surveillance and mass detention systems in the region.
Spring 2008 witnessed the historic and widespread uprisings in Tibet against China’s rule which were followed by a series of self-immolations by 153 Tibetans demanding the return of His Holiness the Dalai Lama and freedom in Tibet. These protests prompted China to maximize and fast track the scope and intensity of its security surveillance both in the number of security personnel and digital technology. In January 2012, the central government introduced a new surveillance system called the “grid system of social management”.In preparation of the implementing the new system, cadres in plainclothes were deployed in every Tibetan village and monastery. The campaign ironically called “Benefit the Masses” involved sending some 21,000 communist party cadres from townships and urban areas to live in teams of four or more in each of the 5,000 villages in TAR. Authorities expanded their network of small police posts known as “convenience” stations to every 200-300 meters in urban areas, to quickly respond to any threat. In 2016, a total of 696 convenient police check posts were newly set up.
New digital surveillance efforts include mandatory collection of DNA samples, Wifi network monitoring and widespread implementation of facial and voice recognition to all connected and integrated data analysis platforms. According to Wall Street Journal’s study of police department documents from across China, the Chinese authorities plan to double their current DNA trove to 100 Million records by 2020. DNA sampling of Tibetans on the Tibetan plateau is widespread under the guise of mandatory medical check-ups aimed at controlling the movement of Tibetan people and further restrict their freedom.The author’s interviews with recent arrivals from Tibet confirmed that beginning in July 2013 Tibetans in cities and villages are being asked to undergo free medical checkup and blood samples have been collected.
Tenzin Tsultrim, a researcher at Tibet Policy Institute based in India believes that China might extend its profiling of DNA samples to even foreign tourists, including Tibetans from India and western countries, visiting Tibet.
Also, CCP’s security spending has increased exponentially since 2008. Germany based researcher Adrian Zens has reported that TAR “has had the highest per capital domestic security expenditure of all provinces and regions.” In 2016, per capita domestic security expenses in Sichuan province’s Tibetan regions were nearly three times higher than Sichuan province as a whole”
The author expressed concern over China’s intention to launch Huawei 5G networks in Tibet, which would make it easier to deploy sensors and enable quick transfer of high volumes of data for real-time analysis. Companies facilitating digital surveillance in Tibet include Alibaba, search provider Baidu, chat app operator Tencent holdings, voice recognition company iFlyTek and facial recognition system Sense Time. State subsidies and other government privileges make Tibet a lucrative market for these businesses to invest and employ their latest technologies. Companies operating in Tibet enjoy a highly reduced tax rate of 9% compared to the standard cooperate tax rate of 25% for the rest of China.
The non-transparent and unchecked export and adoption of China’s highly advanced technologies to foreign markets represent severe intelligence and security threats, especially when integrated directly to national security and surveillance apparatuses. China has successfully put at risk the safety and security of dissidents and activists all over the world and strengthened rouge and undemocratic regimes with its export of surveillance technologies.
Another serious danger for states adopting Chinese technologies is their over reliance on foreign technology to run and manage core government systems thus representing a risk to their very sovereignty. CCP has not only been proliferating its methods through free or subsidized hardware, AI technology and training, but has also been gaining insights and direct connection to the information stream of partner-states.
Surveillance information stream can be realistically used in two ways as targeted micro information to gain leverage on important targets and as a means to gather and employ big data; the use of which is essentially endless. In this sense, there is little to no transparency nor accountability and imposes a very high-security threat.
Exporting the surveillance model is also a strategic move by the CCP’s to further test its model, apply it in variable contexts, and gather additional data and intelligence. The Party gains a direct access into partner-states information stream; advantageous information about markets, business opportunities, important actors, etc. and even possibly sensitive information that could be used to persuade or coerce important actors on local or international matters.
The widespread implementation of surveillance, leading to the intrusion of one’s privacy, may become a cause for further unrest in restrictive states. The absence of freedom and opportunities for people to vent their grievances will most likely expound hatred leading to even more collective anger and dissent among suppressed groups.
Inside Tibet, over the last decade, the “nets in the sky and traps on the ground” have further suppressed the fundamental freedoms of expression, movement and assembly. New and highly advanced technologies have given unrestricted and illicit power to the state security apparatus to intensify and escalate mass surveillance. Checkpoints with smart surveillance and facial recognition are present in cities and at crossings between neighboring districts and provinces. Tibetans inside their homes are tracked through their phones and once they step outside surveillance and facial recognition technologies follow them wherever they go. This is the reality of today’s Tibet and if the free world is unwilling to restrict the import of China’s technologies, this could be your reality tomorrow.
ISIS and the Militant Jihad on Instagram
Authors: Anne Speckhard and Molly Ellenberg
The Islamic State of Iraq and Syria [ISIS] is notorious for its slick propaganda videos and effectiveness at online recruitment, particularly on social media, of men and women all over the world to fight for and live under their Caliphate. Now with the territorial defeat of ISIS, its recruiters continue to be prolific online, encouraging supporters to hope and work toward the Caliphate’s return and to seek revenge on those who destroyed it by mounting attacks at home. While ISIS’s activity on Facebook and Twitter, as well as encrypted apps like Telegram, has been studied extensively, there is a dearth of information about their activity on Instagram, a platform increasingly used by young people vulnerable to ISIS recruitment. This article provides a brief examination of ISIS supporters’ activity on Instagram, even in the face of takedown policies, and also briefly discusses the possibilities of using a counter narrative video ad campaign on the platform to intervene in and prevent ISIS recruitment.
ISIS has long been noted for its superior use of social media, resulting in an unprecedented recruitment of foreign terrorist fighters (FTFs). As of 2020, over 45,000 FTFs had traveled from all over the world to fight with ISIS or live under the ISIS Caliphate in Syria and Iraq. This number peaked between 2014 and 2016, when ISIS was at the height of its reign of terror and has declined since ISIS’s territorial defeat and the 2019 fall of the Caliphate. Yet ISIS still continues to recruit online, urging supporters to seek revenge for the destruction of the Caliphate and conduct attacks in their home countries while waiting and working for the resurgence of the Caliphate. As recently as March and May 2020, ISIS released propaganda videos touting their battlefield achievements in Syria and Iraq, respectively, portraying graphic footage of Syrian and Iraqi soldiers being slaughtered while also calling for revenge against the countries that helped defeat ISIS territorially.
For years, ISIS would blanket the Internet with their high-quality, professionally produced propaganda videos and written content and then use the immediate feedback mechanisms of social media to swarm in on and “love-bomb” anyone who liked, retweeted, commented on, or otherwise responded to their posts. In this manner, ISIS cast a wide online recruiting net but devoted their time and energies trying to seduce further those who showed interest and vulnerability to their online propaganda. Today’s online experience with video chat, online telephoning and text messaging allows ISIS’s online recruiters operating in at least 25 different languages to create deep and meaningful relationships with those on whom they are able to home in. As they do so, they artfully identify and meet the specific needs of their prey, creating intimate relationships and crafting individualized message that promise dignity, purpose, hero status, love, or anything else sought by the recruit should they attack on ISIS’s behalf or travel to fight for them. Due to this advanced recruitment strategy, ISIS was able to attract a significant amount of foreign terrorist fighters solely online, with no face-to-face recruitment. 
Because ISIS has been so prolific and so effective at using social media to radicalize and recruit, policy makers, scholars, and practitioners alike agree that effective efforts to prevent and counter violent jihadist extremism also require a social media aspect. Jihadists’ use of myriad platforms, including Twitter, Ask.fm, and Telegram have been studied extensively, and counter narratives have also been used in online campaigns created and posted by government and non-governmental entities, with mixed results, on a variety of platforms. 
The International Center for the Study of Violent Extremism [ICSVE] has over the past five years created and built its own counter narrative program, titled Breaking the ISIS Brand Counter Narrative Project, which features 194 short video clips of ISIS and al Shabaab insiders denouncing the group, and TheRealJihad.org website that features additional counter narrative material and resources to prevent and intervene in ISIS’s recruitment. ICSVE has also extensively studied online engagement with their and others’ counter narrative materials. It is clear that the most successful counter narratives are emotionally evocative, use credible insiders to deliver the message, and recognize the grievances that viewers may feel in a manner that creates rapport with the viewer rather than mocking the jihadist narrative, condemning those interested to join, or simply promoting pro-democratic, pro-secular society messages. These latter messages may not resonate with someone who has felt discriminated against as a Muslim immigrant, or individual of Muslim immigrant descent, or as a Muslim convert in the West. ICSVE has also learned from studying multiple campaigns that viewers not only watch the Breaking the ISIS Brand counter narrative videos in significant numbers, but are also moved to engage with the posts, through reacting, commenting, sharing, and saving them, and that viewership can be greatly increased by shortening the videos to one minute and then directing viewers to a website (YouTube or the ICSVE-run TheRealJihad.org) where they can watch longer videos and engage with other counter narrative materials and resources.
Although ICSVE’s Breaking the ISIS Brand counter narratives have been successful in the aforementioned ways, it is critical that ICSVE and others working in preventing and countering violent extremism keep up with current social media trends, just as ISIS does, in order to be able to prevent and disrupt their recruitment, especially of young people. Thus, an examination of social media usage among young people is required. In Europe, where ISIS is still actively recruiting and able to move some youth into attacking at home, ICSVE has also been campaigning against them while watching which platforms are being most used by both European youth and ISIS. In the EU, similar to the U.S., Instagram usage is outstripping Facebook and growing for youth, particularly among people younger than 34. This is opposed to Facebook and YouTube still being the platforms of choice among youth in countries in other parts of the world, such as in the Middle East, though Twitter has fallen in popularity among Middle Eastern youth since the height of ISIS’s online recruitment. In 2017, Instagram was the third most popular social media platform in the EU, after Facebook and Google+. Anecdotally, police and security forces in the Netherlands expressed a worry that the youth most vulnerable to radicalization would not be reached through Facebook, as even if they do have accounts, they are much more likely to be active users on Instagram.
Surprisingly, the specific relationship between Instagram and terrorist recruitment has not yet been studied. While there is extensive literature on militant jihadism and other types of violent extremism on Facebook, Twitter, and Telegram, Instagram is typically mentioned only as an example of a social media platform rather than a unique medium for promoting ISIS and militant jihadist propaganda and for terrorist recruitment. This paper begins to delve into the issue of if and how Instagram is being used by ISIS and other militant jihadist groups.
Identifying ISIS and militant jihadist Supporters on Instagram
Identifying those supporting jihadist ideology and groups on Instagram is a relatively simple task. By searching on Islamic terms and names often associated with ISIS, like khilafah, tawheed, and dawlah and even Awlaki, many posts including those hashtags appear, as they were posted by users with public accounts. Among these, most public posts did not include explicit advocations of militant jihadist violence, but rather promoted conservative views such as the requirement for women to be fully covered in niqab, with the implication that women who show their faces at all were sexually promiscuous and that unmarried women who interacted with men were asking to be sexually assaulted. While these views are not necessarily extremist, there could then be found among them ISIS supporters who posted more violent and extreme ideas on their stories or secondary private accounts which made it clear they sympathize with ISIS.
For instance, one commonly shared meme on public pages contrasted “The Hijabi Queen,” a woman who has never had sex before marriage and dresses modestly, with the “Western Thot [Internet slang for a slut or whore],” a woman who is seen as “a pump-and-dump” and “has slept around with countless random guys in her youth, then settles down with someone she’s not even attracted to.” The conservative Muslim woman is portrayed respectfully while the Western woman is dehumanized and degraded, which is not itself violent extremism, but in some cases, it relates to violent suggestions for dealing with Western women’s violations of the poster’s conservative views. For instance, one account posted a photo depicting a man asking, “Is burning the only solution for the feminists?” and another responding, “So it seems. So it seems.”
Other posts advocated violence against members of the LGBTQ+ community, especially during the month of June, which is Pride Month in the United States. Many of these posts appeared at first to advocate tolerance and acceptance of homosexuality until one looked more carefully at the details of the photos:
The photo above was posted by an account which frequently posted other homophobic content and advocated a broad expansion of the global Caliphate but did not believe that ISIS was the group capable of doing so. This view is akin to many others supportive of militant jihad and the idea of an Islamic State Caliphate but who are opposed to ISIS’s propensity for attacking other Sunni Muslims. Below are some posts of memes illustrating such views.
More violent content criticized the relatives of victims of the mosque shooting in Christchurch, New Zealand for forgiving the white supremacist terrorist instead of punishing him according to shariah. Other posts refer to takfir, which is the extremist Islamic practice of excommunicating others for not following their extremist interpretation of Islam, a common practice in ISIS that included the claim that those takfired should be executed as infidels. An example of a post including a meme promoting takfir refers also to the taghut which are, according to ISIS, tyrannical powers that deny and defy Islam, and mushrik, meaning those who reject the oneness of God and who are idolaters. The post is here:
Other posts were anti-Semitic memes accusing figures like the Rothschild family and George Soros of creating the COVID-19 pandemic and inciting race wars which could be found on both far right and militant jihadists sympathizers accounts, again not necessarily denoting militant jihadist sympathy per se. However, among these were also Muslims who appeared to be ISIS supporters based on a video of a man preaching the “ruling of caliphate.”
The account mentioned above, which appears to be an ISIS supporter, posted a meme depicting various high-profile media personalities with Stars of David on their foreheads, below a photo of Jacob Rothschild holding a fan of cash, with an illuminati symbol on his forehead. The title above the photo reads, “The media moguls are highly-paid agents of Rothschild Zionism, hired and paid handsomely serve their global agenda [sic].”
Under the hashtag taghut, denoting tyrannical powers who deny worship of anything other than God and defy Islam, many Instagram users posted photos of Arab leaders, most notably those from Saudi Arabia, accusing them of hypocrisy and Westernization which aligns with the jihadist messaging from al Qaeda, al Shabaab and ISIS, but does not necessarily mean they are militant jihad or ISIS supporters themselves. Messages warning followers not to participate in democratic elections were also posted with the taghut hashtag although this could also be seen as a very conservative, but nonviolent, Salafi view.
One such post featured a Guy Fawkes mask next to the words, “Dumb politicians are not the problem. The problem is the dumb kuffar [disbelievers] that keep voting for them.” The caption specified the leaders of Pakistan, Turkey, Bangladesh, and Saudi Arabia as polytheists and their supporters as kuffar. The same account posted photos accusing Bill Gates of injecting people with the COVID-19 virus in order to sell them a vaccine; referred to Jews, Shias, Sufis, Brelwees [sic], and Christians of being idol-worshippers; and declared takfir on Congresswoman Ilhan Omar for her participation in the U.S. government. Many photos posted by the account featured firearms, though the poster stated that they did not support ISIS specifically.
Of the public accounts that did explicitly advocate for violent jihad, most did not mention ISIS, which may be due to the profile owners’ concerns about avoiding takedowns. Rather than directly mentioning ISIS, they posted photos and quotes from ISIS and al Qaeda English-speaking ideologue Anwar al-Awlaki or exaltations of the Taliban, which seemed to be a far more socially acceptable group, or safer to explicitly post, than ISIS within the jihadist sphere on Instagram.
One post featured a video of Anwar al-Awlaki speaking about jihad, captioned, “Beautiful beautiful reminder, Whoever is going to follow a path should follow the path of the ones who’ve died.” Another post on the account featured only the bottom half of al-Awlaki’s face, presumably to avoid takedown software, as the caption began, “Kuffar deleted this post.”
Another account was dedicated entirely to posting al-Awlaki quotes, with a link to a collection of audio lectures in the bio. According to the account holder, he or she was posting the quotes on behalf of jihad and linking to the audio lectures because “YouTube is deleting the videos of the Sheikh cause [sic] it contains Islam in its purest form.” While many of al-Awlaki’s early videos do address many matters about life in Islam, his later videos promoting endless jihad with the West are the actual reason his videos have been taken down.
One of the most prolific Taliban-supporting accounts frequently posted violent and graphic videos as well as photos boasting of the Taliban’s success. For instance, one photo was accompanied by the caption, “Taliban Lions captured a checkpoint in the Antan area of Siagard in Begha Parwan province, killing and wounding soldiers and looting a large number of arms. Allab Almighty gives us enough weapons in one post to suffice to conquer a large bases… [sic].”
The same account frequently expressed anger toward ISIS, however, citing an oft-referenced conspiracy theory that ISIS was created by the United States and Israel to destroy the Muslim people. The photo below was posted alongside a caption claiming that Edward Snowden had revealed that Abu Bakr al Baghdadi is really a Mossad agent named Elliot Shimon.
There were, however, a few public accounts that were clearly and unashamedly pro-ISIS. Most focused on the women imprisoned at the al-Hol camp in Syria. One account was even purportedly run by women in the camp who raised money through other accounts to finance their escapes. These accounts threatened punishment for the unbelievers who held them captive and yearned for the return of the Caliphate.
An account seemingly run by a woman in al-Hol wrote, “Remember my sisters no matter what state we are in, no matter what the world think of us. The world still trembles at the mention of us, we have left a deep scar that will never heal and we remain a thorn in the side of kufr.”
One account posted in English, Arabic, and German, raising funds to be smuggled out of Camp al-Hol. This account also provided links to other accounts, which posted links to a PayPal account where supporters could donate to the women or write them letters. On June 12th, 2020, one of the associated accounts posted a video claiming that it was taken while the women were leaving the camp. The account also posted graphic photos of bloodied male faces, claiming that “some sisters from the camp recognized their husbands and their husbands were in Hasakah prison.” There were multiple riots and attempted escapes at Hasakah the days and weeks before these photos were posted. The primary account has either been deleted since then or has blocked the account through which ICSVE was following it.
Another account run out of al-Hol, which was not associated with the German account mentioned above, posted in English only. The account posted about fundraisers through Telegram, but did not link to the fundraising websites themselves, likely to prevent the websites from being taken down. The account also lauded ISIS fighters who were captured in ISIS’s last stronghold of Baghouz, fighting until the very end. They also posted about teaching their children to throw rocks at the camp guards and referred to Camp al-Hol as “the cradle of the new Caliphate.” This account has also either been deleted or blocked the account through which ICSVE was following it.
Most accounts that openly supported ISIS were private, though many of these could be identified as likely ISIS followers by a black flag emoji and an index finger emoji in their bios, both common but not unique symbols for ISIS. Notably, proponents of other jihadist groups like the Taliban did not use these symbols in their bios. These pro-ISIS accounts posted photos of weapons and included more provocative messages, such as those denouncing others as unbelievers, in their Instagram stories. Some photos also included selective Islamic scriptures arguing for severe punishment of unbelievers which also aligns with ISIS ideology. Many accounts also posted black and white videos of men with guns on horses with the identifiable black flags of ISIS and women dressed in niqab, expressing nostalgia for the Caliphate. One account even included a story called “44 Ways to Support Jihad,” which included, “Praying to Allah to reward you with martyrdom,” “financing a mujahid [a jihadist warrior] ,” and “arms training.” Another account was dedicated to inspiring hope for the resurgence of the ISIS Caliphate. Under a photo of Bashar al-Assad, the user commented, “The oppressive rule of these tyrants is on its last legs. Their nations are failing, the people want change. The Khilafah is coming very soon, as prophesized. Why don’t you help re-establish it?” Another post read, “The Khilafah state could easily liberate all oppressed Muslims and protect every Muslim living within it. It’s that simple.” Another account used a photo of Abu Bakr al-Baghdadi as his profile picture and posted videos of sermons on his story, as well as other videos praising ISIS fighters and promising that “Allah will grant you victory.” Another post by the same account featured a drawing of the ISIS flag over the earth. Many of these accounts accepted follow requests from the ICSVE-run The Real Jihad account, likely without looking at the account’s posts, which all contain counter narrative material.
It should be noted that many of these accounts are taken down within weeks of discovering them, although new and similar ones quickly replace them. In the study of terrorist activity on social media, Instagram may well be a new frontier where younger people are able to post anonymously about their violent extremist beliefs. The Instagram “Discover” page also serves as an echo chamber for these individuals, suggesting posts and accounts to follow that are similar to accounts one already follows. Indeed, many of the accounts followed by The Real Jihad were found not by searching on hashtags or perusing other users’ lists of followers, but by simply looking at the “Discover” page without searching anything at all. Thus, as soon as a user reacts to a militant jihadist account, he or she will be recommended to follow other such accounts and will not be exposed to any counter arguments unless accounts like The Real Jihad insert themselves into the echo chamber by tagging counter narratives with militant jihadist hashtags.
Research on Instagram in Regard to Terrorist Propagandizing and Recruitment Strategies
Most research on the impact of Instagram focuses on the different communities that exist on Instagram. While some communities, such as those promoting body positivity among young women, bond users together through prosocial means, other communities allow users to unite in promotion of maladaptive behaviors such as self-harm and excessive reassurance-seeking. Because terrorist recruitment online involves aspects of marketing as well as promotion of maladaptive behavior, some studies of Instagram can be applied to its utility for terrorist recruitment and opportunities for preventing and countering radicalization. For instance, a 2016 study of Dutch teenagers and young adults found that while young people were more likely to express negative emotion on Facebook and Twitter, they were more likely to express positive emotion on Instagram. However, they were most likely to express any emotion, positive or negative, on WhatsApp, likely due to its double-ended encryption that makes users feel that their expressions are more private and secure. The authors of the study concluded that users felt stronger ties to Facebook friends (a reciprocal relationship) than to Instagram followers (a non-reciprocal relationship), thus enabling them to disclose more private negative emotions. These results suggest that Instagram may be an effective platform to attract the initial attention of targets for counter radicalization, but they should be then redirected to a platform that allows for more freedom to express negative emotions and the potential to build a more personal relationship. Whether or not ISIS has learned this yet is unknown, but the results nevertheless provide lessons for counter narrative campaigning and suggest that attracting attention on Instagram may be possible, but moving the viewer to a platform where more intimate relations and fears, doubts, and needs can be expressed and hopefully answered in a way that redirects the user away from violent extremism would be beneficial.
Pittman and Reich (2016) posited that because Instagram is an image-based platform, it is better equipped to reduce loneliness among adolescents and young adults than text-based platforms like Twitter. The study noted that Instagram posts with faces (i.e., selfies or photos of groups of friends) were 38 percent more likely to be “liked” and 32 percent more likely to receive a comment than other types of photos, such as those of food or landscapes. Thus, decreased loneliness related to Instagram use may similarly confer the sense of belonging and significance, such as the idea that one is worthy of being noticed, that is often an integral part of terrorist recruitment, even if use of the platform does not allow for the development of emotionally intimate individual relationships. The latter can be developed by instructing those whose attention has been captured and who begin to feel a sense of being noticed and belonging to migrate to other more intimate platforms and apps.
Instagram’s utility for organizations, rather than individuals, has also been examined. In ICSVE’s preliminary counter narrative campaigns on Instagram the account running the counter narrative ads, @TheRealJihad_Official, is a business account and is not made to look like an individual user. Thus, it is important to understand how businesses and organizations in general are able to engage followers on Instagram. One study in Finland found that users were most likely to engage with brands on Instagram when the brands’ content was personal and emotionally evocative. The same has been found in studies of ISIS’s online recruitment as well as studies of counter narratives. Among Kuwaiti banks, Instagram has been found to be most effective in image building and communication, rather than establishing relationships, and that banks are able to gain the trust of their followers by invoking religious themes. Although the Instagram ads discussed in the present study were not run in the Middle East, many were targeted toward Arabic speakers. It is therefore critical to understand the cultural aspects of engaging with organizations on Instagram, namely, the suggestion of the Kuwaiti study that Arabs are less prone to interact directly with an organization on Instagram and are more likely to view the platform, with respect to organizations, as a one-way communication medium. Still another study of brands on Instagram found that consumers were more likely to trust brands if they perceive the brand’s benevolence and integrity, and if the brand is endorsed by “Key Opinion Leaders.”
ISIS recruiters have utilized these factors well. By stoking distrust in Western governments in the mainstream online media, they also contrast their own claimed shariah-based values and build up their own reputation for integrity. For instance, by emphasizing the atrocities of the Assad regime, they portrayed themselves as benevolent. Finally, by invoking trusted jihadi narratives, such the idea that Muslims are under attack by the West, the idea that defensive jihad is required and that jihad is obligatory for all Muslims, alongside the promotion of suicide terrorism as a type of Islamic “martyrdom,” sometimes via fatwas by Arabic scholars or sermons by Anwar al Awlaki for English speakers, they ensure their followers that they have been endorsed by trusted and credible sources. As such, a key aspect of the counter narratives presented in this article is the use of ISIS defectors, returnees, and imprisoned cadres as credible, reliable speakers who have suffered some of the same grievances as viewers and sought justice by joining ISIS, to deliver an honest, benevolent message and warnings to those thinking of following their same path to destruction.
A Possible Instagram Counter Narrative Strategy?
ICSVE has over the past two years, in partnership with Facebook, run over 125 campaigns in countries and languages all over the globe with good success in reaching the target audience and engaging them with the Breaking the ISIS Brand Counter Narrative videos. It is only recently that ICSVE started counter narrative campaigns on Instagram. While the full-scale ICSVE study of running counter narratives on Instagram has been submitted to a scientific journal, some brief results can be relayed here.
Given that we are easily finding outward expressions of support for ISIS, it was not difficult to identify a target population for the ICSVE counter narratives and build a following of accounts that would be viewed as legitimate for people who are in the process of being radicalized toward militant jihad and thus target them with counter narratives. ICSVE researchers were able to identify potential ISIS supporters on Instagram through their bios alone, meaning that one does not have to request to follow a private account in order to determine whether that user can be considered a likely ISIS supporter. Moreover, there is evidence of a large jihadist-supporting community on Instagram, although many of its members do not openly profess to be ISIS supporters. Thus, those aiming to counter militant jihad generally would be wise not to focus solely on ISIS, lest they be dismissed by supporters of the Taliban, al Qaeda, al Shabaab, and Kashmiri militant jihadist groups who support violence but denounce ISIS.
While the counter narratives used in ICSVE’s first campaign were specifically ISIS-focused and aimed at the general population in numerous EU countries, future campaigns may be hyper-targeted at those people more vulnerable to terrorist recruitment.
Running counter narrative videos on Instagram is a slightly different process than running Facebook ad campaigns. On Instagram, users are wary of interacting with accounts that appear to not be run by engaged, active Instagram users, even if the account belongs to a business. Thus, before running the campaign, ICSVE staff set up the @TheRealJihad_Official Instagram account and attempted to amass followers by posting daily, at noon, links to articles on TheRealJihad.org, photos with quotes from ISIS insiders denouncing the group, and links to other ICSVE counter narrative videos on YouTube. The account also began following a number of accounts with jihadist content, in order to legitimize itself among the intended audience. Jihadist accounts were found by searching various hashtags such as #khilafah, #dawlah, and #tawheed. At the outset of the campaign, the account followed 75 Instagram users and had five followers. By the middle of the campaign, the account was following 104 accounts and had 60 followers, many of whom were members of the target audience, thus demonstrating the ability to ingratiate itself within the pro-ISIS community on Instagram.
Already, photos and quotes from ISIS defectors, returnees, and imprisoned cadres have been posted on The Real Jihad Instagram account daily since the account’s inception to position it as a credible account with postings of potential interest to the target audience. It should be noted that all ICSVE counter narrative videos have ambiguous names that could be considered pro-ISIS, and most have thumbnails taken from actual ISIS footage that has been used to illustrate the speaker’s story, which denounces rather than supports ISIS. These posts have sparked likes and a few comments, including one ridiculing the defector for expecting a life of luxury in ISIS instead of jihad. Another user sent a direct message to The Real Jihad, accusing the account of using a fabricated hadith, arguing against the Islamic tenet that the most important jihad is that being against one’s own whims and evils, rather than against outside enemies. ICSVE’s Islamic scholar responded by pointing out the user’s use of a straw man fallacy, explaining the correct translation and meaning. The user was not able to refute the scholar’s argument, responding simply, “Allah knows best.” Other users direct messaged the account asking for more links to the counter narrative videos, which is a positive sign of engagement among the target audience.
The counter narratives were run in Germany, France, Austria, Belgium, the Netherlands, Sweden, Greece, and Italy, all countries from which individuals had traveled to join ISIS in Iraq and Syria. All of the counter narrative videos used were one minute long and featured ISIS defectors, returnees or prisoners speaking about why they joined and what they actually experienced while in ISIS, and finally denouncing ISIS as un-Islamic, corrupt, and overly brutal at the end of the video. Each of the videos featured an ISIS member who had traveled to ISIS from the specific country in which the video was run or a nearby country (for example, the speaker in the video shown in Austria was from Germany). The speakers in the videos told their stories in different languages, but each video was subtitled in the dominant and minority languages used by Muslims in the countries in which they were run. They were run for 13 days, from May 15 to May 27, 2020.
In general, the results of ICSVE’s first campaigns were positive in terms of being able to create an account that could reach the target audience and engage them to a certain extent. However, there are concerns that need to be addressed. One is that through the comparison between this Instagram campaign and the identical campaign run on Facebook a few weeks prior, it is clear that one-minute videos do not have the same capability to retain viewers on Instagram as they do on Facebook. This may be because videos on Facebook can be up to four hours long, so users who are accustomed to seeing longer videos on their feed may not get bored as easily, or may check how much of the video is left after watching for 10 or 15 seconds and, seeing that less than a minute remains, decide to finish the video instead of scrolling past it. On Instagram, however, videos cannot be longer than one minute. Therefore, users who are accustomed to watching videos for only a few seconds may not have the patience to watch a one-minute long counter narrative video.
In order to remedy the poor viewer retention on Instagram, future campaigns will feature photos and even shorter videos, likely utilizing ICSVE’s digital posters. These posters are photos of the ISIS defectors, insiders, and imprisoned cadres featured in the counter narrative videos, alongside emotionally evocative quotes about their lives before ISIS and their experiences in the groups. These posters have gained some traction among The Real Jihad account’s regular followers and will therefore likely spark high engagement in an ad campaign.
In summary, ICSVE has been able to determine that Instagram is being used by individuals whose accounts suggest that they are ISIS supporters, and even ISIS members themselves, and that it is possible to reach and target these accounts with counter narrative campaigns. However, our first campaigns taught us that it is critical to carefully determine the best ways to expose both those who are ISIS supporters and those vulnerable to ISIS recruitment to countering arguments in a way that is engaging and emotionally evocative. Likewise it is necessary to keep in mind that Instagram is unique platform where users are more likely to expect to see extremely short videos and photos with less discussion occurring. Our continued work on the platform and future studies will keep this in mind and focus on increasing viewer retention and effectively providing counter arguments to jihadist ideology through photos and videos that are only a few seconds long. Our first campaigns were an important step toward learning if we could utilize counter narratives effectively on Instagram, which differs quite a bit from Facebook in terms of expected mediums and audience. It is clear from our research that Instagram is being used by those supporting, and even members of, ISIS as well as other militant jihadist groups and thus there is a strong need for counter narrative campaigns to be put in place to disrupt and prevent ISIS and other militant jihadist recruitment on Instagram.
The International Center for the Study of Violent Extremism thanks the Embassy of Qatar in Washington, D.C., Facebook and the European Commission’s Civil Society Empowerment Programme for their generous support of our research, creation of counter narratives and counter narrative campaigns on Facebook and Instagram. This article was partially funded by the European Union’s Internal Security Fund — Police.
 Jihadology. (n.d.). Retrieved May 21, 2020, from https://jihadology.net/category/jihadology/
 Speckhard, Anne, and Molly Ellenberg. (2020, April 15). Is Internet Recruitment Enough to Seduce a Vulnerable Individual into Terrorism? Retrieved from https://www.hstoday.us/subject-matter-areas/counterterrorism/is-internet-recruitment-enough-to-seduce-a-vulnerable-individual-into-terrorism/
 Yayla, Ahmet S., and Anne Speckhard. “Telegram: The mighty application that ISIS loves.” International Center for the Study of Violent Extremism (2017).; Al-Rawi, Ahmed, and Jacob Groshek. “Jihadist Propaganda on Social Media: An Examination of ISIS Related Content on Twitter.” In Cyber Warfare and Terrorism: Concepts, Methodologies, Tools, and Applications, pp. 1442-1457. IGI Global, 2020.; Speckhard, Anne, Ardian Shajkovci, and Lorand Bodo. “Fighting ISIS on Facebook—Breaking the ISIS brand counter-narratives project.” International Center for the Study of Violent Extremism (2018).; Shane, Scott, and Ben Hubbard. “ISIS displaying a deft command of varied media.” New York Times 30 (2014).
 Johnson, Joseph. “Instagram in Europe – Statistics & Facts,” February 10, 2020. https://www.statista.com/topics/3438/instagram-in-europe/.
 AW Staff. “Social Media Use by Youth Is Rising across the Middle East: AW Staff.” Arab Weekly, January 26, 2020. https://thearabweekly.com/social-media-use-youth-rising-across-middle-east.
 Drahošová, Martina, and Peter Balco. “The analysis of advantages and disadvantages of use of social media in European Union.” Procedia Computer Science 109 (2017): 1005-1009.
 “ICSVE – Europe – Dutch Federal Police Training Event.” ICSVE, April 19, 2020. https://www.icsve.org/icsve-europe-dutch-federal-police-training-event/.
 Speckhard, A., Ellenberg, M., Shaghati, H., & Izadi, N. (2020) Anti-ISIS and Anti-Western: An Examination of Comments on ISIS Counter Narrative Facebook Videos. International Studies Journal, 16(3), 127-156.
 Speckhard, Anne and Ellenberg, Molly (May 24, 2020). Inside the Sisterhood Springing Jihadis from Jail. The Daily Beast
 Tiggemann, Marika, Isabella Anderberg, and Zoe Brown. “# Loveyourbody: The effect of body positive Instagram captions on women’s body image.” Body Image 33 (2020): 129-136.
 Brown, Rebecca C., Tin Fischer, A. David Goldwich, Frieder Keller, Robert Young, and Paul L. Plener. “# cutting: Non-suicidal self-injury (NSSI) on Instagram.” Psychological medicine 48, no. 2 (2018): 337-346.
 Sheldon, Pavica, and Megan Newman. “Instagram and American Teens: Understanding Motives for Its Use and Relationship to Excessive Reassurance-Seeking and Interpersonal Rejection.” The Journal of Social Media in Society 8, no. 1 (2019): 1-16.
 Waterloo, Sophie F., Susanne E. Baumgartner, Jochen Peter, and Patti M. Valkenburg. “Norms of online expressions of emotion: Comparing Facebook, Twitter, Instagram, and WhatsApp.” new media & society 20, no. 5 (2018): 1813-1831.
 Pittman, Matthew, and Brandon Reich. “Social media and loneliness: Why an Instagram picture may be worth more than a thousand Twitter words.” Computers in Human Behavior 62 (2016): 155-167.
 Hellberg, Maria. “Visual Brand Communication on Instagram: A study on consumer engagement.” (2015).
 Speckhard, Anne, Ardian Shajkovci, and Lorand Bodo. “Fighting ISIS on Facebook—Breaking the ISIS brand counter-narratives project.” International Center for the Study of Violent Extremism (2018).
 Al-Kandari, Ali A., T. Kenn Gaither, Mohamed Mubarak Alfahad, Ali A. Dashti, and Ahmed R. Alsaber. “An Arab perspective on social media: How banks in Kuwait use Instagram for public relations.” Public Relations Review 45, no. 3 (2019): 101774.
 Che, Jasmine WS, Christy MK Cheung, and Dimple R. Thadani. “Consumer purchase decision in Instagram stores: The role of consumer trust.” In Proceedings of the 50th Hawaii International Conference on System Sciences. 2017.
 Speckhard, Anne and Ellenberg, Molly (May 12, 2020). How Assad’s Atrocities Became a Powerful Motivator for Terrorist Recruitment. Homeland Security Today
 Speckhard, Anne. “Recruiting from Beyond the Grave: A European Follows Anwar Al-Awlaki Into ISIS.” Homeland Security Today, April 28, 2020. https://www.hstoday.us/subject-matter-areas/counterterrorism/recruiting-from-beyond-the-grave-a-european-follows-anwar-al-awlaki-into-isis/.
 Speckhard, Anne, Molly Ellenberg, Haider Shaghati, and Neima Izadi. “Hypertargeting Facebook Profiles Vulnerable to ISIS Recruitment with ‘Breaking the ISIS Brand Counter-Narrative Video Clips’ in Multiple Facebook Campaigns.” Journal of Human Security (In Press).
 “Memes – ISIS Defectors Speak Out.” ICSVE. Accessed July 13, 2020. https://www.icsve.org/project/memes/.
Author’s note: first published in Homeland Security Today
Cyber ASAT-Capabilities and South Asia
Since the launch of first satellite in 1957, humanity is using outer space for the purpose of intelligence, surveillance, reconnaissance, communication, monitoring, global positioning and navigation. Military and strategic usage of outer space has provided states with the ability to have early warning systems, effective nuclear command, control and communication (NC3) and strategic intelligence. Space based systems are important for states and militaries because they ensure the availability of information and data to all other services (land, air and water). Therefore, space is an ultimate high ground for information warfare for nearly 70 years. End of the Cold War, beginning of the multi-polarity and effective display of space capabilities as force multipliers during the “Operation Desert Strom” brought many states into the race of space control and power.
Today50 countries are operating more than 1,950 satellites in outer space, which includes 846 commercial, 302 military, 385 government, 145 civilian and 279 mixed usage satellites. Satellites are light weight objects, moving at extreme speed, a marble size object hitting it in space would cause a satellite irrefutable damage. Hence, these strategically important assets in space are at extreme odds with different kinds of vulnerabilities. Due to emerging technologies, hostilities and competition among states, most of the vulnerabilities to space assets are man-made. These threats/vulnerabilities are not shocking for states, as US Space Command publication in 1997stated that considering an importance of space systems in military operations, it is unrealistic to imagine that they will never become a target.
The ability to target satellite in outer-space is also known as “counter-space capabilities” or “anti-satellite weapon systems”. Counter-space capabilities are defined as military capabilities that seek to prevent an adversary from exploiting space to their advantage and enable a state to have a desired degree of space superiority by the destruction or neutralization of enemy forces. Today under the imperatives of their national security concerns state are more inclined towards usage of counter-space capabilities. Although, these technologies were present during Cold War but today states are using them to manifest their hostilities towards each other.
ASATs or counter space capabilities are generally kinetic or non-kinetic with capability to target from Earth to Space, Space to Space or Space to Earth. Kinetic ASAT capabilities are visible and difficult to hide. Since 2007, different states have shown the ability to conduct kinetic ASAT missile test by destroying their own satellites, which resultantly left huge debris in outer-space. However, non-kinetic (physical and non-physical) counter-space technologies are also flourishing which include orbital threats, electromagnetic pulses, electronic warfare and laser beams. According to open-source reporting, space-faring states are developing non-kinetic counter-space technologies against each other. Examples of such incidents include the reports on US capability to jam Global Navigation Satellite Systems (GNSS) like GLONASS or Beidou in a small restricted area of operation, China reportedly successfully blinded the satellites in 2005 and 2006. In 2011, Iran also displayed its counter-space electronic warfare capabilities by destroying the US RQ-170 UAV, this claim was not confirmed by the US. Russia has also invested in electronic space capabilities such as ongoing development of electronic warfare capable aircraft to disable enemy communication and navigation has already developed laser based ASAT on the A-60 aircraft and designated jammers known as R-330ZH and R-381T2.
Cyber-ASAT is another counter-space capability which can be very damaging for space assets. Space satellite systems are made-up of complex and inter-mingled cyber systems, which comprises of hardware, software and digital component. Just like any physical attack on space based asset, cyber-attack also has the capability to undermine deterrence and cause massive damage, uncertainty and confusion. During a hearing, US military official went on record and stated that cyber threats are “no.1 counter-space threat”. According to the Consultative Committee for Space Data Systems most common counter-space cyber threats to the space segment, ground segment and space link communication segment are unauthorized accesses, spoofing, replaying, software threats, data corruption/modification, ground system loss, interception of data and insider threats due to social engineering. However, in extreme cases cyber-ASAT can completely control and destroy satellite, or some vital part of its operation and structure. A chance of cyber-attack happening to any space asset is way more than any kinetic hit. As cyber-attacks are widely accessible, cost-effective, can be deployed more easily, provide easy deniability and are difficult to attribute. On the top of it, cyber-ASAT are challenging to states because they happen at relatively faster speed, without any warning. Moreover, these threats have the capability to hide in plain sight till the critical moment. Due to the interdependence among the systems, whether they are civilian, military or strategic, cyber-attack on any satellite could adversely affect the communication, navigation, integrity of military operation and NC3 system of state. Cyber-ASATs are not some distant realities or a far-fetched idea, they are actually happening, and states are blaming each other for such attacks. Almost 10 years ago US issued a report titled “US-China Economic and Security Review Commission Report”, which stated that two of the US satellites were compromised in 2007 and 2008 via cyber-attack. The attack was regarded as alarming because hackers were managed to complete all the steps required to command the satellite, which means the hackers might have stolen the data and damaged the satellite.
Cyber-attacks on satellites can cause serious issues, if they tend to happen between neighboring hostile nuclear states. South Asia is a region where intense military modernization is taking place at a rapid speed between India and Pakistan. India has an advance space program in comparison to Pakistan’s space program. However, significant factor in this regard is that due to its ambitious foreign policy, India aspires to be a global power, which puts India face to face with China. Both countries have also fought a war on 2,100 miles long disputed border in Himalayas. Therefore, India most likely would try to acquire technological sophistication to ensure that its space assets would not remain vulnerable to Chinese counter-space cyber-attacks. India is expanding its space program very effectively and rapidly, this growth at the same time will increases the vulnerability of its systems to cyber-attacks. This need is well realized within the Indian policy circles and policy initiatives such as establishment of units to handle space and cyber warfare are undergoing. The cyber unit would be responsible for sharpening offensive capabilities, while space warfare unit would be responsible for protecting Indian space assets. Moreover, India and Japan decided to cooperate in the area of cyber security and outer space in the backdrop of growing cyber terrorism and India’s successful ASAT test. Moreover, in 2019 India conducted successful ASAT missile test in lower earth orbit. These developments show that India want to acquire ASAT capabilities and offensive cyber capabilities, which if joined together becomes a classic counter-force cyber capability. Focus of Indian policy makers towards cyber security is relatively new, which makes its military systems prone to cyber-attacks. Like its neighbor, Pakistan is also working to make itself more digitalize and secure its cyber systems. Space program of the country is at nascent stage and most of the space satellites are launched with the help of other countries, mostly China. To advance its space program Space Program 2040 was launched by Pakistan which includes points like establishment of ground stations and ancillary facilities for reception and use of data, establishment of satellite tracking facilities, launching of multipurpose satellites and development of satellites and satellite launch vehicles. Like India, not much is known about the extent of Pakistan’s offensive and defensive cyber capabilities. Pakistan has not formulated National Cyber Security Strategy, though it was presented to National Assembly of Pakistan in 2013.
Most of the reported attacks between India and Pakistan are of websites hijacking; however it would be unrealistic to believe that no other attempts are made or in future conflict/crisis situation both states will not retort to offensive cyber capabilities towards each other. In any such moment cyber-attack on any satellite to corrupt or modify the data or complete acquisition and destruction of satellite would severely undermine the existing deterrence by creating confusion and uncertainty. Due to increasingly blurring lines between peace and war time use of cyber-ASAT, both countries need to develop the resilience and security in their respective civilian, military and strategic systems. With the ongoing hostilities, it seems impossible that both countries might go for any confidence building measure in the near future. Thus, it is necessary that both states strengthen their systems and make some rules of engagement in this highly vague domain to avoid any major catastrophe.
Understanding the Balochistan Liberation Army: An Analysis of Emerging Trends
The latest turbulence surrounding the Pakistan-Balochistan dichotomy occurred on 28th June 2020 when four heavily armed militants stormed into the Pakistan Stock Exchange building in Karachi and killed three security personnel and a police officer. Although Pakistan’s immediate response was to direct the blame at its neighbouring nemesis (echoed in the comments of Prime Minister Imran Khan and Foreign Minister Shah Mehmood Qureshi) the real responsibility for the attack was claimed by the Balochistan Liberation Army (BLA). In light of the freshly erupted insurgencies, it is imperative to understand the contestation in Balochistan as well as the significance of the BLA.
Balochistan: A Land of Perpetual Anarchy
Nestled in the South Western section of Pakistan, Balochistan is a sparsely populated and a highly persecuted territory that covers only 43 per cent of Pakistan’s total area. Its geopolitical significance emanates from the presence of the regional neighbours –– Iran to the West, Afghanistan to the Northwest and the Arabian Sea to the South. Over the years, the region has culminated into a hub of international unrest. For the longest time, the Baloch province has been subjected to insurgencies, the roots of which trace back to the British departure in 1947. With its fate unknown and undecided, the then Baloch ruler, Khan of Kalat signed an agreement which granted a forceful accession of Balochistan to the Pakistani administration. The unrest has birthed a number of separatist groups over the years that have fought to diminish Pakistani hegemony in the region. The most significant among these groups is the BLA.
What is the Balochistan Liberation Army?
The BLA or the Balochistan Liberation Army is identified as one of the oldest insurgency groups organised in the Southwestern region of Balochistan, with its authority (Hyrbyair Marri) seated in the United Kingdom. The main objective of this group is to exterminate Pakistani influence from their country and establish a Greater Balochistan province by incorporating the Iranian and Afghani Baloch territories.
Regarded as an ethno-nationalist militant organisation, the BLA was formally instituted in 2000. Spread over the region with 6,000 cadres, the component group members of the BLA hail from the Marri, Bugti and Mengal clans. In the period between 1973 and 1977, that is identified as the ‘Independent Balochistan Movement’, the Baloch had engaged in two massive guerrilla wars against the Pakistani administration. The leaders of the Baloch movement have been claiming sovereignty over the Southeastern province and Northern Pashtun region. Although deemed as a terrorist organisation and banned by the United States, the BLA has once again re-appeared in the international domain. Having consolidated its base in Pakistan and Balochistan, the group is said to have been active since 2000 and is fighting against unequal allotment of jobs to Punjabis as compared to Balochi natives and mineral exploitation by Pakistan’s powerful provinces.
Epicentre of Exploitation
Balochistan is a region endowed with natural resources. Besides having a long coastline overlooking the Arabian Sea, it has an abundant collection of resources like coal, natural gas, oil, copper, zinc, lead and so on. The geostrategic importance of the region has drawn international attention towards the region and made it an epicentre of global contestation. However, the wide array of resources has contributed the least to the development of the Baloch province. What has agitated the Balochi separatist movements is Pakistan’s handing over of vast sections of the region to China for its million-dollar Belt and Road Initiative (BRI) project.
The low level of infrastructural development and lack of investment in the disputed zone has resulted in a low level of economic activities and hurt the province of Baloch on the fiscal front. Another case in point to argue for its geopolitical significance is the Gwadar port, that holds economic and geostrategic importance for Pakistan. In recent years, China has invested nearly $19 billion in the Gwadar port and other infrastructural developments in the Baloch province as a part of the China-Pakistan Economic Corridor (CPEC). Such developments have triggered a surge of unemployment in Baloch, where jobs are mostly handed out to workers from China and Pakistan. Only 8 out of 330 CPEC projects have been allotted to Balochistan. In fact, Pakistani security analyst, Muhammad Amir Rana has explained the province as ‘an environment of fear’ and one where journalists cannot intrude and report about local problems. Plundering activities carried out in the region by the Chinese have thus, given birth to anti-Chinese sentiments that have manifested itself several times in the form of attacks on Chinese targets such as the one in the Chinese consulate at Karachi in 2018 or the very recent bombing at the Pakistani Stock Exchange.
The Indian Angle: Where Does India Stand in the Balochistan Crisis?
Pakistan has since time immemorial, accused India of playing the Baloch card against it. The fact that stronger Indo-Baloch ties will be fundamental to Indian interest is well known. Balochistan has always looked at India as a potential ally in their war against Pakistani hegemony in their territory. The roots of the Indo-Baloch ties were further strengthened after Prime Minister Narendra Modi brought up the human rights issue in Baloch during his Independence Day speech on 15th August 2016. In spite of being a majorly Muslim province, the Balochis have always propagated the spirit of secularism. In fact, the Baloch leader Hyrbyair Marri asserted that Balochistan has closer ties with India as compared to Pakistan because the movement has never weaponised religion to win wars. The leaders demand Indian intervention to abolish atrocities meted out by Pakistan in the region. Marri observes that to counter Pakistan in their territory they need more than ‘India’s friendship, support and help’. They demand New Delhi to view Balochistan as an ally and contribute vehemently in stabilising the disputed zone. Such pro-India feelings among Balochis have convinced Pakistan’s Prime Minister Imran Khan to dismiss claims of the Majid Brigade of the Balochistan Liberation Army and instead hold India accountable for the very recent catastrophe at the stock exchange building in Karachi. Such accusations are not new. Earlier as well, Islamabad pointed a finger at India accusing it of facilitating the swift escape of the chief of Baloch Republican Party, Baramdagh Bugti to Switzerland. Moreover, during the Kulbhushan Jadhav case that was tried at the International Court of Justice, Pakistan hinted at India’s involvement in terrorism in the region.
For the longest time now, Balochistan has made headlines for the wrong reasons. What primarily characterises this fragile zone is perpetual violence and instability. The extraordinary economic and geostrategic significance has transformed it into a hub of conflicting interests. The Baloch history is testimony to global exploitation that emanates essentially from its abundant resources, extracted by countries to cater to their advantages. Furthermore, the Pakistani representation of a pro-Indian stance in Balochistan is just another provocation to its open-ended resentment towards India. Lack of reconciliation efforts will worsen the situation and stretch the civil war furthermore. A democratic transition in the province that is entirely in possession of Islamabad shall prove to be fruitful in addressing socio-economic issues that the people in Balochistan are subjected to. The long history of insurgency makes it fair to surmise that Balochistan favours political negotiation to counter Pakistani marginalisation and aggression. Therefore, brutal repression of interests by military means coupled with a reluctance to accommodate the political interests will cause the insurgency to linger around for a longer time. Secondly, reducing and balancing complexities in this volatile region also calls for global cooperation.
Several instances across the world have proved how international backing to internal animosities has been effectual—such as the Houthi rebels looking up to Iran in their battle against the internationally recognised Yemeni government or Erdogan pledging Turkish support to Pakistan on its Kashmir stance. Emerging trends in a COVID characterised world order have fuelled anti-Chinese perspectives in many countries that blame it for its failure to contain the spread of the virus. This acts as the US trump card to not only enter into the ‘Baloch game’ but also stand true to its antagonism towards China. As far as India is concerned, the Baloch province has routinely regarded India as an ally in their fight against Pakistan. Moreover, recent engagements with PLA troops along the Indo-China periphery have already propelled anti-Chinese sentiments in the country. Therefore, Indian involvement in Balochistan legitimises the possibility to counter both Pakistani and Chinese aggression in a single stroke. Appeasement of the distressed region, both regional and international shall help to surmount the insurgency to some extent, if not eradicate it wholly.
Stay Home, Stay Unsafe: The Violent Fallout of Lockdown on Women
Authors: Prateek Khandelwal and Nikhil Hans* The unprecedented crisis of COVID-19 led to a worldwide shutdown. The “locked’ world aims...
Hong Kong Developments: India’s Tactical Punch To China
Hong Kong’s National Security Legislation: A Brief Overview A new wide-ranging Security Law was passed by China for Hong Kong...
Korea: Keep supporting people and the economy until recovery fully under way
Korea has limited the damage to its economy from the COVID-19 crisis with swift and effective measures to contain the...
Evolving Japan-UAE ties
Japan and the UAE share a unique relationship with each other. Japan recognised the UAE as an independent state in...
An alarming surge in illegal wildlife trade in Southeast Asia
With a recent purge by American social media giant Facebook on advertisements for the illicit sale of animals in Yangon,...
Covid-19 Outbreak: A Compromise on Gender Equality
The pandemic has without doubt affected men and women in a different manner. It has resulted in affecting adversely the...
Japan’s Security Environment in Asia Pacific: A Tragic or Misery
Authors: Mehtab Ali Bhatti and Kainat Akram* The security threats can be to a great extent partitioned into two groups;...
Eastern Europe3 days ago
In The Bends And Labyrinths Of Civilizations
East Asia2 days ago
Filing of a petition with ICC: Beginning of Uighurs’ legal battle against China
Africa3 days ago
Russia’s Lukoil Finds A New Home In Senegal
Diplomacy2 days ago
Blue Gold: An Emerging Source Of Global Conflicts
South Asia2 days ago
The New Axis, the Mapolitics and South Asia: The Indian View
East Asia2 days ago
Changing equations of US-China relations and Taiwan Factor
Africa2 days ago
Paying Tribute to Mother Teresa of Somalia, Late Dr. Hawa Abdi
International Law2 days ago
Civic and Ethnic Nationalism in a Populist World: Behind the Facade of Dichotomies