Connect with us

Intelligence

Beijing’s Export of Surveillance Technology

Published

on

How would you feel if your every move and decision were being tracked, recorded, and ranked? Nobody really wants a camera to follow them everywhere they go. Welcome to China where the Chinese government is experimenting a new system of surveillance as part of its overt and covert expansion of government intervention and surveillance. Alarmingly, this surveillance system is increasingly showing up all around the world.

China is widely expanding its surveillance network to strengthen and maintain vigilance of its entire populous by tracking peoples’ movements through cellphones and monitoring content of telephonic conversations and emails. Attempts by the government to transform the internet into a system of surveillance and censorship represent a fundamental threat to media freedom and democracy at large.

Cities in China are under the heaviest CCTV surveillance in the world, according to a new analysis by Comparitech, which provides information for research and comparative analysis of tech services. It has been widely reported that China today has about 200 million CCTV cameras in use, a figure predicted to rise 213% by 2022 to 626 million. China is projected to have one public CCTV camera for every two people. However, the Comparitech report suggests the number could be far higher.

These monitoring systems are tighter and heavier handed in Tibet.

Another striking corroboration of China’s sophisticated surveillance system is the widespread use of highly advanced cameras with artificial intelligence which have facial recognition system and can estimate people’s age, ethnicity and gender. These cameras can run recognition systems that match you with your relatives and your associates and within no time pull out a list of people you frequently meet. These invisible eyes that follow you, wherever you go and whatever you do make you suffocated and generate a strong and lasting sense of fear.

The Chinese government admits that the technology using facial recognition, body scanning, and geo-tracking are matched with personal data to keep tab on people in real life and online. Their master plan is to use these technologies as the backbone of their nascent social credit system.

Social credit system

Since Xi Jinping tightened his power grip on technology and surveillance many new notorious strategies to suppress the freedom of expression have been implemented. These include the introduction of new cyber security law, the launch of Cyberspace Administration of China (CAC) and the initiation of a social credit system – a score-based system relying on the adoption of desired behavior based on social merit. This system both punishes and rewards key behaviors through a range of initiatives such as public shaming, travel bans, limited or extended business opportunities, and favorable or devalued credit ratings. The ultimate goal is to hammer into citizens the idea that “keeping trust is glorious and breaking trust is disgraceful”

The point system citizens will incentivise lawfulness, integrity, and trustworthiness with real time impacts on what citizens can and can’t do. Perks like good behavior could lead to privileges of faster internet services, travel ticket booking convenience in flights and trains, and even concessions on advance deposits for renting cars and booking hotels. Having a low social credit score could mean restrictions on traveling, refusal of passport, difficulty in getting employment and being publicly shamed among others.

China’s National Public Credit Information Center reported that it had cancelled airline tickets of 17.5 million people due to their unproductive scores and 5.5 million were barred from booking train tickets in 2018 because of low social credit scores.

China’s technological power grip around the world

For the Communist Party of China the key motive for gathering, analyzing and evaluating data is to preempt and uncover any threat to the social and political stability of its iron grip on China. It is indeed for the first that a government is employing highly advanced technology to expand internet surveillance and censorship to maintain the stability of own rule. China uses surveillance technology to spy on human right defenders, dissidents, and lawyers, deny freedom of speech and subvert anti-communist party campaigns. This abuse of technology fundamentally undermines democracy and threatens human rights.

According to the People’s Daily, the party-owned largest newspaper group in China, the Chinese capital of Beijing is now completely covered by surveillance cameras that watch over “every corner of Beijing city”.

Authoritarian governments across the globe are acquiring state of the art technologies to repress dissent at a rapid pace. For construction of “Smart Cities” in Pakistan, Philippines and Kenya, Chinese companies including Huawei and ZTE are involved in supplying extensive built-in surveillance technologies. Bonifacio Global City in the Philippines outfitted by Huawei has internet-connected cameras that provide “24/7 intelligent security surveillance with data analytics to detect crime and manage traffic.”

Surveillance built with loans from the Chinese Government

Chinas export of surveillance technology began in 2008 during the Beijing Olympic where it marketed its surveillance mechanisms and ‘solutions’.  Prior to the Olympics, 300,000 new cameras were installed in the capital. China then invited many foreign officials to observe the effectiveness of its new authoritarian technologically advanced tools. Since then, the Party has exported its ‘solutions’ to many countries with severe human rights records including but not limited to Ecuador, Venezuela, Ethiopia, Pakistan, Kenya, Iran, and Zimbabwe.

China’s collaboration with authoritarian governments across the globe to build large-scale surveillance systems has given rise to global threats to free speech and privacy.

In his research, Prof. Steven Feldman from Boise State University’s School of Public Service found that China is exporting AI-equipped surveillance technology to at least 54 countries around the world with government types ranging from closed authoritarian to flawed democracies”

With China’s help Ecuador now has a new surveillance system, ECU-911 meant to expand automated policing and reduce crime rates. This $200 million deal was jointly signed by China’s State-controlled C.E.I.E.C and Huawei, and funded by Chinese loans in exchange for Ecuador providing them with their principal export, oil. Ecuador’s surveillance systems were not only made in China, but were installed by Chinese companies and workers. Chinese even trained the Ecuadorians how to use it.  

China’s export of advanced technologies is a show of strength and capability to the world. It represents the country’s ability to compete with established powers (notably the US) in important sectors, reducing dependency and promoting self-reliance. However, Chinese companies often lack transparency and, most importantly, are without a doubt subordinate to the Chinese Communist Party.

The seriousness of the perceived security threats from Chinese technology companies is evident from the US’s notable restriction or outright prohibition of companies such as Huawei. The US has also encouraged its allies to do the same. Australia, Great-Britain, New-Zealand, the US, and Canada have all adopted measures to restrict the use of Huawei devices and Chinese infrastructure. 

Security implications of the export of Chinese surveillance systems

Under President Xi Jinping, the Chinese government has vastly extended domestic surveillance, fueling a new generation of companies that make sophisticated technology at ever-lower prices. With China’s global outreach, the domestic systems are spreading far and wide.

Loans from Beijing have made surveillance technology available to governments that could not have previously afforded it. Adding to this lucrative deal is China’s total lack of transparency and accountability of its use. This rapid development and export of China’s surveillance equipment is helping strengthen a future of tech-driven repression, potentially leading to the loss of privacy.

CCP’s export of surveillance systems to willing governments around the globe has given rise to significant national security risks for individual states as a result from their extensive reliance on and cooperation with Chinese state-owned enterprises or CCP member-owned firms in key infrastructure development projects and expansion of the state security apparatus. These high-tech exports including 5G infrastructure, fiber optics, and telecom equipment aid China’s rapidly rising control and influence over its trading partners. Ultimately, these strategic moves could lead up to China’s goal of strengthening its internet sovereignty, securing its position as a great global power; widen its sphere of influence particularly in South-East Asia and Africa with the help of the Belt and Road initiative (BRI), promote its economic dominance, and provide an alternative to the United States and its allies.

The advent of modern technology in China granted the government, particularly under President Xi Jinping’s leadership, the opportunity to innovate, the expertise to initiate and the free-hand to implement modern surveillance technologies. This new and extremely effective combination of state control apparatus has proven to be incredibly valuable for the Party in tightening security measures, assuring its long-term survival, shaping public opinion, and suppressing resistance.

CCP’s evolving surveillance strategies in Tibet

The iron curtains on Tibet have been shut for a long time and the entire region is off limits for free and independent visits of international media, journalists, advocates, researchers and government and civil society representatives. The highly repressive situation inside Tibet makes it difficult to understand the scope of digital surveillance in the region. Over the years, China’s surveillance system in Tibet has been growing and evolving at an unprecedented scale. The abundance of manned and unmanned checkpoints, AI, CCTV camera networks and re-education centers under the garb of national security have added another layer of control to an already extremely controlled and oppressed environment in Tibet.

Furthermore, the CCP is constantly upgrading its ‘Great Firewall of China’ to monitor and limit online and offline traffic by creating its ‘own’ internet and limiting access to the ‘traditional’ web. Chinese authorities in Tibet are offering large cash rewards to informants in a bid to stamp out online ‘subversive’ activities curbing free flow and dissemination of information. According to a notice issued on Feb 28 by three government departments of the so called Tibet Autonomous Region information leading to the arrests of social media users deemed disloyal to China can fetch up to 300,000 Yuan ($42,582). People sharing political contents or commentary deemed sensitive they face arrest and heavy criminal penalties.

Surveillance in Tibet and Xinjiang have been widely known as “Orwellian.” In addition to the traditional security surveillance apparatus of the military, police, and neighborhood spies, modern surveillance technologies have been specifically developed and tested in these regions. According to human right reports, tight security measure currently being practiced in Uyghur to suppress the resistance movement were previously successfully developed and practiced in Tibet by Chen Quanquo, TAR’s then party secretary. Following his highly suppressive policies in Tibet, Chen was appointed the party secretary in Xinjiang and continues to be the chief architect of the massive surveillance and mass detention systems in the region.

Spring 2008 witnessed the historic and widespread uprisings in Tibet against China’s rule which were followed by a series of self-immolations by 153 Tibetans demanding the return of His Holiness the Dalai Lama and freedom in Tibet. These protests prompted China to maximize and fast track the scope and intensity of its security surveillance both in the number of security personnel and digital technology. In January 2012, the central government introduced a new surveillance system called the “grid system of social management”.In preparation of the implementing the new system, cadres in plainclothes were deployed in every Tibetan village and monastery. The campaign ironically called “Benefit the Masses” involved sending some 21,000 communist party cadres from townships and urban areas to live in teams of four or more in each of the 5,000 villages in TAR. Authorities expanded their network of small police posts known as “convenience” stations to every 200-300 meters in urban areas, to quickly respond to any threat. In 2016, a total of 696 convenient police check posts were newly set up.

New digital surveillance efforts include mandatory collection of DNA samples, Wifi network monitoring and widespread implementation of facial and voice recognition to all connected and integrated data analysis platforms. According to Wall Street Journal’s study of police department documents from across China, the Chinese authorities plan to double their current DNA trove to 100 Million records by 2020. DNA sampling of Tibetans on the Tibetan plateau is widespread under the guise of mandatory medical check-ups aimed at controlling the movement of Tibetan people and further restrict their freedom.The author’s interviews with recent arrivals from Tibet confirmed that beginning in July 2013 Tibetans in cities and villages are being asked to undergo free medical checkup and blood samples have been collected.

Tenzin Tsultrim, a researcher at Tibet Policy Institute based in India believes that China might extend its profiling of DNA samples to even foreign tourists, including Tibetans from India and western countries, visiting Tibet.

Also, CCP’s security spending has increased exponentially since 2008. Germany based researcher Adrian Zens has reported that TAR “has had the highest per capital domestic security expenditure of all provinces and regions.” In 2016, per capita domestic security expenses in Sichuan province’s Tibetan regions were nearly three times higher than Sichuan province as a whole”

The author expressed concern over China’s intention to launch Huawei 5G networks in Tibet, which would make it easier to deploy sensors and enable quick transfer of high volumes of data for real-time analysis. Companies facilitating digital surveillance in Tibet include Alibaba, search provider Baidu, chat app operator Tencent holdings, voice recognition company iFlyTek and facial recognition system Sense Time. State subsidies and other government privileges make Tibet a lucrative market for these businesses to invest and employ their latest technologies. Companies operating in Tibet enjoy a highly reduced tax rate of 9% compared to the standard cooperate tax rate of 25% for the rest of China.

Conclusion

The non-transparent and unchecked export and adoption of China’s highly advanced technologies to foreign markets represent severe intelligence and security threats, especially when integrated directly to national security and surveillance apparatuses. China has successfully put at risk the safety and security of dissidents and activists all over the world and strengthened rouge and undemocratic regimes with its export of surveillance technologies.

Another serious danger for states adopting Chinese technologies is their over reliance on foreign technology to run and manage core government systems thus representing a risk to their very sovereignty. CCP has not only been proliferating its methods through free or subsidized hardware, AI technology and training, but has also been gaining insights and direct connection to the information stream of partner-states.

Surveillance information stream can be realistically used in two ways as targeted micro information to gain leverage on important targets and as a means to gather and employ big data; the use of which is essentially endless. In this sense, there is little to no transparency nor accountability and imposes a very high-security threat.

Exporting the surveillance model is also a strategic move by the CCP’s to further test its model, apply it in variable contexts, and gather additional data and intelligence. The Party gains a direct access into partner-states information stream; advantageous information about markets, business opportunities, important actors, etc. and even possibly sensitive information that could be used to persuade or coerce important actors on local or international matters.

The widespread implementation of surveillance, leading to the intrusion of one’s privacy, may become a cause for further unrest in restrictive states. The absence of freedom and opportunities for people to vent their grievances will most likely expound hatred leading to even more collective anger and dissent among suppressed groups.

Inside Tibet, over the last decade, the “nets in the sky and traps on the ground” have further suppressed the fundamental freedoms of expression, movement and assembly. New and highly advanced technologies have given unrestricted and illicit power to the state security apparatus to intensify and escalate mass surveillance. Checkpoints with smart surveillance and facial recognition are present in cities and at crossings between neighboring districts and provinces. Tibetans inside their homes are tracked through their phones and once they step outside surveillance and facial recognition technologies follow them wherever they go. This is the reality of today’s Tibet and if the free world is unwilling to restrict the import of China’s technologies, this could be your reality tomorrow.

Research Fellow Tibet Policy Institute Central Tibetan Administration Dharamshala, Distt. Kangra

Continue Reading
Comments

Intelligence

Coronavirus: Bioterrorism or Not, Who Is the Winner?

Sajad Abedi

Published

on

Authors: Sajad Abedi and Mohammad Amin Zabihi*

It has been so long since the early instances of using toxins, chemicals, and diseases as agents of assassinations and/or even mass murder. There are numerous historical and even modern instances of using toxins in assassinations, or using contagious diseases in warfare without even knowing about the bacteria or virus. For example, (allegedly) the first registered event of such method goes back to 14th century when Tatar army, desperate to win after three years of siege, threw corpses of plague victims to the Caffa city[1], causing an outbreak of this disease within the city. But the most important part happened afterwards; some soldiers could manage to escape on boats – Caffa was a port city on the Crimea Sea – to Italy, unaware of the fact that they were already infected. Nevertheless, most of them died along the way, but infected rats and remaining bodies caused one the major waves of plague pandemic[2] all over the Europe.

The paramount point is that in our modern world, it is just a matter of hours to leave New York and land somewhere else, thousands of miles away, even before the first symptoms of your disease manifest itself. In fact, the most horrifying factor of any contagious disease could be its latent period.

On the other hand, considering the unprecedent pace of ever-growing biological technologies, many developed countries possess the ability to develop an intelligent virus equipped with customized features in order to remain unnoticed on the victim’s (vector’s) body for quiet a time, and only manifest itself after it infected a considerable number of surrounding people. More interestingly, such customized virus can be planned whether to disable a specific organ or to metastasize within the whole system of the host. Even more, it can be planned according to the genetic map of people within a given region.

Looking at the whole picture with broader perspective, it does not matter whether the agent is toxic, chemical, or biological. The capability to produce and employ a virus, bacteria, or toxin by malicious actors, namely terrorists or criminals, could bring disastrous results.As we witnessed such case during 1990s in Japan – the Aum Shinrikyo Cult.

In fact, if we are going to prevent such disasters, first we should find the potential actors who may resort to such actions, investigate the probable ways, and also understand the costs, benefits, motives, and risks of which for these potential actors.

Of course, terrorists and criminals are the first probable examples which may pop up in our minds, but looking more rigorously, state actors are also among the potential cases. In the case of Coronavirus outbreak, if one considers it as an instance of bioterrorism/biological-war act, the probability of participation of terrorist or criminal organizations seems to be low, due to the complexity of production process and the highly advanced technologies required to produce such virus at the first place. On the other hand, a terrorist organization typically claims the responsibility of such attack in order to earn the reputation, and a criminal organization may demand ransom prior to release the virus – otherwise it would not be beneficial, unless they already have the cure (vaccine/antidote) ready to sell. In any case, it doesn’t seem probable. 

Considering the fact that, in the case of a pandemic, finding the main cause and the zero patient in this complex, interconnected world is significantly difficult (if possible), state actors may resort to such options due to multiple reasons. They may try to initiate a hidden biological war against another country (countries), in order to cause economic interruptions, socio-political chaos, create power vacuum in a specific area, forcing another actor to leave a region, or just simply to enjoy the economic benefits of selling the vaccine or antidote to victims. Obviously, there will be some serious prosecutions and consequences in the case that some concrete evidence shows any tracks of participation of an actor – whether a sovereign state or even a pharmaceutical company; but in such cases, states usually start to throw allegations at each other anyway.

We are living in a world that any kind of news affect the open markets immediately; the more important the news is, the deeper it affects the markets. In this case – Coronavirus – we witnessed a serious drop in international stock markets –especially oil markets – all over the world, which coincided with Russia’s ambivalence approach regarding the cutting supply decision made by OPEC – and also Saudi Arabia’s reaction to the whole story. Altogether, these factors caused a serious drop in different markets which, in fact, started with the news of Coronavirus outbreak at the first place. Who gets the best use of such scenario? The oil and gas producers are the main victims, obviously; but if one (the alleged perpetrator) knows the whole story before it happens, he would sell at the highest price and buy at the lowest price again – after the price crash, president Trump ordered to stock up the US oil reserves.

Although it seems pretty convincing, but is it really rational? What are the risks and costs? In reality, the pandemic of a dangerous virus – one like Coronavirus – equipped with a two-week latent period, in a high-populated country like China can cause sever problems in almost every corner of the planet; in fact, the bigger economy you have, the deeper your challenge would be. The implications of such outbreak are considerably wide: (1) it causes decrease in oil prices which will result in budget deficits in oil-dependent countries – like Russia, Iran, Saudi Arabia; (2) it interrupts the production process and consequently the sale chains – like China; (3) reduces the tourists travels which will consequently result in budget deficits in tourist-dependent countries – like Turkey and most of EU; (4) it causes sever socio-economic costs, especially for populated countries – like China, US, and Russia.

Altogether, if one state actor decides to initiate a biological war against another state, using a virus agent which has the potential to cause a global pandemic, it should consider the possibility of backfiring the same gun inside its own country in numerous ways. In an interconnected world like the one we are living in, such actions cause gargantuan reactions in different ways, one may not be able to predict all of them. Considering such costs and also the risk of being traced back and accused of committing such horrifying act, the possibility of state-sponsorship in these cases will be considered relatively low (but still possible). It is not like creating a computer virus – like Stuxnet – that may or may not blow back to your face; it is the matter of people’s lives. 

*Mohammad Amin Zabihi, MSc. Regional Studies, Allameh Tabatabaei University


[1] Nowadays it is Feodosia, Ukraine 

[2]Also known as Black Death

Continue Reading

Intelligence

The Prospect of Bioterrorism: The Threat of Pathogen, Biting Insects and Dirty Bomb in Europe and UK

Published

on

The recent coronavirus attacks authenticate my postulation of the intensification of bioterrorism in Europe and Asia in 2020. The blame game between Washington and China further prompted misunderstanding about the hegemonic role of the US army that it wants to mitigate the future role of nuclear weapons and missile technology in peace and war. Chinese Ambassador was summoned in Washington when Foreign Ministry in Beijing tweeted that the deadly coronavirus was seeded in Wuhan by the US military. US President Donald Trump also called Covid-19 a “Chinese” and “foreign” virus, earning condemnations not only from Beijing but also from much of the mainstream media. However, China categorically stated that the coronovirus attack was a hybrid war against its economy and industry. Moreover, initially, Iranian officials also declared that the coronavirus was a biological weapon created in US military laboratories. Some state in Europe demonstrated weakness in fighting the Coronavirus war against their population.

Italy and France have been irritated in overcoming the death rate from the disease, while the British Prime Minister become frustrated in changing his controversial approach to the pandemic spread across the country. On 22 March 2020, the Guardian newspaper reported frustration of Downing Street about the shameless statement of controversial adviser to the Prime Minister Boris Johnson, Dominic Mckenzie Cummings, who argued in a private meeting that the government’s strategy towards the coronavirus was “herd immunity, protect the economy and if some pensioners die”. The allegations, which were widely circulated online widely criticised that the government response to the Coronavirus was initially too weak, frustrated and controversial based on a notion that rather than limiting its spread, enough people could be allowed to contract it to give population-wide “herd immunity”. Dominic Mckenzie Cummings was born 25 November 1971 is a British political strategist who has been serving as Chief Adviser to Prime Minister Boris Johnson since July 2019.

Since 9/11, the threat of nuclear and biological terrorism has been at the forefront of the international security agenda. Bio terror experts have stressed the need on prevention of terrorist groups operating in Europe and the UK from gaining access to weapons of mass destruction and from perpetrating atrocious acts of biological terrorism. Recent events in Europe have raised the prospect of extremist and jihadist groups using biological, radiological and chemical attacks against civilian and military installations. The greatest threat to the national security of Europe and the UK stems from smuggling of material of dirty bomb, pathogen and smuggling of biting insects. As international media focused on the looming threat of chemical and biological terrorism in Europe, extremist and jihadist groups are seeking these weapons to inflict fatalities on civilian population.

Bioterrorism is terrorism involving the intentional release or dissemination of biological agents. These agents are bacteria, viruses, fungi, or toxins, and may be in a naturally occurring or a human-modified form, in much the same way in biological warfare. Biological agents are used by the terrorists to attain their social or political goals and are used for killing or injuring people, plants and animals. Response of Europe to the threat of future bioterrorism seems limited due to political and economic reservations of some member states. The approach to searching for biological agents at airports and shipping container entry points, and promoting bio-hazard awareness raised several important questions. Biological terrorism can be loosely categorised based on the agent used. The virus threat including smallpox, influenza, dengue fever, yellow fever, Rift Valley fever, and haemorrhagic fevers like Lassa, Ebola, and Marburg. Smallpox spreads directly from person to person. The third category of bio-threat is ‘bacteria’, which includes anthrax, plague, and cholera. There are numerous reports on the genetically development of viruses by some states to use it and achieve their political and economic goal.

One of these reports on insect war is the investigative report of Bulgarian investigative journalist and Middle East correspondent Dilyana Gaytandzhieva (12 September 2018), who published a series of reports. Her current work focuses on war crimes and illicit arms exports to war zones around the world. The Alternative World Website and Zodlike Productions, a news forum has published her fresh analysis of future insect war. She has painted a consternating picture of US insect war in her investigative report, and warns that the prospect of biological terrorism is consternating:

“Pentagon’s scientists have been deployed in 25 countries and given diplomatic immunity to research deadly viruses, bacteria and toxins at US military offshore biolaboratories under a $2.1 billion DoD program. The US Embassy to Tbilisi transports frozen human blood and pathogens as diplomatic cargo for a secret US military program. Internal documents, implicating US diplomats in the transportation of and experimenting on pathogens under diplomatic cover were leaked to me by Georgian insiders. According to these documents, Pentagon scientists have been deployed to the Republic of Georgia and have been given diplomatic immunity to research deadly diseases and biting insects at the Lugar Center–the Pentagon biolaboratory in Georgia’s capital Tbilisi. In 2014, The Lugar Center was equipped with an insect facility and launched a project on Sand Flies in Georgia and the Caucasus. In 2014-2015 sand fly species were collected under another project “Surveillance Work on Acute Febrile Illness” and all (female) sand flies were tested to determine their infectivity rate. A third project, also including sand flies collection, studied the characteristics of their salivary glands. Sand flies carry dangerous parasites in their saliva which they can transmit to humans through a bite”.

With the establishment of Islamic State ISIS in Syria and Iraq, Pakistan and Afghanistan, and its secret networks in Europe, international community has now focused on the proliferation and smuggling of chemical and biological weapons in the region. Recent debate in Europe-based think tanks suggests that, as the group retrieved nuclear and biological material from the Mosul University in Iraq, it can possibly make Nuclear Explosive Devices (NED) with less than eight kilogrammes plutonium. The debate about bioterrorism and bio-defence is not entirely new in the military circles of Europe; the involvement of ISIS in using biological weapons against the Kurdish army in Kobane is a warning for the UK and European Union member states to deeply concentrate on the proliferation of these weapons in the region.

  As Islamic State ISIS now controls parts of Iraq and Syria and has carried out successful attacks in France, Germany, UK and Brussels, the group now wants to expand its terror networks to the borders of Russia and China. According to some confirmed reports, hundreds of Pakistanis have joined the army of ISIS in Syria and Iraq, while a women brigade of the ISIS army is operating in Pakistan. The problem of nuclear and biological terrorism deserves special attention from the EU and UK governments because experts warned that the army of ISIS has retrieved capabilities to develop a dirty bomb in which explosives can be combined with a radioactive source like those commonly used in hospitals or extractive industries. The use of this weapon might have severe health effects, causing more disruption than destruction.

In Europe, there is a general perception that ISIS has already used some dangerous gases in Iraq, and it could use biological weapons against civilian populations in UK and EU. If control over these weapons is weak, or if their components are available in the open market, there would be huge destruction in the region. In July 2014, the government of Iraq notified that nuclear material had been seized by the ISIS army from Mosul University. The ISIS published a 19-page document in Arabic on how to develop biological weapons, and a 26-page religious fatwa that allows the use of weapons of mass destruction. “If Muslims cannot defeat the kafir (non-believers) in a different way, it is permissible to use weapons of mass destruction,” warns the fatwa.

The effects of biological weapons are worse as they cause death or disease in humans, animals or plants. The fatalities of dengue and ebola viruses in West Africa are the worst forms of bioterrorism. There are speculations that, in future, measles, dengue, polio and the ebola viruses can be used as weapons of bioterrorism in Europe and the UK. Some states might use drones for the purposes of bio-war against their rival states. In 2013, writing in the Global Policy journal, Amanda M Teckman warned that ISIS might possibly use ebola as a weapon against the civilian population: “It remains to be seen if a terrorist group like ISIS, which has demonstrated a willingness to engage in large scale mass murder, including the uninhibited murder of civilians, has the capability to produce a weaponised version of ebola.”

Debate among the European Union intelligence experts normally starts with the assumption that without a professional intelligence analysis on law enforcement level, prevention of bioterrorism is impossible. In the wake of the terrorist attacks in Brussels, security experts raised the question of intelligence-sharing failure, which caused huge infrastructural destruction and the killings of innocent civilians. Terrorists killed more than 34 innocent people and injured over 200 in Brussels. The failure of French and Brussels intelligence agencies to tackle the menace of extremism and the exponentially growing networks of the Islamic State (ISIS) prompted a deep distrust between the law enforcement agencies and civil society of the two states. The French and Belgium intelligence infrastructure also suffered from a lack of check and balance. This huge intelligence gap has badly affected the intelligence cooperation with other EU member states. The Belgian Foreign Minister warned that more intelligence on home-growing extremism was a must after the EU secret agencies came under heavy criticism immediately after they failed to share intelligence with France about the Paris attackers. French Interior Minister complained that no information about possible attacks was provided by EU secret agencies.

Continue Reading

Intelligence

Cybercrime effecting banking sector/economy of Pakistan

Published

on

Cyber-crime is not a conventional offence as its ramifications transcend borders.  It affects a society in different ways. The term “cybercrime” denotes any sort of illegal activity that uses a computer, cell phone or any other electronic device as its primary means of commission. The computer and electronic devices serve as the agents and the facilitator of the crime. Cyber criminals take full advantage of obscurity, secrecy, and interconnectedness provided by the internet and are able to attack the foundations of our modern information society. Breaching of cyber space is an issue of utmost concern for the banks and financial institutions. The menace of data theft is growing in magnitude with huge financial impact. As custodian of highly valuable customer information, banks have always been the favorite target of the cyber-attacks.

Moreover it is estimated that banks are more frequently targeted by the hackers than any other business organization. IT based financial solutions of the banks such as ATMs, mobile banking and internet banking are exposed to various forms of frauds including skimming and phishing etc. Affected banks may also witness decline in their share prices. Banking industry is more susceptible to the breach of cyber security due to its financial lure for the transgressors. In Pakistan, banking is increasing its user base at a brisk pace; the resulting threats are also multiplying. Financial services in Pakistan i.e. credit cards, accounts information and other, can also be acquired for theft or fabrication. During last few years Pakistan faced some serious cyber breaches in the banking sector. In 2018 it lost US $6 million in cyber-attacks as online security measures failed to prevent breach of security in which overseas hackers stole customer’s data.Data from 19,864 debit cards belonging to customers of 22 Pakistani banks has been put on sale on the dark web, according to an analysis conducted in year 2018 by Pakistan’s Computer Emergency Response Team, PakCERT.

However Cyber breaches of January 24 and January 30, 2019 included such data in large quantities pertaining to bank Meezan Bank Ltd. Gemini Advisory; a body that provides guidance with addressing emerging cyber threats stated that the compromised records posted between January 24 and January 30, 2019 is associated with a compromise of Meezan Bank Limited’s internal systems. Cyber security company “Group-IB”on  a February  22,2019  in advisory stated that money mules use the fake cards, to either withdraw money from ATMs or buy goods” that are later resold by fraudsters. Despite efforts of banks to eliminate ATM card fraud, criminals still find ways around security measures to acquire card data at the point of sale.

The impact of a single, successful cyber-attack can have far-reaching implications including financial losses, theft of intellectual property, and loss of consumer confidence and trust. The overall monetary impact of cyber-crime on society and government is estimated to be billions of dollars a year. While, the banks in Pakistan claim that they have insurance policies, they do not seem much interested in securing their system and the public remains highly affected by such attacks. There is growing sense of distrust in the online banking. Several banking organizations fail to provide proper insurance to their customer. That is why people are more comfortable in keeping their money and reserves at home rather than banks. This is one of the major factors that add to country’s severe economic decline.

Pakistan needs to develop its cyber capabilities infrastructure and should invest in the youth to build a cyber security force of young experts. Simultaneously, there is a need to focus on artificial intelligence, block chains and software robots as suggested by Chief Technology Officer Huawei (Middle East and European Union) Jorge Sebastiao in the recent international seminar on Global Strategic Threat and Response (GSTAR). Establishing a stronger cyber infrastructure will provide stronger security guarantees to the IT enabled services especially to the banking systems of Pakistan. This will in turn enhance the economic growth and security. Furthermore, the transnational nature of cyber-crime makes cyber-security a global challenge and, hence, demands collective and collaborative measures at the international level with flawless and strong legal and cyber policy framework.

In this regard, Pakistan’s cyber-law provides for ‘international cooperation.’ It has the membership of the International Multilateral Partnership against Cyber Threats (ITUIMPACT) and participates in Asia Pacific Security Incident Response Coordination Working Group (APSIRC-WG). However, cyber-security does not appear to be a priority on the country’s agenda for international dialogue and agreements.  Pakistan needs to review the Prevention of Electronic Crimes Bill which will contribute mainly to increase the security of banking systems.

Continue Reading

Publications

Latest

Newsdesk1 hour ago

Mongolia: World Bank Mobilizes $2.2 Million to Strengthen Medical Diagnostic Services

The World Bank mobilized US$2.2 million to help strengthen Mongolia’s hospital services in the wake of the COVID-19 pandemic. The funding...

New Social Compact3 hours ago

Reasons Behind Women Inequality in Pakistan

There is much availability of literature that portrays the issues of women inequality along with explaining the suffering of women...

New Social Compact5 hours ago

Covid-19 Might not be the End

The world seems to be oblivious when it comes to the non-traditional security paradigms hence certain natural cycles repeat overtime....

Newsdesk7 hours ago

Peru Will Receive US$ 50M from the World Bank to Strengthen Key Social Protection

The World Bank Board of Directors today approved a US$ 50 million loan to strengthen key policies and strategies to...

Newsdesk9 hours ago

AIIB To Scale Up Public Health Infrastructure in Wake of COVID-19

Recognizing that countries with fragile infrastructure have less capacity to handle health crises, the Asian Infrastructure Investment Bank (AIIB) is...

South Asia11 hours ago

Pakistan is striving enthusiastically to quell the COVID-19

International cooperation has become necessary for the nations across the globe, to defeat the Coronavirus pandemic -an invisible enemy. For...

Americas13 hours ago

Coronavirus is Trump’s most important electoral rival

The Earth is intertwined with space in various group, ethnic, religious, national, and other forms. National spaces within countries are...

Trending