Connect with us

Intelligence

Beijing’s Export of Surveillance Technology

Published

on

How would you feel if your every move and decision were being tracked, recorded, and ranked? Nobody really wants a camera to follow them everywhere they go. Welcome to China where the Chinese government is experimenting a new system of surveillance as part of its overt and covert expansion of government intervention and surveillance. Alarmingly, this surveillance system is increasingly showing up all around the world.

China is widely expanding its surveillance network to strengthen and maintain vigilance of its entire populous by tracking peoples’ movements through cellphones and monitoring content of telephonic conversations and emails. Attempts by the government to transform the internet into a system of surveillance and censorship represent a fundamental threat to media freedom and democracy at large.

Cities in China are under the heaviest CCTV surveillance in the world, according to a new analysis by Comparitech, which provides information for research and comparative analysis of tech services. It has been widely reported that China today has about 200 million CCTV cameras in use, a figure predicted to rise 213% by 2022 to 626 million. China is projected to have one public CCTV camera for every two people. However, the Comparitech report suggests the number could be far higher.

These monitoring systems are tighter and heavier handed in Tibet.

Another striking corroboration of China’s sophisticated surveillance system is the widespread use of highly advanced cameras with artificial intelligence which have facial recognition system and can estimate people’s age, ethnicity and gender. These cameras can run recognition systems that match you with your relatives and your associates and within no time pull out a list of people you frequently meet. These invisible eyes that follow you, wherever you go and whatever you do make you suffocated and generate a strong and lasting sense of fear.

The Chinese government admits that the technology using facial recognition, body scanning, and geo-tracking are matched with personal data to keep tab on people in real life and online. Their master plan is to use these technologies as the backbone of their nascent social credit system.

Social credit system

Since Xi Jinping tightened his power grip on technology and surveillance many new notorious strategies to suppress the freedom of expression have been implemented. These include the introduction of new cyber security law, the launch of Cyberspace Administration of China (CAC) and the initiation of a social credit system – a score-based system relying on the adoption of desired behavior based on social merit. This system both punishes and rewards key behaviors through a range of initiatives such as public shaming, travel bans, limited or extended business opportunities, and favorable or devalued credit ratings. The ultimate goal is to hammer into citizens the idea that “keeping trust is glorious and breaking trust is disgraceful”

The point system citizens will incentivise lawfulness, integrity, and trustworthiness with real time impacts on what citizens can and can’t do. Perks like good behavior could lead to privileges of faster internet services, travel ticket booking convenience in flights and trains, and even concessions on advance deposits for renting cars and booking hotels. Having a low social credit score could mean restrictions on traveling, refusal of passport, difficulty in getting employment and being publicly shamed among others.

China’s National Public Credit Information Center reported that it had cancelled airline tickets of 17.5 million people due to their unproductive scores and 5.5 million were barred from booking train tickets in 2018 because of low social credit scores.

China’s technological power grip around the world

For the Communist Party of China the key motive for gathering, analyzing and evaluating data is to preempt and uncover any threat to the social and political stability of its iron grip on China. It is indeed for the first that a government is employing highly advanced technology to expand internet surveillance and censorship to maintain the stability of own rule. China uses surveillance technology to spy on human right defenders, dissidents, and lawyers, deny freedom of speech and subvert anti-communist party campaigns. This abuse of technology fundamentally undermines democracy and threatens human rights.

According to the People’s Daily, the party-owned largest newspaper group in China, the Chinese capital of Beijing is now completely covered by surveillance cameras that watch over “every corner of Beijing city”.

Authoritarian governments across the globe are acquiring state of the art technologies to repress dissent at a rapid pace. For construction of “Smart Cities” in Pakistan, Philippines and Kenya, Chinese companies including Huawei and ZTE are involved in supplying extensive built-in surveillance technologies. Bonifacio Global City in the Philippines outfitted by Huawei has internet-connected cameras that provide “24/7 intelligent security surveillance with data analytics to detect crime and manage traffic.”

Surveillance built with loans from the Chinese Government

Chinas export of surveillance technology began in 2008 during the Beijing Olympic where it marketed its surveillance mechanisms and ‘solutions’.  Prior to the Olympics, 300,000 new cameras were installed in the capital. China then invited many foreign officials to observe the effectiveness of its new authoritarian technologically advanced tools. Since then, the Party has exported its ‘solutions’ to many countries with severe human rights records including but not limited to Ecuador, Venezuela, Ethiopia, Pakistan, Kenya, Iran, and Zimbabwe.

China’s collaboration with authoritarian governments across the globe to build large-scale surveillance systems has given rise to global threats to free speech and privacy.

In his research, Prof. Steven Feldman from Boise State University’s School of Public Service found that China is exporting AI-equipped surveillance technology to at least 54 countries around the world with government types ranging from closed authoritarian to flawed democracies”

With China’s help Ecuador now has a new surveillance system, ECU-911 meant to expand automated policing and reduce crime rates. This $200 million deal was jointly signed by China’s State-controlled C.E.I.E.C and Huawei, and funded by Chinese loans in exchange for Ecuador providing them with their principal export, oil. Ecuador’s surveillance systems were not only made in China, but were installed by Chinese companies and workers. Chinese even trained the Ecuadorians how to use it.  

China’s export of advanced technologies is a show of strength and capability to the world. It represents the country’s ability to compete with established powers (notably the US) in important sectors, reducing dependency and promoting self-reliance. However, Chinese companies often lack transparency and, most importantly, are without a doubt subordinate to the Chinese Communist Party.

The seriousness of the perceived security threats from Chinese technology companies is evident from the US’s notable restriction or outright prohibition of companies such as Huawei. The US has also encouraged its allies to do the same. Australia, Great-Britain, New-Zealand, the US, and Canada have all adopted measures to restrict the use of Huawei devices and Chinese infrastructure. 

Security implications of the export of Chinese surveillance systems

Under President Xi Jinping, the Chinese government has vastly extended domestic surveillance, fueling a new generation of companies that make sophisticated technology at ever-lower prices. With China’s global outreach, the domestic systems are spreading far and wide.

Loans from Beijing have made surveillance technology available to governments that could not have previously afforded it. Adding to this lucrative deal is China’s total lack of transparency and accountability of its use. This rapid development and export of China’s surveillance equipment is helping strengthen a future of tech-driven repression, potentially leading to the loss of privacy.

CCP’s export of surveillance systems to willing governments around the globe has given rise to significant national security risks for individual states as a result from their extensive reliance on and cooperation with Chinese state-owned enterprises or CCP member-owned firms in key infrastructure development projects and expansion of the state security apparatus. These high-tech exports including 5G infrastructure, fiber optics, and telecom equipment aid China’s rapidly rising control and influence over its trading partners. Ultimately, these strategic moves could lead up to China’s goal of strengthening its internet sovereignty, securing its position as a great global power; widen its sphere of influence particularly in South-East Asia and Africa with the help of the Belt and Road initiative (BRI), promote its economic dominance, and provide an alternative to the United States and its allies.

The advent of modern technology in China granted the government, particularly under President Xi Jinping’s leadership, the opportunity to innovate, the expertise to initiate and the free-hand to implement modern surveillance technologies. This new and extremely effective combination of state control apparatus has proven to be incredibly valuable for the Party in tightening security measures, assuring its long-term survival, shaping public opinion, and suppressing resistance.

CCP’s evolving surveillance strategies in Tibet

The iron curtains on Tibet have been shut for a long time and the entire region is off limits for free and independent visits of international media, journalists, advocates, researchers and government and civil society representatives. The highly repressive situation inside Tibet makes it difficult to understand the scope of digital surveillance in the region. Over the years, China’s surveillance system in Tibet has been growing and evolving at an unprecedented scale. The abundance of manned and unmanned checkpoints, AI, CCTV camera networks and re-education centers under the garb of national security have added another layer of control to an already extremely controlled and oppressed environment in Tibet.

Furthermore, the CCP is constantly upgrading its ‘Great Firewall of China’ to monitor and limit online and offline traffic by creating its ‘own’ internet and limiting access to the ‘traditional’ web. Chinese authorities in Tibet are offering large cash rewards to informants in a bid to stamp out online ‘subversive’ activities curbing free flow and dissemination of information. According to a notice issued on Feb 28 by three government departments of the so called Tibet Autonomous Region information leading to the arrests of social media users deemed disloyal to China can fetch up to 300,000 Yuan ($42,582). People sharing political contents or commentary deemed sensitive they face arrest and heavy criminal penalties.

Surveillance in Tibet and Xinjiang have been widely known as “Orwellian.” In addition to the traditional security surveillance apparatus of the military, police, and neighborhood spies, modern surveillance technologies have been specifically developed and tested in these regions. According to human right reports, tight security measure currently being practiced in Uyghur to suppress the resistance movement were previously successfully developed and practiced in Tibet by Chen Quanquo, TAR’s then party secretary. Following his highly suppressive policies in Tibet, Chen was appointed the party secretary in Xinjiang and continues to be the chief architect of the massive surveillance and mass detention systems in the region.

Spring 2008 witnessed the historic and widespread uprisings in Tibet against China’s rule which were followed by a series of self-immolations by 153 Tibetans demanding the return of His Holiness the Dalai Lama and freedom in Tibet. These protests prompted China to maximize and fast track the scope and intensity of its security surveillance both in the number of security personnel and digital technology. In January 2012, the central government introduced a new surveillance system called the “grid system of social management”.In preparation of the implementing the new system, cadres in plainclothes were deployed in every Tibetan village and monastery. The campaign ironically called “Benefit the Masses” involved sending some 21,000 communist party cadres from townships and urban areas to live in teams of four or more in each of the 5,000 villages in TAR. Authorities expanded their network of small police posts known as “convenience” stations to every 200-300 meters in urban areas, to quickly respond to any threat. In 2016, a total of 696 convenient police check posts were newly set up.

New digital surveillance efforts include mandatory collection of DNA samples, Wifi network monitoring and widespread implementation of facial and voice recognition to all connected and integrated data analysis platforms. According to Wall Street Journal’s study of police department documents from across China, the Chinese authorities plan to double their current DNA trove to 100 Million records by 2020. DNA sampling of Tibetans on the Tibetan plateau is widespread under the guise of mandatory medical check-ups aimed at controlling the movement of Tibetan people and further restrict their freedom.The author’s interviews with recent arrivals from Tibet confirmed that beginning in July 2013 Tibetans in cities and villages are being asked to undergo free medical checkup and blood samples have been collected.

Tenzin Tsultrim, a researcher at Tibet Policy Institute based in India believes that China might extend its profiling of DNA samples to even foreign tourists, including Tibetans from India and western countries, visiting Tibet.

Also, CCP’s security spending has increased exponentially since 2008. Germany based researcher Adrian Zens has reported that TAR “has had the highest per capital domestic security expenditure of all provinces and regions.” In 2016, per capita domestic security expenses in Sichuan province’s Tibetan regions were nearly three times higher than Sichuan province as a whole”

The author expressed concern over China’s intention to launch Huawei 5G networks in Tibet, which would make it easier to deploy sensors and enable quick transfer of high volumes of data for real-time analysis. Companies facilitating digital surveillance in Tibet include Alibaba, search provider Baidu, chat app operator Tencent holdings, voice recognition company iFlyTek and facial recognition system Sense Time. State subsidies and other government privileges make Tibet a lucrative market for these businesses to invest and employ their latest technologies. Companies operating in Tibet enjoy a highly reduced tax rate of 9% compared to the standard cooperate tax rate of 25% for the rest of China.

Conclusion

The non-transparent and unchecked export and adoption of China’s highly advanced technologies to foreign markets represent severe intelligence and security threats, especially when integrated directly to national security and surveillance apparatuses. China has successfully put at risk the safety and security of dissidents and activists all over the world and strengthened rouge and undemocratic regimes with its export of surveillance technologies.

Another serious danger for states adopting Chinese technologies is their over reliance on foreign technology to run and manage core government systems thus representing a risk to their very sovereignty. CCP has not only been proliferating its methods through free or subsidized hardware, AI technology and training, but has also been gaining insights and direct connection to the information stream of partner-states.

Surveillance information stream can be realistically used in two ways as targeted micro information to gain leverage on important targets and as a means to gather and employ big data; the use of which is essentially endless. In this sense, there is little to no transparency nor accountability and imposes a very high-security threat.

Exporting the surveillance model is also a strategic move by the CCP’s to further test its model, apply it in variable contexts, and gather additional data and intelligence. The Party gains a direct access into partner-states information stream; advantageous information about markets, business opportunities, important actors, etc. and even possibly sensitive information that could be used to persuade or coerce important actors on local or international matters.

The widespread implementation of surveillance, leading to the intrusion of one’s privacy, may become a cause for further unrest in restrictive states. The absence of freedom and opportunities for people to vent their grievances will most likely expound hatred leading to even more collective anger and dissent among suppressed groups.

Inside Tibet, over the last decade, the “nets in the sky and traps on the ground” have further suppressed the fundamental freedoms of expression, movement and assembly. New and highly advanced technologies have given unrestricted and illicit power to the state security apparatus to intensify and escalate mass surveillance. Checkpoints with smart surveillance and facial recognition are present in cities and at crossings between neighboring districts and provinces. Tibetans inside their homes are tracked through their phones and once they step outside surveillance and facial recognition technologies follow them wherever they go. This is the reality of today’s Tibet and if the free world is unwilling to restrict the import of China’s technologies, this could be your reality tomorrow.

Research Fellow Tibet Policy Institute Central Tibetan Administration Dharamshala, Distt. Kangra

Continue Reading
Comments

Intelligence

The New World Order: The conspiracy theory and the power of the Internet

Published

on

“The Illuminati, a mysterious international organisation made up of the world’s top political and social elites, controls the workings of the entire world behind the scenes”. This is the world’s most famous conspiracy theory about the New World Order.

For hundreds of years, legends about the Illuminati have been spread and many people currently believe that the Illuminati still exist. It is believed that the Illuminati operate in various fields such as global politics, military affairs, finance and mass media and control the historical process of the entire world.

The ultimate goal is to establish a New World Order. Nobody can prove it, but many people believe it. This is the greatest paradox about conspiracy theories.

In the 2009 film, Angels and Demons – based on Dan Brown’s best seller of the same name about Professor Langdon, played by Tom Hanks – the story of the Illuminati, who supposedly originated in Europe during the Age of Enlightenment, was recalled. There were physicists, mathematicians and astronomers who questioned the “erroneous teachings” of the authority of the Holy See and dedicated themselves to the scientific field of the search for truth.

Eventually, the Illuminati were forced to become a clandestine organisation and have continued to recruit members for hundreds of years to this day. In Angels and Demons, the historical facts are clearly questionable, and the movie appeared after the great economic crisis of 2007-2008.

The New World Order conspiracy theory has been circulating for a long time and is full of mysterious theories that, however, convince many people who are powerless and dissatisfied with the current state of the world.

The Illuminati, who advocate the establishment of a New World Order through the planning of a series of political and financial events (the financial tsunami of 2007-2008 is said to have been planned by the Illuminati), attempt to influence the course of world history, and ultimately establish an authoritarian world government.

Supporters of the New World Order theory believe that even the powerful US government is now just a puppet government. While another “shadow government” made up of a few people makes decisions that will change the fate of the planet.

You might think that all of the above is just crackpot theories. Many people, however, believe this is true. According to a 2013 poll conducted by the Public Policy Polling Foundation, 28% of US voters believe that the New World Order is actually taking hold.

Brian L. Keeley, a professor of philosophy at Pitts College who devotes himself to the study of modern conspiracy theories, believes that an important feature of conspiracy theorists is that they cite some trivial and overlooked incidents and then propose a perfect explanation compared to an embarrassed official response. The reason why the conspiracy theory explanation can be widely disseminated is that it has no argumentation process to deny. It is just a judgement that jumps directly from hypothesis to conclusion. In the argumentation process, it is only a subjective interpretation of the event.

Nevertheless, for the public that does not fully understand the incident, the conspiracy theory provides an “explanation” for the unknown part of the said incident, and this “explanation” cannot be denied (because its very existence is not corroborated by real arguments and facts). It is therefore recognised as a valid argument by many people.

For example, no one has substantial evidence to prove that the Illuminati actually exist, but no one can prove that the Illuminati are purely fictitious. Therefore, you cannot deny their existence because their existence is “perfection without evidence”.

Columnist Martha Gill wrote in The Guardian on the subject, describing the Illuminati as the most enduring conspiracy theory organisation in world history.

“Conspiracy theories relating to the 1969 moon landing mission, the Kennedy assassination, the 9/11 attacks, etc., are all limited to a specific time and place. But conspiracy theories supporting the existence of the Illuminati can connect them. Anything about these connections, however, is difficult to prove”. In other words, the supporters of conspiracy theories may have common imagination and attribute everything to this organisation, so that every irrational phenomenon in the world can be explained.

Although no one can prove the real existence of the Illuminati, there is actually an alleged “global shadow government” in the world whose name is the Bilderberg Group. The Bilderberg Group holds an annual world-class private meeting and participants include elites from all walks of society such as government, business, media, science and technology.

Known as the “World’s Most Mysterious Conference”, the Bilderberg Group invites various famous political and economic figures to participate in its meetings every year.

Prince Bernhard van Lippe-Biesterfeld (1911-2004) held the first meeting in 1954. As the venue for the meeting was the Bilderberg Hotel in Oosterbeek, that name was used as the name of the group.

The existence of the Bilderberg Group is not a secret, but the content of the topics discussed at the Conferences is absolutely confidential and mainstream media cannot report on the content of the meetings.

The Bilderberg Group issues a press release every year to introduce the Conference participants and the outline of the topics discussed. Over the years, participants have come from many places, including Prince Philip of Edinburgh (1921-2021) of the British Royal Family, Crown Prince Charles, former British Prime Ministers, French President Macron, German Chancellor Merkel, former US Presidents Bush and Clinton, and even Bill Gates and other Internet giants. There were also Italians, as reported years ago in a newspaper of our country.

The 2018 Conference was held in Turin, Italy, in June. According to the description on the Bilderberg Group’s official website, the main topics included European populism, the development of artificial intelligence, quantum computer technology and the “post-truth” era. Obviously the actual content and results of the meeting’s discussion have never been reported.

Therefore, the Bilderberg Group has naturally become a locus where conspiracy theorists want to draw material. They describe the Bilderberg Group as true evidence of the theory that a very small number of elites controls the world, and the participants are planning a New World Order.

On the subject of strange things, let us give some examples. In June 2018, the British Royal Family was also caught up in conspiracy theories. When Prince Harry and his wife Meghan attended a show, they were caught on camera motionless, like two stiff and dull robots. Later related clips went viral on the Internet and netizens were in an uproar: many people believed that the distinguished members of the Royal Family were actually robots developed by high technology.

However, the management of the London museum, Madame Tussauds, later explained the mystery by stating that Harry and Meghan were only played by two actors who wore extremely high-realism wax masks on their faces – all to promote an exhibition of wax statues – and inadvertently caused an uproar.

In that short video, Harry and Meghan did not change their facial appearance and their expressions were stiff just like robots. Consequently, conspiracy theorists used this as evidence that they were robots secretly built by the British Royal Family.

This argument is an extension of the ‘trivial evidence’ mentioned above. The argument proponents ignore any argumentation process and directly draw the final conclusion through the above stated “trivial evidence”. This conclusion is highly topical and quite appealing. With the fast spread of the Internet, the “quick truth” will naturally be recognised and sought after by many people.

I think many people still remember the “Mandela effect” that spread wildly across the Internet in the early years as a false memory. The name “Mandela effect” is believed to have come from Fiona Broome, a self-described “paranormal consultant”, who created a website called the “Mandela effect”. Supporters of the ‘Mandela effect’ claim to “remember” that former South African President Mandela died in prison in the 1980s. But in reality, after being released from prison, Mandela served as President of South Africa from 1994 to 1999 and died in December 2013.

So why should anyone believe this seemingly absurd statement? The Internet has become a support platform for a lot of false content, fake news, as well as unreasonableness and lack of justification. When someone shared that ‘false memory’ with others on the Internet, many people believed it to be true, and even suddenly recalled having that memory: “Mandela died in prison that year”.

As a result, lies inconsistent with facts continue to spread. The lie is repeated thousands of times and many people consider it to be the truth: this learning phase is the first misleading rule on the Internet.

In the Internet era, multidimensional and multiplatform features have generated a number of online “malignancies” of conspiracy theories. Moreover, their dissemination ability is not limited to “believers” only. Since online social media provide a widespread and wide dissemination platform, one passes it onto ten people, ten spread it to a hundred, a hundred to a thousand, and so it goes on in geometric fashion, thus turning a ‘hot’ topic on the Internet into an absolute truth. Those who want to believe are naturally prepared and willing to do so. Moreover, these false opinions on the Internet may even have an impact on the real world.

For example, at the political level, everyone can now comment and participate in the online arena. For politicians to get the right to speak and set the agenda, the key is to rely on the public’s direction on the Internet. The Internet discourse has become the dominant factor of the political storytelling, and not vice versa. The characteristics of social networks are precisely the breeding ground for conspiracy theories.

The Internet is easy to spread among the public and it is exactly the breeding ground for conspiracy theories.

Nowadays, conspiracy theories are enough to influence politics and even political developments. A specific conspiracy theory gains a number of supporters through the Internet that promotes it to become a highly debated topic among the public. Consequently, it enters the real political arena coming from the virtual community and its influence can change the direction of governmental decisions.

Looking at it from another perspective, when conspiracy theories are put on the Internet and continue to proliferate – regardless of whether the Illuminati exist or not – they are enough to establish a New World Order. The real-world public opinions, as well as the composition of opinions and the basis of social discussions are changed, and thus world’s countries, politics and rulers are affected.

Continue Reading

Intelligence

USA and Australia Worry About Cyber Attacks from China Amidst Pegasus Spyware

Published

on

Pegasus Spyware Scandal has shaken whole India and several other countries. What will be its fallout no one knows as we know only tip of iceberg. Amidst Pegasus Spyware Scandal USA and Australia both have shown serious concerns about Cyber Attacks on US and Australian interests. Both say that China is hub of malware software and both face millions of such attacks daily.

I am trying to understand why a software is needed to spy on a particular individual when all calls, messages, data, emails are easily accessible from server. In most of cases these servers are located in USA and some cases these are located in host country. In certain sensitive cases Government Agencies have their own server like Central Intelligence Agency and hundreds of other agencies and military establishment world over including India. Now point is who installs those servers.

A couple of years back I had talked to Mr Mike Molloy who is Chief Executive Officer of Orion Global Technologies previously known as Orion SAS. He had explained me how his company installs servers in host countries on request of private or gov bodies. He talks about contract and trust. That means even when a company or Gov buys a server or software for designated uses the “Secrecy” Factor remain on discretion of company which has supplied server or software.

Now  if all data, e-mail, chat, messages, calls are accessible to Gov as per law and technology (Through Server all components of Communication are accessible and thats why  me and you see start seeing call recording of a person even after many years later), I am unable to understand why a Gov will be needing a software to Spy on any one.

Now coming to where Australia and USA wants to carry the whole debate.

Australian Foreign Minister Sen Marise Payne said, “Australian Government joins international partners in expressing serious concerns about malicious cyber activities by China’s Ministry of State Security.

“In consultation with our partners, the Australian Government has determined that China’s Ministry of State Security exploited vulnerabilities in the Microsoft Exchange software to affect thousands of computers and networks worldwide, including in Australia. These actions have undermined international stability and security by opening the door to a range of other actors, including cybercriminals, who continue to exploit this vulnerability for illicit gain”, She further added.

She opined, ”The Australian Government is also seriously concerned about reports from our international partners that China’s Ministry of State Security is engaging contract hackers who have carried out cyber-enabled intellectual property theft for personal gain and to provide commercial advantage to the Chinese Government”.

She warned China by saying, “Australia calls on all countries – including China – to act responsibly in cyberspace.  China must adhere to the commitments it has made in the G20, and bilaterally, to refrain from cyber-enabled theft of intellectual property, trade secrets and confidential business information with the intent of obtaining competitive advantage”.

On other hand USA’s The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released a Cybersecurity Advisory on Chinese State-Sponsored Cyber Operations. National Security Advisor said, ”Chinese state-sponsored cyber activity poses a major threat to U.S. and allied systems. These actors aggressively target political, economic, military, educational, and critical infrastructure personnel and organizations to access valuable, sensitive data. These cyber operations support China’s long-term economic and military objectives”.

The information in this advisory builds on NSA’s previous release “Chinese State-Sponsored Actors Exploit Publicly Known Vulnerabilities.” The NSA, CISA, and FBI recommended mitigations empower our customers to reduce the risk of Chinese malicious cyber activity, and increase the defensive posture of their critical networks. 

Continue Reading

Intelligence

Afghan issue can not be understood from the simplistic lens of geopolitical blocs

Published

on

pakistan-terrorism

Authors: Tridivesh Singh Maini  and Varundeep Singh*

On July 14, 2021 a terror attack was carried out in Khyber Pakhtunkhwa (KPK) province in which a number of Chinese engineers, working on the Dasu hydropower project (a project which is part of the China Pakistan Economic Corridor) were killed. The attack predictably evinced a strong response from China. The Chinese foreign minister, Wang Yi speaking before a Shanghai Cooperation Organisation (SCO) Foreign Minister’s meeting asked the Taliban to disassociate itself from ‘terrorist elements’ and in a meeting with Pakistan Foreign Minister, Shah Mehmood Qureshi, asked Pakistan to bring the perpetrators to book. Earlier in April 2021, a car bomb attack took place at Serena hotel in Quetta which was hosting China’s Ambassador to Pakistan (four people were killed and twelve were injured)

Wang Yi significantly praised the Ashraf Ghani government, for its attempts towards building national unity and providing effective governance. Beijing clearly realizes that its economic investments in the country as well as big ticket infrastructural projects can not remain safe if there is no security. Afghanistan also criticized Pakistan for its role in sending 10000 Jihadis to Taliban, this is important in the context of the region’s geopolitics.

 Like all other countries, Beijing and Islamabad, would have expected uncertainty after the US withdrawal of troops but perhaps over estimated their capabilities in dealing with the turbulence which had been predicted by many.

Importance of Chinese Foreign Minister’s statements

Wang Yi’s statements are important because days earlier a Taliban spokesman, Suhail Shaheen had praised China and welcomed its role in the country’s reconstruction. He had also assured China that those involved in the insurgency in Xinjiang would not be given refuge in Afghanistan (one of China’s major concerns has been the support provided by Taliban to the East Turkmenistan movement)

While Beijing may have opened back channels with the Taliban and realized that it needs to adapt to the changing geopolitics, recent developments would have increased its skepticism vis-à-vis the Taliban. On the other hand, Russia has been more favorable towards the Taliban. Russia’s Deputy Chief of Mission in India, Roman Babushkin argued that the Taliban are a reality which needs to be accepted, and also that any military activities without a political process are insufficient.

Babushkin did make the point that for successful negotiations, Taliban needed to end violence.

‘that Taliban should deal with the problem of terrorism and other related issues in order to become legitimate, in order to [get] delisted [at the UN Security Council], in order to go ahead with the future Afghanistan and creation of the inclusive government

It would be pertinent to point out, that Zamir Kabulov, Russian President’s Afghanistan envoy went a step further and said that the Afghan government was not doing enough to make talks with Taliban a success.

China’s statements subtle warning to the Taliban, indicating its reservations, and praise of Ghani indicate a possibility of greater understanding between Washington and Beijing (even though Beijing has repeatedly attributed the current troubles in Afghanistan to Washington’s decision to withdraw troops).

Can US and China find common ground

 It remains to be seen if Biden who has exhibited dexterity on a number of complex issues reaches out to Xi Jinping to find common ground with regard to Afghanistan. Significantly, while US-Turkey relations had witnessed a downward trajectory and Biden has been critical of Turkish President Recep Tayyip Erdogan’s authoritarian tendencies and Human rights record, both leaders met on the sidelines of the NATO Summit in June 2021. During the meeting Turkey agreed to secure Kabul Airport. US National Security Advisor Jake Sullivan while commenting on Turkey’s assurance said

‘The clear commitment from the leaders was established that Turkey would play a lead role in securing Hamid Karzai International Airport, and we are now working through how to execute to get to that,’

Taliban earlier this week warned Turkey of ‘consequences’ if the Middle Eastern nation increased its troop presence in Afghanistan.

Conclusion

Russia’s statements with regard to the Taliban indicate that it is not totally on the same page as China (its prior experience in Afghanistan has made it more cautious and circumspect), and that the Afghan issue can not be understood from the simplistic lens of geo-political blocs and traditional lenses. All major stakeholders in Afghanistan, both within the region and outside, seem to be understandably befuddled by the turn of events. It is not just the US, but even China which would be worried not just from an economic stand point but the overall security implications of the turmoil in Afghanistan. The terror attack in KPK indicates that other CPEC related projects could also face threats from militant groups. Beijing would thus need to be quick to react to the overtures from the Taliban in order to secure its economic assets and lives of Chinese workers in neighbouring Pakistan.

 It is especially important for Washington, Beijing and other important stakeholders in the region to work together for dealing with the near term turbulence as well as long term challenges Afghanistan is likely to face.

*Varundeep Singh is an Independent Policy Analyst.

Continue Reading

Publications

Latest

Trending