Connect with us

Intelligence

U.S. vs Iran, a Cybersecurity Update

Published

on

The relationship between the United States and Iran has perhaps reached a very low levein in recent weeks, following the 1979 Khomenist Revolution and the occupation of the US Embassy in Tehran by Iranian students.

According to American sources, on 20th June the United States launched offensive cyber-operations against Iranian intelligence computer systems, the same day that the US President, Donald J. Trump, had before ordered a military attack and then revoked the order before it actually left.

The United States Cyber Command – a department recently promoted by Trump as a unified combat command under the direction of the Department of Defense – allegedly attacked the computer systems used to control missile and rocket launches.

Such a cyberattack would have been the White House‘s response to the actions of the Iranian authorities who, the day before, had shot down an American spy drone – a Global Hawk produced by Northrop Grumman – as it was guilty of violating the airspace of the Islamic Republic.

After accusations and threats to each other, the US President decided to impose new sanctions on Iran and Ayatollah Ali Khamenei. That was not welcomed by the Government of Tehran, which spoke, earlier, of “end of diplomatic path with the United States” and announced that it had exceeded the uranium enrichment limit imposed by the JCPOA – Joint Comprehensive Plan of Iran Nuclear Deal – from which the United States unilaterally exited in May 2018.

It remains to be seen, therefore, after the escalation of the last few weeks, whether the United States will try to make more and more use of cyber-attacks to solve the delicate international issues, primarily the Iranian one.

After the cyber-space was recognized as a strategic domain by NATO in 2016, on par with land, water, sky and space, it has been increasingly seen that countries use this domain to plead their own interests and also to carry out operations – this new type of military activity should not come as a surprise, because you only have to look at the National Cyber Strategy, published in September 2019 by the US, which shows that there has been a paradigm shift from what was the protection of American interests in the cyber space, moving from a more classical deterrence to the purpose of defence to a more offensive deterrence.

The fact that this document was only published last September suggests that the field of cybersecurity is fundamentally new and still to be explored.

On the one hand, cybernetic space is a totally man-made space and where you can have very high levels of ambiguity, through non-identification strategies from where attacks start, on the other hand, it is one of the most unregulated space at the level of behaviour that all countries shoud adopt with the specifice the responsibilities in cyber-operations.

This is a field in which the international law must be adapted as it is vital to understand how international law applies to the cyber-space and to see how it can be applied in practice: there is a long-time discussion between experts in the United Nations about cyber-space and, moreover, you can conduct operations that may fall into the category of attacks that are below the threshold of the use of force. So, it is still unclear whether a cyber-attack can be responded to with a classic attack byusing any classic military tools.

That is why American cybersecurity policy has changed in recent years, starting with the different pillars on which the National Cyber Strategy is based:

1) defending the homeland by protecting networks, systems, functions and data;promote American prosperity by fostering a secure digital economy and promoting strong domestic innovation;

2) preserving peace and security by strengthening the ability of the United States – along with allies and partners – to deter and, if necessary, punish those who use cyber-tools for malicious purposes;

3) expansion of American influence abroad to extend the key principles of an open, reliable and secure Internet.

Within the cyber-space, the United States have adopted a so-called “continuous engagement” – an ongoing commitment to counter possible threats even before they can materialize through targeted attacks, with the transition from a defensive to an offensive approach, with the American presence in the cyber-space that will more and more increas in order to actively dissuade potential enemies.

Historically, the United States are not new to carrying out cyber-attacks on Iran, in fact, as early as 2010, the United States and Israel are believed to have spread a virus, created by the US Government, to slow down the process of enriching uranium in Iran’s nuclear power plants.

That cyber-attack of the United States against the Iranian intelligence unit is part of a context that has seen Washington’s intensifying cyber-operations also against Russia and Iran – it is important to be aware of the cybersecurity space for their own interests and that they have had a particularly aggressive posture in this area.

The United States and Iran are two of the world’s most advanced, active and capable hacking powers at a time when governments regularly use cyber-attacks to achieve important goals and shape geopolitics.

Tensions between the two countries and their allies have produced a long history of extraordinary cyber-attacks in addition to traditional kinetic warfare – for these reasons, Iran’s revenge for the killing of General Qassim Suleimani could also be served on the ground of cyber-war.

Christopher Krebs, director of the Cybersecurity and Infrastructure Security Agency – CISA – of the U.S. Department of Homeland Security, warned the entire community to re-investigate Tehran’s tactics, procedures and techniques in detail in cyberspace, after reporting the increase in the activity of malicious cyber-attacks directed against the American companies and government agencies.

The hackers of the Iranian regime have increasingly used destructive windshield wipers in order to spear phishing, email scam to gain unauthorized access to sensitive data – it is a hackerial attempt to decode a common user password across multiple accounts before switching to a second password that allows you to circumvent account lockouts.

This is an attack that leverages the likelihood that people can use the same username and password to access multiple applications, sites, and services – in fact, cyber-criminals are able to get the details of stolen accounts from a platform and implement the bots needed to log into many other accounts with the same credentials.

Once they have found a way to log in, the criminals will break the account by making fraudulent purchases or stealing confidential information – before the 2015 nuclear deal was negotiated between the United States, Iran, Europe, Russia and China, Iranian hackers regularly targeted American financial companies and critical infrastructure.

Over the past year, Iran and the United States have repeatedly targeted each other in hacking operations – Iranian government hackers have attempted to breach President Trump’s re-election campaign: in fact the U.S. Cyber Command reportedly warned against Iran’s paramilitary force attacks during a period of high tensions, earlier this year.

More than 150 American sites have already been victims of defacement by Iranian hackers also because of the supreme leader, Ayatollah Ali Khamenei, had promised “a strong vengeance” for Suleimani’s killing – this is a modern conflict, to date not only threatened but it is a long-time a cyber war – in recent days, hackers of Tehran have hacked the website of the Federal Depository Library Program – FDLP – with a defacement operation, leaving a message stating that “this is only a small part of Iran’s cyber-capabilities.”

The attack targeted a “weak” target, but it is a sign that the Islamic Republic’s cyber-army has been activated to strike US-linked targets, any critical infrastructure in particular..

The U.S. cyber-army believe, in fact, that the attacks could take place in five ways:

– DDoS attacks, in which you flood a site with access requests and crash it.

– data deletion (or wiper attack), actions to delete data in infected databases.

– attacks on industrial control systems, information-related operations and as well as cyber espionage.

The latter two to steal data for use then in physical, military actions – for example, by committing targeted murders or attacks on infrastructure.

But the Islamic Republic could suffer from the American reaction far more damage than it could cause: it has already happened in the past, as confirmed by the head of the “cyber police” in Tehran, General Kamal Hadianfar, who admitted that Iran in 2017 suffered 296 serious cyber-attacks against paramount infrastructures and on several occasions some experts in the field were mysteriously dead.

In conclusion, after sanctions and threats on both sides, could we really lead to an escalation of cyber-attacks and, because of that, does it seem to be a new Cold War ?

Dr. Luciano Magaldi Orta Nova, after his PhD in Cloud Computing at Cloud Universityby Rackspace in San Antonio, Texas, a Master of Science in Security Engineeering at Cibrary Faculty of Washington, the Tesol certificate at Arizona State University in Tempe, a Bachelor of arts in Interpreting and Translating at Lus Pio V in Rome, an SEO specialization at the University of California Davis (UC Davis), a DSA specialisation at the University of London, an ETL specialisation at the Universitat Aut'onoma of Barcelona, an academic diploma in Forensic Sciences at Oxford Royale Academy, a specialising certificate in American Politics at Harvard Kennedy School, a professional certificate in mathematics at Stanford University, a Copyright Law certificate at MIT in Cambridge, used to work for Google Ireland in Dublin, Apple European campus in Cork, Ireland, and Amazon Slovakia in Bratislava. Dr. Luciano Magaldi finally obtained his specialisation in journalism at Michigan State University School of Journalism. His career as a journalist began writing articles for AgoraVox France and AgoraVox Italia about world politics, military issues and cyber-tech.

Continue Reading
Comments

Intelligence

Boko Haram: Religious Based Violence and Portrayal of Radical Islam

Published

on

Modern-day global and domestic politics have set forth the trend that has legitimized and rationalized the use of religion as a tool to attain political gravity and interests. Similarly, many religion-oriented groups use religion to shape their political agenda and objectives, often using religion as a justification for their violent activities. Most of these mobilized groups are aligned with Islam. These groups have promoted religion-based violence and have also introduced new waves and patterns in global terrorism. Some prominent organized groups that attain world attention include Boko Haram, ISIS, Al- Qaeda, and the Taliban. These groups have potentially disrupted the political establishment of their regions. Although, a comparative insight delivers that these various organizations have antithetical political objectives but these groups use Islam to justify their violent actions and strategies based on violence and unrest.

The manifesto of Boko Haram rests on Islamic principles i.e. establishing Shariah or Islamic law in the region. A system that operates to preserve the rights of poor factions of the society and tends to promote or implement Islamic values. Hence, in this context, it negates westernization and its prospects. However, the rise of Boko Haram was based on anti-western agenda which portrayed that the existing government is un-Islamic and that western education is forbidden. Hence, the name Boko Haram itself delivered the notion that western culture or civilization is forbidden. Boko Haram has a unique political and religiously secular manifesto. Boko Haram was formed by Mohammad Yusuf, who preached his agenda of setting up a theocratic political system through his teachings derived from Islam. And countered the existing governmental setup of the Christians. The violent dynamics surged in 2009 when an uprising against the Nigerian government took the momentum that killed almost 800 people. Following the uprising, Mohammad Yusuf was killed and one of his lieutenants Abu Bakar Shekau took the lead.

Boko Haram used another violent strategy to gain world attention by bombing the UN Compound in Abuja that killed twenty-three people. The incident led to the declaration of Boko Haram as a Foreign Terrorist Organizationby the United States Department. Thus, the group continued the process of violence and also started to seize several territories like Bama, Dam boa, and Abadan. They also extended their regional sphere in terms of occupation using violent strategies. The violence intensified when in the year 2014, 276 girls were abducted from Girl’s school in Chibok. This immediately triggered global outrage and developed an image of religious extremism and violence. This process continued over the years; one reported case articulated that a Christian girl ‘Lean Shairbu’ was kept in captivity for a prolonged period upon refusal to give up her religion. Ever since, the violence has attained an upward trajectory, as traced in the case of mass Chibok abduction and widespread attack in Cameroon in the years 2020 and 2021.

After establishing a regional foothold Boko Haram improvised new alliances especially in 2015 after the government recaptured some of its territories that pushed the militant group near Lake Chad and to the hilly areas. Consequently, Abu Bakar Shekau turned towards international alliance and pledged its allegiance to IS. This created two branches of Boko Haram called Jamat u Ahlis Liddawatiwal Jihad (JAS) headed by Abu Bakar Shekau and Islamic State in West Africa Province (ISWAP) lead by Musab Al Barnarwai. The ISWAP developed strong social, political, and strategic roots in the region. It has embedded itself socially in the hearts and minds of people by establishing their caliphate and judicial system.

The pattern of religion-based conflicts has transformed the global religious conflicts. That is often referred to as extremist terrorism based on religion. Hence the rise of Boko Haram also involved demographics that complimented their political objectives. As the state of Nigeria is an amalgamation of Christians and Muslims; and has been constructed as a distinct ethno-lingual society, historically. The Christians resided in the South of Nigeria while the Muslims were located in Northern Nigeria. The northern side suffered from poverty, illiteracy, unemployment, and public health issues under the government of Goodluck Jonathan. His government was centrally weak and marginalized the Northern side. This also contributed as one of the major factors that granted an edge for the influence and legitimacy of Boko Haram. Therefore, the main reason that triggered the organization and its move was based on Islamic principles of Jihad and Tajdid. This presents new notions of religion to recruit and incorporate more people into their community. The concept of Jihad has been historically driven which reflects and justifies acts against the unjust state and its authority. It also expands the capacity for social hostilities against the non-religious entities promoting hatred and non-acceptance. This also breeds religious extremism and rigidity that further validates the use of violence on their behalf.  Hence Jihad acts as a driving force to strive against the un-Islamic state structure for Islamic religious social fabric. Moreover, this religiously derived conception of violent confrontation has always been legitimized in terms of the historic concept of war and terms of self-defense. 

As a radical and contemporary religious belief; Jihad is regarded as the manifestation of religious violence and extremist terrorism. The establishment of the caliphate and state-like institutions represents a radical Salafist view regarding the establishment of the Islamic state structure. The ISWAP acts as a pseudo-state or state with in state that has established its authority and control. The reflection of another religious proclamation ofTajdid refers to the renewal of religious norms that aims at reconstruction or reset of social structure in accordance with Islamic values. Jihad and Tajdid collaboratively serve to generate notions about the reset of the political framework as an Islamic state system. The socio-religious reconstruction is particularly divergent from the western one. As western societies are often pluralistic, while Boko Haram’s vision aims as establishing Islamic social composition. Moreover, the western setup provided constitutional provisions to women in terms of rights, freedom, education, and liberty. This completely contradicted their conceptualization of women. Hence, this also generated gender-based violence as means to protect Islamic values. This was closely witnessed during the abduction of girls from their school. Furthermore, Islamic radicalization has been pursued through different channels that have extensively contributed to narrative building amongst the population, propaganda, and the development of a religious mindset in the African region. One of the most prominent tactics used for the purpose has been achieved through the propagation of literature. The scholars started to preach about Jihad and its implications since the 15th Century. The channel continues to date where the teachers preach about these scholarly findings that further encourages the youth to turn towards radical Islamization. The degree of radicalization elevates as Boko Haram propagates the concept of exclusivism that tends to oppose other value systems and beliefs. This creates a rift the society and deteriorates the sense of co-existence. As a result, Boko Haram represents a destructive paradox that promotes religious extremism and violence through misinterpretation of Islamic principles. Pursuing the political agenda of Boko Haram under the banner of Islamic law; which is power-oriented and would help them maintain dominance politically, economically, and territorially in the African region.

Continue Reading

Intelligence

Security of nuclear materials in India

Published

on

Terrorism

The author is of the view that nuclear security is lax in India. More so, because of the 123 Agreement and sprawling  nuclear installations in several states. The thieves and scrap dealers even dare to advertise online sale of radioactive uranium. India itself has reported several incidents of nuclear thefts to the international bodies. The author wonders why India’s security lapses remain out of international focus. Views expressed are personal.  

Amid raging pandemic in the southern Indian state of Maharashtra, the anti-terrorism squad arrested  (May 6, 20210) two persons (Jagar Jayesh Pandya and Abu Tahir Afzal hussain Choudhry) for attempting to sell seven kilograms  of highly-radioactive muranium for offered price of  about Rs. 21 crore. The “gentlemen” had uncannily advertised  the proposed sale online.. As such, the authorities initially dismissed the advertisement as just another hoax. They routinely detained the “sellers-to-be” and forwarded a sample of their ware to the Bhabha Atomic Research Centre.  They were shocked when the centre reported that “the material was natural uranium”.  As such the squad was compelled to book the duo under India’s Atomic Energy Act, 1962 at Nagpur police station (Explained: ATS seizes 7 kg uranium worth  Rs. 21 crore from a scrap dealer…Indian Express May 7, 2021).

Not a unique incident

The event, though shocking, is  is not  one of its kind. Earlier, in 2016 also, two persons were arrested by Thane (Maharashtra) police while they were trying to sell eight to nine kilograms of depleted uranium for Rs. 24 crore.  It is surmised that sale of uranium by scrap dealers in India is common. But, such events rarely come in limelight. According to Anil Kakodar, former chairman of the Atomic Energy Commission, `Factories using uranium as a counterweight in their machines are mandated to contact the Atomic Energy agencies and return uranium to them. They however resort to short cuts and sell the entire machine with uranium in scrap’.

India media scarcely report such incidents. However, Indian government sometimes reports such incidents to the International Atomic Energy Agency (IAEA) to meet disclosure requirements. According to international media reports (February 25, 2004), India reported 25 cases of “missing” or “stolen” radio-active material from its labs to the IAEA.  Fifty-two per cent of the cases were attributed to “theft” and 48% to the “missing mystery”.  India claimed to have recovered lost material in twelve of total 25 cases.  It however admitted that 13 remaining cases remained mysterious.

India’s reports such incidents to the IAEA to portray itself as a “responsible state”.  It is hard to believe that radio-active material could be stolen from nuclear labs without operators’ connivance.

Nine computers, belonging to India’s Defence Research and Development Organisation establishment at Metcalfe House, New Delhi, were stolen. India communicated 25 cases of ‘stolen or missing’ uranium to the IAEA. In different incidents, uranium in varying forms and quantities continue to be recovered from scrap dealers and others by Indian authorities. The recoveries include fifty-seven pounds of uranium in rod form, eight kilograms in granular form, two hundred grams in semi-processed form, besides twenty-five kilograms in radioactive form, stolen from the Bibi Cancer Hospital.

Too, the ‘thieves’ stole three cobalt switches, worth Rs. 1.5 million, from Tata Steel Company laboratory at Jamshedpur (Jharkhand). A shipment of beryllium (worth $24 million), was caught in Vilnius, on its way to North Korea. Taiwanese authorities had intercepted a ship carrying dual-use aluminum oxide from India to North Korea. A New Jersey-based Indian engineer Sitaram Ravi Mahidevan was indicted for having bypassed US export procedures to send blue-prints of solenoid-operated valves to North Korea.

We know that the Taiwanese authorities had intercepted a ship, carrying dual-use aluminum oxide from India to North Korea.  The oxide is an essential ingredient of rocket casings and is, as such, prohibited for export to “rogue” countries.

Pakistan bashing

Despite recurrent incidents of theft of uranium or other sensitive material from indiandian nuclear labs, the IAEA never initiated a thorough probe into lax security environment in government and private nuclear labs in india. However, the international media has a penchant for creating furore over uncorroborated nuclear lapses in Pakistan. The Time magazine article ‘Merchant of Menace’, had reported that some uranium hexafluoride cylinders were missing from the Kahuta Research Laboratories.  Pakistan’ then information minister and foreign-office spokesman had both refuted the allegation.  Masood Khan (foreign office) told reporters, `The story is a rehash of several past stories’.

Similarly,  Professor Shaun Gregory in his report ‘The Security of Nuclear Weapons’ contends that those guarding about 120 nuclear-weapon sites, mostly in northern and western parts of Pakistan, have fragmented loyalties. As such, they are an easy prey to religious extremists.

Frederick W. Kagan and Michael O’Hanlon, also draw a gloomy portrait of the situation in Pakistan. In their article, published in The New York Times, dated November 18, 2007, they predicted that extremists would take over, if rule of law collapses in Pakistan. Those sympathetic with the Taliban and al-Qaeda may convert Pakistan into a state sponsor of terrorism. They pointed to Osama bin Laden’s meeting with Sultan Bashiruddin Mahmood and Chaudhry Abdul Majeed, former engineers of Pakistan’s Atomic Energy Commission (having no bomb-making acumen).

They claimed that U.S. military experts and intelligence officials had explored strategies for securing Pakistan’s nuclear assets. One option was to isolate the country’s nuclear bunkers. Doing so would require saturating the area, surrounding the bunkers, with tens of thousands of high-powered mines, dropped from air, packed with anti-tank and anti-personnel munitions. The panacea, suggested by them, was that Pakistan’s nuclear material should be seized and stashed in some “safe” place like New Mexico.

Rebuttal

The fact is that the pilloried Pakistani engineers had no knowledge of weaponisation (“When the safest is not safe enough,” The Defence Journal -Pakistan), pages 61-63). The critics mysteriously failed to mention that Pakistan is a party to the UN Convention on the Physical Protection of Nuclear Materials. The steps taken by Pakistan to protect its nuclear materials and installations conform to international standards. The National Command Authority, created on February 2, 2000, has made fail-safe arrangements to control development and deployment of strategic nuclear forces. Pakistan’s nuclear regulatory authority had taken necessary steps for safety, security, and accountability of Pakistan’s nuclear weapons, facilities, and materials even before 9/11 incident. These controls include functional equivalent of the two-man rule and permissive action links (PALs). The indigenously-developed PALs are bulwarks against inadvertent loss of control, or accidental use of weapons. So far, there has been no security lapse in any of Pakistan’s nuclear establishments.

Abdul Mannan, in his paper titled “Preventing Nuclear Terrorism in Pakistan: Sabotage of a Spent Fuel Cask or a Commercial Irradiation Source in Transport”, has analysed various ways in which acts of nuclear terrorism could occur in Pakistan (quoted in “Pakistan’s Nuclear Future: Worries beyond War”). He has fairly reviewed Pakistan’s vulnerability to nuclear terrorism through hypothetical case studies. He concludes that the threat of nuclear terrorism in Pakistan is a figment of imagination, rather than a real possibility.

There are millions of radioactive sources used worldwide in various applications. Only a few thousand sources, including Co-60, Cs-137, Ir-192, Sr-90, Am-241, Cf-252, Pu-238, and RA-226 are considered a security risk. The Pakistan Nuclear Regulatory Authority (PNRA) has enforced a mechanism of strict measures for administrative and engineering control over radioactive sources from cradle to grave. It conducts periodic inspections and physical verifications to ensure security of the sources. The Authority has initiated a Five-Year National Nuclear-Safety-and-Security-Action Plan to establish a more robust nuclear-security regime. It has established a training centre and an emergency-coordination centre, besides deploying radiation-detection-equipment at each point of nuclear-material entry in Pakistan, supplemented by vehicle/pedestrian portal monitoring equipment where needed.

Fixed detectors have been installed at airports, besides carrying out random inspection of personnel luggage. All nuclear materials are under strict regulatory control right from import until their disposal.

Concluding remarks

Nuclear controls in India and the USA are not more stringent than Pakistan’s. It is not understood why the media does not deflect their attention to the fragile nuclear-security environment in India. It is unfortunate that the purblind critics fail to see the gnawing voids in India’s nuclear security.

The ‘research work’ by well-known scholars reflects visceral hatred against Pakistan. The findings in fresh ‘magnum opuses’ are a re-hash or amalgam of the presumptions and pretensions in earlier-published ‘studies’. It is time that the West deflected its attention to India where movements of nuclear materials, under the 123 expansion plan, are taking place between nuclear-power plants sprawling across different states.

Above all, will the international media and the IAEA look into open market uranium sales in India.

Continue Reading

Intelligence

Biological warfare: A global security threat

Published

on

Biological warfare is not a new concept in arena of international politics as it has been used as a tool to sabotage enemy in previous centuries. Biological weapons are a sub-category of Weapons of Mass destruction (WMDs) in which there is a deliberate use of micro-organisms like pathogens and toxins to cause disease or death in humans, livestock and yields.Form its usage in 14th century by Mongols to its usage by imperial Japan during 1930s-40s against Chinese, it has always been a threat to global security. The evolution of bio-weapons can be broadly categorized into four phases; first phase includes the post WWII developments with the evident use of chlorine and phosgene in Ypres.The second phase was marked by the use of nerve agents like tabun, cholinesterase inhibitor and anthrax and plague bombs. The initiation of third phase was marked by the use of biological weapons in Vietnam war during 1970s where deadly agents like Agent orange were used. 4th and last phase include the time of biological and technological revolution where genetic engineering techniques were at their peak. Traditionally they have been used in wartime in order to defeat enemy but with the emergence of violent non-state actors, bioterrorism is another potential threat to the security of states. There are certain goals that are associated with the use of biological weapons. Firstly, it is purposed to hit to economy of the targeted country, breaking down government authority and have a psychological effect on masses of the targeted population. It is also a kind of psychological warfare as it may hit a smaller number of people but leaves impact on wider audience through intimidation and spreading fear. It also creates natural circumstances under which a population is induced with disease without revealing the actual perpetrator.

With the advancement in genetic engineering techniques more lethal biological weapons are being produced everyday around the world. Countries which are economically deprived are more likely to pursue such goals as it is difficult for them to go for heavy military sophistication keeping into consideration their poor economic conditions. Biological weapons serve as inexpensive tool for developing countries to address their issues in prevailing international security environment. During the initial decades of cold war, united states of America (USA) and Soviet Union went for acquiring tons of biological weapons alongside nuclear proliferation.

 The quest for these weapons reduced during 1970s with the formation of Biological and Toxin Weapons Convention (BWC). This convention was presented in 1972 before countries and finally came into force in 1975 with 150 countries who signed this convention and 140 countries who fully joined this treaty. This convention prohibits any biological weaponization in order to promote peace and stability around the world. But this convention has obvious defects as it is unable to address many issues like it doesn’t prevents itself the use of biological weapons but just reinforces 1925 Geneva Protocol which forbids the use of bio-weapons. Convention allows ‘defensive research’ to which there are many objections that what is incorporated into this defensive research. It is non-binding to the signatory states and in case if countries are proliferating it lacks the effective oversight techniques to look after them either they are pursuing these biological weapons capabilities or not. Since the inception of this convention till now it has clearly failed in stopping the countries from acquisition as well as usage of these weapons. This is evident as there were many cases after 1975 where these weapons were used as in 1980s when Iraq used mustard gas, sarin and tabun against Iran and many other ethnic groups inside Iran. Another incident which was highlighted was Sarine nerve gas attack in Tokyo subway system leaving thousands injured and many got killed. In post-cold war era, however, the number of these attacks reduced as much attention was shifted to terrorism after 9/11 attacks with the change in global security architecture.

“Anthrax letters” in post 9/11 attacks revealed yet another dimension of bio-weapons which was the threat of bioterrorism from non-state actors. US became a victim of bio-terrorism when in 2001 a powder was transported through letters containing bacterium called anthrax infecting many people. One purpose which terrorists have is to make general masses feel as if they are unsafe in the hands of their government which can be best achieved through the use of these weapons. The fact that biological weapons are cheaper and more devastating than conventional weapons make it more likely for biological weapons to be used by terrorists. Also, the fact that they are easy to hide and transport and a smaller quantity can leave long-lasting impacts on larger population makes these weapons more appealing.  Now that we are facing a global pandemic in the form of COVID-19 which according to some conspiracy theories is a biological weapon pose even more serious challenge to the international security in coming decades. There is no such scientific research which proves Corona Virus as a biological weapon but the realization here is that whether or not it is a biological weapon but world was least prepared for it. Not only the developing countries but also developed states suffered more despite having enormous medical infrastructure. The fact that there has been decline in the incidents related to bioterrorism should never let us think that there is no possibility of such attacks. The fact that world failed to handle Covid-19 puts a question mark on the credibility of measures if we are faced with bio-terrorism. The medical community as well as general population needs to develop an understanding of how to respond if there is such attack. At the international level there is a dire need to develop some strong norms which discourage the development and use of such weapons in any capacity.    

Continue Reading

Publications

Latest

Trending