The European Commission put forward a series of measures designed to further strengthen the EU’s framework to fight against money laundering and terrorist financing:
- An Action Plan for a Comprehensive EU policy on Preventing Money Laundering and Terrorist Financing
- A refined and more transparent methodology to identify high-risk third countries
- An updated list of high-risk third countries
To ensure inclusive discussions on the development of these policies, the Commission launched a public consultation today on the Action Plan. Authorities, stakeholders and citizens will have until 29 July to provide their feedback.
Action Plan for a Comprehensive EU policy on Preventing Money Laundering and Terrorist Financing
Why is the Commission adopting this Action Plan now?
While current EU rules are far-reaching, and even go beyond international standards, they are not applied in a fully coherent manner across the EU. This leads to fragmentation between Member States. The challenge lies not only with specific pieces of legislation but with how these rules are implemented effectively across the EU. There is a clear need to tackle this lack of coherence and ensure a more harmonised implementation of the rules across the EU.The recent increase in criminal activities in the context of the Coronavirus pandemic is a reminder that criminals will exploit all possible avenues to pursue their illicit activities to the detriment of society. The EU needs to be equally determined in ensuring that they do not benefit from the proceeds of these crimes.
In July 2019, the Commission adopted an Anti-Money Laundering Communication, which highlighted a number of measures that could be taken to remedy the weaknesses in the EU’s current anti-money laundering rules.
Following this, the European Parliament and the Council invited the Commission to investigate what steps could be taken to achieve a more harmonised set of rules across the EU, including better supervision at an EU level and improved coordination among Member States’ Financial Intelligence Units (FIUs).
Today’s Action Plan is the Commission’s reply to these calls and is a first step towards a new, comprehensive framework to fight money laundering and terrorist financing in the EU.
How is the EU going to stop money laundering and terrorist financing?
Money laundering is a difficult crime to detect. Its consequences can have a severe impact on the EU’s economy and on its financial system. Therefore, the EU needs to have a multi-faceted approach to properly tackle money laundering and terrorist financing. Action is needed on several levels.
This is why the Commission has today put forward a series of measures aimed at closing any loopholes or weak links in the EU’s anti-money laundering rules.
Today’s Action Plan is built on six pillars, each of which is aimed at improving the EU’s overall fight against money laundering and terrorist financing, as well as strengthening the EU’s global role in this area. When combined, these six pillars will ensure that EU rules are more harmonised and therefore more effective. The rules will be better supervised and there will be better coordination between Member States’ authorities.
The six pillars are as follows:
Effective application of EU rules: the Commission will continue to monitor closely the implementation of EU rules by Member States to ensure that the national rules are in line with the highest possible standards. In parallel, today’s Action Plan encourages the European Banking Authority (EBA) to make full use of its new powers to tackle money laundering and terrorist financing.
A single EU rulebook: while current EU rules are far-reaching and effective, Member States tend to apply them in a wide variety of different manners. Diverging interpretations of the rules therefore lead to loopholes in our system, which can be exploited by criminals. To combat this, the Commission will propose a more harmonised set of rules in the first quarter of 2021.
EU-level supervision: currently it is up to each Member State to individually supervise EU rules in this area and as a result, gaps can develop in how the rules are supervised. In the first quarter of 2021, the Commission will propose to set up an EU-level supervisor.
A coordination and support mechanism for Member States’ Financial Intelligence Units:Financial Intelligence Units in Member States play a critical role in identifying transactions and activities that could be linked to criminal activities. In the first quarter of 2021, the Commission will propose to establish an EU mechanism to help further coordinate and support the work of these units.
Enforcing EU-level criminal law provisions and information exchange: Judicial and police cooperation, on the basis of EU instruments and institutional arrangements, is essential to ensure the proper exchange of information.The private sector can also play a role in fighting money laundering and terrorist financing. The Commission will issue guidance on the role of public-private partnerships to clarify and enhance data sharing.
The EU’s global role: the EU is actively involved within the Financial Action Task Force (FATF) and on the world stage in shaping international standards in the fight against money laundering and terrorist financing. We are determined to step up our efforts so that we act as a single global actor in this area. In particular, the EU will adjust its approach to third countries with strategic deficiencies in their anti-money laundering and countering terrorist financing regimes that pose significant threats to our Single Market. The new methodology issued alongside this Action Plan today provides the EU with the necessary tools to do so. Pending the entry into force of this revised methodology, today’s updated EU list ensures better alignment with the latest FATF (Financial Action Task Force) list.
What about the effective implementation of current EU rules?
The Commission closely monitors the implementation of all EU rules in its Member States. For example, infringement proceedings were opened in February 2020 against all those Member States that failed to notify transposition of the 5th Anti-Money Laundering Directive.
In parallel, we continue to verify that Member States have fully and correctly transposed the 4th Anti-Money Laundering Directive. The Commission has also started checking how Member States are implementing this Directive in practice. This is done in the context of the European Semester cycle. The Commission has also contracted a study by the Council of Europe, which has extensive experience in such checks. This study will feed into the report on effectiveness that the Commission is required to submit by 2022 under the Anti-Money Laundering Directive.
The Commission expects the European Banking Authority (EBA) to use its new powers to improve the effectiveness of supervisory action in the financial sector by conducting on-site examinations to assess AML framework across the EU.
Will this Action Plan lead to a new Regulation? What rules will be harmonised in the future?
This will be subject to a thorough analysis to ensure that we reach as high a level of harmonisation as possible. Current EU rules do function but Member States tend to apply them in a wide variety of different manners. Diverging interpretations of EU law therefore lead to loopholes in our system, which can be exploited by criminals. To combat this, the Commission will propose a more harmonised set of rules in the first quarter of 2021.
A number of areas where divergence should be minimised were highlighted, namely the list of obliged entities, customer due diligence requirements, internal controls, and reporting obligations.
Is current supervision sufficient or should an Agency at EU level be created?
Following recent EU reforms, the European Banking Authority (EBA) has been empowered to act quickly and decisively in the fight against money laundering and terrorist financing. It is now equipped with concrete tools to ensure the exchange of information between anti-money laundering and financial supervisors.
The latest amendments of the Anti-Money Laundering Directive also give national authorities more powers to act where banks, or financial and non-financial entities, breach their anti-money laundering obligations. These amendments also improve the exchange of information between authorities.
Nevertheless, as outlined in a Commission Report on the assessment of recent alleged money laundering cases, some structural weaknesses in the EU’s anti-money laundering framework persist, even after all the new measures have been fully implemented.
These weaknesses may endanger the security and reputation of the EU’s financial system. Therefore, it is essential that the EU’s anti-money laundering rules can also be supervised at an EU level.
The role and scope of this EU-level supervision – as well as the supervisory body that should be tasked with carrying out this role – will be proposed following a thorough assessment of all options, also based on the feedback we will receive in the open public consultation launched today.
The EU-level supervisor will be established as part of a comprehensive new policy to fight money laundering and terrorist financing. The Commission has set the political objective to achieve this within this mandate, and we count on the support of the European Parliament and the Council to ensure that the legislative work will progress as swiftly as possible.
Will all operators be supervised by this EU-level supervisor?
This matter will be thoroughly analysed. As the Action Plan notes, there are several options regarding the scope of EU-level supervision, ranging from a narrow to a broad scope. Each of these options has pros and cons, and the Commission’s proposal will be based on a careful assessment of all options, also based on the feedback we will receive in the open public consultation launched today, ensuring that the future supervisory framework is of the highest quality and leaves no weak links nor loopholes in the system.
What about the national Financial Intelligence Units (FIU)?
Financial Intelligence Units(FIUs)in Member States play an important role in identifying transactions and activities that could be linked to criminal activities. However, several technical difficulties in the functioning of the secure communication channels (FIU.net) have created difficulties.
Several Financial Intelligence Units fail to comply with their obligation to exchange information with other Financial Intelligence Units. In addition, some Financial Intelligence Units have not managed to engage in a meaningful dialogue by giving quality feedback to private entities, as required by the Anti-Money laundering Directive. The Action Plan sets the ground for the creation of an EU support and coordination mechanism for these Units.
The aim of this mechanism is to remedy the weaknesses that were identified in how Financial Intelligence Units work. This support and coordination mechanism would support cross-border cooperation and analysis. It would also streamline how information is exchanged between Member States’ FIUs and the FIUs of third countries. Finally, this support mechanism will operate as the host and as a secure communication channel for the FIU.net.
The private sector can play a critical role in fighting money laundering and terrorist financing. What will the Commission do to support its involvement?
Private operators are the gatekeepers of our financial system and our economy. They are the first ones to detect whether a transaction or activity might be suspicious. With their day-to-day experience, they can certainly contribute to fighting money launderers and those who fund terrorist activities.
The Commission fully recognises the benefits of the public and the private sector working together in this area. At the same time, it is important that these partnerships develop in a sound manner. To this end, the Commission will issue guidance, including sharing of good practices, and will consider whether to request the opinion of the European Data Protection Board in this work.
Will the list of private operators subject to anti-money laundering/terrorist financing requirements be expanded?
We will analyse whether the current scope of operators subject to these rules is adequate. Recent reviews of international standards suggest that, as a minimum, virtual asset service providers should be requested to comply withthe relevant rules.
This is also an area where we can learn from Member States’ experiences. Some countries have expanded the list of professionals subject to these rules to include, for example, crowdfunding platforms. All these examples should be analysed, also based on the feedback we will receive in the open public consultation launched today, to arrive at a harmonised list of obliged entities.
New methodology for identifying high-risk third countries
Why do you need a new methodology to identify high-risk third countries?
Identifying and tackling money-laundering activities is a moving target. Criminal techniques develop fast and take into account the latest technological developments. The new methodology aims at tackling these issues and updating our capacity to successfully identify high-risk third countries with strategic deficiencies in their anti-money laundering and countering terrorist financing regimes that pose significant threats to our Single Market.
In addition, under the Anti-Money Laundering Directive (AMLD), the Commission has a legal obligation to identify high-risk third countries with strategic deficiencies in their legal systems regarding money laundering and terrorist financing. This is to ensure that enhanced due diligence measures are applied, for example, by relevant EU businesses when carrying out financial transactions involving those third countries.
The 5th AMLD, adopted in July 2018, further strengthened the criteria for the identification of high-risk third countries, going beyond the criteria of the Financial Action Task Force (FATF), in particular as regards beneficial ownership information.
The Council objected to the list presented by the Commission on 13 February 2019. The Commission has worked within that legal framework to address concerns expressed by the Council as regards the transparency of the process and the need to incentivise third countries and respect their right to be heard.
The key new elements of today’s refined methodology for identifying high-risk third countries concern: (i) the interaction between the EU and FATF listing process; (ii) an enhanced engagement with third countries subject to the autonomous assessment; and (iii) reinforced consultation of Member States experts. The European Parliament and the Council will have access to all relevant information at the different stages of the procedures, subject to appropriate handling requirements.
What are the criteria used for listing a third country at EU level?
The 4th Anti-Money Laundering Directive (AMLD) sets out the technical criteria for identifying high-risk third countries. These requirements have been revised by the 5th Anti Money Laundering Directive in order to provide even more robust criteria.
Under the AMLD, the Commission takes into account strategic deficiencies of those countries, in particular in relation to the legal and institutional AML/CFT (anti-money laundering / countering the financing of terrorism) framework such as:
o criminalisation of money laundering and terrorist financing,
o customer due diligence and record keeping requirements,
o reporting of suspicious transactions,
o the availability and exchange of information on beneficial ownership of legal persons and legal arrangements;
o the powers and procedures of competent authorities;
o their practice in international cooperation;
o the existence of dissuasive, proportionate and effective sanctions.
As a general requirement, the effectiveness in applying those AML/CFT safeguards will be considered. When carrying out its assessment, the Commission considers relevant evaluations, assessments or reports drawn up by relevant international organisations and standard setters – in particular those issued by FATF – as well as other information sources.
Once the new methodology is in place, who will be consulted?
Member State experts will be consulted at every stage of the process regarding the assessments of third country regimes, the definition of mitigating measures, third countries’ implementation of “EU Benchmarks” and the preparation of the Delegated Regulation. This consultation will include specific Member State competent authorities (law enforcement, intelligence services, Financial Intelligence Units). The European Parliament will be fully involved in those consultations.
The Commission is committed to ensuring appropriate reporting to the European Parliament. Both the European Parliament and the Council will have access to all relevant information at the different stages of the procedures, subject to appropriate handling requirements.
How often will the list be updated?
The EU list will be updated one month following the publication of an updated FATF list, which the Commission considers as a baseline. In addition, the Commission will identify further third countries based on its own autonomous assessment, after having engaged with those countries as set out in the refined methodology published today. The Commission will immediately identify those countries that refuse to take commitments to address their strategic deficiencies (“non-cooperative jurisdictions”) or those third countries that have an overriding level of risk. Third countries taking commitments to address concerns, as part of the Commission’s autonomous assessment, will benefit from a 12-month observation period. In case they do not implement those commitments within the agreed period, the Commission will proceed with a listing.
How does the FATF lists interact with the EU list?
Third countries listed by the Financial Action Task Force (FATF) will in principle also be listed by the EU. For countries de-listed by FATF, the Commission will assess whether the reasoning for de-listing is also sufficiently comprehensive from the EU’s point of view.
With regard to EU Accession countries, the Commission may develop other mitigating measures in the context of the accession negotiations that address the identified strategic deficiencies. Accession countries could take commitments that go beyond the FATF action plans. This will be closely monitored by the Commission. This option does not apply to third countries that are not in the process of acceding to the EU.
In specific circumstances – for example, if a third country has strategic deficiencies in its anti-money laundering and countering terrorist financing regime that pose a significant threat to the EU or if certain requirements related to beneficial ownership transparency are in question – certain EU requirements can “top up” the existing FATF Action Plan.
If a third country presents a risk and is not yet subject to the FATF procedure, the Commission or Member States should flag this in FATF before considering adding this country to the EU’s autonomous list.
What is the link between the AML listing process and the EU’s list of non-cooperative tax jurisdictions?
The EU list of non-cooperative tax jurisdictions and the EU’s AML lists may overlap on some of the countries they feature, but they have different objectives, criteria, compilation processes and consequences. The EU’s tax list is a Council-led process, whereas the EU’s anti-money laundering (AML) list is established by the Commission based on EU anti-money laundering rules. The high-risk third country (AML) list aims to address risks to the EU’s financial system caused by third countries with deficiencies in their anti-money laundering and counter-terrorist financing regimes. On the basis of this list, banks must apply higher due diligence controls to financial flows involving those high risk third countries. The anti-money laundering list is compiled by the Commission. On the other hand, the common EU list of non-cooperative tax jurisdictions addresses the external risks to Member States’ tax bases, posed by third countries that do not comply with international tax good governance standards. It is managed directly by the Member States, through the Code of Conduct Group, with the support of the Commission. The Code of Conduct Group decides which jurisdictions should be listed and makes a recommendation to EU Finance Ministers, who take the final decision. Nonetheless, the two lists complement each other in ensuring a double protection for the Single Market from external risks.
Why does the Commission not propose a “grey list” of countries being assessed?
Unlike the EU’s list of non-cooperative tax jurisdictions, the Anti-Money Laundering Directive only provides for one single list of “high risk third countries” based on identification of strategic deficiencies in the anti-money laundering and counter terrorist financing regime in a given country. It does not provide for a “black list” or “grey list.” As a result, the Commission considers that such a “grey list” cannot be issued, as no firm conclusion would be reached on the existence of strategic deficiencies. The Commission will, however, ensure full transparency with the European Parliament and Council throughout the process of engaging, in cooperation with the European External Action Service, with third countries, so that the co-legislators can monitor progress in the implementation of this new methodology, including in the drafting of EU benchmarks and assessing their implementation within the given timeframe.
New EU list of high-risk third countries
Why is the Commission presenting a new list of high-risk third countries?
Criminals and terrorists are not sitting back during the Coronavirus pandemic. Europol has provided a recent assessment of new threats posed by criminal groups trying to take advantage of the pandemic.
The EU is committed to protecting the integrity of its financial system and preventing financial flows involving countries with strategic deficiencies in their anti-money laundering and countering terrorist financing regimes. In line with the risk-based approach, banks and other obliged entities must apply enhanced due diligence in case of financial flows to/from high-risk third countries identified in the EU list.
As defined under the 4th and 5th Anti-Money Laundering Directives, the EU has to establish a list of high-risk third countries, to make sure that the EU’s financial system is equipped to prevent money laundering and terrorist financing.
The Commission issued the first such list in 2016, and updated it subsequently over the past years. Since the adoption of the 5th Anti-Money Laundering Directive, the criteria by which a third country is assessed have been extended substantially, thereby requiring the Commission to carry out an autonomous assessment. This required an adaptation of the listing process based on a refined methodology. This also follows calls from the European Parliament to have an autonomous list. Today, the Commission has amended the list of high-risk third countries, via a Delegated Act, in order for it to be better aligned with the lists published by FATF. This update is necessary since the EU list has not reflected the latest FATF lists adopted since October 2018. Further updates will take place once the Commission has engaged with third countries subject to the EU’s autonomous assessments, according to the refined methodology published today.Given the Coronavirus crisis, the date of application of today’s Regulation listing third countries – and therefore applying new protective measures – only applies as of 1 October 2020. This is to ensure that all stakeholders have time to prepare appropriately. The delisting of countries, however, is not affected by this and will enter into force 20 days after publication in the Official Journal.
What countries have been added to the EU list?
The Commission took into account the latest lists issued by FATF. As a consequence, the Commission has listed 12 new countries on the EU list. Based on the FATF “Compliance documents”, the Commission considers that The Bahamas, Barbados, Botswana, Cambodia, Ghana, Jamaica, Mauritius, Mongolia, Myanmar, Nicaragua, Panama and Zimbabwe meet the criteria set out in article 9(2) of Directive (EU) 2015/849. Those countries have expressed a high-level political commitment to implement an action plan agreed with FATF to address their strategic deficiencies. We welcome those commitments and invite those jurisdictions to implement them swiftly.Given the Coronavirus crisis, the date of application of today’s Regulation listing third countries – and therefore applying new protective measures – only applies as of 1 October 2020.
What countries have been removed from the EU list?
Following progress made, the Commission has removed 6 countries from the EU list. The Commission’s review concluded that Bosnia-Herzegovina, Guyana, Lao People’s Democratic Republic, Ethiopia, Sri Lanka and Tunisia addressed their strategic deficiencies and should therefore be delisted.This decision will enter into force 20 days after publication in the Official Journal.
What is the situation of other countries recently delisted by FATF?
For those countries delisted by FATF since the adoption of Delegated Regulation (EU) 2016/1675, the assessment by the Commission is still ongoing (i.e., Afghanistan, Iraq, Trinidad and Tobago and Vanuatu).
Regarding Iraq and Afghanistan, the available information and the security situation in the countries did not allow the Commission to conclude, at this stage, whether they effectively addressed their strategic deficiencies. This is due in particular to the fact that those countries were delisted by FATF based on a former procedure that did not assess the effective application of AML/CFT measures. Effective application of AML/CFT measures is a criteria explicitly included in the requirements set out in the AML Directive.
Regarding Vanuatu and Trinidad and Tobago, the available information did not allow the Commission to conclude, at this stage, whether they addressed their strategic deficiencies, notably as regards the transparency of beneficial ownership, which is a specific requirement set in the AML Directive.
The Commission will review the anti-money laundering regime of those countries as a matter of priority and will engage with them as appropriate, based on the refined methodology.
What is the situation of Albania with regard to its AML/CFT regime?
The assessment of high-risk third countries is applicable to enlargement countries – which can be listed in case strategic deficiencies are identified. As set out in the methodology, the Commission can also address these issues in the framework of the accession process where the Candidate Countries are requested to fulfil a set of stringent criteria. Therefore, alternative mitigating measures can be put in place in such instances within the framework of other EU policies, as part of the enlargement policy.
In February 2020, Albania made a high-level political commitment to work with FATF and the Council of Europe to strengthen the effectiveness of its AML/CFT regime. Similarly, the Commission developed additional mitigating measures that were put in place to address key concerns. Albania expressed a high-level political commitment towards the Commission to implement further mitigating measures, notably further aligning with the EU Anti-Money Laundering Directive and putting in place registers of beneficial ownership. These commitments go beyond the action plan agreed with FATF. Therefore those mitigating measures are considered as appropriate to address risks posed to the EU financial system at this stage. This option does not apply to third countries that are not in the process of acceding to the EU.
What are the consequences of the listing for financial institutions?
Under to the 4th Anti-Money Laundering Directive, banks and other financial institutions (“obliged entities”) have to apply extra checks (“enhanced customer due diligence requirements”) for transactions involving high-risk third countries identified on the list.
Customer due diligence corresponds to a series of checks and measures that a bank or an obliged entity has to use in case they have suspicions of high risk of money laundering or terrorist financing. Enhanced due diligence measures include extra checks and monitoring of those transactions by banks and obliged entities in order to prevent, detect and disrupt suspicious transactions.
The Fifth Anti-Money Laundering Directive clarifies the type of enhanced vigilance to be applied, which includes obtaining additional information on the customer and on the beneficial owner or obtaining the approval of senior management for establishing a business relationship.
The listing does not entail any type of sanctions, restrictions on trade relations or impediment to development aid but requires banks and obliged entities to apply enhanced vigilance measures on transactions involving these countries.
What are the consequences of the listing for the financial system?
According to the 4th AMLD, banks and other obliged entities are required to apply enhanced vigilance in transactions involving high-risk third countries (so called “enhanced customer due diligence requirements”). This is also in line with international obligations, where FATF already calls on its members to apply enhanced due diligence to high-risk jurisdictions. Those enhanced measures will lead to extra checks and monitoring of those transactions by banks and obliged entities in order to prevent, detect and disrupt suspicious transactions.
These measures do not entail any type of sanctions, restrictions trade relations or impediment to development aid but it aims to apply enhanced vigilance measures in those cases. In order to further clarify the type of enhanced vigilance to be applied, the 5th AMLD, adopted in June 2018, harmonises those enhanced measures.
What is the impact of the EU anti-money laundering list on EU-funded financial operations?
The listing process does not affect EU humanitarian assistance, EU development policy or the provision of grants, procurement and budget support.
The use of EU funded financial instruments and budgetary guarantees is subject to stricter provisions in relation to anti-money laundering and countering terrorist financing. According to the EU’s Financial Regulation and the European Fund for Sustainable Development Regulation, there is a prohibition against “Implementing Partners” (such as International Financial Institutions or National Promotional and Development Banks) entering into new or renewed operations with entities established in countries on the EU’s list of high risk third countries, when carrying out financial operations supported by the EU budget.
There is however an exemption when the action is physically implemented in the third country in question (subject to the absence of other risk factors). That means that when an action is physically implemented in a listed jurisdiction (i.e. when the financial operation supported by the Union budget is implemented in a listed jurisdiction exclusively for the purpose of financing a project in that same jurisdiction), the Implementing Partner can still carry out financial operations with entities established in that jurisdiction with the support of the EU. Therefore, there should be no adverse effect with regard to actions physically implemented in listed jurisdictions.
Why will the new protective measures only apply as of 1 October 2020?
The very exceptional and unpredictable situation arising from the Coronavirus pandemic has a global impact and is leading to significant disruption for economies and national administrations around the world. Therefore, the date of application of today’s Regulation listing third countries – and therefore applying new protective measures – only applies as of 1 October 2020. This is to ensure that all stakeholders have time to prepare appropriately. The delisting of countries, however, is not affected by this and will enter into force 20 days after publication in the Official Journal.
Will there be any technical assistance available for the countries identified as high-risk third countries?
The EU is committed to providing technical assistance to the countries identified as high-risk third countries. The Commission is one of the world’s leading donors when it comes to providing targeted support to tackle anti-money laundering / countering terrorist financing. The Commission currently has a programme (€20 million) under the Global Facility (AML/CFT) to support countries in the world to monitor, disrupt and deny the financing of terrorism and money-laundering. The Commission aims at supporting more partners to address AML/CFT issues. This process is demand-driven – i.e. countries will have to define their needs and request technical assistance to improve their AML/CFT regimes in the framework of the external aid policy of the Commission.
What are the next steps?
The Delegated Regulation has now been transmitted to the European Parliament and to the Council for a 1-month scrutiny period (extendable by 1 more month). If there is no objection during this period, the Delegated Regulation will be published in the Official Journal in view of its entry into force. The Commission will re-initiate its reviews under the autonomous assessment and come up with, at an appropriate time, a new autonomous list. These assessments will be subject to consultation of Member States’ experts and appropriate engagement with third countries, in cooperation with the European External Action Service (EEAS), as set in the refined methodology. The European Parliament and the Council will have access to all relevant information at the different stages of the procedures, subject to appropriate handling requirements. The Commission will continue to engage in FATF in order to ensure increased synergies between the EU and the FATF listing process.
Finally, as part of the planned review of AML/CFT rules at EU level, the Commission will conduct an impact assessment and propose legislative proposals in early 2021. Input from today’s open public consultation will feed into this impact assessment. The legislative proposals should ensure that risks posed by third countries are appropriately addressed.
A More Diverse Force: The Need for Diversity in the U.S. Intelligence Community
As part of a hiring initiative meant to attract new and diverse hires, the Central Intelligence Agency (CIA) released a new recruitment video in March of 2021. The video featured a Hispanic female discussing her background and time in the CIA, as well as why she chose to serve her country. She says at one point, “I’m a woman of color. I am a mom. I am a cis-gender millennial who’s been diagnosed with generalized anxiety disorder…I did not sneak into CIA. My employment was not and is not the result of a fluke or a slip through the cracks. I earned my way in, and I earned my way up the ranks of this organization”.
The video showed a woman who cares for her family, cares for her country, and desires to see a difference be made in the world. However, some took issue with the advert though, though these criticisms came over a month after the video first was published and made available to the public.
In a tweet, the Republican Senator from Texas, Ted Cruz, said, “If you’re a Chinese communist, or an Iranian Mullah, or Kim Jong Un…would this scare you? We’ve come a long way from Jason Bourne”. Many criticized Cruz for his usage of Jason Bourne, a fictional CIA Paramilitary Operations Officer, yet he took to Twitter once again to clarify, saying, “My point is that CIA agents should be bad-asses—not woke, fragile flowers needing safe spaces”.
Donald Trump, Jr. tweeted “China & Russia are laughing their asses off watching CIA go full woke…If you think about it, wokeness is the kind of twisted PSYOP a spy agency would invent to destroy a country from the inside out”. Others, including popular conservative commentators like Dinesh D’Souza and Meghan McCain, also criticized the ad calling a “joke” or “insane” while others went as far to say that the CIA was “actively looking to recruit the most immodest, narcissistic, grotesquely self-serving people in the world”.
Criticism towards the ad did not purely come from the Conservative, rightist personalities either, but also members of the left. Left-leaning publications such as The Intercept and Jezebel both critiqued the ad. It seems that, from all sectors of American public and political life, this advert and total tactic was heavily derided; from members of the left, it was cringey and irrespective of the agency’s long and controversial history while, from members of the right, it was ineffective national security and intelligence policy.
However, what many seem to be forgetting is that diversity within the intelligence world is an extremely important factor in creating effective and accurate foreign policy and in gaining the most up to date and accurate intelligence.
Intelligence analysis is probably the most important part of the Intelligence Cycle and holds just as much, if not more, importance as the end result, the intelligence estimate or packet. To put it simply, if the analysis is corrupted in some way, shape, or form by either the analyst’s personal views or tainted by poorly verified intelligence, then the action taken based upon this intelligence could result in missteps or negative affects to U.S. policymakers, military units, or regions in which the intelligence affects. Throughout history, there are an abundance of examples in which intelligence analysts have misinterpreted situations due to their own biases about a nation, political ideology, or have been selected specifically to sort through intelligence in order to back up a preconceived opinion.
One of the best examples in showing how analysts’ personal views, both conscious and subconscious, can affect their overall analysis is the 1954 coup d’état of Guatemalan President Jacobo Árbenz.
The coup, which was given the CIA codename Operation PBSUCCESS, was a mission in which the U.S. government, via the CIA and U.S. State Department, engaged in fomenting a coup to remove Árbenz, the leftist president who had approved of agrarian reforms within Guatemala. To justify an invasion, members of the State Department and CIA tried to link Árbenz to Guatemalan communists, yet this proved very difficult as there was “no evidence that Arbenz himself was anything more than a European-style democratic socialist”. A CIA paper, published two months before the coup, also, “did not cite any direct contact between Guatemalan Communists and Moscow. The paper offered ideology, not facts…”.
A master’s thesis written by a student at West Virginia University extensively and exclusively covers the CIA’s decision making process, detailing how, “CIA reports from the early 1950s also demonstrated this fear [of Communism]… The “red scare,” in essence, affected nearly all Americans. Many in the Eisenhower government also felt that Moscow had a nefarious hidden hand and controlled communist sympathizers around the globe,” while also noting that the, “ONI [Office of Naval Intelligence] did not feel that CIA had valid reasons or enough sources to reach the conclusion it did regarding Soviet intentions in Latin America”. The heightened fears of Communism and the Soviet Union that permeated the minds of analysts within the State Department and CIA (as well as the desires by some to ensure the survival of the United Fruit Company in the country) resulted in intelligence that was skewed to believing that the Guatemalan government was embracing Communism, when, even according to the CIA’s own histories, was baseless.
Based upon this example, as one can see, the intelligence provided to the U.S. government was based upon analyst biases and did not accurately reflect how the Guatemalan government under Árbenz operated nor how entrenched the Communists were in political life. The fear of Communism overwhelmed the amount of solid and fact-based analysis, resulting in an invasion that removed a democratically elected president.
This coup eventually resulted in the emplacement of a right-wing, military government, which would rule until 1996, overseeing a brutal civil war complete with death squads, acts of genocide committed by presidential administrations, political assassinations, and a drastic increase in governmental corruption. Members of the CIA who were involved in the operation too regretted their actions and acknowledged that the outcome did not benefit Guatemala, the U.S., or Latin America. Operation PBSUCCESS did not bring about a U.S.-friendly democracy, but a U.S.-friendly military dictatorship that engaged in war crimes and severely destabilized the entire country. The failure of this operation to bring about a democracy and U.S. intervention in the country in the first place was, in my own view and examination, based upon biased analyses by the CIA which promoted the view that Guatemala was becoming sympathetic to Communists and the operation itself shows just how important intelligence analysis is.
Not only is analysis an incredibly important tool within the intelligence cycle as a whole, but the analyst themselves are highly important. The analysis is only as good as the analyst and if the analyst is biased, limited in their outlook or worldview, or come from a sole section of society, then the analysis will reflect those beliefs. Most of the analysts involved in the Guatemalan operation were white and male, most likely coming from middle-class backgrounds and either having military service or Ivy League education or both. These beliefs and hiring processes which exclude persons beyond the majority of America’s populace can significantly hinder an agency and promote a poor world outlook. The majority of persons in countries in which the U.S. is involved, thinking of becoming involved, or are creating analyses in anticipation of potential foreign policies are not white or male nor from wealthy societies; they are, most often than not, of an extremely different mindset than many Americans, live in poverty or close to poverty, and have an immensely different culture. While the CIA has made some headway in this area, retired CIA case officers and analysts have made claims that the CIA (and the Intelligence Community as a whole) are severely underperforming and not effectively recruiting towards people from outside of that select pool.
Ted Cruz and Donald Trump, Jr.’s comments about the CIA lowering their standards and fostering an environment in which the CIA now is ineffective at creating intelligence or defending the United States from foreign threats (not being “badass” enough) is nonsensical. If anything, the inclusion of persons who are not white or male, who have experience outside of the military, who are knowledgeable on issues beyond military, intelligence, and national defense/security makes for a more well-rounded force and an agency more effective at analyzing collected intelligence, crafting accurate and informed recommendations, and allowing past mistakes, the misreading of important political events, to take hold. Including strong, analytical persons from more minority backgrounds into the national security framework will perform wonders for American intelligence analysis and in making influential policy decisions.
To quote Marc Polymeropoulos, a retired CIA officer, “Diversity is an operational advantage. Simple as that. I want case officers who look like the UN”.
Women Maoists (Naxalbari)
Every now and then, Indian newspapers flash news about Maoist insurgents, including women being killed. They usually avoid mentioning how many soldiers were killed in encounters, whether fake or genuine. Here is a glimpse of such news: A woman fighter, along with a male c-fighter, was killed in a clash with government forces in Odisha’s Malkagiri district (Press Trust of India, December 14, 2020).
In another incident, a woman Maoist was killed in an encounter with India’s security forces in Sukma district of Chhatisgarh (PTI, October 13, 2010). A woman Maoist was killed near Anrapali forest (Visakhapatnam, Andhrapradesh). And, another woman Maoist, carrying Rs. 16 lac reward on her head was killed in Gadchiroli district of Maharashtra.
Sometimes there are pitched battles between the Indian forces and the Maoists, including women. For instance, there was a head-on confrontation between a Maoist group and government forces of over 1500 “jawan”, equipped with state-of-the-art weapons and helicopters at the Bijapur-Sukma border. Sans air power, the Maoists, armed only with machine guns, gunned down 22 soldiers belonging to Central Reserve Police Force, Commando Battalions for Resolute Action (Cobra), and Bastariya Battalion of the Central Reserve Police.
Why do women join the Maoist Movement?
They find the Maoist narrative of emancipation attractive. . Not only the low-caste women but also the high-caste ones joined the Maoist ranks in droves. About 30 to 40 per cent of combatants are Maoists. The status of women in the Indian society is no better than that of slaves. They are not supposed to form an opinion or dare express it. Even the high-caste women are supposed to be reticent and coy. They are tutored to be housewives confined to quadrilateral of their homes, rear children, and do household chores. The Maoist ideology ingrained the sense of empowerment in them. The Maoist manifesto teems with such words as “mahila sasahktikaran” (women’s empowerment), “raise their voices” (awash uthaunne), “get their voices represented” (mahilako awaj ko pratinidithyo) and “understand women’s grief” (mahila ko dukka bhujnne).
The Maoist struggle is commonly known as “the people’s war”. The “war” aims at abolishing the feudal system, and creating a democratic egalitarian society. The bulwark of the Maoists is rural population, lower castes and women. Women and men of all castes, classes, ethnic backgrounds and education levels joined the movement.
The Maoist has incorporated women’s emancipation in their ideological manifesto, actually a “40-point demand-document”. The gender equality is enshrined in points 19, 20 and 21, mentioned heretofore:
“19. Patriarchal exploitation and discrimination against women should be stopped, girls should be allowed to access paternal property as their brothers.
20. All racial exploitation and suppression should be stopped. Where ethnic communities are in the majority, they should be allowed to form their own autonomous governments.”
The Maoist proved their heart-felt commitment to the manifesto by punishing rapists, wresting back the usurped land of single women, penalising men for polygamy, and prohibiting the sale of liquor as drunken men more often beat the women. Jan adalats (“people’s courts”) ferociously uphold women’s rights on issues of social and domestic violence.
Women were given political or combat position on the basis of merit. Untouchability and gender discrimination has been abolished. The points 19, 20 and 21 of the Maoist manifesto relating to women stress the need to transform state and customary laws to redress gender inequality at all levels.
In 2002, in recognition of their female constituency, the Maoists introduced the so-called “prachanda path,” creating a women’s department in the Central Committee. In several cases, it is the women who slay the incorrigible feudal tyrants. The women realise that they are “agents of change” who have to fight out repression in all its manifestations. The women have become politically aware that they have the right make decisions about their marriages, children’s education, and other everyday gender needs.
Indian police admit it was the women fighters who were in the vanguard of a deadly attack in Chhattisgarh, where 24 people, including some top politicians, were killed.
Because of its liberal manifesto, the insurgency has spread to 11 states, with Chhattisgarh, Jharkhand, and Odisha as epicenters. It has become entrenched in all central and eastern Indian states, often referred to as the “Red Corridor.
Having failed to subdue the Maoists, the government occasionally resorts to spreading false news about deaths of Maoist leaders. For instance, Hindustan Times dated June 24, 2021 reported that Maoist leader Haribushan, carrying a reward of Rs. 40 lac on his head, had died from COVID19. Her wife rebutted the news (Parveen Kumar Bandari Hans News Service October 5, 2021). “More than 16 senior and middle level level communist leaders have died in the last couple of months due to COVID19…Two senior most leaders of Bastar Ganga, including Dandakaryana Special Zone Committee members Ganga and Sobhroi have died due to infection in the last couple of months”.
Sympathy with Naxals is an offence
In the Bhim Koregaon planted-letters case, several intellectuals and rights activists including Navalakha were declared “traitors” by the Indian government. They were even accused of having links with Kashmiri militants. Fake letters were inputted into their computers. They were even accused of being Pakistan’s intelligence agencies agents through Ghulam Nabi Fai, a US-based Kashmiri leader. Fei has served two-year imprisonment in the USA for having illegally received funds from the inter-services intelligence of Pakistan.
The Maoist are trying to disseminate their message to urban areas also. They understand that the minorities are fed up with the regressive caste system. The rebels want to radicalise youngsters and already have carved out a strong network in premier universities of Delhi and Kolkata. The Maoist want to create an urban militia to fight the oppressive enforcement machinery of the states and Indian Union. They are believed to have infiltrated the government intelligence machinery to stay abreact of government’s tactics.
The Maoists make no bones about their plan to set up a “coordination network among like-minded outfits in India, Bangladesh and Nepal. They want unhindered movement of left-wing extremists in these territories to exchange arms, ammunition and information”. To counter the Maoist strategy, India rushed its diplomats to capitals of neighbouring countries to plug up the porous border and obstruct the insurgents’ free movement.
In addition, India launched Special teams for simultaneous searches in Tamil Nadu, Kerala and Karnataka at suspected Maoist training centres and hideouts. The effort was counter-productive because India’s national Investigation Agency framed charges against the innocent people.
During searches, the Indian forces were surprised to know that the retired Gorkha soldiers of both British and the Indian Army harbour sympathy for the Maoists.
They trained the Maoists to use fire arms efficiently. Some Maoists demonstrated their alacrity and military sills in planning bank robberies, and extorting ransom from rich businessmen. Besides arms and ammunition snatched from police stations, the Maoists are believed to have amassed over Rs. 5 billion from bank heists. The general impression in people’s minds is that the Indian forces dare not pursue the Maoists in forests. The insurgents pick up places where to ambush the security forces, and make off with booty with impunity.
Salwa Judum (purification hut)
Having failed to arrest momentum of the movement, India organised a private army ofSalwa Judum ledbyMahendra Karma From among the villagers. To boost their morale, they were given honorary rank of “special police officer. “As a workaround, the government sponsored counter-militias and split tribes into those “for” and “against” Maoists. Those willing to fight the Maoists were offered guns, money and honorary police ranks.
The Maoists shot dead Mahendra Karma and several members of the ruling Indian National Congress whose brainchild the Salwa Judum was. It later transpired that the salwa judum had been cobbled up with help of child soldiers recruited under duress or financial allurement. It was involved in gross human rights violations. When People’s Union of Civil Liberties in India brought its atrocities to the Supreme Court’s notice, it declared it illegal in 2011.
Charu Mazumdar started the movement as a “revolutionary opposition” in 1965. The world came to know of it in 1967 when the Beijing Radio reported “peasants’ armed struggle” at Naxalbari (Siliguri division of West Bengal). In July 1972, the police arrested Charu Mazumdar and tortured him to death on the night of July 27-28. The Naxalite ideology has great appeal for marginalized strata (particularly dalit and adivasis) of India’s caste-ridden society. The Naxalites Central Committee’s resolution (1980) visualises creating a base for spreading people’s democratic revolution. It would include : ‘Homogenous contiguous forested area around Bastar Division (since divided into Bastar, Dantewada and Kanker Districts of Chhatisgarh) and adjoining areas of Adilabad, Karimnagar, Khammam, East Godavari Districts of Andhra Pradesh, Chandrapur and Garchehiroli district of Maharastra, Balaghat districts of Madhya Pradesh, Malkagiri and Koraput districts of Orissa. The Naxalites want to carve out an independent zone extending from Nepal through Bihar and then to the Dandakarnaya region extending up to Tamil Nadu to give them access to the Bay of Bengal as well as the Indian Ocean.
China disrupted Facebook around the world for political and intelligence reasons?
First: The fact that the Chinese child “Wang Zhengyang”, whose picture is circulated globally, and who now lives in the United States of America and not in China
Second: The accusations of Facebook founder “Mark Zuckerberg” against China, and the Chinese defense of deliberately waging a technological war and cyber hacking against the work of American technology companies
Third: Reasonable Chinese and international accusations that Facebook deliberately disrupted its network, coupled with evidence and proof
Fourth: Analyzing the aspects of Chinese benefits and the Chinese political and ethical employment for the disruption of the American “Facebook” network around the world, internally, externally and ideologically
Fifth: The attitude of the Chinese themselves towards the ban by the Chinese authorities and the leaders of the Communist Party of China of the “Facebook” website in their country, according to the Chinese Constitution
Sixth: The relationship between (the crisis of disrupting Facebook and restoring China’s technological prestige and position) between its citizens and the world, and promoting the theory of “the superiority of Chinese technological applications over their American counterparts”
Facebook and its CEO well-known “Mark Zuckerberg” have faced many crises in recent years, which led to his summoning to appear before a “hearing committee in the US Congress”, especially with the rumors of hacking and selling the privacy and data of tens of millions of users of the “Facebook” network and its other applications around the world. Some leaks indicated that “Cambridge Analytica Company” has obtained (the data of more than 50 million users’ accounts on the Facebook social networking site without their knowledge, after concluding a secret deal with the same company for commercial and advertising reasons), which violates the privacy of users. It leads to a violation of their human rights if their data is used inappropriately.
We find that the crisis of disrupting the “Facebook” network and its American applications for several hours, has coincided with many “accusations and conspiracy theories associated with it”, such as:
that the disruption was deliberate, as the global giant “Facebook” tried to erase some evidence, proofs and evidence that condemns the company in one way or another, especially with the (summoning of the US Senate to Mrs.Francis Haugen”, who previously worked in the products department in the location headquarter company of the “Facebook” in 2019, but it submitted its resignation after noticing illegal actions and activities carried out by Facebook and its officials, in order to hear its testimony regarding the “unlawful actions of Facebook”, endangering the interests of the United States of America itself, and condoning the Dangerous toys for children may prompt suicide in order to achieve “material gains” for the company, regardless of any other considerations.
On the other hand, analyzes have begun regarding the Chinese conspiracy theory against “Facebook” and its CEO “Mark Zuckerberg”, in a Chinese attempt to embarrass the United States of America internationally due to the failure of its democratic digital technology system that it is trying to promote around the world, and to confirm the success of “Chinese alternative networking services and applications to its American counterpart” in avoiding these American technological errors, especially after “Downdetector” spotted it.
Notifying that “Down Detector”, its main task is to track (website crashes), and it has received tens of thousands of reports of crashes on (Facebook, Instagram, WhatsApp, Messenger) platforms. It was not immediately clear what caused the malfunction that affected the three platforms.
Despite the growing number of theories and comments about China’s involvement in “Facebook hacking and penetrating”, Facebook itself has denied any allegations of being hacked or any evidence that users’ data has been hacked, explaining the reason for the malfunction. All of its services and applications, including: (Instagram and WhatsApp), amid the growth of many (conspiracy theories) that have spread around the world, and the growing intensity of rumors circulating, including a Chinese child “hacker” penetrating the (Facebook) network alone and disabling users’ data.
Because of this, Facebook’s Vice President of Infrastructure “Santosh Janardan” issued a company statement, saying:
“Our engineering teams learned that changes to the settings on the main routers that coordinate traffic between data centers caused problems that disrupted this communication”
Santosh Janardan, as the (Vice President of Facebook Infrastructure Company), denied the responsibility of China or any other parties or even hacking operations behind this malfunction, explaining in a public statement, in which he assured the world and users, that:
“We want to make it clear that there was no malicious activity behind this malfunction, and its main cause was a wrong change of settings on our part, and we also have no evidence that user data was compromised as a result of this malfunction”
Hence, we note the “increasing international criticism of Facebook”, and its ability to avoid and solve those problems that caused (imbalance in the financial markets, stock exchanges and global markets). Accordingly, and to try to understand the whole picture, the Egyptian researcher will try to raise all the problems related to the company “Facebook”, and to respond in practice to the reasons for accusing China in the first place of hacking the network, as follows:
First: The fact that the Chinese child, “Wang Zhengyang”, whose picture is circulated globally, and who now lives in the United States of America and not in China
The Egyptian researcher followed up on the global uproar that aroused when a Chinese child “hacker” penetrated the Facebook site, and caused this global malfunction of Facebook’s search engines and disrupted the activities of the world, but when the Egyptian researcher was searching on the famous Chinese search engine “Baidu” as “Chinese alternative to the global site of Google”, they are constantly considering that “Baidu is a Google site alternative in China”.
We will find a definition of the true identity and personality of the child, completely different from what was circulated globally, according to the following reasons:
Where the “Chinese Baidu website” indicated the identity of the child appearing in the globally circulated image, as a picture of the globally known Chinese hacke “Wang Zhengyang”, who now actually lives in the United States of America to complete his studies and is not in China at all.
The interesting thing for analysis is what the famous Chinese website “Baidu” mentioned that the Chinese child whose image is being circulated globally is called (Wang Zhengyang), and he is (born in 2001), meaning that he is a young man and not a child as various sites around the world claimed, and “his age is now aout 20 years old”, and the most amazing thing for me personally, is that “he is recentely resides in the United States of America and not in China”, whereas (Wang Zhengyang) traveled to study in the United States of America to continue studying his specialization in (computer, programming and information systems).
He also noted the “Chinese Baidu website”, praising the genius of “Wang Zhengyang”, and that he was one of the students in a school in the Beijing Municipal Public Security Bureau and the Education Committee for the implementation of (Enlightenment Project for Network Security).
We can as well find that the actual appearance of the Chinese child (Wang Zhengyang) for the first time globally at the (Chinese Internet Security Conference), in 2014, and that was the first appearance of the Chinese genius child (Wang Zhengyang), who was only 13 years old, as the youngest hacker across mainland China.
When the Chinese child (Wang Zhengyang) was accused at the time of hacking his school’s website and endangering the privacy of its files and students’ data, the child (Wang Zhengyang) defended those allegations against him himself, accusing him of hacking his school’s website, according to his claim or defense at the time, that:
“He was only meant to help fix his school’s data website to help her and not intentionally harm her”
As the Chinese child (Wang Zhengyang) explained at the time, that:
“The school website he hacked was not for middle school students, but for high school students in the same educational institution”
Perhaps what stopped me analytically is what the child (Wang Zhengyang) confirmed at the time and his emphasis, on:
“He would rather be seen as an ethical computer hacker, and would not use technology to do illegal things”
Hence, the whole matter was orchestrated as previously referred to as a global rumor, it was not determined who (the first cause of its release, regarding the personality and identity of the Chinese child “Wang Zhengyang”), and even more dangerous to me (the reasons and deliberately ignoring his life now in the United States of America itself and not in the China’s capital of Beijing), in which he studied throughout his primary studies.
I think that they are all legitimate questions and inquiries on my part, and the entire world public opinion has the right to understand, and this is the most dangerous point for me, and it should be asked and explained, as follows:
“Why have we all been deceived about the true identity of the Chinese child by deliberately concealing his true age and deliberately concealing as well his whereabouts?”
Second: The accusations of Facebook founder “Mark Zuckerberg” against China, and the Chinese defense of deliberately waging a technological war and cyber hacking against the work of American technology companies
We find that in the context of an attempt by “Facebook Company and its owner and CEO, Mark Zuckerberg” to circumvent the size of the losses that the company suffers periodically, as well as accusing it of many accusations in exchange for achieving financial gains and profits, Mark Zuckerberg’s accusations have been multiplied to China and its alternative technological applications, on the pretext (China’s attempt to impose its laws, systems, values, and communist ideology on the world), and despite the inability of “Facebook Company nor its founder Mark Zuckerberg” to prove the validity of their allegations against China, the Chinese side has begun to respond to “the violations of Facebook and its CEO Mark Zuckerberg”. The agreed upon ethical standards, and the most important mutual accusations between the (two sides), which are as follows:
1) It cannot be asserted that China deliberately launched a technological war and cyber hacking against the work of American technology companies, which did not explicitly accuse China in this regard. We find that the most important statement issued by “Mark Zuckerberg”, the founder of Facebook against China, is his explicit accusation of it, saying:
“Beijing wants to impose its values on us, and we will not allow another country to impose special laws on us on the Internet”
2) The second reference against China also comes, regarding what Mark Zuckerberg referred to, as the CEO of “Facebook”, and his other frank accusation directed at China, saying:
“Six out of 10 social media sites that exist today are mainly Chinese, and Beijing is trying to impose its values on us, and we cannot allow another country to impose laws on the Internet”
3) The first real confrontation between “Mark Zuckerberg” against China, is his decision to establish (a committee to monitor and control the movements of Chinese social networks), and this team can take the final decision without the intervention of any other official. Here, “Mark Zuckerberg” made sharp accusations against China, and indirect hints that it was “the reason behind calling him for an urgent hearing in the US Congress”, and that was several months ago, for what he rumored about him from “politicizing the content and spreading chaos and violence”.
4) The famous American surveillance website “whois.domaintools”, as a site that specializes in monitoring domains and their owners, especially on Facebook, has published a promotional announcement, saying that:
“The domain of facebook.com is for sale, due to its exposure to several previous cyber attacks”
5) We find that China has repeatedly been subjected to fierce attacks by American officials and politicians via Facebook and China’s denunciation of this, most notably (the emergence of the Coronavirus vaccinations and the intimidation of receiving Chinese vaccines), and China accused “Mark Zuckerberg” of causing a global panic, and of aiding preventing people from getting the right vaccine.
6) Caving in to Chinese pressure, “Mark Zuckerberg” was forced in mid-March 2021 to appear, confirming on his Facebook page his support for the global vaccination campaign and helped spread vaccine awareness ads, but the attack continued on Facebook, as a result of allowing commentators, comments and addresses to promote theories and comments that prevent people from receiving the vaccine, especially the Chinese. Hence, we understand “the tense relationship between Facebook and its founder, Mark Zuckerberg, and China”, especially during the recent period.
Through the previous analysis of the details of the relationship between Facebook and China, we find that the matter has gone beyond the line of technological competition to the exchange of accusations against each other, especially with what has been proven even within the American interior itself, that Facebook and its founder, “Mark Zuckerberg” is trying to play political roles and put (its gains profits and material above the public interest, as it overlooks the many damages caused by the site to its users and children), as well as proving a number of users of the “Instagram” application owned by the same company that the company deliberately sells their data and violates their privacy for purposes and interests that are purely material and not ethical. Hence, China is defending that:
“Our Chinese local network of applications to preserve the values, morals, and cohesion of Chinese society itself in the face of the corruption of Facebook and its operators in the United States of America”
Third: Reasonable Chinese and international accusations that Facebook deliberately disrupted its network, coupled with evidence and proof
We find that after the failure of the Facebook network service, and the rest of the other applications associated with it, the logical question in China and the world has become:
“Did Facebook intentionally disrupt its servers, software, and the scope of its networks around the world to hide a scandal or secrets that shook the image of the United States of America globally?”
We note here that a number of Chinese accusations against the company “Facebook“, which adopts a number of logical reasons, deliberately in charge of the famous network – perhaps based on US government pressures, deliberately disabling the network for several hours, to hide secrets, and was based mainly on the Chinese and globally on a number of Among the reasons behind this sudden malfunction of the “Facebook” network, including:
The Facebook company has all the adequate measures to secure its servers, software, and its giant international network from any accidental accidents, hacks, or various and innovative backups in the event of any failure or malfunction.
Facebook’s possession of the best security and technical system in the whole world, and perhaps what it has is not owned by major governments and countries, and this brings us to the same most dangerous question, related to the “conspiracy theory”, which is:
“Did “Facebook” deliberately disrupt its servers, software and network globally for several hours?”
Here, logical reasons related to the international reputation of the United States of America were actually linked, which prompted Facebook and those responsible for it to disable the network, perhaps (to erase those evidence and evidence, which condemns the United States of America), and the owner of the American Facebook, “Mark Zuckerberg”, and in conjunction with events and events Interestingly and logically linked to the sudden downfall of Facebook, such as:
(Pandora’s Leaks, the testimony of Francis Haugen)
The “Pandora Documents leak”, is one of the most important legal and political battles in the world, which Facebook is trying to contain immorally, according to the list of accusations delegated to it, which is a (leakage of a huge number of documents containing many financial secrets that may make scandals and provide financial crimes to hundreds of world leaders, politicians, billionaires and celebrities).
The accusations came to the Facebook network and its founder, “Mark Zuckerberg”, of deliberately disabling the network’s servers and data for several hours to erase and remove all documents and prices contained in documents and leaks in the name of “Pandora’s Reveal”, which is a leak of nearly 12 million documents that reveals (Fortune secrecy, tax evasion, money laundering by some world leaders and wealthy people).
Therefore, accusations have been leveled by China and a large number of well-known journalists around the world, including more than 600 journalists in 117 countries, who began searching for a large number of sensitive files from more than 14 sources for several months to reveal (major global corruption cases affecting the most important global leaders, which Facebook is trying to prevent in various ways in order to preserve Washington’s interests with the countries of the world) and to achieve material gains for the company at the same time.
The data was obtained by the (International Consortium of Investigative Journalists), based in Washington DC, known as its consortium name, is: “ICIJ”
The accusations against “Facebook company deliberately disrupting its work for several hours around the world” confirm that he was working with more than (140 media organizations in the largest global investigation of its kind ever in the world, but the quality of the documents collected and found were with political and international nature, and lead to political and international crises for Washington and its allies), so it became necessary for the “Facebook” network to get rid of it completely, so it came (deliberately disrupting the network for several hours for purely political and intelligence purposes to carry out this task, and to erase those dangerous and sensitive documents, so that no access is reached and consequently embarrassing Washington with its allies around the world), and shaking the world’s confidence in the United States of America.
On the other hand, “Facebook’s fear of publishing data, extracts or clips from the testimony of the former employee of the company, Ms. Francis Haugen against the company and its officials, is supported by documents and documents about the nature of the violations and penetrations of the Facebook network globally”. And here we mean the testimony of “Mrs. Francis Haugen”, an employee who worked as a former manager in the products department in the “Facebook” company since 2019, to help address the problem of election interference through social media, especially after (several accusations of the Russian side of interfering in the final results of the US Presidential elections), in favor of former US President “Donald Trump”.
Perhaps the most dangerous thing that “Mrs. Frances Haugen” said and tried to silence her and stop her and get rid of her by threatening her, is that American policy makers and legislators are encouraging the “Facebook and its owner Mark Zuckerberg” network to disrespect its users and violate, exploit, hack and sell their privacy for purely material purposes, as well as On the adoption by those in charge of “Facebook” of a polluted agenda, as it incites inhuman standards for the following taboo:
(Spreading hatred, racial discrimination between whites and blacks and all other minorities, fueling political and religious disputes and conflicts to achieve material gains, not caring about the health and security of users, especially children, by publishing games that encourage suicide in exchange for huge financial gains)
Based on the testimony of “Mrs. Francis Haugin”, the position of the Chinese President, Comrade “Xi Jinping”, came to issue of “laws that obligate young people to abide by the male dress and not to mix identities, and to prevent the broadcast of any content in the Chinese media in which men imitate women”, with the publicly affirmation of the Chinese authorities and leaders the Communist Party of China “CPC” stated the need to work on:
“Limiting the scope of work and spread of technology companies producing children’s electronic games and applications to reduce them and curb their growth and increasing influence”
Hence, since November 2020, the Chinese authorities have started to adopt a strict campaign throughout the country, based and aimed primarily at “protecting children, youth and school students from falling into the trap of addiction to games and applications at the expense of their health and their relationships with the entire community”.
And based on the evidence, evidence and previous evidence that confirms (the Facebook company intentionally disrupts its work to erase the evidence of its international condemnation). Hence, we find, that with the (increasing of American and Western criticism to the Chinese campaign directed against American and mainly Western technology companies, which produce children’s toys), especially those that encourage suicide, such as: (Facebook films for children), policy makers in the Communist Party of China tried to assert that:
“Germany, as a successful Western model, has adopted the same policies to protect its children and children. Despite the progress of industry and modern technologies and technology, Germany has restricted the work of children’s toy companies, with Chinese leaders confirming that Germany has succeeded in industry, production and progress, not consumption and games”
Fourth: Analyzing the aspects of Chinese benefits and the Chinese political and ethical employment for the disruption of the American “Facebook” network around the world, internally, externally and ideologically
The malfunction of Facebook and its various applications, such as: “WhatsApp, Instagram, Messenger”, shows the extent of American hegemony over very important tools in the era of the digital economy, to extend American influence and control over the world, and in return, China has distanced itself from these (Digital chaos) by banning these American and Western applications and providing (local Chinese alternatives of technology that fits the nature and values of Chinese society and protects its youth and children), through:
My accurate analysis as an expert in Chinese Politics for (the great Chinese benefits from the disruption of Facebook as a giant of American technology around the world, and the attempt to use the matter politically, ideologically and values to defend its interests), thus hitting and offending the reputation of American social networks, as well as their inability to confronting the emergency and most importantly its violations of the rights of the child, family and human being.
This may also come in the field and scope of the work of “Chinese digital technology propaganda in the face of the alliance of digital technological democracies against it, led by Washington with its allies, such as: Britain and Australia in the first place”, especially after the United States of America banned the Chinese technology giant of (Huawei company for technology), which adopts China’s plan on The world, especially in developing and African countries, to spread (the fifth generation services “G5″ for Chinese digital technology).
China will also try to improve the reputation of its technology companies globally, especially after the arrest (the Chinese financial director of Huawei in Canada and her arrest and then recently sentenced on charges of belonging to a banned group, as well as other financial charges related to the work of the Chinese company Huawei itself), which increased the tensions of the relations between China and the United States, especially with China accusing Washington of pushing its Canadian allies to obstruct its interests around the world.
China was able to use the disruption of American social networks to make (technological ideological propaganda for itself, by proving it with tangible evidence, that social networks in China did not suffer any glitch during the Facebook stoppage), regarding the work of applications for mobile phones in China.
Therefore, Chinese social networks, such as: “Weibo, WeChat, Kyukyo, Youku, Doyen”… etc., which were working normally during a period of downtime and disruption of all American versions of the web and its applications, especially those linked to the American Facebook network, the Chinese ideological propaganda focused mainly on the inside, stating that:
“The social networks in China did not suffer any malfunctions during the failure of their American counterparts”
In this context, the Chinese media tried to emphasize (the good management of the ruling Communist Party authorities of the country, especially with the Chinese authorities banning American technological services, such as: Facebook and its applications inside China), which are: “Instagram, Twitter, and WhatsApp”, and others. As well as (China bans the work of some other Western technology companies that have been proven to violate Chinese laws), and therefore, the Chinese citizen was not affected by any noticeable stop, with his use and use of Chinese applications alternative to the American, and from here (no one practically noticed that any of the Chinese applications stopped working within the whole mainland of China during the period of downtime and disruption of Facebook and its various applications around the world).
Through this analysis, we understand that (China mainly focused its efforts on the inside), certainly that China does not face any similar technical problems, especially with the impact of this interruption of Facebook’s work on the accounts of millions of users around the world, as well as causing problems using the “Oculus platform” for virtual reality, which is also affiliated with “Facebook”, while (China only uses its own technological applications with a global reputation and good value, given that there were no technical problems in it, as well as observing all the ethical standards that its American counterparts neglected).
Fifth: The attitude of the Chinese people themselves towards the ban by the Chinese authorities and the leaders of the Communist Party of China of the “Facebook” website in their country, according to the Chinese Constitution
The ruling Communist Party authorities have tried to conduct (large educational and awareness campaigns for all the Chinese people about the danger of American and Western digital technologies on the identity, national culture and values of the People’s State of China), as the new competition between China and the United States of America and the West is witnessing several accelerating geostrategic balances and radical internal social and political transformations. China has become more capable of changing the image of the world and the relations of competition in it in new unconventional ways, such as: the matter of “Chinese alternative technological applications in the face of Western technologies”.
This alternative proposal for Chinese digital technology, alternative to its American and Western counterparts, enhances the legitimacy and strength of governance and the ruling authorities of the Communist Party in the Chinese state, with their ability to win over the masses and Chinese public opinion with a system of cultural values agreed upon among all the Chinese people with their leaders, authorities and ruling party. Which can be understood, as follows:
The Chinese authorities have reaffirmed the depth of their far-reaching strategic view by blocking a number of American social networking sites, especially “Facebook” in China since 2009, and the Chinese authorities attributed the blocking to (three main reasons), which are:
First: Because (those American social media sites deliberately underestimate the values of China and fail to mention the China’s historical facts), such as deliberately mentioning the necessity of reviving the old revolutions in China and promoting their renewal.
Second: The presence of (gaps in the security and privacy options on Facebook, and its threat to Chinese national security).
Third: The growing criticism against China on the famous search engine website of “Google”, and its intentional publication of “pornographic materials”, which (infiltrate the privacy of children and the Chinese family).
2) The Chinese authorities also blocked the famous American website of “Amazon” for selling books, due to the intention of the “Amazon” website to provoke China despite its warning, by deliberately selling and promoting a book banned from publication in China that talks about revolutions, as if anyone clicks on a website or link of the book is on Amazon from China, the site is completely blocked for at least 15 minutes, which is an attempt by the Chinese state to maintain its security and stability and protect its history and heritage in the face of American and Western absurdity, as China officially defends itself.
3) Hence, (private Chinese applications began to promote themselves, and the Chinese media themselves promoted them, by not disrupting them during the period of downtime and sudden failure in other American digital services), which cost heavy losses in the United States of America approaching 164 thousand dollars, losses per minute, that is, nearly $60 million, which China has not faced.
4) As for the position of the Chinese themselves towards banning Facebook in their country, you find that “Chinaese people keenness to preserve the value system of Chinese society”, considering that American websites, such as: (Facebook, Twitter, Google), and the other applications, as from China’s point of view, they’re looking to the American and Western IT applications may (infect the Chinese value system, as it threatens the culture of the Chinese).
5) According to the Chinese constitution, “the Chinese state itself is morally responsible for protecting its citizens from exposure to Western and American cultural invasion”, and also for closing the door on Western attempts to use these sites to foment internal political unrest against the Chinese state.
6) Hence, we find that China, after the disruption of Facebook and the rest of the other related applications, we can analytically highlightthe (Chinese promotion of the superiority of its digital values and technological model in the face of American and Western applications), and the Chinese affirmation of the validity of its theory to follow a policy called: (Building the Great Firewall Project china)
Or what is officially, known as: “the Golden Cover Project”,or “Golden Shield”.
Which is one of the most important and sensitive Chinese technical projects to monitor the Internet and block the unwanted websites, and it is considered one of (the most advanced Chinese sensitive technical projects in the world).
Based on the understanding of the Chinese technological map and the most important methods and celebrities that China adopts in the face of American and Western digital technologies such as Facebook, as we analyzed it, and from here we find that (the ruling Communist Party authorities in China are trying to take advantage of the rapid technological progress in the mainland of China to change the geostrategic map of the world in a fast way, whose nature has not yet been clear in the face of American hegemony and unilateralism), which is evident to us from the way and mechanism of the Chinese political and ethical employment of the (relationship between the technology and politics and the interaction and mutual influence between them), which represents one of the most important determinants of this new world, and the innovative non-traditional competition trends between China and the USA.
Sixth: The relationship between (the crisis of disrupting Facebook and restoring China’s technological prestige and position) between its citizens and the world, and promoting the theory of “the superiority of Chinese technological applications over their American counterparts”
The researchers, scholars, and the international academic community around the world are witnessing the emergence of new technological and cognitive terms that are all centered around the American-Chinese technological conflict and polarization at the present time in its political form, such as the term of (Techno-Politics).
This new term of “Techno Politics” refers to (the relationship between political and technological affairs in its changing form), in a way that can be applied to the current conflict and competition between China and the United States of America over “fifth generation networks and the United States’ ban on the Chinese company Huawei”, as a result of the struggle over the acquisition of technological applications and their relationship The nature of competition and political polarization between Washington and Beijing, but in terms of digital and technology, which we can apply and understand on the part of China during the crisis of the Facebook disruption, as follows:
The crisis of disruption of Facebook and the rest of the applications associated with it, such as: (WhatsApp, Instagram), and others, has restored China’s technological prestige and position among its citizens, and demonstrated the depth and far-sightedness of the policies of the Communist Party of China, emphasizing that:
“China’s blocking of many American social media sites is not in vain, as the Chinese state sees great importance in “not leaving the personal information of its members in foreign hands that may one day exploit that information, which is our primary task in preserving the Chinese citizen, as one of the important ingredients for maintaining China’s national security”
This also reminds us of a crisis that occurred a few years ago, a crisis occurred between “the American Google company” and China, during which the two parties exchanged accusations that took a political nature, and ended with the consent and agreement of the two parties to transfer the “Google” engine service to the city of “Hong Kong”, where it directs you to Google’s Hong Kong site directly, if you try to open the site in any of the other provinces and provinces of China.
On the other hand, China is trying to promote other Chinese search engines competing with the US, such as: “Baidu”, which was launched by China in 2000, to be the first search engine in the country, and also a strong competitor to the American company “Google”.
We can also recognize the “Youku website” in China, which is the Chinese alternative to “YouTube”, as “Youku” is the most largest and important site that provides the service of uploading and publishing videos on the Internet in China, and the site is characterized by the ability to upload unlimited videos, as it allows users to upload full movies and complete episodes of Chinese, Korean, and American series. And the site as well allows the Chinese people to follow up on many (non-Chinese films and series, as they are accompanied by Chinese subtitles on the screen), outperforming the services of the YouTube American site.
We also find that the “Weibo” site in China, as the Chinese alternative to “Twitter”, which is blocked in China, and the word “Weibo” in Arabic means (small tweets or short posts), and according to the “Weibo site’s statistics”, its Chinese users are daily writing more than 100 million microblogs, outperforming the famous Twitter social networking site.
Here, we also find the “QQ” application in China, with taking into consideration that “QQ”, is considered one of the largest chat programs in China, and an alternative to the famous chat programs, such as: (MSN & Yahoo), which the Chinese do not accept to use.
We also find the “WeChat” applicationor “Weixin” in Chinese, which is the most used application in China for social networking, where the parent company revealed a new report to it, which showed that it has so far more than 400 million active users and they are constantly increasing.
With the intensification of the Chinese accusations against the United States of America, which I consider to be the most violent of all, was the accusation of the Chinese Vice Foreign Minister “Xie Feng” to the United States of America publicly, of “trying to eliminate the Chinese regime”, In text, he said:
“There is a campaign by an entire government and an entire society that is being waged to bring down China”
This was reported by the well-known Chinese newspaper, “China Daily”, during “Ms. Sherman’s visit to Tianjin province in China”, on July 26, 2021, who is considered the most high-level ranking senior official in the American administration of President “Joe Biden” to visit China.
Finally, we find that through the previous comprehensive analysis of the Egyptian researcher to analyze and understand the nature of the work of Chinese technology companies in the face of their American and Western counterparts, we can now accurately understand (the role or employment of the political and value but also the ideology of Chinese and American technology companies and all other digital platforms associated with them to play real and independent geopolitical roles).
Therefore, the talk about (the disruption of the Facebook network around the world, the role of China and the exchange of accusations between all concerned parties is closely linked to national security and its link to digital technology and the giant Chinese digital technology projects globally in the Silicon Valley region), especially with the connection of advanced technology networks and companies at the present time with governments, which applies to “Facebook” and its connection with the US federal government and various political institutions as I mentioned, and also with the association of Chinese companies working in the technology sector with the government, this shows us with evidence (the seriousness of the relationship between digital technology, politics and national security) for both China and the USA in our case.
Hence, what most analytically caught my eye, academically and researchly was (Chinese President Comrade Xi Jinping’s meeting with Apple CEO “Tim Cook”, at rates that exceed his meeting with presidents and leaders in the whole world). This is a confirmation of what I have previously presented in this close connection between the governments of countries and giant technology companies, and even (transcends their borders because of their connection with armies and all national security files around the world, which is almost applicable to the American and Chinese cases and the Chinese alternatives applied to digital technology in the face of American and Western competition, in order to preserve on its national security from any penetration), and this fully proves and confirms our theory about (the relationship between politics, technology and national security, the limits and extensions of influence between each other).
Credit Suisse to pay $475 million to U.S. and U.K. authorities
Credit Suisse Group AG has agreed to pay nearly $475 million to U.S. and U.K authorities, including nearly $100 million...
Gallup: World’s Approval of U.S. Govt. Restored to Obama’s Record High
On October 19th, Gallup issued their “2021 Rating World Leaders” report and finds that “Six months into the first year...
China beats the USA in Artificial Intelligence and international awards
The incoming US Secretary of the Air Force said that China was winning the battle of Artificial Intelligence over the...
Iraq: An Urgent Call for Education Reforms to Ensure Learning for All Children
Learning levels in Iraq are among the lowest in the Middle East & North Africa (MENA) region and are likely...
Breaking The Line of the Israel-Palestine Conflict
The conflict between Israel-Palestine is a prolonged conflict and has become a major problem, especially in the Middle East region....
More Funding for Business and Trade to Help Lao PDR Recover from Pandemic
The World Bank and the Government of Lao PDR have agreed to scale up a Competitiveness and Trade Project that...
Changing complexion of “militancy” in the occupied Kashmir
Two teachers, Supinder Kaur and Deepak Chand, were shot dead in Srinagar on October7, 2021.The Resistance front owned the killing....
Africa4 days ago
Analyzing The American Hybrid War on Ethiopia
Energy3 days ago
Gas doom hanging over Ukraine
Intelligence4 days ago
Women Maoists (Naxalbari)
New Social Compact4 days ago
Eurasian Forum: Empowering Women in the Changing World
Middle East3 days ago
Safar Barlek of the 21st Century: Erdogan the New Caliph
Middle East3 days ago
Iran unveils new negotiation strategy
Middle East3 days ago
Shaping US Middle East policy amidst failing states, failed democratization and increased activism
Russia3 days ago
The 30th Anniversary of the Renewal of Diplomatic Relations Between Russia and Israel