How is the new “Cold War 2.0”,which currently characterizes the ever less collaborative relations between the United States and China, developing?
Some data may be interesting in this regard. On March 3, 2020 the Chinese cybersecurity company Qihoo 360 accused CIA of having hacked many Chinese companies for over 11 years.
They are – almost obviously – aviation companies, large global commercial Internet networks, research institutions and certainly also Chinese government agencies.
Not to mention the cryptocurrency operations often organized by people and entities traceable to the North Korean government.
Both the Chinese and the US governments, in fact, use various and complex entities and mechanisms to operate in cyberwar. Firstly, the “front companies”. Just think of the Chinese group APT40, which even hires hackers – as everybody does, after all. Secondly, the intrusions to collect cyberdata in the large multinational companies, or even in State agencies, which often remain blocked for a few days and, in that phase, transfer vast masses of data to the “enemy”.
Thirdly, the theft of IP and trade secrets- another mechanism that everybody uses.
Obviously this is not the case of Italian Agencies, which, at most, can entrust a small, but good Milanese company to do some hacking, possibly in accordance with the law.
It now seems that the Italian ruling classes are composed above all of what in the 1920s Gaetano Salvemini called “the Paglietta of the Naples Court”.
On the military level, the United States believes that today the Chinese Joint Chiefs of Staff can hit well and quickly any opposing C3 system (Combat, Control, Communication) and that it can also carry out automated, but smart warfare operations, from the very first moments in which a significant regional military clash occurs.
Although many US experts in the sector also maintain that, still today, the United States hasa better base of action and, probably some advanced technologies that could enable the United States to have a better and wider cyber action. Nevertheless, this is not necessarily the case.
Certainly China is well aware that the Western and especially North American response to a harsh cyberattack would entail an even harsher, immediate and ruinous reaction against Chinese targets in the homeland and in the other regions.
Hence cyberwar’s parallel IT operations are mainly carried out by Russia: just think of the attack on French TV5Monde in 2015 or on Ukrainian energy companies in late December 2015, as well as on Sony in 2014. We can also mention the 2017 attack – through the use of a computer virus, WannaCry – which, however, was a cyberattack attributed by the United States to North Korea.
On the technical-legal level, the Chinese legislation that governs the Chinese cyberwar is mainly contained in the National Security Law of 2015 and finally in the Intelligence Law of 2017, in which it is laid down that cyber operations can be conducted both by the Ministry of National Security, the old guoan, and by the Office for Internal Security of the Public Security Ministry.
The operations abroad normally concern the Centre for the Evaluation of Intelligence and Technology (CINTSEC), which is an integral part of the Ministry for State Security.
The other autonomous cyber networks operating within the People’s Liberation Army(PLA) add to this official network.
At geopolitical level, China does not want to trigger any conflict with the United States. Neither a traditional conflict nor a cyber one. Quite the reverse.
China’s current real goal is to bridge the technological and operational gap between the two cyberwars, both on a strictly military level and, above all, on the economic and technological one.
China knows that – as Napoleon said – “wars cost money” and it is good not to make them if they can be avoided.
For the United States, China needs cyberwar to win “particularly informationalised local wars”.
Conversely, for Chinese theorists, cyberwar is the only real strategic war of the 21st century, as it was the case for nuclear war in the 20th century.
In other words, the technological and doctrinal area that allows to win a medium and large conflict and then sit at the peace negotiating table with of Phaedrus’s motto Quia sum Leo.
Also on a global and commercial level, China even plans to build a large private company that can compete on an equal footing with what in China is called “the eight Kongs”, namely Apple, Cisco, Google, IBM, Intel, Microsoft, Oracle and Qualcomm.
Therefore, at military level, China wants first of all its full cyberspace security so as to ensure the security of critical intelligence, both of regions and economic activities.
Also on the American side, however, there is currently a tendency to reduce the Chinese cyber penetration power, both at military and commercial levels. Some analysts maintain that,in recent years, the Chinese cyber presence has been very exaggerated.
There is a psywar operation – this time, certainly, of North American origin, but recently present on the Web – which currently makes us add a further analytical factor on the intelligence cyberwar and, above all, on the implementation of cyber criteria in psywar.
Nowadays there is a sort of “Report of a Military Contractor” available on the Web- as it is officially entitled – which is supposed to reveal just what the United States would like to hear still today, i.e. that Covid-19 is just a “Chinese virus” that was designed and made in the now very famous Wuhan laboratory.
This report was drafted by a previously unknown Multi-Agency Collaboration Environment (MACE), a group of cyber and non-cyber experts, whose site is only part of the Sierra Nevada Corporation.
However, it is still a current relevant contractor of the US Department of Defence.
Hence the usual “external centre” that is used to say things that it would be unreasonable to say directly.
The report states it is based on evidence related to the posts of the intra-and extra social networks, both of the laboratory and its employees, as well as on the data provided by non-military satellites and finally on the positioning data of mobile phones.
All this in view of even saying that “something” happened – probably by chance and accidentally, but in any case extremely severe and uncontrolled – in the Wuhan laboratory, only with regard to the Covid-19 virus.
This is a further phase of the modern misinformation technique: at first, it was said that the virus deliberately came out of the Hebei laboratory, while now it is underlined that it probably “escaped” unintentionally from its microscopic cage.
It is easy to understand what they really want to communicate: even if the Chinese government were not responsible, international lawsuits for claiming damages would still be possible.
Nowadays, at least in the West, misinformation is carried out at first by hardly hitting the opponent and later possibly apologizing for saying something inaccurate or wrong. A psychological warfare technique that creates the “aura” of the case without later supporting and corroborating it. It is very dangerous.
A really dangerous tactic, especially in the presence of an increasingly evolved and advanced Network.
The document, however, does not report as many as seven locations of mobile and institutional phones within the Wuhan laboratory – too great a flaw to be accidental.
MACE also states that, allegedly, a whole conference inside the Hebei laboratory was “cancelled”, due to an unspecified disaster, while, again in the documents of the laboratory, there are pictures with a clear internal date concerning precisely that event, the conference of November 2019.
One of these pictures was also found in the social media of a Pakistani scientist who had participated.
Even the aerial photographs provided by the company Maxar Technologies are a sign of obvious and normal repairing of roads, certainly not specific roadblocks placed due to an unforeseen and very severe event.
A few days ago President Trump stated that the “virus came out of the lab because someone was stupid”. Too easy and, I believe, useless even for a legal and insurance case against the Chinese government itself.
Moreover, these is the more or less manipulated data which, however, has certainly been useful to develop and spread the theory of “Chinese fault” for the outbreak of the epidemic and then pandemic, just in the midst of the great “acquisition of intelligence data” to which Trump and Pompeo referred.
All this just to reaffirm, without any reasonable doubt, the wilful or culpable guilt of the Chinese government in the outbreak of the coronavirus pandemic, and hence to stop the development of China and make it retreat, – with huge legal costs – from a development rate that was already within reach.
Moreover, the aforementioned MACE report lacks some data that we would simply call cultural intelligence, i.e. not knowing that the first week of October is a “golden” week for China, e.g. the National Day which commemorates the foundation of the People’s Republic of China, announced by Mao Zedong in a very famous speech at the Square of Heavenly Peace Square, with an even more famous phrase: “the Chinese people have stood up!”
How can they not know this, even believing they are intelligence people?
The same happened with a US report on the coronavirus issue transmitted from US to Australian intelligence agencies and later immediately published in a Sydney newspaper. Obviously everyone also “manipulate” documents to defame the opponent, but there are many ways and means of doing so.
On a more strictly doctrinal level, however, the issue brings us back to the analysis developed in 1999 by the two famous PLA Colonels, Quiao Lang and Wang Xiangsui, entitled Unrestricted Warfare.
It was a manual on what we would today call asymmetrical warfare.
Today, however, Quiao Liang thinks that – even at this stage of the conflict -war is still linked to the manufacturing industry. This means you can have excellent scientific research and a good network of research centres, but if you do not turn all this into mass and important industrial products, as Quiao Liang says, “you have just won a medal, but nothing more”.
Liang also maintains that the United States is therefore using up its weapons and industrial equipment stocks.
Furthermore, the more the coronavirus crisis worsens -considering the scarcely effective reaction of the US economic and health system – the more the consumption of North American military and civilian stocks increases, although the ability to produce them decreases more than proportionally.
Hence has the United States still have a manufacturing and mass industry, as well as the ability to turn technological evolution into mass products, to wage an asymmetrical or conventional war but, above all, to continue it until the final victory?
The Chinese Air Force General seems to imply that this is not the case.
Hence, in his mind, currently the only reasonable solution for China is to expand its production system, but never underestimate the “traditional” medium-low technology manufacturing industry, which is the one that reproduces and expands production forces and enables it to last over time, which is the only real guarantee of victory.
You do not eat fintech products, but rather Californian tomatoes and Midwest meat.
Those who want to collect technological jewels can certainly do so and – as the General maintains – obviously also China must do so, but what is still and always needed is the great mass production and items that, coincidentally, have become scarce all over the world: masks, respirators, food, traditional infrastructure, as well as means of transport.
It is fine if you believe that war and the economy are a superhero scenario, but you have to win, i.e. “to last one minute more than your opponent” – hence you need to go back to a mass, industrial, stable and growing civilization for the “real” economy.
The myth of high technology as the key to everything, induced by the development of the current United States, has made everyone else in the world lose the true sense of modernization, the key concept of the Chinese political narrative, from Deng Xiaoping to present days and in the future.
You cannot think of a future civilization in which social verticalisation is such that a share of over-rich countries slightly higher than 1% follows the vertical impoverishment of all the others.
A mass impoverishment which also leads to a reduction of manufacturing production. The products are later sent to “Third World” countries to trigger a process of social pyramidalization that is almost unprecedented in human history. And what is it for? For uselessly spending the mad money produced by fintech?
Therefore, the Chinese General believes that a US decoupling from China – as all the economists close to the White House preach-is needed to prevent China from taking all the most important technological and defence patents. In his opinion, however, also China must not decouple from the USA at all. This is not useful for high technology, but if anything, to avoid doing the same as the United States on a mass level.
If there is decoupling – as the current US economists preach – the Chinese products will become more competitive compared to the US and US-related products. Hence the US monetary hegemony would soon disappear and the same would be true for the its double use of the dollar that made an old FED Governor say to his European colleagues: “the dollar is our currency,but it is your problem”.
Therefore, in the long run, it will also be impossible to let China – with its low-cost productions – be replaced by Vietnam, Myanmar and the other countries in the so-called “pearl necklace” of Southeast Asia.
Moreover, if after the coronavirus crisis, there will be further robotization of the workforce, how will it be possible to maintain many and sufficiently high wages which, after the pandemic, will obviously be distributed to a smaller number of available workers?
Low wages – and hence also scarce tax revenues – as well as crisis of State spending and decrease in social and military spending, especially in the high tech sector, which always has a very high unit cost.
Therefore, just to recap, the Empire is facing severe danger.
As the Chinese General maintains, “we must not dance with wolves”, i.e. we must not follow the pace of US dance to reap only the technological fruits, but rather maintain and expand the great manufacturing production and, above all, even avoid taking up the cultural, industrial and scientific traits of the United States, which the Chinese General deems to be at the end of its civilization cycle.
According to Chinese analysts, the United States is a “country that has gone directly from dawn to decadence”, just to put it in the words of a French ambassador.
Hence China needs to solve the Taiwan issue autonomously, as well as also harshly oppose the actions against Huawei, by reacting blow-for-blow with the U.S. companies in China, such as IBM, Cisco, etc., and stopping their activities in China, where necessary. Anything but hybrid warfare.
Here we are at a commercial and quasi-conventional war between two powers, i.e. an old Western power,on the one side, and an Asian power on the other which, however, does not want at all to be relegated and closed in the Pacific, as implied and assumed by the new US military projects for closing the Ocean, from California to Japan, or for trying to block the expansion of the Silk Road or still trying to block the expansion line to the South and East of China, as President Xi Jinping has recently advocated.
Certainly China is currently not lagging behind on the cyberwar issue. Nevertheless it does not want to use it as a substitute for conventional war or psywar for dual-use technologies, nor to play the game of the total defeat of a hypothetical “enemy”.
China can now avail itself of the Third Department of the People’s Army, the network dedicated to cyberwar within the PLA, but also of the Strategic Support Force.
This will be the new “Cold War 2.0”, i.e. a series of IT, economic and industrial guerrilla warfare actions, and of actions of defamation – specifically at military level – of confidential information to be stolen from the enemy in a tenth of a second, as well as of cultural manipulation and-eventually, but only in the end-of fake news.
Cyber-attacks-Frequency a sign of Red Alert for India
The biggest target is in terms of transportations, nuclear power plants, Power system Operation Corporation Limited, V.O. Chidambaram Port Trust, Telangana State Load Dispatch Centre, logistic industries and research organisations which eventually can lead to destruction of the whole ecosystem. The confidentiality breach in the case of medical data leak as reported by a German cyber security firm –Greenbone Sustainable Resilience wherein Picture Archiving and Communication Servers were linked to public internet without any requisite protection is a point of concern. Then, there are certain individualistic attacks such as hacking email and financial crimes (banking), etc. In the last two years the attacks radar of focus has been defence, government accounts and the vaccine manufacturing companies.
Cyber Security – Individualistic awareness need of the hour
The target of the individual in a peculiar case which led to heinous crimes casted was due to opening of a document which was a bait to install Netwire- a malware. The bait was eventually delivered through a file and what prompted a person to open that link was a Drop box sent to him on his email was actually opening a Pandora Box of malicious command and control server. An emphasis to understand the technicality that Netwire stands for a malware which gives control of the infected system to an attacker. This in turn paves way for data stealing, logging keystrokes and compromise passwords. In the similar vein the Pegasus used the tactic to infiltrate the user’s phones in 2019.
Cyber Security – Attacking Power Distribution Systems
The intrusions by Chinese hacker groups in October, 2020 as brought out by Recorded Future was done through Shadow Pad which opens a secret path from target system to command and control servers. And, the main target is sectors such as transportation, telecommunication and energy .And , there are different tags that are being used by the Chinese Espionage Industry such as APT41, Wicked Spider and Wicked Panda , etc.
The institutions backing legitimisation
The Institutions which are at working under the cyber security surveillance are the National Security Council and National Information Board headed by National Security Adviser helping in framing India’s cyber security policy .Then, in 2014 there is the National Critical Information Infrastructure Protection Centre under the National Technical Research Organisation mandating the protection of critical information infrastructure. And, in 2015 the National Cyber Security Coordinator advises the Prime Minister on strategic cyber security issues. In the case of nodal entity , India’s Computer Emergency Response Team (CERT-in) is playing a crucial role under the Ministry of Electronics and Information Technology(MEITY).But, there is a requirement of clarity in National Cyber Security Policy of 2013 and the needed updates desired in it respectively.
A cohesive approach – Data Protection and Privacy Importance
The Data privacy i.e. the personal data protection bill is an important imperative in which services of private actors can be bridged through a concerned law which is missing link in that sense. The point of Data localisation falls squarely within this dimension of Section 40 and 41 of the draft bill where in the Indian stakeholders have the capacity to build their own data centres .In this contextualisation there also a need to understand certain technicalities involved in terms of edge computing which in a way is enabling the data to be analysed, processed, and transferred at the edge of a network. An elaboration to this is the data is analysed locally, closer to where it is stored, in real-time without delay. The Edge computing distributes processing, storage, and applications across a wide range of devices and data centres which make it difficult for any single disruption to take down the network. Since more data is being processed on local devices rather than transmitting it back to a central data centre, edge computing also reduces the amount of data actually at risk at any one time. Whereas on the other hand, there is insistence on data localisation has paved the way for companies such as Google Pay to adhere to the policy and synchronise their working with the United Payments Interface (UPI).
What do you understand by Data Share?
In the recent case of WhatsApp privacy issue and drawing in parallel other organisation a similar platform such as Facebook and Google shared the data to the third party with a lopsided agreement and with continuance of the data trade business industry. In 1996 the internet was free so was perceived as carte blanche , a safe harbour falling under the Section 230 of the Communication Decency Act in the United States but with the evolution of the circumstances the laws in that specifications are also required to change in that respect. In relations to the Indian law under the Information Technology Act, 2000 under the Section 69 the Indian government has the powers to monitor and decrypt any information that’s store in any computer resource but on certain conditions such as in regards to the sovereignty, defence and security of the country.
Cyber-attacks understanding on the International Forums
In terms of Lieber Code of Conduct of 1863 or be it Hague Convention of 1899 there is a need of updating the definitions and where in the cyber army falling under the categorisation of civilians , not possessing any of the warfare weapons cause the main weapon that they possess is a malware which is invisible but can have deep repercussions leading to destruction of that particular economy altogether .So, in recent evolving circumstances there is an undue importance to for the target country to respond with equal force and having a right to self-defence in this manner regardless of the attack being from a non-state actor from a third country and masquerading under the civilian garb .Henceforth , there a thorough understanding of the complex environment that one is dealing with , there is undue emphasis to change and respectively update with the current world.
Incidents of Uranium Theft in India: Depleting Nuclear Safety and International Silence
In yet another incident of the capture of nuclear-related materials from unauthorized persons in India has made headlines in the Indian media but largely ignored in the international media. On 4th June 2021, as reported in the Indian media, the authorities arrested seven people possessing approximately 6.4 kilograms of Uranium in the Eastern State of Jharkhand. This is the second time in less than a month where Indian authorities have captured such a gang in an attempt to sell uranium illegally. An incident of the same nature was reported just a few days ago in May 2021 where authorities apprehended unauthorized persons, who were trying to sell nearly 7 kilograms of natural uranium on the black market. Notably, Indian authorities themselves believe that these events might be linked to a “national gang involved in illegal uranium trade”. This is a very serious issue because it means two things; first, that Indian local uranium reserves, radioactive nuclear materials, and facilities are not protected and are prone to black marketing. Secondly, this scenario has emerged because India is not adhering to international bindings of nuclear safety and security such as UN resolution 1540 and (Convention on Physical Protection on Nuclear Material) CPPNM under IAEA to secure its materials, reserves, and facilities. But, the most damaging aspect in this scenario is the discriminatory behavior of the international community, which is criminally silent on the violations of norms, practices, and regulations necessary for nuclear safety and security.
Though in both incidents, Uranium was in natural condition, which cannot be used for making bombs; however; it should be of great concern, as even in its natural state the Uranium can spread considerable radioactivity if used with conventional explosives. Moreover, Indian authorities themselves are considering that these activities could be linked with national gangs involved in the illegal supply of uranium. This raises the point that actually how much natural uranium is illegally sold in the black market by India. Since these are only incidents that are being reported in the Indian media, there might be many incidents that have never been reported. Also, this gang was captured from near the area where Indian Uranium mines of Jharkhand are allocated, the likelihood of access of non-state actors to these mines cannot be denied. These incidents are critical for international security and stability because such radioactive material when sold in black markets could be brought by the non-state and states aspiring for nuclearization. Unfortunately, in such a scenario all the efforts currently going on to stop the proliferation of nuclear weapons would be hampered. The recurring of these incidents reflect that India, despite being a member of CPPNM is not ensuring the protection of its nuclear materials from theft and sabotage by proper regulations, stringent mechanisms, and control. Other than CPPNM, India has also signed UN resolution 1540, which makes it mandatory for the states to ensure security regulations, mechanisms, equipment required for the security of Weapons of Mass Destruction (WMD) from the non-state actors. But, surprisingly, so far the UN or any other international organization has not taken notice of these recurring events. Rather, these mishaps by Indian authorities are shoved under the carpet. These incidents have been reportedly re-occurring in India, media reported these events in 2003, 2008, 2009, 2013, 2016, 2019, and now again in 2021.
Nuclear safety and security is a national matter of any state; however, against the backdrop of the potential damage, which these weapons can bring, they have become an international concern. Specifically, to an extent, where states are sometimes criticized, lauded, and sometimes rewarded for their behavior in this realm. In this regard, India appears as an exceptional case, where the formation of Nuclear Suppliers Group NSG to stop such events in the future has its roots in the Indian so-called peace nuclear explosion (PNE) in 1974. Ironically, a few years down the road, the same NSG gave a waiver to India for conducting nuclear export. Moreover, India was made part of many other regimes such as the Missile Technology Control Regime (MTCR), Australia Group, and Wassenaar Arrangement. Although, these decisions were carried out in lieu of geo-political realities, where the West regards India as a balancer against China but it gave a free hand to India. Even the US-based NTI Report on Nuclear Security Index gives India less score in nuclear safety and security regulations. At a time when many nuclear theft-related incidents have occurred in India in recent years, disgracefully, India still desires to become a member of NSG based on its so-called nuclear record.
To sum up the situation, the occurrence of back-to-back nuclear theft-related incidents has further exposed India’s nuclear credentials and its non-adherence to international practices of nuclear safety and security. If legal bindings such as CPPNM and 1540 would not be implemented in the future by India, the South Asian stability, as well as the international security, would be undermined. Moreover, if the international non-proliferation continues to remain lenient towards states like India, the rest would likely regard the international non-proliferation mechanism not just as discriminatory but even as hoaxing. Many states might prefer to proliferate for their own interests, which would not serve the non-proliferation mechanism and regime. A very candid example is that today even after two years of the last NPT review conference, the next has not been conducted and chances are that it might not be conducted this year.
Uranium is being traded freely in the open market in India
The Times of India has reported that a special police team arrested seven persons and recovered 6 Kgs of Uranium from them following raids at different parts of the city on Thursday. Bokaro SP Chandan Kumar Jha said, “We have seized the yellow substance and will send it to experts for tests. Uranium is a highly radioactive substance used at nuclear facilities.”
Police said the accused, suspected of being part of a national gang involved in the illegal uranium trade, searched for customers and fixed its price at Rs 50 lakhs per kg. Notably, a kilogram of Uranium sells for around Rs 18 crores in the global market, sources said. For the first time, Uranium has been seized in this industrial town, but in other parts of India, similar cases were reported several times recently.
Those arrested have been identified as Bapi Da alias Bapi Da alias Bapi Chandra, Anil Singh, Deepak Kumar, Krishna Kant, Hare Ram Sharma, Mahavir Mahto, and Pankaj Mahto. They are residents of different parts of the district. Deepak and Bapi have a criminal history. It is illegal to possess Uranium without a license in India, and violation of the Atomic Energy Act, 1962, can attract stringent punishment.
Jha said police received information that some criminals are preparing to sell Uranium. A nine-member team headed by Chas DSP Mukesh Kumar and City DSP Kuldeep Kumar were involved in the raids. “It is still unclear how they got their hands on the radioactive metal. During interrogation, they mentioned West Bengal, Giridih, and a few other places. Seven mobile phones and a motorcycle were also seized from them,” he said.
Notably, Jharkhand is among a few states in the country that has uranium mines. Uranium Corporation of India Limited (UCIL) also has a uranium processing plant at Jaduguda, about 150km from Bokaro city.
Sources said police are also investigating to ascertain whether the arrested accused have any links with a similar racket busted by Maharashtra Anti- Terror Squad (ATS) on May 5 after it nabbed two persons. A total of 7.1 kg of natural Uranium worth Rs 21.3 crore was seized from the duo identified as Jigar Jayesh Pandya (27) and Choudhary (31).
It is a severe failure of the Government that hazardous materials are accessible by common people. It is the state’s responsibility, and the state must ensure the safety of the ordinary people. However, PM Modi has different priorities and over-engaged in non-issues. His focus to undermine minorities and the illegal occupation of Kashmir has made him over busy and left no time to safeguard the public interest. His extremist policies and brutalities against minorities are strongly condemned.
It is not the first time that Uranium has been traded like a regular commodity in the open market. It can be dangerous for India as well as the whole world. The law and order situation in India has deteriorated adversely, and criminals may avail this opportunity. The worst scenario will be if the RSS Hindu extremists got access to Uranium, then, definitely, the subcontinent is a one case. The fanatic RSS members are so vulnerable that they can go to any extent without considering the consequences.
Therefore it is appealed to the International community, the International Atomic Energy Agency (IAEA), and the UN to take serious notice and place preventive measures on the ground.
Being the next-door neighbor, Pakistan is under threat and has a responsibility to highlight such severe violations and may involve the international community to avoid similar cases in the future.
Pakistan on Friday, describing the reports of yet another incident of attempted illegal sale of Uranium in India as a “matter of deep concern,” reiterated its call for the thorough investigation of such incidents and measures for strengthening the security of nuclear materials to prevent their diversion.
In a statement, FO Spokesman Zahid Hafeez Chaudhri said the similar incident in Maharashtra last month and other such reports in the past “are a matter of deep concern as they point to lax controls, poor regulatory and enforcement mechanisms, as well as the possible existence of a black market for nuclear materials inside India.”
The UN Security Council Resolution 1540 and the IAEA Convention on the Physical Protection of Nuclear Material (CPPNM) make it binding on states to ensure stringent measures to prevent nuclear material from falling into the wrong hands, the statement noted.
“Pakistan reiterates its call for [a] thorough investigation of such incidents and measures for strengthening the security of nuclear materials to prevent their diversion,” it added.
The press release said it was “equally important to ascertain the intent and ultimate use of the attempted uranium sale given its relevance to international peace and security as well as the sanctity of global non-proliferation regime.”
Uranium is used in several areas, including nuclear explosives and medical techniques. The very fact that some people stole or illegally mined Uranium raises concerns about nuclear safety and security in India. It also indicates the possibility of a nuclear market existing in India that could be connected to international players.
Pakistan had voiced serious concern last month, too, after reports of the Maharashtra seizure emerged, pointing to gaps in state control mechanisms there.
“We have noted with serious concern the reports about the seizure of more than 7kg natural uranium from unauthorized persons in India,” Chaudhri had said at the time.“Security of nuclear materials should be the top priority for all countries,” he added.
“There is a need for a thorough investigation of the matter as to how such sizeable quantity of uranium could become available outside any state control and identify the gaps which made this possible.”
Latin America and the Caribbean: missing the chance to invest in a sustainable recovery?
A new platform showcasing real-time data from 33 countries in Latin America and the Caribbean has revealed that on environmentally...
Cities in Southern Uzbekistan to Improve Urban Infrastructure and Municipal Services
Residents of cities located in two southern regions of Uzbekistan will benefit from improved urban infrastructure and municipal services, thanks...
Global value chains in the aftermath of the pandemic: What role for the G20?
Can embedding inclusive and sustainable transformation at the core of multilateral efforts help ensure that countries benefit from integration in...
World Bank Supports Jordan’s Green, Resilient, and Inclusive Recovery
The World Bank Group’s Board of Executive Directors approved on June 10, 2021 a US$500 million Program to catalyze public...
Morocco and IRENA Partner to Boost Renewables and Green Hydrogen Development
The International Renewable Energy Agency (IRENA) and the Ministry of Energy, Mines and Environment (MEME) of the Kingdom of Morocco...
EU clears way for the EU Digital COVID Certificate
Today, the Presidents of the three EU institutions, the European Parliament, the Council of the EU and the European Commission...
Landmark G7 agreement pledges 870 million COVID-19 vaccine doses
A senior UN official welcomed on Sunday, the Group of Seven (G7) leading industrialized nations’ commitment to immediately share at...
Intelligence3 days ago
Incidents of Uranium Theft in India: Depleting Nuclear Safety and International Silence
Economy3 days ago
How has Russia’s economy fared in the pandemic era?
Green Planet2 days ago
The Inevitable Geopolitical Dilemma of Climate Change
Economy3 days ago
Assessing the trends of Globalization in the Covid Era
New Social Compact3 days ago
Educating Women in Pakistan: A Necessity For National Development
Reports3 days ago
Zimbabwe’s Economy is Set for Recovery, but Key Risks Remain
Africa Today2 days ago
Kenya Receives $750 million Boost for COVID-19 Recovery Efforts
Middle East2 days ago
Saudi Arabia steps up effort to replace UAE and Qatar as go-to regional hub