The post of Chief of the Libyan Intelligence Services of Tripoli’s GNA is still vacant, but only recently. Therefore, this is an optimal situation for the Head of Tripoli’s government, who is currently pro tempore Director of the GNA agencies, while the struggle for the next Intelligence Service Directors is intensifying.
In an obvious triangulation with Turkey, which is now essential to Tripoli’s very survival, and with France, which can do harm outside and inside the perimeter of Haftar’s forces it continues to support, in spite of everything -also with the support of Qatar and the Emirates and even, to a residual extent of Italy, the major strategic failure in the post-Gaddafi chaos – and with the United States, which is returning to Libya from the peripheries.
Russia is increasingly dissatisfied with Haftar, but it will now be difficult for it to negotiate a credible deal with Tripoli from a strong-to-weak position.
Pursuant to the UN-sponsored Skhirat agreement of 2015, the still national political structures of GNA were subject to a strict tripartite rule, whereby the three major regions of a definitively divided Libya, namely Tripolitania, Cyrenaica and Fezzan, always had equal representation at the “centre” of power.
Currently the Libyan Intelligence Services are without a leader since the death of Abdoullah Masoud Al Darsi on April 3, 2020. He had been appointed on November 1, 2018.
He replaced Abdul Qaderal-Thulami. who had died of a “heart attack” but was probably, and more likely, killed by the Al-Nawasi militia, closely connected with the Tripoli Interior Ministry.
The Al-Nawasi militia mainly operates in controlling the city of Tripoli, together with the other militias of the “Tripoli Revolutionaries’ Brigade”, the Special Deterrence Force and the “Abu Slim Unit of the Central Security Apparatus” and also a large part of the regular Police forces.
The Al-Nawasi militia was attacked by General Haftar’s Libyan Armed Forces, in Ayn Zara, in the recent attack by Cyrenaica’s militants, while in February 2020 Tripoli’s Interior Minister, Fathi Bashaga, the strong man of the region, publicly stated that the Al-Nawasi Brigade “blackmailed the State”.
Al-Darsi, the former Chief of the Tripoli Intelligence Services, successor to al-Thulami, had been recommended to al-Sarraj by Parliament and also replaced Salem al-Hassi, an ineffective candidate who was considered a member of the Libyan Islamic Fighting Group. That group included members of Al-Qaeda and participated in the Islamic Shield Force and was declared “terrorist group” by the Tripoli Parliament in 2012. It was later accepted as an internal force of Tripoli’s GNA when, during the “second Libyan war” started in 2014, the “Shield Force” defended Tripoli from a dangerous advance by General Haftar.
Al-Darsi was also leader of the “Union of Reform” party and, incidentally, it was precisely him who harshly opposed the very few Jews’ right to go back to the country, after the pro-Gaddafi uprising, as well as to be compensated for the damage they suffered.
Al-Darsi, however, represented Benghazi, but was temporarily replaced when his city, Garyan, surrendered to General Haftar’s LNA forces.
His predecessor, Abdulkader al-Thulami, whom he replaced in 2017, came from the Fezzan region, since he was born in Aqar al-Shati.
The other deputy of the Libyan intelligence services is Abdul majidal-Dabaa, representative from Tripoli, appointed together with al-Thulami, who is currently in prison.
Accused of complicated illegal financial operations, he is certainly a part of the militia network that often blackmails, but operates on its own behalf, and sometimes funds Tripoli’s central State.
Hence who are those competing for the post of Chief of Tripoli’s Libyan Intelligence Services? Firstly, let us study the structure and history of Tripolitania’s Intelligence Services, considering that General Haftar has an almost exclusively military Service.
The Intelligence Service, known as Temehu, was established with Law 7/2012: its primary goal is to wipe “Gaddafi’s loyalists” out. The whole structure of departments and networks is in its Chief’s hands.
The first Director was Salem Abd al Assalam Alhasi, who in 2015 refused to resign, as requested by the Tobruk Parliament, although he was anyway still loyal to that Parliament.
He was accused, above all, of having confiscated the material of 60 Libyan snipers trained in the United States to fight against terrorism.
Salem Mohammad Alaswad, his deputy and successor, was a figure who accepted the structural weakness of the post-Gaddafi Libyan State and hence also accepted the chain of command of Tripoli’ security during the time in which he was Chief of the Intelligence Service: Minister of Defence, the Supreme Security Council and the brigades of the then “Libyan Shield Force”.
Al Hasi relinquished his U.S. citizenship in 2015, by also falsifying the accusations that he was a member of the Muslim Brotherhood.
Currently, however, there are many more candidates than usual to replace the old Chief of the Libyan Intelligence Service.
The first in line is the businessman, Mohammed al-Assawi. Coming from Misrata, he supports in every way the Chief of the Misrata militia and current powerful number two of Tripoli’s regime, namely Maiteeq.
Still today Turkey wants Khaled al-Sharif – a fighter, at the time close to al-Qaeda – but it can also agree on Emad al-Trabelsi -the old commander of special operations in Zintan – or on the Misrata businessman, al-Issawi.
Trabelsi’s problem is that he has very bad and hard relations with the powerful Interior Minister, FathiBashaga.
It is interesting to note that last June Bashaga said that Egypt – currently supporting General Haftar – could play an important role in reconciling the political and tribal factions of Tripolitania. Hence Bashaga would accept the reality of a ceasefire with Egypt (and General Haftar) quickly.
Is this the will of Turkey, which is already asking for the administration of the Port of Tripoli – and in the future of the Port of Misrata – waiting to throw out of the way also our local hospital – the only Italian information body in Libya – thanks to our bunch of politicos?
Ahmed Maiteeq was elected, with some doubts and reservations, in May 2014. The following year, again as a man of the Misrata militia, he was elected Deputy Prime Minister.
Minister Fathi Bashaga also refused to provide as many as 48 million Libyan dinars to Abdullah al-Trabelsi, the factotum brother of Emad al-Trabelsi. He said that the money was needed to “manage” the situation of migrants in the Tripoli area.
It should be noted that the UNCHR, the U.N. refugee agency, which operates in the Tripoli area, was assisting 287 people in mid-June, with a total of 401,863 migrants assisted in Libya. All of them are outside Tripoli and, to a large extent, outside Libya.
Moreover, Emad al-Trabelsi left the Tripoli front in February 2020 to reach General Haftar’s lines.
Another candidate for the post of Chief of Tripoli’s intelligence Services is Tareq Zarmoh.
He is a former Director of the Intelligence Services Unit operating specifically in the fight against jihadist groups.
He has excellent relations with the United States, Great Britain and all those who naively believe that the whole disaster in Libya and elsewhere in the region was brought precisely by the jihadists, and not by those who brought them in, i.e. those great Western fools. As far as we know, he has no good relations with the Italian intelligence Sservices.
How much influence has the United States on al-Sarraj, after Turkey’s magic hand that prevented Tripoli from falling into General Haftar’s hands? Not so much, we imagine. True friends come in bad times and in times of trouble you find out who your friends are.
There are considerable funds, however, for Zarmoh both in Switzerland and the Channel Islands, which could strengthen his anti-terrorist groups. Al-Sarraj knows this very well and takes it into due account.
A further candidate for the post of Chief of Tripoli’s intelligence Services is Mustafa Gadur, precisely the militia leader that last February was accused by Fathi Bashaga of conspiring against his Ministry.
Bashaga said that a leader of the al-Nawasi militia, led by Gadur, allegedly contacted the Italian intelligence Services to coordinate a meeting between the al-Nawasi militia and Gadur himself with the United Arab Emirates’ intelligence Services.
Currently the al-Nawasi militia consists of approximately 700 members and includes also a well-established group of Salafist Madkalites who operate with the other members of the al-Nawasi militia, starting from their headquarters in Abu Seta, where there are also the members of the GNA Presidential Council.
The Madkhalites are Salafists who, in Westerners’ silly jargon, would be defined as “extremists”.
They fiercely hate the Muslim Brotherhood, but the Madkhalite tradition – of Saudi origin, as usual – tends to be quietist.
The Madkhalites were left alone and sometimes favoured above all by Gaddafi, who often accepted and used their tacit revolt against the Ikhwan, the Muslim Brotherhood.
Nowadays, mainly thanks to France -which aims at getting us out of Gaddafi’s Libya and above all taking ENI away from us -Italy is the target of the largest Islam immigration to Italy and Europe that the ignorant people define as “radical”.
The members of Gadur’s katiba, i.e. the aforementioned al-Nawasi militia, have now infiltrated all the nerve centres of political and military power, given their role in the central security of Tripoli’s regime. Obviously the Interior Minister, Fathi Bashaga, does not like it at all. Bashaga does not want to be the Chief of the intelligence Services, but he wants to choose who should hold that post and wants, above all, to have him as a friend and, even better, as his servant.
It should be noted that Mustafa Gadur has excellent relations with Seddik Omar al-Kebir, for having provided him both the security, which in Libya must be rather “assertive”, and other support, mainly money-laundering.
He is the Governor of the Libyan Central Bank, who is probably also a member of the Muslim Brotherhood.
He has long been a man of Qatar and Turkey, but he is now in the crosshairs of the United States, which considers him its sworn enemy.
The United States – Lord bless it – wants to merge the Central Bank of Tripoli with that of Benghazi, led by El Hebri.
It is an old U.N. project in the exit plan for Libya. However, currently pressing for such a reunification is really an operation that Benedet to Croce would define “enlightened”, i.e. full of high and noble principles, but absolutely devoid of any pragmatism.
Obviously al-Kabir allegedly funded also “terrorism”.
Which one? That of so many parts that make up his government, recognized by the United Nations?
Al-Kabir has obvious relations with the militias, i.e. above all with the “Special Deterrence Force” (RADA). Al-Kabir, however, can also rely on the support of the Libyan ambassador to Turkey, Abdul Razzak Mukhtar Abdul Gader, a very important Muslim Brother, as well as with Megaryeh, former director of the CBL and current Head of Bahrain’s branch of the Arab Banking Corporation.
Megaryeh is also Director of the Doha centre of the Brookings Institution, as well as Director of the Silatech association, founded by Sheika Moza Bint Nasser, the mother of Tamim al-Thani, the Emir of Qatar.
Al-Kabir is also one of the sources of the Italian Intelligence Services.
General Haftar’s heavy offensive, however, has led to some remarkable results: firstly, there is the almost total loss of power, influence and also information of the Italian Intelligence Services, which are now outside Libya.
Obviously, the Turkish Intelligence Service, which has already much helped Italy in Silvia Romano’s liberation, is now capable of deciding many posts and positions in the Tripoli government, pulling rank and underlining its military role, with its jihadists transported from Idlib, Syria.
It has already happened with Khaled Sherif, supported by the Muslim Brotherhood, who last May was not appointed Chief of the LNA Intelligence Service.
He was, however, harshly “purged” by Fathi Bashaga.
After the Turkish jihadist support to Tripoli, there were continuous visits of the most important Turkish Ministers, starting from that of Foreign Minister Cavusoglu on June 17, and of Hakan Fidan, the Chief of the Turkish MIT Intelligence Service, immediately afterwards, who operated also with Tunisia. Not to mention the visit of the Chief of the Turkish e-intelligence, Cemalettin Celik, as well as of the very powerful new Chief of the Turkish intelligence Service network in Libya, Metehan Olgun.
The visit of the Turkish Foreign Minister was not by chance, not even from an economic viewpoint.
As already mentioned, Turkey harshly told al-Sarraj it wanted the almost complete management of the port of Misrata.
Now, there is the Misrata Free Zone, without Misrata; no major imports from abroad into Libya; no connection with the Mediterranean; no major transportation of legal or illegal oil to Italy and the EU.
Furthermore, just during the Turkish clash with General Haftar, Turkey explicitly stressed the importance of the Misrata Forces, which still report to Fathi Bashaga, the Interior Minister and true number 2 of the Tripoli government for long time.
He is the likely king maker.
Currently, however, the mediators, brokers and businessmen of Misrata operate mainly with exchanges from Turkey, especially with regard to the agrifood sector.
Moreover, Bollorè -a man of the French Presidency, but often in contrast with its intelligence Services, which sometimes have flooded the Italian ones with very negative dossiers on him – has had a contract with the Misrata Authority since 2010, but has obviously not supported the French engagement with General Haftar. Quite the reverse. But we do not believe that Bollorè is in the first thoughts of the Misrata Port Authority.
Turkey is largely penetrating Africa from Libya.
Guinean President Alpha Condé visited Ankara twice in less than two months, but President Erdogan alone has also put the Turkish NGO, IHH, into action to support Alpha Condé and the Guinean population and to pave the way for some Turkish businessmen who want to do business and make transactions in Guinea Bissau, or are even forced to do so.
In the African regions of Islamic tradition, the Turkish government is replacing the still operational wide networks of Fethullah Gulen – by now its number one enemy – especially in Guinea, Senegal and Gabon, while Gulen’s schools are still performing well in South Africa and Nigeria, despite the efforts of the textile oligarch (with factories in the areas where migrants from Syria stay), who is also honorary consul to Pretoria.
In Mogadishu, the Turkish conglomerate Albayrak operates by processing Guinean minerals, while the local government in Bamako has recently entrusted the management of a fast road to the Turkish family Kalioncu.
A Turkish business family, however, has failed to sign the contract for the construction of the Kandadji dam on the Niger River in favour of India, which can transfer the materials from the Konkola copper mine to Niger’s ports, while the government of Zambia – an unavoidable channel – supported Turkey.
Currently, before its actual conquest of Libya, but mainly thanks to our strategic foolishness, Turkey records approximately 30 points of economic development in Africa.
The means to manage cyberspace and the duty of security
Over and above the ethical concepts regarding the near future, it is also good to focus on the present. Governments are required to protect their national resources and infrastructure against foreign and domestic threats, to safeguard the stability and centrality of human beings and political systems and to ensure modern services for civilians. Suffice it to recall the chaos that arose some time ago in the Lazio region for the well-known health issues.
Governments must play a key role in developing and leading the local ecosystems, but this national effort must involve many other stakeholders: local businesses, entrepreneurs, multinational companies, local and foreign investors, State agencies, Ministries and academics, people in education, professional institutions and the public at large.
Furthermore, cybersecurity is a national opportunity for developing the local economy and for positioning any country in the international arena as a safe place to establish and develop economic relations between States and companies. It is also important as a regional cyber hub.
Cyber strategy therefore consists in prioritising operational cyber activities with a view to optimising and monitoring the overdevelopment of cyber intelligence that could one day take such turns as to be ungovernable.
This is the reason why investment in technology, local capacity building and resource allocation and concentration are required. This means providing strategic advisory services to government agencies that are seeking to advance cyber security at a strategic and operational level.
It is therefore necessary to work with governments to develop their strategic and operational capabilities in cybersecurity, either at the national or sectoral level, as well as providing comprehensive cyber projects that combine cyber defence and the development of a local cyber ecosystem, based on the models tried and tested by various countries around the world, such as the People’s Republic of China, Israel, the United States of America, etc.
There is a need to specialise in setting up Cyber Units and Cyber Centres (SOC & Fusion Centres) and in developing Cyber Eco-Systems and Cyber Strategies. This means providing various cyber solutions, services and know-how to companies in various sectors, such as financial, industrial, energy, health, technology and many other sectors.
Stable OT (operational technology) security services and strategic advice to companies in the fields of energy, manufacturing, security, medicine, transport, critical infrastructure and many others create the prerequisites for defending cyberspace. As well as helping OT-based organisations integrate cybersecurity into their processes and products. Design, develop and deliver advanced technologies and solutions to protect critical assets in OT environments, such as ICS, SCADA, IIoT, PLC, etc.
In this regard there is a basic need for creating professional IT schools around the world that teach the meaning of cyberspace, and not just how to use Word and other simple Office programs.
The expansion and creation of universities and institutes of cyber knowledge is a starting point from which partnerships are launched with organisations seeking to create their own cyber schools or with academic or educational organisations offering cyber training to their students.
Providing comprehensive solutions for IT schools, enables the training of IT professionals and new recruits in all IT roles, so that hackers do not remain the sole repository of digital truth. Advanced training is a solid starting point for organisations seeking to train their IT professionals. Professionals who can manage and master schemes such as Cyber Defender, Cyber Warrior, Cyber Manager, SOC Analyst, Digital Forensics, Basic Training and many others, including through the use of simulation.
Leading the creation and development of the high-level cybersecurity ecosystem is a duty of States towards the citizens who elect their leaders. The same holds true for seeking and employing highly experienced experts in the various security subject matters, including strategic cyber defence, cyber warfare, cyber intelligence, cyber research and development and cyber strategy, as well as defining training policies for these branches of operation.
Having examined the prerequisites for protecting cyberspace, it is worth addressing the structure of some of the risks faced by institutional network systems.
One of the most typical operations made by hackers relates to the use of client/server technology to combine several computers as a platform to launch DDoS (Distributed Denial of Service) attacks against one or more targets, thus exponentially increasing damage.
A malicious user normally uses a stolen account to install the DDoS master programme on a computer. The master programme will communicate with a large number of agents at any given time and the agent programmes have been installed on many computers in the network. The agent launches an attack when it receives an instruction. Using client/server technology, the master control programme can activate hundreds of agent programmes in a matter of seconds.
A DDoS uses a group of controlled machines to launch an attack on a computer, be it server or client. It is so fast and hard to prevent that is therefore more destructive. If we consider that in the past network administrators could adopt the method of filtering IP addresses against DDoS, it becomes more difficult to prevent such actions today. How can measures be taken to respond effectively?
If the user is under attack, defence will be very limited. If there is a catastrophic attack with a large amount of traffic pouring onto the unprepared user, it will very likely that the network will be paralysed before the user can recover. Users, however, can still take the opportunity to seek defence.
Hackers usually launch attacks through many fake IP addresses. At that juncture, if users can distinguish which IPs are real and which are fake – and hence understand from which network segments these IPs come – they can ask the network administrator to change them. Firstly, the PCs should be turned off to try to eliminate the attack. If it is found that these IP addresses are coming from outside rather than from the company’s internal IP, a temporary investigation method can be used to filter these IP addresses on the server or router.
The solution would be to discover the route through which the attackers pass and block them. If hackers launch attacks from certain ports, users can block these ports to prevent intrusion. After the exit port is closed, all computers cannot access the Internet.
A more complex method consists in filtering the Internet Control Message Protocol (ICMP), a service protocol for packet networks transmitting information regarding malfunctioning, monitoring and control information or messages between the various components of a computer network. Although it cannot completely eliminate the intrusion during the attack, filtering the ICMP can effectively prevent the escalation of the aggression and can also reduce the level of constant damage to a certain extent.
The DDoS attack is the most common attack method used by hackers. Some conventional methods of dealing with it are listed below.
1. Filter all RFC1918 IP addresses. The RFC1918 IP address is the address of the internal network, such as 10.0.0.0, 192.168.0.0, 172.16.0.0, etc. These are not fixed IP addresses of a particular network segment, but confidential local IP addresses within the Internet, which should be filtered out. This method serves to filter out a large number of fake internal IPs during an attack, and can also mitigate DDoS attacks.
2. Use many PCs to resist hacker attacks. This is an ideal response phase, if the user has sufficient ability and resources to enable a defence against hackers who attack and continue to access and take over resources. Before the user is fatally attacked, the hacker has little means to control many PCs. This method requires considerable investment and most of the equipment is usually idle, which does not correspond to the actual functioning of the current network of small and medium-sized enterprises.
3. Make full use of network equipment to protect resources. The so-called network equipment refers to load balancing hardware and software such as routers and firewalls, which can effectively protect the network. When the network is attacked, the router is the first to fail, but the other devices have not yet collapsed. The failed router will return to normalcy after being restarted and will restart quickly without any loss. If other servers collapse, their data will be lost and restarting them is a lengthy process. In particular, a company uses load balancing equipment so that when a router is attacked and crashes, the other will work immediately. This minimizes DDoS attacks.
4. Configure the firewall. The firewall itself can resist DDoS and other attacks. When an attack is discovered, it may be directed to certain sacrificial hosts, which are able to protect the actual host from the attack. The sacrificial hosts may obviously choose to redirect to unimportant hosts or to those having systems with fewer vulnerabilities than some operating systems and with excellent protection against attacks.
5. Filter unnecessary services and ports. Many tools can be used to filter out unnecessary services and ports, i.e. filter out fake IPs on the router. For example, Cisco’s CEF (Cisco Express Forwarding) can compare and filter out Source IP and Routing Table packets. Opening only service ports has become a common practice for many servers. For example, WWW servers open only 80 ports and close all the others or use a blocking strategy on the firewall.
6. Limit SYN/ICMP traffic. The user must configure the maximum SYN/ICMP traffic on the router to limit the maximum bandwidth that SYN/ICMP packets can occupy. Therefore, when there is a large amount of SYN/ICMP traffic exceeding the limit, this means it is not normal network access, but hacking. In the beginning, limiting SYN/ICMP traffic was the best way to prevent DDoS. Although the effect of this method on DDoS is currently not widely used, it can still play a certain role.
7. Scan regularly. Existing network master nodes should be scanned regularly, checked for security vulnerabilities and new vulnerabilities cleaned up promptly. Computers on backbone nodes are the best locations for hackers to use because they have higher bandwidth. It is therefore very important to strengthen the security of these hosts. Furthermore, all computers connected to the major nodes of the network are server-level computers. Hence regular scanning for vulnerabilities becomes even more important.
8. Check the source of the visitor. Use suitable software to check whether the visitor’s IP address is true. This should be done by reverse-searching the router: if it is fake, it will be blocked. As said above, many hacker attacks often use fake IP addresses to confuse users and it is hard to find out from where they come. Therefore, for example, the use of Unicast Reverse Path Forwarding can reduce the occurrence of fake IP addresses and help improve network security.
As seen above, we need experts who know more than hackers, and this is the duty that States and governments have towards their institutions, but primarily towards their citizens.
The visit of the head of Israeli Mossad intelligence to Bahrain
The visit of the UAE Foreign Minister, Sheikh Abdullah bin Zayed to Damascus on Tuesday, November 9, 2021 and the meeting with Syrian President Bashar Al-Assad, sparked a great controversy that began from the moment it was announced, which was highlighted by Western analyzes mainly from outside the region, that it comes for a (comprehensive Arab reassessment of the reality of the relationship with Syria and its importance in combating terrorism in the region, and the importance of the current Syrian reality in the calculations of Arab and Gulf national security, primarily towards Iran, and breaking the American “Caesar Law” towards imposing an economic blockade on Syria), and various analyzes and speculations about the future of these have increased. The Emirati step, its implications and dimensions in the Arab and Gulf relations towards the Syrian regime, and whether it represents one of the indicators of the transition to another new phase of political action towards opening up to Damascus, and the return of Syria to its regional and international role. Especially with the clarification of the “Emirati-Syrian coordination” some time before that visit to arrange the rapprochement between the two sides, which became clear by the announcement of the contact between the Crown Prince of Abu Dhabi (Sheikh Mohammed bin Zayed and President Bashar Al-Assad), as well as an official invitation to Syria to participate in the “International Expo Exhibition In Dubai” and then my meeting with the Syrian and Emirates oil ministers in Moscow.
But what stopped me in that Emirates visit, was perhaps other events that were not addressed during those analyzes, which caught my attention analytically and academically, and the most different of them was (I was alerted by a foreign researcher during my commentary on the same analysis, that the Emirates move is mainly in the interest of Tehran the Iranian regime, not to stifle and besiege Iran in its areas of influence and its known role in Syria). Despite the strangeness of this analysis, I occupied my mind with another matter to respond to it, regarding: (the significance of the visit of the head of the Israeli Mossad to Bahrain, and the visit of Emirates officials to Tel Aviv, and what is even clearer to the public is the organization of joint naval exercises in the Red Sea with the joint Israeli naval forces with Bahrain and the UAE), at the same time as the aforementioned visit.
Accordingly, my analysis mainly focuses on whether that visit took place through (arranging and coordinating with Tel Aviv to curb Iran in Syria and the region, by attracting Syria to the Arab League and collective Arab action again), and the Gulf rejectionist and Arab reservations towards the step of rapprochement. The Syrian-Iranian, or did I aim for a clearer Gulf rapprochement with Iran through rapprochement with Syria, as I went to a number of mainly Western analyzes, which I received. From here, the Egyptian researcher will analyze all the following elements:
Analyzing the implications of the visit of the UAE Foreign Minister (Bin Zayed) to Syria on November 9, 2021.
And its relationship to the “joint naval maneuvers” between (Israel, the UAE and Bahrain) in the Red Sea on November 10, 2021 on the Iranian existence at Syria
The visit of (the head of the Israeli Mossad intelligence service to Bahrain) at the time of the naval joint maneuvers with Israel in the Red Sea, with (the visit of the UAE Air Force commander to Israel).
Then, finally, analyzing the impacts of the Israeli Mossad intelligence moves in the Red Sea on its rapprochement with the USA in the face of (China, Russia and Iran).
To answer those questions, it is necessary to verify and respond to number of inquires and some other different analyses, such as:
The UAE’s motives for taking such a step of rapprochement with Syria, through the visit of the UAE Foreign Minister “Sheikh Abdullah bin Zayed” to Damascus on Tuesday, November 9, 2021, and the meeting with Syrian President “Bashar Al-Assad”.
Rather, will this Emirates step (encourage the rest of the Arab countries to follow the Emirates footsteps) and open up to the Syrian regime?
What is the fate of the “Syrian opposition to the Emirati-Syrian rapprochement”, and is this Emirates move aimed at weakening the Syrian opposition track, especially the Syrians opposing the regime of President “Bashar Al-Assad” abroad?
Then, it will remain to analyze (the Syrian opposition’s options if more Arab countries open up to the Al-Assad’s regime).
Will there be a (Syrian-Emirati consensus) towards the step of solving the (return of Syrian refugees from abroad and the settlement of their situation with the current Syrian regime)?
Finally, the question arises, regarding: (the impact of the intensity of American and international criticism of the UAE’s step of rapprochement with the Syrian regime and President “Bashar Al-Assad” on the completion of the remaining Arab steps seeking to integrate and return Syria once more to its membership in the League of Arab States)?
In fact, the most dangerous and important analysis for me remains completely analytical, namely: (What was raised about the fact that the UAE obtained the green light from the United States of America itself and from the Israeli side before the visit of the UAE Foreign Minister “Bin Zayed” to the Emirates, in pursuit of forming (Gulf-UAE-Israeli alliance against Iran), and seeking to neutralize the Syrian regime in the face of these Iranian moves as a closely related ally of the Iranians?) Accordingly, we can analyze that, as follows:
Perhaps what reinforces and supports my recent view regarding the “Israeli Gulf mobilization with the help of the UAE and Washington’s support to confront Iran through Syria” is (the joint security coordination between Israel and the Emirati and Bahraini naval forces to conduct joint naval maneuvers in the Red Sea, which lasted for five full days), which began on Wednesday, November 10, 2021, which comes at the same time as the UAE rapprochement with Syria, meaning:
(There are joint security arrangements between Israel, the UAE and Bahrain in the face of Iran through the move of rapprochement with Syria as an ally of Iran)
As I mentioned, the joint naval maneuvers between Israel and the UAE at the same time as the UAE visit confirms (the continuation of joint security coordination between Israel and the UAE), especially to curb and limit Iranian influence. Knowing that the step of joint security coordination between the Emirates and Israel began three years ago, when the naval forces of the Gulf states, mainly the “UAE and Bahrain”, began conducting joint naval maneuvers with the Israeli side, which were the first for them ever with their Israeli counterpart, in cooperation with the forces of the United States of America’s Navy.
We find that the current joint naval maneuvers in the Red Sea with the participation of the UAE and Israel, with the participation of (warships from the Emirates, Bahrain and Israel), in addition to the United States of America, is a “joint Israeli-Gulf assertion” to send a message to the Iranian side, that these naval maneuvers with Israel, aims to:
“Securing the maritime traffic in the face of Iran, and seeking to secure the movement of the straits and maritime navigation in the Red Sea with the help of Israeli security, especially that these joint maritime training operations included training on encirclement and raid tactics”
This was confirmed by the US Naval Forces Central Command, in an official statement, to confirm that:
“The Israeli, Emirates, and Bahraini training aims to enhance the ability to work collectively among the forces participating in the maneuvers”
From here, we understand that the step of joint Israeli-Emirati security coordination, and the consequent step of the joint naval maneuvers, came after the signing of the “Abraham Accords” in September 2020, and the normalization of their relations with Israel by the UAE and Bahrain. Since then, it has strengthened the (diplomatic, military, and intelligence relations between Israel, the UAE and Bahrain, as the two most important Gulf countries that share Tel Aviv’s concerns about Iran’s activities in the Red Sea and the region).
The most prominent here, is (the visit of the head of the Israeli intelligence service Mossad in a public visit to Bahrain at the time of the joint naval maneuvers with Israel in the Red Sea, with the commander of the UAE Air Force heading at the same time also on a first-of-its-kind visit to Israel in October 2021).
In general, the (re-opening of the Emirati and Bahraini embassies in Damascus) in December 2018, was considered at that time as (a major change in the Gulf policy towards Syria, and it was among the first indications of a more comprehensive normalization). There is no doubt that these steps came after consulting Saudi Arabia. However, it seems that Saudi Arabia, as usual, is taking a cautious and secretive attitude towards the move of rapprochement with Syria due to its fear of the “Al-Assad regime’s relations with Tehran”.
At the time, the UAE and Bahrain talked about (the geopolitical benefits of rehabilitating the regime of President Bashar Al-Assad). The State of Bahrain confirmed that “the step of integrating Bashar Al-Assad aims to strengthen the Arab role and prevent regional interference in Syrian affairs”.
The most important analytical question for me is whether Abu Dhabi has completely severed its relations with Damascus at all, given (the continued presence of prominent Syrian figures loyal to Damascus living and working in the Emirates).
In general, this (continuous stream of signals emanating from Damascus and other Arab capitals, led by the Emirates for rapprochement with Syria), indicates that the former opponents of the Syrian government have come close to reaching mutually beneficial arrangements with the Syrian government, some of which pledged a few years ago to drop it.
The most important gains for the Syrian regime from that rapprochement with the UAE and the rest of the Arab countries will be (reconstruction contracts for Syria and energy deals), in addition to the markets that will be opened to it if they reconcile with the Arab countries, which may later pave the way for “inclusion of Damascus again and returning its membership in the League of Arab States”, which is of course the most important strategic step for the UAE and the Gulf states, to help Syria to return back to the “Arab House”, and consequently put pressure on it not to rapprochement with Iran, as it is a rival opponent for the UAE and the Gulf states.
In this context, the Syrian capital, Damascus is now hoping for (influential Arab voices to exert international pressure in order to lift the severe sanctions imposed on the Syrian regime), which aims to (punish Syrian officials and Syrian organizations for their alleged involvement in human rights violations).
Features of ISIS’ Information Warfare
The most significant feature of our modern world is the large-scale popularization and application of the Internet, which has transformed our society and formed a substantial information society. Initially, the information society was only a theoretical projection, but it has now become a reality. When the world transforms into an information society, the great impact of such a transformation will be felt. The governance structures of the world have not prepared for such changes, and thus are unable to deal with these transformations effectively, resulting in massive risks and social disorder.
In the field of information and anti-terrorism, a major concern is the impact of the Internet. The Internet has accelerated the flow of information, and the boundary of truth and falsehood are at times, indistinguishable. At the same time, social conditions can be exaggerated online. Combined with the psychological activities and circumstances of the masses, it is extremely easy to create a larger scale of dissatisfaction which will, to a certain extent, lead to the collapse of the original social ideological and belief systems. The United States and Western countries ignoring the social and stage of countries and regions in the Mediterranean region, Africa, and the Middle East and Central Asian countries, blindly export their ideology, and driven by the amplification effect of the Internet, this process of collapse has been accelerated.
A terrorist organization such as ISIS has harnessed the great potentials offered by the Internet, and as such, it laid the foundation for the large-scale development of ISIS’s information warfare. First of all, the Islamic State has established a professional public relations organization, responsible for producing and disseminating content. ISIS has its homepage and accounts on major social networking sites, and even has multi-layered sub-accounts, thereby evading censorship. They launched DABIQ, an attractively designed online magazine with extremely provocative content, and developed a smartphone app called Dawn of Glad Tidings, focusing on the Western “high-end customer base” as their target group to inform them of the latest “news of jihad in real-time”. In addition, the Islamic State has also launched the online game, which creates scenarios for players to attack the U.S. military, police, and civilians, and rewards criminal acts and even terrorist attacks in the game.
Today, ISIS can be seen almost on all social media platforms and is accessible in Western countries. It has thousands of accounts on Twitter alone, including both organized public accounts and terrorist personal accounts. ISIS is proficient in the so-called “viral marketing” model in information warfare. Through the user’s network, the information spreads like a virus and spreads to thousands of audiences using rapid replication. The organizer clearly achieves the word-of-mouth “relationship marketing” by providing a certain product or service, allowing others to become “marketing and communication levers” inadvertently.
ISIS is often far more professional and sensitive than the government departments of various countries that hold the power of national governance. It has long been keenly aware of the evolution of political discourse from propaganda to information dissemination in contemporary society, and this trend is one of the keys that is enabling it to lead public opinion. Traditional propaganda methods such as sermons and speeches, obviously, lack interaction with the target audience. Therefore, ISIS encourages followers to use various websites as platforms to establish various forms of “self-media”. ISIS also cultivate Internet influencers to encourage netizens to create audio messages, videos and even websites. As ISIS cleverly hides its ambitions behind high-level productions and attractive propaganda, more and more people in the West, especially young people, have been successfully brainwashed, are actively participating in the dissemination of ISIS-related information, even going to the Middle East to become jihadists on the battlefield and gain the satisfaction of realizing their supposed self-worth.
This kind of information warfare was so successful that in 2016, the official website of Tsinghua University in China was hacked by ISIS hackers where ISIS recruitment advertisements were posted. In the United States, the Federal Bureau of Investigation (FBI) has found cases where teenagers as young as 15 years old were recruited by ISIS, and in some cases in the United States, parents even encouraged their children to participate in terrorist organizations. In fact, the information warfare of ISIS is very active and successful not only in Western countries but also in Turkey and Syria. As a result, ISIS has obtained the human resources of thousands of sacrificial young people.
The information society and the Internet have created a huge imbalance for the future world, making this world an unbalanced world and a world in transition. The formation of various transnational virtual organizations is now possible using simple network tools. This also means that terrorist organizations like ISIS cannot theoretically be eliminated at all. They can easily evolve into virtualized organizations that exist everywhere and can be found by search engines at any time due to the ubiquity of the information society and the Internet.
They will continue to grow, gain popularity, and evolve into a new type of network-based anti-government organization. Terrorist organizations of various types have shifted their focus from the real world to the virtual world, and then back again. This is the enormous governance challenge that the information society will undoubtedly face in the future.
Final analysis conclusion:
Although ISIS faces restrictions as it is a terrorist organization, it has used the information society and the Internet to launch successful information warfare and has achieved remarkable results worldwide. In an age of information asymmetry, simple and easy network tools have made it possible to establish a variety of transnational virtual organizations. This will pose a huge governance challenge to the future information society.
Why Nepal’s Maoist finance minister is talking about legalizing black money?
Despite being the oldest sovereign nation in South Asia, Nepal is also the most unstable nation of the subcontinent. For...
Omicron Variant: Implications on Global Economy
The prolonged battering of the Covid-19 has been considerably hitting the world economy. While vaccination and a receding in the...
The American Initiative for a “Better World” and its difference with the Chinese Belt and Road
During their summit held at the end of July 2021 in the city of “Cornwall” in Britain, the leaders of...
Xi Jinping’s Global Development Initiative and the Sustainable Development Agenda of China-Africa in 2030
Chinese President “Xi Jinping” proposed during his speech before the virtual session of the (general debate of the 76th session...
Commission proposes to strengthen coordination of safe travel in the EU
European Commission has proposed to update the rules on coordination of safe and free movement in the EU, which were...
France: Invest in skills, digitalisation and the green transition to strengthen the recovery
Swift and effective government support has helped France to rebound rapidly from its COVID19-induced recession. Using the country’s announced Recovery...
What is the Difference between a Sensor and Transducer?
What Do We Understand by a Transducer? A transducer is an electrical gadget or device that can convert energy from...
Tech News3 days ago
193 countries adopt the first global agreement on the Ethics of Artificial Intelligence
Defense2 days ago
War Between Russia and Ukraine: A Basic Scenario?
South Asia4 days ago
US and India in the Indo Pacific: Advancing a shared vision
Middle East3 days ago
Turkey’s Foreign Policy Balancing Act
Middle East4 days ago
Yemen recovery possible if war stops now
Intelligence3 days ago
The means to manage cyberspace and the duty of security
Middle East3 days ago
UAE and the opportunity for an India-Pakistan “sporting war”
Defense3 days ago
Contemporary World and the Era of Hybrid Warfare