Connect with us

Intelligence

Report: As US pushes Iran Arms Embargo Renewal, Houthi Missile Attacks Are A Global Danger

Published

on

While Secretary Pompeo is pushing for an extension of the arms embargo on Iran, which is due to expire in the fall, Houthis continue facilitating Iran’s military and ideological agenda in the region. Iran denied having yet another ship filled with sophisticated weaponry intercepted during a joint US-Arab Coalition operation near Yemen in June, another piece of evidence pointing to the dangers of Iran’s continuing relationship with the Houthis. And despite dealing with a series of explosions throughout IRGC military bases, and nuclear/power stations, Iran has shown no signs of slowing down in the implementation of this agenda and denied any external interventionism. The blasts are attributed to Israel, and to an opposition group known as “Cheetahs of the Homeland.” The latest such incident took place to the West of Tehran, in the vicinity of additional IRGC bases and power stations.

Most of the P5+1 members are reluctant to follow US lead in renewith the arms embargo. Furthermore, there is evidence that where EUropean companies have turned away from profit due to the concern over losing access to the US financial system, China and Russia have stepped comfortably in, which means that with or without the arms embargo, Iran retains access to the components needed for the production of sophisticated weapons. A new deal inked between Beijing and Tehran reportedly grants China access to Iranian air force bases, while Iran essentially becomes a gas station for the Chinese Communist Party which has been suffering ongoing financial losses and reportedly has not been able to meet its “New Silk Road” /Belt-and-Road commitments.

Enter the HOuthis, who have been reportedly smuggling oil out of Southern Yemen and supplying Hezbullah and IRGC with a resource lifeline to complement access to Iraqi oil and the Chinese lease monopoly over Ahwazi petrochemicals. Yemen’s internationally recognized government has downplayed the attacks on Safter oil pumping stations, but with the fall of oil output in Yemen since the HOuthi coup, access to natural resources has become an important rallying point for the Houthis. In exchange, Houthis are playing an increasingly central role in Iran’s regional hegemony projects as Iraqi militias have attracted increasing US scrutiny and ire, with mass arrests following the liquidation of Qassem Soleimani and several important heads of Iran-backed Shi’a groups starting in January.

While the US and the Arab Coalition have succeeded in intercepting several ships providing weapons to Houthis as evidence of the close relationship, they have not been able to stop the smuggling altogether. And for every number of bomb-laden Houthi boats destroyed by the Arab Coalition, an unknown number of such operations succeeds, at least partially. Then there are rumors of the HOuthis exploiting security vulnerabilities and launching a deadly and destructive attack on a Saudi air force base in June 2020, among a series of missile and drone attacks aimed at Saudi cities, which, according to the Coalition, were intercepted by the Saudi missile defense systems. Those are just some of the most recent examples of Houthi attacks; during the course of the war, according to the Coalition spokesman Turki Al-Maliki, nearly 1700 attacks against civilian sites in Saudi Arabia had been launched by the HOuthis, and an unknown number of similar attacks against civilians in Yemen. In July, another quantity of drones was destroyed by the Coalition forces over Yemen.

These events show the limits of US diplomacy and political action, and in particular, the limits of the strategy exclusively targeting Iran, without taking into the account the subversive and increasingly powerful role of the HOuthis in the region. Of course, in the event of the non-renewal of the embargo, Iran will indeed become an international arms marketplace for the worst of rogue actors, but even now with the restrictions in place, it has evaded full accountability and has managed to sow mayhem and mischief with the help of its proxies and increasingly integrated regional relationships.

It, too, is important to note that much of Iran’s assets lie outside Tehran. Therefore the approah of “cutting off the head of the snake”, with anything short of complete regime change and destruction of the existing Iranian administrative infrastructure and financial architecture, is hardly the panacea for the Iranian assertion of control in the Middle East, without also severing the limbs that carry out its bidding, including, in particular the Houthis.

And that is the argument that was heard in detail by a gathering of international experts during a series of meetings held by the Coalition of Organizations for Peace in Yemen on the sidelines of the Human Rights Council, session 44.

The first seminar focused on the HOuthi role in the shelling of Yemeni and Saudi cities.Seminar of Houthi shelling of cities:

Violation of the armistice and non-compliance with international agreements

Moderator: Dr. Arwa Al-Khattabi, an academic and human rights activist

The first speaker, Engineer Khaled Al-Afif, head of the German-Yemeni Forum for Rights and Freedoms, member of European organizations allied for peace in Yemen, spoke about the Houthi breach of the armistice and the agreements and stated that the Houthi militias relied on the tactic of restoring breath and arranging the papers to pounce on the adversaries and their means were to deceive the tribes and the government and now the international community.and the truce announcement. Each time, the militias break the ceasefire agreements once their ranks are rearranged (this follows a model long adopted by another Iranian proxy, Hamas).

He mentioned that between 2004 and 2010, the Yemeni government fought six wars with the Houthi militias, and all these wars were stopped by ceasefire agreements with the involvement of mediation committees that the Houthis did not adhere to. On the contrary, for them it was a warrior’s rest to arrange their ranks and when the army stopped the war because of the truce the Houthis rallied to crush the tribal sheikhs and the regions that supported the government and opposed their forces. After 2011, the Houthi militia took advantage of the youth revolution, political division, and the army’s division to impose its complete control over the Saada governorate, and the first thing that it worked on was the displacement of the Dammaj sons after several armies and agreements that were not adhered to, and this is the first case of sectarian displacement in Yemen.

The militia expanded its military operations to Imran and held several rounds of talks through mediation committees that ended in neutralizing the tribes and swooping on anyone who opposed the HOuthis; the Houthis did not abide by any agreement or armistice with any party that did not accept their authority, but relied on terrorism and the scorched earth policy after all the armistice and additionally, relied on the bombing the homes of tribal elders. Before announcing the truce in Amran, the Houthis launched an armed attack on the governorate to control it. While the mediation committees led by the UN envoy bin Omar were moving to a cease-fire, the Houthis stormed the capital, Sanaa, and then a truce was established, or what was known as the peace agreement, one that the Houthis did not adhere to. The Houthis entered into a partnership agreement with the Congress Party and former President Ali Saleh, and they did not adhere to any provision of it. Rather, at the end of 2017, they launched armed operations against the party that ended with the killing of former President Saleh and collaborators, and threw thousands of supporters of the party, women and men, in prison.

Khaled Al-Afif further talked about the most prominent agreement that were brokered by the United Nations, which was Stockholm, which ended with the handover to the Houthis of the port of Al-Hadidah, strategically important both for humanitarian aid to the rest of the country and as a smuggling center for the delivery of Iranian weapons and other contraband. The Houthis violated the ceasefire hundreds of times and killed some members of the monitoring committees, including Colonel Muhammad Sharaf al-Sulayhi. In Naham, Al-Jawf, and Marib, more than a truce was held and announced, but the Houthis did not adhere to any truce.

On the contrary, they took advantage of the truces to arrange their ranks, and those areas were neglected, Al-Jawf and the military operations are carried out on a daily basis in Marib. In conclusion, he said: “A few days ago, the Houthis held a truce in Radman Al Bayda, through tribal mediation that the Houthis did not abide by, and ended in storming the Radman area and detonating many homes.” Mr. Khaled talked about bombing and detonating property, raising terror and terrorizing citizens and residents, which is a systematic strategy for the Houthi militia, which started from the first six wars between 2004 and 2009 in Saada against all opposition figures, villages, and regions that rejected these militias, and this Houthi terrorism reached the zenith after their coup against the state in September 21, 2014 and their control grab over the weapons of the Yemeni army and the acquisition of experiences in developing weapons, booby traps and drones through Iranian experts and from the Lebanese Hezbollah, which was stated by Iranian officials and Hezbollah leader Hassan Nasrallah.

Since the beginning of its war to control the Yemeni governorates, the Houthi militia has deliberately bombed residential areas in cities and rural areas that refuse to submit to and surrender to the militia, and with every defeat this militia has been subjected to, indiscriminate shelling of residential neighborhoods and hospitals to terrorize people, the resistance and the army to surrender. In Taiz, among the 20 hospitals and health centers, 18 hospitals were suspended due to the bombing of the Houthi militia or the siege they struck on the city of Taiz, and only two hospitals remain operational.

Despite this, the militias bombed the main revolution hospital in Taiz, according to human rights organizations, and the Houthi missiles destroyed the part The largest of the hospital was mass destruction concentrated in the intensive care department. Where the victims of indiscriminate shelling in Taiz between 2015 and 2018, nearly 3,000 civilians, including 630 children and 371 women. Taiz is at the forefront of the number of injured people in Yemen, and the pain of the wounded is compounded by the Houthi siege imposed on the city of Taiz, which exacerbated their tragic situation in an unprecedented way, as the number of wounded reached 16 thousand and 402 civilians, including 1756 children and girls and 249 women.

7070 went missing due to kidnapping and enforced disappearance, and in 2019, approximately 186 citizens were killed, 54 of which were indiscriminate shelling of residential neighborhoods, 18 snipers, 41 as a result of landmines, 3 under torture, and one of extrajudicial executions. The total destruction resulting from indiscriminate shelling was 2,320 buildings, 452 of which were public property, 338 buildings were partially destroyed, and 18 of the 20 hospitals in the city were destroyed due to the constant shelling.

At the level of cities and governorates, entire neighborhoods in Aden Governorate, from Khor Maksar, Tawahi and the northern regions of the governorate were destroyed as a result of the war launched by the Houthi militia in an attempt to occupy Aden and the center of Lahj and Abyan Governorate. Most public property and a large part of private property were destroyed and the effects of the destruction are still prominent to today. It also bombed a water tank in the Al-Duraimi district in Al-Hodeidah, which is one of the hot spots where water is not easily available. The Houthi militia bombed the Al-Isayad port, in Hodeidah, killing 14 people and wounded 30, most of them civilians.

The Houthi militia also boasted more than 73 torrential bridges and streams of mines linked to rockets and missiles in major roads linking Hodeidah directorates to destroy roads and bridges in the areas they lost and to hinder the progress of the Yemeni army and prevent the return of citizens. Since the signing of the Stockholm Agreement, the Houthi militia has continued to violate the ceasefire by attacking cities under the control of the Yemeni government, blowing up bridges and destroying roads in crimes aimed at passing humanitarian aid to people in need outside its control areas.

The systematic militia destruction of cultural objects and historical monuments of Yemen occurs, either through the trade and sale of antiquities and manuscripts, or their use as military barracks and military sites, and Yemen has joined the countries whose antiquities are sold in public auctions after being looted by gangs and smugglers. Because assaulting or harming antiquities and manuscripts is a crime in accordance with national legislation and an explicit violation of international agreements, militia leaders have added to their crimes against the Yemenis an additional crime by committing hostilities against the historical and artistic works that constitute the cultural heritage of peoples.

Cairo’s ancient castle, on of the most prominent monuments in Taiz and Yemen, was severely damaged as a result of its use by the militias as a military barracks, which were bombing the city and its residential homes, which was subjected to bombing by the resistance to preserve the lives of innocent people. Hundreds of them were killed and injured from the bombing of a tank that was inside The castle destroyed the militias, blew up 7 archaeological monuments in the Dhamar governorate, and before their departure from Aden they looted and destroyed the Aden Museum. Also, the monuments in the governorates of Shabwah and the outskirts of Marib and in Abib were looted and tampered, and large quantities of rare artifacts were smuggled out and only revealed when they were placed. An auction to sell antiquities on the internet.

In Al-Jawf, the militias destroyed 63 archaeological monuments and historical cities that have become almost completely destroyed, including Nashan, Kamana, Haram, Anba, and Nasq, in addition to the well-known and well-known cities such as Baraqish, Qarnaw, Al-Kharba al-Bayda, and Khirbet Al-Aswad. And the bombing of villages and areas of the Hajjur tribes in the district of Keshr, northeast of Hajjah, was mentioned by ballistic missiles, after more than 40 days of the humanitarian blockade.

The author, presenting at this event, said: “I noticed that we have a strange situation that although the international community has extensive information documenting the extent of Iran’s assistance to the Houthis in attacks on civilians and the supply of weapons used in attacks on Yemeni and Saudi cities, as well as oil tankers, oil sites, and airports, no However, the evidence of Iranian interference is increasing. Many attacks on various Saudi cities from Jizran and Abha to Riyadh show evidence of advanced missiles and drones loaded with bombs that could not be produced in Yemen without Iran’s help. The media failed In documenting general violations of human rights by the Houthis, as well as the deteriorating humanitarian situation.

Houthi launched a deadly attack on Aden, killing 32 members of the Yemeni military parade while targeting high-ranking officials. And that’s just one such well known attack against Yemeni cities; the experts have documented attacks against Yemeni civilians that have not been covered by Western media, but which have gone more lethal and precise over time, according to the experts, as the Houthis gained additional access to increasingly more sophisticated Iranian weapons.

Indeed, the international community is well aware that Iran’s interference precedes the ongoing five-year long civil war. These weapons have been secretly replenished with consistency going back decades, while the international community turned a blind eye to the Houthi smuggling of contraband through the Oman borders, excusing it as regular crime rather than a precursor to a coup. Since then, Iran has developed various routes for smuggling weapons, posing a threat to international maritime security.

Despite allegations that the Somali shipping route used to smuggle arms has been closed, the Iranians continue to use shipments, as well as other sea routes on the way to Hodeidah that are under the control of the Houthis and are both necessary as a receiving point for humanitarian supplies and as a point for arms smuggling. The author added that the Houthis were able to smuggle weapons by road and in trucks to Hodeidah, and this complex mechanism dates back to a long period before the civil war where Iran funded, armed, and trained the Houthis for years before the coup. For years the Houthis have been moving back and forth to Iran and we know that Hezbollah and Iranian advisers have been on the ground providing direct assistance and advice away from ground operations or basic training.

That’s how the Houthis were able to assess vulnerabilities of the Saudi defense systems, and to receive complex intelligence information which had allowed them to penetrate cities, attack well protected military bases, and coordinate complex attacks far exceeding their own capabilities and knowledge.

The United Nations has documented that the missiles and drones recovered from the attack sites bear Persian markings and appear similar to the the brands, makes, and models of Iranian weapons used elsewhere in the region, and recovered in other places including in Lebanon, Bahrain, and Iraq.

To counter these threats, it is necessary to prevent Iran from being able to import Western weapons and other weapons and parts that can be used to continue to produce missiles and drones. The international community continues to treat the war in Yemen as an isolated issue, the Houthi attacks on civilians as a Yemeni and a Saudi issue, but in reality this is not the case. The Houthis involved in these attacks must be sanctioned, the entire movement must be considered an Iranian proxy and designated as a terrorist organization such as the Iranian Revolutionary Guard and Hezbollah, the flow of weapons should be disrupted more forcefully, the delivery routes must be closed and the Houthis must be treated as a global threat, and not only a Yemeni, a Saudi, or even a regional threat, because they are part of Iran’s global network of terrorist agents and will soon have global influence and threaten countries outside the Middle East, just like Hezbollah and the Revolutionary Guards do. ”

Majdi Al-Akwa, Assistant Secretary-General of the Humanitarian League for Human Rights and member of organizations allied for peace in Yemen affirmed the above-stated concerns.

Interventions were made by the attendees, and they affirmed that the Houthis cannot be trusted and any agreement and truce concluded with them and that the international community should classify them as a terrorist group and deal with them as they do with ISIS.

Continuing on this theme, the following symposium on the sidelines of the Human Rights Council session 44 explored how the Iranian regime embraces terrorism and destroys nations and peoples.

Organizer: The Yemeni Coalition of Independent Women and European organizations allied for peace in Yemen

Chairman:

Attorney Faisal Al-Qifi, head of European organizations allied for peace in Yemen

The first speaker, Peymaneh Shafi, a journalist and member of the Iranian-American community in California, talked about the Iranian regime’s policy and said: “I lived in Iran under the pressure of the regime and fled to asylum in America decades ago, and from here I am trying to help those who are persecuted by the Iranian militias in Iran, Yemen, Iraq and Lebanon.

The Iranian regime is being weakened by the pressure of the international community, and friends in Iran are trying to establish the Iranian regime in order to live in safety and peace in the Middle East region.

I am sure that you know that Iran has a great role to play in supporting the Houthi militia, and since 2014 through Hezbollah militias, where Hezbollah trainers have been sent to educate and recruit youth.

And they worked to spread fears among people in order not to refuse to join Houthi.

Wesam Basindowah, the head of the March 8 bloc for the women of Yemen, talked about the influence of Houthi in the Iranian regime also regarding women’s rights, as Houthi pursues Iran’s path to oppress women.

From September 2014 to December 2018, 266 women and their children were arrested. By the Houthi coup, women were valued in Yemen and were not arrested as the militia did.

She expressed hope the activists in Yemen will work to resist the militia and uphold the principle of human rights.

Wesam also added that in the United States, activists are working to classify this militia, to follow Iran’s IRGC and the Lebanese Hezbullah in the terrorist lists, so that Middle Eastern countries can enjoy peace and freedom.

Ben Minick, a Middle East journalist specializing in military strategy, spoke about the role of the international community in classifying Houthi as a terrorist group and said: “I would like to thank you for allowing me to present today to you on behalf of the Yemeni Alliance of Independent Women and in the United States of America. We are gathered here today to discuss the role of the international community in classifying the Houthi rebels as a terrorist group.

The war on terror began long before the United States intervened in 2001. The regime that took power during the 1979 Islamic revolution engaged in a terrorist war from the start. We can spend months discussing the various groups listed, but today I would like to focus specifically on Hezbollah and the Houthi rebels.

More recently, formal legislation has been passed declaring Hezbollah a terrorist group. There is no need for us to review all the reasons for this classification. The main issue that goes into effect is the reasoning behind the amount of time it took to develop a classification.

It is not easy to determine the classification of a particular group as a terrorist. Although it may look better, there is a standard that must be fulfilled. Otherwise, it would be as simple as referring to a group of people that one country does not like or disagree with and causes it to be classified as a terrorist group. This is part of the delay.

To be determined, the group must fit the relevant U.S. law definition. An organization may be classified as a terrorist even if it does not directly attack American targets. However, it must threaten the national security of the United States or its citizens.

In terms of the United States government, once an organization is included in this list of standards, well-written and highly documented legislation must be submitted to Congress. If the majority of delegates in Congress believe in the benefits of the bill, it is passed. This is neither a quick nor easy operation.

But the bill itself does not classify the organization; It only directs the Secretary of State to review the evidence and report back to Congress within a short period of time on whether to classify it and give reasons. For example, the Secretary of State may choose to request additional evidence for review, or require additional time for the review process. Before conducting the designation, the Secretary of State must inform the leaders of Congress; Once the organization is publicly announced as a terrorist organization, the state and treasury department can begin the process of asking financial institutions to freeze their assets.

It can be said that even when the Houthis do not directly attack American targets, they attack US allies, facilitate Iranian terrorism in the region targeting the United States through various agents, facilitate the spread of other terrorist groups, and deal with Hezbollah and the Iranian Revolutionary Guards, both of whom are terrorist-specific entities. , In planning operations that could target the area.

Moreover, attacks on Yemen and Saudi Arabia, even when not specifically directed against the United States, endanger American forces.

There may be political reasons for avoiding classification; The political obstacle here is that the Houthis were legalized by the international community and seized power; The internationally recognized government is largely in exile.

The classification of the Houthis means that the United States will have to work closely with the Arab coalition to get the Houthis out of power, which would seem to many Americans as participants in an endless “Middle East war”, even if it was done for reasons of national security , American military intervention is minimal, and confrontation is inevitable and the best way takes place at the time and the method that the United States chooses instead of the opponent.

This also means generating a lot of publicity, long-term legal battles and political attempts to block this move from within the State Department. These are the challenges that must be addressed before this issue is brought up to Congress, let alone the State Department. “

Adel Al Ahmadi, Chairman of the Nashwan Al-Hamiri Council for Studies and Media, talked about the expected effects and consequences of the continued expansion of Houthi’s authority over international peace and security and summarized it in:

  • The threat from Yemen’s strategic location between at least two continents overseeing an international strategic corridor and a long coastal strip that stretches from east to west. The threat related to the Houthis being an Iranian focus was found to be a tool to target the Yemeni neighborhood represented by the Kingdom of Saudi Arabia, as it represents the economic status in the world. And both sides proved without detail, that Houthi acted by targeting some ships and threatening navigation.
  • The continued control of a sectarian terrorist group by force of arms over the will of the vast majority of Yemenis prepares the country for the possibility of the emergence of extremist terrorist groups from the other side, similar to ISIS and Al Qaeda. He stated that the rise of ISIS in Iraq was the result of terrorism practiced by pro-Iranian militias in previous years against those described as Sunnis. He talked about sectarian thought and how it is based on a revenge racist idea that claims that the government is its own, and that it finds in terrorism and wars one of the most prominent reasons for survival, as it was not possible to find acceptance in social circles except in circles of turmoil.
  • The group proceeds from the racist slogan, which exclaims the death of peoples and religions. All that the Houthis do is to see the slogan implemented. He explained that the strategic location of Yemen and the threat that Al-Houthi poses to the Yemeni neighborhood, as happened in targeting the Abqaiq and Khurais fields last year in Saudi Arabia. It indicates that the world may face economic crises whose borders cannot be predicted, if it leaves the chance for the Houthis to remain as an armed group that controls the capital of Yemen and many of Yemen.
  • He talked about the seriousness of the threat posed by the Houthi group in that it combines deadly weapons: first the weapon of gun and gunpowder, secondly the weapon of the religious text is false and thus the weapon of atonement and thirdly the weapon of racism and claiming the preference of a particular family and its right to rule and fourth the weapon of hatred and incitement to the Yemeni society or the world as a whole. Finally, Dr. Al-Ahmadi mentionedthe organic affiliation with the Iranian charity project in the region.
  • Dr. Wassam Basandouh explained that the arrival of the mullahs regime to power in Iran or what they call the Islamic Republic revolution, is nothing but a military militia coup that brought to power a regime hostile to liberation and the concept of the state and threatens peace and security in the region and the world under the slogan “exporting the revolution”, and it is the same system that supported the militia coup Al-Houthi in Yemen provided it with weapons and fueled it with spiritual ideological sectarian tide. Two days prior to this seminar, there was a session in the Security Council discussing a proposal to renew the arms embargo on Iran, and this matter affects Yemen and the region in particular as it will have its broader effects globally, it clearly means restoring the outright ability of the mullahs ’regime to supply militias Terrorism with weapons in Syria, Hezbollah in Iran, Al-Houthi in Yemen, and in Iraq, and even the restoration of the full capabilities of the Iranian Revolutionary Guard, which is practicing destabilizing operations extending from the Arab region to Africa, South America and the world.
  • The international community’s delay in including Hezbollah as a terrorist group has had dire consequences for European countries and American interests, and the waiting process is long until the world is convinced that the Houthi militia should be included in terrorist lists, and it will raise the cost that the world will face later. We know very well that the United States, for example, and the Western system in general are subject to its classification on the extent of the direct harm that these groups are committing against their interests, they do not care much for the Yemenis, and here we remind him immediately after the Houthi coup and control of the capital, Sanaa, groups of Houthi militia went to storm the American embassy in a blatant violation The Vienna Convention, which secures diplomatic facilities and wreaks havoc on its property.
  • Also, the Houthi slogan targets America with hostility, which is a declaration of war, and here Dr. Basindowa wondered how any US proposal for peace in Yemen could include allowing this rogue group to participate in the state and share power after all the crimes it committed? Also evidenced is the renewed American announcement that there are Houthi warships funded by Iran targeting its ships, in addition to the recent reports discussed in the Security Council that recognized that the missiles used to bomb Aramco are Iranian-made missiles, and we do not forget here that the Houthi militia has adopted this launch.
  • Missiles, even if it was a false declaration, remains revealing. We as human rights activists conscious of our capabilities know that the inclusion of the Houthi militia on terrorist lists is the decision of its states and needs the efforts of states, Dr. Basindowah said, and that in order to make a decision like this it takes a lot of time, but we also will not give up and will not give up our effort by calling and seeking to classify this militia as a terrorist group and we will remember that the Iranian regime is a regime A terrorist embraces, sponsors and funds terrorism.

Since these presentations were heard, several Houthi leaders went on trial in the Yemeni territories under the Coalition control. It will be instructive to follow the evidence against them presented in the case and to watch what additional details about cooperation with Iran will be revealed in the course of the legal process. Additionally, the Houthis continue to hold Yemen, the region, and international community hostage with the ticking time bomb of the FSO Safer oil tanker, at risk of turning into a colossal environmental disaster, whether through continuing neglect, or a deliberate act of sabotage threatened time and again by the Houthis.

And despite increasing scrutiny and reporting, none of other troubling issues, such as diversion of international humanitarian aid, is going away either. The sooner the United States and others realize that the passive acceptance of Houthi authority is detrimental to whatever other political, economic, and military action is being taken to deter Iran’s aggression in the region and beyond, the more likely they are to develop an effective strategy that might finally begin to address both sides of the equation.

Irina Tsukerman is a human rights and national security attorney and analyst based in New York. She has written extensively about geopolitics, foreign policy, and security issues for a variety of domestic and international issues and her writing has been translated into Arabic, Farsi, Spanish, French, Portuguese, German, and Indonesian.

Continue Reading
Comments

Intelligence

The means to manage cyberspace and the duty of security

Published

on

Over and above the ethical concepts regarding the near future, it is also good to focus on the present. Governments are required to protect their national resources and infrastructure against foreign and domestic threats, to safeguard the stability and centrality of human beings and political systems and to ensure modern services for civilians. Suffice it to recall the chaos that arose some time ago in the Lazio region for the well-known health issues.

Governments must play a key role in developing and leading the local ecosystems, but this national effort must involve many other stakeholders: local businesses, entrepreneurs, multinational companies, local and foreign investors, State agencies, Ministries and academics, people in education, professional institutions and the public at large.

Furthermore, cybersecurity is a national opportunity for developing the local economy and for positioning any country in the international arena as a safe place to establish and develop economic relations between States and companies. It is also important as a regional cyber hub.

Cyber strategy therefore consists in prioritising operational cyber activities with a view to optimising and monitoring the overdevelopment of cyber intelligence that could one day take such turns as to be ungovernable.

This is the reason why investment in technology, local capacity building and resource allocation and concentration are required. This means providing strategic advisory services to government agencies that are seeking to advance cyber security at a strategic and operational level.

It is therefore necessary to work with governments to develop their strategic and operational capabilities in cybersecurity, either at the national or sectoral level, as well as providing comprehensive cyber projects that combine cyber defence and the development of a local cyber ecosystem, based on the models tried and tested by various countries around the world, such as the People’s Republic of China, Israel, the United States of America, etc.

There is a need to specialise in setting up Cyber Units and Cyber Centres (SOC & Fusion Centres) and in developing Cyber Eco-Systems and Cyber Strategies. This means providing various cyber solutions, services and know-how to companies in various sectors, such as financial, industrial, energy, health, technology and many other sectors.

Stable OT (operational technology) security services and strategic advice to companies in the fields of energy, manufacturing, security, medicine, transport, critical infrastructure and many others create the prerequisites for defending cyberspace. As well as helping OT-based organisations integrate cybersecurity into their processes and products. Design, develop and deliver advanced technologies and solutions to protect critical assets in OT environments, such as ICS, SCADA, IIoT, PLC, etc.

In this regard there is a basic need for creating professional IT schools around the world that teach the meaning of cyberspace, and not just how to use Word and other simple Office programs.

The expansion and creation of universities and institutes of cyber knowledge is a starting point from which partnerships are launched with organisations seeking to create their own cyber schools or with academic or educational organisations offering cyber training to their students.

Providing comprehensive solutions for IT schools, enables the training of IT professionals and new recruits in all IT roles, so that hackers do not remain the sole repository of digital truth. Advanced training is a solid starting point for organisations seeking to train their IT professionals. Professionals who can manage and master schemes such as Cyber Defender, Cyber Warrior, Cyber Manager, SOC Analyst, Digital Forensics, Basic Training and many others, including through the use of simulation.

Leading the creation and development of the high-level cybersecurity ecosystem is a duty of States towards the citizens who elect their leaders. The same holds true for seeking and employing highly experienced experts in the various security subject matters, including strategic cyber defence, cyber warfare, cyber intelligence, cyber research and development and cyber strategy, as well as defining training policies for these branches of operation.

Having examined the prerequisites for protecting cyberspace, it is worth addressing the structure of some of the risks faced by institutional network systems.

One of the most typical operations made by hackers relates to the use of client/server technology to combine several computers as a platform to launch DDoS (Distributed Denial of Service) attacks against one or more targets, thus exponentially increasing damage.

A malicious user normally uses a stolen account to install the DDoS master programme on a computer. The master programme will communicate with a large number of agents at any given time and the agent programmes have been installed on many computers in the network. The agent launches an attack when it receives an instruction. Using client/server technology, the master control programme can activate hundreds of agent programmes in a matter of seconds.

A DDoS uses a group of controlled machines to launch an attack on a computer, be it server or client. It is so fast and hard to prevent that is therefore more destructive. If we consider that in the past network administrators could adopt the method of filtering IP addresses against DDoS, it becomes more difficult to prevent such actions today. How can measures be taken to respond effectively?

If the user is under attack, defence will be very limited. If there is a catastrophic attack with a large amount of traffic pouring onto the unprepared user, it will very likely that the network will be paralysed before the user can recover. Users, however, can still take the opportunity to seek defence.

Hackers usually launch attacks through many fake IP addresses. At that juncture, if users can distinguish which IPs are real and which are fake – and hence understand from which network segments these IPs come – they can ask the network administrator to change them. Firstly, the PCs should be turned off to try to eliminate the attack. If it is found that these IP addresses are coming from outside rather than from the company’s internal IP, a temporary investigation method can be used to filter these IP addresses on the server or router.

The solution would be to discover the route through which the attackers pass and block them. If hackers launch attacks from certain ports, users can block these ports to prevent intrusion. After the exit port is closed, all computers cannot access the Internet.

A more complex method consists in filtering the Internet Control Message Protocol (ICMP), a service protocol for packet networks transmitting information regarding malfunctioning, monitoring and control information or messages between the various components of a computer network. Although it cannot completely eliminate the intrusion during the attack, filtering the ICMP can effectively prevent the escalation of the aggression and can also reduce the level of constant damage to a certain extent.

The DDoS attack is the most common attack method used by hackers. Some conventional methods of dealing with it are listed below.

1. Filter all RFC1918 IP addresses. The RFC1918 IP address is the address of the internal network, such as 10.0.0.0, 192.168.0.0, 172.16.0.0, etc. These are not fixed IP addresses of a particular network segment, but confidential local IP addresses within the Internet, which should be filtered out. This method serves to filter out a large number of fake internal IPs during an attack, and can also mitigate DDoS attacks.

2. Use many PCs to resist hacker attacks. This is an ideal response phase, if the user has sufficient ability and resources to enable a defence against hackers who attack and continue to access and take over resources. Before the user is fatally attacked, the hacker has little means to control many PCs. This method requires considerable investment and most of the equipment is usually idle, which does not correspond to the actual functioning of the current network of small and medium-sized enterprises.

3. Make full use of network equipment to protect resources. The so-called network equipment refers to load balancing hardware and software such as routers and firewalls, which can effectively protect the network. When the network is attacked, the router is the first to fail, but the other devices have not yet collapsed. The failed router will return to normalcy after being restarted and will restart quickly without any loss. If other servers collapse, their data will be lost and restarting them is a lengthy process. In particular, a company uses load balancing equipment so that when a router is attacked and crashes, the other will work immediately. This minimizes DDoS attacks.  

4. Configure the firewall. The firewall itself can resist DDoS and other attacks. When an attack is discovered, it may be directed to certain sacrificial hosts, which are able to protect the actual host from the attack. The sacrificial hosts may obviously choose to redirect to unimportant hosts or to those having systems with fewer vulnerabilities than some operating systems and with excellent protection against attacks.

5. Filter unnecessary services and ports. Many tools can be used to filter out unnecessary services and ports, i.e. filter out fake IPs on the router. For example, Cisco’s CEF (Cisco Express Forwarding) can compare and filter out Source IP and Routing Table packets. Opening only service ports has become a common practice for many servers. For example, WWW servers open only 80 ports and close all the others or use a blocking strategy on the firewall.

6. Limit SYN/ICMP traffic. The user must configure the maximum SYN/ICMP traffic on the router to limit the maximum bandwidth that SYN/ICMP packets can occupy. Therefore, when there is a large amount of SYN/ICMP traffic exceeding the limit, this means it is not normal network access, but hacking. In the beginning, limiting SYN/ICMP traffic was the best way to prevent DDoS. Although the effect of this method on DDoS is currently not widely used, it can still play a certain role.

7. Scan regularly. Existing network master nodes should be scanned regularly, checked for security vulnerabilities and new vulnerabilities cleaned up promptly. Computers on backbone nodes are the best locations for hackers to use because they have higher bandwidth. It is therefore very important to strengthen the security of these hosts. Furthermore, all computers connected to the major nodes of the network are server-level computers. Hence regular scanning for vulnerabilities becomes even more important.

8. Check the source of the visitor. Use suitable software to check whether the visitor’s IP address is true. This should be done by reverse-searching the router: if it is fake, it will be blocked. As said above, many hacker attacks often use fake IP addresses to confuse users and it is hard to find out from where they come. Therefore, for example, the use of Unicast Reverse Path Forwarding can reduce the occurrence of fake IP addresses and help improve network security.

As seen above, we need experts who know more than hackers, and this is the duty that States and governments have towards their institutions, but primarily towards their citizens.

Continue Reading

Intelligence

The visit of the head of Israeli Mossad intelligence to Bahrain

Published

on

The visit of the UAE Foreign Minister, Sheikh Abdullah bin Zayed to Damascus on Tuesday, November 9, 2021 and the meeting with Syrian President Bashar Al-Assad, sparked a great controversy that began from the moment it was announced, which was highlighted by Western analyzes mainly from outside the region, that it comes for a (comprehensive Arab reassessment of the reality of the relationship with Syria and its importance in combating terrorism in the region, and the importance of the current Syrian reality in the calculations of Arab and Gulf national security, primarily towards Iran, and breaking the American “Caesar Law” towards imposing an economic blockade on Syria), and various analyzes and speculations about the future of these have increased. The Emirati step, its implications and dimensions in the Arab and Gulf relations towards the Syrian regime, and whether it represents one of the indicators of the transition to another new phase of political action towards opening up to Damascus, and the return of Syria to its regional and international role. Especially with the clarification of the “Emirati-Syrian coordination” some time before that visit to arrange the rapprochement between the two sides, which became clear by the announcement of the contact between the Crown Prince of Abu Dhabi (Sheikh Mohammed bin Zayed and President Bashar Al-Assad), as well as an official invitation to Syria to participate in the “International Expo Exhibition In Dubai” and then my meeting with the Syrian and Emirates oil ministers in Moscow.

    But what stopped me in that Emirates visit, was perhaps other events that were not addressed during those analyzes, which caught my attention analytically and academically, and the most different of them was (I was alerted by a foreign researcher during my commentary on the same analysis, that the Emirates move is mainly in the interest of Tehran the Iranian regime, not to stifle and besiege Iran in its areas of influence and its known role in Syria).  Despite the strangeness of this analysis, I occupied my mind with another matter to respond to it, regarding: (the significance of the visit of the head of the Israeli Mossad to Bahrain, and the visit of Emirates officials to Tel Aviv, and what is even clearer to the public is the organization of joint naval exercises in the Red Sea with the joint Israeli naval forces with Bahrain and the UAE), at the same time as the aforementioned visit.

    Accordingly, my analysis mainly focuses on whether that visit took place through (arranging and coordinating with Tel Aviv to curb Iran in Syria and the region, by attracting Syria to the Arab League and collective Arab action again), and the Gulf rejectionist and Arab reservations towards the step of rapprochement.  The Syrian-Iranian, or did I aim for a clearer Gulf rapprochement with Iran through rapprochement with Syria, as I went to a number of mainly Western analyzes, which I received.  From here, the Egyptian researcher will analyze all the following elements:

Analyzing the implications of the visit of the UAE Foreign Minister (Bin Zayed) to Syria on November 9, 2021.

And its relationship to the “joint naval maneuvers” between (Israel, the UAE and Bahrain) in the Red Sea on November 10, 2021 on the Iranian existence at Syria

The visit of (the head of the Israeli Mossad intelligence service to Bahrain) at the time of the naval joint maneuvers with Israel in the Red Sea, with (the visit of the UAE Air Force commander to Israel).

Then, finally, analyzing the impacts of the Israeli Mossad intelligence moves in the Red Sea on its rapprochement with the USA in the face of (China, Russia and Iran).

   To answer those questions, it is necessary to verify and respond to number of inquires and some other different analyses, such as:

The UAE’s motives for taking such a step of rapprochement with Syria, through the visit of the UAE Foreign Minister “Sheikh Abdullah bin Zayed” to Damascus on Tuesday, November 9, 2021, and the meeting with Syrian President “Bashar Al-Assad”.

Rather, will this Emirates step (encourage the rest of the Arab countries to follow the Emirates footsteps)  and open up to the Syrian regime?

What is the fate of the “Syrian opposition to the Emirati-Syrian rapprochement”, and is this Emirates move aimed at weakening the Syrian opposition track, especially the Syrians opposing the regime of President “Bashar Al-Assad” abroad?

Then, it will remain to analyze (the Syrian opposition’s options if more Arab countries open up to the Al-Assad’s regime).

Will there be a (Syrian-Emirati consensus) towards the step of solving the (return of Syrian refugees from abroad and the settlement of their situation with the current Syrian regime)?

Finally, the question arises, regarding: (the impact of the intensity of American and international criticism of the UAE’s step of rapprochement with the Syrian regime and President “Bashar Al-Assad” on the completion of the remaining Arab steps seeking to integrate and return Syria once more to its membership in the League of Arab States)?

In fact, the most dangerous and important analysis for me remains completely analytical, namely: (What was raised about the fact that the UAE obtained the green light from the United States of America itself and from the Israeli side before the visit of the UAE Foreign Minister “Bin Zayed” to the Emirates, in pursuit of forming (Gulf-UAE-Israeli alliance against Iran), and seeking to neutralize the Syrian regime in the face of these Iranian moves as a closely related ally of the Iranians?) Accordingly, we can analyze that, as follows:

Perhaps what reinforces and supports my recent view regarding the “Israeli Gulf mobilization with the help of the UAE and Washington’s support to confront Iran through Syria” is (the joint security coordination between Israel and the Emirati and Bahraini naval forces to conduct joint naval maneuvers in the Red Sea, which lasted for five full days), which began on Wednesday, November 10, 2021, which comes at the same time as the UAE rapprochement with Syria, meaning:

 (There are joint security arrangements between Israel, the UAE and Bahrain in the face of Iran through the move of rapprochement with Syria as an ally of Iran)

As I mentioned, the joint naval maneuvers between Israel and the UAE at the same time as the UAE visit confirms (the continuation of joint security coordination between Israel and the UAE), especially to curb and limit Iranian influence.  Knowing that the step of joint security coordination between the Emirates and Israel began three years ago, when the naval forces of the Gulf states, mainly the “UAE and Bahrain”, began conducting joint naval maneuvers with the Israeli side, which were the first for them ever with their Israeli counterpart, in cooperation with the forces of the United States of America’s Navy.

We find that the current joint naval maneuvers in the Red Sea with the participation of the UAE and Israel, with the participation of (warships from the Emirates, Bahrain and Israel), in addition to the United States of America, is a “joint Israeli-Gulf assertion” to send a message to the Iranian side, that these naval maneuvers with  Israel, aims to:

 “Securing the maritime traffic in the face of Iran, and seeking to secure the movement of the straits and maritime navigation in the Red Sea with the help of Israeli security, especially that these joint maritime training operations included training on encirclement and raid tactics”

This was confirmed by the US Naval Forces Central Command, in an official statement, to confirm that:

“The Israeli, Emirates, and Bahraini training aims to enhance the ability to work collectively among the forces participating in the maneuvers”

From here, we understand that the step of joint Israeli-Emirati security coordination, and the consequent step of the joint naval maneuvers, came after the signing of the “Abraham Accords” in September 2020, and the normalization of their relations with Israel by the UAE and Bahrain. Since then, it has strengthened the (diplomatic, military, and intelligence relations between Israel, the UAE and Bahrain, as the two most important Gulf countries that share Tel Aviv’s concerns about Iran’s activities in the Red Sea and the region).

The most prominent here, is (the visit of the head of the Israeli intelligence service Mossad in a public visit to Bahrain at the time of the joint naval maneuvers with Israel in the Red Sea, with the commander of the UAE Air Force heading at the same time also on a first-of-its-kind visit to Israel in October  2021).

In general, the (re-opening of the Emirati and Bahraini embassies in Damascus) in December 2018, was considered at that time as (a major change in the Gulf policy towards Syria, and it was among the first indications of a more comprehensive normalization). There is no doubt that these steps came after consulting Saudi Arabia.  However, it seems that Saudi Arabia, as usual, is taking a cautious and secretive attitude towards the move of rapprochement with Syria due to its fear of the “Al-Assad regime’s relations with Tehran”.

At the time, the UAE and Bahrain talked about (the geopolitical benefits of rehabilitating the regime of President Bashar Al-Assad). The State of Bahrain confirmed that “the step of integrating Bashar Al-Assad aims to strengthen the Arab role and prevent regional interference in Syrian affairs”.

The most important analytical question for me is whether Abu Dhabi has completely severed its relations with Damascus at all, given (the continued presence of prominent Syrian figures loyal to Damascus living and working in the Emirates).

In general, this (continuous stream of signals emanating from Damascus and other Arab capitals, led by the Emirates for rapprochement with Syria), indicates that the former opponents of the Syrian government have come close to reaching mutually beneficial arrangements with the Syrian government, some of which pledged a few years ago to drop it.

The most important gains for the Syrian regime from that rapprochement with the UAE and the rest of the Arab countries will be (reconstruction contracts for Syria and energy deals), in addition to the markets that will be opened to it if they reconcile with the Arab countries, which may later pave the way for “inclusion of Damascus again and  returning its membership in the League of Arab States”, which is of course the most important strategic step for the UAE and the Gulf states, to help Syria to return back to the “Arab House”, and consequently put pressure on it not to rapprochement with Iran, as it is a rival opponent for the UAE and the Gulf states.

    In this context, the Syrian capital, Damascus is now hoping for (influential Arab voices to exert international pressure in order to lift the severe sanctions imposed on the Syrian regime), which aims to (punish Syrian officials and Syrian organizations for their alleged involvement in human rights violations).

Continue Reading

Intelligence

Features of ISIS’ Information Warfare

Published

on

The most significant feature of our modern world is the large-scale popularization and application of the Internet, which has transformed our society and formed a substantial information society. Initially, the information society was only a theoretical projection, but it has now become a reality. When the world transforms into an information society, the great impact of such a transformation will be felt. The governance structures of the world have not prepared for such changes, and thus are unable to deal with these transformations effectively, resulting in massive risks and social disorder.

In the field of information and anti-terrorism, a major concern is the impact of the Internet. The Internet has accelerated the flow of information, and the boundary of truth and falsehood are at times, indistinguishable. At the same time, social conditions can be exaggerated online. Combined with the psychological activities and circumstances of the masses, it is extremely easy to create a larger scale of dissatisfaction which will, to a certain extent, lead to the collapse of the original social ideological and belief systems. The United States and Western countries ignoring the social and stage of countries and regions in the Mediterranean region, Africa, and the Middle East and Central Asian countries, blindly export their ideology, and driven by the amplification effect of the Internet, this process of collapse has been accelerated.

A terrorist organization such as ISIS has harnessed the great potentials offered by the Internet, and as such, it laid the foundation for the large-scale development of ISIS’s information warfare. First of all, the Islamic State has established a professional public relations organization, responsible for producing and disseminating content. ISIS has its homepage and accounts on major social networking sites, and even has multi-layered sub-accounts, thereby evading censorship. They launched DABIQ, an attractively designed online magazine with extremely provocative content, and developed a smartphone app called Dawn of Glad Tidings, focusing on the Western “high-end customer base” as their target group to inform them of the latest “news of jihad in real-time”. In addition, the Islamic State has also launched the online game, which creates scenarios for players to attack the U.S. military, police, and civilians, and rewards criminal acts and even terrorist attacks in the game.

Today, ISIS can be seen almost on all social media platforms and is accessible in Western countries. It has thousands of accounts on Twitter alone, including both organized public accounts and terrorist personal accounts. ISIS is proficient in the so-called “viral marketing” model in information warfare. Through the user’s network, the information spreads like a virus and spreads to thousands of audiences using rapid replication. The organizer clearly achieves the word-of-mouth “relationship marketing” by providing a certain product or service, allowing others to become “marketing and communication levers” inadvertently. 

ISIS is often far more professional and sensitive than the government departments of various countries that hold the power of national governance. It has long been keenly aware of the evolution of political discourse from propaganda to information dissemination in contemporary society, and this trend is one of the keys that is enabling it to lead public opinion. Traditional propaganda methods such as sermons and speeches, obviously, lack interaction with the target audience. Therefore, ISIS encourages followers to use various websites as platforms to establish various forms of “self-media”. ISIS also cultivate Internet influencers to encourage netizens to create audio messages, videos and even websites. As ISIS cleverly hides its ambitions behind high-level productions and attractive propaganda, more and more people in the West, especially young people, have been successfully brainwashed, are actively participating in the dissemination of ISIS-related information, even going to the Middle East to become jihadists on the battlefield and gain the satisfaction of realizing their supposed self-worth.

This kind of information warfare was so successful that in 2016, the official website of Tsinghua University in China was hacked by ISIS hackers where ISIS recruitment advertisements were posted. In the United States, the Federal Bureau of Investigation (FBI) has found cases where teenagers as young as 15 years old were recruited by ISIS, and in some cases in the United States, parents even encouraged their children to participate in terrorist organizations. In fact, the information warfare of ISIS is very active and successful not only in Western countries but also in Turkey and Syria. As a result, ISIS has obtained the human resources of thousands of sacrificial young people.

The information society and the Internet have created a huge imbalance for the future world, making this world an unbalanced world and a world in transition. The formation of various transnational virtual organizations is now possible using simple network tools. This also means that terrorist organizations like ISIS cannot theoretically be eliminated at all. They can easily evolve into virtualized organizations that exist everywhere and can be found by search engines at any time due to the ubiquity of the information society and the Internet.

They will continue to grow, gain popularity, and evolve into a new type of network-based anti-government organization. Terrorist organizations of various types have shifted their focus from the real world to the virtual world, and then back again. This is the enormous governance challenge that the information society will undoubtedly face in the future. 

Final analysis conclusion:

Although ISIS faces restrictions as it is a terrorist organization, it has used the information society and the Internet to launch successful information warfare and has achieved remarkable results worldwide. In an age of information asymmetry, simple and easy network tools have made it possible to establish a variety of transnational virtual organizations. This will pose a huge governance challenge to the future information society.

Continue Reading

Publications

Latest

Reports50 mins ago

People are increasingly worried about inequalities but divided on how to address them

For a recovery from the COVID-19 crisis that is strong, sustainable but also fair, it will be key to tackle...

business-technology business-technology
Tech News3 hours ago

Industrial innovation to accelerate transitions towards greener and digital economies

In the context of the 8th European Conference on Corporate R&D and Innovation (CONCORDI), 2021 – Industrial innovation for competitive sustainability,...

Reports5 hours ago

Data show how the COVID-19 pandemic has hit all aspects of people’s well-being

The COVID-19 pandemic has not only had devastating effects on physical health and mortality but has touched every aspect of...

Reports7 hours ago

Inflation Concerns Push Up Emerging East Asia Bond Yields

Emerging East Asia’s bond market grew 3.4% in the third quarter to $21.7 trillion, although rising global inflation and a...

Tourism9 hours ago

New COVID-19 Surges Keep Travel Restrictions in Place

One out of five destinations continue to have their borders completely closed as new surges of COVID-19 impact the restart...

East Asia11 hours ago

Summit for Democracy Attempts to Turn Multicolor Modern World into Black and White Divisions

One of the most important takeaways from the recent sixth plenary session of 19th CPC Central Committee is that Beijing...

East Asia13 hours ago

The Chinese diplomatic force in the IAEA to confront Western leadership

At the level of international relations, through China’s presence in all the relevant international organizations, and its membership in all...

Trending