Since the time of Empress Wu Chao, who created the first Chinese intelligence service in 625 A.D., much has changed, but we could also say that some traits have not completely changed, as we might believe at first sight.
Later there was China’s extraordinary adventure in the modern world, which began with the fall of the last Emperor Pu Yi, who was also guilty of collaborationism with the Japanese in Manchukuo and ended his days artistically drawing the phrase “today the people are sovereign” at the court of Mao Zedong.However, as early as 1934, the British intelligence Services deciphered MASK, the code used by the Komintern to encode information from Moscow to Shanghai which, at that time, was the CPC’s pole.
However, it was in 1957 that the United States began to fly its U-2s over China, starting from Peshawar.
In 1966, two years after the beginning of the Great Cultural and Proletarian Revolution, there was the great purge of the intelligence services in China carried out by the very powerful Kang Sheng. He was the mover of the fall of Liu Shaoqi, Deng Xiaoping and Lin Biao, but then he was associated with the “Gang of Four” and hence suffered the usual damnation memoriae. A man of Mao Zedong who knew too much, but died in his bed.
Then, as is well-known, in 1971 Li Biao was killed while fleeing to the USSR with his plane.
Not surprisingly, again in 1971, Kissinger began to deal secretly with China. Lin Biao’s death was the seal on the definitive strategic separation between China and the Soviet Union – which was what the United States was interested in.
In 1973 the first CIA “station” was created at the U.S. liaison office in Beijing, while China took the Paracel Islands and CIA left its main station in Taiwan.
In 1975 the first Chinese Electronic Intelligence satellite (ELINT) was launched, but the following year saw the death of Zhou Enlai, the true master of Chinese foreign policy and Kissinger’s friend who protected Mao from his mistakes.
The Armed Forces returned to power: with the support of all the military, Deng Xiaoping quickly put Hua Guofeng aside and became the CPC Secretary, but reforms were still being studied. Initially Deng was not as reformist as currently believed in the West.
Hence in Deng’s reformist phase, the U.S. diplomatic recognition was shifted from Taiwan to the People’s Republic of China – and that was China’s real goal at the time.
Shortly afterwards, China also opened diplomatic offices in the United States.
In 1981, however, the Americans developed programmes for controlling the Chinese agents operating in the USA, while Deng Xiaoping himself started China’s nuclear rearmament.
The China National Nuclear Corporation was established in 1988.
Ten years later, in 1999, the Chinese Armed Forces built a base for intercepting military signals in Cuba but, in 2002, the Chinese cyber attacks on some U.S. networks – known as TITAN RAIN – began, while the FBI even opened a liaison office in Beijing, with assignments also extended to Mongolia.
In 2004, China put the Nanosatellite I into orbit, but there was also a further cyber attack – probably of Chinese origin – on the U.S. Army Information Systems Engineering Command, as well as on the Naval Ocean Systems Center, and finally on the space and strategic installation in Huntsville, Alabama.
In 2010, Google suffered an AURORA cyber attack. A long, powerful and initially uncontrollable attack.
Probably also Symantec, Northrop Grumman, Morgan Stanley and Dow Chemical were hit by AURORA cyber attacks – albeit this fact is not confirmed.
Hence data collection, mainly economic and technological intelligence for China, but also a complex relationship with the United States to be penetrated informally, but not to be damaged too much.
In any case, the reins of the Chinese Service (or rather, the intelligence services) were held by the State Security Ministry.
A legal difference should be underlined: while, legally speaking, the KGB was a Central Committee’s Department, the Communist China’s intelligence Service was a real Ministry.
The Interior Ministry was represented by the Public Security Ministry but, in general terms,it should be said that – unlike the old Soviet ones – the Chinese intelligence Services are less obsessive in their relationship with possible “sources”, anyway preferring ethnically Chinese people.
Furthermore, the Chinese Foreign Service seems to prefer sources that – unlike what happened with the Soviet KGB – have no money or personal crisis problems, which become dangerous or ambiguous.
Again unlike the old Soviet ones, the Chinese intelligence Services do not willingly pay for news and information. They do not blackmail and they do not extort. Quite the reverse. They do not pay at all. If anything, they help Chinese abroad for relatives or other matters.
Hence rarely do the Chinese intelligence Services pay for the data they receive.
The Chinese intelligence Agencies are therefore interested in people who,only rarely, come within the range of attention of the enemy intelligence Services. Operationally speaking, this is an excellent choice.
Again unlike the old Soviet ones, China’s intelligence Services do not organize rezidenture abroad. They also rarely hold clandestine meetings and almost never use covert communications.
“The floating bird is existence, if it dives it is non-existence”. The mind is like the moon: it is reflected in the water at a speed that man does not perceive. The mind should not be stopped, but left free to grasp the void, the invisible, the Nothing.
The Chinese intelligence Services, however, organize closed areas where a “source” finds itself – with its pace and needs – providing the materials needed by the Chinese government.
The width of the network, however, is such that the slow and non-invasive pace of Chinese operatives is capable of reaching the same – or even larger – quantity of sensitive material collected by a Service that does not follow the Tao, i.e. the natural flow of events and people.
Moreover, the Chinese intelligence Service often operates with real academics, real students, real journalists and very real businessmen.
The cover is often irrelevant, but also very true. Indeed, it is considered a cover attracting excessive interest – like jealousy which, as Karl Kraus used to say, “is a dog’s bark which attracts thieves”.
Obviously, in this respect, the Chinese intelligence Services have a significant advantage, since they can legally use real journalists and real academics, while in the West – including in Italy – it is forbidden to use “journalists, clergymen, parliamentarians and town councillors” as agents. Stupidity has been tormenting the intelligence Services with a ferocity worthy of a better cause.
Hence no one who can really be useful. This leads the Western intelligence services to fabricate useless complicated “stories” that are often easily discovered by the adversaries.
Not to mention the forty-year defamation of the intelligence Service – as is the case in Italy – which causes other damage.
For the intelligence Services, the Chinese technological companies operating in the West must be economically self-sufficient and, indeed, make profit, without weighing on the Service’s or State’s coffers.
An often predatory “Western-style” profit is also allowed, at least as long as this does not negatively affect intelligence operations.
Therefore, the Chinese companies using up technology and data – which are the primary material of current Chinese intelligence – must be the most obvious and natural enterprises, without hidden compartments or ambiguous operatives that the host country’s intelligence Services can discover – albeit possibly not so easily.
Another problem in the control of Chinese operations in the West is the difficulty – and, indeed, we could say the reluctance- with which our companies, including SMEs, report the often harshly blackmailing cyber attacks, or even the crises resulting from fraud and scams often carried out by managers and employees.
The obsession of being always listed on the Stock Exchange makes companies, including the small and medium-sized ones, excessively afraid of disclosing such adverse operations.
According to Leonardo-Finmeccanica, during the Covid-19 phase, there have been 230,000 malspam operations worldwide, 6% of which in Italy.
This year 51% of all Italian companies have suffered one or more significant cyber attacks, with a 125% average expansion for the domains called “Covid”.
In China, however, there has recently been a change of the State system.
While in the past, before globalization, also thanks to an “imperial” psychology, the Service had above all to defend borders and, to some respects, also the “purity” of the Chinese ethnic balance, today – considering the global economic role played by China – the Service has to deal with 1) the security of raw materials supplies from abroad and 2) the stability of the productive system in a phase of great social transformations.
Hence the necessary current complexity of the Chinese Party’s and State’s decision-making system: the top level is the National Security Leading Small Group (NSLSG), which also has many informal strategic decision-making mechanisms within the Chinese ruling class. An elite that has always been more informal than we might think.
Certainly, at institutional level, there is also the Politburo Standing Committee, but there is still Hu Jintao, a man still essential to the power architecture of Xi Jinping, who listens to him carefully.
There is also the Foreign Affairs Leading Small Group, which is less involved in relations with the United States – of which the aforementioned National Security Leading Small Group is in charge – but mainly controls the work of the Agencies and connects them.
In addition to the intelligence Services’ role, a fundamental role is also played by the various and often excellent academic and non-academic think tanks.
Also the results of these structures are assessed by the Small Groups.
But how is foreign policy decided in China?
First of all, there is the CPC but, more precisely, the “Politburo Central Committee”, in addition to the aforementioned Politburo Standing Committee (PBSC).
With its 204 members and 167 “alternate” members, the Central Committee meets once a year.
The “Politburo Central Committee” is composed of 25 members, elected by the Central Committee. It meets once a month and five of its members do not usually live in Beijing.
The PBSC, the Central Committee Standing Group for Foreign Affairs, meets once a week and has nine members.
The Meeting is often coordinated by the Central Committee’s Foreign Affairs Office.
Within the Standing Committee, the Foreign Affairs Office has a specific area responsibility, but we should not think that Chinese Communism is authoritarian, at least in the childish sense of the term.
The bigger the issue, the wider and freer the discussion. The leader’s policy line is always to buildthe broadest consensus among his advisers.
With specific reference to the thorniest issues, the leader often appoints a “first collaborator” but usually the “central” meetings are routine for minor issues, even geopolitically, while the leader speaks and decides on the essential issues: the relations with the United States – still a constant obsession of the Chinese intelligence Service – with Japan, Taiwan or, most likely, the Russian Federation.
The policy line at the top of the decision-making system – and this also pleases Xi Jinping – is still the old and stable policy line developed by Jang Zemin, which was defined in 1999: “collective leadership, democratic centralism, individual preparation and decisions that always result from meetings”.
In this way, the Standing Committee and the Central Committee’s Foreign Affairs Office prepare briefings and distribute them among the Central Committee’s offices.
Often there is no voting, but discussions are held until consensus is reached.
For example,a rare case of voting was when North Korea conducted a nuclear test in 2009 and China had to decide whether to withdraw its support for the country. Seven negative votes were cast against support for North Korea.
The establishment of the aforementioned National Security Leading Small Group (NSLSG)mainly followed the U.S. bombing of the Chinese Embassy in Belgrade.
A fact that has marked China’s recent political history.
Hu Jintao, whom the PSBC defined as a “main personality”, leads a complex office: eight Ministers from the State Council; two from the Foreign Ministry; the National Security Minister; the Minister of Commerce; the Taiwan Affairs Office, the Office dealing with Hong Kong and Macao; the Overseas Chinese Affairs Office and finally the Information Office.
There are also two Party’s bodies: the Propaganda Department and the International Department.
The Armed Forces are represented by the Defence Minister and the Chief of Staff.
Therefore, the Chinese intelligence Services have a completely different style and modus operandi compared to the Westerners’ intelligence practices. They also have a complex and technically refined organization of political control over the Services’ operations, and finally a different finalization of the Chinese Agencies’ operations in the West, at least for the time being.
The role of maritime power
The maritime environment is both a means of transport and a resource. The first aspect is obviously expressed through what is transported by ship: containers, oil, minerals, many objects and many resources of our daily life have passed through the sea before we use them. Data also crosses the sea, since submarine cables are the heart of the Internet, constituting the “real” face of the “virtual” world. For the second aspect, that of resources, it is either food, with mainly fishing, energy, fossil with oil and gas, or renewable with wind turbines and tide turbines, or minerals, starting from sand, whose exploitation is little known, but essential for many activities including construction.
It was from the fifteenth century, which corresponded to the beginning of the great discoveries, that the control of the seas became an important topic. At that time, the British Sir Walter Raleigh theorized its importance: “Whoever owns the sea holds the trade of the world; whoever holds the trade holds the wealth; whoever holds the wealth of the world owns the world itself ”. Gradually, the United Kingdom becomes the maritime superpower par excellence, supplanting a Spain and Portugal soon exhausted by the colonization of a South America too big for them and unable to compete with a France that is too terrestrial. At the end of the 19th century, Britain controlled major sea routes and her empire was vast, with the great outdoors of Australia and Canada and the British Indies.
But the entry into the twentieth century coincided with the arrival of a new actor in the oceans, the United States. The theorist in charge here is Alfred Mahan, who has updated Raleigh’s theory by specifying that control of the sea passes through that of sea routes and that in this matter everything is played at the level of the straits. The pivotal year in this sense is undoubtedly 1914: it corresponds to the inauguration of the Panama Canal, a maritime passage controlled by Uncle Sam, but also to the beginning of the First World War, which at the same time weakens the United Kingdom, due to of the energy spent in the conflict that does not compensate for territorial gains in Africa, the Middle East and the Pacific. The turning point that completes the transformation of the United States into the great maritime power of the second half of the 20th century is World War II. Europeans, including those belonging to the victorious camp, are too weakened to maintain their historical prerogatives, especially when colonial empires become complicated to maintain for political as well as demographic reasons.
The United States emerged from the war with a colossal military and merchant fleet (thanks, among other things, to the Liberty ships), and was able to reconstitute those of its new allies in the Western camp. Moreover, this aid does not prevent the Americans from making their own interests prevail over those of their allies, as with the Suez crisis where they countered the Franco-British intervention that had militarily managed to regain control of this strategic channel with diplomatic means. This domination of the seas was hardly contested by the Russians, reduced to an asymmetrical confrontation, symbolized by submarines. It is important to stress that Russia does not have direct access to the oceans, a resource of the United States.
In 1990, the Soviet Union collapsed, but a phantom threat already hovered over the almighty awakening of America, that of China. Under the impact of Deng Xiao Ping’s reforms, its economy was starting to become competitive and the country was using its huge pool of cheap labor to become “the factory of the world”. This economy is export-oriented and generates colossal shipping traffic, to which the Dragon is adding its touch: rapidly, Chinese shipping companies and shipbuilding are becoming key players in their respective sectors. From a military point of view, the Middle Kingdom had an almost insignificant navy in the late 1980s, but today it is second in the world behind the United States, even if the latter maintain a good advantage.
On land, the Chinese strategy consists first of all in controlling the space contained within a first chain of islands corresponding to the East China Sea and the South China Sea, even if in the latter it means not respecting the rights of other coastal states. or even intimidate Taiwan, the “rebel province”. The next step is to dominate the space within a second chain of islands located further offshore, which would put China in direct contact with US possessions, with the risk of confrontation that this entails. The so-called “pearl necklace” strategy, consisting in the development of Chinese infrastructures in the Indian Ocean, also connects the Middle Kingdom with another competitor, India, which wishes to assert its rights in this space that India considers its courtyard. Finally, China inaugurated its first overseas naval base in Djibouti in 2018, and others may follow in the years to come, such as Walvis Bay in Namibia. This expansion solidifies China’s rank as a world power, while Russia has lost most of its network of naval bases around the world with the collapse of the USSR.
The power of the sea is composite, made up of elements that multiply each other more than they add up. The first of these is access to the sea, without which nothing is possible. Therefore, the United Kingdom, an island country, is naturally predisposed to the projection of maritime power. The United States, bordered by two large maritime spaces, is also favored. For Russia, things are less obvious, as for China; in fact, the goal of the pearl necklace strategy is both to allow access to the sea from peripheral regions such as Xinjiang and to control sea routes. Moreover, in its time, Russia had tried to develop its access to the sea with “the race for warm seas”.
Once you have mastered access to the sea, it is necessary to be able to move, thanks to the sea routes and more particularly to the strategic passages. Today, the Americans retain control of it, although the Middle Kingdom tries to weave its web. For example, instead of wanting to get its hands on the Panama Canal, China is supporting a competing canal project in Nicaragua, even if the latter is stopped for the moment. Traffic also requires a merchant fleet, and China is among the champions of shipping and also shipbuilding, where Americans are largely left behind, held back by a protectionist Jones Act that maintains a significant merchant fleet, but marginalized in the globalization.
In general, where terrestrial space is largely controlled by our human societies, the sea escapes this phenomenon much more, to the point that it is still a space to be conquered in many ways. The polar regions, especially the icy Arctic Ocean, but also the seas surrounding the Antarctic continent, constitute a new frontier for humans. The seabed and its mineral resources are also often less known than terrestrial space.
Finally, one last consideration: the Italy – with the exception of the maritime republics – has not been able to exploit its projection of maritime power. And this is one of the reasons, certainly not the only one, that has prevented – and prevents – Italy from having a credible, authoritative foreign policy and above all capable of stopping Turkish hegemonic ambitions.
Indian Chronicle: Exposing the Indian Hybrid warfare against Pakistan
In recent years Indian hybrid warfare against Pakistan has intensified manifold to malign Pakistan Internationally through disinformation and propaganda tactics. Hybrid warfare has mainly been described as achieving war-like objectives with the help of fake news, disinformation, and propaganda. The Objectives of Hybrid warfare are mostly to secure long term victory against the opponent. Similarly, India has launched massive hybrid warfare against Pakistan, which was uncovered by EU DisinfoLab in its report called “Indian Chronicle”.
EU DisinfoLab is an independent organization working to expose and tackle disinformation campaigns targeting the European Union and its member states. The organization has claimed that the disinformation campaign against Pakistan has been active since 2005, “a massive online and offline 15-year ongoing influence operation supporting Indian interests and discrediting Pakistan internationally”.
In a recent investigation EU DisinfoLab has exposed a malicious Indian campaign against Pakistan. In the report, “Indian Chronicle” EU DisinfoLab has exposed the dubious use of media outlets, NGOs, and fake personnel by India to malign Pakistan. The disinformation campaign mainly targeted the United Nations and the European Union through more than 750 fake media outlets and 10 fake NGOs. According to the report, “uncovered an entire network of coordinated UN-accredited NGOs promoting Indian interests and criticizing Pakistan repeatedly. We could tie at least 10 of them directly to the Srivastava family, with several other dubious NGOs pushing the same messages.”
According to the report the disinformation campaign is supported by the Srivastava group. The Srivastava group has helped in “resurrected dead NGOs” to spread fake news. The report says that “Our investigation led to the finding of 10 UN-accredited NGOs directly controlled by the Srivastava Group, which our full report introduces at length. Their common trait? The fact that they all rose from the ashes of real NGOs. Indian Chronicles effectively benefited from the track record of these organizations while pursuing their agenda: discrediting Pakistan and promoting Indian interests at UN conferences and hearings,”.
Moreover, Asian News International (ANI), a major news agency in India has provided a platform for suck fake news campaigns. The aim of the Srivastava group and ANI media outlet is “to reinforce pro-Indian and anti-Pakistan (and anti-Chinese) feelings” in India, and “internationally, to consolidate the power and improve the perception of India, to damage the reputation of other countries and ultimately benefit from more support from international institutions such as the EU and the UN”.
The report claim that the organizations funded by the Srivastava group-sponsored trips for European Parliament members to Kashmir. “The organizations created by the Srivastava Group in Brussels organized trips for Members of the European Parliament (MEPs) to Kashmir, Bangladesh, and the Maldives. Some of these trips led to much institutional controversy, as the delegations of MEPs were often presented as official EU delegations when they were in fact not traveling on behalf of the Parliament,”. Such sponsored trips aimed to build a positive image of India, while spreading disinformation about the alleged claims of Pakistan-sponsored terrorism in Kashmir.
Moreover, India has been actively involved in portraying Pakistan as a terrorist-sponsored state through its disinformation and fake news technique. For instance, India is lobbying strongly at FATF to put Pakistan on the blacklist.
India has also supported and sponsored Baloch separatist leaders and spread disinformation through their fake media outlets as mentioned in the EU DisinfoLab report.“These UN-accredited NGOs work in coordination with non-accredited think-tanks and minority-rights NGOs in Brussels and Geneva. Several of them – like the European Organization for Pakistani Minorities (EOPM), Baluchistan House, and the South Asia Democratic Forum (SADF) – were directly but opaquely created by the Srivastava group,”one of the examples is Kulbhushan Jadhav, an Indian spy who was captured in Pakistan.
The Indian Chronicle report has exposed the dubious face of India and the administrative structure of the United Nations and the European Union. Indian involvement in the spread of disinformation and resurrection of dead people and NGOs has exposed its long-standing for Human rights and democracy. Meanwhile, the reports have also exposed the administrative structure of the UN and EU, as they failed to notice the activities of fake UN-accredited NGOs and spread of disinformation through their affiliated NGOs.
Hybrid Warfare: Threats to Pakistani Security
‘Victory smiles upon those who anticipate the changes in the character of war’-Giulio Douhet
Hybrid threats are becoming a norm in Pakistan and if we want to move forward in this age of technological advancements, cybercrimes, and the use of social media, we must have a wholesome response mechanism.
Hybrid warfare is a military strategy that employs not only conventional forms of warfare but irregular with it as well. It involves propaganda, cyber-attacks, state-sponsored terrorism, electoral intervention, and many more means of multi-dimensional approaches towards war which are used by militarized non-state actors. The term ‘Hybrid’ came into use around 2005-2006 due to the Israel-Hezbollah war (“Lessons from Lebanon: Hezbollah and Hybrid Wars – Foreign Policy Research Institute” 2016) and became a hot-topic in 2014 after the annexation of Crimea. Using non-confrontational means can lead to internal struggles and crumbling of the target. What direct force won’t get you can be easily achieved by infiltration and multi-faceted resources. It’s neither character of war nor its outcome that defines it as a hybrid war, but the changing tactics (“State and Non-State Hybrid Warfare” 2018). In a world where everyone, from wealthy states to those caught in throes of hunger, is armed to the teeth, there are ways to achieve socio-political objectives through the use of violent and non-violent non-state actors.
Pakistan – A Target
Pakistan has risen to incredible heights despite it being a relatively young nation and this is only proved further by the interest international players have in its internal workings. Several factors contribute to the important stature Pakistan holds in the international community such as the Pak-China alliance, its geostrategic location, military aptitude, Russian interests in the Indian Ocean, Deep Sea Gwadar Port (One Belt One Road Project), neighbor to Afghanistan (a country existing as a battleground for proxies), etc. All these reasons make sure to keep Pakistan on the radar.
Though it may be secure militarily, Pakistan is still vulnerable to hybrid threats due to internal dynamics, numerous conflicting interests of nations in state-affairs, and increasing non-state actors. South Asian nuclearization has all but guaranteed that a full-fledged war between Pakistan and India is unlikely therefore the latter uses hybrid warfare to weaken Pakistan from within.
Evolutionary Nature of War
There was truth to Heraclites’s words when he claimed that change is the only constant in our world. The social theory of evolutionary change tells us that individuals, communities, societies, and states are always in a state of motion, continuously evolving according to the era. War is born from man, it is only fair that if a man changes, so shall war. It has become more complex; the stakes have raised from territorial boundaries to the maintenance of world order and preservation of state sovereignty. Wars are no longer fought on the borders, skirmishes aside, the real destruction takes place within. Due to the paradigm shift after the Cold War (Ball 2018), there rose a need for legal, economical, socio-political, and informational means of warfare. It is used as a way to undermine other nation-states in pursuit of national power; the international system is not only a race but also a way to tear others down.
Threats to Pakistani Security
To secure Pakistan from all sides, we must first analyze the threats it faces from all sides. Conventional Warfare used to be seen as one dimensional and it only perceived assault to be done through the land, air, or sea channels. However, now it is fought in various intangible zones.
India is a budding regional hegemon due to its political and economic growth including hidden agendas. Pakistan is perceived to be a direct threat to India especially after the launch of the CPEC project, perceived to be undermining its hold over the region, which is why it is employing stratagems of hybrid warfare to internally weaken Pakistan. Till now India has used State-Sponsored terrorism, funded insurgencies, operated terror cells, and even sent fighter jets into Pakistani Airspace as an attempt to ruin its reputation in the international community.
There has been growing instability in Afghanistan which has led to mass migrations across the porous border into Pakistan, with around 1.4 million registered Afghans (United Nations High Commissioner for Refugees 2018) and 1 million unregistered (“Amnesty International” 2019). India has its claws in Afghan matters as well and will use it to exploit Pakistan’s weaknesses even after US forces leave the arena. Afghan Government’s poor administrative capability especially after the return of DAESH (Tribune 2020) and Tehrik-e-Taliban Afghanistan are threats to Pakistan as well as regional peace and are a major cause of lawlessness in the country and has a spillover effect for its neighbors.
Ideologically speaking, Iran is a sectarian threat to Pakistan and its Port Chahbahar stands to lose active traffic once CPEC is fully functional which means it stands as an instigator of hybrid warfare and it would be a risk to overlook it based on past good relations.
Even after the Cold War, strategic rivalry and animosity between the powers including Russia, America, and China still exist. The emergence of China as an economic superpower is perceived as a threat to the US due to which there is a major shift in its defensive posture towards the region.
The US has shown significant interest in Pakistan due to its geo-strategic location but not all interest has yielded positive results. They carried out a surgical strike for the capture and assassination of Osama-Bin-Laden. Such a breach of sovereignty and security is a hybrid threat.
There are several lobbies in Pakistan all vying for their own cause. The Iranian lobby has sectarian undercurrents. Sectarianism has always been one of the leading factors of the divide in the Muslim civilization and is the rising trend of terrorism.Such conflict itself is volatile and is deepening the rift between different sects(Shia-Sunni) of Pakistan, causing unrest.
Rising prices of commodities such as flour and sugar can lead to social unrest and discord. Such industries and their stocks are under the thumb of a select few, the elites. With the right bribes and conditions, even they would agree to sell out society.
Non-state actors are groups or organizations that have influence in the state but work independently and have their socio-political agendas (“Towards a Typology of Non-State Actors in ‘Hybrid Warfare’: Proxy, Auxiliary, Surrogate and Affiliated Forces” 2019). They work on political opportunities and mobilized grievances. Groups like BLA (Balochistan Liberation Army), TTP (Tehrik-e-Taliban Pakistan), and Lashkar-e-Taiba (LeT) are some of the major actors. Pakistan needs to focus on curbing Jihadist Terrorism as it is keeping it from leaving the grey list of FATF.
It refers to the spread of miscommunication. Propaganda and circulation of false news through social media are a relatively common way to cause turmoil in a community. Once a rumor is circling, there is no way to erase it. India claims that Pakistan is spreading the false narrative of ‘Islam being in danger’ to justify its actions, although untrue, is something that the Indians fully believe now. That Pakistani Intelligentsia is made solely to create narratives under which to attack India. Such beliefs further antagonize the states against each other.
Indian Chronicles are a prime example of information warfare being waged against Pakistan.
Channels such as Cyber-Jihad and Dark Web come under the purview of cyber warfare and are a threat to the fabric of society and its security in Pakistan.
Given the above discussed bleak prevailing internal security situation, Pakistan needs to formulate a short to mid and long-term response that curbs all external and internal parties alongside proxies from infiltrating and influencing the working of the state and affecting the masses.
For a full-spectrum approach, all domains should be covered such as diplomacy, defense, internal and external security, economic, informational, cyber, and media security.
There are steps to be followed through for active and effective quelling of hybrid threats. First, a strategy must be put for, then tactical action should be taken and lastly, the implementation process should be supervised and fully followed through.
The main focus of the state should be on deterrence towards, protection from, and prevention of hybrid threats to the state.
One must not forget that Hybrid war is a mix of both unconventional and conventional warfare, therefore a nation-wide response should include the intertwined operational capabilities of armed forces alongside political actors. Pakistan sees its security being threatened both by internal factors and external hostile/proxy elements. This is hampering state development. State-building and nation-building must go hand in hand if counter and deter such threats effectively.
COVID’s led to ‘massive’ income and productivity losses
Job losses or reduced working hours due to the impact of the COVID-19 pandemic cost the world the equivalent of...
Russia at Crossroads with Europe
The European politics has been hazy over the course of the last decade. Whether it highlights the shocking exit of...
Syria: 18 children killed since the start of the year
The brutal fighting in Syria continues to exact a terrible toll on children, with at least 18, including a one-year-old...
The strategic thinking behind the EU-China investment deal
Washington was understandably perplexed that a China-EU investment agreement was concluded a few weeks before the Biden administration, especially a ...
Deloitte Bolsters Cyber Threat Hunting Capabilities with Root9B Acquisition
Deloitte & Touche LLP announced today its acquisition of substantially all the assets of Root9B, LLC (R9B), a leading provider of...
100th Anniversary of the Turkish Constitution
Teşkilatı-Esasiye Law, the law provides for the establishment of the State of Turkey on January 20, 1921. This law also...
WEF Launches Coalition to Tackle Racism in the Workplace
The World Economic Forum has today launched the Partnering for Racial Justice in Business initiative, which will see a coalition...
Russia3 days ago
How the West failed to understand contemporary Russia
Defense3 days ago
Israel continues its air strikes against Syria after Biden’s inauguration: What’s next?
Europe2 days ago
Talking Turkey With Greece: Turkey and Israel’s Marriage of Convenience
Middle East3 days ago
When is usury usury? Turkish fatwa casts doubt on Erdogan’s religious soft power drive
Defense2 days ago
Pakistan Army’s Ranking improved
Economy2 days ago
Pandemic Recovery Creates a 50-50 Future
Energy News3 days ago
Solar power charges pandemic recovery for indigenous farmers in Viet Nam
Diplomacy2 days ago
India-made Covid vaccines open a new chapter in New Delhi’s continuing medical diplomacy