Connect with us

Intelligence

Evolutions of Strategic Intelligence

Published

on

What is strategic intelligence currently used for? First and foremost, for correctly orienting the long sequence of decision makers’ interpretations.

Secondly, for acting as automatic or non-automatic selector of relevant or non-relevant facts and news for those who have access to the intelligence system.

 Finally, for correctly connecting intelligence data with the rest of open source news and the various perceptions on a topic.

 Intelligence is never just a sequence of data collection. Certainly data is needed to qualify, think, imagine or refuse any Intelligence Service’s operation. What is really needed, however, is never mere data, but the indication of how the opponent secretly thinks and, therefore, what he/she selects as primary concept and, more generally, how the enemy hierarchizes and interprets his/her notions.

 The Strategic Intelligence System (SIS) produces the information needed by the most important decision-makers.

 Therefore, it must be simple, immediate and clear -considering that very rarely decision-makers have already experience of Intelligence Service -but also new, fresh, reasonable and, above all, capable of being even counterfactual, where needed.

 If, as often happens today, even in Italy, the Intelligence Service produces models that confirm the ideas of the most superficial politicians, it is not good.

 Not even for the insubstantial careers of the fools who always say yes.

 In other words, an analysis that is not obvious, not always inferable from the most well-known facts, not childish and in any case not taken for granted.

Vaste programme, as De Gaulle said when he was proposed the abolition of idiots.

 There is, on the one hand, the childish and very “American” fascination for new technologies, which are undoubtedly extraordinary.

 Technologies which, like Artificial Intelligence, can expand, automate and make the collection and processing of intelligence data even more refined. But technologies which, each time, must be adapted to a context in which also the enemy uses AI.

 Sure, but it is anyway necessary to deal with staff suitable for analysing the data sequence of an AI system and understanding how it relates to the opponent’s decision-making, whether it has to do with AI networks or not.

 Either there are technology experts who understand nothing about intelligence, or there are intelligence experts who know nothing about AI technology.

 What if the enemy produced – as has already happened – fragments of voluntarily manipulated information so as to later put out of phase the AI machines that interpret government’s choices from outside?

 What if decision-making totally hid its operating mechanisms, thus artfully eliminating any signal capable of bringing the analytical system into its decision-making mechanism? It takes so little, indeed.

Hence we need to see how and to what extent the Artificial Intelligence subsets, cloud computing, machine learning, problem solving and robotics are really useful for intelligence operations.

 In the U.S. tradition – very much linked to the “machine” myth – AI allows to automate and simplify (and here there is already a danger) data collection and, in particular, the synthesis between geospatial, Signal, HUMINT and even open source data collection.

That is all well and good, but how can we avoid the opponent knowingly “dirtying” the data sequence or developing and processing models in which the various sources contrast dangerously with each other?

 Either you give contradictory news, or you put a useful source in a bad light, or you create a “narrative” that you are working for Good and Democracy, and here the Western idiots will not be able to say anything.

 Probably, you shall also go back to the old traditional methods: someone who infiltrates into the enemy’s ruling classes, becomes credible and then changes the enemy’s decision-making process in our favour. Or informs us of how it really goes.

 In the case of Geointelligence, AI can collect sensor data very well, often very quickly. So far, all is well, but the truth lies in the brain that evaluates, just as beauty is in the eye of the beholder.

 AI is also useful in computer vision and sometimes very useful also for electronic intelligence (ELINT), especially for translation between different languages. But, certainly, this is not the whole intelligence process. We are always talking about hardware, not about conceptual software.

 This is what I could call “Descartes’ complex”, i.e. the typical idea of the old Western scientific mentality that we always need to see facts and then find the automatic mechanism of a phenomenon.

 This is a completely wrong criterion.

In Intelligence Services’ operations the “facts” are usually not seen, if all goes well, and never have a univocal and certain “mechanism”.

Otherwise it would not be an Intelligence Service’s operation, but a simple police action or a completely public and official operation.

 The mythical rationalism of the United States and of other similar countries always tends to “automate” intelligence. Hence the more the data collection of an Intelligence Service is automated, the more predictable and useless it is. Predictable especially by the Enemy.

We always need to use “lateral thinking” and serendipity. “Lateral thinking”, based on the observations made by Maltese psychologist De Bono, uses lateral observation points to solve a problem, without using the most obvious and visible “sequential” logic accepted by everybody.

 You do not dig a mine in the wrong place, but in the right one.

Nevertheless, the thinking that De Bono calls “vertical” always digs in the same place, and the human mind which, like all the other organs, does not want to work too much, is attracted by the most probable, obvious and “visible” solution, i.e. what it defines as “natural”.

 Serendipity is the possibility of making accidental discoveries. Indeed, it is never by chance, but it shows the imaginative and necessary potential of those who discover a phenomenon, but who know above all how to use accidental or apparently trivial information.

It is another essential characteristic in intelligence analysis.

Furthermore, some countries think that HUMINT, i.e. intelligence from human sources, can be strengthened by AI systems that collect and select the “sources” always according to predefined patterns.

 Whatever is predefined must never be used in an intelligence Service, unless there are temporary guarantees. This is the Number 1 Rule. Instead of the standardization of analysis techniques, the opposite must be done in a world where “third” countries acquire powers that were unimaginable until a few years ago.

Therefore, the predefined mechanism is a severe mistake: the “sources” are trained to avoid precisely these systems.

 As was also the case at the time of the Cold War, when many Soviet undercover agents infiltrated in the Western Intelligence Services were even trained to succeed without problems in the analysis with the polygraph, the so-called “lie detector”, and also created a credible, but completely imaginary and in any case unverifiable, personal story.

They indeed used serendipity and lateral thinking. The others, with their naive positivism, let themselves be fooled.

 The real problem is therefore the analysis of strategic surprise: September 11 is a case in point, but surprises can be either “widespread” or “specific”.

 If you donot know how to analyse surprise, it is difficult that you can really do intelligence.

From what does strategic surprise stem anyway? From the fact that you, the victim, do not know how the strategic formula of the opponent (or friend, which is the same) is composed.

 If the United States had not well understood the role played in Saudi Arabia by Prince Turki, Director General of the Saudi intelligence agency from 1973 to 2001, resigning the position only 10 days before the “9/11 attacks”, probably it would have understood that a change was taking place in relations between the Arab-Islamic world and the West.

Moreover, on a private level –  which in the U.S. world is always equated to the public one – there was IBM’s near bankruptcy. It was bailed out – with difficulty – with very quick operations connected to confidential information.

 Well, but this is not always the case.

Indeed, the intelligence system is not a “support” to managers’ decisions, but it is its essence, regardless of what the aforementioned managers may think.

 There are new tasks and functions to be evaluated such as the greater perception State managers (except the Italian ones) have of the strategic importance of their choices.

 There is also the study of global trends, a naive construction which, however, serves to outline the potential of a country’s development lines.

 Moreover, in the U.S. tradition, adverse transactions have only recently been correctly reported: in the past, financial transactions, the unforeseen and clearly hostile industrial acquisitions – in short, everything in business – used to take place in the global market and therefore were fine and went very well.

There is also the adverse “line” of U.S. intelligence against the policies of central banks and large E.U. and Asian financial companies to leave the dollar area, often as quickly as possible.

This is currently a central theme of the U.S. and neighbouring countries’ counter-espionage.

 Therefore, two new classes of intelligence are being developed, namely financial intelligence (FININT) and market intelligence (MARKINT).

 FININT resulted from the experience gained by governments in studying some agencies in the evaluation and continuation of money laundering, tax evasion and terror financing.

 But there is the danger that often completely incompetent leaders base their choices not only on classified information, but also on what they themselves believe to be the direct perception of facts.

 Bravo! Let us recall the analysis made by the U.S. Intelligence Services in January 2019, when they reported to President Trump that Iran was not developing a military nuclear project, and the President told them to “go back to school” and that they were “passive and naive”.

 We are coming to the “decline of truth” and the rise of what is currently called “narrative” or storytelling.

 Intelligence has always defined itself as “truth to power”.

Certainly there was the neopositivist, naive and often completely silly myth of creating stable and unquestionable truths, as if the Other did not know them, thus forging stable and effective mechanisms for analysing the “enemy”, as if the enemy did not know it.

 Probably something changes with non-State actors, but Western intelligence interprets these structures as if they were quasi-States. This is not the case, of course.

 Rather, they are ideologically cohesive groups that present themselves as States because they represent territories, albeit only with violence.

 Hence, at least for the time being, strategic intelligence will be put aside by technological development, which will largely occupy only tactical intelligence. In the very short term, there will also be the necessary training – in one way or another – of the elected politicians, which shall learn – for better or for worse – how to do it.

 Then there will be the ability of the automated structures to select the malware, the distorted information, the news capable of putting its own algorithm out of phase.

Advisory Board Co-chair Honoris Causa Professor Giancarlo Elia Valori is an eminent Italian economist and businessman. He holds prestigious academic distinctions and national orders. Mr. Valori has lectured on international affairs and economics at the world’s leading universities such as Peking University, the Hebrew University of Jerusalem and the Yeshiva University in New York. He currently chairs “International World Group”, he is also the honorary president of Huawei Italy, economic adviser to the Chinese giant HNA Group. In 1992 he was appointed Officier de la Légion d’Honneur de la République Francaise, with this motivation: “A man who can see across borders to understand the world” and in 2002 he received the title “Honorable” of the Académie des Sciences de l’Institut de France. “

Continue Reading
Comments

Intelligence

A More Diverse Force: The Need for Diversity in the U.S. Intelligence Community

Published

on

As part of a hiring initiative meant to attract new and diverse hires, the Central Intelligence Agency (CIA) released a new recruitment video in March of 2021. The video featured a Hispanic female discussing her background and time in the CIA, as well as why she chose to serve her country. She says at one point, “I’m a woman of color. I am a mom. I am a cis-gender millennial who’s been diagnosed with generalized anxiety disorder…I did not sneak into CIA. My employment was not and is not the result of a fluke or a slip through the cracks. I earned my way in, and I earned my way up the ranks of this organization”.

The video showed a woman who cares for her family, cares for her country, and desires to see a difference be made in the world. However, some took issue with the advert though, though these criticisms came over a month after the video first was published and made available to the public.

In a tweet, the Republican Senator from Texas, Ted Cruz, said, “If you’re a Chinese communist, or an Iranian Mullah, or Kim Jong Un…would this scare you? We’ve come a long way from Jason Bourne”. Many criticized Cruz for his usage of Jason Bourne, a fictional CIA Paramilitary Operations Officer, yet he took to Twitter once again to clarify, saying, “My point is that CIA agents should be bad-asses—not woke, fragile flowers needing safe spaces”.

Donald Trump, Jr. tweeted “China & Russia are laughing their asses off watching CIA go full woke…If you think about it, wokeness is the kind of twisted PSYOP a spy agency would invent to destroy a country from the inside out”. Others, including popular conservative commentators like Dinesh D’Souza and Meghan McCain, also criticized the ad calling a “joke” or “insane” while others went as far to say that the CIA was “actively looking to recruit the most immodest, narcissistic, grotesquely self-serving people in the world”.

Criticism towards the ad did not purely come from the Conservative, rightist personalities either, but also members of the left. Left-leaning publications such as The Intercept and Jezebel both critiqued the ad. It seems that, from all sectors of American public and political life, this advert and total tactic was heavily derided; from members of the left, it was cringey and irrespective of the agency’s long and controversial history while, from members of the right, it was ineffective national security and intelligence policy.

However, what many seem to be forgetting is that diversity within the intelligence world is an extremely important factor in creating effective and accurate foreign policy and in gaining the most up to date and accurate intelligence.

Intelligence analysis is probably the most important part of the Intelligence Cycle and holds just as much, if not more, importance as the end result, the intelligence estimate or packet. To put it simply, if the analysis is corrupted in some way, shape, or form by either the analyst’s personal views or tainted by poorly verified intelligence, then the action taken based upon this intelligence could result in missteps or negative affects to U.S. policymakers, military units, or regions in which the intelligence affects. Throughout history, there are an abundance of examples in which intelligence analysts have misinterpreted situations due to their own biases about a nation, political ideology, or have been selected specifically to sort through intelligence in order to back up a preconceived opinion.

One of the best examples in showing how analysts’ personal views, both conscious and subconscious, can affect their overall analysis is the 1954 coup d’état of Guatemalan President Jacobo Árbenz.

The coup, which was given the CIA codename Operation PBSUCCESS, was a mission in which the U.S. government, via the CIA and U.S. State Department, engaged in fomenting a coup to remove Árbenz, the leftist president who had approved of agrarian reforms within Guatemala. To justify an invasion, members of the State Department and CIA tried to link Árbenz to Guatemalan communists, yet this proved very difficult as there was “no evidence that Arbenz himself was anything more than a European-style democratic socialist”. A CIA paper, published two months before the coup, also, “did not cite any direct contact between Guatemalan Communists and Moscow. The paper offered ideology, not facts…”. 

A master’s thesis written by a student at West Virginia University extensively and exclusively covers the CIA’s decision making process, detailing how, “CIA reports from the early 1950s also demonstrated this fear [of Communism]… The “red scare,” in essence, affected nearly all Americans. Many in the Eisenhower government also felt that Moscow had a nefarious hidden hand and controlled communist sympathizers around the globe,” while also noting that the, “ONI [Office of Naval Intelligence] did not feel that CIA had valid reasons or enough sources to reach the conclusion it did regarding Soviet intentions in Latin America”. The heightened fears of Communism and the Soviet Union that permeated the minds of analysts within the State Department and CIA (as well as the desires by some to ensure the survival of the United Fruit Company in the country) resulted in intelligence that was skewed to believing that the Guatemalan government was embracing Communism, when, even according to the CIA’s own histories, was baseless.

Based upon this example, as one can see, the intelligence provided to the U.S. government was based upon analyst biases and did not accurately reflect how the Guatemalan government under Árbenz operated nor how entrenched the Communists were in political life. The fear of Communism overwhelmed the amount of solid and fact-based analysis, resulting in an invasion that removed a democratically elected president.

This coup eventually resulted in the emplacement of a right-wing, military government, which would rule until 1996, overseeing a brutal civil war complete with death squads, acts of genocide committed by presidential administrations, political assassinations, and a drastic increase in governmental corruption. Members of the CIA who were involved in the operation too regretted their actions and acknowledged that the outcome did not benefit Guatemala, the U.S., or Latin America. Operation PBSUCCESS did not bring about a U.S.-friendly democracy, but a U.S.-friendly military dictatorship that engaged in war crimes and severely destabilized the entire country. The failure of this operation to bring about a democracy and U.S. intervention in the country in the first place was, in my own view and examination, based upon biased analyses by the CIA which promoted the view that Guatemala was becoming sympathetic to Communists and the operation itself shows just how important intelligence analysis is.

Not only is analysis an incredibly important tool within the intelligence cycle as a whole, but the analyst themselves are highly important. The analysis is only as good as the analyst and if the analyst is biased, limited in their outlook or worldview, or come from a sole section of society, then the analysis will reflect those beliefs. Most of the analysts involved in the Guatemalan operation were white and male, most likely coming from middle-class backgrounds and either having military service or Ivy League education or both. These beliefs and hiring processes which exclude persons beyond the majority of America’s populace can significantly hinder an agency and promote a poor world outlook. The majority of persons in countries in which the U.S. is involved, thinking of becoming involved, or are creating analyses in anticipation of potential foreign policies are not white or male nor from wealthy societies; they are, most often than not, of an extremely different mindset than many Americans, live in poverty or close to poverty, and have an immensely different culture. While the CIA has made some headway in this area, retired CIA case officers and analysts have made claims that the CIA (and the Intelligence Community as a whole) are severely underperforming and not effectively recruiting towards people from outside of that select pool.

Ted Cruz and Donald Trump, Jr.’s comments about the CIA lowering their standards and fostering an environment in which the CIA now is ineffective at creating intelligence or defending the United States from foreign threats (not being “badass” enough) is nonsensical. If anything, the inclusion of persons who are not white or male, who have experience outside of the military, who are knowledgeable on issues beyond military, intelligence, and national defense/security makes for a more well-rounded force and an agency more effective at analyzing collected intelligence, crafting accurate and informed recommendations, and allowing past mistakes, the misreading of important political events, to take hold. Including strong, analytical persons from more minority backgrounds into the national security framework will perform wonders for American intelligence analysis and in making influential policy decisions.

To quote Marc Polymeropoulos, a retired CIA officer, “Diversity is an operational advantage. Simple as that. I want case officers who look like the UN”.

Continue Reading

Intelligence

Women Maoists (Naxalbari)

Published

on

Every now and then, Indian newspapers flash news about Maoist insurgents, including women being killed. They usually avoid mentioning how many soldiers were killed in encounters, whether fake or genuine.  Here is a glimpse of such news: A woman fighter, along with a male c-fighter, was killed in a clash with government forces in Odisha’s Malkagiri district (Press Trust of India, December 14, 2020).

In another incident, a woman Maoist was killed in an encounter with India’s security forces in Sukma district of Chhatisgarh  (PTI, October 13, 2010). A woman Maoist was killed near Anrapali forest (Visakhapatnam, Andhrapradesh). And, another woman Maoist, carrying Rs. 16 lac reward on her head was killed in Gadchiroli district of Maharashtra.

Sometimes there are pitched battles between the Indian forces and the Maoists, including women. For instance, there was a head-on confrontation between a Maoist group and government forces of over 1500 “jawan”, equipped with state-of-the-art weapons and helicopters at the Bijapur-Sukma border. Sans air power, the Maoists, armed only with machine guns, gunned down 22 soldiers belonging to Central Reserve Police Force, Commando Battalions for Resolute Action (Cobra), and Bastariya Battalion of the Central Reserve Police.

Why do women join the Maoist Movement?

They find the Maoist narrative of emancipation attractive. . Not only the low-caste women but also the high-caste ones joined the Maoist ranks in droves. About 30 to 40 per cent of combatants are Maoists. The status of women in the Indian society is no better than that of slaves. They are not supposed to form an opinion or dare express it. Even the high-caste women are supposed to be reticent and coy. They are tutored to be housewives confined to quadrilateral of their homes, rear children, and do household chores. The Maoist ideology ingrained the sense of empowerment in them. The Maoist manifesto teems with such words as “mahila sasahktikaran” (women’s empowerment), “raise their voices” (awash uthaunne), “get their voices represented” (mahilako awaj ko pratinidithyo) and “understand women’s grief” (mahila ko dukka bhujnne).

The Maoist struggle is commonly known as “the people’s war”. The “war” aims at abolishing the feudal system, and creating a democratic egalitarian society. The bulwark of the Maoists is rural population, lower castes and women. Women and men of all castes, classes, ethnic backgrounds and education levels joined the movement.

Pro-women manifesto

The Maoist has incorporated women’s emancipation in their ideological manifesto, actually a “40-point demand-document”. The gender equality is enshrined in points 19, 20 and 21, mentioned heretofore:

“19. Patriarchal exploitation and discrimination against women should be stopped, girls should be allowed to access paternal property as their brothers.

20. All racial exploitation and suppression should be stopped. Where ethnic communities are in the majority, they should be allowed to form their own autonomous governments.”

People’s courts

The Maoist proved their heart-felt commitment to the manifesto by punishing rapists, wresting back the usurped land of single women, penalising men for polygamy, and prohibiting the sale of liquor as drunken men more often beat the women.  Jan adalats (“people’s courts”) ferociously uphold women’s rights on issues of social and domestic violence.

Equal authority

Women were given political or combat position on the basis of merit. Untouchability and gender discrimination has been abolished. The points 19, 20 and 21 of the Maoist manifesto relating to women stress the need to transform state and customary laws to redress gender inequality at all levels.

In 2002, in recognition of their female constituency, the Maoists introduced the so-called “prachanda path,” creating a women’s department in the Central Committee. In several cases, it is the women who slay the incorrigible feudal tyrants. The women realise that they are “agents of change” who have to fight out repression in all its manifestations.  The women have become politically aware that they have the right make decisions about their marriages, children’s education, and other everyday gender needs.

Indian police admit it was the women fighters who were in the vanguard of a deadly attack in Chhattisgarh, where 24 people, including some top politicians, were killed.

 Because of its liberal manifesto, the insurgency has spread to 11 states, with Chhattisgarh, Jharkhand, and Odisha as epicenters. It has become entrenched in all central and eastern Indian states, often referred to as the “Red Corridor.

Fake news

Having failed to subdue the Maoists, the government occasionally resorts to spreading false news about deaths of Maoist leaders. For instance, Hindustan Times dated June 24, 2021 reported that Maoist leader Haribushan, carrying a reward of Rs. 40 lac on his head, had died from COVID19. Her wife rebutted the news (Parveen Kumar Bandari Hans News Service October 5, 2021). “More than 16 senior and middle level level communist leaders have died in the last couple of months due to COVID19…Two senior most leaders of Bastar Ganga, including Dandakaryana Special Zone Committee members Ganga and Sobhroi have died due to infection in the last couple of months”.

Sympathy with Naxals is an offence

In the Bhim Koregaon planted-letters case, several intellectuals and rights activists including Navalakha were declared “traitors” by the Indian government. They were even accused of having links with Kashmiri militants. Fake letters were inputted into their computers. They were even accused of being Pakistan’s intelligence agencies agents through Ghulam Nabi Fai, a US-based Kashmiri leader. Fei has served two-year imprisonment in the USA for having illegally received funds from the inter-services intelligence of Pakistan.

Urban militia

The Maoist are trying to disseminate their message to urban areas also. They understand that the minorities are fed up with the regressive caste system. The rebels want to radicalise youngsters and already have carved out a strong network in premier universities of Delhi and Kolkata. The Maoist want to  create an urban militia to fight the oppressive enforcement machinery of the states and Indian Union.  They are believed to have infiltrated the government intelligence machinery to stay abreact of government’s tactics.

Coordination strategy

The Maoists make no bones about their plan to set up a “coordination network among like-minded outfits in India, Bangladesh and Nepal. They want unhindered movement of left-wing extremists in these territories to exchange arms, ammunition and information”. To counter the Maoist strategy, India rushed its diplomats to capitals of neighbouring countries to plug up the porous border and obstruct the insurgents’ free movement.

Gurkha trainers

In addition, India launched Special teams for simultaneous searches in Tamil Nadu, Kerala and Karnataka at suspected Maoist training centres and hideouts. The effort was counter-productive because India’s national Investigation Agency framed charges against the innocent people.

During searches, the Indian forces were surprised to know that the retired Gorkha soldiers of both British and the Indian Army harbour sympathy for the Maoists.

They trained the Maoists to use fire arms efficiently. Some Maoists demonstrated their alacrity and military sills in planning bank robberies, and extorting ransom from rich businessmen. Besides arms and ammunition snatched from police stations, the Maoists are believed to have amassed over Rs. 5 billion from bank heists. The general impression in people’s minds is that the Indian forces dare not pursue the Maoists in forests. The insurgents pick up places where to ambush the security forces, and make off with booty with impunity.

Salwa Judum (purification hut)

Having failed to arrest momentum of the movement, India organised a private army ofSalwa Judum ledbyMahendra Karma From among the villagers.  To boost their morale, they were given honorary rank of “special police officer. “As a workaround, the government sponsored counter-militias and split tribes into those “for” and “against” Maoists. Those willing to fight the Maoists were offered guns, money and honorary police ranks.

The Maoists shot dead Mahendra Karma and several members of the ruling Indian National Congress whose brainchild the Salwa Judum was.  It later transpired that the salwa judum had been cobbled up with help of child soldiers recruited under duress or financial allurement. It was involved in gross human rights violations. When People’s Union of Civil Liberties in India brought its atrocities to the Supreme Court’s notice, it declared it illegal in 2011.

Concluding remarks

Charu Mazumdar started the movement as a “revolutionary opposition” in 1965.  The world came to know of it in 1967 when the Beijing Radio reported “peasants’ armed struggle” at Naxalbari (Siliguri division of West Bengal). In July 1972, the police arrested Charu Mazumdar and tortured him to death on the night of July 27-28. The Naxalite ideology has great appeal for marginalized strata (particularly dalit and adivasis) of India’s caste-ridden society. The Naxalites Central Committee’s resolution (1980) visualises creating a base for spreading people’s democratic revolution. It would include : ‘Homogenous contiguous forested area around Bastar Division (since divided into Bastar, Dantewada and Kanker Districts of Chhatisgarh) and adjoining areas of Adilabad, Karimnagar, Khammam, East Godavari Districts of Andhra Pradesh, Chandrapur and Garchehiroli district of Maharastra, Balaghat districts of Madhya Pradesh, Malkagiri and Koraput districts of Orissa. The Naxalites want to carve out an independent zone extending from Nepal through Bihar and then to the Dandakarnaya region extending up to Tamil Nadu to give them access to the Bay of Bengal as well as the Indian Ocean. 

Continue Reading

Intelligence

China disrupted Facebook around the world for political and intelligence reasons?

Published

on

First: The fact that the Chinese child “Wang Zhengyang”, whose picture is circulated globally, and who now lives in the United States of America and not in China

Second: The accusations of Facebook founder “Mark Zuckerberg” against China, and the Chinese defense of deliberately waging a technological war and cyber hacking against the work of American technology companies

Third: Reasonable Chinese and international accusations that Facebook deliberately disrupted its network, coupled with evidence and proof

Fourth: Analyzing the aspects of Chinese benefits and the Chinese political and ethical employment for the disruption of the American “Facebook” network around the world, internally, externally and ideologically

Fifth: The attitude of the Chinese themselves towards the ban by the Chinese authorities and the leaders of the Communist Party of China of the “Facebook” website in their country, according to the Chinese Constitution

Sixth: The relationship between (the crisis of disrupting Facebook and restoring China’s technological prestige and position) between its citizens and the world, and promoting the theory of “the superiority of Chinese technological applications over their American counterparts”

Facebook and its CEO well-known “Mark Zuckerberg” have faced many crises in recent years, which led to his summoning to appear before a “hearing committee in the US Congress”, especially with the rumors of hacking and selling the privacy and data of tens of millions of users of the “Facebook” network and its other applications around the world.  Some leaks indicated that “Cambridge Analytica Company” has obtained (the data of more than 50 million users’ accounts on the Facebook social networking site without their knowledge, after concluding a secret deal with the same company for commercial and advertising reasons), which violates the privacy of users.  It leads to a violation of their human rights if their data is used inappropriately.

We find that the crisis of disrupting the “Facebook” network and its American applications for several hours, has coincided with many “accusations and conspiracy theories associated with it”, such as:

that the disruption was deliberate, as the global giant “Facebook” tried to erase some evidence, proofs and evidence that condemns the company in one way or another, especially with the (summoning of the US Senate to Mrs.Francis Haugen”, who previously worked in the products department in  the location headquarter company of the “Facebook” in 2019, but it submitted its resignation after noticing illegal actions and activities carried out by Facebook and its officials, in order to hear its testimony regarding the “unlawful actions of Facebook”, endangering the interests of the United States of America itself, and condoning the  Dangerous toys for children may prompt suicide in order to achieve “material gains” for the company, regardless of any other considerations.

On the other hand, analyzes have begun regarding the Chinese conspiracy theory against “Facebook” and its CEO “Mark Zuckerberg”, in a Chinese attempt to embarrass the United States of America internationally due to the failure of its democratic digital technology system that it is trying to promote around the world, and to confirm the success of “Chinese alternative networking services and applications to its American counterpart” in avoiding these American technological errors, especially after “Downdetector” spotted it.

Notifying that “Down Detector”,  its main task is to track (website crashes), and it has received tens of thousands of reports of crashes on (Facebook, Instagram, WhatsApp, Messenger) platforms.  It was not immediately clear what caused the malfunction that affected the three platforms.                

  Despite the growing number of theories and comments about China’s involvement in “Facebook hacking and penetrating”, Facebook itself has denied any allegations of being hacked or any evidence that users’ data has been hacked, explaining the reason for the malfunction.  All of its services and applications, including: (Instagram and WhatsApp), amid the growth of many (conspiracy theories) that have spread around the world, and the growing intensity of rumors circulating, including a Chinese child “hacker” penetrating the (Facebook) network alone and disabling users’ data.

  Because of this, Facebook’s Vice President of Infrastructure “Santosh Janardan” issued a company statement, saying:

 “Our engineering teams learned that changes to the settings on the main routers that coordinate traffic between data centers caused problems that disrupted this communication”

    Santosh Janardan, as the (Vice President of Facebook Infrastructure Company), denied the responsibility of China or any other parties or even hacking operations behind this malfunction, explaining in a public statement, in which he assured the world and users, that:

 “We want to make it clear that there was no malicious activity behind this malfunction, and its main cause was a wrong change of settings on our part, and we also have no evidence that user data was compromised as a result of this malfunction”

Hence, we note the “increasing international criticism of Facebook”, and its ability to avoid and solve those problems that caused (imbalance in the financial markets, stock exchanges and global markets). Accordingly, and to try to understand the whole picture, the Egyptian researcher will try to raise all the problems related to the company “Facebook”, and to respond in practice to the reasons for accusing China in the first place of hacking the network, as follows:

First: The fact that the Chinese child, “Wang Zhengyang”, whose picture is circulated globally, and who now lives in the United States of America and not in China

The Egyptian researcher followed up on the global uproar that aroused when a Chinese child “hacker” penetrated the Facebook site, and caused this global malfunction of Facebook’s search engines and disrupted the activities of the world, but when the Egyptian researcher was searching on the famous Chinese search engine “Baidu” as “Chinese alternative to the global site of Google”, they are constantly considering that “Baidu is a Google site alternative in China”.

   We will find a definition of the true identity and personality of the child, completely different from what was circulated globally, according to the following reasons:

Where the “Chinese Baidu website” indicated the identity of the child appearing in the globally circulated image, as a picture of the globally known Chinese hacke “Wang Zhengyang”, who now actually lives in the United States of America to complete his studies and is not in China at all.

The interesting thing for analysis is what the famous Chinese website “Baidu” mentioned that the Chinese child whose image is being circulated globally is called (Wang Zhengyang), and he is (born in 2001), meaning that he is a young man and not a child as various sites around the world claimed, and “his age is now aout 20 years old”, and the most amazing thing for me personally, is that “he is recentely resides in the United States of America and not in China”, whereas (Wang Zhengyang) traveled to study in the United States of America to continue studying his specialization in (computer, programming and information systems).

He also noted the “Chinese Baidu website”, praising the genius of “Wang Zhengyang”, and that he was one of the students in a school in the Beijing Municipal Public Security Bureau and the Education Committee for the implementation of (Enlightenment Project for Network Security).

 We can as well find that the actual appearance of the Chinese child (Wang Zhengyang) for the first time globally at the (Chinese Internet Security Conference), in 2014, and that was the first appearance of the Chinese genius child (Wang Zhengyang), who was only 13 years old,  as the youngest hacker across mainland China.

When the Chinese child (Wang Zhengyang) was accused at the time of hacking his school’s website and endangering the privacy of its files and students’ data, the child (Wang Zhengyang) defended those allegations against him himself, accusing him of hacking his school’s website, according to his claim or defense at the time, that:

   “He was only meant to help fix his school’s data website to help her and not intentionally harm her”

As the Chinese child (Wang Zhengyang) explained at the time, that:

 “The school website he hacked was not for middle school students, but for high school students in the same educational institution”

Perhaps what stopped me analytically is what the child (Wang Zhengyang) confirmed at the time and his emphasis, on:

   “He would rather be seen as an ethical computer hacker, and would not use technology to do illegal things”

    Hence, the whole matter was orchestrated as previously referred to as a global rumor, it was not determined who (the first cause of its release, regarding the personality and identity of the Chinese child “Wang Zhengyang”), and even more dangerous to me (the reasons and deliberately ignoring his life now in the United States of America itself and not in the China’s capital of Beijing), in which he studied throughout his primary studies.

   I think that they are all legitimate questions and inquiries on my part, and the entire world public opinion has the right to understand, and this is the most dangerous point for me, and it should be asked and explained, as follows:

Why have we all been deceived about the true identity of the Chinese child by deliberately concealing his true age and deliberately concealing as well his whereabouts?”

Second: The accusations of Facebook founder “Mark Zuckerberg” against China, and the Chinese defense of deliberately waging a technological war and cyber hacking against the work of American technology companies

   We find that in the context of an attempt by “Facebook Company and its owner and CEO, Mark Zuckerberg” to circumvent the size of the losses that the company suffers periodically, as well as accusing it of many accusations in exchange for achieving financial gains and profits, Mark Zuckerberg’s accusations have been multiplied to China and its alternative technological applications, on the pretext (China’s attempt to impose its laws, systems, values, and communist ideology on the world), and despite the inability of “Facebook Company nor its founder Mark Zuckerberg” to prove the validity of their allegations against China, the Chinese side has begun to respond to “the violations of Facebook and its CEO Mark Zuckerberg”.  The agreed upon ethical standards, and the most important mutual accusations between the (two sides), which are as follows:

 1) It cannot be asserted that China deliberately launched a technological war and cyber hacking against the work of American technology companies, which did not explicitly accuse China in this regard.  We find that the most important statement issued by “Mark Zuckerberg”, the founder of Facebook against China, is his explicit accusation of it, saying:

“Beijing wants to impose its values ​​on us, and we will not allow another country to impose special laws on us on the Internet”

 2) The second reference against China also comes, regarding what Mark Zuckerberg referred to, as the CEO of “Facebook”, and his other frank accusation directed at China, saying:

 “Six out of 10 social media sites that exist today are mainly Chinese, and Beijing is trying to impose its values ​​on us, and we cannot allow another country to impose laws on the Internet”

 3) The first real confrontation between “Mark Zuckerberg” against China, is his decision to establish (a committee to monitor and control the movements of Chinese social networks), and this team can take the final decision without the intervention of any other official. Here, “Mark Zuckerberg” made sharp accusations against China, and indirect hints that it was “the reason behind calling him for an urgent hearing in the US Congress”, and that was several months ago, for what he rumored about him from “politicizing the content and spreading chaos and violence”.

 4) The famous American surveillance website “whois.domaintools”, as a site that specializes in monitoring domains and their owners, especially on Facebook, has published a promotional announcement, saying that:

The domain of facebook.com is for sale, due to its exposure to several previous cyber attacks”

 5) We find that China has repeatedly been subjected to fierce attacks by American officials and politicians via Facebook and China’s denunciation of this, most notably (the emergence of the Coronavirus vaccinations and the intimidation of receiving Chinese vaccines), and China accused “Mark Zuckerberg” of causing a global panic, and of aiding preventing people from getting the right vaccine.

 6) Caving in to Chinese pressure, “Mark Zuckerberg” was forced in mid-March 2021 to appear, confirming on his Facebook page his support for the global vaccination campaign and helped spread vaccine awareness ads, but the attack continued on Facebook, as a result of allowing commentators, comments and addresses to promote theories and comments that prevent people from receiving the vaccine, especially the Chinese.  Hence, we understand “the tense relationship between Facebook and its founder, Mark Zuckerberg, and China”, especially during the recent period.

   Through the previous analysis of the details of the relationship between Facebook and China, we find that the matter has gone beyond the line of technological competition to the exchange of accusations against each other, especially with what has been proven even within the American interior itself, that Facebook and its founder, “Mark Zuckerberg” is trying to play political roles and put (its gains profits and material above the public interest, as it overlooks the many damages caused by the site to its users and children), as well as proving a number of users of the “Instagram” application owned by the same company that the company deliberately sells their data and violates their privacy for purposes and interests that are purely material and not  ethical.  Hence, China is defending that:

 “Our Chinese local network of applications to preserve the values, morals, and cohesion of Chinese society itself in the face of the corruption of Facebook and its operators in the United States of America”

Third: Reasonable Chinese and international accusations that Facebook deliberately disrupted its network, coupled with evidence and proof

We find that after the failure of the Facebook network service, and the rest of the other applications associated with it, the logical question in China and the world has become:

 “Did Facebook intentionally disrupt its servers, software, and the scope of its networks around the world to hide a scandal or secrets that shook the image of the United States of America globally?”

    We note here that a number of Chinese accusations against the company “Facebook“, which adopts a number of logical reasons, deliberately in charge of the famous network – perhaps based on US government pressures, deliberately disabling the network for several hours, to hide secrets, and was based mainly on the Chinese and globally on a number of  Among the reasons behind this sudden malfunction of the “Facebook” network, including:

The Facebook company has all the adequate measures to secure its servers, software, and its giant international network from any accidental accidents, hacks, or various and innovative backups in the event of any failure or malfunction.

Facebook’s possession of the best security and technical system in the whole world, and perhaps what it has is not owned by major governments and countries, and this brings us to the same most dangerous question, related to the “conspiracy theory”, which is:

 “Did “Facebook” deliberately disrupt its servers, software and network globally for several hours?”                     

Here, logical reasons related to the international reputation of the United States of America were actually linked, which prompted Facebook and those responsible for it to disable the network, perhaps (to erase those evidence and evidence, which condemns the United States of America), and the owner of the American Facebook, “Mark Zuckerberg”, and in conjunction with events and events  Interestingly and logically linked to the sudden downfall of Facebook, such as:

(Pandora’s Leaks, the testimony of Francis Haugen)

The “Pandora Documents leak”, is one of the most important legal and political battles in the world, which Facebook is trying to contain immorally, according to the list of accusations delegated to it, which is a (leakage of a huge number of documents containing many financial secrets that may make scandals and provide financial crimes to hundreds of world leaders, politicians, billionaires and celebrities).

The accusations came to the Facebook network and its founder, “Mark Zuckerberg”, of deliberately disabling the network’s servers and data for several hours to erase and remove all documents and prices contained in documents and leaks in the name of “Pandora’s Reveal”, which is a leak of nearly 12 million documents that reveals (Fortune  secrecy, tax evasion, money laundering by some world leaders and wealthy people).

Therefore, accusations have been leveled by China and a large number of well-known journalists around the world, including more than 600 journalists in 117 countries, who began searching for a large number of sensitive files from more than 14 sources for several months to reveal (major global corruption cases affecting  the most important global leaders, which Facebook is trying to prevent in various ways in order to preserve Washington’s interests with the countries of the world) and to achieve material gains for the company at the same time.

    The data was obtained by the (International Consortium of Investigative Journalists), based in Washington DC, known as its consortium name, is: “ICIJ”

The accusations against “Facebook company deliberately disrupting its work for several hours around the world” confirm that he was working with more than (140 media organizations in the largest global investigation of its kind ever in the world, but the quality of the documents collected and found were with political and international nature, and lead to political and international crises for Washington and its allies), so it became necessary for the “Facebook” network to get rid of it completely, so it came (deliberately disrupting the network for several hours for purely political and intelligence purposes to carry out this task, and to erase those dangerous and sensitive documents, so that no access is reached  and consequently embarrassing Washington with its allies around the world), and shaking the world’s confidence in the United States of America.

On the other hand, “Facebook’s fear of publishing data, extracts or clips from the testimony of the former employee of the company, Ms. Francis Haugen against the company and its officials, is supported by documents and documents about the nature of the violations and penetrations of the Facebook network globally”. And here we mean the testimony of “Mrs. Francis Haugen”, an employee who worked as a former manager in the products department in the “Facebook” company since 2019, to help address the problem of election interference through social media, especially after (several accusations of the Russian side of interfering in the final results of the US Presidential elections), in favor of former US President “Donald Trump”.

Perhaps the most dangerous thing that “Mrs. Frances Haugen” said and tried to silence her and stop her and get rid of her by threatening her, is that American policy makers and legislators are encouraging the “Facebook and its owner Mark Zuckerberg” network to disrespect its users and violate, exploit, hack and sell their privacy for purely material purposes, as well as  On the adoption by those in charge of “Facebook” of a polluted agenda, as it incites inhuman standards for the following taboo:

 (Spreading hatred, racial discrimination between whites and blacks and all other minorities, fueling political and religious disputes and conflicts to achieve material gains, not caring about the health and security of users, especially children, by publishing games that encourage suicide in exchange for huge financial gains)

Based on the testimony of “Mrs. Francis Haugin”, the position of the Chinese President, Comrade “Xi Jinping”, came to issue of “laws that obligate young people to abide by the male dress and not to mix identities, and to prevent the broadcast of any content in the Chinese media in which men imitate women”, with the publicly affirmation of the Chinese authorities and leaders the Communist Party of China “CPC” stated the need to work on:

  “Limiting the scope of work and spread of technology companies producing children’s electronic games and applications to reduce them and curb their growth and increasing influence”

 Hence, since November 2020, the Chinese authorities have started to adopt a strict campaign throughout the country, based and aimed primarily at “protecting children, youth and school students from falling into the trap of addiction to games and applications at the expense of their health and their relationships with the entire community”.

 And based on the evidence, evidence and previous evidence that confirms (the Facebook company intentionally disrupts its work to erase the evidence of its international condemnation).  Hence, we find, that with the (increasing of American and Western criticism to the Chinese campaign directed against American and mainly Western technology companies, which produce children’s toys), especially those that encourage suicide, such as: (Facebook films for children), policy makers in the Communist Party of China tried to assert that:

   “Germany, as a successful Western model, has adopted the same policies to protect its children and children. Despite the progress of industry and modern technologies and technology, Germany has restricted the work of children’s toy companies, with Chinese leaders confirming that Germany has succeeded in industry, production and progress, not consumption and games”

Fourth: Analyzing the aspects of Chinese benefits and the Chinese political and ethical employment for the disruption of the American “Facebook” network around the world, internally, externally and ideologically

    The malfunction of Facebook and its various applications, such as: “WhatsApp, Instagram, Messenger”, shows the extent of American hegemony over very important tools in the era of the digital economy, to extend American influence and control over the world, and in return, China has distanced itself from these (Digital chaos) by banning these American and Western applications and providing (local Chinese alternatives of technology that fits the nature and values ​​of Chinese society and protects its youth and children), through:            

My accurate analysis as an expert in Chinese Politics for (the great Chinese benefits from the disruption of Facebook as a giant of American technology around the world, and the attempt to use the matter politically, ideologically and values ​​to defend its interests), thus hitting and offending the reputation of American social networks, as well as their inability to confronting the emergency and most importantly its violations of the rights of the child, family and human being.

This may also come in the field and scope of the work of “Chinese digital technology propaganda in the face of the alliance of digital technological democracies against it, led by Washington with its allies, such as: Britain and Australia in the first place”, especially after the United States of America banned the Chinese technology giant of (Huawei company for technology), which adopts China’s plan on  The world, especially in developing and African countries, to spread (the fifth generation services “G5″ for Chinese digital technology).

China will also try to improve the reputation of its technology companies globally, especially after the arrest (the Chinese financial director of Huawei in Canada and her arrest and then recently sentenced on charges of belonging to a banned group, as well as other financial charges related to the work of the Chinese company Huawei itself), which increased the tensions of the relations between China and the United States, especially with China accusing Washington of pushing its Canadian allies to obstruct its interests around the world.

 China was able to use the disruption of American social networks to make (technological ideological propaganda for itself, by proving it with tangible evidence, that social networks in China did not suffer any glitch during the Facebook stoppage), regarding the work of applications for mobile phones in China.

Therefore, Chinese social networks, such as: “Weibo, WeChat, Kyukyo, Youku, Doyen”… etc., which were working normally during a period of downtime and disruption of all American versions of the web and its applications, especially those linked to the American Facebook network, the Chinese ideological propaganda focused mainly on the inside, stating that:

The social networks in China did not suffer any malfunctions during the failure of their American counterparts”

In this context, the Chinese media tried to emphasize (the good management of the ruling Communist Party authorities of the country, especially with the Chinese authorities banning American technological services, such as: Facebook and its applications inside China), which are: “Instagram, Twitter, and WhatsApp”, and others.  As well as (China bans the work of some other Western technology companies that have been proven to violate Chinese laws), and therefore, the Chinese citizen was not affected by any noticeable stop, with his use and use of Chinese applications alternative to the American, and from here (no one practically noticed that any of the Chinese applications stopped working within the whole mainland of China during the period of downtime and disruption of Facebook and its various applications around the world).                                                         

   Through this analysis, we understand that (China mainly focused its efforts on the inside), certainly that China does not face any similar technical problems, especially with the impact of this interruption of Facebook’s work on the accounts of millions of users around the world, as well as causing problems using the “Oculus platform” for virtual reality, which is also affiliated with “Facebook”, while (China only uses its own technological applications with a global reputation and good value, given that there were no technical problems in it, as well as observing all the ethical standards that its American counterparts neglected).

Fifth: The attitude of the Chinese people themselves towards the ban by the Chinese authorities and the leaders of the Communist Party of China of the “Facebook” website in their country, according to the Chinese Constitution

The ruling Communist Party authorities have tried to conduct (large educational and awareness campaigns for all the Chinese people about the danger of American and Western digital technologies on the identity, national culture and values ​​of the People’s State of China), as the new competition between China and the United States of America and the West is witnessing several accelerating geostrategic balances and radical internal social and political transformations. China has become more capable of changing the image of the world and the relations of competition in it in new unconventional ways, such as: the matter of “Chinese alternative technological applications in the face of Western technologies”.

This alternative proposal for Chinese digital technology, alternative to its American and Western counterparts, enhances the legitimacy and strength of governance and the ruling authorities of the Communist Party in the Chinese state, with their ability to win over the masses and Chinese public opinion with a system of cultural values ​​agreed upon among all the Chinese people with their leaders, authorities and ruling party.  Which can be understood, as follows:

The Chinese authorities have reaffirmed the depth of their far-reaching strategic view by blocking a number of American social networking sites, especially “Facebook” in China since 2009, and the Chinese authorities attributed the blocking to (three main reasons), which are:

First: Because (those American social media sites deliberately underestimate the values of China and fail to mention the China’s historical facts), such as deliberately mentioning the necessity of reviving the old revolutions in China and promoting their renewal.

Second: The presence of (gaps in the security and privacy options on Facebook, and its threat to Chinese national security).

Third: The growing criticism against China on the famous search engine website of “Google”, and its intentional publication of “pornographic materials”, which (infiltrate the privacy of children and the Chinese family).

2) The Chinese authorities also blocked the famous American website of “Amazon” for selling books, due to the intention of the “Amazon” website to provoke China despite its warning, by deliberately selling and promoting a book banned from publication in China that talks about revolutions, as if anyone clicks on a website or link of the book is on Amazon from China, the site is completely blocked for at least 15 minutes, which is an attempt by the Chinese state to maintain its security and stability and protect its history and heritage in the face of American and Western absurdity, as China officially defends itself.

 3) Hence, (private Chinese applications began to promote themselves, and the Chinese media themselves promoted them, by not disrupting them during the period of downtime and sudden failure in other American digital services), which cost heavy losses in the United States of America approaching 164 thousand dollars, losses per minute, that is, nearly $60 million, which China has not faced.

 4) As for the position of the Chinese themselves towards banning Facebook in their country, you find that “Chinaese people keenness to preserve the value system of Chinese society”, considering that American websites, such as: (Facebook, Twitter, Google), and the other applications, as from China’s point of view, they’re looking to the American and Western IT applications may (infect the Chinese value system, as it threatens the culture of the Chinese).

 5) According to the Chinese constitution, “the Chinese state itself is morally responsible for protecting its citizens from exposure to Western and American cultural invasion”, and also for closing the door on Western attempts to use these sites to foment internal political unrest against the Chinese state.

 6) Hence, we find that China, after the disruption of Facebook and the rest of the other related applications, we can analytically highlightthe (Chinese promotion of the superiority of its digital values and technological model in the face of American and Western applications), and the Chinese affirmation of the validity of its theory to follow a policy called: (Building the Great Firewall Project china)

  Or what is officially, known as: “the Golden Cover Project”,or “Golden Shield”.

   Which is one of the most important and sensitive Chinese technical projects to monitor the Internet and block the unwanted websites, and it is considered one of (the most advanced Chinese sensitive technical projects in the world).

     Based on the understanding of the Chinese technological map and the most important methods and celebrities that China adopts in the face of American and Western digital technologies such as Facebook, as we analyzed it, and from here we find that (the ruling Communist Party authorities in China are trying to take advantage of the rapid technological progress in the mainland of China to change the geostrategic map of the world in a fast way, whose nature has not yet been clear in the face of American hegemony and unilateralism), which is evident to us from the way and mechanism of the Chinese political and ethical employment of the (relationship between the technology and politics and the interaction and mutual influence between them), which represents one of the most important determinants of this new world, and the innovative non-traditional competition trends between  China and the USA.

Sixth: The relationship between (the crisis of disrupting Facebook and restoring China’s technological prestige and position) between its citizens and the world, and promoting the theory of “the superiority of Chinese technological applications over their American counterparts”

   The researchers, scholars, and the international academic community around the world are witnessing the emergence of new technological and cognitive terms that are all centered around the American-Chinese technological conflict and polarization at the present time in its political form, such as the term of (Techno-Politics).

    This new term of “Techno Politics” refers to (the relationship between political and technological affairs in its changing form), in a way that can be applied to the current conflict and competition between China and the United States of America over “fifth generation networks and the United States’ ban on the Chinese company Huawei”, as a result of the struggle over the acquisition of technological applications and their relationship  The nature of competition and political polarization between Washington and Beijing, but in terms of digital and technology, which we can apply and understand on the part of China during the crisis of the Facebook disruption, as follows:

The crisis of disruption of Facebook and the rest of the applications associated with it, such as: (WhatsApp, Instagram), and others, has restored China’s technological prestige and position among its citizens, and demonstrated the depth and far-sightedness of the policies of the Communist Party of China, emphasizing that:

   “China’s blocking of many American social media sites is not in vain, as the Chinese state sees great importance in “not leaving the personal information of its members in foreign hands that may one day exploit that information, which is our primary task in preserving the Chinese citizen, as one of the important ingredients for maintaining China’s national security”

This also reminds us of a crisis that occurred a few years ago, a crisis occurred between “the American Google company” and China, during which the two parties exchanged accusations that took a political nature, and ended with the consent and agreement of the two parties to transfer the “Google” engine service to the city of “Hong Kong”, where it directs you to Google’s Hong Kong site directly, if you try to open the site in any of the other provinces and provinces of China.

On the other hand, China is trying to promote other Chinese search engines competing with the US, such as: Baidu”, which was launched by China in 2000, to be the first search engine in the country, and also a strong competitor to the American company “Google”.

We can also recognize the “Youku website” in China, which is the Chinese alternative to “YouTube”, as “Youku” is the most largest and important site that provides the service of uploading and publishing videos on the Internet in China, and the site is characterized by the ability to upload unlimited videos, as it allows users to upload full movies and complete episodes of Chinese, Korean, and American series. And the site as well allows the Chinese people to follow up on many (non-Chinese films and series, as they are accompanied by Chinese subtitles on the screen), outperforming the services of the YouTube American site.

We also find that the “Weibo” site in China, as the Chinese alternative to “Twitter”, which is blocked in China, and the word “Weibo” in Arabic means (small tweets or short posts), and according to the “Weibo site’s statistics”, its Chinese users are daily writing more than 100 million microblogs, outperforming the famous Twitter social networking site.

Here, we also find the “QQ” application in China, with taking into consideration that “QQ”, is considered one of the largest chat programs in China, and an alternative to the famous chat programs, such as: (MSN & Yahoo), which the Chinese do not accept to use.

We also find the “WeChat” applicationor “Weixin” in Chinese, which is the most used application in China for social networking, where the parent company revealed a new report to it, which showed that it has so far more than 400 million active users and they are constantly increasing.

With the intensification of the Chinese accusations against the United States of America, which I consider to be the most violent of all, was the accusation of the Chinese Vice Foreign Minister “Xie Feng” to the United States of America publicly, of “trying to eliminate the Chinese regime”,  In text, he said:

“There is a campaign by an entire government and an entire society that is being waged to bring down China”

  This was reported by the well-known Chinese newspaper, “China Daily”, during “Ms. Sherman’s visit to Tianjin province in China”, on July 26, 2021, who is considered the most high-level ranking senior official in the American administration of President “Joe Biden” to visit China.

  Finally, we find that through the previous comprehensive analysis of the Egyptian researcher to analyze and understand the nature of the work of Chinese technology companies in the face of their American and Western counterparts, we can now accurately understand (the role or employment of the political and value but also the ideology of Chinese and American technology companies and all other digital platforms associated with them to play real and independent geopolitical roles).

    Therefore, the talk about (the disruption of the Facebook network around the world, the role of China and the exchange of accusations between all concerned parties is closely linked to national security and its link to digital technology and the giant Chinese digital technology projects globally in the Silicon Valley region), especially with the connection of advanced technology networks and companies at the present time with governments, which applies to “Facebook” and its connection with the US federal government and various political institutions as I mentioned, and also with the association of Chinese companies working in the technology sector with the government, this shows us with evidence (the seriousness of the relationship between digital technology, politics and national security) for both China and the USA in our case.

  Hence, what most analytically caught my eye, academically and researchly was (Chinese President Comrade Xi Jinping’s meeting with Apple CEO “Tim Cook”, at rates that exceed his meeting with presidents and leaders in the whole world).  This is a confirmation of what I  have previously presented in this close connection between the governments of countries and giant technology companies, and even (transcends their borders because of their connection with armies and all national security files around the world, which is almost applicable to the American and Chinese cases and the Chinese alternatives applied to digital technology in the face of American and Western competition, in order to preserve  on its national security from any penetration), and this fully proves and confirms our theory about (the relationship between politics, technology and national security, the limits and extensions of influence between each other).

Continue Reading

Publications

Latest

Defense4 hours ago

Will India be sanctioned over the S-400 Air Defense System?

The Russian S-400 air defense system has emerged as a serious concern for US policymakers. Amongst other states, US allies...

Finance6 hours ago

Albania Has Opportunity to Build a More Sustainable Growth Model

Albania’s economy, like other countries in the region, is recovering faster than expected after the historic recession created by the...

Middle East8 hours ago

Process to draft Syria constitution begins this week

The process of drafting a new constitution for Syria will begin this week, the UN Special Envoy for the country,...

Human Rights10 hours ago

Only ‘real equality’ can end vicious cycle of poverty

Although poverty and privilege “continue to reproduce themselves in vicious cycles”, it is possible to break the chain and shift the paradigm, an independent UN human rights...

Finance12 hours ago

Montenegro on Course for Stronger Economic Recovery in 2021

The Western Balkans region is rebounding from the COVID-19-induced recession of 2020, thanks to a faster-than-expected recovery in 2021, says...

Environment14 hours ago

UNESCO ‘eDNA’ initiative to ‘unlock’ knowledge for biodiversity protection

To understand the richness of biodiversity across World Heritage marine sites, the UN scientific organization launched on Monday a project to protect...

Americas16 hours ago

America’s Two-Tiered Justice System

The Constitution states only one command twice. The Fifth Amendment says to the federal government that no one shall be “deprived...

Trending