Connect with us
gun terrorism gun terrorism

Intelligence

A Counter-Terrorism Agenda and stronger Europol to boost the EU’s resilience

Published

on

Today, the Commission is presenting a new Counter-Terrorism Agenda for the EU to step up the fight against terrorism and violent extremism and boost the EU’s resilience to terrorist threats. Building on the work done in recent years, the Agenda seeks to support Member States in better anticipating, preventing, protecting and responding to the terrorist threat. Europol, the EU Agency for law enforcement cooperation, will deliver better operational support to Member States’ investigations under the revised mandate proposed today.

Vice-President for Promoting our European Way of Life, Margaritis Schinas, said: “The inclusive and rights-based foundations of our Union are our strongest protection against the threat of terrorism. By building inclusive societies where everyone can find their place, we reduce the appeal of extremist narratives. At the same time, the European way of life is not optional and we must do all in our power to prevent those that seek to undo it. With today’s Counter-Terrorism Agenda we are putting the focus on investing in the resilience of our societies with measures to better counter radicalisation and to protect our public spaces from attacks through targeted measures.

Commissioner for Home Affairs, Ylva Johansson, said: “With today’s Counter-Terrorism Agenda, we are boosting experts’ ability to anticipate new threats, we are helping local communities to prevent radicalisation, we are giving cities the means to protect open public spaces through good design and we are ensuring that we can respond quickly and more efficiently to attacks and attempted attacks. We are also proposing to give Europol the modern means to support EU countries in their investigations.”

Measures to anticipate, prevent, protect and respond

The recent spate of attacks on European soil have served as a sharp reminder that terrorism remains a real and present danger. As this threat evolves, so too must our cooperation to counter it.

The Counter-Terrorism Agenda aims at:

  • Identifying vulnerabilities and building capacity to anticipate threats

To better anticipate threats as well as potential blind spots, Member States should make sure that the Intelligence and Situation Centre (EU INTCEN) can rely on high quality input to increase our situational awareness. As part of its upcoming proposal on the resilience of critical infrastructure, the Commission will set up advisory missions to support Member States in carrying out risk assessments, building on the experience of a pool of EU Protective Security Advisors. Security research will help enhance early detection of new threats, whilst investing in new technologies will help Europe’s counter terrorism response stay ahead of the curve.

  • Preventing attacks by addressing radicalisation

To counter the spread of extremist ideologies online, it is important that the European Parliament and the Council adopt the rules on removing terrorist content online as a matter of urgency. The Commission will then support their application. The EU Internet Forum will develop guidance on moderation for publicly available content for extremist material online.

Promoting inclusion and providing opportunities through education, culture, youth and sports can contribute to making societies more cohesive and preventing radicalisation. The Action Plan on integration and inclusion will help build community resilience.

The Agenda also focuses on strengthening preventive action in prisons, paying specific attention to the rehabilitation and reintegration of radical inmates, including after their release. To disseminate knowledge and expertise on the prevention of radicalisation, the Commission will propose setting up an EU Knowledge Hub gathering policy makers, practitioners and researchers.

Recognising the specific challenges raised by foreign terrorist fighters and their family members, the Commission will support training and knowledge sharing to help Member States manage their return.

  • Promoting security by design and reducing vulnerabilities to protect cities and people

Many of the recent attacks that took place in the EU targeted densely crowded or highly symbolic spaces. The EU will step up efforts to ensure physical protection of public spaces including places of worship through security by design. The Commission will propose to gather cities around an EU Pledge on Urban Security and Resilience and will make funding available to support them in reducing the vulnerabilities of public spaces. The Commission will also propose measures to make critical infrastructure – such as transport hubs, power stations or hospitals – more resilient. To step up aviation security, the Commission will explore options for a European legal framework to deploy security officers on flights.

All those entering the EU, citizens or not, must be checked against the relevant databases. The Commission will support Member States in ensuring such systematic checks at borders. The Commission will also propose a system ensuring that a person who has been denied a firearm on security grounds in one Member State cannot lodge a similar request in another Member State, closing an existing loophole.

  • Stepping up operational support, prosecution and victims’ rights to better respond to attacks

Police cooperation and information exchange across the EU are key to respond effectively in case of attacks and bring perpetrators to justice. The Commission will propose an EU police cooperation code in 2021 to enhance cooperation between law enforcement authorities, including in the fight against terrorism.

A substantial part of investigations against crime and terrorism involve encrypted information. The Commission will work with Member States to identify possible legal, operational, and technical solutions for lawful access and promote an approach which both maintains the effectiveness of encryption in protecting privacy and security of communications, while providing an effective response to crime and terrorism. To better support investigations and prosecution, the Commission will propose to create a network of counter-terrorism financial investigators involving Europol, to help follow the money trail and identify those involved. The Commission will also further support Member States to use battlefield information to identify, detect and prosecute returning Foreign Terrorists Fighters.

The Commission will work to enhance the protection of victims of terrorist acts, including to improve access to compensation.  

The work on anticipating, preventing, protecting and responding to terrorism will involve partner countries, in the EU’s neighbourhood and beyond; and rely on stepped up engagement with international organisations. The Commission and the High Representative/Vice-President, as appropriate, will step up cooperation with Western Balkan partners in the area of firearms, negotiate international agreements with Southern Neighbourhood countries to exchange personal data with Europol, and enhance strategic and operational cooperation with other regions such as the Sahel region, the Horn of Africa, other African countries and key regions in Asia.

The Commission will appoint a Counter-Terrorism Coordinator, in charge of coordinating EU policy and funding in the area of counter-terrorism within the Commission, and in close cooperation with the Member States and the European Parliament.

Stronger mandate for Europol

The Commission is proposing today to strengthen the mandate of Europol, the EU Agency for law enforcement cooperation. Given that terrorists often abuse services offered by private companies to recruit followers, plan attacks, and disseminate propaganda inciting further attacks, the revised mandate will help Europol cooperate effectively with private parties, and transmit relevant evidence to Member States. For example, Europol will be able to act as a focal point in case it is not clear which Member State has jurisdiction.

The new mandate will also allow Europol to process large and complex datasets; to improve cooperation with the European Public Prosecutor’s Office as well as with non-EU partner countries; and to help develop new technologies that match law enforcement needs. It will strengthen Europol’s data protection framework and parliamentary oversight.

Background

Today’s Agenda follows from the EU Security Union Strategy for 2020 to 2025, in which the Commission committed to focus on priority areas where the EU can bring value to support Member States in fostering security for those living in Europe.

The Counter-Terrorism Agenda builds on the measures already adopted to deny terrorists the means to carry out attacks and to strengthen resilience against the terrorist threat. That includes EU rules on combating terrorism, on addressing terrorist financing and access to firearms.

Continue Reading
Comments

Intelligence

UN: Revealing Taliban’s Strategic Ties with Al Qaeda and Central Asian Jihadists

Published

on

Afghan peace mediators

As the 20th anniversary of the 9/11 attacks and the deadline for the withdrawal of American troops from Afghanistan draws near, the region has been witnessing sudden adjustments. The Taliban have not only intensified assaults against the Afghan government forces and captured new territories but also began to demonstrate their regional ambitions to reduce Washington’s influence in Central and South Asia. As the US military has completed more than half of its withdrawal from Afghanistan, the Taliban believe that they defeated America after 20 years of grueling war. The Taliban leaders, who were driven by the latest military successes, began further setting their own conditions for the neighbors and stepping on the toes of Washington in order to prevent the establishment of a new US military base in Central Asia.

On May 26, the Taliban issued a statement warning Afghanistan’s neighbors not to allow the US to utilize their territory and airspace for any future military operations against them. The Sunni Islamist jihadi group cautioned that facilitating US military operations by neighboring countries in the future will be a “great historical mistake and a disgrace that shall forever be inscribed as a dark stain in history.” They further emphasized that the presence of foreign forces is “the root cause of insecurity and war in the region.” The insurgent group strictly warned without elaborating that “the people of Afghanistan will not remain idle in the face of such heinous and provocative acts”. At the end of the statement, they exerted political pressure on the Central Asian states, threatening that “if such a step is taken, then the responsibility for all the misfortunes and difficulties lies upon those who commit such mistakes.”

Given the past experience of US military presence in the region, the Taliban’s threatening appeal is most likely addressed to the governments of Kyrgyzstan, Uzbekistan and Tajikistan.  After the 9/11 attacks the Kyrgyz, Tajik, and Uzbek governments hosted the American military to wage a campaign against the Taliban, Al Qaeda and their Salafi-Jihadi subsidiaries. But virtually every US military base in Central Asia was suddenly expelled when the personal interests of the regional authoritarian leaders have been infringed upon. Uzbekistan expelled the US base from Karshi-Khanabad amid strong political disagreements over a bloody 2005 crackdown on protesters in Andijan. The Dushanbe and Kulob airports in Tajikistan were used very briefly by the NATO forces. The US base at the Bishkek airport in Kyrgyzstan also was closed in 2014 under heavy Russian hands. It is no secret that following the expel of US military bases, some political leaders of Central Asia became skeptical of Washington, thus further perceiving it as an unreliable partner.

The Taliban’s warning to the Central Asian states is fully consistent with the strategic expectations of Al Qaeda, its loyal and faithful ideological partner in the global jihad, both of which jointly seek to push the US out not only from Afghanistan, but also from Central and Southeast Asia. Based on propaganda releases and the rhetoric on Telegram channels, the Central Asian Salafi-Jihadi groups which are linked to the Taliban and Al Qaeda, strongly supported the withdrawal of US forces from the region. Consequently, Uighur and Uzbek jihadists potentially see the Taliban and Al Qaeda as powerful parent organizations, whose resurgence in Afghanistan offers major advantages for their military and political strengthening. Unsurprisingly, Al Qaeda and Taliban aims to oust the US forces from the region, hence playing into the hands of Moscow and Beijing, considering that both unlikely to welcome an increased US military presence in their backyard.

Taliban leaders are well aware that the possible deployment of US military assets in Central Asia will impede their strategic goal in rebuilding the so-called Islamic Emirate of Afghanistan. Today Washington is actively working with nations surrounding Afghanistan on the deployment of its troops to support Afghan forces “over the horizon” after withdrawal from the country on September 11. The US air support for the Afghan military could thwart Taliban plans to quickly seize Kabul and force them to sit at the negotiating table with the Ashraf Ghani administration. The Taliban have consistently and clearly emphasized in their numerous public statements opposing the negotiation and power share with the Kabul regime. They consider themselves the only and undeniable military-political force that has the right to rule the country in accordance with Sharia law. The Taliban jihadists are determined to continue waging jihad until establishing the Islamic Emirate of Afghanistan, and their emir, Mullah Haibatullah Akhundzada, becomes the country’s “lawful ruler”.

On June 6, 2021, the Taliban once again appealed to Kyrgyzstan and Tajikistan “to resolve their border issues through a dialogue” and “seeking a logical solution that would benefit both sides.” Recall, during the two-day border conflict between the armed forces of the two post-Soviet countries at the end of April, more than 50 people were killed, hundreds were injured and thousands were forced to leave their homes. In its statement, the Taliban, called on Tajik and Kyrgyz leaders to value “the peace and security of their respective nations.” According to the local analysts, Taliban’s “peace-aiming appeal” looks like a mockery of the Afghan people suffering from their bloody jihad.

Taliban’s “Soft Power” Under Construction

The question to be posed is what kind of leverage does the Taliban has with the Central Asian states to put pressure on them in preventing the possible deployment of new US military bases in the region?

The Taliban, an insurgent Islamist group that has yet to come to power, does not have any economic or political leverage over the former Soviet republics of Central Asia. But it is imperative to mention that the Taliban holds “soft power” tools, such as Central Asian Salafi-Jihadi terrorist groups affiliated with the Taliban and Al Qaeda. These groups challenged the region’s secular regimes, hence aiming to establish an Islamic Caliphate in the densely populated Fergana Valley, sandwiched between Kyrgyzstan, Uzbekistan and Tajikistan.

It is no secret that the Central Asian post-Soviet countries consider the Al Qaeda-linked Uzbek and Uighur Sunni Salafi-Jihadi groups hiding in Taliban-controlled Afghan soil as a threat to the security of the entire region. Recall, the first group of radical Islamists from Central Asia who found refuge in Afghanistan in the mid-90s was the Islamic Movement of Uzbekistan (IMU), which had close and trusting ties with both Al Qaeda and the Taliban. Currently, Uighur fighters of Turkestan Islamic Party (TIP) from China’s Xinjiang, Uzbek militant groups such as Katibat Imam al-Bukhari (KIB), Katibat Tawhid wal Jihad (KTJ), the Islamic Jihad Union (IJU) and Tajik militants of Jamaat Ansarullah (JA) wage jihad in Afghanistan under the Taliban’s umbrella.

The Taliban still strongly support Uzbek and Uighur jihadists despite the 2020 US-Taliban peace agreement that requires the Taliban to sever ties with Al Qaeda and all Central Asian terrorist groups.

In response to documentary evidence of the UN Security Council and the US Defense Intelligence Agency on the Taliban’s close-knit relationship with Al Qaeda and their failure to fulfill the obligation, the Taliban have adopted new tactics to publicly deny the presence of transnational terrorist groups in the country and their ties to them. The Taliban still insist that there are no foreign fighters in the country. But regular UN reports reveal the true face of the Taliban, who are trying to hide their deep network links with Al Qaeda and Central Asian Islamists — a decades-old relationship forged through common ideology and a history of joint jihad.

Thus, a recently released report by the UN Security Council’s Taliban Sanctions Monitoring Team confirms that there are “approximately between 8,000 and 10,000 foreign terrorist fighters from Central Asia, the North Caucasus and China’s Xinjiang in Afghanistan. Although the majority are affiliated foremost with the Taliban, many also support Al Qaeda.” The UN report stated that Uzbek and Uighur jihadists’ ties with the Taliban and Al Qaeda remain “strong and deep as a consequence of personal bonds of marriage and shared partnership in struggle, now cemented through second generational ties.” Further the UN monitoring team revealed Al Qaeda’s core strategy of “strategic patience,” according to which the group would wait for “a long period of time before it would seek to plan attacks against international targets again.”

According to the report, “several hundred Uighur jihadists of Turkestan Islamic Party (TIP) located primarily in Badakhshan and neighboring Afghan provinces, whose strategic goal is to establish an Islamic Uighur state in Xinjiang, China.” To achieve its goal, TIP facilitates the movement of fighters from Afghanistan and Syria to China. Abdul Haq al-Turkistani, who is a member of Al Qaeda’s Shura Majlis, leads the Syrian and Afghan branches of TIP for more than two decades. According to the UN monitoring group, “Uighur militant Hajji Furqan, the TIP’s deputy emir, is also a deputy leader of Al Qaeda and responsible for the recruitment of foreign fighters.” Such mixed appointments of group leaders highlight the close and deep ties between the troika: Taliban-Al Qaeda-TIP.

The UN report found more evidence of close cooperation between Uzbek IMU jihadists and the Taliban. The report stated that the “IMU fighters are currently based in Faryab, Sar-e Pol and Jowzjan provinces, where they dependent on the Taliban for money and weapons”. The UN monitoring team also highlighted the activities of Central Asian Salafi-Jihadi groups such as KIB, IJU and Jundullah, which are waging jihad in the northern Afghan provinces of Faryab and Kunduz under Taliban shelter and control. “The Taliban has forbidden these groups from launching independent operations, resulting in a reduction of their income.” In conclusion, UN analysts noted that pressure on the Taliban to cut their ties with Al Qaeda and Central Asian Salafi groups has not succeeded. Thus, the UN report once again refuted the Taliban’s assertion that Al Qaeda and Central Asian jihadists are not present in Afghanistan.

Conclusion

Thus, it can be assumed that while US military pressure persists, the Taliban’s tactics will continue to publicly deny their trust relationships and close ties with Al Qaeda, Central Asian jihadists, and other transnational terrorist groups in the country. But as long as the Taliban’s perception of its own level of influence and control in Afghanistan remains high, insurgents will continue to insist that they are abiding by the accord with the US.

The Taliban’s strategy is to build the foundation of their “soft power” through the patronage and protection of Al Qaeda and Central Asian Salafi-Jihadi groups in Afghanistan. Thus, in this complex process, not only material interests, but also common religious roots originating in the Hanafi school of Sunni Islamic theology and mutual sympathy for jihadist ideological visions might play a significant role.

Continue Reading

Intelligence

Cyber-attacks-Frequency a sign of Red Alert for India

Published

on

The biggest target is in terms of transportations, nuclear power plants, Power system Operation Corporation Limited, V.O. Chidambaram Port Trust, Telangana State Load Dispatch Centre, logistic industries and research organisations which eventually can lead to destruction of the whole ecosystem. The confidentiality breach in the case of medical data leak as reported by a German cyber security firm –Greenbone Sustainable Resilience wherein Picture Archiving and Communication Servers were linked to public internet without any requisite protection is a point of concern. Then, there are certain individualistic attacks such as hacking email and financial crimes (banking), etc. In the last two years the attacks radar of focus has been defence, government accounts and the vaccine manufacturing companies.

Cyber Security – Individualistic awareness need of the hour

The target of the individual in a peculiar case which led to heinous crimes casted was due to opening of a document which was a bait to install Netwire- a malware. The bait was eventually delivered through a file and what prompted a person to open that link was a Drop box sent to him on his email was actually opening a Pandora Box of malicious command and control server. An emphasis to understand the technicality that Netwire stands for a malware which gives control of the infected system to an attacker. This in turn paves way for data stealing, logging keystrokes and compromise passwords. In the similar vein the Pegasus used the tactic to infiltrate the user’s phones in 2019.

Cyber Security – Attacking Power Distribution Systems

The intrusions by Chinese hacker groups in October, 2020 as brought out by Recorded Future was done through Shadow Pad which opens a secret path from target system to command and control servers. And, the main target is sectors such as transportation, telecommunication and energy .And , there are different tags that are being used by the Chinese Espionage Industry such as APT41, Wicked Spider and Wicked Panda , etc.

The institutions backing legitimisation

The Institutions which are at working under the cyber security surveillance are the National Security Council and National Information Board headed by National Security Adviser helping in framing India’s cyber security policy .Then, in 2014 there is the National Critical Information Infrastructure Protection Centre under the National Technical Research Organisation mandating the protection of critical information infrastructure. And, in 2015 the National Cyber Security Coordinator advises the Prime Minister on strategic cyber security issues. In the case of nodal entity , India’s Computer Emergency Response Team (CERT-in) is playing a crucial role under the Ministry of Electronics and Information Technology(MEITY).But, there is a requirement of clarity in National Cyber Security Policy of 2013 and the needed updates desired in it respectively.

A cohesive approach – Data Protection and Privacy Importance

The Data privacy i.e. the personal data protection bill is an important imperative in which services of private actors can be bridged through a concerned law which is missing link in that sense. The point of Data localisation falls squarely within this dimension of Section 40 and 41 of the draft bill where in the Indian stakeholders have the capacity to build their own data centres .In this contextualisation there also a need to understand certain technicalities involved in terms of edge computing which in a way is enabling the data to be analysed, processed, and transferred at the edge of a network. An elaboration to this is the data is analysed locally, closer to where it is stored, in real-time without delay. The Edge computing distributes processing, storage, and applications across a wide range of devices and data centres which make it difficult for any single disruption to take down the network. Since more data is being processed on local devices rather than transmitting it back to a central data centre, edge computing also reduces the amount of data actually at risk at any one time. Whereas on the other hand, there is insistence on data localisation has paved the way for companies such as Google Pay to adhere to the policy and synchronise their working with the United Payments Interface (UPI).

What do you understand by Data Share?

In the recent case of WhatsApp privacy issue and drawing in parallel other organisation a similar platform such as Facebook and Google shared the data to the third party with a lopsided agreement and with continuance of the data trade business industry. In 1996 the internet was free so was perceived as carte blanche , a safe harbour falling under the Section 230 of the Communication Decency Act in the United States but with the evolution of the circumstances the laws in that specifications are also required to change in that respect. In relations to the Indian law under the Information Technology Act, 2000 under the Section 69 the Indian government has the powers to monitor and decrypt any information that’s store in any computer resource but on certain conditions such as in regards to the sovereignty, defence and security of the country.

Cyber-attacks understanding on the International Forums

In terms of Lieber Code of Conduct of 1863 or be it Hague Convention of 1899 there is a need of updating the definitions and where in the cyber army falling under the categorisation  of civilians , not possessing any of the warfare weapons cause the main weapon that they possess is a malware which is invisible but can have deep repercussions leading to destruction of that particular economy altogether .So, in recent evolving circumstances there is an undue importance to for the target country to respond with equal force and having a right to self-defence in this manner regardless of the attack being from a non-state actor from a third country and masquerading under the civilian garb .Henceforth , there a thorough understanding of the complex environment that one is dealing with , there is undue emphasis to change and respectively update with the current world.

Continue Reading

Intelligence

Incidents of Uranium Theft in India: Depleting Nuclear Safety and International Silence

Published

on

Terrorism

In yet another incident of the capture of nuclear-related materials from unauthorized persons in India has made headlines in the Indian media but largely ignored in the international media. On 4th June 2021, as reported in the Indian media, the authorities arrested seven people possessing approximately 6.4 kilograms of Uranium in the Eastern State of Jharkhand. This is the second time in less than a month where Indian authorities have captured such a gang in an attempt to sell uranium illegally. An incident of the same nature was reported just a few days ago in May 2021 where authorities apprehended unauthorized persons, who were trying to sell nearly 7 kilograms of natural uranium on the black market. Notably, Indian authorities themselves believe that these events might be linked to a “national gang involved in illegal uranium trade”. This is a very serious issue because it means two things; first, that Indian local uranium reserves, radioactive nuclear materials, and facilities are not protected and are prone to black marketing. Secondly, this scenario has emerged because India is not adhering to international bindings of nuclear safety and security such as UN resolution 1540 and (Convention on Physical Protection on Nuclear Material) CPPNM under IAEA to secure its materials, reserves, and facilities. But, the most damaging aspect in this scenario is the discriminatory behavior of the international community, which is criminally silent on the violations of norms, practices, and regulations necessary for nuclear safety and security.

Though in both incidents, Uranium was in natural condition, which cannot be used for making bombs; however; it should be of great concern, as even in its natural state the Uranium can spread considerable radioactivity if used with conventional explosives. Moreover, Indian authorities themselves are considering that these activities could be linked with national gangs involved in the illegal supply of uranium. This raises the point that actually how much natural uranium is illegally sold in the black market by India. Since these are only incidents that are being reported in the Indian media, there might be many incidents that have never been reported. Also, this gang was captured from near the area where Indian Uranium mines of Jharkhand are allocated, the likelihood of access of non-state actors to these mines cannot be denied. These incidents are critical for international security and stability because such radioactive material when sold in black markets could be brought by the non-state and states aspiring for nuclearization. Unfortunately, in such a scenario all the efforts currently going on to stop the proliferation of nuclear weapons would be hampered. The recurring of these incidents reflect that India, despite being a member of CPPNM is not ensuring the protection of its nuclear materials from theft and sabotage by proper regulations, stringent mechanisms, and control. Other than CPPNM, India has also signed UN resolution 1540, which makes it mandatory for the states to ensure security regulations, mechanisms, equipment required for the security of Weapons of Mass Destruction (WMD) from the non-state actors. But, surprisingly, so far the UN or any other international organization has not taken notice of these recurring events. Rather, these mishaps by Indian authorities are shoved under the carpet. These incidents have been reportedly re-occurring in India, media reported these events in 2003, 2008, 2009, 2013, 2016, 2019, and now again in 2021. 

Nuclear safety and security is a national matter of any state; however, against the backdrop of the potential damage, which these weapons can bring, they have become an international concern. Specifically, to an extent, where states are sometimes criticized, lauded, and sometimes rewarded for their behavior in this realm. In this regard, India appears as an exceptional case, where the formation of Nuclear Suppliers Group NSG to stop such events in the future has its roots in the Indian so-called peace nuclear explosion (PNE) in 1974. Ironically, a few years down the road, the same NSG gave a waiver to India for conducting nuclear export. Moreover, India was made part of many other regimes such as the Missile Technology Control Regime (MTCR), Australia Group, and Wassenaar Arrangement. Although, these decisions were carried out in lieu of geo-political realities, where the West regards India as a balancer against China but it gave a free hand to India. Even the US-based NTI Report on Nuclear Security Index gives India less score in nuclear safety and security regulations. At a time when many nuclear theft-related incidents have occurred in India in recent years, disgracefully, India still desires to become a member of NSG based on its so-called nuclear record.

To sum up the situation, the occurrence of back-to-back nuclear theft-related incidents has further exposed India’s nuclear credentials and its non-adherence to international practices of nuclear safety and security. If legal bindings such as CPPNM and 1540 would not be implemented in the future by India, the South Asian stability, as well as the international security, would be undermined. Moreover, if the international non-proliferation continues to remain lenient towards states like India, the rest would likely regard the international non-proliferation mechanism not just as discriminatory but even as hoaxing. Many states might prefer to proliferate for their own interests, which would not serve the non-proliferation mechanism and regime. A very candid example is that today even after two years of the last NPT review conference, the next has not been conducted and chances are that it might not be conducted this year.

Continue Reading

Publications

Latest

Trending