Connect with us

Intelligence

Chaos Maker: Bernard-Henry Levy video in Panjshir and the chaos making in the Middle East

Published

on

First: The Israeli-French intelligence maneuver deliberately displaying the video of the French-Israeli Jewish chaos maker “Bernard-Henry Levy” globally to form a “resistance front against the Taliban in the Afghan province of Panjshir” to distract the attention of the whole world and the Taliban leaders themselves about “the real  location-based of the Israeli intelligence presence in Afghanistan and on its borders in “Bhutan and Azerbaijan”

Second: My deep analysis for the first time globally of the relationship between the French-Israeli “Chaos Maker” video “Bernard-Henry Levy” in the “Afghan Province of Panjshir”, and the chaos making in the Middle East, the countries of the Arab Spring revolutions, and the role of Israel and the West

    The Egyptian researcher viewed, with great academic and analytical interest, during mid-August 2021, a leaked video of the French-Israeli Jewish writer, known internationally as the “mysterious person”, whose name is “Bernard-Henry Lévy”.

   And he publicly circulated it, and “Bernard Henry Levy” deliberately published it on his page publicly about his meeting with the people of the “anti-Taliban state of Panjshir” and a number of armed militia loyal to it led by “Ahmed Shah Massoud” to incite against the Taliban movement and its affiliates, the Egyptian researcher went in (an intellectual and analytical trend completely different from that of the entire Arab and Islamic world), by not believing the truth, purpose and real purpose of the content of this deliberately circulated and leaked video, as believed by millions around the world – including the leaders of the Taliban movement themselves who rushed to get rid of the insurgents in the anti-Panjshir state to them – especially all the Islamic peoples who hurled insults at “Bernard Henry Levy” as the Egyptian researcher saw and smiled strongly for this huge amount of insults in the “wrong direction”, because I have realized with my understanding of the Israeli and Western intelligence mentality, that:

  “Deliberately displaying something intended to display a specific mental image, and trying to install it publicly and globally, while it is intended to be something completely other than the content issued to us”

     And this analysis applies to me completely to the video of “Bernard Henry Levy” as “deliberately exporting an intelligence image in one direction to distract attention, while what is meant is something else entirely”. So, the Egyptian researcher has viewed and analyzed the situation, as follows:

First: The Israeli-French intelligence maneuver deliberately displaying the video of the French-Israeli Jewish chaos maker “Bernard-Henry Levy” globally to form a “resistance front against the Taliban in the Afghan province of Panjshir” to distract the attention of the whole world and the Taliban leaders themselves about “the real location-based of the Israeli intelligence presence in Afghanistan and on its borders in “Bhutan and Azerbaijan”

    On the other hand, the Egyptian researcher closely follows the Israeli intelligence and military sites, such as: “Breaking Defense Hebrew and Debka” sites, to explain, understand and analyze (how and the mechanism of the response and the Israeli presence in Afghanistan and on its borders, for fear of the extensions of the Taliban armed militias to the Israeli borders), thus threatening the security of Israel itself.

   – Accordingly, the Egyptian researcher stopped at a number of possible Israeli military and intelligence sites precisely on the borders of Afghanistan or even inside it, in coordination with Turkey, mainly, according to the assurances of the Israeli military generals themselves on the Israeli military and intelligence sites, so the serious and first global analysis of the Egyptian researcher came in this framework, by presenting and analyzing future scenarios and the following strategic Israeli tactical and intelligence plans:

The Egyptian researcher found an agreed statement within the Israeli intelligence and military services, regarding:

   “The need for Israel to monitor the movements of armed militias loyal to the Taliban through its Turkish ally, and through joint security coordination between Israel and Turkey, as well as through the Israeli presence itself on the regional borders directly adjacent to Afghanistan”

Therefore, the spread of leaks about (the Israeli intelligence presence in a military base in the state of Azerbaijan on the borders of Afghanistan to monitor the movements of both the Taliban armed militias, and to monitor the Iranian movements themselves), this confirms the previous analysis of the Egyptian researcher on (the connection of the Israeli presence inAfghanistan and its relationship with Bhutan and Azerbaijan states to monitor developments and the situations in Afghanistan for the benefit of Israel and its allies in Central Asia and India).

This applies to the academic analysis of the Egyptian researcher about that (the Iranian and international emphasis is primarily on the discovery of the locations of two Israeli bases on the territory of the state of Azerbaijan near the capital Baku” in mid-October 2021, to monitor the movements of the Taliban movement in Afghanistan, and to monitor the presence of the Iranian army and its extensions), and therefore, this confirms and also applies to the situation and the Israeli presence in the “State of Bhutan” and its borders and heights, which are very close to the Afghan heights and mountain ranges, making it easier for those Israeli military sites, as well as those Israeli intelligence moves, to take the necessary measures and means to destroy the Iranian army and its collaborators from the Taliban leaders fully upon any suspicious or planned move against Israeli, American, or even Indian goals or interests, as a primarily ally to Washington and Tel Aviv, according to the permanent and continuous Israeli assurances of that.

As these (Israeli military bases in the state of Azerbaijan after their unveiling immediately in October 2021), according to pro-Iranian websites, became within the range of (the Iranian Fajr Khamsa missile system), which is able to carry out the task very easily to strike those Israeli military bases in the Azerbaijani capital “Baku”.  And this (confirms that idea, with the Israeli presence on the regional borders adjacent to Afghanistan and Iran to monitor the situation and the Iranian-Afghan movements and its militias), and from here, the logic also applies to “the Israeli intelligence presence in the state of Bhutan and its regional highlands immediately adjacent to Afghanistan, India and China, and to expose the region”.

Perhaps as a result of this Iranian accuracy in revealing those Israeli military sites in “Azerbaijan”, which (the United States of America was forced to warn Israel directly against doing or committing any reckless or hostile act or making any attempt to target Afghanistan or those Iranian missile capabilities on the one hand Azerbaijan), and all the leaks came from the assertion of the United States of America to its Israeli ally, that:

“Israel’s targeting of these Iranian missiles or any other targets inside Afghanistan through these Israeli military bases in the Azerbaijani capital, Baku, will burn Tel Aviv”

 This caused (international intelligence disclosure of those “Israeli military bases in Azerbaijan” to Washington itself, which led to the American request for the Israeli side to withdraw them), with the American assurance directed to Israel, about:

   “The Israeli need not to prejudice these Iranian missile capabilities through the Israeli military bases in Azerbaijan, and not to link them to the Iranian nuclear file, while calling and warning Israel to reduce its military presence or even withdraw its forces from Azerbaijan”

Returning to the Israeli scheme in the state of Azerbaijan, it was “targeting to harass Iran through the attacks as it was planning, and also trying to provoke Iran to respond to the Israeli bombing in the event that it occurs”, with Iran responding by bombing the two Israeli military bases, which are close to the Azeri capital, “Baku”, and that perhaps (an Israeli desire to embarrass Turkey as an ally of the Azerbaijan state), and it is close to the political decision-making centers in Azerbaijan, and therefore (Israel is forcing the Turkish side to intervene to defend Azerbaijan, as an Israeli intelligence and strategic plan from the Israelis point of view, which will lead to a strong conflict between Iran and Turkey due to  situation in Azerbaijan).

But,Turkey has realized the serious consequences that it will have in the event of intervention in Azerbaijan in favor of any party according to the Israeli tactical plan, and at the same time, Turkey does not want the “presence of another competitor or partner such as Israel or even Iran that may share its alliance and control to some extent over the state of Azerbaijan”. Therefore, the United States of America proceeded to warn and warn Israel not to proceed with its endeavors, which (which will mainly return to Israel and from it by targeting it from several Turkish, Iranian and other Asian parties, all of which will negatively return only to the Hebrew state in Tel Aviv and not others), according to the assurances of the US military for military leaders in Israel.

Based on those Israeli intelligence and military movements in “Azerbaijan”, which the Egyptian researcher also linked to the idea and philosophy of the Israeli intelligence presence in the “State of Bhutan” directly on the borders of Afghanistan by signing a peace agreement with it, the most dangerous international analysis of the Egyptian researcher relates to the same Israeli idea  Presented in Azerbaijan, and related to Israel’s policy of “deliberately diverting attention about the places and the reality of its real locations”, so, “Israel may deliberately  leak a video of the Israeli presence in the Afghan state of Panjshir, which is basically anti-Taliban rule and opposition to it, through the French-Israeli Jewish chaos maker, whose name is “Bernard Henry Levy”, as an Israeli attempt to make the “Afghan province of Panjshir itself a strategic target for the Taliban leaders to delude them of their success in striking the presence of Israel and its allies in the Afghan province of Panjshir that opposes the rule of the Taliban”.

The Egyptian researcher reached this dangerous analysis, the first of its kind in the world, due to her strong understanding of the viewpoint and method of work of “Israeli and Western intelligence in general”, that what they present to us and issue to our peoples of a “certain mental image” is not the truth that is intended to be reached, but is intended to access to something else entirely through it.

 Hence, I personally went to follow (the pages of social networking sites and the private Twitter site of the French-Israeli “Bernard Henry Levy”) and to send a public message commenting on the video of “Bernard” referred to, requesting an academic and research interview with him publicly in a post that the Egyptian researcher publicly published on the  Twitter social network that has been read by the whole world for my commenting on Bernard Henry Levy’s meeting with the leaders of the “Afghan Province of Panjshir and its armed militias to support them against the Taliban”,  of course, I did not miss reading the number of insults on the video of Bernard Henry Levy’s meeting with the people of the Afghan province of Panjshir, which were issued mainly from Islamic nationalities, the majority of which are Arab.  And linking all parties, poles, and analyzes to each other, I reached very easily that these insults are what Bernard Henry Levy and those behind him mean, and they are assured of the success of their plan to “distract attention”. And what confirms the validity of an analytical result completely, is (the fall of the Afghan state of Panjshir very easily in the hands of the leaders and militias of the Taliban movement, with absolute ease, after deliberately “Bernard Levy” and those behind him deliberately publish this video so that the leaders of the Taliban movement and the world can watch it).

The tangible evidence of the correctness of my analysis in this regard was my complete knowledge of “how fragile of the Afghan province of Panjshir”, despite it being against the Taliban thought, therefore, I expected its complete fall with absolute ease in the hands of the “Taliban militias”. This is of course what happened, and what he meant Bernard Henry Levy, who leaked a video of his meeting with the people of the “Afghan province of Panjshir” for their support against the armed Taliban militias, and in the full and complete truth, which “Bernard Henry Levy”, knows, that:

   “He completely wants to distract the leaders of the armed Taliban movement around the real presence of the Israeli intelligence in the heart of the Afghan province of Panjshir. Therefore, the drawn intelligence plan is to expedite the leaders of the Taliban movement to get rid of the armed militias in the Afghan province of Panjshir, seize that state and tighten the Taliban grip on it”

Which can be analyzed in my opinion, that Israel intended to publish this video referred to in the “Afghan Province of Panjshir”, as an intelligence plan, aimed at:

   “A delusional perception by the Taliban leaders, who believed that storming and controlling Panjshir province, misses the opportunity for Israel and its security allies to penetrate Afghan territory through the Afghan province of Panjshir and its armed militias that are basically opposed to the Taliban movement and its ideology”

The truth is exactly the opposite of the above. Giving the Taliban leaders the opportunity to achieve “a fictitious victory over Israel and the Western intelligence loyal to it”, which is the required success or the bait that the Taliban leaders swallowed with absolute ease, and even hurried to seize the Afghan province of Panjshir as soon as they deliberately published this video for “Bernard Henry Levy” in his meeting with the people of the Afghan province of “Panjshir” for their support in their “legitimate demand to stand firmly against the Taliban and its militias”.

Hence, the Egyptian researcher was assured of the soundness of her important and complete analysis, that the publication of the video of the internationally known Jewish chaos maker, “Bernard Henry Levy” in the heart of the Afghan province of Panjshir, is nothing, but:

“Deliberately exporting an intelligence image in one direction to distract attention, while the intention is something else entirely”

Also, as the Egyptian researcher tried in another way to track and understand the activity and mechanism work of “Bernard Henry Levy” in general around the world, the Egyptian researcher understood that his main places of existence are “areas of chaos and turmoil constantly, including all countries of the Arab Spring revolutions”, such as: (Syria, Libya  Egypt, Tunisia, South Sudan, the Kurdish regions), and others, and perhaps this is the real reason for calling him globally by the title of “chaos maker”, with his constant presence in places of unrest and revolutions or demands for secession, and his constant encouragement to secession or revolutionaries and rebels wherever he goes to it around the world, especially the countries of the Arab world and the Middle East.

From here, I can analyze the “deliberate leakage of the video of the chaos maker “Bernard Henry Levy” through him personally via Twitter, despite (he knew in advance that he endangered the safety of the people of “Panjshir State” as soon as he deliberately published and broadcast this video, and this was so clear and doesn’t need a discussion, which caused them severe harm from the leaders and militias of the Taliban movement after storming the state of Panjshir after “Bernard Henry Levy” deliberately published this video on his page on the “Twitter”), which reinforces the main hypothesis of the Egyptian researcher, that what happened by “Bernard Levy” towards the people of Panjshir province against the Taliban, it is “a clear moral betrayal in the first place for the sons of “Panjshir”, and then actually causing them to be targeted by the Taliban’s incursion into the state, and then to confuse – which is the most important thing – about another goal nearby in which Israel is present near Afghanistan”.

And what I analyzed in this regard, that the intentional leakage of this video by its owner in the first place, enhances that “intelligence mental image” that Israel and other intelligence agencies cooperating with it wanted to communicate to the peoples of the Islamic world in the first place and its intelligence systems and even the leaders of the Taliban movement on their head, by showing a video  The French-Israeli Jewish chaos maker “Bernard-Henri Levy” in Afghanistan and his meetings with the leaders of “Panjshir Province” against the “Taliban movement” and its affiliates, not with the aim of sympathizing with them or supporting them, but with the aim of defaming them, and handing them over to the leaders and militias of the Taliban movement, and this is another problem that has not been addressed  Before about “the possibility of sacrificing those who share their goals in order to achieve a greater goal”, and this is precisely what was done with the intention of deliberately leaking the video, although I reserve the word “leak”, because it was deliberately published and not leaked as circulated by a number of Arab websites and Islamic countries.

Hence, my analysis, which I concluded as follows, is that the leak of the video referred to by “Bernard Henry Levy” personally through social networking sites and the “Twitter” site, and even “left the whole world preoccupied with the leaked video of its owner mainly in public and not a secret leak without his knowledge, reinforces the hypothesis of the Egyptian researcher”, which the Egyptian researcher analyzed in depth, that:

    “leaking deliberately this video is nothing, but an Israeli intelligence maneuver with a French and perhaps American partnership, and perhaps with the participation of a number of international intelligence services cooperating with them in order to draw the attention and attention of the whole world to the location of the real presence of the Israeli intelligence and all the intelligence services cooperating with Tel Aviv, “Bernard Levy Henry” personally leaked this video, contrary to the truth for what it is intended for reaching”

Additionally, when the Egyptian researcher entered the social networking sites of “Bernard Henry Levy” to try to understand or read any comment from him or comment about the publication of this video and the timing of its leakage in the first place or such matters, but I found that it is not a leaked video as we arrived in the Arab world and in the region, but I found that “Barnard” himself was the one who deliberately put it and presented it globally on his Twitter page in the first place, so I have written  a public message on Bernard’s Twitter page, commenting on the video of Afghanistan and his meetings with the people of the Afghan state of Panjshir, in which I asked to meet him to do an academic analysis  I researched with him about this video, but my request was rejected and ignored to analyze the video academically, research and analytically.  Therefore, from here we fully understand the following analysis:

     “It is absolutely inconceivable that a video of the intelligence of Israel, France, and perhaps India as their ally, as well as other intelligence services cooperating with them, and sacrificing their interest with the utmost ease, which proves my analytical view that the “video of the French Jewish chaos maker” Bernard-Henri Levy”, is nothing but a kind of distraction about that Israeli-French intelligence maneuver by deliberately showing the video of the French-Israeli Jewish chaos maker “Bernard-Henry Levy” globally to form a “resistance front against the Taliban in the Afghan province of Panjshir” to distract the attention of the whole world about “the truth and location of the Israeli intelligence presence in Afghanistan and on its borders, and all the intelligence agencies cooperating with it”.

After all those events that accompanied the presentation of this aforementioned video, the Egyptian researcher continued to follow the method and mechanism of work of “Bernard-Henry Levy” during his previous work for a long time, whether as “an official military correspondent for France in Afghanistan”, based on a personal choice of his friend, the French President.  The former Sarkozy, or the analysis of other visits to him in this way in the “State of Panjshir” in many and multiple countries that witnessed turmoil or severe crises or demands for secession and division, and others, I was amazed at what I witnessed and analyzed from the amount and volume of information circulated about “Bernard” and the most important thing to me now  It became (attempting to understand the meaning, purpose, or purpose of “Bernard Henry Levy” deliberately publishing those many videos in different parts of the world, which he personally involved in those countries for sitting among their revolutionaries, or carrying a weapon openly with their armed militias, as in cases of separation and division that  He supported it, such as South Sudan, or for his permanent support for secession demands, as in the Libyan and Kurdish cases), emphasizing his intention to publish all his videos and pictures publicly through his social networking pages and wearing circulating leaks, as is rumored in the Arab world.  and the Islamic, which is something that is worth stopping at analytically and in research to try to understand:

“The nature of the role or work that Bernard Levy is doing, and in whose interest, and even who is behind it in the first place?”

Perhaps for all these facts that I mentioned, the nickname “Bernard” among the French and the world has become a “chaos maker” or a “mysterious figure”, and the big question about him, especially with his nickname circulating among the French, that he is the “inspirer of former French President Sarkozy”, his data bank and his close advisor.  We find that despite the intertwining of all these data about Bernard, as I mentioned, in his relationship with Afghanistan and the countries of the “Arab Spring revolutions” and others, which some of us in the region may not understand, given the difficulty of being familiar with that Asian region to a great extent.

   Therefore, the Egyptian researcher was able to link all these data, interactions and previous scenarios together, which are matters that linked them and the Egyptian researcher stopped at them a lot, given (the announcement of Israel in December 2020, signing an agreement to establish diplomatic relations with the state of Bhutan), as a small and remote kingdom in the Himalayas south of the Himalayas, in the middle of the line of Asia, specifically between India and China, and this coincided with the Egyptian researcher’s attempt to analyze this and link it to the Israeli presence in the state of Azerbaijan on the borders of Afghanistan and Iran together to monitor their movements and detect it in mid-October 2021 through mainly Iranian leaks, and also according to  my situation and assumption from the beginning is basically a different perception related to the location of the Israeli intelligence presence in Afghanistan, completely away from the “Afghan state of Panjshir”, according to the Israeli promotion through “Bernard Henry Levy” video and the regional relations between China and India, but rather the withdrawal of this on “political normalization with the UAE and the countries of the Middle East”, as I have analyzed earlier, through the “employment mechanism for the political and psychological value of the “happiness index” pursued and adopted by the state of Bhutan since its establishment and inception, and its promotion and dissemination in the Emirates before the start of the stage of signing a peace agreement with it”. This may be withdrawn later through several countries in the region, with which Israel plans to start political normalization.

Second: My deep analysis for the first time globally of the relationship between the French-Israeli “Chaos Maker” video “Bernard-Henry Levy” in the “Afghan Province of Panjshir”, and making the chaos in the Middle East, Arab Spring countries revolutions, and the role of Israel and the West towards them

   When the Egyptian researcher tried to follow and understand the activity and mechanism of work of “Bernard Henry Levy” in general around the world, the Egyptian researcher understood that “Bernard Levy” is a Jew of religion, and has strong relations with Tel Aviv.  In Afghanistan and the world, and what caught the Egyptian researcher’s attention to him are those old photos that he himself published, which were taken of him more than a year ago, to form a “resistance front against the Taliban”, made up of “the militias of the Afghan province of Panjshir led by “Ahmed Shah Massoud”, Knowing that “Panjshir Province”, asit was (the only state that was not subject to the Taliban movement), but once the video of “Bernard Henry Levy” was leaked, the Egyptian researcher analyzed for the first time globally the relationship between the video of “Bernard Henry Levy” in the Afghan state of Panjshir, and linking it to the relations of Israel and the West in general with the Middle East and the countries of the Arab Spring revolutions, as follows:

The validity of the Egyptian researcher’s analysis and her attempt to prove her previous theory may come from the angle of (Israel’s attempt to play to swallow the Taliban leaders for the bait or the trap set for them by going to the anti-Afghan province of “Panjshir” and controlling it, in the belief of the Taliban leaders and the Islamic world, that  Israel is playing there in the “Afghan Province of Panjshir” while the truth is completely different and the evidence that proves the correctness of my hypothesis and my referred theory, is that within a few weeks of the referred publication video by “Bernard Henry Levy” in the “Panjshir State” that has been stormed by  Taliban militias, and they were completely controlled and the movement of the Afghan province was paralyzed in favor of the Taliban leaders, and this was exactly what was required, by following the “game of delusion or projection or making political illusion” or “installing and fabricating content” and then displaying it in public to distract attention from the real goal of what is happening in  Afghan mandate by Israeli and Western intelligence.

We find that “Bernard Henry Levy” may have succeeded in one way or another in his mission completely after everyone in Afghanistan started talking about “the mysterious political role in Afghanistan and other places of turmoil in the Arab and Islamic world in the first place” by the French “Bernard Henry Levy”, known for his constantly presence in “chaos areas” around the world, through his movements and stances, which raise many question marks.

On the other hand, reviewing the reasons for the fear of any moves made by “Bernard” is also reinforced by looking at his various precedents in the same context. For example, we find that “Bernard-Henri Levy” was one of the most prominent French-Israeli thinkers who relentlessly criticized the “socialist ideas, Communism and nationalism”, and he considered them moral evils, and this is what he expressed in his book, which bore the title of (Barbarism with a Human Face), published in 1977, and then his other book (God’s Will).

It was also known that “Bernard Henry Levy” employed what he inherited from his Jewish father of Algerian origin in encouraging all “Israeli expansionist projects”, which was what the Egyptian researcher observed in the leadership of “Bernard Henry Levy” and his leadership of a group of fanatical Jews in order to establish (philosophical Institute of Levy, located in Jerusalem, Israel), and Bernard Levy is one of the most affected by ideas hostile to the Islamic faith, such as his view that “the veil is an invitation to rape”, and Bernard Levy Henry believes that (the extremist Islamic movements were not a product of Western anti-Islam behaviors.  Rather, from Bernard Levy Henry’s point of view, it is deep and rooted in the Islamic faith that calls for violence, and it is one of the most serious dangers threatening the West, such as fascism threatened it in the recent past), besides his other statement:       

   “Military and political interference in the affairs of the Arab and Islamic world is not considered an imperialist violation. Rather, it is a legitimate right of the civilized West and a sacred duty that must be carried out quickly and without hesitation. His goals are all centered on dismantling Arab and Islamic entities, and seeking to fragment them.  And scatter it, destabilize its security and tamper with its stability, so that it does not have a list!”

Here, the Egyptian researcher found that the French philosopher (Michel Onfray) was the first to criticize the positions of “Bernard Levy“, and he explicitly saw in him the description of (a philosopher complicit with suspicious world plans), and he considered him (an igniter of fire, a merchant of wars). Theprominent French philosophers, such as: “Prof.Gilles Deleuze”, his professors “Jacques Derrida and the historian Pierre Vidal Naquet”, called him a “cultural deception”, as the philosopher Cornelius Castoriadis called him “the empty prince and the criminal opportunist”.

The most prominent (areas of chaos) in which the responsibility of “Bernard Henry Levy” was announced as a chaos maker in the countries of the Arab Spring revolutions in the Middle East and the region, as follows:

When “Bernard Henry Levy” visited Libya in 2011 and demanded that “NATO intervene in the Libyan conflict and division”, and the strangest thing for the Egyptian researcher is that Bernard Levy personally lowered the green flag adopted by Libya in response to the 1977 Camp David agreements, related to the Israeli peace agreement with Egypt. Bernard Levy raised the old Libyan royal flag, which was in effect in the fifties and sixties, before the late Libyan president, Colonel “Muammar Al-Qathafi”, overthrew the Libyan monarchy, overthrew the rule of the former Libyan king “Idris Al-Senussi” and put in place a “ready-made partition map of Libya”. Bernard-Henry Levy also attended the meetings of the “delegations of the Libyan Transitional Council with former French President “Sarkozy” with a number of French officials, and “Bernard-Henry Levy” was active in arranging (the intervention of NATO forces in Libya).  He conveyed a message from one of the leaders of the Libyan movement to the former Israeli Prime Minister “Benjamin Netanyahu” and conveyed to him again his response to it.

 Bernard Henry Levy was also present in the “Kurdistan Region of Iraq”, and his adoption and encouragement of the idea of ​​a referendum on the independence of the Kurdistan Region from Iraq.

 Also, the strange presence of the mysterious French Jew “Bernard Henry Levy” in Sudan, and “Bernard Levy” was one of the fiercest advocates of international intervention in the “Darfur of North Sudan”.

Bernard Levy’s permanent encouragement for (the secession of southern Sudan from the north), and his encouragement of the plan for “the armed conflict of southern Sudan and the division and fragmentation of Sudan into several parts”. Here we find Bernard Henry Levy’s video interviews published with the (armed militias of Sudan) to encourage them to secede from the north and form a separate and independent government and region in “South Sudan” to secede to break up Sudan.

The same thing has been repeated in (Syria), with Bernard Henry Levy inciting the West to intervene in the Syrian interior, during which Bernard Levy called to support the Syrian revolutionaries to overthrow the regime of “Bashar Al-Assad”, and his actual meeting with the armed militias working against “Bashar Al-Assad”.

Here, we also notice Bernard-Henry Levy’s exploitation of the so-called “Arab Spring” revolutions, with his public appearances in front of the lenses of photographers and his daily field participation in the demonstrations that swept the “streets of Tunisia” before the fall of the late Tunisian President “Zine El Abidine Ben Ali”.

The most dangerous thing for the Egyptian researcher, as she is an Egyptian identity, is the mysterious, sudden, and even recurring appearance of the French “Bernard Henry Levy” in the heart of “Tahrir Square in the center of Cairo during the period of the Egyptian revolution of January 25, 2011”, and the strangest thing is that “Bernard Levy” distributed  Food on the Egyptian protesters and revolutionaries in the heart of the “Egyptian Tahrir Square in central Cairo”, without anyone recognizing it in the famous Egyptian Square that witnessed the Egyptian revolutions on (January 25, 2011 or June 30, 2013).

  Through the previous presentation of tracking and understanding the activity and mechanism of work of “Bernard Henry Levy” in general around the world, the Egyptian researcher understood that the “intelligence mental image” that is intended to be communicated to us by displaying public videos and pictures of Bernard Levy, and then deluding us every time that it is  Leaked photos or videos, without his knowledge, that the primary role of Bernard’s policy may have been part of “Israeli or Western intelligence maneuvers, all of which drew the attention and attention of the whole world to a certain point in order to plant an idea about something in another direction far from the destination of what is being circulated”. This is what happened with us in the Afghan case, and I analyzed it very carefully, as I mentioned.

Associate Professor of Political Science, Faculty of Politics and Economics / Beni Suef University- Egypt. An Expert in Chinese Politics, Sino-Israeli relationships, and Asian affairs- Visiting Senior Researcher at the Centre for Middle Eastern Studies (CMES)/ Lund University, Sweden- Director of the South and East Asia Studies Unit

Continue Reading
Comments

Intelligence

Somalia: Security Council adopts resolution to keep pirates at bay

Published

on

Suspected pirates wait for members of the counter-piracy operation to board their boat. US Navy/Jason R Zalasky

The UN Security Council on Friday adopted a resolution to combat the continuing threat of piracy off the coast of Somalia, as shipping and protection measures to keep vessels safe, have returned to levels not seen since before the COVID-19 pandemic.

The Secretary-General’s latest report on the situation in the country illustrates that joint counter-piracy efforts have resulted in a steady decline in attacks and hijackings since 2011.

However, although piracy off the coast of Somalia has been “repressed”, the ongoing threat of resurgence remains.

As such – under Chapter VII of the Charter, which provides for enforcement action – the Security Council adopted Resolution 2608, which, among other things, condemns piracy and armed robbery at sea off the Somali coast, underscoring that it exacerbates instability by introducing “illicit cash that fuels crime, corruption and terrorism”.

Making amends

Through its resolution, ambassadors said that investigations and prosecutions must continue for all who “plan, organize, illicitly finance or profit from pirate attacks off the coast of Somalia”.

The Somali authorities were called upon to put in place mechanisms to safely return effects seized by pirates and to patrol the coastal waters to prevent and suppress future acts of armed robbery at sea.

At the same time, they were requested to bring to justice those using Somali territory to “plan, facilitate, or undertake criminal acts of piracy and armed robbery at sea”.

Member States were asked – at the request of the Somali authorities and with notification to the Secretary-General – to strengthen maritime capacity in the country and to appropriately cooperate on prosecuting suspected pirates for taking hostages.

The resolution also encourages the Somali Government to accede to the UN Convention against Transnational Organized Crime, and develop a corresponding legal architecture as part of its efforts to target money laundering and financial support structures on which piracy networks survive.

Authorization to fight piracy

The Security Council renewed its call to States and regional organizations to deploy naval vessels, arms, and military aircraft to combat piracy, and stressed that the importance of international coordination.

At the same time, the resolution authorized – for a further three-month period – States and regional organizations cooperating with Somali authorities, to fight against piracy and armed robbery at sea off Somalia, “for which advance notification has been provided by Somali authorities to the Secretary-General”.

Calls to action

Through its resolution, the Council called upon all States to “take appropriate actions…to prevent the illicit financing of acts of piracy and the laundering of its proceeds…[and] to criminalize piracy under their domestic law”.

Countries were also petitioned to cooperate in the investigation and prosecution of anyone responsible for or associated with acts of piracy and armed robbery off the coast of Somalia, including international criminal networks.

Resolution 2608 welcomed the continued work of the UN Office on Drugs and Crime’s (UNODC) Global Maritime Crime Programme to ensure that those suspected of piracy are prosecuted, and those convicted, imprisoned in accordance with international legal standards.

Finally, the resolution recognized the International Maritime Organization’s (IMO) role concerning privately contracted security personnel on board ships in high-risk areas and welcomed its continued anti-piracy role – particularly in coordination with UNODC, the World Food Programme (WFP), the shipping industry and all other parties concerned.

Continue Reading

Intelligence

ISIS-K, Talc, Lithium and the narrative of ongoing jihadi terrorism in Afghanistan

Published

on

Terrorism

Chinese and Russian efforts are underway to strengthen the Taliban government economically and militarily, along with legitimacy and international recognition. In return, Pakistan is trying to disrupt the Taliban government’s relations with Iran and Tajikistan, as well as with China and Russia. Subsequent to the fall of the previous republican government, following Russia and China, Iran is a major supporter of the Taliban.

Iran plays a significant role in a new intelligence surge launched by major regional players in Afghanistan, which includes ISIS-K campaign against the Taliban government in country. Although Taliban have been able to crush, ISIS-K in several provinces of Afghanistan, but the group was able to mobilize a bunch of other terrorist organizations such as Turkistan Islamic Party, Khetabat Iman Ul Bekhari, Khetabat ultauhied Waljihad, Islamic Jihad Union, Jamaat Ansarullah and East Turkistan Islamic Movement, and The Army of Justice. According to sources on the ground, the group has also established contacts with the resistance front led by Ahmad Massoud to fight Taliban.

Seemingly, the group joined forces with the Resistance Front in northern part of the country to downfall the Taliban particularly in northern Afghanistan.  In addition to defeating the Taliban in the central and southern provinces of Afghanistan, the group has started a sectarian war between the Sunnis and Shiites, which has partly soured relations between the Afghan Taliban and Iran. The group had the support of Pakistan as well as other regional countries and beyond.  Furthermore, Lashkar-e-Taiba fighters entered Afghanistan with the help of the Pakistani army, joining the fight between Sunni and Shia in Afghanistan.  Efforts are underway to start a civil war in the country.  According to the information, ISIS militants have been mostly funded and financed by the Saudi government, as well as other Salafi Gulf States to minimize and even eradicate Shiites in the region.

In accordance with some sources, additional costs are being borne by the United States and Great Britain.  Beside all such financial support, Islamic State (ISIS-K) militants also obtain some funding and thrive through mining and establishing business firms throughout the region.

Let us say, Islamic State militants relatively control the oil reserves in Iraq and they illegally extract it, meantime they have hands on talc and other precious stones in Afghanistan to cover their propaganda campaign expenses. ISIS-K uses the same tactics applied by Taliban during the US occupation; Taliban began illegal mining in Afghanistan to finance their activities in order to wage the war against the US aggression.   During the Taliban’s resistance, Taliban fighters had also a strong financial support from Pakistan, and the Pakistani government accordingly received that financial sustenance from other countries namely western and the Arab world.  However, the Taliban forcibly mined Afghanistan’s lapis lazuli and smuggled it to Pakistan. Under the auspices of the Pakistani government, the gems were shipped to the United States and the European countries.  In return, the Taliban were paid in cash.  Likewise, the Taliban, ISIS chose the same path, and made the most of money via mining in Afghanistan.

Subsequently, the ISIS group has chosen Nangarhar province as its stronghold in Afghanistan, since it has mineral deposits of talc, chromite, marble and other precious and rare earth minerals in addition, the group is also trying to control smuggling routes, to launch cross border terrorism.

 Consequently, ISIS-K endeavors to bring Ghazni province under its control, since a huge Lithium, mine exists in the province. The group is well aware of its preciousness in the world market because the element is mainly used by automotive industries to produce batteries for electric cars.

The anti-corruption network of the former Afghan government reported that the Taliban and the Islamic State together received about 46 million in 2016 thru illegal mining from a single district of Nangarhar province. That is why ISIS has spent millions of dollars in Afghanistan because of holding its campaign and propaganda, allegedly, most of which came from mining.

Furthermore, district governors have been appointed by ISIS for Afghanistan’s 387 major districts, with a monthly salary of up to 80,000 Afghanis.  This is a huge financial burden for the Islamic State, but the Islamic State group’s representatives say that they stick to their words, so that everyone will be paid on time. The ISIS group needs a large amount of financial support to achieve its major goals, but the group is not overstrained financially, because it receives a chockfull financial support.

Conversely, Iran is trying to increase the number of Shiite orientated proxies in the world and especially in Afghanistan to eliminate ISIS-K in return; the Saudi and other Gulf Sates want to prevent it. Therefore, they use ISIS and other associates of the group to counter Iran’s ambitious trans-national agenda; ISIS-K takes advantage of having been provided with huge financial support by anti-Iran camp.

Iran has repeatedly tried to spread Shia religion around the world, most notably at Mustafa International School in Bamko, the capital of Mali in Africa.  There have been several attempts by the Iranian government to convert the students to Shi’ism, an issue that has become the topic of international debate supported by Saudi Arabia.  Finally, all of these events are currently having a direct and indirect impact on Afghanistan and the country’s ongoing security crisis, which will affect the entire region at the end.

Continue Reading

Intelligence

The means to manage cyberspace and the duty of security

Published

on

Over and above the ethical concepts regarding the near future, it is also good to focus on the present. Governments are required to protect their national resources and infrastructure against foreign and domestic threats, to safeguard the stability and centrality of human beings and political systems and to ensure modern services for civilians. Suffice it to recall the chaos that arose some time ago in the Lazio region for the well-known health issues.

Governments must play a key role in developing and leading the local ecosystems, but this national effort must involve many other stakeholders: local businesses, entrepreneurs, multinational companies, local and foreign investors, State agencies, Ministries and academics, people in education, professional institutions and the public at large.

Furthermore, cybersecurity is a national opportunity for developing the local economy and for positioning any country in the international arena as a safe place to establish and develop economic relations between States and companies. It is also important as a regional cyber hub.

Cyber strategy therefore consists in prioritising operational cyber activities with a view to optimising and monitoring the overdevelopment of cyber intelligence that could one day take such turns as to be ungovernable.

This is the reason why investment in technology, local capacity building and resource allocation and concentration are required. This means providing strategic advisory services to government agencies that are seeking to advance cyber security at a strategic and operational level.

It is therefore necessary to work with governments to develop their strategic and operational capabilities in cybersecurity, either at the national or sectoral level, as well as providing comprehensive cyber projects that combine cyber defence and the development of a local cyber ecosystem, based on the models tried and tested by various countries around the world, such as the People’s Republic of China, Israel, the United States of America, etc.

There is a need to specialise in setting up Cyber Units and Cyber Centres (SOC & Fusion Centres) and in developing Cyber Eco-Systems and Cyber Strategies. This means providing various cyber solutions, services and know-how to companies in various sectors, such as financial, industrial, energy, health, technology and many other sectors.

Stable OT (operational technology) security services and strategic advice to companies in the fields of energy, manufacturing, security, medicine, transport, critical infrastructure and many others create the prerequisites for defending cyberspace. As well as helping OT-based organisations integrate cybersecurity into their processes and products. Design, develop and deliver advanced technologies and solutions to protect critical assets in OT environments, such as ICS, SCADA, IIoT, PLC, etc.

In this regard there is a basic need for creating professional IT schools around the world that teach the meaning of cyberspace, and not just how to use Word and other simple Office programs.

The expansion and creation of universities and institutes of cyber knowledge is a starting point from which partnerships are launched with organisations seeking to create their own cyber schools or with academic or educational organisations offering cyber training to their students.

Providing comprehensive solutions for IT schools, enables the training of IT professionals and new recruits in all IT roles, so that hackers do not remain the sole repository of digital truth. Advanced training is a solid starting point for organisations seeking to train their IT professionals. Professionals who can manage and master schemes such as Cyber Defender, Cyber Warrior, Cyber Manager, SOC Analyst, Digital Forensics, Basic Training and many others, including through the use of simulation.

Leading the creation and development of the high-level cybersecurity ecosystem is a duty of States towards the citizens who elect their leaders. The same holds true for seeking and employing highly experienced experts in the various security subject matters, including strategic cyber defence, cyber warfare, cyber intelligence, cyber research and development and cyber strategy, as well as defining training policies for these branches of operation.

Having examined the prerequisites for protecting cyberspace, it is worth addressing the structure of some of the risks faced by institutional network systems.

One of the most typical operations made by hackers relates to the use of client/server technology to combine several computers as a platform to launch DDoS (Distributed Denial of Service) attacks against one or more targets, thus exponentially increasing damage.

A malicious user normally uses a stolen account to install the DDoS master programme on a computer. The master programme will communicate with a large number of agents at any given time and the agent programmes have been installed on many computers in the network. The agent launches an attack when it receives an instruction. Using client/server technology, the master control programme can activate hundreds of agent programmes in a matter of seconds.

A DDoS uses a group of controlled machines to launch an attack on a computer, be it server or client. It is so fast and hard to prevent that is therefore more destructive. If we consider that in the past network administrators could adopt the method of filtering IP addresses against DDoS, it becomes more difficult to prevent such actions today. How can measures be taken to respond effectively?

If the user is under attack, defence will be very limited. If there is a catastrophic attack with a large amount of traffic pouring onto the unprepared user, it will very likely that the network will be paralysed before the user can recover. Users, however, can still take the opportunity to seek defence.

Hackers usually launch attacks through many fake IP addresses. At that juncture, if users can distinguish which IPs are real and which are fake – and hence understand from which network segments these IPs come – they can ask the network administrator to change them. Firstly, the PCs should be turned off to try to eliminate the attack. If it is found that these IP addresses are coming from outside rather than from the company’s internal IP, a temporary investigation method can be used to filter these IP addresses on the server or router.

The solution would be to discover the route through which the attackers pass and block them. If hackers launch attacks from certain ports, users can block these ports to prevent intrusion. After the exit port is closed, all computers cannot access the Internet.

A more complex method consists in filtering the Internet Control Message Protocol (ICMP), a service protocol for packet networks transmitting information regarding malfunctioning, monitoring and control information or messages between the various components of a computer network. Although it cannot completely eliminate the intrusion during the attack, filtering the ICMP can effectively prevent the escalation of the aggression and can also reduce the level of constant damage to a certain extent.

The DDoS attack is the most common attack method used by hackers. Some conventional methods of dealing with it are listed below.

1. Filter all RFC1918 IP addresses. The RFC1918 IP address is the address of the internal network, such as 10.0.0.0, 192.168.0.0, 172.16.0.0, etc. These are not fixed IP addresses of a particular network segment, but confidential local IP addresses within the Internet, which should be filtered out. This method serves to filter out a large number of fake internal IPs during an attack, and can also mitigate DDoS attacks.

2. Use many PCs to resist hacker attacks. This is an ideal response phase, if the user has sufficient ability and resources to enable a defence against hackers who attack and continue to access and take over resources. Before the user is fatally attacked, the hacker has little means to control many PCs. This method requires considerable investment and most of the equipment is usually idle, which does not correspond to the actual functioning of the current network of small and medium-sized enterprises.

3. Make full use of network equipment to protect resources. The so-called network equipment refers to load balancing hardware and software such as routers and firewalls, which can effectively protect the network. When the network is attacked, the router is the first to fail, but the other devices have not yet collapsed. The failed router will return to normalcy after being restarted and will restart quickly without any loss. If other servers collapse, their data will be lost and restarting them is a lengthy process. In particular, a company uses load balancing equipment so that when a router is attacked and crashes, the other will work immediately. This minimizes DDoS attacks.  

4. Configure the firewall. The firewall itself can resist DDoS and other attacks. When an attack is discovered, it may be directed to certain sacrificial hosts, which are able to protect the actual host from the attack. The sacrificial hosts may obviously choose to redirect to unimportant hosts or to those having systems with fewer vulnerabilities than some operating systems and with excellent protection against attacks.

5. Filter unnecessary services and ports. Many tools can be used to filter out unnecessary services and ports, i.e. filter out fake IPs on the router. For example, Cisco’s CEF (Cisco Express Forwarding) can compare and filter out Source IP and Routing Table packets. Opening only service ports has become a common practice for many servers. For example, WWW servers open only 80 ports and close all the others or use a blocking strategy on the firewall.

6. Limit SYN/ICMP traffic. The user must configure the maximum SYN/ICMP traffic on the router to limit the maximum bandwidth that SYN/ICMP packets can occupy. Therefore, when there is a large amount of SYN/ICMP traffic exceeding the limit, this means it is not normal network access, but hacking. In the beginning, limiting SYN/ICMP traffic was the best way to prevent DDoS. Although the effect of this method on DDoS is currently not widely used, it can still play a certain role.

7. Scan regularly. Existing network master nodes should be scanned regularly, checked for security vulnerabilities and new vulnerabilities cleaned up promptly. Computers on backbone nodes are the best locations for hackers to use because they have higher bandwidth. It is therefore very important to strengthen the security of these hosts. Furthermore, all computers connected to the major nodes of the network are server-level computers. Hence regular scanning for vulnerabilities becomes even more important.

8. Check the source of the visitor. Use suitable software to check whether the visitor’s IP address is true. This should be done by reverse-searching the router: if it is fake, it will be blocked. As said above, many hacker attacks often use fake IP addresses to confuse users and it is hard to find out from where they come. Therefore, for example, the use of Unicast Reverse Path Forwarding can reduce the occurrence of fake IP addresses and help improve network security.

As seen above, we need experts who know more than hackers, and this is the duty that States and governments have towards their institutions, but primarily towards their citizens.

Continue Reading

Publications

Latest

Economy2 hours ago

Fashion Week & Sustainability

Fashion is always fun and constantly evolving. Old fashion styles are still being popular and new trendy styles are being...

Development4 hours ago

Strong Producer Organizations Key to a Vibrant Farming Sector

Scaling up agricultural production among small farmers through clustering and organizing them into cooperatives and various types of producers’ organizations,...

Energy News6 hours ago

Renewable electricity growth is accelerating faster than ever worldwide

The growth of the world’s capacity to generate electricity from solar panels, wind turbines and other renewable technologies is on...

Intelligence8 hours ago

Somalia: Security Council adopts resolution to keep pirates at bay

The UN Security Council on Friday adopted a resolution to combat the continuing threat of piracy off the coast of...

Africa Today10 hours ago

Rights experts call for end to violence against women in Tigray conflict

Experts appointed by the UN Human Rights Council have called for urgent action to end violence against women and girls...

Human Rights12 hours ago

‘Bodyright’ campaign launched, to end rise in gender-based violence online

Corporate logos and Intellectual Property (IP) receive “greater protection online than we do as human beings”, the UN’s women’s health agency that works to end gender-based violence, UNFPA, said on Thursday, launching a new...

Africa14 hours ago

Gender Equality at the Expense of Democracy in Africa

At a first glance, the Transitional Charter released by the Comité national du rassemblement et du développement (CNRD), the junta...

Trending