June 18, 2022No Comments

Food Security at Risk in Africa

Author: Alessandra Gramolini.

Before and during the Russian-Ukrainian conflict

Russia and Ukraine are not only the world’s biggest producers of wheat, they have also been the cheapest exporters on the market. This made them very attractive to low-income countries. Over 40% of wheat consumed in Africa usually comes from Ukraine and Russia. The war interrupted global markets and trade flows to Africaincreasing even more food prices in the region. Ukrainian ports in the Black Sea have been widely blocked for exports since the conflict began. Kyiv and its allies blame Moscow for blocking the ports. Even countries that import little from the two countries are indirectly impacted by higher world prices for key commodities.

Before the war in Ukraine, African countries were already struggling with the increase of food prices due to extreme climate and weather events and also after two year of Covid-19 pandemic,. Since the Russia-Ukraine conflict began, global food prices have reached new heights. Five weeks into the Ukraine war, disruptions are more severe and food prices are even surpassing the levels of the 2008 global financial crisis. The United Nations Food and Agriculture Organization’s (FAO) Food Price Index, affirmed that international wheat prices rose for a fourth consecutive month in 2022. The March index is the highest it has been since the measure was created in the 1990s. In 2020 alone, Africa imported $4 billion and $2.9 billion worth of agricultural products from Russia and Ukraine. With this war in Ukraine, about 20 million people in the Sahel and West Africa do not have access to sufficient food. 

In Egypt, wheat is the main food item, and the Egyptian government imports about 50 to 60 percent of its cereal from Russia and Ukraine, despite the government’s efforts to diversify imports following the 2008 global food crisis. Egypt had to borrow three billion dollars from the International Islamic Trade Finance Corporation (Itfc), an Islamic finance instrument based in Saudi Arabia. Countries like Tunisia imported 50% of their grain needs exclusively from Russia and Ukraine. For the moment, Tunisia claims to have stocks, but to avoid food riots, as happened in the Arab Spring, basic products are subsidized and controlled by the government. Algeria, the second largest African wheat consumer after Egypt has also imposed moderate prices.

Additionally, according to the UN, Russia is the highest exporter of nitrogen fertilizer and the second-highest exporter of phosphorus and potassium fertilizer globally.  Several African countries rely on importing these Russian fertilizers, including Cameroon, Ghana, Senegal and Kenya. But following severe economic sanctions against Russia, its ability to sell fertilizer globally has taken down, precipitating a major shortage. In Kenya, farmers are scaling back on farming because of the exorbitant fertilizer prices that would certainly affect their profits. Others plan to avoid fertilizing their farms, especially olive and orange groves farmers. This will lower production and, of course, the quality. The pressure and prices will likely increase further as the war continues, raising food security concerns, with citizens beginning to feel the impact.

Image Source: https://www.wfp.org/news/hunger-west-africa-reaches-record-high-decade-region-faces-unprecedented-crisis-exacerbated

Alarm from aid agencies

Aid agencies have also felt the impact of rising prices. The World Food Program (WFP) used to buy more than half of its grain from Ukraine and Russia. The organization now spends an additional $71 million a month to reach the same number of people it did before the conflict. That money could be used to provide daily food rations to four million people for a month. The activities of the WFP in West and Central Africa have started to suffer too. The aid agency supports national school feeding programmes that run independently. But some governments are now asking the WFP for help, because they can no longer afford some food products. The WFP also distributes cash for people in the region to buy food, but with soaring prices this is not an effective solution. 

A recent FAO-WFP report issued today calls for urgent humanitarian action in 20 ‘hunger hotspots’ where acute hunger is expected to worsen during summer 2022. The effects of the war in Ukraine are expected to be particularly severe where economic instability and high prices combine with drops in food production due to climate events such as recurrent droughts or flooding. 

“We are deeply concerned about the combined impacts of overlapping crises jeopardizing people’s ability to produce and access foods, pushing millions more into extreme levels of acute food insecurity,” said FAO Director-General QU Dongyu. “We are in a race against time to help farmers in the most affected countries, including by rapidly increasing potential food production and boosting their resilience in the face of challenges.” 

Qu Dongyu called on Mediterranean countries to work together to avoid the risks to food security aggravated by the Russia-Ukraine conflict. “We must keep our world food trade system open and ensure that agri-food exports are not limited or taxed”, he said a few days ago during a summit on the food crisis in the Mediterranean area. He then illustrated the main steps on which this cooperation should focus on: greater investments in the countries most affected by the current increase in food prices; reduction of food losses and waste; better and more efficient use of natural resources; and finally, great attention to technological and social innovations that can significantly reduce the losses of the agricultural market. 

What are the consequences?

Some analysts argue the Kremlin is hoping that a possible food crisis will put political pressure on the West by provoking new refugee flows towards Europe from food-insecure countries in the Middle East and Africa.

“The situation is forcing hundreds of thousands of people to move to different communities and to live with host families who are already living in difficult conditions themselves. There is not enough food, let alone food that is nutritious enough for children. We must help them urgently because their health, their future and even their lives are at risk,” said Philippe Adapoe, Save the Children's director for West and Central Africa. The war is starting to push families to the brink of survival and increasing also the risk of violence against women. Hibo Aden, women's rights officer at ActionAid Somaliland, said the situation has become so desperate for some families that girls are forced to marry in exchange for food and water. 

The presence of unstable conditions and civil wars further aggravate the scenario. Many people in African countries will have problems accessing better hygiene, health, or school conditions, given that the family's spending power will be dedicated to the purchase of food at higher prices. Furthermore, phenomena of internal conflict are beginning to be seen, with countries such as Nigeria, South Africa or Ethiopia, which have chosen to restrict some food exports, blocking supply chains and trade, thus creating other problems.

In conclusion, the forecasts for the future are somewhat catastrophic. In these conditions, hunger will increase at high rates and will be more and more deadly. If the international community does not act in support of rural communities affected by hunger, the degree of devastation will be dangerous.

June 18, 2022No Comments

AI goes to War: Observations from the Battlefields in Ukraine

Author: Andrea Rebora, Federica Montanaro and Oleg Abdurashitov.

Although the concept of artificial intelligence is quite complex and nuanced, many people imagine its use in warfare as a brutal slaughter conducted by evil robots. The reality is much different, and the current conflict between Russia and Ukraine offers a glimpse of what AI is being used for on today’s battlefields.

Researchers and military experts have spent years trying to visualize and understand military operations conducted with the support of artificial intelligence systems. One of the most prominent examples is the use of lethal autonomous weapons (LAWs), systems designed to locate, identify, and engage targets based on programmed information without requiring constant human control. Russia is using its KUB-BLA during the invasion in Ukraine, a loitering munition (commonly known as kamikaze drone) designed to identify and attack ground targets using AI technology.[1]However, the Russian aerial campaign leveraging these drones appears weak overall, and its fleet surprisingly small.[2] On the Ukrainian side, the Bayraktar TB2 drone fleet arguably appears to be its most potent force,[3] alongside the “kamikaze drone fleet,” with an estimated 20-30% of the registered Ukrainian kills to be the result of the successful employment of these systems.[4]

Another application envisioned on the battlefield is the use of AI to automate the mobility of vehicles, such as tanks and vessels, and make them more effective at identifying routes and prioritizing target selection and engagement.

AI is being increasingly included in the military decision-making process, from the straightforward calculation of aircraft or missile trajectories to the identification of targets during sensitive operations via automated target recognition. In 2021, Secretary of the Air Force Frank Kendall confirmed that AI had already been used during at least one “live operational kill chain,” demonstrating its effectiveness on the battlefield.[5]

Finally, the idea of artificial intelligence being applied to cyber operations is a thought that keeps many professionals up at night. Cyberattacks have already become one the most pervasive issues of this decade and, if enhanced by AI, they could be used to cause significant damage and potentially destabilize entire countries.[6]

The war in Ukraine, however, seems to be a far cry from swarms of unmanned drones and autonomous vehicles clashing with robotic systems of the adversary, as envisioned by several researchers of future warfare[7]. While AI algorithms reveal themselves on the battlefield, they do so in far more mundane aspects. 

The most illustrative example is the use of Ukraine’s specialist application for artillery (GIS Arta), which combines the conventional geo-mapping tools with the ability to sift information on the enemy’s location from a variety of sources and data types, including military and civilian drones and smartphones, GPS trackers and radars.[8] The intuitive and data-agnostic system has since become a force multiplier for the outgunned Ukrainian artillery, increasing the precision of their strikes.

The algorithmic geo-mapping itself, however, is not new and both high-resolution maps and image and processing algorithms are widely available and used among a range of civilian apps - from online maps to food delivery. The GIS Arta allows the blending of imagery intelligence (IMINT) and signals intelligence (SIGINT) feeds into an actionable solution for cheap and proves the ingenuity of Ukrainian developers and army in adopting civilian AI and machine learning technology for military use, but also highlights that the use of technology is shaped by the conditions and demands of the battlefield, not vice versa.

Russia, in turn, claims it is working on updating its reconnaissance and reconnaissance-strike drones with “electronic [optical and infrared] images of military equipment adopted in NATO countries” obtained through the application of neural network training algorithms.[9] With images and videos of NATO-supplied equipment requested by Ukraine widely available on the internet in almost ready-made datasets, the use of neural networks may be justified. Given that both Russia and Ukraine rely on human operators of unmanned aerial vehicles (UAVs), whose ability to identify snippets of objects is dramatically outmatched by the image recognition technology, such an AI-augmented approach may lead to better prioritization and increased accuracy of the Russian strikes targeting. 

Another example is the use of AI-enabled face recognition algorithms largely thanks to the ubiquity of visual content, ranging from smartphone videos and security camera feeds to social media pages.[10] The use of face recognition ranges from inspecting people and vehicles at checkpoints to identifying the potential perpetrators of war crimes. While lacking the immediacy often required on a battlefield, face recognition may become an essential deterring component of warfare preventing the most horrendous crimes on the battlefield. 

The use and credibility of such technology are not without controversy since AI algorithms are prone to bias and software flaws. In particular, the first person officially accused by Ukraine of war crimes in Bucha, who was caught on camera in a courier service office in a Belarus town used by Russian soldiers to send looted goods back to Russia, is a Belarusian citizen who vehemently denies even serving in the military.[11]

What emerges from this evolving environment is that the employment of AI on the Ukrainian battlefield is very human-centered and not very different from what has been seen in other conflicts. Despite the technological progress and innovations, there is still no clear evidence of the use of fully autonomous weapons in Ukraine. The presence of human beings “in the loop” still prevents us from finding a paradigmatic change in the employment of AI in this conflict. Artificial intelligence is leveraged as an instrument, which shapes and facilitates decision making and enables the implementation of decisions already taken, but is still not allowed to, or capable of, making autonomous decisions.

Despite the relatively limited use of advanced AI systems, the conflict in Ukraine provides a significant amount of operational and technical information. On the operational side, AI systems are being examined, tested, and deployed in various degrees and scope of application, allowing researchers and officials to understand the advantages and challenges in leveraging such systems in active conflict. On the technical side, the data collected such as images, audio, and geographical coordinates, can be used to train and improve current and future systems capable of, for example, recognizing camouflaged enemy vehicles, identifying optimal attack and counterattack routes, and predicting enemy movements.

The conflict in Ukraine provides an overview of the AI military capabilities of the two countries and the level of risk they are willing to accept with their top-of-the-line AI systems. After all, the cost-benefit analysis associated with using autonomous weapons in low-intensity conflict is much different from using the same weapons in open conflict, where the risk of losing just one AI-powered system is very high and particularly expensive. The military invasion of Ukraine is unfortunately not over yet, but militaries around the world will study its execution and aftermath for years to understand how to leverage AI systems for offensive and, most importantly, defensive applications.

June 18, 2022No Comments

Will METO be the new NATO?

Author: Shahin Modarres.

As the light at the end of the tunnel of revitalizing the JCPOA grows weaker the tension between Iran and the international community rises fiercely. Tension can be analyzed on two levels, regional level, and international level. On a regional level whilst Iran's regional competitors express their concerns regarding Iran's nuclear program, Israel has been applying a drastically different approach, a completely physical approach that dances on the edge of initiating a direct regional conflict. For the past month a notable number of high-ranking officers and scientists within the IRGC and Ministry of defense have been targeted and assassinated in the streets of Iran, almost all targets played an important role in the country's nuclear and missile program. Even though the Israeli officials never officially accepted the responsibility but Israel remains to be the main guess behind the calls. At the same time reports have been registered regarding threats against Israeli citizens in Turkey and Thailand. Earlier Israel's minister of foreign affairs asked all citizens to evacuate Istanbul immediately because of a series of imminent threats against their lives. 

On another proxy level, the shelling of Iranian infrastructures in Syria by the Israeli Air Force has been intensified. Drones trying to reach Israeli territories through Iraq's airspace have been shot and there have been reports of drone attacks on safe sites of Israel's intelligence operations according to Iranian authorities. Constant cyber war has been going on as well, every now and then, Iranian or Israeli hackers have been claiming victory by accessing infrastructures or personal data from the rival. A full encounter between the countries is now more threatening than ever. That is the main reason why both actors are reinforcing their teams in anticipation. 

Image Source: https://www.bakerinstitute.org/center-for-the-middle-east/

One of Iran's main bargaining leverages has been its regional influence. A military influent formed of mostly Shiite militant groups in Iraq, Syria, Lebanon, and Yemen running alongside vast support of Sunni groups such as Hamas for years gave Iran an upper hand to proceed with its regional proxy wars but what has changed? Iran's influence in the region has been limited mainly because of two reasons, a technological shift in the defense paradigm and a realistically Machiavellian perception of diplomacy. The aerial defense system known as the "Iron Dome" by Israel has definitely been a game-changer redefining traditional defensive methods through advanced approaches to countering missile attacks. On the diplomatic level, the "Abraham Accords" were none other than a realist perception of "my enemy's enemy can be my friend!" The growing angle of difference between Iran and Arab countries of the Persian Gulf and Saudi Arabia itself lead the tension between Israel and Arab countries to decrease gradually. Now a new form of an alliance is being formed between them. An alliance that some interpret as a Middle Eastern form of NATO; is METO. 

A few days ago Israel's minister of defense called for a new alliance between Israel and its Arab partners against Iran led by the United States. It appears that the defensive circle against Iran is getting tighter but at the same time Iran has decided to deactivate the surveillance set by the IAEA within its nuclear facilities. President Biden's trip to the Middle East will happen soon during which he will visit Israel and Saudi Arabia. Against all odds, the Biden administration appears to be considering its foreign policy legacy none other than peacebuilding between Israel and Saudi Arabia. Hence, his trips will play a crucial role that may affect and form Middle East's near future on different levels.

A Middle Eastern Treaty Organization(METO) on a dynamic scale may only live with the blessing of the United States. But on a regional level, actors are consciously trying to build an independent alliance as well. Almost each and every member of the new alliance at some point during the past two decades has been unhappy regarding US policies in the region hence traces of a collective will to have independent strong regional alliances are quite clear amongst actors. There is already talk regarding Israel sharing parts of its "Iron Dome" technology with Arab partners. Whilst wealthy Arab partners can generously invest in the Israeli technological and scientific R&D, all allies may benefit from the results.  

On the other end, Iran has shown a Russo-Oriental turn towards developing military and security cooperation with China and Russia. Also, there has been a fast development of the county's Aerospatiale program, particularly in regards to ballistic missiles program, drones, and satellites. Even though the Iranian economy is facing its most fragile state expenses regarding the doctrines of "Defense and Influence" have indeed increased. 

To anticipate the outcome of this equation we all need to think in a Machiavellian context, to simply interpret the equation based on each country's national interest. Will the US join the coalition to form METO? Will Russia and China support their supposed ally if Iran's nuclear program once again ends up in the United Nations Security Council? And eventually, the final unfortunate question is, will we face another devastating war in the Middle East?  

June 8, 2022No Comments

Analysis of the nexus between Human Trafficking and Terrorism.

Author: Arianna Caggiano.

This is a critical commentary of the research paper launched by the OSCE Organization: Trafficking in Human Beings and Terrorism. Where and How They Intersect: Analysis and Recommendations for More Effective Policy Response.

Human Trafficking as a tactic of terrorist groups

Over the years, human trafficking has increasingly become a modus operandi used by terrorist groups to finance and carry out their activities. To this extent, as human trafficking constitutes a crime that is usually perpetrated by organized criminal groups, some scholars have stressed that the “crime-terror nexus” implies that both criminal and terrorist organizations might cooperate with each other in the furtherance of their respective goals. Despite the increasing use of organised crime-related tactics deployed by terrorists, in analysing the current legal framework in international law when it comes to trafficking in human beings and terrorism there is still no existing treaty or convention dealing with the nexus between the two phenomena. On the basis of the OSCE paper launched in 2021 on the nexus between human trafficking and terrorism, this article will try to critically evaluate from a juridical and legal point of view the analysis and findings developed by the OSCE on this matter.

Comparing Legal and Policy Frameworks of Anti-Trafficking and anti-terrorism Mechanisms

When it comes to the definition of the human trafficking’s legal framework, it is worth emphasizing that it was not until 2000 that a first definition of trafficking in human beings was given in the Protocol to Prevent, Suppress and Punish Trafficking in Persons Especially Women and Children, better known as the Palermo Protocol. The adoption of the Protocol can be considered as a watershed moment for the legal framework of human trafficking: as of today, it counts 173 signatory States and it can be defined, thus, as almost a universal ratification. A further key role in combating human trafficking is played by regional trafficking treaties, which complement the obligations upon signatory States, especially with reference to victims’ protection. Indeed, as stressed by the OSCE research, a major principle guiding anti-trafficking legislations and policies is the principle of non-punishment of victims of trafficking, according to which Member States are obliged to «assess the individual situation of persons released from the captivity of armed and terrorist groups so as to enable prompt identification of victims of trafficking».

On the other hand, the international legal framework related to terrorism and counterterrorism is considerably more challenging and complex in comparison to the anti-trafficking international legal system. Indeed, despite the existence of a set of treaties, protocols, conventions, Security Council Resolutions, as well as “soft law” and non-binding mechanisms, there is no comprehensive instrument providing a universal and accepted definition of terrorism, as it is the case for human trafficking with the Palermo Protocol

In analysing the nexus between these two phenomena, it is of utmost importance to emphasize the constituent elements of trafficking used as a tactic by terrorist groups. Pursuant art. 3 of the Palermo Protocol, «Trafficking in persons shall mean the recruitment, transportation, transfer, harbouring or receipt of persons, by means of the threat or use of force […] to achieve the consent of a person having control over another person, for the purpose of exploitation. […]». This very intense definition provided by the Protocol, shows three main constituent elements of human trafficking: action, means and purpose.

Therefore, as the OSCE outlines, in evaluating the link between trafficking in human beings and terrorism from a legal perspective, a useful approach would be one that analyses these three constituent elements when exploited by terrorist groups as a tactic to recruit individuals. In this regard, the analysis of the current legal framework on the nexus between the two crimes shows that a harmonisation in the criminalization of terrorism and human trafficking as two offences connected has not been reached yet. Indeed, despite the existence of several instruments that recognize the growing links between terrorism and transnational organized crime, the lack of a definition of terrorism still hinders the internationally community to adopt an internationally agreed-upon approach to terrorism matters, while it is not the case for human trafficking. 

The legal response that has been adopted so far to address cases where the two phenomena intersects has largely focused on criminalizing all individuals related to terrorist activities and groups. The lack of a definition of terrorism has led States to adopt different measures aimed at only criminalizing terrorists and not identifying and protecting victims. Therefore, as highlighted in the research, this approach has showed to have significant consequences for victims, who have risked being held fully accountable for all the crimes they have committed, even though they are victims of human traffickers. Based on these findings, the OSCE research concludes that a human trafficking lens when dealing with terrorist criminal offences should be applied to contribute to victim identification, assistance, rehabilitation and reintegration, and prevention of re-victimization. Therefore, it would be of utmost importance to apply the principle of non-punishment - that already exists in the human trafficking framework – in the anti-terrorism existing legal and policy mechanism. 

Conclusion

This critical commentary has analysed from a legal perspective the comprehensive research carried out by the OSCE organization on the nexus between human trafficking and terrorism. It has highlighted how the application of anti-trafficking mechanisms, including the principle of non-punishment, in the context of terrorism could help leading in a better way prosecution of criminal offences related to terrorism. The OSCE research might constitute the basis for an international and agreed-upon definition that considers both a security-oriented approach to prevent and prosecute terrorist offences and a human rights-based one, ensuring that victims of terrorism – and trafficked persons exploited by terrorists – are not held accountable and can access to their rights. 

All in all, the OSCE research offers significant food for thought and, using concrete cases, helps filling the knowledge gap of policy makers, academics, practitioners, and legislators on the nexus between human trafficking and terrorism. 

June 8, 2022No Comments

Italy’s cybersecurity response to Russian attacks (Italiano)

Author: Sarah Toubman

In the past few years, the Italian government has rapidly increased both the pace and number of steps taken to protect its national cybersecurity interests. Italy began creating legislation and organizations for the defense of its cybersecurity infrastructure in 1993, but many observers have criticized developments in Italian cybersecurity as inadequate and slow-moving compared to its peers in Europe and beyond. However, in June 2021, the Italian government declared its intention to create a new national agency for cybersecurity, and just weeks ago, released a national cybersecurity policy for 2022-2026.

The Italian government’s increased attention to cybersecurity has come just in time, as several prominent cyberattacks against Italy by Russian hackers occurred this May. Considering Italy and the European Union’s support for Ukraine in its war against Russia, it is not surprising that Russian-backed agents have unleashed attacks on Italy in the cybersphere, a space the Kremlin has long operated in. For example, during the 2008 Ruso-Georgian war, Russian-backed hackers reportedly carried out cyberattacks against Georgian internet infrastructure.

More recently, this cyber aggression has been turned towards both state and private cyberinfrastructure in Italy. On May 10th, Russian hacker groups “Killnet” and “Legion” attempted to break into and modify the voting results for the Eurovision Song Contest, which Italy hosted and Ukraine ultimately won. However, thanks to the Italian Computer Security Incident Response Team, which was created in 2018, the attempt was foiled. 

Similarly, just one day later on May 11th, “‘Killnet’ claimed an attack on the websites of several Italian institutions, including the Senate, Italy's upper house of parliament, and the National Health Institute.” On May 19th, the Russian hacking organization launched additional cyberattacks on Italian institutions, including the High Council of the Judiciary, and the Ministries of Foreign Affairs, Public Education, and Culture.

While Russian-backed cyber organizations are clearly enthusiastically targeting Italy, the robust responses of Italian cyber-defense organizations are now successful on a level which would have been unlikely prior to the development of its new cybersecurity agency and the rollout of its 2022-2026 cybersecurity policy. Although historically Italy has often been behind the curve in its cybersecurity policies, Mario Draghi’s push to launch the National Cybersecurity Agency was in fact extremely forward-looking and timely. Furthermore, since the agency’s announcement, Italian cybersecurity forces have developed the skills required to successfully counter Russian-backed agents, proving its creation was not merely a publicity-boosting measure for the Draghi government.

One recent headline has declared that “Italy [is] embroiled in cyber war with pro-Russian hackers.” Definitions of what constitutes cyberwarfare still vary, and the Russian government formally denies involvement with the groups of hackers conducting these attacks. However, such a headline again serves to remind those concerned with international security that Russia has historically and continues to use the cyber sphere to wage war, and therefore a robust international security policy necessarily includes cyber-defense. Therefore, in the context of the Russian invasion of Ukraine--the largest war seen in Europe since 1945--defensive cybersecurity capabilities are evermore important for Italy and any nation openly opposing Russian actions. 

Italy’s 2013 National Strategic Framework for Cyberspace Security and 2017 Cybersecurity Action Plan had both highlighted the need for improved public-private cooperation to ensure national cybersecurity moving forward. In fact, the 2017 plan had urged that “private entities operating in strategic sectors must be considered as key assets and included into a holistic approach to national cybersecurity that provides for the implementation of minimum security requirements for country-critical systems.” Again, such a point was forward-looking, highlighting the fact that in May 2022, Russian-backed agents did not only launch cyberattacks on Italian government organizations, but also the Eurovision Song Contest, a multinational initiative being operated out of Italy. 

Notably, under the country’s new cybersecurity policy, the Italian Computer Security Incident Response Team was successfully able to both prevent an attack against Eurovision and resolve cyber incidents related to government websites. However, moving forwards, this area merits even further attention. The Italian state could be severely impacted by cyberattacks against a whole range of websites, companies, and infrastructure, including public, private, and multinational organizations. Therefore, ensuring Italian cybersecurity going forward would require not just improved public-private cooperation, but also coordination between Italy and all interconnected sectors of the EU. 

Image Source: https://imgcdn.agendadigitale.eu/wp-content/uploads/2019/05/28110643/cyber-war.jpg.webp

Italian translation 

Negli ultimi anni, il governo italiano ha accelerato rapidamente il passo e ha compiuto progressi nella protezione dei suoi interessi nazionali nell’ambito della sicurezza cibernetica. L’Italia iniziò a legiferare e fondare organizzazioni per la difesa delle infrastrutture legate alla sicurezza cibernetica nel 1993. Da allora, molti osservatori hanno criticato gli sviluppi, ritenendoli inadeguati e lenti rispetto agli altri paesi in Europa e nel mondo. Giugno 2021 segna una tappa importante per il governo italiano, che dichiara di voler creare una nuova agenzia nazionale per la sicurezza cibernetica, e poche settimane fa, è stata pubblicata la policy per la sicurezza cibernetica nazionale 2022-2026.

L’aumento di attenzione per questo campo arriva perfettamente in tempo, quasi in concomitanza con diversi attacchi cibernetici compiuti da hacker russi contro l’Italia lo scorso Maggio. Tenendo presente il supporto dichiarato da Italia e Unione Europea per la guerra portata avanti dall’Ucraina contro la Russia, non è una sorpresa che agenti sostenuti dalla Russia stessa abbiano effettuato attacchi contro l’Italia nella sfera cyber, uno spazio in cui il Cremlino opera da tempo. Per esempio, durante la guerra tra Russia e Georgia nel 2008, la Russia ha dato supporto ad hacker per colpire le infrastrutture internet dell’avversario.

Più di recente, le aggressioni cyber sono state indirizzate contro la sfera cyber pubblica e privata dell’Italia. Il 10 Maggio, il gruppo hacker russo “Killnet” e “Legion” ha cercato di entrare e modificare i risultati dei voti dell’Eurovision Song Contest,tenutosi in Italia e vinto dall’Ucraina. Nonostante ciò, grazie al Computer Security Incident Response Team dell’Agenzia per la Cybersicurezza Nazionale, creato nel 2018, il tentativo è stato sventato.

Allo stesso modo, ad un solo giorno di distanza, “Killnet” ha rivendicato un attacco a diversi siti istituzionali italiani, incluso quello del Senato e dell’Istituto di Salute Nazionale. Il 19 Maggio, l’organizzazione russa ha lanciato ulteriori attacchi ad istituzioni italiane, inclusi il Consiglio Superiore della Magistratura, i Ministeri degli Affari Esteri, della Pubblica Istruzione e della Cultura. 

Mentre le cyber organizzazioni russe sono chiaramente entusiaste di avere l’Italia come bersaglio, le risposte robuste date dalle organizzazioni di cyber-difesa italiane hanno avuto un successo che non sarebbe stato possibile raggiungere precedentemente allo sviluppo della nuova Agenzia per la Cybersicurezza Nazionale e alla nuova policy 2022-2026. Sebbene storicamente l’Italia si è sempre trovata in ritardo rispetto ai progressi e alle policy promosse dagli altri paesi, il Presidente Mario Draghi ha insistito per fondare l’Agenzia per la Cybersicurezza Nazionale e questo ha permesso di essere estremamente lungimiranti nel garantire una risposta agli attacchi. Inoltre, dalla creazione dell’Agenzia, l’Italia ha sviluppato delle abilità notevoli e necessarie nella lotta contro gli agenti russi. 

Di recente, è stato dichiarato che “l’Italia è coinvolta in una cyber guerra con gli hacker russi.” Le definizioni di questa cyber-guerra sono ancora varie, e il governo russo ha formalmente negato il coinvolgimento dei gruppi hacker e gli attacchi condotti. Nonostante questo, la situazione al momento conferma che la sfera cyber è sempre utilizzata dalla Russia come arma contro i nemici di guerra, e perciò c’è bisogno di politiche per la sicurezza internazionale più robuste e che includano necessariamente la cyber difesa. Nella guerra tra Russia e Ucraina, la più grande guerra mai vista dopo il 1945, le capacità difensive nel campo della cybersicurezza sono ancora più significative per l’Italia e per qualunque altra nazione che voglia apertamente condannare le azioni Russe. 

La National Strategic Framework for Cyberspace Security del 2013 e il Cybersecurity Action Plan del 2017 hanno entrambi sottolineato il bisogno di migliorare la cooperazione tra pubblico e privato per assicurare una rapida evoluzione nell’ambito della cyber sicurezza nazionale. Infatti, il piano del 2017 ha evidenziato che “le entità private che operano per la cyber sicurezza nazionale lavorano per l’implementazione dei minimi standard di sicurezza richiesti per le infrastrutture critiche del paese.” Ancora una volta, questo punto di vista è lungimirante e sottolinea il fatto che a Maggio 2022, gli agenti russi non hanno solo colpito il governo italiano ma anche l’Eurovision Song Contest, un’iniziativa multinazionale che era organizzata dall’Italia. 

Il Computer Security Incident Response Team dell’Italia ha avuto successo nel prevenire l’attacco contro l’Eurovision e nel risolvere incidenti legati a siti internet del governo.

Infine, questo argomento meriterebbe ancora più attenzione. Lo stato italiano potrebbe essere severamente colpito da cyber attacchi contro siti internet, compagnie e infrastrutture, includendo il settore pubblico, privato e organizzazioni multinazionali. Per questo, garantire la cyber sicurezza del paese e svilupparla ulteriormente richiederebbe non solo un miglioramento della cooperazione tra pubblico e privato, ma anche la coordinazione tra Italia e tutti i settori interconnessi dell’Unione Europea. 

May 30, 2022No Comments

The Geopolitics of the Energy Transition’s Momentum

Authors: Riccardo Bosticco and Michele Mignogna.

Introduction

The main result that Putin has achieved until now with the aggression of Ukraine is a solid stance from the European Member States to halt gas imports from Russia. This and other green commitments have pushed the EU and the whole world to give renewed impetus to renewable energy. Moreover, the relation between climate and industry policies is increasingly evident. In a broader context of power competition trade, investment policies in the energy and climate sectors play an ambivalent role: energy dependencies have been conceptualized as mutually benefitting; yet, the current war unveils their risky nature. After a brief description of the renewables’ geopolitical dimensions, this article outlines what is at stake for the EU’s primary areas of energy cooperation. 

The Impact of Renewable Energy on Geopolitics

Renewable energies have the potential to transform interstate energy relations. Renewables have fundamentally distinct geographic and technological properties than coal, oil, and natural gas. Sources are plentiful but intermittent; their production is increasingly decentralized and utilizes rare earth resources in clean tech equipment and, lastly, their distribution is predominantly electric and entails tight management standards and long-distance losses. This contrasts sharply with fossil fuel resources’ geographically fixed and finite character, their reliance on massive centralized production and processing facilities, and their ease of storage and transit as solids, liquids, or gases worldwide.

The energy transition provides a chance to rethink and revise long-standing trading relationships. It also allows countries to engage in previously closed energy value chains. Significantly, the future of the energy world will likely redefine the concept of energy security. However, in this society, the impulse to produce things domestically will collide with the logic of size and global supply networks. The energy transition will rewire the planet, but how much of it will transcend international borders is still unclear. A crucial element will be the commerce of minerals, distinct from that of oil, gas, and coal in terms of location. Nonetheless, such business will follow a familiar pattern: resources will be harvested in one region of the world, transported to refineries and processing centers, and then transformed into final goods. Diversification, bottlenecks, extraction disputes, and rent-seeking dynamics will all be present, although with different details.

Such developments will require a significant shift in energy strategies, indicating that areas pursuing industrial policies rather than decarbonization may reap climatic advantages. The previous energy map established a link between natural resources and markets. Yet, the new energy map will be much more complex.

The Geopolitics of the Energy Transition and the EU

Bringing together the words ’geopolitics’ and ‘renewables’ leads to the study of renewables and related security risks, the effects of the energy transition on traditional energy relations, possibilities of mutually beneficial ties, and windows of opportunity for countries to move up in the global power hierarchy. The energy transition is indeed a process where the industrial advantage is likely to bring with itself political benefits and leadership status. In the context of the current war in Ukraine, this is becoming clearer every day. Yet, the energy transition is expected to become part of power competition as the most impellent challenge – posed by the war as well as climate change and the security risks with it – of our times and will likely create amities and enmities.

Take the example of Russia. In the past decade, Russia has perceived the EU’s energy transition problematically. The EU-Russia energy relationship was primarily based on gas, oil, and coal. Nonetheless, the association is characterized by different conceptions of energy and energy security, although both actors recognize the potential of energy interdependence. While the EU and European countries are more enthusiastic concerning the transition, Russia’s discourses are more conservative yet try to defend the role of natural gas in the energy transition.

While it is difficult to predict an essential role played by Russia nowadays, given the progressive isolation it is forced to, the energy wire will see China having high stakes in renewable developments and geopolitics. Concerning relations with the EU, some have argued that the energy transition is likely to be the determinant of the future of EU-China relations. Energy in EU-China relations does not play the same role as relations with Russia. While the renewable sector has encouraged interdependence between the two powers in the past, more recently, nationally oriented policies have hindered the precedent path.

Still, the energy transition will significantly shape relations between the EU and the Arab states. While Bahrain, Kuwait, Qatar, Saudi Arabia, and the United Arab Emirates are challenged by balancing relating with the US and China, managing regional crises, the pandemic, and containing Iran as the primary regional rival, the last point precisely is preventing some of the Arab states in the Gulf region to act assertively against Russia. Nonetheless, looking ahead to the 2020s, how those countries manage the energy transition will have consequences on internal and external political and economic environments. Especially Gulf countries envision a sustainable future, thus setting the stage for redrawing energy investments. In this context, the EU will play a crucial role, opening to the Gulf’s market interests and advancing regional security interests.

Conclusion

Overall, the current war is not only highlighting the strategic value of energy resources and energy ties but also how the transition to new energy systems is likely to rewire the world. In a context where the main political divide on the global stage is between liberal and illiberal forces and strong energy dependences revealed security threats, future systems of alliances will have to account for this. For the EU, the energy transition will have to deal with Russia, act as cohesively as possible, and strengthen its strategic thinking concerning big partners such as China and the Gulf States. The transitions’ stakes entail a strategic opportunity to avoid past errors.

May 26, 2022No Comments

Will the new Transatlantic Data Framework withstand a ‘Schrems III’ in European Courts?

Authors: Beatrice Gori, Giovanni Tricco and Giorgia Zaghi.

On March 25, amid a week of summits in Brussels overshadowed by the Ukrainian war, Joe Biden and Ursula Von Der Leyen in a joint meeting unexpectedly announced a new transatlantic data privacy agreement in principle, clearly showing  the political status nearby the issue. Since the fall of the previous privacy shield in 2020 the data flows between the two transatlantic actors have been surrounded by uncertainty, making it difficult for companies, particularly SMEs, to conduct business. Transatlantic data and information flows between the United States and the European Union are estimated to be valued at over $7.1 trillion dollars with over 5300 companies participating, including technology behemoths such as Google, Meta and Microsoft. Therefore, a new agreement is well expected by both sides of the Atlantic since the Court of Justice of the European Union (CJEU) decision in Schrems II which called for the unproportionate capability of US surveillance capabilities and the lack of an effective redress body for European data owners.

The new Transatlantic data pact is expected to heal such gridlocks and foster the data economy in the near future. However, a text has not been published, raising serious doubts among privacy experts. Max Schrems, the Austrian privacy activist who has torn down the two previous agreements, welcomed the new pact as “a lipstick on a pig” calling for future challenges in front of the European judicial system. The line between whether such a new agreement will fulfill the CJEU criteria or pave the way for a Schrems III is exceedingly thin. Nonetheless, the question is surrounded by different controversies, indeed The CJEU highly criticized US practices without taking into account the national capabilities of its Member States. Several reports, including one from theEuropean Fundamental Right Agency (FRA) and from the United Nations High Commissioner for Human Rights, outlined how surveillance programs conducted by European intelligence services allegedly vary from collecting traffic metadata from diverse sources to monitoring web forums and intercepting cable-bound transmissions.

Indeed, in Europe surveillance activities fall under the scope of national security, which is a matter of national competence according to the Treaty of the European union (TEU), therefore European courts cannot legislate or address changes to its Member States. The EU courts’ approach has provoked anger and disbelief among US national security experts: “mix of judicial imperialism and Eurocentric hypocrisy”, as pointed out by Steven Baker a partner in the law firm Steptoe & Johnson LLP and former general counsel of the National Security Agency (NSA). Therefore, while the CJEU’s Schrems II decision emphasized how the current laws inadequately protect the right of non-nationals to judicial redress in the United States, additional surveillance and intelligence reform should be addressed even in the EU to create a political momentum for legislative intervention in the American congress. Until that moment as underlined by Peter Swire it is “unrealistic for the EU to demand changes to U.S. national security legislation when European countries themselves are not averse to similar practices.”

Image Source: https://www.bbc.com/news/world-europe-57489588

Swire's forecast appears to have come true, in the fact sheet released by the US government no legislative amendments are mentioned; instead, it calls for the establishment of a new redress mechanism and other safeguards to satisfy the CJEU’s request via a Presidential Executive Order (EO). Such a process would raise doubts regarding the capacity of the new mechanism to be independent and able to investigate wrongdoings by the American Intelligence Communities (IC). Theoretically, this would represent the same issues of the Ombudsman of the old-fashioned Privacy Shield. However, an intriguing solution t has been envisaged by experts. They call for the creation of an independent redress authority via a regulation of the Department of Justice (DOJ) which will be independent by the executive, in conjunction with EOs from the President that would confer to the newly redress authority concrete capability to effectively investigating redress requests and for issuing decisions that are binding on the entire American IC. A non-statutory solution according to them that would – theoretically – satisfy the request of the European courts in Schrems II.

The European Data Protection Board (EDPB) made the point clear in its statement saying that it will direct “special attention to how this political agreement is translated into concrete legal proposals.” Therefore, until a text is missing just speculation can be made. Indeed, at the moment the political agreement made on 25 March 2022 is just the latest step on the ‘intense negotiations’ on a Privacy Shield replacement, as stated by the European Commissioner of Justice Didier Reynders, who announced that the works for a final text is undergoing in order to have the final agreement for late 2022. He pointed out that: "It is difficult to give a precise timeline at this stage, but we expect that this process could be finalized by the end of this year. On the European side there is trust in the work and commitment of American officials. Indeed, the U.S. Department of Commerce Deputy Assistant Secretary for Services Christopher Hoff said to IAPP that the United States made unparalleled commitments to significantly increase privacy and civil liberties safeguards through the establishment of the new multi-layered redress mechanism, assuring that it will be independent and binding in its safeguards on how the court is set up, as well as the protections for the judges' selection and removal. In addition, he pointed out that he strongly believes that the agreement will be durable and that all the features surrounding the new agreement will be much clearer at the appropriate time.

The stakes are high, indeed, in case the agreement will not survive the scrutiny of the CJEU legal uncertainty will persist and future economic losses for the digital economy of the EU and the US will increase. Accordingly, to forecasts of DIGITALEUROPE by 2030 if a stable agreement that enables lawful and consistent data transfer is not assured the European Union economy could lose €1.3 trillion in cumulative economic growth by 2030, €116 billion in annual exports and 1.3 million job losses, primarily high-skilled professions. On the other hand, if a stable mechanism of data transfer will be assured the EU economy would gain €720 billion in cumulative extra growth by 2030, equivalent to an increase of 0.6% in GDP on a yearly basis, €60 billion in annual exports, of which half coming from the manufacturing sector, boosting the position of European SMEs and 700 thousand new jobs will be created. Therefore, it is critical that the text of the new agreement will include proper safeguards as requested by the CJEU in Schrems II in order to ensure a long-standing Transatlantic Data Flow Agreement, on which the European data economy may foster, as well as, the protection of the rights of europeans being guaranteed in the years ahead. 

May 23, 2022No Comments

Competition or Cooperation: What drives the U.S. Strategy in the Arctic?

Author: Irene Senfter.

Arctic politics: past and present

The Arctic region was a prominent theatre during the Cold War as it is home to Russia’s Northern Fleet, Russia’s second-strike nuclear capabilities, and North America's North Warning System. Gorbachev’s reassessment of the region as a “zone of peace” in 1987 inaugurated three decades of peaceful and cooperative regional governance. Sadly, Russia’s recent violation of the UN charter when invading Ukraine in 2022 does not bode well for a region that until recently has been relatively isolated from world politics

By purchasing Alaska from Russia in 1867, the United States has become an Arctic nation. However, except for the Cold War period, the region has received somewhat limited consideration in US national security strategy. The US has never developed an Arctic identity comparable to Russia or Canada. In 2013, the first US Arctic strategy document was released under President Obama. It is currently being updated under President Biden. 

This article will follow a structural realist approach to explore three main drivers of US strategy in the Arctic: access control of the Arctic Sea, freedom of navigation on Arctic Sea lanes, and regional security dilemma. A fourth driver, climate change, is examined through a liberal institutionalist lens.

Image Source: www.pixabay.com

Arctic competition: a realist perspective

According to Mearsheimer’s theory of structural realism, states operate in an anarchic international self-help system and strive for maximum power to assure state survival. Great powers struggle to become regional hegemons and want to prevent other states from becoming hegemons in their regions. From this perspective, the United States’ objective in the Arctic is to prevent Russia from becoming a regional hegemon. The Arctic region is of great strategic importance to the Russian government.  To achieve its goal, the US needs to control access to and exit from the Arctic Sea through a strong naval presence in the Bering Strait and allied military cooperation in the Chukchi Sea and the GIUK (Greenland-Iceland-UK) gap. 

Unlike other states, the US is not primarily interested in the extraction of natural resources and the development of new trade routes enabled by the receding Arctic ice masses. However, freedom of navigation on the Northern Sea Route (NSR) is a critical factor in preventing Russian regional hegemony in the Arctic. Just as the US insists on freely navigating the South China Sea, it strongly opposes Russia’s policies of mandatory registration and escort of vessels where the NSR runs through Russian territory or waters. It also disputes Canada’s sovereignty claim on the Northwest Passage.  Notably, China has declared itself as a “near-Arctic” nation and has presented plans for a Polar Silk Road,evoking the spectre of rising Chinese influence in the region.

Mearsheimer argues that states will use every opportunity to gain a strategic advantage over their adversaries. For realists, power derives from military strength and economic might, and states can never be sure about their adversaries’ intents. This dynamic is currently feeding a security dilemma in the Arctic.  Many observers view the Russian military build-up in the Arctic as potentially offensive to Western security. Russia has been building or upgrading military bases in the Arctic and modernising its nuclear submarine fleet located at the Kola Peninsula. New Russian hypersonic gliders could evade the North Warning System. All Arctic states have boosted their northern presence in reaction to heightened tensions. Russia looks at NATO’s increased presence in the Arctic region with suspicion, especially at Finland’s and Sweden’s recent NATO membership plans.

The US Department of Defense has instructed the US AirforceArmy, and Navy to increase capabilities, presence, cooperation with allies, and resilience in the Arctic. Alaska is already the most militarised of all US states, and in 2022 it will host the highest number of F-35 jets in the world. A deep-water port to be constructed in Nome will allow servicing of the heavy vessels that can blockade the Bering Strait. In this context and against common complaints, a large fleet of icebreakers is not necessarily of strategic importance to the US. 

Arctic cooperation: a liberal institutionalist perspective

According to liberal institutionalism, institutions enable cooperation between states as they encourage states to forego short-term benefits for long-term gains. Mearsheimer disputes that international institutions can change state behaviour in the military realm. However, he acknowledges their effectiveness in the environmental sphere. With its ambitious research projects and numerous working groups, the Arctic Council is a premier example of cooperation on climate change, environmental protection, sustainable development, and human security. Climate change in the Arcticis proceeding twice as fast as on the rest of the planet as the receding ice exposes more seawater. Seawater is darker than ice and absorbs rather than reflects heat. Rising sea levels are causing severe coastline erosion at a high cost to the mainly indigenous population. The permafrost is thawing, freeing up yet more carbon and causing damage to housing and infrastructure. Currently, the Arctic Council has paused all official meetings in reaction to Russia invading Ukraine in February 2022. 

Climate mitigation efforts, sustainable development, and Arctic scientific knowledge benefit communities living on all American coastlines and areas exposed to extreme weather and wildfires. Therefore, it is in the interest of the United States to find a way for the Arctic Council to continue its work. Despite the intense security competition between the US and China, American political leaders know that dialogue on environmental issues must continue. The work of the Arctic Council could be isolated from geopolitics in a similar way. 

Conclusion

Arctic geopolitics has limited bearing on the global balance of power, but global power play impacts Arctic security significantly. Sea access control, freedom of navigation, security dilemma management, and climate change in the Arctic are of national interest to the US and shape its Arctic strategy. This analysis shows how the US seeks to protect free and open domains in the Arctic. The challenge for the US and all Arctic nations consists in guaranteeing a stable and sustainable Arctic space for the benefit of the people who live in the Arctic and beyond. 

May 19, 2022No Comments

The Consequences of Ukrainian War on U.S.-China Relations

Author: Francesco Cirillo.

The war in Ukraine is shaking the European security system and also influencing Washington's strategies in the Indo-Pacific. With the focus on Europe, the US has slowed down its diplomatic and political activity in Asia while keeping a close eye on Beijing's moves. The latest moves such as Beijing's ratified security agreement with the Solomon Islands has alarmed Canberra, a close US ally, as well as the Americans. For Washington, the move is seen as an attempt by Beijing to strengthen its diplomatic and politico-military position in the South Pacific. Another hot dossier concerns the thorny issue of Taiwan. With the Russian invasion Washington is analysing how it can support Taipei in terms of military aid without bothering the People's Republic of China.

In recent months, with the outbreak of war in Ukraine, there have been growing concerns that in the near future Beijing might attempt an armed attack to occupy and annex Taiwan, which Beijing calls one of its 'rebel provinces'. At the moment, however, there seem to be no signs of a possible Chinese attack. The war has been a total game changer, causing concern within Xi Jinping's leadership. According to the Wall Street Journal, Chinese big tech companies are scaling back their business in the Russian Federation market, as they are intimidated by possible sanctions that the US and the West might apply against them. But recently a War Game was broadcast on NBC news, simulating an invasion of Taiwan by the People's Republic of China and a subsequent military confrontation with the US in the Pacific.

Image Source: https://pixabay.com/photos/mao-zedong-mao-tse-tung-chairman-mao-15983/ 

In fact, within the US federal agencies, preparations are being made for a possible war confrontation with Chinese forces. Despite the tension within some Chinese academic circles, it is theorised that a kind of competitive coexistence could be found with Washington, which would aim to exclude a warlike confrontation. In January 2022, Professor Wang Jisi , lecturer at the School of International Studies and President of the Institute of International and Strategic Studies at Peking University, wrote and published an essay entitled 'A Hot Peace: Is a Paradigm in U.S.-China Relations Emerging?'. In this short essay, the academic theorises that despite the mistrust between Washington and Beijing on various dossiers ranging from the Hong Kong issue to the mistrustful view of international relations via Taiwan, it is necessary to maintain and consolidate a channel of communication between the two leaderships in order to cooperate when the interests of both the People's Republic and the United States converge. According to Wang Jisi, this would lead the current status of Sino-US relations not towards a new 'Cold War' but towards a so-called 'Hot Peace', in which Beijing and Washington, despite competition in various fields, mutual mistrust and different visions concerning the status quo of the international chessboard will necessarily have to cooperate in certain dossiers of global importance.  

The war in Ukraine puts Beijing in front of a dangerous strategy: on the one hand it publicly pushes both Moscow and Kiev to find a point of convergence to open a diplomatic mediation table; on the other hand it wants to avoid being included in possible economic sanctions. Moreover, it adds that there could be a remote hypothesis that is at the moment difficult to realise: with a severely weakened post-war Russia, China, in exchange for financial aid, would ask the Kremlin for possible access to military technology in the experimental phase in order to study it and acquire know-how.

At the moment, however, China is focused on other dossiers and preparing for the Party Congress, but with an eye on the economic consequences that the conflict could bring globally. 

May 17, 20221 Comment

How innovation in terrorism financing explains Hezbollah’s financial success

Author: Camilla Cormegna.

Introduction

Terrorism financing is vital for a terrorist organisation to operate and carry out terrorist activities, but resources are also spent to provide community services such as welfare, education, public and protection service replacing governments as the main providers. An example of this is demonstrated by Hezbollah, the focus of this analysis, whose social services offered to the Lebanese Shiite population allows it to secure political supports while acquiring a sacred and untouchable status in Lebanon. To sustain its organisational establishment while pursuing ideological and political objectives, Hezbollah is estimated to earn $1 billion annually through various sources. 

Hezbollah depends on an array of revenue resources, although the bulk of its funding comes from Iran’s state-sponsorship, which provides around $800 million annually. This external funding comes with drawbacks, as sponsorship undermines group’s autonomy and pressures and sanctions on Iran negatively affect the state’s financing of Hezbollah. Therefore, Hezbollah is forced to innovate and diversify the sources of income to ensure financial sustainability. The group now leverages drug and human trafficking, diamonds smuggling, money laundering, propaganda televisionlocal exactions, and diverting charitable contributions

The article argues that Hezbollah owes its success to innovation in terrorism financing, making it one the most proficient and technically skilled terrorist groups in the world. Innovation refers to ability of terrorist groups to develop and adopt new financial techniques when pressured by countering terrorist financing strategies. This process can entail different phenomena such as the introduction of new tradeable commodities, new methods of production, new supply sources, and new market opportunities. The article presents Hezbollah’s success by exploring three profitable ventures that demonstrate the group’s ability to exploit lucrative opportunities: their sophisticated money-laundering scheme, the terror-crime nexus and the group’s ties with Venezuela, and the role of the Lebanese diaspora. 

Image Source: unsplash.com

A sophisticated money laundering scheme

Hezbollah runs an extensive network of illicit trade involving cars and drugs to launder money. In 2015 it was reported that Hezbollah purchased used cars in the United States which were then shipped and sold in West Africa while at the same time, drugs were shipped from Colombia to Europe. Both proceeds were sent to Lebanon through Hezbollah controlled money laundering channels and then deposited into the financial system. It is estimated that between 2007 and 2011, Hezbollah, with the help of the Lebanese Canadian Bank (LCB) and exchange houses, laundered $300 million. The LCB case shows the innovative adaption of Hezbollah, as after the 2011 scandal which detected and closed LBC’s money service businesses (MSBs), the terrorist organisation soon replaced MSBs resuming with the money laundering. This caseillustrates how Hezbollah’s facilitators are leveraging global trade and financial institutions to carry out illegal activities and how complex and sophisticated their system is, but it also demonstrates how facilitators among the Lebanese diaspora community are vital in supporting the organisation.  Moreover, counterterrorism financing (CTF) deficiencies and constraints allow Hezbollah to thrive and exploit the cross-border movement of funds. Financial intelligence units’ effectiveness is achieved through information sharing which is geographically circumscribed, and compliance with the Financial Action Task Force (FATF) legislative and regulatory standards is lacking in the Middle East

The terror-crime nexus with FARC and Venezuela’s role

As the money laundering scheme briefly introduced, Hezbollah has developed its own criminal activities such as the drug trade and it has done so by developing a strategic cooperation with FARC. Although their relationship is not political neither revolutionary but done to guarantee funds and financial independence through the diversification of income sources, the coupling of these organisations allows them to share operational knowledge, making them a “hybrid narc-terrorist network”. Hezbollah’s involvement with FARC and the drug trade was revealed in 2008 through the US and Colombian Operation Titan which dismantled a cocaine smuggling and money laundering ring which profited both organisations. 

Hezbollah is also tangled up with the Venezuelan government, which guarantees a safe haven to carry out their operations. Hezbollah’s involvement with Venezuela started in the 1980s, when the organisation started to deepen its association with many Lebanese immigrants in Latin America who fled the civil war. In 2005, the then Iranian and Venezuelan presidents Ahmadinejad and Chavez came together in a series of commercial ties, laying the foundations of their relationship. There is evidence that the Venezuelan government launder Hezbollah’s money while providing them with material support for their activities, but it also employs Hezbollah sympathisers as Ministers generating revenue through the distribution of narcotics. It is the case of the current Minister of Industries and National Production El Aissami of Iraqi-Lebanese descent, involved in the drug trafficking and in the issue of diplomatic passports for Hezbollah facilitators. In this environment characterised by corruption and bribery, Hezbollah continues to thrive because Latin American countries do not recognise Hezbollah as a terrorist organisation, thus failing to enforce CFT frameworks while facilitating illicit financial flows. Moreover, Venezuela is noncompliant with 31 out of the 40 FATF recommendations, demonstrating how the regime has no intention in addressing terrorism concerns.

The role of the Lebanese diaspora

Hezbollah’s presence in international diaspora communities provides the organisation with access to criminal ventures and funds. The diaspora is comprised of Lebanese emigrated mainly to Europe, Latin America, North America, and West Africa between 1975 and 1990. Hezbollah acquired financial support from the diaspora through its commitment to the fight against Israel and the West and it translated the support into an array of financial sources as well as financiers and facilitators. A cultural practice embedded within the diaspora is the sending of remittances to Lebanon and to Hezbollah, considering its legitimate status among Shia at home, as a method of support. However, third-party funding is risky for terrorist organisations, as donors may lose interest in the cause or law enforcement activity can lead to a decline in donations. In West Africa, the Lebanese diaspora is heavily involved in the diamond trade, as diamonds are a source of donation and as an informal tax to support the organisation back home. In Venezuela, Hezbollah-tied family clansparticipate in the local drug trade and money laundering, operating with protection from the regime. In Europe, Hezbollah raises money through charities which is legal in European countries because Hezbollah is not listed as a terrorist organisation, only its military wing is banned, allowing the group to raise money and collect donations for Hezbollah-tied associations. A terrorism designation would freeze al funds, financial assets, and economic resources of the group and would be a powerful CTF approach given the group’s vast network.

Conclusion

The case of Hezbollah is emblematic of innovation in terrorist financing because to achieve financial independence and to anticipate CTF approaches the group has evolved and diversified its sources of funding. This, in turn, has allowed the organisation to become one of the most technically capable and proficient terrorist groups in the world. With the advancement of technology, will the group continue to innovate its income sources by developing fund-raising schemes using cryptocurrencies? Maybe. Hezbollah has already received some cryptocurrency funding through the Iranian government, and in 2018 it was reported to have used crypto to fund part of its operations. Cryptocurrencies offer anonymity and may be used to diversify even more its portfolio, but because their supply is not flexible and their price can be controlled, terrorist organisations have so far shown reluctance to use them. Moreover, as long as the traditional financing methods are stable and not hampered by CTF efforts, the possibility of financing through cryptocurrency will not increase.