June 8, 2022No Comments

Italy’s cybersecurity response to Russian attacks (Italiano)

Author: Sarah Toubman

In the past few years, the Italian government has rapidly increased both the pace and number of steps taken to protect its national cybersecurity interests. Italy began creating legislation and organizations for the defense of its cybersecurity infrastructure in 1993, but many observers have criticized developments in Italian cybersecurity as inadequate and slow-moving compared to its peers in Europe and beyond. However, in June 2021, the Italian government declared its intention to create a new national agency for cybersecurity, and just weeks ago, released a national cybersecurity policy for 2022-2026.

The Italian government’s increased attention to cybersecurity has come just in time, as several prominent cyberattacks against Italy by Russian hackers occurred this May. Considering Italy and the European Union’s support for Ukraine in its war against Russia, it is not surprising that Russian-backed agents have unleashed attacks on Italy in the cybersphere, a space the Kremlin has long operated in. For example, during the 2008 Ruso-Georgian war, Russian-backed hackers reportedly carried out cyberattacks against Georgian internet infrastructure.

More recently, this cyber aggression has been turned towards both state and private cyberinfrastructure in Italy. On May 10th, Russian hacker groups “Killnet” and “Legion” attempted to break into and modify the voting results for the Eurovision Song Contest, which Italy hosted and Ukraine ultimately won. However, thanks to the Italian Computer Security Incident Response Team, which was created in 2018, the attempt was foiled. 

Similarly, just one day later on May 11th, “‘Killnet’ claimed an attack on the websites of several Italian institutions, including the Senate, Italy's upper house of parliament, and the National Health Institute.” On May 19th, the Russian hacking organization launched additional cyberattacks on Italian institutions, including the High Council of the Judiciary, and the Ministries of Foreign Affairs, Public Education, and Culture.

While Russian-backed cyber organizations are clearly enthusiastically targeting Italy, the robust responses of Italian cyber-defense organizations are now successful on a level which would have been unlikely prior to the development of its new cybersecurity agency and the rollout of its 2022-2026 cybersecurity policy. Although historically Italy has often been behind the curve in its cybersecurity policies, Mario Draghi’s push to launch the National Cybersecurity Agency was in fact extremely forward-looking and timely. Furthermore, since the agency’s announcement, Italian cybersecurity forces have developed the skills required to successfully counter Russian-backed agents, proving its creation was not merely a publicity-boosting measure for the Draghi government.

One recent headline has declared that “Italy [is] embroiled in cyber war with pro-Russian hackers.” Definitions of what constitutes cyberwarfare still vary, and the Russian government formally denies involvement with the groups of hackers conducting these attacks. However, such a headline again serves to remind those concerned with international security that Russia has historically and continues to use the cyber sphere to wage war, and therefore a robust international security policy necessarily includes cyber-defense. Therefore, in the context of the Russian invasion of Ukraine--the largest war seen in Europe since 1945--defensive cybersecurity capabilities are evermore important for Italy and any nation openly opposing Russian actions. 

Italy’s 2013 National Strategic Framework for Cyberspace Security and 2017 Cybersecurity Action Plan had both highlighted the need for improved public-private cooperation to ensure national cybersecurity moving forward. In fact, the 2017 plan had urged that “private entities operating in strategic sectors must be considered as key assets and included into a holistic approach to national cybersecurity that provides for the implementation of minimum security requirements for country-critical systems.” Again, such a point was forward-looking, highlighting the fact that in May 2022, Russian-backed agents did not only launch cyberattacks on Italian government organizations, but also the Eurovision Song Contest, a multinational initiative being operated out of Italy. 

Notably, under the country’s new cybersecurity policy, the Italian Computer Security Incident Response Team was successfully able to both prevent an attack against Eurovision and resolve cyber incidents related to government websites. However, moving forwards, this area merits even further attention. The Italian state could be severely impacted by cyberattacks against a whole range of websites, companies, and infrastructure, including public, private, and multinational organizations. Therefore, ensuring Italian cybersecurity going forward would require not just improved public-private cooperation, but also coordination between Italy and all interconnected sectors of the EU. 

Image Source: https://imgcdn.agendadigitale.eu/wp-content/uploads/2019/05/28110643/cyber-war.jpg.webp

Italian translation 

Negli ultimi anni, il governo italiano ha accelerato rapidamente il passo e ha compiuto progressi nella protezione dei suoi interessi nazionali nell’ambito della sicurezza cibernetica. L’Italia iniziò a legiferare e fondare organizzazioni per la difesa delle infrastrutture legate alla sicurezza cibernetica nel 1993. Da allora, molti osservatori hanno criticato gli sviluppi, ritenendoli inadeguati e lenti rispetto agli altri paesi in Europa e nel mondo. Giugno 2021 segna una tappa importante per il governo italiano, che dichiara di voler creare una nuova agenzia nazionale per la sicurezza cibernetica, e poche settimane fa, è stata pubblicata la policy per la sicurezza cibernetica nazionale 2022-2026.

L’aumento di attenzione per questo campo arriva perfettamente in tempo, quasi in concomitanza con diversi attacchi cibernetici compiuti da hacker russi contro l’Italia lo scorso Maggio. Tenendo presente il supporto dichiarato da Italia e Unione Europea per la guerra portata avanti dall’Ucraina contro la Russia, non è una sorpresa che agenti sostenuti dalla Russia stessa abbiano effettuato attacchi contro l’Italia nella sfera cyber, uno spazio in cui il Cremlino opera da tempo. Per esempio, durante la guerra tra Russia e Georgia nel 2008, la Russia ha dato supporto ad hacker per colpire le infrastrutture internet dell’avversario.

Più di recente, le aggressioni cyber sono state indirizzate contro la sfera cyber pubblica e privata dell’Italia. Il 10 Maggio, il gruppo hacker russo “Killnet” e “Legion” ha cercato di entrare e modificare i risultati dei voti dell’Eurovision Song Contest,tenutosi in Italia e vinto dall’Ucraina. Nonostante ciò, grazie al Computer Security Incident Response Team dell’Agenzia per la Cybersicurezza Nazionale, creato nel 2018, il tentativo è stato sventato.

Allo stesso modo, ad un solo giorno di distanza, “Killnet” ha rivendicato un attacco a diversi siti istituzionali italiani, incluso quello del Senato e dell’Istituto di Salute Nazionale. Il 19 Maggio, l’organizzazione russa ha lanciato ulteriori attacchi ad istituzioni italiane, inclusi il Consiglio Superiore della Magistratura, i Ministeri degli Affari Esteri, della Pubblica Istruzione e della Cultura. 

Mentre le cyber organizzazioni russe sono chiaramente entusiaste di avere l’Italia come bersaglio, le risposte robuste date dalle organizzazioni di cyber-difesa italiane hanno avuto un successo che non sarebbe stato possibile raggiungere precedentemente allo sviluppo della nuova Agenzia per la Cybersicurezza Nazionale e alla nuova policy 2022-2026. Sebbene storicamente l’Italia si è sempre trovata in ritardo rispetto ai progressi e alle policy promosse dagli altri paesi, il Presidente Mario Draghi ha insistito per fondare l’Agenzia per la Cybersicurezza Nazionale e questo ha permesso di essere estremamente lungimiranti nel garantire una risposta agli attacchi. Inoltre, dalla creazione dell’Agenzia, l’Italia ha sviluppato delle abilità notevoli e necessarie nella lotta contro gli agenti russi. 

Di recente, è stato dichiarato che “l’Italia è coinvolta in una cyber guerra con gli hacker russi.” Le definizioni di questa cyber-guerra sono ancora varie, e il governo russo ha formalmente negato il coinvolgimento dei gruppi hacker e gli attacchi condotti. Nonostante questo, la situazione al momento conferma che la sfera cyber è sempre utilizzata dalla Russia come arma contro i nemici di guerra, e perciò c’è bisogno di politiche per la sicurezza internazionale più robuste e che includano necessariamente la cyber difesa. Nella guerra tra Russia e Ucraina, la più grande guerra mai vista dopo il 1945, le capacità difensive nel campo della cybersicurezza sono ancora più significative per l’Italia e per qualunque altra nazione che voglia apertamente condannare le azioni Russe. 

La National Strategic Framework for Cyberspace Security del 2013 e il Cybersecurity Action Plan del 2017 hanno entrambi sottolineato il bisogno di migliorare la cooperazione tra pubblico e privato per assicurare una rapida evoluzione nell’ambito della cyber sicurezza nazionale. Infatti, il piano del 2017 ha evidenziato che “le entità private che operano per la cyber sicurezza nazionale lavorano per l’implementazione dei minimi standard di sicurezza richiesti per le infrastrutture critiche del paese.” Ancora una volta, questo punto di vista è lungimirante e sottolinea il fatto che a Maggio 2022, gli agenti russi non hanno solo colpito il governo italiano ma anche l’Eurovision Song Contest, un’iniziativa multinazionale che era organizzata dall’Italia. 

Il Computer Security Incident Response Team dell’Italia ha avuto successo nel prevenire l’attacco contro l’Eurovision e nel risolvere incidenti legati a siti internet del governo.

Infine, questo argomento meriterebbe ancora più attenzione. Lo stato italiano potrebbe essere severamente colpito da cyber attacchi contro siti internet, compagnie e infrastrutture, includendo il settore pubblico, privato e organizzazioni multinazionali. Per questo, garantire la cyber sicurezza del paese e svilupparla ulteriormente richiederebbe non solo un miglioramento della cooperazione tra pubblico e privato, ma anche la coordinazione tra Italia e tutti i settori interconnessi dell’Unione Europea. 

May 30, 2022No Comments

The Geopolitics of the Energy Transition’s Momentum

Authors: Riccardo Bosticco and Michele Mignogna.

Introduction

The main result that Putin has achieved until now with the aggression of Ukraine is a solid stance from the European Member States to halt gas imports from Russia. This and other green commitments have pushed the EU and the whole world to give renewed impetus to renewable energy. Moreover, the relation between climate and industry policies is increasingly evident. In a broader context of power competition trade, investment policies in the energy and climate sectors play an ambivalent role: energy dependencies have been conceptualized as mutually benefitting; yet, the current war unveils their risky nature. After a brief description of the renewables’ geopolitical dimensions, this article outlines what is at stake for the EU’s primary areas of energy cooperation. 

The Impact of Renewable Energy on Geopolitics

Renewable energies have the potential to transform interstate energy relations. Renewables have fundamentally distinct geographic and technological properties than coal, oil, and natural gas. Sources are plentiful but intermittent; their production is increasingly decentralized and utilizes rare earth resources in clean tech equipment and, lastly, their distribution is predominantly electric and entails tight management standards and long-distance losses. This contrasts sharply with fossil fuel resources’ geographically fixed and finite character, their reliance on massive centralized production and processing facilities, and their ease of storage and transit as solids, liquids, or gases worldwide.

The energy transition provides a chance to rethink and revise long-standing trading relationships. It also allows countries to engage in previously closed energy value chains. Significantly, the future of the energy world will likely redefine the concept of energy security. However, in this society, the impulse to produce things domestically will collide with the logic of size and global supply networks. The energy transition will rewire the planet, but how much of it will transcend international borders is still unclear. A crucial element will be the commerce of minerals, distinct from that of oil, gas, and coal in terms of location. Nonetheless, such business will follow a familiar pattern: resources will be harvested in one region of the world, transported to refineries and processing centers, and then transformed into final goods. Diversification, bottlenecks, extraction disputes, and rent-seeking dynamics will all be present, although with different details.

Such developments will require a significant shift in energy strategies, indicating that areas pursuing industrial policies rather than decarbonization may reap climatic advantages. The previous energy map established a link between natural resources and markets. Yet, the new energy map will be much more complex.

The Geopolitics of the Energy Transition and the EU

Bringing together the words ’geopolitics’ and ‘renewables’ leads to the study of renewables and related security risks, the effects of the energy transition on traditional energy relations, possibilities of mutually beneficial ties, and windows of opportunity for countries to move up in the global power hierarchy. The energy transition is indeed a process where the industrial advantage is likely to bring with itself political benefits and leadership status. In the context of the current war in Ukraine, this is becoming clearer every day. Yet, the energy transition is expected to become part of power competition as the most impellent challenge – posed by the war as well as climate change and the security risks with it – of our times and will likely create amities and enmities.

Take the example of Russia. In the past decade, Russia has perceived the EU’s energy transition problematically. The EU-Russia energy relationship was primarily based on gas, oil, and coal. Nonetheless, the association is characterized by different conceptions of energy and energy security, although both actors recognize the potential of energy interdependence. While the EU and European countries are more enthusiastic concerning the transition, Russia’s discourses are more conservative yet try to defend the role of natural gas in the energy transition.

While it is difficult to predict an essential role played by Russia nowadays, given the progressive isolation it is forced to, the energy wire will see China having high stakes in renewable developments and geopolitics. Concerning relations with the EU, some have argued that the energy transition is likely to be the determinant of the future of EU-China relations. Energy in EU-China relations does not play the same role as relations with Russia. While the renewable sector has encouraged interdependence between the two powers in the past, more recently, nationally oriented policies have hindered the precedent path.

Still, the energy transition will significantly shape relations between the EU and the Arab states. While Bahrain, Kuwait, Qatar, Saudi Arabia, and the United Arab Emirates are challenged by balancing relating with the US and China, managing regional crises, the pandemic, and containing Iran as the primary regional rival, the last point precisely is preventing some of the Arab states in the Gulf region to act assertively against Russia. Nonetheless, looking ahead to the 2020s, how those countries manage the energy transition will have consequences on internal and external political and economic environments. Especially Gulf countries envision a sustainable future, thus setting the stage for redrawing energy investments. In this context, the EU will play a crucial role, opening to the Gulf’s market interests and advancing regional security interests.

Conclusion

Overall, the current war is not only highlighting the strategic value of energy resources and energy ties but also how the transition to new energy systems is likely to rewire the world. In a context where the main political divide on the global stage is between liberal and illiberal forces and strong energy dependences revealed security threats, future systems of alliances will have to account for this. For the EU, the energy transition will have to deal with Russia, act as cohesively as possible, and strengthen its strategic thinking concerning big partners such as China and the Gulf States. The transitions’ stakes entail a strategic opportunity to avoid past errors.

May 26, 2022No Comments

Will the new Transatlantic Data Framework withstand a ‘Schrems III’ in European Courts?

Authors: Beatrice Gori, Giovanni Tricco and Giorgia Zaghi.

On March 25, amid a week of summits in Brussels overshadowed by the Ukrainian war, Joe Biden and Ursula Von Der Leyen in a joint meeting unexpectedly announced a new transatlantic data privacy agreement in principle, clearly showing  the political status nearby the issue. Since the fall of the previous privacy shield in 2020 the data flows between the two transatlantic actors have been surrounded by uncertainty, making it difficult for companies, particularly SMEs, to conduct business. Transatlantic data and information flows between the United States and the European Union are estimated to be valued at over $7.1 trillion dollars with over 5300 companies participating, including technology behemoths such as Google, Meta and Microsoft. Therefore, a new agreement is well expected by both sides of the Atlantic since the Court of Justice of the European Union (CJEU) decision in Schrems II which called for the unproportionate capability of US surveillance capabilities and the lack of an effective redress body for European data owners.

The new Transatlantic data pact is expected to heal such gridlocks and foster the data economy in the near future. However, a text has not been published, raising serious doubts among privacy experts. Max Schrems, the Austrian privacy activist who has torn down the two previous agreements, welcomed the new pact as “a lipstick on a pig” calling for future challenges in front of the European judicial system. The line between whether such a new agreement will fulfill the CJEU criteria or pave the way for a Schrems III is exceedingly thin. Nonetheless, the question is surrounded by different controversies, indeed The CJEU highly criticized US practices without taking into account the national capabilities of its Member States. Several reports, including one from theEuropean Fundamental Right Agency (FRA) and from the United Nations High Commissioner for Human Rights, outlined how surveillance programs conducted by European intelligence services allegedly vary from collecting traffic metadata from diverse sources to monitoring web forums and intercepting cable-bound transmissions.

Indeed, in Europe surveillance activities fall under the scope of national security, which is a matter of national competence according to the Treaty of the European union (TEU), therefore European courts cannot legislate or address changes to its Member States. The EU courts’ approach has provoked anger and disbelief among US national security experts: “mix of judicial imperialism and Eurocentric hypocrisy”, as pointed out by Steven Baker a partner in the law firm Steptoe & Johnson LLP and former general counsel of the National Security Agency (NSA). Therefore, while the CJEU’s Schrems II decision emphasized how the current laws inadequately protect the right of non-nationals to judicial redress in the United States, additional surveillance and intelligence reform should be addressed even in the EU to create a political momentum for legislative intervention in the American congress. Until that moment as underlined by Peter Swire it is “unrealistic for the EU to demand changes to U.S. national security legislation when European countries themselves are not averse to similar practices.”

Image Source: https://www.bbc.com/news/world-europe-57489588

Swire's forecast appears to have come true, in the fact sheet released by the US government no legislative amendments are mentioned; instead, it calls for the establishment of a new redress mechanism and other safeguards to satisfy the CJEU’s request via a Presidential Executive Order (EO). Such a process would raise doubts regarding the capacity of the new mechanism to be independent and able to investigate wrongdoings by the American Intelligence Communities (IC). Theoretically, this would represent the same issues of the Ombudsman of the old-fashioned Privacy Shield. However, an intriguing solution t has been envisaged by experts. They call for the creation of an independent redress authority via a regulation of the Department of Justice (DOJ) which will be independent by the executive, in conjunction with EOs from the President that would confer to the newly redress authority concrete capability to effectively investigating redress requests and for issuing decisions that are binding on the entire American IC. A non-statutory solution according to them that would – theoretically – satisfy the request of the European courts in Schrems II.

The European Data Protection Board (EDPB) made the point clear in its statement saying that it will direct “special attention to how this political agreement is translated into concrete legal proposals.” Therefore, until a text is missing just speculation can be made. Indeed, at the moment the political agreement made on 25 March 2022 is just the latest step on the ‘intense negotiations’ on a Privacy Shield replacement, as stated by the European Commissioner of Justice Didier Reynders, who announced that the works for a final text is undergoing in order to have the final agreement for late 2022. He pointed out that: "It is difficult to give a precise timeline at this stage, but we expect that this process could be finalized by the end of this year. On the European side there is trust in the work and commitment of American officials. Indeed, the U.S. Department of Commerce Deputy Assistant Secretary for Services Christopher Hoff said to IAPP that the United States made unparalleled commitments to significantly increase privacy and civil liberties safeguards through the establishment of the new multi-layered redress mechanism, assuring that it will be independent and binding in its safeguards on how the court is set up, as well as the protections for the judges' selection and removal. In addition, he pointed out that he strongly believes that the agreement will be durable and that all the features surrounding the new agreement will be much clearer at the appropriate time.

The stakes are high, indeed, in case the agreement will not survive the scrutiny of the CJEU legal uncertainty will persist and future economic losses for the digital economy of the EU and the US will increase. Accordingly, to forecasts of DIGITALEUROPE by 2030 if a stable agreement that enables lawful and consistent data transfer is not assured the European Union economy could lose €1.3 trillion in cumulative economic growth by 2030, €116 billion in annual exports and 1.3 million job losses, primarily high-skilled professions. On the other hand, if a stable mechanism of data transfer will be assured the EU economy would gain €720 billion in cumulative extra growth by 2030, equivalent to an increase of 0.6% in GDP on a yearly basis, €60 billion in annual exports, of which half coming from the manufacturing sector, boosting the position of European SMEs and 700 thousand new jobs will be created. Therefore, it is critical that the text of the new agreement will include proper safeguards as requested by the CJEU in Schrems II in order to ensure a long-standing Transatlantic Data Flow Agreement, on which the European data economy may foster, as well as, the protection of the rights of europeans being guaranteed in the years ahead. 

May 23, 2022No Comments

Competition or Cooperation: What drives the U.S. Strategy in the Arctic?

Author: Irene Senfter.

Arctic politics: past and present

The Arctic region was a prominent theatre during the Cold War as it is home to Russia’s Northern Fleet, Russia’s second-strike nuclear capabilities, and North America's North Warning System. Gorbachev’s reassessment of the region as a “zone of peace” in 1987 inaugurated three decades of peaceful and cooperative regional governance. Sadly, Russia’s recent violation of the UN charter when invading Ukraine in 2022 does not bode well for a region that until recently has been relatively isolated from world politics

By purchasing Alaska from Russia in 1867, the United States has become an Arctic nation. However, except for the Cold War period, the region has received somewhat limited consideration in US national security strategy. The US has never developed an Arctic identity comparable to Russia or Canada. In 2013, the first US Arctic strategy document was released under President Obama. It is currently being updated under President Biden. 

This article will follow a structural realist approach to explore three main drivers of US strategy in the Arctic: access control of the Arctic Sea, freedom of navigation on Arctic Sea lanes, and regional security dilemma. A fourth driver, climate change, is examined through a liberal institutionalist lens.

Image Source: www.pixabay.com

Arctic competition: a realist perspective

According to Mearsheimer’s theory of structural realism, states operate in an anarchic international self-help system and strive for maximum power to assure state survival. Great powers struggle to become regional hegemons and want to prevent other states from becoming hegemons in their regions. From this perspective, the United States’ objective in the Arctic is to prevent Russia from becoming a regional hegemon. The Arctic region is of great strategic importance to the Russian government.  To achieve its goal, the US needs to control access to and exit from the Arctic Sea through a strong naval presence in the Bering Strait and allied military cooperation in the Chukchi Sea and the GIUK (Greenland-Iceland-UK) gap. 

Unlike other states, the US is not primarily interested in the extraction of natural resources and the development of new trade routes enabled by the receding Arctic ice masses. However, freedom of navigation on the Northern Sea Route (NSR) is a critical factor in preventing Russian regional hegemony in the Arctic. Just as the US insists on freely navigating the South China Sea, it strongly opposes Russia’s policies of mandatory registration and escort of vessels where the NSR runs through Russian territory or waters. It also disputes Canada’s sovereignty claim on the Northwest Passage.  Notably, China has declared itself as a “near-Arctic” nation and has presented plans for a Polar Silk Road,evoking the spectre of rising Chinese influence in the region.

Mearsheimer argues that states will use every opportunity to gain a strategic advantage over their adversaries. For realists, power derives from military strength and economic might, and states can never be sure about their adversaries’ intents. This dynamic is currently feeding a security dilemma in the Arctic.  Many observers view the Russian military build-up in the Arctic as potentially offensive to Western security. Russia has been building or upgrading military bases in the Arctic and modernising its nuclear submarine fleet located at the Kola Peninsula. New Russian hypersonic gliders could evade the North Warning System. All Arctic states have boosted their northern presence in reaction to heightened tensions. Russia looks at NATO’s increased presence in the Arctic region with suspicion, especially at Finland’s and Sweden’s recent NATO membership plans.

The US Department of Defense has instructed the US AirforceArmy, and Navy to increase capabilities, presence, cooperation with allies, and resilience in the Arctic. Alaska is already the most militarised of all US states, and in 2022 it will host the highest number of F-35 jets in the world. A deep-water port to be constructed in Nome will allow servicing of the heavy vessels that can blockade the Bering Strait. In this context and against common complaints, a large fleet of icebreakers is not necessarily of strategic importance to the US. 

Arctic cooperation: a liberal institutionalist perspective

According to liberal institutionalism, institutions enable cooperation between states as they encourage states to forego short-term benefits for long-term gains. Mearsheimer disputes that international institutions can change state behaviour in the military realm. However, he acknowledges their effectiveness in the environmental sphere. With its ambitious research projects and numerous working groups, the Arctic Council is a premier example of cooperation on climate change, environmental protection, sustainable development, and human security. Climate change in the Arcticis proceeding twice as fast as on the rest of the planet as the receding ice exposes more seawater. Seawater is darker than ice and absorbs rather than reflects heat. Rising sea levels are causing severe coastline erosion at a high cost to the mainly indigenous population. The permafrost is thawing, freeing up yet more carbon and causing damage to housing and infrastructure. Currently, the Arctic Council has paused all official meetings in reaction to Russia invading Ukraine in February 2022. 

Climate mitigation efforts, sustainable development, and Arctic scientific knowledge benefit communities living on all American coastlines and areas exposed to extreme weather and wildfires. Therefore, it is in the interest of the United States to find a way for the Arctic Council to continue its work. Despite the intense security competition between the US and China, American political leaders know that dialogue on environmental issues must continue. The work of the Arctic Council could be isolated from geopolitics in a similar way. 

Conclusion

Arctic geopolitics has limited bearing on the global balance of power, but global power play impacts Arctic security significantly. Sea access control, freedom of navigation, security dilemma management, and climate change in the Arctic are of national interest to the US and shape its Arctic strategy. This analysis shows how the US seeks to protect free and open domains in the Arctic. The challenge for the US and all Arctic nations consists in guaranteeing a stable and sustainable Arctic space for the benefit of the people who live in the Arctic and beyond. 

May 19, 2022No Comments

The Consequences of Ukrainian War on U.S.-China Relations

Author: Francesco Cirillo.

The war in Ukraine is shaking the European security system and also influencing Washington's strategies in the Indo-Pacific. With the focus on Europe, the US has slowed down its diplomatic and political activity in Asia while keeping a close eye on Beijing's moves. The latest moves such as Beijing's ratified security agreement with the Solomon Islands has alarmed Canberra, a close US ally, as well as the Americans. For Washington, the move is seen as an attempt by Beijing to strengthen its diplomatic and politico-military position in the South Pacific. Another hot dossier concerns the thorny issue of Taiwan. With the Russian invasion Washington is analysing how it can support Taipei in terms of military aid without bothering the People's Republic of China.

In recent months, with the outbreak of war in Ukraine, there have been growing concerns that in the near future Beijing might attempt an armed attack to occupy and annex Taiwan, which Beijing calls one of its 'rebel provinces'. At the moment, however, there seem to be no signs of a possible Chinese attack. The war has been a total game changer, causing concern within Xi Jinping's leadership. According to the Wall Street Journal, Chinese big tech companies are scaling back their business in the Russian Federation market, as they are intimidated by possible sanctions that the US and the West might apply against them. But recently a War Game was broadcast on NBC news, simulating an invasion of Taiwan by the People's Republic of China and a subsequent military confrontation with the US in the Pacific.

Image Source: https://pixabay.com/photos/mao-zedong-mao-tse-tung-chairman-mao-15983/ 

In fact, within the US federal agencies, preparations are being made for a possible war confrontation with Chinese forces. Despite the tension within some Chinese academic circles, it is theorised that a kind of competitive coexistence could be found with Washington, which would aim to exclude a warlike confrontation. In January 2022, Professor Wang Jisi , lecturer at the School of International Studies and President of the Institute of International and Strategic Studies at Peking University, wrote and published an essay entitled 'A Hot Peace: Is a Paradigm in U.S.-China Relations Emerging?'. In this short essay, the academic theorises that despite the mistrust between Washington and Beijing on various dossiers ranging from the Hong Kong issue to the mistrustful view of international relations via Taiwan, it is necessary to maintain and consolidate a channel of communication between the two leaderships in order to cooperate when the interests of both the People's Republic and the United States converge. According to Wang Jisi, this would lead the current status of Sino-US relations not towards a new 'Cold War' but towards a so-called 'Hot Peace', in which Beijing and Washington, despite competition in various fields, mutual mistrust and different visions concerning the status quo of the international chessboard will necessarily have to cooperate in certain dossiers of global importance.  

The war in Ukraine puts Beijing in front of a dangerous strategy: on the one hand it publicly pushes both Moscow and Kiev to find a point of convergence to open a diplomatic mediation table; on the other hand it wants to avoid being included in possible economic sanctions. Moreover, it adds that there could be a remote hypothesis that is at the moment difficult to realise: with a severely weakened post-war Russia, China, in exchange for financial aid, would ask the Kremlin for possible access to military technology in the experimental phase in order to study it and acquire know-how.

At the moment, however, China is focused on other dossiers and preparing for the Party Congress, but with an eye on the economic consequences that the conflict could bring globally. 

May 17, 20221 Comment

How innovation in terrorism financing explains Hezbollah’s financial success

Author: Camilla Cormegna.

Introduction

Terrorism financing is vital for a terrorist organisation to operate and carry out terrorist activities, but resources are also spent to provide community services such as welfare, education, public and protection service replacing governments as the main providers. An example of this is demonstrated by Hezbollah, the focus of this analysis, whose social services offered to the Lebanese Shiite population allows it to secure political supports while acquiring a sacred and untouchable status in Lebanon. To sustain its organisational establishment while pursuing ideological and political objectives, Hezbollah is estimated to earn $1 billion annually through various sources. 

Hezbollah depends on an array of revenue resources, although the bulk of its funding comes from Iran’s state-sponsorship, which provides around $800 million annually. This external funding comes with drawbacks, as sponsorship undermines group’s autonomy and pressures and sanctions on Iran negatively affect the state’s financing of Hezbollah. Therefore, Hezbollah is forced to innovate and diversify the sources of income to ensure financial sustainability. The group now leverages drug and human trafficking, diamonds smuggling, money laundering, propaganda televisionlocal exactions, and diverting charitable contributions

The article argues that Hezbollah owes its success to innovation in terrorism financing, making it one the most proficient and technically skilled terrorist groups in the world. Innovation refers to ability of terrorist groups to develop and adopt new financial techniques when pressured by countering terrorist financing strategies. This process can entail different phenomena such as the introduction of new tradeable commodities, new methods of production, new supply sources, and new market opportunities. The article presents Hezbollah’s success by exploring three profitable ventures that demonstrate the group’s ability to exploit lucrative opportunities: their sophisticated money-laundering scheme, the terror-crime nexus and the group’s ties with Venezuela, and the role of the Lebanese diaspora. 

Image Source: unsplash.com

A sophisticated money laundering scheme

Hezbollah runs an extensive network of illicit trade involving cars and drugs to launder money. In 2015 it was reported that Hezbollah purchased used cars in the United States which were then shipped and sold in West Africa while at the same time, drugs were shipped from Colombia to Europe. Both proceeds were sent to Lebanon through Hezbollah controlled money laundering channels and then deposited into the financial system. It is estimated that between 2007 and 2011, Hezbollah, with the help of the Lebanese Canadian Bank (LCB) and exchange houses, laundered $300 million. The LCB case shows the innovative adaption of Hezbollah, as after the 2011 scandal which detected and closed LBC’s money service businesses (MSBs), the terrorist organisation soon replaced MSBs resuming with the money laundering. This caseillustrates how Hezbollah’s facilitators are leveraging global trade and financial institutions to carry out illegal activities and how complex and sophisticated their system is, but it also demonstrates how facilitators among the Lebanese diaspora community are vital in supporting the organisation.  Moreover, counterterrorism financing (CTF) deficiencies and constraints allow Hezbollah to thrive and exploit the cross-border movement of funds. Financial intelligence units’ effectiveness is achieved through information sharing which is geographically circumscribed, and compliance with the Financial Action Task Force (FATF) legislative and regulatory standards is lacking in the Middle East

The terror-crime nexus with FARC and Venezuela’s role

As the money laundering scheme briefly introduced, Hezbollah has developed its own criminal activities such as the drug trade and it has done so by developing a strategic cooperation with FARC. Although their relationship is not political neither revolutionary but done to guarantee funds and financial independence through the diversification of income sources, the coupling of these organisations allows them to share operational knowledge, making them a “hybrid narc-terrorist network”. Hezbollah’s involvement with FARC and the drug trade was revealed in 2008 through the US and Colombian Operation Titan which dismantled a cocaine smuggling and money laundering ring which profited both organisations. 

Hezbollah is also tangled up with the Venezuelan government, which guarantees a safe haven to carry out their operations. Hezbollah’s involvement with Venezuela started in the 1980s, when the organisation started to deepen its association with many Lebanese immigrants in Latin America who fled the civil war. In 2005, the then Iranian and Venezuelan presidents Ahmadinejad and Chavez came together in a series of commercial ties, laying the foundations of their relationship. There is evidence that the Venezuelan government launder Hezbollah’s money while providing them with material support for their activities, but it also employs Hezbollah sympathisers as Ministers generating revenue through the distribution of narcotics. It is the case of the current Minister of Industries and National Production El Aissami of Iraqi-Lebanese descent, involved in the drug trafficking and in the issue of diplomatic passports for Hezbollah facilitators. In this environment characterised by corruption and bribery, Hezbollah continues to thrive because Latin American countries do not recognise Hezbollah as a terrorist organisation, thus failing to enforce CFT frameworks while facilitating illicit financial flows. Moreover, Venezuela is noncompliant with 31 out of the 40 FATF recommendations, demonstrating how the regime has no intention in addressing terrorism concerns.

The role of the Lebanese diaspora

Hezbollah’s presence in international diaspora communities provides the organisation with access to criminal ventures and funds. The diaspora is comprised of Lebanese emigrated mainly to Europe, Latin America, North America, and West Africa between 1975 and 1990. Hezbollah acquired financial support from the diaspora through its commitment to the fight against Israel and the West and it translated the support into an array of financial sources as well as financiers and facilitators. A cultural practice embedded within the diaspora is the sending of remittances to Lebanon and to Hezbollah, considering its legitimate status among Shia at home, as a method of support. However, third-party funding is risky for terrorist organisations, as donors may lose interest in the cause or law enforcement activity can lead to a decline in donations. In West Africa, the Lebanese diaspora is heavily involved in the diamond trade, as diamonds are a source of donation and as an informal tax to support the organisation back home. In Venezuela, Hezbollah-tied family clansparticipate in the local drug trade and money laundering, operating with protection from the regime. In Europe, Hezbollah raises money through charities which is legal in European countries because Hezbollah is not listed as a terrorist organisation, only its military wing is banned, allowing the group to raise money and collect donations for Hezbollah-tied associations. A terrorism designation would freeze al funds, financial assets, and economic resources of the group and would be a powerful CTF approach given the group’s vast network.

Conclusion

The case of Hezbollah is emblematic of innovation in terrorist financing because to achieve financial independence and to anticipate CTF approaches the group has evolved and diversified its sources of funding. This, in turn, has allowed the organisation to become one of the most technically capable and proficient terrorist groups in the world. With the advancement of technology, will the group continue to innovate its income sources by developing fund-raising schemes using cryptocurrencies? Maybe. Hezbollah has already received some cryptocurrency funding through the Iranian government, and in 2018 it was reported to have used crypto to fund part of its operations. Cryptocurrencies offer anonymity and may be used to diversify even more its portfolio, but because their supply is not flexible and their price can be controlled, terrorist organisations have so far shown reluctance to use them. Moreover, as long as the traditional financing methods are stable and not hampered by CTF efforts, the possibility of financing through cryptocurrency will not increase. 

May 16, 2022No Comments

Trail of Blood in Colombia’s Tourist Resort: The murder of Paraguayan anti-narco prosecutor Marcelo Pecci

Author: Giovanni Giacalone.

On the morning of May 10th Paraguay’s anti-drug prosecutor Marcelo Pecci was murdered by two hitmen on a jet ski who reached the beach where he was vacationing with his wife and shot him in the head and the back. The murder took place in Barù, a renowned location just 45 minutes away from the city of Cartagena, Colombia. The jet ski was rented by the killers in Playa Blanca, approximately 3 km away from the resort where Pecci and his wife were staying.

“One of the men got out and without saying a word he shot Marcelo twice, one shot hit him in the face and another in the back,” Pecci’s wife, Claudia Aguilera, told the newspaper El Tiempo. The hitmen then fled in the same jet ski. A hotel security guard was also shot at, although he was not injured. Prosecutor Pecci was traveling without bodyguards and his wife said that they had not received any type of threat. Additionally, the Colombian police forces were not aware of his presence in the country.

The couple had traveled from Paraguay to Cartagena on May 5th to spend their honeymoon there. The following day, after a quick visit to the city’s historic center, they reached the Decameron Hotel and Resort in Barù, where they planned to spend the rest of the time before heading back to Paraguay on May 10th, as indicated by the message published on Monday May 9th by Aguilera on social media: “The last sunset in Barú, but we will have millions more together.” At approximately 10:30 am on Tuesday morning, the last day of vacation, Pecci was gunned down in front of his wife and tourists at the hotel’s private beach. A group of Paraguayan tourists who were at the same hotel as Pecci and were leaving on the same day complained that they were held for questioning by the Colombian police for hours, and added that at the hotel and resort there was no visible security, as reported by ABC TV Paraguay. 

Marcelo Pecci was a high-level prosecutor who specialized in contrasting drug trafficking, money laundering and organized crime. He had recently participated in the operation Ultranza Py against drug trafficking in Paraguay and he was also investigating the infiltration of Ndrangheta in the country. According to Gen. Jorge Luis Vargas, head of Colombia's national police, Pecci was the victim of "transnational" criminals working across borders and the murder was very likely highly planned, with a large amount of money spent to carry it out. He also added that narcos or even international terrorists could be behind the murder. 

On the same day of the homicide, the Colombian police released a picture of one of the two alleged killers, a man dressed in black, wearing a Panama hat, with a Caribbean accent. The Colombian authorities announced a reward of up to 500 million Colombian pesos ($12,000) to anyone who can provide information about the assassins. The owner of the jet ski that was rented to the two hitmen said that they paid $50 to use the vehicle for 30 minutes, but they returned it just 15 minutes later.

There are currently two versions regarding the killers, one is that they followed Pecci and his wife all the way from Paraguay to Barù, traveling on the same plane; the second one is that they were contracted in Cartagena to conduct the hit. Rocio Vallejo, a member of the Paraguayan Parliament and the Patria Querida party claimed that organized crime is behind it, she pointed the finger against the “narco-politica” and even accused some Parliament members of being linked to the narcos, adding that “narcotrafficking knows no borders”.

As explained to the ITSS by the Brazil-based investigative journalist Maria Zuppello, who is specialized in organized crime and terrorism in Latin America: “The murder of Pecci is a tragic page not only for Paraguay but for all of Latin America that lost a prosecutor of great value. The various leads that are being followed range from the terrorist matrix of Hezbollah to the former president of Paraguay, Horacio Cartes, who was already targeted by the Dea for money laundering and narco-activity in the United States. It is now clear how Latin America has become a privileged hub for narco-terrorism”. Following the murder, the Paraguayan police searched the prison cell of Lebanese narcotrafficker Kassem Mohammed Hijazi, who was arrested in August of 2021in Ciudad del Este thanks to an investigation led by Pecci with the support of the Dea. In the meantime, Noticias Caracol revealed that four Paraguayan women who had arrived on the same flight and were staying at the same hotel as Pecci, and a person considered very close to the murdered prosecutor, are under the radar of the Colombian authorities.

It is unclear why Pecci, considering his high-level profile, was traveling without bodyguards and had not warned Colombian authorities about his presence there. It is possible that since he hadn’t received any threat, as claimed by his wife Claudia Alvarez, he thought that he would be safe in a place like Barù, renowned for international tourism and with a very low crime rate if compared to other parts of Colombia; however, the killer were after him. The investigations are currently underway with the help of the Dea, the Fbi, Interpol, and it is plausible that there will be news in the upcoming days.

May 9, 2022No Comments

The Need for a Territorial Defence Force in Taiwan

Author: Sandra Watson Parcels.

The Chinese Communist Party is one of the most ruthless regimes in history. There should be no illusion that China, under President Xi, is not only capable, but willing to enact this violence on the people of Taiwan. Mara Karlin, United States Assistant Secretary of Defence for Strategy, Plans and Capabilities stated, "I think the situation we're seeing in Ukraine right now is a very worthwhile case study for them about why Taiwan needs to do all it can to build asymmetric capabilities, to get its population ready, so that it can be as prickly as possible should China choose to violate its sovereignty." Ukraine, under the might of the much larger Russian military, was expected to fall in days, but the Territorial Defence Force has been credited in helping to slow the Russian advance. 

A recent article by Michael Hunzeker and Admiral (Ret.) Lee Hsi-ming, former Chief of the General Staff of the Republic of China’s (Taiwan) Armed Forces, and a recent ITSS Verona Interview with the Admiral discusses the need for Taiwan to develop a standing, all-volunteer, Territorial Defence Force against the threat of a Chinese invasion. The Taiwanese military currently has approximately 170,000 active-duty troops, including 90,000 Army, 40,000 Navy,10,000 marines and 40,000 Air Force but just rough-and-ready militias and civil defense groups to counter a ruthless occupation. Territorial Defense Forces are not capable of defeating a large-scale invasion but can prevent a swift victory by ensuring an occupation would be violent and lengthy.

Hunzeker and Admiral Lee’s concept is to build a Territorial Defence Force around special forces units, trained in asymmetrical warfare. A well trained and equipped Territorial Defence Force would make it very difficult and costly for the People’s Liberation Army (PLA), should they get passed Taiwan’s coastline defences. In a recent interview, Hunzeker elaborated that Taiwan should have a Territorial Defence Force for two reasons. One, as a message of deterrence that the Taiwanese people are ready, willing, and able to defend Taiwan. Two, a Territorial Defence Force would make it very challenging to conquer the civilian population. This would buy time for Taiwan to defend itself and for allies to intervene and help Taiwan. Retired U.S. Navy Rear Admiral Mark Montgomery, a senior fellow at the Foundation for Defense of Democracies stated that the United States (U.S.) needs to learn the right lessons from the war in Ukraine, including spending less time ‘worrying about provoking authoritarian bullies’ and more time working todefend threatened democracies before invasions start. The U.S. has also been slow in addressing concerns and requests by U.S. Indo-Pacific Command, that recently warned again that military balance of power in the region continues to become “more unfavorable” for America and its allies. Therefore, although it is likely the U.S. and allies will come to Taiwan’s defence, Taiwan must also show a willingness to fight, just as Ukraine’s Territorial Defence Force inspires the world and garners international support.

Image Source: https://aspeniaonline.it/wp-content/uploads/2020/10/taiwan.jpg

The Territorial Defence Force would not need to be extremely large to be effective. Units of thousands, even hundreds of asymmetric trained volunteers would make a big impact, as witnessed now in Ukraine. 

The Taiwanese government must play the leading role in building and supplying the Territorial Defence Force. Not only must volunteers be trained, but they will also need to be armed and supplied. Ukraine has land borders that make it easier to resupply fuel, ammunition, weapons, water, food, and medical supplies. As an island, Taiwan has the advantage of island defence but will be at a disadvantage when it comes to resupply. Taiwan’s strategic challenges include knowing China will attempt to cut Taiwan off from the outside world. Therefore, it is vital that the Taiwanese government create a Territorial Defence Force and provide stockpiles throughout the country. 

Scenes of ordinary Ukrainians defending their homeland has awakened Taiwan’s own spirit of resistance. The Taiwanese people are inspired, Russia has shown that the threat of invasion is real and Ukraine’s Territorial Defence Force has shown that resistance works. Now is the time for the government of Taiwan to build a strong, fully supplied Territorial Defence Force that will deter and, if need be, defend Taiwan from occupation. The 4thPresident of the United States, James Madison once said, “A well-regulated militia, composed of the body of the people, trained in arms, is the best most natural defense of a free country.”

May 9, 2022No Comments

Psychological Warfare in a Changing World

By: Danilo delle Fave and Marco Verrocchio.

“Supreme excellence consists in breaking the enemy’s resistance without fighting”. This sentence of Sun Tzu well summarizes the meaning of Psychological warfare Psychological Operations (PSYOPS) includes all the psychological techniques to influence the behaviour, emotions and reasons of the target (governments, armies, companies, etc..) to affect its results. Three types of PSYOPs are distinguishable: Tactical, Operational and Strategic. While the Tactical PSYOPS are used during a conflict, the Operational ones are used also prior and after a military operation, to assist the commander’s plans. 

At the same time, Strategic PSYOPS comprehend all activities a government can pursue to influence foreign attitude, perceptions and behaviour. In other words, PSYOPS are essentially conceived as in support of other operations, trying to maximize the profits with the least effort possible. Many communication tools are used in PSYOPS, from leaflets to social networks. Therefore, efficient communications and practical messages are essential for the outcomes of the operations. Although Psychological warfare was used since ancient times, it became more effective when communication allowed a constant persuasion of the enemy or its civilian population. 

Not surprisingly, the first PSYOPS occurred during WWII through radio stations. Axis forces and Allies created specific programs broadcasted regularly on FM and AM frequencies to discourage enemy’s population and send fake news. Some of these operations were effective. For example, Radio London, a BBC program, successfully sent messages to the Italian Resistance in occupied Italy. After WWII, PSYOPS began to be extensively used. In Korea, a special division of the US Command was created to convince soldiers to lay down their weapons and prevent South Koreans from supporting the enemy. PSYOPS operations worked closely with Marines in the First Gulf War, achieving significant results. For instance, the 9th PSYOP Battalion facilitated the surrender of 1.405 Iraqi troopsbesieged on an island, just sending helicopters with aerial loudspeakers. 

Image Source: https://upload.wikimedia.org/wikipedia/commons/thumb/0/01/US_Army_soldier_hands_out_a_newspaper_to_a_local_Aug_2004.jpg/1280px-US_Army_soldier_hands_out_a_newspaper_to_a_local_Aug_2004.jpg

Since the end of the Cold War, Psychological warfare has changed dramaticallyPSYOPS have become instruments of NATO. According to the Allied Joint Doctrine for Psychological Operations (NATO PSYOPS), they are considered as: “Planned psychological activities using methods of communications and other means directed to approved audiences in order to influence perceptions, attitudes and behaviour, affecting the achievement of political and military objectives”. This is a definition that fits better with the current status of the PSYOPS, and it was developed during “the war on terror”,where coordination with US allies was fundamental. Nowadays, the borders among tactical, operational and strategic PSYOPS are blurring due to the global scale and the simultaneous nature of the information. Moreover, in the current high-intensity warfare scenarios, Tactical PSYOPS are more dangerous than Strategic and Operational ones due to more precise guided weapons. A solution to the drawbacks of Tactical PSYOPS is coming from technology. For example, in the war in Ukraine, leaflets have been replaced by SMS text messages and audio ones, using Orlan-10 drones like jammers to spread information directly on the cellphones of Ukrainian soldiers.

In the battle to conquer the “hearts and minds”, both the United States and the Russian Federation had developed a proper doctrine for psyops. In the U.S doctrine psychological operations are a peculiar type of Information Operations, which represent the integrated employment of Information-related capabilities in concert with other lines of operation to influence, disrupt, corrupt, or usurp the decision making of adversaries and potential adversaries while protecting their own. These Information-related capabilities can be carried on as military information support operations, cyberspace operations, electronic warfare, military deception, civil military operation and even public affairs. In this framework the U.S. doctrine states that psyops are driven primarily in the effort of influencing foreign target audiences through the development of massages and devise actions in order to change those groups’ attitude and behaviors.

Psychological operations are therefore carried on as military information support operations that can also degrade the enemy’s combat power, reduce civilian interference, minimize collateral damage, and increase the population’s support for operations. The key aspect of U.S. doctrine is represented by the dissemination of persuasive messages based on true information. False information is considered a double-edge weapon and risks being counter-productive to the long-term credibility and success of psychological operations.

The Russian doctrine instead adopts a different approach: they do not consider a liability the use of false information and have also developed a military doctrine that prescribes the implementation of psyops even in times of peace. Based upon the Soviet tradition of psychological operations, the so-called spetspropaganda, the Russian doctrine has developed the so-called “new generation warfare”. It is centered around the idea that current menances to the Russian Federation come from the “information sphere” and call for the strengthening of Russian capabilities in psychological operations. As in the Soviet time, the two pillars of Information warfare are reflexive control and active measuresReflexive controlis the manipulation of the decision making process of the enemy by altering key factors in the adversary’s perception of the world and causing him to choose the actions most advantageous to Russian objectives. Active measures are all kinds of operations that aim to influence, undermine, disrupt and discredit targeted countries, their institutions and non governmental organizations.

Moreover, the Russian doctrine considers information warfare a crucial element of modern warfare, therefore they have promoted different types of psyops. This explains why Russian information warfare and political warfare clearly overlaps, and despite the prominence of non military actors such as the SVR and the FSB in political warfare, deceit and propaganda, the GRU, the military secret service, is also a major player in the Kremlin strategy to pursue hybrid warfare. One of the most paradigmatic ways in which Russian forces organize psyops is the troll farm, through which they exploit social media algorithms and key demographics that can be vulnerable to their propaganda, in order to obtain a cheap way to carry on these kinds of operations. 

(Graphic from National Security Analysis Department, “Little Green Men”: A Primer on Modern Russian Unconventional Warfare, Ukraine 2013-2014, Assessing Revolutionary and Insurgent Strategies Study , 18).

May 2, 2022No Comments

Sri Lankan Turmoil

Image source: https://cdn.cnn.com/cnnnext/dam/assets/220331175311-03-sri-lanka-protests-0331-super-169.jpg

By Austin Parcels & Alberto Trame

Intro

Since 2019, Sri Lanka has been experiencing its worst economic crisis. Unprecedented levels of inflation, the near depletion of foreign exchange reserves, the rising prices of basic commodities, daily blackouts lasting ten to thirteen hours, and shortages of medical supplies plague the already poor nation. Sri Lanka’s population of almost 22 million people now waits in nearly endless lines for basic amenities. Schools have been suspended because of the lack of equipment and businesses shut down because of the lack of petrol needed for commuters and the transportation of goods.

Declared the "worst economic crisis for Sri Lanka in 73 years" by the Sri Lankan Government, the country now finds itself embroiled in protests and steadily increasing violence. Protesters place blame on president Gotabaya Rajapaksa's government, whom they accuse of mismanaging the economy. The Rajapaksa are Sri Lanka's most influential family, a political dynasty, prominent in several senior roles in the Sri Lankan State. Protesters demand that Rajapaksa and his family step down, hoping to pave the way for new democratic leaders.

Understanding Sri Lanka's turmoil and the regional fallout are vital to understanding the current state of South Asian security and diplomacy. There are several reasons for Sri Lanka's current unrest, ranging from president Rajapaksa's tax cuts, Sri Lanka's significant foreign debt, the ongoing agricultural crisis, and the tourism fallout over the 2019 Easter bombings and COVID-19. Finally, Sri Lanka's second-largest market for tea exports, Russia, has been ostracized by the international community in the wake of their invasion of Ukraine. Sri Lanka depends heavily on tea exports, with 17% of its economy relying on it completely.

Sri Lanka and China

The first security concern comes in the form of Chinese regional ambition. While Sri Lanka is not massively indebted to China (only about 10% of the Sri Lankan debt stock is owed to China), the Rajapaksa government has stated it will appeal to China to ease its debt burden. Given China's history of debt-trap diplomacy, and its continued influence on political and economic spheres of affairs throughout the continent, cosying up to China could spell danger for Sri Lanka and the region.

Sri Lanka has already given up a port to the Chinese ambition. Under pressure from China regarding debts, Sri Lanka coughed up the Hambantota Port and 15,000 acres of land surrounding it. China now controls a piece of territory just off the shores of its main regional rival, India. China's ambition in Sri Lanka does not stop there. China's Belt and Road Initiative (BRI) has invested $1.4 billion in the Colombo Port City project, the largest ever foreign investment in Sri Lanka's history.

China has utilized the BRI as a form of neo-colonialism, using it to debt-trap poorer countries while exploiting those same countries for their raw resources and control over the infrastructure. With the presence of China in Sri Lanka already, and the current economic crisis, the Chinese are poised to take advantage of the situation by further exploiting the poorer island nation.

Sri Lankan Islamist Extremism

Easter Sunday, three years ago, three churches and three luxury hotels in Colombo were targeted in a series of coordinated Islamist terrorist attacks carried out by the National Tawahujja Jama'ath (NTJ). The attack killed 269 people, injuring at least 500 others. NTJ is believed to have connections to the Islamic State (ISIL). Terrorism in Sri Lanka has existed for some time. Organisations such as the Tamil Tigers and various Marxist-Leninist parties have carried out attacks in the past. Islamist terrorism began to rise in the 2010s, with a steep rise in attacks against the country's small Roman Catholic minority. These attacks eventually culminated in the 2019 Sri Lanka Easter bombings.

Sri Lanka's Islamic population, called Moors, is not large, accounting for roughly 9.7% of the population, and they have historically faced significant persecution by the Buddhist majority. Following the defeat of the Tamil Tigers in 2009, there has been a steep rise in anti-Islamic sentiment in Sri Lanka. Bhavani Fonseka, a human rights lawyer, spoke to the BBC about the issues, saying "in the post-war period, Muslims have become the new enemy." Muslim Sri Lankans, who already face discrimination from the government and who have a sudden rise in extremism within their community, are now staring down the barrel of the ongoing economic crisis.

Studies have shown that there is a connection between poverty, economic minority discrimination, and domestic terrorism. The ongoing economic crisis will exacerbate the divide between the Muslim and Christian minorities and the Buddhist majority. With the crisis worsening, Sri Lanka can expect a dramatic rise in Islamic terrorist attacks from well-trained, ISIL-affiliated organisations like the NTJ.

This rise in terrorism is not just a domestic issue either. Malaysia, Indonesia and the Philippines have seen their shared maritime border exploited by Islamist terrorists seeking to supplement conflict zones in Southeast Asia with foreign fighters. The Philippines' large Islamist problem has crossed the maritime borders and is beginning to affect its neighbours. Sri Lanka shares a maritime border with Maldives and India, two countries that could face the fallout of rising Islamic terrorism within Sri Lanka. As the economic crisis continues, and Sri Lanka finds itself unable to support its military and police structures, terrorists and criminals will leak through the porous borders.

Conclusions

In an increasingly globalized and interconnected world, the economic downward spiral of a small country can still have a great effect on the world at large. For South Asia, Sri Lanka's crisis can be a catalyst for significant shifts in the area's power structure, a rise in terrorism, and the opportunity for powerful countries to gain a further foothold in the region. This article has highlighted some of the ways Sri Lanka's ongoing crisis could do significant damage to South Asia, but there are undoubtedly other issues, such as international criminal organisations, which were not addressed. If you'd like to learn more about security concerns in South Asia and elsewhere, click here to view more of ITSS Verona's articles.

This article also mentioned the Belt and Road Initiative (BRI), which is an economic infrastructure development strategy adopted by the Chinese Government in 2013. It has been considered a centrepiece of Xi Jinping's foreign policy, but many opponents of the strategy consider it a way for China to practice debt-trap diplomacy and neo-colonialism. If you'd like to learn more about the BRI and China's foreign policy, check out this ITSS member series article.