10, August 2016
Turkey and the Syrian crisis: Consistently inconsistent 0
Turkey says its views are concurrent with those of Russia regarding the need for a political solution to the crisis in Syria. Speaking to the state-run Anadolu Agency on Wednesday, Turkish Foreign Minister Mevlut Cavusoglu also said Ankara and Moscow were of similar opinions concerning the need for a ceasefire in Syria and the provision of humanitarian aid to the civilians affected by the conflict there.
The comments come even as Turkey and Russia have been supporting opposing sides in the conflict in Syria. While Russia has stressed the need to support the legitimate Syrian government, Turkey has been offering support to the anti-Damascus militants.
Despite that difference, Turkey has recently been surprisingly gravitating toward Russia. A standoff in November last year plunged the two countries’ relations into turmoil. Back then, the Turkish military shot down a Russian fighter jet as it was conducting operations over Syria. One of the two pilots of the Russian Sukhoi Su-24M was killed by anti-Damascus militants on the ground after parachuting out of the targeted jet.
Following a failed coup in Turkey in July this year, Turkish officials, who had previously defended the downing of the Russian jet, distanced themselves from the incident, saying that the bomber aircraft had been targeted by military personnel who later took part in the putsch attempt against Ankara.

Most recently, Turkish President Recep Tayyip Erdogan traveled to Russia, where he discussed the Syrian conflict with Russian President Vladimir Putin.
In his Wednesday’s remarks, Cavusoglu said a Turkish delegation, including Foreign Ministry, military, and defense officials, will travel to Russia for follow-up talks on the same day.
Observers also speculate that the Turkish overtures to Russia are coming at a time when Ankara is finding itself increasingly at odds with Western countries in the wake of the coup.
Western countries, particularly those of the European Union (EU), say Turkey is being too heavy-handed in its crackdown on putschists. Cavusoglu seemed to dismiss such speculation on Wednesday, however, saying his country’s rapprochement with Russia was not meant as a message to the West.
He did say, though, that support for EU membership had fallen in Turkey because of what he said was the bloc’s sympathetic attitude toward those who carried out the coup attempt. The EU is making serious mistakes in its response to the coup, the Turkish minister said, adding that if the West “loses” Turkey, it will be because of its own mistakes, not Ankara’s good ties with Russia, China or the Islamic world.
Presstv



















16, August 2016
China’s rise as a cyber power 0
The cyber domain has become central to the struggle for strategic advantage between the US and the West on the one hand, and China and other authoritarian states on the other. If there is any outsider, who can present a coherent view of China’s rise as a cyber power, it is the author of this short book. Nigel Inkster was the deputy chief of the UK’s Secret Intelligence Service, MI6, speaks Mandarain, is well versed in the country’s history and seems to show a good understanding of the psyche of Beijing’s leadership and its options. He is currently the Director of Future Conflict and Cyber Security at the International Institute for Strategic Studies in London.
Informing China’s stance is the Soviet era doctrine of information warfare as a tool to ensure internal political control and a favourable external narrative. The US, of course, has its own cyber war capacity, and its efficacy may have been damaged by Edward Snowden, who blew the whistle on the US’s extensive snooping programme. Where the West and the East importantly differ is the degree of liberty they are willing to tolerate in the cybersphere.
China’s Cyber Power argues that state control of the cyber domain is a critical factor in China’s pursuit of military strength and protection from internal and external threats. “What the leadership fear most of all is the prospect of an irrecoverable breakdown in internal order,” writes Inkster. “There are signs that the Party’s ideologues may be developing a vision for the Chinese cyber domain that enables it to exercise control over citizens by both filtering the information they access and compiling such detailed electronic data on individuals – including their entire browsing history and all their social-media posts – that any perceived infractions can be used as leverage against them,” he writes.
“For now, China appears to believe that it can have its cake and eat it: gaining the economic benefits that come from with global connectivity while excluding information as seen as detrimental to political and social stability,” Inkster writes. On the external front, Inkster believes that the Chinese are heavily engaged in cyber espionage as a means of dulling the West’s technological edge. In the wake of an agreement between President Barack Obama and Chinese President Xi Jinping, Chinese efforts to cyber-steal American intellectual property and business secrets seem to be declining. But the international fault lines on cyber issues remain clear, as does cyber’s pivotal role in future armed conflicts.
In 2000, then US President Bill Clinton likened Chinese efforts to censor what was on the web to trying to “nail Jell-O to the wall.” Beijing’s approach is nuanced as the authorities often refrain from censoring criticisms of the leadership, but do crack down on attempts to mobilize unauthorized public protest. The Chinese now live in what could be called a parallel web universe, overseen by a complex and multilayered monitoring and control system. This might strengthen the authoritarians’ hold on power, although Inkster concludes, “it will be some time before any safe conclusions can be reached about this experiment.”
The recent example of Zimbabwe shows how the cat and mouse game is playing out in an African country. Robert Mugabe’s regime is presently facing a challenge from Pastor Evan Mawarire’s #This Flag, a protest movement that makes extensive use of the internet and social media. Shutting down the internet was probably considered too draconian, especially since opponents were likely to see it as sign of panic. When warnings about “misuse” of social media proved ineffective, says TechZim.co.zw, a Zimbabwean information technology site, the government opted instead to force Zimbabwe’s three mobile network operators to suspend sales of cheap data bundles. Eliminating special mobile data promotion bundles is the ultimate squeeze on protest, TechZim suggests.
Was Mugabe’s government advised by the Chinese? Inkster believes that a large number of African countries may find the Chinese model of internet control attractive. China’s large footprint in Africa allows it to influence cyber policies through diplomatic pressure and help in telecommunications network development, he says. Chinese telecommunications giants Huawei and ZTE have built major systems in around 30 African countries. Huawei has established training centres in seven African states, a research and development facility in South Africa, and a network operations base in Cairo. Human Rights Watch has criticised both companies for providing equipment used to conduct political surveillance.
“China may exploit its control of African telecommunications infrastructure for intelligence-gathering purposes,” writes Inkster. “There is no hard evidence to support this proposition, but it would scarcely be surprising if China were engaged in such activities, whether independently or in conjunction with the states concerned.” “Chinese engagement appears to have been translated into political support for some of Beijing’s policies, a notable example being the 2015 cyber-security pact between the Chinese and South African governments, which made reference to collaboration on information security,” he says.
In July 2016 South Africa, along with others, supported China by voting against a UN resolution that would have required states to commit themselves to a policy of non-interference with the flow of online information. This diplomatic victory could be a sign that Beijing is winning the cyber Cold War in Africa. For the public, communications can be hidden from prying eyes through encrypted services such as WhatsApp, the use of Virtual Private Networks, which can camouflage internet addresses, and Tor, software that can hide the source of internet traffic. These devices are certainly sufficient to force prying eyes to work a lot harder.