Authors: Anne Speckhard and Molly Ellenberg
The Islamic State of Iraq and Syria [ISIS] is notorious for its slick propaganda videos and effectiveness at online recruitment, particularly on social media, of men and women all over the world to fight for and live under their Caliphate. Now with the territorial defeat of ISIS, its recruiters continue to be prolific online, encouraging supporters to hope and work toward the Caliphate’s return and to seek revenge on those who destroyed it by mounting attacks at home. While ISIS’s activity on Facebook and Twitter, as well as encrypted apps like Telegram, has been studied extensively, there is a dearth of information about their activity on Instagram, a platform increasingly used by young people vulnerable to ISIS recruitment. This article provides a brief examination of ISIS supporters’ activity on Instagram, even in the face of takedown policies, and also briefly discusses the possibilities of using a counter narrative video ad campaign on the platform to intervene in and prevent ISIS recruitment.
ISIS has long been noted for its superior use of social media, resulting in an unprecedented recruitment of foreign terrorist fighters (FTFs). As of 2020, over 45,000 FTFs had traveled from all over the world to fight with ISIS or live under the ISIS Caliphate in Syria and Iraq. This number peaked between 2014 and 2016, when ISIS was at the height of its reign of terror and has declined since ISIS’s territorial defeat and the 2019 fall of the Caliphate. Yet ISIS still continues to recruit online, urging supporters to seek revenge for the destruction of the Caliphate and conduct attacks in their home countries while waiting and working for the resurgence of the Caliphate. As recently as March and May 2020, ISIS released propaganda videos touting their battlefield achievements in Syria and Iraq, respectively, portraying graphic footage of Syrian and Iraqi soldiers being slaughtered while also calling for revenge against the countries that helped defeat ISIS territorially.[1]
For years, ISIS would blanket the Internet with their high-quality, professionally produced propaganda videos and written content and then use the immediate feedback mechanisms of social media to swarm in on and “love-bomb” anyone who liked, retweeted, commented on, or otherwise responded to their posts. In this manner, ISIS cast a wide online recruiting net but devoted their time and energies trying to seduce further those who showed interest and vulnerability to their online propaganda. Today’s online experience with video chat, online telephoning and text messaging allows ISIS’s online recruiters operating in at least 25 different languages to create deep and meaningful relationships with those on whom they are able to home in. As they do so, they artfully identify and meet the specific needs of their prey, creating intimate relationships and crafting individualized message that promise dignity, purpose, hero status, love, or anything else sought by the recruit should they attack on ISIS’s behalf or travel to fight for them. Due to this advanced recruitment strategy, ISIS was able to attract a significant amount of foreign terrorist fighters solely online, with no face-to-face recruitment. [2]
Because ISIS has been so prolific and so effective at using social media to radicalize and recruit, policy makers, scholars, and practitioners alike agree that effective efforts to prevent and counter violent jihadist extremism also require a social media aspect. Jihadists’ use of myriad platforms, including Twitter, Ask.fm, and Telegram have been studied extensively, and counter narratives have also been used in online campaigns created and posted by government and non-governmental entities, with mixed results, on a variety of platforms. [3]
The International Center for the Study of Violent Extremism [ICSVE] has over the past five years created and built its own counter narrative program, titled Breaking the ISIS Brand Counter Narrative Project, which features 194 short video clips of ISIS and al Shabaab insiders denouncing the group, and TheRealJihad.org website that features additional counter narrative material and resources to prevent and intervene in ISIS’s recruitment. ICSVE has also extensively studied online engagement with their and others’ counter narrative materials. It is clear that the most successful counter narratives are emotionally evocative, use credible insiders to deliver the message, and recognize the grievances that viewers may feel in a manner that creates rapport with the viewer rather than mocking the jihadist narrative, condemning those interested to join, or simply promoting pro-democratic, pro-secular society messages. These latter messages may not resonate with someone who has felt discriminated against as a Muslim immigrant, or individual of Muslim immigrant descent, or as a Muslim convert in the West. ICSVE has also learned from studying multiple campaigns that viewers not only watch the Breaking the ISIS Brand counter narrative videos in significant numbers, but are also moved to engage with the posts, through reacting, commenting, sharing, and saving them, and that viewership can be greatly increased by shortening the videos to one minute and then directing viewers to a website (YouTube or the ICSVE-run TheRealJihad.org) where they can watch longer videos and engage with other counter narrative materials and resources.
Although ICSVE’s Breaking the ISIS Brand counter narratives have been successful in the aforementioned ways, it is critical that ICSVE and others working in preventing and countering violent extremism keep up with current social media trends, just as ISIS does, in order to be able to prevent and disrupt their recruitment, especially of young people. Thus, an examination of social media usage among young people is required. In Europe, where ISIS is still actively recruiting and able to move some youth into attacking at home, ICSVE has also been campaigning against them while watching which platforms are being most used by both European youth and ISIS. In the EU, similar to the U.S., Instagram usage is outstripping Facebook and growing for youth, particularly among people younger than 34.[4] This is opposed to Facebook and YouTube still being the platforms of choice among youth in countries in other parts of the world, such as in the Middle East, though Twitter has fallen in popularity among Middle Eastern youth since the height of ISIS’s online recruitment.[5] In 2017, Instagram was the third most popular social media platform in the EU, after Facebook and Google+.[6] Anecdotally, police and security forces in the Netherlands expressed a worry that the youth most vulnerable to radicalization would not be reached through Facebook, as even if they do have accounts, they are much more likely to be active users on Instagram.[7]
Surprisingly, the specific relationship between Instagram and terrorist recruitment has not yet been studied. While there is extensive literature on militant jihadism and other types of violent extremism on Facebook, Twitter, and Telegram, Instagram is typically mentioned only as an example of a social media platform rather than a unique medium for promoting ISIS and militant jihadist propaganda and for terrorist recruitment. This paper begins to delve into the issue of if and how Instagram is being used by ISIS and other militant jihadist groups.
Identifying ISIS and militant jihadist Supporters on Instagram
Identifying those supporting jihadist ideology and groups on Instagram is a relatively simple task. By searching on Islamic terms and names often associated with ISIS, like khilafah, tawheed, and dawlah and even Awlaki, many posts including those hashtags appear, as they were posted by users with public accounts. Among these, most public posts did not include explicit advocations of militant jihadist violence, but rather promoted conservative views such as the requirement for women to be fully covered in niqab, with the implication that women who show their faces at all were sexually promiscuous and that unmarried women who interacted with men were asking to be sexually assaulted. While these views are not necessarily extremist, there could then be found among them ISIS supporters who posted more violent and extreme ideas on their stories or secondary private accounts which made it clear they sympathize with ISIS.
For instance, one commonly shared meme on public pages contrasted “The Hijabi Queen,” a woman who has never had sex before marriage and dresses modestly, with the “Western Thot [Internet slang for a slut or whore],” a woman who is seen as “a pump-and-dump” and “has slept around with countless random guys in her youth, then settles down with someone she’s not even attracted to.” The conservative Muslim woman is portrayed respectfully while the Western woman is dehumanized and degraded, which is not itself violent extremism, but in some cases, it relates to violent suggestions for dealing with Western women’s violations of the poster’s conservative views. For instance, one account posted a photo depicting a man asking, “Is burning the only solution for the feminists?” and another responding, “So it seems. So it seems.”
Other posts advocated violence against members of the LGBTQ+ community, especially during the month of June, which is Pride Month in the United States. Many of these posts appeared at first to advocate tolerance and acceptance of homosexuality until one looked more carefully at the details of the photos:
The photo above was posted by an account which frequently posted other homophobic content and advocated a broad expansion of the global Caliphate but did not believe that ISIS was the group capable of doing so. This view is akin to many others supportive of militant jihad and the idea of an Islamic State Caliphate but who are opposed to ISIS’s propensity for attacking other Sunni Muslims. Below are some posts of memes illustrating such views.
More violent content criticized the relatives of victims of the mosque shooting in Christchurch, New Zealand for forgiving the white supremacist terrorist instead of punishing him according to shariah. Other posts refer to takfir, which is the extremist Islamic practice of excommunicating others for not following their extremist interpretation of Islam, a common practice in ISIS that included the claim that those takfired should be executed as infidels. An example of a post including a meme promoting takfir refers also to the taghut which are, according to ISIS, tyrannical powers that deny and defy Islam, and mushrik, meaning those who reject the oneness of God and who are idolaters. The post is here:
Other posts were anti-Semitic memes accusing figures like the Rothschild family and George Soros of creating the COVID-19 pandemic and inciting race wars which could be found on both far right and militant jihadists sympathizers accounts, again not necessarily denoting militant jihadist sympathy per se. However, among these were also Muslims who appeared to be ISIS supporters based on a video of a man preaching the “ruling of caliphate.”
The account mentioned above, which appears to be an ISIS supporter, posted a meme depicting various high-profile media personalities with Stars of David on their foreheads, below a photo of Jacob Rothschild holding a fan of cash, with an illuminati symbol on his forehead. The title above the photo reads, “The media moguls are highly-paid agents of Rothschild Zionism, hired and paid handsomely serve their global agenda [sic].”
Under the hashtag taghut, denoting tyrannical powers who deny worship of anything other than God and defy Islam, many Instagram users posted photos of Arab leaders, most notably those from Saudi Arabia, accusing them of hypocrisy and Westernization which aligns with the jihadist messaging from al Qaeda, al Shabaab and ISIS, but does not necessarily mean they are militant jihad or ISIS supporters themselves. Messages warning followers not to participate in democratic elections were also posted with the taghut hashtag although this could also be seen as a very conservative, but nonviolent, Salafi view.
One such post featured a Guy Fawkes mask next to the words, “Dumb politicians are not the problem. The problem is the dumb kuffar [disbelievers] that keep voting for them.” The caption specified the leaders of Pakistan, Turkey, Bangladesh, and Saudi Arabia as polytheists and their supporters as kuffar. The same account posted photos accusing Bill Gates of injecting people with the COVID-19 virus in order to sell them a vaccine; referred to Jews, Shias, Sufis, Brelwees [sic], and Christians of being idol-worshippers; and declared takfir on Congresswoman Ilhan Omar for her participation in the U.S. government. Many photos posted by the account featured firearms, though the poster stated that they did not support ISIS specifically.
Of the public accounts that did explicitly advocate for violent jihad, most did not mention ISIS, which may be due to the profile owners’ concerns about avoiding takedowns. Rather than directly mentioning ISIS, they posted photos and quotes from ISIS and al Qaeda English-speaking ideologue Anwar al-Awlaki or exaltations of the Taliban, which seemed to be a far more socially acceptable group, or safer to explicitly post, than ISIS within the jihadist sphere on Instagram.
One post featured a video of Anwar al-Awlaki speaking about jihad, captioned, “Beautiful beautiful reminder, Whoever is going to follow a path should follow the path of the ones who’ve died.” Another post on the account featured only the bottom half of al-Awlaki’s face, presumably to avoid takedown software, as the caption began, “Kuffar deleted this post.”
Another account was dedicated entirely to posting al-Awlaki quotes, with a link to a collection of audio lectures in the bio. According to the account holder, he or she was posting the quotes on behalf of jihad and linking to the audio lectures because “YouTube is deleting the videos of the Sheikh cause [sic] it contains Islam in its purest form.” While many of al-Awlaki’s early videos do address many matters about life in Islam, his later videos promoting endless jihad with the West are the actual reason his videos have been taken down.
One of the most prolific Taliban-supporting accounts frequently posted violent and graphic videos as well as photos boasting of the Taliban’s success. For instance, one photo was accompanied by the caption, “Taliban Lions captured a checkpoint in the Antan area of Siagard in Begha Parwan province, killing and wounding soldiers and looting a large number of arms. Allab Almighty gives us enough weapons in one post to suffice to conquer a large bases… [sic].”
The same account frequently expressed anger toward ISIS, however, citing an oft-referenced conspiracy theory that ISIS was created by the United States and Israel to destroy the Muslim people.[8] The photo below was posted alongside a caption claiming that Edward Snowden had revealed that Abu Bakr al Baghdadi is really a Mossad agent named Elliot Shimon.
There were, however, a few public accounts that were clearly and unashamedly pro-ISIS. Most focused on the women imprisoned at the al-Hol camp in Syria. One account was even purportedly run by women in the camp who raised money through other accounts to finance their escapes. These accounts threatened punishment for the unbelievers who held them captive and yearned for the return of the Caliphate.[9]
An account seemingly run by a woman in al-Hol wrote, “Remember my sisters no matter what state we are in, no matter what the world think of us. The world still trembles at the mention of us, we have left a deep scar that will never heal and we remain a thorn in the side of kufr.”
One account posted in English, Arabic, and German, raising funds to be smuggled out of Camp al-Hol. This account also provided links to other accounts, which posted links to a PayPal account where supporters could donate to the women or write them letters. On June 12th, 2020, one of the associated accounts posted a video claiming that it was taken while the women were leaving the camp. The account also posted graphic photos of bloodied male faces, claiming that “some sisters from the camp recognized their husbands and their husbands were in Hasakah prison.” There were multiple riots and attempted escapes at Hasakah the days and weeks before these photos were posted. The primary account has either been deleted since then or has blocked the account through which ICSVE was following it.
Another account run out of al-Hol, which was not associated with the German account mentioned above, posted in English only. The account posted about fundraisers through Telegram, but did not link to the fundraising websites themselves, likely to prevent the websites from being taken down. The account also lauded ISIS fighters who were captured in ISIS’s last stronghold of Baghouz, fighting until the very end. They also posted about teaching their children to throw rocks at the camp guards and referred to Camp al-Hol as “the cradle of the new Caliphate.” This account has also either been deleted or blocked the account through which ICSVE was following it.
Most accounts that openly supported ISIS were private, though many of these could be identified as likely ISIS followers by a black flag emoji and an index finger emoji in their bios, both common but not unique symbols for ISIS. Notably, proponents of other jihadist groups like the Taliban did not use these symbols in their bios. These pro-ISIS accounts posted photos of weapons and included more provocative messages, such as those denouncing others as unbelievers, in their Instagram stories. Some photos also included selective Islamic scriptures arguing for severe punishment of unbelievers which also aligns with ISIS ideology. Many accounts also posted black and white videos of men with guns on horses with the identifiable black flags of ISIS and women dressed in niqab, expressing nostalgia for the Caliphate. One account even included a story called “44 Ways to Support Jihad,” which included, “Praying to Allah to reward you with martyrdom,” “financing a mujahid [a jihadist warrior] ,” and “arms training.” Another account was dedicated to inspiring hope for the resurgence of the ISIS Caliphate. Under a photo of Bashar al-Assad, the user commented, “The oppressive rule of these tyrants is on its last legs. Their nations are failing, the people want change. The Khilafah is coming very soon, as prophesized. Why don’t you help re-establish it?” Another post read, “The Khilafah state could easily liberate all oppressed Muslims and protect every Muslim living within it. It’s that simple.” Another account used a photo of Abu Bakr al-Baghdadi as his profile picture and posted videos of sermons on his story, as well as other videos praising ISIS fighters and promising that “Allah will grant you victory.” Another post by the same account featured a drawing of the ISIS flag over the earth. Many of these accounts accepted follow requests from the ICSVE-run The Real Jihad account, likely without looking at the account’s posts, which all contain counter narrative material.
It should be noted that many of these accounts are taken down within weeks of discovering them, although new and similar ones quickly replace them. In the study of terrorist activity on social media, Instagram may well be a new frontier where younger people are able to post anonymously about their violent extremist beliefs. The Instagram “Discover” page also serves as an echo chamber for these individuals, suggesting posts and accounts to follow that are similar to accounts one already follows. Indeed, many of the accounts followed by The Real Jihad were found not by searching on hashtags or perusing other users’ lists of followers, but by simply looking at the “Discover” page without searching anything at all. Thus, as soon as a user reacts to a militant jihadist account, he or she will be recommended to follow other such accounts and will not be exposed to any counter arguments unless accounts like The Real Jihad insert themselves into the echo chamber by tagging counter narratives with militant jihadist hashtags.
Research on Instagram in Regard to Terrorist Propagandizing and Recruitment Strategies
Most research on the impact of Instagram focuses on the different communities that exist on Instagram. While some communities, such as those promoting body positivity among young women,[10] bond users together through prosocial means, other communities allow users to unite in promotion of maladaptive behaviors such as self-harm[11] and excessive reassurance-seeking.[12] Because terrorist recruitment online involves aspects of marketing as well as promotion of maladaptive behavior, some studies of Instagram can be applied to its utility for terrorist recruitment and opportunities for preventing and countering radicalization. For instance, a 2016 study of Dutch teenagers and young adults found that while young people were more likely to express negative emotion on Facebook and Twitter, they were more likely to express positive emotion on Instagram. However, they were most likely to express any emotion, positive or negative, on WhatsApp, likely due to its double-ended encryption that makes users feel that their expressions are more private and secure. The authors of the study concluded that users felt stronger ties to Facebook friends (a reciprocal relationship) than to Instagram followers (a non-reciprocal relationship), thus enabling them to disclose more private negative emotions.[13] These results suggest that Instagram may be an effective platform to attract the initial attention of targets for counter radicalization, but they should be then redirected to a platform that allows for more freedom to express negative emotions and the potential to build a more personal relationship. Whether or not ISIS has learned this yet is unknown, but the results nevertheless provide lessons for counter narrative campaigning and suggest that attracting attention on Instagram may be possible, but moving the viewer to a platform where more intimate relations and fears, doubts, and needs can be expressed and hopefully answered in a way that redirects the user away from violent extremism would be beneficial.
Pittman and Reich (2016) posited that because Instagram is an image-based platform, it is better equipped to reduce loneliness among adolescents and young adults than text-based platforms like Twitter. The study noted that Instagram posts with faces (i.e., selfies or photos of groups of friends) were 38 percent more likely to be “liked” and 32 percent more likely to receive a comment than other types of photos, such as those of food or landscapes.[14] Thus, decreased loneliness related to Instagram use may similarly confer the sense of belonging and significance, such as the idea that one is worthy of being noticed, that is often an integral part of terrorist recruitment, even if use of the platform does not allow for the development of emotionally intimate individual relationships. The latter can be developed by instructing those whose attention has been captured and who begin to feel a sense of being noticed and belonging to migrate to other more intimate platforms and apps.
Instagram’s utility for organizations, rather than individuals, has also been examined. In ICSVE’s preliminary counter narrative campaigns on Instagram the account running the counter narrative ads, @TheRealJihad_Official, is a business account and is not made to look like an individual user. Thus, it is important to understand how businesses and organizations in general are able to engage followers on Instagram. One study in Finland found that users were most likely to engage with brands on Instagram when the brands’ content was personal and emotionally evocative.[15] The same has been found in studies of ISIS’s online recruitment as well as studies of counter narratives.[16] Among Kuwaiti banks, Instagram has been found to be most effective in image building and communication, rather than establishing relationships, and that banks are able to gain the trust of their followers by invoking religious themes.[17] Although the Instagram ads discussed in the present study were not run in the Middle East, many were targeted toward Arabic speakers. It is therefore critical to understand the cultural aspects of engaging with organizations on Instagram, namely, the suggestion of the Kuwaiti study that Arabs are less prone to interact directly with an organization on Instagram and are more likely to view the platform, with respect to organizations, as a one-way communication medium. Still another study of brands on Instagram found that consumers were more likely to trust brands if they perceive the brand’s benevolence and integrity, and if the brand is endorsed by “Key Opinion Leaders.”[18]
ISIS recruiters have utilized these factors well. By stoking distrust in Western governments in the mainstream online media, they also contrast their own claimed shariah-based values and build up their own reputation for integrity. For instance, by emphasizing the atrocities of the Assad regime,[19] they portrayed themselves as benevolent. Finally, by invoking trusted jihadi narratives, such the idea that Muslims are under attack by the West, the idea that defensive jihad is required and that jihad is obligatory for all Muslims, alongside the promotion of suicide terrorism as a type of Islamic “martyrdom,” sometimes via fatwas by Arabic scholars or sermons by Anwar al Awlaki for English speakers,[20] they ensure their followers that they have been endorsed by trusted and credible sources. As such, a key aspect of the counter narratives presented in this article is the use of ISIS defectors, returnees, and imprisoned cadres as credible, reliable speakers who have suffered some of the same grievances as viewers and sought justice by joining ISIS, to deliver an honest, benevolent message and warnings to those thinking of following their same path to destruction.
A Possible Instagram Counter Narrative Strategy?
ICSVE has over the past two years, in partnership with Facebook, run over 125 campaigns in countries and languages all over the globe with good success in reaching the target audience and engaging them with the Breaking the ISIS Brand Counter Narrative videos. It is only recently that ICSVE started counter narrative campaigns on Instagram. While the full-scale ICSVE study of running counter narratives on Instagram has been submitted to a scientific journal, some brief results can be relayed here.
Given that we are easily finding outward expressions of support for ISIS, it was not difficult to identify a target population for the ICSVE counter narratives and build a following of accounts that would be viewed as legitimate for people who are in the process of being radicalized toward militant jihad and thus target them with counter narratives. ICSVE researchers were able to identify potential ISIS supporters on Instagram through their bios alone, meaning that one does not have to request to follow a private account in order to determine whether that user can be considered a likely ISIS supporter. Moreover, there is evidence of a large jihadist-supporting community on Instagram, although many of its members do not openly profess to be ISIS supporters. Thus, those aiming to counter militant jihad generally would be wise not to focus solely on ISIS, lest they be dismissed by supporters of the Taliban, al Qaeda, al Shabaab, and Kashmiri militant jihadist groups who support violence but denounce ISIS.
While the counter narratives used in ICSVE’s first campaign were specifically ISIS-focused and aimed at the general population in numerous EU countries, future campaigns may be hyper-targeted at those people more vulnerable to terrorist recruitment.[21]
Running counter narrative videos on Instagram is a slightly different process than running Facebook ad campaigns. On Instagram, users are wary of interacting with accounts that appear to not be run by engaged, active Instagram users, even if the account belongs to a business. Thus, before running the campaign, ICSVE staff set up the @TheRealJihad_Official Instagram account and attempted to amass followers by posting daily, at noon, links to articles on TheRealJihad.org, photos with quotes from ISIS insiders denouncing the group, and links to other ICSVE counter narrative videos on YouTube. The account also began following a number of accounts with jihadist content, in order to legitimize itself among the intended audience. Jihadist accounts were found by searching various hashtags such as #khilafah, #dawlah, and #tawheed. At the outset of the campaign, the account followed 75 Instagram users and had five followers. By the middle of the campaign, the account was following 104 accounts and had 60 followers, many of whom were members of the target audience, thus demonstrating the ability to ingratiate itself within the pro-ISIS community on Instagram.
Already, photos and quotes from ISIS defectors, returnees, and imprisoned cadres have been posted on The Real Jihad Instagram account daily since the account’s inception to position it as a credible account with postings of potential interest to the target audience. It should be noted that all ICSVE counter narrative videos have ambiguous names that could be considered pro-ISIS, and most have thumbnails taken from actual ISIS footage that has been used to illustrate the speaker’s story, which denounces rather than supports ISIS. These posts have sparked likes and a few comments, including one ridiculing the defector for expecting a life of luxury in ISIS instead of jihad. Another user sent a direct message to The Real Jihad, accusing the account of using a fabricated hadith, arguing against the Islamic tenet that the most important jihad is that being against one’s own whims and evils, rather than against outside enemies. ICSVE’s Islamic scholar responded by pointing out the user’s use of a straw man fallacy, explaining the correct translation and meaning. The user was not able to refute the scholar’s argument, responding simply, “Allah knows best.” Other users direct messaged the account asking for more links to the counter narrative videos, which is a positive sign of engagement among the target audience.
The counter narratives were run in Germany, France, Austria, Belgium, the Netherlands, Sweden, Greece, and Italy, all countries from which individuals had traveled to join ISIS in Iraq and Syria. All of the counter narrative videos used were one minute long and featured ISIS defectors, returnees or prisoners speaking about why they joined and what they actually experienced while in ISIS, and finally denouncing ISIS as un-Islamic, corrupt, and overly brutal at the end of the video. Each of the videos featured an ISIS member who had traveled to ISIS from the specific country in which the video was run or a nearby country (for example, the speaker in the video shown in Austria was from Germany). The speakers in the videos told their stories in different languages, but each video was subtitled in the dominant and minority languages used by Muslims in the countries in which they were run. They were run for 13 days, from May 15 to May 27, 2020.
In general, the results of ICSVE’s first campaigns were positive in terms of being able to create an account that could reach the target audience and engage them to a certain extent. However, there are concerns that need to be addressed. One is that through the comparison between this Instagram campaign and the identical campaign run on Facebook a few weeks prior, it is clear that one-minute videos do not have the same capability to retain viewers on Instagram as they do on Facebook. This may be because videos on Facebook can be up to four hours long, so users who are accustomed to seeing longer videos on their feed may not get bored as easily, or may check how much of the video is left after watching for 10 or 15 seconds and, seeing that less than a minute remains, decide to finish the video instead of scrolling past it. On Instagram, however, videos cannot be longer than one minute. Therefore, users who are accustomed to watching videos for only a few seconds may not have the patience to watch a one-minute long counter narrative video.
In order to remedy the poor viewer retention on Instagram, future campaigns will feature photos and even shorter videos, likely utilizing ICSVE’s digital posters.[22] These posters are photos of the ISIS defectors, insiders, and imprisoned cadres featured in the counter narrative videos, alongside emotionally evocative quotes about their lives before ISIS and their experiences in the groups. These posters have gained some traction among The Real Jihad account’s regular followers and will therefore likely spark high engagement in an ad campaign.
In summary, ICSVE has been able to determine that Instagram is being used by individuals whose accounts suggest that they are ISIS supporters, and even ISIS members themselves, and that it is possible to reach and target these accounts with counter narrative campaigns. However, our first campaigns taught us that it is critical to carefully determine the best ways to expose both those who are ISIS supporters and those vulnerable to ISIS recruitment to countering arguments in a way that is engaging and emotionally evocative. Likewise it is necessary to keep in mind that Instagram is unique platform where users are more likely to expect to see extremely short videos and photos with less discussion occurring. Our continued work on the platform and future studies will keep this in mind and focus on increasing viewer retention and effectively providing counter arguments to jihadist ideology through photos and videos that are only a few seconds long. Our first campaigns were an important step toward learning if we could utilize counter narratives effectively on Instagram, which differs quite a bit from Facebook in terms of expected mediums and audience. It is clear from our research that Instagram is being used by those supporting, and even members of, ISIS as well as other militant jihadist groups and thus there is a strong need for counter narrative campaigns to be put in place to disrupt and prevent ISIS and other militant jihadist recruitment on Instagram.
The International Center for the Study of Violent Extremism thanks the Embassy of Qatar in Washington, D.C., Facebook and the European Commission’s Civil Society Empowerment Programme for their generous support of our research, creation of counter narratives and counter narrative campaigns on Facebook and Instagram. This article was partially funded by the European Union’s Internal Security Fund — Police.
Author’s note: first published in Homeland Security Today
Assessing Pakistan’s Position In Theft Category of NTI Index Report 2020
Cyber ASAT-Capabilities and South Asia
Anne Speckhard, Ph.D., is an adjunct associate professor of psychiatry at Georgetown University School of Medicine and Director of the International Center for the Study of Violent Extremism (ICSVE). She has interviewed over 500 terrorists, their family members and supporters in various parts of the world including Gaza, the West Bank, Chechnya, Iraq, Jordan, Turkey, the Balkans, the former Soviet Union and many countries in Europe. She is the author of several books, including Talking to Terrorists and ISIS Defectors: Inside Stories of the Terrorist Caliphate. Follow @AnneSpeckhard
With Al Qaeda down but not out, killing Zawahiri is symbolic
Al-Shabab’s Enigmatic Invasion of Ethiopia
Afghanistan on the Verge of Religious Terrorism and Sectarian Warfare
The Philippines SIM Card Registration Act and the Veto of President Duterte
Chinese propaganda in the Middle East through social media and Twitter
Business on Instagram: the secrets
What occupied me the most during the last period after the control of the American Central Intelligence Agency and the Israeli Mossad on a number of those around me, including: professors, colleagues and relatives, was to spread the story of my madness everywhere, despite my severe isolation from everyone, due to my strict academic and analytical intelligence nature, which completely compels me to move away about all aspects of luxury or racing to get to know others for purely security reasons, related to my personal safety, for being targeted by the Israeli Mossad and the American Central Intelligence for many years, which made me very sorry, for the decline of morals of some, and their selling of their conscience and morals at any price for a few pounds will end It is implemented quickly, but it has caused harm to a person who was looking for restoring the dignity and prestige of the Arabs and helping them dismantle all the American and Israeli spy networks in the Middle East and the region, as well as preparing new generations capable of challenging and imposing and dictating their conditions on everyone with strictness and firmness. But, in the midst of this struggle, I was shocked by the morals of many around me, who sold and betrayed at a cheap price.
Therefore, the previous period was one of the most important periods of my entire life, for my intellectual work and my intelligence analytical efforts as a proactive intelligence analyst, and a future theorist that draws the shape of the foreseeable future and maps of the modern world, and reshapes the alliances of the new world, after the disintegration of the features of American and Israeli hegemony, with the rise of other great, regional and international powers, such as: China and others, to help all Arabs and developing peoples to fully challenge American hegemony, and their constant attempt to impose their conditions on us, and even formal plans to encourage Arabs and the sons of Arab and developing peoples to penetrate the American depth itself, by ending that American hegemony over them, by dismantling all of the American espionage networks in Egypt, the region and even the world, with entering the depth of the American Central Intelligence Agency and wandering in the building of the Israeli Mossad, to obtain all the information we want to know, enabling us to challenge America as a superpower and force it to submit to our conditions and dictate our conditions to it and to the Israelis themselves, after dismantling the Israeli Mossad device itself from the inside after its penetration.
Through my diligent observations, and my psychological and psychological studies of the mentalities and personalities of a number of American and Israeli diplomats, and my search for any previous recorded conversations of American and Israeli intelligence men, I noticed very carefully the extent of the state of confusion and disrespect for the policies of their countries, and their severe prejudice against them, which caught me in the eye of an intelligence expert examining the entire situation. I came to a genius conclusion, according to which the easiest personalities to recruit at any price are American and Israeli diplomats and their military and general intelligence men, given the nature of the pressures and the enormous suffering they face, as well as their complete dissatisfaction with the policies of their countries and their intelligence services with their current formations. This is perhaps what I played during the last period, by following up on all the activities of the American and Israeli diplomats that I reached, and my strict follow-up to everything that falls under my eyes in terms of conversations by their intelligence men to analyze the strengths and weaknesses of their personalities, and to write and record that on an ongoing basis, to identify the most prominent commonalities between them, tracking and knowing those individual differences, which enabled their intelligence and diplomatic services to seek help from them during previous periods. It reached a maximum result, which is the possibility of completely subjugating all American and Israeli diplomats and their intelligence men in favor of other intelligence services, who are hostile, proud and admirable at the same time, as they view China and Russia, their archenemy. Hence, I set out to draw the features of the approach and decipher the symbols and codes of the relationship between them and their current intelligence services, from intermittent communication or complete separation, followed by a defining stage of indifference or ignoring the question. Because through that particular detail and detail, I can penetrate into their depths intelligence, security and psychologically, and then ensure control over them, just as they do with me and those around me, to ensure control over me, considering that I am one of the most prominent proactive intelligence analytical mindsets in the world, as well as my frightening personality for them To my closeness to the countries of China and Russia and their friends alike.
By analogy with the previous point about the possibility of recruiting their intelligence men and diplomats and subjecting them to our conditions – which I tried to draw the attention of the countries of China and Russia to – China has succeeded in achieving an unprecedented penetration of the files of all American and Israeli diplomats and intelligence men alike. The Chinese helped in this, and their absolute and unparalleled success in penetrating the depth of files belonging to the Israeli Mossad and all its employees or dealers, which led to the disclosure of the data of tens of thousands of Mossad employees, the Shin Bet security service, the Israeli Atomic Energy Commission, and the Israeli Institute For biological research, the Israeli military forces, which include: the names of the most prominent pilots, intelligence personnel, members of the special forces, and nuclear scientists in Israel. Israel fears that many parties will benefit from this information, such as: Iranian intelligence, Hezbollah in Lebanon, as well as many other intelligence agencies, which do not maintain friendly relations with Israel.
The Chinese and Russian intelligence are constantly trying to obtain all the information, documents, documents and speeches delivered at all Israeli conferences, or in which Israel was an original party or a participant. Where the most serious issue for the Israelis is related to the readiness of the Arab armies and defense ministries at the present time, to form a “joint military defense alliance between Israel and the Arabs to fight Iran”, which I tried to draw the attention of the Chinese to, and resulted in China forming a multilateral action platform to bring about a kind of dialogue and rapprochement between the Arab Gulf and Iran, away from the policies of Israeli and American provocation, and their tireless attempt to ignite and inflame the situation in the region against Iran as an ally of China and Russia, in favor of Israeli rapprochement with the Gulf states and all.
The Mossad, and other Israeli intelligence and security services, rely on these data, which are owned by the (Israeli Ministry of Interior), in order to recruit new members, whether inside or outside Israel itself. The Israeli intelligence, especially the Mossad, is also working on using false or pseudonymous identities to carry out all its security operations, whether it is to carry out surveillance and gather information, to infiltrate certain places, or to purchase sensitive equipment.
The leaking of such information to China or others is disastrous for the Israeli intelligence and the Mossad, because this leads to the possibility of linking it to activities that take place abroad under false Israeli or foreign identities. It is also possible that the leakage of that sensitive information that China has penetrated may lead to thwarting many Israeli security operations abroad or lead to the arrest of Mossad agents through foreign intelligence agencies. Above all, by verifying these leaked Israeli intelligence data, it is possible to ascertain the living persons and the deceased personalities whose identities are used by the Israeli Mossad in secret missions to conceal the true identity of the Israeli agent entrusted with carrying out a mission.
What is most important to me is China’s follow-up and targeting of all activities and operations of the Israeli Mossad and its close follow-up of all Arab students studying in the defense and military industries abroad, and its follow-up by the Israeli Mossad elements since their first university studies, until the start of their graduation and the end of their studies and then their travel to their homelands. This is what China has learned well through many of its collaborators from countries and individuals, to obtain a lot of sensitive information that the Israeli Mossad elements are trying to access and identify, then turn it into several intelligence reports in files, and track Mossad agents responsible for following up on defense industry students and researchers. And the discussion of their relationship with Mossad officials in several countries other than the Israeli territory itself abroad, and China’s tireless attempt to dismantle all the Israeli encryption programs on the Internet, which Israel uses to communicate with clients, which is shocking to the Israeli Mossad, which is considered an “intelligence earthquake” for Israel.
The point of intelligence worth mentioning to China and the region remains, which is confirmed by all the intelligence documents recently obtained by China, that there is a clear fluctuation in the positions of the leaders of the Arab armies and defense ministries during their speeches at the joint security and military conferences between them, and within the headquarters of the League of Arab States, on the Those Arab armies are still far from being ready and ready to fight any war or joint conflict with Israel against Iran. These analyzes or summaries of closed secret discussions of the leaders of the Arab armies and defense ministries regarding their position on the joint military and defense alliances to confront Tehran’s moves in cooperation with the military leaders in Tel Aviv, are considered the biggest strategic treasure for China, Russia and Iran alike, which is probably what the Mossad leaders realized The Israelis, who are known to report directly to the Office of the Prime Minister’s Office in person, have provided the high political level in Israel with valuable information about the lack of readiness of the Arab and Gulf armies for a military confrontation with Israel against Iran.
On the other hand, after the success of Chinese intelligence in completely dismantling all American spy networks on Chinese territory, doubt arose about China’s success in recruiting diplomats from the American embassy in Beijing to work for it, and the suspicion of American intelligence appeared in everyone, including the American ambassador at the American embassy in Beijing same. Which prompted all American intelligence agencies, to form (special working groups of the elite and elite of American intelligence, the most experienced and the highest ranked, whether within the FBI or the CIA)
They assigned this group a very secret headquarters that they chose meticulously in northern Virginia, and assigned it to analyze every operation, and to (study the file of all diplomats working in the American embassy in Beijing very carefully, regardless of their diplomatic ranks, including the American ambassador himself, for fear of recruiting them for China).
This is what Chinese intelligence has succeeded in completely, given the targeting of US and Israeli Foreign Ministry officials by the Chinese, and the most dangerous targeting of China to recruit senior American and Israeli security, military and intelligence ranks and leaders on behalf of the Chinese Ministry of State Security, which is the main intelligence agency for China. They are assisted by all the vast Chinese spy networks spread around the world, in view of the directives issued by the Chinese President, Comrade Xi Jinping in 2018, and his strict directives to Chinese companies to amend their internal regulations to put the concepts of (loyalty and belonging to the Chinese state above achieving economic profit itself). The largest and most dangerous role remains, represented by the (Chinese Ministry of State Security) in Beijing, through its recruitment of the former officer in the US Central Intelligence Agency “CIA”, named “Jerry Chun Shing”, and through him the Chinese intelligence was able to know and track all the lists of the agents he knows are CIA agents, and the most dangerous is the help of former CIA officer “Jerry Chun Shing” of Chinese intelligence in deciphering the encrypted communications system known as “Quafcom” to set up the entire American spy network in China.
The most dangerous Chinese intelligence service is the (Chinese Ministry of State Security), and the Chinese Ministry of State Security begins to monitor and recruit its officers from the first university level, as most of them come from students of the (Beijing University of International Relations), and this is the main difference in the Chinese approach to recruiting intelligence officers. In their first university stages, in order to select the best qualified in a precise and strict manner, and to have better opportunities in examining their backgrounds and their contacts with foreign bodies, and do they have a history of traveling or residing abroad or not? The Chinese Ministry of State Security also places great emphasis on the proficiency of its employees in foreign languages, and runs an “intensive school for teaching foreign languages for officers”, in addition to placing them for a long time under the supervision of a special department of internal security known as (the Ninth Office), whose main function is (monitoring and following up all Workers and conscripts within the Chinese Ministry of State Security).
It comes at the top of the government agencies that practice intelligence activity informally in China, namely: (The National Defense Administration of Science, Technology and Industry), known in China and internationally as the “Sustained Administration”, and it is very similar to the work of the (Defense Advanced Research Projects Agency), known as “DARPA” in the United States of America, and we find the role of the Chinese news agency “Xinhua”, which Washington and the West always accuse of working as a cover for Chinese intelligence officers and agents, and which prepares secret summaries for decision-makers in Beijing, and there is also (the Office of Overseas Chinese Affairs), which maintains relations with overseas Chinese communities and Chinese expatriates, as well as the role of the (Chinese Ministry of Education), which monitors and communicates with all overseas Chinese students, all of these Chinese bodies, ministries and agencies employ their followers to collect information for the benefit of the Chinese government.
The main office responsible for recruiting and screening the handpicked in China for espionage activities is (the Liaison Office of the Ministry of State Security in Fuzhou, China). Whereas its elements are spreading all over the world in a decentralized network run by the principal officers.
In general and statistically close to accuracy, the number of Chinese elements loyal to the Chinese state security apparatus within the United States of America alone can be estimated at hundreds of thousands of individuals or assets, some of whom work permanently and others temporarily, and there are statistics confirming that there are more than 17 million Americans of assets. Asian, including four million of Chinese origin, in addition to a huge network of shell companies and front companies, numbering nearly three thousand… All of them are directly affiliated and are under the supervision of the Chinese Ministry of State Security.
Chinese intelligence methods vary in recruiting these elements, but in the case of precious assets, that is, those that provide intelligence information of high importance to China, many additional temptations and advantages are often added to them, and some of them are called “ocean bottom fish”, a Chinese equivalent term For the concept of “sleeper cells” in Western intelligence culture, these fish often receive training up to several months or years inside China, and are mainly used in the process of gathering information and filling gaps in communication networks, and sometimes to spread rumors in their host country. The Chinese intelligence has retained its special and distinctive character of the huge number and widespread espionage operations whose effects are felt all over the world.
Here, we are noticing the extent of the sophistication and advanced of the Chinese intelligence services, which consists of a wide range of intelligence agencies, military departments, corporate offices, party organs, and even research institutions, universities and the media, all of whom are subject to two parallel structures of control, whether by the central government in Beijing, or by Before the intelligence services of the ruling Communist Party in China, whose institutions hold the actual power in the country at the expense of the government itself, and carry out various operational and administrative tasks.
And the most dangerous office of the CIA targeted by Chinese intelligence is the (Office of Foreign Broadcasting Information Service), which includes a complete list of sensitive information from the heart of the CIA, which is passed on to Beijing, and perhaps the most important is information related to the plans of the CIA. The White House and its management of rapprochement or conflict with China, plans whose leakage gave Beijing a higher position in any subsequent negotiations with the American side.
The surprising thing for me, personally, is the prohibition of visiting China for all its recruited agents who are implanted within the American Central Intelligence Agency in particular, since the beginning of their work in the American Central Intelligence Agency, provided that the meetings of Chinese recruits within the American intelligence services take place with the Chinese agents operating them to give them The orders are in other countries apart from China and Washington, knowing that the duration of those meetings takes only a few minutes at most, due to the difficulty of monitoring and tracking them during those few minutes and seconds, and most importantly, the Chinese intelligence agents follow up with the American agencies their assignments that reach them from China with one Chinese intelligence official that does not change, in the manner that he may remain with his agents for a full 30 years, in order to maintain secure, narrow, and unobservable channels of communication by the Americans except with great difficulty.
In general, the Ministry of State Security of China, which is the main Chinese intelligence service, was established in 1983, by merging the (Central Investigation Department with the espionage units of the Ministry of Public Security), to eventually turn the ministry into China’s main civil intelligence service, under it, they are organizing all the official and unofficial intelligence structures in the country, with the exception of the army, which maintained its own military intelligence apparatus, which is under the supervision of the Communist Party of China, and not under the direct control of the government.
The Chinese President, Comrade “Xi Jinping”, directed his intelligence services to stop using embassy employees for espionage purposes, and to rely instead on journalists and businessmen, as part of a grand strategy known as “hide the brightness and feed the mystery”, where “Xi Jinping” wanted to expand the capabilities of his country, however, wanted to keep pace with the West, without engaging in many rhetorical wars and as covertly as possible.
Here, we find the distinctive nature of the Chinese intelligence work, which depends not only on recruiting influential agents to obtain direct and sensitive information, as much as it depends on flooding the enemy intelligence and counterintelligence services and the enemy with thousands of small-scale and scope espionage operations, many of which seem to be of no value. The final total results of those Chinese slow and complex processes is often reflect the traditional human traits of the Chinese who are known for their patience, perseverance and hard work.
We can understand this Chinese way of tiny and small group work to obtain information, in Chinese social norms, and specifically in the well-known Chinese “Guansky” tradition, which means exploiting slow and strong interpersonal networks to influence events, a norm that has been developed and transmitted to Chinese business and economy, and later to the field of intelligence at the structural and technical level, at a time when the intelligence industry and the war of minds and information gathering were at a rapid pace for China, given the density of the intelligence working groups of the Chinese.
The culture of intelligence and information gathering has gained tremendous importance for the Chinese, and their special approach to obtaining information, which has always been far from the general logic and bearing its own mark, was often done through a combination of (three main ways), which are:
Through my intelligence analysis referred to, we can understand that Chinese espionage operations on the American side have made a great resonance in the American intelligence community, and shed light not only on the continuous rounds of the secret intelligence conflict between China and the United States of America, whose chapters still extend to this day, but also on the unfamiliar traditions and tactics of the Chinese intelligence services, one of the most efficient and complex intelligence services in the world, and perhaps the least known, notorious, knowledgeable and unfamiliar with their complex working methods.
China’s National Counterintelligence and Surveillance Networks and the China Foreign Counterespionage Bureau have succeeded in dismantling all US spy networks on all Chinese territory. The amazing thing is that the Chinese surrounded all American CIA officers and informants, who were going to Chinese restaurants to meet their clients, and the network of American spies in China, which turned out to be all under the control of the Chinese secret services. Every restaurant in China, according to what was announced by the secret reports of the American intelligence, and frustrating is the work of these workers in Chinese restaurants, and their possession of different military and security ranks in the (Chinese National Counterintelligence Service).
Which prompted the Central Intelligence Agency to withdraw and smuggle many agents, informants and spies for America from China since 2010 until now due to its losses there and the vigilance of the Chinese. Which caused the CIA to suffer terrible losses as a result of this great failure it suffered in penetrating deep into the Chinese territory itself. Perhaps this is what brings me back to the memory of what happened completely similar to it, given what the CIA also incurred in the Soviet Union, after the detection of many American agents inside Soviet lands. The terrible shock was that the real reason for the detection of American agents on Soviet soil was betrayal from within the CIA itself, as American spies were handed over to their Soviet hunters by the American FBI agent (Robert Hansen), the head of the same counter-intelligence unit in the CIA, whose name is (Aldrich Ames), who were recruited by the Russian Intelligence Agency “KGB”.
The fearsome Soviet in the seventies and eighties and throughout the Cold War period between the American and Soviet parties.
Here, the reason for the Chinese intelligence dismantling all American spy networks on Chinese soil is due to the (Chinese anti-espionage service) being able to uncover a modern surveillance system, organized by the (US National Security Agency) “NSA” from Taiwan. At first, CIA agents went to the American student in Shanghai, China, “Glenn Shriver”, who collected American information of a defensive nature for Chinese intelligence in order to earn money to inspire American students studying abroad and motivate their patriotism, the (US Federal Bureau of Investigation) “FBI” issued (A video exposes the betrayal of the American student “Glenn Shriver”).
And cases of real Chinese hacking of American intelligence were discovered, including what happened in March 2017, when the employee of the US State Department, “Candice Clinburn”, was arrested after discovering that she had secret contacts with Chinese officials, and her bank account revealed the scandal of the flow of money to her from China, in addition to Chinese officials showered her with precious gifts and drenched her with money, including: an iPhone, a laptop computer, a fully furnished apartment, and many other benefits. But “Clinburn” did not admit her mistake, and no one could prove that she had revealed information about American agents to the Chinese.
In another discovered case of Chinese spying on Washington, in January 2018, “Jerry Chun Xin Li” 53-year-old, was arrested at New York airport. We find here that “Jerry Chun Xin Li” is an American citizen of Chinese descent who served in the US armed forces in the 1980s, and since 1994 has worked for the Central Intelligence Agency, where he had access to highly classified documents. In 2007, he retired and went with his family to “Hong Kong”, and there he worked in an auction house, belonging to a high-ranking official in the Communist Party of China, and he was identified and recruited for China in the face of the CIA.
In addition, the US secret communications system, used in China, known as:
What was used by a network of American agents in China, was very primitive, and the most dangerous was that it was connected via the Internet, and it was very similar to the American intelligence communication system in the Middle East, where the network environment is less dangerous. It is clear that the American intelligence geniuses did not fully appreciate the capabilities of the Chinese hackers and hackers. And when the American investigation team conducted tests to track the Chinese intrusion, it found that the American system of communications with the network of agents and spies in China contains a fatal error, as once it is entered, it is easily possible to access a much wider secret communication system, as the CIA was using it and interacting through it with its agents and agents network all over the world.
More seriously, the CIA was particularly concerned, fearing that Chinese intelligence might have shared this information with its Russian counterpart and informed them of ways to gain access to the “Covcom” system of communications for the US intelligence contacts with its agents on Chinese lands.
What increased the fears of the Americans, is the disappearance of a number of American informants and spies, who were already active in Russia, and they stopped communicating with their operators from the American side at the same time that the American intelligence network collapsed in China, which confirms the Chinese handing over the secret communications code of the Americans spies on the Russian lands as well.
Because of the abject failure of the American intelligence in the face of Chinese superiority over it, so it tried to respond to the (Chinese National Counterintelligence Service) in November 2021, by convicting the American jury of spying for the Chinese intelligence officer (Yangun Shu), who was deputy director of the department in the (Sixth Office of the Ministry of State Security) The Chinese officer in Jiangsu Province), which serves as the main intelligence agency of the Communist Party of China, and accused him of working to spy on US and Western military interests in favor of China, to obtain US military secrets and so on, and here the Chinese officer (Yangun Shu) was arrested in Belgium in the year 2018. Then the final verdict was issued against the Chinese officer (Yangun Shu) on November 5, 2021, convicting the Chinese intelligence officer by a US federal jury of committing the charge of “conspiracy and attempting to commit economic and military espionage and stealing trade and military secrets for China”.
Here, “Yang Shuo” is considered the first Chinese intelligence officer to be extradited to the United States of America. His case shows how China sought to obtain military-industrial secrets to help it militarily modernize its armed forces, which eventually enabled the People’s Liberation Army to build its vast network of Chinese advanced weaponry very quickly.
The important thing should be noticed here is that under the (China National Security Law), every Chinese citizen and company is required to cooperate with the CPC and its leaders in matters of national security. This means, in practice, that those Chinese companies that deal with any foreign companies are still required to share any technology or information they obtain with the Chinese military or intelligence services in the Chinese state. Likewise, all Chinese researchers and graduate students working on science, technology, engineering or mathematics projects are expected to share their research with Beijing, for the welfare and development of their country.
Accordingly, it is clear the extent of the widespread spread of the Chinese in America, Europe and the world, in order to preserve their security and the security of their homeland first, and then to obtain all the advanced technologies that allow them to develop and modernize the industrial and military infrastructure of their country, and this was revealed by “William Ivanina”, the head of the Counterintelligence and National Security Center The United States, that the Chinese are adept in this field, by following a variety of means, through (the Chinese Ministry of State Security, United Front Action Department, People’s Liberation Army).
The Chinese are also using a variety of ingenious tactics in this framework, including the latest electronic espionage devices and systems, to access sensitive information remotely, and what is known as “signal intelligence technology” to quickly capture information, as well as electronic intelligence, which enabled it to decipher all The blades of American spying and wiretapping devices on its soil and abroad. Thus, the vision becomes completely clear to us, about the reasons for the dismantling of all US spy networks by Chinese intelligence on its lands.
The (Project of Sound Judgments of Brilliant Future Predictors), which is funded by the “Advance Intelligence Research Projects Activity” section of the US government and the US Central Intelligence Agency (CIA), is striving to recruit, sort and employ brilliant geniuses who are able to predict the future in an unprecedented and genius way, by discovering new ways in advanced intelligence proactive thinking, which allows predicting the shape of the future and the new world order, and its network of international alliances globally
Here, the Central Intelligence Agency (CIA’s accurate and right Judgments of the Future Predictors Project) believes that there are real geniuses and super-intelligent proactive geniuses globally, who are better than others, and better prepared to predict global future events
The Central Intelligence Agency (CIA’s Good Judgments of the Future Predictors Project) announced that there are few people with exceptional and unique talents and talents to see the future differently. And through their real traitors and agents, it was discovered that I am one of the few geniuses globally, who apply to the world’s most advanced proactive genius to participate in the project of geniuses, who are able to predict the future shape globally in a different, genius and accurate way. They tried to entice me to work with them… However, my love for China as a second true homeland for me, brought up among their children, stood as a barrier between me and the American dream in joining me to work with them, and my refusal to work in (the Central Intelligence Agency’s Project of Good Judgments for the Predictors of the Future)
Although the Central Intelligence Agency (CIA’s Future Predictors of Good Judgments Project) employs more than 2000 geniuses around the world, who are considered among the best brilliant minds in the world, and are able to predict the best ways for the future, assess the probability of certain global events and fabricate others with them. However, the greatest American obsession was to attract me in a specific and accurate way, and to leave my absolute and intense love and devotion to China since my childhood, and my always correspondence with the Chinese to draw the shape of the foreseeable future and predict it with them.
With my refusal to join this clever geniuses focus group, known in America as: (brilliant geniuses forecasters, of the Central Intelligence Agency’s Project of Good Judgments for Future Predictors), mainly because of their unique predictive personality traits, which allow them to predict and predict things more accurately, compared to Basically several advanced global intelligence agencies
After that, a number of my Professors and colleagues who are basically close to the American political and intelligence circles, spread among everyone the topic and story of my madness, as an American attempt to blackmail the United States of America against me, to urge me to leave my homeland and join them in the project of geniuses globally in predicting the future, affiliated with the American Central Intelligence Agency, It is known as (Project of sound judgments for geniuses who predict the future)… to the point of kidnapping and assaulting me, and the practice of my professors and colleagues to the harshest levels of psychological and physical violence in my confrontation to force me to leave my loyalty and closeness to China, and to consider China as my true homeland, and to submit to those American conditions, and my acceptance to work with the American political and intelligence circles in (the Central Intelligence Agency’s Project of Good Judgments of the Future Predictors)… So that was the result that we are dealing with now, of beating and mutilating me, and attempts to kidnap and assault me cruelly, and the participation of my professors and colleagues in that moral farce to spread the story of my insanity, according to a calculated and deliberate American plan and agenda, to confront me with great care, to enforce me to change my convictions and work with them.
In recent years, China has been following the adage that “he who controls the discourse controls the world” with increasing...
The seventh package of the European Union sanctions against Russia in connection with the events in Ukraine will be remembered for its ban on the...
The proponent and opponents of tech innovation argue about the blessings and harms of the expanded technological advancement in the...
Even in the midst of tensions between India and Pakistan, people to people linkages between both countries – with both...
Russia and Iran are finding ever more points of convergence in their foreign policies and across the domain of economic...
The third day of talks between experts from Iran and the EU centered around technical and legal matters regarding the...
Around one million species are facing extinction, according to a report from IPBES, an independent intergovernmental science and policy body...
Policy Support Indispensable for China’s Economic and Financial Recovery
How Russia’s Policy in the Middle East and North Africa is Changing After February 24
Why would a peaceful country join NATO?
Crisis in Sri Lanka and The India-South Asia Challenges: Way Forward
Russia (Re)Schedules African Leaders Summit for 2023 in St. Petersburg
Escalating Big Power Contestation on Taiwan: Can It Lead to War?
The Assembly Lines of Grand Eurasia
Financial education gaps are primary barrier to retail investing in capital markets