Wednesday, August 5, 2020

Yemen's Multilayered War: Al Qaeda in Arab Peninsula

This article is by

Share this article

Article Contributor(s)

Anant Jani

Article Title

Yemen's Multilayered War: Al Qaeda in Arab Peninsula

Publisher

Global Views 360

Publication Date

August 5, 2020

URL

Sailors render honors at the USS Cole Memorial

Sailors render honors at the USS Cole Memorial | Source: Flickr

This is the 4th part of a short explainer article series on the current crisis in Yemen. To read the earlier parts of the series click on the following links.

To read the 1st part of the series click on the link.

To read the 2nd part of the series click on the link.

To read the 3rd part of the series click on the link.

The unification of Yemen in 1990 was a direct result of the military defeat of South Yemen at the hand of North Yemen forces. This military defeat and coerced unification implied that Unified Yemen could not achieve real cohesion, preventing the functioning of the nation as a democratic unit.

Meanwhile, newer elements were added to the dangerous mix of sub-nationalism, intra religious division, and tribal loyalty in Yemen. These were the Yemeni veterans of Soviet-Afghan war who fought with the Afghan mujahideen against the Soviet army backing the Afghan government.

These were hardline Wahabi and Salafi fighters, following an idealogy that mandated a strict interpretation of Islam. The fighters returned to Yemen in the early 1990s, after the withdrawal of Soviet forces from Afghanistan. The local Yemeni, both the Zaidi Shias or Maliki Sunni have traditionally followed a more liberal version of Islamic and social practices. Unlike the local Sunnis who were living in peaceful coexistence with the Zaidis Shia, these hardliners were antagonistic to the Shias.

Their arrival was followed by a forceful realignment of the local residents’ religious practices, mandating the local population to strict interpretations and social practices. Osama bin Laden, who had family roots in Yemen, was a conveniently placed ideological mentor. This led to a pushback from both the government forces as well as Shia groups, especially the Houthi-led Ansar Allah movement. In time, these former mujahideen, who were battle hardened and well versed in guerilla warfare, allied themselves with Al-Qaeda to start a low level insurgency in Yemen.

The Gulf war and subsequent stationing of American forces in Saudi Arabia and other gulf countries provided another impetus for the growth of Al Qaeda in Yemen. Consequently, they demanded that coalition forces leave Arabian land, failing which would result in more terror attacks.

Al-Qaeda affiliated groups attacked many installations associated with the US-led coalition forces in Yemen and nearby countries. The most successful of those was the famous bombing of USS Cole in Aden, in 2000. It was followed by a series of attacks leading up to  9/11.

Al-Qaeda in the Arab Peninsula (AQAP) is also known as the Ansar al-Sharia in Yemen is fighting to set up an emirate amidst the lack of leadership post the Houthi rebellion. It was this outfit that claimed responsibility for the attack on the French satirical magazine, Charlie Hebdo, in 2015 and is now considered the most dangerous al-Qaeda outfit by the US.

The CNN reported that “AQAP set out its objectives in a May 2010 statement as the "expulsion of Jews and crusaders" from the Arabian Peninsula, the re-establishment of the Islamic caliphate, the introduction of Sharia, or Islamic law, and the liberation of Muslim lands.”

The full list of attacks and places captured by terrorist insurgents in chronological order can be accessed here.

One of the outcomes of continual terrorist attacks has been a reduction in Hadi’s popularity. He is also seen as weak for not being able to stop al-Qaeda from terrorising Southern Yemen, as well as for not being able to alleviate them from their feeling of marginalization ever since the unification.

To read the 5th part of the series click on the link.

Subscribe to the Global Views 360 mailing list for the weekly updates.

Support us to bring the world closer

To keep our content accessible we don't charge anything from our readers and rely on donations to continue working. Your support is critical in keeping Global Views 360 independent and helps us to present a well-rounded world view on different international issues for you. Every contribution, however big or small, is valuable for us to keep on delivering in future as well.

Support Us

Share this article

Read More

February 22, 2021 11:06 PM

WhatsApp's New Privacy Policy: Collecting Metadata and Its Implications

According to WhatsApp’s new privacy policy, the app is set to collect “only” user’s Metadata. Metadata can reveal a lot more than merely the app usage of a person. Former NSA General Counsel Stewart Baker stated, “Metadata absolutely tells you everything about somebody’s life. If you have enough metadata you don’t really need content.”

This article explores the ways in which WhatsApp is underselling the true estimation of the significance of Metadata.

Facebook owned WhatsApp recently announced the update of its privacy policy terms. 8th of February, 2021 was initially set as the deadline for users to either accept the new privacy policy or delete their account. By this time, most of us have already witnessed or been a part of the backlash that WhatsApp is experiencing. LocalCircles conducted a survey and the results indicated that 15% of India’s users are likely to move away entirely from the app while 36% will drastically reduce the usage and 67% of users are likely to discontinue chats with WhatsApp business accounts.

To reinstall trust in its users, WhatsApp released a clarification stating that the new policy update doesn’t compromise privacy of messages with friends and family. Furthermore, it explains that the update includes changes related to WhatsApp business accounts are optional too.

However, owing to severe backlash, WhatsApp has pushed the deadline to May 15 while they further clarify their policy updates.

It is true that WhatsApp cannot read our messages as it is end-to-end encrypted which implies that only a message’s sender and receiver can read it. The updated privacy policy intends to alert users that some businesses would soon be using Facebook-servers to store messages with their customers. By accepting the new privacy policy, users will be allowing WhatsApp to reserve all rights to collect your data and share it with the expansive Facebook and Instagram networks ‘regardless of whether you have profiles on those apps.’

A person using WhatsApp | Source: Andrés Rodríguez via Pixabay

By using WhatsApp, you may now be sharing your usage data, your phone’s unique identifier, your location when the location service is enabled, among several other types of metadata. A culmination of all your metadata is linked to your identity.

The value of metadata has been underestimated since the term isn’t clearly understood. Metadata is data about our data. For instance, in a cell phone conversation, the conversation itself isn’t metadata but everything except that is metadata. Data regarding who you called, how long you spoke for, where you were when you placed the call, where the other person on the line was and the time you placed the call. Consider a situation when every time you made a call to someone, you had to inform a particular person about who you called, how long you spoke for, when and where and all other details except the content spoken. This applies for every single call and everyone else’s metadata is also being recorded. The person owning the metadata can analyze and tell a lot about your personal life. Who you work with, who you spend time with, who you are close to, where you are at particular times and so on…

Kurt Opsahl, in his post in the Electronic Frontier Foundation, gives an example of how companies and governments collect intimate details about your life with the disguised use of the word called metadata. The following examples are an excerpt of his article:

“They know you rang a phone sex service at 2:24 am and spoke for 18 minutes. They know that you called suicide prevention hotline from the Golden Gate Bridge.

They know you spoke with an HIV testing service, then your doctor, then your health insurance company in the same hour.

They know you called a gynaecologist, spoke for a half hour, and then called the local Planned Parenthood's number later that day. But nobody knows what you spoke about.”

Metadata provides more than required context to know some of the most intimate and personal details of your lives.  When this data is correlated with the records of other phone calls, one can easily obtain a lot more data and track our daily routines. This is merely about phone calls. WhatsApp includes a lot more features and will collect metadata of chats, businesses and money transactions.

In WhatsApp’s words:

“We collect service-related, diagnostic, and performance information. This includes information about your activity (such as how you use our Services, how you interact with others using our Services, and the like), log files, and diagnostic, crash, website, and performance logs and reports.”

In addition to this, WhatsApp also collects information about IP address, OS, browser information and phone number.

Stanford’s computer scientists conducted an analysis to understand the extent of intrusion of privacy using metadata. The scientists built an app for smartphones. The app was developed to retrieve metadata of calls and text messages from more than 800 volunteers’ phone logs. The researchers received records of more than 250,000 calls and 1.2 million texts. Their inexpensive analysis revealed personal details of several people like their health records. Researchers were also able to learn that one of their participants owned an AR semi-automatic rifle with only metadata.

Gen. Michael Hayden | Source: Wikimedia

Gen. Michael Hayden, the former head of the National Security Agency once stated that “the U.S. government kill[s] people based on metadata.”

In 2016, Facebook was involved in the infamous data privacy scandal which centered around collection of personal data of over 87 million people by Cambridge Analytica, a political consulting and strategic analyst firm. The organization harvested user data for targeted advertising, particularly political advertising during the 2016 U.S. election. While the central offender was Cambridge Analytica, the apparent indifference for data privacy to Facebook facilitated Cambridge Analytical and several other organizations.

In June 2018, Facebook confirmed that it was sharing data with at least 4 Chinese companies, Huawei, Oppo, Lenovo and TCL. Facebook was under scrutiny from the U.S. intelligence agencies on security issues as they claimed that the data with the Chinese telecommunication companies would provide an opportunity for a foreign espionage.

In September 2019, there were reports that the Indian government contemplated making it mandatory for companies like Google, Facebook, and Amazon, to share the public data of users.

The Ministry of Electronics and IT (MeitY) was planning on issuing new guidelines under the Information Technology Act which according to which tech giants would have been required to share freely available data or the public information that they collate in the course of their operations, including traffic, buying and illness patterns.

Europe is exempted from WhatsApp’s new privacy policy as EU antitrust authorities fined Facebook 110 million euros for misleading the regulators during the takeover of WhatsApp in 2014. EU’s strict privacy laws empowers regulators to fine up to 4% of global annual revenue of the companies that breach the bloc’s rules.

Your Metadata is extremely personal. By giving WhatsApp the authority to access it, you are giving access to several other organizations, businesses and it also makes you more vulnerable to third-party hackers and trackers. WhatsApp has given multiple assurances about its updated privacy policy being noninvasive. However, most of these assurances are cleverly worded and misleading statements. It is important to read through the fine print of the new policy before accepting it.

Read More