FEATURED | Why the ‘Five Eyes’ Should Not Turn Blind: A Decisive Moment for Counter-Terrorism in Bangladesh

The ‘Five Eyes’ are an intelligence sharing network, known for its exclusive cooperation among each other. However, in order to face the challenge of international terrorism, they adopted increasingly the practice of sharing intelligence with non-‘Five Eyes’ members, like Bangladesh. But instead of using intelligence information for a comprehensive counter-terrorism strategy, Bangladesh’s Government is suspected to have misapplied this information against political opponents accompanied with severe human rights violations.

By Siegfried O. Wolf

Introduction

The ‘Five Eyes’ are an intelligence sharing network, known for its exclusive cooperation among each other. However, in order to face the challenge of international terrorism, they adopted increasingly the practice of sharing intelligence with non-‘Five Eyes’ members, like Bangladesh. But instead of using intelligence information for a comprehensive counter-terrorism strategy, Bangladesh’s Government is suspected to have misapplied this information against political opponents accompanied with severe human rights violations. This accusation created certain confusions in the relations between ‘Five Eyes’ countries and Dhaka, which resulted in demands to restrict security cooperation with Bangladesh. 

FEATURED | Why the ‘Five Eyes’ Should Not Turn Blind: A Decisive Moment for Counter-Terrorism in Bangladesh

Keeping this context, this article argues that any punishable measures towards Bangladesh, like the holding back of valuable intelligence for counter-terrorism, would have significant negative impacts in the long run. It will be outlined that the major rationale therefore lies in rooting the issue in the country’s political legacies and collective memories determined by the experience of the independence war and the role of western countries, foremost the United States (US). Furthermore, restriction in security cooperation with Bangladesh might disturb the country’s historically sensitive civil-military relations adding to the problems of democratic transition, and could be harmful for relations with Bangladesh in the long run. As such, it will be necessary to continue full cooperation between the ‘Five Eyes’ and the GoB in counter-terrorism.

The ‘Five Eyes’: An exclusive club

The so-called ‘Five Eyes’ nations make up the world's leading intelligence-sharing network. This alliance is comprised of Australia, Canada, New Zealand, the United Kingdom and the United States which are represented by their signal intelligence agencies (SIGINT).[1]

The ‘Five Eyes’ partnership’s origin can be traced to the British-US intelligence cooperation to monitor enemy radio transmissions during the Second World War (WW II), that matured during the Cold War. In the aftermath of the East-West conflict, it seemed that the most exclusive intelligence alliance was temporarily without a clear assignment. Subsequently, the ‘Five Eyes’ were trying to broaden the scope of its initial mission. This task was defined by the collection of foreign intelligence ‘defined as "all communications […] of a foreign country which may contain information of military, political or economic value’ to the Five Eyes partners, as determined in the more or less founding document, the 1946 UKUSA agreement (or BRUSA).

In this context, it is important to note that, originally, ‘Five Eyes’ partners and Commonwealth nations were excluded. Nevertheless, due to various ‘whistleblowing processes’ it became obvious that especially the United States National Security Agency (NSA) do spy on affiliates. This got more significance in the global war against terror. Nevertheless, collaboration between the ‘Five Eyes’ gained new impetus after 9/11.

Today, this alliance constitutes of a patchwork of various surveillance programmes and intelligence-sharing arrangements which enable to monitor the majority of all kinds of communications worldwide. Operating within a system of geographical work-sharing, the group divides the world into eavesdropping target sectors. By exchanging their respective intelligence, concerns and subsequent approaches go far beyond the original SIGINT sharing (like defence intelligence, human intelligence). But besides their cohesiveness in action, the respective individual intelligence agencies are running within their own national legal framework and legislated mandates. However, all intelligence agencies of the ‘Five Eyes’ are entrenched in the Anglo-Saxon culture and bounded together by the acceptance of liberal democratic values and processes in their goal to achieve complementary national interests. The latter one is commonly perceived as the main factor in building trust between the alliance partners but also sets them apart from intelligence activities of many other countries.

In this context, one must emphasize that information sharing and other forms of cooperation have significant implications for human rights. This turned into an critical issue between the ‘Five Eyes’ countries and their partners after Edward Snowden made public that the NSA has been able to retain vast amounts of data from the UK and other partners. Besides this ‘Five Eyes’ internal dimensions of Snowden exposures, also the relationship and intelligence sharing with non-alliance members got in  the focus of international attention.

The ‘Five Eyes’ and Bangladesh: The accusation of misuse of intelligence sharing

One of the latest remarkable cases is that of Bangladesh. Tensions, or at least some kind of disconnection, appeared in the relationship between Dhaka’s security circles and foreign intelligence agencies. More precisely, it seems that there exists some ‘confusions’ over how shared intelligence is used by Bangladesh’s authorities and security sector agents.

There are two major claims: First, human rights organisation (like Amnesty International, Human Rights Watch) are stating that Bangladesh’s security agents are involved in human rights violations. Secondly, and closely linked with the previous claim, accusations exist that the Government of Bangladesh (GoB), namely Prime Minister (PM) Sheikh Hasina and her Awami League (AL) administration, use foreign intelligence for political purposes. As such, in both cases, intelligence sharing about subjects between foreign agencies with Bangladesh authorities is considered as critical. Such phenomena could complicate counter-terrorism efforts in Bangladesh. This raises further questions regarding ongoing and future intelligence cooperation between Dhaka and the ‘Five Eyes’ and its impact on the rise of Jihadism in Bangladesh.

There are claims that foreign intelligence was handed to the GoB and to its security agents. However, the more problematic claim that this information was supposedly used for partisan reasons to arrest suspects, especially political opposition members (Bangladesh Nationalist Party/BNP) who maintain close relationship with religious extremist parties like Jamaat-e-Islami, is difficult to prove. Reports of human rights agencies hint that some detainees face human rights violations. Considering the strong polarisation of state and society, endemic violence, and a culture of revenge between the two major political parties AL and BNP, it seems that these claims have some substance. Furthermore, Bangladesh’s armed forces have a historical record of extra judicial, outlaw activities and being highly politicized. This got fostered due to a widespread culture of impunity dating back to the time of the country’s independence war, a serious lack of political will, and a gap in institutionalized civilian control over armed forces. However, statements that the GoB used information for political purposes instead of comprehensive counter-terrorism are falling short. Furthermore, it hampers the understanding of the currently perceived tensions between Bangladesh and the ‘Five Eyes’. This can be understood from the following reasons-

(A.) Sensitive civil-military relations as factor in counter-terrorism and foreign relations

One has to be aware of the tensed relationship between the GoB and the security forces. Bangladesh lacks formal, institutionalized civilian control mechanisms over its security forces. Generally, PM Sheikh Hasina was able to gain control over decision-making processes in all policy fields, especially in the area of internal security. Ms. Hasina’s main power resource is her personal charisma and authority as daughter of Bangladesh’s ‘founding father’ Sheikh Mujibur Rahman (Bangabandhu) as well as internal factionalism within and rivalry between the different security agents.

A most remarkable example in this direction is the ‘Pilkhana crisis’, a staged mutiny of the para-military Bangladesh Border Rifles (BDR) at Pilkhana/Dhaka on 25/26 February 2009. During that time, the capital witnessed a bloody confrontation in which numerous commanding officers of the Bangladesh Army, deployed at the BDR, were killed. PM Hasina was able to hold the regular soldiers back by taking revenge on the BDR, restructuring the latter one as the Border Guards Bangladesh and reducing the army leverage in the new force.

Against this backdrop, Sheikh Hasina exercised successfully her personalized and not institutionalized decision-making power vis-à-vis the military top brass. However, from a long term perspective, there are not clear indications that Ms. Hasina was able to exert control over policy implementation, especially not when it comes to counter-terrorism activities. Especially religious inspired segments of the armed forces are trying to undermine Sheikh Hasina’s government. The coup attempt of fanatic Islamists officers in 2012 (Heinous conspiracy) can be seen as a proof. Despite the fact that the coup failed, it turns out that parts of the army still try to follow historical patterns by acting against the line of the civilian government. One should be aware that Bangladesh has a tradition of direct military interventions, namely the military rules of General Ziaur Rahman (1975-1981) and General H.M. Ershad (1982-1990) as well as the military-backed (rather controlled) non-party caretaker governments from 2006-2008. Both of the dictators helped to prepare the ground for the rise of the Islamist threat.

To sum up, political instability, rise of Islamist militancy, and deteriorating security situation is not only a matter of the entrenched conflict between two political parties (BNP versus AL) but also an outcome of the country’s stressed civil-military relations. As such, any insensitive punishable measures by the ‘Five Eyes’, like restrictions in counter-terrorism cooperation, could further disturb Bangladesh’s sensitive relations between civilians and soldiers. Additionally, it could also create anti-sentiments towards foreign interference, especially if the GoB feels that cooperation in counter-terrorism with foreign agencies will weaken their position towards their own security apparatus. In result, potential tensions in relations with other countries are more likely.

(B.) The historical legacies need to taking into account

The claim of misuse of foreign intelligence ignores the historical legacies which are of tremendous importance to grasp today’s political patterns in Bangladesh. Generally, one should be aware that political psyche, behaviour and culture is largely determined by the experience of the war of independence (‘liberation war’) against the West Pakistani forces who are responsible for conducting large-scale massacres and target-killings among the people of Bangladesh (then East Pakistan) in 1970/71. Most remarkably, in this context were the reports of US Consul General Archer Blood, especially his last cable on 6 April 1971, the so called ‘Blood Telegram’. In the legendary document, the diplomat denounced the complicity of the then US President Richard Nixon and his National Security Advisor Henry Kissinger in the mass murdering of Bangladeshis. Obviously, Blood’s reporting was inconvenient for Washington. Until today, the ignorance of Blood’s alarming documentation and the recall from his post is perceived as a major wrongdoing of the US towards Bangladesh. Many people are still asking why Washington did not stop the genocide in East Pakistan. Apparently, the silence of Mr. Nixon was the trade-off for Pakistan’s help to arrange the US-China rapprochement (1972 Nixon visit to China). This experience determines without any doubts a crucial element in the ‘collective memory’ of the people. Especially, within the AL which was the driving force of the independence movement. In result, this traumatic cognition is partly causal for a cautious approach of GoB in interpreting any restrictive policy towards Dhaka by other states, especially the US. 

Final thoughts – The need to continue security cooperation with the GoB

Taking into consideration the issues of civil-military relations and cognitive memory, it would be disastrous for the future course of counter-terrorism in Bangladesh, if the ‘Five-Eyes’ would withdraw its support for Dhaka. The crucial point is that Bangladesh lacks a coherent counter-terrorism approach. The tortuous nets between political parties and Islamist groupings make the sharing of intelligence even more difficult. On top of that, Bangladesh’s weak and dysfunctional institutions are another challenge for security cooperation. The intense political polarisation of the country is not only hampering the effectiveness of political-administrative institutions but also keeps the disintegration within security sector agents going.

Consequently, the misuse of shared information will most likely remain as an issue as long there are no healthy military relations featured by an effective civilian control. Undoubtedly, this creates cautiousness among the ‘Five Eyes’in its current interaction with Dhaka in counter-terrorism. When it comes to cooperation with states featured by a unstable process of democratic transition and political instability, the ‘Five-Eyes’ prefer to work directly with the security agents together instead with civilian (understood as elected representatives) authorities. In other words, taking into account the ties of the intelligence alliance with other countries, especially Pakistan, it seems that intelligence sharing and other security related cooperation via military-to-military contacts is the preferred modus operandi. This did not only strengthen the military’s role in politics in Pakistan but also weaken the ability of the government to exercise decision-making power vis-à-vis the soldiers.

Despite uncertainties, it is crucial that the international community continues to give full support to the GoB in its struggle against militant Islamic fundamentalism. The dictate of the moment is that the government with its security agencies must work out a concrete and comprehensive strategy to counter the domestic and global Jihadist threats. Until now, this did not happen, at least not in an effective, visible way. Moreover, the GoB is reluctant to confirm the presence of international terrorist groupings, foremost Islamic State (IS).

Two reasons could be responsible for Dhaka’s difficulties in dealing with home-grown and international terrorism: First, the country’s difficult civil-military relations which are featured by personalized decision-making procedures on security related matters of PM Sheikh Hasina. In this context, the establishment of an institutionalized relationship with the armed forces is essential. At the moment, it appears that Ms. Hasina either does not see the ‘right moment’ for introducing new mechanisms and/or her administration as well as the parliament has no necessary capacities (like functional and effectives committees for civilian control, properly equipped and staffed/skilled ministries) to establish a functional, institutionalized relationship with the country’s security forces. Secondly, another additional major roadblock making the implementation of a successful counter-terrorism concept unlikely is the difficult relations between and within the different security agencies. In the past, factionalism within the security apparatus was one of the major rationales behind the numerous coups and coup-attempts which the country had to experience.

To sum up, the ‘Five Eyes’ should continue its intelligence and security cooperation with Bangladesh’s civilian authorities. This would help the GoB to carry out an appropriate strategy in countering Islamist fundamentalism and to strengthen democratic procedures in the country.

About The Author:

Dr. Siegfried O. Wolf, is Senior Researcher (member) at the South Asia Institute (SAI), Heidelberg University, and Director of Research at SADF (Coordinator: Democracy Research Program). He was educated at the SAI and Institute of Political Science (IPW) in Heidelberg. Additionally he is a visiting fellow at the National University of Science and Technology (NUST, Islamabad), affiliated researcher at the Pakistan Security Research Unit (PSRU, Durham University), and a former research fellow at IPW and Centre de Sciences Humaines (New Delhi, India).

He is the co-author of 'A Political and Economic Dictionary of South Asia' (Routledge; London 2006), co-editor of 'Politics in South Asia. Culture, Rationality and Conceptual Flow' (Springer: Heidelberg, 2015), 'The Merits of Regionalisation. The Case of South Asia' (Springer: Heidelberg, 2014) and 'State and Foreign Policy in South Asia' (Sanskriti: 2010), and Deputy Editor of the 'Heidelberg Papers in South Asian and Comparative Politics' (HPSACP).

Furthermore, he has worked as a consultant for the Federal Ministry for Economic Cooperation and Development (BMZ), Germany, and is member of the external group of the Afghanistan-Pakistan Task Force, Federal Foreign Office, Germany.

He can be reached at his official email id: swolf@sai.uni-heidelberg.de




[1] Namely the Australian Signals Directorate (ASD), Canadas Communications Security Establishment Canada (CSEC), New Zealands Government Communications Security Bureau (GCSB), the United Kingdoms Government Communications Headquarters (GCHQ), and the United States National Security Agency (NSA). 
__________________________

Publication Details:

AIDN: 001-11-2015-0414

Wolf, Siegfried. "FEATURED | Why the ‘Five Eyes’ Should Not Turn Blind: A Decisive Moment for Counter-Terrorism in Bangladesh." IndraStra Global 01, no. 11 (2015):0414. http://www.indrastra.com/2015/11/FEATURED-Why-Five-Eyes-Should-Not-Turn-Blind-CT-in-Bangladesh-by-Siegfried-O-Wolf-0414.html. | ISSN 2381-3652 |

Name

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,7,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,36,Aerospace,5,Afghanistan,88,Africa,115,Agile Methodology,2,Agriculture,21,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,6,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,31,Army,3,Art,3,Artificial Intelligence,84,Artillery,2,Arunachal Pradesh,2,ASEAN,13,Asia,71,Asia Pacific,24,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,58,Austria,1,Automation,13,Automotive,133,Autonomous Flight,2,Autonomous Vehicle,4,Aviation,63,AWACS,2,Awards,17,Azerbaijan,17,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Bali,1,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,30,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,21,BIMSTEC,1,Biodiversity,1,Biography,1,Biology,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,11,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,33,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,7,Bomb,3,Bond Market,3,Book,11,Book Review,24,Border Conflicts,13,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,107,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,5,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1273,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,58,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Banks,1,Central Eastern Europe,49,Certification,1,Chad,2,Chagos Archipelago,1,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,599,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,6,Climate,68,Climate Change,29,Climate Finance,2,Climate Studies,2,Clinical Research,3,Clinton,1,Cloud Computing,46,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,16,Commodities,5,Communication,13,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,2,Conflict,117,Conflict Diamonds,1,Conflict Resolution,49,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,3,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,5,Credit,2,Credit Rating,3,Credit Score,1,Crimea,4,Critical Minerals,1,CRM,1,Croatia,2,Crypto Currency,21,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,9,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,10,Cyber Crime,2,Cyber Security & Warfare,118,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,5,DACA,1,Dagestan,1,DARPA,3,Data,9,Data Analytics,36,Data Center,4,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,14,Debt Fund,1,Decision Support System,5,Defense,12,Defense Deals,8,Deflation,1,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,3,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,5,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,55,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,2,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Indicator,1,Economic Justice,1,Economics,46,Economy,115,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,61,Education,67,EFTA,1,Egypt,28,Election Disinformation,1,Elections,55,Electric Vehicle,15,Electricity,7,Electronics,9,Elon Musk,1,Emerging Markets,1,Employment,23,Energy,317,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,9,Entrepreneurship,15,Environment,48,ePayments,14,Epidemic,6,ESA,1,Ethiopia,4,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,237,EuroZone,5,Exchange-traded Funds,2,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,6,Featured,1436,Federal Reserve,6,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,19,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,15,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,37,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,French Polynesia,1,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gambling,1,Gaming,1,Garissa Attack,1,Gas Price,24,GATT,1,Gaza,16,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,9,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,11,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,72,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Markets,1,Global Perception,1,Global Trade,101,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,5,Google,20,Gorkhaland,1,Government,129,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,186,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,5,Haiti,2,Hamas,12,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,17,Houthi,13,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,77,Immigration,21,Impeachment,1,Imran Khan,1,Independent Media,73,India,693,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,25,Indices,1,Indigenous rights,1,Indo-Pacific,9,Indonesia,25,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,4,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,213,Iraq,54,IRGC,1,Iron & Steel,5,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,154,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,95,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Julian Assange,1,Justice System,3,Kamala Harris,3,Kanchin,1,Kashmir,10,Kaspersky,1,Kazakhstan,26,Kenya,6,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Ladakh,1,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,84,Law,6,Leadership,3,Lebanon,12,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,2,Light Battle Tank,1,Linkedin,1,Lithium,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,11,Lockdown,1,Lone Wolf Attacks,3,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,51,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,30,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,3,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,19,Meta,3,Metadata,2,Metals,4,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,113,Military Exercise,12,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,58,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,2,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,4,NASA,14,NASDAQ,1,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,13,Netflix,1,Neurosciences,7,New Caledonia,1,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1331,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,56,North Korea,60,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,7,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,2,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,388,Oil Gas,7,Oil Price,77,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,2,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,709,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,183,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,27,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Payment Orchestration,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,6,Petrochemicals,1,Petroleum,19,Pharmaceuticals,15,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,6,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,56,Polynesia,3,Pope,1,Population,7,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,35,Press Release,158,Prison System,1,Privacy,18,Private Debt Fund,1,Private Equity,3,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,14,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,6,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,54,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Revenue-based Financing,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,3,Royal Canadian Air Force,1,Rupee,1,Russia,328,Russian Navy,6,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,407,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,4,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,3,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Sociology,1,Soft Power,1,Software,8,Software Engineering,1,Solar Energy,17,Somalia,5,South Africa,20,South America,55,South Asia,498,South China Sea,36,South East Asia,84,South Korea,67,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,47,Space Station,3,Spaceflight,1,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,26,Stablecoin,1,Stamps,1,Startups,43,State,1,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,29,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,6,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,5,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,78,Testing,2,Texas,3,Thailand,12,The Middle East,664,Think Tank,317,Tibet,3,TikTok,2,Tim Walz,1,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,22,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,16,Tsar,1,Tunisia,7,Turkey,75,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,117,Ukraine War,30,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,86,United Nations,29,United States,788,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US Dollar,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,22,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,26,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,18,Water Politics,8,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,2,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,40,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,29,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
ltr
item
IndraStra Global: FEATURED | Why the ‘Five Eyes’ Should Not Turn Blind: A Decisive Moment for Counter-Terrorism in Bangladesh
FEATURED | Why the ‘Five Eyes’ Should Not Turn Blind: A Decisive Moment for Counter-Terrorism in Bangladesh
The ‘Five Eyes’ are an intelligence sharing network, known for its exclusive cooperation among each other. However, in order to face the challenge of international terrorism, they adopted increasingly the practice of sharing intelligence with non-‘Five Eyes’ members, like Bangladesh. But instead of using intelligence information for a comprehensive counter-terrorism strategy, Bangladesh’s Government is suspected to have misapplied this information against political opponents accompanied with severe human rights violations.
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj51oO6McgPQoZZi3SVcMpdIoU5NVr9KyNK-TbdHKrt6rhsFkBsp_gJsoW3x-0nCnrYOJLieTEn9WmkTFi3F4Gr_j13I1M6UKTxo6BRK1wEAUp0eiTByrhG8DGvMa7ZvEBX1Z5UlCPIAYY/s640/rab.jpg
https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj51oO6McgPQoZZi3SVcMpdIoU5NVr9KyNK-TbdHKrt6rhsFkBsp_gJsoW3x-0nCnrYOJLieTEn9WmkTFi3F4Gr_j13I1M6UKTxo6BRK1wEAUp0eiTByrhG8DGvMa7ZvEBX1Z5UlCPIAYY/s72-c/rab.jpg
IndraStra Global
https://www.indrastra.com/2015/11/FEATURED-Why-Five-Eyes-Should-Not-Turn-Blind-CT-in-Bangladesh-by-Siegfried-O-Wolf-0414.html
https://www.indrastra.com/
https://www.indrastra.com/
https://www.indrastra.com/2015/11/FEATURED-Why-Five-Eyes-Should-Not-Turn-Blind-CT-in-Bangladesh-by-Siegfried-O-Wolf-0414.html
true
1461303524738926686
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content