How are you, friends? Right now, a Great Game is going on in the world. In this Great Game, one country whose superpower is at stake is in danger, which is definitely the United States of America. Saving its world order, which is continuing, is its first priority. In comparison, the second power is China, and the third power is Russia. Both these powers, on the basis of two hands, have reached a point where they have to challenge the American superpower status in every situation. Both of their powers have different approaches, but the vision behind it is the same, the ideology is the same as that of American President James Monroe. In short, friends, James Monroe was the American president who put America on the path to becoming a superpower. He presented a doctrine in 1823, which was actually a threat to the world's most powerful man and a declaration of being a regional don. The first and most important point of this doctrine was that in both the continents of the New World, i.e., North and South America, especially No European country would ever come and occupy, or establish colonies. This was because, after the discovery of the New World, that is, America, European powers were coming here specifically to seize the land and establish their own colonies, plundering these places and plundering the natural resources here. Although the founders of the USA had previously done the same to Native Americans, they were not ready to allow any other country to do so. The second point of this Doctrine was a threat. It stated that if any country tried to establish a colony in North and South America, it would be considered an attack on the United States of America, meaning it would have to fight the United States. The third point was that the United States would not interfere in the mutual conflicts of European countries. The fourth and final point was that the United States would not play any role in the colonies that currently exist in North and South America. Friends, in this fourth point, America Actually, there was a double-edged sword. This double-edged sword happened two years before this doctrine. What happened was that America first liberated Texas, which was a Spanish colony, by force. Then, two years later, America introduced this doctrine, the Monroe Doctrine. This doctrine was introduced at a time when most of the people of South America had already gained independence from Spain and Portugal, or were about to gain independence. As you can see in the map, in 1800, two colors, yellow and green, dominated Central and South America. These two colors represent the occupation of Spain and Portugal and their American colonies. The very light green color above represents the 13 states of the United States of America. Whereas in the next map, which is from 1822, you see more than two colors, which means that some areas had gained independence from Spain and Portugal, while others were being occupied by other European powers like France. So, at that time, America introduced the Monroe Doctrine. By announcing this doctrine, he is actually trying to stop anyone from attacking anyone within his area of influence, that is, his geography.It was stopped by force because only in this situation could he established his monopoly in that place. Friends, you can watch this story in more detail in Episode 10 of History of America. But here you should understand that becoming a global superpower or an international superpower begins with completely establishing its influence in its area. No one becomes a superpower overnight. Now this is the same issue that China and Russia are facing. First of all, let us look at China. This entire area which is India, Nepal, Bhutan, Bangladesh, Myanmar, Thailand, Laos, Cambodia, Vietnam, the South China Sea and here is Taiwan as well, and then from East China to Korea and Mongolia. This entire area is what we can geopolitically call the area of Chinese influence. That is, due to its power and geography, these are all those areas where China can and wants to enforce its regional order. That is, it wants its Monroe Doctrine here, as was given by American President James Monroe in his area in 1823. But friends, there is a problem here. The issue is that below is India and that is under American influence. Pakistan also has more trade relations with America. Vietnam is already an American alliance, then Taiwan and South Korea also exist with the full support of America. Above all, American warships openly roam and swim in the South China Sea and East China Sea with the help of Korea, Japan and the Philippines. China can only threaten them but cannot stop them. Just on January 22, you saw how two American warships and aircraft carriers roamed in the waters of China, that is, the part of the ocean which China calls its own sea, in the Pacific Ocean. On which China also warned that American ships should have taken permission from China before entering these waters. But you know that America keeps roaming there without permission with its external fleet. So in this way, friends, you can see that China is surrounded by America. In fact, China not only wants to break this encirclement of America in every situation, but it also wants to establish its own doctrine, its own world order or regional order in this entire region. Now you think who is stopping him from giving doctrine in his region? Friends, just giving doctrine is not enough; this doctrine has to be implemented, it has to be applied to the region for which you have brought the doctrine. It has to be implemented with your power and the rib of this implementation, my curious fellows, is not there in China right now, where it can say like President James Monroe, that this is my area of influence and if anyone comes in it, I will consider it a war against myself, I will fight him. China wants to say this but is unable to say it, then what is China doing? Is China sitting silent? No friends, China is working on a long-term strategy and this is a very important part of the Great Game. To remove America from its region, China has to reduce its influence as a first step, reduce its impact. For this, the doctrine on which China is working is very different from the Monroe Doctrine and that is the strategy of winning without fighting. Part of this strategy is to ensure continuous competition, ruthless competition on every field.And in this competition, there are no principles, rules, laws, regulations, people, illusions, shame, etiquette, manners, courtesy, courtesy, consideration, nothing. Now, friends, it's not that America doesn't like any principles; it is also in a rootless, ruthless competition; it doesn't have any moral superiority. We will present America's moves in the Great Game one by one, but for now, let's present to you a picture of what China is doing in this Great Game. Friends, the thing that China is doing the most right now is investing in America and building its capital there. Until before the pandemic, before COVID, China was directly investing between $37 and $47 billion annually in America, that is, from $37 billion to approximately $47 billion. One of the various purposes for making this investment was China's aim to acquire new American technology, because China lags far behind America in technology. What happens is that a Chinese citizen invests a large sum of money, millions or billions of dollars, along with some Canadians or Americans, and forms a major technology company in the United States, or partners with a major American company. This is typically a Chinese company partnering with Chinese companies where work is being done on defense or artificial intelligence. What happens is that the owners and most senior people in these companies are private Americans. They receive such a large investment for their work and business that they cannot refuse. Then, despite the other person's Chinese origin, he is still an American, so they agree to work with him. But this Chinese investor, this Chinese investor, is not actually an American at heart. He is essentially an intelligence agent of his own government, of the Chinese government. I'm not talking about all Chinese investors, friends. I'm talking about those who are holding and handling secret operations. Only they have roles. I'm talking about where Chinese intelligence has a specific target to achieve. Well, after years of production, when that technology or defense company with Chinese investment discovers that its technology is being copied rapidly in China, it becomes alarmed. It begins to suspect that there's something fishy in the company, something they're unaware of. Now, some people want to point fingers at that Chinese investment, but they can't or won't blame the Chinese investor. There are two very important logical reasons for this. First, if they take action against that Chinese investor with the help of American security agencies, American law will thoroughly investigate them and those Americans to see if they too are in collusion with the Chinese investor. Then, if news appears in the media, the company's reputation will be severely tarnished. So, you can understand why companies worth billions of dollars, which have reached this level through years of hard work, would take such a risk. But the second reason why they are not ready is that they do not have any concrete proof that their ChineseThe investor is actually an agent of the Chinese intelligence agency MSS. Then another very important Lidiya Baaz status is that by the time the American company comes to know that their partner is actually stealing technology, by that time the investor, that Chinese investor has already left America. The second thing friends, what this Chinese leadership is doing is that it deposits dollars with China and Hong Kong at this time.China has foreign reserves of $7 trillion. This is such a huge amount that China can disturb the value of the dollar globally. By throwing these dollars into the market, China can severely impact the value of the dollar as well as the American economy. The third important thing China does is cyber attacks. American security agencies, and especially American space missions and defense companies, have a constant complaint that Chinese hackers steal their information. This is happening continuously. Friends, a total of more than 6 lakh files of American weapons manufacturing company Lockheed Martin's F35 and F25 fighter jets and Boeing's F35 and F25 fighter jets have been stolen and have been copied and reached China. This news has become common in the media and China has not denied it. American intelligence agencies were shocked when they found out that the technologies they were secretly developing were being continuously transferred in the form of attachment files in emails. So friends, this is the third important thing which China is doing this to keep itself updated with American technology. Friends, this was a part of a brief story of the Great Game going on in the world, in which you saw China's role. Consider it just a glimpse because the detailed stories will come in the next few posts. After China, friends, let us see where Russia stands in this Great Game and what it is doing. Russia, friends, is that superpower which till yesterday was standing eye to eye with America, just 32 or 31 years ago, but now America has defeated it. Neither does Russia have as much financial resources as China, nor does it have such technology which is superior to America. It has defense technology which is slightly better than China, but it is not comparable to America. On top of this, the problem for Russia is that its historical area of influence has been completely compromised and has come under American influence. Just look at this map once again. This is the Russia of the imperialist era, the Tsarist Russia of before the First World War. Or whether it's the USSR's Russia, in both periods, its influence was fully present in its west and west, from Finland down to Estonia, Latvia, Lithuania, Belarus, Ukraine, Moldova, Romania, Bulgaria, and if we look further south, even up to Turkey, then Georgia, Azerbaijan, Turkmenistan, Afghanistan, Tajikistan, Kyrgyzstan, Pakistan, Kazakhstan, and east to the Sea of Japan. Soviet Russia used to run its regional order and exert influence. But now the situation is that all these countries in Russia's west, in Europe, and Eastern Europe have allied with the US because they are in danger of losing their independence from Russia. Except for Belarus, all these countries have become NATO members or have gone under American and European protection. Russia no longer has complete monopoly over Afghanistan, the Soviet Union, and even the Sea of Japan. Now, Russia is ready to go to any lengths to restore its area of influence. To restore this area, if it doesn't do so now, the Great Game will begin. He will be out of it, in fact America is on one side, friends, Chinese power is also in his region.It will oust Russia, rather Russia will have to come under the Chinese power because you know that in the game of power, there is no weapon called Khalaq. So, it is not expected from China that if it becomes powerful, it will support Russia; no, it will support itself. To regain its influence in its region, friends, now Russia cannot declare war against America, so it is using its most powerful and dangerous weapon. That weapon is cyber attacks. Social media propaganda is a very important part of this weapon, a very important part. Russia used this weapon on a large scale for the first time in the US elections in support of Donald Trump. In fact, in the world, the wars fought without gunpowder, without such weapons or bullets, are known today as hybrid wars. In hybrid wars, powerful countries often promote nonsense and foolish people to the maximum extent. This is the era of social media, with which the economy is also connected, so they promote such people in a fake manner. These are the things that create division and turmoil in that country, the enemy country, and create intense hatred towards you, widening the fault lines. When a country is divided and hatred becomes intense, that country cannot collectively gather and take important decisions. One group is always afraid of the other's blackmailing and takes decisions that cause severe economic, diplomatic, and strategic damage to the country, both strategically and defensively. So, friends, Russia, through millions of fake accounts, helped TV celebrity and businessman Donald Trump win in 2016. It also helped politically in making him popular. Russia hacked Henry Clinton's emails and defamed him with fake propaganda to such an extent that Trump's supporters got a major weapon in the form of "Hubbal Watan" (Hubbal Watan). All these things gave Donald Trump's fans propaganda points in the millions. Hashtags were created in the millions. So, friends, this became a way to weaken America. Now let's see what other method Russia is using to do this. The second method is that Russia, staying a little below the threshold of war, carries out alchemical attacks. It carries out these attacks at such places, on such people who are challenging the power of Russia and especially the Russian President Putin. For example, in 2006, a former senior officer of the Russian intelligence agency FSB, Alexander Leont Vinko, was murdered in London in this very hotel which you are seeing on the screen, the Millennium Hotel, located in Mephisto, London. After investigation, it was found that this former Russian agent was not killed by the Russian intelligence but by Polonium 210. Actually, friends, the biggest issue for Russian President Putin with Leont Vinko was that in his opinion he had become a double agent. Leont Vinko, that is, this former Russian agent, was earlier a top officer in the Russian intelligence, but in 1999, he had informed about the big bombings taking place in different areas of Russia. He wrote another book on the bombings. You friends already know about these bombings in our blogs on the Ukraine-Russia war, that they were the actions that resulted in Vladimir Putin becoming the Russian President for the first time.Russia used these bomb blasts as a response to its attack on the Muslim state of Chichi, and then attacked and captured it. This same Russian agent, Alexander Lemenko, wrote a book on this, "Blowing Up Russia: Terror from Vienna." The Inkfish intelligence agency orchestrated this to help Putin win the election. Remember, Putin was the head of the FSB a few months before that. Getting Alexander killed in London was an extraordinary task, friends. In fact, taking such action in a country allied with NATO and America was a challenge to them: Russia will not spare any individual or agent working against it, even if America and its allies had given him shelter. But friends, there was something more important than the murder of Letmenko, and that was that he was killed with Polonium 210. This is a radioactive isotope that was initially used in atom bombs, that is, it was a part and component of a nuclear weapon, a very small particle of which He was killed by putting a much smaller poison in Alexander's cup. However, the problem was that this radioactive substance, this isotope, was present in London at that time. Research revealed that it had been transferred from Russia in such a large poison that it could have killed thousands of people in London. This poison was prepared in a Russian laboratory that was tracked. Then, it was found out that it was a wall battery where atomic weapons were prepared during the Cold War. This poison is one of the few expensive and most difficult poisons in the world that is not easy to detect. It does not show up easily in any test and the doctor keeps thinking of it as a stomach ache or some other stomach disease, and during this time the patient dies. Alexander Late Vinko also consulted a doctor because of stomach ache, but when the pain increased, the doctor was unable to understand what the issue was. Then Alexander revealed the truth. He told that he A former Russian spy, now sheltering in London, suspects he was poisoned. Doctors should investigate this possibility and conduct tests in this manner. After this, Alexander underwent treatment that involved Britain's Atomic Weapons Establishment, and the entire story came to light. Friends, Alexander Littman died in severe pain a few days later. The British Security Department tracked all the routes of Polonium 210. They traced where Russia had brought it from, where it had passed through, and through which homes it had been brought here. When this entire trail emerged, even London and America were stunned because this was a direct chemical attack by Russia on the West. It took London's security agencies 10 years to solve this case. But in 2018, friends, Russian President Vladimir Putin released another former spy, Sergei Skripal, and his daughter from London. I tried to kill him with poison. Although the Russian agents had successfully given him the poison called Novi Chowk poison, which is a very dangerous modern poison, but both of them, i.e.A father and daughter survived weeks of life-and-death suffering thanks to treatment. However, a woman died trying to smell the perfume bottle in which Russian agents had brought the poison to the hotel. She applied a little perfume to her hand, tried to smell it, and died a short time later. This poison is so dangerous. "Navi Chowk" is often used by Russian intelligence agents. It is a very dangerous nerve agent that severely disturbs the target's nerves. It causes a sudden, unusual and unusual tension in the target's body. It is so severe and painful that the patient begins to foam at the mouth, vomits, and collapses in agony. Sergei Skrapal was found lying on a bench in this condition. When he was brought to the hospital for immediate medical treatment and medical assistance, his life was saved. American intelligence agents, friends, also do the same. They have been using nerve agent poisons, which obviously fall under the category of chemical weapons. In terms of modern warfare, this is also a crime against humanity, which the CIA and Russian intelligence are committing. The third major thing Russia does is to show off its power. In this, it has surprised America twice recently. Once in 2014, in fact, both times in 2014. In 2014, when it first secretly invaded Ukraine's Donbas region and then seized a large part of it. Then, that same year, when it captured Crimea, America, Europe, and NATO were surprised. This is why, this time, when Russia began moving towards Kyiv in 2022, America and NATO were ready. They did not allow Russia to capture Kyiv and other regions of Ukraine. Friends, in this blog, we showed you what Russia and China are doing to usurp America's superpower status. During this, you also learned that What is America doing to protect its status? First, it has almost surrounded Russia and China militarily, as you can see on the maps. Then, another very important thing America does is to gather the best minds from around the world. This is a system America has in which it attracts the best minds from around the world by offering them maximum salaries and benefits through scholarships. Because of this, it once again becomes the leader in innovation and leadership, leaving no one able to compete with it. Friends, you will hear and see many stories in these blogs. But now let us tell you why, despite America's power and its might, Russia and China have reached this point where they are challenging it. What mistakes did America make or what did they do better? One reason is very clear: the Chinese are a very hardworking and silent nation; they think far ahead. But another important reason is that after the collapse of Soviet Russia, for the next approximately 30-32 years, America It embroiled itself in wars that consistently diverted its attention from Russia and China, just as fighting Soviet Russia diverted American attention from Pakistan's nuclear program.The program was withdrawn, and Pakistan successfully completed its nuclear program. Although the US never wanted it to be completed, Pakistan did. You all know that on August 30, 2021, the last American soldier, Major General Chris Don, left Afghanistan. We have already shown you the shocking, true, and extremely interesting story of this 20-year American war in our blogs. But friends, do you know why America withdrew from Afghanistan after 20 years? Whatever reason you give for this, include America's realization that if it continues to entangle itself in tensions like the War on Terror in Afghanistan and Iraq, then China and Russia will destroy its global agenda and its superpower status. How, friends, through hybrid war? All the tactics of China, America, and Russia that we have presented before you are called hybrid warfare. This is a war that The enemy plays a war of force, that is, a war of ammunition, by staying just slightly behind the extreme point. In this video, the enemy is never allowed to reach a point where he starts a direct war with you. In this video, friends, we have presented to you an introduction to the Great Game that is currently being played in the world. You can easily understand the changes taking place in various worlds within this Great Game. But in future blogs, we will present to you all those interesting stories, even more interesting than stories, in which you will see how Russia, China, and America are playing this Great Game. Just as you saw the story of the Cold War in the series of blogs, now you are beginning to see the story of the Western Cold War, and indeed the Great Game of the world. Videos in this series will continue to appear from time to time. In these, we will show you the places where this battle is being fought in 3D maps and the weapons with which this Great Game is being played. And we'll show you the living characters who are fighting this battle. They're not fighting for power, but for real. Although they're not fighting, they are fighting. Do watch. So friends, how are you? We were talking about how Russia and China are trying to wrest superpower status from America, and how America is scrambling to protect its world order from these forces. This is the Great Game of today's world, and this is the story we're telling you. Friends, there's a Chinese tale from 1,500 years ago about a general named Jin Zang, a highly skilled fighter. He fought not only with a sword but also with a small weapon called a jian, a 15- to 20-inch stick, and would break the opponent's skull mid-combat. He inherited this special fighting skill from his family, and it was called jian because of the name of this small weapon. This weapon was even more dangerous because expert fighters could easily conceal it under their arms, in long sleeves, or anywhere else in their shirts, since it didn't have a blade. It did not have sharp edges, so it could easily be hidden under clothes. It did not weigh much either, but obviously when it was used in aWhen experts used the jung as a weapon, it proved to be more dangerous than a sword. Now, friends, Chinese General Jung, over time, introduced some more clever innovations to this art, taking it to a new level. After this clever innovation, this art, which was called jung, now became shosho jung with the inclusion of this clever innovation. General Jing's mastery in this art was such that with just a simple stick, he could break or drop any weapon in the opponent's hand. Even if his enemy came wearing an iron robe, he would knock him down with this Isha Shojin technique and that small stick, leaving him incapable of fighting. This art was amazing but always secret. General Jung did not transfer it to his next generation or his family, but he believed that if I teach this art, then maybe tomorrow I may have to fight against my own people. Then there should be some such art, some such skill that only I know so that I can defend myself. So friends, since that time, in China, the use of any weapon of war or any method of warfare that is secret, which does not look like a weapon, looks like an ordinary everyday object, but in reality it is a very dangerous weapon or technology, is called Sha Shojin. Nowadays, it is also being used as a Chinese defense doctrine, that is, a method of warfare in which you are fighting the enemy, but he does not understand that you are fighting him, you are finding him unarmed, he does not even realize that he is being attacked with a dangerous weapon, he considers it a routine thing and by the time he understands the whole game, the enemy has already achieved his objective. So friends, under the Sha Sho Jian doctrine, China has specifically targeted America and the American defense system because China does not want to or cannot openly compete in the war of weapons and technology in a double war. So, it has deployed the Sha Shojin technique. Now, how does it use it? So, Max Fellows, in 1999, two Chinese colonels presented a doctrine that Doctrine was introduced for the Chinese army i.e. People's Liberation Army (PNA). Its Chinese name is something else but in English it has been translated as Unrestricted Warfare. This doctrine is China's modern Sha Shojin weapon and technology. It has been discussed in it that how military success can be achieved in today's global world. Now obviously friends, this book, this doctrine is about future wars and modern wars, but in reality this book tells how China's PLA has to face the super power America which is much more powerful than us and more expert in technology, and if at any time a war has to be fought with America, then how is it not a victory? The gist of this doctrine is that the best way to win a war against America is to start a war right now and on those fronts where the American army is defending. Which fronts are there where the American army is defending? They believe that the biggest weakness of the American military is that it cannot control the battlefield. The US military is not seeing the whole picture and considers its success only to be more and more expert in technology and to make innovations.They think that if they have made drones, made fighting robots, made fighter jets with fifth generation stealth technology, have started deceiving raiders, etc., then now they have gained utter superiority over the militaries of the rest of the world. Now they think that they have become capable of winning the wars of the future. According to Chinese doctrine, this thinking is America's biggest weakness because Americans are sitting in those war zones where there is a battle before the war. Now these are from the war zones. According to Modern Sha Shojin Unrestricted War Zone, these war zones include Lawfare Economic War Zone and Cyber or Networking War Zone. Friends, we will talk about all these in these videos of the Great Game, but first of all let me tell you that surprisingly, Cyber War Zone is the field where China is continuously defeating America. Now how is that, friends? This is from April 17, 2021. April 17, 2021 You must have seen the famous picture of when 640 Afghans came and sat in the belly of the American plane flying from Kabul. You have already seen our entire series Taliban vs America on why and how these Afghans came here and especially in this installment we showed you a lot about it, but here I want to tell you that this plane is Boeing Company's C-17. It is America's top of the line cargo military plane. You can get an idea of its usefulness from the fact that it has the capability to easily carry hundreds of people along with their luggage and move across seven seas. Then this plane is so useful for the American army that it can transport an entire battalion or several companies with it, including tanks, vehicles, jeeps, weapons and Hamas, anywhere. This is America's most expensive military plane, it is a cargo plane. America has never spent more than this on any other plane till date. In the preparation of this huge Boeing C-17, America spent Rs 31 billion to make this technology successful. Billions of dollars were spent, this is such an important preparation, friends, that when the American President goes on a foreign tour, his bullet proof, bomb proof lamez cars, security attack bullet proof and bomb proof cars, etc., all of them are carried on this Boeing C-17, so this is not an ordinary plane, many countries including Russia and China wanted to make a super cargo plane like this, but they were not able to make such simple and powerful technology, such a powerful technology, America kept this technology hidden in the same way as the Chinese emperor used to keep the formula for making silk, but friends, just like the Europeans snatched the silk thread from the Chinese, then C-17 is a radish from which garden, instead of spending 31 billion dollars on this secret, the Chinese acquired this secret by spending only one million dollars on hackers, how did they do that, friends, Stephen Su was a Chinese businessman whose real name was Sobin, with the help of the Chinese military, targeted two very important companies working with the American defense agency Pentagon, Lockheed Martin and Boeing Company. Martin friends, the world's third largest is Aerosmith, which is the world's second largest aircraft manufacturing company. The first largest company is Aerobus, by the way, so friends, this is Boeing.This is the same company whose story of a ready-made Boeing C17 you learned at the beginning of this video, that huge plane with more than 600 wings sitting in its belly, while the big planes like Boeing 747 and 77 etc. which you might have seen parked at airports, also belong to this company. Friends, these two companies of Boeing are so important for American defense that America provides them millions of dollars for research. These two institutions play a fundamental role in the future research of American defense and the Pentagon. That is why their security is also very important for American security because the American army has the superiority over all the militaries of the world, it is because of these companies. They innovate, so the American army has such weapons that no other country has, so you should understand how important and sensitive institutions Lockheed Martin and Boeing are for America. So friends, Chinese national Stephen Su had bought a nice house worth 2 million dollars in Canada, where he lived and his children. Born in Switzerland, he founded a mid-sized company, Lotech, in Canada. During the five years from 2009 to 2014, this business established strong business relationships with many Americans and Canadians, especially those working in American or Canadian defense organizations. He also treated those who knew people working in organizations developing new technologies to meals at expensive hotels. By moving from one source to another, and from one to a third, he reached those who could obtain the information China desperately needed. People who met this Chinese national, Sobin, described him as a very interesting man, a fun-loving person, arranging dates in expensive hotels in Seattle and Los Angeles, telling jokes, and always laughing. But he was a complete package, a company that catered to people suffering from loneliness and a busy life. It was no less than a blessing. Chinese businessman Sobin used to specifically target those people among his acquaintances who were working for or with companies like Lockheed Martin, Boeing or any such companies. Then after some frankness with these people, he would start giving them business offers. From here his work started. He would tell those people that I am not asking you to bring me America's F35 jet fighter and park it in my garage, but if you bring me any one of this ready-made systems, then I can sell it in the market at a very good price and then we will also share this profit among ourselves. Now the system which he used to talk about acquiring was not a very sensitive system to the market, hence, in the greed of profit, some people used to do the deal considering it a bad thing or a bad thing. Now this is one method of Shobin, the other method, this Stephen Sho used to use that due to his connections, he used to know the position and work of those people who were working for the American army. He used to prepare the technology and send their names and phone numbers to China in a password protected email. His two associates in China, who were also associated with the Chinese military,He used to keep a record of this information. Sobin used to do this work with such simplicity that in most of the cases the password of the file attached in an email was the same as the subject of the email. For example, once he kept the subject of the email as 'My Phone Number', which meant that the password of the files attached in this email was his phone number. Similarly, he used to do another work very quickly. The work was that he used to send the locations of those important computers and sources, personal information of the people working there, their designations, names of their vendors, their emails, their salaries, their HR records, everything to his Chinese military hacker friends. Now this information was a treasure because this information helped in hacking. How did he do this? By now, such Chinese hackers had the emails and records of all the people working in the most important places. They used to send emails or messages on behalf of some close colleague about their office timings and friendship. In this email, they used to ask for a specific file or a product picture or a drawing of a system. It used to happen like routinely, colleagues or people working in a company would ask each other for something. Along with this, these emails would also contain a document or link. Then, as soon as a colleague clicked on a document or link in an email from a colleague or downloaded a file, without their knowledge, their computer would have fallen into the hands of Chinese hackers and would have been silently hacked. An intrusion had occurred. Then, the Chinese hackers would check the files, make copies, and through them, they would also enter the entire computer network of that company. From here, they would get thousands of files and their information, which they would give to Sobin and ask him to look at them and tell them which data is useful to us and which is useless. Friends, Sobin was one of those few people, perhaps one of those few people in the world, who understood all the fields of backbone networking, hacking technology, and business very well. He, along with Chinese He not only knew English, but he also knew all the technical terms of these high-tech companies, both those used by Americans and those used by Chinese. He knew both these technical names and the terms used routinely. That's why he could quickly filter the names of thousands of files and tell his fellow hackers which files and computer information would be useful to them. The hackers then worked extensively on those files and computers, digging them up. Once these files were hacked and transferred to him, Sobin would work day and night to translate those important files into Chinese. Sobin was well-versed in both Chinese and American terms, including those related to aviation and business. Sobin was an easy task for him, but it required hard work. After translating and translating these files, he would send them to Hong Kong or Macau, which are self-governing semi-autonomous regions under China, i.e., China. There is a share but Mukhtar himself has a big role in it. His Chinese hacker friends were keeping records of all this information in an operation room in Hong Kong or Macau.One reason for collecting and preserving this data was that if international pressure, global law enforcement, or any other pressure were to come into play, the Chinese could claim that this hacking had nothing to do with mainland China. These are essentially independent areas, and their actions have no connection to the CCP or the Chinese Communist Party. Friends, from the machine rooms in Hong Kong and Macau, they would print all that data back onto hard disks, make copies, or copy them onto separate hard disks, and create new copies. Then, instead of using a network or the internet or a cargo company's network, they would pack it all into boxes and transport it to mainland China under the supervision of Chinese military officers. There, all this information was exploited and secrets were shared with companies that were supposed to develop technologies comparable to American technology. Friends, for four years, from 2009 to 2013, Chinese hackers used this same tactic to hack America's most important companies, such as Boeing and Lockheed Martin. Military assets were seen as if an insider, an expert was looking at them. In 3 years, the information that Chinese hackers copied only regarding the Bo C17 was 65GB of files. Now you can guess yourself how much text and design files, which are very lightweight and of a few kilobytes, would be there in 65GB. By the way, for your information, friends, those files were more than 630,000. The files of Lake Martin, the company that manufactures F16 and F35, which Chinese hackers copied were also in tens of thousands. You can say that for years, China easily fooled these companies of the world working for the Pentagon. It kept fooling them. Those companies, which even the world's superpowers trusted, kept getting fooled. Friends, the climax of this story was November 2014. This was the year when an air show was held in China. In this, aircraft of aviation companies from all over the world participated in a parking lot where The American Boeing C17 was standing, no one in the world had any cargo ship like it, but after some time, a Chinese military cargo plane exactly like it came and parked right next to it. This was a four-engine Y20 cargo plane of the Chinese company. A direct copy of the Boeing C17, this cargo plane is being considered as China's biggest success at this time because before this, only America was the country which had the capability to transport maximum troops along with weapons from one place to another in minimum time, but now China can also do this. The Chinese have made its design a little wider from inside so that 90 of China's biggest tanks, which are big tanks, can come in it. Friends, after Boeing, Sobin's team had hacked the most data of Lockheed Martin. Their latest fighter jet F35 is exactly like China's J31 fighter jet and more are ready. Mahreen says that there is only one engine difference between the two, that is, the Chinese one is double engine and the American one is single engine, but the thing is The real speciality of this preparation is stealth technology, not the engine, that is, its ability to deceive radar is its real speciality. The technology which America had developed by spending 11 billion dollars, China acquired its most important part for a few lakh dollars.So, this is the Shah Shojin technique because now both America and China are standing equal on the field. In this sense, just like Sobin's team hacked the data of Boeing and Lockheed Martin, in the same way, they also stole the data of many other American companies. They also investigated 32 projects of the American military. They found out the passwords of the teams of the companies manufacturing war equipment. They got the list of their vendors. They investigated their jobs. They got the designs of their JDs. They even hacked the data of Russian and Indian missile systems sitting there and also hacked the secret government information from Taiwan to Tibet. This same team of Sobin did all this for their country China and also made money on it from the open market because they were not only taking money from the Chinese military, but apart from sharing this data with the CCP, the Chinese Communist Party, they also used to sell it in the black market on the dark web in other places. Just like there is a black market, friends, similarly there is a black market of the internet also which is called darknet. The web says that all this is visible and happens there, but friends, these hackers could not escape from the Chinese hacker FBI for long. In the old times, in 2001, 21 years ago, the American security department used to intercept 20 million phone calls and emails daily, meaning all this used to pass through their scanner, where they found any word or any part of the conversation interesting, then they used to appoint a team, a small team used to inquire on it and work on it, but today friends, 5 billion 5 billion Google searches are done daily, more than 300 billion 300 billion emails are exchanged daily, this is such a huge number that in one second, 3.There are 5 million 3.5 million emails in a second. It's practically impossible for any intelligence agency to constantly scan so many emails and then deploy teams to track those emails. That's why agencies have now begun hiring young people, freelancers, and even hackers to help them. They're paid from intelligence funds based solely on information that's beneficial to them. That means hackers and young teams can continue their work. When someone provides information that's beneficial to the agency, they're paid for it. This is the method. Friends, one such help came from a hacker or freelancer at the FB Los Angeles office in 2014. Someone had tipped the FBI about an email written in Chinese. There wasn't anything unusual about this email; everything was normal. But the only thing that made it normal now was that everything was coded in passwords, making it look normal. But in reality, the intelligence message was just a mistake due to which the hackers were caught. That mistake was that the name of an attachment file was not changed. The name of this file was C17 Project Recon Sense Summary. From here the FBI got suspicious and started monitoring this system. They started getting evidence one by one and from a picture which was posted in the mail itself, they got information about Sobin being present in Canada and also that two people are present in China and they are related to the Chinese security department. Such a picture was also transferred in the mail. From where they got to know about this, the FBI contacted Canada, that is, the American FBI contacted Canada and came to know that Sobin was going to go to China any moment now, he was going to leave Canada. The FBI wanted to catch him immediately because if he got out of their hands now, it would be impossible to bring him back from China. Then it was also important that if any Chinese hacker was caught, then the next year the Chinese President was coming to America. In front of him, American President Barack Obama would present this matter with evidence. So the FBI tried their best to get Canada to help arrest Sobin. Canada was unwilling to stop, arrest, and hand him over to the US without evidence. However, the problem was that Canada was also facing a serious problem at that time. Their security system was also under constant attack from Chinese and Russian hackers. So, for help in this problem, they decided to contact the US and arrested Sobin. But before Canada could hand him over to the Americans and the Americans could prosecute him for stealing secrets, a major twist in the story occurred when China arrested several Canadians present in its country. The number of Canadians arrested in a few months was around 200. Among them was the Canadian couple Shahria Kevan and Jolia Garas, who were living in China for a long time. After their arrest, the Chinese administration sent a message to the Canadian government that your citizens are in our custody and you have the right to hire a lawyer for them. This was a silent threat from China to Canada that if If they want to hand over their citizens to America, then they should think twice or thrice that their citizens are also on our path. Now Canada was trapped between two world powers, on one side its powerfulWhile the Chinese neighbor wanted to legally remove Sobin, Canada, on the other hand, wanted to secure leniency from the Chinese government for its citizen. Instead of handing Sobin over to the US, Canada complicated the matter with a long legal complexity. Meanwhile, a Canadian couple arrested in China faced almost the same espionage charges as the Americans had leveled against Sobin. The Canadian couple had been living in China since 1984. Their business was teaching English and selling coffee. China accused them of sending Chinese military photographs, specifically the men, to them on the instructions of a non-Canadian spy agency. Other allegations were also along similar lines. China continued to pressure Canada not to hand Sobin over to the US. However, there's a twist here once again. The twist was that despite a two-year legal battle, when the US couldn't take Sobin from Canada, one day Sobin decided to go to the US to fight his case. The lawyer said that the time it would take for America to take me is far less than the punishment that the American courts can give for this crime, so I will appear in the American court myself and take my case. The reason behind this was that his lawyers had told him that if he surrenders himself before the court, his sentence could be reduced. Another thing was that the Chinese, Canadian and American officials had matters in common, so the American security officials took Sobin to America in a vehicle in such a way that two strong American military personnel were sitting on both sides of his head and in the middle, Sobin was sitting entangled in the seat. On the way, a security official asked Sobin, which is your favorite aircraft? Which is your favorite aircraft? Sobin said in a frustrated tone, any other than Boeing C-17. So friends, the story is brief, Sobin was sentenced to 46 months by the American court, which was then completed legally. It happened and was completed in October 2017. Sobin returned to China. Similarly, the Canadian Choda Garrus family returned to Canada a year before that, in about September 2016, after paying a fine of Rs 20,000 and serving a sentence of about 2 years. During the trial, Sobin had submitted a statement in 35 pages by 35 pages, in which all the details were recorded, which we have heard for you. He had told how he had been hacking the intellectual property of American organizations including Boeing and Lockheed Martin. America repeatedly called it theft and robbery for what he did, whereas America itself had been doing the same with China for years and is certainly doing it even today. According to the secret American documents leaked by Edward Snod, the American Secret Service used to listen to the conversations of Chinese leaders directly. That too by entering the system of China's largest mobile company Huawei. What America used to do was that it would do such things in Huawei phones. He used to fix the program secretly so that all the audio and video coming near this phone kept reaching him freely. Do you know what kind of cover is there on the phone camera and the microphone of the phone, it could have been closed and it could have been turned off, if it had been there then no one else but the American intelligence agencies used to do all this and it is believed that even today they try their best to do it.They might be doing it, or perhaps they are, because America is far ahead in technology. Friends, after Sobin's arrest and Tarai Junam, in 2015, the Chinese president visited the US and in his one-on-one meeting with Barack Obama, cyber warfare was the most important agenda. So important that it made headlines in the newspapers. According to reports, both governments decided to work together to combat cybercrime. Because neither China nor the US admitted that they were helping hackers for their own benefit, they decided that if a Chinese or American hacker was operating in their country, they would cooperate with each other to catch him. This was agreed upon, but you know that in the war of power, there is no weapon called Khalaq. Even today, neither Chinese nor American hackers have backed down from their work; rather, they have learned new methods. According to the US FBI, hundreds, if not thousands, of Chinese hackers are working continuously, and most of them are private individuals who hack based on the needs of their country. And then they pass the information to representatives of the Chinese government. They earn money from this and they also consider it a service to their country. In fact, friends, let me tell you that now in 2022, the Chinese have even changed this method, by pointing a station of their team in America, Canada, or Britain. Now they hack any computer without pointing it to any person. They have acquired the capability through which they can enter entire systems and hack. According to the FBI, they know only 10 percent or less about which of our systems have been intruded by Chinese hackers, like the one done by Sobin. Because there are so many hackers and they are so fast that it is very difficult to catch them. Friends, the problem for America is that it wants to protect itself from these hackings but is unable to do so. As soon as the American authorities find out where Chinese hackers are hacking in any organization, they reach out to stop this hacking. At that very moment, Chinese hackers also realize that their method has been caught, so they immediately withdraw from there and clear all their tracks, leaving no trail behind. Next time, they come back with more updates, with new networks and new methods, under new names. Because China does not consider it a crime, nor do its citizens working for it. They take it as a war policy and implement it with full enthusiasm because they feel that even though we are not able to face America right now, we can. So, if we have to fight, and the time for war comes, then we should be capable of giving an equal fight. We will do whatever we have to do for this equal fight. So friends, these are the examples of cyber warfare through which you can see China's role in this great game. Now come to China's other two techniques: cyber warfare and economic warfare. Friends, this phase has become very long, so we will discuss these things in the next phase. Yes, so friends, how are you? We are talking about the great game going on in the world. In the previous blog, we learned about the Shoshou Jian Doctrine of China and how China followed this doctrine.Using this technology, China is secretly defeating America from within, or at least trying to. Now, in this blog, we'll present not only theories but actual events that will help you understand how China has begun to encircle the American economy, and America is nearly helpless in the face of it. Then we'll also look at Russia's cyber wars. General Robert Spaulding is a former member of the American military. He has also served as the military attaché in China and has worked for a long time in American think tanks. The American military attaché, or military attaché, is a position held by almost every major military official. A retired or active-service soldier is appointed to represent another country. This is a very important position. Now, consider how important it would be for an American to be an attaché in an enemy country. It's Robert Spaulding we're talking about. He recently wrote a book that has deeply troubled the American intelligence community. In "Stealth War," he makes an important point about China's intelligence war against the United States. He writes that in 2016 and 2017, he tried very hard to conduct research in the United States. The subject and topic of the research was to determine the influence of the Chinese Communist Party, the Chinese government, on the American economy. Friends, since political parties are not allowed in China, you cannot form political parties there. Only one party, the Chinese Communist Party, rules there. Therefore, whenever the word "CCP" is mentioned, you should understand that it is the Chinese Huk Ran Party, the ruling party. So, friends, the basic research questions that Robert Spaulding had for his research were: how Chinese diplomats, investors, and businessmen manipulate American business leaders; how they trap or attempt to trap American companies; how many and which major multi-billion dollar companies' boards do CCP members have or have established relationships with? What kind of American businesses are the Chinese most interested in? And most importantly, is Chinese investment the kind that buys goods manufactured in China, leading to the loss of American jobs? All this was important in his view to understand the extent to which Chinese businessmen have dominated the American economy and how much they are capable of controlling it. This question was very important to him. General Spaulding says that he approached a top American think tank with this question. It was one of the five largest and most reputable think tanks in America. It was a research institute in international security at Idarpalli Trends. It was a very big name, which Spaulding did not disclose, but he says that everything was in order. The think tank was fully prepared to conduct this research. General Spaulding had also personally arranged funds for the research, that is, he had convinced some donors to provide money for the investigation. Provide the think tank with a list of these donors and their consent.Their agreements were also handed over to think tanks. The think tank itself was so enthusiastic that it was calling this research the most important project in America. That think tank had its own idea that perhaps this research could shake the entire American business sector. So everything was set. But what happened was that a few days before the start of the research, you can understand, a few hours before, less than 48 hours before, the president of the think tank called a meeting of the research donors and without giving any reason, told them that this investigation cannot be done, in fact, it is not needed at all. Moreover, according to General Spertzing, he did not give any explanation. General Sahib says that he was very upset as to why this research project was postponed. He investigated this personally and says that he found out that the independent donors of that think tank are those people whose financial benefits are somehow connected to China. Meaning that if the research had been done, then in fact it would have been It was against them. John Birding says that after this, he remained in the White House as well. There, too, he tried to conduct research through many organizations, NGOs, and think tanks that could investigate China's business affairs, but nothing was possible there either. He says that representatives of such organizations used to tell him that you are right, but we cannot help you on this issue. While some people in those organizations clearly told him that we actually do not want to anger our Chinese funders and business links. If we do this research, they will get angry. So, friends, from the words of this American general, you can understand how China is playing aggressively on the economic front in the Great Game against the Musashi Empire. Fighting the economic war on the part of the Chinese Shasho Jihan is a matter for later. Friends, right now America is not even capable of understanding this. But friends, this is not only an economic front but also a political front. China is targeting the powerful politicians in America. He keeps it with him in different ways. If you look at today's US President Joe Biden, his son was part of such a business venture of Bank of China in which 3.Cobalt worth $8 billion (38 billion dollars) was to be purchased. Cobalt is a metal, an element that is widely used in the batteries of electric vehicles. In this deal, Joe Biden's son Hunter Biden's team held shares at a 30:30 ratio. The rest was with China. When this was happening, Joe Biden was the Vice President under Barack Obama. He was very powerful and powerful. There was severe objection to him, asking how he could enter into such a large partnership with America's number one enemy. This is a conflict of interest. However, in response, Joe Biden's son Hunter Biden and his associates said, "Where did the conflict of interest come from? This is the cobalt mining business. The mines are in the African country of Congo. The American company Yo Harvest has shares. If it benefits, then understand that America will benefit. Where did the conflict of interest come from in this whole business?" So friends, they continued doing business happily. Now you will see that this was the successful strategy of China. He quietly makes top-level investments in America, cooperating with powerful people there, and secretly manipulating their economy. You must remember that no company in China is completely private. The CCP (Chinese Communist Party) owns every major business, and its agenda is to wage war through economic warfare, lawlessness, and network warfare, defeating the American world order in this way. Now let's see what happens. What happens is that a seemingly simple business deal destroys jobs within America. Although money is flowing into America as a result of this deal, it flows into only a few hands, as a large portion of the manufacturing capacity has already been moved out of China. Some shares do reach America, but they benefit only a few. Thousands of people lose their jobs, whose jobs have now migrated from America to China, over the 16 years from 2001 to 2017. America lost 3.4 million jobs in 16 years.4 million jobs vanished. And where did this end? Friends, manufacturing was lost from Shobhe. Similarly, there are huge investment firms on Wall Street that are run by billions of dollars of investment from the Chinese Communist Party, or billions of dollars of investment in them. In fact, many CEOs receive millions of dollars in annual salaries, many of which are possible only because China is investing there. Friends, China is doing all this under a military strategy. It is playing Sha Shojin, whose story you have seen in the previous blog. They are continuing the war with an art in which the enemy is weakened to such an extent that he is incapable of fighting. He is not killed, he is simply disarmed and rendered weaponless. According to them, war is not just about forcing the enemy to accept your point of view by using weapons, but by any means - by force, without force, without military force, through fight, or through love. This is a new principle. Actually, it's not that new; it's an old method; it's just new. Chinese General Sanju had explained all these principles a year ago. So, friends, these were China's points in the Great Game. Just as China has kept America on its toes with Shasho Jian technology, Russia has also put Europe, America's most important trade and defense partner, NATO, in a difficult situation. Friends, in cyber warfare, Russia launches many more cyber attacks than China and achieves its goals through it. For example, consider the 2007 attacks on Estonia, an attack in which Russia proved for the first time that it could keep any US-allied country or a country allied with America tied down without using its military. Estonia is the most tech-friendly country in Europe. Just as children are formally taught to wash their hands and maintain cleanliness in schools around the world, similarly, cyber hygiene training is also provided to children in Estonia. It is through this that they are taught how to protect their mobiles and computers from cyber attacks and hackers. Friends, this small country gained independence from its great country and very big neighbor Russia some time ago in 1991. Along with this, other countries of the Baltic States like Latvia and Lithuania also gained independence at around the same time, but there were two problems with their independence. One is that in all these countries and especially in Estonia, ethnic Russians are ethnically Russian in large numbers. Some were already present and some had migrated and settled here during the Soviet era. If you look at today's Estonian demography, 24/24 of the population is ethnic Russians. This means that out of the total population of Estonia, around 320,000 are Russians. And the icing on the cake is that these Russians live in the urban areas of Estonia. The Marku are concentrated in urban areas, meaning they are a political force. They have great importance in Estonia's demography. No decision can be taken there without their involvement. Now that this country has gained independence from Russia, the issues here are almost the same as those in the larger ones.At the same level as in Pakistan and India, the 24-year-old Russians living in Estonia constantly feel that they are part of a powerful past, but now they are ruled by an entity that we once ruled. And if you see, this isn't even that long ago, it was only 30-31 years ago. These Russians are always very conscious of their rights. They are very sensitive about their rights. On the other hand, the Estonian majority, who are natives there, also have this issue of having to be careful in every matter that they don't anger the minority Russians. Because their anger creates a huge issue that Russia starts to interfere in because Crimea wants to see Russia's central power with the world, but Russia wants to bring it back into its camp or at least prevent it from going towards NATO and the US. But you know that Estonia It has become a member of NATO and is allied with the US. In this situation, the leverage that Russia has over Estonia is the ethnic Russians who are ethnic Russians and are settled there in 24% numbers. Just like Russia came under the pretext of helping Russia in Crimea and Ukraine and occupied these areas, so a similar thinking is found in the Russian establishment regarding Estonia, Latvia and Latvia, that is, regarding all these Baltic states. But despite these two things, friends, all the Russians and locals of Estonia are very boring people themselves. And not only in Estonia, friends, but throughout Europe, Estonians are famous for being very lazy and very boring, so boring that their jokes are commonly heard in the Northern areas of Europe. For example, there is a joke about them that an Estonian was renovating his house. A European stranger passing by asked, "Hey Estonia, congratulations on your home." If you're renovating, tell me how many rooms you'll be building. Ania replied, "One room, how many?" The person who asked, "Saya," then asked, "Brother, why just one room?" Antonia replied, "Well, can you build less than one?" So, these simple and lazy people have a reputation for being non-social, non-emotional, non-emotional, simple, boring, and focused on their work. Tech-friendly. But what happened on the night of April 26, 2007, when suddenly, riots broke out in Estonia's capital, Tallinn. Thousands of young people took to the streets and started vandalizing. Enraged, they set shops on fire. Some were looting goods, some were breaking shop wUntil they understand, prepare a new lie, a new narrative. By that time, the lie will have spread so widely that the truth will be lost within it. By the time it takes for it to come out, the propagandist will have achieved his or her objective. This is an old doctrine, friends, you know it. But let me tell you a lesson from history: even the most powerful propaganda cannot last more than a generation. So, friends, under this destructive doctrine, Russia was spreading such horrific news on Estonia's social media that it ignited a fire in the hearts of Russian youth. They felt that their heroes, those who saved Estonia at the risk of their lives, were being disrespected, dishonored, their graves destroyed, and they were being humiliated. To this end, the Estonian government had hatched a conspiracy. Groups were formed on social media, mujahi paras were planned, petrol bombs and other materials were arranged, and in a coordinated manner, on the night of April 26th, thousands of people were killed. Estonian Russians, who were Russians, succeeded in turning Tolen into a battlefield, and the commotion continued for three days. But friends, this wasn't just a spontaneous reaction from the local native Russians; it was actually a full-fledged hybrid war by Russia, an attack whose second cause had become Estonia's network system, its online system. Indeed, when fake news set the streets of Tolen ablaze, Estonia's entire online system also came under the grip of Russian hackers. For example, news websites, where the comment sections typically received 50 to 100 text messages every 10 minutes, were now seeing 101 comments every 10 minutes. The same was true of government websites; they were down, and even bank transactions became impossible because of the sudden influx of online customers, so much so that the data servers couldn't handle the high traffic. The amount of traffic hadn't even been created. Suddenly, Estonia's network system was jammed. In 2007, friends, all this was very new. If it had been any other country, they might have been vulnerable to blackmail within a short time. But Estonia, a technology nation, quickly understood the situation. They understood that the internet and online system wasn't damaged by bad weather, but rather by the actions of a few people. One proof of this was that the thousands of comments that were appearing in the comment section every minute were of 30 to 35 types. These same comments were being repeated repeatedly, copy-pasted, and only a few were new. Generating multiple comments simultaneously from the same account and the same IP address was not common. It was clear that it wasn't humans, but computer boards and programs that were automatically increasing website views and slowing down sites with indiscriminate comments, shutting them down. The purpose behind this was to prevent credible websites from reaching people with news that could be harmful to cyber attackers. The propaganda of reached the same false propaganda that the Russians were trying to spread in the world. Friends, Estonia is the first country to introduce electronic voting. Online shopping with EstonianThere was hardly any option other than this. They used to do everything online. So Estonia faced the biggest cyber attack in history, which was then called DDoS (Distributor Denial of Service Attack). In this, Russian hackers hacked thousands of computers from all over the world and diverted them all towards Estonia at the same time, towards their vital websites. Now you can understand it like this: there is a very big sweet shop. It is very open and spacious. Its arrangements have been made in such a way that even if 100 people come in at a time, they will be easily served, everyone will get sweets, money transactions will also be done easily, there will be no pushing and shoving. But if suddenly 50 people come in this shop with a capacity of 100 people, and all those who enter the shop do not come out again, and those standing outside are all trying to enter through the door at the same time, then what will happen? The shop will not run, this company will not run, neither will the real customers get sweets nor will the shopkeeper be able to serve anyone. That's all friends. DDoS attacks involve Distributor Denial of Service (DDS). This was the first full-fledged hybrid attack in modern history, in which key roads and online systems were simultaneously jammed in a coordinated effort. Estonia was formally attacked, but the attackers were neither in uniform nor riding tanks, nor could the Estonian forces stationed at the borders do anything to stop them. However, every Estonian felt cut off from the world, trapped in a state of limbo. This was a new kind of siege, in which the most modern country in the modern world was surrounded by internet connectivity. Estonia's defense and interior ministers were trying to break it, but they were at a loss for what to do. However, they all understood that this attack was carried out by their largest and most powerful neighbor, Russia. Evidence of this was found in the cyber footprints and the hackers' markings, and their codes, which had become the hallmark of Russian hackers. What they had to do was to do it immediately, to find an immediate solution, so that by keeping them busy like this, their cyber eyes and ears, which are their internet eyes and ears, are not closed and they are not subjected to any new attack or any new calamity because friends, a major purpose of a cyber attack is to jam the online traffic of a country and in the meantime, some action is taken which is not possible with active online security. So, Estonia's Minister of Defence Security has now started to repel this low tech, high impact, high execution attack one by one. They started pushing it back in such a way that Estonia first contacted NATO and saved themselves from this DDoS attack on themselves. This was important because Estonia is a part of the NATO Alliance. What is NATO and why does it exist? In short, it is the United Force of Europe, which was established with the support of America. It is called NATO or North Atlantic Treaty Organization. Nowadays, its most important purpose is to keep the European Union away from Russian influence. We have to protect ourselves from attacks, friends, you can see the further details in this video of ours, its link is present above.Estonia warned that a cyber attack had already occurred. At any moment, another Russian attack or a similar DDoS attack could happen on any other NATO-backed country, so everyone should be prepared. After this, they cut themselves off from the rest of the world to prevent DDoS attacks on their systems. They shut down their internet and cut off all communication with the world. It's possible that Russian hackers also wanted the same thing, so they could take other action in the darkness. But it was necessary, so they did. The second thing they did became an example of simplicity and wisdom. Today, every major company in the world uses this method to protect itself from hackers' DDoS attacks. You must have noticed that when you visit a site, you are often asked, "Are you human?" as soon as you open that site. This isn't asked because your answer satisfies the computer or laptop. It's asked because if a human is operating the computer, laptop, or phone at that time, they would touch it, move the mouse, or respond with the keyboard. Whereas if a bot were operating the computer, laptop, or phone, they would touch it, move the mouse, or respond with the keyboard. If it's a program or a virus, it will respond from within the system through coding or some other means. The system or the website understands this action. Even if it's a bot, even if it calls itself human and checks a box, it won't be able to enter that network or system. No human can do this. The computer will know that it's not a human but a jinn, meaning it's a phishing operation. So it won't allow this entry. So, Estonia did this: on every website where there was a comment section, they set a limit for each IP address and a specific time limit, so that every user from each IP address can't comment more than that in that time, that is, let's say someone can make only one comment in 5 minutes. Since the cyber attackers were Russians, they didn't know the local Estonian language, so they also conducted a test on some important sites. They put a few symbols on the screen, such as a book, a tree, a ship, a car, etc., and then wrote in the Estonian language below that, click on something from these, for example, click on the car. Now, Which Estonian language did the hackers know? Back in 2007, hackers or bots weren't even capable of instantly translating all the world's languages, so they were unsuccessful. Therefore, they couldn't open the site in this way. Using these two simple methods, Estonia repelled the entire cyberattack, the DDoS attack. Now, in the second stage, Estonia's ministers, Kharja and Moss Pete, started informing the world. They openly accused the Russian establishment of carrying out cyberattacks on Estonian websites because the internet addresses from which they were being launched were linked to Russian government agencies and the PUT system. But friends, when Estonia was facing this DDoS attack and those militants, at the same time, the Estonian embassy in Russia had become deeply involved. Russia had taken it seriously, and they were accusing the Russian soldiers' statue, which is a memorial there, of being destroyed. It also involved Estonia's involvement. Ethnic Russians were hyperactively engaged with the Russian parliament.For days, they were severing ties with Estonia, imposing restrictions on it, and even campaigns to boycott their products were underway. Then, Russia was constantly spreading fake news propaganda against the Russians present in Estonia, the reason for which you already know at the beginning of this video. Well, friends, Estonia immediately repelled the DDoS attack in two or three ways. But after this, Estonia did another important thing to prevent such attacks in the future and to survive this possible attack. It was that they started storing all their government data and important data, even newspapers and news sites, on separate secure servers as backup. These servers were servers Estonia had established in those renowned online embassies outside its country. So, now, even if an attack were to happen on their government websites, their records, their news sites, or their servers, even if it succeeded, it would still not succeed because Estonia would be able to create a backup at that very moment. He will launch the weapon he has prepared and his plan to jam their country will fail. Anyway, friends, after 2007, in the biggest cyber attacks of 2017 and 2018, many countries of the world including America and Europe were affected, but Estonia was not affected even by 1 percent of them. Estonia has taught a lesson to its school children as well as the elderly, that is cyber hygiene, cyber hygiene and cyber hygiene because they believe that no web police, no system can protect us 100% from cyber attacks until each one of us learns to protect ourselves. By the way, friends, let me tell you that the Bronze Soldier, whose memorial was being shifted and during which all this commotion took place, has gone to Bilkhira. Now, at that new place, ethnic Russians gather in front of the statue and place flowers. Estonian police are also present there to protect it. Now, Estonia has become quite safe from cyber hygiene, but friends, in the sea close to China. America is facing perhaps its biggest challenge in the form of the world's largest military machine. When American ships pass through the open waters here, that is, that part of the ocean which is not special to any country. No country has special rights in that part. That part of the ocean is not the property of that country. Even when American ships pass through there, they hear threats from the Chinese Navy. These warnings are being sent to their cockpits or radio rooms in a Chinese accent, saying, "This is the Chinese Navy, we are warning you, this is the Chinese Navy, go away, please leave immediately, go away right now." This Chinese Navy is warning you. By speaking English in a Chinese accent, American ships and foreign ships are warned repeatedly and in a very threatening manner in that part of the ocean which is open water, which is international waters. So what happens there? Do the Americans succumb to the Chinese threats, get scared or Then the Chinese have to remain silent, what happens friends, in the next part of this great game, in the next log we will talk about this, how are you friends my curious fellows, how are you friends, this video in front of you is the world's biggest andThe beautiful Pacific Ocean is indeed a very important center of the Global Great Game. It is a character because two world powers, China and America, are so heated and active in the competition for monopoly over this ocean that the Third World War can start at any time in the competition for monopoly over it. Friends, to conquer the Pacific Ocean, America has a weapon that China does not currently have. This is why America has a slight edge of a few inches over China. But now China is also making this weapon, in fact, it is close to making it. This weapon is called Blue Water Navy. This blog on the Great Game is the story of this weapon. The thing is that the army which is expert in fighting in reverse in the river areas is well equipped in this respect. They are trained in such weapons. They are taught weapons for fighting in the rivers. They have the ability to swim in brown water, so it is called Brown Water Navy. Then the Navy which is the external army stays close to the shores and operates on the seashore. But it fights its enemies and defends its country. That navy is called Green Water Navy. Like Pak Navy is also a Green Water Navy, but my curious fellows, it is much more powerful, expensive and complicated than Brown and Green Navy. The one which has the best capability to carry out any military operation anywhere in the world is called Blue Water Navy. Though any country can take its external fleet anywhere and carry out operations, even beyond its borders, but only that country has the capability to carry out the toughest operations or respond to the operations in the shortest possible time worldwide. For this, that country has to keep at least thousands of soldiers ready at all times on strategic positions on important trade routes across the world, that is, military bases have to be built. Then aircraft carriers are required for these bases. Salary and financial resources are required to be very high. Similarly, where these bases are located, they are close to their mother. Recommendations have to be made to that military and that place has to be upgraded as well. Now, obviously friends, for all this, an immense budget is required for which the economy of your country should be very strong. A lot of things should be produced in the country and this is the reason that right now, if any country has a blue water navy, then it is only the United States of America. America can afford a blue water navy because friends, its defense budget is more than the total budget of China, India, UK, Russia, France, Germany, Saudi Arabia, Japan and South Korea, that is, the eight countries with the highest defense budget after America. In 2021, friends, the American defense budget was 801 billion dollars. Although it was kept a little less due to Corona, so anyway, friends, through this expensive blue water navy, America has deployed hundreds of its military bases and around 80,000 troops some distance away from the shores of China. Just look at this world map. You can see all the red spots on the map. All these are American bases which are outside America, some are like a tradeThere is no strategic position in the world where the American Blue Water Navy's strength is not present or is not within its reach. Iran and North Korea also have military bases beyond the North Korean coasts, although these countries are considered enemies of America. And now, according to the world's most reputed and most popular news channel, Al Jazeera, and its English website, America currently has 750 military bases in 80 countries around the world. More than half of its army is deployed on these bases, and the largest part of this army is installed in the Pacific Ocean near China. Look at the map again. To the east of China, there are 120 American bases in Japan. China's closest neighbor, South Korea, has 73 bases. Further out in the ocean, there is Guam, which is also an American territory. There are many American bases there too. There is a large number of American military personnel and a very strong base there. Then there are American bases in Australia, Philippines, Singapore and Cambodia as well. Now friends, you will see that all these places are at least 10,000 km away from America. They are close to China, but till now America has remained the uncrowned naval king here too, but now the situation is changing very fast. China has started establishing its bases one by one to compete with America. It has started from this biggest ocean, the Pacific Ocean, and especially from the region called South China Sea. According to world law, this ocean is an open sea. Open sea or open water is that region of the ocean which is not a part of any country, is not the exclusive economic zone of any country. Now what is this exclusive economic zone? My curious fellows, friends, according to the United Nations Convention on the Law of the Seas, any country has to establish its own exclusive economic zone from its baseline to its land border. Special rights are available in the sea for 200 miles, or approximately 370 kilometers. This means that the country is the sole owner of that part of the ocean. It can do as it pleases. It can fish there, extract oil and gas, etc., meaning that the law of that country will prevail here. When any ship or boat of another country passes through here, it will first seek permission from that country. These coastal gods of India and Pakistan, who grab each other's fish and leave them to rot in jail for years, actually arrest each other for violations of this zone. Well, friends, beyond any country's Exclusive Economic Zone, international waters begin, from where not only that country's law but also the law of the world begins to take effect. International law applies there. So, according to this world law, all the countries surrounding the South China Sea have their own Exclusive Economic Zones. The rest of this area in between is international waters. World law will apply here, but even then, when a powerful American Air Force plane passes over it, it hears threats from below. These threats, these warnings are issued by Chinese security officers speaking English in their own accent. The translation of what they say is that the American planeThe threats they give are, get out of here immediately and stay away from this area, this is Joe Reeves, this is China's independent land, get out of here before there's any misunderstanding, get out of this area, this is Chinese territory. Friends, this threat is heard by the powerful American aircraft passing through here, whenever an American aircraft passes, but when a Philippine ship passes through this area, it also hears Chinese threats, without a doubt, but this time Phil Pak goes and the anger increases a little, so they say something like this, hey Phil Pak aircraft, I have warned you once before, I am saying again, get out of here immediately, get out of here immediately, this is a Chinese warning, if you don't get out of here immediately, you will be responsible for whatever happens. Have you seen the double standard, friends, you must have heard the joke of the traffic constable in Pakistan and India, in which the traffic officer standing at a square is controlling the vehicles on a loudspeaker, that is wrong parking. He calmly tells the vehicle by calling out its model number that don't park your vehicles like this, park here, others will be disturbed, but when this same traffic officer sees a biker or a red-hot car and finds that he is parking wrongly there, he shouts, "Hey, move aside, this is the road to your house," etc., etc. Friends, something similar happens in world politics too, the powerful deal with the weak, and so friends, what happens when Chinese military officers give such warnings to American pilots and their aircraft, which are dangerous? Actually, the job of the surveillance aircraft present at American bases around China is to keep an eye on the Chinese, they have to face and handle this situation day and night. So, this military personnel has a complete script given by their organization, on which step-by-step sentences are written in response to the Chinese warnings. On the first Chinese warning, they have to speak the first lines of the paper they have, in which they tell that This is a free and unsuspecting American naval aircraft performing its military duties legally and in a part of the ocean that is not part of any country. However, the Chinese authorities ignore this response and issue a second warning, which is slightly harsher than the first. The American pilot begins reading the second part of the script, looking at the paper. Then the Chinese issue a third warning, which is even harsher. After this, the ship moves forward, and as long as it remains there, it keeps reading the warning written on paper in reply like a machine. Friends, this place, the South China Sea, through which passing ships receive Chinese warnings, is the most important region in the world. The South China Sea is the route through which approximately $5 trillion, or $5000 billion worth of trade, takes place every year. For the economies of all these countries of West Asia, this part of the ocean holds the status of life and death. Now look at Vietnam's 86 on 86, Indonesia's 85 on 85, Thailand's 85 on 85. 70 4 74 F Singapore's 66, Malaysia's 58 South Korea's 47 and China's 40 trade takes place through the South China Sea only. Now in percentage, even if China's trade is less than Indonesia's,And it appears less than others, but the amount of trade that China does in dollars is more than the total trade of the other 10 countries here. For example, according to confirmed numbers, if we tell you, in 2016, China did trade worth 1470 billion dollars through this route, which has now increased even more because in those days, after that, due to Corona etc., it decreased significantly, but now it has increased even more. In comparison, if you see, America transported products worth only 208 billion dollars through this route in the same year. See further that the South China Sea is the place from where 1/3rd of the world's total shipping and maritime trade passes. There are approximately 111 billion barrels of oil reserves in this entire South China Sea and 190 trillion cubic feet of gas deposits are also here. Then, friends, this place is the best fishing ground in the world. 12% of all the fish caught and eaten comes from the South China Sea, so you should understand that the country which will rule over the maximum part of the South China Sea will be in possession or will have the monopoly and will also be at the forefront in the fishing industry, it will be able to extract the maximum amount of oil and gas and most importantly, it will be the watchman on this busiest commerce trade route of the world, rather it will be the police officer there, so these are some of the basic things which make the South China Sea the world's most favorite zone, not only a danger zone because you know that the more attractive a thing is, the more dangerous it is, so now China, by taking all the risks, has declared this entire territory of the South China Sea as its exclusive economic zone, and on the one hand, it has declared its part, its country, its part, for this China has taken the help of its historical maps and has put nine points, now in the diplomatic language, it has described this thing in Safari language. These are called the Nine Dash Lines of China. You can see on the map that if we look at these lines and see how much area these Nine Dash Lines cover, then it simply means that China has not only claimed the entire South China Sea as its own, but according to this map, the exclusive economic zones of Taiwan, Philippines, Bernai, Malaysia, Singapore and Vietnam have also ended. How is it that in three places in the South China Sea, there are very small islands - islands, shoals, keels, reeves or sand bars, whatever you call them, there are hundreds of them. They are so small that only a small boat can park at some places. To give them recognition and to discuss them, they are divided into three big geographical groups: Sapre Islands, Paracel Islands and Scarbro Shoals. So, by claiming all these islands or at most these islands as its own, China also acquires an exclusive economic zone of 200 nautical miles around them. In this way, Beijing The border that exists extends 17100 kilometers from its current base line. Friends, this is China's claim and the rest of the countries there, UNO and America do not accept it. Now if they do not accept it then it is okay. No one accepts the claim, it has to be made to accept it. So friends, to get this claim accepted, China worked on a genius idea; it established these borders on military basis.They turned it into a sea, right in front of the entire world. What they did was to station their large ships at some distance from shallow reefs or sandy ridges floating on the ocean floor. They then devised a mechanism that would extend a large pipe from the ship's bottom into the deep sea, break up sand and rocks from the depths, and pull them onto the ship in the form of mud and sludge. This mud and sludge would then be dumped continuously over the reef at a specific location through a long floating pipe floating on the shallow waters. Hundreds of Chinese ships continued this work day and night from 2014 to 2015, and even until 2021. By May 2015, China had completed many of its missile islands in the Spratly Islands, a key location in the South China Sea, in this manner, and also connected them with American bases. They had built these powerful ships, which are present in hundreds around China, because American naval fleets can be destroyed at any time. But the unsinkable bases that China had built, by throwing mud and throwing mud, were not easy to sink with a bomb or missile. Friends, look at them for yourself. This is the South China Sea, and it contains the Spruce Islands. And this is a 2015 photo by Soby Reeves. Here, there are many such installations, including a runway, which do not exist in rural areas or tourist places. In this photo, you can see how Chinese ships are throwing mud to create a masonry island. This is the scene; what you see as pins and needles are all large ships that draw mud from the ocean and then work to create artificial islands. This is a photo taken from a satellite or from an overhead spacecraft. Then, look at this second photo, this is also a ferry to the Spruce Islands. This is Cross Reef. This is a picture from 2014, when China had not yet started building it. Then, see, it started growing rapidly and by 2017, China had transformed it into a complete military base and America could not do anything. However, the Philippines, which is closest to this island and which is being most affected by it, is America's alliance. Friends, now you can also see the 2020 picture of this Masan Island. In this, you can see the runway on which almost every Chinese warship can land. Then the full capacity to park fighter jets is also present here. Raiders anti-aircraft and anti-ship missile systems have also been installed here. Similarly, this is a 2021 picture of another Chinese military base, Miss Chief Reef. In this too, you can clearly see the runway and military installation on this half circle on this semi-circular military base. This military base also It is very close to the Philippines. Friends, similarly China has built many military bases in the Spratly Islands, Parcels and Scar Bor. When these bases were completed in 2015, China had announced that any aircraft or ship passing through the entire region of the South China Sea will now have to take permission from China. The voices, rather threats and warnings, that you heard in the beginning of the video had the same background. Friends, whatever China is doing, its planning is very old.It always plays the long game. The Great Game is a consolation of its long game. In 2012, the 18th session of the Chinese Communist Party was held. In this, President Houjon Taw was retiring and in his place, the new President Shijin Ping had come to lead China. While going to that meeting or while leaving, President Houjon Taw shared his vision. He said that China will have to move towards becoming a great maritime power and a global external power. He calls it Haiyan Changu in his own language. In Chinese, this Haiyan Changu, that is, Great Maritime Power, a great external power, is called the current President Shijin Ping's dream. Friends, there is no difference between a Blue Water Navy or a great external military power. It is the same thing. So, China is moving towards this dream because to implement and establish the Chinese world order, a powerful Blue Navy is needed so that it can globally establish its geography, civilization and It can protect its geographical, economic and diplomatic interests. It can protect its maritime interests. It can protect its maritime interests. It can protect peacekeeping and goodwill. So, till the South China Sea. You have seen that China has done all this. Now let us show you where it has reached for its blue water navy. In the Pacific Ocean, China has already claimed the Sanka Ku Islands along with Japan and has been claiming them for a long time and is increasing its strength there. China is increasing its strength so rapidly in that area in the East China Sea that in 2018, American Admiral Philip Davidson started warning the American Senate. He started telling his Senate continuously that the technology and operational capabilities of the Chinese Air Force have increased so much that they have become a threat to our Air Force, Naval Force, air bases and ground forces. Remember friends, this is the American general, the commander who was then the commander of the Indo-Pacific region. According to Admiral Davidson, during the Chinese preparedness exercise, American bases They used to come close to China as if they were threatening, telling them, declaring that they are no less powerful than you. Friends, American generals are complaining in a letter to their Defense Committee in the Senate that China has destroyed many types of radar systems in the Spratly Islands of the South China Sea, has established its defenses and launched electronic attacks. This is such an arrangement that now if American forces conduct any operation in the South China Sea, the Chinese forces will have complete intelligence in advance, and they have also acquired the capability to jam the American war machine. This project of China is called A2AD, that is, Anti-Access Area Denial. If translated in simple language, it means that if any power, including America, tries to come close to China for war, then it will have to bear unlimited loss, life, financial and technical losses. So, according to American generals, China has made complete arrangements for A2AD. So friends, you have seen two regions - South China Sea and East China Sea - the places where China is trying to change its global order. Now, coming down to the Indian Ocean, China has reached Burma, Sri Lanka and Gwadar port of Pakistan. In each of these places, it is extremely strong and has a strong hold on caste system.The infrastructure is present which it can use as its naval base at any time. Then there is a small country of Daja Moti in East Africa. China has built a naval base there too. This country is in Somalia and Eterinian and is extremely busy trading sea at the mouth of the Red Sea. This is a walk on opening. This picture which you are seeing is of the Chinese army parade in this country in 2017. This was Bashar's Africa, the Eastern part of Africa, but now let us see that China has also taken steps towards setting up a naval base in Africa, in the West, in the Maghreb, on the very other side of Africa. This small African country is Equatorial Guinea, a country rich in oil wealth. On China's entry here, American and European newspapers are making headlines loudly that China is strengthening its footprint in Africa, expanding it, gaining a foothold. Friends, America has now become so serious about China in Africa that the American National Security Advisor for Africa has said They have started making frequent rounds and, in collaboration with the local rulers, are trying to prevent them from working with China. According to Economica, the US is so worried about China's growing influence and naval bases in Africa that it has sent its Deputy Security Advisor, Mr. John Finer, to several African countries, including Equatorial Guinea. He has advised these African countries on behalf of the US not to fall into China's murky economic trap. The US is also warning these countries that getting too close to China and giving them bases is a national security issue for the US. So keep this in mind. But friends, despite American threats, China's march in Africa continues and its influence is spreading. Just look at this incident, published by America's most prestigious Inimity magazine. This will give you an idea of America's fear. If you move from top to bottom, these areas are the targets where China has deployed its naval bases in Africa. It has already established ports or is investing there or is now operating ports there. These include Sudan, Ethiopia, Djibouti, Kenya, Tanzania, Madagascar, Mozambique, South Africa. Then, moving up north, Namibia, Angola, Congo, Gabon, Cameroon, Nigeria, Tonga, Equatorial Guinea, Equatorial Guinea, Sierra Leone, Cape Verde, and Mauritania are included. You can clearly see, friends, how China is winning the Great Game in the Lame Game. This is called the story of the turtle and the hare, which continues before you in the form of America and China. But the matter does not end here, friends, moving beyond the South China Sea, East China Sea and Africa, China has now started showing its soft power in the Caribbean Sea, right on America's doorstep. Just as America has signed agreements with China's neighbors, now China is making mutual and security agreements with American neighbors and American neighbors. China is establishing its soft power in the Caribbean Sea countries just below America. In this way, it has rather He has done that by strengthening their security, giving donations in the form of weapons to their militaries, and establishing Chinese cultural centers there, these cultural centers right on America's doorstep.Confucius Institutes are named after the Chinese philosopher Confucius. China has so far given 2 institutes to Jamaica, the most important country in the Caribbean.China has provided loans of $1 billion to Jamaica to develop its infrastructure. Roads, bridges, convention centers, housing schemes, children's hospitals, public offices, and foreign ministry buildings have been constructed in Jamaica. Chinese firms have also provided a separate loan of $3 billion to Jamaica to improve mining and sugar production. Jamaica's Prime Minister made an official visit to China in 2019, during which he was given a very impressive protocol by Beijing. In response, senior American leaders are visiting Jamaica and trying to distance their neighbor from China. In January 2020, US Secretary of State Mike Pompeo visited Jamaica and complained to the President about the lure of easy loans from countries like China. However, so far, he has not stopped Jamaica from getting closer to China. The Chinese embassy in Jamaica took strong notice of the American issue in the relations between these two countries, i.e., China and Jamaica, that very evening and immediately issued a press release expressing "very strong dissatisfaction and extreme displeasure" with the American move. Friends, look at the world map once again. The red dots here tell you that China has invested in the ports of 63 countries worldwide, and surprisingly, this includes two American ports. Although China will never be able to use these for military purposes, they will obviously still be used for intelligence. So friends, this was the blue water story of today's Great Game. In this, you saw both the legal aspect of Chinese exploration and the military aspect. How China has now begun rapidly moving towards a blue water navy. And if the United States does not find an out-of-the-box solution, it is clear that Just as China has won in the South China Sea, it will win this part of the Great Game as well as the next phase. Now, friends, China has also started warning its close allies in the Pacific Ocean. You may have seen the tweets in which China repeatedly warns all the allies in its region, all the countries in its region, that they should not play the role of pawns in America's Great Game, not to become anyone's pawns, at least not America's. This means that China is now openly showing its muscles. American generals themselves are admitting this. In this video, we have shown you in detail how America is troubled by Chinese muscle in the Pacific Ocean. When America was spending trillions of dollars on the wars in Afghanistan and Iraq, China was playing the same Shasho Jian game, in which it has now become stronger. But now America has come to its senses and, to counter Chinese influence in the Pacific Ocean, it has started providing its allies with weapons that are even more powerful than the atomic bomb. It is difficult because eight countries in the world have atomic bombs and they have already made them, but there is one weapon which can be made by just five mamalkandam atomic bombs, many countries may have dozens or hundreds of them, but the weapon we are talking about is only as many as the fingers of the hand.If someone has it, it is enough. What kind of weapon is this? Then friends, you must be aware that the most important part of the Great Game is now being played not on land, not in the oceans, not in the atmosphere, but much above that, in space. How China, Russia and America get involved in the space, who is defeating or getting defeated by whom, we will talk about this in the next blog. Friends, how are you today? Two countries, China and Russia, are trying to end America's superpower authority in the space above, and America is filling the space with weapons to compete with these two. But till 5060 years ago, America had to face only Soviet Russia in the space; China was not even close to it. So, at that time, to humiliate and scare Soviet Russia, America did something on July 9, 1962, which very few people know today. America secretly exploded an atom bomb in the space 450 kilometers above, carried out an atomic explosion. This was an atomic weapon test. These atomic blasts were actually an American series of high-altitude nuclear tests, which were named Operation Fishball. In this, they were to conduct a total of five atomic blasts and the blast we are talking about was named Starfish Prime. Through these blasts, America wanted to test its nuclear capability and whether it could use its most dangerous weapon, i.e., the atomic bomb, in case of an open war. America also wanted to see what would be the impact if Soviet Russia targeted its satellites and space missions with an atomic weapon and how it would deal with it. To see all this, America secretly launched this operation in July 1962 from the small island of Johnston Toll, almost in the middle of the Pacific Ocean. This island was at a distance of 1513 km from the American state of Hawaii, but still This nuclear experiment blew up the entire electrical grid of Island Hawaii. Numerous electrical devices were burnt, and ordinary people sitting at home suffered significant losses without any reason. Friends, this explosion also had an effect that was not even imagined by those who carried out the blasts. This explosion created a radiation belt around our blue earth, which destroyed many satellites. The world's first communication satellite was also included in these destroyed satellites, and a military satellite of Britain was also among them. This radiation belt remained around our earth for decades and kept creating problems, but obviously, 60 years ago, there were not as many satellites in the world as there are today, so its impact was not felt much at that time. So, friends, you can understand that the dirty phase of the Khalai War was started by America 60 years ago. It was done with nuclear explosions in the open, then Russia was not going to stop, Russia also carried out nuclear explosions one after the other in the open and showed its strength to America through its nuclear experience, two countries were bent on destroying our blue land to humiliate each other in their war, but the issue for both of them was that those satellites and missions on which they had invested billions of dollarsBillions of dollars were involved and they were also in danger, so both decided to put a stop to this mutual madness for some time. Friends, Madness Madness is also the official name of that situation. This official name was coined by an American defense expert Donald Berner from the abbreviation MD Mad for Mutual Assured Destruction, that is, if a nuclear war breaks out, then perhaps no one can guarantee who will win this nuclear war in the end, but everyone can guarantee that everyone will be destroyed, so this doctrine is called MD Mutual Assured Destruction, everyone's joint destruction. Well, friends, America and Russia then tried to stop this madness by signing agreements among themselves that they will not conduct big explosions in the open. But no emergency could be averted, but both of them, non-linearly, did not conduct any nuclear explosions or any big explosions in the open. To do this, they stopped the blasts, so friends, they stopped, but both the countries They did not trust the other. Both countries continued to build deep underground bunkers in their respective countries to protect themselves from nuclear attacks. Such bunkers, where all the arrangements for launching nuclear attacks on each other and for protecting against nuclear attacks, were always ready, still exist today. Now look at this, this is the Offutt Air Force Base in the American state of Nebraska. This is its picture and this is the place where the aircraft were prepared which dropped two atomic bombs named Little Boy and Fat Man on Hiroshima and Nagasaki in the Second World War. Three stories down is a huge office, rather a compound, which was built for the purpose that even if there is an atomic attack on America, this bunker remains safe. But since it is very old, it may not be able to withstand the new atomic attacks. Some other arrangement will be made for it. Anyway, this is the infrastructure that America built immediately after the Second World War. Today, the American Strategic Command is located here, under which the American forces are responsible. It is its job to fight wars and also to protect the space assets of its own allies. You must have heard the name of the Pentagon many times. It is the heart of the American military. The office of this center, Nimra, is in the air base. Because if America has to win a war against Russia and China, then this is the center from where all this war will be fought. Then friends, this is the center from where America's space assets are also protected, which will be useful in case of a nuclear war. If you have seen the news of 9/11, then you will definitely remember a picture in which US President George Bush is sitting in a closed room with three other people, while videos of the attack are playing on the screen in front. We are talking about the same place in this three-story basement where the US President was taken immediately after the 9/11 attacks. This is the Strategic Command. This is where the team sits, which is actually the modern American army. This is the Space Army. This force is part of the Space Command of the US Army and Air Force. It was designed to protect and fight the world. Even before President Donald Trump's presidency in 2018, when it was not officially approved, this branch of the US military was operating around the world.It had more than 1000 personnel worldwide, its employees were more than 9 billion dollars, its budget was more than 6 billion dollars, it had six bases in the world and its intelligence installations at 134 locations across the world, then President Donald Trump formally approved it in 2018. After this, America's Space Army became official, but its operations are still secret. However, when something is published in Chinese magazines, then we come to know about it, like if something is published about the Chinese in American magazines, then we get to know a little about their intelligence things, like friends, America officially names its space program, similarly Russia has also named its Russian Space Army as Cosm Cheksi Vaska Rossiya, this is its Russian name. It was formally launched in August 2015, but you know that almost every major air force now has a cyberspace wing. However, China has also started work, which is a big initiative to modernize its army. It is working on a plan worth billions of dollars, so in this connection, on December 31, 2015, it also launched the People's Liberation Army Strategic Support Force and the work of this Chinese force, like the American Space Force, is to protect China's machines and satellites revolving in various Earth orbits, to keep an eye on the enemy's installations and to launch a counter-attack. Here the question arises that which installations of each other do these three world powers have to keep an eye on? To understand this, friends, let us take you above the ground. This closest area around the world, from 160 km to 200 km above, the area from 160 to 200 km is called low Earth orbit. Here, all those satellites are revolving which take the land survey from which maps etc. are made, surveys are done, weather conditions are reported, prediction of any sea storm is also done by these present satellites of some company or individual. If there is a need to spy on an individual, then that too is done by the satellites present here. Like, there was continuous surveillance of Osama bin Laden when he was in Abbottabad and it had to be seen whether he was the same person, so that too was done from this low earth orbit. Friends, the most famous example of this orbit is the Hubble Telescope. This space telescope has been present in space for 32 years since 1990 and takes pictures of millions of billions of kilometers away. With its help, scientists of the world do space research. How old is our universe? What is the age of the universe? At what rate is the universe expanding? These are the amazing discoveries of this Hubble Telescope. Then its discoveries on black holes and supernovas, that is, exploding stars, are also very amazing. So, friends, this Hubble Space Telescope works in low earth orbit only. In this very range, in this very orbit, there is also the International Space Station, the space station where scientists from all over the world do joint research. We do a joint investigation, it is operated jointly by America, Russia, Europe, Japan and Canada, no single country is in charge of it or its owner, this station is used for complete peace and peaceful purposes, it will not be used for space war, friends, all this is in the low earth orbit, that is, between the strip of 160 to 200 km above the ground, let us understand it like thisOf all the satellites of companies, militaries of all the countries revolving around the world, the largest part of them, approximately 63 per 63 percent, is in this low Earth orbit. If we tell you the exact number, then from 1950 till now, more than 8000 satellites have been sent into space, more than 8000 satellites, but the total number of satellites which are operational and working is 4852. If you remember 4852 in run figure is around 5000, then 4078 of these are in low Earth orbit only. Friends, at a higher altitude than this, 2000 km above the ground, there is medium Earth orbit, in which there are the least number of satellites, the number of operational satellites is only 141, only 6 per 6 of the total satellites, but friends, this is also the area where the most important satellites which are our For the modern system to reach its full potential, this modern world needs our smart phones the most, which are like oxygen for it, that is, GPS and Global Positioning Satellites. You must have heard the name of GPS Global Positioning System among these. It is actually a constellation of American military satellites. There are around 30 satellites in total. Out of these, 22 to 24 satellites are active at all times. All of them work in the form of a network and tell us the exact time up to milliseconds and tell the exact position in the world up to a distance of 1 meter and tell the place location. If you start sending the location to someone, then he tells you that this location is being told from a distance of so many meters or so many feet, then he is actually telling according to that constellation that it is so accurate that the difference in it can be only a few meters. So my curious fellows, when satellites work together, then this networking is considered important in science. Constellation is also called GPS. GPS is also a satellite constellation. Its services are free for the entire world. The American Air Force has an Idarpalli satellite network. You can travel anywhere in the world without any worries and you have the support of satellite maps. As long as your phone is on and the internet is working. Even if it is not working, you can check the map from the satellite and you will not get lost. These services are coming from this GPS network. With the help of GPS, we know how long it will take to reach a particular place if we go on foot, on a vehicle, on a bicycle, on a bus, or on a ship. Ships traveling in the oceans, carrying goods, cargo, or traveling, get all the help of their nation, all the help of their directions, all the help of their nation from this GPS system and do their navigation with it. Like this American system, friends, now a Russian satellite GNS is also providing these services to the entire world and its army from this medium Earth orbit. This is the reason why experts who want more accuracy are now using GPS to avoid even the slightest mistake. Both these constellations use both GPS and GNSS so that the project is finalized in such a way that there is not even the slightest mistake. So friends, there are two orbits, Low Earth and Medium Earth. Now friends, above these two comes a very important orbit where the surface of the Great Game is the hottest and hottest. This is 35 to 4000 km above.40,000 km above the Earth's geocentric or geostationary orbit. The satellite here completes one revolution around the Earth in 23 hours, 56 minutes, and 4 seconds. This is exactly the time it takes the Earth to complete one revolution around itself. The advantage of this is that the satellite remains fixed at one place. If you have ever installed a dish antenna on the roof of your house or adjusted its location and want to watch a particular channel, you will remember that at a particular location, the signals of that particular channel are visible. If you move the dish even slightly to the right or left, the signals of that channel will not be visible. This used to happen because you were aligning your dish or antenna with that particular satellite located in the geostationary orbit from where the transmission of that channel was coming. Once that antenna is fixed to that satellite, you can watch that channel all the time because its position will not change now; it will always remain the same, friends, in the high Earth orbit, the geostationary orbit. There are satellites of telecommunication companies, satellites of TV channels, radio stations and satellites used for dangerous nights also revolve in this geostationary highest orbit. Let me tell you friends that America has a huge monopoly on this orbit, in such a way that in this orbit there are those satellites of America which give advance warning of any attack. These are the American satellites which handle the phone lines of the American President and the intelligence army, pages and safaris. This is the reason friends, that the Great Game has the maximum impact on this orbit. Yes, my curious fellows, by looking at these three orbits you have understood how important the creation is, how much it is felt and what is the formation here. From this you have understood how sensitive it is for any country to protect its space assets. Perhaps this is the reason why China, Russia and America have deployed their forces for their protection. Now, friends, since America has information rules and Compared to China, it is much more open. We can more easily gather information about America from books, maps, and newspapers. So, to show you how these three countries are protecting their space assets and which instruments they use, we will take the example of America. The other two countries, Russia and China, also do the same with slight differences. If you see that in the United States's Strategic Center, America's assets are protected which are at the top of the earth's surface and which operate in stationary orbit, which is the last one. So here are those four satellites of America, friends, which are very important and are responsible for protecting America before any nuclear or missile attack. If even one of these four satellites fails, gets destroyed, or does not work temporarily, then the American defense system will be blinded from one-fourth to one-fourth of the world. It will not be able to see anything from there. But if this system is working and during this time no one is attacking America. If any country fires an intercontinental missile from any place, nuclear or non-nuclear, then a system will be deployed in the basement of this centre or if America fires a missile at someone thenThis system will also start working because obviously there could be retaliatory fire. For such friends, the US Strategic Command has clocks installed according to all the time zones. From Greenwich Mean Time to Moscow, London and Karachi, all the time zones can be seen simultaneously. You know that a day is approximately 24 hours and there are only 24 time zones in the world. So, the time zones of all the times are displayed on the wall in front. But there are three more clocks which will play an important role in missile attacks. One of these shows Red Impact, the second Blue Impact and the third Safe Impact. You can call it Green. The Red Impact Clock will show when an American nuclear missile is fired and it will show when an American missile will hit enemy territory. The Blue Impact Clock will come into action when another enemy country of America fires a missile towards America. It will show that the enemy's nuclear missile or missiles are coming to hit America. Here will be the time in which it will now hit American soil. It will touch and cause destruction. Finally, comes the green clock of safe impact. This clock is for the space military team that is working in the bunker here for the protection and retaliation of the American army. Due to this clock, this team practices it daily in the shortest possible time and will go into the open. This entire team will go into the open because the attack on the ground would have already taken place, so this team will have to go into the open and become active to counter the enemy and then whatever orders it gets, it will operate in that manner by rising above the ground because now it will most probably not be possible on the ground. But for the functioning of this entire system, friends, it is necessary that the American defense satellites revolving in the geostationary orbit, which is the last uppermost Earth orbit, are working properly and no one should hit them, and no one should come in their way. But friends, both China and Russia have now acquired the capability to operate in this uppermost orbit of the space, which is called the geostationary orbit. They can even reach what's called a geostationary orbit to demonstrate their power. Just as China has brought its installations on land and at sea close to American forces, similarly, China has begun launching its satellites in geostationary orbit close to American satellites in space. Russian satellites, friends, in every orbit, move closer to Muslim satellites than American security and revolve there, and even change orbits, which is highly technical and requires a lot of expertise. This harms America because its secret phone lines, secret messages that no one in the world can decode in code words, cannot be caught on the way. Russian and Chinese satellites can not only tap them but also decode them. On the other hand, America does the same. It has deployed larger and more powerful satellites from low Earth orbit to high Earth orbit to steal information from Chinese and Russian sensitive satellites. Remember this. Friends, America has the monopoly and it is scientifically far ahead of China and Russia, hence China andRussia wants to end its super power status, not America, or China and Russia want to take some share from America's power. So the country whose everything is at stake is not China or Russia, it is America because its power will decrease, China and Russia's power will definitely increase. So, among the weapons that have been prepared to end American space power, friends, one important weapon is a satellite that kidnaps the enemy's satellite or steals its information or disables it. Russia is progressing very rapidly in kidnapping satellites. This satellite, which carries out various types of operations against the enemy, is called Kama Kazi satellite. In 2014, Russia launched one such satellite. However, it was a common weather communication satellite. Some pieces of which disintegrate as soon as it is launched, like its various fuel tanks etc., disintegrate into pieces and the rest of the satellite starts its work for which it also It was made of a similar Russian satellite, but in the American Air Force's Space Department, where every Chinese and Russian space mission and its every piece is closely monitored all the time, after a few weeks it was monitored that a useless piece that had separated from that satellite suddenly came alive and started revolving in orbit. This dramatic change was possible only if it had been a Kamakaji satellite, which it was. Therefore, in order to hide it, Russia kept the space junk for many weeks in the form of space debris. Friends, space junk is those broken pieces that remain scattered in space after the destruction of satellites or those parts of a space mission which are used only to deliver that mission into space. After this, all those pieces are cut into space and become part of the junk. Similarly, the useless things of the empty things that remain in the International Space Station, that is, the things in the dustbin, their broken parts which were thrown away, have also been included in the space debris. All these are just a huge amount of junk of the space, either they get destroyed or burn up after rubbing against the resistance of the atmosphere below the space, or they remain present in the space itself, revolving in different orbits, one of which is named Grave Yard Orbit, in which these things revolve. So friends, this was Russia's Kamaka-G satellite Cosmos 2499. Actually, this Kamaka-G satellite was immediately captured by the soldiers of the American Space Mission, so they kept trying to protect their installations with it and were successful to a great extent. Russia could not use it for much. Friends, the space armies that America, China and Russia are building are very different from the Russian army. The soldiers of this army have big screens in front of them, there are no tanks and no field. Every soldier, who is called DDO (Defense Duty Officer), is responsible for some special installation present in a particular orbit of the space. If it is a place, then the job of a DDO is to continuously monitor that particular installation, that particular location during his shift to see if any threat is moving towards it. So, the screen that is in front of him helps the DDO.Space is visible on them in 3D, so the DDO can move it in space by zooming in, zooming back, moving left and right in space with his mouse and keyboard and can easily see even the smallest thing of the size of a soft hair. A special real time action software has been specially designed by the American army, Russians and Chinese for this purpose, on which their space armies work. So the DDO has to do this that he has to remain alert all the time because in space, friends, things move at a speed of 100 miles per hour, even 10 times faster than the speed of a bullet. A broken piece of any satellite or a missile or any weapon or any thing, everything moving at such a speed in space is a weapon, so it is moving at a speed 10 times faster than a bullet because there is no resistance there. Therefore, if any mass, any matter, any piece is coming from a very far distance towards that important installation which a DDO is monitoring, then he cannot ignore it because in a few seconds Ignoring it means that a Kama Kaji satellite or a piece of iron would have come 100 kilometers or even thousands of kilometers ahead. If it collides with that particular installation from its satellite, then not only will that installation be destroyed and shattered, but hundreds of thousands of more pieces will also be scattered in the space and the rest of that country's installations will also be in danger. Whatever is around it will also be in danger. Therefore, it is very important to observe them continuously. Apart from this, friends, space armies can target satellites revolving in those countries from the ground. Such laser weapons are especially installed by countries like Iran, North Korea and Israel, who fear that some American, NATO or enemy satellite might be spying on them from low Earth orbit. Therefore, they install such laser weapons on the ground itself so that their intelligence installations can be protected and by firing from below, they can destroy any satellite or any machine that tries to spy on them. So, friends, these new soldiers of space war are standing on any border. Like soldiers, they are protecting their own borders. Now let's see that going beyond defense, friends, China and America have also started experimenting with destroying satellites. On January 11, 2007, China launched a rocket from Sichuan province. Space Soldiers sitting in America started monitoring it as part of their routine, as every big country is monitoring every move of the other. But the Americans started getting surprised when this rocket started moving rapidly towards a Chinese weather satellite. In a few moments, the Chinese rocket, running at a speed of 8 kilometers per second, collided with its own weather satellite. This was an empty missile which had actually conducted a successful experiment of destroying a satellite. Since everyone knew that both America and Russia, and even other countries, would be monitoring it, so with this miracle, China told the world that it does not need any new technology to destroy any American satellite; it has this technology and its own weapons. There is no satellite outside the range of Mizan, so America cannot spy on it or work against it.Before starting any space war, think about what China can do. But friends, since China conducted this experiment in its first orbit slightly above the lower Earth orbit and it spread a lot of debris, it was widely criticized across the world. It was said that China is turning space into a battlefield. The space, which is already filled with debris from space wars and which often becomes the cause of space accidents, all these fragments are the reason why China destroyed its satellite and scattered 6000 more fragments in space, making the space unsafe. Each of these fragments is a potential missile which can destroy any space object in seconds after hitting it. You already know friends that due to the lack of resistance in space, these fragments move at a very high speed. We have already told you this. So friends, you should see that when the world was shocked by China's attack on the satellite and in response to the Muzammil blasts, Pakistan also carried out nuclear blasts a few days later. SimilarHe was proud and had planned to build his iconic tower, Trump Tower, in Moscow because it was from here that he runs his business empires and built his Yash Gandhi Tower in its top floor penthouse. So such were his plans, friends. These were the days when Barack Obama was the US President and no one had any idea that a non-political and celebrity businessman like Donald Trump could also become the President of America. So, in the Cox Hall where this show was being held, the young man who was to sing and the Russian billionaire who had given 200 million dollars (200 million dollars) for this show were actually from the same family. There were two people from the Aroff family. The Agler family is actually not Russian, but they are among those Russian billionaires who do business in collaboration with the Russian President. So, it was they who, along with Donald Trump, got the Miss Universe event in Moscow sued because both of them benefited from it. Billionaire Ars Agler was a businessman who had a lot of government contracts from Russian President Putin. They were easily acquired, which is why Donald Trump had them all together to make it easier to process files in Russia. Now, friends, if you think that big events like Miss Universe, Miss Earth, and Miss World are meant to find beauty, then I salute your simplicity. In reality, these competitions are part of a marketing game where many multinational companies are promoting their other businesses. Some are promoting their business at a specific location, while others, by giving someone global fame, want to promote their products through them and make them brand ambassadors. Thousands of other similar ventures are also running simultaneously behind such events. So, this isn't just a beauty competition, but a business venture for some entrepreneurs. That's why there's a lot of fighting over the rights, where it will be held, on which channel it will be shown, who will show it, which ads will come, all this. So, friends, after the Miss Universe contest, Donald Trump had a photo taken with Miss Universe and the Alro family and a letter of approval. A letter of intent was signed, agreeing to build a Trump Tower in Moscow. This was the moment when Donald Trump began praising Russian President Putin, in fact, he had begun doing so since the time he had decided to hold the beauty pageant in Moscow. He tweeted in June 2013, "Do you think President Putin will come to my Miss Universe pageant in Moscow? If he does, he'll be my new best friend." Even after the Miss Universe in Moscow, friends, he continued to praise Putin, saying that Vladimir Putin had contacted him when he was in Moscow and that he was very nice. Donald Trump repeatedly tried to meet Russian President Putin during the Miss Universe event, but was unsuccessful. According to him, Putin had once invited him for a meeting, but due to a traffic jam, the meeting couldn't take place. He couldn't arrive on time. However, Donald Trump remained undeterred. He continued his efforts to build a Trump Tower in Moscow and meet Putin. He kept this tower in Moscow at all costsThey wanted to establish it, but the problem at that time was that American relations with Russia had deteriorated. Doing business in Russia had become very difficult for Americans. These relations deteriorated so much that in 2011, President Putin's party, United Russia, won the Russian Parliament elections. However, the opposition accused these elections of rigging and launched protest protests. Western media, including the United States, began supporting these protesters. Large processions of 60,000 to 60,000 people began taking place in Russia. Despite the harsh winter, people began taking to the streets carrying banners and placards. The United States also began issuing statements in support of these protesters, and the American and European media began publishing reports against Putin, which obviously emboldened the protesters. Russian pilgrims carried posters calling Putin a thief, a cheater, a rat, and who knows what else. Friends, this situation turned out to be very disturbing for Putin. All this that was happening was disturbing him because just three months later, the presidential elections were going to be held in Russia, in which Putin was the candidate. If the situation against him continued like this, he could have lost this election. Because in the recent elections of Russia, after which there were allegations of rigging and these protests, his party had received 15% less votes than the previous time. His popularity had fallen. Due to American and European support, he no longer called these allegations of rigging against him and these protests of the opposition as local conspiracy. He said, and he was quite right in saying that this conspiracy against him was an American conspiracy. He called it the work of US Secretary of State Kharge Hanley Clinton. He said in very harsh words about the protests against him in Russia, "I know that Mrs. Clinton had sent some of her actors to my country." They have activated the streets by giving signals against them. Then friends, what happened was that in March 2012, despite the Tarikh Saaz movement and Mujahi wings, Vladimir Putin won the Russian presidential election for the second time. He got 60% votes out of 60 and with teary eyes, he gave a victory speech in front of thousands of people in Main Square Moscow, Russia, saying that we have won in an open and fair election, but here once again America came to spoil their plans. Severe displeasure was expressed in America and Europe over the election. It was written in the top magazine of Western media, Economist, that the world already knew that Vladimir Putin would win the presidential election, not because he is very famous or renowned, but because he was bound to win, he had indulged in all kinds of rigging during the election and had crushed his political opponents with force. Similarly, the American newspaper New York Times also called this election extremely controversial and wrote that Putin will first face the challenge of his legitimacy, that is, his being the legitimate President. He will have to prove this because when he was celebrating his victory, he got a big slap from the European observers. This was written by the New York Times. They wrote that the observers have made valid allegations of fraud and rigging in the elections. The American newspaper Barat reported on this angle.The Putin, who were already angry, even more so without going further, listen further. You know that Russia considers its neighboring country Ukraine as its own. Especially for the Putin system, this is the time. In 2014, their supporter Viktor Ivanov was the president there. What happened in 2013 was that there was a lot of protest against Viktor in the western parts of Ukraine, especially in the Ukrainian region, because he was from the Russian Ethnicity. Eastern Ukraine, which borders Russia, was his supporter. The Russian President was also his supporter. And the whole of western Ukraine was against him. So a movement started which was called the Revolution for Dignity Movement. During these mujahis, the media of the western world started supporting Viktor's opponents, that is, it started supporting the western part of Ukraine. The aim of these mujahis was to remove the Russian-backed president, hold new elections, and prosecute President Viktor for treason. The mujahis blocked the roads. In this Dignity Movement, civil disobedience was committed, staff was burned, people were killed, and finally, in February 2014, this movement was successful. However, during this period, 121 people lost their lives and around 2,000 were injured. Financial losses amounted to billions of dollars. Apart from this, the Dignity Movement or Revolution was successful in such a way that President Viktor and the Mujahideen found a new path for the people. But on the morning of the month, the world suddenly learned that President Viktor had fled the country from Kyiv to the Russian city of Moscow. Propaganda began in the media that Russian President Vladimir Putin had helped Viktor escape from Kyiv, the capital of Ukraine, so that a treason case against him could not be tried there. Well, friends, this case was later tried in his absence, and on June 24, 2019, he was declared guilty of treason and sentenced to 13 months in prison. The sentence could not be executed because he was not in Ukraine; he was in Moscow and remains there. However, since Ukrainian President Viktor was ethnic Russian and drew votes from there. Eastern Ukraine was his stronghold, and Russia was his supporter, Russian President Putin was very angry when he was sentenced. When the trial against him was underway and he was removed, and the West was supporting him, the Russian President was very angry about this. In 2013, the Russian President was very angry about this and called it an American and Western conspiracy. To a large extent, this was true because the European media, European and American, were supporting him. President Putin accused America of interfering in Ukraine's affairs. As evidence, Russia released an audio tape on the internet in which two American diplomats, who were apparently in Moscow, were discussing the removal of Viktor, the pro-Russian President of Ukraine. US President Barack Obama was upset by this and accused Russia of being a spy for American allies. They intercept their conversations and then, violating selfish etiquette, Russia is releasing this conversation, this spam, this intercepted conversation, which according to them was illegal, on the internet. Barack Obama thought that all this was happening on the orders of Russian President Vladimir Putin.Someone didn't just copy or steal it and put it on the internet. So, friends, after reaching this point, keep these three points in mind once again: December 2011, the Duma elections, the Russian Parliament, and large protests against Putin in Russia. His support was also coming from the West. March 2012, when Putin became president in 2012, there was once again opposition from the Western media and the political leaders there. And then in 2013, the success of the Russian-backed Dignity Movement in Ukraine against Viktor, the president of the Russian Ethnicity. Again, Putin also had a hand in it. In all this, if you include Putin's occupation of the Ukrainian territory of Crimea and the US sanctions imposed on Russia in response, then my curious fellows, this was the backdrop that Putin had endured by 2014, and he had come with this understanding. To what extent is the issue being played against them in their internal affairs? Now was the time for them to settle scores, because in less than two years, the US presidential election was going to be held. When America is about to go to the polls, friends, it becomes very vulnerable politically. Every country becomes weak during those times. This opportunity gives enemy forces more opportunity to play tricks in that country because it is difficult to achieve political consensus. The government and the opposition are unable to agree on even the most important national issues because both are promoting hatred by making speeches against each other. So this was an excellent opportunity when Russian President Putin decided to retaliate. This election of 2016 was very important for America because it was going to be held at a time when the world economy was badly disturbed. America was trying to get rid of Afghanistan at all costs. It had started to feel threatened by the growing power of China and Russia. Barack Obama, considered one of America's most powerful and beloved presidents, was nearing the end of his second term. He could not become president for a third time. His challenger, his party, the Democrats, was a popular figure who was by no means a political tycoon. He was a celebrity, a conman, a businessman, a royalty, a show host, and a playboy. This was the same man who, just a few years ago, had come to Moscow to be bewitched by the beauty queen in order to meet with Russian President Vladimir Putin. President Putin decided to attack this weak point in American politics. Missiles, atomic bombs, proxies, wedding processions, magazines, and machine guns were old weapons of the old Great Game of Cold War, friends. But now a new weapon of the new era was in Putin's hands: the media. President Putin had recruited a massive army of online trolls, even at that time, who spread every false information that benefited Russia like a religious fanatic. They not only spread but also create fake information. They used to present Putin as a hero and take advantage of his opponents and did not let go of any opportunity to prove America as nonsense and stupid. But this was only a small part of that great game. Its real trick and real feat was thatMany experts from the army of Russian trolls used to sneak into the American political system and secretly hack the most important information. From here, friends and friends, the story begins: how President Putin played the 2016 election between Donald Trump and Mrs. Clinton like a football match. This is a very interesting story of the Great Game. Friends, what happened was that in September 2015, the FBI, the US internal security agency, sent a secret information to the National Committee of the Democratic Party. You can understand that the committee was busy in those days, which was to determine who would be the presidential candidate from their group. The FBI informed them that some of their computers had been hacked. One was definitely in the possession of hackers, and through that, hackers could now access all the computers. Along with this, the FBI also found a group of Russian hackers, which was very famous or infamous online, which the FBI also used, APTC, and from there they also got a lot of information. According to information gathered from Russian hackers, that is, information gathered through their espionage, Russian hackers had attacked the American government, political circles, and think tank networks and had penetrated them. This information was also passed on to all these departments. Now, look at the cruelty of the Democratic Party, for whatever reason, the IT team of the Democratic Party, which the FBI had informed that their computers were being hacked, did not take this warning seriously. The result was that within a few days, Russian hackers got hold of the entire network of the Democratic Party and all the data of Lily Clinton's election campaign. They then used this data with great skill, the story of which you will see in this section. But now, friends, know that if the Russian hacker had reached the Democratic Party, then the Republican Party was also not safe from it. The most close people to the Russian President Putin had come to the right and left of the Republican Party's candidate Donald Trump. Now, who were these people, friends, in Donald Trump's election campaign? The chief strategist and chairman of the U.S. was Paul Manford. He had previously been a part of the election campaigns of Ronald Reagan and Bush, the American presidents. But the interesting aspect of this was that Paul Manford was the person who had been missing from Washington for 10 years. He was missing because he had become close to Russian President Putin. Paul Manford was actually helping President Putin's Ukrainian President Viktor Koch win the election for a decade. He was lobbying for him. On his advice, President Putin had the Ukrainian President fire on those who protested against him, including the Dignity Movement. You already learned about the details of this at the beginning of the video. You also learned that President Viktor Koch had to flee Ukraine and take shelter in Russia. Manford continued to campaign for these people. Friends, this same person had also been an advisor to the Russian billionaire oligarchy. During this time, he made multi-million dollars by establishing connections with the Russians and then hid it back in America. He came and was involved in fraud cases here too. Finally, one day he was arrested here again. A case was filed against him in America and in 2019That is, after the election campaign, in 2019, a US court in New York sentenced him to seven years in prison, meaning he was convicted of a crime. He is currently serving his sentence. Furthermore, there were many individuals in Trump's election campaign who had been working with people close to the Russian president for years. This means that Russian hackers had spread their spies around both parties in the two-party system of the US election. If the Democrats' computers were hacked, the Republican candidate's election campaign chairman was a 10-year friend and former business partner of Russia. Another close associate of Trump was Rob Goldstone, a British white man, with whose help Donald Trump organized the 2013 Miss Universe pageant in Moscow. This same Goldstone was also working to renovate Donald Trump's Trump Tower in Russia, meaning he was taking this matter beyond the planning stage. In June 2016, he organized the most important event of Trump's election campaign. This white man sent an email to Trump's son, Donald Trump Jr., stating that he needed to contact him, Donald Trump Jr., for something very interesting. The email stated that Russian officials had some documents related to Donald Trump's election campaign, documents that would destroy Henry Clinton and greatly benefit your father, Donald Trump Jr., and the details of his election campaign. The email also stated that this was very high-level and very sensitive information. All this information was from Putin and the Russian government to help Donald Trump. Friends, these emails are not a fantasy theory because these emails are now public. You can read all the data and transcripts online whenever you want. Both the sender and the receiver today believe that this email conversation took place in which the Russian government, i.e., President Putin, wanted to provide some information to help Donald Trump, for which a meeting was held at Trump Tower. There is evidence of this meeting being scheduled, but the meeting did take place. There is a lot of disagreement on whether or not this happened. Trump doesn't admit that these meetings took place, but emails provide evidence that these meetings were discussed. Friends, such emails were exchanged repeatedly, in which Donald Trump Jr., who calls himself Don, kept replying, "If that's true, meaning there's some filth against anti-Russian candidate Hillary Clinton, then I love it." Now, if you notice, when all this was happening, Donald Trump, as an American citizen, should have shared with his government's security department that Russia was interfering in the US elections, meaning that Russia had access to some secret documents of former US Secretary of State Larry Clinton. It was Donald Trump's and his party's national responsibility to bring this information to the attention of US security agencies. However, the Trump team, his head, his chairman, his son, and even he himself did not share any such information with the security department at that time; instead, they hid it and tried to take advantage. However, they used religion and racism in their campaign. He is the one who sings the most about patriotism of the country.By the way, my curious fellows, it has often been observed in history that those who are most dependent on love for the country and religion are actually cheating because honesty, speaking the truth, and love for the country are not something that needs to be publicized; they are as essential as oxygen for every human being. In fact, if we look at it, the person who repeatedly says this is actually hiding the thief within him. Donald Trump was doing something similar at that time. He was taking help from Russia, exchanging emails, and simultaneously raising the slogan of America First. Calling himself America's biggest lover of the country, he used to say that as President, I will send Larry Clinton to jail. To gain cheap public acceptance, Donald Trump used to give new and loud names to his political opponents. He used to call Larry Clinton "Crazy Larry Krug", "Larry Heartless Larry Lying Henry" and his family "Wild Bull" when he was contesting for the second time against Joe Biden. When he came, he continued his same method. He used to call Joe Burden as % Joe Basement Joe Beijing Joe China Joe Corrupt Joe Crazy Joe Joe Hyde Coid Pro Joe Slippy Joe Slippy Creepy Joe Slow Joe and many such names. Such videos and clips of him would then go viral on social media. Russian trolls would make them double viral and this was what he wanted, he was becoming a fool in the new generation. Well friends, despite calling himself America's biggest lover of the country, Donald Trump was hiding the matter of his country's security which had come to the knowledge of his team. During the days when Donald Trump and Russian links were talking about bringing data to bring incriminating evidence against Larry Clinton, in the same days, this news started appearing as breaking news in the American media that Russian hackers have been hacking the systems of the Democratic Party, i.e. Haley Clinton's party, for several months. Russia has got immense information about the Democratic Party and this became common news in America and all over the world. Donald Trump now started making fun of Larry and his party for this very thing that whoever keeps their computers They can't secure it. They say they'll provide security for America, while Trump's opponents were claiming that Russia was carrying out hacking attacks solely to help Donald Trump win. To find out how Russia was aiding Donald Trump, the Democrats hired a cyber investigation firm, Fusion GPS. This firm compiled a three-page dossier, after interviewing officials from the Russian intelligence agency and the Russian intelligence agency. According to this dossier, in 2013, when Donald Trump was hosting the Miss Universe pageant in Moscow, the Russian intelligence agency, the FSB, captured secret videos of him. In these videos, Donald Trump was seen engaging in undressed sex with prostitutes. This information was crucial because Donald Trump, a possible American president, could be blackmailed by Russia. As soon as the Democrats received this dossier, they handed it over to the FBI, the American security agency. The FBI launched an unrelated investigation. This investigation continued even after the election, but the Russians tried to take America to extreme lengths by using journalist Julian Assange to influence the American election.The pressure began. On July 22, 2016, exactly one day before the Democrats were to nominate Haley Clinton as their official presidential candidate, announcing her candidacy for US president, Julian Assange tweeted. If one thing had the greatest impact on the US election, it was the information contained in this tweet. This information may have been released by Julian Assange, but it was provided to him by Russian hackers. What was this information? Who was Julian Assange, what role did he play in this Great Game, and why did Donald Trump keep sending him "I love you," messages. Why did the US FBI ask him to remove its logo from a statement prepared by Barack Obama? Why did Obama and Putin issued stern warnings during a one-on-one meeting in China? Why, friends? If we start discussing all this now, this blog will become much longer. In the next blog, we will discuss the seventh and final part of the Great Game. We'll share all these details with you, and there'll be a bonus too. Friends, be sure to watch this last part. Friends, in the last and most interesting part of the Great Game, Khushamdid, we were talking about how Russia supported Donald Trump in the 2016 US elections. We reached the month of July when Julian Assange was entering this Great Game. You know that Julian Assange is the creator of WikiLeaks and he gained fame in 2010 by releasing videos and documents of US military operations in Iraq. This first leaked video of his, which you're watching now, is from 2010. In which the US military was selectively killing more than eight people, including writer Safia, in a drone strike. The US military was hiding this news, but WikiLeaks released it publicly and released a video of it. In this video, the American military was having an inauthentic conversation about the killed journalists and civilians. Friends, it also caused significant damage to America's image internationally. All those killed were innocent, but America was continuously killing them by branding them as terrorists, and had already killed them. Friends, America has been accusing Julian Assange of working in collaboration with Russian hackers. Russian hackers steal and hack secret documents from the US and the Middle East, which Julian Assange then releases through WikiLeaks at opportune times, at times that benefit anti-American forces. By the way, Julian Assange is currently imprisoned in a London jail on charges of illegal computer hacking. While the US wants to arrest him and take him to their country and prosecute him there, the British courts are continuously rejecting American requests. The British courts are not handing Jolie and Assange over to the US. Well, this is their position this time. So friends, the day the Democratic Party nominates Haley Clinton as the US presidential candidate A day before that, Julian A. Sanz tweeted that he was going to release 25,000 official emails of the Democratic Party, one by one, in a series.Yes, Jolie Nassaj released these emails over the next several weeks. Even today, if you go to the WikiLeaks site, 3444, 34000, 441 documents are the same. After each such release, Donald Trump would send messages of "I love you, I love you, WikiLeaks" to the Jolie Nassaj department at rallies. In his speeches, he would say, "I love you, I love you, WikiLeaks." Friends, at that time, the US President was Barack Obama. He was a friend of Henry Clinton and belonged to the Democratic Party. Henry Clinton had also been his former Secretary of State. But even as President, he could not make any statement that would give Harley Clinton any political advantage. Then, the investigation into the Russia issue was still ongoing. So, Donald Trump's attacks on Haley Clinton continued. Russian hackers not only hacked her party emails and network, but they also accomplished another very serious feat. They also hacked the emails of John Podesta, the election chairman of Harley Clinton. You must have often encountered this method. This must have happened to you as well. 8 months before the election, in April, an email designed by Bajhar G or any other well-known organization is prepared for John Podesta. You receive it, but upon clicking the link, instead of your wish being fulfilled, the hackers' wish is fulfilled, meaning your entire system is hacked. This is what was about to happen to John Podesta, but he took some precautions and sent this email to his cyber security team to see what is this matter and whether he should click here or not. The security team and the IT team immediately realized that this email is a phishing tool and has come from hackers. So they replied to John that this is an illegitimate mail, meaning it is not correct. But alas, a typo error, a historical typo error, what happened was that the cyber security guy had written "illegibility" in the email for some reason, meaning there is no issue. Illegitimate mail was written as ILN. The skip was made, so John Patta immediately clicked on the link he was told. In that time, his entire network fell into the hands of hackers. Hackers downloaded and hacked all of Haley Clinton's emails, of which, obviously, the largest portion at that time was related to the US elections. See, for several months, the Democrats did not know that thousands of their emails were reaching Russia directly, and when they found out, it was too late. Upon suspicion, the Democrats hired Crowdstrike, a cybersecurity firm. This firm checked the Democrats' systems and soon told them that two hired Hussian-linked hackers named Fancy Bear and Kuzi Bear had been hacking their systems for months. Friends, the Russian link was discovered in this way. Firstly, the hackers were writing the code in Russian, and then their working timings were of the Eastern Russian time zone, meaning they started work from the Kremlin office in Moscow and ended with its timings. He would stop work and go on leave as if someone had hired hackers on an hourly basis. These are the emails that WikiLeaks got hold of through Jalin Sanj. WikiLeaks started releasing these emails in installments before the US elections, as per the timing, and every installmentBut Donald Trump got political advantage or you can also say that it was delivered to him, that was the reason why he kept sending messages of thanks and love to WikiLeaks in public as you have seen in the videos, all this Russian intrusion in the US elections was continuously reaching President Barack Obama, so he decided to talk directly to the Russian President so that he could alert him. Three months before the US elections, in September 2016, the G20 summit was being held in China. On the sidelines of this, the leaders of two world powers, Barack Obama and Vladimir Putin, met. This was a one-on-one meeting in a closed room and no one was present except translators. The immediate news that was published about what happened in this room was general that both of them talked about the situation in Ukraine and Syria, but in reality, the big issue that was discussed here was that according to US President Barack Obama, he had warned the Russian President. He had said that if Russia interfered in the US elections If the tampering is not stopped, there are clear signs of a dangerous outcome. President Vladimir Putin, the Russian President, did not say anything at that time, but four days ago, when he was asked a question about hacking in the US elections, he had already given a very offensive answer to Bloomberg in an interview with the American media. So, perhaps he said the same thing here in the meeting. He told Bloomberg that he had no knowledge about this because Russia does not do such hacking at the state level. Then President Putin asked the interviewer who was interviewing him, whether it is more important who hacked the American networks or what the American public learned from this hacking. Actually, friends, you have also seen in this link, in this video, that he was referring to the information that the public had received through hacked emails through WikiLeaks, which clearly showed that the Democratic Party was trying harder to nominate Clinton as President, while Bernie Sanders was competing against her. was receiving less importance, meaning they were successful in establishing a rigged image here. Putin called it an internal conspiracy, and the same thing was also being discussed in the Law League. Now, friends, US President Barack Obama was also watching all this. He wanted to bring the issue of Russian hackers and Trump's involvement in the US elections to the American public. He wanted to tell them how, according to him, Russia was trying to help Trump win. He presented all his evidence before the Senate and tried to convince them, asking them to issue a joint statement about Russia's attempts to hack the US elections in Trump's favor. However, the senators refused to issue such a joint statement. Then, he tried to get the Security Department to issue the same statement. There was considerable debate here as well. There was also a debate on whether or not to include Russian President Putin's name in the statement without evidence. Finally, after several meetings, the tape emerged that Russian attacks in the US elections were being presented to the public. But in this statement, instead of mentioning the name of the Russian President, he was simply pointed towards him, so such a statement was prepared for Barack Obama.During the period in which all this was written, all the important security agencies of America like FBI, CIA, NSA and DHS i.e. Homeland Security signed this statement. But surprisingly, at the very last moment, when the logos of all the security agencies started appearing on the statement, the FBI requested to remove its logo from here and requested that its logo should not be printed here. FBI Director Mr. Comey said that the FBI does not want to give any impression in political matters and especially near the US elections, which would benefit one group and harm the other. Then it was decided that President Barack Obama would get this statement officially released with the logos of two agencies of the White House, Homeland Security and National Intelligence. These two agencies are actually the hub of information of all the agencies and American agencies. So friends, friends, the joint statement was prepared and finalized, but it was to be released on October 7, 2016, i.e. a little more than a month before the American presidential election. It was a coincidence, not an instant one, this was supposed to be the biggest news in American history and the modern world that America is accusing a country of manipulating its election system, this had never happened before in American history, but see, there is a drama on this too, Russian hackers, Jalil Sanj, Donald Trump, even the weather, all this is because of this news [Music] A few days before the release of the Nimturi statement, Category 5 hurricane Hurricane Matthew hit the coastal areas of the Eastern American coast, killing over 600 people and costing America $165 billion.The news of a loss of $5 billion was all over the media. Well friends, this was a very strange storm; it had been brewing for weeks, but another storm also came, which was very strange. A statement was to be issued on October 7th, but on the same day, another old footage was also released by the Washington Post. This was an off-the-record conversation of Donald Trump in 2005, which he had done while talking to Dilip Bush on an American TV show. This video and audio went viral instantly. In this, Donald Trump, who was a presidential candidate and was going to the election in a few days, a few weeks later, was saying in this audio leak that he could get away with having a sexual relationship with any woman because of his wealth and fame. He even used words like "grab by the P" in this audio. The woman about whom everyone was talking was known to America and she was also known to her husband. So, this audio leak and the news brought attention to the Russian President. This news overshadowed the joint statement about the hacking of the US elections. The statement that Barack Obama was issuing about Russian hacking was suppressed. But then another news came, even bigger than this. This time it was an attack from Julian Sachs. At 4:32 pm, WikiLeaks announced that they were going to make public the personal emails of John Batista, Chairman of the Election Commission of Mallory Clinton. This news once again took the joint statement, which had already been overshadowed by the storm, and Donald Trump's audio leak even further behind. Donald Trump's magical followers, who were not affected by anything he said, were not at all offended by Donald Trump's pompous conversation. On the contrary, he started getting more fame on social media than before. For Halley Clinton, who was hoping that the intelligence agency's findings would benefit her, those votes became more important than the election field. Those fake accounts, which were being run by Russian hackers, became so important that Donald Trump used the information firm Cambridge You must have seen the videos of Zuckerberg sharing his personal data with the help of Analytica. He created several accounts on his ID that claimed to be American and would comment and post on major news media outlets. These fake accounts were hacked using a VPN without the permission of those profiles to help Donald Trump's election campaign. Evidence of this emerged when Christopher Valli, a whistleblower from within Cambridge Analytica, leaked the organization's confidential documents. Christopher Valli's complete 17-page statement, which he presented before the judiciary, has been released on the US Department of Justice's website. In it, he explained in detail how Cambridge Analytica and Russia were colluding to sway the US election in Donald Trump's favor. His book on this subject has also been published in the New Yorker magazine. Zuckerberg later admitted to a committee of US Senators on April 10, 2018, that his company had lost more than $119 billion in market value.In other ways, they can continue their income and business. So friends, we were talking about the election hack when on November 8, 2016, the US election leader told Safia that he had received a beautiful letter of congratulations from the Russian President. On November 13, the fifth day after the victory, President Putin and President Donald Trump had a phone conversation in which the idea of normalizing US-Russia relations was discussed. In December 2016, President Barack Obama announced and ordered a full review of the election. Evidence of Russian involvement again emerged in the full review. The National Intelligence, American Security Department, prepared a report in which it was judged that the Russian government tried to influence the US election according to its wishes through state-funded media, third-party hackers, and paid social media trolls. The report mentioned Donald Trump's name 17 times and it was written that the Russian government had attempted to influence the US election according to its wishes through state-funded media, third-party hackers, and paid social media trolls. The preference was for Donald Trump to win. Newspapers also published stories of Donald Trump's unbelievable influence with the help of Russian connections and Putin polls. Then dozens of books came into the market detailing every detail of large-scale Russian hacking of the US elections. However, Russian President Putin and Donald Trump have been calling such allegations baseless and unfounded, saying that the Russian issue is completely useless. Friends, this was the last detailed story of the Great Game, in which you also saw Russian tactics and American helplessness. Before this, you have also seen excellent blogs on the Great Games between China and America in this regard. In the fourth part of this series, we told you that America is forming a new alliance to defeat China in the world's largest ocean, the Pacific Ocean. In fact, it has already formed this alliance. You know, this alliance had to be formed because China has strong influence in the Pacific Ocean, Indian Ocean, Atlantic Ocean, and South China Sea. It is building a military base stronger than the US. These bases are currently small in number, but they are rapidly modernizing and expanding. Their numbers are increasing. In the Pacific region, US military officers say that our military technology is currently far ahead of China's, but this margin of superiority, this margin of dominance, is shrinking. This gap is decreasing every day. According to General Davidson, commander of the Indo-Pacific region, if the Chinese continue to innovate and invest at this rate, this difference will not last long. Friends, the idea that the US would go to war with China was unthinkable even a few years ago, but now an alliance, which we have already mentioned, has been formed, which is ready to fight China. This military alliance of three countries, the AU, has formed a military alliance in the name of the US. The major players in this alliance are the US and Britain, in fact, they are the real players, but they have started preparing Australia as their policeman here. Otherwise, Australia alone cannot compete with China without the help of these two. You know that in the Pacific region surrounding Australia, there is no naval power bigger than China.And the biggest strength of naval power is its aircraft carriers and submarines. These submarines are usually diesel and electric powered, but the most dangerous and powerful among them are marine nuclear submarines. You can call them the lion of the sea. If seen from China's point of view, then this is the dragon of the sea. To estimate how powerful and powerful a nuclear submarine is, you can see that at present there are only six countries in the world which have this marine. At present, all the submarines of America are nuclear powered, this is 68, then Russia has 29, China has 12, while Britain has 11, France has eight and India has one. This weapon is the lion of the sea or the dragon because when it lies in ambush, it can remain under the surface of the sea for many years, that is, it does not need to come to the surface of the sea again and again for refueling, as diesel or electric submarines do. They run on this power, they have to come to the surface again and again for refueling. Nuclear submarines do not have to do this. Electric or diesel submarines are small in size and can be easily detected. Even if they make a slight noise, the radar can easily pick it up, which does happen. But nuclear submarines are very large in size and do not make any noise at all. Radar cannot even pick it up. Detecting it is as difficult as finding a needle in the desert. It is detected only when a missile coming out of the sea is going towards its target. This missile can be conventional as well as nuclear-powered. You can see in this picture how an entire fleet of Chinese nuclear-powered submarines is floating in the sea and moving forward. This is the living force of China in Bahrul Kahal. To counter this, the UK-US military alliance has been formed and it has decided to give this Traltunga to Australia. Friends, when the decision was made to give this nuclear submarine to Australia, China reacted very strongly. The answer was given in words. According to the Chinese government's representative newspaper, Global Times, after this military alliance, Australia has declared itself an enemy of China. The Chinese newspaper, which is a government newspaper, wrote that no matter how many weapons Australia acquires, it is no more important than an American dog. But if it ever tries to confront China under the guise of these weapons, it will be mercilessly killed. This was a Chinese newspaper, friends, which publishes editorials and news according to government policy. However, the Chinese office of Kharja also strongly condemned this and said that America and Britain have shown very narrow-mindedness. The formation of this tri-military alliance is an extremely irresponsible act. In fact, the Chinese Prime Minister Kharja warned the three countries that their cold war mentality will harm their own interests. You know that during the Cold War, Russia and America would go to any extent to humiliate each other, even countries close to each other. China pointed towards the same thing that China was actually watching the growing friendship of Australia with America, Australia's biggest trading partner, for many months.China was the only one in the region. For example, the wine business in Australia was growing rapidly, and China used to buy Australian wine at a high rate. But suddenly, to punish Australia for getting closer to America, China imposed a two-hundred-dollar tax on Australian wine. Then, China even went on to increase it further. So, this is an example of how China has started attacking in a full-fledged manner in the Great Game, and its counters too. Chinese newspapers are doing this almost every other day, and somewhere separately, they are challenging America's monopoly. The war of intelligence agencies, the competition for poison production, in the open, in the oceans, on the surface, nuclear, on the surface, on the surface, and in international trade. This story is in front of you in seven logs. To see this complete, very interesting and sensational story with real characters and real locations, please click on this link. Here, find out why Saudi Arabia and Iran are after each other. And here, find out how India was saved from being bankrupt
0 Comments