Facebook Internal Documents Show Stasi Operations Including Murder

What about Apple and Tim Cook?

  • Apple threatened to remove Facebook from its App Store after a report about an online slave market.
  • The BBC in 2019 reported that human traffickers were using Facebook’s services to sell domestic workers.

    Apple threatened to kick Facebook off its App Store after a 2019 BBC report detailed how human traffickers were using Facebook to sell victims, according to The Wall Street Journal.

    The paper viewed company documents that show a Facebook investigation team was tracking down a human trafficking market in the Middle East whose organizers were using Facebook’s services. What appeared to be employment agencies were advertising domestic workers that they could supply against their will, per the Journal.

    The BBC published a sweeping undercover investigation of the practice, prompting Apple to threaten to remove Facebook from its store, the paper said.

    An internal memo found that Facebook was aware of the practice even before then: A Facebook researcher wrote in a report dated 2019, “was this issue known to Facebook before BBC inquiry and Apple escalation?,” per the Journal.

    Underneath the question reads, “Yes. Throughout 2018 and H1 2019 we conducted the global Understanding Exercise in order to fully understand how domestic servitude manifests no our platform across its entire life cycle: recruitment, facilitation, and exploitation.”

    Apple and Facebook did not immediately respond to requests for comment.

    The Wall Street Journal on Thursday also reported how Facebook’s AI content moderators cannot detect most languages used on the platform, a needed skill if the company is going to monitor content in foreign markets where it has expanded. source

Source: The dozens of internal Facebook documents obtained by the outlet showed how employees have expressed concerns about how the social media giant is being used in countries across the globe and how Facebook has failed to properly respond to these issues.

Some of the documents reportedly showed that Facebook employees raised concerns about human trafficking organizations in the Middle East that used Facebook to attract women. Other documents showed Facebook employees alerting their higher-ups of groups involved in organ selling and pornography.

The news outlet reported that while some of the groups and pages flagged by employees have been taken down, dozens of others remain active on the social media site.

Mexican cartels that are feeding America's drug habit ... source

Another document detailed a Facebook employee’s investigation into a Mexican drug cartel that was active on the social media site. The employee, who was a former police officer, was able to identify the Jalisco New Generation Cartel’s network of accounts on both Facebook and Instagram, which is owned by Facebook.

The employee wrote in the report that his team had found Facebook messages between cartel recruiters and potential recruits “about being seriously beaten or killed by the cartel if they try to leave the training camp.”

México: Cártel Jalisco Nueva Generación lanzó un video ... source

The documents reportedly showed that the cartel was open about its criminal activity, with several pages on the social media site showing “gold-plated guns and bloody crime scenes.”The Wall Street Journal reported that even after the employee recommended Facebook increase its enforcement on the groups, documents showed that Facebook didn’t completely remove the cartel from its site and instead said that it removed content tied to the group. Just nine days after the report from the employee, his team found a new Instagram account tied to the cartel, which included several violent posts.

Many of the documents apparently showed employees raising concerns about how the social media giant was being used in developing countries, such as militant groups in Ethiopia using Facebook to promote violence against minority groups.

Brian Boland, a former Facebook vice president, told the Wall Street Journal that the social media site sees these issues in developing countries as “simply the cost of doing business.”

“There is very rarely a significant, concerted effort to invest in fixing those areas,” Boland said.

In a statement sent to Newsweek, a Facebook spokesperson said: “In countries at risk for conflict and violence, we have a comprehensive strategy, including relying on global teams with native speakers covering over 50 languages, educational resources, and partnerships with local experts and third-party fact-checkers to keep people safe.”

In a series of tweets on Thursday, Facebook spokesman Andy Stone wrote, “As the Wall Street Journal itself makes clear, we have a team of experts who help us uncover patterns of harmful behavior so we can disrupt it. We’ve got arguably more experts and resources dedicated to this work than any other consumer technology company in the world.”

General Milley Says China is not an Enemy

It was 2017 when General Milley said China is not an enemy.

Well let’s go back to some facts shall we?

Has General Milley even met FBI Director Chris Wray?

The counterintelligence and economic espionage efforts emanating from the government of China and the Chinese Communist Party are a grave threat to the economic well-being and democratic values of the United States.

The Chinese government is employing tactics that seek to influence lawmakers and public opinion to achieve policies that are more favorable to China.

At the same time, the Chinese government is seeking to become the world’s greatest superpower through predatory lending and business practices, systematic theft of intellectual property, and brazen cyber intrusions.

China’s efforts target businesses, academic institutions, researchers, lawmakers, and the general public and will require a whole-of-society response. The government and the private sector must commit to working together to better understand and counter the threat.

Then, the New York Times publishes an article on April 13, 2021 titled: ‘China Poses Biggest threat to U.S., Intelligence Report Says’

Sure, it is several years later but and after Milley says he has known his CCP counterpart for 5 years…there is this –>May be an image of text that says 'Milley reportedly made the calls before the 2020 presidential election on Oct. 30, 2020, and two days after the Jan. 6 Capitol riot, on Jan. 8, 2021, and assured Zuocheng of the stability of the American government. He also allegedly assured the Chinese general that he would contact him regarding any imminent attack from the U.S. in the waning days of Trump's presidency.'

and this –>

May be an image of text that says 'Four #ChineseWarships, including a Chinese destroyer, have sailed into the United States' exclusive economic zone. Chinese state-run media says this is a warning to the United State about China's naval capabilities.'

The Annual Threat Assessment of the Intelligence Community published on April 9, 2021 is here in full. 

The 112th Congress held a hearing (House Foreign Affairs Committee) on May 28, 2012 titled: Investigating the Chinese Threat, Part I: Military and Economic Aggression. 

How about APT 40 (Advanced Persistent Threat) published by CISA? Can we really safeguard our trade secrets, intellectual property and infrastructure from the Chinese cyber war? Did General Milley discuss any of this in any other phone calls with his Chinese Communist Party counterpart?

China hacked Microsoft. Chinese hacking goes back several years. How about NASA, the World Bank, the State Department (East Asia Division), the Commerce Department, the Naval War College or the Lockheed Martin F-35 fighter program?

Remember when President Obama removed all CIA operatives from China? That was because the Chinese military was killing our operatives in country. How did they know?

CHINA USED STOLEN DATA TO EXPOSE CIA OPERATIVES IN AFRICA AND EUROPE
The discovery of U.S. spy networks in China fueled a decadelong global war over data between Beijing and Washington. 

Around 2013, U.S. intelligence began noticing an alarming pattern: Undercover CIA personnel, flying into countries in Africa and Europe for sensitive work, were being rapidly and successfully identified by Chinese intelligence, according to three former U.S. officials. The surveillance by Chinese operatives began in some cases as soon as the CIA officers had cleared passport control. Sometimes, the surveillance was so overt that U.S. intelligence officials speculated that the Chinese wanted the U.S. side to know they had identified the CIA operatives, disrupting their missions; other times, however, it was much more subtle and only detected through U.S. spy agencies’ own sophisticated technical countersurveillance capabilities.

In part:

More than a thousand visiting researchers from China working at US universities have left the country since the summer, according to John Demers, chief of the Department of Justice’s national security division. This exodus comes as the Department of Justice has intensified its investigations of espionage by scientists at US institutions who are secretly affiliated with the Chinese government or military.

This summer, the Department of Justice has had at least five researchers from China arrested. They all had US visas but hadn’t disclosed their affiliations with the Chinese Communist party or military in their visa applications, Demers explained at a 2 December virtual summit of the Aspen Institute, a global non-profit think tank based in Washington DC. Those handful of arrests were ‘just the tip of the iceberg’, Demers stated.

‘Between those five or six arrests, and the dozens of interviews that the [FBI]  did with individuals who were here under similar circumstances … more than 1000 [People’s Liberation Army]-affiliated Chinese researchers left the country,’ he claimed.

It appears that those departures were in addition to about a thousand Chinese graduate and postgraduate students whose visas were revoked by the State Department back in September under a ‘proclamation’ announced by outgoing President Trump. That directive prohibited individuals from studying or conducting research in the US if they were found to have links with the Chinese government or its military.

Bill Evanina, the US government’s top counterintelligence official, said at the summit that of the 1000-plus Chinese researchers who left the US he is ‘most concerned about the graduate-level students’. These researchers all came to the US ‘at the behest of the Chinese government and intelligence services’, and are going to particular universities to study specific fields that are expected to benefit China, he claimed.

***

CHICAGO (WLS) — The spy case against a former U.S. Army reservist and student at Illinois Institute of Technology wasn’t a one-man espionage show, according to federal investigators.

Ji Chaoqun’s federal court appearance in Chicago on Thursday is routine, in an anything-but-normal case. Chaoqun is charged against the backdrop of a possibly wider Chinese scheme to siphon intelligence information overseas.

Chaoqun and a similarly-accused spyman in Cincinnati, Ohio, shared the same foreign connection according to authorities, what’s known in intelligence circles as a “handler.” That link is pointed out in federal court records examined by the I-Team.

Chinese national Chaoqun, 30, is charged with providing intelligence officials in China with background check information on eight American citizens including defense contractors, federal investigators say. He had arrived in Chicago in 2013 with a student visa to study electrical engineering at IIT on the South Side but since being arrested has been locked up at the Metropolitan Correctional Center in the Loop for allegedly violating America’s Foreign Agents Registration Act.

In the Cincinnati case, Yanjun Xu is being held on charges he tried to steal trade secrets from GE Aviation, the giant military contractor and manufacturer. Xu, 40, is accused of downloading GE Aviation records onto his personal laptop and then smuggling them on a flight to China. As part of the charged scheme, federal authorities said Xu had posed as a technology association official and invited a GE Aviation employee to travel to China for a presentation. Xu became the first suspected Chinese intelligence official ever extradited to the U.S. He was arrested in Belgium and is now being detained at the federal penitentiary in Milan, Michigan.

So, what’s the connection between Cincinnati’s Xu and Chicago’s Chaoqun? While there is no indication the men were actual associates, commiserated in crime, or even ever met, the alleged link is buried in a Chicago court file.

Chaoqun’s criminal complaint cites a “clandestine and overt human source collection” used by Chinese officials to recruit spies and gather stolen intelligence.

“Chinese intelligence services conduct extensive overt, covert, and clandestine intelligence collection operations against U.S. national security entities, including private U.S. defense companies, through a network of agents within and outside of China,” states FBI Special Agent Andrew K. McKay.

According to the FBI, Chaoqun and Xu shared the very same covert, Chinese handler. U.S. authorities say the Chinese man assigned to secretly oversee both assignments, met with each alleged operative separately. They would get together in secret locations, frequently hotel rooms, but for the same alleged purpose: provide “information as a benefit to the Chinese government.”

Did General Milley discuss of of this with Li Zuocheng? Remember it is said that China was a little rattled at the potential instability of the United States and needed hand holding before and after the election of 2020 and the January 6 chaos in Washington DC. Seems, we Americans need hand holding from the woke Joint Chiefs of Staff and Pelosi.

Calls are routine? But the subject matter is hardly routine much less loyal to the homeland and the Constitution. Joint Chiefs spokesperson confirms Milley calls with China, defends them as routine Greg Nash

Joint Chiefs of Staff spokesperson Col. Dave Butler on Wednesday confirmed that Joint Chiefs Chairman Gen. Mark Milley called his Chinese counterparts after the Jan. 6 riot at the Capitol but said those calls were routine.

Butler said in a statement that Milley “regular communicates with Chiefs of Defense around the world, including China and Russia. These conversations remain vital to improving mutual understanding of U.S. national security interests, reducing tensions, providing clarity and avoiding unintended consequences or conflict.”

The statement comes in response to reports that a forthcoming book says Milley once told his Chinese counterpart that he would give a heads up before any attack on China by the U.S.

“You and I have known each other for now five years. If we’re going to attack, I’m going to call you ahead of time. It’s not going to be a surprise,” Milley said, according to an excerpt from a new book by veteran journalist Bob Woodward and The Washington Post’s Robert Costa.

“All calls from the Chairman to his counterparts, including those reported, are staffed, coordinated and communicated with the Department of Defense and the interagency,” Butler said in Wednesday’s statement.

 

 

$64 Million to Afghanistan Per Biden Admin but Add in $1.2 Billion

The Taliban is swimming in significant assets, with more to come. and China is delighted.he ultimate winner of two decades of war in Afghanistan is likely China. Secretary of State Antony Blinkin confirmed that if the Taliban behaves, the $64 million will be authorized. Further, there is the matter of nations around the world and the pledges they have made in ’emergency funds’ for Afghanistan.

At the first high-level conference on Afghanistan since the Taliban took power a month ago, Western governments, big traditional donors and others announced pledges that went beyond the $606 million that the United Nations was seeking to cover costs through the end of the year for protecting Afghans from looming humanitarian disaster.

U.N. humanitarian chief Martin Griffiths announced at the close of the ministerial meeting that more than $1.2 billion in humanitarian and development aid had been pledged. He said this included the $606 million sought in a “flash appeal” but also a regional response to the Afghan crisis that U.N. refugee chief Filippo Grandi spoke about after arriving in Kabul on a previously unannounced visit.

He wrote on Twitter that he would assess humanitarian needs and the situation of 3.5 million displaced Afghans, including over 500,000 displaced this year alone.

Officials at the U.N. refugee agency, UNHCR, have expressed concerns that more Afghans could take refuge into neighboring Pakistan and Iran, which both already have large numbers of Afghans who fled their country during the past decades of war. sourceTaliban seen with SCAR rifle commonly carried by American ...

GovExe: The aircraft and armored vehicles left behind when U.S. forces withdrew will give China—through their eager partners, the Taliban—a broad window into how the U.S. military builds and uses some of its most important tools of war. Expect the Chinese military to use this windfall to create—and export to client states—a new generation of weapons and tactics tailored to U.S. vulnerabilities, said several experts who spent years building, acquiring, and testing some of the equipment that the Taliban now controls.

To understand how big a potential loss this is for the United States, look beyond the headlines foretelling a Taliban air force. Look instead to the bespoke and relatively primitive pieces of command, control, and communication equipment sitting around in vehicles the United States left on tarmacs and on airfields. These purpose-built items aren’t nearly as invincible to penetration as even your own phone.

“The only reason we aren’t seeing more attacks is because of a veil of secrecy around these systems,” said Josh Lospinoso, CEO of cybersecurity company Shift5. “Once you pierce that veil of secrecy…it massively accelerates the timeline for being able to build cyber weapons” to attack them.

Lospinoso spent ten years in the Army conducting penetration tests against radios, small computers, and other IT gear commonly deployed in Afghanistan.

Take the radios and communications equipment aboard the Afghan Air Force C-130 transport plane captured by the Taliban. The Pentagon has assured that the equipment was disabled. But if any of it remains on the plane an adversary with time and will could pick those apart one by one.

“You now have some or all of the electronic components on that system and it’s a representative laboratory; it’s a playground for building, testing, and iterating on cyber-attacks where maybe the adversary had a really hard time” until he obtained actual copies of the gear, Lospinoso said. “It is the playground for them to develop attacks against similar items.”

Georgianna Shea, who spent five years at MITRE helping the Pentagon research and test new technologies,  said the loss of key equipment to the Taliban “exposes everything we do in the U.S., DOD: our plans of action, how we configure things, how we protect things. It allows them unlimited time and access to go through and find vulnerabilities that we may not be aware of.”

“It’s not just a Humvee. It’s not just a vehicle that gets you from point A to point B. It’s a Humvee that’s full of radios, technologies, crypto systems, things we don’t want our adversaries getting a hold of,” said Shea, now chief technologist at the Foundation for Defense of Democracies’s Transformative Innovation Lab.

Of particular concern are the electronic countermeasures gear, or ECMs, used to detect improvised explosive devices.

“Imagine the research and development effort that went into develop those ECM devices that were designed to counter IEDs,” said Peter Christensen, a former director of the U.S. Army’s National Cyber Range. “Now, our adversaries have them. They’re going to have the software and the hardware that goes with that system. But also develop capabilities to defeat or mitigate the effectiveness of those ECM devices.”

Gear that has been “demilitarized” or “rendered inoperable,” as U.S. officials described the planes and vehicles left behind, can still reveal secrets, Shea said.

“In some cases, this equipment was fielded with the assumption we would have gates and guards to protect it. When it was developed, no one thought the Chinese would have it in their cyber lab, dissecting it, pulling it apart.”

Once an attacker has physical control of a device, little can stop her from discovering its vulnerabilities—and there are always vulnerabilities, Shea said.

Under current acquisition practices, most new defense gear is not tested for vulnerabilities until late in the design process. Testers often receive far too little time to test comprehensively. Sometimes they get just two weeks, she said, and yet “they always find something. Always.”

“Regardless of the previous testing that’s been done on compliance, they always find something: always… “They’re very backlogged and don’t have an unending amount of resources,” she said. So you have to schedule development with these testers. There’s not enough resources to test it to the depth and breadth that it should be to understand all of the vulnerabilities.”

Plans to fix newly discovered vulnerabilities “were often inconsistent or inadequate,” Christensen said.

Lospinoso, who spent years conducting such tests for the Army, still performs penetration testing for the U.S. military as a contractor. He says a smart hacker can usually find useful vulnerabilities  in hardware “within hours.”

When such a network attack disables a radio or a truck, troops are generally not trained to do anything about it. They may not even realize that they have been attacked, and may chalk up problems to age or maintenance problems.

“Every time we run an attack against a system, knocked out a subcomponent or have some really devastating effect that could cause loss of an asset—every time, the operator in the cockpit says, ‘We do not have operating procedures for what you just did,’” Lospinoso said.

Little of this is new. In 2017, the Government Accountability Office highlighted many of these concerns in a blistering report.

More than just insight into network vulnerabilities, the abandoned vehicles and gear will help China understand how U.S. forces work with partner militaries, said N. MacDonnell Ulsch, the CEO and chief analyst of Phylax Analytics.

“If you were to take all of the technology that was currently deployed in Afghanistan by the [United States] and you made an assessment of that, you have a point in time and a point in place reference of what the status quo is; what technology is being used, how much it costs, what’s it capable of doing and you realize it’s going to a developing nation,” Ulsch said.

China can use the knowledge to develop their weapons and tactics, but also to give their arms-export sales team an edge, he said. The Taliban have highlighted their nascent partnership with China as perhaps their most important foreign diplomatic effort. China, meanwhile, has already begun giving millions in aid to the new regime.

Whatever vulnerabilities China does discover will likely imperil U.S. troops for years to come, Lospinoso said.

“There is a zero percent chance we will go back and re-engineer” all of the various systems with serious cyber vulnerabilities, he said. “We are stuck with billions and billions in weapon systems that have fundamental flaws.”

 

Deputy CIA Director Says Here Comes al Qaeda Again

Leaving Afghanistan and abandoning Bagram Air Base immediately created a terror state. Did anyone contemplate that?

Meanwhile, the Taliban has named Mohammad Hassan Akhund, a longtime ally of Taliban founder Mullah Mohammad Omar, to serve as the country’s acting prime minister. Akhund, who was the Taliban’s foreign minister before the U.S. invasion in 2001, told the United Nations in 1999 that “we will never give up Osama [bin Laden] at any price.”Hibatullah Akhundzada, considered the “emir” of Afghanistan by the Taliban, is a strong al Qaeda ally and proud father of a suicide bomber known as the “commander of the faithful.” Current al Qaeda leader Ayman Zawahiri reportedly swore allegiance to him as the “emir of the believers” in 2016.

Al Qaeda could reconstitute in Afghanistan and regain the capability to threaten the U.S. in “one to two” years, intelligence chiefs said Tuesday, revising downward estimates that were previously issued by the Pentagon.

source

“The current assessment, probably conservatively, is one to two years for al Qaeda to build some capability to at least threaten the homeland,” said Lieutenant General Scott Berrier, director of the Defense Intelligence Agency (DIA), at an annual summit hosted by the Intelligence and National Security Alliance, with panels moderated by CBS News.

“That said, DIA is not going to take…their eye off the ball of terrorism,” Berrier said.

CIA deputy director David Cohen said at the same event that the agency was keeping “a very keen watch” on the terror network’s activities in Afghanistan, adding there is evidence its militants are returning to the country.

“[W]e are already beginning to see some of the indications of some potential movement of al Qaeda to Afghanistan,” Cohen said, “but it’s early days, and we will obviously keep a very close eye on that.”

The Taliban, who seized control of Afghanistan in a stunningly rapid takeover last month, are known to have maintained close ties with al Qaeda and are suspected by analysts of harboring senior operatives.

Both U.S. officials said Tuesday that intelligence agencies were working on ways to continue intelligence collection without a troop presence or embassy in the country, acknowledging current capabilities had been meaningfully reduced by the U.S. withdrawal. Lawmakers, counterterrorism experts and former intelligence officials have expressed concern over how reliable so-called over-the-horizon capabilities can be without networks of informants to guide them.

“We’re thinking about ways how to gain access back into Afghanistan with all kinds of sources,” Berrier said. “We are prioritizing that effort.”

Cohen said the agency would seek to maintain a network of intelligence assets within Afghanistan, but that operating from a distance and absent a physical presence was not a “new” challenge for the intelligence community.

“As we work from over the horizon principally…we will also look for ways to work from within the horizon, to the extent that is possible,” Cohen said. “But we will approach this in the way that we have approached the counterterrorism mission in many places around the world for a number of years, and I think, as a community, we continue to get better and better at doing that.”

Speaking at the summit on Monday, Director of National Intelligence Avril Haines said Afghanistan did not currently top the list of international terror threats, saying the “greatest threat” came from militant groups operating in Yemen, Somalia, Iraq and Syria.

The U.S. has Frozen $9.5 Billion in Assets Belonging to Afghanistan Central Bank

The U.S. has frozen nearly $9.5 billion in assets belonging to the Afghan central bank and stopped shipments of cash to the nation as it tries to keep a Taliban-led government from accessing the money, an administration official confirmed Tuesday.This amounts to roughly one-third of the country’s annual economic output. International aid flows represented roughly 43 percent of Afghanistan’s economy in 2020, according to the World Bank.Afghanistan Economy: Hard to recover - CGTN

The official said that any central bank assets that the Afghan government has in the U.S. will not be available to the Taliban, which remains on the Treasury Department’s sanctions designation list. Additionally, as the Taliban began their march through Afghanistan, the Biden administration cancelled a planned shipment of physical dollars due to be delivered to the country and directed the International Monetary Fund to renege on its long-planned release of funds to Afghanistan. More detail and context here. 

The United States’ principal competitors in Beijing and Moscow see a potential opening with the U.S. departure. While there is little thought that China or Russia are interested in aiding Afghanistan’s development – instead seeing the country as both a playground for great power influence and, on the part of Beijing, a mercantilist maneuver critical to clinching its Belt-and-Road initiative in South Asia – it is possible that China and Russia can actually leverage U.S. sanctions and the restrictions major financial institutions will face in dealing with Afghanistan to empower the Taliban and their own interests. The Taliban meanwhile may welcome China and Russia filling the void of western finance and aid while also taking advantage of the departure of U.S. restrictions on poppy production to return to state controlled narcotics sales, furthering enriching themselves while continuing to impoverish the Afghan people.

Beyond the reserves, the United States also sends roughly $3 billion per year in support for the Afghan military, or roughly 15 percent of the country’s gross domestic product. The funding can only be spent if the secretary of defense “certifies to Congress that the Afghan forces are controlled by a civilian, representative government that is committed to protecting human rights and women’s rights,” according to a congressional summary of the legislation. This funding is expected to stop flowing as well, along with smaller pots of money, such as $20 million for recruiting women to the Afghan national security forces.

About 80 percent of Afghanistan’s budget is funded by the United States and other international donors, John Sopko, the special inspector general for Afghanistan reconstruction, told Reuters in the spring. A spokesman for the White House Office of Management and Budget declined to comment on the status of congressionally approved funding for Afghanistan. NATO Secretary General Jens Stoltenberg said at a news conference Tuesday that NATO has suspended aid to the Afghan government as well. “We have of course suspended all support, financial and other kinds of support, to the Afghan government, because there is no Afghan government for NATO to support,” Stoltenberg said. “No money is transferred; no support is provided.” More context here. 

Meanwhile, China, Pakistan, Iran and Russia will keep their embassies in Kabul open and functional while most other nations have shuttered and evacuated their embassy operations. China is making financial moves to support the Taliban while doing the same to takeover the now former US air base in Bagram.

The UN Secretary General held a half day conference seeking to raise the $606 million which humanitarian agencies say is urgently needed to provide life-saving aid to millions of Afghans over the four final months of the year.

Among other things, the money is needed for critical food and livelihood assistance for nearly 11 million people and essential health services for 3.4 million.

‘Starvation’

Guterres stressed that Afghans were experiencing “one of the worst humanitarian crises in the world” even before the Taliban takeover on August 15.

Some 40 percent of the country’s GDP was already drawn from foreign funding, and half of the population was already dependent on humanitarian aid, according to the UN.

Afghanistan is also facing a devastating drought and mass displacement in addition to the impact of Covid-19.

Fears now abound that other countries’ reluctance to deal with the Taliban could push Afghanistan over the edge.

Guterres announced that the UN would release $20 million from its Central Emergency Response Fund to support the humanitarian operation in Afghanistan.

Under the leadership of acting central bank governor, Haji Mohammad Idris, a Taliban loyalist who has no formal financial training, the central bank has been moving to restrict dollar outflows amid a pause in foreign aid and a scramble by some Afghanis to get savings out of the country.

Further controls are expected to hasten the afghani’s depreciation against the dollar, exacerbating inflation in a country where more than a third of the population lives on less than $2 a day.

“It’s a matter of concern that the remaining physical cash of U.S. dollars is going to reduce further,” said an Afghani banker. “With the restrictions we are predicting the dollar will reach more than 100 afghanis to the dollar.”