13 Mac

COMPARATIVE OVERVIEW BETWEEN TWO MAJOR SOUTHEAST ASIAN NATIONAL OIL COMPANIES (NOCs): PETRONAS OF MALAYSIA AND PERTAMINA OF INDONESIA

Both organizations play crucial roles in their respective countries' economies, energy security, and global energy markets. The infographic highlights several key aspects: founding year, total assets, oil production, annual revenue, and operational focus. Below is a more detailed explanation and deeper analysis of each element shown in the poster.


Detailed Explanation of the Poster: PETRONAS vs PERTAMINA

1. Overview of National Oil Companies (NOCs)

National oil companies are government-owned corporations responsible for managing a country’s petroleum resources. Their responsibilities usually include:

  • Exploration of oil and natural gas reserves
  • Production and extraction of hydrocarbons
  • Refining crude oil into usable fuels
  • Distribution and marketing of petroleum products
  • Strategic management of national energy security

Both PETRONAS and PERTAMINA were created to ensure that their countries maintain control over their natural energy resources instead of leaving them entirely to foreign oil companies.

However, their development strategies and global positions differ significantly.


2. Founding Year and Historical Context

PETRONAS (Malaysia) – Founded in 1974

PETRONAS, officially known as Petroliam Nasional Berhad, was established in 1974 after Malaysia passed the Petroleum Development Act.

This law gave PETRONAS exclusive ownership and rights over Malaysia’s petroleum resources, including offshore oil and gas fields.

Key historical factors behind PETRONAS' creation:

  • Malaysia wanted to regain control over oil resources previously dominated by international oil companies.
  • The government aimed to ensure petroleum profits would contribute directly to national development.
  • PETRONAS was structured to operate with commercial independence, allowing it to compete globally.

Over the decades, PETRONAS transformed from a national energy manager into a global integrated oil and gas corporation.


PERTAMINA (Indonesia) – Founded in 1957

PERTAMINA (Perusahaan Pertambangan Minyak dan Gas Bumi Negara) was founded in 1957, making it significantly older than PETRONAS.

Indonesia had a long history of oil production dating back to the Dutch colonial period, when companies such as Royal Dutch Shell operated in the region.

After independence, the Indonesian government nationalized many oil operations and consolidated them into a national company.

However, Pertamina’s early history included challenges such as:

  • Political instability
  • Rapid expansion without financial control in the 1970s
  • Debt crises that required government restructuring

Despite these challenges, Pertamina remains a central pillar of Indonesia’s energy system.


3. Total Assets

PETRONAS

US$157 Billion in assets

Assets represent the total value of everything the company owns, including:

  • Oil and gas fields
  • LNG plants
  • Refineries
  • Offshore drilling infrastructure
  • Shipping fleets
  • International energy investments

PETRONAS has invested heavily in global upstream and downstream operations, including:

  • Canada (LNG Canada project)
  • Australia (large LNG facilities)
  • Brazil (deepwater exploration)
  • Turkmenistan (gas projects)
  • Middle East energy developments

These international investments significantly increased PETRONAS’ asset value.


PERTAMINA

US$85 Billion in assets

Although still very large, Pertamina's assets are smaller than PETRONAS. This difference is partly due to:

  • Less aggressive international expansion
  • Greater focus on domestic refining and fuel distribution
  • Declining domestic oil production in Indonesia

However, Pertamina still manages:

  • Numerous refineries
  • National fuel distribution networks
  • Large domestic oil and gas fields
  • Petrochemical facilities

4. Oil Production Capacity

PETRONAS

2.4 million barrels of oil equivalent per day

This figure includes both:

  • crude oil
  • natural gas production

PETRONAS operates in multiple international energy basins, which helps diversify production sources.

Major production regions include:

  • Malaysia offshore fields
  • Africa
  • Middle East
  • South America
  • Australia

Additionally, PETRONAS is one of the world’s leading exporters of liquefied natural gas (LNG).

Malaysia itself ranks among the largest LNG exporters globally.


PERTAMINA

0.8 million barrels per day

Indonesia used to be a major oil exporter and was once a member of OPEC.

However, several factors reduced production:

  • Mature oil fields
  • Limited discovery of new large reserves
  • Increasing domestic consumption

As a result, Indonesia has transitioned into a net oil importer, meaning it imports more oil than it produces.

This significantly affects Pertamina’s production figures.


5. Annual Revenue

PETRONAS

US$90 Billion per year

Revenue comes from multiple sources:

  • crude oil sales
  • natural gas exports
  • LNG trading
  • petrochemical products
  • international energy trading

PETRONAS is also one of the largest contributors to Malaysia’s government revenue, historically providing a significant portion of national income through dividends and taxes.


PERTAMINA

US$72 Billion per year

Pertamina generates large revenues primarily through:

  • fuel sales across Indonesia
  • refinery operations
  • domestic oil and gas production
  • shipping and distribution networks

Indonesia’s large population of over 270 million people creates enormous demand for gasoline, diesel, and other petroleum products.

This large domestic market supports Pertamina’s revenue even with lower oil production.


6. Operational Focus

PETRONAS – Global Expansion Strategy

The poster highlights that PETRONAS operates in more than 30 countries worldwide.

Its business model includes:

  • upstream exploration
  • LNG export
  • downstream petrochemical production
  • global energy trading

PETRONAS has positioned itself as a global energy multinational, competing with international oil companies.

One of its biggest achievements is becoming a global LNG leader.


PERTAMINA – Domestic Market Dominance

Pertamina’s strategy focuses on energy security for Indonesia.

Its key responsibilities include:

  • maintaining national fuel supply
  • managing thousands of gas stations (SPBU)
  • operating refineries across Indonesia
  • distributing fuel across an archipelago of over 17,000 islands

This logistical challenge is enormous and requires a vast infrastructure network.


7. Structural Differences in Strategy

PETRONAS Strategy

PETRONAS emphasizes:

  • international expansion
  • high-value energy exports
  • global investment diversification

This approach reduces reliance on domestic oil reserves and allows PETRONAS to generate revenue worldwide.


PERTAMINA Strategy

Pertamina focuses on:

  • national energy supply
  • domestic refining capacity
  • fuel distribution to support economic growth

This makes Pertamina more closely tied to Indonesia’s internal energy needs.


8. Strategic Significance for Their Countries

PETRONAS and Malaysia

PETRONAS plays a major role in:

  • funding government programs
  • supporting national development
  • strengthening Malaysia’s global energy presence

It also contributes to Malaysia’s reputation as a major LNG exporter.


PERTAMINA and Indonesia

Pertamina is essential for:

  • ensuring stable fuel supply
  • supporting Indonesia’s large transportation sector
  • maintaining national energy security

Given Indonesia’s massive population and geography, Pertamina’s logistics operations are among the most complex in the world.


Final Key Insight from the Poster

The infographic illustrates a key contrast:

PETRONAS

  • Younger company
  • More globally integrated
  • Higher production and assets

PERTAMINA

  • Older company
  • Focused on domestic energy supply
  • Large but less internationally diversified

Both companies are critical pillars of their national economies, but they represent two different models of national oil company development.

HOW CAN A COUNTRY THAT IS MILITARILY WEAKER IN CONVENTIONAL TERMS STILL DETER A SUPERPOWER AND MAKE IT THINK TWICE BEFORE INITIATING WAR?


In the past, Iran clearly understood the global balance of military power. Its leaders were fully aware that if a direct, conventional war were to occur, they would struggle to compete with Western powers, especially the United States. When comparing military strength in terms of advanced fighter jets, aircraft carriers, satellite surveillance, and cutting-edge missile defense systems, the technological gap between Iran and the United States — along with its allies — was extremely wide. The United States possesses one of the most powerful militaries in the world, supported by a massive defense budget, global military bases, and highly advanced research and development in defense technology.

If Iran had chosen to confront such a force using traditional methods of warfare — tank battles on land, dogfights between fighter jets in the air, or direct naval engagements between large fleets — the outcome would likely have been heavily unfavorable to Iran. The United States operates fleets of aircraft carriers capable of projecting power thousands of kilometers away from its own shores. These carriers alone can carry dozens of advanced fighter aircraft, supported by destroyers, cruisers, and submarines equipped with sophisticated missile systems.

Given this reality, Iran’s leadership had to confront an important strategic question: how can a country that is militarily weaker in conventional terms still deter a superpower and make it think twice before initiating war?

The answer began to take shape after the end of the Iran–Iraq War (1980–1988). That conflict, which lasted nearly eight years, was one of the longest and most devastating wars of the late twentieth century. Hundreds of thousands of people were killed, and both countries suffered enormous economic and infrastructural damage. The war served as a major lesson for Iran’s military planners. They realized that relying solely on traditional military structures and equipment would leave them vulnerable in any future confrontation with technologically superior adversaries.

As a result, Iran began to fundamentally rethink its military doctrine. Rather than attempting to match Western powers weapon-for-weapon, Iran gradually shifted toward a completely different strategic philosophy known as Asymmetric Warfare.

Asymmetric warfare is based on a simple but powerful principle: do not confront your opponent where they are strongest; instead, exploit the areas where they are vulnerable. This strategy is often adopted by smaller or less technologically advanced forces when facing much stronger opponents. By using unconventional tactics, mobility, and strategic creativity, a weaker power can significantly increase the cost and complexity of war for its adversary.

Over time, Iran developed several key pillars that form the foundation of this asymmetric strategy.


1. Economic Attrition: Forcing the Enemy to Spend More

One of Iran’s most important strategic ideas is to turn the economics of war against its adversaries.

Building advanced fighter jets, stealth aircraft, or large warships requires enormous financial investment, sophisticated industrial capacity, and access to advanced technologies. Instead of trying to compete directly in those areas, Iran focused heavily on producing ballistic missiles, cruise missiles, and large numbers of attack drones, particularly loitering munitions sometimes referred to as “kamikaze drones.”

These systems are relatively inexpensive compared to the sophisticated air-defense systems used to intercept them. For example, a single drone might cost tens of thousands of dollars, while the missile used to shoot it down could cost hundreds of thousands — or even millions — of dollars.

When launched in large numbers, these drones and missiles create a strategic dilemma for defenders. If they intercept every incoming threat, they may spend vast sums of money very quickly. If they fail to intercept them, the drones may damage infrastructure, military bases, or economic targets.

Over time, this approach can place significant financial and logistical pressure on technologically advanced militaries that rely on expensive defensive systems.


2. Building a Network of Regional Allies and Proxies

Another key element of Iran’s strategy is the development of relationships with armed groups and political movements across the Middle East.

Over several decades, Iran has cultivated ties with various organizations in countries such as Lebanon, Iraq, Syria, and Yemen. These groups may share ideological alignment, strategic interests, or political cooperation with Iran.

From a strategic perspective, this creates a multi-front environment. If a major conflict were to break out, Iran’s adversaries might not face a single battlefield. Instead, they could encounter simultaneous pressures in multiple locations across the region.

This situation forces opponents to divide their attention, resources, and military capabilities. Rather than concentrating their strength in one theater of war, they may need to respond to various threats occurring at different distances and in different environments.

Such a dynamic can significantly complicate military planning and increase the overall cost and difficulty of sustained military operations.


3. Strategic Geography: Control Near a Global Energy Chokepoint

Iran’s geographical position also plays a crucial role in its strategic calculations.

The country lies next to the Strait of Hormuz, one of the most critical maritime chokepoints in the world. A large percentage of global oil exports passes through this narrow waterway every day, making it vital to international energy markets.

Because so much of the world’s energy supply depends on safe passage through this strait, any disruption there could have immediate global consequences. Even the possibility of instability in the region can cause oil prices to rise sharply, affecting transportation, manufacturing, and the broader global economy.

This geographic reality gives Iran a significant form of strategic leverage. Any major conflict in the region could threaten the stability of this crucial shipping route, which in turn would create economic and political pressures far beyond the Middle East.


4. Swarm Tactics in Naval Warfare

When it comes to naval power, the United States is known for its large and technologically advanced fleet, including massive aircraft carriers that serve as floating airbases.

Iran, however, has chosen a different approach. Instead of attempting to build large warships comparable to those of major naval powers, Iran has invested in large numbers of small, fast attack boats equipped with missiles, torpedoes, or explosives.

In narrow and complex waterways such as the Persian Gulf, these small vessels can maneuver quickly and approach larger ships from multiple directions at once. This tactic is sometimes described as a “swarm attack”, where numerous smaller units converge simultaneously on a much larger target.

Although each individual boat may not be powerful on its own, the combined effect of many fast-moving attackers can create significant challenges for larger vessels. Coordinated attacks from multiple angles can overwhelm defensive systems and complicate a ship’s ability to respond effectively.


The Strategic Objective

Importantly, the ultimate objective of Iran’s strategy is not necessarily to defeat a superpower like the United States in a traditional battlefield victory.

Instead, the strategy is designed to ensure that any potential war becomes extremely costly, prolonged, and politically complicated for the opposing side. By increasing the economic burden, logistical challenges, and regional instability associated with war, Iran seeks to raise the overall price of military confrontation.

In strategic terms, this approach focuses on deterrence through difficulty. If the potential costs of war become too high — economically, militarily, and politically — decision-makers in opposing countries may conclude that the conflict is not worth pursuing.

In this sense, victory is not measured solely by battlefield success. Rather, it is achieved by creating conditions in which the opponent decides that continuing the conflict would be more damaging than avoiding it altogether.

11 Mac

HOW TO IDENTIFY A TIKTOK “CUT-PRICE” LINK VS A SCAM

Scammers often spread “cut-price” TikTok links promising huge discounts (70–95% off) to trick people into clicking malicious websites. These scams can lead to financial loss, stolen personal data, or hacked accounts. Understanding how these scams work will help you avoid becoming a victim.


1. Check the Domain Name Carefully

The domain (website address) is the most important indicator.

Legitimate TikTok Domains

Official TikTok links normally use domains such as:

  • tiktok.com
  • www.tiktok.com
  • vt.tiktok.com
  • shop.tiktok.com

Examples of legitimate links:

https://vt.tiktok.com/Zxxxx
https://www.tiktok.com/@username/video/xxxx
https://shop.tiktok.com/product/xxxx

Suspicious or Scam Domains

Scammers create fake domains that look similar to TikTok:

tiktok-sale.my
tiktokpromo.store
tiktokclearance.shop
tiktok-deals.net
tiktok-voucher.xyz

These websites are not owned by TikTok.

⚠️ Even if the name contains “tiktok”, it does not mean it is official.


2. Unrealistically Low Prices

Scam links often advertise extremely cheap prices.

Example comparison:

Product Real Price Scam Price
iPhone $900 $49
AirPods $199 $15
Gaming Laptop $1500 $120

Scammers rely on impulse buying behavior. They use phrases such as:

  • “Flash Sale 90% OFF”
  • “Limited stock – only 5 left”
  • “TikTok Clearance Warehouse”
  • “Today only”

These messages are designed to create urgency and pressure you into clicking quickly.


3. The Link Opens a Fake Website

A legitimate TikTok shop link usually:

  • Opens inside the TikTok app, or
  • Redirects to TikTok’s official website.

A scam link often opens a fake e-commerce page that imitates TikTok Shop.

Signs of a fake website:

  • Poor design or broken layout
  • Fake product reviews
  • Countdown timers
  • No company information
  • No contact details
  • No return policy

Sometimes scammers copy the exact TikTok interface to look convincing.


4. Requests for Sensitive Information

Many scam pages try to steal sensitive data.

They may ask for:

  • Credit card details
  • Bank account numbers
  • One-Time Password (OTP/TAC)
  • TikTok login credentials
  • Personal identity information

These scams are called phishing attacks.

TikTok will never ask for your bank password or verification code through external links.


5. Shortened Links to Hide the Real Address

Scammers often use URL shorteners to disguise malicious links.

Examples:

bit.ly/xxxx
tinyurl.com/xxxx
shorturl.at/xxxx

These links hide the real destination website.

If someone sends you a shortened link claiming to be a TikTok promotion, be cautious before clicking.


6. Suspicious TikTok Accounts Promoting the Link

Many scam links are promoted through fake TikTok accounts.

Signs of suspicious accounts:

  • Very few followers
  • Recently created account
  • Repeated promotional videos
  • Comments disabled
  • Spam comments saying “I received mine!”

They often direct users to:

  • “Click the link in bio”
  • “Order through the website only”

This tactic helps scammers avoid TikTok’s built-in security systems.


7. Fake TikTok Shop Checkout Pages

Some scam websites create fake payment pages that resemble legitimate online stores.

Warning signs include:

  • Only one payment method (credit card)
  • No secure payment gateway
  • No HTTPS security
  • Payment page redirects multiple times

Legitimate TikTok Shop payments are usually processed through trusted payment systems.


8. Lack of Seller Information

Real online stores provide clear business details.

A legitimate shop usually has:

  • Business name
  • Customer support
  • Return policy
  • Verified seller badge
  • Customer reviews

Scam websites usually hide all business information.


9. Verify the Product Inside the TikTok App

The safest method is to check directly inside TikTok.

Steps:

  1. Open the TikTok app
  2. Go to TikTok Shop
  3. Search for the product
  4. Check the seller profile

Look for:

  • Seller ratings
  • Customer reviews
  • Number of sales
  • Verified seller status

If the product cannot be found in TikTok Shop, the link may be suspicious.


10. Use Security Tools to Check the Link

Before opening a suspicious link, you can scan it using security services:

Examples:

  • Google Safe Browsing
  • VirusTotal
  • URLVoid

These tools analyze whether a link is known for phishing or malware.


11. Psychological Tricks Used by Scammers

Scammers rely heavily on human psychology.

Common manipulation techniques include:

Urgency

“Only 10 minutes left!”

Scarcity

“Only 3 items remaining!”

Authority

“Official TikTok Warehouse Clearance”

Social Proof

“10,000 units sold today”

These tactics push people to act quickly without verifying the link.


12. Common TikTok “Cut Price” Scam Scenario

A typical scam process works like this:

  1. You see a TikTok video showing extremely cheap products.
  2. The video includes a link in the caption or bio.
  3. The link redirects to a fake online store.
  4. You place an order and pay.
  5. The item never arrives.

Sometimes scammers also steal your credit card details.


Conclusion

To protect yourself from TikTok cut-price scams, always check:

  1. The domain name (must be official TikTok domains)
  2. Unrealistic discounts
  3. Fake websites
  4. Requests for sensitive information
  5. Suspicious seller accounts

The safest rule is:

Only purchase products directly inside the TikTok app through TikTok Shop.

09 Mac

THE DIFFERENCE BETWEEN THE ISLAMIC FINANCIAL SYSTEM AND THE CONVENTIONAL FINANCIAL SYSTEM

1. Philosophical and Ethical Foundations

Islamic Financial System

The Islamic financial system is built upon the principles of Sharia, which derive from the Al-Qur'an and the Hadith.

Its philosophy is not purely economic; it integrates ethical, social, and spiritual objectives.

Key goals include:

  • Justice and fairness in financial dealings
  • Equitable distribution of wealth
  • Prevention of exploitation
  • Social welfare and economic balance
  • Ethical economic development

In Islam, wealth is viewed as a trust from God, and financial activities must comply with moral obligations.

This means financial transactions must promote mutual benefit and fairness, not exploitation.


Conventional Financial System

The conventional financial system is rooted in modern economic theory, particularly capitalism and neoclassical economics.

Its philosophical foundation emphasizes:

  • Profit maximization
  • Market efficiency
  • Capital accumulation
  • Interest-based lending
  • Financial market expansion

Ethical considerations may exist through regulations, but they are not structurally embedded as religious obligations.

The system prioritizes economic growth and return on investment, often through debt-based financial mechanisms.


2. The Concept of Interest

Islamic Finance: Prohibition of Interest

One of the most defining features of Islamic finance is the prohibition of Riba.

Riba refers to any guaranteed increase on a loan or debt.

Islam prohibits riba because it is believed to:

  • Create unjust enrichment
  • Exploit borrowers
  • Increase wealth inequality
  • Encourage debt-based economic structures

For example:

If someone borrows $10,000 and must repay $11,000 regardless of outcome, that extra $1,000 is considered riba.

Islamic finance requires that profits must come from legitimate trade, investment, or asset-backed activities, not from lending money at interest.


Conventional Finance: Interest as the Core Mechanism

In conventional finance, interest is a central mechanism of financial intermediation.

Banks operate by:

  1. Accepting deposits
  2. Lending money to borrowers
  3. Charging interest on loans
  4. Paying lower interest to depositors

The difference between lending and deposit rates creates the bank’s profit margin.

Interest is justified economically as compensation for:

  • Time value of money
  • Risk of default
  • Opportunity cost

However, critics argue that excessive debt and interest-based systems can contribute to financial crises and wealth inequality.


3. Risk Sharing vs Risk Transfer

Islamic Finance: Risk Sharing

Islamic finance emphasizes risk-sharing partnerships rather than risk transfer.

This means both parties in a financial transaction share:

  • profit
  • loss
  • business risk

Key Islamic contracts include:

Mudarabah
An investor provides capital while an entrepreneur manages the business. Profits are shared based on an agreed ratio.

Musharakah
All partners contribute capital and share profits and losses proportionally.

This structure encourages:

  • responsible investment
  • careful risk management
  • genuine economic productivity

Conventional Finance: Risk Transfer

Conventional banking primarily operates on risk transfer.

When a borrower takes a loan:

  • the borrower bears most of the risk
  • the bank receives interest regardless of business performance

Even if the borrower suffers financial losses, the debt must still be repaid.

This structure creates asymmetrical risk distribution, where lenders face limited downside compared to borrowers.


4. Asset-Backed vs Debt-Based Transactions

Islamic Finance: Asset-Based Transactions

Islamic finance requires financial transactions to be linked to real economic activity and tangible assets.

Money itself cannot generate money without involvement in trade or investment.

For example:

Murabaha

Instead of lending money for a purchase:

  1. The bank buys the asset (e.g., a house or equipment)
  2. The bank sells it to the customer at a marked-up price
  3. The customer pays in installments

This ensures the transaction is based on real trade rather than pure lending.

Another example is:

Ijarah

The bank purchases an asset and leases it to the client.

Ownership and asset risk remain linked to the financier.


Conventional Finance: Debt-Based Transactions

In conventional finance, transactions are often debt-based.

A bank simply provides money as a loan, and the borrower repays with interest.

Financial markets also include complex instruments such as:

  • derivatives
  • speculative contracts
  • leveraged financial products

These instruments may have no direct connection to real economic assets, which can amplify systemic financial risks.


5. Prohibition of Excessive Uncertainty and Speculation

Islamic finance prohibits:

Gharar

and

Maysir

These prohibitions aim to prevent:

  • deceptive contracts
  • gambling-like speculation
  • extreme financial risk

For example, many speculative derivatives or betting-style financial instruments are considered incompatible with Islamic principles.

Conventional finance allows such instruments as part of financial market activity.


6. Ethical Investment Restrictions

Islamic finance restricts investment in industries considered harmful or unethical.

Prohibited sectors include:

  • alcohol production
  • gambling businesses
  • pornography
  • weapons manufacturing (in some interpretations)
  • unethical entertainment industries

Islamic financial institutions screen investments through Sharia supervisory boards to ensure compliance.

Conventional finance generally allows investment in any legal industry.


7. Social Justice and Wealth Distribution

Islamic finance incorporates mechanisms designed to promote social justice and wealth redistribution.

Examples include:

Zakat

Zakat requires Muslims to donate a portion of wealth annually to support the poor.

Another concept is:

Waqf

Assets are dedicated permanently for public benefit, such as funding schools, hospitals, or community services.

Conventional finance does not structurally include such redistribution mechanisms.


8. Stability and Financial Crisis Perspective

Supporters of Islamic finance argue that its principles can improve financial stability because:

  • asset-backed financing reduces speculative bubbles
  • risk-sharing discourages excessive debt
  • ethical investment screens reduce harmful industries
  • leverage levels tend to be lower

Some economists believe these features could help mitigate financial crises similar to the Global Financial Crisis, which was partly driven by excessive debt and speculative financial instruments.

However, Islamic finance still operates within global financial markets and may face similar systemic pressures.


Key Structural Comparison

Aspect Islamic Finance Conventional Finance
Interest Prohibited Allowed
Risk Shared between parties Transferred to borrower
Transactions Asset-based Debt-based
Speculation Restricted Allowed
Investment sectors Ethical/halal only All legal sectors
Social responsibility Built into system External regulation

Conclusion

The fundamental difference between Islamic finance and conventional finance lies in how financial returns are generated and how risks are distributed.

Islamic finance seeks to create a system that aligns economic activity with ethical principles, real assets, and shared responsibility, while conventional finance prioritizes financial efficiency, credit expansion, and interest-based capital growth.

Both systems play important roles in the global economy, but they represent different philosophies of how money, risk, and wealth should function in society.

THE HISTORY OF THE MONGOL EMPIRE AND ITS RELATIONSHIP WITH THE ISLAMIC WORLD

The Mongol Empire was one of the largest empires in world history. It began in the early 13th century and stretched from East Asia to Eastern Europe and the Middle East. Initially, the Mongol invasions caused immense destruction in Muslim lands. However, over time many Mongol rulers converted to Islam, eventually creating powerful Islamic Mongol states.

This transformation from conquerors to Muslim rulers is one of the most remarkable events in world history.


1. Origins of the Mongol Empire

The Mongol Empire was founded by:

Genghis Khan

Born around 1162 in Mongolia, Genghis Khan united the scattered Mongol tribes in 1206 and became their supreme leader.

Characteristics of Mongol society

  • Nomadic lifestyle
  • Expert horse riders
  • Highly disciplined military structure
  • Strong loyalty to their leader

Their army was extremely effective because of:

  • fast cavalry units
  • advanced military strategy
  • psychological warfare

Within decades, they built the largest contiguous land empire in history.


2. Mongol Expansion Toward the Islamic World

The Mongol invasion of Muslim territories began when Genghis Khan attacked the:

Khwarazmian Empire

around 1219–1221.

Cause of the conflict

A Mongol trade caravan was killed in the Khwarazmian city of Otrar, and the ruler executed Mongol envoys.

This was considered a severe insult, so Genghis Khan launched a massive invasion.

Major cities destroyed

Many major Islamic cities were devastated:

  • Bukhara
  • Samarkand
  • Urgench

These invasions caused enormous destruction and loss of life.


3. The Fall of Baghdad (1258)

One of the most catastrophic events in Islamic history occurred in 1258.

The Mongol army led by:

Hulagu Khan

attacked the capital of the Abbasid Caliphate.

What happened in Baghdad

  • The city was besieged for several weeks
  • The Abbasid army collapsed quickly
  • Libraries, mosques, and institutions were destroyed
  • The Caliph Al-Musta'sim Billah was killed

The destruction of Baghdad ended over 500 years of Abbasid rule.

Many historians describe this event as one of the greatest tragedies in Islamic civilization.


4. The Mongol Defeat by the Mamluks

The Mongol expansion into the Muslim world was finally stopped in 1260.

The Muslim army led by:

Sultan Qutuz
and
Baibars

defeated the Mongols at the:

Battle of Ain Jalut

in present-day Palestine.

This was the first major Mongol defeat and prevented them from conquering Egypt and North Africa.


5. Conversion of Mongol Rulers to Islam

Although the Mongols initially destroyed many Islamic cities, many Mongol rulers later converted to Islam.

This transformation significantly changed the political landscape.

One of the most famous conversions was:

Ghazan Khan

in 1295.

After his conversion:

  • Islam became the official religion of the Ilkhanate
  • Islamic law and institutions were restored
  • Mosques and schools were rebuilt

This marked a major turning point where Mongol rulers became protectors of Islamic civilization.


6. Mongol Islamic Empires

After the Mongol Empire fragmented, several Mongol states emerged.

Some of them adopted Islam as their main religion.

Major Mongol Islamic states

1. Ilkhanate (Persia)

Founded by Hulagu Khan and later Islamized under Ghazan Khan.

2. Golden Horde

A powerful Mongol state in Russia whose rulers later embraced Islam.

3. Chagatai Khanate

Parts of this state eventually adopted Islam as well.

These states played an important role in spreading Islam across Central Asia and parts of Eastern Europe.


7. Cultural Impact of Mongol Rule

Despite their early destruction, Mongol rule also led to major developments.

Trade expansion

The Mongols created a stable trade network across Eurasia known as the Pax Mongolica.

This allowed:

  • merchants to travel safely
  • cultural exchange between East and West
  • growth of the Silk Road

Knowledge exchange

Ideas and technologies spread across regions including:

  • medicine
  • astronomy
  • military technology
  • paper and printing

8. Legacy of the Mongol Islamic States

The Mongols eventually became part of Islamic civilization.

Their influence helped shape later Muslim empires such as:

  • Timurid Empire
  • Mughal Empire

The Mughal Empire, in particular, descended from Mongol and Turkic roots.


Conclusion

The history of the Mongols and Islam is a story of conflict, transformation, and integration.

Initially, Mongol invasions devastated many Muslim lands and destroyed major centers of Islamic civilization such as Baghdad. However, within a few generations, Mongol rulers themselves embraced Islam and helped rebuild Islamic institutions.

Thus, the Mongol legacy in the Muslim world is both destructive and transformative, ultimately contributing to the spread of Islam across large regions of Asia.

OFFICE POLITICS: A MAJOR BARRIER TO IDENTIFYING HIGH-POTENTIAL EMPLOYEES

In many organizations, the failure to identify and develop high-potential employees (HiPos) is not caused by a shortage of talent. Instead, it is often the result of office politics—informal power dynamics, personal interests, and subjective decisions that influence organizational processes.

Office politics occurs when decisions about promotions, talent development, recognition, or leadership succession are shaped more by personal relationships, perceptions, and strategic self-interest than by objective evidence such as performance, competencies, and measurable potential.

When political considerations influence talent management systems, organizations risk making systematic errors in identifying future leaders. Truly capable employees may remain unnoticed or underutilized, while others with stronger visibility or connections may receive opportunities that do not align with their actual capabilities.

Over time, this creates a dangerous cycle where the organization not only fails to nurture real talent but also unintentionally discourages high performers from remaining engaged.

Below are several major forms of office politics that frequently interfere with the fair identification of high-potential employees.

---

1. 🧠 Politics of Intuition

One of the most common forms of office politics occurs when leaders rely heavily on personal intuition or “gut feeling” when evaluating employee potential.

Statements such as:

- “I have a good feeling about this person.”
- “My instinct tells me he will become a great leader.”
- “I just see leadership potential in her.”

may sound reasonable, especially when expressed by experienced managers. However, relying excessively on intuition can introduce cognitive bias, unconscious preferences, and subjective judgments into the evaluation process.

Human intuition is influenced by factors such as familiarity, similarity, communication style, and personal comfort with certain personalities. These factors do not necessarily correlate with leadership capability or long-term performance.

Another critical issue is that past performance does not always predict future success, particularly when employees transition into roles requiring very different competencies. For example, a technically skilled employee may not necessarily succeed in a leadership position that demands strategic thinking, people management, and conflict resolution.

Without structured evaluation methods such as:

- competency frameworks
- behavioral assessments
- leadership simulations
- 360-degree feedback systems
- performance analytics

organizations risk making talent decisions based on impressions rather than evidence.

---

2. 🧩 Politics of Self-Interest

Another powerful form of office politics occurs when managers prioritize their own interests over the long-term interests of the organization.

Some managers intentionally avoid nominating their best employees as high-potential candidates because they fear losing them to promotions or transfers. A highly capable employee may be essential to the team’s productivity, and a manager may worry that promoting that individual would weaken the team’s overall performance.

There is also a psychological dimension to this behavior. In some cases, managers may feel threatened by exceptionally talented employees who could eventually surpass them in rank or influence.

As a result, these managers may:

- delay recommending promotions
- withhold opportunities for leadership exposure
- minimize the visibility of talented employees
- or redirect recognition toward less threatening individuals

This phenomenon is sometimes referred to as “talent hoarding.”

While it may benefit the manager in the short term, it harms the organization’s broader talent development pipeline. Over time, talented employees who feel restricted or overlooked may become disengaged—or leave the organization entirely.

---

3. 🧱 Politics of Conflict Avoidance

In some organizations, decisions about talent recognition are influenced by a desire to avoid interpersonal conflict rather than to uphold meritocratic standards.

Managers may nominate certain employees as high-potential not because they genuinely deserve it, but because doing so helps maintain peace within the team.

For instance, an employee who frequently challenges management decisions or demands recognition may be labeled as “high potential” simply to prevent ongoing disputes or dissatisfaction.

While this may temporarily reduce tension, it weakens the credibility of the organization’s talent management system. Employees who truly deserve recognition may begin to question the fairness of the process.

When recognition becomes a tool for conflict management rather than merit evaluation, the integrity of the system deteriorates.

---

4. 🤝 Politics of Favoritism

Favoritism is perhaps one of the most visible forms of office politics.

Leaders may consciously or unconsciously favor individuals who:

- previously worked closely with them
- share similar backgrounds or communication styles
- demonstrate strong personal loyalty
- or belong to their trusted “inner circle”

Psychologists often refer to this as in-group bias—the natural human tendency to prefer people who feel familiar or similar.

While trust and familiarity are valuable in leadership relationships, favoritism can distort objective talent evaluation. Employees who may be highly competent but less socially connected to senior leadership often receive fewer opportunities for exposure, mentorship, or promotion.

Over time, favoritism can create an organizational culture where advancement appears to depend more on relationships and visibility than on capability and results.

Such environments often lead to frustration, disengagement, and declining trust in leadership.

---

5. 🎂 Politics of Ageism

Age-related stereotypes can also influence how organizations evaluate potential.

In some workplaces, younger employees are automatically perceived as more suitable for leadership roles because they are believed to be:

- more innovative
- more technologically savvy
- more adaptable to change

In other organizations, the opposite occurs. Older employees may be favored because they are assumed to possess greater wisdom, stability, and experience.

Both assumptions are overly simplistic.

Leadership potential is not determined by age alone. Instead, it depends on factors such as:

- learning agility
- emotional intelligence
- strategic thinking
- adaptability
- and the ability to influence others

When age stereotypes influence promotion decisions, organizations risk overlooking capable individuals who do not fit the expected age profile.

---

6. ⚖️ Politics of Gender

Gender bias remains a significant challenge in many professional environments.

Highly capable women are sometimes overlooked for leadership roles due to persistent stereotypes regarding leadership style, work-life balance, or perceived commitment to career advancement.

Common misconceptions include assumptions that women:

- may prioritize family responsibilities over leadership roles
- are less assertive or decisive than male counterparts
- may not thrive in high-pressure executive environments

These assumptions often persist despite clear evidence of strong performance and leadership capability.

When gender bias influences talent identification, organizations not only create inequitable systems but also miss the opportunity to benefit from diverse leadership perspectives, which research consistently shows can improve decision-making and organizational performance.

---

🧭 Conclusion

When office politics infiltrates the talent identification process, organizations face several serious risks:

- genuine talent remains unrecognized
- unqualified individuals receive advancement opportunities
- employee morale declines
- trust in leadership weakens
- and long-term organizational performance suffers

To mitigate these risks, organizations must design transparent, evidence-based talent management systems that rely on structured evaluations rather than subjective impressions.

Effective talent identification should incorporate:

- measurable performance indicators
- competency-based assessments
- multi-source feedback mechanisms
- leadership development evaluations
- and clear governance structures that reduce bias.

Only through systematic and transparent processes can organizations ensure that true potential is identified, nurtured, and positioned to lead the future of the organization.

07 Mac

THE HISTORY AND STORY OF AL‑MASIH AD‑DAJJAL IN ISLAM

In Islamic belief, Al-Masih ad-Dajjal (The False Messiah) is one of the most important figures connected with the events before the Day of Judgment. He represents the greatest trial (fitnah) that humanity will experience near the end of time. His story is mentioned in many authentic narrations (hadith) of the Prophet Muhammad.

The Prophet repeatedly warned Muslims about the danger of Dajjal, saying that no trial from the time of Adam until the Day of Judgment will be greater than the trial of Dajjal.


1. Meaning of the Name “Dajjal”

The Arabic word “Dajjal” comes from the root دجل (dajala) which means:

  • to deceive
  • to cover the truth with lies
  • to mislead people through falsehood

Because of this, he is called Al-Masih ad-Dajjal, meaning:

  • Al-Masih – one who travels across the earth
  • Ad-Dajjal – the great deceiver

He will claim to be a divine savior, but in reality he will be a false messiah who leads people astray.


2. Evidence of Dajjal in Islamic Teachings

The belief in Dajjal comes mainly from Hadith literature, especially narrations reported by companions of the Prophet.

The Prophet Muhammad frequently warned his followers about Dajjal and taught prayers seeking protection from his trials.

Many companions narrated descriptions of him, including:

  • Abdullah ibn Umar
  • Abu Hurairah
  • Fatimah bint Qays

These narrations form the main Islamic understanding of Dajjal.


3. The Story of Tamim ad-Dari and the Island of Dajjal

One of the most detailed accounts comes from the companion:

Tamim al‑Dari

According to an authentic hadith:

Tamim al-Dari and several sailors were travelling by ship. During the journey, a storm pushed them off course for about one month until they reached a mysterious island.

On that island they encountered a strange creature called Al-Jassasah.

This creature was described as:

  • very hairy
  • difficult to distinguish its front from its back

The creature directed them to a large building or monastery where they found a huge man chained with iron restraints.

The man questioned them about several matters:

  • whether the Prophet Muhammad had appeared
  • whether the people of Arabia had followed him
  • whether the Sea of Galilee still contained water
  • whether the date palms of Baisan still produced fruit

After asking these questions, the man revealed:

“I am the Dajjal.”

He said he would soon be permitted to leave and travel across the earth spreading deception.


4. Physical Characteristics of Dajjal

The Prophet described Dajjal in detail so that believers could recognize him.

Key physical descriptions include:

  • Blind in one eye
  • The blind eye resembles a floating grape
  • The other eye protrudes unnaturally
  • On his forehead will be written “Kafir” (disbeliever)
  • This word will be readable by believers
  • He will have curly hair
  • A large and powerful body
  • A reddish complexion

These features are meant to ensure that believers are not deceived.


5. Place of Emergence

According to several hadiths, Dajjal will emerge from the East, particularly from a region called:

Khurasan

Historically this region includes areas of:

  • northeastern Iran
  • Afghanistan
  • Turkmenistan
  • parts of Central Asia

Some narrations mention that many of his early followers will come from this region.


6. Duration of Dajjal’s Rule

Dajjal will remain on Earth for 40 days, but these days will not be normal.

The Prophet explained the unusual timeline:

  1. The first day will be like one year
  2. The second day will be like one month
  3. The third day will be like one week
  4. The remaining days will be like normal days

During this time he will travel throughout the entire world very quickly.


7. Powers and Deceptions of Dajjal

Dajjal will perform many supernatural acts that will deceive people.

These include:

1. Claiming Divinity

He will claim that he is God, demanding people worship him.

2. Controlling Weather

He will command the sky to produce rain and the earth to grow crops.

3. Illusion of Resurrection

He will appear to bring a person back to life after killing them.

4. Wealth and Food

He will bring large resources of food and wealth, attracting followers.

5. False Paradise and Hell

He will bring two things that appear as:

  • Paradise
  • Hell

However, in reality:

  • his paradise will be hell
  • his hell will be paradise.

8. Cities Dajjal Cannot Enter

Despite his global influence, Dajjal will not be able to enter certain sacred cities.

These cities are protected by angels:

  • Mecca
  • Medina

Every entrance to these cities will be guarded by angels preventing Dajjal from entering.


9. Followers of Dajjal

Many people will follow Dajjal because of his power and miracles.

His followers will include:

  • hypocrites
  • disbelievers
  • people seeking wealth and power

Some narrations mention that among his followers will be groups from different nations and backgrounds.


10. The Return of Prophet Isa (Jesus)

Eventually, Dajjal will be confronted by the Prophet:

Isa ibn Maryam

Muslims believe that Prophet Isa will descend from heaven near the end of time.

He will join the believers and confront Dajjal.


11. The Death of Dajjal

Dajjal will attempt to flee when he sees Prophet Isa.

However, Prophet Isa will pursue him and eventually kill him at a place called:

Lod

After Dajjal’s death, his followers will be defeated and peace will begin to return to the world.


12. Protection Against the Trial of Dajjal

The Prophet taught several ways to protect oneself from Dajjal.

Reciting verses of the Quran

Specifically the first ten verses of:

Surah Al‑Kahf

Making a specific prayer

Muslims are encouraged to seek refuge from:

  • punishment of the grave
  • trials of life and death
  • the trial of Dajjal

Avoid approaching him

Believers are advised to stay away from him because his deception will be extremely powerful.


Conclusion

In Islamic theology, Al-Masih ad-Dajjal represents the ultimate deception and trial before the end of the world. His appearance will challenge the faith of humanity through extraordinary powers and false miracles. However, according to Islamic belief, his reign will be temporary and he will ultimately be defeated by Prophet Isa, marking a major turning point in the events leading to the Day of Judgment.