Quantcast
Channel: Eurasia Review
Viewing all 73659 articles
Browse latest View live

NASA Flights To Track Greenhouse Gases Across Eastern US

$
0
0

NASA is launching an airborne experiment to improve scientists’ understanding of the sources of two powerful greenhouse gases and how they cycle into and out of the atmosphere.

Atmospheric Carbon and Transport–America, or ACT-America, is a multi-year airborne campaign that will measure concentrations of carbon dioxide and methane in relation to weather systems. The study will gather real-time measurements from research aircraft and ground stations to improve the ability to detect and quantify the surface sources and sinks of the gases.

“Carbon dioxide and methane are the two most important long-lived greenhouse gases in the atmosphere,” said Ken Davis, ACT-America principal investigator from Pennsylvania State University, University Park. “We have a very difficult time inferring important sources and sinks of these gases, including uptake of carbon dioxide by the biosphere, and emission of methane from a variety of human and biological sources. We hope to improve our ability to measure those sources and sinks today, which should enable improvements in the management and simulation of future climate.”

ACT-America will employ a new generation of data analysis systems to convert regional observations of greenhouse gas concentrations and the meteorological conditions that move them around the atmosphere into more accurate estimates of where on the surface the gases originated and where they are absorbed. These data will fill in the details of how the gases are moved by weather systems, information that will help scientists interpret the long-term greenhouse gas observations more accurately.

Currently, the ability to determine sources and sinks of greenhouse gases relies on long-term observations from a sparse network of tower-based instruments. Space-based measurements of greenhouse gases have become available with the recent launches of the Japan Aerospace Exploration Agency’s Greenhouse gases Observing SATellite in 2009 and NASA’s Orbiting Carbon Observatory–2 (OCO-2) in 2014. These satellites provide significantly more observations and cover much more of the Earth’s surface, but they cannot sample continuously in any one location or see through clouds.

“The ability of the ACT-America campaign to help bridge the spatial scales between satellite and ground observations, as well as to look in detail about how weather patterns contribute to changes in the distributions of carbon dioxide and methane makes it a unique addition to the global effort to understand the sources and sinks of greenhouse gases,” said Michael Freilich, director of the Earth Science Division at NASA Headquarters, Washington.

The ACT-America campaign will use instruments on NASA’s C-130H and King Air B-200 aircraft. The C-130H and B-200 will fly below OCO-2 collecting data that will be compared with satellite data collected at the same time and place. The campaign team includes researchers and flight crews collecting data in the air, and scientists on the ground synthesizing that information into computer models.

ACT-America flights will be based at three locations across the eastern U.S. to allow scientists to take advantage of the existing detailed information available on meteorology and carbon dioxide and methane distributions. The first flights will be based out of NASA’s Langley Research Center, Hampton, Virginia, and Wallops Flight Facility, Wallops Island, Virginia. Subsequent flights this summer will be based in Lincoln, Nebraska, and Shreveport, Louisiana.


Saudi Arabia: Several Suspects Held After Multiple Islamic State Strikes

$
0
0

Monday’s terrorist attacks in Madinah, Jeddah and Qatif were reportedly planned by Daesh in Syria, which chose elements inside the Kingdom and provided them with suicide bombs to carry out the attacks, according to sources.

“The nation is proud of its children who sacrificed their lives to defend us, and we will not forget them; they remain a source of pride and honor for this country,” said Crown Prince Mohammed bin Naif who on Tuesday received the families of the victims at the Prophet’s Mosque.

Meanwhile, Maj. Gen. Mansour Al-Turki, spokesman for the Interior Ministry, told a local newspaper that preliminary investigations point to coordination and connection between the Madinah and the Qatif attacks — the suicide bombers in both cities had the same goal of targeting a mosque, and carried out the attack at the same time.

Investigations are underway. Several suspects have been arrested including the family members of Pakistani terrorist Gulzar Khan who blew himself up close to the US Consulate in Jeddah and the owner of the booby-trapped car used in Qatif.

Meanwhile, US Secretary of State John Kerry held an impromptu meeting on Tuesday with Foreign Minister Adel Al-Jubeir and talked about the need to defeat Daesh, the US State Department said.

Kerry and Al-Jubeir also discussed the need for a political transition in Syria, the situation in Libya, the effort to reach a political resolution in Yemen and recent developments between the Israelis and Palestinians.

Manchester United Signs Midfielder Henrikh Mkhitaryan

$
0
0

Manchester United on Wednesday, July 6 announced that Henrikh Mkhitaryan has completed his transfer from Borussia Dortmund, the club’s website said.

Henrikh joins on a four-year contract with the option to extend for a further year, Manchester said.

Mkhitaryan, 27, made 140 appearances and scored 41 goals for Borussia Dortmund after joining them in 2013. Last season he scored 23 goals and registered an impressive 32 assists across all competitions. Henrikh was voted Bundesliga Player of the Season for 2015/16 in a poll of his fellow professionals, and he was named in the Team of the Season following votes by the players’ union in Germany, VDV.

“I am very proud to join Manchester United, this move is a dream come true for me,” Mkhitaryan said.

“I am excited to play for a club with such an illustrious history and hope to be part of it for a long time. I thank the trust the club and [chief coach] Jose Mourinho have put in me. Finally, I believe playing for such a great club honors my father’s memory, and the inspiration and drive he gave to me when I was young.”

“Henrikh is a very talented footballer who has been in such prolific form for both his club and his country,” Mourinho said, in turn.

“He is a real team player with great skill, vision and also has a good eye for goal. I am delighted he has chosen to sign for United. I believe he will make an impact on the team very quickly as his style of play is suited to the Premier League. We are all looking forward to working with him.”

The midfielder is Armenia’s all-time top scorer, with 19 goals in 59 appearances since his international debut in January 2007. Henrikh captains his national team and has received the Armenian Footballer of the Year award on five occasions.

US Needs To Do More For Pakistan To Bring In Paradigm Shift In Policy – Analysis

$
0
0

By Vikram Sood

In his book Afghanistan-Pakistan-India: A Paradigm Shift, released recently at Observer Research Foundation, New Delhi, Afghan Ambassador to India, Shaida Abdali writes: “The logic of Pakistan’s survival in its present form makes it necessary for Pakistan’s policymakers to continue creating problems for its neighbours — Afghanistan and India. This requirement paradoxically, will hamper efforts of Pakistan in becoming a truly democratic and open society, if it chooses to do so.” For now, Pakistan’s leaders prefer to keep their country in permanent hostility with India and Afghanistan despite the growing global distaste for these policies.

There is hope in the book that there will be a paradigm shift in the attitude of the one country that has been the spoiler throughout and its intransigence has prevented a solution. It is this attitude that meant countless Afghans have lived and died without knowing what a post-conflict situation, let alone peace and tranquillity, could mean to them and for their families.

A note of realism is, however, necessary when we speak of a paradigm shift. This is unlikely to happen in Pakistan.

For far too long, both in its relations with Afghanistan and India, Pakistan assumed that its presumed entitlements permit it to indulge in cross-border terrorism. Exhausted it might be with the blowback of its policies, having boxed above its weight for so many years, yet hubris doesn’t allow it to change its policies. It would prefer to remain a regional black hole and miss out on the opportunities of the 21st century. This change won’t happen unless those who control Pakistan’s destiny are made to pay the price and their successors are able to dream the big picture.

For this to happen, though, the United States must do a lot more of what it has been doing. If what was done so far was adequate, the drone killing of Mullah Mansour would not have been necessary. Rewarding truant behaviour has to stop and the gravy train must be pulled back. Pakistan’s military along with its surrogates has to be curbed. This was the general sentiment at a recent discussion at the Hudson Institute in Washington moderated by former Pakistani Ambassador to the US Husain Haqqani, author of seminal books on Pakistan, and also attended, among others, by the Afghan Ambassador in Washington.

Afghanistan was always a secondary priority in American calculations, besides a brief spell from October 2001 to late 2002, after which for several years Iraq became a US obsession. Pakistan made full use of this opportunity, and helped revive the Taliban as the US followed an uneven policy with surges and pullbacks. Emboldened by this disinterest and keen to retain control over the Taliban, Pakistan did not even deem it necessary to keep its donor-cum-ally informed of the presence of Osama bin Laden in Abbottabad or the death of Mullah Omar in Karachi.

The way the Taliban seem to be extending their control in different parts of Afghanistan clearly indicate there seems to be little possibility of militarily defeating them. There just aren’t enough troops (Afghan or US) committed to this goal and the Afghan National Security Force has been kept under-equipped too long. Given the Taliban stance that they will not negotiate with the government in Kabul, even getting these negotiations going won’t be easy. The Quadrilateral peace talks have foundered since June 2015.

A complete takeover by Taliban, with Pakistan in control (as Islamabad hopes), is unacceptable. Yet, whatever has to be achieved is only possible if there are troops on the ground and allies are chosen with care.

This requirement comes at a time when America’s appeal in Afghanistan is sliding as the apparent unwillingness of the US-led forces to engage the enemy is at odds with the lofty aims of restoring peace and stability in Afghanistan.

Relations between Afghanistan and Pakistan have been tense in the past few weeks, with troops on both sides of the Durand Line exchanging fire, resulting in fatalities.

As it is, Pakistan is perturbed by the Iran-India-Afghanistan agreement on Chahbahar, the inauguration of Salma Dam, an Indian offer to train more Afghan women troops, the US promise of financial cooperation of $3 billion a year to support the Afghan military at a time when its own ties with the US are in a trough.

Pakistan has therefore chosen to needle Afghanistan on the Durand Line, perhaps to draw US attention to its sensitivities on this issue.

It is quite clear Afghanistan won’t change its stand on the Durand Line, that has kept the Pashtoon divided. Pakistan hopes that by raising the issue, not only will the Pashtoon in Afghanistan put pressure on Kabul, but other ethnic groups in Afghanistan, not similarly enthused about the Durand Line, may react differently, causing fissures inside Afghanistan. However, the reality is that while Afghan ethnic groups exhibit their ethnicity, they also strongly affirm Afghanistan’s nationhood — unlike in Pakistan, where the Baloch have been in perpetual revolt, Mohajirs are still called Mohajirs and Sindhis are suspect.

Pakistan’s favourite in the Taliban, Sirajuddin Haqqani, had in a recent message rejected Taliban talks with the “puppet regime” in Kabul. Al Qaeda leader Ayman al Zawahiri also voiced support to Mullah Haibatullah Akhunzada, the new Taliban leader. US special envoy for Afghanistan and Pakistan Richard Olson made it clear that Pakistan won’t have a bright future or feel secure until it acts against the Afghan Taliban and the Haqqani Network in Afghanistan. Nor for that matter will negotiations with the Taliban yield any positive results.

The recent Chahbahar Agreement is a win-win possibility for all three nations in perpetuity. It will break Pakistan’s stranglehold on landlocked Afghanistan. India must go on doing what it can as India-Afghan relations aren’t a zero-sum game, regardless of the spoiler.

This article originally appeared in The Asian Age.

Sri Lanka To Allow Victims And Witnesses To Testify From Overseas

$
0
0

Sri Lanka’s Cabinet has approved amending the Assistance and Protection of Victims of Crime and Witnesses Act No. 04 of 2015 to enable victims and witnesses to testify without being present in Sri Lankan courts.

Since the Act was brought into operation on May 16, 2016 there had been many requests to allow witnesses to give evidence from overseas.

As such, the act will be amended enabling victims and witnesses to give evidence from outside the country through audio visual media, without being present at the courts.

The government noted that evidence may be given at a Sri Lankan Diplomatic Mission in the respective country and provisions should be enacted to protect the freedom of witnesses and prevent any influence.

The proposal in this regard was made by the Minister of Justice Wijayadasa Rajapaksa.

Developed $2 Portable Zika Test

$
0
0

A rapid, low-cost genetic test for the Zika virus has been developed by University of Pennsylvania engineers.The $2 testing device, about the size of a soda can, does not require electricity or technical expertise to use. A patient would simply provide a saliva sample. Color-changing dye turns blue when the genetic assay detects the presence of the virus.

Rapid, accurate diagnosis is especially important for pregnant women who may be infected. However, the only approved tests for the virus currently require highly sensitive laboratory equipment. Diagnostic tools that can be used in the field, while the patient waits, would be a critical tool for fighting the Zika epidemic.

The engineers demonstrated the design and efficacy of their test in a study published in the journal Analytical Chemistry. It was conducted by Research Assistant Professor Changchun Liu and Professor Haim Bau of the Department of Mechanical Engineering and Applied Mechanics in Penn’s School of Engineering and Applied Science, along with members of the Bau lab, Jinzhao Song and Michael Mauk. They collaborated with Sara Cherry, associate professor of microbiology in Penn’s Perelman School of Medicine, and Brent Hackett, a member of her lab.

Assays that detect genetic material from the Zika virus itself are considered the gold standard in diagnostics. Alternatives, such as tests that look for antibodies the body creates in response to the virus, are insufficient as they may produce false negatives from people who are infected but haven’t yet produced enough antibodies, or false positives from people who have antibodies for a different disease that is similar enough to trigger the test.

Tests that look for RNA sequences from the virus itself, known as reverse transcriptase polymerase chain reaction, or RT-PCR, avoid both problems. However, RT-PCR requires delicate laboratory work. Viral gene sequences in a patient’s sample must be amplified, or repeatedly copied, to levels where they can be detected, a process that normally involves multiple precise temperature changes.

“The CDC has approved, on an emergency basis, only these kinds of laboratory-based molecular tests for the Zika virus,” said Liu. “Generally, lateral flow tests, which directly change the color of a test strip based on the presence of Zika antibodies, suffer from low sensitivity. And since antibodies to the Zika virus cross-react with other similar viruses prevalent in Zika-endemic areas, lateral flow tests for Zika also suffer from low specificity.”

With the amplification step as the main hurdle to a portable genetic test, the Penn researchers investigated the possibility of using an alternative technique known as RT-LAMP, or reverse transcription loop-mediated isothermal amplification, which only requires the sample to be kept at a specific temperature, not cycled through multiple precise temperature changes as in RT-PCR.

As a trade-off for this simplified amplification process, RT-LAMP requires even more specialized “primers,” short gene sequences that are designed to match the regions of the virus’ DNA targeted by the test.

“Although Zika primers for RT-PCR have been published in the literature, RT-LAMP primers have not,” Bau said. “So, using data mining, we identified highly conserved regions of the Zika virus genome that are divergent from other known pathogens. We then designed appropriate primers to recognize this sequence.

“In parallel,” Liu said, “we engineered a low-cost, point-of-care system that consists of a diagnostic cassette and a processor. The cassette isolates, concentrates and purifies nucleic acids and carries out enzymatic amplification. The test results are indicated by the change in the color of a dye, which can be inspected visually.”

The researchers then worked on how to keep the sample at the necessary temperature without using electricity. Their solution involved a thermos bottle, a self-contained heating element that uses a chemical reaction from portable military rations and a wax-like material that absorbs excess heat by melting. A 3-D printed lid fits on top of the thermos and holds all of the test’s components in place.

Once a patient’s saliva sample is introduced into the cartridge, the test takes about 40 minutes to run. The researchers demonstrated its efficacy with their own saliva spiked with virus samples generated by the Cherry Lab, showing sensitivity equivalent to that of RT-PCR tests. Future work will demonstrate the test’s selectivity and will also test a version that can quantify the viral load by means of a fluorescent dye and an integrated smartphone camera.

“Our work represents a proof of concept at this stage,” Bau said. “Before the assay can be adapted for medical use, we must experiment with patients’ samples and make assure that our assay and system match the performance of the gold standard and operate reproducibly and reliably. We are fortunate to have dedicated colleagues in endemic regions ready to assist us in this task.”

Brazil: Dilma Rousseff Found Not Guilty Of Budgetary Maneuvers – Analysis

$
0
0

By Aline Piva and Desirée Mota*

On June 27, a board of experts charged with investigating the accusations against Brazilian President Dilma Rousseff found no proof of her direct involvement with the country’s fiscal budgetary maneuvers. Known as “fiscal pedaling”, this is one of the main accusations used by the opposition to justify her impeachment.[1] The investigation, a 224-page report requested by the Brazilian Senate, was carried out by independent auditors who had two weeks to clarify the details regarding the removal process, from both the defense and the accusation.[2] [3] The auditors concluded that Rousseff is not guilty of breaking fiscal or budgetary laws.[4] However, the auditors have identified that Rousseff authored three decrees in 2015 which increased the government expenditures without Congress’ consent.[5] The auditors also stated that Rousseff authored a fourth presidential decree in 2015, which did not affect the government expenditures. According to the report, “it was concluded that the executive branch has fulfilled the fiscal result targets, even with the release of the commitment limit and financial execution promoted by Decree 8581/2015. Therefore, the contingency decrees were sufficient to ensure compliance with the fiscal balance targets for 2015.”[6] The evidence provided by these reports has exposed proponents of the ongoing impeachment process, as it highlights the fragility of their accusations against President Rousseff.

What is Rousseff Being Accused Of?

According to those who initiated the impeachment process, Rousseff committed two different crimes under the Fiscal Responsibility Law. The Senate is investigating if Rousseff was involved in government delays in issuing credits to Banco do Brasil (BB), a state-owned Brazilian bank for payment of the Agricultural credit program (known as Plano Safra).[7] This financial maneuver is known as “fiscal pedaling,” and has been commonly used by many other state governors and former federal government administrations of the Brazilian government.[8] The report presented this week shows that that there is no evidence that corroborates Rousseff’s direct participation in committing irregular budgetary activities.

The opposition also accuses President Rousseff of issuing credit decrees in 2015, thereby increasing the government expenditures without Brazilian Congress’ approval — which is illegal according to the Brazilian Fiscal Responsibility Law.[9] Rousseff’s defense maintains that the Brazilian Congress’ approval was not necessary in the cases presented by proponents of impeachment since those decrees did not compromise the fiscal balance targets for that year. However, the accusers argue that those fiscal targets were only fulfilled because Congress passed a bill reducing the fiscal target for 2015. In turn, the defense argues that the goal can only be considered breached after the end of the fiscal year, which did not happen in 2015.[10]

Next Steps

On May 12, the Brazilian Senate decided to proceed with the impeachment process against the democratically elected president, Dilma Rousseff, initiating its intermediary phase. In this phase, house committee gathers and analyzes evidence presented both by Rousseff’s defense and by impeachment proponents. After all the evidence is presented, a new report based on this analysis will be prepared by Senator Antonio Anastasia, and then voted on by the other members of the committee — this vote will likely take place on August 9.[11] Following this vote, all 81 Senators will vote to accept or reject the report presented by Senator Anastasia.

If it is rejected, the process is dismissed and Rousseff resumes the presidency; if it is approved, the process continues to its final phase. In this case, the Senators will have to respond either “yes” or “no” to the question formulated by Supreme Court Justice Ricardo Lewandowski (who now presides over the impeachment committee) on whether Rousseff committed crimes while in office.[12] According to the most recent schedule approved by the Senate, this final phase of the impeachment process will likely take place on August 22.[13]

Although evidence of the political motivations behind the ousting of Dilma Rousseff continues to mount, the prospective outcome of the impeachment process is still unclear. As reported by TeleSur, “the budget charges have been the key justification behind the impeachment process against Rousseff, painted as a bid to tackle government corruption.”[14] With many of his ministers and close allies accused of corruption and other serious crimes, the viability of the government led by Interim President Michel Temer (who is himself also implicated in a corruption scheme) is now put to question.[15] Recent polls show that 70 percent of Brazilians reject Temer’s interim presidency, while Rousseff’s approval rates are now higher than when she was in office.[16]

This new report confirms the illegitimate nature of allegations against Dilma Rousseff, and reaffirms that Dilma’s impeachment allegations are not based on governmental mismanagement, but are, in fact, a political mutiny by former allies.

*Aline Piva, Research Fellow and Desirée Mota, Research Associate at the Council on Hemispheric Affairs

Notes:
[1] Haubert Mariana. Colon, Leandro. “Rousseff is guilty of decrees but not fiscal pedaling, according to investigations.” Folha de São Paulo. June 27, 2016. Accessed June 28, 2016. http://www1.folha.uol.com.br/internacional/en/brazil/2016/06/1786429-rousseff-is-guilty-of-decrees-but-not-fiscal-pedaling-according-to-investigation.shtml

[2] Ibid

[3] Dilma Rousseff didn’t take part in fiscal crimes, say auditors. Plus-55. June 27, 2016. Accessed June 29, 2016. http://plus55.com/politics/2016/06/dilma-rousseff-didnt-take-part-fiscal-crimes-say-auditors

[4] Ibid

[5] “Perícia vê ação de Dilma em decretos, mas não identifica nas pedaladas.” G1. June 27, 2016. Accessed June 28, 2016.

http://g1.globo.com/politica/noticia/2016/06/pericia-ve-acao-de-dilma-em-decretos-mas-nao-identifica-nas-pedaladas.html

[6] Ibid.

[7]Schreib, Mariana. O que significa a perícia sobre pedaladas – e como pode impactar o proceso de impeachment. BBC Brasil. June 27, 2016. Accessed June 28, 2016

http://www.bbc.com/portuguese/brasil-36627955

[8] “Se impeachment for por pedaladas, 16 governadores terão que se afastar”. Valor. March 22, 2016. Acessed June 29, 2016.

http://www.valor.com.br/politica/4493408/se-impeachment-por-pedaladas-16-governadores-terao-que-se-afastar

[9] “Perícia Vê Ação De Dilma Em Decretos, Mas Não Identifica Nas Pedaladas.” Política. 2016. Accessed June 28, 2016. http://g1.globo.com/politica/noticia/2016/06/pericia-ve-acao-de-dilma-em-decretos-mas-nao-identifica-nas-pedaladas.html.

[10] Ibid

[11] “Folha De S.Paulo.” Novo Calendário Aumenta Em Uma Semana Processo De Impeachment. Accessed June 28, 2016. http://www1.folha.uol.com.br/poder/2016/06/1784424-novo-calendario-aumenta-em-uma-semana-processo-de-impeachment.shtml.

[12] “Entenda O Processo De Impeachment.” G1. Accessed June 28, 2016. http://especiais.g1.globo.com/politica/2015/entenda-o-processo-de-impeachment/.

[13] “Folha De S.Paulo.” Novo Calendário Aumenta Em Uma Semana Processo De Impeachment. Accessed June 28, 2016. http://www1.folha.uol.com.br/poder/2016/06/1784424-novo-calendario-aumenta-em-uma-semana-processo-de-impeachment.shtml.

[14] “Senate Report Clears Rousseff of Budget Manipulation.” TeleSUR. June 27, 2016. Accessed June 28, 2016. http://www.telesurtv.net/english/news/Senate-Report-Clears-Rousseff-of-Budget-Manipulation–20160627-0023.html.

[15] Schreiber, Mariana. “Após Acusações, Ministro Pede Demissão: Como ‘delação-bomba’ Pode Atingir Governo.” BBC Brasil. June 16, 2016. Accessed June 28, 2016. http://www.bbc.com/portuguese/brasil-36555446.

[16] “70% of Brazil Disapproves of Coup President Michel Temer: Poll.” TeleSUR. Accessed June 28, 2016. http://www.telesurtv.net/english/news/70-of-Brazil-Disapproves-of-Coup-President-Michel-Temer-Poll-20160627-0013.html.

Building A Better Computer Bug Finder

$
0
0

Individuals and corporations spend millions of dollars every year on software that sniffs out potentially dangerous bugs in computer programs. And whether the software finds 10 bugs or 100, there is no way determine how many go unnoticed, nor to measure the efficacy of bug-finding tools.

Researchers at the New York University Tandon School of Engineering, in collaboration with the MIT Lincoln Laboratory and Northeastern University, are taking an unorthodox approach to tackling this problem: Instead of finding and remediating bugs, they’re adding them by the hundreds of thousands.

Brendan Dolan-Gavitt, an assistant professor of computer science and engineering at NYU Tandon, is a co-creator of LAVA, or Large-Scale Automated Vulnerability Addition, a technique of intentionally adding vulnerabilities to a program’s source code to test the limits of bug-finding tools and ultimately help developers improve them. In experiments using LAVA, they showed that many popular bug finders detect merely 2 percent of vulnerabilities.

A paper detailing the research was presented at the IEEE Symposium on Security and Privacy and was published in the conference proceedings. Technical staff members of the MIT Lincoln Laboratory led the technical research: Patrick Hulin, Tim Leek, Frederick Ulrich, and Ryan Whelan. Collaborators from Northeastern University are Engin Kirda, professor of computer and information science; Wil Robertson, assistant professor of computer and information science; and doctoral student Andrea Mambretti.

Dolan-Gavitt explained that the efficacy of bug-finding programs is based on two metrics: the false positive rate and the false negative rate, both of which are notoriously difficult to calculate. It is not unusual for a program to detect a bug that later proves not to be there — a false positive — and to miss vulnerabilities that are actually present — a false negative. Without knowing the total number of real bugs, there is no way to gauge how well these tools perform.

“The only way to evaluate a bug finder is to control the number of bugs in a program, which is exactly what we do with LAVA,” said Dolan-Gavitt. The automated system inserts known quantities of novel vulnerabilities that are synthetic yet possess many of the same attributes as computer bugs in the wild. Dolan-Gavitt and his colleagues dodged the typical five-figure price tag for manual, custom-designed vulnerabilities and instead created an automated system that makes judicious edits in real programs’ source code.

The result: hundreds of thousands of unstudied, highly realistic vulnerabilities that are inexpensive, span the execution lifetime of a program, are embedded in normal control and data flow, and manifest only for a small fraction of inputs lest they shut the entire program down. The researchers had to create novel bugs, and in significant numbers, in order to have a large enough body to study the strengths and shortcomings of bug-finding software. Previously identified vulnerabilities would easily trip current bug finders, skewing the results.

The team tested existing bug-finding software and found that just 2 percent of bugs created by LAVA were detected. Dolan-Gavitt explained that automated bug identification is an extremely complex task that developers are constantly improving. The researchers will share their results to assist these efforts.

Additionally, the team is planning to launch an open competition this summer to allow developers and other researchers to request a LAVA-bugged version of a piece of software, attempt to find the bugs, and receive a score based on their accuracy.

“There has never been a performance benchmark at this scale in this area, and now we have one,” Dolan-Gavitt said. “Developers can compete for bragging rights on who has the highest success rate in bug-finding, and the programs that will come out of the process could be stronger.”


Archaeology Suggests No Direct Link Between Climate Change And Early Human Innovation

$
0
0

Environmental records obtained from archaeological sites suggest climate may not have been directly linked to cultural and technological innovations of Middle Stone Age humans in southern Africa, according to a study published July 6, 2016 in the open-access journal PLOS ONE by Patrick Roberts from the University of Oxford, UK, and colleagues.

The Middle Stone Age marked a period of dramatic change amongst early humans in southern Africa, and climate change has been postulated as a primary driver for the appearance of technological and cultural innovations such as bone tools, ochre production, and personal ornamentation.

While some researchers suggest that climate instability may have directly inspired technological advances, others postulate that environmental stability may have provided a stable setting that allowed for experimentation. However, the disconnection of palaeoenvironmental records from archaeological sites makes it difficult to test these alternatives.

The authors of this study carried out analyses of animal remains, shellfish taxa and the stable carbon and oxygen isotope measurements in ostrich eggshell, from two archaeological sites, Blombos Cave and Klipdrift Shelter, spanning 98,000 to 73,000 years ago and 72,000 to 59,000 years ago, respectively, to acquire data regarding possible palaeoenvironmental conditions in southern Africa at the time. For instance, ostrich eggshell carbon and oxygen stable isotope levels may reflect vegetation and water consumption, which in turn vary with rainfall seasonality and amount in this region.

The researchers found that climatic and environmental variation, reflected in ostrich eggshell stable isotope measurements, faunal records, and shellfish indicators, may not have occurred in phase with Middle Stone Age human technological and cultural innovation at these two sites. While acknowledging that climate and environmental shifts may have influenced human subsistence strategies, the researchers suggest climate change may not have been the driving factor behind cultural and technological innovations in these localities and encourage context-specific evaluation of the role of climate change in driving early human experimentation.

Patrick Roberts noted, “Our results suggest that although climate and environmental changes occurred, they were not coincident with cultural innovations, including personal ornamentation, or the appearance of complex tool-types. This suggests that we have to consider that other factors drove human innovation at this stage in our species’ evolution.”

Bill Gates And Other Billionaires Backing A Nuclear Renaissance – Analysis

$
0
0

By James Stafford

Let’s for a second imagine a world without nuclear energy. That’s a tough one but let’s try. No nuclear bombs, of course, no Chernobyl and Fukushima, no worries about Iran and North Korea. A wonderful world, maybe?

Probably not, because without nuclear energy we would have burned millions more tons of coal and billions more barrels of oil. This would have brought about climate change of such proportions that what we have today would have seemed negligible.

Nuclear energy and uranium, which feeds it, are controversial enough even without any actual accident happening. Radioactivity is dangerous. Nobody is arguing against it. When an accident does take place, the public backlash is understandably huge. What many opponents of uranium forget to mention, however, are the benefits of nuclear energy and the fact that the statistical probability of serious accidents is pretty low. They focus on the “What if?” and neglect the other side of the coin. But let’s try to see both sides of the issue.

The positive side of nuclear energy definitely deserves more attention than it’s currently getting. Uranium-fueled power is obscenely greener than fossil fuels. It’s also cheaper and, perhaps surprisingly for many, it is actually lower in carbon emissions than solar and biomass. This means that the construction of a nuclear plant, including materials used and the work itself plus the operation of the plant over its lifecycle, produces fewer greenhouse gases than the construction and operation of a solar farm.

What’s perhaps more important is that nuclear energy is much more easily scalable than other low or zero-carbon energy sources. And that isn’t just some claim from the nuclear industry – that’s something climate scientists and environmentalists are saying. Here’s a public appeal by several such scientists, urging greater support for nuclear energy, noting that “While it may be theoretically possible to stabilize the climate without nuclear power, in the real world there is no credible path to climate stabilization that does not include a substantial role for nuclear power.”

The uranium mining industry is certainly aware of these attitudes and it’s also aware of a global trend: countries are building new nuclear plants and upgrading existing ones. Forget about Germany and its plans to go nuclear-free – plans that will cost it tens of billions, by the way. None other than Sweden–the poster child of renewable energy, the country that vowed to become the first fossil-free state in the world–is not only choosing to maintain its nuclear fleet; it is updating them. China is building 20 new reactors, South Korea is working on four; and even Japan is restarting some of the capacity shut down after the Fukushima disaster and building new reactors.

The growth of nuclear power around the world will cause demand for uranium to surge, and uranium prices are set to double over the next two years. “Reality is finally trumping negative sentiment,” says Paul D. Gray, CEO of uranium and lithium miner Zadar Ventures Ltd. “And the reality is that we can’t wean ourselves off fossil fuels without nuclear power.”

Uranium will be needed in prodigious volumes to power up new nuclear reactors, and much of it will come from the Athabasca Basin in Canada. This area, rich in high-grade uranium, is being targeted by both public giants like Cameco (TSX:COO) and Areva (EPA:AREVA) and smaller miners such as Zadar Ventures, CanAlaska Uranium and Mega Uranium.

Yet what about those notorious safety risks? Nuclear energy may be green, but it is also more dangerous than, say, wind energy.

Again, nobody in nuclear power is contesting that. What they are doing instead is working on new, safer reactors. Welcome to the next generation—reactors that are much safer than their predecessors. But they will still need uranium.

The U.S. government recently announced an $82-million funding program for next-generation nuclear reactor development. The UK is even more generous, pledging last year £250 million over five years for research and development in the nuclear energy field.

Private investors such as Bill Gates, D. E. Shaw, and Chinese billionaire Li Kashing have been pouring money in such research – and uranium mining – for years now.

The nuclear reactors of tomorrow will not only be safer than the ones we already have – which are themselves safer than many believe – they will be much more efficient.

Bill Gates’ TerraPower, for instance, has designed a traveling wave reactor, which utilizes nuclear waste. Another design, by two MIT researchers, again uses waste, mixed into molten salt. In short, the nuclear reactors of the future will utilize not just regular uranium but will take care of the waste as well – the same waste that raises so much concern among environmentalists and the general public.

So it’s the Athabasca Basin that will be ground zero in the nuclear energy rebound.

Some even call the Athabasca Basin the “Persian Gulf of uranium”. It not only contains some of the highest-grade uranium in the world, it is also home to two of the top seven deposits in terms of metal content. The basin has a well developed power, transport and processing infrastructure, too, which makes it all the more attractive for miners and mining investors.

Athabasca will be one of the places to watch in the coming years as the uranium market swings from a glut into a deficit. The glut was caused by the sharp drop in demand following the Fukushima events in 2011. Now the pendulum is moving back, with a deficit in the making as uranium miners curbed exploration and production due to falling prices.

Back in 2012, Bill Gates noted that “When you have fission, you have a million times more energy than when you burn hydrocarbons. That’s a nice advantage to have.”

Today, it’s getting increasingly clear that it’s more than “nice”. Nuclear power is unique among zero-carbon energy sources: its production is consistent as it doesn’t depend on sunlight or wind. This, coupled with affordability and safety – whatever environmental extremists say – makes nuclear energy an indispensable element of the global renewable energy mix for the future.

It also suggests uranium is more than likely to take the center stage it deserves as fossil fuels relinquish the spotlight.

The Athabasca basin will be in the undeniable spotlight sooner than you might think in what will be a boon for major Northern American operators as well as juniors, such as Zadar Ventures.

“It’s impossible to find another natural resource that is so fundamentally necessary to our future,” says Zadar’s Gray. “This will be the year of the uranium rebound, and nuclear energy’s next-generation safeguards will rewrite the global energy map once again.”

Source: http://oilprice.com/Alternative-Energy/Nuclear-Power/Bill-Gates-And-Other-Billionaires-Backing-A-Nuclear-Renaissance.html

Putin’s Apparent Cancellation Of Three Domestic Trips Sparks Speculation – OpEd

$
0
0

Vladimir Putin reportedly has cancelled three domestic trips that he had been scheduled to make this week – to the Altay, Sakha and Nizhny Novgorod – and has not appeared in public since returning from Finland, a pattern that is already leading to speculation about his health physical or political.

Three sources “close to the Kremlin” told RBC that the Kremlin leader had cancelled the three trips, but Putin’s press secretary, Dmitry Peshkov, said there were no cancellations and that these “trips” were simply among “the dozens” people have proposed but that had not been agreed to by the president (rbc.ru/politics/06/07/2016/577ced289a7947214102dae3).

But the news agency’s sources provided the kind of detail which suggests that the trips in fact had been planned and then cancelled. According to them, Putin was supposed to take part in a session of the State Council on tourism on July 5. Then on July 6, he was to go to Sakha to take part in a regional conference of the Popular Front and the opening of a sports competition.

And on July 7, Putin reportedly was expected in Nizhny Novgorod to open a new factory; but according to the news agency’s sources, this event was not only organized at the last minute but cancelled shortly thereafter. It reported that the factory owners hope to have it rescheduled later this month or in August.

RBC reports today that “the last time Putin took part in public activities to which the press was invited was at the end of last week” when he flew to Finland. The presidential Internet page lists subsequent meetings with regional heads, but at least one of them took place earlier than the Kremlin reported.

The last time Putin was out of public view this long was in March 2015 when he did not appear in public for eleven days. At that time, Western news agencies like Reuters reported that the Kremlin leader was ill, something his press spokesman denied.

Crafting And Managing Effects: The Evolution Of The Profession Of Arms – Analysis

$
0
0

By James G. Stavridis, Ervin J. Rokke, and Terry C. Pierce*

Recent operations conducted against U.S. businesses and citizens have reemphasized a critical vulnerability in how the U.S. Government thinks about and defends itself against nonkinetic instruments of power. This is particularly true in the manmade domain of cyber. In December 2014, a high-profile breach of Sony Pictures Entertainment was linked to a state-sponsored cyber attack by North Korea. Apparently, North Korea was motivated by opposition to the film The Interview, a comedy about the assassination of North Korea’s leader Kim Jong-un.1 The Obama administration responded to Pyongyang’s alleged cyber attacks on Sony by imposing sanctions against the country’s lucrative arms industry.2 It is too soon to tell whether this response was appropriate and effective. However, the apparent difficulties we faced in determining how best to respond indicate that the assumptions underlying the definitions and responsibilities of our military profession, most of which emerged following World War II and the beginning of the Cold War, are badly in need of updating to accommodate new forms of warfare.

The end of World War II and emergence of the Cold War resulted in a surge of brilliant academic scholarship concerning the profession of arms. In 1957, for example, Harvard political science professor Samuel Huntington published his seminal book, The Soldier and the State. This was a monumental effort explaining why and how the modern military officer corps represents a profession in the same sense as those of law, clergy, and medicine.3 Two key themes emerged from Huntington’s work. First, the optimal means for civilian control of the military was to professionalize it. Second, Huntington argued that the central skill of military competence, unique to its profession, was best summed up by Harold Lasswell’s phrase, “the management of violence.”4 In short, for Huntington as well as other nationally recognized scholars of his time, the unique professional expertise of military officers was focused on the achievement of successful armed combat.5

We believe the first part of Huntington’s theory still holds. In a democratic society, the military is a profession requiring civilian control. We argue, however, that the Huntington assertion of “management of violence” as the unique expertise of the profession of arms needs to be updated from his 1957 model. We maintain that members of today’s profession of arms are “the managers of effects” while the primary responsibility for defining the desired effects, particularly in the strategic arena, lies with civilian leadership at the national level. This assertion builds upon the concept of soft power introduced by Professor Joseph Nye in 1990, which argued that “winning the hearts and minds has always been important, but it is even more so in a global information age.”6 Since 1990, soft power has grown in importance as information-age technologies advance. More importantly, the information revolution is changing the nature of power and increasing its diffusion, both vertically and horizontally, marking the decline of the sovereign state and the rise of a new feudal-type world.7 Finally, we maintain that these hard and soft effects could be generated not only in the natural domains of land, sea, air, and space, but also in the increasingly significant manmade domain of cyber.

Huntington’s World: Civil-Military Relationships

The profession of arms as we know it owes much to Huntington’s ground-breaking framework for civil-military relations and national security. The Soldier and the State is rooted in a bipolar world where most of the destructive military power was possessed by the United States and Soviet Union. A key tenet of Huntington’s work is a complex relationship between civilian and military authorities, with the military subordinated to civilian control. He offers several prescriptions for achieving and maintaining the stability and the utility of this relationship. The output of Huntington’s theory includes an intellectual framework for analyzing the extent to which the system of civil-military relations in a society tends to enhance or detract from the military security of that society.8

Huntington’s focus is on the nation-state with its responsibility to thwart threats arising from other independent states.9 For him, achieving a stable and productive relationship between civilian and military authorities is essential for maximum security of the state. A key assumption of Huntington’s model is that violence almost always originated with a nation-state and was directed toward another nation-state. In this environment, the threat or actual use of force embodied in national armies, navies, and air forces is the best way to keep the peace. Thus, Huntington asserts that the unique expertise of the military profession is to manage violence.

Huntington’s model proved useful for half a century, during which security depended largely on national capacities for managing violence in the natural domains of land, sea, air, and space. His model, however, falls short with the emergence of nonkinetic instruments of foreign policy to include those within the cyber domain. Particularly within that domain, nation-states and their militaries are no longer the sole managers for instruments of force. A new assortment of nonkinetic actors using soft power in the cyber as well as the natural domains can achieve hard-power kinetic effects.

Both national and nonstate actors operating in the cyber domain have targeted Iranian oil ministers’ computers, foreign financial institutions and energy sectors, and even senior political and military leaders, causing significant damage.10 In 2011, Chairman of the Joint Chiefs of Staff Admiral Mike Mullen stated that cyber was “the single biggest existential threat that’s out there” because “cyber, actually more than theoretically, can attack our infrastructure and our financial systems.”11 Cell phones, for example, are an essential tool for economic prosperity as well as for financing and planning terrorist operations. Significantly, such cell phones costing $400 today match the computing power of the fastest $5 million supercomputer in 1975.12

New Answers to Three Questions

Our call to update Huntington’s definitions and prescriptions for the profession of arms is driven by the emergence of new answers to three fundamental questions that have been traditionally used to define a global security situation: Who are the major actors? What can they do to one another? What do they wish to do to one another? Scholars of international politics and national security, beginning with Professor Stanley Hoffmann of Harvard University, have taught us that when the answers to these questions change in significant ways, the global security environment is fundamentally altered.13 Historical examples include the Peace of Westphalia (1648), French Revolution (1789), Congress of Vienna (1815), unification of Germany (1870), and the end of World War II (1945).

Thus, the emergence of new actors (the United States and Soviet Union), capabilities (nuclear weapons), and intentions (propelled by the ideological split between democratic and communist ideologies) formed the intellectual platform and inspiration for “new thinking” about the profession of arms by early Cold War scholars. Quite properly, their analyses and policy prescriptions were based on “new realities” of the postwar period and ultimately came to reflect the desired effect of “containment,” which was conceived and developed by civilian leadership at the national level.

Realities of the 21st Century

Now we must come to grips with the new realities of the 21st century that emerged with the fall of communism and the Soviet Empire in the 1990s. With such additional dynamics as the incredible advances in technology and communications as well as the end of the Cold War, the global security system clearly has once again faced new answers to Professor Hoffmann’s three fundamental questions. As in 1789, 1815, 1870, and 1945, the global world of national security has been turned on its head.

Who Are the New Actors? Some actors on the international scene have disappeared, while others, to include a variety of non–nation state entities, have emerged. Many of the traditional major actors emerged with the Peace of Westphalia in 1648, the treaty ending the Thirty Years’ War.14 This agreement set the stage for the previous warfighting entities such as families, tribes, religions, cities, and even commercial organizations to consolidate and fight under the monopoly of the nation-state militaries.15 Until recently, such state-versus-state warfare remained the standard model. However, we are now witnessing a partial resurgence of the pre-Westphalia model as nonstate actors such as the Islamic State of Iraq and the Levant, al Qaeda, Hamas, Hizballah, and others—including drug cartels and crime syndicates—have emerged as very real participants in the international security environment.

What Can They Do to Each Other? As demonstrated by the 9/11 attacks, these nonstate actors are capable of global terrorism using various means of attacking nation-states, from suicide operations to decapitation of individual citizens. Ironically, these new actors are in some important ways “returning to the way war worked before the rise of the state.”16 Many of the nonstate actors also are adept at using modern, nonkinetic instruments such as social media and other tools emerging from the cyber domain to achieve their desired effects. By using these cyber tools, they have, in effect, revitalized and bolstered Sun Tzu’s notion of “getting into your opponent’s head.” They have expanded the battlefield beyond the traditional domains of land, sea, air, and space to accommodate more effectively than ever before the battles of wits.

What Do They Wish to Do to Each Other? Nation-state actors still appear focused primarily on traditional goals of maintaining and expanding their power and influence, but they generally follow internationally accepted Geneva Conventions for conducting war. This is not the case, however, with the new nonstate actors, who frequently have eschewed conventions accepted by the more traditional nation-state actors since Westphalia. For them, the battlefield has taken on a wider range of options with less regard for such notions as just war theory. Indeed, recent attacks involving malware tools for hacking into corporate entities such as banks and large merchandise sales entities (Target, The Home Depot, Sony, and others) as well as Internet accounts of private individuals demonstrate a departure from traditional emphases by combatants on enemy military targets.

The Need for a Wider Lens

Cognitive psychologists tell us that when faced with complex problem sets, we are “wired” to simplify our task by using “frameworks, lenses, or concepts” to reduce the problem scope to a more manageable, “bite-size” challenge. Most certainly, this pertains to the analysis of predicaments that nations face on a continuing basis in the arena of national security. Such analysis is at the heart of John Boyd’s “orientation phase,” the most critical component of his famous “observe, orient, decide, and act” cycle (the OODA loop).17 It is the stage in the cognitive process at which the participants attempt to define the “reality” of their problem set. Quite understandably, the simplifying lens traditionally used by leaders in the national security arena has focused on the military weapons of the time. Indeed, this tradition has been employed since at least the Chinese Spring and Autumn periods of the 8th through the 4th centuries BCE. Today, it exists in the form of the combined arms warfare (CAW) concept with its focus being ships, planes, tanks, and missiles.

Cognitive psychologists also tell us that such simplifying lenses inevitably turn out to be inadequate for comprehending realities faced in complex problem sets. We have previously argued that the CAW concept encounters this difficulty when used as a lens.18 In our current security arena, for example, it fails to accommodate the emerging cyber domain as well as nonkinetic instruments of power resident in the traditional land, sea, air, and space domains. Because the CAW concept limits “vision” to the traditional instruments of military force, new forms of power, to include those emerging from the cyber domain, are anomalies and excluded from our concept of reality. Understanding the power of these anomalies requires a new way of thinking and thus a new and wider lens beyond the traditional CAW lens with its focus on the natural domain weapons systems. The new lens we have offered might properly be called combined effects power (CEP). The CEP construct is a way to maximize and harmonize the effects of kinetic and nonkinetic power. The key issue it tackles is what effects we want to achieve using both hard and soft power.19

In a thoughtful piece titled “Winning Battles, Losing Wars,” Lieutenant General James Dubik, USA (Ret.), suggests that this dilemma has characterized virtually all post-9/11 wars and attributes it in large part to the “civil-military nexus that underpins how America wages war.”20 We agree with this assertion and believe that the problem emerges with the very first challenge in international conflicts: the selection of proper war aims. Too often, our war aims (desired effects) are neither crisp and coherent nor realistic in terms of their demands on the American people for blood and treasure. One need only review the predicaments we face or have recently faced in Syria, Iraq, Iran, Afghanistan, and North Korea to understand how battles can be won while their wars are lost.

War aims go wrong when they are based on faulty assessments of reality. Assessments of reality are wrong when the concepts or “lenses” we use to help us understand our security predicaments are unable to accommodate complex challenges. In short, we cannot adequately address the complicated, nonlinear aspects of international conflict in today’s world if we rely on the linear CAW approaches designed for the simpler hard-power era of the Cold War. Huntington’s 1957 framework was brilliant in its hard-power design and has served us well. The time has come, however, to flesh it out with new realities, including soft power, that square more accurately with the 21st century. We must come to grips with the facts that the post–Cold War era has yielded fundamentally new answers to Professor Hoffmann’s three questions.

The Need for a New Way of Thinking

We believe that the first step in this process is to change the initial question that is often asked for addressing emerging challenges in the national security arena. In place of the traditional focus on how we might best combine our military instruments to successfully fight wars of destruction, we must first have an answer to a foundational challenge: What is the effect that we wish to achieve? In most situations, particularly at the strategic level, this is a question for our senior civilian policymakers. They must be the primary determiners of desired effects. Equally important, they must understand that without a coherent definition of desired effects, the military and other entities with foreign policy tools are not in a position to craft effective responses beyond the CAW model. This is true regardless of how accurate their assessments of the security challenge might be.

In sum, we believe Huntington’s concept of civilian control, with its emphasis on the professional development of our military, remains vital to a democratic society. Also required is a capability and willingness of our national-level civilian leadership to assume a primary role in determining and articulating desired effects. For its part, the military profession must be capable of managing the full spectrum of capabilities within its purview, both kinetic and nonkinetic, to accomplish the desired effects. This may well require some expansion of the traditional professional development process for military personnel. They will need the expertise for an improved capacity to manage a broad spectrum of tools for achieving desired effects as well as the less complex challenge of Huntington’s 1957 notions about managing violence.

And so it is that a new first question—“What is the desired effect at the strategic level?”—can open the door to a more holistic assessment of and response to the security predicaments in which we find ourselves. As such, it broadens our perspective to go beyond a traditional focus on military instruments to include a more balanced appreciation for nonkinetic alternatives in the natural domains of land, sea, air, and space and, equally important, the emerging cyber domain. Once our national security leadership has developed desired effects, they become touchstones that can enable military professionals to go about the task of arraying, selecting, and implementing appropriate strategies and instruments of power. Needless to say, desired effects exist at the operational and tactical as well as the strategic level. Civilian leadership is likely to call for greater military involvement in the development of desired effects at these less strategic levels.

The Need to Update Huntington’s Framework: The Sony Example

As we wrote this article, our national leadership’s response to the challenge of the cyber strike against Sony Corporation could be described as perplexed, if not confused. Whether it was an attack on a vital American interest or, less seriously, an act of vandalism was unclear. The strike was apparently the product of a national decision by North Korea, but the target was a nonstate actor (Sony), and the location of the strike force could well have been a third country. The attack, while not violent in a traditional way, was serious in its costly impact of some $300 million in damages as well as its negative impact on an American First Amendment core value. In short, it represented major new answers to at least two of the fundamental questions asked by Professor Hoffmann: What can the actors do to one another? What do the actors wish to do to one another? From a traditional perspective, North Korea was not a new participant in our nation’s historical arena of conflict, but it was clearly acting in a new cyber domain, which made its fundamental character very different from what we faced when it invaded South Korea in 1950. As such, there may or may not have been a new answer to Hoffmann’s third question.

Whatever the case, the 1957 vintage Huntington model was proved an inadequate framework for dealing with the North Korean strike against Sony. Indeed, its narrow focus on traditional instruments of force seemed to suggest only two alternatives, both of which were unacceptable. Few, including the President of the United States, were willing to respond with kinetic instruments of power. At the same time, the United States wanted to make clear to North Korea and the world that the strike against Sony would not go unpunished. Perhaps this notion of punishment was the “desired effect.” If so, the instruments of power to create such punishment fell largely outside the traditional tools relevant to Huntington’s definition of the “unique military expertise” as the “management of violence.”

Conclusion

National security conflicts are increasingly a battle of wits, and we must update the way we use them to match the increasingly complicated world in which we live. The challenge goes well beyond what we think; it is also how we think about problem sets that rests on new realities and principles that render traditional linear approaches insufficient, if not irrelevant. Against this background, Huntington’s classic framework has proved inadequate for accommodating the cognitive and operational pathways required for meeting today’s challenges of the orientation and subsequent phases of Boyd’s OODA loop. The Sony crisis can, however, provide an important learning experience for dealing with even more serious situations of a similar nature in the future.

General Dubik’s assertion that our modern dichotomy of winning battles and losing wars can be attributed at least in part to the “civil-military nexus that underpins how America wages war” has substantial merit. Waging war involves selecting proper war aims; we see this as the crafting of desired effects and consider it to be primarily the responsibility of senior civilian policy leaders as an initial step in their decision matrix. Such desired effects rise above the selection of kinetic and nonkinetic instruments for their achievement. As such, they provide a critical context for the selection of relevant instruments and their operational deployment. This, we believe, is a managerial and leadership responsibility of the military profession.

In summary, we are calling for a new way of thinking on the part of our senior national security leaders, both military and civilian, to accommodate new answers to Professor Hoffmann’s three salient questions. This new way of thinking requires us to adapt our simplifying lens to the more complicated world of the 21st century. It also requires us to ask a new question at the outset: What effects do we want to achieve using both hard and soft power? Fortunately, as cognitive psychologists tell us, we are “wired” to do this.

*About the authors:
Admiral James G. Stavridis, USN (Ret.), Ph.D., is Dean of the Fletcher School of Law and Diplomacy at Tufts University. Lieutenant General Ervin J. Rokke, USAF (Ret.), Ph.D., is the Senior Scholar in the Center for Character and Leadership Development at the U.S. Air Force Academy. Captain Terry C. Pierce, USN (Ret.), Ph.D., is Director of the Department of Homeland Security Center of Innovation at the U.S. Air Force Academy.

Source:
This article was published in the Joint Force Quarterly 82, which is published by the National Defense University.

Notes:
1 Don Clark and Nathan Olivarez-Giles, “Hackers Hit Sony, Microsoft Videogame Services,” Wall Street Journal, December 27–28, 2014, B1.

2 Carol Lee and Jay Solomon, “North Korean Arms Dealers Targeted,” Wall Street Journal, January 3–4, 2015, A1.

3 Samuel P. Huntington, The Soldier and the State: The Theory and Politics of Civil-Military Relations (Cambridge: The Belknap Press, 1957), 7.

4 Ibid., 11.

5 Ibid.

6 Joseph S. Nye, Jr., Soft Power: The Means to Success in World Politics (New York: PublicAffairs, 2004), 1.

7 Joseph S. Nye, Jr., The Future of Power (New York: PublicAffairs, 2011), 113–114.

8 Huntington, viii.

9 Ibid, 1.

10 Isaac Porche, Jerry Sollinger, and Shawn McKay, “An Enemy Without Boundaries,” United States Naval Institute Proceedings 138, no. 10 (October 2012), 35.

11 Jason Healey, “No, Cyberwarfare Isn’t as Dangerous as Nuclear War,” U.S. News and World Report, March 20, 2013.

12 James Manyika et al., Disruptive Technologies: Advances That Will Transform Life, Business, and the Global Economy (New York: McKinsey Global Institute, May 2013).

13 Stanley Hoffmann, The State of War: Essays on the Theory and Practice of International Politics (New York: Praeger, 1965), 92–93.

14 William S. Lind, “Understanding Fourth Generation War,” Military Review, September–October 2004, 12.

15 Ibid.

16 Ibid., 12–16.

17 Robert Coram, Boyd: The Fighter Pilot Who Changed the Art of War (Boston: Back Bay Books, 2002), 327–344.

18 Ervin J. Rokke, Thomas A. Drohan, and Terry C. Pierce, “Combined Effects Power,” Joint Force Quarterly 73 (2nd Quarter 2014).

19 Ibid.

20 James Dubik, “Winning Battles, Losing Wars,” Army Magazine, December 2014, 16–17.

Crimes Against Peace: The Chilcot Inquiry, Tony Blair And Iraq – OpEd

$
0
0

Keep Calm But I Told You So. — Russian Embassy, UK, Tweet, Jul 6, 2016

Britain is in political turmoil, but even prior to that, there was that old problem of why Her Majesty’s government went to war in a disastrous conflict that had no immediate, security related grounds. The reasons for invading Iraq were more ideological than scientific, more evangelical than rational.

One of the greater evangelists in this mission of folly was former British Prime Minister Tony Blair. Britain may well have been in search of a role after empire, and here it was by way of redux, a traditional stomping ground in the Middle East. The hope was also personal. Ego, and the desperate sense of purchasing goodwill in Washington, seemed to preoccupy Blair.

The result of going into Iraq in a fit of moral outrage and strategic bravado was disastrous. Actually, it was more than disastrous. Virtually every murderous spin off in the Middle East has its provenance in the disturbances of the Coalition of the bungling willing in 2003.

That war suggested much about what was wrong with the Anglosphere, with its various satraps and misguided assumptions. The United States was charging into a bloody engagement hoping its not too questioning followers, the UK and Australia, would join in. They were right, with Blair giving a pre-determined commitment of British forces on July 28, 2002, a good deal prior to the formal Parliamentary vote on whether military intervention against Iraq was warranted.

Sir John Chilcot as Chairman of the Iraq Inquiry was hoping to do much. The inquiry, he hoped, would give us lessons that would “help ensure that, if we face similar situations in future, the government of the day is best equipped to respond to those situations in the most effective manner in the best interests of the country.”[1]

For all of that, the history of this inquiry is characterised by chronic, mind numbing delay. Britain’s gift to the world was not merely a civil service but one of uncivil disservice when required. Such pursuits have their own rationale and powers of justification.

While the inquiry’s process has been unsatisfactory, Chilcot’s findings are now the stuff of pure affirmation.[2] There is noting new in it. Iraq’s previously sponsored dictator Saddam Hussein posed no immediate threat to Western states in 2003. Peaceful options prior to the use of force, a grave decision in international relations, had not been exhausted.

When the UK Ministry of Defence had committed to the bloody effort, it found itself woefully underprepared. Its inventory was poor, lacking in essential equipment such as armoured patrol vehicles and helicopters. The use of improvised explosive devices (IEDs), the great deliverer of asymmetrical warfare, was not taken seriously.

The rest of the stage for the day was set by Blair’s apologetics. “The report,” claimed Blair in a statement, “should lay to rest allegations of bad faith, lies or deceit.” This is standard Blair: muddle the issue, obfuscate the finding. Regard sorrow and faith as forgivable faults.

Conveniently missed is a vital fact: fanatical, uninformed belief has been the basis of some of history’s most blood sodden decisions. And to say that deception was not part of it is to misread the report, which notes the desire on the part of President George W. Bush and Blair, to invade for reasons of regime change.

Few ever go to wars, legal or otherwise, without faith. That hardly constitutes grounds for letting planners of the hook. Crimes against peace, articulated by the Nuremberg International Military Tribunal, are arguably the gravest of crimes. Whatever the faulty evidence, the diplomatic option or a continued strategy of containment, none of these mattered with a decision taken well in advance, a common plan of aggression.

Blair did make a feeble attempt to comb through the minute details by way of exoneration. In an attempt to appease the British public, and his God, he asserts that Chilcot did not find “falsification or improper use of Intelligence (para 876 vol 4).” He notes the finding that he did not deceive Cabinet (para 953 vol 5) and claims that Chilcot found against a “secret commitment to war whether at Crawford Texas in April 2002 or elsewhere (para 572 onwards vol 1).” There are lies, and then there are lies.

One can sense Blair’s relief that the inquiry did not make a finding on one of the most fundamental points that would make a prosecutor’s brief stick: whether the action to attack Iraq was itself legal. He makes much hay out of the point of a “finding” by the Attorney-General that there was a lawful basis by March 13, 2003 for possible military action (para 933 vol 5). On that score, Chilcot could have done much more.

Blair then gives us his reflection about consequences, which sound all too much like a defence before a future criminal tribunal – as well as it might. He accepts the errors of his administration, treating them like desk job miscalculations, only to then claim that it was perfectly right to remove Saddam. Forget the “underestimated” consequences, as Chilcot rather blandly calls them.

Furthermore, he continues in his refusal to accept that “the cause of terrorism we see today whether in the Middle East or elsewhere in the world” had anything to do with this adventurous gamble. Object and belief trumped procedure and execution. Such reasons are as good any for a formal conviction.

Notes: 
[1] http://www.iraqinquiry.org.uk/

[2] http://www.iraqinquiry.org.uk/the-report/

Seven Countries Seen Emerging As ICT Frontrunners In Fourth Industrial Revolution

$
0
0

Finland, Switzerland, Sweden, Israel, Singapore, the Netherlands and the United States are leading the world when it comes to generating economic impact from investments in information and communications technologies (ICT), according to the World Economic Forum’s Global Information Technology Report 2016.

On average, this group of high-achieving economies at the pinnacle of the report’s Networked Readiness Index (NRI) economic impact pillar scores 33% higher than other advanced economies and 100% more than emerging and developing economies. The seven are all known for being early and enthusiastic adopters of ICT and their emergence is significant as it demonstrates that adoption of ICTs – coupled with a supportive enabling environment characterized by sound regulation, quality infrastructure and ready skills supply among other factors – can pave the way to wider benefits.

The breakaway of these seven economies is significant for other nations given the role that networked readiness is likely to play as the world transitions to the Fourth Industrial Revolution. The Global Information Technology Report 2016 finds high levels of confidence among business leaders that capacity to innovate is increasing, which suggests that other nations, too, could start to see more economic and social impact from ICT. However, on a cautionary note, the NRI data also suggest that individuals are driving ICT adoption much more enthusiastically than either governments or business, where no clear trends are discernible across regions since 2012.

Singapore leads the Networked Readiness Index in 2016

The 2016 edition of the NRI finds Singapore as the highest-placed country in the world when it comes to networked readiness. Finland, which topped the ranking in 2014, remains in second place for a second year in a row, followed by Sweden (3rd), Norway (4th) and the United States (5th), which climbed two places. Making up the rest of the top 10 are the Netherlands, Switzerland, the United Kingdom, Luxembourg and Japan.

While the upper echelons of the NRI continue to reflect a strong correlation between networked readiness and per capita income, roughly 75% of the countries included in this year’s index show a score improvement in 2016. However, convergence both at the global and regional level remains elusive, with four regions – Eurasia, Emerging Europe, the Middle East, North Africa and Pakistan (MENAP) group, and sub-Saharan Africa – having widened the gap between the most and least networked-ready since 2012.

Elsewhere in the NRI, of the large emerging markets, Russia remains unchanged at 41st position. China comes next, moving up 3 places to 59th. South Africa improves markedly, climbing 10 places to 65th, while Brazil partially recovers from a previous downward trend to 72nd this year and India drops two places to 91st.

Europe remains at the technology frontier; seven of the top 10 NRI countries are European. Yet the performance range is wide, with Greece dropping four places to 70th position and Bosnia and Herzegovina closing the group at 97. Several Eastern European countries, notably the Slovak Republic, Poland and the Czech Republic, are making big strides, landing spots in the NRI top 50. Better affordability and large improvements in economic and social impacts are making major contributions to this success. Italy is another notable mover this year, improving 10 places to 45th position as the economic and social impacts of ICT are starting to be realized (up 18 in the global impact ranking).

The Eurasia region continues its upward trajectory, with the average NRI for the region increasing significantly since 2012. In particular, it is notable that the improvement is observed across all four elements that make up the index: environment, readiness, usage and impact. The region is led by Kazakhstan, which continues on its positive trajectory of recent years to land in 39th position.

Malaysia leads the Emerging Asian economies in 2016 and moves up one spot to 31st position overall. The country continues to perform strongly, supported by a government which is fully committed to the digital agenda. The top five in the region in terms of overall ICT readiness remain Malaysia, Mongolia, Thailand, China and Sri Lanka as in 2015. The group of Emerging Asian countries has been moving up and converging since 2012. Individual usage in the region is still one of the lowest in the world, but has been growing strongly in recent years.

The performance range by countries in the Latin America and Caribbean region remains widely dispersed with almost 100 places between Chile (38th) and Haiti (137th). There was no clear trend from 2015 to 2016 in terms of relative performance, with Chile and Haiti staying put and, of the remaining group, half of the countries improving their ranking and the other half dropping. Considering the absolute NRI score, however, the region has been moving up and converging since 2012. In order to foster the innovation forces that are key for thriving in the digitized world and the emerging Fourth Industrial Revolution, many governments in the region will urgently need to reinforce efforts to improve their regulatory and innovation environments.

The United Arab Emirates (26th) and Qatar (27th) continue to lead the Arab world in networked-readiness. In addition, the MENAP region (Middle East, North Africa and Pakistan) is home to two of the biggest movers in this year’s ranking: Kuwait (61st, up 11) and Lebanon (88th, up 11). In both cases, individuals are leading the charge, with the business sector catching up and strongly contributing to the successful performance. While governments are lagging behind in terms of digital adoption (Kuwait, 81st; Lebanon, 124th), the business community in both countries is registering an increased weight on ICT in government vision and efforts to improve the regulatory environment.

The NRI also sees several sub-Saharan African countries among the top upward movers, including South Africa (65th, up 10), Ethiopia (120th, up 10) and Côte d’Ivoire (106th, up 9). Leadership, in terms of digital adoption, is coming from different groups of stakeholders. While efforts are very much government-driven in Ethiopia and Côte d’Ivoire, the business sector is providing the most momentum in South Africa. The largest barriers to tackle for Côte d’Ivoire will be infrastructure and affordability; reversing the trend of a deteriorating business and innovation environment for South Africa; and boosting individual usage and skills for Ethiopia.

“The digital economy is an essential part of the architecture of the Fourth Industrial Revolution. In order for digital technology to continue contributing economic and social impact, societies need to anticipate its effects on markets and to ensure a fair deal for workers in digitized market environments. New models of governance will be key in this,” said Richard Samans, Head of the Centre for the Global Agenda, Member of the Managing Board, World Economic Forum Geneva.

“Cross-border data flows drive innovation and growth,” said Pastora Valero, Vice President of Government Affairs, Cisco. “The countries and companies innovating most prominently know that it is the free flow of ideas and information, which leads to improvements in processes and products. Initiatives to foster the free flow of data are crucial to supporting the global nature of the data economy.”

Trump’s Trend Of Bigotry Can’t Be Easily Excused – OpEd

$
0
0

By Mitchell Blatt*

Donald Trump on July 2 tweeted an image of Hillary Clinton in front of a pile of money with the quote “Most Corrupt Candidate Ever!” inside the outline of a Star of David. As usual with acts of bigotry from Trump, Trump’s defenders are out in full force to defend him.

“That’s not a Star of David, it’s just “a star”,” Mary Ann Arlotta wrote on Facebook.

“I’m fairly certain that same shape is on Microsoft PowerPoint,” Rhea Paseur wrote.

Mark Ross wrote, “Some call it the satanic star while others call it the Star of David.” (The pentagram, aka “the satanic star,” has five sides, but anti-Semitic conspiracy theorists do consider the Star of David to be a “Satanic Hexagram.”)

This is becoming a familiar pattern in the Trump campaign: Trump does something bigoted and/or incredibly stupid. Trump fans, whom Trump joked would support him if he killed someone on 5th Avenue, display their gymnastics abilities by defending him.

As Facebook user Kevin Wos wrote, in an explanation that anyone with the faintest understanding of history doesn’t need to read, “Oh yeah, because a Star of David combined with images of money and talk of corruption couldn’t possibly be a dog whistle for the far right. Nope, not anti-Semitic at all!”

The issue, furthermore, comes down to reputation and track record. People are granted a number of mistakes. Trump deleted this tweet afterwards and reuploaded the same image with a circle in the place of the Star of David, so one might be charitable if it was the first time he said or did something bigoted against a minority ethnic group.

But when you have a record of refusing to denounce the KKK on live TV, calling a judge “Mexican” and saying he thus is unqualified to preside over a trial, tweeting white supremacists named “#WhiteGenocide,” launching a months long war on a female reporter and calling her a “bimbo,” tweeting a fabricated image that greatly exaggerated the amount of black-on-white murders, implying that Ted Cruz’s heritage as a Cuban means he can’t be an evangelical Christian, calling for a ban on Muslim immigration or travel, and generally making a stream of racist and racially-tinged statements all along the campaign trail (this paragraph would never end if I detailed them all), then you don’t have much room to whine about being taken out of context.

Each time Trump did something nasty, his backers—and sometimes himself—would cook up schemes to excuse his vulgar behavior. When Trump said Megyn Kelly was bleeding from “somewhere,” he issued a statement saying he was talking about her nose (as if just being an unhinged whiner was so much better than being an unhinged whining sexist). When Trump mocked a disabled man by exaggerating his hand movements, he claimed he didn’t know the man, who had interviewed him multiple times, was disabled, and that he just happened to be waving his arms around wildly on stage because that’s what ordinary people do while speaking.

It was be easier (but not easy) to dismiss any one of those comments as a mistake, an outlier, a fluke, if it only happened once. After a while, you build up a track record by which you can be judged. It’s a lot harder to argue every one of those statements was a misunderstanding.

About the author:
*Mitchell Blatt moved to China in 2012, and since then he has traveled and written about politics and culture throughout Asia. A writer and journalist, based in China, he is the lead author of Panda Guides Hong Kong guidebook and a contributor to outlets including The Federalist, China.org.cn, The Daily Caller, and Vagabond Journey. Fluent in Chinese, he has lived and traveled in Asia for three years, blogging about his travels at ChinaTravelWriter.com. You can follow him on Twitter at @MitchBlatt.

Source:
This article was published at Bombs and Dollars


Real-Time Video Streaming And Its Security Concerns – Analysis

$
0
0

The recent real-time broadcast of an attack on a French police commander on Facebook Live has raised concerns that others may be inspired to emulate such attacks in future, highlighting the ever-growing security conundrum for social media companies.

By Dymples Leong*

The recent attack of a French police commander and his partner by Larossi Abballa, an individual known to French authorities as an Islamist extremist and the simultaneous screening of the attack on Facebook Live, was the first instance in which the video of a terror act was live streamed on a social media platform.

Such an attack has once again turned the spotlight on social media platforms and their abuse by certain individuals for various nefarious purposes and the renewed calls for social media companies such as Facebook to do more to reduce the avenues and platforms for hate speech and terror.

Going Live

Initially open to celebrities and media practitioners, Facebook Live was expanded for all users in March 2016. Used by many from politicians sharing snippets of their lives with supporters, to podcasting political debates and companies promoting content marketing efforts, Facebook Live allows users to broadcast live videos to followers, in real-time. Research from Facebook demonstrated that the amount of time users spent viewing live videos was 3 times more than a video that was not broadcast live.

While Facebook’s idea of live videos is not novel (with competitors such as Periscope and Meerkat being among the early market adopters), live streaming videos is appealing to many companies and individuals; having the potential to connect, discuss and interact with 1.65 billion active users worldwide on Facebook enables the domination of the ‘attention market’.

Videos that are broadcast cannot be edited or moderated, providing followers a sincere, honest, emotional and ‘raw’ aspect of content, as opposed to commercialised content curated videos. Users are able to track the instantaneous reactions of followers, providing an online video experience that is both engaging and immersive.

Facebook, the ‘Online Global Police’

Facebook has shown much commitment in removing offensive and violent content (such as content that glorifies or celebrates violence or terrorism) that infringes on their terms of service. Such posts are usually flagged and reported by users within the online community, with platform providers removing offensive content within 24 hours of a report being made. Experts agree that Facebook is one of the leaders in taking decisive action in responding to flagged posts.

Having earned praise for its commitment to actively remove accounts which promotes terrorism, providing tools to counter violent speech online and by working with authorities, governments and the public are pressing for more. Governments have pressured the company into releasing all online activities of terrorists; and victims of terror attacks have attempted to file lawsuits against companies such as Facebook, Google and Twitter, for allegedly allowing terrorists to use the platforms as tools for extremist activities.

Although the chances of success for such requests are slim it reflects an increasing series of questions and concerns about the role of tech companies and their participation against terror, and the constant urging by governments that tech companies can and should do more in monitoring, assessing and removing content related to offensive and violent content online.

Dilemma of Live Streaming

Live streaming videos present a different dilemma. Incidents of violence are becoming increasingly common on live-streaming sites. In May this year a woman in France broadcast her suicide in real time on the live-streaming video site Periscope as she threw herself in front of a moving train, and a teenaged girl was accused of broadcasting her friend’s alleged rape on Periscope.

Unlike a television network, the same attributes of Facebook Live’s popularity limits the company from identifying, disrupting or removing offensive or undesirable videos before it goes live. While Abballa’s video was removed and profile account deactivated by the company, what is not known is the number of people who had viewed the video before its deactivation.

The video, while removed from Facebook, continues to be circulated and shared on closed sites and private channels in other mediums. There are also concerns that others may be similarly inspired to broadcast future attacks in like manner, creating further conundrums for social media companies.

The inclusion of children in ISIS Nusantara propaganda outreach is indeed worrying as it marks a progressive milestone for ISIS’ ultimate realisation of a relentless and unforgiving world that would rob the children of their own innocence.

The Future is Video

Following the aftermath of the Paris shooting, Facebook stated that it was in the midst of expanding its live video review team, exploring the review of video broadcasts that are viral before they are flagged by users, and investigating the possibility of using AI (Artificial Intelligence) tools to interpret and classify live videos in real time.

While these measures will not ultimately deter individuals from abusing the platform’s tools for nefarious purposes, it does create significant barriers to these videos from garnering greater publicity and becoming viral, significantly reducing reach and denying these individuals the global attention they crave.

The tech industry is increasingly shifting focus to find ways to enhance video offerings such as incorporating machine learning and neural algorithms on various platforms. Facebook has predicted that the written word will be rendered obsolete on the platform, with video trouncing it as the go-to communication on the web. With Facebook founder Mark Zuckerberg believing that the future of the social media platform lies in video, it seems like the debate of protecting freedom of expression and ensuring that the platform remains a safe and secure avenue for users will only intensify in the years to come.

*Dymples Leong is a Research Analyst at the Centre of Excellence for National Security (CENS), a constituent unit of the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

Obama’s Drone Death Report Numbers Don’t Add Up – OpEd

$
0
0

More than three years after President Barack Obama pledged to be transparent about the United States’ lethal drone program, his administration has finally come forward with an accounting of the numbers of civilian deaths that resulted from drone strikes between Jan. 20, 2009, and Dec. 31, 2015. But they only cover airstrikes “outside areas of active hostilities,” which encompasses Pakistan, Yemen, Somalia and Libya. Civilian deaths in Afghanistan, Iraq and Syria are not included in the report.

As expected, the administration’s numbers are significantly lower than tallies documented by leading nongovernmental organizations (NGOs), including the London-based Bureau of Investigative Journalism, New America and The Long War Journal. Obama’s Office of the Director of National Intelligence(DNI) sets the figure of “noncombatant deaths” at between 64 and 116. The NGOs , however, estimate between 200 and 1,000 civilian deaths occurred as a result of U.S. drone strikes in the areas, and during the time periods, covered by the DNI report.

The DNI report omits significant details that would enable the public to fully assess its claims, including the locations, dates, numbers and names of both civilians and combatants killed in each airstrike. Micah Zenko, a senior fellow at the Council on Foreign Relations, told The Washington Post that releasing raw numbers without explanation “leaves reason to remain skeptical of the government’s claims. You can’t grade your own homework.”

There is good reason to distrust the DNI’s claimed numbers of civilian casualties. “Every previous (rare) public, on-record statement made by the Obama administration on the program has been shown to be false or deeply misleading,” the international human rights organization Reprieve noted in a recent report. “Moreover, the administration has repeatedly shifted the goal posts, secretly redefining who can be targeted and what it means to be a civilian,” it said.

One of the Obama administration’s most notorious lies was the statement of current CIA Director and former counterterrorism adviser John Brennan, who claimed in June 2011 that there had not been a “single collateral death”caused by drones in 2010-2011. As Reprieve reports, the CIA knew that statement was false at the time it was made. The Bureau of Investigative Journalism documented at least 45 civilian casualties during that period.

While the DNI report is far from perfect, it provides much more information than the administration previously disclosed. Before the report was released, the U.S. had admitted responsibility for only two civilian deaths: the 2015 accidental killing of two aid workers held hostage by al-Qaida in Pakistan. Both those victims were Westerners.

But much more information is needed. It is disappointing that the report lumps together seven years of airstrikes, making it impossible to gauge whether Obama is complying with the rules he established in 2013 for his targeted killings.

The 2013 Presidential Policy Guidance remains classified. The White House released a fact sheetthat year requiring that strikes outside areas of active hostilities be taken only in the face of a “continuing, imminent threat to U.S. persons” and when there is “near certainty that the terrorist target is present.”

Although the fact sheet did not define “continuing” or “imminent,” a leaked 2011 Department of Justice white paper said that a U.S. citizen can be killed even when there is no “clear evidence that a specific attack on U.S. persons and interests will take place in the immediate future.” This makes a mockery of the “imminence” requirement for killing U.S. citizens. The administration presumably sets an even lower bar for noncitizens.

It is impossible to fathom how the administration can have near certainty that a terrorist target is present. One type of drone attack is called a “signature strike,” also known as a crowd killing. A signature strike does not target specified individuals but rather areas of suspicious activity. In many instances, the U.S. doesn’t know whom it is killing.

Along with the DNI report, Obama released an executive order prioritizing the protection of civilians and requiring that future administrations be forthcoming about annual deaths from the drone program. One wonders why Obama waited until seven years into his presidency and seven months before leaving office to prioritize the protection of civilians and advocate transparency. And any future president is free to modify or rescind his order.

Obama’s order says, “Civilian casualties are a tragic and at times unavoidable consequence of the use of force in situations of armed conflict or in the exercise of a state’s inherent right of self-defense.”

It is puzzling that Obama would invoke the United Nations Charter’s right of self-defense—the only exception to the charter’s prohibition of military force. The charter permits a state to act in self-defense only after an armed attack on the United States or another U.N. member state. Pakistan, Yemen, Somalia and Libya have not mounted an armed attack against the U.S. or any other U.N. member country. (Neither have Iraq, Afghanistan or Syria, for that matter.) So there is no lawful basis for the U.S. to claim it is acting in self-defense when it launches airstrikes in those countries.

When a state is engaged in armed conflict, it must abide by the laws of war, or international humanitarian law. That means the use of force must satisfy the distinction andproportionality requirements. In order to comply with the distinction mandate, the state must always distinguish between combatants and civilians. Proportionality means that an attack cannot be excessive in relation to the anticipated military advantage.

The evidence shows we cannot trust the administration to comply with these legal requirements. “The Drone Papers”is a treasure trove of secret military documents provided to The Intercept by an anonymous whistleblower, a member of the intelligence establishment. Those documents indicate that the administration labels unidentified males who are killed in a strike zone “enemies killed in action,” unless there is evidence posthumously proving they were not terrorists or “unlawful enemy combatants.”

Perhaps most disturbing, “[Obama’s] order further institutionalized and normalized air strikes outside conventional war zones as a routine part of 21st-century national security policy,” Charlie Savage and Scott Shane wrote in The New York Times. Like his predecessor, Obama defines the whole world as his battlefield, reserving for himself the role of judge, jury and executioner. Compliance with due process (arrest and fair trial), which the U.S. Constitution guarantees all persons, not just U.S. citizens, has not been a priority in the Obama administration’s “war on terror.”

Drone strikes will not conquer terrorism. The bipartisan Stimson Task Force, composed of senior military and intelligence officials, warned that the “secret war” of lethal drone strikes was “creating a slippery slope toward continual or widening conflict and instability.”

Four former Air Force service members who participated in the drone program are Brandon Bryant, Michael Haas, Stephen Lewis and Cian Westmoreland. They wrote an open letter to Obama saying that the drone program has “fueled the feelings of hatred that ignited terrorism and groups like [Islamic State]” and that the killing of civilians in drone strikes has been one of the most “devastating driving forces for terrorism and destabilization around the world.”

This article was originally published by Truthdig.

Greece: The Struggle Of Sticking To Its Word – OpEd

$
0
0

While the rest of Europe is still catching its breath after the tenuous migration deal with Turkey, Athens remains on the hook for the sizeable and increasingly desperate population of refugees and migrants now trapped in Greece. With the northern borders shut and Greek officials countering pressure from Brussels to send migrants back across the Aegean, over 50,000 migrants are now living in makeshift facilities in the European country worst equipped to help them.

Volunteers working in Thessaloniki recently raised the alarm over conditions “not fit for animals” at what are supposedly permanent housing facilities, with old factories and other repurposed buildings that lack both electricity and running water filled with tents pitched on dirty concrete. Another source of security concerns for the public has been the use of the Skaramangas shipyard as a makeshift housing facility, with nearly 3,000 people now living there and potentially as many as 7,000 arriving in the near future. The Skaramangas camp is located in close proximity to a sensitive military and industrial site, notably home to Greece’s Type 214 submarines. Ironically, the program to commandeer such sites for use as camps is being run by defense minister Panos Kammenos, who announced in February that the Greek military would be overseeing the response to the migrant crisis. The country’s struggles in dealing with the migrant problem, taken in conjunction with the sputtering economic recovery, have reinforced Greece’s uncontested claim to the title of “sick man of Europe.”

The unresolved migrant issue comes as yet another blow for Alexis Tsipras and his government, who have spent much of their time in power backtracking on onetime promises to undo the austerity regime. Just last month, they agreed to a whole suite of austerity measures equal to some 2% of gross domestic product and new taxes on fuel, tobacco, alcohol, hotel stays and cars. After vowing they would put a stop to the privatization of Greece’s bloated public sector, Tsipras and his allies rubber-stamped a buy-out of the Piraeus port (which is also being used to house thousands of stranded migrants) by Chinese shipping business COSCO and signed a major privatization deal with German airport operator Fraport, which now has a €1.2 billion contract to lease and manage 14 regional airports.

Even so, the Greek economy continues to limp ahead without major impetus for growth. The collapse now seems to have become the new normal: Greece has shed a quarter of its GDP since 2007, while the national unemployment level has teetered around 25% for four years and the youth employment level has been stuck at about 50% for even longer than that. The financial irresponsibility of past leaders and the halting reform efforts of the current government has led to a major brain drain, with the best, brightest and most ambitious leaving for new opportunities. Those left seem resigned to enduring life in a country that seems almost endemically mismanaged.

For their part, Tspiras and some of his coalition partners have always viewed the debt crisis through a prism of national pride. The prime minister is the same man who said the IMF bore “criminal responsibility” for his country’s cash crisis. His lieutenants’ language has not been that of negotiation, but defiance. It was Kammenos who rattled the nerves of the entire continent by ominously warning last year: “If Europe leaves us in the crisis, we will flood it with migrants, and it will be even worse for Berlin if in that wave of millions of economic migrants there will be some jihadists of the Islamic State too.”

In the face of statements like these, it’s understandable that markets remain to be convinced. The Piraeus deal was only passed after six months of torturous wrangling. Meanwhile, a gold mining initiative spearheaded by Canada’s Eldorado Group devolved into a highly-publicized spat between the company and Greek officialdom, while the fate of the aforementioned Skaramangas shipyards remains embroiled in a legal battle between the government and owner Abu Dhabi MAR. The government is planning to unify all the shipyards under one body and expropriate the owners of the shipyards.

Indeed, Finance minister Euclid Tsakalotos, is now putting into motion plans to nullify parts of the 2010 accord and force the shipyard to refund an “illicit aid” payment involving its previous owners. The debate over the Skaramangas shipyard has raised questions of potential involvement by competitor Nikos Tavoularis (owner of Elefsis Shipyards) who, according to a report in Parapolitika, has plans to take over Skaramangas and fold it into a unified shipbuilding industry with the government’s help.

For all these hurdles, Greece seems to be on the right track. The question is: will it last? The answer might be no. Syriza rose to power on a fervently anti-austerity ticket, with Tsipras positioning the austerity agenda as a foe that would be resisted and defeated. So far, he and his party have made concessions, but a continuing absence of growth could well see them revert to their old platform if cooperation comes to be seen as a losing strategy. Looking from the outside, the constant specter of Greece relapsing into unreliability is still enough to spook investors and international partners.

*Theodoros Papadopoulos is a consultant and researcher based out of London, specialized in the institutional evolutions of Eastern Europe and Africa.

Insurgency In Southern Thailand: More Unrest Ahead? – Analysis

$
0
0

Growing discontent in Southern Thailand has led to a significant increase in the number of attacks in the region, a surge in radical online activity as well as the revival of militant groups that are thought to be defunct or dormant. These trends portend more unrest in the coming months and render the region vulnerable to exploitation by groups like ISIL/ISIS.

By Vikram Rajakumar*

On the evening of 26 June 2016, a powerful car bomb exploded along a busy street at Sungai Golok (near the Thai-Malaysia border) killing four people, three of whom were Malaysians. This explosion came in the wake of an upsurge of violence in South Thailand since March 2016. Several days earlier, insurgents detonated two floating bombs near a wharf in Pattani; this new form of attack is believed to be a trial run for such devices. Throughout the month, there were three major bomb attacks that killed 12 people, among them several soldiers.

Southern Thai insurgents have also been very active on social media domains as reported in an earlier Commentary. (See Vikram Rajakumar “Insurgency in Southern Thailand: What Does ISIL’s Black Flag of Pattani Portend?”) (08 April 2016). Social media platforms have become a new front for the insurgents to win recruits and rally support for their militant campaign for autonomy. Their online propaganda efforts have clearly resonated in the real world as seen in the attacks targeted at government and security personnel and institutions.

Revival of Southern Thai Insurgent Groups

Since the shutting down of an Islamic school (Jihad Wittaya or “Pondok Jihad”) by the Thai government in 2005 and confiscation of its land by the courts in December 2015, the trust between the government and the southern Thai Malay Muslim community has been severely impaired. It has proved to be the turning point for the insurgency as seen in the escalation of bombings and attempted bombings since early this year. Although there have been many bombing incidents since 2008, April 2016 alone saw a 42% increase in attacks, according to terrorism specialist Dr. Zachary Abuza on 1 May 2016.

The upsurge in violence and online activity has been accompanied by the revival of hitherto defunct and dormant breakaway factions of the Pattani United Liberation Organisation (PULO), one of the most active insurgent groups in the south. The resurrection of these groups, which include the Nampra Army (PULO’s armed wing that was active from 1976-1990) and the Pattani Liberation Army, are possible game changers to the restive region. (Nampra stands for Negara Melayu Patani Raya or the Malay State of Patani Raya.)

The appearance of Nampra Army in February 2016 was confirmed when rocket explosives were found with the PULO MKP’s sticker flags (PULO MKP is a term used by radicals to distinguish PULO’s two factions). The PULO MKP split from PULO several years ago and is directed by Kasturi Mahkota who is based in Gothenburg, Sweden. Kasturi’s faction is part of MARA Pattani, a coalition made up of six insurgent groups formed in August 2015.

The coalition had expressed the desire to engage in a peace dialogue with the Thai government on the condition that the Thai state officially recognises it as an official entity with legal and diplomatic immunity. Though this has been reported in the media, the Thai government has not acknowledged it.

Alleged Human Rights Abuses

The Pattani Liberation Army (PLA) was an organisation formed in 2009 when PULO and the Group of Mujahidin Islam Patani (GMIP) formed an alliance. They agreed to jointly form a unified military wing, the PLA, under the command of the First Deputy Military Commander of PULO. The PLA was thought to be defunct, but in the last one week, there have been Facebook posts suggesting that the PLA has been revived and has re-joined forces with PULO’s main arm.

The upsurge of violence and simultaneous burst of online radical activity and revival of defunct or dormant insurgent groups are portentous developments. They reflect the strained relations between the Thai government and southern Thais, stemming from the ‘Pondok Jihad’ dispute as well as issues concerning tight military control and alleged human rights abuses and ill-treatment of detainees.

Traditional insurgent networks and alliances are being utilised in unpredictable ways. That social media accounts related to Thai insurgent groups have begun using flags and symbols of the so-called Islamic State of Iraq and the Levant (ISIL) also known as ISIS are ominous; whether these groups have adopted the same goals as ISIS however remains unclear.

PULO had issued a statement in February 2016, declaring that it does not have anything to do with ISIS. However, given the spike in violence since this statement, and the increase in online clamour for autonomy using Islam as a cantilever, more investigation is necessary to determine whether there are any links between local insurgents and ISIS.

Remembering Krue Se and Tak Bai

Recent developments suggest that ISIS is increasing its presence in Southeast Asia and targeting vulnerable groups in South Philippines, Indonesia, Malaysia and South Thailand. ISIS has published the first edition of a newspaper meant for speakers of the Malay Language which is also widely spoken in Southern Thailand. The publication, Al-Fatihin, was revealed on 20 June 2016 by Furat Media, an IS-affiliated media agency.

This was followed by the release of a 21-minute video by the Islamic State’s Philippines Media Office entitled “The Solid Structure”, featuring Southeast Asians from Malaysia, Indonesia and the Philippines, pledging allegiance to the group. One of the individuals, Abu ‘Aun Al-Malizi, a Malaysian, identifies Thai nationals as part of the Katibah Nusantara (a dedicated Southeast Asian military unit in ISIS), and that fighters will return to their homelands with new skillsets, ready to wage jihad.

ISIS videos with Malay subtitles are also being widely circulated on Thai social media. These significant developments to the jihadi landscape have the potential to aggravate radicalism and militancy in the already simmering south.

The possibility of more attacks like the Sungai Golok blast on 26 June cannot be ruled out. Social media platforms are teeming with radical activity, disseminating videos displaying the training of insurgents and the making of bombs as well as sermons, caricatures and pictures depicting atrocities that southern Thais had to endure.

Insurgents may view this year as an opportune moment to dramatise their cause as it marks the 12th anniversary of the Kru Se mosque and Tak Bai incidents, pivotal events in the history of the conflict; they coincide with the upcoming Thai Constitutional Referendum scheduled on 7 August 2016, when Thais will head to the polls to vote on the ruling junta’s proposed military-guided democracy. Insurgents may seize this period to mount attacks not only to commemorate past tragedies, but also to send a strong message to the Thai government that “We are

*Vikram Rajakumar is a Senior Analyst at the International Centre for Political Violence and Terrorism Research (ICPVTR) at the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

Political Deal Won’t Hamper Turkish-Palestinian Bond – OpEd

$
0
0

Hyped emotions, and political opportunism aside, the Israel-Turkey normalization deal, signed on June 27 is unfavorable for Palestinians – and for Gazans, in particular.

There is much that is being said to blame Turkey or placate the damage of seeing Turkey – which has for years been  one of the most visible backers of Palestinian Resistance – reaching out to Israel. Yet, no amount of text, statements and press releases can diminish the psychological defeat felt in Gaza following the announcement.

Gazans are emotionally exhausted after ten years of siege, dotted by devastating wars and the lack of any political horizon. Aside from their resistance, undying faith and legendary steadfastness, Palestinians in Gaza have looked up with much hope and anticipation to a few friends. One was Turkey.

The relationship was cemented in May 2010, when Israeli commandos raided the ‘Freedom Flotilla’ in international waters, killing nine Turkish humanitarian activists aboard the ‘MV Mavi Marmara’. A tenth activist died later from his wounds. Since then, many Palestinians, as well as many Turks, have felt that the relationship between Palestine and Turkey entered a new phase, not that of words, but deeds. They had more in common than sentimental gestures of friendship, now, blood and tears.

There is no question that Turkey, an important NATO member and an American ally in the region, has been under much pressure since it demoted its diplomatic ties with Israel in 2011. But the fact is, normalizing ties with Israel without the latter lifting the suffocating and deadly siege on Gaza was not a criterion for Turkey. Neither the Turkish economy, political stability nor national security was exceedingly damaged by the Turkey-Israel rift.

The little known fact is that the rift hardly affected trade between both countries. “Though political relations had hit rock bottom, both Turkey and Israel knew business must go on,” Turkey’s TRT World recently reported.

“Business and politics were separated by a Chinese-Wall like efficiency. Trade not only continued, but expanded by 26% compared to 2010.”

Moreover, 2013 and 2014 were one of the busiest years for Turkish Airlines carrying passengers between Turkey and Israel and, in 2015, trade between both countries had risen to $5.6 billion, according to Turkish Statistics Institute, cited in TRT.

Still, thanks to what seemed like a principled Turkish position on Gaza, Turkey’s status, at least among Muslim nations, has been elevated like never before.

Perhaps, Turkey has felt embattled as a result of the war on Syria, the rise of militant violence, uncertain economic forecast, the flood of refugees, its conflict with Russia and the political crack within its ruling party. But Palestinians have played no part in that.

If Turkish Prime Minister, Recep Tayyip Erdogan, felt the need to re-evaluate his political course as a result of whichever political calculation he found urgent and reasonable, what sin did Gazans commit to be disowned in such a fashion?

It is a “stab in the back”, Gaza Professor Haidar Eid wrote. It is a “cheap manipulation of the Palestinian cause,” complained Gaza journalist, Ghada Albardawil. While others tried to maintain conciliatory language, the disappointment in Gaza – in fact, among most Palestinians – is unmistakable.

Gaza-based Dr. Ahmad Yousef refused to blame Turkey for failing to lift the siege. Yousef, who is also the former political adviser to Hamas’ Gaza leader, Ismail Haniyeh, told Al-Monitor that “Hamas believes that, under the Turkish-Israeli agreement, Turkey achieved as much as it can to ease the blockade on Gaza, which has been plagued by economic crises.”

This reasoning, however well-intentioned, is off the mark. Turkey, of course, cannot be blamed for the failure to lift the siege. The siege is an Israeli one, and its deadly outcomes are the moral and legal responsibility of Israel, its regional partners and western supporters.

However, it is still incumbent on Turkey, as it is on every other country in the world, not to do business with a government accused of war crimes, including that of Crime of Apartheid, in addition to its continued violations of international and humanitarian law.

With Israel illegally occupying the West Bank and East Jerusalem (Al-Quds) and imposing a deadly siege on Gaza, what moral justifications can the Turkish government provide to justify its normalization of ties with Israel?

Not only does the agreement ensure the families of the 10 Turkish victims (considered ‘martyrs’ by Palestinians) will be denied the right to legally pursue criminal charges against their Israeli murderers, thousands of Palestinian families, too, will have no such chance.

In other words, business as usual will return to the Turkish-Israeli relations, while Gazans are trapped behind fences, walls and barbered wire.

Those who wish to see the cup half full, cite the fact that Gaza will be receiving tons of Turkish aid, a future hospital with the capacity to hold 200 beds and a water desalination plant – especially when considering that only 3 percent of Gaza’s water is actually drinkable.

But the supplies will be routed via an Israeli seaport – which is exactly what the ‘Mavi Marmara’ activists refused to do. The political move would further validate the Israeli Occupation, and the siege apparatus as well.

Worse, this arrangement – if it is, indeed, fulfilled – would reduce the crisis in Gaza to that of a humanitarian one. But this is not the case. Gaza is not just suffering from an economic embargo, but a politically-motivated blockade following the 2006 democratic elections in Palestine, the result of which was rejected by Israel and its backers.

Gazans are punished purely as a result of a political question and, later, for their resistance and refusal to succumb to pressure and bullying. Neither foodstuff, nor a hospital or cleaner water will resolve any of these dilemmas.

When Israeli commandos violently raided the ‘Freedom Flotilla’ in May 2010, something extraordinary happened in Gaza: a deep sense of loss, but also a sense of pride. It was the first time that this generation experienced real solidarity emanating from a Muslim country, exhibited with such resolution and willingness to sacrifice.

For years, many in Gaza were partly sustained by the hope that Turkey would maintain its support (as Palestinians were promised repeatedly) until the siege is lifted.

This has not been actualized. Moreover, Israel is expected to generate massive wealth as a result of the deal, especially when it is able to export its natural gas to Europe, via Turkey.

But if this is not entirely about money, at least from the Turkish perspective, what is it, then? A Turkish foreign policy realignment? A return to the ‘zero problems with our neighbors’ approach to foreign policy? Whatever it is, seeing the hopes in Gaza dashed under the crushing weight of realpolitik is disheartening.

No matter that some are proposing to sugarcoat the Israel-Turkey rapprochement, the deal was a blow to Palestinian hopes that their siege was about to end, that they were no longer alone facing Israel’s military machine and its powerful western benefactors.

Perhaps the deal is also a wake-up call – that Palestinians must count on themselves first and foremost, achieve their elusive unity and seek solidarity the world over.

Nevertheless, even this unfair deal cannot possibly break the bond between the Turkish and Palestinian people. ‘Blood is thicker than water’, they say. And they are right.

Viewing all 73659 articles
Browse latest View live




Latest Images