Quantcast
Channel: Eurasia Review
Viewing all 73702 articles
Browse latest View live

Islamic State: Ambitions And Constraints – OpEd

$
0
0

By Fadi Elhusseini*

Since its inception, news of the Islamic State of Iraq and Syria (ISIS) has splashed across global newspapers. The nascent entity emerged suddenly and quickly expanded. Its brutality has commanded widespread attention and generated mounting concern. A few months ago, ISIS entered its second year, demonstrating a unique ability to survive despite being targeted by joint international efforts and military campaigns. This article digs deep inside the life of ISIS, assesses important details such as its structure and formations, and highlights facts that may be important to the reader and the decision-maker alike. These features reveal the complexity of the composition of ISIS, which managed to build itself up in record time.

Islamic movements have a deeply rooted history in the Middle East. They took on a mature political form with the emergence of the Muslim Brotherhood in 1928, five years after the collapse of the Ottoman caliphate. The failure of the Brotherhood to master challenges and to fulfill the aspirations of its supporters led to the emergence of numerous other movements with an Islamic orientation. This trend escalated with the US occupation of Iraq in 2003, resulting in the birth of the Jama’at al-Tawhidwal-Jihad (JTJ).

In 2004, led by Abu Musab al-Zarqawi, JTJ swore allegiance to the al-Qaeda network – becoming Al-Qaeda in Iraq (AQI). Following al-Zarqawi’s death in 2006, AQI became the Islamic State of Iraq – the forerunner of ISIS. History aside, ISIS, or DAESH (an abbreviation of the group’s name in Arabic, ad-Dawla al-Islamiyyafil-Iraq wa-Sham), has become one of the most influential and controversial forces to penetrate the Middle East. Dramatic victories and the control of Mosul in the summer of 2014 were stepping stones that ushered in and solidified ISIS’ rule, hence its declaration of a caliphate.

In a span of less than two years, ISIS managed to survive despite the participation of some 60 nations in the U.S.-led coalition against it, the recent attacks by the Russian troops, the fierce battles against the Syrian regime and the Iraqi army, the clashes with the Sunni tribes in Iraq, and the forces of the popular crowd ‘al-Hashd al-Shabi’. ISIS has also been able to withstand the Kurdish Iraqi fighters, ‘Peshmerga’, al-Nusra, Hezbollah, the Iranian Revolutionary Guard fighters and other mercenaries. Intriguingly, the group has succeeded not only in survival, but also in morphing from a non-state actor into a quasi-state.

At this point, ISIS controls more than half of Syria and one third of Iraq. Its territory consists of a decentralized system of 16 provinces, each one further divided into districts. Every province is controlled by an emir (a governor), who manages the emirs of his districts. These district emirs, in turn, micromanage their populations and maintain control of oil fields.

According to The New York Times, ISIS has outpaced the Syrian and Iraqi regimes in administrating the cities it controls. After years of civil war, chaos and instability, things are now in order; streets are cleaner, businesses are more organized, and, if you follow their dictates, you can live in safety.

The same conclusion was reached by other western sources that emphasized that ISIS runs life in the cities it controls as any other state would: issuing identity cards, driving licenses and work permits. It develops infrastructure and fights corruption.

The ISIS caliphate has a Shura Council (a parliament), but its role remains consultative. The final word rests with the so-called caliph Abu Bakr al-Baghdadi. The caliphate has also developed several departments including media, justice and security as well as its own education system (based on an austere interpretation of Islam).

The security apparatus is run differently than other departments, as it is only for those completely loyal to the group and is not open to new recruits whose loyalty has not been tested. According to US security sources, the number of ISIS fighters ranged between 9,000 and 18,000 before the US-led campaign, and the same sources suggested that the number of fighters is the same now!

The CIA said a year ago that the number of ISIS terrorists ranges between 20,000 and 31,500, while the head of the Syrian Observatory for Human Rights thinks that the number in Syria alone exceeds 50,000. On his part, the chief of the Russian General Staff estimates the number of ISIS fighters to be 70,000; still, those numbers remain modest when compared with the Kurdish estimations, which suggest that the number has reached 200,000.

Numbers aside, ISIS has employed tactics so brutal that even al-Qaeda has denounced them. Their methods involve the destruction of property, torture and execution in the crudest fashion, all intended to terrorize and intimidate their enemies. Indeed, according to witnesses, the battle of Basra would not have ended so swiftly without the horror that struck the Iraqi garrison after being subjected to a number of suicide attacks.

With regard to foreign operations that include terrorist attacks or bombings in Western or Arab countries, ISIS utilizes these acts as propaganda and as one of its accomplishments so as to attract new recruits who sympathize with its ideology. This leads us to the second administrative body to which ISIS pays a lot of attention: media.

ISIS has demonstrated a powerful capacity to attract the support of ideological and real-world fighters (from more than 80 countries) and to cultivate terrorist cells around the world. Experts have highlighted ISIS’ propaganda machine as the key to its recruitment success. With as many as 90,000 Twitter accounts globally, ISIS’ virtual online army has proven adept at the use of technology – especially social media platforms. The recent, flagrant call for Sudanese youth to join the group is a salient example of ISIS’ ability to run a sophisticated propaganda campaign.
ISIS’ swift occupation of a large swathe of Iraq and Syria, and its ability to stretch its tentacles in ten countries – Nigeria, Algeria, Libya, Egypt, Saudi Arabia, Iraq, Syria, Yemen, Pakistan and Afghanistan – as either ISIS or an affiliated group, highlights the group’s ambition and its capacity to control and manage large territories.

According to security experts, ISIS’ strategy is based on survival followed by expansion. After the initial survival phase, ISIS began to create provinces and districts. The group then started to expand its sphere of influence into other regions. In his book Empire of Fear: Inside the Islamic State, Andrew Hosken uncovers a five-year plan designed by ISIS. Hosken outlines ISIS’ map of a new world order that includes Spain, Greece, the rest of the Balkans, India and the top half of Africa in a greater, ultra-strict caliphate or Islamic State.

For almost two years now, ISIS has continued its campaign while regional and global powers have lacked a common vision on how to respond. Although the international community certainly dreads the prospect of any further ISIS expansion, it is distracted by other matters and continues to misjudge the menace posed by that ‘distant’ region. In the same way, the ongoing proxy war in Syria is hindering any consensus on how to fights ISIS, and regional powers are busy with their domestic and regional conflicts; e.g. Huthis in Yemen and PKK in Turkey.

A lot of speculations outweighed a foreign role in the creation and success of ISIS, especially with the unprecedented accomplishments ISIS attained in no time. Yet, perhaps the truth is a mixture between the two: the regional instability and chaos inspired a foreign decision to create ISIS so as to achieve specific goals.

In spite of the aforementioned gloomy givens, I think that the circumstances that contributed to the emergence and continuation of ISIS will not last long. Thus, the group is doomed to failure and demise, noting that the real success it had was unifying all the people across the globe against terrorism.

*Fadi Elhusseini is a Palestinian diplomat and an associate research fellow (ESRC) at the Institute for Middle East Studies-Canada and a doctoral candidate at the University of Sunderland in Britain. His articles have appeared in scores of newspapers, magazines and websites.

A previous version appeared earlier in: http://www.eastonline.eu/en/east-62/the-caliph-s-political-ambitions


Canadian Legend Chapter III: ‘Making Up For 10 Long, Lost Years’

$
0
0

The constitutionally guaranteed rights of Aboriginal Peoples in Canada are not an inconvenience but rather a sacred obligation. Our futures are inextricably intertwined. When I say that we must complete the unfinished work of Confederation, I mean that Canada needs a renewed, nation-to-nation relationship with Aboriginal communities.

Not a month into his reign, and Justin’s problems are rushing to meet him. The ogre was not only on Parliament Hill, but on a much higher mountain top, one that stretches around the globe, creating a very complex geopolitical map.

The French suicide bombing killing 129 on November 13 was immediately called “terrorist” and was indeed nasty, but is really a revenge match in the Great Games series in which France has been one of the stars. The latest chapter in that saga began, appropriately, at a football match between Crusaders France and Germany, ratcheting up the global temperature in the West. A kind of political global warming, which deniers insist is caused by a few nasties who must be ruthlessly killed, even if it means killing thousands of innocents.

This has been the traditional policy of the ogres on high, who are dull but have lots of very nasty weapons, and only disdain for their native peoples, never understanding why they get the odd firecracker under their seats. They have been terrorizing the world for centuries, so it’s hardly surprising that the victims should go for revenge, however lamentable this may be.

The worldwide outcry was only because the victims were French white folks. 44 people were killed in Beirut the day before and no cries of outrage were heard in western news headlines. 80 Palestinians gunned down in the previous week, ditto.

Justin’s personal realm is calm, and while sympathetic to the French, he refuses to take the road of vengeance. Instead, he sees the best way to fight the terrorists avenging western bombing of Syria is to … stop bombing! And better yet, provide a haven for tormented Syrians, with  his vow to welcome 25,000 Syrian refugees. Take the wind out of ISIS sails.

Canada’s colonial heritage festers

However, this sensible approach is running into snags. Some Indigenous Canadian leaders see millions suddenly going to help poor Arabs from across the globe, and wonder if their sorry state will continue to be ignored in Trudeau’s own backyard. Aboriginal communities rank a miserable 63rd in per capita income in the world, versus Canada’s 8th position.

Dakota Tipi First Nation Chief Dave Pashe says it’s frustrating to see the government prioritize refugees over First Nations people, who need work and housing too. He was shocked when he was elected to see most of his young people not finishing Grade 12. He asked the Manitoba government for funding, however the cupboard was bare. “But they have all kinds of money to bring in refugees from all other countries. The governments are sending the wrong message to native people by doing that.”

Pashe can rest assured with the overthrow of the ogre. Ten years ago under Trudeau’s Liberal predecessor Paul Martin, before Pashe’s reign, the Kelowna Accord was signed, a nation-to-nation collaborative plan to close the inequality gap with Indigenes, but then Harper came to power, and Kelowna was gone. The few policies issued under Harper were acts of “political theatre and the illusion of progress”, Trudeau told the Assembly of First Nations General Assembly in July.

Trudeau told Canada’s founding peoples of “the urgent need for a renewed relationship between the federal government and Indigenous Peoples in Canada. One built on trust, recognition and respect for rights.” He said the failed relationship between the Crown and Aboriginal Peoples is the result of “generations of political leaders at all levels”.

Harper worked hard to outdo his predecessors in cynicism. The head of the Assembly of First Nations (AFN) Perry Bellegarde was particularly pleased to see him go, as last January Harper had greeted the new chief of Canada’s First Nations with a stony silence on Bellgarde’s complaint about the Conservatives’ education bill, and his request that Harper launch an inquiry into murdered and missing Indigenous women.

Justin learned from his very own Great White Father to respect and honour the native peoples, and even before besting the ogre in October, committed his government to set things straight with Canada’s founding nations. He vowed

  • To sign the UN Declaration on the Rights of Indigenous Peoples of 2007, which Harper refused to sign.
  • To revised Harper’s draconian security Bill C-51, which Indigenous Peoples saw as threatening them as “terrorist” when they stand up for their rights.
  • To implement the Truth and Reconciliation Report (TRR) on native issues, including language, education, health, housing, and special funds for CBC.
  • To set up a Reconciliation Framework based on the TRR, which will include mechanisms to resolve grievances associated with historical treaties and modern land-claims agreements.
  • To repeal Harper’s changes to the Elections Act which make it harder for Indigenous Peoples to exercise their right to vote.
  • To ensure all natives have access to safe drinking water within five years.
  • To launch an inquiry into missing and murdered indigenous women and girls.

Justin’s new band includes a record eight Indigenes, with Hunter Tootoo as Fisheries Minister. In the 2011 elections, there were four Conservative native MPs. This time none, and with the two NDPers, that makes a historic ten on Parliament Hill.
.
One of the TRR demands was for the Catholic Church to apologize for the spiritual, cultural, emotional, physical and sexual abuse of First Nations, Métis and Inuit children at Catholic-run schools. Before he was toppled, the Protestant ogre met with Pope Francis, the kindly Great White Father in Rome, but made no mention of this sorry chapter. What will our Catholic hero do?

Canadians arm with terrorism silver bullet

The ogre’s band are not happy about the new alliance with Canada’s founding nations, nor with the Trudeau’s ‘smart policy’ against terrorism. Candice Bergen, Conservative MP for Portage-Lisgar, Manitoba, condemned Justin’s call to Obama canceling Canadian bombing in Syria and restricting Canadian involvement there to troop training and humanitarian aid, arguing that bombing is necessary to achieve peace (sic).  Pashe is in Bergen’s riding, and shot back that she should come to visit his community and other First Nations in the constituency before she casts stones.

Fears have been raised especially in Justin’s own native Quebec over the Syrian policy, pointing to terrorist attacks last year by 2 radical Quebec citizens protesting Canada’s earlier bombing of Syria. The ogre was even forced to hide in his prime ministerial closet when shots were heard a few metres from his lair.

We should not fear criticizing France for its sordid colonial past and ongoing killing of Syrians. Canada will not attract such vengeance. The trick, as Trudeau pointed out to his own colonial victims–the First Nations, is to make up for past crimes of “generations of political leaders”, and establish a relationship “built on trust, recognition and respect for rights.” A lesson from our young hero to his French colleague.

As for a silver bullet, the only way to fight ISIS responsibly is to do the right thing, and expose their policy of violence as bad for Muslims, bad for everyone. Already thousands of communities across the country have pledged to sponsor Syrian families and are busy hosting fundraisers. Port Elgin, a town of 12,500 in Bruce County Ojibway lands, is sponsoring two families. Quebec City, a stronghold of the ogre’s remnants on Algonquian lands, is nonetheless taking 200 families, braving the ogre’s naysayers loudly petitioning to cancel the goodwill gesture.

Terry Nelson, Grand Chief of the Southern Chiefs Organization, says Manitoba’s plans to bring refugees in from other countries should not be impacted by events in Europe. “There’s been an invitation for 2,500 Syrian people to be here in Winnipeg,” he said. “They should not be judged by a small minority of people that are terrorists. We live in the greatest country in the world. The most peaceful country in the world. We are blessed.”

Writes Jennifer Tsun (Eagle Watch) reflecting Justin’s dilemma: “What don’t some people get about living in the ‘global village’?  What affects one will affect others.  France is bombing Syria.  France, always a colonial power, is very active plundering northern African nations such as Niger. Why should we run to their defence? [Because] Indigenous people understand this Connectedness intuitively based on their teaching that we are all related.”

Justin wants to do the right thing on the world stage and at the same to satisfy his own people. The path is strewn with pitfalls. Let’s hope our young hero can avoid them.

Rare Fossil Of A Horned Dinosaur Found From ‘Lost Continent’

$
0
0

A rare fossil from eastern North America of a dog-sized horned dinosaur has been identified by a scientist at the University of Bath. The fossil provides evidence of an east-west divide in North American dinosaur evolution.

During the Late Cretaceous period, 66-100 million years ago, the land mass that is now North America was split in two continents by a shallow sea, the Western Interior Seaway, which ran from the Gulf of Mexico to the Arctic Ocean. Dinosaurs living in the western continent, called Laramidia, were similar to those found in Asia.

However, few fossils of animals from the eastern ‘lost continent’ of Appalachia have been found because these areas being densely vegetated, making it difficult to discover and excavate fossils.

Dr Nick Longrich, from the Milner Centre for Evolution based in the University of Bath’s Department of Biology & Biochemistry, studied one of these rare fossils, a fragment of a jaw bone kept in the Peabody Museum at Yale University. It turned out to be a member of the horned dinosaurs – the Ceratopsia. His study, published in the journal Cretaceous Research, highlights it as the first fossil from a ceratopsian dinosaur identified from this period of eastern North America.

Ceratopsia is a group of plant-eating horned dinosaurs that lived in the Cretaceous period. The fossil in question comes from a smaller cousin of the better known Triceratops, the leptoceratopsids. It was about the size of a large dog.

The specimen studied by Longrich was too incomplete to identify the exact species accurately, but showed a strange twist to the jaw, causing the teeth to curve downward and outwards in a beak shape. The jaw was also more slender than that of Ceratopsia found in western North America, suggesting that these dinosaurs had a different diet to their western relatives, and had evolved along a distinct evolutionary path.

Dr Nick Longrich explained: “Just as many animals and plants found in Australia today are quite different to those found in other parts of the world, it seems that animals in the eastern part of North America in the Late Cretaceous period evolved in a completely different way to those found in the western part of what is now North America due to a long period of isolation.

According to Longrich, “This adds to the theory that these two land masses were separated by a stretch of water, stopping animals from moving between them, causing the animals in Appalachia to evolve in a completely different direction, resulting in some pretty weird looking dinosaurs.

“Studying fossils from this period, when the sea levels were very high and the landmasses across the Earth were very fragmented, is like looking at several independent experiments in dinosaur evolution,” Longrich said, adding that, “At the time, many land masses – eastern North America, Europe, Africa, South America, India, and Australia – were isolated by water.’

“Each one of these island continents would have evolved its own unique dinosaurs- so there are probably many more species out there to find.”

Advanced New Camera Can Measure Greenhouse Gases

$
0
0

A camera so advanced that it can photograph and film methane in the air around us is now presented by a team of researchers from Linköping and Stockholm Universities. It can be an important part of the efforts to measure and monitor greenhouse gases.

There are several questions surrounding the powerful greenhouse gas methane. Its rapid but irregular increase in the atmosphere has puzzled researchers. And there is a high degree of uncertainty with regard to the sources and sinks of methane in the landscape. A newly developed camera from Linköping University and Stockholm University can help to address these issues. The utility of the camera to both photograph and film methane has been demonstrated in a study that was recently published in Nature Climate Change.

”The camera is very sensitive, which means that the methane is both visible and measureable close to ground level, with much higher resolution than previously. Being able to measure on a small scale is crucial,” said Magnus Gålfalk, Assistant Professor at Tema Environmental Change, Linköping University who led the study.

The advanced hyperspectral infrared camera weighs 35 kilos and measures 50 x 45 x 25 centimeters. It is optimized to measure the same radiation that methane absorbs and which makes methane such a powerful greenhouse gas. The camera can be used to measure emissions from many environments including sewage sludge deposits, combustion processes, animal husbandry and lakes. For each pixel in the image the camera records a high-resolution spectrum, which makes it possible to quantify the methane separately from the other gases.

The camera was developed by a team that combined knowledge from many different fields of expertise, including astronomy, biogeochemistry, engineering and environmental sciences.

“This gives us new possibilities for mapping and monitoring methane sources and sinks, and it will help us understand how methane emissions are regulated and how we can reduce emissions. So far the camera has been used from the ground and now we’re working to make it airborn for more large-scale methane mapping,” said David Bastviken, professor at Tema Environmental Change, Linköping University and the principal investigator on the project.

Professor Bastviken emphasised that the project would not have been possible without funding for methodological development from the Knut and Alice Wallenberg Foundation and the Swedish Research Council, VR.

In addition to Magnus Gålfalk and David Bastviken from Linköping University, Professors Göran Olofsson and Patrick Crill from Stockholm University contributed to the project.

Bob Fisk’s Fact-Free Polemics On Syria – OpEd

$
0
0

Robert Fisk — or to mirror the style of his latest missive, let’s just call him Bob — is convinced there aren’t 70,000 “moderate” opposition fighters in Syria, contrary to the recent assertion of Britain’s Prime Minister David Cameron.

Bob doesn’t present a conflicting data set — a different analysis of the makeup of the opposition. Instead, his position rests on two pieces of reasoning.

Firstly, Bob asserts, if such a force did exist, “it would already have captured Damascus and hurled Bashar al-Assad from power.”

Assad is still in power. It therefore follows that the 70,000 fighters don’t exist. Impeccable reasoning, some might say.

Secondly, “Who’s ever heard before of a ‘moderate’ with a Kalashnikov?” This he presents as a rhetorical question on the basis that “moderates” would be “folk who don’t carry weapons at all.”

Bob declines to label all those opposition fighters who by virtue of carrying weapons, can’t as far as he is concerned be called moderates, but the obvious antonym would be extremists. Since his father, Bill, gun in hand, fought in the trenches in World War One, would that have made him an extremist too?

I guess not, because the terms “moderate” or “extremist” apparently only apply to people fighting without close direction from their own government. A government, however little political legitimacy it possesses, can apparently deploy “ground troops” — a “regular force” that meets Bob’s approval. Approval of what, I’m not sure. Men in government-issued uniforms?

There are few problems with the logic here — problems that I hope many readers would see as glaring.

Firstly, as even the most casual observers should have long been aware, throughout this war the Assad regime has maintained uncontested rule throughout Syrian airspace.

The U.S.-led air campaign against ISIS, once it expanded inside Syria, did so without objections from the Syrian government and thus there have been no clashes between what are ostensibly rival air forces. Likewise, Russian jets now support Assad’s forces and their allies on the ground.

The fact that not a single component of the opposition possesses an air force and neither do any possess surface-to-air missiles in any significant numbers, is precisely what has allowed the Assad regime to conduct its air operations using one of the crudest methods of warfare: dropping barrel bombs from helicopters.

These assaults, along with bombs dropped by air force jets, along with its use of the bulk of heavy weapons on the ground, are the reason Assad has not been driven out of Damascus.

Secondly, if the defining characteristic of an extremist is that he carries a Kalashnikov, wouldn’t that also make Assad’s own troops extremists since they too carry the same Russian weapons?

As a veteran war reporter, Robert Fisk enjoys an international reputation built on a career of fearless journalism — such as his account of the Sabra and Shatila massacre in 1982. But these days, unfortunately, his interest in reporting seems to have waned as he coasts along, buoyed by the authority which derives from his earlier work.

Still, when it comes to this question about the numerical strength of the so-called moderate opposition in Syria, it’s predictable and understandable that Fisk would choose to frame this as a debate between a seasoned Middle East journalist and a British prime minister.

We all know perfectly well that Cameron is, as the English would say, batting on a sticky wicket. Who can fail to have suspicions that this PM might be drawing his information from yet another “dodgy dossier”?

Fortunately, there’s no reason to reduce this issue to a question about who you want to believe: Cameron or Fisk?

Unlike early in 2003, when the war in Iraq had yet to be launched and its alleged necessity was based on the sketchiest intelligence, the situation in Syria can be analyzed without relying solely on deductive reasoning, wild speculation, and dubious sources.

There are well-informed, independent analysts who have neither a political ax to grind, nor a journalistic image to sustain, nor cozy relations with senior government officials to maintain, and far from dismissing Cameron’s claim, they say it’s accurate and flesh out their position in detail.

Charles Lister acknowledges that at the core of this debate is the question of how “moderate” is defined. He identifies 105-110 factions who in combination amount to 75,000 fighters who are “explicitly nationalist in terms of their strategic vision; they are local in terms of their membership; and they seek to return to Syria’s historical status as a harmonious multi-sectarian nation in which all ethnicities, sects and genders enjoy an equal status before the law and state.”

Lister argues:

Had the West more definitively intervened in Syria early on, we would undoubtedly have more moderate, more cohesive and more natural ally-material opposition to work with. Unfortunately, things took a different path. Our subsequent obsession with the extremists and refusal to tackle Syria’s complexity has clouded our vision. A ‘moderate’ opposition in culturally attuned terms does exist in Syria, we need only open our eyes to it. Only these groups – and certainly not Assad – will ensure the real extremists such as ISIL and Al-Qaeda eventually lose their grip on power in Syria.

Kyle Orton provides some more granular detail:

In southern Syria, there are more than 30,000 fighters between the Southern Front, Al-Ittihad al-Islami li-Ajnad a-Sham, and Faylaq al-Rahman. And in western/northern Syria the vetted FSA-branded groups, Asala, The Levant Front, Zanki, and the other, largely Aleppine units add up to another 35,000. The other 10,000 fighters are in these smaller groups of strategic value.

In spite of the media and political focus on ISIS, both Lister and Orton see the larger threat in Syria emanating from al Qaeda. Orton writes:

Without a clear commitment to Assad’s ouster and meaningfully bolstering the moderate elements of the insurgency, Al-Qaeda is marching toward erecting a base of operations that is wholly integrated into the local terrain in Syria from which to wage its global holy war.

Commentators such as Robert Fisk, Patrick Cockburn and others who these days sound indistinguishable from the Israelis and the neoconservatives, may well say, al Qaeda or ISIS — what’s the difference? They’re all terrorists. They’re all fed by “the octopus” of Saudi Arabia.

What is strange and disturbing about this current of opinion is that it buttresses a sentiment which separates clarity from discrimination.

Supposedly, we can have a clear view of the situation in Syria without needing to understand any of the details. Questions about the size, strength, and nature of the complex array of forces fighting in Syria can be waved away with an air no less regal than Assad’s own dismissive gestures when he claims his enemies are all “terrorists.”

Rajoy Underlines Spain’s Commitment To Challenge Of Climate Change

$
0
0

During the Climate Change Summit, being held in the French capital, Spain’s Prime Minister Mariano Rajou stressed that “a global, ambitious and legally-binding agreement”, that commits everyone, must come out of Paris. Rajoy also highlighted the major progress that this summit represents: the Kyoto Protocol was signed by 36 countries responsible for 15% of the world’s emissions; while 186 countries are present in Paris, responsible for 96% of global emissions.

At the 21st Conference of the Parties to the United Nations Framework Convention on Climate Change, Rajoy, said that this issue is “currently the greatest environmental challenge we are facing”, since it raises “major social and economic challenges”.

In this regard, Spanish Prime Minister added that a new agenda on low growth in emissions must come out of Paris that allows, among other things, for the goal of maintaining global warming below a two-degree increase on pre-industrial levels to be met. According to Rajoy, the summit must offer “a global, ambitious and legally-binding agreement”, that commits all parties according to “their capabilities and circumstances”.

Goals for post-2020

Rajoy stressed that Spain is tackling the Paris Summit “with commitment”, since, as a member of the European Union, it takes on ambitious targets in terms of reducing carbon emissions. In this regard, he recalled some specific actions that have already been implemented: programmes to renew vehicle fleets, measures to increase the energy efficiency of buildings and financing for projects to reduce emissions.

It is a question, added Rajoy, of achieving the goals set for post-2020, that include: Taking on, together with our European partners, the commitment to reduce emissions by at least 40% by 2030 compared with 1990 figures; Mobilising financial resources for developing countries in their fight against climate change. Over the last four years, Spain has allocated 1.4 billion euros to this heading. Recently, the government has agreed to a financial contribution from Spain to the Green Climate Fund of 120 million euros between 2015 and 2020 and; Increasing annual contributions to projects that foster the transition to a low carbon economy in developing countries. The goal is to double this by 2020 and reach a level of 900 million euros per annum.

Rajoy also underlined the major step that the Paris Climate Change Summit represents: the Kyoto Protocol was signed by 36 countries responsible for 15% of the world’s emissions; while 186 countries are present in Paris, between them responsible for 96% of global emissions.

Future Climate Change Act

On another note, Rajoy announced a new Climate Change Act for the next term of office if he continues in power. The new act “will contain Spain’s commitments on the matter of climate change and the de-carbonisation of the economy”, as well as create “a single institutional framework” and tackle the coordinated design of all resources. Among other features, he added, “environmental taxation will be streamlined” and energy efficiency, renewable technologies and R&D+i will be boosted.

The Revival Of Jihad In Bangladesh: Is Islamic State At India’s Doorsteps? – Analysis

$
0
0

By Balasubramaniyan Viswanathan

Islamic State, in its latest issue of Dabiq entitled “Just Terror,” has sounded the clarion for its jihadi campaign in Bangladesh with a dedicated article entitled “The Revival of Jihad in Bengal.” This is the first official instance of the Islamic State trying to revive jihad in the Indian subcontinent, concomitantly confirming the presence of Islamic State in Bangladesh, and posing serious security problems to India.

The Dabiq article has been authored by Abu Abdur Rahman Al Banghali, ostensibly a Bangladeshi himself, identified by the nom de guerre suffix Banghali, which refers to a person of Bengali origin. The use of word “Bengal” in the Dabiq article is explained by an annotation stating that “Bengal is what the region was referred to before the founding of “Bangladesh” by nationalists in 1971.” This reference is to the 1971 liberation war for an independent Bangladesh from Pakistan. The article has criticized even the Islamist political parties and extremist groups with hardline ideology in Bangladesh for non-conformity to the puritan form of Islam as propagated by the Islamic State. The article not only targets new recruits but also members of other organizations in Bangladesh to switch allegiance to the Islamic State.

Interestingly, terror operations in Bengal have been included only in the current issue of Dabiq under a section titled “Military Operations by the Islamic State.” This section is a regular feature in all its issues of Dabiq, where the military operations of Islamic State in its “Wilayats” (provinces) are published.

The magazine has also officially claimed responsibility for the targeted killing of foreigners, policemen, and bomb attacks on a Shia procession in Bangladesh this year. The Dabiq article claims that Islamic State’s security cell carried out the following attacks:

  • September 28 – assassination of Cesare Tavella, an Italian citizen.
  • October 03 – assassination of Kunio Hoshi, a Japanese citizen in the city of Rangpur.
  • October 24 – multiple IED attacks on a Shia procession in the city of Dhaka, killing one person and wounding eighty-seven.
  • November 04 – assault on a police checkpoint in Dhaka, killing one policeman and wounding another

The Dabiq article has put an end to the ambiguity prevailing over the actual perpetrators of recent “lone wolf” type attacks in Bangladesh. Though these attacks were attributed to the Islamic State by the SITE Intelligence Group, Dhaka had maintained that the attacks were artificially engineered by vested interests, and the government has vehemently denied the presence of the Islamic State in Bangladesh. However, recent reports indicate that Dhaka has reconciled to the presence of Islamic State in Bangladesh by seeking assistance to nab two fugitive Islamic State operatives hiding in India who are suspected of being behind terror attacks in Bangladesh.

Security Implications for India

Given this new development and India’s close physical proximity to Bangladesh, Indian security planners will be concerned as this is bound to have serious security implications for India for a variety of reasons.

Firstly, Bangladeshi extremists have been known to operate from India, particularly in West Bengal. A module of Jamaat-ul-Mujahideen (JMB), a banned extremist group in Bangladesh, was busted in Burdwan, West Bengal, in 2014. An investigation by India’s National Investigation Agency (NIA) has revealed that JMB has spread its network in the Indian states of West Bengal, Assam, and Jharkhand. JMB has been involved in recruitment, radicalization, and training of Indian youths by organizing terrorist training camps in certain Madrasas. JMB has established organizational bases at certain districts of West Bengal like Nadia, Burdwan, Murshidabad and Birbhum as well as in the Sahebganj district of Jharkhand in India. NIA charge sheets reveals that these bases were actively used for organizing radicalization programs, organizational meetings, fund-collection meetings, and hideouts for cadres and their families. JMB has an elaborate network of terrorist training camps at select Madrasas, and other hideouts where recruits are indoctrinated into the violent jihadi ideology as well as training for violent action through use of explosives and firearms.

More recently, Dhaka handed over a list of 204 Bangladeshi terrorists who are hiding in different parts of India. Interestingly, Dhaka has also provided the details of two Islamic State operatives believed to presently be in India, both of whom were involved in the assassination of the Japanese national in Dhaka in October 2015. As a result, there is always a healthy pool of terrorists or indoctrinated cadres belonging to different Bangladesh extremist groups or organisations in India, any of whom could possibly switch allegiance to Islamic State with a flick of a switch, providing Islamic State with readily available resource, and posing serious threat within India.

Secondly, the Indo-Bangladeshi border is highly porous which has abetted the rapid growth of smuggling networks and easy movement of criminals across the borders. For instance, fake Indian currency notes (FICN) are smuggled by agents at the behest of Pakistan’s Inter-Services Intelligence (ISI) into India through Malda in West Bengal. The National Investigation Agency of India is presently investigating cases related to seizure of huge consignments of FICNs (Rs.2.71 Crores) stashed in shipping containers in Dhaka. In reality, Bangladesh has emerged as a key hub for peddling FICNs into India, which are sourced from Dubai. This network is robust, efficient and intact in-spite of joint working mechanisms formulated to tackle this menace by both the countries. This network has been used by terrorist groups in the past to move terrorists and logistics in and out of India.

Thirdly, terrorists and insurgents from both India and Bangladesh have found safe haven at both sides of the border. For instance, some of the Indian insurgent leaders like Arabinda Rajkhowa, and Anup Chetia of the banned United Liberation Front of Assam (ULFA) have found shelter in Bangladesh in past. Fundamentalists like Thadiyanvide Nazir of the Lashkar-e-Taiba module which carried out the bomb blasts in Bangalore, India in 2008 have also found their way to Bangladesh. Dhaka has arrested these insurgents and terrorists who were handed over to the Indian authorities. Notwithstanding this crackdown, Bangladesh still appears to figure in the itinerary of most of the terrorist groups in India, for both infiltration as well as exfiltration of terrorists using the above networks.

Fourthly, the ability of the Islamic State to mount rapid, frequent attacks with a shortened planning and execution cycle could also play in its favour. For instance, Russia and France started their air campaign against the Islamic State in late September, 2015. Islamic State, in response to their bombing campaign, brought down a Russian civilian jet over Sinai with a bomb and conducted terror attacks in Paris in October and November respectively. Islamic State should have theoretically conceived and planned the attack only after the start of the air campaign. Hence, commissioning, planning, and execution of these complex trans-border terror attacks took anywhere between 30-45 days, which is the key strength of the Islamic State, not rivaled by any other terrorist group. Similar complex attacks by other terrorists groups have used up more time to plan and execute compared to these attacks. For instance, Al Qaeda took more than a year to plan and execute 9/11 attacks in 2001, so did Lashkar-e-Toiba for Mumbai in 2008.The ability of the Islamic State to strike at will at distant lands, at short notice is its unique selling proposition which will make more radicalized youngsters gravitate towards the Islamic State. This ability is more pronounced after its recent conventional losses in Syria due to the coalition air campaign.

There are already ominous signs of Islamic State attempting to harness the above aspects in its favor. Islamic State recently released a recruitment audio message in Bengali, the dialect spoken by a size able population of Bengalis in India’s West Bengal. This is a clear attempt to target the Bengali-speaking population in India and Bangladesh. In addition to that, Indian intelligence agencies have intercepted several youngsters going to Syria to join the Islamic State. Most of these wannabe jihadis had planned to cross over to Bangladesh illegally and travel to Dubai and to Turkey from there, which is a testimony to the fact that the Islamic State handlers are still using Bangladesh as an exfiltration route. This is a strong testament to the presence of a support network in Bangladesh. Hence, an active jihadi support apparatus in Bangladesh will only exacerbate the situation further for India.

A readily available pool of recruits in India, supported by a well-knit support network in Bangladesh, has effectively created a scenario which could bring Islamic State to India’s doorsteps. Islamic State has resources which has facilitated the commissioning of multiple terror attacks in Bangladesh with rapid frequency, including the recent attack on a Shia mosque as recent as November 24th, killing one person. Islamic State could possibly use these resources to enhance its ability to execute terror attacks with a reduced attack cycle, more frequently in India. As reported by Geopoliticalmonitor recently, these resources could well play a key role in translating the intent of the Islamic State into actions, which has already envisioned unleashing the apocalyptic “Ghazva-e-Hind” in India.

This article was published by Geopolitical Monitor.com

Kerry’s Serbia-Kosovo Tour To Focus On Security

$
0
0

By Ivana Nikolic and Qendrese Mustafa

US Secretary of State John Kerry will be visiting both Serbia and Kosovo this week – another high-profile Western visit to the region lately.

John Kerry will visit Belgrade on December 3 to take part in the annual ministerial council of Organisation for Security and Co-operation in Europe, OSCE, organized by Serbia, the country chairing the organisation in 2015.

Serbia’s Foreign Minister and Deputy Prime Minister Ivica Dacic said the main topics during the two-day meeting will be security-related in the wake of the terrorist attacks in Paris that left 129 people dead.

“The ministerial meeting will be a great opportunity to talk about the fight against terrorism and questions concerning refugees,” Dacic said.

Kerry’s is the second senior Western official to come to Serbia in two weeks.

Earlier, Serbia hosted a visit by the NATO Secretary-General, Jens Stoltenberg, which experts said showed Serbia wants to maintain its foreign-policy balance between Russia and the West.

The NATO Secretary-General’s visit came shortly after the visit of the Serbian Prime Minister, Aleksandar Vucic, to Moscow where Serbia agreed to buy Russian weapons.

Bosko Jaksic, a Belgrade political analyst, told BIRN on Friday that Kerry’s visit to Serbia was mostly “ceremonial” and connected to the ongoing refugee crisis and terrorism.

However, he did not exclude the likelihood of important bilateral unofficial talks.

“Russian influence in the Balkans may be discussed behind the scenes, but it will not dominate [the talks] in public,” he predicted.

“It is obvious that the West will not initiate such a topic [in public] as it would even further damage already strained relations netween the East and West,” Jaksic said.

Kerry’s visit comes amidst heighten tensions in the region following the Paris attacks in mid-November, which have led to Balkans countries limiting transit rights to migrants from war-torn states.

Under new restrictions imposed last week, only Syrians, Afghans and Iraqis are being let through, while others from Iran, Bangladesh, Pakistan and elsewhere are being blocked.

A day before visiting Belgrade, Kerry will be in Kosovo, which has been in the middle of a political crisis for more than three months.

The crisis centres on the government’s agreements to the formation of an autonomous Association of Serbian Municipalities in Kosovo and to a border demarcation deal with Montenegro.

Opposition parties in Kosovo have been blocking the work of parliament since early October and even setting off tear gas in the chamber, demanding that the government scrap its recent EU-mediated agreement with Belgrade, which they say gives Kosovo Serbs too much power.

Pal Lekaj, an MP from the opposition Alliance for the Future of Kosovo, AAK, told BIRN that his party does not know if the opposition will meet Kerry during his visit to Kosovo.

Nevertheless, he does not believe that Kerry will urge the opposition to abandon its demands.

“We still stick to those requests and we’ll continue because we have a just cause to make Kosovo a functional country, in which we’ve invested together with our international friends,” Lekaj said.

Kosovar analyst Dukagjin Gorani argues that Kerry’s visit is mostly connected to security issues.

“It’s ambitious of us to think that Kerry will be coming here because we have a crisis. Kerry is going to be here for regional security issues and for regional-international cooperation,” Gorani told BIRN.

He thinks it far less likely that Kerry will be discussing Kosovo’s internal issues.

“His messages will surely be general messages. Maybe during the meetings and discussions with his team they may mention the requests of the US government, about the special court and the agreement with Serbia on normalization,” Gorani concluded.

The new special court, which is to be located in Kosovo and in The Netherlands, will deal with allegations that former fighters from the Kosovo Liberation Army, KLA, were involved in killings, abductions, illegal detentions and persecution in the war of independence.

The formation of the court, like the municipal associaation, remains highly controversial in Kosovo.


Singapore Story 2.0: Strengthening The Core – Analysis

$
0
0

Singapore’s Prime Minister has just unveiled a new dialogue series, SGfuture, to forge a vision for the next 50 years, towards SG100. The national narrative will evolve to reflect the aspirations of its future architects. Additional layers and voices are sinews that give the core strength.

By Ong Weichong*

2015 HAS been a significant year for Singapore. It marked the 50th year of Singapore’s independence and the passing of the country’s founding Prime Minister, Mr Lee Kuan Yew. Indeed, the first 50 years of Singapore’s history as a sovereign nation-state can be read as “Singapore Story 1.0” – where Mr Lee Kuan Yew and the PAP Old Guard led Singapore “From Third World to First” in a single generation.

Amid the launch of the new dialogue series SGfuture, it is worth bearing in mind that this story of ‘national struggle’ amidst trying times, however, is far removed from the personal experience of young Singaporeans. The structural geostrategic and physical vulnerabilities faced by Singapore at the outset of independence in 1965 have not gone away, but the narrative of ‘national struggle’ that underscores much of Singapore Story 1.0 may be losing its resonance with a generation that has known only stability and economic prosperity.

Need for a new national narrative

If the Singapore Story is to endure for the next 50 years, it is imperative to start piecing together a Singapore Story 2.0. The crafting of Singapore Story 2.0 is more than an intellectual exercise. It is an inclusive conversation amongst Singaporeans that provides the Singapore ‘tribe’ with a sense of identity, belonging and cohesion. Thus, the importance of having a Singapore Story that resonates with younger Singaporeans cannot be overstated. Going forward, the next edition of the Singapore Story should be built upon the firm foundations of version 1.0, but at the same time broadened to include additional layers and voices.

This can be done in at least three different ways. Firstly, the national narrative should be pluralised and strengthened by adding layers around its core – layers beyond the realm of ‘great men’ that connect with the lives of the average Singaporean. Secondly, beyond the local, Singapore Story 2.0 should bear cognisance that the fortune of Singapore is inextricably linked to that of its immediate neighbourhood. Finally, Singapore Story 2.0 should reflect the aspirations of a generation that will take the nation-building project beyond SG50.

Why the national narrative matters

Some academic historians of the ‘New History’ school would argue that there is no place for a master narrative, but as Kumar Ramakrishna points out in his book Original Sin? Revising the Revisionist Critique of Operation Coldstore: “For relatively young, globalised nations like multi-cultural, multi-religious Singapore…a master narrative is absolutely essential to provide overall structure and coherence to the ongoing nation-building project.”

Indeed, it would be hubristic to believe that the nation-building project in Singapore is complete and immune to the forces of radical ideologies – particularly religious extremism of all forms. Surely, the foundation of Singapore, a nation-state built on the principles of a secular multiracial meritocracy is a story worth remembering. More importantly, the national narrative serves as a more credible aspirational ideal against other ideologies that might threaten the social cohesion of Singapore.

As the Singapore Story evolves, additional strands drawn from a shared social and cultural past are the ones that give voice to the identity of Singaporeans – a shared consciousness of what makes them Singaporean. For example, stories of growing up in HDB estates with celebrations of community functions, void deck weddings and funerals, of Singaporean hawker food culture and other rites of passage unique to Singapore are their shared experiences as Singaporeans. In short, these additional layers give the national narrative added resonance, reality and resilience – for these are stories of their lives that are told.

“A Shining Red Dot”: Singapore at the Crossroads

From pre-modern Temasek to modern Singapore, this island has served as the crossroads where various cultures meet and blend, but this has not always been so. Temasek declined to insignificance when it was no longer integral to the wider fortunes of Maritime Southeast Asia. Indeed, the Singapore Story framed through the lens of the Long Duree is very much intertwined with that of Maritime Southeast Asia – and the Indo-Pacific world.

In his recent 8th S Rajaratnam Lecture, PM Lee Hsien Loong emphasised: “In the end both our external influence, and our domestic unity and success, comes down to our conviction as individual citizens of Singapore. We must be determined that we want to be Singaporean, to stand up in the world, and to be a shining red dot.” The story of Singapore’s place within the larger world – on which the survival and success of this “Shining Red Dot” depends, needs to be reiterated in Singapore Story 2.0.

Lest we fall for the hubris that Singapore’s relevance to the world is a given, Thucydides reminds us of the fate of the ancient city-state of Athens:

So thoroughly had the present prosperity persuaded the Athenians that nothing could withstand them, and that they could achieve what was possible and what was impracticable alike, with means ample or inadequate it mattered not. The reason for this was their general extraordinary success, which made them confuse their strength with their hopes.

Globally, the eastward swing in economic and possibly political power is well underway. That said, many bright young Singaporeans would be more familiar with the works of William Shakespeare than the Sejarah Melayu or Southeast Asian variants of the Ramayana.

Indeed, despite the massive improvement in global rankings of Chinese universities such as Tsinghua and Beida, most of Singapore’s best and brightest tend to go for the safer route of Oxbridge and Ivy League universities rather than those of the Chinese C-9. If predictions of the 21st Century as the ‘Asian Century’ do come to pass, Singapore’s future leaders would do well to look east to broaden their horizons.

Singapore Story 2.0: “That is What Makes us Singaporeans”

What will the Singapore Story be 50 years from SG50? Will there be a SG100 to tell and celebrate? The ‘national struggle’ of Singapore’s founding generation cannot be replicated in terms of personal experience. It can only exist in the theoretical and conceptual space for succeeding generations. However, the heart and core of Singapore Story 1.0 – a city-nation-state built on the principles of a secular multiracial meritocracy is a vision that future generations can still aspire to.

As envisioned by Mr S Rajaratnam – “Being Singaporean is a matter not of ancestry, but of choice and conviction”. It is indeed a choice that has been taken, lived, experienced and shared by fellow Singaporeans from all walks of life – a vision worth protecting and fighting for. Singapore Story 2.0 will have a software update that reflects the aspirations of its future architects, but its ‘heartware’ will still be one that makes us Singaporeans.

*Ong Weichong is Assistant Professor with the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore.

Preparing For The Cyber Battleground Of The Future – Analysis

$
0
0

By Chris Babcock*

For space and cyber Airmen, tomorrow’s fight will be determined largely by the concept of cyberspace dependency. That term, as defined by the author, is the degree to which a military capability relies on supremacy over a portion of the cyberspace domain in order to cause or carry out its effects.1 Cyber dependency is rapidly growing due to the cyberspace domain’s exponential nature, the trajectory of market forces in the civilian world, and the strategic integration by the military of computer technology in the land, maritime, and air domains.2

Unlike employment in the three traditional war-fighting domains, the present employment of capabilities in the space domain cannot be achieved without cyberspace.3 The recognition of this unique relationship between space and cyberspace has profound implications for recruitment; initial, intermediate, and advanced training; and development in the space and cyber career fields. A transition from the current force-development system towards one that acknowledges the unique relationship between space and cyberspace will have the additional benefit of informing the greater operational community as war fighters in the land, maritime, and air domains continue to become increasingly dependent upon cyberspace and space. This article discusses the implications of cyber dependency and proposes six recommendations to ensure that from recruitment to advanced training, space and cyber Airmen are prepared to excel in their interconnected domains.

Space Cyber Dependency

The relationship between space and cyberspace is unique in that virtually all space operations depend on cyberspace, and a critical portion of cyberspace can only be provided via space operations. —Joint Publication 3-12 (R), Cyberspace Operations, 5 February 2013

All space operations currently performed by the US military are cyberspace dependent (fig. 1).4 Space operations take place in the physical space domain, not within cyberspace. But because those who perform space operations are not physically present in space, they must rely entirely on control of their segment of cyberspace to transmit their commands to space vehicles in order to carry out space operations.5

Figure 1. Space and cyberspace operations. Due to physical limitations, space operations take place on both sides of the cyberspace domain.

Figure 1. Space and cyberspace operations. Due to physical limitations, space operations take place on both sides of the cyberspace domain.

If a military space operation were to involve a pilot physically residing in a space vehicle, reacting to the environment in order to carry out effects in space, this would describe a space operation that is not reliant entirely on cyberspace supremacy.6 In the absence of that scenario, space operators must use specialized computers and computer programs to transmit information to and from their space vehicles— which are themselves complex information systems—over a computer network.7 Space’s cyber dependency demands that special attention be paid to the cyber defense of space capabilities, but it also foreshadows the future state of the traditional war-fighting domains.

The physical network layer of cyberspace includes the information systems with which space operators command their satellites, the circuits connecting those information systems to the ground equipment, and the ground equipment itself. The logical network layer of cyberspace is embedded in each piece of the physical network. The cyber-persona layer describes the space operators who rely on the physical and logical network layers to perform space operations (fig. 2).

Figure 2. Cyber layers in space operations

Figure 2. Cyber layers in space operations

The Exponential Domain

But if you think you’re safe in cyber, when you wake up tomorrow, everything is different. —Gen John E. Hyten, Commander Air Force Space Command

Ever since Intel cofounder Mr. Gordon Moore observed in 1965 that the capability of computer circuitry grows exponentially over time, it has been widely understood that innovation in computer technology expands at a rate unmatched in human history.8 Innovation begets innovation, and the changing nature of information technology poses unique challenges for military operators in the cyberspace domain compared to those of the first four war-fighting domains.9

First among those challenges is that the private sector has now begun to advance far more rapidly than the defense industry in several areas of technological innovation.10 This can mostly be attributed to the molasses-like procurement and configuration management processes in the Department of Defense’s large technological programs relative to the nimbleness of a Silicon Valley start-up company.11

A second serious challenge is that the asymmetry of cyberspace allows attackers to more quickly and more easily utilize rapid changes to their advantage than can defenders.12 At a fundamental level, cyber defenders attempt to ensure that software and hardware work the way they are supposed to while cyber attackers attempt to break software or hardware to cause harmful effects.13 In this matchup, the aggressor will almost always have the advantage. Additionally, the exponential nature of cyberspace causes institutional knowledge and individual skill sets to atrophy far more quickly than they do in the traditional war-fighting domains. This poses especially interesting challenges for the training and education of cyberspace operators.

For all of its difficulties, the US Air Force has a well-established grasp on the current cyberspace battleground. Yet, it must fully account for the nature of cyber dependency and the implications it holds for the expanding cyber battleground of the future.

Self-Induced Dependency

The F-35 Lightning II is one of the most complicated weapons systems ever developed, a sleek and stealthy fighter jet years in the making that is often called a flying computer because of its more than 8 million lines of code. — Christian Davenport, Washington Post

While the space domain is the first to be wholly dependent upon cyber, it will not remain the only one. In the air domain, remotely piloted aircraft are an excellent example of a weapon system that is wholly cyber dependent.14 Even the newest manned fighter aircraft, the F-35, has been described as a flying computer; further- more, while the Army develops personal drones, smart exoskeletons, and computerized rifles, the Defense Advanced Research Projects Agency is developing pack-mule robots, and the Navy is creating its own autonomous drones, including both submarines and aircraft.15

While those efforts will certainly enhance war-fighting capabilities, increased cyber dependency also comes at a cost. The cost may be paid in increased risk to the missions that these technologies support or in deliberate security and active defense of the newly dependent systems.16 In each example, the inherent risks introduced by cyber dependency are monumental. In the civilian world, hackers have already been able to take control of vehicles (most notably gaining full remote control of the latest Jeep models), smart guns, and hobby drones. They have even infiltrated the internal networks of commercial aircraft.17 For the cyber squadron of the future, security and defense of local weapon systems—from land and air to space— must be a priority (fig. 3).

Figure 3. From communications to cyber. (Based in part on briefing, Lt Col David Canady, subject: Cyber Squadron of the Future, Headquarters US Air Force / A6CF, May 2014, http://www.safcioa6.af.mil/shared /media/document/AFD-140512-040.pdf.)

Figure 3. From communications to cyber. (Based in part on briefing, Lt Col David Canady, subject: Cyber Squadron of the Future, Headquarters US Air Force / A6CF, May 2014, http://www.safcioa6.af.mil/shared /media/document/AFD-140512-040.pdf.)

One particularly thorny challenge for those cyber operators will be the requirement to perform cyber operations on the live network of a weapon system, but this challenge can and must be overcome.18 Choosing not to secure and defend is the riskiest choice of all. In cyberspace, the longer any vulnerability exists in an unmitigated form, the greater the odds that it will be weaponized and exploited by an adversary. By some measures the process, from discovery to weaponization and attack, takes hackers little more than one week to complete.19

Cybersecurity concerns have not yet stopped the Department of Defense from procuring weapons that are increasingly cyber dependent. In the civilian world, regular consumers also seem to not yet be dissuaded by security concerns.

Market-Driven Cyber Dependency

These characteristics and conditions present a paradox within cyberspace: the prosperity and security of our nation have been significantly enhanced by our use of cyberspace, yet these same developments have led to increased vulnerabilities and a critical dependence on cyberspace, for the US in general and the joint force in particular. —Joint Publication 3-12 (R), Cyberspace Operations, 5 February 2013

Market forces in the civilian world are rapidly driving many categories of consumer products towards the “Internet of Things” (IoT). By 2020 it is estimated that there will be between 50 and 100 billion devices that are networked to each other across the world, creating an IoT.20

From refrigerators to coffeepots and thermostats, the commercial marketplace is growing increasingly flooded with Internet-aware devices of all types.21 Arguably, the preponderance of devices in the marketplace in the near future will be Internet-aware, making it difficult for a discerning consumer such as the Department of Defense to find noncomputerized alternatives.22 This will leave the military with difficult choices to make regarding the trade-off between accepting risk or accepting the costs associated with cybersecurity and defense of these newly networked refrigerators and coffeepots.

If we accept that in the future a much higher percentage of devices, infrastructure, and systems will have computer networking capabilities that are either a permanent part of military installations (such as supervisory control and data acquisition [SCADA]) or will regularly enter military installations (such as smart watches and self-driving cars), then those devices will become a de facto part of the cyber battlespace. It is the cyber squadron of the future that should be relied upon to secure and defend those devices. Efficiencies provided by organizational and structural changes such as the move to the joint information environment, as well as new technologies such as software-defined networking, may free up many of the resources required to allow the cyber squadron of the future to secure and defend the expanded cyber terrain; however, additional investment and reforms will also be needed to sustain these new requirements.23

Winning Tomorrow’s Fight

Given the speedy movement towards greater cyber dependency throughout the military, it is critical that Air Force Space Command examine and consider the following recommendations for the cyber and space force-development systems.24

Leverage Big Data for Decision Making

Air Force Space Command should develop three standard tests and should implement them throughout the force-development process to assess both space and cyber Airmen. The first test should be for cyber proficiency and propensity only. This test would measure a recruit’s or trainee’s potential to comprehend cyber concepts and acquire cyber skills, regardless of formal cyber training.25 The second and third tests would be knowledge based—one for knowledge applicable to cyberspace operations and the other applicable to space. Initially, it may be impossible to determine exactly what cyber proficiency looks like. This is acceptable and should not dissuade the command from undertaking this effort. As scores for all three tests are compiled, they must be associated with members and tracked alongside other metrics to determine how scores appear to correlate to a given individual’s success, mediocrity, or failure. The process of data compilation and analysis should continually inform a cyclical reevaluation of the tests to ensure that they adequately assess ability and knowledge.

Pertinent data points that should be associated with test scores fall into three major categories: education, training, and experience. By combining proficiency and knowledge test scores with data points from these three categories, Air Force Space Command will gain powerful insight into how to prioritize education, training, and experience when it makes force-development decisions. By strategically retesting Airmen, the command can gain insight into how specific training events or educational milestones affect or do not affect scores.26

Mission-Specific Cyber Training

Air Force Space Command is close to having implemented the optimal framework for an initial, intermediate, and advanced training system for cyberspace operations. The current focus on mission-specific intermediate training as opposed to general intermediate training and on-the-job training is a great leap in the right direction.27 Increased cyber dependencies will create the need for many additional mission-specific training courses such as SCADA and IoT defensive operations, as well as intermediate cyber defensive training that is specific to various Air Force land, space, and air mission systems.

For enlisted Airmen, the 1B initial training course should be split between a combined 3D and 1B initial training course and intermediate training courses that are specific to the mission requirements that 1B and 3D Airmen will encounter. The 3D career fields should not be left out of the operationalization of the communications career fields because they play important roles in the security and defense of the cyber battleground and will continue to do so. Efforts to divide training requirements between the 3D and 1B career fields should follow the National Institute of Standards and Technology’s National Initiative for Cybersecurity Education Framework.28 While training for enlisted 3D and 1B Airmen will diverge fairly quickly after the basics, there must be a set of core “operational cyber” fundamentals shared by the two career tracks.29

Specialized Training for Cyber-Dependent Operators

For those noncyber officers whose mission sets have high levels of cyber dependency, such as space operations personnel and remotely piloted aircraft pilots, opportunities should be made available for them to attend the intermediate and advanced cyber training that is applicable to their mission. Program acceptance for noncyber Airmen should be based in part on their cyber proficiency and knowledge test scores.

Just as there is an advantage provided by having weapons officers who are proficient across the spectrum of weapon systems, so would it be advantageous to have officers in cyber-dependent missions who are also proficient in cyber operations.30 A program similar in many ways to the one offered by the USAF Weapons School but with a smaller footprint should be established to strategically place graduates within their cyber-dependent career fields.31

Work to Expand Industry Partnership Opportunities

Air Force Space Command should work with the Office of the Assistant Secretary of the Air Force for Acquisition (SAF/AQ) and the Air Force Institute of Technology (AFIT) to create a special pipeline for officer and enlisted Airmen in the space and cyber career fields to tour in the Education with Industry (EWI) program. If this cannot be accomplished, Air Force Space Command should consider establishing a similar program, focused on bringing cutting-edge innovation and specialized skills back to the military while expanding ties with industry partners.
Graduates of the EWI program not only help close the technology and skills gap between the military and the private sector but also help increase cooperation and strengthen ties between the two sectors at a critical time for space and cyberspace.32 Air Force Space Command should focus on embedding officer and enlisted Airmen within corporations that are at the forefront of space and cyberspace technology and should press to expand outside the list of traditional cleared defense contractors.

Though the EWI program is not generally made available to enlisted Airmen, space and cyberspace require unique technical skills that can be developed and grown during an EWI tour. While an officer in the EWI program may develop unique leadership skills and pick up innovative ideas, correctly placed enlisted Air- men could bolster their coding or other technical skills that are specific to their mission and career field.

These efforts would be in line with Secretary of Defense Ashton Carter’s initiative to increase innovation in the Department of Defense and strengthen military and industry ties.33 In addition to coordination with SAF/AQ and AFIT on the EWI program, Air Force Space Command should seek to develop direct ties with Defense Innovation Unit X, the new Department of Defense cell in Silicon Valley.34 Because Unit X will primarily develop and strengthen industry ties in the area of cyber operations, Air Force Space Command would benefit from coordinating with Unit X on force development of cyberspace operators.35

Encourage New Forms of Education and Training

The civilian market for Internet-based microdegrees, nanodegrees, and other forms of short-term, topic-specific training has greatly increased cost-effective education and training opportunities for Airmen to leverage.36 Shorter than an associate de- gree but longer than a traditional training course, microdegrees and other new forms of Internet-based learning have proliferated in recent years. Air Force Space Command should actively embrace and explore this trend as a way to train and educate space and cyber Airmen. Partnerships with online learning companies such as Udacity, Coursera, edX, or other massive open online course (MOOC) providers may yield opportunities for Airmen to gain topical education and training customized to the needs of Air Force Space Command, with much lower entry costs and time barriers for students.37

Traditional education still has a very important role to play, but Air Force Space Command should take active steps to investigate how these education technologies are changing the civilian education market.38 Microdegrees can provide Airmen with a far more agile, topical, and responsive form of education that also allows them to stay up to date in the rapidly advancing field of information technology. Beyond individualized education and training, partnerships between Air Force Space Command and MOOC companies could provide a relatively cost-efficient way to train space and cyber Airmen on the whole.39

Extensive Investment in the Cyber Training Corps

Of all the war-fighting domains, cyber’s exponentially changing terrain makes “teaching cyber” a challenging task over time. Comparatively, very little changes year-to-year as pilots are trained in air operations or as space operators are trained in space operations, yet course material in the cyber domain may become outdated within months.40

Just as an individual operator’s skills and knowledge will atrophy far more rapidly than in the other domains, so will material developed for training and education.41 For every instructor assigned to a cyber instructional course, Air Force Space Command should consider assigning a second member whose responsibilities include rapid revision of course material based on changing circumstances in the cyber domain and tuning based on analysis of student feedback and performance.

While the instructor handles instruction, grading, and administration, a course developer would be tasked to ensure that course instruction remains timely and relevant. Whenever possible, course developers should be embedded with operational units and/or industry partners in the private sector for short bursts of time to retain cutting-edge knowledge and skills.42 Like an information system with known vulnerabilities, cyber instructional courses cannot afford to remain static; instead, they must be treated like a constantly evolving system. For every cadre of instructors, there should be an equally large or greater cadre of course developers handling this function.

Conclusion

Of all the war-fighting domains, cyberspace is the most rapidly changing. These changes are driving Air Force missions and weapon systems towards greater cyberspace and space dependency. By understanding, anticipating, and posturing for greater degrees of cyber dependency throughout the force, Air Force Space Command will develop space and cyber Airmen who are ready to prevail in the cyber battleground of the future.

Air Force Space Command should consider the advantages of leveraging big data for decision making, continuing to develop mission-specific cyber training, making cyber training available to operators in cyber-dependent missions, strengthening ties with industry partners, encouraging new forms of education and training, and investing heavily in an expanded cyberspace training cadre. These investments, some small and some large, would yield sizable dividends when Air Force Space Command suddenly finds itself immersed in the cyber battleground of the future. It is possible to imagine, at some near-distant point in the future, an Air Force that is wholly dependent on space and cyberspace. It is equally possible to envision an Air Force whose cyber defense capabilities are far greater than the new threats that these space and cyber dependencies will pose. The time to begin overcoming the challenges of cyber dependency is now.

About the author:
*2nd Lt Chris Babcock, USAF
: Lieutenant Babcock (BS, Indiana University) is the crew commander and deputy section chief for the 50th Space Communications Squadron’s Air Force Satellite Control Network, Network Operations Security Center. He is a cyberspace operations officer with a special interest in network defense and intelligence integration.

Source:
This article (PDF) was originally published in the Air and Space Power Journal Volume 29, Issue 6, November-December 2015.

Notes:
1. Degrees of cyber dependency may be used to describe any military capability, technology, or strategy. Supremacy in the cyberspace domain is analogous to air supremacy and is defined by the author as the degree of cyber superiority over a portion or segment of cyberspace wherein the oppos- ing cyber force is incapable of effective interference.
2. Market forces will drive the military to secure and defend a larger battlespace, but the Depart- ment of Defense itself will also deliberately expand the cyber battlespace in a much more consequen- tial way.
3. Joint Publication (JP) 3-12 (R), Cyberspace Operations, 5 February 2013, http://www.dtic.mil /doctrine/new_pubs/jp3_12R.pdf. JP 3-12 refers to this as the “[unique] relationship” between space and cyberspace. The author calls this “domain cyber dependency” because all operations in the space domain presently rely on cyberspace supremacy.
4. Ibid.; and JP 3-14, Space Operations, 29 May 2013, http://www.dtic.mil/doctrine/new_pubs /jp3_14.pdf.
5. JP 3-12 (R), Cyberspace Operations, defines cyberspace as “many different and often overlapping networks, as well as the nodes (any device or logical location with an internet protocol [IP] address or other analogous identifier) on those networks, and the system data (such as routing tables) that support them” (I-2).
6. Ibid.
7. Ibid. With regard to space operations, the physical network layer of cyberspace includes the infor- mation systems with which space operators perform command and control operations and receive and analyze telemetry; the circuits connecting those information systems to the ground equipment; the ground equipment itself, which prepares and sends data to the space vehicle; and the space vehicles themselves. The logical network layer of cyberspace is embedded in each piece of the physical network. When space operators change configurations on or send commands to any part of the physical network layer, encrypt or decrypt transmissions, or perform data aggregation and analysis, they are operating within the logical network layer of cyberspace. To some degree, these actions may be considered cyber- space operations. The cyber-persona layer describes the space operators who rely on the physical and logical network layers to perform space operations. The cyber-persona layer also includes potential ad- versaries who may disrupt space operations through their own cyberspace operations.
8. Damon Poeter, “How Moore’s Law Changed History (and Your Smartphone),” PC, 19 April 2015, http://www.pcmag.com/article2/0,2817,2482133,00.asp.
9. JP 3-12 (R), Cyberspace Operations; and Mark Pomerleau, “Army Cyber Chief Outlines Key Chal- lenges, Goals,” Defense Systems, 18 March 2015, http://defensesystems.com/Articles/2015/03/18 /Army-cyber-Cardon-outlines-challenges-goals.aspx.
10. Max Boot, “The Paradox of Military Technology,” New Atlantis, no. 14 (Fall 2006): 13–32.
11. Jose Pagliery, “Love, Not War: Pentagon Courts Silicon Valley,” CNN, 23 April 2015, http:// money.cnn.com/2015/04/23/technology/security/military-silicon-valley/.
12. Lt Col Gregory Conti and Col John “Buck” Surdu, “Army, Navy, Air Force, and Cyber—Is It Time for a Cyberwarfare Branch of Military?,” IAnewsletter 12, no. 1 (Spring 2009): 14–18; and Andrew Phillips, “The Asymmetric Nature of Cyber Warfare,” US Naval Institute, 14 October 2012, http://news .usni.org/2012/10/14/asymmetric-nature-cyber-warfare.
13. JP 3-12 (R), Cyberspace Operations.
14. Katia Moskvitch, “Are Drones the Next Target for Hackers?,” BBC, 6 February 2014, http://www.bbc .com/future/story/20140206-can-drones-be-hacked; and Aliya Sternstein, “How to Hack a Military Drone,” DefenseOne, 29 April 2015, http://www.defenseone.com/technology/2015/04/how-hack-military -drone/111391/.
15. Christian Davenport, “Meet the Most Fascinating Part of the F-35: The $400,000 Helmet,” Wash- ington Post, 1 April 2015, https://www.washingtonpost.com/news/checkpoint/wp/2015/04/01/meet-the -most-fascinating-part-of-the-f-35-the-400000-helmet/; “Insects Inspire Military Mini Drones,” Fox News,18 September 2014, http://www.foxnews.com/tech/2014/09/18/insects-inspire-military-mini-drones/; Joyce P. Brayboy, “Army Researcher’s Interest in Robots Leads to Innovative Device,” US Army, 2 July 2015, http://www.army.mil/article/151527; Terri Moon Cronk, “Robot to Serve as Future Military’s ‘Pack Mule,’ ” US Department of Defense, 19 December 2012, http://archive.defense.gov/news/newsarticle .aspx?ID=118838; Brendan McGarry, “U.S. Military Begins Testing ‘Smart’ Rifles,” DefenseTech, 15 January 2014, http://defensetech.org/2014/01/15/u-s-military-begins-testing-smart-rifles/; and Kris Osborn, “Navy to Deploy First Underwater Drones from Submarines,” Military.com, 13 April 2015, http://www .military.com/daily-news/2015/04/13/navy-to-deploy-first-underwater-drones-from-submarines.html.
16. Cybersecurity is most commonly understood to be compliance related, such as the manage- ment of vulnerabilities and the implementation of protective measures. This contrasts with active de- fense, which is the implementation of defensive measures or maneuvers in anticipation of, during, or after a cyber incident or engagement with an adversary.
17. “The Pentagon Got Hacked While You Were at Def Con,” Wired, 9 August 2015, http://www .wired.com/2015/08/security-news-week-pentagon-got-hacked-def-con/; Andy Greenberg, “Hackers Remotely Kill a Jeep on the Highway—with Me in It,” Wired, 21 July 2015, http://www.wired .com/2015/07/hackers-remotely-kill-jeep-highway/; Kim Zetter, “Is It Possible for Passengers to Hack Commercial Aircraft?,” Wired, 26 May 2015, http://www.wired.com/2015/05/possible-passengers -hack-commercial-aircraft/; and Hallie Golden, “Security Experts Point to OPM’s Biggest Cybersecurity Failure,” NextGov, 21 July 2015, http://www.nextgov.com/cybersecurity/2015/07/security-experts -point-opms-biggest-cybersecurity-failure/118274/. In each of these examples, the exploits were uncovered by security researchers, not professional “militarized” hackers. If a well-organized, advanced, persis- tent threat were to commit its resources to similar targets, the results would likely be far severer.
18. JP 3-12 (R), Cyberspace Operations. Traditionally, the bulk of defendable battlespace in the cyber- space domain has been communications infrastructure that provides support to the primary mission. One implication of greater cyber dependency will be that the defendable battlespace will expand to include the mission systems themselves. The challenge posed is that intuitively, friendly disruption to the mission would be more likely while defensively operating on a mission or weapon system than it would be while defending communications infrastructure.
19. Recorded Future Special Intelligence Desk, “Week to Weak: The Weaponization of Cyber Vul- nerabilities,” Ref ID: 2014-02 (Somerville, MA: Recorded Future, 4 December 2014), http://go.recorded future.com/week-to-weak-report. The “Week to Weak” report, published in late 2014, illustrates the rapid speed at which vulnerabilities are now weaponized and seen in the wild. Analysis by Recorded Future found that the median number of days for a vulnerability to be exploited is only 7.5. For refer- ence, the report cites the National Institute of Standards and Technology (NIST) as publishing roughly 7,000 newly known vulnerabilities in 2014. This illustrates the incredible speed at which cybersecurity measures such as vulnerability management must occur to maintain risk at appropriate levels.
20. “Standards Are Making the Internet of Things Come Alive,” IEEE Standards Association, 8 April 2013, http://standardsinsight.com/ieee_company_detail/standards_iot; and Dr. W. Charlton Adams Jr., “The Internet of Things and the Connected Person,” Wired, December 2014, http://www.wired.com /insights/2014/12/iot-connected-person/.
21. Klint Finley, “Hacked Fridges Aren’t the Internet of Things’ Biggest Worry,” Wired, 12 March 2015, http://www.wired.com/2015/03/hacked-fridges-arent-internet-things-biggest-worry/; Bill Wasik, “In the Programmable World, All Our Objects Will Act as One,” Wired, 14 May 2013, http://www.wired .com/2013/05/internet-of-things-2/; and Dan Saffer, “The Wonderful Possibilities of Connecting Your Fridge to the Internet,” Wired, 29 October 2014, http://www.wired.com/2014/10/is-your-refrigerator -running/.
22. If the public is not dissuaded by privacy and security concerns, consumer preference for smart devices from self-driving cars to networked refrigerators should provide supplying firms a competitive advantage. If this is the case, competitors to those “first-mover” firms may seek to adopt the same tech- nology or develop their own, potentially commoditizing the technology itself and driving out non- adopting alternatives from the market.
23. Cade Metz, “Mavericks Invent Future Internet Where Cisco Is Meaningless,” Wired, 16 April 2012, http://www.wired.com/2012/04/nicira/; and Klint Finley, “GE’s New Cloud Must Be the Most Tempting Hacker Bait Ever,” Wired, 5 August 15, http://www.wired.com/2015/08/ges-new-cloud-may -tempting-hacker-bait-ever/.
24. Since space operations are overwhelmingly reliant on cyberspace supremacy, several but not all of these recommendations are cyber-centric.
25. A cyber proficiency test would likely assess logic-based problem solving as well as abstract thinking, two skills required for success in cyberspace (and in space).
26. Critically, these tests should not be used to affect the career vectoring of individuals during the first several years of implementation. Over time, as the tests are refined and conclusions are able to be teased out of data points, they will become useful in making those decisions. Drawing conclusions too quickly and making vectoring decisions during the refinement process would skew the results and only lead to foregone conclusions rather than provide true insight.
27. Capt Kinder Blacke, “Intermediate Network Warfare Training Up and Running,” Air Force Space Command, 3 March 2011, http://www.afspc.af.mil/news/story.asp?id=123245023; and SSgt Jarrod Chavana, “Airmen Train for ‘New Wild, Wild West’ in Cyber Domain,” Santa Maria Times, 10 October 2014, http://santamariatimes.com/news/local/military/airmen-train-for-new-wild-wild-west-in-cyber -domain/article_1633ec02-eb22-54e5-ad04-f4bea53b776c.html.
28. “National Cybersecurity Workforce Framework,” National Initiative for Cybersecurity Education, accessed 15 October 2015, http://csrc.nist.gov/nice/framework/.
29. In addition to being informed by the NIST standards, initial and intermediate training for en- listed Airmen should be informed by operational techniques used in the joint community, such as the plan, brief, execute, debrief (PBED) process.
30. J. R. Wilson, “Interview: Col. Robert ‘Shark’ Garland, Commandant, USAF Weapons School,” Defense Media Network, 6 November 2011, http://www.defensemedianetwork.com/stories/interview -col-robert-%E2%80%9Cshark%E2%80%9D-garland-commandant-usaf-weapons-school/.
31. Entry into the program and placement following the program could be managed very similarly to the procedures of the USAF Weapons School, without the need to develop an entire training pro- gram that is separate from the traditional intermediate and advanced cyber courses that are specific to the graduate’s mission.
32. Jim Garamone, “Winnefeld: DoD Must Strengthen Public, Private Ties,” US Department of De- fense, 14 May 2015, http://www.defense.gov/news/newsarticle.aspx?id=128810; and Kevin Gilmartin, “Education with Industry Program Offers Different Perspective,” Air Force Print News, 14 March 2008, http://www.hanscom.af.mil/news/story_print.asp?id=123090306.
33. Cheryl Pellerin, “Carter Seeks Tech-Sector Partnerships for Innovation,” US Department of De- fense, 23 April 2015, http://www.defense.gov/news/newsarticle.aspx?id=128655.
34. Mark Pomerleau, “Carter Details DoD’s Innovation Plans,” Defense Systems, 6 May 2015, https://defensesystems.com/articles/2015/05/06/carter-dod-innovation-plans-congress.aspx; and Patrick Tucker, “Pentagon Sets Up a Silicon Valley Outpost,” Defense One, 23 April 2015, http://www.defenseone .com/technology/2015/04/pentagon-sets-silicon-valley-outpost/110845/.
35. Pomerleau, “Carter Details DoD’s Innovation Plans.”
36. Stuart M. Butler, “How Google and Coursera May Upend the Traditional College Degree,” Brookings Institution, 23 February 2015, http://www.brookings.edu/blogs/techtank/posts/2015/02/23-mooc -google-coursera-butler/.
37. Ibid.
38. In addition to partnering with the companies themselves, an examination of the underlying tech- nology and methods may illustrate efficiencies that could be implemented in military-led training courses.
39. Jeffrey R. Young, “Will MOOCs Change the Way Professors Handle the Classroom?,” Chronicle of Higher Education, 7 November 2013, http://chronicle.com/article/Will-MOOCs-Change-Campus/142869/.
40. Conti and Surdu, “Army, Navy, Air Force, and Cyber,” 14–18.
41. Ibid.
42. Semiregularly, instructors and course developers should rotate between their respective func-
tions to retain currency in each.

Turkey’s Brinkmanship Against Russia November 2015: Implications – Analysis

$
0
0

By Dr Subhash Kapila*

The Middle East enveloped by military turbulence generated by global and regional power-play and the spectre of ISIS power-push in the region did not require another provocative military escalation of tensions by Turkey after the Russian military intervention in Syria for the twin objectives of neutralising the ISIS and also ensuring no regime change takes place in Syria by Syrian rebel groups supported by Turkey, Saudi Arabia and the United States.

With the ISIS being now viewed as a global threat, the Russian military intervention in Syria should have been welcomed by ISIS- tolerant states because the ISIS that they created for a regime-change in Syria now stands transformed into a strong entity with the potential to devour them too. Turkey may be now reportedly hosting two million Syrian refugees but it also cannot shove-of media reports suggesting that the main influx of new ISIS foreign inductees into ISIS pass through Istanbul and that ISIS exports and sale of oil goes through or bought by Turkey. So therefore Russian military intervention in Syria primarily against the ISIS which figures now in Russian threat perceptions should have been welcomed as any ISIS neutralisation would now require a global effort.

Contextually, in recent years under the same Turkish top leadership there was a marked upsurge in Turkey-Russia political, military and economic relations with consequent mutual benefits to both these nations. That itself should have held back Turkey and the Turkish President from authorising the shoot-down of the Russian Air Force fighter plane on a mission on the Syrian-Turkish border. So what has changed after the Russian military intervention in Syria? Was Turkey under NATO pressure? Or were Turkish regional power ambitions being thwarted or were there strong domestic political compulsions? Readers can draw the conclusions from the discussion below.

Turkey seemingly indulged in unwarranted brinkmanship against Russia by shooting down a Russian Air Force SU-24 which Turkey claimed intruded into Turkish airspace for 17 seconds while on bombing sorties against the ISIS, and that was all the more reason for Turkey to exercise restraint going by the tense overlapping of multi-nations bombing sorties against the ISIS in the congested airspace on the Turkish-Syria border.

Russian military intervention in Syria and use of Russian Air Force for bombing of ISIS locations in Syrian territory on the Syria-Turkey border has rattled Turkey. This basically arises because Russian air strikes are also targeting Syrian rebel positions which besides other rebel groups also target Syrian Turkmen rebel positions which enjoy Turkish support and have Turkish ethnic linkages

Syrian Turkmen rebel positions are located perilously close to the Russian airbases, North of Latakia, being used for Russian air strikes.

While Russia so far has held its hand back from military retaliation against Turkey for this brinkmanship challenge for geopolitical reasons, but reports suggest that Russian ripostes are now two pronged. The first is economic retaliation by curtailing gas supplies to Turkey, cutting of Turkish imports into Russia and clamping on Russian sizeable tourist traffic to Turkey.

But stronger retaliation short of war against Turkey is the Russian intensification of air strikes against Syrian Turkmen positions contiguous to Turkey’s Southern border. This besides neutralising sizeable rebel forces operating against the Syrian regime of President Assad hurts Turkey most contextually in terms of Turkey’s domestic politics.

Analysing the military implications first, it needs to be brought out first that Tukey’s President would be powerless to hit back at or impede Russian Air Force strikes against Syrian Turkmen positions, with Russian Air Force operating strictly in Syrian airspace. Secondly, Russia has decided now to provide Russian Air Force fighter aircraft escorts to its aircraft on bombing sorties along the Syrian-Turkish border. Thirdly, Russia has despatched highly advanced S-400 Air defense missiles systems which in similar circumstances would be able to shoot down Turkish Air Force planes impeding Russian strikes against Turkmen and other rebel positions. Fourthly, which option Russia recently employed in its present military intervention was the use of long range cruise missiles to effect from as far as off Russian Navy ships in the Black Sea.

Since Russian military strikes on Turkmen rebel positions was becoming a strong pressure point in Turkish domestic politics and likely now to become intensified, the Turkish President may have to regret on this attack on the Russian Air Force strike aircraft.

Controversy has gone viral on blogger-sites as to how Turkish TV crews were at the right place, at the right time and facing the right direction, to film live the Russian Air Force strike aircraft going down in flames after being hit by Turkish military action. This controversy got further reinforced when the Russian President indicated that all Russian air strikes undertaken along the Syrian-Turkish border, prior details were being provided to the United States. This factor brings into account that the United States could have passed on this information to Tukey making this downing of the Russian Air Force aircraft a “premeditated” one. Notwithstanding the fact that this controversy will go on for some time, let us now examine the geopolitical implications.

The Russian President may have presently held back his hand for wider geopolitical reasons but it would be uncharacteristic of him not to retaliate strongly with a military option wherein Russia provides strong military backing to Kurdish rebels battling the Turkish regime. This could add to Turkish military challenges which already have multiplied after Turkey also pitched-in for a regime-change in Syria.

Turkey’s regional power aspirations in the Middle East stand a greater chance of being dented with Russia no longer friendly-disposed towards Turkey and Russia-Iran strategic convergences against regime-change in Syria getting that much more reinforced. Turkey has already spoilt its relations with Iran after recording a phase of friendly relations some years back.

The Turkish President short of an outright apology to the Russian President for this provocative military action which Turkey could have passed-off as an over-reaction by Turkish Air Force and lessened the chances of any further escalation, went only that further to express ‘sadness’ over the incident,

The Russian President’s strong reactions terming the Turkish shooting down of the Russian Air Force fighter-plane as a “stab in the back” and by “accomplices of terrorists” cannot be taken lightly, especially the latter term which connotes Turkey as accomplice of the ISIS.

Concluding, it needs to be observed that Russia-Turkey relations seem to be headed towards “frozen turbulence” in which Turkey may be a bigger loser geopolitically than Russia. Turkey’s strategic space and flexibility in the regional strategic space is likely to be restricted now.

*Dr Subhash Kapila is a graduate of the Royal British Army Staff College, Camberley and combines a rich experience of Indian Army, Cabinet Secretariat, and diplomatic assignments in Bhutan, Japan, South Korea and USA. Currently, Consultant International Relations & Strategic Affairs with South Asia Analysis Group. He can be reached at drsubhashkapila.007@gmail.com

The Islamic State: Frequently Asked Questions, Threats, Global Implications And US Policy Responses – Analysis

$
0
0

By John W. Rollins and Heidi M. Peters*

In the wake of the deadly November 13, 2015, terrorist attacks in Paris, U.S. policymakers are faced with a wide range of strategy and operational considerations related to the activities of and threats emanating from the Islamic State (IS). A terrorist attack such as this prompts an examination of U.S. domestic security precautions; the role of allies and coalition partners; the appropriate military and diplomatic reactions; the safety and security of infrastructure and that of travelers; and numerous additional discrete issues that require the active involvement of dozens of federal, state, and local government agencies.

With the attacks in Beirut, over Egypt, and in Paris, the Islamic State has demonstrated a transnational capability that suggests its strategic objectives and tactics have evolved, gaining strength in some areas and losing capacity in others. The response to these attacks by the United States and other nations continues to evolve as the threat posed by IS changes.

What Other Names Are Frequently Associated with the Islamic State?

The Islamic State (IS) organization is also referred to by its former name—the Islamic State of Iraq and the Levant (ISIL)/Islamic State of Iraq and Syria (ISIS)—and the Arabic acronym Daesh (pronounced “daash,” for Dawlat al-Islamiyah f’al-Iraq wa al-Sham), which translates to the Islamic State in Iraq and the Levant/Syria.

How Was the Islamic State Established?

Many observers argue that changes in Iraq’s political structure as a result of the U.S.-led overthrow of Saddam Hussein helped give rise to the Islamic State. The fall of Hussein’s Sunni Arab-dominated government and the ascension to power of the majority Shiite Arab population fueled deep Sunni resentment that continues today. In Syria, the Islamic State has grown in size and strength in part because of the Asad regime’s use of Syria’s armed forces and Iranian support to try to suppress rebellion by Syria’s Sunni Arab majority.

The Islamic State’s direct ideological and organizational roots lie in the forces built and led by the late Abu Musab al Zarqawi in Iraq from 2002 through 2006—Tawhid wal Jihad (Monotheism and Jihad) and Al Qaeda in the Land of the Two Rivers (also known as Al Qaeda in Iraq, or AQ-I). Zarqawi took advantage of Sunni animosity toward U.S. forces and feelings of disenfranchisement at the hands of Iraq’s Shiites and Kurds to advance a uniquely sectarian agenda that differed from Al Qaeda’s in important ways. Some experts attribute Sunni resentment to the use by some Shiites of the democratic political process to monopolize political power in Iraq. Following Zarqawi’s death at the hands of U.S. forces in June 2006, AQ-I leaders repackaged the group as a coalition called the Islamic State of Iraq (ISI). ISI lost its two top leaders in 2010 and was weakened, but not eliminated, by the time of the U.S. withdrawal in 2011.

In June 2014, Islamic State leaders declared their reestablishment of the caliphate (khilafa, lit. succession to the prophet Mohammed), dropped references to Iraq and the Levant in their name, demanded the support of believing Muslims, and named Abu Bakr al Baghdadi as caliph and imam (leader of the world’s Muslims).1 IS leaders have highlighted Baghdadi’s reported descent from the Quraysh tribe—the same tribe as the Prophet Muhammad—as well as his religious training, as qualifications for his position as caliph. The group cites its implementation of several of the historical requirements of the caliphate/imamate as further grounds for the religious legitimacy of its actions. Its Muslim critics question its legitimacy and actions.

See CRS Report R43612, The “Islamic State” and U.S. Policy, by Christopher M. Blanchard and Carla E. Humud for more information.

Where Has the Islamic State Launched Terrorist Attacks?

Prior to 2015, the majority of terrorist attacks conducted by IS supporters were in Iraq and Syria. However, in 2015 it appears IS strategy evolved to include pursuing terrorist attacks globally. In this regard, transnational IS terrorist attacks outside of Iraq and Syria may be an instrumental tactic in a broader strategic effort to draw adversaries, including the United States, into larger- scale and more direct conflict. An example of the Islamic State’s evolving strategy may be demonstrated in the numerous terrorist attacks occurring in places other than Iraq and Syria with civilian deaths rising to nearly 1,000 since January 2015.

See CRS Report R43612, The “Islamic State” and U.S. Policy, by Christopher M. Blanchard and Carla E. Humud, and CRS Insight IN10209, European Security, Islamist Terrorism, and Returning Fighters, by Kristin Archick and Paul Belkin for more information.

Are Islamic State Affiliates Operating in Other Countries?

Since 2014, some armed groups outside of Iraq and Syria have recognized the Islamic State caliphate and pledged loyalty to Abu Bakr al Baghdadi. As of late 2015, experts consider IS adherents in Yemen, Egypt, Algeria, Saudi Arabia, Libya, Afghanistan, and Nigeria to be the most significant and capable. These groups have used the Arabic word “wilayah” (state/province) to describe themselves as constituent members of a broader IS-led caliphate. The implications of such pledges of loyalty to the Islamic State on groups’ objectives, tactics, and leadership structures appear to vary and may evolve.

The Obama Administration has stated that groups and individuals that are associated with the Islamic State and that participate in hostilities against the United States or its coalition partners are legitimate military targets pursuant to the 2001 Authorization for the Use of Military Force against Al Qaeda, subject to executive branch discretion.

For more information, see “IS Affiliates and Adherents” in CRS Report R43612, The “Islamic State” and U.S. Policy, by Christopher M. Blanchard and Carla E. Humud; CRS Insight IN10199, The Islamic State in Egypt: Implications for U.S.-Egyptian Relations, by Jeremy M. Sharp; “Armed Islamist Groups and Related Terrorism Threats” in CRS Report RL33142, Libya: Transition and U.S. Policy, by Christopher M. Blanchard; and CRS Insight IN10242, Nigeria’s Boko Haram and the Islamic State, by Lauren Ploch Blanchard and Christopher M. Blanchard.

How Is the Islamic State Financed and What Is the United States Doing to Counter IS Financing?

While IS funding streams remain fluid, the group’s largest revenue sources appear (based on open-source information) to include oil sales, taxation and extortion, and the sale of looted antiquities. Oil sales initially provided the majority of the group’s revenue, but gradually declined as a percentage of overall IS profits due to an extensive campaign of airstrikes by the United States and coalition partners against oil and gas facilities used by the group.

U.S. officials have noted that the Islamic State’s financial strength depends not only on its income but also on its expenses, and the extent to which it is able to devote its resources to military operations. U.S. officials have stated that the Islamic State’s decision to hold and govern territory is a financial burden for the group, and thus a vulnerability that the United States could potentially exploit by diminishing the group’s ability to generate and utilize revenue. If the Islamic State cannot afford the expenses associated with governing its territory, some argue that the resulting public backlash would undermine its ability to rule.

Targeting the Islamic State’s finances is one of five core lines of effort to degrade and defeat the terrorist organization. General John Allen, the recently retired U.S. Special Presidential Envoy for the Global Coalition to Counter ISIL, stated in early 2015 that the United States cannot defeat the Islamic State through military efforts alone, and highlighted the need to deprive the group of access to financial resources.2 At present, U.S. policy focuses on disrupting IS revenue streams, limiting the group’s access to formal financial systems, and imposing sanctions on the group’s senior leadership and financial facilitators.3 The United States also has sought to collaborate with international partners, including through cooperation on financial intelligence collection and analysis.

See CRS Report R43980, Islamic State Financing and U.S. Policy Approaches, by Carla E. Humud, Robert Pirog, and Liana W. Rosen for more information.

What Types of Assistance Are Coalition Partners and Other Nations Contributing to Countering IS Activities?

On September 10, 2014, President Obama announced the formation of a global coalition to “degrade and ultimately defeat” IS. Subsequently, some 60 nations and partner organizations agreed to participate, contributing either military forces or resources (or both) to the campaign. In Brussels in December 2014, these 60 partners agreed to organize themselves along five “lines of effort,” with at least two countries in the lead for each:

  • Supporting military operations, capacity building, and training (led by the United States and Iraq);
  • Stopping the flow of foreign terrorist fighters (led by The Netherlands and Turkey);
  • Cutting off IS access to financing and funding (led by Italy, the Kingdom of Saudi Arabia, and the United States);
  • Addressing associated humanitarian relief and crises (led by Germany and the United Arab Emirates); and
  • Exposing IS’s true nature (led by the United Arab Emirates, the United Kingdom, and the United States).

Coalition participation tends to be fluid, with each country contributing capabilities that are commensurate with their own national interests and comparative advantage. Since August 2015, several coalition participants have changed the roles, missions, and capabilities of the military forces they are applying to counter the Islamic State.

Along with the United States, France has been at the forefront of the international coalition conducting military operations against IS in Iraq. Until September 2015, France had ruled out conducting operations in Syria—in part because it did not want to inadvertently support the Asad regime—but changed course due to growing concerns about IS. Following the November attacks, President François Hollande vowed to redouble the military campaign to destroy the Islamic State. Within 48 hours of the attacks, France launched its most aggressive air strikes yet, on the IS stronghold of Raqqa, Syria; the number of French fighter jets conducting airstrikes is to increase from 12 to 38. Hollande has also stressed that he will focus on unifying and bolstering the international military coalition fighting IS. This would include greater cooperation with the United States, Russia, and countries in the region.

Russia initiated military operations in Syria in September 2015, but it did not begin robustly targeting Islamic State forces until Russian authorities concluded in mid-November that a “self- made” explosive device4 had brought down a Russian airliner over the Egyptian Sinai Peninsula on October 31, 2015, killing all 224 passengers on board. Statements released by the Islamic State and affiliated groups claimed responsibility for the crash, and depicted the improvised explosive devise allegedly used to carry out the attack.5 Russia’s military operations in Syria to support the Asad regime currently appear to be independent of the global counter-IS coalition’s activities.

See CRS Report R44135, Coalition Contributions to Countering the Islamic State, by Kathleen J. McInnis; CRS Insight IN10301, France: Efforts to Counter Islamist Terrorism and The Islamic State, by Paul Belkin; and CRS Insight IN10360, Russian Deployments in Syria Complicate U.S. Policy, by Carla E. Humud et al. for more information.

U.S. Policy Responses to the IS Threat

The U.S. government continues to lead a multilateral coalition that seeks to “degrade and ultimately destroy” the Islamic State organization by progressively reducing the geographic and political space, manpower, and financial resources available to it.6 Stated U.S. strategy to achieve this objective consists of a number of “lines of effort,” including, in partnership with several European and Arab states, direct military action, support for Iraqi and Syrian partner ground forces, intelligence gathering and sharing, and efforts to restrict flows of foreign fighters and disrupt the Islamic State’s finances.7 Administration officials have identified areas where they believe progress has been made in implementing U.S. and allied strategy to date, but they continue to state that it may take a considerable amount of time to achieve the full range of U.S. objectives. They also note the potential for delays or setbacks.

See CRS Report R43612, The “Islamic State” and U.S. Policy, by Christopher M. Blanchard and Carla E. Humud for more information.

What Is the U.S. Strategy to Address IS-related Concerns?

High-profile terrorist attacks attributed to the Islamic State organization in several countries are altering the terms of U.S. and allied policy debates about the threat posed by the group and current strategic approaches to defeating it. At President Obama’s direction, elements of the U.S. government continue to lead a multilateral coalition that seeks to “degrade and ultimately destroy” the Islamic State organization by progressively reducing the geographic and political space, manpower, and financial resources available to it. Stated U.S. strategy to achieve this objective consists of a number of “lines of effort,” including, in partnership with several European and Arab states: direct military action, support for Iraqi and Syrian partner ground forces, intelligence gathering and sharing, and efforts to restrict flows of foreign fighters and disrupt the Islamic State’s finances. Administration officials have identified areas where they believe progress has been made in implementing U.S. and allied strategy to date, but they continue to state that it may take a considerable amount of time to achieve the full range of U.S. objectives, while noting the potential for delays or setbacks.

See CRS Report R43612, The “Islamic State” and U.S. Policy, by Christopher M. Blanchard and Carla E. Humud for more information.

Is a New Authorization to Use Military Force Against the Islamic State Necessary?

The President in his August 2014 notifications to Congress of deployments and airstrikes in Iraq indicated his powers as Commander in Chief and Chief Executive under Article II of the Constitution gave him authority to use military force against the Islamic State. Subsequently, however, Obama Administration officials and the President’s September 2014 notifications to Congress for airstrikes and other actions in Iraq and Syria stated that two enacted authorizations for use of military force (AUMFs), the Authorization for Use of Military Force (2001 AUMF; P.L. 107-40), and the Authorization for Use of Military Force Against Iraq Resolution of 2002 (2002 AUMF; P.L. 107-243), provide authorization for certain U.S. military strikes against the Islamic State in Iraq and Syria, as well as the Khorasan Group of Al Qaeda in Syria. Despite these assertions of adequate existing legislative authority, the President indicated on November 5, 2014 that he intended to enter into discussions with congressional leaders to develop a new AUMF specifically targeting the Islamic State, in order to “right-size and update whatever authorization Congress provides to suit the current fight, rather than previous fights” authorized by the 2001 and 2002 AUMFs. The President called on Congress to enact a new AUMF targeting the Islamic State in his January 2015 State of the Union address, and transmitted a draft AUMF to Congress on February 11, 2015.

A number of Members of Congress have introduced legislative proposals for a new AUMF in the 113th and 114th Congresses, stating that existing legislation authorizing military force is outdated and insufficient when applied to the Islamic State crisis. Some Members of Congress have expressed the opinion that a new authorization is necessary to prevent the President from entering into a large-scale, long-term conflict akin to the recent conflicts in Afghanistan and Iraq. Others argue that the existing 2001 and 2002 AUMFs, authorizing the use of military force against Al Qaeda and the Taliban after the 9/11 terror attacks, and the invasion of Iraq to remove Saddam Hussein from power, respectively, are too limited in their scope and unnecessarily constrain the President’s ability to defeat terrorist and extremist threats to U.S. national security and interests. These Members of Congress have in some cases introduced new authorizations that would expand the President’s authority to meet growing and evolving threats, possibly applying to groups other than the Islamic State and in places other than Iraq and Syria. In many cases, Members of Congress have stressed the importance of Congress’s role in the exercise of the war power in the Constitution, stating that Congress should not abdicate its responsibility to participate in the country’s decision to use military force against the Islamic State.

These proposals have included several types of authorizing and constraining provisions, including the following:

  • identifying legitimate targets of military force, including the Islamic State, associated forces of the Islamic State, and others;
  • prohibiting long-term, large-scale use of U.S. armed forces;
  • limiting geographic area of military operations;
  • placing time limits on existing and new authority to use military force;
  • repealing existing AUMFs or stating that new authority supersedes older authorities with regard to the Islamic State; and
  • requiring regular reporting, certification of certain conditions, and consultation with Congress regarding the campaign against the Islamic State.

See CRS Report R43760, A New Authorization for Use of Military Force Against the Islamic State: Issues and Current Proposals in Brief, by Matthew C. Weed for more information.

IS Threats to the Homeland and U.S. Policy Responses: Has the Islamic State Threatened to Attack the United States?

Al Baghdadi and other IS leaders have threatened to attack the United States since 2012. They routinely describe the United States and its non-Muslim allies as “crusaders,” and encourage Islamic State supporters to attack U.S. and allied persons, facilities, and interests by any means possible overseas and at home.8 The group’s propaganda suggests that it welcomes the prospect of direct military confrontation with the United States and U.S. partners, viewing such conflict as a harbinger of apocalyptic battles described in some Islamic religious materials.

For example, in November 2014, Al Baghdadi argued that the Islamic State would continue to expand and welcomed the potential introduction of Western ground forces, saying: “soon, the Jews and Crusaders will be forced to come down to the ground and send their ground forces to their deaths and destruction, by Allah’s permission.”9 IS leaders frequently challenge the United States and others to “come down and meet us on the ground,” and they view such developments as imminent and likely to end in the destruction of their enemies. Statements released by the Islamic State in the wake of the November 2015 Paris attacks contained similarly goading sentiments.10 In this regard, transnational IS terrorist attacks may be an instrumental tactic in a broader strategic effort to draw adversaries, including the United States, into larger-scale and more direct conflict.

Does the Islamic State Have the Capability to Attack in the United States?

While statements released by the Islamic State following the November 2015 Paris attacks identified locations in Washington, DC,11 and New York City12 as potential targets for future attacks, officials and observers continue to debate the extent to which the group has the capability to direct and conduct such attacks inside the United States. U.S. officials have suggested that the individuals responsible for deadly 2015 shooting attacks in Texas and Tennessee were inspired by jihadist-Salafist propaganda, but they have not alleged any operational links between the Islamic State organization and the attackers. These U.S. attacks followed a spate of similar so-called lone wolf attacks in Europe and elsewhere, in which the alleged perpetrators appeared to be inspired by the Islamic State and/or Al Qaeda but have not necessarily been operationally linked to them or their affiliates. The Islamic State has praised these and other incidents and continues to urge supporters to conduct such attacks if they are able.

In this context, U.S. officials have expressed increasing concern about the IS threat in congressional testimony and other public statements. In November 2014, National Counterterrorism Center (NCTC) Director Nicholas Rasmussen said in testimony before the Senate Select Committee on Intelligence that “the [ISIL] threat beyond the Middle East is real, although thus far limited in sophistication. However, if left unchecked, over time we can expect ISIL’s capabilities to mature, and the threat to the United States homeland ultimately to increase.”13 In October 2015, Rasmussen expressed concern about “the group’s trajectory” given that it has “the ingredients that we traditionally look at as being critical to the development of an external operations capability.”14

In the wake of the Paris, Beirut, and Sinai attacks of November 2015, and an October 2015 attack in Ankara (Turkey’s capital), CIA Director John Brennan said that the Islamic State organization “has developed an external operations agenda that it is now implementing with lethal effect.”15

He argued that the United States and its allies will have to deal with IS threats “for quite some time” and suggested that one potential motivation for the group’s embrace of transnational terrorism as a tactic and strategic tool is its desire to signal continuing momentum in the face of limited progress and battlefield setbacks in Iraq and Syria since late 2014. Brennan stated his view that it is “inevitable that ISIL and other terrorist groups are going to continue to try and to attempt to carry out these attacks. That is an inevitability for at least as far as the eye can see. But to me, it’s not inevitable that they’re going to succeed.” Efforts to prevent future attacks and assess future risks to U.S. domestic security are likely to draw from analysis and forensic study of where, how, and by whom the recent attacks were planned, organized, and directed.

For more information on U.S. counterterrorism and security management, and related homeland security issues, see CRS Report R44041, Selected Issues in Homeland Security Policy for the 114th Congress, coordinated by William L. Painter.

What Challenges Are Posed to Law Enforcement by U.S. Citizens: Wishing to Travel Abroad to Join IS?

There is no exact, official, and publicly available count of Americans who have been drawn to the Islamic State. The Federal Bureau of Investigation (FBI) has estimated that “upwards of 200 Americans have traveled or attempted to travel to Syria to participate in the conflict.” The State Department has suggested that the Islamic State has attracted more than 22,000 foreign fighters from more than 100 countries.

In a general sense, it appears that the current challenges posed by the Islamic State largely require U.S. law enforcement to identify individuals who pose a danger as terrorists and preempt their efforts to do harm. All of this draws on resources, strategies, and programs developed in response to 9/11. Analysis of U.S. counterterrorism investigations since September 11, 2001, suggests that the Islamic State (IS) and its acolytes may present broad challenges for domestic law enforcement. These challenges involve understanding and responding to a variety of terrorist actors who arguably can be sorted into five categories:

  • The Departed—Americans, often described as foreign fighters, who plan to leave or have left the United States to fight for the Islamic State. This group includes suspects scheming to travel but who are caught before they arrive in IS territory.
  • The Returned—American foreign fighters who trained with or fought in the ranks of the Islamic State and come back to the United States, where they can potentially plan and execute attacks at home.
  • The Inspired—Americans lured—in part—by IS propaganda to participate in terrorist plots within the United States.
  • The Others—Foreign IS adherents who radicalize in and originate from places outside of the United States or non-American foreign fighters active in the ranks of the Islamic State. These persons could try to enter the United States when done fighting abroad.
  • The Lost—Unknown Americans who fight in the ranks of the Islamic State but do not plot terrorist attacks against the United States. Such individuals may come home after fighting abroad and remain unknown to U.S. law enforcement. Additionally, some American IS fighters will never book a trip back to the United States. (The post-9/11 record of U.S. counterterrorism investigations suggests this prospect. None of the Americans who have fought for al-Shabaab, a terrorist group based in Somalia, have come home to plot attacks.) Finally, some American IS supporters will perish abroad.

See CRS Report R44110, The Islamic State’s Acolytes and the Challenges They Pose to U.S. Law Enforcement: In Brief, by Jerome P. Bjelopera for more information.

What Are the Implications of Encryption and Evolving Technology for U.S. Law Enforcement Investigations?

Because modern-day terrorists and criminals are constantly developing new tools and techniques to facilitate their illicit activities, law enforcement is challenged with leveraging its tools and authorities to keep pace. For instance, interconnectivity and technological innovation have not only fostered international business and communication, they have also helped criminals carry out their operations. At times, these same technological advances have presented unique hurdles for law enforcement and officials charged with combating malicious actors.

Enhanced data encryption, in part a response to privacy concerns following Edward Snowden’s revelations of mass government surveillance, has opened the discussion on how this encryption could impact law enforcement investigations. Law enforcement officials have likened the new encryption to “a house that can’t be searched, or a car trunk that could never be opened.” There have been concerns that malicious actors, from savvy criminals to terrorists to nation states, may rely on this very encryption to help conceal their illicit activities. There is also concern that law enforcement may not be able to bypass the encryption, their investigations may be stymied, and criminals will operate above the law. Critics of these concerns contend that law enforcement maintains adequate tools and capabilities needed for their investigations.

See CRS Report R44187, Encryption and Evolving Technology: Implications for U.S. Law Enforcement Investigations, by Kristin Finklea, and CRS Insight IN10400, Paris Attacks and “Going Dark”: Intelligence-Related Issues to Consider, by Anne Daugherty Miles for more information.

What Are the Implications of Terrorists’ Use of Non-Traditionally Accessed Areas of the Internet?

The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal terrorism-related, criminal, or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policymakers.

Just as terrorists and criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online.

See CRS Report R44101, Dark Web, by Kristin Finklea for more information.

IS Implications for Iraq and Syria: How Are the Implications of IS’s Activities Affecting Iraqi Governance?

Iraq’s sectarian and ethnic divisions—muted toward the end of the 2003-2011 U.S. military intervention in Iraq—have reemerged to fuel a major challenge to Iraq’s stability and to U.S. policy in Iraq and the broader Middle East region. The resentment of Iraq’s Sunni Arabs toward the Shiite-dominated central government facilitated the capture in 2014 of nearly one-third of Iraqi territory by the Sunni Islamist extremist group called the Islamic State (also known as the Islamic State of Iraq and the Levant, or ISIL). Iraq’s Kurds have been separately embroiled in political and territorial disputes with Baghdad, although those differences have been subordinated to the common struggle against the Islamic State.

See CRS Report RS21968, Iraq: Politics and Governance, by Kenneth Katzman and Carla E. Humud for more information.

Which Nations and Non-State Entities Are Undertaking Military Action in Syria to Defeat IS?

The rise of IS and Russia’s military intervention on behalf of the Syrian government have reshaped debates over U.S. policy toward the ongoing civil conflict in Syria, now in its fifth year. The Islamic State controls large areas of northeastern and central Syria, from which it continues to launch assaults on forces opposed to and aligned with the government of President Bashar al Asad. Meanwhile, fighting elsewhere pits government forces and their foreign allies against a range of anti-government insurgents, some of whom have received limited U.S. assistance.

Russian military intervention in support of Asad poses a direct challenge to U.S. goals in Syria, and is raising new questions about the future of the conflict and U.S. strategy.

See CRS Report RL33487, Armed Conflict in Syria: Overview and U.S. Response, coordinated by Christopher M. Blanchard for more information.

Europe and IS Security Implications What Threat Does the Islamic State Pose to Europe?

On November 13, 2015, coordinated terrorist attacks in Paris left at least 129 people dead and over 350 injured at 6 locations throughout the city. French President François Hollande attributed the attacks to the Islamic State terrorist organization (which subsequently claimed responsibility), and asserted that France’s response would be “merciless.” The attacks were the worst-ever terrorist incident on French soil, and the latest in a number of examples of Islamist terrorism in France and Europe over the past year and a half.

These attacks have reinforced European concerns about European citizens training and fighting with extremist groups in foreign conflicts (especially in Syria and Iraq) and heightened fears that terrorists could slip into Europe, including as part of an ongoing influx of migrants and refugees. News reports indicate that one of the assailants killed during the attacks may have entered Europe through Greece in early October with a Syrian passport as part of the refugee flows (authorities have not conclusively made this link); at least two suspects—both French nationals—may have traveled to Syria. While evidence suggests that the Islamic State was directly involved in planning and carrying out these attacks, worries also persist about “homegrown” extremists inspired by Islamist propaganda to commit violence at home without ever traveling abroad. Other recent terrorist incidents in Europe include

  • The May 2014 killing of four people at the Jewish Museum in Brussels, Belgium; the suspect is a French Muslim who reportedly spent a year with Islamist fighters in Syria.
  • The January 2015 attacks in Paris in which gunmen killed 17 people in three related incidents that targeted the satirical magazine Charlie Hebdo, police officers, and a kosher supermarket. The perpetrators of the attacks were French- born Muslims, with possible ties to Al Qaeda in Yemen or the Islamic State.
  • The February 2015 shootings in Copenhagen, Denmark, in which a self- radicalized Danish-born citizen of Palestinian descent murdered two individuals—one at a cafe that had been hosting a free speech debate, another at a synagogue—and wounded five police officers.
  • The attempted August 2015 attack on a train traveling from Amsterdam to Paris that was thwarted by six passengers, including three Americans; the suspect is a Moroccan man who may have traveled to Syria.

See CRS Insight IN10209, European Security, Islamist Terrorism, and Returning Fighters, by Kristin Archick and Paul Belkin; CRS Report R44003, European Fighters in Syria and Iraq: Assessments, Responses, and Issues for the United States, coordinated by Kristin Archick; and CRS Insight IN10301, France: Efforts to Counter Islamist Terrorism and The Islamic State, by Paul Belkin for more information.

What Concerns Are Associated with Citizens from Western Countries Traveling to Iraq and Syria to Join the Islamic State?

The rising number of U.S. and European citizens traveling to fight with rebel and terrorist groups in Syria and Iraq has emerged as a growing concern for U.S. and European leaders, including Members of Congress. Several deadly terrorist attacks in Europe over the past year—including the killing of 17 people in Paris in January 2015—have heightened the perception that these individuals could pose a serious security threat. Increasingly, terrorist suspects in Europe appear to have spent time with groups fighting in the Middle East, especially with the Islamic State organization. Others, like the gunman who murdered two individuals in Copenhagen in February 2015, seem to have been inspired by Islamist extremist propaganda.

U.S. intelligence suggests that more than 20,000 foreign fighters have traveled to the Syria-Iraq region, including at least 3,400 Westerners, since 2011. The vast majority of Western fighters are thought to be from Europe, although roughly 150 Americans have traveled or attempted to travel to Syria. U.S. authorities estimate that a handful of Americans have died in the conflict; they also assert that military operations against the Islamic State group since August 2014 have killed thousands of fighters, including an unknown number of foreigners.

U.S. officials and analysts contend that the potential foreign fighter threat underscores the importance of close law enforcement ties with key European allies and existing U.S.-EU information-sharing arrangements, including those related to tracking terrorist financing and sharing airline passenger data. Some U.S. policymakers, including several Members of Congress, have expressed particular worries about European fighters in Syria and Iraq because the U.S. Visa Waiver Program (VWP) permits short-term visa-free travel to the United States for citizens of most European countries. At the same time, many point out that the VWP’s existing security controls require VWP travelers to provide advanced biographic information to U.S. authorities and may help limit travel by known violent extremists.

See CRS Report R44003, European Fighters in Syria and Iraq: Assessments, Responses, and Issues for the United States, coordinated by Kristin Archick for more information.

Refugee Considerations: What Is the Scope of the Migration and Refugee Crisis in Europe?

Europe is experiencing what many consider to be its worst migration and refugee crisis since World War II, as people flee conflict and poverty in bordering regions. With the war in Syria in its fifth year, and with 4.1 million refugees in neighboring countries, more Syrians have been leaving for Europe. Other migrants and refugees originate from elsewhere in the Middle East, as well as Afghanistan, Africa, and some Western Balkans countries. Experts characterize the influxes as mixed migration, defined as flows of different groups of people—such as economic migrants, refugees, asylum-seekers, stateless persons, trafficked persons, and unaccompanied children— who travel the same routes and use the same modes of transportation (see text box). Sometimes also termed irregular migrants, these individuals do not have the required documentation, such as passports and visas, and may use smugglers and unauthorized border crossings.

The surge of migrants and refugees has significantly challenged European governments and the 28-member European Union (EU), which has come under criticism for lacking coherent and effective policies. The lines of distinction between groups in the mixed migration flows have raised questions about determination of status and protection required. A key policy consideration is whether the movement is voluntary or forced. The United Nations High Commissioner for Refugees (UNHCR) asserts that 85% of those arriving in Europe by sea in 2015 are from refugee- producing countries. European governments maintain that at least some individuals seeking to enter Europe are economic migrants.

See CRS In Focus IF10259, Europe’s Migration and Refugee Crisis, by Kristin Archick and Rhoda Margesson for more information.

What Is the Administration’s Plan for Admitting Syrian Refugees into the United States?

With some European countries pledging to accept increased numbers of Syrian and other asylum seekers in the face of a refugee crisis, attention is focused on the United States and its plans to admit Syrian and other refugees in FY2016 and beyond. The Obama Administration initially proposed an overall refugee ceiling of 75,000 for FY2016 and held consultations with Congress on that proposal, as required by law. On September 20, 2015, however, Secretary of State John Kerry announced that the refugee ceiling for FY2016 would instead be 85,000. Previously the Administration had announced that the United States would admit at least 10,000 Syrian refugees in FY2016.

The FY2015 worldwide refugee ceiling is 70,000 and the allocation for the Near East/South Asia region, which includes Syria, is 31,000. The FY2015 refugee admissions proposal included a discussion of U.S. plans to resettle Syrian refugees. From October 1, 2010, through August 31, 2015, the United States has admitted a total of 1,494 Syrian refugees, almost 1,300 of that total since October 1, 2014.

See CRS Insight IN10355, Syrian Refugee Admissions to the United States, by Andorra Bruno, and CRS Report R44277, Syrian Refugee Admissions and Resettlement in the United States: In Brief, by Andorra Bruno for more information.

What Is the Scope and Process of U.S. Refugee Admissions and Resettlement Policy?

A refugee is a person fleeing his or her country because of persecution or a well-founded fear of persecution on account of race, religion, nationality, membership in a particular social group, or political opinion. Typically, the annual number of refugees that can be admitted into the United States, known as the refugee ceiling, and the allocation of these numbers by region are set by the President after consultation with Congress at the start of each fiscal year. For FY2015, the worldwide refugee ceiling is 70,000, with 68,000 admissions numbers allocated among the regions of the world and 2,000 numbers comprising an unallocated reserve. An unallocated reserve is to be used if, and where, a need develops for refugee slots in excess of the allocated numbers. The FY2015 regional allocations are as follows: Africa (17,000), East Asia (13,000), Europe and Central Asia (1,000), Latin America/Caribbean (4,000), and Near East/South Asia (33,000).

Overseas processing of refugees is conducted through a system of three priorities for admission. Priority 1 comprises cases involving persons facing compelling security concerns. Priority 2 comprises cases involving persons from specific groups of special humanitarian concern to the United States (e.g., Iranian religious minorities). Priority 3 comprises family reunification cases involving close relatives of persons admitted as refugees or granted asylum.

For more information on U.S. immigration inspections, the visa waiver program, and related border security issues, see CRS Report R44041, Selected Issues in Homeland Security Policy for the 114th Congress, coordinated by William L. Painter, and CRS Report RL31269, Refugee Admissions and Resettlement Policy, by Andorra Bruno.

U.S. Legal Considerations Relating to Threats from the Islamic State: What Legal Tools Are Available to Deter Travel by a Suspected
Terrorist?

The terrorist attacks in Paris last week, for which the Islamic State has claimed responsibility, have renewed concerns about terrorist travel. Following reports that at least one of the perpetrators of the attacks was carrying a Syrian passport, there has been heightened scrutiny and debate concerning the resettlement of refugees from war-torn Syria to Europe and the United States. Some of the tools the federal government employs to prevent individuals from traveling to, from, or within the United States to commit acts of terrorism include Terrorist Databases and Screening, No-Fly List and Selectee List, Criminal Sanctions, Passport Restrictions on Travel to Specific Countries, and Immigration restrictions. In some cases, the application of these tools may depend on different factors, including whether the suspected terrorist is a U.S. or foreign national.

See CRS Legal Sidebar WSLG1438, Legal Tools to Deter Travel by Suspected Terrorists: A Brief Primer, by Michael John Garcia and Jared P. Cole, and CRS Report R42336, Terrorist Watch List Screening and Background Checks for Firearms, by William J. Krouse for more information.

What Are the Procedural Due Process and Hurdles to Litigation Relating to Inclusion in the Terrorist Databases and on the No Fly List?

In order to protect national security, the government maintains various terrorist watchlists, including the “No Fly” list, which contains the names of individuals to be denied boarding on commercial airline flights. Travelers on the No Fly list are not permitted to board an American airline or any flight on a foreign air carrier that lands or departs from U.S. territory or flies over U.S. airspace. Some persons have claimed that their alleged placement on the list was the result of an erroneous determination by the government that they posed a national security threat. In some cases, it has been reported that persons have been prevented from boarding an aircraft because they were mistakenly believed to be on the No Fly list, sometimes on account of having a name similar to another person who was actually on the list. As a result, various legal challenges to placement on the list have been brought in court.

The Due Process Clause provides that no person shall be “deprived of life, liberty, or property, without due process of law.” Accordingly, when a person has been deprived of a constitutionally protected liberty interest, the government must follow certain procedures. Several courts have found that placement on the No Fly list may impair constitutionally protected interests, including the right to travel internationally, and the government’s redress procedures must therefore satisfy due process. Typically, due process requires that the government provide a person with notice of the deprivation and an opportunity to be heard before a neutral party. However, the requirements of due process are not fixed, and can vary according to relevant factors. When determining the proper procedural protections in a given situation, courts employ the balancing test articulated by the Supreme Court in Matthews v. Eldridge, which weighs the private interests affected against the government’s interest. Courts applying this balancing test might consider several factors, including the severity of the deprivation involved in placement on the No Fly list. In addition, courts may examine the risk of an erroneous deprivation under the current procedural framework and the potential value of imposing additional procedures on the process. Finally, courts may inquire into the government’s interest in preserving the status quo, including the danger of permitting plaintiffs to access sensitive national security information.

See CRS Report R43730, Terrorist Databases and the No Fly List: Procedural Due Process and Hurdles to Litigation, by Jared P. Cole for more information.

Can States and Localities Bar the Resettlement of Syrian Refugees Within Their Jurisdictions?

Responding to reports that one individual involved in the Paris attacks was carrying a Syrian passport—which subsequent reports indicate may have been fake or stolen—a number of governors have recently expressed an intention to restrict the resettlement of Syrian refugees within their states. These announcements have prompted questions about states’ authority in the refugee resettlement process and, particularly, whether a state concerned about the resettlement of Syrian refugees within its jurisdiction may take action to forestall or prevent such resettlement.

It is not always clear from a governor’s statements what he or she means when saying, for example, that a state “will temporarily suspend accepting new Syrian refugees.” However, states would appear to have some discretion as to the terms on which state agencies participate in the federally funded refugee resettlement program, although a state likely could not opt to participate actively in the resettlement of refugees from some countries but not others. In contrast, a state lacks the power to prohibit a Syrian refugee admitted into the United States from physically entering or remaining within the state’s jurisdiction.

See CRS Legal Sidebar WSLG1440, Can States and Localities Bar the Resettlement of Syrian Refugees Within Their Jurisdictions?, by Kate M. Manuel and Michael John Garcia for more information.

*About the authors:
John W. Rollins,
Coordinator Specialist in Terrorism and National Security

Heidi M. Peters, Coordinator Information Research Specialist

Source:
This article was published by CRS on November 25, 2015 (PDF)

Notes:
1 Scholar of medieval Islam Wilferd Madelung describes historical Sunni doctrines for the declaration of the imamate in “Imāma.” Encyclopaedia of Islam, 2nd Ed., Edited by: P. Bearman, Th. Bianquis, C.E. Bosworth, E. van Donzel, W.P. Heinrichs, Brill Online, 2015.
2 Gen. John Allen, Special Presidential Envoy for the Global Coalition to Counter ISIL, statement submitted for the conference “Taking the Fight to ISIL: Operationalizing CT Lines of Effort Against the Islamic State Group,” Washington Institute for Near East Policy, February 2, 2015.
3 Under Secretary of the Treasury for Terrorism and Financial Intelligence David Cohen, Remarks at the Carnegie Endowment for International Peace, October 23, 2014.
4 President of the Russian Federation, “Meeting on Investigation into the Crash of a Russian Airliner over Sinai,” November 17, 2015, at http://en.kremlin.ru/events/president/news/50707/videos.
5 U.S. Government Open Source Center (OSC) Report TRR2015111855839040, “Full Text of 12th Issue of ISIL’s English-Language Magazine Dabiq,” Twitter, November 18, 2015.
6 White House Office of the Press Secretary, “Statement by the President on ISIL,” September 10, 2014.
7 The website of the Special Presidential Envoy for the Global Coalition to Counter ISIL identifies five “lines of effort” guiding the coalition’s efforts: (1) Providing military support to our partners; (2) Impeding the flow of foreign fighters; (3) Stopping ISIL’s financing and funding; (4) Addressing humanitarian crises in the region; and (5) Exposing ISIL’s true nature.
8 In July 2012, Baghdadi warned U.S. leaders that “the mujahidin have set out to chase the affiliates of your armies that have fled…. You will see them in your own country, God willing. The war with you has just begun.” OSC Report GMP20120721586002, “Islamic State of Iraq Amir Calls on Sunni Tribes to ‘Repent,’” July 21, 2012. In 2015, IS Spokesman Adnani urged the group’s supporters “in Europe and the disbelieving West and everywhere else, to target the crusaders in their own lands and wherever they are found.” OSC Report TRR2015012657315008, January 26, 2015.
9 OSC Report TRR2014111361251279, “ISIL Amir Al-Baghdadi Accepts Pledges of Allegiance, Announces ‘Expansion’ to Saudi Arabia, Yemen,” Twitter, November 13, 2014.
10 For example: “Rally the troops, assemble the convoys, deliver the planes, raise the Cross, mount on the apostates, crawl to us under your banners, and fulfill the prediction of our prophet, blessings and peace be upon him, whom you insulted, and so we retaliated for him against you. We are here awaiting you and your destruction. Welcome to the field we want. Welcome to the place God chose for us. Welcome to Dabiq [a town in northern Syria, the site of Armageddon in some Islamic eschatological material and the name of the Islamic State’s English language magazine].” OSC Report TRO2015111451259817, “Pro-ISIL Media Establishment Praises Paris Attacks, Invites Military Escalation in Syria,” Twitter, November 14, 2015.
11 For example: “O France of the cross, by the permission of Almighty God, we shall strike your edifices…. We have begun with you [referring to Paris attack], and we will finish at the so-called White House, by the permission of Almighty God. We will make it black with our fire, and we will blow it up as we have blown up idols in this good land.” OSC Report TRR2015111956357770, “ISIL Video From ‘Wilayah Dijlah’ Threatens Hollande, Obama With ‘More of These Types of Strikes’,” Twitter, November 19, 2015.
12 For example: “‘I congratulate our Muslim brothers and the soldiers of the caliphate in France for this blessed operation. And to you O Crusaders, this is the first storm. And that our forces, they surely must conquer!’ This is followed by footage of a man preparing and donning an explosive belt, and then walking into Times Square in New York City.” OSC Report TRL2015111882051969, “ISIL Video Features Fighters Praising Paris Attacks, Bomb- Making, Threat to Times Square,” Twitter, November 18, 2015. In response, New York City officials released statements indicating that there was no “credible and specific threat” associated with the video.
13 Mr. Nicholas J. Rasmussen, then-Acting Director, National Counterterrorism Center, Statement for the Record, Senate Select Intelligence Committee, November 20, 2014. In September 2014, his predecessor Matthew Olsen had said that “we have no credible information that ISIL is planning to attack the U.S.”. Olsen also said U.S. counterterrorism officials “remain mindful of the possibility that an ISIL-sympathizer—perhaps motivated by online propaganda—could conduct a limited, self-directed attack here at home with no warning.” However, Olsen noted that, “In our view, any threat to the U.S. homeland from these types of extremists is likely to be limited in scope and scale.”
14 NCTC Director Rasmussen, Statement for the Record, House Homeland Security Committee, October 21, 2015.
15 Remarks of Central Intelligence Agency Director John Brennan before the Center for Strategic and International Studies, Washington, DC, November 16, 2015.

Islamic State, Turkey And Oil And The Bigger Picture: Interview With Pelicourt

$
0
0

As the terrorist attack in Paris sparks worldwide fear of similar reprisals and a bloody shootout and hostage situation in a five-star Mali hotel exacerbates those concerns, global energy security reels under the pressure of unfathomable geopolitics. In an exclusive interview with Oilprice.com, Robert Bensh—managing director and partner at Pelicourt, a Western-owned oil and gas company navigating tricky conflict zones—discusses:

• The terrorist threat to global energy security
• What ISIS is really after
• The bigger oil picture for ISIS
• Why Iraq can’t cope
• Why Iraqi Kurdistan has disappointed
• Why loose and shifting alliances spell geopolitical disaster
• Whether it’s all as doom-and-gloom as it seems…

Interview by James Stafford of Oilprice.com

James Stafford: In the aftermath of the terrorist attack in Paris and the shooting rampage and hostage situation at the Radisson Blu hotel in Bamako, Mali, how are we supposed to understand the role of energy in this equation; or the threat to global energy security?

Robert Bensh: We don’t have to force a connection here. Every modern day conflict—even if not immediately evident—has at its heart control over resources from oil and gas to water. Religion is but a symptom; a tool used to consolidate opinions, cement power and lure in new recruits.

James Stafford: How significant a role does oil play in funding the Islamic State?

Robert Bensh: I think we have to look at this from a much broader angle. While ISIS is earning significant income from oil sales, keeping in mind that no one really has a true estimate of volumes, the more dangerous aspect of this is that we are well beyond the point at which this is a crazy group of jihadists running amok.

James Stafford: You’re speaking about their level of organization and overall capabilities?

Robert Bensh: Exactly. It’s not their short-term energy disruptions we should be as concerned about. The bigger picture is that ISIS is trying to build a nation here—a fully functional state with its own oil and gas resources. And one of the most important aspects of their plan is to strangle Iraq’s oil revenues in a concerted effort to reduce Baghdad’s capabilities to defend its territory. At this rate, ISIS could become the next member of OPEC.

James Stafford: Is Iraq even remotely equipped to deal with this threat?

Robert Bensh: The latest disintegration of the Iraqi state came with the war in 2003. The follow-on prime minister—Nouri Al-Maliki—largely destroyed national institutions that would have presented a challenge to his Shi’ite rule. The weakened state that emerged from this has not been able to effectively combat the forward push of ISIS. And while the Kurds in Northern Iraq were a fundamental line of defense for Baghdad, that too is eroding as the Kurds have allowed themselves to become mixed up in disruptive internal politics that will undo all the work made to date towards independence. That development is not sitting well with investors who put a lot of money into what appeared to be a very stable and forward-moving Iraqi Kurdistan.

James Stafford: How does Russia fit into this equation?

Robert Bensh: It’s all connected; and for the energy sector, it all reverberates globally. Less attention will now be paid to Russia’s activities in Ukraine in light of the terrorist attack in Paris and the fear that this has sparked off an extended playing ground for the jihadists. As this happens, it is interesting to watch Russia’s relations with Turkey, and the additional insecurity Turkey adds to the conflict in Syria. Turkey’s game of playing all sides in the balance of power game is difficult to sustain. The downing by Turkey of a Russian jet conducting air strikes over northern Syria is just the first move in the new phase of this game, and analysts should probably start looking at ISIS oil sales to Turkey in their examinations of why Turkey downed a Russian jet at a time when the Russians were specifically targeting ISIS-controlled oil facilities and tankers.

James Stafford: What can we expect from Turkey?

Robert Bensh: President Erdogan has now consolidated his power thanks to his victory in the recent parliamentary elections. This means a clear Turkish policy of regime change for Syria. This in turn will be taken advantage of by ISIS. ISIS has already taken great advantage of Turkey’s double game in the form of boosting Syrian and Iraqi Kurds to keep ISIS back but trying to encourage Kurdish disunity by simultaneously attacking the Turkish Kurds. This is diminishing the Kurds’ ability to fight ISIS and also creating a very dangerous situation on the Turkish-Syrian border and across into Southeastern Turkey, where oil interests will suffer significantly. Amid the melee, Russia has been launching air strikes against ISIS in northern Syria, too close to the Turkish border for Erdogan’s comfort.

James Stafford: How can oil and gas investors possibly navigate this geopolitical terrain?

Robert Bensh: They can’t. No one can. Alliances are very unclear, and shifting. No one has a clear strategy because it’s not just about containing the ISIS advance. It’s about WHO is containing the ISIS advance—even after Paris. Will a Turkish-American air strike combo be the one to kick ISIS out of northern Syria? Or will the Russians? At the end of the day, there is one additional, untapped energy resource to be considered—the Levant Basin. This is where Israel has made game-changing gas finds that will render it energy independent and much more powerful. This is where Lebanon will eventually start exploring, if its political standoff is ever resolved, and if ISIS doesn’t upset these plans. What is rarely talked about is Syria’s unexplored portion of this highly promising basin. Whoever ends up in power in Syria will end up with this—the longer game.

James Stafford: Is it all as doom-and-gloom as the mainstream media portrays it?

Robert Bensh: That is always a matter of perspective. It’s always important to remember that the Middle East has been in a state of conflict since time immemorial and most likely will be for our lifetimes. It reaches us today in different ways, through the proliferation of various globalized media sources. As such, it always seems to be on our doorstep. At the same time, this same globalization in many ways aids the proliferation of terrorism as a new form of conflict. Whether it is ‘doom-and-gloom’ is a matter of personal perception. But any way you look at it, these are dire straits out of which no government has a clear path.

James Stafford: What advice would you give investors today about venturing into the oil and gas sector outside of North America?

Robert Bensh: Only invest in management that has a certain geopolitical foresight. Oil and gas men tend to be short-sighted—like most other people. Just because you can make a play work in the U.S does not mean you will succeed in a foreign country in this day and age. Geopolitical insight is paramount to success, and while no one will have all the answers, good management will at least be prepared for a number of eventualities.

Article Source: https://oilprice.com/Interviews/ISIS-Turkey-And-Oil-The-Bigger-Picture-Interview-With-Pelicourt.html

Qatari Labor Reforms: Words But No Actions – Analysis

$
0
0

Words but no actions. That is Amnesty International’s evaluation of promised Qatari labor reforms on the fifth year of the awarding of the 2022 World Cup hosting rights to the Gulf state.

Qatar’s failure to enact wide-ranging reforms heightens the risk of its hosting rights being called into question against a backdrop of legal investigations into the integrity of its bid and world soccer body FIFA presidential elections that could spur increased pressure on the Gulf state in FIFA’s bid to put a massive corruption scandal that involves Qatar behind it.

In a statement, Amnesty researcher Mustafa Qadri, asserted that “too little has been done to address rampant migrant labour abuse. Qatar’s persistent labour reform delays are a recipe for human rights disaster… Unless action is taken – and soon – then every football fan who visits Qatar in 2022 should ask themselves how they can be sure they are not benefiting from the blood, sweat and tears of migrant workers.”

Mr. Qadri noted further that FIFA had “played its part in this sorry performance” given that it was aware of the labour issues when it awarded the World Cup to FIFA. He said FIFA needed to work with Qatar and business to address the issue.

Prince Ali Bin Al Hussein, a frontrunner in next February’s presidential election, has warned that FIFA could revisit Qatar’s hosting rights if it failed to follow through on promises to improve the living and working conditions of migrant workers working on World Cup-related construction sites. He said human and workers’ rights were important criteria in the awarding of the tournament, which together with the Olympic Games is the world’s foremost sporting mega event.

“As an Asian, I am asking that they (Qatar) have to abide by that. I have seen suggestions from Qatar especially in terms of workers’ rights that they want to move ahead but FIFA has to guarantee that they do so. Because that is the basis of how we should be. Football can be a right conduit to serve the society and that for me is the most important thing,” Prince Ali said.

FIFA’s corruption scandal has so far led to the indictment in the United States of 14 serving and former FIFA executives as well as suspension of the group’s president, Sepp Blatter, and European soccer chief Michel Platini.

It has also sparked a Swiss investigation into the awarding in December 2010 of the tournament to Qatar and the 2018 World Cup to Russia. The US Department of Justice proceedings could be expanded to include the Qatari bid, which has been tarred by allegations of corruption and bribery.

Qatar initially built goodwill by responding positively to criticism by trade union and human rights activists who described its regime for migrant worker force that constitutes a majority of the Gulf state’s population as ‘modern slavery.’ Qatar’s kafala or sponsorship regime puts employees at the mercy of their employers.

The goodwill has since largely been wasted by Qatar failing to forcefully follow through on promised reforms. In a first positive fallout from the awarding of the tournament, Qatar broke with the Gulf practice of barring entry to the country or imprisoning its critics. Instead, it opened its doors to the likes of Amnesty, Human Rights Watch and the International Trade Union Confederation (ITUC).

As a result, the 2022 Supreme Committee for Delivery& Legacy alongside Qatar Foundation and Qatar Rail adopted labour standards applicable for all their contracts that significantly improved workers’ living and working conditions but stopped short of abolishing the kafala system. That may help to assuage FIFA’s next president but will not convince Qatar’s critics who argue that the standards need to be enshrined in national law rather than only applicable to a limited number of Qatari institutions. It raises questions about Qatari sincerity and the value of engagement.

In its statement, Amnesty noted that Qatar has backtracked on promises to implement limit changes by the end of this year. Among other things, Qatar has postponed until the end of next year expanding its labour inspector force as well as limited changes of the kafala system. The changes moreover fail to abolish one of the most onerous facets of kafala, the need for an employee to obtain his or her employer’s consent to change jobs.

A series of related events have called into question the effectivity or the sustainability of the kafala system and cast a further shadow over how Qataris, who constitute a minority of the Gulf state’s population, approach communal affairs.

Qatar last month introduced a long delayed wage protection system that requires businesses to pay workers on time by direct bank deposits. Yet, several hundred employees of Drake & Scull in a rare work stoppage that is banned in Qatar went on strike last week in a dispute over unpaid wages.

Moreover, heavy rains that last month led to flooding, including of Qatar’s newly opened $15 billion Hamad International Airport, prompted an investigation into the quality of construction and a temporary ban on contractors and workers leaving the country.

Qatar appeared to be underlining de facto segregation in a move that cast a further shadow over its sincerity about labour reform with Doha’s Central Municipal Council set to vote on barring single men from entering malls on at least one day a week. Most of Qatar’s migrant workers arrive leaving their families behind in their home countries. Under the proposal, they would be unable to visit malls on the one day a week that they are off.

Malls are alongside sports facilities Qatar’s main venue for public relaxation and entertainment. In another facet of de facto segregation, those facilities are off limits to migrant workers. Qatari institutions that have adopted improved standards like the supreme committee are building separate sports facilities for workers in cities that are exclusively built for them.

“This looks like discrimination by stealth. It will certainly have a detrimental effect,” warned Human Rights Watch Gulf researcher Nicholas McGeehan.

While Qatar’s national soccer team has recently performed well and invested heavily in grooming potential foreign players, Guardian reporter Robert Booth noted recently that the Gulf state has ignored a potentially significant talent pool in its own backyard: soccer-crazy migrant workers.

Qatar “should scout the migrant camps for football stars, make the best of these citizens and throw them into national sides. It would be a statement of intent,” Mr. Booth said.

The politics of its citizenry being a majority in its own country is what complicates labour reform that many Qatar’s fear would open a Pandora’s Box of foreigners demanding more rights that ultimately could threaten Qatari control of their culture, society, and state. Wasting goodwill and the calling into question of the sincerity of Qatar’s declared intentions threatens however to deprive the Gulf state of the time and space it needs to enact reforms its critics were willing to grant it.

US: CIA Torture Is Unfinished Business, Says HRW

$
0
0

Obama administration claims that legal obstacles prevent criminal investigations into torture by the Central Intelligence Agency (CIA) are unpersuasive, and risk leaving a legacy of torture as a policy option, Human Rights Watch said in a report released Tuesday. Sufficient evidence exists for the attorney general to order criminal investigations of senior United States officials and others involved in the post-September 11 CIA program for torture, conspiracy to torture, and other crimes under US law.

The 153-page report, “No More Excuses: A Roadmap to Justice for CIA Torture,” sets out evidence to support the main criminal charges that can be brought against those responsible for state-sanctioned torture, and challenges claims that prosecutions are not legally possible. The report also outlines US legal obligations to provide redress to victims of torture, and steps the US should take to do so. It also details actions that other countries should take to pursue criminal investigations into CIA torture.

“It’s been a year since the Senate torture report, and still the Obama administration has not opened new criminal investigations into CIA torture,” said Kenneth Roth, executive director of Human Rights Watch. “Without criminal investigations, which would remove torture as a policy option, Obama’s legacy will forever be poisoned.”

On December 9, 2014, the Senate Intelligence Committee issued a scathing summary of the still classified 6,700-page report documenting the CIA’s detention and interrogation program. The Senate summary, while confirming previous reporting, also revealed that CIA torture was more brutal, systematic, and widespread than had been previously reported. It provided new details of abuse, such as so-called rectal feeding of some detainees, and gave information on the brutal impact that painful stress positions and sleep deprivation had on detainees. The summary focused on whether “enhanced interrogation techniques” were an effective means of gathering useful intelligence – concluding they were not – but it did not evaluate the legality of the program.

The Justice Department says that it had already investigated CIA abuses in 2009 and concluded there was insufficient admissible evidence to bring charges. But that investigation, headed by John Durham, examined only CIA abuses that went beyond “authorized” actions, instead of all CIA torture and ill-treatment. Even then, investigators do not appear to have interviewed any former detainees, undercutting claims that their inquiry was thorough or credible.

One defense frequently heard is that the CIA and senior White House officials relied on legal opinions by the Justice Department’s Office of Legal Counsel purporting to find that “enhanced interrogation techniques” were lawful – the so-called Torture Memos. However, the Senate summary provides evidence that CIA officials knew from the outset that those practices would violate anti-torture laws. Other evidence shows that CIA and White House officials went shopping for guarantees against criminal prosecution and when that was refused, helped to craft those same legal opinions authorizing the torture that they would rely upon.

The Torture Memos were so strained in their legal reasoning that they cannot fairly be characterized as an honest interpretation of the law. These facts are the antithesis of the good-faith reliance on the advice of counsel that could serve as a legitimate defense to torture charges. Further, the Senate summary and other evidence show that the CIA abused detainees in ways that were not authorized and applied authorized techniques in ways that far exceeded authorizations.

Although much of the torture and other abuse took place a decade or more ago, statutes of limitation do not bar several criminal charges. The usual five-year federal statute of limitations is not a bar to the crimes of torture or conspiracy to torture when there was a “foreseeable risk that death or serious bodily injury” may result, as well as for certain sexual abuse charges. In addition, the statute of limitations for the crime of conspiracy may be extended if those responsible conceal a central component of the plot, which was the case with the CIA program, Human Rights Watch said.

Under the United Nations Convention against Torture, which the United States ratified in 1988, governments are required to credibly investigate allegations of torture and to prosecute where warranted. The failure to investigate and prosecute CIA torture increases the danger that some future president will authorize similar illegal interrogation methods in response to an inevitable serious security threat. Several presidential candidates for the 2016 elections have defended the use of “enhanced interrogation techniques” and some have said they would use them again if elected.

The Convention against Torture, which the US government was instrumental in shaping, also requires redress and compensation to torture victims. But the Bush and Obama administrations have actively thwarted every attempt by former detainees to obtain remedies in US courts, invoking claims of immunity and national security to get lawsuits dismissed before the plaintiffs could even introduce evidence of abuse.

The Justice Department should appoint a special prosecutor to conduct new investigations ensuring that all relevant witnesses, including claimed victims of torture, are interviewed and all available relevant physical evidence is collected, preserved, and examined, Human Rights Watch said.

“If the United States with its established democracy and stable political system can flout its legal obligation to prosecute torture, it undermines respect for the rule of law the world over,” Roth said. “Government officials who went shopping for and helped to craft legal opinions justifying the unjustifiable shouldn’t be able to rely on those opinions to shield themselves from liability.”


India-Afghanistan: Interesting Times Ahead – Analysis

$
0
0

By Rajeshwari Krishnamurthy*

India-Afghanistan relations took an interesting turn in November 2015. In the span of a month, New Delhi hosted at least two high-level visitors: Afghan National Security Advisor Hanif Atmar, and Afghan Deputy Foreign Minister Hekmat Karzai. Additionally, the Afghan Deputy Minister of Culture, Sayed Mossadeq Khalili, too visited New Delhi to address an academic conference.

Atmar’s visit followed an invitation from his Indian counterpart, Ajit Doval. Atmar met Doval and the Indian Minister of Defence Manohar Parrikar, and discussed security-related cooperation in detail. Close on the heels of this visit was that of Karzai’s, who met Indian External Affairs Minister Sushma Swaraj and Indian Foreign Secretary S Jaishankar, among others. This visit was centred primarily on the “operationalisation of the [India-Afghanistan] strategic partnership [agreement]” signed in 2011. What Kabul expects from the 2011 agreement was well-illustrated in Karzai’s 17 November Op Ed in The Hindu, titled ‘Traditional friends, modern allies’.

More importantly, details of Indian Prime Minister Narendra Modi’s first official visit to Afghanistan, scheduled to take place in the near future, were discussed. This visit might coincide with the inauguration of the Afghan parliament building that India is constructing.

India and Afghanistan: May 2014-November 2015

These visits and exchanges have altered the general perception of a limbo in Kabul-New Delhi relations. That perception had set in when the then newly-elected Afghan President Ashraf Ghani made peace overtures to Pakistan in an attempt to draw them into to the conflict resolution process. India took a ‘wait-and-watch’ approach vis-à-vis deepening engagement with Afghanistan, and Kabul’s preoccupation with Islamabad, Washington and Beijing made it appear as though India was relegated to the side-lines.

Following the debacle over former Afghan Taliban Chief Mullah Omar’s death, his subsequent succession by Mullah Mansour and the Kunduz siege, the dispensation in Kabul, which was attempting to reorganise its equation with Pakistan as priority, decided to move on.

Furthermore, the US appears to be increasingly desperate for any deal that can help them project successes achieved in Afghanistan, especially in the wake of the ongoing discussion on a nuclear deal for Pakistan. This was evident in the 4 November 2015 statement by Captain Jeff Davis, USN, Director, Defense Press Operations, at the US Department of Defense Briefing for Foreign Journalists, in which he said, “…What we’re not doing counterterrorism operations against is the Taliban. We don’t – we actually view the Taliban as being an important partner in a peaceful Afghan-led reconciliation process. We are not actively targeting the Taliban.”

Meanwhile, although the reconciliation process is not dead yet, the Afghan Taliban’s attacks on Afghans and Afghan territories still continue; and the Afghan National Security Forces are stretched extremely thin. Furthermore, the Afghan public’s perception of the coalition government is at an all-time low. Kabul is hard-pressed to deliver. Afghanistan will not settle for just any deal. Their priorities, especially on security matters, are clear. They are unlikely to accept any lopsided and/or incomprehensive bargain; and they definitely do not take the evolving undercurrents lightly.

Their reaching out to India, and India’s receptiveness follows this scheme of events. This is not any policy shift from the Indian side. India had not made any dramatic changes to its Afghanistan policy in the first place – all it did was take a more measured approach than before, without interference and with Afghanistan taking the lead in its own dealings. At the most, one could say India continued its engagement with Afghanistan while simultaneously accepting the altered procedure to do so, and it appears to be willing to accept the new alteration as well. This is not ill-advised, and New Delhi will continue maintaining positive relations with Kabul.

Nonetheless, India still does not fall in the inner core of Ghani’s ‘Five Circle Foreign Policy’. Conversely, the US, Pakistan and China, do.

Signalling and Symbolism

Symbolism is key here. There might be an opportunity for New Delhi to make a positive difference to the peace process. India could reach out to Yunus Qanuni, the newly-appointed chief of the Afghan High Peace Council, which is tasked with negotiating with the Afghan Taliban.

He has held various positions: he is a former Afghan vice president, the former speaker of the Wolesi Jirga (lower house), and the former minister of interior of the erstwhile interim government of Afghanistan, among others. Additionally, he is not viewed entirely as an adversary by the Afghan Taliban. In fact, he was one of the seven Afghan leaders proposed by the Afghan Taliban to conduct negotiations with. Most importantly, India holds a good place in Qanuni’s mind and experiences. New Delhi should build on this connection, engage with him, and identify ways in which we can contribute to the peace process.

While the Kabul-New Delhi bilateral has always remained warm, India has consistently chosen a measured stance for a variety of practical reasons. India has not involved itself in the Afghan peace process yet as it cannot offer much if things fall apart. Therefore, any further engagement on that front should be purely based on an assessment of the prospect of positive outcomes; how far India can go, practically, keeping its own compulsions in mind; and only at a request from Kabul.

Most of all, New Delhi, while working towards contributions that are positive for Afghanistan in whichever measure, should try and avoid getting entangled in the new-age Great Game afoot in the region. For that, India will have to express its stance on how it plans to engage. To that end, Modi’s Kabul visit will be a moment India can use to vocalise how it defines its role and place in that region.

* Rajeshwari Krishnamurthy
Research Officer, IReS, IPCS
Email: rajeshvvari@gmail.com

Paris Attacks Widen Gap Between Germany And Rest Of West – Analysis

$
0
0

Although the ISIL is a convenient common enemy, the Paris attacks have widened the “deep rift within the Western world” and worsened the clash among the “Western Civilizations” themselves over the “inclusion of ‘the other’” which were highlighted in Diana Pinto’s article at Project Syndicate [Note 1].

Such a divide can be noted in some commentaries on the leading American journals. The latest, though not yet the last, straw added to the camel’s back is James Poulos’ Nov 18 Foreign Policy essay “France is at war … with Germany” which calls for regaining control over Europe back from Germany. If it is deemed as some sort of echo to John Vinocur’s “Germany turns against the West on Russia” in the Wall Street Journal [Note 2], then there is no surprise that the “United States did not just tap chancellor Angela Merkel’s phone but also eavesdropped on several of her ministers” [Note 3].

Berlin remains firm on its positions. Responding to the harsh criticisms of Merkel’s refugee policy and also the French airstrikes of ISIL’s territories, Deutsche Welle voiced German disapproval without ambiguity:

  • “Merkel ally Michael Fuchs … urged France to reflect on why it happened to them” [Note 4]
  • “In France … there are debates about how Muslims should have to eat pork as well in school canteens.  We don’t have that in Germany, thank God. We can be proud of that.” [Note 5]
  • “Some of what he (Hollande) said was wrong; namely, that he wants to wage war on terror.   This is the same political trap former US President George W. Bush fell into …” [Note 6]
  • “Germany’s success contrasted with the relative inadequacies of Britain and especially France is about how it has managed to define a more open national identity for its citizens, improved the socio-economic status and mobility …” [Note 7]

This intra-Western cleave, however, is not irreconcilable. Germany nowadays shares with the Western peers the same values of democracy, liberty and the like, and is surely a core member of the West camp.    What has caused the collision is Berlin’s commitment to dismissing the West-vs-Rest theme.

After the highly controversial ‘crucifix-case’ 1995, Germany has been  struggling to fend off the ‘Self/Other’ notion of ‘identity politics’ — one of the conceptual foundations of Samuel P. Huntington’s ‘clash of civilizations’ [Note 8] — to evolve into a ‘tolerant republic’. This legal case, in short, is that by a 5-3 vote, the Federal Constitutional Court declares the Bavarian General School law “requiring a cross or crucifix in the classroom is unconstitutional” on the ground that the “right to religious liberty requires the state to exercise religious neutrality in the form of treating religions and beliefs equally, thus a state cannot force students to be taught ‘under the cross’ … Both minorities and majorities can equally claim a ‘positive’ liberty of religious expression, and there is no reason why the majority should prevail” [Note 9]. Having gone through the shocks, the public debate turned to deliberate what a republic is and how a ‘tolerant’ republic should cope with the challenge of cultural diversity.

The next decade saw “a ‘paradigm shift’ in German immigration and neutralization policy” which included a new law in 1999 awarding citizenship to children born to settled foreign residents, a ‘green card’ program in 2000, and a commission report in 2001 on better integration of immigrants into the community [Note 10]. No one is sure whether this discourse of German republicanism could keep on exerting influence on Berlin’s foreign and domestic policies amid the large influx of Muslim refugees, but obviously Chancellor Merkel is embracing it without hesitation.

It appears unfair to only complain about the immigrant countries like the USA, Canada and Australia (new world) and the affluent OECD states and their reluctant admission of Syrian (and African) refugees since ‘identity politics’ are also disseminating in the Third World — Kurds vs Arabs in the Middle East, Rohingya Muslims in Buddhist Myanmar, the Tutsi clan in Rwanda, just name a few. Nonetheless, most ethnic conflicts in these developing countries are stemmed from the arbitrary slice of ‘national’ boundaries in the post-colonial Asia and Africa, and then further aggravated by certain Self/Other- or West/Rest-based foreign policy measures adopted by the Western powers. The leaders of the West should take the German toleration concept for reference so as to reassess what they should and could do to reconcile with Berlin on one hand, and root out the implacable ethno-cultural violence in the failed states on the other.

If unchecked, intensifying ‘identity politics’ worldwide would not just widen the West-Germany crack but also ignite more confrontations between the West and the unstable “Rest”.

[Note 1]
Project Syndicate, “A Clash of Western Civilizations”, Oct 13, 2015.
https://www.project-syndicate.org/commentary/hungary-germany-border-walls-by-diana-pinto-2015-10

[Note 2]
Foreign Policy, “France is at War … with Germany, Nov 17, 2015.
http://news.yahoo.com/france-war-germany-024723659.htm

Wall Street Journal, “Germany turns against the West on Russia”, Apr 28, 2014.
http://www.wsj.com/articles/SB10001424052702303939404579529341282445718

[Note 3]
The Guardian, “WikiLeaks: US spied on Angela Merkel’s ministers too, say German newspaper”, July 2, 2015.
http://www.theguardian.com/media/2015/jul/02/wikileaks-us-spied-on-angela-merkels-ministers-too-says-german-newspaper

[Note 4]
DW, “German politican: ‘France needs to investigate why its own citizens become so radical’”, Nov 17, 2015.
http://www.dw.com/en/german-politician-france-needs-to-investigate-why-its-own-citizens-become-so-radical/a-18856488

[Note 5]
DW, “Islamic scholars in Germany fear consequences from Paris”, Nov 16, 2015.
http://www.dw.com/en/islamic-scholars-in-germany-fear-consequences-from-paris/a-18852208

[Note 6]
DE, “Opinion: War is no remedy for terrorism”, Nov 17, 2015.
http://www.dw.com/en/opinion-war-is-no-remedy-for-terrorism/a-18854501

[Note 7]
DW, “Culture of violence trumps a culture of hope”, Nov 18, 2015.
http://www.dw.com/en/culture-of-violence-trumps-a-culture-of-hope/a-18857198

[Note 8]
See p.8-12 in Mark B. Salter (2002), “Barbarians and Civilization in International Relations”, London and Sterling, Virginia: Pluto Press.

[Note 9]
Rainer Forst, “A Tolerant Republic?” See p.214-5 in Jan-Werner Müller (ed.) (2003), “German Ideologies since 1945”, NY: Palgrave.

[Note 10]
William A. Barbieri, Jr, “The Many Faces of the Republic: Or, What’s in a Name?” See p.231 in Jan-Werner Müller (ed.) (2003), “German Ideologies since 1945”, NY: Palgrave.

This article was also published at FPIF.

Zimbabwe: Xi Jinping In Harare, First Visit Of Chinese Leader In 20 Years

$
0
0

Chinese President Xi Jinping landed Tuesday morning in Harare and was greeted with a 21-gun salute by his Zimbabwean counterpart Robert Mugabe.

This marks the first visit of a Chinese leader to the country since 1996.

The visit shows Beijing’s interest in “cementing relations between the two countries”, as specified by Xi, who applauded Zimbabwe’s role as acting chair of the African Union in favoring and reinforcing the development of the continent”.

China last year invested $238 million in Zimbabwe, becoming its first economic partner.

The Asian giant last year imported from the country $840 million mainly in tobacco and cotton, while Beijing exported to Zimbabwe $400 billion in merchandise.

The Chinese President will head to South Africa tomorrow to attend the China-Africa Cooperation summit in Johannesburg.

Paris Climate Change Summit: Why It Is Bound To Fail – Analysis

$
0
0

Expectations are high for a good and fair new climate change agreement at the much anticipated on-going climate change summit in Paris. Such expectations are elusive if the negotiations fail to face reality and set aside divisive national interests for the global good, humanity and the planet.

By Raman Letchumanan*

After 21 years of negotiations, hopes are high that a new climate change agreement at the 21st Conference of Parties (COP21) to the United Nations Framework Convention on Climate Change (UFCCC) in Paris will break new ground on saving the planet from the grave threat of climate change. However, the obstacles to reaching a deal is not on the issues perse, but how the UNFCCC negotiation process itself has not addressed or postponed critical decisions thus far, which Paris has to now resolve. Under the pretext of a new comprehensive global deal, the Paris talks are expected to address the failings of past negotiations and resolve it at one go.

The Paris talks should certainly avoid the habit of making key decisions at the eleventh hour, in many cases beyond the scheduled Friday close, up to the late hours of Sunday. At that late hour, decisions are focused on “compromise language”, by a small group of key negotiators, which then continues to haunt subsequent negotiations as to its actual meaning, intent and applicability.

Curse of eleventh hour deals

In Kyoto in 1997, where the Kyoto Protocol was adopted, the eleventh hour break-through came with the agreement on the Clean Development Mechanism (CDM) where developed countries insisted that they should be allowed to make cheaper investments in developing countries to meet their national emission reduction targets. However, CDM turned out to be the primary means of reducing developed country commitments. The US refused to ratify the Protocol.

These led to the failure of the Kyoto Protocol with almost all countries not meeting their targets, and consequently a collapse of the market carbon price. Least Developed Countries expecting a windfall through the Adaptation Fund resourced from the CDM were left high and dry. Paris now has to address the future fate of the Kyoto Protocol.

In Bali in 2007, again at the eleventh hour deadlock, Papua New Guinea had to tell the US to “get out of the way” if it was not willing to lead. The compromise language came in the form of “Nationally Appropriate Mitigation Actions (NAMAs)” where developing countries agreed to cut emissions, subject to receiving adequate financial support, in particular. The Bali talks were expected to lead to a comprehensive deal in Copenhagen two years later.

In Copenhagen in 2009, however, developing countries insisted on “show us the money first” as promised for their NAMAs. A last-minute attempt promising US$30 billion immediate short-term finance, among others, failed to reach consensus on the Copenhagen Accord.

That elusive global deal continued through to Durban (South Africa) in 2011. A compromise deal at the eleventh hour resulted in a decision to launch “a process to develop a protocol, another legal instrument or an agreed outcome with legal force under the Convention applicable to all Parties”. Negotiators since then, as sculptors furiously chipping away without first agreeing on its final form, have produced a 54-page text with full of brackets and options, to be settled at Paris. The legal nature of the final draft may yet make or break the negotiations at the eleventh hour in Paris.

Tweaking lifestyles vs losing livelihoods

Yes, all issues inherited from the past are on the table in Paris, and none, including previously agreed principles, is sacrosanct. The battle lines are clearly demarcated: developed vs developing, rich vs poor, mandatory vs voluntary mitigation actions, givers vs takers in the context of finance, technology and capacity building etc. But this was not what the 1992 UNFCCC envisaged based on the universally accepted principles and value systems such as equity, sustainable development, precautionary measures (approach), historical responsibility, common but differentiated responsibility, polluters-pay-principle, and the right to development, livelihood and clean environment.

In fact from the humanistic point of view, it is simply a matter of tweaking lifestyles vs losing livelihoods. In Southeast Asia for example, the choice for the latter group is to restrain from using fires to cultivate their land, or worse risking life, limb and property to weather-induced disasters.

In fact national boundaries do not distinguish between rich and poor, or where disasters will strike. Developed and Developing Countries should realise that their socio-economic development will change over time, and their obligations and commitments will also change over time as they negotiate the future climate agenda over the next 100 years.

Unfortunately, looking at the current draft negotiating text (as of 10 November), even the principle and value-based approach is being questioned. All the principles mentioned above are bracketed, and even references to the UNFCC is in brackets – that means subject to negotiation. It would be a sheer nightmare if the Paris talks unravel what has been agreed, and is still applicable, at the historic Earth Summit in Rio in 1992.

A principles- and value-based approach

Rather than focussing on numbers and operational details, Paris should take on a principles- and value-based approach building upon the provisions of the UNFCCC. It is good that, through the Intended Nationally Determined Contributions (INDCs), countries have expressed what each can do, in terms of mitigation, adaptation, finance, technology etc.

However the UNFCCC Secretariat, in analysing the 147 INDC submissions as of 1 October 2015, has found that global emissions are expected to be higher by 37-57% by 2030 compared to 1990 levels, a far cry from the reduction of 25-40% called for by the world’s scientists. Nevertheless, there is a discernible reduction in the rate of growth of future emissions.

More tellingly, all countries have reported well-developed plans and strategies to reduce emissions through their national effort, and that they could do more if the environment is facilitative and conductive. This is the key lesson for the Paris talks: to facilitate countries, the private sector, the society and communities to do their part for climate change; without being overly intrusive and prescriptive, but to set a global level-playing field and empower the transformation towards a low-carbon society. In fact, most of the gains in climate action so far should be attributed to private sector enterprise, technological innovations, and the environmentally-conscious society.

In a break from tradition, world leaders gathered in Paris on 30 November 2015 on the first day of the two-week Conference. All of them have espoused the principles and value-based approach in combating climate change, and committed to urgent ambitious actions in addressing the threats of climate change. Their officials should take the cue as they navigate the negotiating text, and not quibble on language and who does what. Otherwise, Paris will set itself up for the classic eleventh hour deal, where decisions become meaningless and contentious.

If COP21 in Paris fails to deliver and lead, then it is time for the UNFCCC “to get out of the way”.

*Raman Letchumanan is a Senior Fellow with the S. Rajaratnam School of International Studies (RSIS), Nanyang Technological University, Singapore. The views expressed here are strictly his own. Dr Raman attended almost all the Climate Change Summits as a country delegate and as a representative of a regional inter-governmental organisation.

Putin’s Revenge? The Fight For The Border – OpEd

$
0
0

“We have received additional information confirming that the oil controlled by Islamic State militants (ISIS) enters Turkish territory on an industrial scale. We have every reason to believe that the decision to down our plane was guided by a desire to ensure the security of this oil’s delivery routes to ports where they are shipped in tankers.” – Russian President Vladimir Putin, Paris, 11-30-15

On Monday, the remains of Lieutenant Colonel Oleg Peshkov were flown to Moscow where he was met by the Russian Minister of Defense, the Head of the Russian Airforce, family members and a full military drill team. Peshkov will be buried with honors and receive the Russian Federation’s highest award, the Medal of Valor, for his service in fighting US-backed terrorist groups in Syria. Peshkov’s Su-24 was ambushed last Tuesday by a Turkish F-16 when he allegedly drifted into Turkish airspace for 17 seconds.

The surprise attack, which was not preceded by any warning, forced the pilot to eject after which he was he was shot and killed while descending in his parachute. The anti-regime militant who claims to have killed Peshkov, is a Turkish ultra-nationalist named, Alparslan Celik, who is a leader in The Grey Wolves, a terrorist organization that has “carried out scores of political murders since 1970s.” Celik’s group of “moderate” jihadis is one of many disparate militias that are supported by both the US and Turkey in their effort to topple Syrian President Bashar al Assad and splinter the country into smaller parts.

The downing of the Su-24 has not triggered the knee-jerk reaction from Moscow that many had expected. Instead, it has focused Putin’s attention on his ultimate goal of defeating terrorism in Syria and maintaining the sovereign integrity of the state. Putin has boosted Russia’s military presence to 69 Sukhoi fighter jets, 160 bombers, as well as submarines and warships located in the Mediterranean Sea. He has also deployed the S-400 anti-aircraft defense system to Latakia and ordered the Moskva guided missile cruiser to remain within firing distance off the coast of Syria. The downing of the Russian warplane has only intensified Putin’s determination to seal the northern border, defeat the terrorists and win the war in Syria. This is clearly not the reaction Washington was hoping for.

In candid remarks to the Russian media, Putin implicated the US in the downing of the Su-24 stating that the US military was briefed on the warplane’s flight path and then immediately passed along that information to Turkey. Here’s what he said:

“We told our US partners in advance where, when at what altitudes our pilots were going to operate. The US-led coalition, which includes Turkey, was aware of the time and place where our planes would operate. And this is exactly where and when we were attacked. Why did we share this information with the Americans? Either they don’t control their allies, or they just pass this information left and right without realizing what the consequences of such actions might be. We will have to have a serious talk with our US partners.”

Putin’s damning remarks have not appeared in any of the western media. The censorship of this information is similar to the blackout of comments Putin made just two weeks earlier at the G-20 summit where he announced that “40 countries” are financing ISIS including members of the G-20. Here’s an except of Putin’s bombshell announcement:

“I provided examples based on our data on the financing of different Islamic State units by private individuals. This money, as we have established, comes from 40 countries and, there are some of the G20 members among them,” Putin told the journalists.

“I’ve shown our colleagues photos taken from space and from aircraft which clearly demonstrate the scale of the illegal trade in oil and petroleum products. The motorcade of refueling vehicles stretched for dozens of kilometers, so that from a height of 4,000 to 5,000 meters they stretch beyond the horizon,” Putin added, comparing the convoy to gas and oil pipeline systems.” (Putin: ISIS financed from 40 countries, including G20 members, RT)

Don’t look for this story in the New York Times, the Wall Street Journal or the Washington Post. You won’t find it. It’s not in the interest of the major media to publish information that suggests that Washington and its allies are providing material support for terrorist organizations.

It’s clear that Russia’s bombardment of jihadi groups operating near the Turkish-Syrian border has Turkish President Recep Tayyip Erdogan worried. Erdogan has long hoped that the area would be turned into a Safe Zone where Sunni militants– committed to removing Assad from power– could receive weapons and other support from their sponsors while coming and going as they pleased. The Russian-led coalition’s attempt to retake the area and seal the border to stop the flow of terrorists from Turkey, is probably what precipitated the attack on the Russian warplane. It was a desperate attempt to wave-off the Russian offensive and reverse the course of the war which has turned decisively in Assad’s favor. As for the militant groups that are operating in this area, analyst Pepe Escobar sums it up like this in a recent post at Sputnik News:

“The Su-24s were actually after Chechens and Uzbeks — plus a few Uyghurs — smuggled in with fake Turkish passports (Chinese intel is also on it), all of these operating in tandem with a nasty bunch of Turkish Islamo-fascists. Most of these goons transit back and forth between the CIA-weaponized Free Syrian Army (FSA) and Jabhat al-Nusra. These were the goons who machine-gunned the Russian pilots as they parachuted down after the hit on the Su-24….

Turkey, for all practical purposes, has been a handy, sprawling Salafi-jihadi Infrastructure and Logistics Center; it offers everything from porous borders enabling countless jihadi return tickets from Syria to Europe, facilitated by corrupt police, to a convenient crossroads for all kinds of smuggling and a hefty money laundering ops.” (Sultan Erdogan’s War on…Russia, Pepe Escobar, Sputnik)

Escobar sums up Ankara’s role in Syria as succinctly as anyone. Erdogan has been ISIS best friend, of that, there is little doubt. The problem that Turkey faces now is that the Russian-led coalition is rapidly destroying the infrastructure that provides funding for ISIS, (oil refineries, fields and transport) while gradually retaking territory that was formally-controlled by the many anti-regime or al Qaida-linked groups in the north, west and central parts of the country. In the last few days alone, Russia and Co. have concluded the encirclement of Syria’s biggest city, Aleppo, vaporized a convoy of over 500 oil trucks in the vicinity of Raqqa, and intensified their bombing in the Turkmen Mountains, the Kurdish Mountains, and the Prophet Jonah Mountains. The coalition has moved as far north as Azaz along the Turkish border and recaptured the strategic Aleppo-Raqqa highway which completely cuts off ISIS supply-route from the east in Raqqa. All of the recent progress comes in the wake of the retaking of the strategic Kuweris Airbase which was the tipping point in the 4 and a half year-long conflict. Now the Russian coalition has focused on closing the border, a move that will sever vital supply-lines to pro-Turkish militias operating in Syria and force the terrorists to either flee or surrender. Russian Foreign Minister Sergei Lavrov emphasized this point last week saying, “We are convinced that by blocking the border we will in many respects solve the tasks to eradicate terrorism on Syrian soil.”

Keep in mind, that Erdogan is not the only one with designs on the so-called “Afrin-Jarabulus corridor” east of the Euphrates. Powerful politicians in the US, including John McCain, Lindsay Graham, Jeb Bush, Hillary Clinton and others, have all alluded to this area as the most suitable location for a no-fly zone. And, despite the fact that Obama refuses to send US ground forces to fight in Syria, he has continued to fuel the conflict in other less conspicuous ways. Just last Wednesday, under the cover of the Thanksgiving holiday when the media was preoccupied with other matters, Obama signed the National Defense Authorization Act of 2016 which provides another $800 million in aid to armed extremists in Syria and Ukraine. The NDAA, which effectively prevents the closing down of US concentration camp at Guantanamo Bay (Gitmo), reflects Obama’s determination to continue Washington’s vicious policy in Syria which has resulted in the deaths of more than 250,000 and the displacement of 11 million more.

This helps to explain why the Russian offensive has set alarms off in Washington; it’s because the US plan to establish a permanent staging ground for terrorists in N Syria is quickly going up in smoke.

Bangkok-based geopolitical researcher and writer, Toni Cartalucci explains exactly what’s at stake for the warring parties in a brilliant piece at Global Research titled “‘Humanitarian Supplies” for the Islamic State (ISIS): NATO’s Terror Convoys Halted at Syrian Border”. Here’s an excerpt:

“Russia’s increased activity along the Syrian-Turkish border signifies the closing phases of the Syrian conflict. With Syrian and Kurdish forces holding the border east of the Euphrates, the Afrin-Jarabulus corridor is the only remaining conduit for supplies bound for terrorists in Syria to pass…..When this corridor is closed and supplies cut off, ISIS, Nusra, and all associated NATO-backed factions will atrophy and die as the Syrian military restores order across the country…

With that support being cut off and the prospect of these militants being eradicated, the true sponsors behind this conflict are moving more directly and overtly to salvage their failed conspiracy against the Syrian state. What we see emerging is what was suspected and even obvious all along – a proxy war started by, and fought for Western hegemonic ambitions in the region, intentionally feeding the forces of extremism, not fighting them.” (Humanitarian Supplies for the Islamic State (ISIS): NATO’s Terror Convoys Halted at Syrian Border, Global Research)

Seen in this light, Obama’s recent request for Turkey to deploy “30,000 (troops) to seal the border on the Turkish side”, (See: Wall Street Journal) should be viewed with extreme skepticism. Clearly, Washington has not relented in its “Assad must go” policy at all, in fact, Obama reiterated that mantra less than a week ago. That means the Obama crew may be hoping that Turkish ground forces can succeed where his jihadi proxies failed, that is, that the 30,000 troops will be used to clear and hold a 60×20-mile stretch of Syrian territory that can be used as the proposed safe zone. All Turkey would need is a pretext to invade and a little bit of air cover from the USAF. It wouldn’t be the first time a false flag was used to start a war.

The bottom line is this: Putin had better move quickly before Washington and Ankara get their ducks in a row and begin to mobilize. The time to seize the border is now.

Viewing all 73702 articles
Browse latest View live




Latest Images