zenpundit.com » recommended reading

Archive for the ‘recommended reading’ Category

Book review: Fountainhead of Jihad

Saturday, June 22nd, 2013

[ Charles Cameron — opening of my review of Vahid Brown & Don Rassler, Fountainhead of Jihad: The Haqqani Nexus, 1973-2012 for Pragati magazine ]
.

Deep insight into the Haqqani Network

Haqqani Network is at the centre of a nexus of jehadi violence in a triangle of relations with the Pakistani Taliban, the Pakistani military and al-Qa’ida.

.

.

by Charles Cameron
.

Charlie Wilson, the gaudy US congressman from Texas whose support for arming the mujahideen during the Soviet occupation of Afghanistan gave the name Charlie’s War to George Crile’s book (and the Tom Hanks feature adaptation of the same name), drank, lusted, flirted, bribed and persuaded with cheerful abandon — and once referred to Jalaluddin Haqqani as “goodness personified.”

That same Jalaluddin Haqqani, Vahid Brown and Don Rassler argue in their book, Fountainhead of Jihad: the Haqqani Nexus, 1973-2012, was pushing the line of obligatory global jihad even before Abdullah Azzam, and was the first to recruit Arab “foreign fighters” to the jihad back in the 1980s. The network that paragon of goodness established is still, some forty years later, continuing in a tradition that began before the Durand Line was scrawled across a map, already in place when the British attempted to ‘take’ Afghanistan in the First Afghan War of 1839 — and that has arguably prevailed repeatedly in that mountainous, mutinous region against all comers since Iskandar tried his own fortune at what would later be called the Great Game.

Read the rest at Pragati

**

The book, from the admirable Hurst Publishers in London and Columbia University Press in the US is available on Amazon and elsewhere.

Pragati is the magazine of India’s Takshashila Institution.

Recommended Reading & Viewing – Cyber Edition

Friday, June 21st, 2013

Top Billing! John Robb  DATA Dystopia. The NSA Scandal and Beyond. , Iran, Cyberwar, and the Perils of Lazy Thinking , and Canada Makes the Automation of Tyranny Easier 

John went from near blog dormancy to en fuego in a week.

….It’s safe to say that at the end of the day, there’s not much you can do without big brother detecting it.

So, should you be worried?  Of course.  There’s all sorts of nightmare scenarios that can emerge from this collection effort can enable the automation of tyranny (and that’s a very bad thing).

What do I find interesting about this situation?  

First off, it’s amazing how few people care about freedom and privacy.  In short, people have become so dependent on the bureaucracy, they will accept nearly any insult.

Secondly, this activity is clear proof that the government security system increase views all Americans as potential enemies.  It’s also a good indicator that people inside the system don’t have the backbone/character to stop this type of gross infringement from occurring (NOTE:  I don’t know what Snowden’s motivation was, so I’m not holding him up as a example).  We saw something similar with torture a couple of years ago.

Thirdly, this scandal is a good milestone on the decline of the national security system.  Simply, when the costs of it (snooping) far outweigh any potential benefit (protection), it needs to go.  Further, since the nation-state derives most of its legitimacy from its ability to deliver security to citizens, this failure is more proof that the nation-state is in decline as a form of governance.

Finally, unless something drastic occurs, this type of data will NEVER be deleted.  It’s there forever.  It will be used against you decades from now.  How it could be used against you is a matter of speculation today, but due to software automation, it could be used to do very bad things against a great many people in a very systematic way. 

Pundita – 2006: NSA Killed System That Sifted Phone Data Legally (ThinThread) , Classifed documents reveal “top secret rules that allow NSA to use US data without a warrant.” New Guardian report. , Ed Snowden is a transgender CIA operative from outer space: America’s Tin Foil Hat Tribe gets to the bottom of the NSA Affair 

 The National Security Agency developed a pilot program in the late 1990s that would have enabled it to gather and analyze massive amounts of communications data without running afoul of privacy laws. But after the Sept. 11 attacks, it shelved the project — not because it failed to work — but because of bureaucratic infighting and a sudden White House expansion of the agency’s surveillance powers, according to several intelligence officials.

The agency opted instead to adopt only one component of the program, which produced a far less capable and rigorous program. It remains the backbone of the NSA’s warrantless surveillance efforts, tracking domestic and overseas communications from a vast databank of information, and monitoring selected calls. 
Four intelligence officials knowledgeable about the program agreed to discuss it with The Sun only if granted anonymity because of the sensitivity of the subject. 

The program the NSA rejected, called ThinThread, was developed to handle greater volumes of information, partly in expectation of threats surrounding the millennium celebrations. Sources say it bundled together four cutting-edge surveillance tools. ThinThread would have: 

* Used more sophisticated methods of sorting through massive phone and e-mail data to identify suspect communications.

* Identified U.S. phone numbers and other communications data and encrypted them to ensure caller privacy. 

* Employed an automated auditing system to monitor how analysts handled the information, in order to prevent misuse and improve efficiency. 

* Analyzed the data to identify relationships between callers and chronicle their contacts. Only when evidence of a potential threat had been developed would analysts be able to request decryption of the records. 

An agency spokesman declined to discuss NSA operations

Small Wars Journal – Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion 

Adm. James Stavridis- The New Triad 

WIREDIntroducing Aaron’s Law, a Desperately Needed Reform of the Computer Fraud and Abuse Act   

Bruce Schneier –Has U.S. started an Internet war?

Foreign PolicyTOTAL RECALL 

New York TimesWeb’s Reach Binds N.S.A. and Silicon Valley Leaders

Ribbonfarm –War and Nonhuman Agency

Recommended Viewing:
Daniel Suarez: The kill decision shouldn’t belong to a robot

The dervish and the gas mask

Monday, June 10th, 2013

[ by Charles Cameron — wall art, sufism and poetry in Istanbul ]
.


.

I wasn’t altogether sure, when Zeynep Tufekci tweeted a stenciled image of a whirling dervish (above, right) the other day, that the dervish was in fact wearing a gas mask. Just the fact that the dervish was showing up on a wall during the events in Turkey was interesting to me — and all the more so since Zeynep pointed out that the accompanying slogan Sen de GelCome, Come Whoever you are is from Jalaluddin Rumi, the great Sufi poet and founder of the Mevlevi order of whirling dervishes.

As the photo of a dervish whirling in the park (above, left) shows, however — and I only saw it today — the stencil is indeed the iconization — in protest art — of a dervish in gas mask in real-time Istanbul.

There’s insight to be had there.

**

The version of Rumi’s poetry that I first ran across lo these many years ago, and to which I return:

AJ Arberry, tr, Mystical Poems of Rumi 1
AJ Arberry, tr, Mystical Poems of Rumi 2

Rumi’s prose:

AJ Arberry, tr, Discourses of Rumi

Rumi’s poetry in the versions that have made this thirteenth century Afghan-born, Persian-speaking resident of Turkey “the best-selling poet in America”:

Coleman Barks, Rumi: The Big Red Book

Rumi’s life, as told within Sufi tradition:

Idries Shah, The Hundred Tales of Wisdom

Rumi’s life, teachings and poetry, in contemporary context:

Franklin D. Lewis, Rumi: Past and Present, East and West

Rumi explored with scholarship and depth:

Anne-Marie Schimmel, The Triumphant Sun
Anne-Marie Schimmel, Rumi’s World
William C Chittick, The Sufi Path of Love
Fatemeh Keshavarz, Reading Mystical Lyric

**

Come, Come Whoever you are

Recommended Reading

Monday, June 10th, 2013

Top Billing! The Guardian Glenn Greenwald – NSA collecting phone records of millions of Verizon customers daily , The National Security Agency: surveillance giant with eyes on AmericaNSA Prism program taps in to user data of Apple, Google and othersBoundless Informant: the NSA’s secret tool to track global surveillance dataEdward Snowden: the whistleblower behind the NSA surveillance revelations 

Have to say, I never in a million years expected to ever give Glenn Greenwald a “top billing”. I have often, for example, disagreed very strongly on how he has characterized (or, in my view, mischaracterized) the application of the laws of war about US actions toward al Qaida and the Taliban and I still do. It must be said however, that Greenwald has at least always been scrupulously consistent in his criticism when most other pundits were not; and secondly, with the NSA, Greenwald has broken one of the most important stories of the year.

Credit where credit is due.

Haft of the Spear  –140+ Ed Snowden Edition 1.0 

….His Insight. See comment about “context” above. Snowden is not a trained case officer or interceptor, or analyst. In being able to understand how what he had access to fit into the big scheme of things, he’s a lot more bottom-of-the-pyramid Manning than top of the pyramid Ellsberg.

T. Greer  – America 3.0 

It is unusual for me to read a book aimed at popular conservative audiences.  I am something of a disaffected conservative. Crony capitalism and government overreach have proved to be bipartisan endeavors, and I have long lost faith that the Republican party can ever be more than an organ of America’s governing elite. [1] Outside of the beltway the broader currents of mainstream conservatism are so full of angry sound and righteous fury (and nothing else) that I have long stopped paying close attention them. The movement is in desperate need of a clearer vision and more compelling purpose. 

 America 3.0 is the book to provide it. 

 James Bennet and Michael Lotus get everything right that all of the other popular commentators get wrong. In contrast to pundits incessantly focused on the character flaws of the opposition and controversies of the hour, these authors focus on the broad political principles and broad political context – “centuries into the past and decades into the future” (xxv).  Where most popular political creeds are shallow, filled more with hype and platitudes than meaningful evidence, America 3.0 is both respectful in tone and deeply researched (and none the less readable for it!). Few popular political works have any real historical grounding;  America 3.0 possesses this in spades. Even more impressively, the authors manage to convey both their sense of history and their firm belief in American exceptionalism without any of the reflexive chest-pounding sometimes mistaken as patriotism in conservative corners. (As they write in the introduction, “We are attempting to avoid setinmentalility in this book, and look at the record in a cold light. As we write things are not good in America. Being realistic is a matter of urgency (xxiv).”) Most impressive of all is the political platform they lay out. In age where conservatives are too often defined by what they are againstAmerica 3.0 paints a compelling picture of what they should be for.

All in all, a breath of fresh air. 

Nuclear Diner (Rofer) –What Makes a Whistleblower? 

….Daniel Ellsberg exemplefies the last kind of whistleblower. He shared the government’s documents on the Vietnam war that showed that the government’s public claims were lies. Combine that with the investigative journalism of Bob Woodward and Carl Bernstein on Watergate, and you have today’s high journalistic myth, that the press will out government wrongdoing with the help of whistleblowers. We now know that the person who took the chances to out Watergate was Mark Felt, whose identity was long hidden.

Both Ellsberg and Felt wanted to get the truth out. Ellsberg’s motives were honorable, to inform the public. Felt may have been motivated more by office politics. There are an enormous number of motives that someone may have for leaking information. What all the motives have in common is that hardly ever will the leaker be completely honest about his motives; he may not even be conscious of all his motives.

Edward Luttwak – Nukes: Why is Iran different?

 

Regime security for an ideological state

Abu Muqawama (Elkus) How Not to Argue about Women in Combat 

A brutal Fisking

SWJ – Political Violence Prevention: Profiling Domestic Terrorists  

It comes out a lot like you would expect

Dart Throwing Chimp –How Social Science Is Like Microbiology 

The Ecological paradigm

Duck of Minerva (Nexon) –New Podcast: Interview with Patrick James 

Middle-Earth in IR theory…..

Not the Singularity (Morris) Security expert Bruce Schneier on NSA and why we need whistleblowers

Austin Bay – Protests Change Turkey’s Political Landscape: A Report From Istanbul 

Victor Davis Hanson -Why Some Wars Are So Savage 

That’s it.

I am not Kafka. But..

Tuesday, June 4th, 2013

[by Charles Cameron — a very preliminary salute to James Bennett and Michael Lotus’ new book, with blues harp to match ]
.


.

Okay, I’m a snapper-up of unconsidered trifles, a jackdaw, not the most consistent of readers — but I did stumble upon something…

I’ll admit, I cannot even see how “the actual time and materials cost of the hammer might be $60 a hammer” when its “functional equivalent might cost $20 in a hardware store” — but let’s overlook that 200% markup for a moment, and chew on the rest of this dazzling paragraph from James C. Bennett and Michael J. Lotus, America 3.0: Rebooting American Prosperity in the 21st Century — Why America’s Greatest Days Are Yet to Come, pp. 266-67:

The Department of Defense requires that the labor time and materials used in building defense items on a “time and materials” basis, which is the great majority of all such items, be documented in excruciating detail. The costs of doing this are themselves allowed as expenses, so that the government ultimately pays for the costs of this proof. Therefore, when lurid accounts of $600 hammers procured by the Pentagon surface in the press, what is actually happening is a hammer whose functional equivalent might cost $20 in a hardware store is purchased in the Pentagon system, the actual time and materials cost of the hammer might be $60, with an additional $540 in documentation costs to ensure that the government is not being over¬charged for the item.

I admit, I am not Kafka.

But if that isn’t a snake biting its own tail arrangement, I don’t know what is.

**

What can I say?

**

Interesting, btw — I’ll bet there’s a story behind the decision to switch book covers from the one proposed earlier (at the top of the post, left) to the one the book now carries (right)!


Switch to our mobile site