zenpundit.com » 2013 » June

Archive for June, 2013

Book review: Fountainhead of Jihad

Saturday, June 22nd, 2013

[ Charles Cameron — opening of my review of Vahid Brown & Don Rassler, Fountainhead of Jihad: The Haqqani Nexus, 1973-2012 for Pragati magazine ]
.

Deep insight into the Haqqani Network

Haqqani Network is at the centre of a nexus of jehadi violence in a triangle of relations with the Pakistani Taliban, the Pakistani military and al-Qa’ida.

.

.

by Charles Cameron
.

Charlie Wilson, the gaudy US congressman from Texas whose support for arming the mujahideen during the Soviet occupation of Afghanistan gave the name Charlie’s War to George Crile’s book (and the Tom Hanks feature adaptation of the same name), drank, lusted, flirted, bribed and persuaded with cheerful abandon — and once referred to Jalaluddin Haqqani as “goodness personified.”

That same Jalaluddin Haqqani, Vahid Brown and Don Rassler argue in their book, Fountainhead of Jihad: the Haqqani Nexus, 1973-2012, was pushing the line of obligatory global jihad even before Abdullah Azzam, and was the first to recruit Arab “foreign fighters” to the jihad back in the 1980s. The network that paragon of goodness established is still, some forty years later, continuing in a tradition that began before the Durand Line was scrawled across a map, already in place when the British attempted to ‘take’ Afghanistan in the First Afghan War of 1839 — and that has arguably prevailed repeatedly in that mountainous, mutinous region against all comers since Iskandar tried his own fortune at what would later be called the Great Game.

Read the rest at Pragati

**

The book, from the admirable Hurst Publishers in London and Columbia University Press in the US is available on Amazon and elsewhere.

Pragati is the magazine of India’s Takshashila Institution.

Recommended Reading & Viewing – Cyber Edition

Friday, June 21st, 2013

Top Billing! John Robb  DATA Dystopia. The NSA Scandal and Beyond. , Iran, Cyberwar, and the Perils of Lazy Thinking , and Canada Makes the Automation of Tyranny Easier 

John went from near blog dormancy to en fuego in a week.

….It’s safe to say that at the end of the day, there’s not much you can do without big brother detecting it.

So, should you be worried?  Of course.  There’s all sorts of nightmare scenarios that can emerge from this collection effort can enable the automation of tyranny (and that’s a very bad thing).

What do I find interesting about this situation?  

First off, it’s amazing how few people care about freedom and privacy.  In short, people have become so dependent on the bureaucracy, they will accept nearly any insult.

Secondly, this activity is clear proof that the government security system increase views all Americans as potential enemies.  It’s also a good indicator that people inside the system don’t have the backbone/character to stop this type of gross infringement from occurring (NOTE:  I don’t know what Snowden’s motivation was, so I’m not holding him up as a example).  We saw something similar with torture a couple of years ago.

Thirdly, this scandal is a good milestone on the decline of the national security system.  Simply, when the costs of it (snooping) far outweigh any potential benefit (protection), it needs to go.  Further, since the nation-state derives most of its legitimacy from its ability to deliver security to citizens, this failure is more proof that the nation-state is in decline as a form of governance.

Finally, unless something drastic occurs, this type of data will NEVER be deleted.  It’s there forever.  It will be used against you decades from now.  How it could be used against you is a matter of speculation today, but due to software automation, it could be used to do very bad things against a great many people in a very systematic way. 

Pundita – 2006: NSA Killed System That Sifted Phone Data Legally (ThinThread) , Classifed documents reveal “top secret rules that allow NSA to use US data without a warrant.” New Guardian report. , Ed Snowden is a transgender CIA operative from outer space: America’s Tin Foil Hat Tribe gets to the bottom of the NSA Affair 

 The National Security Agency developed a pilot program in the late 1990s that would have enabled it to gather and analyze massive amounts of communications data without running afoul of privacy laws. But after the Sept. 11 attacks, it shelved the project — not because it failed to work — but because of bureaucratic infighting and a sudden White House expansion of the agency’s surveillance powers, according to several intelligence officials.

The agency opted instead to adopt only one component of the program, which produced a far less capable and rigorous program. It remains the backbone of the NSA’s warrantless surveillance efforts, tracking domestic and overseas communications from a vast databank of information, and monitoring selected calls. 
Four intelligence officials knowledgeable about the program agreed to discuss it with The Sun only if granted anonymity because of the sensitivity of the subject. 

The program the NSA rejected, called ThinThread, was developed to handle greater volumes of information, partly in expectation of threats surrounding the millennium celebrations. Sources say it bundled together four cutting-edge surveillance tools. ThinThread would have: 

* Used more sophisticated methods of sorting through massive phone and e-mail data to identify suspect communications.

* Identified U.S. phone numbers and other communications data and encrypted them to ensure caller privacy. 

* Employed an automated auditing system to monitor how analysts handled the information, in order to prevent misuse and improve efficiency. 

* Analyzed the data to identify relationships between callers and chronicle their contacts. Only when evidence of a potential threat had been developed would analysts be able to request decryption of the records. 

An agency spokesman declined to discuss NSA operations

Small Wars Journal – Bandwidth Cascades: Escalation and Pathogen Models for Cyber Conflict Diffusion 

Adm. James Stavridis- The New Triad 

WIREDIntroducing Aaron’s Law, a Desperately Needed Reform of the Computer Fraud and Abuse Act   

Bruce Schneier –Has U.S. started an Internet war?

Foreign PolicyTOTAL RECALL 

New York TimesWeb’s Reach Binds N.S.A. and Silicon Valley Leaders

Ribbonfarm –War and Nonhuman Agency

Recommended Viewing:
Daniel Suarez: The kill decision shouldn’t belong to a robot

Yet More Biographies…..

Monday, June 17th, 2013

     

Alexander The Great by Robin Lane Fox  

Colonel Roosevelt by Edmund Morris 

Shadow Warrior: William Egan Colby and the CIA  by Randall Woods 

The first, was one of the works cited by Paul Cartledge in his own biography of Alexander the Great. Fox is an eminent historian at Oxford, now emeritus and his biography was a an important work in the field.

The next two were gifts from my own students. Now that I have Colonel Roosevelt, I will have to read the prize-winning trilogy as I have copies of the first two volumes (somewhere). The impression Morris made with his Reagan biography, Dutch, was very strange, but this will probably redeem him.

Not very familiar with Woods, but William Colby was a fascinating, controversial and contradictory DCI whose intelligence career spanned the OSS and much of the Cold War, dying in retirement under mysterious circumstances.

Added to the pile…..

Turkey and the unicorn

Monday, June 17th, 2013

[ by Charles Cameron — i don’t do much in the way of cat pics, so here’s a timely geopolitical unicorn for you ]
.

What with the Whole Wired World looking a bit both “1984” and “Brave New” this week, and with Turkey clearly itching to up its rep as an authoritarian state, you might not think this would be the week a Turkish customs official would stamp a unicorn’s passport…

What can I tell you? Someone did. A Turkish customs official allowed this young British girl, Emily Harris, into Turkey by stamping her unicorn’s passport.

**

If I was Recep Tayyip Erdogan — and I’m not, and unlikely yo be any time soon — I might want to give that man a medal for providing the one news item this week favorable to the Turkish tourist trade — at a time when images of tear gassings in hotels and water cannonades in parks can hardly be helping the country’s image as an attractive place to visit.

Seriously — Public Diplomacy, one child’s passport at a time.

And while you’re at it, quit gassing hotels with children in them, will you? It’s barbaric.

Night vision, x-rays – what do we have for the fog of war?

Monday, June 17th, 2013

[ by Charles Cameron — it occurred to me to ask ]
.

I have a question for the assembled horde — but first, the shoes:


Getting your feet x-rayed and fitted for a new pair of shoes, ca. 1950

**

You know the way they say (Elizabeth Kübler-Ross, eg, with no implied claim of veracity here, just interest) that you go through various stages of grief: denial, anger, bargaining, depression and acceptance?

Suppose there are stages of response to terror that governments, agencies, leaders, pundits, analysts & journos tend to go though. Suppose at the start they lean to the vengeful and are therefore prone to see things in black and white, no nuance, confrontational, response intense & military rather than diplomatic — and in later stages get calmer, begin to see motives less single-strandedly, catch details previously missed, suggest responses that are more measured, more proportional, etc.

If we got really clear on how this tends to work, could we begin to have an understanding of the ratio between “heat of the moment” and “after the fog of war clears” thinking, which in turn could allow us to discount initial reactions, look for “next stage” signals in the cognitive periphery, and get a more accurate read through the fog from the start?

We know now, eg, that the first reaction at OKC was to expect Muslim blame, but it become clear that McVeigh did it — and first expectations were dashed. With WMD in Iraq the clearing of the fog took longer, but it still happened.

I’m suggesting that people who have just been affronted or attacked will understand better, later, and that for more appropriate response, some time lag may be required. But does the lag time have formal features, styles of assumption that gradually give way identifiably and reliably to more nuance and accuracy as certain formal issues are addressed — so there could be a checklist, and a kind of 2 week, two month, two year, two decade look ahead / lookback methodology devised, charted, and implemented, eg as a part of scenario planning and / or red teaming?

Is some of this implicit in the second O in the OODA loop? Can we take it usefully further?

**

Yes, when I was a boy, you stepped up to the x-ray machine in the shoe store, pushed your feet in and peered into the viewer at the top of the machine to see how well your new shoes fit your ghost-of-a-skeleton feet.

Later on, this was viewed as an unhealthy way to judge the fit of a shoe, and life and choice in shoe stores became more complicated.


Switch to our mobile site