Skip to main content

Home/ Geopolitics Weekly/ Group items tagged Pentagon

Rss Feed Group items tagged

Argos Media

Contracting Boom Could Fizzle Out - washingtonpost.com - 0 views

  • The recent surge in the Washington area's defense-contracting workforce would begin to ebb under Defense Secretary Robert M. Gates's latest budget proposal as the Pentagon moves to replace legions of private workers with full-time civil servants.
  • The budget would reverse a contracting boom, beginning after the 2001 terrorist attacks, in which the proportion of private contractors grew to 39 percent of the Pentagon's workforce. Gates said he wants to reduce that percentage to a pre-Sept. 11 level of 26 percent.
  • Roughly 7.5 percent of metropolitan Washington's labor force -- about 291,000 jobs -- is tied to Pentagon contracting. Defense analysts and government contracting experts said Gates's move could affect companies such as CACI and SAIC, which do large amounts of government contracting work, offering technical services, administrative support, database outsourcing and contract management.
  • ...11 more annotations...
  • Local giants Lockheed Martin and General Dynamics also run substantial government-support operations and would see some weapons projects cut, while other programs would receive budget increases.
  • In particular, the proposed budget would sharply reduce the number of contractors who help the Pentagon oversee and manage its vast weapons-buying apparatus following a string of reports chronicling cost overruns and other problems.
  • A CACI executive said the company is waiting for further details before commenting. The Arlington company has 12,300 employees, half of whom are in the D.C. region. Ninety-five percent of its $2.4 billion in revenue last year came from federal contracts for technical services and information technology and contracting oversight for the Army and Navy, as well as such Pentagon offices as the Defense Advanced Research Projects Agency and the Missile Defense Agency.
  • Overall, the budget Gates proposed calls for major cuts to the weapons programs of some of the largest contractors.
  • One of the hardest-hit defense firms was Boeing. The Chicago company's $150 billion Future Combat Systems, a family of Army vehicles linked by high-tech communications, came under criticism from Gates for being costly and plagued by development problems. He proposed canceling the $87 billion vehicle part of the system -- a move that would hurt Boeing, SAIC and their subcontractors, BAE and General Dynamics.
  • Gates also proposed canceling some of Boeing's missile defense programs, including one to equip a modified 747 aircraft with a laser that can shoot down missiles soon after they're launched, saying the program "has significant affordability and technology problems and the program's proposed operational role is highly questionable."
  • Boeing would also be hurt because it makes one-third of the F-22 fighter jet and the Pentagon plans to stop ordering additional aircraft. Gates would also cancel the Air Force's program to build a new search-and-rescue helicopter, which had been awarded to Boeing. And it would not order more of Boeing's C-17 cargo planes. Boeing could also see a military satellite program, known as TSAT, end.
  • Lockheed Martin, of Bethesda, the biggest defense contractor in the world, also took hits on several of its major programs.
  • Gates said he would kill the company's bid to build the presidential helicopter, known as the VH-71, citing the fact that the program is six years late and has gone from initial estimates of $6 billion to $13 billion.
  • Lockheed was also hit by the move to not order more F-22 fighter jets. Perhaps hoping for support in Congress, the company has taken out newspaper ads explaining how its F-22 supports roughly 25,000 jobs around the country.
  • But the Pentagon proposed ordering more of Lockheed's F-35 known as the Joint Strike Fighter, and it would increase from two to three the number of littoral combat ships being built by Lockheed and General Dynamics to patrol near enemy coastlines.
Argos Media

A Pentagon Cyber-Command Is in the Works - washingtonpost.com - 0 views

  • The Obama administration is finalizing plans for a new Pentagon command to coordinate the security of military computer networks and to develop new offensive cyber-weapons, sources said last night.
  • Planning for the reorganization of Defense Department and intelligence agencies is underway, and a decision is imminent, according to a person familiar with the White House plans.
  • The new command would affect U.S. Strategic Command, whose mission includes ensuring U.S. "freedom of action" in space and cyberspace, and the National Security Agency, which shares Pentagon cybersecurity responsibilities with the Defense Information Systems Agency.
  • ...3 more annotations...
  • The Pentagon plans do not involve the Department of Homeland Security, which has responsibility for securing the government's non-military computer domain.
  • The Wall Street Journal first reported on the plans last night.
  • News of the proposal comes on the heels of a 60-day White House review of cybersecurity efforts.
Pedro Gonçalves

High-Priced F-22 Fighter Has Major Shortcomings - washingtonpost.com - 0 views

  • The United States' top fighter jet, the Lockheed Martin F-22, has recently required more than 30 hours of maintenance for every hour in the skies, pushing its hourly cost of flying to more than $44,000, a far higher figure than for the warplane it replaces, confidential Pentagon test results show
  • The aircraft's radar-absorbing metallic skin is the principal cause of its maintenance troubles, with unexpected shortcomings -- such as vulnerability to rain and other abrasion -- challenging Air Force and contractor technicians since the mid-1990s, according to Pentagon officials, internal documents and a former engineer.
  • While most aircraft fleets become easier and less costly to repair as they mature, key maintenance trends for the F-22 have been negative in recent years, and on average from October last year to this May, just 55 percent of the deployed F-22 fleet has been available to fulfill missions guarding U.S. airspace, the Defense Department acknowledged this week. The F-22 has never been flown over Iraq or Afghanistan.
  • ...2 more annotations...
  • Sensitive information about troubles with the nation's foremost air-defense fighter is emerging in the midst of a fight between the Obama administration and the Democrat-controlled Congress over whether the program should be halted next year at 187 planes, far short of what the Air Force and the F-22's contractors around the country had anticipated.
  • "It is a disgrace that you can fly a plane [an average of] only 1.7 hours before it gets a critical failure" that jeopardizes success of the aircraft's mission, said a Defense Department critic of the plane who is not authorized to speak on the record. Other skeptics inside the Pentagon note that the planes, designed 30 years ago to combat a Cold War adversary, have cost an average of $350 million apiece and say they are not a priority in the age of small wars and terrorist threats.
Argos Media

New Military Command to Focus on Cybersecurity - WSJ.com - 0 views

  • The Obama administration plans to create a new military command to coordinate the defense of Pentagon computer networks and improve U.S. offensive capabilities in cyberwarfare, according to current and former officials familiar with the plans.
  • The initiative will reshape the military's efforts to protect its networks from attacks by hackers, especially those from countries such as China and Russia. The new command will be unveiled within the next few weeks, Pentagon officials said.
  • The move comes amid growing evidence that sophisticated cyberspies are attacking the U.S. electric grid and key defense programs. A page-one story in The Wall Street Journal on Tuesday reported that hackers breached the Pentagon's biggest weapons program, the $300 billion Joint Strike Fighter, and stole data.
  • ...8 more annotations...
  • A White House team reviewing cybersecurity policy has completed its recommendations, including the creation of a top White House cyberpolicy official
  • Defense Secretary Robert Gates plans to announce the creation of a new military "cyber command" after the rollout of the White House review, according to military officials familiar with the plan.
  • NSA's increasingly muscular role in domestic cybersecurity has raised alarms among some officials and on Capitol Hill. Rod Beckstrom, former chief of the National Cyber Security Center, which is charged with coordinating cybersecurity activities across the U.S. government, resigned last month after warning that the growing reliance on the NSA was a "bad strategy" that posed "threats to our democratic processes."
  • Pentagon officials said the front-runner to lead the new command is National Security Agency Director Keith Alexander, a three-star Army general.
  • Former President George W. Bush's top intelligence adviser, Mike McConnell, first proposed the creation of a unified cyber command last fall. The military's cybersecurity efforts are currently divided between entities like the NSA and the Defense Information Systems Agency, which is responsible for ensuring secure and reliable communications for the military. The Air Force also runs a significant cybersecurity effort.
  • Cyber defense is the Department of Homeland Security's responsibility, so the command would be charged with assisting that department's defense efforts. The relationship would be similar to the way Northern Command supports Homeland Security with rescue capabilities in natural disasters. The NSA, where much of the government's cybersecurity expertise is housed, established a similar relationship with Homeland Security through a cybersecurity initiative that the Bush administration began in its final year.
  • The cyber command is likely to be led by a military official of four-star rank, according to officials familiar with the proposal. It would, at least initially, be part of the Pentagon's Strategic Command, which is currently responsible for computer-network security and other missions.
  • In a rare public appearance Tuesday at a cybersecurity conference in San Francisco, Gen. Alexander called for a "team" approach to cybersecurity that would give the NSA lead responsibility for protecting military and intelligence networks while the Department of Homeland Security worked to protect other government networks.
Argos Media

Computer Spies Breach Fighter-Jet Project - WSJ.com - 0 views

  • Computer spies have broken into the Pentagon's $300 billion Joint Strike Fighter project -- the Defense Department's costliest weapons program ever -- according to current and former government officials familiar with the attacks.
  • Similar incidents have also breached the Air Force's air-traffic-control system in recent months, these people say. In the case of the fighter-jet program, the intruders were able to copy and siphon off several terabytes of data related to design and electronics systems, officials say, potentially making it easier to defend against the craft.
  • The latest intrusions provide new evidence that a battle is heating up between the U.S. and potential adversaries over the data networks that tie the world together. The revelations follow a recent Wall Street Journal report that computers used to control the U.S. electrical-distribution system, as well as other infrastructure, have also been infiltrated by spies abroad.
  • ...18 more annotations...
  • Attacks like these -- or U.S. awareness of them -- appear to have escalated in the past six months, said one former official briefed on the matter.
  • while the spies were able to download sizable amounts of data related to the jet-fighter, they weren't able to access the most sensitive material, which is stored on computers not connected to the Internet.
  • Former U.S. officials say the attacks appear to have originated in China. However it can be extremely difficult to determine the true origin because it is easy to mask identities online.
  • A Pentagon report issued last month said that the Chinese military has made "steady progress" in developing online-warfare techniques. China hopes its computer skills can help it compensate for an underdeveloped military, the report said.
  • The Chinese Embassy said in a statement that China "opposes and forbids all forms of cyber crimes." It called the Pentagon's report "a product of the Cold War mentality" and said the allegations of cyber espionage are "intentionally fabricated to fan up China threat sensations."
  • The U.S. has no single government or military office responsible for cyber security. The Obama administration is likely to soon propose creating a senior White House computer-security post to coordinate policy and a new military command that would take the lead in protecting key computer networks from intrusions, according to senior officials.
  • The Bush administration planned to spend about $17 billion over several years on a new online-security initiative and the Obama administration has indicated it could expand on that.
  • The Joint Strike Fighter, also known as the F-35 Lightning II, is the costliest and most technically challenging weapons program the Pentagon has ever attempted. The plane, led by Lockheed Martin Corp.
  • Six current and former officials familiar with the matter confirmed that the fighter program had been repeatedly broken into. The Air Force has launched an investigation.
  • Foreign allies are helping develop the aircraft, which opens up other avenues of attack for spies online. At least one breach appears to have occurred in Turkey and another country that is a U.S. ally, according to people familiar with the matter.
  • Joint Strike Fighter test aircraft are already flying, and money to build the jet is included in the Pentagon's budget for this year and next.
  • Computer systems involved with the program appear to have been infiltrated at least as far back as 2007, according to people familiar with the matter. Evidence of penetrations continued to be discovered at least into 2008. The intruders appear to have been interested in data about the design of the plane, its performance statistics and its electronic systems, former officials said.
  • The intruders compromised the system responsible for diagnosing a plane's maintenance problems during flight, according to officials familiar with the matter. However, the plane's most vital systems -- such as flight controls and sensors -- are physically isolated from the publicly accessible Internet, they said.
  • The intruders entered through vulnerabilities in the networks of two or three contractors helping to build the high-tech fighter jet, according to people who have been briefed on the matter. Lockheed Martin is the lead contractor on the program, and Northrop Grumman Corp. and BAE Systems PLC also play major roles in its development.
  • The spies inserted technology that encrypts the data as it's being stolen; as a result, investigators can't tell exactly what data has been taken. A former Pentagon official said the military carried out a thorough cleanup.
  • Investigators traced the penetrations back with a "high level of certainty" to known Chinese Internet protocol, or IP, addresses and digital fingerprints that had been used for attacks in the past, said a person briefed on the matter.
  • As for the intrusion into the Air Force's air-traffic control systems, three current and former officials familiar with the incident said it occurred in recent months. It alarmed U.S. national security officials, particularly at the National Security Agency, because the access the spies gained could have allowed them to interfere with the system, said one former official. The danger is that intruders might find weaknesses that could be exploited to confuse or damage U.S. military craft.
  • In his speech in Austin, Mr. Brenner, the U.S. counterintelligence chief, issued a veiled warning about threats to air traffic in the context of Chinese infiltration of U.S. networks. He spoke of his concerns about the vulnerability of U.S. air traffic control systems to cyber infiltration, adding "our networks are being mapped." He went on to warn of a potential situation where "a fighter pilot can't trust his radar."
Argos Media

BBC NEWS | Asia-Pacific | China fury at US military report - 0 views

  • Beijing has reacted angrily to a Pentagon report on China's military power, which claimed it was altering the military balance in Asia. A foreign ministry spokesman called it a "gross distortion of the facts", urged an end to "Cold War thinking". In its annual report to Congress, the Pentagon said China was developing "disruptive" technologies for nuclear, space and cyber warfare. It could be used to enforce claims over disputed territories, the report said.
  • The Pentagon reported that China was successfully managing to expand its arsenal of sophisticated weaponry, even though Beijing's ability to sustain military power at a distance remains limited. Chinese "armed forces continue to develop and field disruptive military technologies", including "nuclear, space, and cyber warfare".
  • The Pentagon analysis said China was developing weapons that would disable its enemies' space technology such as satellites, boosting its electromagnetic warfare and cyber-warfare capabilities and continuing to modernise its nuclear arsenal. It also noted a build-up of short-range missiles opposite Taiwan, despite a significant reduction in tension between the two in recent months.
  • ...2 more annotations...
  • The report estimated China's military spending in 2008 was roughly double that of a decade ago.
  • China's armed forces are undoubtedly undergoing a dramatic transformation from a poorly-equipped peasant army to an increasingly sophisticated modern military, the BBC's defence and security correspondent Rob Watson says. But its level of training and co-ordination as well as actual war fighting capability is still in doubt, he adds.
Argos Media

Obama takes US closer to total ban on cluster bombs | World news | The Guardian - 0 views

  • The United States has stepped closer to a total ban on the use and export of cluster bombs with the signing by Barack Obama of a new permanent law that would make it almost impossible for the US to sell the controversial weapons. The decision was hailed by opponents of the weapons as a "major turnaround in US policy" that overrode Pentagon calls to permit their continued export.
  • Under the new rules, the air and artillery-deployed weapons, which scatter hundreds of bomblets, are required to have a self-destruct failure rate of less than 1%, which few of the US cluster bombs meet, before being cleared for sale. Despite a temporary ban having been in place, the Pentagon made it clear last year that it was keen to see the export of the weapons again.
  • The new law comes into force amid growing pressure from Congress for a complete ban on their use, even by the US military. International opposition to cluster bombs, which maim and kill civilians long after they have been fired during conflicts, has been hardening rapidly since the Israeli Defence Forces fired more than 1m into southern Lebanon during the 2006 war with Hezbollah. Last year, a treaty limiting their use was signed by 95 countries, including most of America's Nato allies - but not the US.
  • ...1 more annotation...
  • In July 2008, Robert Gates, the defence secretary, issued a three-page directive spelling out US policy on cluster munitions which described the ordnance as "legitimate weapons with clear military utility". Under that policy, the US will continue to use cluster munitions and, after 2018, will use only munitions with a tested failure rate of less than 1%.
Pedro Gonçalves

U.S. Is Still Using Private Spy Ring, Despite Doubts - NYTimes.com - 0 views

  • Top military officials have continued to rely on a secret network of private spies who have produced hundreds of reports from deep inside Afghanistan and Pakistan, according to American officials and businessmen, despite concerns among some in the military about the legality of the operation.
  • Earlier this year, government officials admitted that the military had sent a group of former Central Intelligence Agency officers and retired Special Operations troops into the region to collect information — some of which was used to track and kill people suspected of being militants. Many portrayed it as a rogue operation that had been hastily shut down once an investigation began.
  • But interviews with more than a dozen current and former government officials and businessmen, and an examination of government documents, tell a different a story. Not only are the networks still operating, their detailed reports on subjects like the workings of the Taliban leadership in Pakistan and the movements of enemy fighters in southern Afghanistan are also submitted almost daily to top commanders and have become an important source of intelligence.
  • ...4 more annotations...
  • The American military is largely prohibited from operating inside Pakistan. And under Pentagon rules, the army is not allowed to hire contractors for spying.
  • Military officials said that when Gen. David H. Petraeus, the top commander in the region, signed off on the operation in January 2009, there were prohibitions against intelligence gathering, including hiring agents to provide information about enemy positions in Pakistan. The contractors were supposed to provide only broad information about the political and tribal dynamics in the region, and information that could be used for “force protection,” they said.
  • Some Pentagon officials said that over time the operation appeared to morph into traditional spying activities. And they pointed out that the supervisor who set up the contractor network, Michael D. Furlong, was now under investigation.
  • But a review of the program by The New York Times found that Mr. Furlong’s operatives were still providing information using the same intelligence gathering methods as before. The contractors were still being paid under a $22 million contract, the review shows, managed by Lockheed Martin and supervised by the Pentagon office in charge of special operations policy.
Argos Media

Commander's Ouster Is Tied to Shift in Afghan War - NYTimes.com - 0 views

  • The top American commander in Afghanistan, Gen. David D. McKiernan, was forced out Monday in an abrupt shake-up intended to bring a more aggressive and innovative approach to a worsening seven-year war.
  • Defense Secretary Robert M. Gates announced the decision in terse comments at the Pentagon, saying that “fresh eyes were needed” and that “a new approach was probably in our best interest.” When asked if the dismissal ended the general’s military career, Mr. Gates replied, “Probably.”
  • Defense Department officials said General McKiernan, a respected career armor officer, had been removed primarily because he had brought too conventional an approach to the challenge.
  • ...4 more annotations...
  • He is to be replaced by Lt. Gen. Stanley A. McChrystal, a former commander of the Joint Special Operations Command. He served in Afghanistan as chief of staff of military operations in 2001 and 2002 and recently ran all commando operations in Iraq.
  • Forces under General McChrystal’s command were credited with finding and capturing Saddam Hussein and with tracking and killing Abu Musab al-Zarqawi, the leader of Al Qaeda in Mesopotamia. His success in using intelligence and firepower to track and kill insurgents, and his training in unconventional warfare that emphasizes the need to protect the population, made him the best choice for the command in Afghanistan, Defense Department officials said.
  • At the same time, he will be confronted with deep tensions over the conduct of Special Operations forces in Afghanistan, whose aggressive tactics are seen by Afghan officials as responsible for many of the American mistakes that have resulted in the deaths of civilians.
  • Pentagon officials have begun to describe Afghanistan as the military’s top priority, even more important than the war in Iraq. President Obama announced a major overhaul of American strategy in Afghanistan in March. Planned troop levels are expected to reach more than 60,000 Americans.
Pedro Gonçalves

Pentagon Prefers Blimps to $35M Spy Planes - Technology News Briefs | Newser - 0 views

  • Financially grounded by the recession, the Pentagon and governments around the world are launching blimps to spy on their enemies, the Economist reports. Such balloons cost far less than Predator and Global Hawk drones—which can sell for $35 million each—and stay airborne for more than a week, while drones last about 30 hours. Blimps are also hard to shoot down, even when they are hit.
  • Blimps also suit Secretary of Defense Robert Gates, who said he wants "75% solutions" enacted in weeks or months, not "exquisite systems” that take years.
Pedro Gonçalves

BBC NEWS | Americas | US launches cyber security plan - 0 views

  • US President Barack Obama has announced plans for securing American computer networks against cyber attacks.He said that from now on, America's digital infrastructure would be treated as a strategic national asset. He announced the creation of a cyber security office in the White House, and said he would personally appoint a "cyber tsar".
  • Acts of terror today, he said, could come "not only from a few extremists in suicide vests, but from a few key strokes of a computer - a weapon of mass disruption."
  • In 2007 alone the Pentagon reported nearly 44,000 incidents of what it called malicious cyber activity carried out by foreign militaries, intelligence agencies and individual hackers.
  • ...2 more annotations...
  • In the past, no one US department was responsible for cyber-security, resulting in poor communication and co-ordination, he said. The new cyber-security office will be a multi-billion dollar effort designed to restrict access to government computers and to protect systems - such as those that run the stock exchange and air traffic control - that keep the country going.
  • The Obama administration is also expected to create a new cyber command at the Pentagon with the dual task of eradicating potential vulnerabilities in America's sensitive computer networks, while simultaneously creating ways to exploit them in the systems of potential enemies. An influential study published last year suggested that having an offensive computer warfare capability would have a deterrent effect against would-be attackers.
Argos Media

U.S. to create cybersecurity military command: report | Technology | Internet | Reuters - 0 views

  • The Obama administration plans to create a new military command to focus on Pentagon computer networks and offensive capabilities in cyberwarfare, The Wall Street Journal reported on Tuesday, citing current and former officials familiar with the plans.
  • Pentagon officials were quoted as saying the new command will be unveiled within the next few weeks. The cyber command will likely to be led by a military official of four-star rank and initially would be part of the Pentagon's Strategic Command, the newspaper said, citing officials familiar with the proposal.
  • The initiative will reshape the military's efforts to protect its networks from attacks by hackers, especially those from countries such as China and Russia, the newspaper said.
  • ...2 more annotations...
  • The newspaper earlier reported that computer spies have repeatedly breached the Pentagon's costliest weapons program -- the $300 billion Joint Strike Fighter project.
  • The Journal quoted former U.S. officials as saying the attacks seemed to have originated in China, although it noted it was difficult to determine the origin because of the ease of hiding identities online.
Pedro Gonçalves

BBC News - Obama unveils new strategy for 'leaner' US military - 0 views

  • The future will see fewer counter-insurgency battles in distant lands. It will focus much more on the capacity of America's air and naval forces to balance a competitor like China or face down an antagonist like Iran. And it will scale back America's much-heralded ability to fight two wars at once.
  • The president said the new strategy would end "long-term, nation-building with large military footprints". The Pentagon would instead pursue a national security strategy based on "smaller conventional ground forces".
  • Mr Panetta said on Thursday the review would make the US military "more agile, more flexible, ready to deploy quickly".
  • ...1 more annotation...
  • The Pentagon has long debated its doctrine on being able to wage two wars simultaneously. In 2001, former Defence Secretary Donald Rumsfeld told Congress that strategy was not working. And when the US was in fact fighting two wars in Iraq and Afghanistan the military suffered a shortage of manpower.
Pedro Gonçalves

New U.S. defence strategy puts more focus on Asia | Reuters - 0 views

  • President Barack Obama unveiled a defense strategy on Thursday that calls for greater U.S. military presence in Asia and envisions cutting troops in Europe as the Pentagon seeks to reduce spending by nearly half a trillion dollars after a decade of war
  • Obama, in a Pentagon news conference alongside Defense Secretary Leon Panetta, released a strategy document that calls for the United States to maintain a force that can win one war while still having the capability to deter the objectives of an adversary in a second conflict.That is a shift away from the military's often repeated goal of being able to fight and prevail in two wars in different theatres simultaneously.
Argos Media

Stand-off with US ship shows Chinese navy's secret tactics | World news | The Guardian - 0 views

  • the American vessel USNS Impeccable was attempting to defend itself against what the Pentagon claimed was co-ordinated harassment and aggression from five Chinese ships. Being unarmed, the Impeccable turned its fire water hoses against two of the Chinese vessels that had come within 50 feet in a threatening posture.Then, the Pentagon records in the admirably restrained language of international diplomacy, "the Chinese crew members disrobed to their underwear and continued closing to within 25 feet."
Argos Media

US government to drop espionage charges against Aipac officials | World news | guardian... - 0 views

  • The US government is to drop espionage charges against two officials of America's most powerful pro-Israel lobby group accused of spying for the Jewish state because court rulings had made the case unwinnable and the trial would disclose classified information.
  • The two accused, Steven Rosen and Keith Weissman, worked for the American Israel Public Affairs Committee (Aipac), which drives fundraising for some US members of Congress. They were accused of providing defence secrets to the chief political officer at the Israeli embassy in Washington, Naor Gilon, about US policy toward Iran and al-Qaida in league with a former Pentagon analyst who has since been jailed for 12 years.
  • Dana Boente, who was prosecuting the case in Virginia, said that the case was dropped because pre-trial court rulings had complicated the government's case by requiring a higher level of proof of intent to spy. The court said the prosecution would have to prove not only that the accused pair had passed classified information but that they intended to harm the US in doing so.
  • ...3 more annotations...
  • A former Pentagon analyst, Lawrence Franklin, has already pleaded guilty to disclosing classified information to Rosen and Weissman.
  • The case has been further complicated by a scandal revealed last month by a political publication, Congressional Quarterly, around a member of Congress, Jane Harman, who was secretly taped telling an Israeli agent that she would pressure the justice department to reduce spying charges against the two former Aipac officials.In return, the Israeli agent offered to get a wealthy donor who helps funds election campaigns for Nancy Pelosi, the then-minority leader in the House of Representatives, to pressure Pelosi to appoint Harman to a senior position on the congressional intelligence committee.Aware of the sensitivity of the position she has put herself in, Harman finished the discussion with the Israeli spy by saying: "This conversation doesn't exist."
  • Congressional Quarterly obtained a transcript of the tape recorded by the National Security Agency. An FBI probe of Harman was dropped after the intervention of President Bush's attorney general, Alberto Gonzales.
Pedro Gonçalves

Cyber Blitz Hits U.S., Korea - WSJ.com - 0 views

  • U.S. and South Korean computer networks were besieged for days by a series of relatively unsophisticated attacks, possibly from North Korea, that were among the broadest and longest-lasting assaults perpetrated on government and commercial Web sites in both countries.
  • South Korean officials are investigating whether the attacks originated in North Korea, and a senior U.S. official said the U.S. also is probing North Korea's possible role. U.S. officials noted that the attacks, which appear to have started primarily in South Korea on July 4, coincided with North Korea's latest missile launches and followed a United Nations decision to impose new sanctions.
  • The senior U.S. official said the attacks seemed to have come from South Korea, but it was possible Pyongyang was using sympathizers there. "We're trying to assess whether this is some random attack or the North Koreans might be working through a proxy," said the official.
  • ...12 more annotations...
  • If a North Korea link is found, it would mark a new turn in Pyongyang's attempts to lash out at the U.S. North Korea has been building up its capability for cyberattacks in the past couple of years, computer security specialists said. North Korea recently increased the number of people in a cyber-warfare unit, South Korea's Yonhap news agency reported last month.
  • U.S. government Web sites attacked included those of the Defense Department, National Security Agency, Treasury Department, Secret Service, State Department, Federal Trade Commission and Federal Aviation Administration, according to the cyber-security unit of VeriSign Inc., a computer-security company, and others familiar with the attacks. The attacks appear to have occurred roughly from Saturday to Tuesday.
  • Private sites attacked, according to a cyber-security specialist who has been tracking the incidents, included those run by the New York Stock Exchange, Nasdaq, the Washington Post, Amazon.com and MarketWatch.
  • Most U.S. federal Web sites appeared to be running properly Wednesday. In South Korea, several government sites were down late Tuesday and early Wednesday but many were back to normal by Wednesday afternoon. "There is a connection between what is going on here in the states and what is going on in [South] Korea," said Richard Howard, director of intelligence at VeriSign's iDefense cyber-security unit.
  • Those responsible used a method similar to attacks in recent years on the governments of Estonia and Georgia, called a "distributed denial of service" attack. It is a maneuver in which many computers act in concert to overwhelm Web sites.
  • At the White House, spokesman Nicholas Shapiro said the attacks over the weekend "had absolutely no effect on the White House's day-to-day operations." The only effect, he said, was that some Internet users in Asia may not have been able to access the White House's Web site for a time.
  • President Barack Obama has made bolstering cyber-security a priority. He said in May he would create a new White House cyber-security post, though it hasn't yet been staffed. People familiar with the process say the White House has had difficulty finding someone to take the job.
  • Defense officials confirmed Pentagon networks were struck but said the intrusions were detected quickly and did no real damage. Adm. Mike Mullen, the nation's top military officer, said Pentagon networks are under near-constant attack. "I grow increasingly concerned about the cyber-world and the attacks," he said.
  • James Lewis, a cyber-security specialist at the Center for Strategic and International Studies, said of the attack, "It's really a test of which U.S. agencies are ready and which aren't."
  • The New York Stock Exchange's parent company, NYSE Euronext, announced at 12:35 p.m. Wednesday that its Web site, but not its trading systems, had been targeted. Exchange officials weren't aware of the attack until notified by the government on Tuesday, said a person familiar with the events. An NYSE spokesman said the exchange's systems detected zero impact either on the Web site or on the separate trading operations. An official of Nasdaq said there wasn't any impact on its business.
  • North Korea turned more antagonistic after the illness of dictator Kim Jong Il last August and September. The country had done little to prepare for a successor, and Mr. Kim's illness triggered an internal shuffle that apparently raised the influence of hard-line military figures.
  • The cyberattacks came as Washington's point man on North Korea sanctions, Ambassador Philip Goldberg, concluded a weeklong trip to China and Malaysia aimed at tightening the financial screws on Pyongyang. Last week, the Obama administration announced sanctions on two North Korea-linked arms companies. The U.S. Treasury last month listed 17 North Korean banks and businesses that it is seeking to constrict financially.
Argos Media

What would an "even-handed" U.S. Middle East policy look like? | Stephen M. Walt - 0 views

  • the United States supports the creation of a viable Palestinian state in virtually all of the West Bank and Gaza. The new Israeli government led by Benjamin Netanyahu opposes this goal, and Foreign Minister Avigdor Lieberman has already said that he does not think Israel is bound by its recent commitments on this issue.  
  • To advance its own interests, therefore, the United States will have to pursue a more even-handed policy than it has in the past, and put strong pressure on both sides to come to an agreement. Instead of the current "special relationship" -- where the U.S. gives Israel generous and nearly-unconditional support -- the United States and Israel would have a more normal relationship, akin to U.S. relations with other democracies (where public criticism and overt pressure sometimes occurs).  While still committed to Israel’s security, the United States would use the leverage at its disposal to make a two-state solution a reality.
  • This idea appears to be gaining ground. Several weeks ago, a bipartisan panel of distinguished foreign policy experts headed by Henry Siegman and Brent Scowcroft issued a thoughtful report calling for the Obama administration to “engage in prompt, sustained, and determined efforts to resolve the Arab-Israeli conflict.” Success, they noted, "will require a careful blend of persuasion, inducement, reward, and pressure..."
  • ...21 more annotations...
  • Last week, the Economist called for the United States to reduce its aid to Israel if the Netanyahu government continues to reject a two-state solution.  The Boston Globe offered a similar view earlier this week, advising Obama to tell Netanyahu "to take the steps necessary for peace or risk compromising Israel's special relationship with America." A few days ago, Ha’aretz reported that the Obama Administration was preparing Congressional leaders for a possible confrontation with the Netanyahu government.
  • We already know what it means for the United States to put pressure on the Palestinians, because Washington has done that repeatedly -- and sometimes effectively -- over the past several decades.  During the 1970s, for example, the United States supported King Hussein’s violent crackdown on the PLO cadres who were threatening his rule in Jordan. During the 1980s, the United States refused to recognize the PLO until it accepted Israel’s right to exist.  After the outbreak of the Second Intifada, the Bush administration refused to deal with Yasser Arafat and pushed hard for his replacement. After Arafat's death, we insisted on democratic elections for a new Palestinian assembly and then rejected the results when Hamas won. The United States has also gone after charitable organizations with ties to Hamas and backed Israel’s recent campaign in Gaza.
  • In short, the United States has rarely hesitated to use its leverage to try to shape Palestinian behavior, even if some of these efforts -- such as the inept attempt to foment a Fatah coup against Hamas in 2007 -- have backfired.
  • The United States has only rarely put (mild) pressure on Israel in recent decades (and never for very long), even when the Israeli government was engaged in actions (such as building settlements) that the U.S. government opposed.  The question is: if the Netanyahu/Lieberman government remains intransigent, what should Obama do?
  • 4. Downgrade existing arrangements for “strategic cooperation.”  There are now a number of institutionalized arrangements for security cooperation between the Pentagon and the Israel Defense Forces and between U.S. and Israeli intelligence. The Obama administration could postpone or suspend some of these meetings, or start sending lower-grade representatives to them.
  • 2. Change the Rhetoric. The Obama administration could begin by using different language to describe certain Israeli policies.  While reaffirming America’s commitment to Israel’s existence as a Jewish-majority state, it could stop referring to settlement construction as “unhelpful,” a word that makes U.S. diplomats sound timid and mealy-mouthed.  Instead, we could start describing the settlements as “illegal” or as “violations of international law.”
  • U.S. officials could even describe Israel’s occupation as “contrary to democracy,” “unwise,” “cruel,” or “unjust.”  Altering the rhetoric would send a clear signal to the Israeli government and its citizens that their government’s opposition to a two-state solution was jeopardizing the special relationship.
  • 3. Support a U.N. Resolution Condemning the Occupation.  Since 1972, the United States has vetoed forty-three U.N. Security Council resolutions that were critical of Israel (a number greater than the sum of all vetoes cast by the other permanent members)
  • If the Obama administration wanted to send a clear signal that it was unhappy with Israel’s actions, it could sponsor a resolution condemning the occupation and calling for a two-state solution.
  • 1. Cut the aid package? If you add it all up, Israel gets over $3 billion in U.S. economic and military aid each year, which works out to about $500 per Israeli citizen. There’s a lot of potential leverage here, but it’s probably not the best stick to use, at least not at first. Trying to trim or cut the aid package will trigger an open and undoubtedly ugly confrontation in Congress (where the influence of AIPAC and other hard-line groups in the Israel lobby is greatest). So that’s not where I’d start.
  • There is in fact a precedent for this step: after negotiating the original agreements for a “strategic partnership,” the Reagan administration suspended them following Israel’s invasion of Lebanon in 1982. Today, such a step would surely get the attention of Israel’s security establishment.
  • 5. Reduce U.S. purchases of Israeli military equipment. In addition to providing Israel with military assistance (some of which is then used to purchase U.S. arms), the Pentagon also buys millions of dollars of weaponry and other services from Israel’s own defense industry. Obama could instruct Secretary of Defense Robert Gates to slow or decrease these purchases, which would send an unmistakable signal that it was no longer "business-as-usual." Given the battering Israel’s economy has taken in the current global recession, this step would get noticed too.
  • 6. Get tough with private organizations that support settlement activity. As David Ignatius recently noted in the Washington Post, many private donations to charitable organizations operating in Israel are tax-deductible in the United States, including private donations that support settlement activity. This makes no sense: it means the American taxpayer is indirectly subsidizing activities that are contrary to stated U.S. policy and that actually threaten Israel’s long-term future.  Just as the United States has gone after charitable contributions flowing to terrorist organizations, the U.S. Treasury could crack down on charitable organizations (including those of some prominent Christian Zionists) that are supporting these illegal activities. 
  • 7. Place more limits on U.S. loan guarantees. The United States has provided billions of dollars of loan guarantees to Israel on several occasions, which enabled Israel to borrow money from commercial banks at lower interest rates.  Back in 1992, the first Bush administration held up nearly $10 billion in guarantees until Israel agreed to halt settlement construction and attend the Madrid peace conference, and the dispute helped undermine the hard-line Likud government of Yitzhak Shamir and bring Yitzhak Rabin to power, which in turn made the historic Oslo Agreement possible.
  • 8. Encourage other U.S. allies to use their influence too. In the past, the United States has often pressed other states to upgrade their own ties with Israel.  If pressure is needed, however, the United States could try a different tack.  For example, we could quietly encourage the EU not to upgrade its relations with Israel until it had agreed to end the occupation.
  • most of these measures could be implemented by the Executive Branch alone, thereby outflanking die-hard defenders of the special relationship in Congress.  Indeed, even hinting that it was thinking about some of these measures would probably get Netanyahu to start reconsidering his position.
  • Most importantly, Obama and his aides will need to reach out to Israel’s supporters in the United States, and make it clear to them that pressing Israel to end the occupation is essential for Israel’s long-term survival.
  • He will have to work with the more far-sighted elements in the pro-Israel community -- including groups like J Street, the Israel Policy Forum, Brit Tzedek v'Shalom,  and others
  • In effect, the United States would be giving Israel a choice: it can end its self-defeating occupation of Palestinian lands, actively work for a two-state solution, and thereby remain a cherished American ally.  Or it can continue to expand the occupation and face a progressive loss of American support as well as the costly and corrupting burden of ruling millions of Palestinians by force.
  • Indeed, that is why many—though of course not all--Israelis would probably welcome a more active and evenhanded U.S. role. It was former Prime Minister Ehud Olmert who said "if the two-state solution collapses, Israel will face a South-Africa style struggle for political rights." And once that happens, he warned, “the state of Israel is finished."
  • The editor of Ha’aretz, David Landau, conveyed much the same sentiment last September when he told former Secretary of State Condoleezza Rice that the United States should "rape" Israel in order to force a solution. Landau's phrase was shocking and offensive, but it underscored the sense of urgency felt within some segments of the Israeli body politic.
Pedro Gonçalves

'Killer robots' pose threat to peace and should be banned, UN warned | Science | The Gu... - 0 views

  • "Machines lack morality and mortality, and as a result should not have life and death powers over humans,"
  • "States are working towards greater and greater autonomy in weapons, and the potential is there for such technologies to be developed in the next 10 or 20 years,"
  • Unmanned aerial vehicles were intended initially only for surveillance, and their use for offensive purposes was prohibited, yet once strategists realised their perceived advantages as a means of carrying out targeted killings, all objections were swept out of the way.
  • ...4 more annotations...
  • Drone technology has already moved a step closer to a fully autonomous state in the form of the X-47B, a super-charged UAV developed by the US Navy that can fly itself, and which last week completed the first takeoff from an aircraft carrier. The drone is billed as a non-combat craft, yet its design includes two weapons bays capable of carrying more than 4,000lbs.Britain is developing its own next generation of drone, known as Taranis, that can be sent to tackle targets at long range and can defend itself from enemy aircraft. Like X-47B it has two in-built weapons bays, though is currently unarmed.
  • South Korea has set up sentry robots known as SGR-1 along the Demilitarized Zone with North Korea that can detect people entering the zone through heat and motion sensors; though the sentry is currently configured so that it has to be operated by a human, it is reported to have an automatic mode, which, if deployed, would allow it to fire independently on intruders.
  • the Pentagon is spending about $6bn a year on research and development of unmanned systems, though in a directive adopted last November it said that fully autonomous weapons could only be used "to apply non-lethal, non-kinetic force, such as some forms of electronic attack".
  • The possibility of "out of the loop" weapons raises a plethora of moral and legal issues, Heyns says. Most worryingly, it could lead to increasing distance between those carrying out the attack and their targets: "In addition to being physically removed from the kinetic action, humans would also become more detached from decisions to kill – and their execution."
1 - 20 of 31 Next ›
Showing 20 items per page