Skip to main content

Home/ InternationalRelations/ Group items tagged hacking

Rss Feed Group items tagged

Ed Webb

Exclusive: Ex-NSA cyberspies reveal how they helped hack foes of UAE - 0 views

  • Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
  • in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
  • former U.S. government hackers have employed state-of-the-art cyber-espionage tools on behalf of a foreign intelligence service that spies on human rights activists, journalists and political rivals
  • ...20 more annotations...
  • surveillance techniques taught by the NSA were central to the UAE’s efforts to monitor opponents
  • Various reports have highlighted the ongoing cyber arms race in the Middle East, as the Emirates and other nations attempt to sweep up hacking weapons and personnel faster than their rivals. The Reuters investigation is the first to reveal the existence of Project Raven, providing a rare inside account of state hacking operations usually shrouded in secrecy and denials.
  • While this activity raises ethical dilemmas, U.S. national security lawyers say the laws guiding what American intelligence contractors can do abroad are murky. Though it’s illegal to share classified information, there is no specific law that bars contractors from sharing more general spycraft knowhow, such as how to bait a target with a virus-laden email.
  • The hacking of Americans was a tightly held secret even within Raven, with those operations led by Emiratis instead. Stroud’s account of the targeting of Americans was confirmed by four other former operatives and in emails reviewed by Reuters.
  • Stroud had already made the switch from government employee to Booz Allen contractor, essentially performing the same NSA job at higher pay. Taking a job with CyberPoint would fulfill a lifelong dream of deploying to the Middle East and doing so at a lucrative salary. Many analysts, like Stroud, were paid more than $200,000 a year, and some managers received salaries and compensation above $400,000.
  • Providing sensitive defense technologies or services to a foreign government generally requires special licenses from the U.S. State and Commerce Departments. Both agencies declined to comment on whether they issued such licenses to CyberPoint for its operations in the UAE. They added that human rights considerations figure into any such approvals.
  • “Some days it was hard to swallow, like [when you target] a 16-year-old kid on Twitter,” she said. “But it’s an intelligence mission, you are an intelligence operative. I never made it personal.”
  • the program took aim not just at terrorists and foreign government agencies, but also dissidents and human rights activists. The Emiratis categorized them as national security targets
  • the UAE has been accused of suppressing free speech, detaining dissidents and other abuses by groups such as Human Rights Watch. The UAE says it is working closely with Washington to fight extremism “beyond the battlefield” and is promoting efforts to counter the “root causes” of radical violence. Raven’s targets eventually would include militants in Yemen, foreign adversaries such as Iran, Qatar and Turkey, and individuals who criticized the monarchy, said Stroud and eight other former Raven operatives. Their accounts were confirmed by hundreds of Raven program documents reviewed by Reuters.
  • Reached by phone in London, Donaghy, now a graduate student pursuing Arab studies, expressed surprise he was considered a top national security target for five years. Donaghy confirmed he was targeted using the techniques described in the documents. “I’m glad my partner is sitting here as I talk on the phone because she wouldn’t believe it,” he said. Told the hackers were American mercenaries working for the UAE, Donaghy, a British citizen, expressed surprise and disgust. “It feels like a betrayal of the alliance we have,” he said.
  • Mansoor was convicted in a secret trial in 2017 of damaging the country’s unity and sentenced to 10 years in jail. He is now held in solitary confinement, his health declining, a person familiar with the matter said. Mansoor’s wife, Nadia, has lived in social isolation in Abu Dhabi. Neighbors are avoiding her out of fear security forces are watching. They are correct. By June 2017 Raven had tapped into her mobile device and given her the code name Purple Egret, program documents reviewed by Reuters show. To do so, Raven utilized a powerful new hacking tool called Karma, which allowed operatives to break into the iPhones of users around the world.
  • Karma was particularly potent because it did not require a target to click on any link to download malicious software. The operatives understood the hacking tool to rely on an undisclosed vulnerability in Apple’s iMessage text messaging software. In 2016 and 2017, it would be used against hundreds of targets across the Middle East and Europe, including governments of Qatar, Yemen, Iran and Turkey, documents show. Raven used Karma to hack an iPhone used by the Emir of Qatar, Sheikh Tamim bin Hamad al-Thani, as well as the phones of close associates and his brother.
  • Emirati security forces viewed human rights advocates as a major threat to “national stability,”
  • But a 2014 State Department agreement with CyberPoint showed Washington understood the contractors were helping launch cyber surveillance operations for the UAE. The approval document explains CyberPoint’s contract is to work alongside NESA in the “protection of UAE sovereignty” through “collection of information from communications systems inside and outside the UAE” and “surveillance analysis.”
  • “It was incredible because there weren’t these limitations like there was at the NSA. There wasn’t that bullshit red tape,”
  • Under DarkMatter, Project Raven continued to operate in Abu Dhabi from the Villa, but pressure escalated for the program to become more aggressive. Before long, senior NESA officers were given more control over daily functions, former Raven operatives said, often leaving American managers out of the loop. By mid-2016, the Emirates had begun making an increasing number of sections of Raven hidden from the Americans still managing day-to-day operations. Soon, an “Emirate-eyes only” designation appeared for some hacking targets.
  • Stroud began searching a targeting request list usually limited to Raven’s Emirati staff, which she was still able to access because of her role as lead analyst. She saw that security forces had sought surveillance against two other Americans. When she questioned the apparent targeting of Americans, she received a rebuke from an Emirati colleague for accessing the targeting list, the emails show. The target requests she viewed were to be processed by “certain people. You are not one of them,” the Emirati officer wrote.
  • Days later, Stroud said she came upon three more American names on the hidden targeting queue.
  • occupations were listed: journalist
  • When Stroud kept raising questions, she said, she was put on leave by superiors, her phones and passport were taken, and she was escorted from the building. Stroud said it all happened so quickly she was unable to recall the names of the three U.S. journalists or other Americans she came across in the files. “I felt like one of those national security targets,” she said. “I’m stuck in the country, I’m being surveilled, I can’t leave.” After two months, Stroud was allowed to return to America. Soon after, she fished out the business card of the FBI agents who had confronted her at the airport. “I don’t think Americans should be doing this to other Americans,” she told Reuters. “I’m a spy, I get that. I’m an intelligence officer, but I’m not a bad one.”
Ed Webb

Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks - 0 views

  • The Central Intelligence Agency has conducted a series of covert cyber operations against Iran and other targets since winning a secret victory in 2018 when President Trump signed what amounts to a sweeping authorization for such activities
  • The secret authorization, known as a presidential finding, gives the spy agency more freedom in both the kinds of operations it conducts and who it targets, undoing many restrictions that had been in place under prior administrations
  • Unlike previous presidential findings that have focused on a specific foreign policy objective or outcome — such as preventing Iran from becoming a nuclear power — this directive, driven by the National Security Council and crafted by the CIA, focuses more broadly on a capability: covert action in cyberspace.  
  • ...19 more annotations...
  • countries include Russia, China, Iran and North Korea — which are mentioned directly in the document — but the finding potentially applies to others as well
  • offensive cyber operations with the aim of producing disruption — like cutting off electricity or compromising an intelligence operation by dumping documents online — as well as destruction, similar to the U.S.-Israeli 2009 Stuxnet attack, which destroyed centrifuges that Iran used to enrich uranium gas for its nuclear program
  • freed the agency to conduct disruptive operations against organizations that were largely off limits previously, such as banks and other financial institutions
  • it lessened the evidentiary requirements that limited the CIA’s ability to conduct covert cyber operations against entities like media organizations, charities, religious institutions or businesses believed to be working on behalf of adversaries’ foreign intelligence services, as well as individuals affiliated with these organizations
  • “as long as you can show that it vaguely looks like the charity is working on behalf of that government, then you’re good.”
  • Since the finding was signed two years ago, the agency has carried out at least a dozen operations that were on its wish list, according to this former official. “This has been a combination of destructive things — stuff is on fire and exploding — and also public dissemination of data: leaking or things that look like leaking.” 
  • critics, including some former U.S. officials, see a potentially dangerous attenuation of intelligence oversight, which could have unintended consequences and even put people’s lives at risk
  • “Our government is basically turning into f****ing WikiLeaks, [using] secure communications on the dark web with dissidents, hacking and dumping,”
  • senior Trump officials weren’t interested in retaliating against Russia for the election interference
  • “Trump came in and way overcorrected,” said a former official. Covert cyber operations that in the past would have been rigorously vetted through the NSC, with sometimes years-long gaps between formulation and execution, now go “from idea to approval in weeks,” said the former official. 
  • an unknown group in March 2019 posted on the internet chat platform Telegram the names, addresses, phone numbers and photos of Iranian intelligence officers allegedly involved in hacking operations, as well as hacking tools used by Iranian intelligence operatives. That November, the details of 15 million debit cards for customers of three Iranian banks linked to Iran’s Islamic Revolutionary Guard Corps were also dumped on Telegram.Although sources wouldn’t say if the CIA was behind those Iran breaches, the finding’s expansion of CIA authorities to target financial institutions, such as an operation to leak bank card data, represents a significant escalation in U.S. cyber operations
  • These were operations the “CIA always knew were an option, but were always a bridge too far," said a former official. “They had been bandied about at senior levels for a long time, but cooler heads had always prevailed." 
  • “It was obvious that destabilization was the plan on Iran,”
  • Neither these two Iran-related findings, nor the new cyber finding, mention regime change as a stated goal, according to former officials. Over time, however, the CIA and other national security officials have interpreted the first two Iran findings increasingly broadly, with covert activities evolving from their narrow focus on stopping Tehran’s nuclear program, they said. The Iran findings have been subject to “classic mission creep,” said one former official.
  • “We’re playing semantics — destabilization is functionally the same thing as regime change. It’s a deniability issue,”
  • The CIA’s “deconfliction is poor, they’re not keeping people in the loop on what their cyber operations are,”
  • This more permissive environment may also intensify concerns about the CIA’s ability to secure its hacking arsenal. In 2017, WikiLeaks published a large cache of CIA hacking tools known as “Vault 7.” The leak, which a partially declassified CIA assessment called “the largest data loss in CIA history,” was made possible by “woefully lax” security practices at the CIA’s top hacker unit, the assessment said.
  • Removing NSC oversight of covert operations is a significant departure from recent history, according to Eatinger. “I would look at the intel community as the same as the military in that there should be civilian control of big decisions — who to go to war against, who to launch an attack against, who to fight a particular battle,” he said. “It makes sense that you would have that kind of civilian or non-intelligence civilian leadership for activities as sensitive as covert action.”
  • “People thought, ‘Hey, George W. Bush will sign this,’ but he didn’t,” said a former official. CIA officials then believed, “‘Obama will sign it.’ Then he didn’t.”“Then Trump came in, and CIA thought he wouldn’t sign,” recalled this official. “But he did.”
Ed Webb

The Blast Shack - 0 views

  • the sad and sordid days grind on and on; and that blindly potent machinery is just sitting there. Sitting there, tempting the user.
  • Bradley had to leak all over the third rail. Through historical circumstance, he’s become a miserable symbolic point-man for a global war on terror. He doesn’t much deserve that role. He’s got about as much to do with the political aspects of his war as Monica Lewinsky did with the lasting sexual mania that afflicts the American Republic.
  • That is so dispiriting and ugly. As a novelist, I never think of Monica Lewinsky, that once-everyday young woman, without a sense of dread at the freakish, occult fate that overtook her. Imagine what it must be like, to wake up being her, to face the inevitability of being That Woman. Monica, too, transgressed in apparent safety and then she had the utter foolishness to brag to a lethal enemy, a trusted confidante who ran a tape machine and who brought her a mediated circus of hells. The titillation of that massive, shattering scandal has faded now. But think of the quotidian daily horror of being Monica Lewinsky, and that should take a bite from the soul.
  • ...10 more annotations...
  • Bradley’s gonna become a “spy” whose “espionage” consisted of making the activities of a democratic government visible to its voting population. With the New York Times publishing the fruits of his misdeeds. Some set of American prosecutorial lawyers is confronting this crooked legal hairpin right now. I feel sorry for them.
  • the one-man global McDonald’s of leaks
  • While others stare in awe at Assange’s many otherworldly aspects — his hairstyle, his neatness, too-precise speech, his post-national life out of a laptop bag — I can recognize him as pure triple-A outsider geek. Man, I know a thousand modern weirdos like that, and every single one of them seems to be on my Twitter stream screaming support for Assange because they can recognize him as a brother and a class ally. They are in holy awe of him because, for the first time, their mostly-imaginary and lastingly resentful underclass has landed a serious blow in a public arena. Julian Assange has hacked a superpower.
  • It’s not just about him and the burning urge to punish him; it’s about the public risks to the reputation of the USA. They superpower hypocrisy here is gonna be hard to bear. The USA loves to read other people’s diplomatic cables. They dote on doing it. If Assange had happened to out the cable-library of some outlaw pariah state, say, Paraguay or North Korea, the US State Department would be heaping lilies at his feet. They’d be a little upset about his violation of the strict proprieties, but they’d also take keen satisfaction in the hilarious comeuppance of minor powers that shouldn’t be messing with computers, unlike the grandiose, high-tech USA. Unfortunately for the US State Department, they clearly shouldn’t have been messing with computers, either. In setting up their SIPRnet, they were trying to grab the advantages of rapid, silo-free, networked communication while preserving the hierarchical proprieties of official confidentiality. That’s the real issue, that’s the big modern problem; national governments and global computer networks don’t mix any more. It’s like trying to eat a very private birthday cake while also distributing it. That scheme is just not working. And that failure has a face now, and that’s Julian Assange.
  • He’s a different, modern type of serious troublemaker. He’s certainly not a “terrorist,” because nobody is scared and no one got injured. He’s not a “spy,” because nobody spies by revealing the doings of a government to its own civil population. He is orthogonal. He’s asymmetrical. He panics people in power and he makes them look stupid. And I feel sorry for them. But sorrier for the rest of us. Julian Assange’s extremely weird version of dissident “living in truth” doesn’t bear much relationship to the way that public life has ever been arranged. It does, however, align very closely to what we’ve done to ourselves by inventing and spreading the Internet. If the Internet was walking around in public, it would look and act a lot like Julian Assange. The Internet is about his age, and it doesn’t have any more care for the delicacies of profit, propriety and hierarchy than he does.
  • The one grand certainty about the consumers of Cablegate is that diplomats are gonna be reading those stolen cables. Not hackers: diplomats. Hackers bore easily, and they won’t be able to stand the discourse of intelligent trained professionals discussing real-life foreign affairs. American diplomats are gonna read those stolen cables, though, because they were supposed to read them anyway, even though they didn’t. Now, they’ve got to read them, with great care, because they might get blindsided otherwise by some wisecrack that they typed up years ago. And, of course, every intelligence agency and every diplomat from every non-American agency on Earth is gonna fire up computers and pore over those things. To see what American diplomacy really thought about them, or to see if they were ignored (which is worse), and to see how the grownups ran what was basically a foreign-service news agency that the rest of us were always forbidden to see. This stark fact makes them all into hackers. Yes, just like Julian. They’re all indebted to Julian for this grim thing that he did, and as they sit there hunched over their keyboards, drooling over their stolen goodies, they’re all, without exception, implicated in his doings. Assange is never gonna become a diplomat, but he’s arranged it so that diplomats henceforth are gonna be a whole lot more like Assange. They’ll behave just like him. They receive the goods just like he did, semi-surreptitiously. They may be wearing an ascot and striped pants, but they’ve got that hacker hunch in their necks and they’re staring into the glowing screen.
  • Diplomats are people who speak from nation to nation. They personify nations, and nations are brutal, savage, feral entities. Diplomats used to have something in the way of an international community, until the Americans decided to unilaterally abandon that in pursuit of Bradley Manning’s oil war. Now nations are so badly off that they can’t even get it together to coherently tackle heroin, hydrogen bombs, global warming and financial collapse. Not to mention the Internet.
  • the American diplomatic corps, and all it thinks it represents, is just collateral damage between Assange and his goal. He aspires to his transparent crypto-utopia in the way George Bush aspired to imaginary weapons of mass destruction. And the American diplomatic corps are so many Iraqis in that crusade. They’re the civilian casualties.
  • It’s the damage to the institutions that is spooky and disheartening; after the Lewinsky eruption, every American politician lives in permanent terror of a sex-outing. That’s “transparency,” too; it’s the kind of ghastly sex-transparency that Julian himself is stuck crotch-deep in. The politics of personal destruction hasn’t made the Americans into a frank and erotically cheerful people. On the contrary, the US today is like some creepy house of incest divided against itself in a civil cold war. “Transparency” can have nasty aspects; obvious, yet denied; spoken, but spoken in whispers. Very Edgar Allen Poe.
  • This knotty situation is not gonna “blow over,” because it’s been building since 1993 and maybe even 1947. “Transparency” and “discretion” are virtues, but they are virtues that clash. The international order and the global Internet are not best pals.
Ed Webb

The Digital Maginot Line - 0 views

  • The Information World War has already been going on for several years. We called the opening skirmishes “media manipulation” and “hoaxes”, assuming that we were dealing with ideological pranksters doing it for the lulz (and that lulz were harmless). In reality, the combatants are professional, state-employed cyberwarriors and seasoned amateur guerrillas pursuing very well-defined objectives with military precision and specialized tools. Each type of combatant brings a different mental model to the conflict, but uses the same set of tools.
  • There are also small but highly-skilled cadres of ideologically-motivated shitposters whose skill at information warfare is matched only by their fundamental incomprehension of the real damage they’re unleashing for lulz. A subset of these are conspiratorial — committed truthers who were previously limited to chatter on obscure message boards until social platform scaffolding and inadvertently-sociopathic algorithms facilitated their evolution into leaderless cults able to spread a gospel with ease.
  • If an operation is effective, the message will be pushed into the feeds of sympathetic real people who will amplify it themselves. If it goes viral or triggers a trending algorithm, it will be pushed into the feeds of a huge audience. Members of the media will cover it, reaching millions more. If the content is false or a hoax, perhaps there will be a subsequent correction article – it doesn’t matter, no one will pay attention to it.
  • ...17 more annotations...
  • The combatants view this as a Hobbesian information war of all against all and a tactical arms race; the other side sees it as a peacetime civil governance problem.
  • Information war combatants have certainly pursued regime change: there is reasonable suspicion that they succeeded in a few cases (Brexit) and clear indications of it in others (Duterte). They’ve targeted corporations and industries. And they’ve certainly gone after mores: social media became the main battleground for the culture wars years ago, and we now describe the unbridgeable gap between two polarized Americas using technological terms like filter bubble. But ultimately the information war is about territory — just not the geographic kind. In a warm information war, the human mind is the territory. If you aren’t a combatant, you are the territory. And once a combatant wins over a sufficient number of minds, they have the power to influence culture and society, policy and politics.
  • Cyberwar, most people thought, would be fought over infrastructure — armies of state-sponsored hackers and the occasional international crime syndicate infiltrating networks and exfiltrating secrets, or taking over critical systems. That’s what governments prepared and hired for; it’s what defense and intelligence agencies got good at. It’s what CSOs built their teams to handle. But as social platforms grew, acquiring standing audiences in the hundreds of millions and developing tools for precision targeting and viral amplification, a variety of malign actors simultaneously realized that there was another way. They could go straight for the people, easily and cheaply. And that’s because influence operations can, and do, impact public opinion. Adversaries can target corporate entities and transform the global power structure by manipulating civilians and exploiting human cognitive vulnerabilities at scale. Even actual hacks are increasingly done in service of influence operations: stolen, leaked emails, for example, were profoundly effective at shaping a national narrative in the U.S. election of 2016.
  • The substantial time and money spent on defense against critical-infrastructure hacks is one reason why poorly-resourced adversaries choose to pursue a cheap, easy, low-cost-of-failure psy-ops war instead
  • Our most technically-competent agencies are prevented from finding and countering influence operations because of the concern that they might inadvertently engage with real U.S. citizens as they target Russia’s digital illegals and ISIS’ recruiters. This capability gap is eminently exploitable; why execute a lengthy, costly, complex attack on the power grid when there is relatively no cost, in terms of dollars as well as consequences, to attack a society’s ability to operate with a shared epistemology? This leaves us in a terrible position, because there are so many more points of failure
  • This shift from targeting infrastructure to targeting the minds of civilians was predictable. Theorists  like Edward Bernays, Hannah Arendt, and Marshall McLuhan saw it coming decades ago. As early as 1970, McLuhan wrote, in Culture is our Business, “World War III is a guerrilla information war with no division between military and civilian participation.”
  • The 2014-2016 influence operation playbook went something like this: a group of digital combatants decided to push a specific narrative, something that fit a long-term narrative but also had a short-term news hook. They created content: sometimes a full blog post, sometimes a video, sometimes quick visual memes. The content was posted to platforms that offer discovery and amplification tools. The trolls then activated collections of bots and sockpuppets to blanket the biggest social networks with the content. Some of the fake accounts were disposable amplifiers, used mostly to create the illusion of popular consensus by boosting like and share counts. Others were highly backstopped personas run by real human beings, who developed standing audiences and long-term relationships with sympathetic influencers and media; those accounts were used for precision messaging with the goal of reaching the press. Israeli company Psy Group marketed precisely these services to the 2016 Trump Presidential campaign; as their sales brochure put it, “Reality is a Matter of Perception”.
  • There’s very little incentive not to try everything: this is a revolution that is being A/B tested.
  • Combatants are now focusing on infiltration rather than automation: leveraging real, ideologically-aligned people to inadvertently spread real, ideologically-aligned content instead. Hostile state intelligence services in particular are now increasingly adept at operating collections of human-operated precision personas, often called sockpuppets, or cyborgs, that will escape punishment under the the bot laws. They will simply work harder to ingratiate themselves with real American influencers, to join real American retweet rings. If combatants need to quickly spin up a digital mass movement, well-placed personas can rile up a sympathetic subreddit or Facebook Group populated by real people, hijacking a community in the way that parasites mobilize zombie armies.
  • Attempts to legislate away 2016 tactics primarily have the effect of triggering civil libertarians, giving them an opportunity to push the narrative that regulators just don’t understand technology, so any regulation is going to be a disaster.
  • The entities best suited to mitigate the threat of any given emerging tactic will always be the platforms themselves, because they can move fast when so inclined or incentivized. The problem is that many of the mitigation strategies advanced by the platforms are the information integrity version of greenwashing; they’re a kind of digital security theater, the TSA of information warfare
  • Algorithmic distribution systems will always be co-opted by the best resourced or most technologically capable combatants. Soon, better AI will rewrite the playbook yet again — perhaps the digital equivalent of  Blitzkrieg in its potential for capturing new territory. AI-generated audio and video deepfakes will erode trust in what we see with our own eyes, leaving us vulnerable both to faked content and to the discrediting of the actual truth by insinuation. Authenticity debates will commandeer media cycles, pushing us into an infinite loop of perpetually investigating basic facts. Chronic skepticism and the cognitive DDoS will increase polarization, leading to a consolidation of trust in distinct sets of right and left-wing authority figures – thought oligarchs speaking to entirely separate groups
  • platforms aren’t incentivized to engage in the profoundly complex arms race against the worst actors when they can simply point to transparency reports showing that they caught a fair number of the mediocre actors
  • What made democracies strong in the past — a strong commitment to free speech and the free exchange of ideas — makes them profoundly vulnerable in the era of democratized propaganda and rampant misinformation. We are (rightfully) concerned about silencing voices or communities. But our commitment to free expression makes us disproportionately vulnerable in the era of chronic, perpetual information war. Digital combatants know that once speech goes up, we are loathe to moderate it; to retain this asymmetric advantage, they push an all-or-nothing absolutist narrative that moderation is censorship, that spammy distribution tactics and algorithmic amplification are somehow part of the right to free speech.
  • We need an understanding of free speech that is hardened against the environment of a continuous warm war on a broken information ecosystem. We need to defend the fundamental value from itself becoming a prop in a malign narrative.
  • Unceasing information war is one of the defining threats of our day. This conflict is already ongoing, but (so far, in the United States) it’s largely bloodless and so we aren’t acknowledging it despite the huge consequences hanging in the balance. It is as real as the Cold War was in the 1960s, and the stakes are staggeringly high: the legitimacy of government, the persistence of societal cohesion, even our ability to respond to the impending climate crisis.
  • Influence operations exploit divisions in our society using vulnerabilities in our information ecosystem. We have to move away from treating this as a problem of giving people better facts, or stopping some Russian bots, and move towards thinking about it as an ongoing battle for the integrity of our information infrastructure – easily as critical as the integrity of our financial markets.
Ed Webb

Canada-Australia-U.K. Alliance Could Stand Up for Liberal Internationalism - 0 views

  • This club of three—as a new C-3 grouping of Canada, Australia, and Britain—has legs. But the idea must be reclaimed from the nationalist right: Not only is deepening foreign-policy coordination among Ottawa, Canberra, and London increasingly attractive amid the accelerating decay of the American-led world order, but this grouping has shown itself over Hong Kong to be far more meaningful in world affairs than seemed possible
  • Canada, Australia, and Britain are all facing a moment of crisis in their foreign policies. Canada’s humiliating failure to make it onto the United Nations Security Council reflects that it can now be picked on by China, or even Saudi Arabia, as the United States weakens. Australia is faced with cyberattacks and growing Chinese pressure. Britain, now outside the European Union, has been repeatedly threatened by China over Hong Kong, Huawei, HSBC, and nuclear power plants. All three are struggling to make their voices heard in international politics, in the various G-groups, in global bodies, and in President Donald Trump’s Washington.
  • Sadly, for all three, Germany and France are in a very different place from them on the authoritarian powers. Berlin, constrained by huge exports to China, wants to find a middle way between Washington and Beijing and is not ready to throw the EU into greater competition that could jeopardize critical trade for the sake of the interests of either Canada, Australia, or Britain. Paris, similarly, thinks differently on Russia. French President Emmanuel Macron’s emerging vision for a European Security Council or “Eurogroup”-style body including Russia, Turkey, and Britain is well outside the anti-authoritarian frame than Ottawa, Canberra, and London share.
  • ...12 more annotations...
  • Chinese and Russian aggression against the democracies is likely to grow, the United States might critically weaken, and the EU seems firmly set on pursuing a middle path. Instead of worrying about looking back to the past, leaders in Ottawa, Canberra, and London should embrace the idea and propose a significant deepening of their foreign-policy coordination. This is most definitely not about “getting the band back together,” as one British Conservative member of Parliament greeted a trade talk announcement, but three middle powers building an anti-authoritarian group to resist great-power bullying in the 21st century.
  • A mini C-3 format would offer the best approach: a summit with follow-up that is both flexible and lightweight enough to get off the ground but with a permanent working group in foreign ministries advancing dossiers and initiatives. As the C-3 are all Commonwealth countries, summits could be timed to coincide with the biennial Commonwealth Heads of Government Meeting, where the leaders of Canada, Australia, and Britain regularly meet anyway.
  • Drawing both on Britain’s joint initiative with Canada to block Putin attending the G-7 and on Canada’s humiliating experience at the U.N., among this C-3’s first tasks should be to coordinate joint positions inside the U.N., G-7 and G-20. As far as major goals are concerned, this could include supporting any future attempts of Canada to win a seat on the U.N. Security Council and for Australia to formally join the G-7.
  • This is not about replacing working with the EU or the United States but creating a group for Canada, Australia, and Britain to jointly present tougher anti-authoritarian packages to big powers than had they tried to individually present them alone. The C-3, like the E-3 to the EU, would be complementary to existing Euro-Atlantic bodies.
  • deeper cooperation between Britain, Canada, and Australia has an image problem
  • imperial nostalgia or conservative culture politics
  • too anchored on ethnic fraternity
  • the idea needs to be decolonized
  • what about other middle powers? Why not include, say, Japan? This is where two critical principles of international politics come into play: Does your grouping have enough like-mindedness to be able to function and enough load-bearing capacity to get anything done? What Canada, Australia, and Britain are after is mutual geopolitical support; adding members that aren’t willing to offer that risks creating another talking shop like the Franco-German Alliance for Multilateralism. That group, which stretches from Chile to Kazakhstan, lacks the ability to agree on anything of substance—and the power to act on it.
  • there are simply not a lot of like-minded democracies to go around
  • Ottawa, Canberra, and London didn’t need each other in a U.S.-led world order or in a relatively benign world without authoritarian superpowers. But that system has decayed. Deep divisions, not just between the Europeans and Donald Trump, but with much of the U.S. national security establishment, are breaking up the old Washington-led ideological West. The common anti-authoritarian frame that once glued together Western foreign policy has come unstuck
  • In this world, the C-3 is a liberal international, not a nationalist, cause
Ed Webb

'Trump thought I was a secretary': Fiona Hill on the president, Putin and populism | US... - 0 views

  • one of a handful of people to have stood at the nexus of these three disastrous governments, to have been in the room to witness Donald Trump, Vladimir Putin and Boris Johnson operate
  • “It’s a story really about how the US, UK and Russia have all ended up in the same spot weirdly, not just in terms of Covid-19 but also populist politics and many of the same out-of-control inequalities,”
  • In her view populist governments are useless at handling complex problems of governance, almost by definition
  • ...17 more annotations...
  • What interests Hill is how the three such different countries end up in the same boat, run by populists and significantly less able to cope with a pandemic than their neighbours. She believes the critical common factor is the heady rise, and then the catastrophic collapse, of heavy industry and the failure of their governments to manage the fall and cushion the impact on their people.
  • when you’re coming from the north of England, you are completely network-poor – you have no idea of how to go about it. It’s all about mentorship and connections
  • In all three countries, the government did little to mitigate the pain, leaving afflicted families to move to where the jobs were. In practice, the barriers to mobility – vast distances and bureaucracy in Russia, house prices in the UK – kept them anchored. Even in the US, the bursting of the housing bubble in 2008 made movement harder. And in all three countries, the ties of family obligations and social networks kept people rooted in place without prospects, and educational opportunities to change your destiny have withered away.
  • “If you’re in the north of England it’s probably easier to move to Australia, Canada or America and start again, like some of my family did, rather than trying to find a job in the south,” Hill said. “House prices in the north-east were so ridiculously low vis-a-vis in London or the south.”
  • In both the UK and Russia, the planners had built new towns as part of the great industrialisation drive, which suddenly had their economic lifelines cut off and were left to wither. Hill felt another echo when she visited the American midwest, where her in-laws lived. The great cities built on steel and automobiles had died, leaving hollowed-out communities.
  • “Liberal democracy hasn’t been delivering,” she argued. “If I go back to my home town, it’s still no better than it was when I was growing up in terms of opportunity. The shops are boarded up in the main street. Nothing new is coming in. There’s just no kind of sense of optimism. And when I visit my relatives here in the US in Wisconsin and other places, there’s a lot of sense of: the rest of the world is kind of moving on and leaving us behind. People see that as being closely associated with liberal democracy.”
  • “Populism provides a narrative for people who have lost their identities that were tied to meaningful work,” she said. “When people lose that then they’re looking for something. There’s a feeling they’ve been robbed and deprived of a golden age, and they want that back and populist politics feeds upon that, and provides scapegoats for losing it.”
  • At the interview in London, only she and another northern girl, a farmer’s daughter from Sunderland, took the time to chat to the secretary. It turned out that the secretary was part of the selection panel, and it was the two northerners who won the fellowships.
  • “Trump didn’t look up when I came in and I don’t think he looked up the whole time I was giving my spiel about the terrorist attack,”
  • Trump had decided he wanted a press release and assumed Hill, one of the few women in the room, was there to type it up.
  • “It’s not like the first time I’ve been mistaken for a secretary. I’ve been mistaken for many things, believe me,”
  • “A lot of this stuff which is described as policy is really all about personal fighting … And it’s kind of a comedy of errors, with all this intriguing. It’s very reminiscent of Kremlin intrigue and the kind of intrigue around No 10 in the UK – people always trying to do each other in.”
  • She argues Trump’s desire to forge a personal relationship with Putin is no different from his approach to the North Korean leader, Kim Jong-un, or the Chinese president, Xi Jinping, or Israel’s prime minister, Benjamin Netanyahu. “He wants to be like he was as a CEO, he has all these discussions with people in private … He has a very informal style with everyone. Putin is similar. He just tries to engage with people in the way that he thinks kind of fits them best,” she said. “Boris is the same. It’s like the guy in the pub. It’s less getting into the weeds of the substance in some sort of formal way, and more two guys talking.
  • “He wanted to treat Putin the same way he treated Xi or Netanyahu. He wanted to be able to pick up the phone and talk to them.” But Putin could not be treated like the others. The Trump campaign had dozens of contacts with Russian officials or Kremlin intermediaries, and the candidate had appealed to Moscow to interfere in the election by hacking Hillary Clinton’s emails. Furthermore, as Hill made clear in her biography of him, Putin has taken all the skills of his long KGB career with him to the Russian presidency. And the Kremlin was constantly outmanoeuvring the White House, arranging events so that Trump would be alone with Putin with only the Russian president’s translator in the room. The state department, which stuck to rigid protocol rules on whose translator should be where and when, was being played.
  • In her efforts to have US career officials included in Trump’s meetings with Putin, she found herself facing determined resistance from inside the president’s entourage, as they became more and more distrustful of career officials as disloyal potential whistleblowers.
  • It gave Russians unnecessary leverage
  • He has torn up one arms control agreement after another with the result that in less than a year’s time, there could be no limits left on the world’s major nuclear arsenals.
Ed Webb

Ethiopia and Egypt Are Already at War Over the Nile Dam. It's Just Happening in Cybersp... - 0 views

  • the group calling themselves the Cyber_Horus Group in late June hacked more than a dozen Ethiopian government sites, replacing each page with their own creation: an image of a skeleton pharaoh, clutching a scythe in one hand and a scimitar in the other. “If the river’s level drops, let all the Pharaoh’s soldiers hurry,” warned a message underneath. “Prepare the Ethiopian people for the wrath of the Pharaohs.”
  • Rarely have young people been so passionate about an infrastructure project. But the Grand Ethiopian Renaissance Dam, which will be Africa’s largest, is more than just a piece of infrastructure. It has become a nationalistic rallying cry for both Ethiopia and Egypt—two countries scrambling to define their nationhood after years of domestic upheaval. Many Ethiopians and Egyptians are getting involved in the only way they can—online—and fomenting the first African cyberconflict of its kind, one with far-reaching and long-lasting consequences.
  • Today, there are several entries for the GERD on Google Maps, most earning middling 3 to 4 stars ratings, buoyed by five-star ratings with feedback such as, “One of the great architectural dam in the World!” but weighed down by one-star complaints including, “You’re gonna make us die from thirst.”
  • ...15 more annotations...
  • Tensions escalated this year, as the U.S.-brokered negotiations between Ethiopia and Egypt unraveled and new talks mediated by the African Union began
  • Construction of the dam was completed in July, and the filling of its reservoir started soon after amid heavy rains but before an agreement between Ethiopia, Egypt, and Sudan was signed. The U.S. government, a top source of aid for both Ethiopia and Egypt, said in August that it would halt some aid to Ethiopia over what it saw as a unilateral move to progress with the dam.
  • Social media users from the two countries frequently collide on the Internet, but seem to do so most often on Adel el-Adawy’s Twitter page: As a member of a prominent Egyptian political dynasty, a professor at the American University in Cairo, and the most visible disseminator of the Egyptian perspective on the dam in English, he has amassed a significant following. Adawy, whose pinned tweet is a picture of himself shaking hands with Egyptian President Abdel Fattah al-Sisi, posts frequently about the Nile and Ethiopian affairs, especially when things get sticky.
  • It’s possible that the engagement is coming from concerned Ethiopians at home and abroad, at the encouragement but not the behest of Ethiopian officials. “I have friends who joined Twitter just for the sake of this. It’s highly emotional and nationalistic,” said Endalkachew Chala, an Ethiopian communications professor at Hamline University in Minnesota.
  • The Ethiopian government does broadly engage in “computational propaganda,” according to a 2019 report from the Oxford Internet Institute. Agencies there use human-run social media accounts to spread pro-government propaganda, attack the opposition, and troll users. The same goes for the Egyptian government.
  • the first known time these kinds of digital tools have been used by people from one African country against people from another, said Gilbert Nyandeje, founder and CEO of the Africa Cyber Defense Forum. “It only means one thing. It means we should expect this more and more.”
  • the dam provided a unifying issue around which Ethiopians of all ethnic backgrounds could rally. “We do have a lot of divisions—ideological, ethnic, tribal, religious,” said Chala, the Ethiopian professor. “But even though we have these bitter divisions, Ethiopians have overwhelmingly supported this Nile dam especially on social media.”
  • at the core of Egyptian identity is the Nile, so bolstering nationalism means defending the Nile, too. And officials have encouraged this outlook: One sleekly produced video shared on Facebook by the Ministry of Immigration and Egyptian Expatriates Affairs warned, “More than 40 million Egyptians are facing the threat of drought and thirst.… The cause of water shortage is Ethiopia building a dam five times bigger than its needs.”
  • a show of vulnerability rare in Arab power politics. But the strategy has helped garner global sympathy for Egypt, even as its Nile claims are framed by Ethiopia as the result of unjust colonial-era agreements in which Egypt’s interests were represented by British colonizers.
  • For both countries—Egypt since the 2011 fall of Mubarak and Ethiopia since the 2012 death of strongman Prime Minister Meles Zenawi—national identity has been in flux
  • Ethiopian officials, meanwhile, continue to encourage Ethiopians to post about the dam online and often use the #ItsMyDam hashtag in their own social media posts. This use of social media to rally around the dam has also meant that Ethiopia’s massive global diaspora can get involved, without having to worry about frequent in-country Internet shutdowns that otherwise curtail online movements there.
  • The thousands of Ethiopian refugees, asylum seekers, and migrants living in Egypt are now facing greater pressure and harassment from Egyptian citizens and authorities since the dam tensions started to heat up
  • in Ethiopia, it has meant that any domestic criticism of the dam from an environmentalist point of view—namely, that it could disrupt ecosystems and biodiversity, even within Ethiopia—is met with derision
  • for both countries, surging nationalist sentiment means that it’s harder for officials to agree to, and for the public to accept, compromise
  • the main sticking points now are related to dispute resolution, drought contingency plans, and future upstream projects. And yet, much of the online rhetoric remains maximalist, even rejecting items that have already been unanimously decided—such as the existence of an Ethiopian Nile dam in any form—raising the possibility that the online tensions and attacks may not subside anytime soon
1 - 9 of 9
Showing 20 items per page