Skip to main content

Home/ InternationalRelations/ Group items tagged intelligence

Rss Feed Group items tagged

Ed Webb

'A mass assassination factory': Inside Israel's calculated bombing of Gaza - 0 views

  • The Israeli army’s expanded authorization for bombing non-military targets, the loosening of constraints regarding expected civilian casualties, and the use of an artificial intelligence system to generate more potential targets than ever before, appear to have contributed to the destructive nature of the initial stages of Israel’s current war on the Gaza Strip, an investigation by +972 Magazine and Local Call reveals
  • The investigation by +972 and Local Call is based on conversations with seven current and former members of Israel’s intelligence community — including military intelligence and air force personnel who were involved in Israeli operations in the besieged Strip — in addition to Palestinian testimonies, data, and documentation from the Gaza Strip, and official statements by the IDF Spokesperson and other Israeli state institutions.
  • The bombing of power targets, according to intelligence sources who had first-hand experience with its application in Gaza in the past, is mainly intended to harm Palestinian civil society: to “create a shock” that, among other things, will reverberate powerfully and “lead civilians to put pressure on Hamas,”
  • ...33 more annotations...
  • the Israeli army has files on the vast majority of potential targets in Gaza — including homes — which stipulate the number of civilians who are likely to be killed in an attack on a particular target. This number is calculated and known in advance to the army’s intelligence units, who also know shortly before carrying out an attack roughly how many civilians are certain to be killed
  • “The numbers increased from dozens of civilian deaths [permitted] as collateral damage as part of an attack on a senior official in previous operations, to hundreds of civilian deaths as collateral damage,”
  • another reason for the large number of targets, and the extensive harm to civilian life in Gaza, is the widespread use of a system called “Habsora” (“The Gospel”), which is largely built on artificial intelligence and can “generate” targets almost automatically at a rate that far exceeds what was previously possible. This AI system, as described by a former intelligence officer, essentially facilitates a “mass assassination factory.”
  • the increasing use of AI-based systems like Habsora allows the army to carry out strikes on residential homes where a single Hamas member lives on a massive scale, even those who are junior Hamas operatives. Yet testimonies of Palestinians in Gaza suggest that since October 7, the army has also attacked many private residences where there was no known or apparent member of Hamas or any other militant group residing. Such strikes, sources confirmed to +972 and Local Call, can knowingly kill entire families in the process.
  • at least until the current war, army protocols allowed for attacking power targets only when the buildings were empty of residents at the time of the strike. However, testimonies and videos from Gaza suggest that since October 7, some of these targets have been attacked without prior notice being given to their occupants, killing entire families as a result.
  • there are “cases in which we shell based on a wide cellular pinpointing of where the target is, killing civilians. This is often done to save time, instead of doing a little more work to get a more accurate pinpointing,”
  • Over 300 families have lost 10 or more family members in Israeli bombings in the past two months — a number that is 15 times higher than the figure from what was previously Israel’s deadliest war on Gaza, in 2014
  • “There is a feeling that senior officials in the army are aware of their failure on October 7, and are busy with the question of how to provide the Israeli public with an image [of victory] that will salvage their reputation.”
  • “The emphasis is on damage and not on accuracy,” said IDF Spokesperson Daniel Hagari on Oct. 9.
  • “We are asked to look for high-rise buildings with half a floor that can be attributed to Hamas,” said one source who took part in previous Israeli offensives in Gaza. “Sometimes it is a militant group’s spokesperson’s office, or a point where operatives meet. I understood that the floor is an excuse that allows the army to cause a lot of destruction in Gaza. That is what they told us. “If they would tell the whole world that the [Islamic Jihad] offices on the 10th floor are not important as a target, but that its existence is a justification to bring down the entire high-rise with the aim of pressuring civilian families who live in it in order to put pressure on terrorist organizations, this would itself be seen as terrorism. So they do not say it,” the source added.
  • “I remember thinking that it was like if [Palestinian militants] would bomb all the private residences of our families when [Israeli soldiers] go back to sleep at home on the weekend,” one source, who was critical of this practice, recalled.
  • On Oct. 22, the Israeli Air Force bombed the home of the Palestinian journalist Ahmed Alnaouq in the city of Deir al-Balah. Ahmed is a close friend and colleague of mine; four years ago, we founded a Hebrew Facebook page called “Across the Wall,” with the aim of bringing Palestinian voices from Gaza to the Israeli public. The strike on Oct. 22 collapsed blocks of concrete onto Ahmed’s entire family, killing his father, brothers, sisters, and all of their children, including babies. Only his 12-year-old niece, Malak, survived and remained in a critical condition, her body covered in burns. A few days later, Malak died. Twenty-one members of Ahmed’s family were killed in total, buried under their home. None of them were militants. The youngest was 2 years old; the oldest, his father, was 75. Ahmed, who is currently living in the UK, is now alone out of his entire family.
  • “Hamas is everywhere in Gaza; there is no building that does not have something of Hamas in it, so if you want to find a way to turn a high-rise into a target, you will be able to do so,”
  • for the most part, when it comes to power targets, it is clear that the target doesn’t have military value that justifies an attack that would bring down the entire empty building in the middle of a city, with the help of six planes and bombs weighing several tons
  • Although it is unprecedented for the Israeli army to attack more than 1,000 power targets in five days, the idea of causing mass devastation to civilian areas for strategic purposes was formulated in previous military operations in Gaza, honed by the so-called “Dahiya Doctrine” from the Second Lebanon War of 2006.
  • As documented by Al Mezan and numerous images coming out of Gaza, Israel bombed the Islamic University of Gaza, the Palestinian Bar Association, a UN building for an educational program for outstanding students, a building belonging to the Palestine Telecommunications Company, the Ministry of National Economy, the Ministry of Culture, roads, and dozens of high-rise buildings and homes — especially in Gaza’s northern neighborhoods.
  • Previous operations have also shown how striking these targets is meant not only to harm Palestinian morale, but also to raise the morale inside Israel. Haaretz revealed that during Operation Guardian of the Walls in 2021, the IDF Spokesperson’s Unit conducted a psy-op against Israeli citizens in order to boost awareness of the IDF’s operations in Gaza and the damage they caused to Palestinians. Soldiers, who used fake social media accounts to conceal the campaign’s origin, uploaded images and clips of the army’s strikes in Gaza to Twitter, Facebook, Instagram, and TikTok in order to demonstrate the army’s prowess to the Israeli public.
  • since October 7, Israel has attacked high-rises with their residents still inside, or without having taken significant steps to evacuate them, leading to many civilian deaths.
  • evidence from Gaza suggests that some high-rises — which we assume to have been power targets — were toppled without prior warning. +972 and Local Call located at least two cases during the current war in which entire residential high-rises were bombed and collapsed without warning, and one case in which, according to the evidence, a high-rise building collapsed on civilians who were inside.
  • According to intelligence sources, Habsora generates, among other things, automatic recommendations for attacking private residences where people suspected of being Hamas or Islamic Jihad operatives live. Israel then carries out large-scale assassination operations through the heavy shelling of these residential homes.
  • the Habsora system enables the army to run a “mass assassination factory,” in which the “emphasis is on quantity and not on quality.” A human eye “will go over the targets before each attack, but it need not spend a lot of time on them.” Since Israel estimates that there are approximately 30,000 Hamas members in Gaza, and they are all marked for death, the number of potential targets is enormous.
  • A senior military official in charge of the target bank told the Jerusalem Post earlier this year that, thanks to the army’s AI systems, for the first time the military can generate new targets at a faster rate than it attacks. Another source said the drive to automatically generate large numbers of targets is a realization of the Dahiya Doctrine.
  • Five different sources confirmed that the number of civilians who may be killed in attacks on private residences is known in advance to Israeli intelligence, and appears clearly in the target file under the category of “collateral damage.” 
  • “That is a lot of houses. Hamas members who don’t really matter for anything live in homes across Gaza. So they mark the home and bomb the house and kill everyone there.”
  • According to the doctrine — developed by former IDF Chief of Staff Gadi Eizenkot, who is now a Knesset member and part of the current war cabinet — in a war against guerrilla groups such as Hamas or Hezbollah, Israel must use disproportionate and overwhelming force while targeting civilian and government infrastructure in order to establish deterrence and force the civilian population to pressure the groups to end their attacks. The concept of “power targets” seems to have emanated from this same logic.
  • According to former Israeli intelligence officers, in many cases in which a private residence is bombed, the goal is the “assassination of Hamas or Jihad operatives,” and such targets are attacked when the operative enters the home. Intelligence researchers know if the operative’s family members or neighbors may also die in an attack, and they know how to calculate how many of them may die. Each of the sources said that these are private homes, where in the majority of cases, no military activity is carried out.
  • there is ample evidence that, in many cases, none were military or political operatives belonging to Hamas or Islamic Jihad.
  • The bombing of family homes where Hamas or Islamic Jihad operatives supposedly live likely became a more concerted IDF policy during Operation Protective Edge in 2014. Back then, 606 Palestinians — about a quarter of the civilian deaths during the 51 days of fighting — were members of families whose homes were bombed. A UN report defined it in 2015 as both a potential war crime and “a new pattern” of action that “led to the death of entire families.”
  • according to the Committee to Protect Journalists, by Nov. 29, Israel had killed 50 Palestinian journalists in Gaza, some of them in their homes with their families
  • The intelligence officers interviewed for this article said that the way Hamas designed the tunnel network in Gaza knowingly exploits the civilian population and infrastructure above ground. These claims were also the basis of the media campaign that Israel conducted vis-a-vis the attacks and raids on Al-Shifa Hospital and the tunnels that were discovered under it.
  • Hamas leaders “understand that Israeli harm to civilians gives them legitimacy in fighting.”
  • while it’s hard to imagine now, the idea of dropping a one-ton bomb aimed at killing a Hamas operative yet ending up killing an entire family as “collateral damage” was not always so readily accepted by large swathes of Israeli society. In 2002, for example, the Israeli Air Force bombed the home of Salah Mustafa Muhammad Shehade, then the head of the Al-Qassam Brigades, Hamas’ military wing. The bomb killed him, his wife Eman, his 14-year-old daughter Laila, and 14 other civilians, including 11 children. The killing caused a public uproar in both Israel and the world, and Israel was accused of committing war crimes.
  • Fifteen years after insisting that the army was taking pains to minimize civilian harm, Gallant, now Defense Minister, has clearly changed his tune. “We are fighting human animals and we act accordingly,” he said after October 7.
Ed Webb

Russia Secretly Offered Afghan Militants Bounties to Kill U.S. Troops, Intelligence Say... - 0 views

  • American intelligence officials have concluded that a Russian military intelligence unit secretly offered bounties to Taliban-linked militants for killing coalition forces in Afghanistan — including targeting American troops — amid the peace talks to end the long-running war there, according to officials briefed on the matter.
  • the Russian unit, which has been linked to assassination attempts and other covert operations in Europe intended to destabilize the West or take revenge on turncoats, had covertly offered rewards for successful attacks last year.
  • The intelligence finding was briefed to President Trump, and the White House’s National Security Council discussed the problem at an interagency meeting in late March, the officials said. Officials developed a menu of potential options — starting with making a diplomatic complaint to Moscow and a demand that it stop, along with an escalating series of sanctions and other possible responses, but the White House has yet to authorize any step
  • ...9 more annotations...
  • a significant and provocative escalation of what American and Afghan officials have said is Russian support for the Taliban, and it would be the first time the Russian spy unit was known to have orchestrated attacks on Western troops
  • a huge escalation of Russia’s so-called hybrid war against the United States, a strategy of destabilizing adversaries through a combination of such tactics as cyberattacks, the spread of fake news and covert and deniable military operations
  • While some of his closest advisers, like Secretary of State Mike Pompeo, have counseled more hawkish policies toward Russia, Mr. Trump has adopted an accommodating stance toward Moscow.
  • the intelligence has been treated as a closely held secret, but the administration expanded briefings about it this week — including sharing information about it with the British government, whose forces are among those said to have been targeted
  • While officials were said to be confident about the intelligence that Russian operatives offered and paid bounties to Afghan militants for killing Americans, they have greater uncertainty about how high in the Russian government the covert operation was authorized and what its aim may be.
  • Some officials have theorized that the Russians may be seeking revenge on NATO forces for a 2018 battle in Syria in which the American military killed several hundred pro-Syrian forces, including numerous Russian mercenaries, as they advanced on an American outpost. Officials have also suggested that the Russians may have been trying to derail peace talks to keep the United States bogged down in Afghanistan. But the motivation remains murky.
  • the handiwork of Unit 29155, an arm of Russia’s military intelligence agency, known widely as the G.R.U. The unit is linked to the March 2018 nerve agent poisoning in Salisbury, England, of Sergei Skripal
  • Western intelligence officials say the unit, which has operated for more than a decade, has been charged by the Kremlin with carrying out a campaign to destabilize the West through subversion, sabotage and assassination
  • Operations involving Unit 29155 tend to be much more violent than those involving the cyberunits. Its officers are often decorated military veterans with years of service, in some cases dating to the Soviet Union’s failed war in Afghanistan in the 1980s. Never before has the unit been accused of orchestrating attacks on Western soldiers, but officials briefed on its operations say it has been active in Afghanistan for many years.
Ed Webb

Exclusive: Ex-NSA cyberspies reveal how they helped hack foes of UAE - 0 views

  • Project Raven, a clandestine team that included more than a dozen former U.S. intelligence operatives recruited to help the United Arab Emirates engage in surveillance of other governments, militants and human rights activists critical of the monarchy.
  • in 2016, the Emiratis moved Project Raven to a UAE cybersecurity firm named DarkMatter. Before long, Stroud and other Americans involved in the effort say they saw the mission cross a red line: targeting fellow Americans for surveillance.
  • former U.S. government hackers have employed state-of-the-art cyber-espionage tools on behalf of a foreign intelligence service that spies on human rights activists, journalists and political rivals
  • ...20 more annotations...
  • surveillance techniques taught by the NSA were central to the UAE’s efforts to monitor opponents
  • Various reports have highlighted the ongoing cyber arms race in the Middle East, as the Emirates and other nations attempt to sweep up hacking weapons and personnel faster than their rivals. The Reuters investigation is the first to reveal the existence of Project Raven, providing a rare inside account of state hacking operations usually shrouded in secrecy and denials.
  • While this activity raises ethical dilemmas, U.S. national security lawyers say the laws guiding what American intelligence contractors can do abroad are murky. Though it’s illegal to share classified information, there is no specific law that bars contractors from sharing more general spycraft knowhow, such as how to bait a target with a virus-laden email.
  • The hacking of Americans was a tightly held secret even within Raven, with those operations led by Emiratis instead. Stroud’s account of the targeting of Americans was confirmed by four other former operatives and in emails reviewed by Reuters.
  • Stroud had already made the switch from government employee to Booz Allen contractor, essentially performing the same NSA job at higher pay. Taking a job with CyberPoint would fulfill a lifelong dream of deploying to the Middle East and doing so at a lucrative salary. Many analysts, like Stroud, were paid more than $200,000 a year, and some managers received salaries and compensation above $400,000.
  • Providing sensitive defense technologies or services to a foreign government generally requires special licenses from the U.S. State and Commerce Departments. Both agencies declined to comment on whether they issued such licenses to CyberPoint for its operations in the UAE. They added that human rights considerations figure into any such approvals.
  • “Some days it was hard to swallow, like [when you target] a 16-year-old kid on Twitter,” she said. “But it’s an intelligence mission, you are an intelligence operative. I never made it personal.”
  • the program took aim not just at terrorists and foreign government agencies, but also dissidents and human rights activists. The Emiratis categorized them as national security targets
  • Emirati security forces viewed human rights advocates as a major threat to “national stability,”
  • Reached by phone in London, Donaghy, now a graduate student pursuing Arab studies, expressed surprise he was considered a top national security target for five years. Donaghy confirmed he was targeted using the techniques described in the documents. “I’m glad my partner is sitting here as I talk on the phone because she wouldn’t believe it,” he said. Told the hackers were American mercenaries working for the UAE, Donaghy, a British citizen, expressed surprise and disgust. “It feels like a betrayal of the alliance we have,” he said.
  • Mansoor was convicted in a secret trial in 2017 of damaging the country’s unity and sentenced to 10 years in jail. He is now held in solitary confinement, his health declining, a person familiar with the matter said. Mansoor’s wife, Nadia, has lived in social isolation in Abu Dhabi. Neighbors are avoiding her out of fear security forces are watching. They are correct. By June 2017 Raven had tapped into her mobile device and given her the code name Purple Egret, program documents reviewed by Reuters show. To do so, Raven utilized a powerful new hacking tool called Karma, which allowed operatives to break into the iPhones of users around the world.
  • Karma was particularly potent because it did not require a target to click on any link to download malicious software. The operatives understood the hacking tool to rely on an undisclosed vulnerability in Apple’s iMessage text messaging software. In 2016 and 2017, it would be used against hundreds of targets across the Middle East and Europe, including governments of Qatar, Yemen, Iran and Turkey, documents show. Raven used Karma to hack an iPhone used by the Emir of Qatar, Sheikh Tamim bin Hamad al-Thani, as well as the phones of close associates and his brother.
  • the UAE has been accused of suppressing free speech, detaining dissidents and other abuses by groups such as Human Rights Watch. The UAE says it is working closely with Washington to fight extremism “beyond the battlefield” and is promoting efforts to counter the “root causes” of radical violence. Raven’s targets eventually would include militants in Yemen, foreign adversaries such as Iran, Qatar and Turkey, and individuals who criticized the monarchy, said Stroud and eight other former Raven operatives. Their accounts were confirmed by hundreds of Raven program documents reviewed by Reuters.
  • But a 2014 State Department agreement with CyberPoint showed Washington understood the contractors were helping launch cyber surveillance operations for the UAE. The approval document explains CyberPoint’s contract is to work alongside NESA in the “protection of UAE sovereignty” through “collection of information from communications systems inside and outside the UAE” and “surveillance analysis.”
  • “It was incredible because there weren’t these limitations like there was at the NSA. There wasn’t that bullshit red tape,”
  • Under DarkMatter, Project Raven continued to operate in Abu Dhabi from the Villa, but pressure escalated for the program to become more aggressive. Before long, senior NESA officers were given more control over daily functions, former Raven operatives said, often leaving American managers out of the loop. By mid-2016, the Emirates had begun making an increasing number of sections of Raven hidden from the Americans still managing day-to-day operations. Soon, an “Emirate-eyes only” designation appeared for some hacking targets.
  • Stroud began searching a targeting request list usually limited to Raven’s Emirati staff, which she was still able to access because of her role as lead analyst. She saw that security forces had sought surveillance against two other Americans. When she questioned the apparent targeting of Americans, she received a rebuke from an Emirati colleague for accessing the targeting list, the emails show. The target requests she viewed were to be processed by “certain people. You are not one of them,” the Emirati officer wrote.
  • Days later, Stroud said she came upon three more American names on the hidden targeting queue.
  • occupations were listed: journalist
  • When Stroud kept raising questions, she said, she was put on leave by superiors, her phones and passport were taken, and she was escorted from the building. Stroud said it all happened so quickly she was unable to recall the names of the three U.S. journalists or other Americans she came across in the files. “I felt like one of those national security targets,” she said. “I’m stuck in the country, I’m being surveilled, I can’t leave.” After two months, Stroud was allowed to return to America. Soon after, she fished out the business card of the FBI agents who had confronted her at the airport. “I don’t think Americans should be doing this to other Americans,” she told Reuters. “I’m a spy, I get that. I’m an intelligence officer, but I’m not a bad one.”
Ed Webb

Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks - 0 views

  • The Central Intelligence Agency has conducted a series of covert cyber operations against Iran and other targets since winning a secret victory in 2018 when President Trump signed what amounts to a sweeping authorization for such activities
  • The secret authorization, known as a presidential finding, gives the spy agency more freedom in both the kinds of operations it conducts and who it targets, undoing many restrictions that had been in place under prior administrations
  • Unlike previous presidential findings that have focused on a specific foreign policy objective or outcome — such as preventing Iran from becoming a nuclear power — this directive, driven by the National Security Council and crafted by the CIA, focuses more broadly on a capability: covert action in cyberspace.  
  • ...19 more annotations...
  • countries include Russia, China, Iran and North Korea — which are mentioned directly in the document — but the finding potentially applies to others as well
  • offensive cyber operations with the aim of producing disruption — like cutting off electricity or compromising an intelligence operation by dumping documents online — as well as destruction, similar to the U.S.-Israeli 2009 Stuxnet attack, which destroyed centrifuges that Iran used to enrich uranium gas for its nuclear program
  • freed the agency to conduct disruptive operations against organizations that were largely off limits previously, such as banks and other financial institutions
  • it lessened the evidentiary requirements that limited the CIA’s ability to conduct covert cyber operations against entities like media organizations, charities, religious institutions or businesses believed to be working on behalf of adversaries’ foreign intelligence services, as well as individuals affiliated with these organizations
  • “as long as you can show that it vaguely looks like the charity is working on behalf of that government, then you’re good.”
  • Since the finding was signed two years ago, the agency has carried out at least a dozen operations that were on its wish list, according to this former official. “This has been a combination of destructive things — stuff is on fire and exploding — and also public dissemination of data: leaking or things that look like leaking.” 
  • critics, including some former U.S. officials, see a potentially dangerous attenuation of intelligence oversight, which could have unintended consequences and even put people’s lives at risk
  • “Our government is basically turning into f****ing WikiLeaks, [using] secure communications on the dark web with dissidents, hacking and dumping,”
  • senior Trump officials weren’t interested in retaliating against Russia for the election interference
  • “Trump came in and way overcorrected,” said a former official. Covert cyber operations that in the past would have been rigorously vetted through the NSC, with sometimes years-long gaps between formulation and execution, now go “from idea to approval in weeks,” said the former official. 
  • an unknown group in March 2019 posted on the internet chat platform Telegram the names, addresses, phone numbers and photos of Iranian intelligence officers allegedly involved in hacking operations, as well as hacking tools used by Iranian intelligence operatives. That November, the details of 15 million debit cards for customers of three Iranian banks linked to Iran’s Islamic Revolutionary Guard Corps were also dumped on Telegram.Although sources wouldn’t say if the CIA was behind those Iran breaches, the finding’s expansion of CIA authorities to target financial institutions, such as an operation to leak bank card data, represents a significant escalation in U.S. cyber operations
  • These were operations the “CIA always knew were an option, but were always a bridge too far," said a former official. “They had been bandied about at senior levels for a long time, but cooler heads had always prevailed." 
  • “It was obvious that destabilization was the plan on Iran,”
  • Neither these two Iran-related findings, nor the new cyber finding, mention regime change as a stated goal, according to former officials. Over time, however, the CIA and other national security officials have interpreted the first two Iran findings increasingly broadly, with covert activities evolving from their narrow focus on stopping Tehran’s nuclear program, they said. The Iran findings have been subject to “classic mission creep,” said one former official.
  • “We’re playing semantics — destabilization is functionally the same thing as regime change. It’s a deniability issue,”
  • The CIA’s “deconfliction is poor, they’re not keeping people in the loop on what their cyber operations are,”
  • This more permissive environment may also intensify concerns about the CIA’s ability to secure its hacking arsenal. In 2017, WikiLeaks published a large cache of CIA hacking tools known as “Vault 7.” The leak, which a partially declassified CIA assessment called “the largest data loss in CIA history,” was made possible by “woefully lax” security practices at the CIA’s top hacker unit, the assessment said.
  • Removing NSC oversight of covert operations is a significant departure from recent history, according to Eatinger. “I would look at the intel community as the same as the military in that there should be civilian control of big decisions — who to go to war against, who to launch an attack against, who to fight a particular battle,” he said. “It makes sense that you would have that kind of civilian or non-intelligence civilian leadership for activities as sensitive as covert action.”
  • “People thought, ‘Hey, George W. Bush will sign this,’ but he didn’t,” said a former official. CIA officials then believed, “‘Obama will sign it.’ Then he didn’t.”“Then Trump came in, and CIA thought he wouldn’t sign,” recalled this official. “But he did.”
Ed Webb

Artificial intelligence, immune to fear or favour, is helping to make China's foreign p... - 0 views

  • Several prototypes of a diplomatic system using artificial intelligence are under development in China, according to researchers involved or familiar with the projects. One early-stage machine, built by the Chinese Academy of Sciences, is already being used by the Ministry of Foreign Affairs.
  • China’s ambition to become a world leader has significantly increased the burden and challenge to its diplomats. The “Belt and Road Initiative”, for instance, involves nearly 70 countries with 65 per cent of the world’s population. The unprecedented development strategy requires up to a US$900 billion investment each year for infrastructure construction, some in areas with high political, economic or environmental risk
  • researchers said the AI “policymaker” was a strategic decision support system, with experts stressing that it will be humans who will make any final decision
  • ...10 more annotations...
  • “Human beings can never get rid of the interference of hormones or glucose.”
  • “It would not even consider the moral factors that conflict with strategic goals,”
  • “If one side of the strategic game has artificial intelligence technology, and the other side does not, then this kind of strategic game is almost a one-way, transparent confrontation,” he said. “The actors lacking the assistance of AI will be at an absolute disadvantage in many aspects such as risk judgment, strategy selection, decision making and execution efficiency, and decision-making reliability,” he said.
  • “The entire strategic game structure will be completely out of balance.”
  • “AI can think many steps ahead of a human. It can think deeply in many possible scenarios and come up with the best strategy,”
  • A US Department of State spokesman said the agency had “many technological tools” to help it make decisions. There was, however, no specific information on AI that could be shared with the public,
  • The system, also known as geopolitical environment simulation and prediction platform, was used to vet “nearly all foreign investment projects” in recent years
  • One challenge to the development of AI policymaker is data sharing among Chinese government agencies. The foreign ministry, for instance, had been unable to get some data sets it needed because of administrative barriers
  • China is aggressively pushing AI into many sectors. The government is building a nationwide surveillance system capable of identifying any citizen by face within seconds. Research is also under way to introduce AI in nuclear submarines to help commanders making faster, more accurate decision in battle.
  • “AI can help us get more prepared for unexpected events. It can help find a scientific, rigorous solution within a short time.
Ed Webb

Why the Pandemic Is So Bad in America - The Atlantic - 0 views

  • almost everything that went wrong with America’s response to the pandemic was predictable and preventable
  • sluggish response by a government denuded of expertise
  • Chronic underfunding of public health
  • ...62 more annotations...
  • bloated, inefficient health-care system
  • Racist policies that have endured since the days of colonization and slavery left Indigenous and Black Americans especially vulnerable
  • decades-long process of shredding the nation’s social safety net
  • same social-media platforms that sowed partisanship and misinformation during the 2014 Ebola outbreak in Africa and the 2016 U.S. election became vectors for conspiracy theories
  • the COVID‑19 debacle has also touched—and implicated—nearly every other facet of American society: its shortsighted leadership, its disregard for expertise, its racial inequities, its social-media culture, and its fealty to a dangerous strain of individualism.
  • SARS‑CoV‑2 is neither as lethal as some other coronaviruses, such as SARS and MERS, nor as contagious as measles. Deadlier pathogens almost certainly exist. Wild animals harbor an estimated 40,000 unknown viruses, a quarter of which could potentially jump into humans. How will the U.S. fare when “we can’t even deal with a starter pandemic?,”
  • The U.S. cannot prepare for these inevitable crises if it returns to normal, as many of its people ache to do. Normal led to this. Normal was a world ever more prone to a pandemic but ever less ready for one. To avert another catastrophe, the U.S. needs to grapple with all the ways normal failed us
  • Many conservationists jump on epidemics as opportunities to ban the wildlife trade or the eating of “bush meat,” an exoticized term for “game,” but few diseases have emerged through either route. Carlson said the biggest factors behind spillovers are land-use change and climate change, both of which are hard to control. Our species has relentlessly expanded into previously wild spaces. Through intensive agriculture, habitat destruction, and rising temperatures, we have uprooted the planet’s animals, forcing them into new and narrower ranges that are on our own doorsteps. Humanity has squeezed the world’s wildlife in a crushing grip—and viruses have come bursting out.
  • This year, the world’s coronavirus experts—and there still aren’t many—had to postpone their triennial conference in the Netherlands because SARS‑CoV‑2 made flying too risky.
  • In 2003, China covered up the early spread of SARS, allowing the new disease to gain a foothold, and in 2020, history repeated itself. The Chinese government downplayed the possibility that SARS‑CoV‑2 was spreading among humans, and only confirmed as much on January 20, after millions had traveled around the country for the lunar new year. Doctors who tried to raise the alarm were censured and threatened. One, Li Wenliang, later died of COVID‑19. The World Health Organization initially parroted China’s line and did not declare a public-health emergency of international concern until January 30. By then, an estimated 10,000 people in 20 countries had been infected, and the virus was spreading fast.
  • it found a nation through which it could spread easily, without being detected
  • “By early February, we should have triggered a series of actions, precisely zero of which were taken.”
  • Even after warnings reached the U.S., they fell on the wrong ears. Since before his election, Trump has cavalierly dismissed expertise and evidence. He filled his administration with inexperienced newcomers, while depicting career civil servants as part of a “deep state.” In 2018, he dismantled an office that had been assembled specifically to prepare for nascent pandemics. American intelligence agencies warned about the coronavirus threat in January, but Trump habitually disregards intelligence briefings. The secretary of health and human services, Alex Azar, offered similar counsel, and was twice ignored.
  • countries “rely on bans to the exclusion of the things they actually need to do—testing, tracing, building up the health system,”
  • genetic evidence shows that the specific viruses that triggered the first big outbreaks, in Washington State, didn’t land until mid-February. The country could have used that time to prepare. Instead, Trump, who had spent his entire presidency learning that he could say whatever he wanted without consequence, assured Americans that “the coronavirus is very much under control,” and “like a miracle, it will disappear.” With impunity, Trump lied. With impunity, the virus spread.
  • A study showed that the U.S. could have averted 36,000 COVID‑19 deaths if leaders had enacted social-distancing measures just a week earlier. But better late than never: By collectively reducing the spread of the virus, America flattened the curve. Ventilators didn’t run out, as they had in parts of Italy. Hospitals had time to add extra beds.
  • Tests were in such short supply, and the criteria for getting them were so laughably stringent, that by the end of February, tens of thousands of Americans had likely been infected but only hundreds had been tested.
  • Sabeti’s lab developed a diagnostic test in mid-January and sent it to colleagues in Nigeria, Sierra Leone, and Senegal. “We had working diagnostics in those countries well before we did in any U.S. states,”
  • In response to the global energy crisis of the 1970s, architects made structures more energy-efficient by sealing them off from outdoor air, reducing ventilation rates. Pollutants and pathogens built up indoors, “ushering in the era of ‘sick buildings,’ ” says Joseph Allen, who studies environmental health at Harvard’s T. H. Chan School of Public Health. Energy efficiency is a pillar of modern climate policy, but there are ways to achieve it without sacrificing well-being. “We lost our way over the years and stopped designing buildings for people,”
  • The indoor spaces in which Americans spend 87 percent of their time became staging grounds for super-spreading events. One study showed that the odds of catching the virus from an infected person are roughly 19 times higher indoors than in open air. Shielded from the elements and among crowds clustered in prolonged proximity, the coronavirus ran rampant in the conference rooms of a Boston hotel, the cabins of the Diamond Princess cruise ship, and a church hall in Washington State where a choir practiced for just a few hours.
  • Between harsher punishments doled out in the War on Drugs and a tough-on-crime mindset that prizes retribution over rehabilitation, America’s incarcerated population has swelled sevenfold since the 1970s, to about 2.3 million. The U.S. imprisons five to 18 times more people per capita than other Western democracies. Many American prisons are packed beyond capacity, making social distancing impossible. Soap is often scarce. Inevitably, the coronavirus ran amok. By June, two American prisons each accounted for more cases than all of New Zealand. One, Marion Correctional Institution, in Ohio, had more than 2,000 cases among inmates despite having a capacity of 1,500.
  • America’s nursing homes and long-term-care facilities house less than 1 percent of its people, but as of mid-June, they accounted for 40 percent of its coronavirus deaths. More than 50,000 residents and staff have died. At least 250,000 more have been infected. These grim figures are a reflection not just of the greater harms that COVID‑19 inflicts upon elderly physiology, but also of the care the elderly receive. Before the pandemic, three in four nursing homes were understaffed, and four in five had recently been cited for failures in infection control. The Trump administration’s policies have exacerbated the problem by reducing the influx of immigrants, who make up a quarter of long-term caregivers.
  • the Department of Health and Human Services paused nursing-home inspections in March, passing the buck to the states. Some nursing homes avoided the virus because their owners immediately stopped visitations, or paid caregivers to live on-site. But in others, staff stopped working, scared about infecting their charges or becoming infected themselves. In some cases, residents had to be evacuated because no one showed up to care for them.
  • its problematic attitude toward health: “Get hospitals ready and wait for sick people to show,” as Sheila Davis, the CEO of the nonprofit Partners in Health, puts it. “Especially in the beginning, we catered our entire [COVID‑19] response to the 20 percent of people who required hospitalization, rather than preventing transmission in the community.” The latter is the job of the public-health system, which prevents sickness in populations instead of merely treating it in individuals. That system pairs uneasily with a national temperament that views health as a matter of personal responsibility rather than a collective good.
  • “As public health did its job, it became a target” of budget cuts,
  • Today, the U.S. spends just 2.5 percent of its gigantic health-care budget on public health. Underfunded health departments were already struggling to deal with opioid addiction, climbing obesity rates, contaminated water, and easily preventable diseases. Last year saw the most measles cases since 1992. In 2018, the U.S. had 115,000 cases of syphilis and 580,000 cases of gonorrhea—numbers not seen in almost three decades. It has 1.7 million cases of chlamydia, the highest number ever recorded.
  • In May, Maryland Governor Larry Hogan asserted that his state would soon have enough people to trace 10,000 contacts every day. Last year, as Ebola tore through the Democratic Republic of Congo—a country with a quarter of Maryland’s wealth and an active war zone—local health workers and the WHO traced twice as many people.
  • Compared with the average wealthy nation, America spends nearly twice as much of its national wealth on health care, about a quarter of which is wasted on inefficient care, unnecessary treatments, and administrative chicanery. The U.S. gets little bang for its exorbitant buck. It has the lowest life-expectancy rate of comparable countries, the highest rates of chronic disease, and the fewest doctors per person. This profit-driven system has scant incentive to invest in spare beds, stockpiled supplies, peacetime drills, and layered contingency plans—the essence of pandemic preparedness. America’s hospitals have been pruned and stretched by market forces to run close to full capacity, with little ability to adapt in a crisis.
  • “We’re designed for discrete disasters” like mass shootings, traffic pileups, and hurricanes, says Esther Choo, an emergency physician at Oregon Health and Science University. The COVID‑19 pandemic is not a discrete disaster. It is a 50-state catastrophe that will likely continue at least until a vaccine is ready.
  • American hospitals operate on a just-in-time economy. They acquire the goods they need in the moment through labyrinthine supply chains that wrap around the world in tangled lines, from countries with cheap labor to richer nations like the U.S. The lines are invisible until they snap. About half of the world’s face masks, for example, are made in China, some of them in Hubei province. When that region became the pandemic epicenter, the mask supply shriveled just as global demand spiked. The Trump administration turned to a larder of medical supplies called the Strategic National Stockpile, only to find that the 100 million respirators and masks that had been dispersed during the 2009 flu pandemic were never replaced. Just 13 million respirators were left.
  • The supply of nasopharyngeal swabs that are used in every diagnostic test also ran low, because one of the largest manufacturers is based in Lombardy, Italy—initially the COVID‑19 capital of Europe. About 40 percent of critical-care drugs, including antibiotics and painkillers, became scarce because they depend on manufacturing lines that begin in China and India. Once a vaccine is ready, there might not be enough vials to put it in, because of the long-running global shortage of medical-grade glass—literally, a bottle-neck bottleneck.
  • As usual, health care was a matter of capitalism and connections. In New York, rich hospitals bought their way out of their protective-equipment shortfall, while neighbors in poorer, more diverse parts of the city rationed their supplies.
  • Travel bans make intuitive sense, because travel obviously enables the spread of a virus. But in practice, travel bans are woefully inefficient at restricting either travel or viruses. They prompt people to seek indirect routes via third-party countries, or to deliberately hide their symptoms. They are often porous: Trump’s included numerous exceptions, and allowed tens of thousands of people to enter from China. Ironically, they create travel: When Trump later announced a ban on flights from continental Europe, a surge of travelers packed America’s airports in a rush to beat the incoming restrictions. Travel bans may sometimes work for remote island nations, but in general they can only delay the spread of an epidemic—not stop it.
  • the indiscriminate lockdown was necessary only because America’s leaders wasted months of prep time. Deploying this blunt policy instrument came at enormous cost. Unemployment rose to 14.7 percent, the highest level since record-keeping began, in 1948. More than 26 million people lost their jobs, a catastrophe in a country that—uniquely and absurdly—ties health care to employment
  • In the middle of the greatest health and economic crises in generations, millions of Americans have found themselves disconnected from medical care and impoverished. They join the millions who have always lived that way.
  • Elderly people, already pushed to the fringes of society, were treated as acceptable losses. Women were more likely to lose jobs than men, and also shouldered extra burdens of child care and domestic work, while facing rising rates of domestic violence. In half of the states, people with dementia and intellectual disabilities faced policies that threatened to deny them access to lifesaving ventilators. Thousands of people endured months of COVID‑19 symptoms that resembled those of chronic postviral illnesses, only to be told that their devastating symptoms were in their head. Latinos were three times as likely to be infected as white people. Asian Americans faced racist abuse. Far from being a “great equalizer,” the pandemic fell unevenly upon the U.S., taking advantage of injustices that had been brewing throughout the nation’s history.
  • Of the 3.1 million Americans who still cannot afford health insurance in states where Medicaid has not been expanded, more than half are people of color, and 30 percent are Black.* This is no accident. In the decades after the Civil War, the white leaders of former slave states deliberately withheld health care from Black Americans, apportioning medicine more according to the logic of Jim Crow than Hippocrates. They built hospitals away from Black communities, segregated Black patients into separate wings, and blocked Black students from medical school. In the 20th century, they helped construct America’s system of private, employer-based insurance, which has kept many Black people from receiving adequate medical treatment. They fought every attempt to improve Black people’s access to health care, from the creation of Medicare and Medicaid in the ’60s to the passage of the Affordable Care Act in 2010.
  • A number of former slave states also have among the lowest investments in public health, the lowest quality of medical care, the highest proportions of Black citizens, and the greatest racial divides in health outcomes
  • As of early July, one in every 1,450 Black Americans had died from COVID‑19—a rate more than twice that of white Americans. That figure is both tragic and wholly expected given the mountain of medical disadvantages that Black people face
  • Native Americans were similarly vulnerable. A third of the people in the Navajo Nation can’t easily wash their hands, because they’ve been embroiled in long-running negotiations over the rights to the water on their own lands. Those with water must contend with runoff from uranium mines. Most live in cramped multigenerational homes, far from the few hospitals that service a 17-million-acre reservation. As of mid-May, the Navajo Nation had higher rates of COVID‑19 infections than any U.S. state.
  • Americans often misperceive historical inequities as personal failures
  • the largely unregulated, social-media-based communications infrastructure of the 21st century almost ensures that misinformation will proliferate fast. “In every outbreak throughout the existence of social media, from Zika to Ebola, conspiratorial communities immediately spread their content about how it’s all caused by some government or pharmaceutical company or Bill Gates,”
  • Rumors coursed through online platforms that are designed to keep users engaged, even if that means feeding them content that is polarizing or untrue. In a national crisis, when people need to act in concert, this is calamitous. “The social internet as a system is broken,” DiResta told me, and its faults are readily abused.
  • Like pandemics, infodemics quickly become uncontrollable unless caught early.
  • In 2016, when DiResta spoke with a CDC team about the threat of misinformation, “their response was: ‘ That’s interesting, but that’s just stuff that happens on the internet.’ ”
  • The WHO, the CDC, and the U.S. surgeon general urged people not to wear masks, hoping to preserve the limited stocks for health-care workers. These messages were offered without nuance or acknowledgement of uncertainty, so when they were reversed—the virus is worse than the flu; wear masks—the changes seemed like befuddling flip-flops.
  • the United States underperformed across the board, and its errors compounded. The dearth of tests allowed unconfirmed cases to create still more cases, which flooded the hospitals, which ran out of masks, which are necessary to limit the virus’s spread. Twitter amplified Trump’s misleading messages, which raised fear and anxiety among people, which led them to spend more time scouring for information on Twitter.
  • By tying career advancement to the publishing of papers, academia already creates incentives for scientists to do attention-grabbing but irreproducible work. The pandemic strengthened those incentives by prompting a rush of panicked research and promising ambitious scientists global attention.
  • In March, a small and severely flawed French study suggested that the antimalarial drug hydroxychloroquine could treat COVID‑19. Published in a minor journal, it likely would have been ignored a decade ago. But in 2020, it wended its way to Donald Trump via a chain of credulity that included Fox News, Elon Musk, and Dr. Oz. Trump spent months touting the drug as a miracle cure despite mounting evidence to the contrary, causing shortages for people who actually needed it to treat lupus and rheumatoid arthritis. The hydroxychloroquine story was muddied even further by a study published in a top medical journal, The Lancet, that claimed the drug was not effective and was potentially harmful. The paper relied on suspect data from a small analytics company called Surgisphere, and was retracted in June.**
  • Science famously self-corrects. But during the pandemic, the same urgent pace that has produced valuable knowledge at record speed has also sent sloppy claims around the world before anyone could even raise a skeptical eyebrow.
  • No one should be shocked that a liar who has made almost 20,000 false or misleading claims during his presidency would lie about whether the U.S. had the pandemic under control; that a racist who gave birth to birtherism would do little to stop a virus that was disproportionately killing Black people; that a xenophobe who presided over the creation of new immigrant-detention centers would order meatpacking plants with a substantial immigrant workforce to remain open; that a cruel man devoid of empathy would fail to calm fearful citizens; that a narcissist who cannot stand to be upstaged would refuse to tap the deep well of experts at his disposal; that a scion of nepotism would hand control of a shadow coronavirus task force to his unqualified son-in-law; that an armchair polymath would claim to have a “natural ability” at medicine and display it by wondering out loud about the curative potential of injecting disinfectant; that an egotist incapable of admitting failure would try to distract from his greatest one by blaming China, defunding the WHO, and promoting miracle drugs; or that a president who has been shielded by his party from any shred of accountability would say, when asked about the lack of testing, “I don’t take any responsibility at all.”
  • Trump is a comorbidity of the COVID‑19 pandemic. He isn’t solely responsible for America’s fiasco, but he is central to it. A pandemic demands the coordinated efforts of dozens of agencies. “In the best circumstances, it’s hard to make the bureaucracy move quickly,” Ron Klain said. “It moves if the president stands on a table and says, ‘Move quickly.’ But it really doesn’t move if he’s sitting at his desk saying it’s not a big deal.”
  • everyday Americans did more than the White House. By voluntarily agreeing to months of social distancing, they bought the country time, at substantial cost to their financial and mental well-being. Their sacrifice came with an implicit social contract—that the government would use the valuable time to mobilize an extraordinary, energetic effort to suppress the virus, as did the likes of Germany and Singapore. But the government did not, to the bafflement of health experts. “There are instances in history where humanity has really moved mountains to defeat infectious diseases,” says Caitlin Rivers, an epidemiologist at the Johns Hopkins Center for Health Security. “It’s appalling that we in the U.S. have not summoned that energy around COVID‑19.”
  • People suffered all the debilitating effects of a lockdown with few of the benefits. Most states felt compelled to reopen without accruing enough tests or contact tracers. In April and May, the nation was stuck on a terrible plateau, averaging 20,000 to 30,000 new cases every day. In June, the plateau again became an upward slope, soaring to record-breaking heights.
  • It is no coincidence that other powerful nations that elected populist leaders—Brazil, Russia, India, and the United Kingdom—also fumbled their response to COVID‑19. “When you have people elected based on undermining trust in the government, what happens when trust is what you need the most?”
  • Drawn to novelty, journalists gave oxygen to fringe anti-lockdown protests while most Americans quietly stayed home. They wrote up every incremental scientific claim, even those that hadn’t been verified or peer-reviewed.
  • The virus was never beaten in the spring, but many people, including Trump, pretended that it was. Every state reopened to varying degrees, and many subsequently saw record numbers of cases. After Arizona’s cases started climbing sharply at the end of May, Cara Christ, the director of the state’s health-services department, said, “We are not going to be able to stop the spread. And so we can’t stop living as well.” The virus may beg to differ.
  • The long wait for a vaccine will likely culminate in a predictable way: Many Americans will refuse to get it, and among those who want it, the most vulnerable will be last in line.
  • It is almost unheard-of for a public-health measure to go from zero to majority acceptance in less than half a year. But pandemics are rare situations when “people are desperate for guidelines and rules,” says Zoë McLaren, a health-policy professor at the University of Maryland at Baltimore County. The closest analogy is pregnancy, she says, which is “a time when women’s lives are changing, and they can absorb a ton of information. A pandemic is similar: People are actually paying attention, and learning.”
  • As the economy nose-dived, the health-care system ailed, and the government fumbled, belief in American exceptionalism declined. “Times of big social disruption call into question things we thought were normal and standard,” Redbird told me. “If our institutions fail us here, in what ways are they failing elsewhere?” And whom are they failing the most?
  • It is hard to stare directly at the biggest problems of our age. Pandemics, climate change, the sixth extinction of wildlife, food and water shortages—their scope is planetary, and their stakes are overwhelming. We have no choice, though, but to grapple with them. It is now abundantly clear what happens when global disasters collide with historical negligence.
  • America would be wise to help reverse the ruination of the natural world, a process that continues to shunt animal diseases into human bodies. It should strive to prevent sickness instead of profiting from it. It should build a health-care system that prizes resilience over brittle efficiency, and an information system that favors light over heat. It should rebuild its international alliances, its social safety net, and its trust in empiricism. It should address the health inequities that flow from its history. Not least, it should elect leaders with sound judgment, high character, and respect for science, logic, and reason.
Ed Webb

Secret British 'black propaganda' campaign targeted cold war enemies | Cold war | The G... - 0 views

  • The British government ran a secret “black propaganda” campaign for decades, targeting Africa, the Middle East and parts of Asia with leaflets and reports from fake sources aimed at destabilising cold war enemies by encouraging racial tensions, sowing chaos, inciting violence and reinforcing anti-communist ideas, newly declassified documents have revealed.
  • The campaign also sought to mobilise Muslims against Moscow, promoting greater religious conservatism and radical ideas. To appear authentic, documents encouraged hatred of Israel.
  • The Information Research Department (IRD) was set up by the post-second world war Labour government to counter Soviet propaganda attacks on Britain. Its activities mirrored the CIA’s cold war propaganda operations and the extensive efforts of the USSR and its satellites.
  • ...12 more annotations...
  • The Observer last year revealed the IRD’s major campaign in Indonesia in 1965 that helped encourage anti-communist massacres which left hundreds of thousands dead. There, the IRD prepared pamphlets purporting to be written by Indonesian patriots, but in fact were created by British propagandists, calling on Indonesians to eliminate the PKI, then the biggest communist party in the non-communist world.
  • “The UK did not simply invent material, as the Soviets systematically did, but they definitely intended to deceive audiences in order to get the message across.”
  • “reports” sent to warn other governments, selected journalists and thinktanks about “Soviet subversion” or similar threats.The reports comprised carefully selected facts and analysis often gleaned from intelligence provided by Britain’s security services, but appeared to come from ostensibly independent analysts and institutions that were in reality set up and run by the IRD. One of the first of these, set up in 1964, was the International Committee for the Investigation of Communist Front Organisations.
  • In early 1963, the IRD forged a statement from the World Federation of Democratic Youth, a Soviet front organisation, which denounced Africans as uncivilised, “primitive” and morally weak. The forgery received press coverage across the continent, with many newspapers reacting intemperately.
  • The IRD also forged literature purporting to come from the Muslim Brotherhood, a mass Islamist organisation that had a significant following across the Middle East. One pamphlet accused Moscow of encouraging the 1967 war, criticised the quality of Soviet military equipment, and called the Soviets “filthy-tongued atheists” who saw the Egyptians as little more than “peasants who lived all their lives nursing reactionary Islamic superstitions”.AdvertisementThe IRD also created an entirely fictive radical Islamist organisation called the League of Believers, which attacked the Russians as non-believers and blamed Arab defeats on a lack of religious faith, a standard trope among religious conservatives at the time.
  • The IRD’s leaflets echoed other claims made by radical Islamists, arguing that military misdeeds should not be blamed on “the atheists or the imperialists or the Zionist Jews” but on “Egyptians who are supposed to be believers”.
  • Other material highlighted the poor view that Moscow took of the Palestine Liberation Organisation and the limited aid offered by the Soviets to Palestinian armed nationalist groups. This was contrasted with the more supportive stance of the Chinese, in a bid to widen the split between the two communist powers.
  • One major initiative focused on undermining Ian Smith’s regime in Rhodesia, the former colony that unilaterally declared its independence from the UK in 1965 in an attempt to maintain white minority rule.The IRD set up a fake group of white Rhodesians who opposed Smith. Its leaflets attacked him for lying, creating “chaos” and crippling the economy. “The whole world is against us … We must call a halt while we can still save our country,”
  • Between 1965 and 1972, the IRD forged at least 11 statements from Novosti, the Soviet state-run news agency. One followed Egypt’s defeat in the 1967 six-day war against Israel and underlined Soviet anger at Egypt’s “waste” of so much of the arms and materiel Moscow had supplied to the country.
  • A similar forgery in 1966 underlined the “backwardness” and “political immaturity” of Africa. Another, a statement purportedly from Novosti, blamed poor academic results at an international university in Moscow on the quality of the black African students enrolled there. The IRD sent more than 1,000 copies to addresses across the developing world.
  • As with most such efforts, the impact of the IRD’s campaigns was often difficult to judge. On one occasion, IRD officials were able to report that a newspaper in Zanzibar printed one of their forgeries about Soviet racism, and that the publication prompted an angry response. This was seen as a major achievement. Officials were also pleased when Kenyan press used fake material about the 1967 six-day war, and when newspapers across much of the Islamic world printed a fake Novosti bulletin on the conflict. Occasionally, western newspapers unwittingly used IRD materials, too.
  • Though the IRD was shut down in 1977, researchers are now finding evidence that similar efforts continued for almost another decade.“The [new documents] are particularly significant as a precursor to more modern efforts of putting intelligence into the public domain.“Liz Truss has a ’government information cell’, and defence intelligence sends out daily tweets to ‘pre-but’ Russian plots and gain the upper hand in the information war, but for much of the cold war the UK used far more devious means,” Cormac said.
Ed Webb

How Many Guns Did the U.S. Lose Track of in Iraq and Afghanistan? Hundreds of Thousands... - 0 views

  • In all, Overton found, the Pentagon provided more than 1.45 million firearms to various security forces in Afghanistan and Iraq, including more than 978,000 assault rifles, 266,000 pistols and almost 112,000 machine guns. These transfers formed a collage of firearms of mixed vintage and type: Kalashnikov assault rifles left over from the Cold War; recently manufactured NATO-standard M16s and M4s from American factories; machine guns of Russian and Western lineage; and sniper rifles, shotguns and pistols of varied provenance and caliber, including a large order of Glock semiautomatic pistols, a type of weapon also regularly offered for sale online in Iraq. Advertisement Continue reading the main story Many of the recipients of these weapons became brave and important battlefield allies. But many more did not. Taken together, the weapons were part of a vast and sometimes minimally supervised flow of arms from a superpower to armies and militias often compromised by poor training, desertion, corruption and patterns of human rights abuses. Knowing what we know about many of these forces, it would have been remarkable for them to retain custody of many of their weapons. It is not surprising that they did not.
  • the Pentagon said it has records for fewer than half the number of firearms in the researchers’ count — about 700,000 in all
  • Overton’s analysis also does not account for many weapons issued by the American military to local forces by other means, including the reissue of captured weapons, which was a common and largely undocumented practice.
  • ...10 more annotations...
  • One point is inarguable: Many of these weapons did not remain long in government possession after arriving in their respective countries. In one of many examples, a 2007 Government Accountability Office report found that 110,000 Kalashnikov assault rifles and 80,000 pistols bought by the United States for Iraq’s security forces could not be accounted for — more than one firearm for every member of the entire American military force in Iraq at any time during the war. Those documented lapses of accountability were before entire Iraqi divisions simply vanished from the battlefield, as four of them did after the Islamic State seized Mosul and Tikrit in 2014, according to a 2015 Army budget request to buy more firearms for the Iraqi forces to replace what was lost.
  • According to its tally, the American military issued contracts potentially worth more than $40 billion for firearms, accessories and ammunition since Sept. 11, including improvements to the ammunition plants required to keep the cartridge production going. Most of these planned expenditures were for American forces, and the particulars tell the story of two wars that did not go as pitched. More than $4 billion worth of contracts was issued for small arms, including pistols, machines guns, assault rifles and sniper rifles, and more than $11 billion worth was issued for associated equipment, from spare machine-gun barrels to sniper-rifle scopes, according to Overton’s count. A much larger amount — nearly $25 billion — was issued for ammunition or upgrades to ammunition plants to keep those firearms supplied. That last figure aligns with what most any veteran of ground combat in Iraq and Afghanistan could tell you — American troops have been involved in a dizzying number of gunfights since 2001, burning through mountains of ammunition along the way.
  • In April, after being approached by The New York Times and reviewing data from Armament Research Services, a private arms-investigation consultancy, Facebook closed many pages in the Middle East that were serving as busy arms bazaars, including pages in Syria and Iraq on which firearms with Pentagon origins accounted for a large fraction of the visible trade
  • The American arming of Syrian rebels, by both the Central Intelligence Agency and the Defense Department, has also been troubled by questions of accountability and outright theft in a war where the battlefield is thick with jihadists aligned with Al Qaeda or fighting under the banner of the Islamic State.
  • many new arms-trading Facebook pages have since cropped up, including, according to their own descriptions, virtual markets operating from Baghdad and Karbala
  • The data show large purchases of heavy-machine guns and barrels. This is a wink at the shift in many American units from being foot-mobile to vehicular, as grunts buttoned up within armored trucks and needed turret-mounted firepower to defend themselves — a matériel adaptation forced by ambushes and improvised bombs, the cheaply made weapons that wearied the most expensive military in the world.
  • a startlingly risky aspect of the Pentagon’s arming of local forces with infantry arms: the wide distribution of anti-armor weapons, including RPG-7s, commonly called rocket-propelled grenades, and recoilless weapons, including the SPG-9. Each of these systems fires high-explosive (and often armor-piercing) projectiles, and each was commonly used by insurgents in attacks. After the opening weeks of each war, the only armor on either battlefield was American or associated with allied and local government units, which made the Pentagon’s practice of providing anti-armor weapons to Afghan and Iraqi security forces puzzling. Why would they need anti-armor weapons when they had no armor to fight? All the while rockets were somehow mysteriously being fired at American convoys and patrols in each war.
  • a portrait of the Pentagon’s bungling the already-awkward role it chose for itself — that of state-building arms dealer, a role that routinely led to missions in clear opposition to each other. While fighting two rapidly evolving wars, the American military tried to create and bolster new democracies, governments and political classes; recruit, train and equip security and intelligence forces on short schedule and at outsize scale; repair and secure transportation infrastructure; encourage the spread or restoration of the legal industry and public services; and leave behind something more palatable and sturdy than rule by thugs.
  • The procession of arms purchases and handouts has continued to this day, with others involved, including Iran to its allies in Iraq and various donors to Kurdish fighters. In March, Russia announced that it had given 10,000 Kalashnikov assault rifles to Afghanistan, already one of the most Kalashnikov-saturated places on earth. If an analysis from the United States’ Special Inspector General for Afghanistan Reconstruction, or Sigar, is to be believed, Afghanistan did not even need them. In 2014 the inspector general reported that after the United States decided to replace the Afghan Army’s Kalashnikovs with NATO-standard weapons (a boon for the rifles’ manufacturer with a much less obvious value for an already amply armed Afghan force), the Afghan Army ended up with a surplus of more than 83,000 Kalashnikovs. The United States never tried to recover the excess it had created, giving the inspector general’s office grounds for long-term worry. “Without confidence in the Afghan government’s ability to account for or properly dispose of these weapons,” it noted, “Sigar is concerned that they could be obtained by insurgents and pose additional risks to civilians.” Write A Comment
  • What to do? If past is precedent, given enough time one of the United States’ solutions will be, once again, to ship in more guns.
Ed Webb

Iran Non Proliferation Overshadowed.pdf - 2 views

shared by Ed Webb on 21 Nov 16 - No Cached
  • The tools that succeeded beyond all other non-military means in chang-ing Iran’s behaviour were the sanctions this deal abolishes. The innovation of those sanctions was that they were not only aimed at states proliferating to Iran, or designed to apply after an Iranian nuclear test. They targeted Iran’s crown jewels of oil and other natural resources
  • The heart of the deal is the abolition of sanctions in exchange for extend-ing Iran’s breakout time (the length of time it would take to produce material for a nuclear weapon) for a limited period. A better approach would have kept Iran at the table for years, with progressive waiving of sanctions and a corresponding continuation of limits Iran had agreed to extend a number of timesalready
  • The sanctions that now remain will not be effective in changing Iran’s behaviour. Iran will be more able to engage in normal arms, nuclear and dual-use technology trade even while it continues its regional military campaigns, and ballistic- and cruise-missile programmes
  • ...8 more annotations...
  • That does not mean we have to either capitulate or bomb Iran.
  • all states intent on acquiring nuclear weapons, when caught, usually hold capability and bargain with it
  • The deal’s primary concession is to permit Iran to have a national uranium-enrichment capability, which the JCPOA will allow to grow over time. Iran will never have been forced to abandon enrichment
  • Iran will add hundreds more significant quantities (bombs’ worth) of unseparated plutonium, annu-ally, to the global stockpile of spent fuel. For now, most of that spent fuelwill return to Russia, but reprocessing, while easier to detect than enrichment, is not barred by the NPT – and Russia is no longer a reliable international partner for the West.
  • access to military sites rests on voluntary agreements.
  • blithe assertions of the United States’ (or another intel-ligence community’s) ability to detect violations ignore the fact that acting on information gained from covert or national-technical means relies on the credibility of the nation declassifying and leaking intelligence. As such, this information is prone to multilateral challenge from states that did not share in its collection. The United States attempted this kind of counter-prolifera-tion with flawed intelligence about Iraq, and failed to convince
  • the deal’s sequencing and mixing of voluntary and binding measures risks encouraging proliferation, in Iran and elsewhere in the region
  • the deal has produced uncertainty whether or not it is actually implemented
Ed Webb

Iran A Good Deal.pdf - 2 views

  • the verifi-cation procedures of the JCPOA are tighter than the safeguards provided for in the Additional Protocol. The constraints and obligations Iran accepts under the deal also go beyond the Nuclear Non-Proliferation Treaty (NPT).
  • to demand a return to the opening-gambit US provi-sions and to impose other conditions is to engage in fantasy. There has long ceased to be any possibility that Iran would give up its enrichment pro-gramme altogether
  • once it was agreed by eight parties after two years of negotiations, it is now the only deal possible
  • ...6 more annotations...
  • Nor will other countries meekly accept a return to imposing tough sanctions at America’s beck and call if Washington undermines the deal that European allies worked so hard to reach.
  • Iran’s commitments under that temporary arrangement would fall away if the JCPOA were killed. Iran would be free to resume where it left off two years ago. Only this time the US would have very few partners willing to impose the tough sanctions that compelled the serious negotiations of the past two years
  • a major breakthrough for the nuclear non-proliferation regime, which to date has never explicitly granted the International Atomic Energy Agency (IAEA) the right to verify nuclear weaponisation work that does not involve nuclear materials
  • Perfect accuracy of intelligence cannot be guaranteed, of course, but Iran would have to assume that any significant cheating on its part would very likely be quickly observed. If so detected, the US and its allies will not give up any of the options they now possess to compel compliance. In fact, such options will be more robust in the latter years of the Iran deal because the technology for military options such as bunker-busting bombs will likely improve, as will the intelligence picture on Iran’s activities.
  • it buys 15 or more years of certified non-nuclear status – and the reassurance of not having to resort to war to stop the programme
  • the suggestion that it might abet regional adventurism. That is an open question; Iran’s behaviour might get worse, especially in the near term, but the deal also offers prospects for it getting better.
Ed Webb

Living With Nuclear Outliers - www.nytimes.com - Readability - 0 views

  • The regimes in North Korea and Iran perceive integration into an international community whose dominant power is the United States as a threat to their survival. Integration might yield short-term regime-sustaining economic benefits, but it carries the risk of regime-terminating political contagion.
  • Pyongyang and Tehran seized on NATO’s 2011 intervention in Libya as evidence that Qaddafi had been duped by the West. Essentially, by taking down regimes in Iraq and Libya, Washington priced itself out of the security assurance market in Pyongyang and Tehran
  • The trouble is that “containment” as a strategy is increasingly denounced by hard-liners in the U.S. policy debate as tantamount to appeasement, reducing the administration’s political space
  • ...3 more annotations...
  • the case for a military strike on Iran’s nuclear program rests on an assessment that the theocratic regime is undeterrable and apocalyptic. But that presumption runs contrary to National Intelligence Estimates, which have characterized the clerical regime’s decision-making as being “guided by a cost-benefit approach.” And U.S. intelligence analysts maintain that Iran has not yet decided to cross the threshold from a potential capability to an actual weapon
  • So long as Iran and North Korea see integration into the international community as a threat to their survival, and so long as they lack any long-term alternative for their economies, they will continue to use their nuclear programs and the ambiguities they generate as a proxy for relations with the world
  • Washington, for its part, does not have the option of changing their regimes or compelling their integration by force. And there is no telling how long their regimes will last
Leah Silver

Iran's president rejects Obama accusations about nuclear efforts - CNN.com - 0 views

  •  
    President Obama's accusations that Iran's nuclear program runs afoul of international agreements are "baseless," the Islamic republic's president told CNN's Larry King on Friday."> text/html; charset=iso-8859-1
Ed Webb

The Blast Shack - 0 views

  • the sad and sordid days grind on and on; and that blindly potent machinery is just sitting there. Sitting there, tempting the user.
  • Bradley had to leak all over the third rail. Through historical circumstance, he’s become a miserable symbolic point-man for a global war on terror. He doesn’t much deserve that role. He’s got about as much to do with the political aspects of his war as Monica Lewinsky did with the lasting sexual mania that afflicts the American Republic.
  • That is so dispiriting and ugly. As a novelist, I never think of Monica Lewinsky, that once-everyday young woman, without a sense of dread at the freakish, occult fate that overtook her. Imagine what it must be like, to wake up being her, to face the inevitability of being That Woman. Monica, too, transgressed in apparent safety and then she had the utter foolishness to brag to a lethal enemy, a trusted confidante who ran a tape machine and who brought her a mediated circus of hells. The titillation of that massive, shattering scandal has faded now. But think of the quotidian daily horror of being Monica Lewinsky, and that should take a bite from the soul.
  • ...10 more annotations...
  • Bradley’s gonna become a “spy” whose “espionage” consisted of making the activities of a democratic government visible to its voting population. With the New York Times publishing the fruits of his misdeeds. Some set of American prosecutorial lawyers is confronting this crooked legal hairpin right now. I feel sorry for them.
  • the one-man global McDonald’s of leaks
  • While others stare in awe at Assange’s many otherworldly aspects — his hairstyle, his neatness, too-precise speech, his post-national life out of a laptop bag — I can recognize him as pure triple-A outsider geek. Man, I know a thousand modern weirdos like that, and every single one of them seems to be on my Twitter stream screaming support for Assange because they can recognize him as a brother and a class ally. They are in holy awe of him because, for the first time, their mostly-imaginary and lastingly resentful underclass has landed a serious blow in a public arena. Julian Assange has hacked a superpower.
  • The one grand certainty about the consumers of Cablegate is that diplomats are gonna be reading those stolen cables. Not hackers: diplomats. Hackers bore easily, and they won’t be able to stand the discourse of intelligent trained professionals discussing real-life foreign affairs. American diplomats are gonna read those stolen cables, though, because they were supposed to read them anyway, even though they didn’t. Now, they’ve got to read them, with great care, because they might get blindsided otherwise by some wisecrack that they typed up years ago. And, of course, every intelligence agency and every diplomat from every non-American agency on Earth is gonna fire up computers and pore over those things. To see what American diplomacy really thought about them, or to see if they were ignored (which is worse), and to see how the grownups ran what was basically a foreign-service news agency that the rest of us were always forbidden to see. This stark fact makes them all into hackers. Yes, just like Julian. They’re all indebted to Julian for this grim thing that he did, and as they sit there hunched over their keyboards, drooling over their stolen goodies, they’re all, without exception, implicated in his doings. Assange is never gonna become a diplomat, but he’s arranged it so that diplomats henceforth are gonna be a whole lot more like Assange. They’ll behave just like him. They receive the goods just like he did, semi-surreptitiously. They may be wearing an ascot and striped pants, but they’ve got that hacker hunch in their necks and they’re staring into the glowing screen.
  • He’s a different, modern type of serious troublemaker. He’s certainly not a “terrorist,” because nobody is scared and no one got injured. He’s not a “spy,” because nobody spies by revealing the doings of a government to its own civil population. He is orthogonal. He’s asymmetrical. He panics people in power and he makes them look stupid. And I feel sorry for them. But sorrier for the rest of us. Julian Assange’s extremely weird version of dissident “living in truth” doesn’t bear much relationship to the way that public life has ever been arranged. It does, however, align very closely to what we’ve done to ourselves by inventing and spreading the Internet. If the Internet was walking around in public, it would look and act a lot like Julian Assange. The Internet is about his age, and it doesn’t have any more care for the delicacies of profit, propriety and hierarchy than he does.
  • It’s not just about him and the burning urge to punish him; it’s about the public risks to the reputation of the USA. They superpower hypocrisy here is gonna be hard to bear. The USA loves to read other people’s diplomatic cables. They dote on doing it. If Assange had happened to out the cable-library of some outlaw pariah state, say, Paraguay or North Korea, the US State Department would be heaping lilies at his feet. They’d be a little upset about his violation of the strict proprieties, but they’d also take keen satisfaction in the hilarious comeuppance of minor powers that shouldn’t be messing with computers, unlike the grandiose, high-tech USA. Unfortunately for the US State Department, they clearly shouldn’t have been messing with computers, either. In setting up their SIPRnet, they were trying to grab the advantages of rapid, silo-free, networked communication while preserving the hierarchical proprieties of official confidentiality. That’s the real issue, that’s the big modern problem; national governments and global computer networks don’t mix any more. It’s like trying to eat a very private birthday cake while also distributing it. That scheme is just not working. And that failure has a face now, and that’s Julian Assange.
  • Diplomats are people who speak from nation to nation. They personify nations, and nations are brutal, savage, feral entities. Diplomats used to have something in the way of an international community, until the Americans decided to unilaterally abandon that in pursuit of Bradley Manning’s oil war. Now nations are so badly off that they can’t even get it together to coherently tackle heroin, hydrogen bombs, global warming and financial collapse. Not to mention the Internet.
  • the American diplomatic corps, and all it thinks it represents, is just collateral damage between Assange and his goal. He aspires to his transparent crypto-utopia in the way George Bush aspired to imaginary weapons of mass destruction. And the American diplomatic corps are so many Iraqis in that crusade. They’re the civilian casualties.
  • It’s the damage to the institutions that is spooky and disheartening; after the Lewinsky eruption, every American politician lives in permanent terror of a sex-outing. That’s “transparency,” too; it’s the kind of ghastly sex-transparency that Julian himself is stuck crotch-deep in. The politics of personal destruction hasn’t made the Americans into a frank and erotically cheerful people. On the contrary, the US today is like some creepy house of incest divided against itself in a civil cold war. “Transparency” can have nasty aspects; obvious, yet denied; spoken, but spoken in whispers. Very Edgar Allen Poe.
  • This knotty situation is not gonna “blow over,” because it’s been building since 1993 and maybe even 1947. “Transparency” and “discretion” are virtues, but they are virtues that clash. The international order and the global Internet are not best pals.
Ed Webb

The Digital Maginot Line - 0 views

  • The Information World War has already been going on for several years. We called the opening skirmishes “media manipulation” and “hoaxes”, assuming that we were dealing with ideological pranksters doing it for the lulz (and that lulz were harmless). In reality, the combatants are professional, state-employed cyberwarriors and seasoned amateur guerrillas pursuing very well-defined objectives with military precision and specialized tools. Each type of combatant brings a different mental model to the conflict, but uses the same set of tools.
  • There are also small but highly-skilled cadres of ideologically-motivated shitposters whose skill at information warfare is matched only by their fundamental incomprehension of the real damage they’re unleashing for lulz. A subset of these are conspiratorial — committed truthers who were previously limited to chatter on obscure message boards until social platform scaffolding and inadvertently-sociopathic algorithms facilitated their evolution into leaderless cults able to spread a gospel with ease.
  • There’s very little incentive not to try everything: this is a revolution that is being A/B tested.
  • ...17 more annotations...
  • The combatants view this as a Hobbesian information war of all against all and a tactical arms race; the other side sees it as a peacetime civil governance problem.
  • Information war combatants have certainly pursued regime change: there is reasonable suspicion that they succeeded in a few cases (Brexit) and clear indications of it in others (Duterte). They’ve targeted corporations and industries. And they’ve certainly gone after mores: social media became the main battleground for the culture wars years ago, and we now describe the unbridgeable gap between two polarized Americas using technological terms like filter bubble. But ultimately the information war is about territory — just not the geographic kind. In a warm information war, the human mind is the territory. If you aren’t a combatant, you are the territory. And once a combatant wins over a sufficient number of minds, they have the power to influence culture and society, policy and politics.
  • Cyberwar, most people thought, would be fought over infrastructure — armies of state-sponsored hackers and the occasional international crime syndicate infiltrating networks and exfiltrating secrets, or taking over critical systems. That’s what governments prepared and hired for; it’s what defense and intelligence agencies got good at. It’s what CSOs built their teams to handle. But as social platforms grew, acquiring standing audiences in the hundreds of millions and developing tools for precision targeting and viral amplification, a variety of malign actors simultaneously realized that there was another way. They could go straight for the people, easily and cheaply. And that’s because influence operations can, and do, impact public opinion. Adversaries can target corporate entities and transform the global power structure by manipulating civilians and exploiting human cognitive vulnerabilities at scale. Even actual hacks are increasingly done in service of influence operations: stolen, leaked emails, for example, were profoundly effective at shaping a national narrative in the U.S. election of 2016.
  • The substantial time and money spent on defense against critical-infrastructure hacks is one reason why poorly-resourced adversaries choose to pursue a cheap, easy, low-cost-of-failure psy-ops war instead
  • Our most technically-competent agencies are prevented from finding and countering influence operations because of the concern that they might inadvertently engage with real U.S. citizens as they target Russia’s digital illegals and ISIS’ recruiters. This capability gap is eminently exploitable; why execute a lengthy, costly, complex attack on the power grid when there is relatively no cost, in terms of dollars as well as consequences, to attack a society’s ability to operate with a shared epistemology? This leaves us in a terrible position, because there are so many more points of failure
  • This shift from targeting infrastructure to targeting the minds of civilians was predictable. Theorists  like Edward Bernays, Hannah Arendt, and Marshall McLuhan saw it coming decades ago. As early as 1970, McLuhan wrote, in Culture is our Business, “World War III is a guerrilla information war with no division between military and civilian participation.”
  • The 2014-2016 influence operation playbook went something like this: a group of digital combatants decided to push a specific narrative, something that fit a long-term narrative but also had a short-term news hook. They created content: sometimes a full blog post, sometimes a video, sometimes quick visual memes. The content was posted to platforms that offer discovery and amplification tools. The trolls then activated collections of bots and sockpuppets to blanket the biggest social networks with the content. Some of the fake accounts were disposable amplifiers, used mostly to create the illusion of popular consensus by boosting like and share counts. Others were highly backstopped personas run by real human beings, who developed standing audiences and long-term relationships with sympathetic influencers and media; those accounts were used for precision messaging with the goal of reaching the press. Israeli company Psy Group marketed precisely these services to the 2016 Trump Presidential campaign; as their sales brochure put it, “Reality is a Matter of Perception”.
  • If an operation is effective, the message will be pushed into the feeds of sympathetic real people who will amplify it themselves. If it goes viral or triggers a trending algorithm, it will be pushed into the feeds of a huge audience. Members of the media will cover it, reaching millions more. If the content is false or a hoax, perhaps there will be a subsequent correction article – it doesn’t matter, no one will pay attention to it.
  • Combatants are now focusing on infiltration rather than automation: leveraging real, ideologically-aligned people to inadvertently spread real, ideologically-aligned content instead. Hostile state intelligence services in particular are now increasingly adept at operating collections of human-operated precision personas, often called sockpuppets, or cyborgs, that will escape punishment under the the bot laws. They will simply work harder to ingratiate themselves with real American influencers, to join real American retweet rings. If combatants need to quickly spin up a digital mass movement, well-placed personas can rile up a sympathetic subreddit or Facebook Group populated by real people, hijacking a community in the way that parasites mobilize zombie armies.
  • Attempts to legislate away 2016 tactics primarily have the effect of triggering civil libertarians, giving them an opportunity to push the narrative that regulators just don’t understand technology, so any regulation is going to be a disaster.
  • The entities best suited to mitigate the threat of any given emerging tactic will always be the platforms themselves, because they can move fast when so inclined or incentivized. The problem is that many of the mitigation strategies advanced by the platforms are the information integrity version of greenwashing; they’re a kind of digital security theater, the TSA of information warfare
  • Algorithmic distribution systems will always be co-opted by the best resourced or most technologically capable combatants. Soon, better AI will rewrite the playbook yet again — perhaps the digital equivalent of  Blitzkrieg in its potential for capturing new territory. AI-generated audio and video deepfakes will erode trust in what we see with our own eyes, leaving us vulnerable both to faked content and to the discrediting of the actual truth by insinuation. Authenticity debates will commandeer media cycles, pushing us into an infinite loop of perpetually investigating basic facts. Chronic skepticism and the cognitive DDoS will increase polarization, leading to a consolidation of trust in distinct sets of right and left-wing authority figures – thought oligarchs speaking to entirely separate groups
  • platforms aren’t incentivized to engage in the profoundly complex arms race against the worst actors when they can simply point to transparency reports showing that they caught a fair number of the mediocre actors
  • What made democracies strong in the past — a strong commitment to free speech and the free exchange of ideas — makes them profoundly vulnerable in the era of democratized propaganda and rampant misinformation. We are (rightfully) concerned about silencing voices or communities. But our commitment to free expression makes us disproportionately vulnerable in the era of chronic, perpetual information war. Digital combatants know that once speech goes up, we are loathe to moderate it; to retain this asymmetric advantage, they push an all-or-nothing absolutist narrative that moderation is censorship, that spammy distribution tactics and algorithmic amplification are somehow part of the right to free speech.
  • We need an understanding of free speech that is hardened against the environment of a continuous warm war on a broken information ecosystem. We need to defend the fundamental value from itself becoming a prop in a malign narrative.
  • Unceasing information war is one of the defining threats of our day. This conflict is already ongoing, but (so far, in the United States) it’s largely bloodless and so we aren’t acknowledging it despite the huge consequences hanging in the balance. It is as real as the Cold War was in the 1960s, and the stakes are staggeringly high: the legitimacy of government, the persistence of societal cohesion, even our ability to respond to the impending climate crisis.
  • Influence operations exploit divisions in our society using vulnerabilities in our information ecosystem. We have to move away from treating this as a problem of giving people better facts, or stopping some Russian bots, and move towards thinking about it as an ongoing battle for the integrity of our information infrastructure – easily as critical as the integrity of our financial markets.
Ed Webb

Russian Mercenaries in Great-Power Competition: Strategic Supermen or Weak Link? | RAND - 0 views

  • Russia's worst-kept secret is its increasingly heavy reliance on private security contractors—really, mercenaries—to maintain a Russia-favorable global status quo and to undermine its competitors' interests. This reliance on mercenaries stems from a known capability gap
  • The employment of private forces within the spectrum of both domestic and interstate rivalry has been more norm than anomaly throughout most of recorded history.
  • Even a strong de facto dictator like Vladimir Putin cannot deploy one-year conscripts beyond Russia's borders without incurring significant political risk
  • ...13 more annotations...
  • Unlike the Soviet Union, Russia is not a global ground combat power.
  • Russia has employed heavily armed mercenaries from the notorious Wagner Group and a range of other (PDF) government-cozy (and perhaps government-run) companies as the tip of the Russian foreign policy spear. In effect, Russia has outsourced its foreign policy in Libya, Syria, the Central African Republic, Madagascar, Mozambique, Sudan, Ukraine, Yemen, Burundi, and other global hot spots.
  • Dmitry Utkin, former commander of the Russian military intelligence directorate's (GRU's) Spetsnaz special forces units, allegedly founded the Wagner Group in 2014. Wagner and an elite GRU Spetsnaz unit reportedly share a military base in the Russian town of Molkino.
  • RAND's work on will to fight—the disposition and decision to fight, act, or persevere in conflict and war—and on Russian state power suggests that Russia is using mercenaries due in great part to its inherent military and civil weaknesses. Russian mercenaries (in fact, all mercenaries) also have behavioral limitations and vulnerabilities to influence. Dependence on mercenaries also reflects a vulnerability in Russian national will to fight. Both of these weaknesses can be exploited.
  • Mercenary soldiers with the Wagner Group (formerly Moran Security Group, and then Slavonic Corps Limited) and other Russian mercenary groups like Patriot, took the lead in some of the more dangerous frontline operations in Syria while uniformed Russian soldiers guarded air and naval bases along Syria's coastline
  • Russia's military has strictly limited ability to project ground power worldwide. It has almost no organic ability to project and sustain ground power more than a few hundred kilometers beyond its own borders. Russian strategic lift is anemic compared to Soviet-era lift. Available forces are often tied down in one of the many frozen conflicts that ring Russia's western and southern borders.
  • In February 2018, Russian-hired mercenaries led (or at least closely accompanied) a Syrian militia force armed with artillery and heavy tanks to seize an oilfield near the city of Deir az-Zour in northeastern Syria. American Special Operations Forces and Marines decimated them with hours of precision air attacks, killing perhaps (PDF) hundreds and causing the rest of the force—including the mercenaries—to flee. As Russian-hired mercenary personnel retreated from the battlefield at Deir az-Zour, other teams of Russian private military actors had to call in helicopter teams to evacuate the wounded from the battlefield in the absence of state support.
  • Russian mercenaries have also performed poorly in Africa. In Mozambique, Wagner mercenaries stumbled through the kinds of partner-building efforts at which U.S. special operations forces tend to excel. They offended the locals and reportedly double-crossed allies to make money. Islamic State insurgents have successfully attacked and killed them on poorly secured roads. Mercenary disinformation tactics in Mozambique backfired. What was billed as a Russian power play in a former Soviet client state looks like a disaster in the making.
  • Wagner sent hundreds of trainers and security personnel to the Central African Republic to help Russian commercial interests secure mining rights and to support a complex regional diplomatic push to increase Russian influence. There has been little pretense in this operation: It is primarily a money-making venture. In one case, Wagner mercenaries reportedly helped the rebels they were hired to fight in order to help a Russian mining company gain access to diamond mines. Wagner has been linked to the suspicious deaths of three journalists who were nosing around its CAR operations. This Russian mercenary-led deployment has been partially successful in countering French influence, but it is not clear that reported successes on the ground outweigh the lasting, negative consequences of Wagner's cutthroat behavior.
  • Russia sent mercenaries and probably some active military forces to support Khalifa Haftar's anti-government forces in Libya. In early 2020, 1,000 Wagner mercenaries reportedly fled the front lines between pro- and anti-government forces after suffering a resounding defeat. Combat losses for Wagner in Libya are unknown but possibly significant.
  • as individuals and as a group, Russian mercenaries have repeatedly shown that they will pursue self-interest and commercial interests over state interests, and that they will quickly abandon partner forces—and perhaps each other—when the tactical risks fail to outweigh the financial rewards.
  • There is no shortage of genuine tough guys in groups like Wagner and Patriot. Under the will to fight factor of quality, many Russian mercenaries would earn high marks for fitness and resilience. But outright toughness and even elite military training alone cannot sustain the will to fight of an individual primarily motivated by money.
  • Together, the weaknesses within Russian mercenary forces and within the Russian state in relation to press-ganged youths, conscripts, and casualties may offer ready opportunities for exploitation in great-power competition. These broader weaknesses in Russian national will to fight could be examined to identify more ways to prevent Russia from aggressively undermining Western democracy.
Ed Webb

Inside a Massive Anti-Trafficking Charity's Blundering Overseas Missions - 0 views

  • People who participated in and witnessed OUR operations overseas recounted blundering missions—carried out in part by real estate agents and high-level donors—that seemed aimed mainly at generating exciting video footage and that, in their view, potentially created demand for trafficking victims
  • Experts and advocates for sex workers and trafficking survivors also questioned whether OUR's ties to a corrupt Thai police agency could lead to repression of pro-democracy activists, and whether it and similar NGOs truly help survivors or have been successful in identifying or dismantling trafficking networks. In all, these people told a story involving alarming amateurism that potentially endangers both those carrying out missions and the people they're meant to help.
  • The image of armed men racing into dangerous situations to rescue sexually abused children has been a hit with OUR’s donors and with media outlets, which have run hundreds of flattering stories about its work.
  • ...21 more annotations...
  • OUR is now a celebrated anti-trafficking charity, claiming to have worked in 26 countries, with the stated aim of bringing together "the world's experts in extraction operations and in anti-child trafficking efforts to bring an end to child slavery." It brought in more than $21 million in donations in 2019, the most recent year for which tax filings are available, and has enjoyed the support of high-powered backers
  • a common pattern for anti-trafficking NGOs working abroad, according to sex worker activists with Thailand’s Empower Foundation.
  • while OUR often claims to partner with local law enforcement on trafficking investigations and rescues, the extent of that “partnership” is often a modest donation OUR gives the agency, which in return credits it in press releases about any investigation, rescue, bust, or arrest that used the money.
  • OUR’s overseas operations, and the “jump team” it says conducts them, are the jewel in its crown: the subject of innumerable fundraising emails, interviews with Ballard, two documentaries, and Sound of Freedom, an upcoming feature film starring Jim Caviezel as Tim Ballard. (The casting of an actor most famous for playing Jesus Christ is perhaps not coincidental; while OUR is not an expressly religious organization, it heavily employs the language and imagery of faith, and Ballard, a devout Mormon, has said he was directly called by God to "Find the lost children.") OUR routinely claims that its overseas jump teams are made up of former members of the military, CIA, and law enforcement who undergo rigorous training.
  • nothing OUR did seemed recognizably informed by professional military or intelligence practice. There was, they said—contrary to the process for operations laid out on OUR's website—no meaningful surveillance or identification of targets; no development of assets; no validating that people they sought to rescue had in fact been trafficked, or that people they were targeting were indeed traffickers; and no meaningful follow-up with people who had been rescued on the missions in which they took part.  
  • “They’d go and just push for pimps to show up with girls.” If presented with sex workers of legal age, OUR would insist on younger girls—a method that several experts said could, when combined with a lack of intelligence-gathering and vetting, potentially lead to girls being trafficked who otherwise wouldn't have been.
  • Typically, after arranging for the women and girls to be brought to them, OUR's operators would call local police, who would make arrests. The operators would then leave the country.“They conflate sex work and trafficking,” said a former military member who has worked with OUR. “They’re making it worse.” 
  • Much research has been published demonstrating how these types of rescues are severely undermining the agency of trafficked persons and disempowering the individuals the involved organizations are claiming to help.
  • “There’s so many of these organizations here I don’t know one from the other,” Mai Janta, a sex worker leader of the organization, told VICE World News, laughing. 
  • it faces an ongoing investigation by Davis County, Utah attorney general Troy Rawlings, as Utah’s Fox 13 reported last October. While Rawlings hasn’t publicly described the contours of the investigation, people familiar with it have told both Fox 13 and VICE World News that his office is looking into whether OUR has made misleading statements in its fundraising appeals
  • Before the training began, candidates were given a psychological examination. On his way to his, William passed a candidate exiting an exam, who said, “If you mention God, you're a shoo-in.” 
  • “Before I went to this training,” he said, “I was counting down the days. I was expecting a world-class training, because these are supposed to be the best operatives.” Instead, he didn't feel like he was learning anything, and certainly not like he was being prepared to rescue children from dangerous traffickers. William wasn't taught, among other things, basic self-defense, signs to look for in a trafficker or trafficking survivor, surveillance technique, or secure communication. Topics that were covered included how to compartmentalize your discomfort if you find yourself in a gay bar, and the instructors' many war stories, including one that involved someone being stabbed dozens of times.
  • real estate brokers seem to have figured heavily in the world of OUR’s operators
  • Empower says that more than 50,000 sex workers have been a formal part of its operations over the years, and that members include sex workers from Thailand and migrant sex workers from Laos, Myanmar, China, and Cambodia. Its members are often extremely familiar with the various rescue operations that come to the country intent on “saving” trafficked women and girls; many organizations, working with local police, have conducted raids on massage parlors, legal brothels, and other places where they work. Most of these groups hail from the U.S., United Kingdom, New Zealand, and Australia, said Janta, and often have a clear religious focus. 
  • “They say they’re helping but really want to change your religion and your job,”
  • Beyond individual organizations, the entire raid-and-rescue model has fallen out of favor with responsible anti-trafficking organizations
  • “From our point of view, they come into our workplaces and make a relationship with the employer as well as the police. If there are no underage workers they continually ask and ask for the employer to find them some underage workers,” Janta added. “So they create a situation where there are underage workers, where there weren’t before.” 
  • “Just because they’re Americans or American missionaries, does not mean they’re actually representing the U.S. and U.S. interests,”
  • OUR's future seems, by all appearances, to be bright. Sound of Freedom, the film about the founding of OUR starring Jim Cavizel and Mira Sorvino as Tim Ballard and his wife Katherine, has been screened in theaters and awaits broad release. Celebrity backers like NFL players Corbin Kaufusi and Josh Allen enthusiastically promote OUR's work. And the public's continued fascination with QAnon and related conspiracy theories about pedophilia and child sex trafficking—from which OUR has publicly distanced itself—has led to huge interest in, and funding for, groups vowing to combat them. 
  • “We didn’t see them,” said Laovilawanyakul. “But we could’ve used their money for this time. They could have spent some of their money helping people get through COVID.”
  • “Instead of donating money to anti-trafficking orgs in the hope that it will help after something bad has happened, think about support for us all to be more secure and able to defend ourselves,” she said. “Scholarships, apprenticeships, family payments for mothers, support for teenagers who have left home.” Losing the ability to make a living has dislodged many women and girls from their villages and forced them into journeys as migrant sex workers.“If us and our families are secure,” Janta added, “we can defend ourselves and build our own lives without the need for rescue.”
Ed Webb

Slaughter in Indonesia: Britain's secret propaganda war | Indonesia | The Guardian - 0 views

  • what would later be claimed, by those who led it, as one of the most successful propaganda operations in postwar British history. A top secret operation that helped overthrow the leader of the fourth most populous country in the world and contributed to the mass murder of more than half a million of its citizens.
  • Recently released in Britain’s National Archives are pamphlets purporting to be written by Indonesian patriots, but in fact written by British propagandists, calling on Indonesians to eliminate the PKI, then the biggest communist party in the non-communist world.
  • The outcome of the turmoil was a brutal and corrupt 32-year military dictatorship whose legacy shapes Indonesia to this day
  • ...18 more annotations...
  • Sukarno, like many Indonesians, including the PKI, believed the creation of a Malaysian federation was unwarranted regional interference by the British to maintain their colonial dominance.
  • Like its US and Australian allies, Britain feared a communist Indonesia. The PKI had three million members and was close to Mao’s China. In Washington the fall of the Indonesia “domino” into the communist camp was seen as a greater threat than the potential loss of Vietnam.
  • Suharto, appointed supreme army commander on 14 October, used the rebellion to undermine and eventually overthrow Sukarno, and as what historian John Roosa has called a “pretext for mass murder”: the elimination of the PKI in a series of massacres across Indonesia that resulted in the deaths of hundreds of thousands of people.
  • British intelligence agencies and propaganda specialists were complicit, carrying out covert operations to undermine Sukarno’s regime and eliminate the PKI by blaming them for the Untung coup.
  • Reddaway had served in the army during the second world war before joining the Foreign Office and playing a key role in the establishment of IRD. After the failed Untung coup he arrived to take charge of the British operation. His brief was simple. In an interview in 1996 with two of the authors, he said he’d been given a budget of £100,000 by the Foreign Office and was told “to do anything I could do to get rid of Sukarno”. Only now do we know what “anything” fully meant.
  • “No, we do not cry out for violence,” the IRD propagandists wrote, “but we demand in the name of all patriotic people that this communist cancer be cut out of the body of the state.” The PKI “is now a wounded snake”, they wrote: “Now is the time to kill it before it has a chance to recover.”
  • Detailed historical research has established that the mass killings of PKI party members and alleged supporters appear to have been triggered by local army commanders or the arrival of army special forces, about three weeks after the botched coup had been put down by Suharto.During that period the media in Indonesia was full of black propaganda against the PKI and its alleged atrocities, as the army whipped up popular anger against communists and legitimised what Roosa has described as its “already-planned moves against the PKI and President Sukarno”.
  • The newsletters were approved by IRD in London before dispatch. Copies sent to senior Foreign Office officials were destroyed after reading at IRD’s request.
  • “Anyone who was leftist was picked up. They were very systematic. They targeted all the leftist groups and not just PKI. People kept themselves to themselves and only talked in whispers.”
  • As the massacres progressed in the autumn of 1965, IRD’s unit in Singapore reassured their readers as to the necessity of the slaughter.In Newsletter 21 they wrote: “Unless we maintain a vigorous campaign to eradicate communism … the red menace will envelop us again.”The stakes were life and death. “We are fighting for our lives and the very existence of Indonesia and we must never forget that. THE CATS ARE WAITING TO POUNCE!”In Newsletter 23 Winchester Road’s propagandists praised “the fighting services and the police” for “doing an excellent job”. Sukarno, then trying to restrain the generals, was wrong: “Communism must be abolished in all its forms. The work started by the army must be carried on and intensified.” The authors finished by equating the PKI to Hitler and Genghis Khan.
  • What Gilchrist wanted and what became the unit’s mission was the production of black propaganda, apparently produced by patriotic Indonesian émigrés abroad, to stir Indonesian anti-communists into action.The influential targets of a propaganda newsletter, according to a declassified report by Wynne, would eventually include “as many personages in the hierarchy of government, army and civil service as we can find”.To disguise the British origin of the newsletter it was sent into Indonesia via Asian cities including Hong Kong, Tokyo and Manila.
  • In the 1996 interviews Reddaway boasted of manipulating the British and other global media to take an anti- Sukarno and PKI line but insisted IRD only passed on true facts and did not use black propaganda.As ever with IRD, Reddaway told us a partial truth. According to a memo he had written: “The bludgeon was surprisingly effective because we were able … to supply publicists with information which they could not find from other sources because of Sukarno’s censorship.”
  • “GCHQ could break and read Indonesian codes without difficulty. The government was among many third world countries using equipment supplied by Swiss-based company Crypto AG. For over 50 years, Crypto AG supplied secretly sabotaged cypher machines, with built-in back doors to which the CIA and GCHQ had keys.”
  • The newsletters remained the core work of Ed Wynne and his colleagues in Winchester Road. A key theme was to encourage their influential readers to support the army’s campaign against the communists. They urged Indonesian patriots: “The PKI and all it stands for must be eliminated for all time.”We now know that to do that they included sensationalised lies. On 5 November the pro-military Jakarta Daily Mail claimed that on the day of the Untung coup 100 women from PKI’s Gerwani women’s organisation had tortured one of the generals using razor blades and knives to slash his genitals before he was shot.The story of the torture and mutilation of the generals by the Gerwani women became part of the founding myth of Suharto’s regime, used to justify the destruction of the PKI. It was also, according to Roosa, a pretext for murder. A lie propagated by the Indonesian army, regurgitated and repurposed to incite IRD’s influential readers.
  • The IRD was deliberately silent on the massacres. One document from December 1965 says they should “do nothing to embarrass the generals” and the newsletter carefully itemises accounts of isolated incidents of PKI brutality but makes no explicit mention of the army’s killings.
  • By early 1966 the mass murders in Indonesia, if not their scale, were well known.In January Robert F Kennedy compared the massacres to “inhuman slaughters perpetrated by the Nazis and the communists” and asked when people would “speak out … against the inhuman slaughter in Indonesia, where over 100,000 alleged communists have not been perpetrators, but victims?”
  • Wynne regarded the operation as a success. In his 1966 annual report he proudly says his operation was “fairly successful” because all his enemies (Konfrontasi, Sukarno, Subandrio and the PKI) were “destroyed”.
  • According to Prof Scott Lucas of the University of Birmingham, the declassified documents show that: “Britain was prepared to engage in dirty deeds which ran contrary to its purported values.” They reveal, he says, “how important black propaganda was to give the illusion that Britain could wield global power – even if many people might be killed for that illusion”.
1 - 20 of 52 Next › Last »
Showing 20 items per page