19 April 2017

*** The Mother of Invention

BY: David Isaac

In 1948, as Israel was heading into its first war, an IDF general sent a letter to David Ben-Gurion, Israel’s new prime minister, politely declining his offer to become chief of staff because he had learned the Jewish State only had six million bullets. “We will need 1 million bullets a day in a war and I am not willing to be chief of staff for just six days,” he wrote.

The Weapon Wizards, an engaging look at Israel’s weapons industry, is replete with such anecdotes. (Another that’s hard to resist is how Jewish forces in Jerusalem held off Arab rioters with one gun and 11 bullets. Afterward, the commander criticized the “gratuitous use of ammo.”) Such stories drive home how little Israel had militarily in its early years. Israel’s humble beginnings make it even more remarkable that it has become a military power. The goal of the authors, Israeli journalists Yaakov Katz and Amir Bohbot, is to explain how that transformation came about. As they write, 60 years ago Israel’s biggest exports were oranges and false teeth. Today, weapons make up 10 percent of Israel’s exports.

Like Start-Up Nation by Dan Senor and Saul Singer, Katz and Bohbot identify national characteristics that have led to a “culture of innovation.” Leading the list is a creativity born of necessity. “With barely any resources beyond the human capital that had immigrated to the new state, Israelis had to make the most of the little they had,” the authors write. Israel has even created a subunit of autistic soldiers to analyze satellite pictures.

*** THE NSA LEAK IS REAL, SNOWDEN DOCUMENTS CONFIRM

Sam Biddle

ON MONDAY, A HACKING group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

*** Sizing up the Global Village

By Luc De Keyser

What modern media users experience online today is a far cry from living in a global village. (ARTISTICPHOTO/Shutterstock)

Editor's Note: The Global Affairs column is curated by Stratfor's board of contributors, a diverse group of thinkers whose expertise inspires rigorous and innovative thought. Their opinions are their own and serve to complement and even challenge our beliefs. We welcome that challenge, and we hope our readers do too.

In the 1960s, technology futurist Marshall McLuhan rose to fame with a seemingly simple catchphrase: "The medium is the message." With the integration of television, computers and databases, he argued, communication technologies have taken on a meaning of their own that extends beyond the mere content of the information they deliver to customers. The ability of these technologies to instantaneously connect people across the globe, tearing down the physical barriers of time and place, likewise inspired McLuhan to dub the digital world a "global village."

But in many ways, what modern media users experience online today is a far cry from living in a global village. Children can't safely roam the internet without supervision; adults can't surf the web without risking their identifying details, or being inundated with messages, ads and news items optimized for companies' commercial gain; users can't participate in trendy forums without expecting to get in an online shouting match. Many have responded to these dangers and inconveniences by restricting their activities to likeminded circles on the web or, in some cases, withdrawing from the digital world altogether. So where did it all go wrong?

*** North Korea: A Red Line at the 38th Parallel


North Korean leader Kim Jong Un (C) inspects an air drill involving special operation forces at an undisclosed location. The situation is tense across the Korean Peninsula in anticipation of further nuclear tests conducted by Pyongyang. (STR/AFP/Getty Images) 

All eyes are focused on the Korean Peninsula. Signs suggest that North Korea is preparing to conduct another nuclear weapons test, perhaps as soon as April 15, to commemorate the 105th anniversary of the birth of the country's founder, Kim Il Sung. If Pyongyang follows through, the act will be nothing short of a provocation. 

As tensions mount, China has stressed the importance of diplomacy and of preventing the situation from escalating to an "irreversible and unmanageable stage." So far, U.S. President Donald Trump's administration has relied largely on non-kinetic means such as additional sanctions and increased enforcement or enhanced regional missile defense to keep North Korea's nuclear ambitions in check. But Washington has made clear that it will keep all of its options open. As the United States demonstrated with its limited cruise missile strike in Syria on April 6, it is willing to take unilateral military action. And considering North Korea's dogged efforts to advance its nuclear program, the Trump administration will have to carefully calculate the risks of a potential military strike. 

A Range of Options 

Action against North Korea could take many shapes or forms, from a limited strike to a large-scale military offensive targeting all of North Korea's military assets. On the lowest end of the scale, the United States could launch a strike to punish North Korea for continuing to develop its nuclear and missile arsenal and to deter it from pursuing nuclear weapons in the future. A punitive strike may be limited to a single base or facility in the country, with the threat of further action down the line if Pyongyang doesn't alter its behavior. Though this kind of attack offers the best way to keep the situation from escalating, it would by no means ensure that North Korea heeds the United States' warning and eases up on its nuclear and missile development. Nor does it eliminate the risk that Pyongyang may respond to the strike in kind. 

** Journey's End: Warsaw and Budapest A shift is emerging in Eastern Europe.

By George Friedman 

As I have mentioned previously, I spent the past couple of weeks in Europe. I completed my trip last week with a visit to Warsaw and Budapest. Both places are concerned with economic issues, resistance to the European Union’s claims on their sovereignty and, most importantly, their long-term national security. What was interesting in my meetings was the subtle shift in how Warsaw and Budapest now view their main threats.

For the Poles, the Russians have long been the major issue. They see the potential for a Russian move against the Baltic states and are deeply concerned about NATO’s military weakness. In their view, should the Russians decide to move decisively, only the Americans would be in a position to bring significant force to bear, and that force would take months to arrive. It is not that they are expecting an attack. But if an attack happens, it will most likely take place in the Baltics, and the Poles will bear the major burden of resistance. The Poles have made substantial efforts in building a military, but they will be unable to hold back the Russians alone. Given the Europeans’ weakness and United States’ distance from the region, they feel isolated.

Russian President Vladimir Putin (left) and Hungarian Prime Minister Viktor Orbán give a joint press conference at the parliament building in Budapest on Feb. 2, 2017. ALEXANDER NEMENOV/AFP/Getty Images

Energy Fact & Opinion: India Joins International Energy Agency as an Association Country


In March 2017, India activated the association status with the International Energy Agency (IEA), an organization comprising 29 member countries and 6 association countries. 

Membership in the IEA, which is restricted to advanced economy members of the Organization for Economic Co-operation and Development (OECD), requires them to demonstrate their net oil importer status, have reserves equivalent to 90 days’ average of crude oil and/or oil products imports in the prior years, and have a demand restraint program for reducing national oil consumption by up to 10 percent. 

In an effort to reflect the rising role of non-OECD economies with major impact on the global energy market, the IEA introduced the “association” status in 2015. Since its inception, China, Indonesia, Thailand, Singapore, Morocco, and now India have become associated with the IEA. 

The association status allows these countries to participate in meetings of IEA standing groups, committees, and working parties, without prior invitation. Association countries can work with the IEA on matters of energy security, energy data and statistics, energy policy analysis, and benefit from priority access to IEA training and capacity-building activities. 
With India’s inclusion, the IEA accounts for about 70 percent of the world’s energy consumption. 

India in Africa: Need to build on its own base rather than countering China

By Namrata Hasija

President Pranab Mukherjee inaugurated the 12th CII-EXIM Bank Conclave on India Africa Project Partnership on March 9, 2017. His address on the occasion sets the tone of India-Africa ties during the past and present times. 

He said: "Mindful of our common history and shared future, we have decided to elevate our relationship. For the first time ever, we welcomed representatives of all 54 countries of Africa at the third India-Africa Forum Summit in October 2015. We have since then broadened our diplomatic footprint. Our leadership has visited almost every African country in the last 18 months." 

He further stated that he personally went to Cote d'Ivoire, Ghana and Namibia last year. 

His special emphasis on the recent spurt of interest in Africa by India's leadership showcases a new Indian approach towards the African continent. This interest has generated another debate as to whether India is competing with China in Africa and trying to counter the Chinese footprint in Africa.

The Chinese presence in Africa is huge and its trade with Africa was at $300 billion in 2015 while India-Africa trade stood at only $75 billion. To counter this kind of clout demands huge investments and other measures. 

The question, however, remains: Why should India counter China in Africa? Do their interests clash in Africa or both have their divergent interests in Africa?

Both countries look at securing their energy interests in the continent along with the huge African markets for their products. India has already ignored this continent for a long time while China consolidated its position by giving huge credit lines and loans for infrastructure development to African leaders. 

Recalibrating Deterrence to Prevent Nuclear Terrorism

by Robert S. Litwak

Pakistan and North Korea are both on the verge of significantly increasing their stocks of nuclear weapons and weapons-usable materials, necessitating a recalibration of deterrent strategies. Nevertheless, effective strategies of deterrence on the state level remain the prerequisite for countering the non-state threat of nuclear terrorism.

Pakistani Taliban Emir Calls for Unity, Jihad, and Global Caliphate

By Bill Roggio

Mullah Fazlullah, the emir of the Movement of the Taliban in Pakistan (TTP), said that his group’s ultimate goal is “to implement the law of Allah on the Earth” and called on Muslims to unite and wage jihad to achieve that end. Fazlullah, one of the most extreme commanders in a group filled with extremists, also said that attempts made by Pakistan’s military intelligence service to break up the TTP have largely failed and his group has reorganized following a tumultuous period.

Fazlullah made the statements in a video released yesterday by Umar Media, the propaganda arm of the TTP. Umar Media also provided an English language transcript of Fazlullah’s speech. He outlined the group’s primary goal in his opening statement.

“The aim of Tehreek e Taliban Pakistan [TTP] is to implement the law of Allah on the Earth of Allah. And this will be the result of our Jihad. For Islamic ideology we have to accord sacrifices. By the grace of Allah, those who believe that implementation and uprising of Shar’iah [Islamic law] is their actual goal and absolute ambition, know that the implementation of this Shar’iah is impossible without practicing Jihad and Jihad is impossible without unity,” Fazlullah said.

Throughout the speech, Fazlullah quoted the Koran to provide religious justification for the TTP’s war against the Pakistani military and government, and said that it is the obligation of clerics to rally Muslims to the cause.

China's New Cybersecurity Law

Israel Kanner, Doron Ella

China's new Cybersecurity Law will go into effect on June 1, 2017. According to official statements, the purpose of the law is to protect China's national security and social stability through close supervision of internet content and technologies. The law has the potential to affect every Chinese or foreign internet or information technology business operating in China. After the law was announced, there were concerns in the West that the continued operation of foreign companies in China will be conditional upon their providing information and technologies to Chinese authorities, or on the inclusion of "backdoors" in their products. Another concern is that foreign companies will be forced to make way for local governmental companies that develop products that are adapted to the regulations of the Chinese market. Similarly, every Israeli technology company that is involved in social media or information will be supervised by the Chinese authorities and will be forced to operate under many more restrictions than before.



China's new Cybersecurity Law will go into effect on June 1, 2017. According to official statements, the purpose of the law is to protect China's national security and social stability through close supervision of internet content and technologies. The law has the potential to affect every Chinese or foreign internet or information technology business operating in China. After the law was announced, there were concerns in the West that the continued operation of foreign companies in China will be conditional upon their providing information and technologies to Chinese authorities, or on the inclusion of "backdoors" in their products. Another concern is that foreign companies will be forced to make way for local governmental companies that develop products that are adapted to the regulations of the Chinese market. 

A crude pipeline to southwestern China through its neighbor Myanmar began operations after years of delays, allowing the world’s second-biggest oil user to receive supplies faster from the Middle East and Africa.

A Suezmax-sized tanker, which can hold 140,000 metric tons (about 1 million barrels) of crude, began offloading oil for the pipeline on Monday at Myanmar’s Made Island, according to China’s official Xinhua News Agency. Operations on the line, which was completed in 2014 and originally scheduled to start the same year, are beginning after the government of Myanmar agreed to lower transit fees, Wang Dongjin, president of PetroChina Co., said last month.


The link, which allows China to import crude from the Middle East and Africa without having to ship through the Straits of Malacca and into the South China Sea, is part of President Xi Jinping’s "One Belt, One Road" infrastructure and trade development plan stretching across Asia to Africa and Europe.

IT DIDN’T HAVE TO BE THIS WAY: FINDING LEVERAGE IN SYRIA

AARON STEIN

For special access to experts and other members of the national security community, check out the new War on the Rocks membership.

The execution of Assad’s April 4 chemical weapons attack was a textbook use of these weapons. This suggests that the decision to use them was military in nature, not a complicated exercise in signaling to the outside world. Reported Russian military activity in the area clearly implicates Moscow as one of two things: either an impotent and clueless backer of the Syria regime, incapable of monitoring the activities of an air force it is co-located with, or party to a war crime

At President Donald Trump’s order, a barrage of cruise missiles collided with the Syrian air base that was purportedly the source of the chemical attack on Kahn Sheikhoun. This use of force has been widely praised and hailed as a potential turning point in the Syrian conflict. However, the use of limited cruise missile strikes to change state behavior has a poor historical track record. It is too early to tell if the strikes will contribute to the immediate goal of deterring future chemical weapon use in Syria or even a second goal now articulated by some members of the Trump administration: forcing Russia to reevaluate its support for Bashar al Assad.

The Great Game in West Asia


The 11 short articles in this text examine 1) the competing interests between Azerbaijan, Iran, Turkey and other actors in the South Caucasus region; 2) the exercising of soft power by the Güllen Movement, Turkey and Russia in the area; and 3) the state-building struggles of Armenia, Georgia and Azerbaijan following the collapse of the Soviet Union.

Download 


Author 

Mehran Kamrava, Anatol Lieven, Mahmood Monshipouri, Gareth Winrow, Hamid Ahmadi, Jeffrey Mankoff, Meliha Benli Altunışık, Bayram Balci, Richard Giragosian, Alexander Kupatadze, Anar Valiyev 

Series 


Publisher 

Chuck Spinney explains why both parties love the Syria poison gas story

By Franklin “Chuck” Spinney

Summary: Trump has received much applause for bombing Syria. Republicans, Democrats, journalists, and geopolitical gurus all cheered. Here insightful defense analyst Chuck Spinney asks inconvenient questions about the lack of evidence and illogic of the “Assad did it” story. This is a follow-up to Before believing the new Syria sarin attack story, ask if the 2013 story was true


If there was a centerpiece to Hillary Clinton’s failed campaign for President of the United States, it was her struggle to convince the American people that Donald Trump was congenitally incapable of reacting rationally when surprised by a dangerous international crisis. She struggled futilely to contrast her experience and gravitas to Trump’s reckless impulsiveness. 

In a rational world, the recent Trumpian brain fart of firing 59 cruise missiles (worth about $90 million) at a nearly empty — and forewarned — Syrian airfield should be a candidate case study to test Clinton’s psychological theory. But it won’t be. Mr. Trump merely did what Ms. Clinton called on him to do a few hours prior to the attack; see this video. Moreover, the political response to Trump’s attack has been one of widespread bipartisan support, with particular enthusiasm among senior Democrats. For example, see … 

The Kremlin Playbook Understanding Russian Influence in Central and Eastern Europe


There was a deeply held assumption that, when the countries of Central and Eastern Europe joined NATO and the European Union in 2004, these countries would continue their positive democratic and economic transformation. Yet more than a decade later, the region has experienced a steady decline in democratic standards and governance practices at the same time that Russia’s economic engagement with the region expanded significantly. Regional political movements and figures have increasingly sought to align themselves with the Kremlin and with illiberalism. Central European governments have adopted ambiguous—if not outright pro-Russian—policy stances that have raised questions about their transatlantic orientation and produced tensions within Western institutions. Are these developments coincidental, or has the Kremlin sought deliberately to erode the region's democratic institutions through its influence to “break the internal coherence of the enemy system”?

The CSIS Europe Program, in partnership with the Bulgarian Center for the Study of Democracy, recently concluded a 16-month study to understand the nature of Russian influence in five case countries: Hungary, Slovakia, Bulgaria, Latvia, and Serbia. This research determined that Russia has cultivated an opaque web of economic and political patronage across the region that the Kremlin uses to influence and direct decisionmaking. This web resembles a network-flow model—or “unvirtuous circle”—which the Kremlin can use to influence (if not control) critical state institutions, bodies, and economies, as well as shape national policies and decisions that serve its interests while actively discrediting the Western liberal democratic system. The United States can no longer be indifferent to these negative developments, as all members of NATO and the European Union must collectively recognize that Russian influence is not just a domestic governance challenge but a national security threat.

RUSSIAN PANTSIR SYSTEMS ‘THE MOST EFFICIENT MEANS’ TO BEAT U.S.-MADE TOMAHAWKS

Sputnik/ Mikhail Fomichev

The Russian-made Pantsir short to medium range surface-to-air missile and anti-aircraft artillery weapon system is “the most efficient means” of countering the US-built Tomahawk Land Attack Missile, one of the leading Russian experts engaged in developing electronic warfare measures told the newspaper Izvestiya.

“Tests have shown that Pantsir complexes are highly efficient in destroying such targets,” he said. “In addition, Russia is testing a system aimed at destroying cruise missiles. This complex is based on new physical principles, but I cannot provide details on how it works. I will only say that the new systems will be capable of completely scorching the avionics of these missiles.”

The expert, who spoke to the newspaper on condition of anonymity, warned that the Tomahawk is a “very complex target,” adding that not a single nation in the world has 100-percent efficient defense system that can consistently intercept Tomahawks.


“Russia and other countries do not have electronic warfare capabilities efficient enough to reliably misguide the missile or render it inoperable. Its guidance accuracy could be jeopardized. It could also be forced to climb to a higher altitude where it could in theory be intercepted by air defense systems,” he said.

The United States most recently used Tomahawks to attack a military base in Syria. The massive airstrike was authorized following an alleged chemical weapons attack in the province of Idlib, which Washington and its allies blame on President Bashar al-Assad although no hard evidence has been provided to support these claims. Damascus and the Syrian Arab Army have denied using toxic substances against civilians.

Defense analyst Konstantin Sivkov suggested that Damascus needs more than 10 anti-missile and anti-aircraft systems operating at various ranges to protect the Syrian territory.

“Damascus needs to create a highly complex air defense system that would help to neutralize a volley of up to 250 missiles, like Tomahawks,” he said. To this end, it will have to acquire several complexes, including the S-300, the Buk, the Tor and Pantsir surface-to-air missile systems.

Never miss a story again — sign up to our Telegram channel and we’ll keep you up to speed!

Armageddon: The Devastating Consequences of a Second Korean War

Dennis P. Halpin

The label of the North Korean state as a Marxist-Leninist regime, even of the particularly repressive Maoist Great Proletarian Cultural Revolution variety, is a misnomer. North Korea is a dynastic autocracy, ruled by a semidivine Kim family with absolute power over both the inner court and the general populace in a way comparable to a Henry Tudor or a Caesar. Even family members who fall into disrepute are not beyond bloody retribution. Just as a Korean king once sentenced his errant crown prince son to die in a rice box of starvation in the sweltering sun, so too Kim Jong-un recently struck down his own half brother with an internationally banned chemical weapon.

The fanaticism of the North Korean public, in its devotion to its leader, is not some Broadway-like drama of feigned affectation. A visit to North Korea and discussion with members of the public at large revealed a clear devotion to the Kims. Implied was a willingness to die in defense of the juche philosophy and the great leader and his bloodline. North Korea, for almost four decades a colony of imperial Japan, has seemingly absorbed the kamikaze-like death wish of those pilots who once made a last-ditch suicidal stand to die for the emperor.

And North Korea is not Iraq. North Korea’s estimated elite thirty-thousand-strong special-operations unit is not Saddam’s Republican Guard, which was easily vanquished. These special forces lie in wait ready to burst through underground tunnels to wreak havoc on South Korea’s civilian population. Then there is the fact that North Korea is now a self-proclaimed “nuclear weapons state” with up to twenty nuclear weapons. It also holds an arsenal of chemical weapons to be delivered by an estimated ten thousand artillery pieces, stashed in mountain tunnels near the DMZ, ready to rain down on metropolitan Seoul a mere thirty-five miles away. This treasure trove of chemical death would be the envy of Syria’s Assad. (Seoul has a population of over ten million, and the metropolitan area holds over twenty-five million people.)

Threat Report 2017: New Dangers and the American Tech to Beat Them


By Popular Mechanics Editors

Russia and China are introducing new weapons of war. ISIS fighters hide among civilians and attack with no regard for casualties. And somehow North Korea has managed to become even less stable than it was before. 

Russia's new Buk-M3 surface-to-air missiles are built on tank treads and have nearly twice the range—43 miles— of their predecessors.

Justin Metz

THE (NEW) TROUBLE WITH RUSSIA
Surface-to-air-missiles

In modern warfare, owning the sky is everything. And the cheapest way to own the sky is to shoot down, from the ground, anything that tries to fly in it. The Russian military is currently fielding a new midrange surface-to-air missile system, the Buk-M3, that has the potential to change everything. And by change we mean destroy. Start with the eyes: a powerful phased-array radar that steers its beams electronically to track targets. The vehicle has a new digital brain that can accept data from longer-range radar, which means the M3 will be able to shoot before some systems would have even identified the incoming aircraft. It has six radar-guided missiles with a range of up to 43 miles—a huge improvement over the 28-mile range in the older Buk-M2. Then there are the treads: The M3 is built on a tracked chassis, like a tank, making it highly mobile, easy to conceal, and eventually likely to be sold to rogue nations in Asia, Africa, and the Middle East. This weapon is having an effect in European air forces without even firing a shot, says Sim Tack, senior analyst for the private security firm Stratfor. It severely limits the potency of Cold War–era aircraft—and of any aircraft whose name doesn't include the word stealth.

McChrystal and a Grain of Salt


By Thomas Meyer

Stanley McChrystal (retired General and Managing Partner at McChrystal Group) recently posted a LinkedIn article, How I Keep Up with an Unrelenting Work Pace. The article was published February 1, 2016 and is receiving excessive praise from many. It is also receiving criticism from those who note the inherent risks of applying strategic level leadership experiences without thought or reflection. Here are some things you should pay attention to when reading McChrystal’s article.

Photo from FastCompany.

This is a guest post by US Army Captain Thomas Meyer. He is the creator of Hay in the Barn Leader, a platform dedicated to improving leaders and their organizations. Follow Hay in the Barn Leader on Facebook and Twitter.
It’s Not for Everybody

First, note this article is not titled, “How YOU Should Keep Up with an Unrelenting Work Pace.” We tend to give excess credence to the words and experiences of those who are successful. Simultaneously, we fail to understand that each individual is different, and these amazingly successful people often have super-human traits, added to their work-ethic, that make them as successful as they are.

No matter how hard he/she trains, the average American will never be Lance Armstrong. No matter how much batting practice you take, you will likely never be Hank Aaron. And, no matter how many times I sing “Friends in Low Places” in the shower, I will never be Garth Brooks. Take this article, and all those like it, with a grain of salt – understanding it is ‘A Way’ that worked for one person; not the way.

The Two Faces of Terror: Why the West Loses

By G Murphy Donovan

G Murphy Donovan isn’t impressed. As far as he’s concerned, the fight against Islamic terrorism has two faces today – public relations and “strategic hokum.” Yes, chest-thumping political rhetoric, do-nothing conferences, and faux coalitions continue to substitute for coherent strategy. A truly viable approach, however, needs to accept an uncomfortable truth – the ultimate problem the West faces is a virulent form of religious imperialism.

This article was originally published by the Small Wars Journal on 9 April 2017.

“Our values (sic) will prevail, never giving in to terror,”

The fight against Islamic terror has two faces today, public relations and strategic hokum. The recent meeting of the ministers of the Global Coalition on the Defeat of ISIS in Washington illustrates these phenomena. Whilst the foreign ministers of “68 nations” were wining, dining, and thumping their chests inside the Beltway, another soldier of Islam successfully struck the British parliament in London. Whatever the purpose of the Washington soiree, it was undone in London by a single Muslim martyr with better motivation and better credentials than any infidel foreign minister. Indeed, the slaughter on Westminster Bridge, enjoyed global press coverage above the fold for a week.

Targeted Killing: A New Departure for British Defence and Security Policy?

By Abigail Watson

The precipitating event is pretty clear: On 21 August 2015, Reyaad Khan – a UK citizen fighting for ISIS – was killed by a Hellfire missile fired from a British drone. The strike, which occurred months before the UK parliament formally OK’d the use of military force in Syria, subsequently led to prolonged debates about the legal basis for targeting one’s own citizens outside of a warzone, parliamentary oversight and government transparency. As Abigail Watson describes here, these debates haven’t been resolved.

This article was originally published by the Oxford Research Group’s Remote Control Project on 28 March 2017.

Summary

On 21st August 2015, Reyaad Khan – a UK citizen fighting for ISIS – was killed by a Hellfire missile fired from a UK drone1 in an operation possibly supported by UK Special Forces.2 This strike occured months before parliamentary approval of the use of military force in Syria, which was not given until December that year, and seemed to mark the first time the UK had undertaken a lethal strike that was outside of a war the UK was militarily involved in.

The then-Prime Minister David Cameron announced the strike as a “new departure”3 for British defence and security policy to a surprised Parliament, who were keen to understand both how the strike had occurred when they had voted against UK military engagement in Syria in August 2013 (and once again in September 2014 when they approved the use of force in Iraq but explicitly refused to extend operations to Syria)4, and on what basis the government had approved the use of lethal force against one of its own citizens abroad.

Unfortunately, the statements that followed from Cameron, the Permanent Representative to the UN (Matthew Rycroft) and the Secretary of State for Defence (Michael Fallon) were both “confused and confusing”5, making it hard to assess how “new” or how controversial this strike was. For example, Cameron claimed that the strike was the first time that “a British asset has been used to conduct a strike in a country where we are not involved in a war,”6 and was taken in self-defence.7 This would be hugely significant, as it would mean that the UK has joined the US in conducting targeted strikes against terrorist threats in areas where it is not at war – raising important questions about where you draw the line on when states can and cannot use lethal force. However, Rycroft’s, statement to the UN also justified the strike on the basis of the collective defence of Iraq.8

Leaked NSA Malware Threatens Windows Users Around the World


The ShadowBrokers, an entity previously confirmed by The Intercept to have leaked authentic malware used by the NSA to attack computers around the world, today released another cache of what appears to be extremely potent (and previously unknown) software capable of breaking into systems running Windows. The software could give nearly anyone with sufficient technical knowledge the ability to wreak havoc on millions of Microsoft users.

The leak includes a litany of typically codenamed software “implants” with names like ODDJOB, ZIPPYBEER, and ESTEEMAUDIT, capable of breaking into — and in some cases seizing control of — computers running version of the Windows operating system earlier than the most recent Windows 10. The vulnerable Windows versions ran more than 65 percent of desktop computers surfing the web last month, according to estimates from the tracking firm Net Market Share.

The crown jewel of the implant collection appears to be a program named FUZZBUNCH, which essentially automates the deployment of NSA malware, and would allow a member of agency’s Tailored Access Operations group to more easily infect a target from their desk.

Smartphone Life Cycles Are Changing

By Martin Armstrong

If you've found yourself squeezing that little bit more life out of your smartphone in recent years, you're not alone.

Please share this article - Go to very top of page, right hand side for social media buttons.

Kantar Worldpanel data shows that compared to 2013, users in the U.S. and Europe are now waiting an average of 2.2 and 3.3 months longer respectively, before upgrading to their next handset. In China, while there has been a net increase of 1.6 months over the same period, the trend isn't yet quite so apparent.

This chart shows the average number of months before users upgrade their smartphone in the U.S., China and Europe from 2013 to 2016.

You will find more statistics at Statista.

New leak suggests NSA penetrated Mideast banking networks

PARIS (AP) — A new set of documents purportedly lifted from the U.S. National Security Agency suggests that American spies have burrowed deep into the Middle East’s financial network, apparently compromising the Dubai office of the anti-money laundering and financial services firm EastNets.

TheShadowBrokers, which startled the security experts last year by releasing some of the NSA’s hacking tools, has resumed pouring secrets into the public domain, this time by publishing purported details of the NSA’s operations against banks across the Arab world. In a first for TheShadowBrokers, the data includes PowerPoint slides and purported target lists, suggesting that the group has access to a broader range of data than previously known.

“This is by far the most brutal dump,” said Comae Technologies founder Matt Suiche, who has closely followed the group’s disclosures and initially helped confirm its connection to the NSA last year. In a blog post , he said it appeared that thousands of employee accounts and machines from the EastNets’ offices had been compromised and that financial institutions in Kuwait, Bahrain and the Palestinian territories had been targeted for espionage.

Calls and messages left with EastNets’ offices in Dubai, London and New York were either not picked up or not immediately returned.

The authenticity of Friday’s document dump could not immediately be determined but the group’s previous releases have been corroborated by material leaked by former U.S. intelligence contractor Edward Snowden and software patches issued by major U.S. technology firms .

The NSA did not immediately return emails seeking comment.

Because EastNets provides a host of Arab banks connectivity to the banking system’s electronic backbone, known as SWIFT, compromising the company would give the NSA the ability to silently track financial transactions across the Middle East, Suiche said in a phone call.

He said other documents in the release suggested an even wider effort to monitor the world’s transactions.

“I’ll bet it’s not the only SWIFT service bureau that’s been compromised,” he said.

Microsoft Joins Other Tech Companies by Releasing 2014 National Security Letter

By Jordan Brunner


Yesterday morning, Microsoft released, along with its most recent biannual transparency reports, a 2014 National Security Letter (NSL) from the FBI which sought “data belonging to a customer of our consumer services,” according to the company’s press release on the matter. The press release also states that Microsoft is “the latest in a series of companies able to disclose an NSL due to provisions in the USA Freedom Act requiring the FBI to review previously issued non-disclosure orders.”

That list of companies has grown increasingly long. Twitter released two NSLs earlier this year, one from 2015 and one from 2016. Other companies that have released their letters are Yahoo (three), Cloudflare (one), CREDO (two) and Google (eight). Yahoo was the first to release its NSLs.

The companies have all cited the USA FREEDOM Act of 2015 as the legal justification for the documents’ release. Under Section 502(f) of the Act, the Attorney General is required to “adopt procedures with respect to nondisclosure requirements,” to require “review at appropriate intervals of such a nondisclosure requirement to assess whether the facts supporting nondisclosure continue to exist,” and to require the “termination of the nondisclosure agreement if if the facts no longer support nondisclosure.”

The Department of Justice drafted its “Termination Procedures for National Security Letter Nondisclosure Requirement,” in response. The procedures provide that the nondisclosure requirement pertaining to a National Security Letter closes either “upon the closing of any investigation in which an NSL containing a nondisclosure provision was issued,” or “on the third-year anniversary of the initiation of the full investigation.” The FBI can extend the nondisclosure requirement beyond three years only if either a Special Agent-in-charge or a Deputy Assistant Director certifies in writing that “one of the statutory standards for nondisclosure is satisfied.”