24 June 2017

*** THE BATTLE FOR MARAWI CITY


On what was to be her wedding day, Stephanie Villarosa ate chocolate-flavored rice porridge out of a styrofoam cup. Under normal circumstances—rings exchanged, fidelity promised, bride kissed—she and her family would have been feasting on lechón, roasted suckling pig, a delicacy in her fiancé’s hometown of Iligan City on the southern Philippine island of Mindanao. Instead, Villarosa was huddled on an institutional plastic chair 38 km south of Iligan, inside Marawi City’s provincial government building. Outside, sniper fire crackled over the mosque-dotted hills to the east and military FA50 fighter jets thundered overhead. Wedding or no, the porridge was nourishing, and Villarosa was happy: “God is good. Today we survived.”

Survival has become a daily battle in Marawi, the capital of Mindanao’s Lanao del Sur province and whose mostly Muslim 200,000 population make the city the biggest Islamic community in what is otherwise an overwhelmingly Catholic country. Villarosa, a teacher in Marawi, was handing out wedding invitations when black-clad fighters of what the locals call Grupo ISIS swarmed the streets. She ran, hid, and took shelter in a nearby house with 38 other people. Outside, she heard, her workplace Dansalan College was burning, and Christians were being killed. “We rescued ourselves—no military,” says Villarosa. “We had to run, walk, crawl.” Seven of her colleagues, including the school’s principal, were unaccounted for, but, low on food and water, and with news that the military was set to bomb the area, Villarosa decided to get to the sanctuary of city hall. “It looked like a movie outside, it looked like The Walking Dead,” she says, referring to the post-apocalypse U.S. TV series.

*** The Race to the Iraqi Border Begins

By Omar Lamrani

One of the best ways to track Iran's priorities in Syria and Iraq is to follow the movements of one of its highest-ranking military leaders, Maj. Gen. Qassem Soleimani. In September 2016, the commander of the Islamic Revolutionary Guard Corps' (IRGC's) elite Quds Force made an appearance south of Aleppo just before loyalist forces launched the final offensive that led to the critical city's capture. Seven months later, he was spotted in the northern Syrian governorate of Hama as loyalist troops, backed by Iran, geared up for a difficult fight with rebel forces on the outskirts of the provincial capital.

This month, Soleimani is on the move once again. On June 12 the elusive figure paid a visit to Iranian-led militia units on the border between Syria and Iraq, giving prayers of thanks for their recent victories in the area. His presence is telling of the newest phase unfolding in Syria's protracted civil war: the race to the Iraqi border.
The First to the Finish Line

As the Islamic State is slowly being driven out of Syria, its enemies are scrabbling to pick up the territory it leaves behind. Syrian rebels, supported by the U.S.-led coalition, are facing off against the government of President Bashar al Assad, backed by Iran and Russia, to wrest control of the extremist group's remaining positions from its weakened grasp. Yet despite having the same finish line in sight, each participant is driven by its own interests, and is willing to risk colliding with its rivals to secure them.

*** The Maharaja’s Mandala India’s geopolitics offer a fascinating insight into its past and future strategic imperatives.

Anirudh Kanisett

Planet Earth’s crust is a set of massive interlocking, interacting tectonic plates, floating on its molten mantle. Above these plates, Earth’s storms, oceans, and climate buffet and shape its biomes and environments. And in them, nudged and shaped by forces which we barely comprehend, are little bubbles of human life, lines we draw on our maps called “nation-states”.

As below, so above. One way of looking at the human world is to think of it as interlocking, interacting geopolitical plates, defined by climates which shape culture and history. These plates, like actual plates, have “centers of gravity”, where politico-cultural “mass” is centered, and where the central balance is to be found. A change at the center of gravity affects all states on the plate.

For the East Asian plate, the center of gravity would be China. For North America, The United States; for Europe, France and Germany.

Modern India’s geopolitics are centered around the North, and especially in the former imperial capital of Delhi. India’s strategic and security imperatives (it is argued) lie to the North-West, towards our rival Pakistan and its designs on Kashmir. If the news is anything to go by, India’s media and populace seem generally obsessed with Kashmir to the point of utter myopia towards the rest of our international actions.

** Professional Military Education: What Is It Good For?

By Pauline Shanks Kaurin

Professional Military Education (PME) covers a wide range of activities. In one sense it refers to a plethora of training, continuing education, and other activities designed to provide development to members of the military at various points in their career and to prepare them for the next level of responsibilities. The U.S. military requires professional education for both officers and enlisted personnel and its form, content, and objective varies across rank, service, and military role. But what is its overarching purpose? Why do we invest so much in this effort? In his 2012 White Paper on Joint Education, General Martin Dempsey argues the purpose of PME is “…to develop leaders by conveying a broad body of professional knowledge and developing the habits of mind central to the profession.”[1] In addition to critical thinking, he lists the ability to understand the security environment, respond to uncertainty, anticipate and lead transitions through change, and operate with trust, understanding, and empathy as important skills for future military leaders.[2]

Taking this document as a starting point, I focus here on the Staff and War College experiences in U.S. professional military education. While many of the questions raised here apply equally—if perhaps differently—to the education of others in the military and other militaries, a narrow scope allows for more precise framing of questions about the purpose of PME. While it seems we would be able to discern the purpose and aims of military education by looking at various official military and institutional documents, they only tell part of the story. What we find upon closer scrutiny are multiple stories about what exactly professional military education is supposed to do and how it is to be done. Some think of it as the equivalent of graduate school needing research and rigor, others think of it as training that ought to be conducted by expert practitioners, and still others a higher level initiation into the Profession of Arms. Accordingly, a closer look at PME is necessary to clarify these basic questions, which then can lead us to thinking through what the focus and content of these experiences ought to be.

** The Emerging Trump Doctrine Of Strategic Savvy

By Jiri Valenta and Leni Friedman Valenta

EXECUTIVE SUMMARY: “America will not lead from behind. America First does not mean America alone. It is a commitment to protecting and advancing our vital interests…” So wrote President Donald Trump’s NSA, General H.R. McMaster, with Gary Cohn, head of the National Economic Council, in the Wall Street Journal. What follows is a discussion of US leaders’ failed strategies in several wars, Trump’s team of generals, and the emerging Trump doctrine, which is here termed “strategic savvy”.

1964 Vietnam War; “Lies that Led to Vietnam”

Bullet-headed Lt. General H.R. McMaster, the US National Security Adviser, is not just a brave warrior. Like his mentor, General David Petraeus, he is a prominent military intellectual. Both men wrote their PhD dissertations on the lessons of Vietnam. In The American Military and the Lessons of Vietnam, Petraeus concluded, “…significant emphasis should be given to counterinsurgency forces, equipment and doctrine.” McMasters’s thesis, Dereliction of Duty, addressed the roles of LBJ and Secretary of Defense Robert McNamara. His subtitle was “Lies that Led to Vietnam.”

On August 4, 1964, the Gulf of Tonkin Resolution was pushed through Congress authorizing military action against North Vietnam as “vital” to US national interests. It sought to punish Hanoi for an allegedly unprovoked attack by three torpedo boats on a US destroyer in the Gulf of Tonkin. In fact, it had not been unprovoked; the US had made repeated prior attacks on the North Vietnamese coast.

The Future of Military IT: Gait Biometrics, Software Nets, and Photon Communicators**

BY PATRICK TUCKER

DISA director Lt. Gen. Alan Lynn talks about the tech he’s eyeing, some of which is barely out of the theoretical realm.

Tomorrow’s soldiers will wield encrypted devices that unlock to their voices, or even their particular way of walking, and communicate via ad-hoc, software-defined networks that use not radio waves but light according to Lt. Gen. Alan Lynn, who leads the Defense Information Systems Agency, the U.S. military’s IT provider. On Tuesday, Lynn talked about next-generation technologies that DISA is looking into, some of which are barely experimental today.

Here are few of the key areas:

Biometric access

Forget thumbprint unlock screens for phones and communications equipment. Tomorrow’s next-generation biometric identifiers are related to the data that soldiers create through their activity. That could include everything from the way that a soldier walks, to the way she holds her phone, to places that she’s been.

The IMF: Pakistan’s History And Future With The Lender Of Last Resort – OpEd

By Sara Cheema

Last year marked the end of Pakistan’s most recent IMF Loan Programme. While many commemorate at the thought of finally coming out of the programme and its forced macroeconomic restrictions, others remain doubtful about our future with the Fund. Are we likely to relapse into the fold of yet another burdensome and economically disastrous programme? In truth, our relationship with the IMF has been a long and uncomfortable one. Loans from the Fund continue to be the gift that keeps on giving, even if at times we do not want it, and certainly regardless of whether or not we are in the position to return it.

As of 1988, Pakistan has entered into 12 different programmes with the IMF, which by contrast, is greater than all countries in the region combined. India till now has signed only 1 facility with the Fund, while countries such as Nepal and Bangladesh have signed a mere 2. Pakistan, for this very reason, was classified as a ‘prolonged user’ by the IMF in 2002, ranking third in the world, higher than every low-income African nation, but surpassed only by two countries; the Philippines and Panama.

One reason for this most certainly has been our constant and very costly effort to keep at par with India, economically and militarily, as well as our long-standing war on terror, all of this done too in the face of exceptionally low levels of savings in the country. As a result of such expenditures, our external accounts have typically remained under pressure, which along with soaring costs of commercial borrowing from international markets, made the IMF was an easy solution to our problems.

US Still Tilting at Windmills in the ‘Ghan: Why Is the US Sending 4,000 More Troops to Afghanistan?


KABUL, AFGHANISTAN - Sixteen years into its longest war, the United States is sending another 4,000 troops to Afghanistan in an attempt to turn around a conflict characterized by some of the worst violence since the Taliban were ousted in 2001. They also face the emergence of an Islamic State group affiliate and an emboldened Taliban, who by Washington’s own watchdog’s assessment now control nearly half the country.

In February, Special Inspector General for Afghan Reconstruction John Sopko, in his first report to the Trump administration, offered a bleak picture of a country struggling under the burden of a deeply corrupt government, a strengthening Taliban and a U.S. development budget rife with waste.

While the government of President Ashraf Ghani asked for a troop surge, at least one lawmaker, Nasrullah Sadeqizada, was skeptical of the plan and cautioned that any should be coordinated with the Afghan government and not be done unilaterally by the United States.

“The security situation continues to deteriorate in Afghanistan and the foreign troops who are here are not making it better,” he said.

At its peak, the war involved 120,000 international troops from 42 countries. So many in Afghanistan question whether adding 4,000 troops to the 8,500 U.S. soldiers in the country will bring peace. But failure could leave the U.S. vulnerable to an increasingly hostile Afghanistan and its growing anti-Western sentiment.

WHAT CAUSED THE DETERIORATION ULTIMATELY LEADING TO THE TROOP SURGE?

Sounding The Warning: DoD Report Examines The Growing Security Challenge From China

by Dean Cheng

The annual Department of Defense report on Chinese military and security development makes clear that China’s military capabilities are steadily expanding in every potential warfighting domain: land, sea, air, outer space, and information space. The Chinese are clearly intent upon dominating the western Pacific in order to secure their environment. This will affect not only U.S. allies, but the United States itself. America needs to respond by reassuring our allies and deterring potential adversaries.

Key Takeaways

China is expanding in every potential warfighting domain: land, sea, air, outer space, and information space.

The Chinese are clearly intent upon dominating the western Pacific in order to secure their environment.

The PLA Strategic Support Force will likely undertake missions to help establish dominance of the key domains of outer space and cyber space.

Select a Section 1/0

Consistent with the fiscal year 2000 National Defense Authorization Act (NDAA), the Department of Defense (DOD) recently released its annual report to Congress on Chinese military and security developments. The report lays out the official views of the DOD and the U.S. intelligence community on the state of the Chinese military and Chinese security activities. Its issuance has been protested annually by the People’s Republic of China (PRC) as furthering perceptions of a “China threat.”

Israel, the Six Day War and the End of the Two-state Solution

By David Gardner

Donald Trump entered the White House promising to be ‘the most pro-Israel president ever’. This hyperbolic bombast gratified what is certainly the most right-wing Israeli government ever, which is celebrating the 50th anniversary of Israel’s crushing victory over Arab armies in 1967, and half a century of occupation of the West Bank and Arab east Jerusalem it has no plans to end.

President Trump, the self-described dealmaker, keeps hinting and tweeting he is on course to do ‘the ultimate deal’ that has eluded his predecessors: never spelt out but assumed to mean an Arab-Israeli peace encompassing a deal for the Palestinians, who have sought in vain the state proffered tantalisingly by the Oslo accords of 1993-95.

This most erratic of US presidents, meeting Benjamin Netanyahu, Israel’s prime minister, in February, threw the international consensus on the Israeli-Palestinian conflict since Oslo to the winds, saying that the two-state solution, meant to offer security to Israel and justice to the Palestinians, may not be the way to resolve it. ‘I am looking at two-state and one-state [solutions], and I like the one that both parties like,’ Trump said, to nervous chortles from Netanyahu and general bemusement.

Trump, Who Said He Was Smarter Than All America’s Generals, Has Outsourced the War in Afghanistan

Mark Landler and Michael R. Gordon

WASHINGTON — When President Trump made his first major decision on the war in Afghanistan, he did not announce it in a nationally televised address from the White House or a speech at West Point.

Instead, the Pentagon issued a news release late one afternoon last week confirming that the president had given the defense secretary, Jim Mattis, the authority to send several thousand additional troops to a war that, in its 16th year, engages about 8,800 American troops.

Mr. Trump, who writes avidly on Twitter about war and peace in other parts of the world, said nothing about the announcement. But its effect was unmistakable: He had outsourced the decision on how to proceed militarily in Afghanistan to the Pentagon, a startling break with how former President Barack Obama and many of his predecessors handled the anguished task of sending Americans into foreign conflicts.

The White House played down the Pentagon’s vaguely worded statement, which referred only to setting “troop levels” as a stopgap measure — a tacit admission of the administration’s internal conflicts over what to do about the deteriorating situation in Afghanistan.

With a president who ran for office almost never having talked about the war, a coterie of political advisers who bitterly oppose deeper American engagement in it, and a national security team dominated by generals worried about the consequences if the United States does not act quickly, the decision could succeed in buying time for Mr. Trump and his advisers to fully deliberate over what to do in Afghanistan.

Backgrounder: The Six-Day War


With the fiftieth anniversary of the 1967 Six-Day War this month, we offer a quick review of work on the subject produced over the years by the Middle East Forum's staff and fellows, and by contributors to its flagship journal, Middle East Quarterly (MEQ).
Causes

The basic facts of the Six-Day War aren't really in dispute. In the face of a military buildup by Arab armies, bellicose threats by Arab leaders, Egyptian President Gamal Abdel Nasser's closure of the Straits of Tiran to Israeli shipping (an act of war that cut off the Jewish state's access to the Red Sea), and other provocations, Israel struck first on June 5. Catching its enemies by surprise, Israel effectively destroyed Nasser's air force in the first hours, then defeated the Egyptian, Jordanian, and Syrian armies in quick succession. By the end of the war it had captured the entire Sinai from Egypt, the West Bank and East Jerusalem from Jordan, and the Golan Heights from Syria.

The conventional wisdom is that the Six-Day War was more or less accidental in that Nasser did not want war. Led astray by Soviet misinformation and egged on by rival Arab leaders, he took the escalation a bridge too far, cornering Israeli leaders into seeing a "preemptive" strike as the only option.

But MEQ editor Efraim Karsh argues in the new Summer 2017 issue of MEQ that whatever specific triggers may have led to war on June 5, 1967, a "second all-out attempt ... to abort the Jewish national revival" was going to happen eventually given the Arab world's unwavering rejection of Jewish statehood, together with Nasser's pan-Arab ambitions and overconfidence.

New playground for non-state actors

M. K. Narayanan

‘Internet-enabled’ terrorism has introduced greater complexity in an already difficult scenario

Hidden terror was, till now, believed to be confined mainly to the less developed regions of the world — the 9/11 attack in the U.S. was seen as an aberration, or exception, rather than the rule in this respect. Since 2015, however, with the attack in January of that year on the Charlie Hebdo offices in Paris, followed by a series of major terrorist incidents in Brussels, Paris, Nice, Berlin and Istanbul during the past two years, it is evident that the developed world is no longer immune from terror strikes.

The Islamic State (IS) has claimed responsibility for the vast majority of these attacks, though this may not be true in all cases. What is not disputed any longer is that the West now has a sizeable number of radicalised Islamist elements who are willing to perpetrate acts of terror — either on their own, or under instructions from elsewhere.

Timeline of the new phase

As ISIS Shrinks in Syria, the US and Iran Draw Closer to Conflict

BY MOHAMAD BAZZI

On Sunday evening, a U.S. warplane shot down a Syrian jet after it bombed American-backed rebels in northern Syria. This marked the first time the United States has downed a Syrian warplane since the start of the country’s civil war in 2011. On Tuesday, the Pentagon announced that the United States had shot down an Iranian-made drone in the country’s southeast, where American personnel have been training anti-Islamic State fighters. 

Since President Donald Trump took office, the U.S. military has struck the Syrian regime or its allies at least five times, in most cases to protect U.S.-backed rebels and their American advisers. Even if the Pentagon may not want to directly engage Syrian forces or their Russian and Iranian-backed allies, there’s a danger of accidental escalation, especially as various forces continue to converge on eastern and southern Syria to reclaim strategic territory from ISIS. Russia, for its part, angrily condemned the U.S. action and threatened on Monday to treat all coalition planes in Syria as potential targets

But the dangers are perhaps particularly acute when it comes to Iran, which made dramatic battlefield moves of its own on Sunday, when it launched several missiles from inside Iran against ISIS targets in eastern Syria. Officially, Iran’s Revolutionary Guards said the volley of missiles fired at Deir Ezzor province was a response to a pair of attacks by ISIS in Tehran on June 7, which killed 18 people and wounded dozens; the attacks marked the first time that ISIS had struck inside Iran. But the Iranian regime had several less-dramatic means to exact revenge against ISIS targets in Syria—after all, there’s no shortage of Iranian allies operating in the war-ravaged country. 

Why Talk About Disinformation Now?

By Alina Polyakova

Cyberattacks played a key, but relatively small part in this operation. Kremlin-backed hackers used targeted phishing e-mails to steal troves of documents and communications between Democratic Party operatives, but the bigger, and more sophisticated, part came later. Rather than using the stolen information for intelligence gathering—a normal and expected technique in the world of spycraft—the data instead appeared on WikiLeaks and other sites beginning in July 2016. It was at this point that an intelligence-gathering operation turned into an influence operation.

Disinformation has become a hot topic since Russia’s interference in the US presidential elections in 2016. As seventeen US intelligence agencies agreed in December of last year: “Russian President Vladimir Putin ordered an influence campaign in 2016 aimed at the US presidential election.” This influence operation aimed to undermine faith in democracy and the credibility of the Western institutions.

The Kremlin’s well-resourced media networks, including RT and Sputnik, and its social bots and troll armies quickly spun narratives about Democratic presidential nominee Hillary Clinton’s campaign. Western media, compelled by trending topics and dramatic headlines, followed suit. And “fake news entrepreneurs” looking to turn an easy profit from ad dollars by writing false stories with alarming headlines took advantage of the scandals. As a result, the e-mail hacks, rather than policies, came to dominate our political discourse while polarizing our society. The Kremlin effectively exploited the virtues of free and open societies and the plurality of our media space to undermine our electoral process.

CJCS Dunford Talks Turkey, Iran, Afghan Troop Numbers & Daesh

By JAMES KITFIELD

Breaking Defense contributor James Kitfield spoke with Gen. Joe Dunford, chairman of the Joint Chiefs of Staff, during Dunford’s swing through Japan, Singapore, Australia, Wake Island, and Hawaii. BD readers know that Defense Secretary Jim Mattis promised Sen. John McCain yesterday that America would get a new Afghan strategy by mid-July. In this second part of Kitfield’s interview, Dunford talks Turkey, Kurds, Daesh (ISIS) and whether the US will boost the number of troops stationed in Afghanistan. Read on! The Editor.

BD: Just while you were meeting with your Asian counterparts in Singapore and Sydney, Australia, there were terrorist attacks claimed by the Islamic State of Iraq and Syria (ISIS) in London, Melbourne, and Kabul. What are we and our allies doing to try and contain the threat from ISIS’ foreign fighters returning to their home regions and launching attacks?

Dunford: One of the issues we talked about with our allies is that there are three pieces of connective tissue that unites these terrorist groups: the flow of foreign fighters, the flow of resources, and a common ideology. And we need to cut that connective tissue. A primary way we are doing that is through a broad intelligence and information sharing network that we have established with the members of the anti-ISIS coalition, who all share a common view of this threat of ISIS foreign fighters.

Who Will Fill America’s Shoes?


RICHARD N. HAASS

NEW YORK – It is increasingly clear that US President Donald Trump represents a departure when it comes to America’s global outlook and behavior. As a result, the United States will no longer play the leading international role that has defined its foreign policy for three quarters of a century, under Democratic and Republican presidents alike.

We have already seen many examples of this change. The traditional US commitment to global organizations has been superseded by the idea of “America first.” Alliances and security guarantees once regarded as a given are increasingly conditioned on how much allies spend on defense and whether they are seen to derive unfair advantage from trade with the US.

More broadly, foreign trade is viewed with suspicion – supposedly a source of job loss rather than an engine of investment, job creation, growth, and stability. Immigration and refugee policies have become more restrictive. Less emphasis is being placed on promoting democracy and human rights. More dollars are going to defense, but fewer resources are being devoted to supporting global health or development.

This is not to be confused with isolationism. Even Trump’s America will continue to play a meaningful role in the world. It is using military force in the Middle East and Afghanistan, increasing diplomatic pressure on North Korea to rein in its nuclear and missile programs, and renegotiating the North American Free Trade Agreement with Canada and Mexico. And the policies of states, cities, and companies will translate into an American commitment to climate change, despite Trump’s decisionto abandon the Paris agreement.

UK Blazes New Path on Information Sharing


The United Kingdom has revamped the way its intelligence agencies collaborate with private industry by establishing a new National Cyber Security Centre that leans towards more open and meaningful exchanges to help secure the country against malicious cyber attacks. The Cipher Brief’s Levi Maxey spoke with Sir David Omand, the former director of the Government Communications Headquarters (GCHQ) and the first UK Security and Intelligence Coordinator, about how this novel model of private-public collaboration is seeking to bridge the gaps between government and private industry when it comes to sharing information on cybersecurity threats.

The Cipher Brief: How has the UK traditionally collaborated with the private sector in areas such as threat intelligence sharing?

David Omand: The starting point for a discussion of these issues has to be the experience, driven sadly by the past terrorist threat from the Provisional IRA, that the UK security authorities have built up while working with the private sector over many years. The owners and operators of the critical national infrastructure in particular are not fazed by working with the Centre for the Protection of National Infrastructure, a part of MI5, the UK’s counterpart to the FBI, giving and receiving sensitive information about vulnerabilities.

Specialist advice on protective security and sharing of intelligence-based threat warnings and assessments became normal business practice and developed mutual confidence based on the shared goal of public protection. Now those relationships of trust between government and industry are being transferred into the cyber domain through the new National Cyber Security Centre (NCSC) a part of Government Communications Headquarters (GCHQ), the UK signals intelligence agency and partner of the U.S. National Security Agency, to face the new threats from criminal and state hackers.  

The Whiskey-Fueled Riot That Forged West Point

Matthew Gault

The United States Military Academy at West Point is synonymous with prestige. Its list of graduates includes two U.S. presidents, 40 astronauts and countless Rhodes Scholars and Medal of Honor recipients. For the past 150 years, West Point’s name has meant excellence, discipline and courage.

The name once meant debauchery, laziness and alcohol poisoning. For the first half of the 19th century, West Point was more Animal House than, well, West Point. That all changed when a new superintendent took control of the academy, modernized its practices and disciplined its cadets.

In return, the cadets got shit-can drunk on Christmas Eve and rioted.

The ensuing chaos destroyed one whole barracks. Dozens of inebriated students ran through the campus, threatening officers and puking all over the grounds. In the morning, the new superintendent rounded up a third of the worst cadets and expelled them.

It was a moment that defined the academy, the last outburst of public excess before West Point settled down and became the prestigious institution it is today. The Eggnog Riot was West Point’s last great bender.

The White House, Wonder Woman and What to Know About Thucydides

Olivia B. Waxman

For a man who's been dead for more than 2,000 years, the Ancient Athenian historian Thucydides is proving surprising relevant. He makes an appearance — though not one entirely based on facts — in the blockbuster Wonder Woman, and on Wednesday Politico reported that Graham Allison, the political scientist who wrote Destined for War: Can America and China Escape Thucydides's Trap?, recently briefed President Donald Trump's National Security Council on what the Peloponnesian War, fought between Athens and Sparta in the 5th century BC, could teach them about U.S.-China relations. 

But, though Thucydides may be having a moment, theorists of international relations have always looked to his writings for guidance on approaching international conflicts. 

He didn't always have all of the answers, however, and in fact, learned them the hard way. Thucydides was well-connected in Athenian society (he snagged an elite position as one of the ten stratēgoi, or military commanders, who were picked each year) but didn't prove himself a particularly adept military leader. During the war, the Spartan general Brasidas caught him and his fleet off-guard and was able to snatch up the strategically-important city of Amphipolis from under his nose. Thucydides was banished as a punishment so, during his 20 years in exile, which lasted until Sparta finally conquered Athens in 404 B.C., he had a lot of time to think about the meaning of war and write about the history he was living through. 

Why I’m Directing The Air Force to Focus on Space

BY HEATHER WILSON 

In the coming months, the US Air Force will grow the space force in numbers and capabilities. 

For the service that I once served and now lead, one of the most important tasks ahead is getting space operations right.

In many respects, the Air Force and the nation are at a critical crossroads. We realize, as do our potential adversaries, that space is interconnected to American life and to U.S. military success. The time is now to integrate, elevate, and normalize space in the Air Force and thus assure continued American dominance in this most critical domain. 

We will do this systematically and doggedly, drawing lessons from earlier periods in which airmen created the resources, tools, and tradecraft to assure freedom of access and freedom of operation for the U.S. military writ large. Today, we begin the process of standing up a new organization at the Pentagon that will be responsible for recruiting, training and equipping airmen involved in the space mission. The establishment of the deputy chief of staff for space operations is the next step toward ensuring that we maintain space superiority.

This move will allow us to focus our attention on many critical areas as we make the policy and budget decisions necessary to train and equip airmen for the challenges in space, an essential but sometimes overlooked area of military operations. In the months ahead, you will hear much more about how we are transforming a mission that for some time has been designed around a relatively benign environment to one that has grown crowded and contested.

Empowering DOD with critical cyber training

By Jonathan Sholtis

U.S. federal agencies have increasing concerns about cybersecurity -- and rightly so. Recently, the Department of Defense faced criticism about its preparedness for a cyber-attack. A December 2016 report from the Office of the Director, Operational Test and Evaluation stated: “DOD personnel too often treat network defense as an administrative function, not a war fighting capability. Until this paradigm changes…the Department will continue to struggle to adequately defend its systems and networks from advanced cyber-attacks.”
While critical feedback can sometimes be warranted and even beneficial to drive improvement, this characterization does not reflect current efforts.

Both former Defense Secretary Ash Carter and current Secretary James Mattis have been explicit in their view that cyber is a key part of our national defense and should be classified as part of the war-fighting domain. The likely elevation of U.S. Cyber Command to combatant command status will put it on equal footing with commands like U.S. Central Command and U.S. Special Operations Command, clearly advancing cybersecurity as a priority for DOD leadership.

Ending The Endless Crypto Debate: Three Things We Should Be Arguing About Instead of Encryption Backdoors

By Kevin Bankston

Recently I participated in a fascinating conference at Georgia Tech entitled “Surveillance, Privacy, and Data Across Borders: Trans-Atlantic Perspectives.” A range of experts grappled with the international aspects of an increasingly pressing question: how can we ensure that law enforcement is able to obtain enough information to do its job in the twenty-first century, while also ensuring that digital security and human rights are protected? How can or should law and policy adapt to a world of digital evidence, much of which is easily obtainable—but much of which is not?

The primary focus of that conference was on how best to regulate the sharing of needed user data between internet companies in one country and law enforcement in another country. However, in this post—part of an online symposium at Lawfare following up on that conference—I’ll be mostly focusing on another, particularly controversial part of the broader conversation regarding modern policing: the debate over encryption, and how law enforcement should respond to it.

First, to very briefly summarize a long-running debate: until he was dismissed in May, FBI Director Comey had been arguing since 2014 that the growing prevalence of encryption—in particular, default encryption on some smartphones, and end-to-end encrypted messages that neither messaging service providers nor the government can decode—is depriving government investigators of needed evidence. This is what the FBI calls the “Going Dark” problem. For the past several years, and most recently in two speeches in March and in testimony to Congress in early May, Comey called for a solution to that problem. Privacy and security advocates fear that the FBI’s preferred solution may end up being a wrong-headed legislative mandate requiring providers to ensure some sort of exceptional technical access to encrypted data for government—what opponents (like me) would call a “backdoor”—or otherwise ensure that they do not deploy any encryption that they themselves cannot decrypt. I won’t bother repeating here the many arguments why such a mandate would be bad for America’s cybersecurity and economic security, as well as the civil and human rights of people around the world, nor why it would be mostly useless at preventing bad guys from using encryption if they want to; see here for arguments that I and my organization Open Technology Institute have previously made.

Intelligent Machines The Dark Secret at the Heart of AI

Will Knight

Last year, a strange self-driving car was released onto the quiet roads of Monmouth County, New Jersey. The experimental vehicle, developed by researchers at the chip maker Nvidia, didn’t look different from other autonomous cars, but it was unlike anything demonstrated by Google, Tesla, or General Motors, and it showed the rising power of artificial intelligence. The car didn’t follow a single instruction provided by an engineer or programmer. Instead, it relied entirely on an algorithm that had taught itself to drive by watching a human do it.

Getting a car to drive this way was an impressive feat. But it’s also a bit unsettling, since it isn’t completely clear how the car makes its decisions. Information from the vehicle’s sensors goes straight into a huge network of artificial neurons that process the data and then deliver the commands required to operate the steering wheel, the brakes, and other systems. The result seems to match the responses you’d expect from a human driver. But what if one day it did something unexpected—crashed into a tree, or sat at a green light? As things stand now, it might be difficult to find out why. The system is so complicated that even the engineers who designed it may struggle to isolate the reason for any single action. And you can’t ask it: there is no obvious way to design such a system so that it could always explain why it did what it did.

The mysterious mind of this vehicle points to a looming issue with artificial intelligence. The car’s underlying AI technology, known as deep learning, has proved very powerful at solving problems in recent years, and it has been widely deployed for tasks like image captioning, voice recognition, and language translation. There is now hope that the same techniques will be able to diagnose deadly diseases, make million-dollar trading decisions, and do countless other things to transform whole industries.

Ransomware attack reveals breakdown in US intelligence protocols, expert says

Edward Helmore 

The attack that temporarily crippled the NHS in Britain and dozens of other institutions across Europe and Russia reveals the failure of the US government’s protocols for warning software developers and the private sector about system vulnerabilities, a cyber-security expert told the Guardian.

Under the vulnerability equities process (VEP) established by the US government, US intelligence agencies are supposed to collectively determine whether to disclose a vulnerability it has obtained or discovered – so the software developer has a chance to fix the problem – or withhold the information to use the flaw for offensive or defensive purposes.

“The NSA is supposed to lead the vulnerability equities process with all the other government agencies gathered round to discuss their interests in the vulnerability, and to weigh the offensive capabilities against defensive concerns for the private sector and US interests,” said Adam Segal, the director of the digital and cyberspace policy program at the Council on Foreign Relations. The EternalBlue-WannaCry attack showed that the NSA did not reveal the vulnerability it had discovered before it was stolen and apparently auctioned off, Segal said.

The US government has consistently indicated it is predisposed to releasing vulnerabilities and leaning toward taking a defensive position. In testimony, NSA director Mike Rogers has said the intelligence agencies revealed close to 90% of vulnerabilities they discover.

According to Segal, the Shadow Brokers case and Wikileaks’ recent ‘Vault 7’ release of CIA hacking tools have led to increasing suspicion that may only be true given a narrow definition of vulnerability.