23 August 2016

** What is striking in India is the indifference of the privileged: Chomsky


At 84, Noam Chomsky remains the sharpest, most acute, most unrelenting critic of power, particularly American power. He speaks to Priyanka Borpujariabout the evolution of protest; the disconnect between the misery he sees on the streets of Delhi and our elites’ chest-thumping pride; the narrow concerns of mainstream media; and his starring role in a Gangnam Style parody.

You have been protesting wars, from Vietnam to Iraq. And then, there has been the Occupy Wall Street movement. What have been the similarities and differences in protest movements over the years?

People do not know this, but it was very tough to oppose the Vietnam war. In the early ’60s, if I was giving a talk, it would be in somebody’s living room or a church with very few people. Right here in Boston, a liberal city, we could not have an outdoor demonstration in the Boston Common until about 1967. Any demonstration would be broken up by force. In March 1966, when we tried to have an indoor demonstration at a church downtown — since we could not have a public one — the church was attacked. The Boston Globe, which was supposed to be a liberal newspaper, denounced the demonstrators. The Harvard University faculty would not even hear about it; nobody would sign a petition. It was a few years of hard slogging. Finally by 1967-68, there were two or three years of intense activism, before it declined. The ’60s were very significant but it was very condensed. Massachusetts Institute of Technology (MIT) was a very conservative campus until about 1968 and then it became very radical, perhaps the most radical in the country.

** A Status Check on the War in Syria

Aug. 18, 2016

With so many reports circulating, we take a step back to get the whole picture and see what's really going on.

Introduction

Civil war in Syria has been raging for five years. In our 2016 annual forecast, the Islamic State was the center of gravity for the conflict in Syria, and our projections for the year revolved around them. So far those projections are on track. However, there has been a flurry of activity in the last two months that has necessitated re-examining the Syrian battlespace.

The Players

Before we can map out the conflict, we must lay out the players. The proliferation of participants is one of the reasons this war is so opaque. There are scores of militias operating in Syria. Included in these are the small and relatively ineffectual U.S.-trained and supplied fighters.

The Syrian Kurds – under the leadership of the Democratic Party of Syria (PYD) and its armed wing, the People’s Protection Units (YPG) – are the most unified. But they have committed to joining the Syrian Democratic Forces (SDF), a U.S.-backed hodgepodge of groups containing Kurds, Christian Arabs and a small number of Sunni Arabs.

The SDF has anywhere between 30,000 and 50,000 fighters. This coalition operates mostly in western Syria, dominating Hasakah province and putting pressure on the Islamic State (IS) from the north. It recently forced IS to withdraw from Manbij.

** Dismantling a Story on US Nukes


By George Friedman
Aug. 19, 2016 
An article appeared on EurActiv.com yesterday, claiming that the United States was moving nuclear weapons it had stored in Turkey to Romania. The report cited two anonymous sources. The story obviously had significance. It indicated that the breakdown in U.S.-Turkish relations had reached a new level. It indicated that the Romanian and U.S. governments were colluding to take highly significant actions without informing the Romanian public. It also indicated that there had been a massive breakdown in U.S. security, because the location of nuclear weapons should be the most secure secret.

If true, it was a major story. Clearly, by journalistic standards, it was well beyond the threshold required for publication. There were two sources, who I will assume were seemingly good sources. They obviously required anonymity, because to tell this they had to be breaking someone’s rules on secrecy. And the story was obviously important to the European public who the journalists serve.

The problem with the story, to begin with, is that it assumes both sources had access to the deepest secrets of the United States and were prepared to provide EurActiv with this secret. The location of U.S. nuclear weapons is extremely classified for a simple reason. If any enemies knew the location of the nuclear weapons, they could destroy them with conventional weapons. If the U.S. is moving these weapons, secrecy is necessary to protect against terrorists stealing them. The United States therefore holds location and movement information very tightly. Sometimes, I would suspect, they give false information on location so that any accurate leak would be mixed in with false ones. I don’t know this, but that’s what I would do if I were the U.S. government.

A cold hard look - How mining corrodes democracy

Ramachandra Guha 

When the new millennium dawned, the poster-boy of economic liberalization in my home state, Karnataka, was N.R. Narayana Murthy. A man from a middle-class home, with no tradition of entrepreneurship in his family, Narayana Murthy got together with six other like-minded individuals to found a company named Infosys. Starting from modest beginnings in Pune, by the year, 2000, the company was headquartered in an impressive campus in Bangalore, with offices around India and in many other countries as well. It employed thousands of qualified engineers, had been listed on NASDAQ, the US share market, and generated revenues of billions of dollars.

Infosys was admired not merely because of its size or profitability. It was a knowledge-based enterprise, using skilled engineers to take advantage of opportunities in the global economy. Its promoters lived low-key lives, and were quite unlike the brash industrialists of northern or western India. Finally, they were not close-fisted, giving back to society through large donations to education, healthcare, and the like.

If, in or about the year, 2000, there was any competition for Narayana Murthy in the "best known entrepreneur in Karnataka" stakes, it came from Azim Premji. Premji, too, ran a large, professionally-run and globally-admired software company, headquartered in Bangalore; he lived, if anything, a life more low-key still, and he contributed even more substantially to social causes.

Revealed: Why Manmohan Singh Sent M K Narayanan To Bengal As Governor

Book Excerpts 
August 10, 2016, 
Source Link


All politicians who acquire power develop a liking for some bureaucrats at the cost of others. These likes and dislikes go on to have a profound on policy, and indeed the country. Given below is an excerpt along the same lines from Ravi Velloor’s book India Rising. In it, he describes how former Prime Minister Manmohan Singh made National Security Advisor (NSA) M K Narayanan head to Bengal as governor, so that Shivshankar Menon, who the PM had a liking for, could be made the NSA. 

In a bureaucratic culture dominated by North Indian Hindi speakers, this Keralite lock on the PM’s inner bureaucratic circle represents something of an anomaly, which could in the long term create new fault lines around the prime minister.” — US ambassador David Mulford in a leaked US diplomatic cable from New Delhi in 2005, put out by Wikileaks 
As he settled into his second term in 2009, Pakistan was still much on Manmohan Singh’s mind, notwithstanding the shock of the previous year when Mumbai had been attacked and brought to a near standstill for three days. In his first term, he had come close to clinching a deal with Pervez Musharraf, Pakistan’s military ruler, for a series of mutual steps on the thorny topic of Kashmir that held the promise of leading to a wider settlement of their many issues. 

However, Pakistan’s internal dynamics rapidly changed and so did things in India. Now, with a renewed and stronger mandate, Manmohan wanted to give peace with Pakistan one more shot. “When can I go to Pakistan?” was a frequent question that he put to the Afghanistan-Pakistan-Iran division of the Ministry of External Affairs. 
Born in Gah, a village in the outback area of Punjab, he had been, like millions of others, displaced by the partition of India, which came with independence from the British Rule in 1947. When the subcontinent was cleaved to create Pakistan, the line drawn by Cyril Radcliffe, a British lawyer flown down for the purpose of drawing up the boundaries of the new state, ran through the heart of Punjab. Hindus and Sikhs, like Manmohan, travelled south to India and met hundreds of thousands going the other way to the new, or soon to be, Pakistan, created as a homeland for the Muslims of India.

America Shouldn't Rush to Support Sri Lanka's Military

August 18, 2016 

Colombo needs to shape up before it gets rewarded by Washington.

The United States is poised to deepen ties with Sri Lanka’s military. Such an initiative would likely include increased military cooperation between the two countries, training programs and possibly an uptick in military assistance heading to the war-torn island nation. While seemingly good intentions may be underpinning this policy shift, the Obama administration would be making a big mistake by moving in this direction. Accordingly, Washington should urgently reconsider its current approach.

The USS New Orleans, a U.S. Navy ship, just visited Sri Lanka. That’s the second ship to the country in the past few months. “The United States looks forward to working with the Sri Lanka Navy as a key force for maritime security and stability,” U.S. ambassador to Sri Lanka and the Maldives Atul Keshap said in a recent press release. Mr. Keshap had more to say on July 27 in Colombo, the capital.

Even though the precise steps for deeper military cooperation remain unclear, this looks like a profoundly disappointing development. After all, Sri Lanka’s military, and we’re not just talking about the army, is in desperate need of reform. The country’s military has been plagued by allegations of international human-rights and humanitarian law violations, including war crimes and crimes against humanity that were committed during the end of country’s civil war. No one has been held accountable to date. Due to human-rights concerns, the United States has maintained a limited military relationship with Sri Lanka for many years. Direct American military assistance ended in 2007, but the Chinese stepped in with alacrity.

China Builds First Overseas Military Outpost Naval facility under construction in Djibouti shows Beijing’s ambitions to be a global maritime power and protect its expanding interests abroad

Jeremy Page 
Aug. 19, 2016

DORALEH, Djibouti—It was February this year when camel drivers first spotted the Chinese troops staking out a patch of coastal scrubland about 8 miles from the largest U.S. military base in Africa.

Chinese navy ships had visited this tiny East African nation before. They sometimes picked up supplies in the old French port, farther down the arid coast, during antipiracy patrols off Somalia.

This time, the Chinese military was here to stay. The camel herders watched as the troops secured a plot next to a construction site where a vast new bulk and container port is taking shape.

The 90-acre plot is where Beijing is building its first overseas military outpost—a historic step that marks a bold new phase in its evolution as a world power.

Due for completion next year, the naval outpost is expected to feature weapons stores, ship and helicopter maintenance facilities and possibly a small contingent of Chinese marines or special forces, according to foreign officers and experts monitoring its development. Its cluster of low-rise concrete buildings and shipping containers, some with Chinese flags, offers the most tangible sign yet of China’s strategy to extend its military reach across the Indian Ocean and beyond.

Lone-Wolf or Low-Tech Terrorism? Emergent Patterns of Global Terrorism in Recent French and European Attacks

August 17, 2016

According to media reports, seven accomplices of Tunisian-borne French resident Mohamed Lahouaiej Bouhlel—the man who drove a 20-ton truck into Bastille Day crowds in Nice—have been charged with aiding in “murder by a group with terror links” and violating weapons laws “in relation to terror groups.” The existence of such accomplices would seem to contradict initial news reports denying any link with terrorist organizations—a lack of connection that French authorities initially maintained, as well.

This disconnect between public narrative and fact pattern is prevalent in recent incidents, both in France and beyond. In a preceding incident, on June 13 in Magnanville, Larossi Abballa, a French citizen of Moroccan descent previously convicted in 2013 of criminal association to plan terrorist acts, used a knife to kill a police officer and his wife in front of their three-year-old child. While initial reports underscored the perpetrator’s solitary lone wolf status, less than a week later French prosecutors charged two other men—Charaf-Din Aberouz and Saad Rajraji, both convicted in 2013 of “being part of a French jihadist group”—for providing support to Abballa.

Accomplices—often discovered weeks after the media loses interest in a case—are not the only or best indicator of the durable links, ideological and material, that have animated a terrorist act. It is impossible to treat the 14,000+ terrorist attacks worldwide in the past year individually, but focusing on France, two January 2016 incidents involved similar suspects, tactics, and motives. First, a 29-year-old French national of Tunisian descent drove his car into soldiers protecting a mosque in Valence on January 1, and a Tunisian native, Tarek Belgacem, used a fake explosive vest and meat cleaver to attack police in the Goutte d’Or district on January 7, the one-year anniversary of the 2015 Charlie Hebdo killings. In both cases, news reports found the attackers “acting alone” with “no particular link to any movement.” Aside from the fake suicide vest, a symbolic weapon of contemporary irregular wars, Belgacem held more than 20 aliases from seven different countries, had migrated to the EU through Romania in 2011 by falsely posing as an asylum-seeker from Iraq or Syria, and lived at an asylum center in Recklinghausen, Germany. Both men, as per ISIS-dictated clichรฉ, shouted a version of Allahu Akbar at imminent victims, amassed jihadi content on their electronic devices, and rationalized their acts by vague reference to global grievancesagainst “Muslims” (excepting, of course, those they attacked).

Is Obama’s Drone War Moral? The ethics of defensive killing

AUG 18, 2016 

The Obama administration opened up significantly this summer about its efforts to kill suspected terrorists outside what it calls “areas of active hostilities,” like Afghanistan, Iraq, and Syria. It released information on the number of civilians accidentally killed in drone strikes and unveiled its framework for making targeting decisions. Coming in the waning days of the administration, these measures presumably represent the president’s last major maneuver in his efforts to defend a program that will help define his legacy—and that his successor will inherit.
The administration’s defense of the program has largely focused on its legality.Top government lawyers have repeatedly made the case that in countries like Pakistan, Yemen, and Somalia, the program not only meets but exceeds the legal constraints on targeting those the Obama administration deems threats. But is Obama’s drone war moral?

 ‘We Have No Idea What War Is’There are two parts to this question: First, can targeted killings outside of conflict zones ever be justified? Second, is the structure that Obama has put in place over the years actually upholding those standards? The answer to the first question, according to philosophers of war, is yes, and the standards for “moral” killing allow for more civilian casualties than one might expect. The answer to the second question is harder. The intense secrecy surrounding the program not only makes it difficult for outsiders to assess the morality of targeted killings, it means the government is failing to uphold its basic moral duties to the public and the people it is targeting.

When Obama has made the moral case for the drone war, he has claimed to uphold the highest standards in defending the nation’s security. “That means taking strikes only when we face a continuing, imminent threat, and only where there is … near certainty of no civilian casualties,” he told an audience at West Point in 2014. Last month, the administration gave its first self-evaluation of how well it had succeeded, claiming to have killed at most 116 civilians in drone strikes outside of war zones, compared with up to 2,581 “combatants.” (Independent estimates put the number of civilian casualties far higher.) But what do these numbers really signify? And can they help Americans grade the morality of the drone campaign as a whole? 

Status Report on NSA’s Mysterious Reorganization Plan

Shaun Waterman
August 19, 2016

NSA seeks to reassure on merging cyber defense, offense

Officials at the huge spy agency say, despite concerns, a coming reorganization will not impact their work to defend U.S. computer networks from hackers and cyberspies. 

The NSA’s fabled Information Assurance Directorate may be going away in a major reorganization of the agency at the end of August, but “the mission will continue,” the directorate's chief said this week.

IAD Director Curtis Dukes told a handful of reporters at a briefing in Washington that his staff would continue protecting the computer networks of the U.S. military and intelligence agencies, as well as working with the FBI, Homeland Security and private sector partners to keep hackers and cyberspies at bay for the civilian government and key industries.

According to an NSA handout, the reorganization, dubbed NSA21, will reconfigure the huge sprawling agency into six directorates: 

Workforce & Support Activities; 
Business Management & Acquisition; 
Research; 
Engagement & Policy, which the handout says will serve as the NSA’s “‘front door' to ensure we speak with one voice in all external engagements;” 
Capabilities, responsible for "deploying personnel across the enterprise to support mission operations;“ and 
Operations, which will merge the two largest existing directorates — signals intelligence and information assurance. 

How big data will revolutionize the global food chain By Clarisse Magnin

By Clarisse Magnin


Advanced analytics opens vast untapped potential for farmers, investors, and emerging economies to reduce the cost of goods sold. 

The way digital technologies are reshaping the relationship between consumers and brands has been hotly debated over the past few years, with much discussion of the reshaping of consumer decision journeys, the advent of multichannel marketing and sales, and the impact of smartphones and the mobile Internet on customer behavior. Yet an even bigger opportunity has been largely overlooked. By taking advantage of big data and advanced analytics at every link in the value chain from field to fork, food companies can harness digital’s enormous potential for sustainable value creation. Digital can help them use resources in a more environmentally responsible manner, improve their sourcing decisions, and implement circular-economy solutions in the food chain. 
Huge untapped potential 

So far, most of the excitement about digital’s potential in the consumer-packaged-goods industry has centered on marketing and sales. But for food producers, the opportunities begin higher upstream and end lower downstream. At the upstream end, the agricultural practices followed by dairy farmers, cacao and coffee producers, wheat and barley producers, cattle farmers, and so on result in enormous variations in commodity costs in an industry where raw materials represent easily 60 percent of the cost of goods sold (COGS) (Exhibit 1). 

The Role of Network Science in Analyzing Slums in Rapidly Growing Urban Areas



Introduction

In the coming decades the United States military will find itself operating in increasingly complex environments. New concepts of operations and new language in military doctrine are needed to address the complexities of these tactical, operational, and strategic environments. In particular, the complexities of urban and peri-urban—areas located in the “urban-fringe”—regions require new tools and concepts to develop more effective operations and supporting doctrine. Rapidly evolving social, economic, and physical structures throughout the world suggest that future operations will involve complex systems, unexpected scenarios, and nonlinear processes. As a basis for military decision-making, these systems have been described as having four components: volatility, uncertainty, complexity, and ambiguity (VUCA) (Kail 2010). VUCA features help explain political, social, informational, organizational, and physical infrastructure networks within complex environments. 

The recent focus on the four VUCA features highlight the complex nature of modern military operational environments. This perspective calls on particular strategic approaches to deal with VUCA characteristics: Volatility refers to rapid, drastic changes in the environment­—strategic plans that assume static environments become ineffective; Uncertainty refers to the unexpected and unclear environments faced by soldiers—military units cannot create useful situational awareness because past experiences do not necessarily help predict the future situation; Complexity refers to systems that are interactive, interdependent, and often multi-layered. Not accounting for the interdependencies and multiple dimensions of these systems will produce inaccurate assessments, which can be disastrous, setting off a cascade of unanticipated events. Ambiguity refers to the difficulty in determining, delineating, defining, and classifying the true problem—uncertainty must be quantified and accounted for in analysis. Supporting nation-building and humanitarian activities necessitates a deeper understanding of how these societal systems function.

Methods used to analyze VUCA environments are growing beyond traditional descriptive statistics, which inherently assume independence among components. During the past decade some of the most important advances towards understanding VUCA have been provided in context of network theory. Network science models capture a dynamic understanding of the interdependence among components, and the evolution of these relationships over time. Developing network models and theoretical approaches is critical to understanding, navigating and leveraging unfamiliar and complex social and physical terrains, particularly in large urban and peri-urban areas.

TWENTY-FIVE YEARS AFTER THE FAILED SOVIET COUP

AUGUST 19, 2016
http://www.newyorker.com/news/news-desk/twenty-five-years-after-the-failed-soviet-coup

Russia’s newly elected President, Boris Yeltsin, speaks from atop one of the tanks that surrounded the building of the Russian Council of Ministers, or “White House,” during the attempted coup of August, 1991.

In August, 1991, a small group of hard-liners in the Soviet government staged a coup aimed at halting the popular anti-Communist, pro-freedom tide stirred by Mikhail Gorbachev’s perestroika. On their orders, tanks surrounded the “White House,” the seat of the government of Russia (then a constituent part of the Soviet Union), which was led by Boris Yeltsin, the newly elected President. Tens of thousands of Muscovites rushed to the White House, to rally around Yeltsin and defend Russian freedom against the Communist putsch. Three days later, the putschists suffered a spectacular defeat.

It was a unique moment in Russian history, when people, on their own initiative, organized to take political action, guided by a strong conviction of what was right for their country. Andrey Desnitsky, a Russian scholar and columnist who was in his early twenties at the time, remembered those events in a piece published this week on the news Web site Gazeta.ru:

At night we heard faraway shooting, and we thought, here it is—they are beginning to storm. The square in front of the White House was packed with people. It was clear that if tanks and submachine gunners advanced, there’d be no place to hide or run away. I was scared, shaking, but . . . I think for the first time in my life I felt to be free and a citizen of my country making its history together with other citizens. And no price seemed too high to pay for this feeling.

Germany’s Weak Negotiating Power


By Lili Bayer
Aug. 15, 2016

German Foreign Minister Frank-Walter Steinmeier is meeting with his Russian counterpart, Sergey Lavrov, today in Yekaterinburg, Russia to discuss the latest escalation in Ukraineand the impasse over Syria. Last week, German State Secretary Markus Ederer rushed to Turkey to, in the words of the German Foreign Ministry, “re-establish direct channels of communication” with the Turkish authorities. Germany has criticized Turkey’s actions following the failed coup, which caused a strain in relations with Ankara. This raised further questions over whether the European Union’s refugee deal with Turkey will be fulfilled.

These meetings are a small indication of a larger problem for Berlin: it is facing a growing number of crises, at home and abroad, that it has limited power to address. For Germany, stability in Ukraine and the European Union’s agreement with Ankara on refugees are key priorities. Surrounded by instability, Germany is attempting to play a leadership role in resolving regional crises, but finding that in reality Washington – and not Berlin – holds the cards. Germany’s ability to shape Russia’s actions in Ukraine and Turkey’s trajectory is limited.

For Germany, stability in Ukraine is key. Last week, Russia accused the government in Kiev of conducting a raid in Russia-controlled Crimea and threatened to call off planned talks with Ukraine, Germany and France. Since the annexation of Crimea and outbreak of hostilities in eastern Ukraine in 2014, Germany has attempted to position itself formally as a mediator in the conflict, leading rounds of negotiations between Russia and Ukraine.

A Special Relationship for the UK After All


By Jacob L. Shapiro
Aug. 18, 2016 
Michael Roth, Germany’s Minister of European Affairs, made some striking comments about the United Kingdom’s relationship with the European Union yesterday. Roth said, “Given Britain’s size, significance, and its long membership of the European Union, there will probably be a special status which only bears limited comparison to that of countries that have never belonged to the European Union.” This contradicts the previous official German position on what will happen when the U.K. eventually triggers Article 50 and begins the formal process of leaving the European Union, and underscores just how overblown the ramifications of Brexit have been.

German Chancellor Angela Merkel has been quite clear formally that the EU should take a firm stance in future negotiations with the U.K. Speaking to the Bundestag shortly after the U.K. voted to leave, Merkel made it clear that the vote meant that the U.K. had left the “European family” and that it would receive no special treatment, nor would it be allowed to “cherry-pick” the privileges it wanted to retain. European Commission President Jean-Claude Juncker was even more frank on the eve of Britain’s vote, saying simply that there would be no future renegotiation with the U.K. – “out is out.”

There was a great deal of hyperbole both in the media and in the words and actions of politicians surrounding Brexit. Those supporting “remain” in the U.K. pointed to government studies saying that leaving would result in immediate and catastrophic consequences for the British economy. Donald Tusk, the current President of the European Council, actually suggested that Brexit was a harbinger not just for the destruction of the EU, but for “Western political civilization.” The idea that Great Britain’s vote meant that the U.K. would turn its back completely on Europe and that Brussels and London would not find common ground on which to work out a relationship is similarly preposterous.

Snowden Documents Confirm That NSA Hack Was Real

Sam Biddle
August 20, 2016

The NSA Leak Is Real, Snowden Documents Confirm

On Monday, a hacking group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

Hacking tools stolen from NSA show Chinese cyberfirms were targeted, experts say

Stephen Chen and Nectar Gan
August 20, 2016

Hacking tools stolen from NSA show Chinese cyberfirms were targeted, experts say

Hacking tools claimed to be pilfered from the US National Security Agency reveal a ­severe security threat to China, mainland experts say, with a leading national provider of network security said to be among the victims of the government hackers.

Some of the data was released online over the weekend by the Shadow Brokers, an anonymous group of hackers which said it took them from the “Equation Group”, an elite espionage team widely believed to be operated by the NSA. An increasing number of security experts have since said the data appeared to be legitimate.

American cybersecurity firm Risk Based Security studied the release and found one victim was Beijing Topsec Network Security Technology, which provides firewall ­services to government arms, including the tax bureau, as well as the military.

An analysis of the data by mainland ­cybersecurity company Rising showed China was at a severe risk.

“We can tell for certain now that some attacks have been carried out against China,” Rising senior engineer Tang Wei said. “Topsec has been compromised; they are one of the largest security hardware suppliers in China, as big as Huawei.”

NSA hack reveals flaws in White House zero-day process

AUGUST 18, 2016

Opinion: NSA hack reveals flaws in White House zero-day process

A potentially damaging hacking tool revealed in the apparent National Security Agency breach includes a zero-day vulnerability – or previously unknown security hole – in Cisco software. The government should have already disclosed that flaw.

Earlier this week, a group calling itself the Shadow Brokers released a cache of military-grade computer hacking tools. Since then, experts and former agency employees have substantiated that the tranche of custom-made malwar originated from the National Security Agency.

Now, the dump is raising serious questions about the nature of the US government's cyberweapons arsenal. Chief among those questions is whether or not the US government should withhold information about potentially damaging flaws in software programs widely used by American companies. 

One of the most potentially damaging exploits that the Shadow Brokers revealed is a so-called "zero-day" vulnerability in a Cisco security product common in many American critical infrastructure facilities. Zero-days are security flaws that the affected company doesn't know about. 

Is that the kind of flaw that the NSA should keep secret from American businesses? Should it have told Cisco?

THE NSA LEAK IS REAL, SNOWDEN DOCUMENTS CONFIRM



ON MONDAY, A HACKING group calling itself the “ShadowBrokers” announced an auction for what it claimed were “cyber weapons” made by the NSA. Based on never-before-published documents provided by the whistleblower Edward Snowden, The Intercept can confirm that the arsenal contains authentic NSA software, part of a powerful constellation of tools used to covertly infect computers worldwide.

The provenance of the code has been a matter of heated debate this week among cybersecurity experts, and while it remains unclear how the software leaked, one thing is now beyond speculation: The malware is covered with the NSA’s virtual fingerprints and clearly originates from the agency.

The evidence that ties the ShadowBrokers dump to the NSA comes in an agency manual for implanting malware, classified top secret, provided by Snowden, and not previously available to the public. The draft manual instructs NSA operators to track their use of one malware program using a specific 16-character string, “ace02468bdf13579.” That exact same string appears throughout the ShadowBrokers leak in code associated with the same program, SECONDDATE.

SECONDDATE plays a specialized role inside a complex global system built by the U.S. government to infect and monitor what one document estimated to be millions of computers around the world. Its release by ShadowBrokers, alongside dozens of other malicious tools, marks the first time any full copies of the NSA’s offensive software have been available to the public, providing a glimpse at how an elaborate system outlined in the Snowden documents looks when deployed in the real world, as well as concrete evidence that NSA hackers don’t always have the last word when it comes to computer exploitation.

How the cyber age gave peace a chance

By Bruce Sterling
17 August 2016 
Source Link

Bruce Sterling, the godfather of cyberpunk, revels in a new history of cybernetics, cyber-spinoffs and gadget-happy cyber movers and shakers

Close cousins? Cybernetic theory has helped inspire the world of AI

THOMAS RID studies war at King’s College London. Recently he has been pondering “cyberwar”, since “cyber” garners much military-industrial gold and glamour these days. This has led him to wonder what people could possibly mean by a strange term like “cyber”.

This thoughtful, enlightening book is his answer: a melange of history, media studies, political science, military engineering, and, yes, etymology.

It takes Rid a full 25 pages of cautious scholarly preface to get to his original research, but after that, every chapter opens up as smoothly as an automated glass door. In Rise of the Machines, Rid has created a meticulous yet startling alternate history of computation.

Within Rid’s framing, Alan Turing’s famous Colossus codebreaker merely lurks in a dim barn somewhere. The true primal beast of modern computing is the interactive gunsight system, an artillery gizmo that spewed tracer fire across the dark skies of the second world war. 

Our central protagonist is not Alan Turing but Norbert Wiener, an academic at the Massachusetts Institute of Technology at the time, who was researching anti-aircraft weapons. Wiener sought to mathematically automate a new prediction and aiming system so that Allied ack-ack gunners could outguess dive-bombing Axis pilots. He had no engineering success whatsoever; meanwhile all the truly capable MIT guys were away, building atom bombs in the desert.

Then peace broke out, and Wiener revealed his new, general theory of humanly interactive yet self-steering machines. He called it “Cybernetics”. Trendspotters quickly picked up and spread the idea, and it’s here that Rid comes into his own as an able historian, excelling at who knew whom exactly when. 

In the main, the early cybernetics community was made up of peacenik, left-wing intellectuals who were dumbfounded by the A-bomb. Bertrand Russell considered Wiener a moral titan. Wiener also got a swift, favourable hearing from the soft-science brigade, who quickly realised that “cybernetic feedback” was Darwin-scale high concept, an intellectual gift that would keep on giving.

“Cybernetic feedback was Darwin-scale high concept, an intellectual gift that would keep on giving“

As a working technology, cybernetics reached its apogee before any digital computers appeared. Rid has a historian’s tenderness for odd cybernetic mechanical systems, and these, far from being the parents of true computers, are better considered the children of weapons systems. Gadgets like the obscure Ashby homeostat (“the closest thing to a synthetic brain so far designed by man”, Time magazine proclaimed) have a mid-century Alexander Calder beauty about them: they move mysteriously, metal mobiles steering through a breeze. 

The next world war is going to be fueled by state-sponsored hacking


Battles in the next world war will be fought in the air, on the ground, and online.

"We've grown used to the fight being in just one domain," Dr. Peter Singer, a strategist at the think tank New America and coauthor of "Ghost Fleet," told Business Insider. "[But] we have these new domains that we've never fought in before, and that's outer space, and cyber space."

While the US has gotten somewhat used to fighting insurgencies and irregular wars, Singer believes the world may be swinging back toward the conventional path, especially as China continues to ramp up its military capabilities.

Singer and August Cole's "Ghost Fleet" put forth a story of what could potentially happen if the US, China, and Russia went to war, and hacking and electronic warfare played a big part in it. Though the book was fictional, all the technology the authors used was drawn from the real world, whether it was currently deployed or in a prototype stage - and it has become recommended reading by the military's top leaders.

"If you're not able to operate the way you want to in cyberspace," Singer said. "That means you can lose battles on land and sea."

Interestingly, the shift to using cyber means of attack instead of conventional ones has already been happening for some time, as Singer explained. We've seen a "micro version" of this new age of warfare playing out recently in Ukraine, Syria, and elsewhere.

Or as one Army officer put it during a 2015 training exercise, "future fights aren't going to be guns and bullets. They're going to be ones and zeroes."
World War 3.0

The Fog of (Cyber) War—Part 2 of 2

08.18.2016

A man walks past the Cyber Terror Response Center in Seoul, South Korea, March 21, 2013. A cyber attack on computer networks in South Korea the day before was traced to China. 

Earlier this summer, Carl Robichaud, Carnegie Corporation of New York’s program officer in International Peace and Security, and Scott Malcomson, Carnegie visiting media fellow, organized an online discussion of new technologies and nuclear security with security policy experts Ivanka Barzashka, Austin Long, Daryl Press, and James Acton. This is the second part of the 2-part discussion. Read Part 1

Carl Robichaud: Let’s talk a bit about how cyber fits in. The preoccupation right now is with how cyber can be used as part of a “gray” campaign to create aggression that cannot be easily deterred. But there’s a different use for cyber attacks: as part of a comprehensive military strategy that can be used to blind and confuse adversaries, attack their command and control, etc. Cyber as part of kinetic warfighting, instead of as an alternative to it. Can you speak to this? What are the implications? What are the countermeasures countries will take?

It is difficult to distinguish cyber intelligence collection from cyber preparation for attack, as well as to distinguish cyber attack from equipment failure.

— AUSTIN LONG

Cyber espionage: A new cold war?

Sam Jones
7:30 pm

An online ‘auction’ signals a build-up of tension between Russia and America

his is a tale of spies, a $500m cyber arms heist, accusations of an attempt to manipulate a US presidential election and an increasingly menacing digital warbeing waged between Russia and the west.

It begins with a clandestine online group known as The Shadow Brokers. There is no evidence that it existed before last Saturday, when a Twitter account in its name tweeted at a handful of leading global news organisations with an unusual announcement: it was conducting a $500m auction of cyber weapons.

In a show of faith, the group put a selection of its wares — a 4,000-file, 250MB trove — on public display. Security analysts have been racing to go through the list but it is already clear that at least some of what has been revealed so far is real.

What is most remarkable, though, is the likely former owner of the Shadow Brokers’ cyber bounty: an outfit known as the Equation Group. Equation is an elite hacking unit of the US National Security Agency. The Shadow Brokers claim that the stolen goods are sophisticated cyber weapons used by the NSA.

The Shadow Brokers’ motivations are not entirely clear. “If this was someone who was financially motivated, this is not what you would do,” says Orla Cox, director of security response at Symantec, a leading cyber security company. Cyber weapons are typically sold over the dark web, notes Ms Cox, or they are used by hackers who want to remain anonymous. They certainly are not advertised to news outlets. And even the best are not priced in $500m bundles.

Can the A-10 Warthog Defeat Its Toughest Enemy?

August 19, 2016 

The United States Air Force is fighting insurgencies in Afghanistan, Iraq, Libya and Syria—but in recent years, the Air Force has had to contend with two uprisings much closer to home in Washington, DC. One was the storm of criticism it received over the controversial and expensive F-35 Lightning stealth fighter—but the trillion-dollar project falls under the definition of “too big to fail,” at least contractually speaking.

The other revolt concerned the fate of the A-10 Thunderbolt II ground attack plane, nicknamed the Warthog for its svelte good looks. In this case, Congressional activism succeeded in thwarting the A-10’s retirement, at least for now. Despite some gnashing of teeth by the top brass—accusations of “treason” were leveled at Warthog proponents at one point—a fleet of fewer than three hundred A-10s will remain in service at least until 2022—some possibly up until 2028. It is currently being deployed operationally in the campaign against ISIS.

The debate around the Thunderbolt is instructive because it reveals divergent philosophies and priorities within the U.S. military. While some of the political tactics in the A-10 debate may be controversial, both sides have rationales for their positions, which are worth judging on their own merits.

The Warthog can be described in four words, but I’ll add in a few hundred more because I’m generous that way.

Army Struggles To Open Up To Industry

August 18, 2016 

(L-R) Army acquisition chief Katrina McFarland, Gen. Dennis Via, and Gen. David Perkins at Army Innovation Summit.

WILLIAMSBURG, Va.: The next time the Army holds a conference on how to improve its relations with industry, it should actually let industry into the most important session, Maj. Gen. Bo Dyess told his four-star superiors at the Army Innovation Summit here. It just has to get around its own lawyers.

This week’s conference — the third Army Innovation Summit in nine months, but the first one open to industry — serves as a microcosm of the service’s struggle to open up. Plagued by bureaucracy, budget cuts, and canceled programs, the service wants industry, academia and its own internal fiefdoms to work together better and earlier. The goal is to explore the art of the possible on weapons programs before the Army locks in official requirements that have — far too often — proven too ambitious, too expensive or too inimical to innovation.

But the largest service keeps finding its biggest enemy is itself. “I frankly have concerns about the Army,” Pentagon acquisition chief Frank Kendall told the conference, especially because it has less in-house engineering expertise than the Air Force and Navy have to manage complex programs. While the entire Defense Department has procurement problems, Kendall continued, “the Army, I think, has a particular problem with this because they have so many different communities” — from tankers and helicopter pilotsto logisticians and cyberwarriors — “and they’re all competing for resources.” It takes a bureaucratic tour de force just to get all the Army’s different tribes working with each other, let alone with outsiders, which is why the first two Innovation Summits focused on coordination within the massive Army Materiel Command.

Gen Robert Scales On The Steep Price Paid By America’s Infantry

August 18, 2016

Retired Maj. Gen. Robert Scales talks about what happens when we don’t prioritize the needs of the infantry.

Since World War II the majority of American combat deaths have come from the infantry. This band of brothers, and now sisters, makes up a small minority of the military, but does the bulk of our fighting and dying.

These are our nation’s warriors. Their job is one that requires them to leave the wire every day with the intention of finding, closing with, and killing the enemy. They do battle with their foes close in and at the small unit level. These engagements should be one-sided fights, with the odds weighted in favor of American infantrymen and special operators. Tragically, this is not the case.

In his upcoming book “Scales On War: The Future Of America’s Military At Risk,” retired Army Maj. Gen. Robert H. Scales Jr. posits that had ground combat troops serving in Iraq and Afghanistan been better armed, equipped, and supported, the extraordinary feats they accomplished in battle would not have been required, and the losses suffered might have been substantially less.

In Scales’ 35 years of service he commanded two units in the Vietnam War as a field artillery officer and was awarded the Silver Star for his actions during the Battle of Hamburger Hill. He has held commands in South Korea, across the United States, and rounded out his career as the commandant of the Army War College before retiring in 2001. Since leaving the Army, he has worked as a senior military analyst for Fox News for 14 years, and as a commentator for NPR and BBC, written for a host of news publications, as well as penning numerous books on the history and future of American warfare.

22 August 2016

GILGIT & BALTISTAN, CHINA & NORTH KOREA

http://www.southasiaanalysis.org/paper289

Paper 289 07.08.2001
by B.Raman
Before the recent Agra summit, Gen.Pervez Musharraf, Pakistan's self-reinstated Chief of the Army Staff (COAS), self-styled Chief Executive and self-promoted President, had held a series of consultations with political and religious leaders of Pakistan, including Pakistan-Occupied Kashmir (POK), on his negotiating strategy at Agra. As we had mentioned in our reports on the subject available at www.saag.org , significantly, he did not invite any representative of the Pakistan-Occupied Northern Areas (Gilgit & Baltistan) for these consultations.

Reports available since then indicate that his decision not to invite anyone from the Northern Areas was due to the fact that Gilgit was in a serious state of unrest for a fortnight from the last week of June,2001, due to protests from Sunni organisations over the decision of the local administration to introduce different text-books in the schools for the Shias, who are in a majority in Gilgit, and the Sunnis. Embarrassed by the outbreak of the violence before the summit, the Pakistani authorities stopped all movements between Gilgit and the rest of Pakistan and imposed strict censorship on the publication of the details of the incidents in Gilgit.

The riots in Gilgit started on June 23,2001, when there were clashes between the workers of the extremist Sunni organisation Sipah Sahaba Pakistan (SSP) and law enforcing agencies following the arrests of some SSP leaders, who demanded that Shia students should study the same books as are prescribed for Sunni students by the Sunni Ulema and not separate books approved by the Shia clergy.

The Sunni traders started a shutter down strike in protest against the arrests of the central Khateeb and Ameer Tanzeem-e-Ahle-Sunnah-al-Jamat, Maulana Nisar Ahmed, and the President of the Gilgit branch of the SSP,Himayat-ullah, along with other religious scholars on the night of June 22.

To disperse rioting SSP members, the police first baton charged and when the SSP cadres retaliated by pelting stones, they fired tear-gas shells intermittently for nearly two hours, which resulted in a large number of casualties. A curfew was imposed and para-military forces were deployed to enforce it.

Thousands of protesting activists of the Ahle Sunnah blocked the roads in Gilgit City and Kohistan to prevent the movement of reinforcements, which were then rushed to the affected areas by helicopters, The Army then forcibly removed the demonstrators from the roads and used bulldozers to remove the barricades erected by them.

Subsequently, about 500 activists of the SSP surrounded the Gilgit City Police Station, demanded the release of the arrested Sunni leaders and defied an one-hour ultimatum to disperse issued by the Army.Brig.Zahid Mubashir, the Station Commander at Gilgit, then rushed to the Police Station and tried unsuccessfully to persuade the demonstrators to disperse. Later, he withdrew the Army to the barracks and let the local Police handle the inflamed situattion.