2 December 2017

The Battle for Advantage in Afghanistan


The war in Afghanistan, which has embroiled U.S. and NATO forces in battle with Taliban insurgents for the better part of two decades, remains locked in a stalemate that both sides are trying to figure out how to break. Gen. John Nicholson, commander of the U.S. forces in the country, acknowledged the impasse in a Nov. 23 interview, but added that he thinks a coming surge of U.S. troops into the country will help the Afghan National Security Forces conduct major offensives over the next two years that will turn the tide of the war in their favor. Meanwhile, on the other side of the conflict, the Taliban have been busy shoring up their positions and looking for ways to intensify their insurgency. For both sides, however, breaking the stalemate is much easier said than done, especially given the complexities inherent to the Afghan battlefield.

Handing Advantage to the Taliban

Rohingya militancy poses a regional threat


BY BRAHMA CHELLANEY

In Myanmar, one of the world’s most diverse, multiethnic nations, there is a rare consensus — the much-persecuted Rohingya Muslims are outsiders and not part of the country. A military operation to flush out Rohingya militants waging a hit-and-run campaign has led to an exodus of Rohingya residents from Rakhine state, creating a refugee crisis for Bangladesh and, to a smaller extent, India. India, over the years, has generously admitted asylum seekers or refugees from a host of places, including Tibet, Afghanistan, Iran, Pakistan, Sri Lanka, Myanmar and China. But the illegal entry of tens of thousands of Rohingya is seen in India as an internal security challenge, in part because of the threat the Indian government perceives from Rohingya jihadist activities. Rohingya militants have a long history of violent jihadism, including recent attacks on non-Muslim civilians in Rakhine state.

The Crisis of the Iraqi State

YEZID SAYIGH

The liberation on November 17 of Rawa, the last significant Iraqi town held by the Islamic State, promises the end of a particularly dangerous phase in the history of a country that has experienced three especially destructive wars since 1980 and almost incessant armed conflict in between. But rather than an era of peace and stability, what Iraq faces next is a far more complex and potentially fateful struggle. For three years since the Islamic State’s dramatic surge and capture of the northern city of Mosul, the military campaign to defeat it has obscured the three challenges that truly threaten the cohesion and integrity of the Iraqi state from within.

China’s ‘Three Warfares’ In Xinjiang

Author: Michael Clarke, ANU

There has been extensive analysis of China’s use of ‘three warfares’ — public opinion, psychological warfare and legal warfare — in the context of external issues like the South China Sea dispute and the Doklam standoff with India. But China has also deployed elements of the ‘three warfares’ to counter a primarily domestic security challenge: the threat of Uyghur militancy, radicalisation and terrorism in Xinjiang. This is consistent with China’s conception of information warfare as a non-kinetic instrument to not only contain the capabilities of adversaries but to ultimately degrade their will and capability to initiate or sustain political or military struggles contrary to China’s interests.

China racing for AI military edge over U.S.: report

Phil Stewart

A research arm of the U.S. intelligence community just wrapped up a competition to see who could develop the best facial recognition technology. The challenge: identify as many passengers as possible walking on an aircraft boarding ramp. Of all the entries, it was a Chinese start-up company called Yitu Tech that walked away with the $25,000 prize this month, the highest of three cash awards. The competition was one of many examples cited in a report by a U.S.-based think tank about how China’s military might leverage its country’s rapid advances in artificial intelligence to modernize its armed forces and, potentially, seek advantages against the United States.

Funding Policy Research at Washington’s Most Influential Institutions

BY BETHANY ALLEN-EBRAHIMIAN

Former Hong Kong Chief Executive Tung Chee-hwa speaks during a press conference in Hong Kong on September 3, 2014. Tung supported the standing committee of China's rubber-stamp parliament who on August 31 ruled out public nominations for Hong Kong's next chief executive in 2017, with candidates for the city's top job to be approved instead by a Beijing-backed committee.The Johns Hopkins University’s School of Advanced International Studies (SAIS), located just a short walk from Dupont Circle in Washington, D.C., is one of the top international relations schools in the United States. Its graduates feed into a variety of government agencies, from the State Department to the CIA, and the military. Its China studies program is especially well known; many graduates come away with expert knowledge of the language, culture, and politics of the United States’ most important strategic competitor.

The jihadist Plan To Use Women To Launch The Next Generation Of ISIS

By Joby Warrick, Souad Mekhennet,

The woman’s secret flight from the caliphate took place more than six months ago, aided by a smuggler who helped her sneak across the Syrian-Turkish border one spring night. But in spirit, this red-haired exile from the Islamic State never truly left. She covered herself in black from head to toe to greet a recent visitor to the small Moroccan house where she stays, and removed her veil only when assured that her guest, also a woman, was alone. Over sips of mint tea, she spoke admiringly of her militant husband and the comrades she met in the Islamic State’s all-female brigade. Calling herself Zarah — she declined to give her family name because she had traveled to Syria in secret — she vowed that her children would someday reclaim the Islamist paradise she believes was stolen from her family.

Iran Reshapes the Middle East

By George Friedman

Iran has always seen itself as being in competition with the Arab states for domination of the Persian Gulf. Its ambitions were put on hold in the late 1980s, at the end of an eight-year war with Iraq that cost Iran more than a million casualties. The war ended in a military draw, but strategically it blocked Iran’s hopes for expanding its power westward. The war against the Islamic State, particularly in Iraq, has opened that door again.

The Iranian Surge

Sinai Peninsula – from Buffer Zone to Battlefield

By Lisa Watanabe for Center for Security Studies (CSS)

The this article was originally published by the Center for Security Studies (CSS) as part of the CSS Analysis in Security Policy series in February 2015. The neglect of the Sinai and growth of a security vacuum on the peninsula has transformed Egypt’s backwater into a stronghold of militancy, with implications of not only national, but also regional and global significance. On 10 November 2014, the deteriorating situation in the Sinai was thrust into the spotlight when the most capable and active Salafist jihadi group on the peninsula, Ansar Bayt al-Maqdis (“Supporters of Jerusalem”, ABM), pledged allegiance to the so-called Islamic State (IS) and renamed itself the “Sinai Province”. However, it has really been at least a decade since the alienation of the local population from the central state and the erosion of the latter’s authority in the peninsula began to provide fertile ground for such groups to emerge on the Sinai. The security vacuum created by the fall of the Mubarak regime in 2011 provided a further impulse for the transformation the Sinai into the site of a full-blown insurgency and a haven for jihadi groups, some of which have links to global terrorist networks. The Egyptian military and security services in particular have been targeted by Sinai-based violent Islamist groups since the 2013 coup.

Search is on for North Korean missile debris

Bill Gertz

U.S. and Japanese warships sailed to the waters near northwestern Japan this week to support American intelligence agencies in a search for the debris of North Korea’s latest long-range missile test. The searchers hope to find clues to the makeup of the Hwasong-15 intercontinental-range missile launched Wednesday that is believed to be a variant of the Hwasong-14 fired off in two flights in July. The missile was fired around 3 a.m. Wednesday local time and flew 50 minutes and with an estimated range farther than all previous missile tests. It flew some 2,500 miles into space but only a distance of just over 600 miles from the launch site on the Korean Peninsula.

Deradicalizing, Rehabilitating, and Reintegrating Violent Extremists

By Feriha Peracha and Raafia Raees Khan for United States Institute of Peace (USIP)

According to Raafia Raees Khan and Feriha Peracha, recidivism remains common among former terrorist group members who have undergone deradicalization and reintegration programs. So what can such programs do to improve their effectiveness? To help find out, our authors here look at lessons learned from the Sabaoon Center’s rehabilitation and reintegration programs in Pakistan. Their findings include that such programs should 1) focus on providing psychosocial support; 2) promote skill building prior to reintegration; and 3) guarantee monitoring after reintegration.

Deterring North Korea: A Reckless Gamble We Cannot Afford

By Kevin R. James

Choosing to deter North Korea is to engage in a gamble: you avoid the costs of a preventive war today when North Korea is relatively weak, but you run the risk of an accidental nuclear war later when North Korea is vastly more powerful. Using plausible estimates of the probability of accidental nuclear war derived from the U.S.-Soviet experience during the Cold War, I find that gambling on deterrence will lead to 7.5 million U.S.-South Korean-Japanese deaths on average (under optimistic assumptions) while a preventive war now will lead to 1.4 million deaths (under pessimistic assumptions). So, not only is deterrence a gamble, it is a reckless and foolish one. Preventive war is the wise and prudent response to North Korea's nuclear threat. 

Dealing with North Korea's Nuclear Threat: The Options

In Israel, Danger Is on the Horizon

By Jacob L. Shapiro

The fight against the Islamic State in Syria and Iraq put a number of issues on hold in the Middle East. But the Islamic State is now all but defeated, and with the loss of a common enemy has come the loss of a common purpose for the anti-IS coalition. Concerns that dominated the region before IS are dominating the region once more. That means Israel, which mostly sat on the sidelines in Syria and Iraq, will become a more active player. Whoever emerged as the victor in the war in Syria would have been an enemy to Israel, and all things being equal, the Israelis preferred the Assad regime to IS. But Assad is still an enemy, and the more his regime consolidates its power, the more of a threat Syria becomes.

Recognize the Real Possibility of Conflict in North Korea

By François Godement

In a hurricane, there is a peaceful lull when the eye of the storm arrives, but it is just an illusion. This is where we are with North Korea. We think we have been seen the worst: Pyongyang tested an H-bomb and launched missiles over Japan; America has flown its bombers off North Korea’s coast; and both sides have traded insults and threats. Now the eye of the storm has arrived. We hear that American and North Korean diplomats are in contact, and Trump is talking up China’s positive but unspecified role. 

What are the European Union’s eastward expansion plans?

by M.S.

NO ONE has ever been quite sure where Europe ends and Asia starts. In the Middle Ages geographers drew the border along various rivers, including the Dnieper and the Volga. By the 1950s the Soviet Union settled on a line running down the Ural mountains, and along the ridge of the Caucasus between the Black and Caspian Seas. But this excludes Armenia, Azerbaijan and Georgia, which tend to think of themselves as European. It also includes a number of countries that the European Union is not ready to accept as candidates for membership. To address these countries’ aspirations, in 2009 the EU launched an initiative called the Eastern Partnership, which covers (in west-to-east order) Belarus, Ukraine, Moldova, Georgia, Armenia and Azerbaijan. On November 24th EU leaders held a summit with these partners in Brussels to discuss the Eastern Partnership.

Deradicalizing, Rehabilitating, and Reintegrating Violent Extremists

By Feriha Peracha and Raafia Raees Khan for United States Institute of Peace (USIP)

Over the years since 9/11, transnational violent extremist movements have become a global phenomenon. Governments worldwide are trying to understand what drives violent extremism and how the growing number of related programs can best prevent proliferation. Despite the increasing body of research on these issues (to understand the causes and to develop programs to mitigate them), questions remain about why individuals join such groups and why recidivism remains common among those who have undergone deradicalization and reintegration programs. This Peace Brief discusses lessons learned from a Pakistani case study that focuses on psychosocial support and monitoring to answer some of these questions.

Are we at cyberwar?

By: Mark Pomerleau  

From a military perspective, the Air Force is at war all the time given that adversaries are trying to deliberately affect their missions, Frank Konieczny, the service’s chief technology officer, said at the CyberCon conference in Arlington hosted by Federal Times. The Air Force, he said, has gone beyond the point of trying to defend the network because defending the entire network is not feasible. The Air Force is now trying to defend missions as opposed to “the network.” Adversaries are seeking to disrupt missions doing things as simple as disrupting data from sensors, making leaders question the validity of data they are getting. Something as simple as altering the data of air pressure in a tire of a tank could lead officials to take that asset out of battle, which could eventually lead officials to question all data coming in.

We Need Cyberspace Damage Control


Naval losses during World War I and the lessons learned in the Battle of Jutland underscored the importance of damage control to a U.S. Navy resolved to improve survivability. Analysis of German warships and procedures, combined with the attention of Navy leadership, resulted in the widespread adoption of German damage-control procedures and influenced ship construction toward more survivable designs. 1 Since the inception of modern damage-control practices during the interwar period, the Navy has demonstrated a strong tradition of rapidly reconstituting damaged ships’ seaworthiness and combat effectiveness, so they might prevent cascading damage, survive, and continue to fight. It is said if every Marine is a rifleman, then every Sailor is a damage controlman. Building on this foundation of damage control, the Navy must incorporate 21st-century practices to ensure the combat effectiveness of future naval units in all domains, including cyberspace.

In Defense of Tapping the Internet to Keep You Safe

LEVI MAXEY 

In one month, the authorities provided under Section 702 of the Foreign Intelligence and Surveillance Act (FISA) are due to expire unless reauthorized by Congress. Lawmakers are expected to renew FISA, but may put another expiration deadline on the bill, and also may add limitations on how the government is allowed to use the information it collects, according to the experts that attended The Cipher Brief’s Cyber Advisory Board meeting on Tuesday. 

For professional wiretappers, technology brings challenges and opportunities

Aaron Gregg

Some people regard government surveillance as a necessary evil at best. But in the District’s outer suburbs, covertly listening in on Americans’ phone calls is considered a stable line of business by at least one local company. Steve Bock, the chief executive of wiretapping contractor Subsentio (Latin for ‘to notice secretly’), views his work as a public service in the fight to protect national security. He became part of a generation of entrepreneurs who retooled their careers in the years after the 2001 terrorist attacks on New York and the Pentagon, when the government boosted funding for defense and intelligence efforts.

Air Force Eyes Next-Gen Electronic Warfare


BY: ORIANA PAWLYK

The Air Force will begin a concept of operations study that will explore how to best dominate the electronic warfare spectrum, an Air Force general said Tuesday. “We’ve started our next enterprise capability collaboration team, what we call as ECCT,” said Gen. Stephen Wilson, Air Force vice chief of staff at the Pentagon. The third one we’re going to focus on electronic warfare,” the general said, met by applause from the EW community during the Association of Old Crows’ annual International Symposium & Convention in Washington, D.C.

1 December 2017

Independent Assessment of U.S. Government Efforts against AlQaeda

Independent Assessment of U.S. Government 
Efforts against AlQaeda
                                                                             - Maj Gen P K Mallick,VSM (Retd)

CNA has recently published a paper on Independent Assessment of U.S. Government Efforts against AlQaeda. 

The report finds nearly 16 years after September 11, 2001, Al-Qaeda today is a very different organization in a very different world. It has suffered setbacks and periods of weakening, but it has also made gains and expanded in the face of international efforts against it. The report assesses that : 

· Al-Qaeda is still pursuing the core goals that it had in 2001, the most notable of which is the establishment of a global caliphate.

· Al-Qaeda today is larger, more agile, and more resilient than it was in 2001.

· In 2001, Al-Qaeda was a rigidly hierarchical organization. Today, Al-Qaeda is a flat, decentralized, and geographically dispersed organization.

· Al-Qaeda is a learning and adaptive organization, and this contributes to the group’s resilience.

· The threat from Al-Qaeda to the United States homeland remains, but does not appear to be the foremost goal of every part of the organization.

· The emergence of ISIS (an Al-Qaeda offshoot), presents both obstacles and opportunities for Al-Qaeda.

· Al-Qaeda may be biding its time to regroup, regenerate, and regain the mantle of global jihad.

Findings on local and regional security environments

· In the years since 2001, many of the countries in the Middle East and Africa have become increasingly politically, socially, and economically unstable.

· Al-Qaeda routinely exploits deteriorating security conditions, or vulnerabilities, in the security environments of weak and failing countries in order to maneuver and expand. 

· Al-Qaeda can exploit security vulnerabilities in weak or failing states, though its success in doing so still requires skillful approaches on the part of the organization’s affiliates.

· Al-Qaeda has benefitted from slow, negative trends in the security conditions in countries across much of the Middle East and Africa, but its largest gains have occurred when there were sharp and rapid deteriorations. 

· Worsening trends in security conditions not only help Al-Qaeda but can significantly hinder U.S. government efforts to counter the group.

Summary of assessment of U.S. government efforts against Al-Qaeda


Conclusion

Having assessed the threat that Al-Qaeda poses to the U.S. homeland and U.S. interests abroad, the impact of changing security environments across much of Africa and the Middle East on Al-Qaeda and U.S. efforts to counter the group, and the effectiveness of U.S. government approaches against Al-Qaeda, we conclude the following:

· Current U.S. efforts are more aligned with the direct threat that Al-Qaeda poses to the United States and less to the security conditions, or vulnerabilities, that Al-Qaeda exploits to survive and expand.

· U.S. government efforts to date have not defeated Al-Qaeda. The current U.S. strategy—centered on military approaches and anchored in the assumed linear goals of disrupting, dismantling, and defeating the organization—is unlikely to do so.

· Dismantling Al-Qaeda would entail a commitment of U.S. resources well beyond those committed today.

· Continued disruption of Al-Qaeda is likely to require increasing resources as security environments continue to weaken in many parts of the world where Al-Qaeda operates and seeks to operate.

Based on these findings, we conclude that the current U.S. strategy toward AlQaeda is unlikely to attain the United States’ desired goals. Therefore, we recommend that the U.S. government should undertake a new review of its policy goals and overarching strategy against Al-Qaeda. This review should take a fresh look at Al-Qaeda and the environments in which it operates, or seeks to operate, as they exist today. This review should also critically examine U.S. strategic goals with respect to Al-Qaeda and like groups, the resources required to achieve those goals, and the political and domestic appetite for sustaining them. It should also examine the balance of roles across U.S. government agencies and the timelines and metrics required for success.

The U.S. has been battling Al-Qaeda primarily militarily for 16 years and yet the group is stronger and present in more places today than it was in 2001. Clearly, the U.S. needs a renewed approach.

* Iran Reshapes the Middle East

By George Friedman

Iran has always seen itself as being in competition with the Arab states for domination of the Persian Gulf. Its ambitions were put on hold in the late 1980s, at the end of an eight-year war with Iraq that cost Iran more than a million casualties. The war ended in a military draw, but strategically it blocked Iran’s hopes for expanding its power westward. The war against the Islamic State, particularly in Iraq, has opened that door again.

The Iranian Surge

Islamists in Pakistan Reverse Counterterrorism Efforts

By Umair Jamal

The Pakistani government’s efforts to disperse hardline Islamist protesters from the capital turned deadly last week when scores of people died in clashes between protesters and security forces across the country. In response to the government’s crackdown, thousands of protesters blocked main highways across the country and shut down major city centers. On Monday morning, after the military’s intervention, hardline Islamists finally called off their three-weeklong sit-in after one of their core demands–the resignation of the federal law minister–was met by the government.

How Is the US Government Fight Against Al Qaeda Going? Only So-So, According to a New Report.


The Center for Naval Analyses (CNA) has published a very timely unclassified report entitled Independent Assessment of U.S. Government Efforts against Al-Qaeda. 

Some 380 pages long, this report is both incisive and critical in its analysis, concluding that while some progress has been made in the 16 years since the 9/11 terrorist attacks, the US government has, on the whole, not managed to contain, much less destroy al Qaeda,

Here are the report’s central conclusions viz the US government and military’s operations against AQ:

Successes:

China's Playbook for Conquering Taiwan

By Ian Easton

This Thanksgiving, as millions of American families sat down for turkey dinner and football, a dangerous game of chicken was being played out on the far side of the Pacific. Formations of Chinese bombers flanked by fighter escorts repeatedly circled Taiwan, simulating attack operations. Meanwhile, Chinese spy planes loitered nearby, collecting intelligence needed for refining China’s invasion plan against the island democracy of 23 million people.

Thousands of foreign troops in Syria _ but will they leave?

Associated Press

Syria’s long-running civil war may be winding down slowly, but the country is awash in weapons and a confounding array of local militias and thousands of foreign troops, some of which may never leave. With crucial aid from allies Iran and Russia, President Bashar Assad has regained control over large areas of Syria in advances that appear to have put to rest the possibility of a military overthrow, at least for now. But his rule is extremely reliant on continued assistance from Iranian-sponsored militias, which have spread across the war-ravaged country.

Middle East Security Status Report

Israel: Desert Raiders Send A Message

In Egypt ISIL (Islamic State in Iraq and the Levant) is making spectacular attacks to remind the world that ISIL still exists and can still punish those it considers heretics and enemies of Islam. The heretics includes anyone who does not practice the extremely conservative form of Sunni Islam ISIL has adopted. The main heretic targets tend to be Shia (which Iran represents and defends) and Sufi (a notably non-militant form of Islam that will only get violent if attacked.) For that reason ISIL has learned that it is not beneficial to kill civilians that cannot be identified as heretics or enemies of Islam. 

In the Middle East, Strange Times Make for Strange Bedfellows

by Stratfor

There was a time when Saudi Arabia considered its enmity for Israel to be a mainstay of its power. But the shifting tides of geopolitics are steadily undercutting the value of conflict between the two. Perhaps nowhere is this change clearer than in an appearance last week by Israeli defense chief Gadi Eisenkot on a Saudi-owned TV station. During the Nov. 16 interview, Eisenkot declared Israel’s readiness to share intelligence with Saudi Arabia on Iran. Israeli Energy Minister Yuval Steinitz later reinforced his colleague’s comment, confirming that Israel’s ties with the kingdom were getting stronger.

Why the Next US Recession Could Be Worse Than the Last

BY JACOB SHAPIRO

Before we begin, I’d like to offer a hearty thanks to the thousands of you who responded to the survey we issued last week. If you haven’t responded yet, don’t worry – there’s still time. The goal of the survey is to figure out what you, the readers, want to read. At the end of the month, we’ll produce a video series addressing the top three topics you have chosen. You can access the survey and let us know what’s on your mind by clicking here. Thank you in advance for your time and your thoughtfulness, and to those of you celebrating in the US or in the world, Happy Thanksgiving.

RUSSIA JUST LOST A BRAND-NEW SATELLITE AFTER MYSTERY GLITCH DURING ROCKET LAUNCH

Damien Sharkov

The launch of Russia’s newest satellite—its second ever from a multibillion-dollar spaceport unveiled last year—has failed to reach target orbit, state news agency Itar-Tass reports. The exact fate of the satellite launched in the early hours of Tuesday morning is unclear, but the Russian space agency Roscosmos confirmed by noon local time that they are not receiving signal from Meteor-M 2-1. Mission control is investigating the reason for that, but reports from sources within the agency—speaking on the condition of anonymity—suggest the rocket went awry.

Russia's New Sukhoi Su-30SM1 Fighter: Could It Crush America's Best Fighters?

Dave Majumdar

The Russians have been modifying other aircraft including the Su-35 Flanker-E and Su-34 Fullback bomber to correct issues they have discovered operating in Syria. The Russians are expected to take delivery of some 17 Su-30SMs this year. Together with the Su-35S and the Su-34 Fullback bomber, the potent multirole fighter will form the backbone of the Russian Air Force even after advanced aircraft such as the Sukhoi T-50 PAK-FA enters service. 

Russia has developed a new modernized version of the Sukhoi Su-30SM Flanker-H that features upgraded avionics and weapons.

Negotiating the EU's Future on Even Ground

By Adriano Bosoni

From its very inception, the European Union has depended on the alliance between France and Germany. The bloc's predecessor, the European Economic Community, formed with the principal goal of binding the two countries together so closely that another war on the Continent would be impossible. And from the 1950s on, a tacit agreement underlay their partnership: France was the main political and military power in the bloc, and Germany was the main financial supporter (paying for, among other things, onerous subsidies for French farmers). After German reunification in 1990, France even pushed for the creation of the euro as another way to strengthen Paris’ links with Berlin.

Cyber and Space Weapons Are Making Nuclear Deterrence Trickier

BY JAMES MILLER RICHARD FONTAIN

Stability was an overriding concern at last week’s Senate Foreign Relations Committee hearing on nuclear command authority, the first in four decades. Senators wondered aloud whether one individual — the American president — should have the sole authority to direct a nuclear attack. The focus is understandable, but there are other challenges to nuclear stability that deserve more attention than they’re getting.

The Leap into Quantum Technology: A Primer for National Security Professionals

By Michael Biercuk and Richard Fontaine

China recently announced the launch of its Jinan Project, a quantum information effort billed as “the world’s first unhackable computer network.” Building on its launch last year of the world’s first quantum-enabled satellite, China has made significant strides in quantum technology, a field with rapidly increasing relevance to national security. Its satellite has been hailed as a major step toward “unbreakable” encrypted communications.